The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/contrib/libsodium/test/default/pwhash_argon2i.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 
    2 #define TEST_NAME "pwhash_argon2i"
    3 #include "cmptest.h"
    4 
    5 #define OUT_LEN 128
    6 #define OPSLIMIT 3
    7 #define MEMLIMIT 5000000
    8 
    9 static void
   10 tv(void)
   11 {
   12     static struct {
   13         const char *       passwd_hex;
   14         size_t             passwd_len;
   15         const char *       salt_hex;
   16         size_t             outlen;
   17         unsigned long long opslimit;
   18         size_t             memlimit;
   19         unsigned int       lanes;
   20     } tests[] = {
   21         { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0"
   22           "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d"
   23           "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5"
   24           "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6",
   25           127,
   26           "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2",
   27           155, 5, 7256678, 1 },
   28         { "e125cee61c8cb7778d9e5ad0a6f5d978ce9f84de213a8556d9ffe202020ab4a6ed"
   29           "9074a4eb3416f9b168f137510f3a30b70b96cbfa219ff99f6c6eaffb15c06b60e0"
   30           "0cc2890277f0fd3c622115772f7048adaebed86e",
   31           86,
   32           "f1192dd5dc2368b9cd421338b22433455ee0a3699f9379a08b9650ea2c126f0d",
   33           250, 4, 7849083, 1 },
   34         { "92263cbf6ac376499f68a4289d3bb59e5a22335eba63a32e6410249155b956b6a3"
   35           "b48d4a44906b18b897127300b375b8f834f1ceffc70880a885f47c33876717e392"
   36           "be57f7da3ae58da4fd1f43daa7e44bb82d3717af4319349c24cd31e46d295856b0"
   37           "441b6b289992a11ced1cc3bf3011604590244a3eb737ff221129215e4e4347f491"
   38           "5d41292b5173d196eb9add693be5319fdadc242906178bb6c0286c9b6ca6012746"
   39           "711f58c8c392016b2fdfc09c64f0f6b6ab7b",
   40           183,
   41           "3b840e20e9555e9fb031c4ba1f1747ce25cc1d0ff664be676b9b4a90641ff194",
   42           249, 3, 7994791, 1 },
   43         { "027b6d8e8c8c474e9b69c7d9ed4f9971e8e1ce2f6ba95048414c3970f0f09b70e3"
   44           "b6c5ae05872b3d8678705b7d381829c351a5a9c88c233569b35d6b0b809df44b64"
   45           "51a9c273f1150e2ef8a0b5437eb701e373474cd44b97ef0248ebce2ca0400e1b53"
   46           "f3d86221eca3f18eb45b702b9172440f774a82cbf1f6f525df30a6e293c873cce6"
   47           "9bb078ed1f0d31e7f9b8062409f37f19f8550aae",
   48           152,
   49           "eb2a3056a09ad2d7d7f975bcd707598f24cd32518cde3069f2e403b34bfee8a5", 5,
   50           4, 1397645, 1 },
   51         { "4a857e2ee8aa9b6056f2424e84d24a72473378906ee04a46cb05311502d5250b82"
   52           "ad86b83c8f20a23dbb74f6da60b0b6ecffd67134d45946ac8ebfb3064294bc097d"
   53           "43ced68642bfb8bbbdd0f50b30118f5e",
   54           82,
   55           "39d82eef32010b8b79cc5ba88ed539fbaba741100f2edbeca7cc171ffeabf258",
   56           190, 3, 1432947, 1 },
   57         { "c7b09aec680e7b42fedd7fc792e78b2f6c1bea8f4a884320b648f81e8cf515e8ba"
   58           "9dcfb11d43c4aae114c1734aa69ca82d44998365db9c93744fa28b63fd16000e82"
   59           "61cbbe083e7e2da1e5f696bde0834fe53146d7e0e35e7de9920d041f5a5621aabe"
   60           "02da3e2b09b405b77937efef3197bd5772e41fdb73fb5294478e45208063b5f58e"
   61           "089dbeb6d6342a909c1307b3fff5fe2cf4da56bdae50848f",
   62           156,
   63           "039c056d933b475032777edbaffac50f143f64c123329ed9cf59e3b65d3f43b6",
   64           178, 3, 4886999, 1 },
