int main(void)
{
SODIUM_INIT;
- FOR (nb_blocks , 8, 1024) { test(nb_blocks, 32 , 3 ); }
- FOR (hash_size , 16, 256) { test(8 , hash_size, 3 ); }
- FOR (nb_iterations, 3, 10) { test(8 , 32 , nb_iterations); }
+ FOR (nb_blocks , 384, 640) { test(nb_blocks, 32 , 3 ); }
+ FOR (hash_size , 16, 256) { test(8 , hash_size, 3 ); }
+ FOR (nb_iterations, 3, 10) { test(8 , 32 , nb_iterations); }
return 0;
}
{
RANDOM_INPUT(key , 32);
RANDOM_INPUT(nonce, 8);
- RANDOM_INPUT(in , 256); // size <= 256
- u8 out [256]; // size <= 256
+ RANDOM_INPUT(in , 128); // size <= 128
+ u8 out [128]; // size <= 128
crypto_stream_chacha20_xor_ic(out, in, size, nonce, ctr, key);
{
SODIUM_INIT;
// regular tests
- FOR (size, 0, 256) { test(size, rand64()); }
+ FOR (size, 0, 128) { test(size, rand64()); }
// counter overflow (should wrap around)
- test(256, -1);
- test(256, -2);
- test(256, -3);
+ test(128, -1);
+ test(128, -2);
+ test(128, -3);
return 0;
}
void test(size_t size)
{
- RANDOM_INPUT(key, 32);
- RANDOM_INPUT(in , 256);
+ RANDOM_INPUT(key, 32);
+ RANDOM_INPUT(in , 32);
u8 tag[ 16];
crypto_onetimeauth(tag, in, size, key);
int main(void)
{
SODIUM_INIT;
- FOR (size, 0, 256) { test(size); }
+ FOR (size, 0, 32) { test(size); }
return 0;
}
{
RANDOM_INPUT(key , 32);
RANDOM_INPUT(nonce, 24);
- RANDOM_INPUT(in , 256); // size <= 256
- u8 out [256]; // size <= 256
+ RANDOM_INPUT(in , 128); // size <= 128
+ u8 out [128]; // size <= 128
crypto_stream_xchacha20_xor_ic(out, in, size, nonce, ctr, key);
{
SODIUM_INIT;
// regular tests
- FOR (size, 0, 256) { test(size, rand64()); }
+ FOR (size, 0, 128) { test(size, rand64()); }
// counter overflow (should wrap around)
- test(256, -1);
- test(256, -2);
- test(256, -3);
+ test(128, -1);
+ test(128, -2);
+ test(128, -3);
return 0;
}