libsodium/test/default/pwhash.c

60 lines
2.2 KiB
C
Raw Normal View History

2014-05-08 02:54:55 -04:00
#include <stdio.h>
#include <string.h>
#define TEST_NAME "pwhash"
#include "cmptest.h"
#define OUT_LEN 128
#define MEMLIMIT 10000000
#define OPSLIMIT 1000000
int main(void)
{
char str_out[crypto_pwhash_scryptxsalsa208sha256_STRBYTES];
2014-05-12 14:26:39 -04:00
char str_out2[crypto_pwhash_scryptxsalsa208sha256_STRBYTES];
2014-05-08 02:54:55 -04:00
unsigned char out[OUT_LEN];
char out_hex[OUT_LEN * 2 + 1];
const char *salt = "[<~A 32-bytes salt for scrypt~>]";
2014-05-08 02:54:55 -04:00
const char *passwd = "Correct Horse Battery Staple";
2014-05-12 14:26:39 -04:00
size_t i;
2014-05-08 02:54:55 -04:00
if (crypto_pwhash_scryptxsalsa208sha256(out, sizeof out,
passwd, strlen(passwd),
(const unsigned char *) salt,
MEMLIMIT, OPSLIMIT) != 0) {
printf("pwhash failure\n");
}
sodium_bin2hex(out_hex, sizeof out_hex, out, sizeof out);
printf("out_hex: [%s]\n", out_hex);
if (crypto_pwhash_scryptxsalsa208sha256_str(str_out, passwd, strlen(passwd),
MEMLIMIT, OPSLIMIT) != 0) {
printf("pwhash_str failure\n");
}
2014-05-12 14:26:39 -04:00
if (crypto_pwhash_scryptxsalsa208sha256_str(str_out2, passwd, strlen(passwd),
MEMLIMIT, OPSLIMIT) != 0) {
printf("pwhash_str(2) failure\n");
}
if (strcmp(str_out, str_out2) == 0) {
printf("pwhash_str doesn't generate different salts\n");
}
if (crypto_pwhash_scryptxsalsa208sha256_str_verify(str_out, passwd,
strlen(passwd)) != 0) {
printf("pwhash_str_verify failure\n");
}
2014-05-08 02:54:55 -04:00
if (crypto_pwhash_scryptxsalsa208sha256_str_verify(str_out, passwd,
strlen(passwd)) != 0) {
printf("pwhash_str_verify failure\n");
}
2014-05-12 14:26:39 -04:00
for (i = 14U; i < sizeof str_out; i++) {
str_out[i]++;
if (crypto_pwhash_scryptxsalsa208sha256_str_verify(str_out, passwd,
strlen(passwd)) == 0) {
printf("pwhash_str_verify(2) failure\n");
}
str_out[i]--;
}
2014-05-08 02:54:55 -04:00
printf("OK\n");
return 0;
}