   65         { "b540beb016a5366524d4605156493f9874514a5aa58818cd0c6dfffaa9e90205f1"
   66           "7b",
   67           34,
   68           "44071f6d181561670bda728d43fb79b443bb805afdebaf98622b5165e01b15fb",
   69           231, 1, 1631659, 1 },
   70         { "a14975c26c088755a8b715ff2528d647cd343987fcf4aa25e7194a8417fb2b4b3f"
   71           "7268da9f3182b4cfb22d138b2749d673a47ecc7525dd15a0a3c66046971784bb63"
   72           "d7eae24cc84f2631712075a10e10a96b0e0ee67c43e01c423cb9c44e5371017e9c"
   73           "496956b632158da3fe12addecb88912e6759bc37f9af2f45af72c5cae3b179ffb6"
   74           "76a697de6ebe45cd4c16d4a9d642d29ddc0186a0a48cb6cd62bfc3dd229d313b30"
   75           "1560971e740e2cf1f99a9a090a5b283f35475057e96d7064e2e0fc81984591068d"
   76           "55a3b4169f22cccb0745a2689407ea1901a0a766eb99",
   77           220,
   78           "3d968b2752b8838431165059319f3ff8910b7b8ecb54ea01d3f54769e9d98daf",
   79           167, 3, 1784128, 1 },
   80     };
   81     char          passwd[256];
   82     unsigned char salt[crypto_pwhash_SALTBYTES];
   83     unsigned char out[256];
   84     char          out_hex[256 * 2 + 1];
   85     size_t        i = 0U;
   86 
   87     do {
   88         sodium_hex2bin((unsigned char *) passwd, sizeof passwd,
   89                        tests[i].passwd_hex, strlen(tests[i].passwd_hex), NULL,
   90                        NULL, NULL);
   91         sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
   92                        strlen(tests[i].salt_hex), NULL, NULL, NULL);
   93         if (crypto_pwhash(out, (unsigned long long) tests[i].outlen, passwd,
   94                           tests[i].passwd_len, (const unsigned char *) salt,
   95                           tests[i].opslimit, tests[i].memlimit,
   96                           crypto_pwhash_alg_argon2i13()) != 0) {
   97             printf("[tv] pwhash failure (maybe intentional): [%u]\n",
   98                    (unsigned int) i);
   99             continue;
  100         }
  101         sodium_bin2hex(out_hex, sizeof out_hex, out, tests[i].outlen);
  102         printf("%s\n", out_hex);
  103     } while (++i < (sizeof tests) / (sizeof tests[0]));
  104 }
  105 
  106 static void
  107 tv2(void)
  108 {
  109     static struct {
  110         const char *       passwd_hex;
  111         size_t             passwd_len;
  112         const char *       salt_hex;
  113         size_t             outlen;
  114         unsigned long long opslimit;
  115         size_t             memlimit;
  116         unsigned int       lanes;
  117     } tests[] = {
  118         { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0"
  119           "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d"
  120           "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5"
  121           "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6",
  122           127,
  123           "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2",
  124           155, 4, 397645, 1 },
  125         { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0"
  126           "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d"
  127           "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5"
  128           "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6",
  129           127,
  130           "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2",
  131           155, 3, 397645, 1 },
  132     };
  133     char          passwd[256];
  134     unsigned char salt[crypto_pwhash_SALTBYTES];
