pwhash_scrypt.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400
  1. #define TEST_NAME "pwhash_scrypt"
  2. #include "cmptest.h"
  3. #define OUT_LEN 128
  4. #define OPSLIMIT 1000000
  5. #define MEMLIMIT 10000000
  6. static void
  7. tv(void)
  8. {
  9. static struct {
  10. const char *passwd_hex;
  11. size_t passwdlen;
  12. const char *salt_hex;
  13. size_t outlen;
  14. unsigned long long opslimit;
  15. size_t memlimit;
  16. } tests[] = {
  17. { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0"
  18. "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d"
  19. "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5"
  20. "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6",
  21. 127,
  22. "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2",
  23. 155, 481326, 7256678 },
  24. { "e125cee61c8cb7778d9e5ad0a6f5d978ce9f84de213a8556d9ffe202020ab4a6ed"
  25. "9074a4eb3416f9b168f137510f3a30b70b96cbfa219ff99f6c6eaffb15c06b60e0"
  26. "0cc2890277f0fd3c622115772f7048adaebed86e",
  27. 86,
  28. "f1192dd5dc2368b9cd421338b22433455ee0a3699f9379a08b9650ea2c126f0d",
  29. 250, 535778, 7849083 },
  30. { "92263cbf6ac376499f68a4289d3bb59e5a22335eba63a32e6410249155b956b6a3"
  31. "b48d4a44906b18b897127300b375b8f834f1ceffc70880a885f47c33876717e392"
  32. "be57f7da3ae58da4fd1f43daa7e44bb82d3717af4319349c24cd31e46d295856b0"
  33. "441b6b289992a11ced1cc3bf3011604590244a3eb737ff221129215e4e4347f491"
  34. "5d41292b5173d196eb9add693be5319fdadc242906178bb6c0286c9b6ca6012746"
  35. "711f58c8c392016b2fdfc09c64f0f6b6ab7b",
  36. 183,
  37. "3b840e20e9555e9fb031c4ba1f1747ce25cc1d0ff664be676b9b4a90641ff194",
  38. 249, 311757, 7994791 },
  39. { "027b6d8e8c8c474e9b69c7d9ed4f9971e8e1ce2f6ba95048414c3970f0f09b70e3"
  40. "b6c5ae05872b3d8678705b7d381829c351a5a9c88c233569b35d6b0b809df44b64"
  41. "51a9c273f1150e2ef8a0b5437eb701e373474cd44b97ef0248ebce2ca0400e1b53"
  42. "f3d86221eca3f18eb45b702b9172440f774a82cbf1f6f525df30a6e293c873cce6"
  43. "9bb078ed1f0d31e7f9b8062409f37f19f8550aae",
  44. 152,
  45. "eb2a3056a09ad2d7d7f975bcd707598f24cd32518cde3069f2e403b34bfee8a5", 5,
  46. 643464, 1397645 },
  47. { "4a857e2ee8aa9b6056f2424e84d24a72473378906ee04a46cb05311502d5250b82"
  48. "ad86b83c8f20a23dbb74f6da60b0b6ecffd67134d45946ac8ebfb3064294bc097d"
  49. "43ced68642bfb8bbbdd0f50b30118f5e",
  50. 82,
  51. "39d82eef32010b8b79cc5ba88ed539fbaba741100f2edbeca7cc171ffeabf258",
  52. 190, 758010, 5432947 },
  53. { "1845e375479537e9dd4f4486d5c91ac72775d66605eeb11a787b78a7745f1fd005"
  54. "2d526c67235dbae1b2a4d575a74cb551c8e9096c593a497aee74ba3047d911358e"
