diff options
author | subtly <subtly@users.noreply.github.com> | 2015-03-08 20:45:23 +0800 |
---|---|---|
committer | subtly <subtly@users.noreply.github.com> | 2015-03-08 20:45:23 +0800 |
commit | 587e544063da2f14819f15d2a55859305fa80e00 (patch) | |
tree | 6f4d7864889c5cd00a9479f3b784051b2dc28438 | |
parent | 845053da1915ca9150a05a92d31cbb3e4f97ed56 (diff) | |
download | dexon-solidity-587e544063da2f14819f15d2a55859305fa80e00.tar.gz dexon-solidity-587e544063da2f14819f15d2a55859305fa80e00.tar.zst dexon-solidity-587e544063da2f14819f15d2a55859305fa80e00.zip |
fix kdf test
-rw-r--r-- | crypto.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -267,14 +267,14 @@ BOOST_AUTO_TEST_CASE(ecies_kdf) // nonce Secret z1; ecdh::agree(local.sec(), remote.pub(), z1); - auto key1 = s_secp256k1.eciesKDF(z1, bytes(), 512); + auto key1 = s_secp256k1.eciesKDF(z1, bytes(), 64); bytesConstRef eKey1 = bytesConstRef(&key1).cropped(0, 32); bytesRef mKey1 = bytesRef(&key1).cropped(32, 32); sha3(mKey1, mKey1); Secret z2; ecdh::agree(remote.sec(), local.pub(), z2); - auto key2 = s_secp256k1.eciesKDF(z2, bytes(), 512); + auto key2 = s_secp256k1.eciesKDF(z2, bytes(), 64); bytesConstRef eKey2 = bytesConstRef(&key2).cropped(0, 32); bytesRef mKey2 = bytesRef(&key2).cropped(32, 32); sha3(mKey2, mKey2); |