  135     unsigned char out[256];
  136     char          out_hex[256 * 2 + 1];
  137     size_t        i = 0U;
  138 
  139     do {
  140         sodium_hex2bin((unsigned char *) passwd, sizeof passwd,
  141                        tests[i].passwd_hex, strlen(tests[i].passwd_hex), NULL,
  142                        NULL, NULL);
  143         sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
  144                        strlen(tests[i].salt_hex), NULL, NULL, NULL);
  145         if (crypto_pwhash(out, (unsigned long long) tests[i].outlen, passwd,
  146                           tests[i].passwd_len, (const unsigned char *) salt,
  147                           tests[i].opslimit, tests[i].memlimit,
  148                           crypto_pwhash_alg_argon2i13()) != 0) {
  149             printf("[tv2] pwhash failure: [%u]\n", (unsigned int) i);
  150             continue;
  151         }
  152         sodium_bin2hex(out_hex, sizeof out_hex, out, tests[i].outlen);
  153         printf("%s\n", out_hex);
  154     } while (++i < (sizeof tests) / (sizeof tests[0]));
  155 
  156     if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3,
  157                       1ULL << 12, 0) != -1) {
  158         printf("[tv2] pwhash should have failed (0)\n");
  159     }
  160     if (crypto_pwhash_argon2i(out, sizeof out, "password", strlen("password"), salt, 3,
  161                               1ULL << 12, 0) != -1) {
  162         printf("[tv2] pwhash should have failed (0')\n");
  163     }
  164     if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3,
  165                       1, crypto_pwhash_alg_argon2i13()) != -1) {
  166         printf("[tv2] pwhash should have failed (1)\n");
  167     }
  168     if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3,
  169                       1ULL << 12, crypto_pwhash_alg_argon2i13()) != -1) {
  170         printf("[tv2] pwhash should have failed (2)\n");
  171     }
  172     if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 2,
  173                       1ULL << 12, crypto_pwhash_alg_argon2i13()) != -1) {
  174         printf("[tv2] pwhash should have failed (3)\n");
  175     }
  176     if (crypto_pwhash(out, 15, "password", strlen("password"), salt, 3,
  177                       1ULL << 12, crypto_pwhash_alg_argon2i13()) != -1) {
  178         printf("[tv2] pwhash with a short output length should have failed\n");
  179     }
  180     if (crypto_pwhash(out, sizeof out, "password", 0x100000000ULL, salt, 3,
  181                       1ULL << 12, crypto_pwhash_alg_argon2i13()) != -1) {
  182         printf("[tv2] pwhash with a long password length should have failed\n");
  183     }
  184     assert(crypto_pwhash_argon2i(out, sizeof out, "password", strlen("password"), salt,
  185                                  OPSLIMIT, MEMLIMIT, crypto_pwhash_alg_argon2id13()) == -1);
  186 }
  187 
  188 static void
  189 tv3(void)
  190 {
  191     static struct {
  192         const char *passwd;
  193         const char *out;
  194     } tests[] = {
  195         { "",
  196           "$argon2i$v=19$m=4096,t=1,p=1$X1NhbHQAAAAAAAAAAAAAAA$bWh++"
  197           "MKN1OiFHKgIWTLvIi1iHicmHH7+Fv3K88ifFfI" },
  198         { "",
  199           "$argon2i$v=19$m=2048,t=4,p=1$SWkxaUhpY21ISDcrRnYzSw$Mbg/"
  200           "Eck1kpZir5T9io7C64cpffdTBaORgyriLQFgQj8" },
  201         { "^T5H$JYt39n%K*j:W]!1s?vg!:jGi]Ax?..l7[p0v:1jHTpla9;]bUN;?bWyCbtqg ",
  202           "$argon2i$v=19$m=4096,t=3,p=2$X1NhbHQAAAAAAAAAAAAAAA$z/QMiU4lQxGsYNc/"
  203           "+K/bizwsA1P11UG2dj/7+aILJ4I" },