  55. "de57bc27c9ea1829824348daaab606217cc931dcb6627787bd6e4e5854f0e8",
  56. 97,
  57. "3ee91a805aa62cfbe8dce29a2d9a44373a5006f4a4ce24022aca9cecb29d1473",
  58. 212, 233177, 13101817 },
  59. { "c7b09aec680e7b42fedd7fc792e78b2f6c1bea8f4a884320b648f81e8cf515e8ba"
  60. "9dcfb11d43c4aae114c1734aa69ca82d44998365db9c93744fa28b63fd16000e82"
  61. "61cbbe083e7e2da1e5f696bde0834fe53146d7e0e35e7de9920d041f5a5621aabe"
  62. "02da3e2b09b405b77937efef3197bd5772e41fdb73fb5294478e45208063b5f58e"
  63. "089dbeb6d6342a909c1307b3fff5fe2cf4da56bdae50848f",
  64. 156,
  65. "039c056d933b475032777edbaffac50f143f64c123329ed9cf59e3b65d3f43b6",
  66. 178, 234753, 4886999 },
  67. { "8f3a06e2fd8711350a517bb12e31f3d3423e8dc0bb14aac8240fca0995938d59bb"
  68. "37bd0a7dfc9c9cc0705684b46612e8c8b1d6655fb0f9887562bb9899791a0250d1"
  69. "320f945eda48cdc20c233f40a5bb0a7e3ac5ad7250ce684f68fc0b8c9633bfd75a"
  70. "ad116525af7bdcdbbdb4e00ab163fd4df08f243f12557e",
  71. 122,
  72. "90631f686a8c3dbc0703ffa353bc1fdf35774568ac62406f98a13ed8f47595fd",
  73. 55, 695191, 15738350 },
  74. { "b540beb016a5366524d4605156493f9874514a5aa58818cd0c6dfffaa9e90205f1"
  75. "7b",
  76. 34,
  77. "44071f6d181561670bda728d43fb79b443bb805afdebaf98622b5165e01b15fb",
  78. 231, 78652, 6631659 },
  79. { "a14975c26c088755a8b715ff2528d647cd343987fcf4aa25e7194a8417fb2b4b3f"
  80. "7268da9f3182b4cfb22d138b2749d673a47ecc7525dd15a0a3c66046971784bb63"
  81. "d7eae24cc84f2631712075a10e10a96b0e0ee67c43e01c423cb9c44e5371017e9c"
  82. "496956b632158da3fe12addecb88912e6759bc37f9af2f45af72c5cae3b179ffb6"
  83. "76a697de6ebe45cd4c16d4a9d642d29ddc0186a0a48cb6cd62bfc3dd229d313b30"
  84. "1560971e740e2cf1f99a9a090a5b283f35475057e96d7064e2e0fc81984591068d"
  85. "55a3b4169f22cccb0745a2689407ea1901a0a766eb99",
  86. 220,
  87. "3d968b2752b8838431165059319f3ff8910b7b8ecb54ea01d3f54769e9d98daf",
  88. 167, 717248, 10784179 },
  89. };
  90. char passwd[256];
  91. unsigned char salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES];
  92. unsigned char out[256];
  93. char out_hex[256 * 2 + 1];
  94. size_t i = 0U;
  95. do {
  96. sodium_hex2bin((unsigned char *) passwd, sizeof passwd,
  97. tests[i].passwd_hex, strlen(tests[i].passwd_hex), NULL,
  98. NULL, NULL);
  99. sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
  100. strlen(tests[i].salt_hex), NULL, NULL, NULL);
  101. if (crypto_pwhash_scryptsalsa208sha256(
  102. out, (unsigned long long) tests[i].outlen, passwd,
  103. tests[i].passwdlen, (const unsigned char *) salt,
  104. tests[i].opslimit, tests[i].memlimit) != 0) {
  105. printf("pwhash failure\n");
  106. }
  107. sodium_bin2hex(out_hex, sizeof out_hex, out, tests[i].outlen);
