summaryrefslogtreecommitdiff
path: root/test/default/secretbox8.c
diff options
context:
space:
mode:
authorMicah Anderson <micah@riseup.net>2014-11-11 11:18:18 -0500
committerMicah Anderson <micah@riseup.net>2014-11-11 11:18:18 -0500
commitc73b6c9ba513fea3e18b696e659049df69931171 (patch)
treea001cd6acbecead76b9a55f324278e8d077fe3d5 /test/default/secretbox8.c
parenteabdc6e3d62550679476899dd861c23b63937142 (diff)
update to 1.0.0-1 version of the package
Diffstat (limited to 'test/default/secretbox8.c')
-rw-r--r--test/default/secretbox8.c50
1 files changed, 26 insertions, 24 deletions
diff --git a/test/default/secretbox8.c b/test/default/secretbox8.c
index 94808dc..7fbb811 100644
--- a/test/default/secretbox8.c
+++ b/test/default/secretbox8.c
@@ -1,5 +1,4 @@
-#include <stdio.h>
-#include <stdlib.h>
+
#include "windows/windows-quirks.h"
#define TEST_NAME "secretbox8"
@@ -13,28 +12,31 @@ unsigned char m2[10000];
int main(void)
{
- size_t mlen;
- size_t i;
- int caught;
+ size_t mlen;
+ size_t i;
+ int caught;
- for (mlen = 0;mlen < 1000 && mlen + crypto_secretbox_ZEROBYTES < sizeof m;++mlen) {
- randombytes(k,crypto_secretbox_KEYBYTES);
- randombytes(n,crypto_secretbox_NONCEBYTES);
- randombytes(m + crypto_secretbox_ZEROBYTES,mlen);
- crypto_secretbox(c,m,mlen + crypto_secretbox_ZEROBYTES,n,k);
- caught = 0;
- while (caught < 10) {
- c[rand() % (mlen + crypto_secretbox_ZEROBYTES)] = rand();
- if (crypto_secretbox_open(m2,c,mlen + crypto_secretbox_ZEROBYTES,n,k) == 0) {
- for (i = 0;i < mlen + crypto_secretbox_ZEROBYTES;++i)
- if (m2[i] != m[i]) {
- printf("forgery\n");
- return 100;
- }
- } else {
- ++caught;
- }
+ for (mlen = 0; mlen < 1000 && mlen + crypto_secretbox_ZEROBYTES < sizeof m;
+ ++mlen) {
+ randombytes_buf(k, crypto_secretbox_KEYBYTES);
+ randombytes_buf(n, crypto_secretbox_NONCEBYTES);
+ randombytes_buf(m + crypto_secretbox_ZEROBYTES, mlen);
+ crypto_secretbox(c, m, mlen + crypto_secretbox_ZEROBYTES, n, k);
+ caught = 0;
+ while (caught < 10) {
+ c[rand() % (mlen + crypto_secretbox_ZEROBYTES)] = rand();
+ if (crypto_secretbox_open(m2, c, mlen + crypto_secretbox_ZEROBYTES,
+ n, k) == 0) {
+ for (i = 0; i < mlen + crypto_secretbox_ZEROBYTES; ++i) {
+ if (m2[i] != m[i]) {
+ printf("forgery\n");
+ return 100;
+ }
+ }
+ } else {
+ ++caught;
+ }
+ }
}
- }
- return 0;
+ return 0;
}