From 99fa31a5950cff1cad75fc7eb930b5cdc6ed1369 Mon Sep 17 00:00:00 2001 From: Frank Denis Date: Wed, 6 Dec 2017 14:08:00 +0000 Subject: [PATCH] More tests --- test/default/pwhash_argon2i.c | 2 ++ test/default/pwhash_argon2id.c | 2 ++ 2 files changed, 4 insertions(+) diff --git a/test/default/pwhash_argon2i.c b/test/default/pwhash_argon2i.c index c670e0fc..fa811b88 100644 --- a/test/default/pwhash_argon2i.c +++ b/test/default/pwhash_argon2i.c @@ -181,6 +181,8 @@ tv2(void) 1ULL << 12, crypto_pwhash_alg_argon2i13()) != -1) { printf("[tv2] pwhash with a long password length should have failed\n"); } + assert(crypto_pwhash_argon2i(out, sizeof out, "password", strlen("password"), salt, + OPSLIMIT, MEMLIMIT, crypto_pwhash_alg_argon2id13()) == -1); } static void diff --git a/test/default/pwhash_argon2id.c b/test/default/pwhash_argon2id.c index 76e40601..cbb982fa 100644 --- a/test/default/pwhash_argon2id.c +++ b/test/default/pwhash_argon2id.c @@ -177,6 +177,8 @@ tv2(void) 1ULL << 12, crypto_pwhash_argon2id_alg_argon2id13()) != -1) { printf("[tv2] pwhash with a long password length should have failed\n"); } + assert(crypto_pwhash_argon2id(out, sizeof out, "password", strlen("password"), salt, + OPSLIMIT, MEMLIMIT, crypto_pwhash_alg_argon2i13()) == -1); } static void