  108. printf("%s\n", out_hex);
  109. } while (++i < (sizeof tests) / (sizeof tests[0]));
  110. }
  111. static void
  112. tv2(void)
  113. {
  114. static struct {
  115. const char *passwd_hex;
  116. size_t passwdlen;
  117. const char *salt_hex;
  118. size_t outlen;
  119. unsigned long long opslimit;
  120. size_t memlimit;
  121. } tests[] = {
  122. { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0"
  123. "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d"
  124. "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5"
  125. "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6",
  126. 127,
  127. "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2",
  128. 155, 64, 1397645 },
  129. { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0"
  130. "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d"
  131. "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5"
  132. "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6",
  133. 127,
  134. "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2",
  135. 155, 32768, 1397645 },
  136. };
  137. char passwd[256];
  138. unsigned char salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES];
  139. unsigned char out[256];
  140. char out_hex[256 * 2 + 1];
  141. size_t i = 0U;
  142. do {
  143. sodium_hex2bin((unsigned char *) passwd, sizeof passwd,
  144. tests[i].passwd_hex, strlen(tests[i].passwd_hex), NULL,
  145. NULL, NULL);
  146. sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
  147. strlen(tests[i].salt_hex), NULL, NULL, NULL);
  148. if (crypto_pwhash_scryptsalsa208sha256(
  149. out, (unsigned long long) tests[i].outlen, passwd,
  150. tests[i].passwdlen, (const unsigned char *) salt,
  151. tests[i].opslimit, tests[i].memlimit) != 0) {
  152. printf("pwhash failure\n");
  153. }
  154. sodium_bin2hex(out_hex, sizeof out_hex, out, tests[i].outlen);
  155. printf("%s\n", out_hex);
  156. } while (++i < (sizeof tests) / (sizeof tests[0]));
  157. }
  158. static void
  159. tv3(void)
  160. {
  161. static struct {
  162. const char *passwd;
  163. const char *out;
  164. } tests[] = {
  165. { "^T5H$JYt39n%K*j:W]!1s?vg!:jGi]Ax?..l7[p0v:1jHTpla9;]bUN;?bWyCbtqg "
  166. "nrDFal+Jxl3,2`#^tFSu%v_+7iYse8-cCkNf!tD=KrW)",
  167. "$7$B6....1....75gBMAGwfFWZqBdyF3WdTQnWdUsuTiWjG1fF9c1jiSD$tc8RoB3."
  168. "Em3/zNgMLWo2u00oGIoTyJv4fl3Fl8Tix72" },
  169. { "bl72h6#y<':MFRZ>B IA1=NRkCKS%W8`1I.2uQxJN0g)N N aTt^4K!Iw5r "
  170. "H6;crDsv^a55j9tsk'/GqweZn;cdk6+F_St6:#*=?ZCD_lw>.",
  171. "$7$A6....3....Iahc6qM0.UQJHVgE4h9oa1/"
  172. "4OWlWLm9CCtfguvz6bQD$QnXCo3M7nIqtry2WKsUZ5gQ.mY0wAlJu."
