vendor/libsodium/test/default/secretbox_easy2.c in rbnacl-libsodium-1.0.11 vs vendor/libsodium/test/default/secretbox_easy2.c in rbnacl-libsodium-1.0.13

- old
+ new

@@ -1,41 +1,42 @@ #define TEST_NAME "secretbox_easy2" #include "cmptest.h" -int main(void) +int +main(void) { unsigned char *m; unsigned char *m2; unsigned char *c; unsigned char *nonce; unsigned char *k; unsigned char *mac; - size_t mlen; - size_t i; + size_t mlen; + size_t i; - mlen = (size_t) randombytes_uniform((uint32_t) 10000) + 1U; - m = (unsigned char *) sodium_malloc(mlen); - m2 = (unsigned char *) sodium_malloc(mlen); - c = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES + mlen); + mlen = (size_t) randombytes_uniform((uint32_t) 10000) + 1U; + m = (unsigned char *) sodium_malloc(mlen); + m2 = (unsigned char *) sodium_malloc(mlen); + c = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES + mlen); nonce = (unsigned char *) sodium_malloc(crypto_secretbox_NONCEBYTES); - k = (unsigned char *) sodium_malloc(crypto_secretbox_KEYBYTES); - mac = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES); - randombytes_buf(k, crypto_secretbox_KEYBYTES); + k = (unsigned char *) sodium_malloc(crypto_secretbox_KEYBYTES); + mac = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES); + crypto_secretbox_keygen(k); randombytes_buf(m, (unsigned long long) mlen); randombytes_buf(nonce, crypto_secretbox_NONCEBYTES); crypto_secretbox_easy(c, m, (unsigned long long) mlen, nonce, k); - if (crypto_secretbox_open_easy(m2, c, - (unsigned long long) mlen + crypto_secretbox_MACBYTES, - nonce, k) != 0) { + if (crypto_secretbox_open_easy( + m2, c, (unsigned long long) mlen + crypto_secretbox_MACBYTES, nonce, + k) != 0) { printf("crypto_secretbox_open_easy() failed\n"); } printf("%d\n", memcmp(m, m2, mlen)); for (i = 0; i < mlen + crypto_secretbox_MACBYTES - 1; i++) { - if (crypto_secretbox_open_easy(m2, c, (unsigned long long) i, - nonce, k) == 0) { + if (crypto_secretbox_open_easy(m2, c, (unsigned long long) i, nonce, + k) == 0) { printf("short open() should have failed\n"); return 1; } } crypto_secretbox_detached(c, mac, m, (unsigned long long) mlen, nonce, k); @@ -47,12 +48,12 @@ memcpy(c, m, mlen); crypto_secretbox_easy(c, c, (unsigned long long) mlen, nonce, k); printf("%d\n", memcmp(m, c, mlen) == 0); printf("%d\n", memcmp(m, c + crypto_secretbox_MACBYTES, mlen) == 0); - if (crypto_secretbox_open_easy(c, c, - (unsigned long long) mlen + crypto_secretbox_MACBYTES, - nonce, k) != 0) { + if (crypto_secretbox_open_easy( + c, c, (unsigned long long) mlen + crypto_secretbox_MACBYTES, nonce, + k) != 0) { printf("crypto_secretbox_open_easy() failed\n"); } printf("%d\n", memcmp(m, c, mlen)); sodium_free(m);