  204         { "K3S=KyH#)36_?]LxeR8QNKw6X=gFbxai$C%29V*",
  205           "$argon2i$v=19$m=4096,t=3,p=1$X1NhbHQAAAAAAAAAAAAAAA$fu2Wsecyt+"
  206           "yPnBvSvYN16oP5ozRmkp0ixJ1YL19V3Uo" }
  207     };
  208     char   *out;
  209     char   *passwd;
  210     size_t  i = 0U;
  211     int     ret;
  212 
  213     do {
  214         out = (char *) sodium_malloc(strlen(tests[i].out) + 1U);
  215         assert(out != NULL);
  216         memcpy(out, tests[i].out, strlen(tests[i].out) + 1U);
  217         passwd = (char *) sodium_malloc(strlen(tests[i].passwd) + 1U);
  218         assert(passwd != NULL);
  219         memcpy(passwd, tests[i].passwd, strlen(tests[i].passwd) + 1U);
  220         ret = crypto_pwhash_str_verify(out, passwd, strlen(passwd));
  221         sodium_free(out);
  222         sodium_free(passwd);
  223         if (ret != 0) {
  224             printf("[tv3] pwhash_str failure (maybe intentional): [%u]\n",
  225                    (unsigned int) i);
  226         }
  227     } while (++i < (sizeof tests) / (sizeof tests[0]));
  228 }
  229 
  230 static void
  231 str_tests(void)
  232 {
  233     char       *str_out;
  234     char       *str_out2;
  235     char       *salt;
  236     const char *passwd = "Correct Horse Battery Staple";
  237 
  238     salt     = (char *) sodium_malloc(crypto_pwhash_SALTBYTES);
  239     str_out  = (char *) sodium_malloc(crypto_pwhash_STRBYTES);
  240     str_out2 = (char *) sodium_malloc(crypto_pwhash_STRBYTES);
  241     memcpy(salt, ">A 16-bytes salt", crypto_pwhash_SALTBYTES);
  242     if (crypto_pwhash_argon2i_str(str_out, passwd, strlen(passwd), OPSLIMIT,
  243                                   MEMLIMIT) != 0) {
  244         printf("pwhash_argon2i_str failure\n");
  245     }
  246     if (crypto_pwhash_argon2i_str(str_out2, passwd, strlen(passwd), OPSLIMIT,
  247                                   MEMLIMIT) != 0) {
  248         printf("pwhash_argon2i_str(2) failure\n");
  249     }
  250     if (strcmp(str_out, str_out2) == 0) {
  251         printf("pwhash_argon2i_str() doesn't generate different salts\n");
  252     }
  253     if (crypto_pwhash_argon2i_str_needs_rehash(str_out, OPSLIMIT, MEMLIMIT) != 0) {
  254         printf("needs_rehash() false positive\n");
  255     }
  256     if (crypto_pwhash_argon2i_str_needs_rehash(str_out, OPSLIMIT, MEMLIMIT / 2) != 1 ||
  257         crypto_pwhash_argon2i_str_needs_rehash(str_out, OPSLIMIT / 2, MEMLIMIT) != 1 ||
  258         crypto_pwhash_argon2i_str_needs_rehash(str_out, OPSLIMIT, MEMLIMIT * 2) != 1 ||
  259         crypto_pwhash_argon2i_str_needs_rehash(str_out, OPSLIMIT * 2, MEMLIMIT) != 1) {
  260         printf("needs_rehash() false negative\n");
  261     }
  262     if (crypto_pwhash_str_needs_rehash(str_out, OPSLIMIT, MEMLIMIT / 2) != 1) {
  263         printf("pwhash_str_needs_rehash() didn't handle argon2i\n");
  264     }
  265     if (crypto_pwhash_str_needs_rehash(str_out + 1, OPSLIMIT, MEMLIMIT) != -1 ||
  266         crypto_pwhash_argon2i_str_needs_rehash(str_out + 1, OPSLIMIT, MEMLIMIT) != -1) {
  267         printf("needs_rehash() didn't fail with an invalid hash string\n");
  268     }
  269     if (sodium_is_zero((const unsigned char *) str_out + strlen(str_out),
  270                        crypto_pwhash_STRBYTES - strlen(str_out)) != 1 ||
  271         sodium_is_zero((const unsigned char *) str_out2 + strlen(str_out2),
  272                        crypto_pwhash_STRBYTES - strlen(str_out2)) != 1) {
  273         printf("pwhash_str() doesn't properly pad with zeros\n");