  173. "WUhtE8vF66" },
  174. { "Py "
  175. ">e.5b+tLo@rL`dC2k@eJ&4eVl!W=JJ4+k&mAt@gt',FS1JjqKW3aq21:]^kna`"
  176. "mde7kVkN5NrpKUptu)@4*b&?BE_sJMG1=&@`3GBCV]Wg7xwgo7x3El",
  177. "$7$96..../....f6bEusKt79kK4wdYN0ki2nw4bJQ7P3rN6k3BSigsK/"
  178. "D$Dsvuw7vXj5xijmrb/NOhdgoyK/OiSIYv88cEtl9Cik7" },
  179. { "2vj;Um]FKOL27oam(:Uo8+UmSTvb1FD*h?jk_,S=;RDgF-$Fjk?]9yvfxe@fN^!NN("
  180. "Cuml?+2Raa",
  181. "$7$86....I....7XwIxLtCx4VphmFeUa6OGuGJrFaIaYzDiLNu/"
  182. "tyUPhD$U3q5GCEqCWxMwh.YQHDJrlg7FIZgViv9pcXE3h1vg61" },
  183. { "CT=[9uUoGav,J`kU+348tA50ue#sL:ABZ3QgF+r[#vh:tTOiL>s8tv%,Jeo]jH/"
  184. "_4^i(*jD-_ku[9Ko[=86 06V",
  185. "$7$A6....2....R3.bjH6YS9wz9z8Jsj.3weGQ3J80ZZElGw2oVux1TP6$"
  186. "i5u6lFzXDHaIgYEICinLD6WNaovbiXP8SnLrDRdKgA9" },
  187. { "J#wNn`hDgOpTHNI.w^1a70%f,.9V_m038H_JIJQln`vdWnn/"
  188. "rmILR?9H5g(+`;@H(2VosN9Fgk[WEjaBr'yB9Q19-imNa04[Mk5kvGcSn-TV",
  189. "$7$B6....1....Dj1y.4mF1J9XmT/6IDskYdCLaPFJTq9xcCwXQ1DpT92$92/"
  190. "hYfZLRq1nTLyIz.uc/dC6wLqwnsoqpkadrCXusm6" },
  191. { "j4BS38Asa;p)[K+9TY!3YDj<LK-`nLVXQw9%*QfM",
  192. "$7$B6....1....5Ods8mojVwXJq4AywF/uI9BdMSiJ/zT8hQP/"
  193. "4cB68VC$nk4ExHNXJ802froj51/1wJTrSZvTIyyK7PecOxRRaz0" },
  194. { "M.R>Qw+!qJb]>pP :_.9`dxM9k [eR7Y!yL-3)sNs[R,j_/^ "
  195. "TH=5ny'15>6UXWcQW^6D%XCsO[vN[%ReA-`tV1vW(Nt*0KVK#]45P_A",
  196. "$7$B6....1....D/"
  197. "eyk8N5y6Z8YVQEsw521cTx.9zzLuK7YDs1KMMh.o4$alfW8ZbsUWnXc."
  198. "vqon2zoljVk24Tt1.IsCuo2KurvS2" },
  199. { "K3S=KyH#)36_?]LxeR8QNKw6X=gFb'ai$C%29V* "
  200. "tyh^Wo$TN-#Q4qkmtTCf0LLb.^E$0uykkP",
  201. "$7$B6....1....CuBuU97xgAage8whp/"
  202. "JNKobo0TFbsORGVbfcQIefyP8$aqalP."
  203. "XofGViB8EPLONqHma8vs1xc9uTIMYh9CgE.S8" },
  204. { "Y0!?iQa9M%5ekffW(`",
  205. "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  206. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  207. /* Invalid pwhash strings */
  208. { "Y0!?iQa9M%5ekffW(`",
  209. "$7$A6....1....$TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4"
  210. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  211. { "Y0!?iQa9M%5ekffW(`",
  212. "$7$.6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  213. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  214. { "Y0!?iQa9M%5ekffW(`",
  215. "$7$A.....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  216. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  217. { "Y0!?iQa9M%5ekffW(`",
  218. "$7$A6.........TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  219. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  220. { "Y0!?iQa9M%5ekffW(`",
  221. "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i44269$"
  222. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AH" },
  223. { "Y0!?iQa9M%5ekffW(`",
  224. "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  225. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx54269" },
  226. { "Y0!?iQa9M%5ekffW(`",
  227. "$7^A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  228. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  229. { "Y0!?iQa9M%5ekffW(`",
  230. "$7$!6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  231. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  232. { "Y0!?iQa9M%5ekffW(`",
  233. "$7$A!....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  234. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  235. { "Y0!?iQa9M%5ekffW(`",
