vendor/libsodium/test/default/secretbox7.c in rbnacl-libsodium-0.7.0 vs vendor/libsodium/test/default/secretbox7.c in rbnacl-libsodium-1.0.0
- old
+ new
@@ -1,6 +1,5 @@
-#include <stdio.h>
#define TEST_NAME "secretbox7"
#include "cmptest.h"
unsigned char k[crypto_secretbox_KEYBYTES];
@@ -9,25 +8,28 @@
unsigned char c[10000];
unsigned char m2[10000];
int main(void)
{
- size_t mlen;
- size_t i;
+ size_t mlen;
+ size_t i;
- for (mlen = 0;mlen < 1000 && mlen + crypto_secretbox_ZEROBYTES < sizeof m;++mlen) {
- randombytes(k,crypto_secretbox_KEYBYTES);
- randombytes(n,crypto_secretbox_NONCEBYTES);
- randombytes(m + crypto_secretbox_ZEROBYTES,mlen);
- crypto_secretbox(c,m,mlen + crypto_secretbox_ZEROBYTES,n,k);
- if (crypto_secretbox_open(m2,c,mlen + crypto_secretbox_ZEROBYTES,n,k) == 0) {
- for (i = 0;i < mlen + crypto_secretbox_ZEROBYTES;++i)
- if (m2[i] != m[i]) {
- printf("bad decryption\n");
- break;
+ for (mlen = 0; mlen < 1000 && mlen + crypto_secretbox_ZEROBYTES < sizeof m;
+ ++mlen) {
+ randombytes_buf(k, crypto_secretbox_KEYBYTES);
+ randombytes_buf(n, crypto_secretbox_NONCEBYTES);
+ randombytes_buf(m + crypto_secretbox_ZEROBYTES, mlen);
+ crypto_secretbox(c, m, mlen + crypto_secretbox_ZEROBYTES, n, k);
+ if (crypto_secretbox_open(m2, c, mlen + crypto_secretbox_ZEROBYTES, n,
+ k) == 0) {
+ for (i = 0; i < mlen + crypto_secretbox_ZEROBYTES; ++i) {
+ if (m2[i] != m[i]) {
+ printf("bad decryption\n");
+ break;
+ }
+ }
+ } else {
+ printf("ciphertext fails verification\n");
}
- } else {
- printf("ciphertext fails verification\n");
}
- }
- return 0;
+ return 0;
}