  274     }
  275     if (crypto_pwhash_argon2i_str_verify(str_out, passwd, strlen(passwd)) != 0) {
  276         printf("pwhash_str_verify(1) failure\n");
  277     }
  278     str_out[14]++;
  279     if (crypto_pwhash_argon2i_str_verify(str_out, passwd, strlen(passwd)) != -1) {
  280         printf("pwhash_str_verify(2) failure\n");
  281     }
  282     str_out[14]--;
  283     assert(str_out[crypto_pwhash_STRBYTES - 1U] == 0);
  284 
  285     if (crypto_pwhash_argon2i_str(str_out2, passwd, 0x100000000ULL, OPSLIMIT,
  286                                   MEMLIMIT) != -1) {
  287         printf("pwhash_str() with a large password should have failed\n");
  288     }
  289     if (crypto_pwhash_argon2i_str(str_out2, passwd, strlen(passwd), 1, MEMLIMIT) !=
  290         -1) {
  291         printf("pwhash_str() with a small opslimit should have failed\n");
  292     }
  293     if (crypto_pwhash_argon2i_str_verify("$argon2i$m=65536,t=2,p=1c29tZXNhbHQ"
  294                                          "$9sTbSlTio3Biev89thdrlKKiCaYsjjYVJxGAL3swxpQ",
  295                                          "password", 0x100000000ULL) != -1) {
  296         printf("pwhash_str_verify(invalid(0)) failure\n");
  297     }
  298     if (crypto_pwhash_argon2i_str_verify("$argon2i$m=65536,t=2,p=1c29tZXNhbHQ"
  299                                  "$9sTbSlTio3Biev89thdrlKKiCaYsjjYVJxGAL3swxpQ",
  300                                  "password", strlen("password")) != -1) {
  301         printf("pwhash_str_verify(invalid(1)) failure %d\n", errno);
  302     }
  303     if (crypto_pwhash_argon2i_str_verify("$argon2i$m=65536,t=2,p=1$c29tZXNhbHQ"
  304                                          "9sTbSlTio3Biev89thdrlKKiCaYsjjYVJxGAL3swxpQ",
  305                                          "password", strlen("password")) != -1) {
  306         printf("pwhash_str_verify(invalid(2)) failure\n");
  307     }
  308     if (crypto_pwhash_str_verify("$argon2i$m=65536,t=2,p=1$c29tZXNhbHQ"
  309                                  "$b2G3seW+uPzerwQQC+/E1K50CLLO7YXy0JRcaTuswRo",
  310                                  "password", strlen("password")) != -1) {
  311         printf("pwhash_str_verify(invalid(3)) failure\n");
  312     }
  313     if (crypto_pwhash_str_verify("$argon2i$v=19$m=65536,t=2,p=1c29tZXNhbHQ"
  314                                  "$wWKIMhR9lyDFvRz9YTZweHKfbftvj+qf+YFY4NeBbtA",
  315                                  "password", strlen("password")) != -1) {
  316         printf("pwhash_str_verify(invalid(4)) failure\n");
  317     }
  318     if (crypto_pwhash_str_verify("$argon2i$v=19$m=65536,t=2,p=1$c29tZXNhbHQ"
  319                                  "wWKIMhR9lyDFvRz9YTZweHKfbftvj+qf+YFY4NeBbtA",
  320                                  "password", strlen("password")) != -1) {
  321         printf("pwhash_str_verify(invalid(5)) failure\n");
  322     }
  323     if (crypto_pwhash_str_verify("$argon2i$v=19$m=65536,t=2,p=1$c29tZXNhbHQ"
  324                                  "$8iIuixkI73Js3G1uMbezQXD0b8LG4SXGsOwoQkdAQIM",
  325                                  "password", strlen("password")) != -1) {
  326         printf("pwhash_str_verify(invalid(6)) failure\n");
  327     }
  328     if (crypto_pwhash_str_verify(
  329             "$argon2i$v=19$m=4096,t=3,p=2$b2RpZHVlamRpc29kaXNrdw"
  330             "$TNnWIwlu1061JHrnCqIAmjs3huSxYIU+0jWipu7Kc9M",
  331             "password", strlen("password")) != 0) {
  332         printf("pwhash_str_verify(valid(7)) failure\n");
  333     }
  334     if (crypto_pwhash_str_verify(