  236. "$7$A6....!....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  237. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  238. { "",
  239. "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  240. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  241. { "Y0!?iQa9M%5ekffW(`",
  242. "$7fA6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4#"
  243. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  244. { "Y0!?iQa9M%5ekffW(`",
  245. "$7$AX....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  246. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  247. { "Y0!?iQa9M%5ekffW(`",
  248. "$7$A6....1!...TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$"
  249. "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" },
  250. { "Y0!?iQa9M%5ekffW(`", "$7$A6....1" },
  251. { "Y0!?iQa9M%5ekffW(`", "$7$" },
  252. { "Y0!?iQa9M%5ekffW(`", "" },
  253. { "Y0!?iQa9M%5ekffW(`",
  254. "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" },
  255. { "test",
  256. "$7$.6..../.....lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." },
  257. { "test",
  258. "$7$z6..../.....lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." },
  259. { "test",
  260. "$7$8zzzzz/.....lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." },
  261. { "test",
  262. "$7$8zzzzzzzzzz.lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." },
  263. { "test",
  264. "$7$8.....zzzzz.lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." },
  265. { "test",
  266. "$7$86..../..../lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." }
  267. };
  268. char * out;
  269. char * passwd;
  270. size_t i = 0U;
  271. do {
  272. out = (char *) sodium_malloc(strlen(tests[i].out) + 1U);
  273. assert(out != NULL);
  274. memcpy(out, tests[i].out, strlen(tests[i].out) + 1U);
  275. passwd = (char *) sodium_malloc(strlen(tests[i].passwd) + 1U);
  276. assert(passwd != NULL);
  277. memcpy(passwd, tests[i].passwd, strlen(tests[i].passwd) + 1U);
  278. if (crypto_pwhash_scryptsalsa208sha256_str_verify(
  279. out, passwd, strlen(passwd)) != 0) {
  280. printf("pwhash_str failure: [%u]\n", (unsigned int) i);
  281. }
  282. sodium_free(out);
  283. sodium_free(passwd);
  284. } while (++i < (sizeof tests) / (sizeof tests[0]));
  285. }
  286. static void
  287. str_tests(void)
  288. {
  289. char *str_out;
  290. char *str_out2;
  291. char *salt;
  292. const char *passwd = "Correct Horse Battery Staple";
  293. salt = (char *) sodium_malloc(crypto_pwhash_scryptsalsa208sha256_SALTBYTES);
  294. str_out =
  295. (char *) sodium_malloc(crypto_pwhash_scryptsalsa208sha256_STRBYTES);
  296. str_out2 =
  297. (char *) sodium_malloc(crypto_pwhash_scryptsalsa208sha256_STRBYTES);
  298. memcpy(salt, "[<~A 32-bytes salt for scrypt~>]",
  299. crypto_pwhash_scryptsalsa208sha256_SALTBYTES);
  300. if (crypto_pwhash_scryptsalsa208sha256_str(str_out, passwd, strlen(passwd),
  301. OPSLIMIT, MEMLIMIT) != 0) {
  302. printf("pwhash_str failure\n");
  303. }
  304. if (crypto_pwhash_scryptsalsa208sha256_str(str_out2, passwd, strlen(passwd),
  305. OPSLIMIT, MEMLIMIT) != 0) {
  306. printf("pwhash_str(2) failure\n");
  307. }
  308. if (strcmp(str_out, str_out2) == 0) {
