summaryrefslogtreecommitdiff
path: root/test/default/box7.c
diff options
context:
space:
mode:
Diffstat (limited to 'test/default/box7.c')
-rw-r--r--test/default/box7.c38
1 files changed, 20 insertions, 18 deletions
diff --git a/test/default/box7.c b/test/default/box7.c
index ea7b484..e9b1db5 100644
--- a/test/default/box7.c
+++ b/test/default/box7.c
@@ -1,4 +1,3 @@
-#include <stdio.h>
#define TEST_NAME "box7"
#include "cmptest.h"
@@ -14,24 +13,27 @@ unsigned char m2[10000];
int main(void)
{
- size_t mlen;
- size_t i;
+ size_t mlen;
+ size_t i;
- for (mlen = 0;mlen < 1000 && mlen + crypto_box_ZEROBYTES < sizeof m;++mlen) {
- crypto_box_keypair(alicepk,alicesk);
- crypto_box_keypair(bobpk,bobsk);
- randombytes(n,crypto_box_NONCEBYTES);
- randombytes(m + crypto_box_ZEROBYTES,mlen);
- crypto_box(c,m,mlen + crypto_box_ZEROBYTES,n,bobpk,alicesk);
- if (crypto_box_open(m2,c,mlen + crypto_box_ZEROBYTES,n,alicepk,bobsk) == 0) {
- for (i = 0;i < mlen + crypto_box_ZEROBYTES;++i)
- if (m2[i] != m[i]) {
- printf("bad decryption\n");
- break;
+ for (mlen = 0; mlen < 1000 && mlen + crypto_box_ZEROBYTES < sizeof m;
+ ++mlen) {
+ crypto_box_keypair(alicepk, alicesk);
+ crypto_box_keypair(bobpk, bobsk);
+ randombytes_buf(n, crypto_box_NONCEBYTES);
+ randombytes_buf(m + crypto_box_ZEROBYTES, mlen);
+ crypto_box(c, m, mlen + crypto_box_ZEROBYTES, n, bobpk, alicesk);
+ if (crypto_box_open(m2, c, mlen + crypto_box_ZEROBYTES, n, alicepk,
+ bobsk) == 0) {
+ for (i = 0; i < mlen + crypto_box_ZEROBYTES; ++i) {
+ if (m2[i] != m[i]) {
+ printf("bad decryption\n");
+ break;
+ }
+ }
+ } else {
+ printf("ciphertext fails verification\n");
}
- } else {
- printf("ciphertext fails verification\n");
}
- }
- return 0;
+ return 0;
}