  335             "$argon2i$v=19$m=4096,t=3,p=2$b2RpZHVlamRpc29kaXNrdw"
  336             "$TNnWIwlu1061JHrnCqIAmjs3huSxYIU+0jWipu7Kc9M",
  337             "passwore", strlen("passwore")) != -1 || errno != EINVAL) {
  338         printf("pwhash_str_verify(invalid(7)) failure\n");
  339     }
  340     if (crypto_pwhash_str_verify(
  341             "$Argon2i$v=19$m=4096,t=3,p=2$b2RpZHVlamRpc29kaXNrdw"
  342             "$TNnWIwlu1061JHrnCqIAmjs3huSxYIU+0jWipu7Kc9M",
  343             "password", strlen("password")) != -1 || errno != EINVAL) {
  344         printf("pwhash_str_verify(invalid(8)) failure\n");
  345     }
  346     if (crypto_pwhash_str_verify(
  347             "$argon2i$v=1$m=4096,t=3,p=2$b2RpZHVlamRpc29kaXNrdw"
  348             "$TNnWIwlu1061JHrnCqIAmjs3huSxYIU+0jWipu7Kc9M",
  349             "password", strlen("password")) != -1 || errno != EINVAL) {
  350         printf("pwhash_str_verify(invalid(9)) failure\n");
  351     }
  352     if (crypto_pwhash_str_verify(
  353             "$argon2i$v=1$m=4096,t=3,p=2$b2RpZHVla~=mRpc29kaXNrdw"
  354             "$TNnWIwlu1061JHrnCqIAmjs3huSxYIU+0jWipu7Kc9M",
  355             "password", strlen("password")) != -1 || errno != EINVAL) {
  356         printf("pwhash_str_verify(invalid(10)) failure\n");
  357     }
  358     if (crypto_pwhash_str_verify(
  359             "$argon2i$v=1$m=4096,t=3,p=2$b2RpZHVlamRpc29kaXNrdw"
  360             "$TNnWIwlu1061JHrnCqIAmjs3huSxYI~=U+0jWipu7Kc9M",
  361             "password", strlen("password")) != -1 || errno != EINVAL) {
  362         printf("pwhash_str_verify(invalid(11)) failure\n");
  363     }
  364     assert(crypto_pwhash_str_alg(str_out, "test", 4, OPSLIMIT, MEMLIMIT,
  365                                  crypto_pwhash_ALG_ARGON2I13) == 0);
  366     assert(crypto_pwhash_argon2i_str_verify(str_out, "test", 4) == 0);
  367     assert(crypto_pwhash_argon2i_str_needs_rehash(str_out,
  368                                                   OPSLIMIT, MEMLIMIT) == 0);
  369     assert(crypto_pwhash_argon2i_str_needs_rehash(str_out,
  370                                                   OPSLIMIT / 2, MEMLIMIT) == 1);
  371     assert(crypto_pwhash_argon2i_str_needs_rehash(str_out,
  372                                                   OPSLIMIT, MEMLIMIT / 2) == 1);
  373     assert(crypto_pwhash_argon2i_str_needs_rehash(str_out, 0, 0) == 1);
  374     assert(crypto_pwhash_argon2id_str_needs_rehash(str_out, 0, 0) == -1);
  375     assert(crypto_pwhash_argon2i_str_needs_rehash(str_out + 1,
  376                                                   OPSLIMIT, MEMLIMIT) == -1);
  377     assert(crypto_pwhash_argon2id_str_needs_rehash(str_out, 0, 0) == -1);
  378     assert(crypto_pwhash_argon2id_str_needs_rehash("", OPSLIMIT, MEMLIMIT) == -1);
  379     assert(crypto_pwhash_str_alg(str_out, "test", 4, OPSLIMIT, MEMLIMIT,
  380                                  crypto_pwhash_ALG_ARGON2ID13) == 0);
  381     assert(crypto_pwhash_argon2id_str_verify(str_out, "test", 4) == 0);
  382     assert(crypto_pwhash_argon2id_str_needs_rehash(str_out,
  383                                                    OPSLIMIT, MEMLIMIT) == 0);
  384     assert(crypto_pwhash_argon2id_str_needs_rehash(str_out,
  385                                                    OPSLIMIT / 2, MEMLIMIT) == 1);
  386     assert(crypto_pwhash_argon2id_str_needs_rehash(str_out,
  387                                                    OPSLIMIT, MEMLIMIT / 2) == 1);
  388     assert(crypto_pwhash_argon2id_str_needs_rehash(str_out, 0, 0) == 1);