  309. printf("pwhash_str doesn't generate different salts\n");
  310. }
  311. if (crypto_pwhash_scryptsalsa208sha256_str_needs_rehash
  312. (str_out, OPSLIMIT, MEMLIMIT) != 0) {
  313. printf("needs_rehash() false positive\n");
  314. }
  315. if (crypto_pwhash_scryptsalsa208sha256_str_needs_rehash
  316. (str_out, OPSLIMIT, MEMLIMIT / 2) != 1 ||
  317. crypto_pwhash_scryptsalsa208sha256_str_needs_rehash
  318. (str_out, OPSLIMIT / 2, MEMLIMIT) != 1 ||
  319. crypto_pwhash_scryptsalsa208sha256_str_needs_rehash
  320. (str_out, OPSLIMIT, MEMLIMIT * 2) != 1 ||
  321. crypto_pwhash_scryptsalsa208sha256_str_needs_rehash
  322. (str_out, OPSLIMIT * 2, MEMLIMIT) != 1) {
  323. printf("needs_rehash() false negative\n");
  324. }
  325. if (crypto_pwhash_scryptsalsa208sha256_str_needs_rehash
  326. (str_out + 1, OPSLIMIT, MEMLIMIT) != -1) {
  327. printf("needs_rehash() didn't fail with an invalid hash string\n");
  328. }
  329. if (crypto_pwhash_scryptsalsa208sha256_str_verify(str_out, passwd,
  330. strlen(passwd)) != 0) {
  331. printf("pwhash_str_verify failure\n");
  332. }
  333. if (crypto_pwhash_scryptsalsa208sha256_str_verify(str_out, passwd,
  334. strlen(passwd)) != 0) {
  335. printf("pwhash_str_verify failure\n");
  336. }
  337. str_out[14]++;
  338. if (crypto_pwhash_scryptsalsa208sha256_str_verify(str_out, passwd,
  339. strlen(passwd)) == 0) {
  340. printf("pwhash_str_verify(2) failure\n");
  341. }
  342. str_out[14]--;
  343. assert(str_out[crypto_pwhash_scryptsalsa208sha256_STRBYTES - 1U] == 0);
  344. assert(crypto_pwhash_scryptsalsa208sha256_str_needs_rehash
  345. (str_out, 0, 0) == 1);
  346. assert(crypto_pwhash_str_needs_rehash(str_out, 0, 0) == -1);
  347. assert(crypto_pwhash_str_needs_rehash(str_out, OPSLIMIT, MEMLIMIT) == -1);
  348. assert(crypto_pwhash_scryptsalsa208sha256_str_needs_rehash
  349. ("", OPSLIMIT, MEMLIMIT) == -1);
  350. sodium_free(salt);
  351. sodium_free(str_out);
  352. sodium_free(str_out2);
  353. }
  354. int
  355. main(void)
  356. {
  357. tv();
  358. tv2();
  359. tv3();
  360. str_tests();
  361. assert(crypto_pwhash_scryptsalsa208sha256_bytes_min() > 0U);
  362. assert(crypto_pwhash_scryptsalsa208sha256_bytes_max() >
  363. crypto_pwhash_scryptsalsa208sha256_bytes_min());
  364. assert(crypto_pwhash_scryptsalsa208sha256_passwd_max() >
  365. crypto_pwhash_scryptsalsa208sha256_passwd_min());
  366. assert(crypto_pwhash_scryptsalsa208sha256_saltbytes() > 0U);
  367. assert(crypto_pwhash_scryptsalsa208sha256_strbytes() > 1U);
  368. assert(crypto_pwhash_scryptsalsa208sha256_strbytes() >
  369. strlen(crypto_pwhash_scryptsalsa208sha256_strprefix()));
  370. assert(crypto_pwhash_scryptsalsa208sha256_opslimit_min() > 0U);
  371. assert(crypto_pwhash_scryptsalsa208sha256_opslimit_max() > 0U);
  372. assert(crypto_pwhash_scryptsalsa208sha256_memlimit_min() > 0U);
  373. assert(crypto_pwhash_scryptsalsa208sha256_memlimit_max() > 0U);
  374. assert(crypto_pwhash_scryptsalsa208sha256_opslimit_interactive() > 0U);
  375. assert(crypto_pwhash_scryptsalsa208sha256_memlimit_interactive() > 0U);
  376. assert(crypto_pwhash_scryptsalsa208sha256_opslimit_sensitive() > 0U);
  377. assert(crypto_pwhash_scryptsalsa208sha256_memlimit_sensitive() > 0U);
  378. printf("OK\n");
  379. return 0;
  380. }