test/crypto.c

changeset 488
29b979ca8750
parent 487
a2fc5b1cd476
child 515
2465dd550bb5
equal deleted inserted replaced
487:a2fc5b1cd476 488:29b979ca8750
416 for(int p=0;p<4;p++) { 416 for(int p=0;p<4;p++) {
417 for(int s=0;s<4;s++) { 417 for(int s=0;s<4;s++) {
418 DavKey *keys[4]; 418 DavKey *keys[4];
419 keys[0] = dav_pw2key( 419 keys[0] = dav_pw2key(
420 pws[p], 420 pws[p],
421 salt[s], 421 (char*)salt[s],
422 saltlen[s], 422 saltlen[s],
423 DAV_PWFUNC_PBKDF2_SHA256, 423 DAV_PWFUNC_PBKDF2_SHA256,
424 DAV_KEY_AES128); 424 DAV_KEY_AES128);
425 keys[1] = dav_pw2key( 425 keys[1] = dav_pw2key(
426 pws[p], 426 pws[p],
427 salt[s], 427 (char*)salt[s],
428 saltlen[s], 428 saltlen[s],
429 DAV_PWFUNC_PBKDF2_SHA256, 429 DAV_PWFUNC_PBKDF2_SHA256,
430 DAV_KEY_AES256); 430 DAV_KEY_AES256);
431 keys[2] = dav_pw2key( 431 keys[2] = dav_pw2key(
432 pws[p], 432 pws[p],
433 salt[s], 433 (char*)salt[s],
434 saltlen[s], 434 saltlen[s],
435 DAV_PWFUNC_PBKDF2_SHA512, 435 DAV_PWFUNC_PBKDF2_SHA512,
436 DAV_KEY_AES128); 436 DAV_KEY_AES128);
437 keys[3] = dav_pw2key( 437 keys[3] = dav_pw2key(
438 pws[p], 438 pws[p],
439 salt[s], 439 (char*)salt[s],
440 saltlen[s], 440 saltlen[s],
441 DAV_PWFUNC_PBKDF2_SHA512, 441 DAV_PWFUNC_PBKDF2_SHA512,
442 DAV_KEY_AES256); 442 DAV_KEY_AES256);
443 443
444 for(int i=0;i<4;i++) { 444 for(int i=0;i<4;i++) {
445 DavKey *key = keys[i]; 445 DavKey *key = keys[i];
446 446
447 int index = 16*p + 4*s + i; 447 int index = 16*p + 4*s + i;
448 int keylen = index % 2 == 0 ? 16 : 32; 448 int keylen = index % 2 == 0 ? 16 : 32;
449 449
450 char *s1 = pwgenkeys[index];
451 char *s2 = key->data;
452
453 UCX_TEST_ASSERT(keylen == key->length, "wrong key length"); 450 UCX_TEST_ASSERT(keylen == key->length, "wrong key length");
454 UCX_TEST_ASSERT(!memcmp(key->data, pwgenkeys[index], keylen), "wrong key data"); 451 UCX_TEST_ASSERT(!memcmp(key->data, pwgenkeys[index], keylen), "wrong key data");
455 } 452 }
456 } 453 }
457 } 454 }

mercurial