  389     assert(crypto_pwhash_argon2i_str_needs_rehash(str_out, 0, 0) == -1);
  390     assert(crypto_pwhash_argon2id_str_needs_rehash("", OPSLIMIT, MEMLIMIT) == -1);
  391     assert(crypto_pwhash_argon2id_str_needs_rehash(str_out + 1,
  392                                                    OPSLIMIT, MEMLIMIT) == -1);
  393     sodium_free(salt);
  394     sodium_free(str_out);
  395     sodium_free(str_out2);
  396 }
  397 
  398 int
  399 main(void)
  400 {
  401     tv();
  402     tv2();
  403     tv3();
  404     str_tests();
  405 
  406     assert(crypto_pwhash_argon2i_bytes_min() > 0U);
  407     assert(crypto_pwhash_argon2i_bytes_max() > crypto_pwhash_argon2i_bytes_min());
  408     assert(crypto_pwhash_argon2i_passwd_max() > crypto_pwhash_argon2i_passwd_min());
  409     assert(crypto_pwhash_argon2i_saltbytes() > 0U);
  410     assert(crypto_pwhash_argon2i_strbytes() > 1U);
  411     assert(crypto_pwhash_argon2i_strbytes() > strlen(crypto_pwhash_argon2i_strprefix()));
  412 
  413     assert(crypto_pwhash_argon2i_opslimit_min() > 0U);
  414     assert(crypto_pwhash_argon2i_opslimit_max() > 0U);
  415     assert(crypto_pwhash_argon2i_memlimit_min() > 0U);
  416     assert(crypto_pwhash_argon2i_memlimit_max() > 0U);
  417     assert(crypto_pwhash_argon2i_opslimit_interactive() > 0U);
  418     assert(crypto_pwhash_argon2i_memlimit_interactive() > 0U);
  419     assert(crypto_pwhash_argon2i_opslimit_moderate() > 0U);
  420     assert(crypto_pwhash_argon2i_memlimit_moderate() > 0U);
  421     assert(crypto_pwhash_argon2i_opslimit_sensitive() > 0U);
  422     assert(crypto_pwhash_argon2i_memlimit_sensitive() > 0U);
  423 
  424     assert(crypto_pwhash_argon2i_bytes_min() == crypto_pwhash_argon2i_BYTES_MIN);
  425     assert(crypto_pwhash_argon2i_bytes_max() == crypto_pwhash_argon2i_BYTES_MAX);
  426     assert(crypto_pwhash_argon2i_passwd_min() == crypto_pwhash_argon2i_PASSWD_MIN);
  427     assert(crypto_pwhash_argon2i_passwd_max() == crypto_pwhash_argon2i_PASSWD_MAX);
  428     assert(crypto_pwhash_argon2i_saltbytes() == crypto_pwhash_argon2i_SALTBYTES);
  429     assert(crypto_pwhash_argon2i_strbytes() == crypto_pwhash_argon2i_STRBYTES);
  430 
  431     assert(crypto_pwhash_argon2i_opslimit_min() == crypto_pwhash_argon2i_OPSLIMIT_MIN);
  432     assert(crypto_pwhash_argon2i_opslimit_max() == crypto_pwhash_argon2i_OPSLIMIT_MAX);
  433     assert(crypto_pwhash_argon2i_memlimit_min() == crypto_pwhash_argon2i_MEMLIMIT_MIN);
  434     assert(crypto_pwhash_argon2i_memlimit_max() == crypto_pwhash_argon2i_MEMLIMIT_MAX);
  435     assert(crypto_pwhash_argon2i_opslimit_interactive() ==
  436            crypto_pwhash_argon2i_OPSLIMIT_INTERACTIVE);
  437     assert(crypto_pwhash_argon2i_memlimit_interactive() ==
  438            crypto_pwhash_argon2i_MEMLIMIT_INTERACTIVE);
  439     assert(crypto_pwhash_argon2i_opslimit_moderate() ==
  440            crypto_pwhash_argon2i_OPSLIMIT_MODERATE);
  441     assert(crypto_pwhash_argon2i_memlimit_moderate() ==
  442            crypto_pwhash_argon2i_MEMLIMIT_MODERATE);
  443     assert(crypto_pwhash_argon2i_opslimit_sensitive() ==
  444            crypto_pwhash_argon2i_OPSLIMIT_SENSITIVE);
  445     assert(crypto_pwhash_argon2i_memlimit_sensitive() ==
  446            crypto_pwhash_argon2i_MEMLIMIT_SENSITIVE);
  447 
  448     assert(crypto_pwhash_argon2i_alg_argon2i13() == crypto_pwhash_argon2i_ALG_ARGON2I13);
  449 
  450     printf("OK\n");
  451 
  452     return 0;
  453 }

Cache object: d86491b2de5072dcc85054e07f6a9f78


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.