Lines Matching +full:force +full:- +full:m1
14 unsigned char *m1, *m2, *m3; in main() local
44 m1 = (unsigned char *) sodium_malloc(m1_len); in main()
53 randombytes_buf(m1, m1_len); in main()
54 memcpy(m1_, m1, m1_len); in main()
70 (state, c1, &res_len, m1, m1_len, NULL, 0, 0); in main()
89 (state, m1, &res_len, &tag, in main()
93 assert(memcmp(m1, m1_, m1_len) == 0); in main()
107 assert(ret == -1); in main()
121 assert(ret == -1); in main()
128 assert(ret == -1); in main()
136 assert(ret == -1); in main()
139 assert(ret == -1); in main()
146 assert(ret == -1); in main()
153 (state, c1, NULL, m1, m1_len, NULL, 0, 0); in main()
162 (state, m1, NULL, &tag, in main()
175 (state, c1, NULL, m1, m1_len, NULL, 0, 0); in main()
187 (state, m1, NULL, &tag, in main()
194 assert(ret == -1); in main()
211 (state, c1, NULL, m1, m1_len, NULL, 0, crypto_secretstream_xchacha20poly1305_TAG_REKEY); in main()
223 (state, m1, NULL, &tag, in main()
237 (state, c1, NULL, m1, m1_len, NULL, 0, 0); in main()
252 (state, c1, &res_len, m1, m1_len, NULL, 0, in main()
257 /* Force a counter overflow, check that the key has been updated in main()
260 memset(state->nonce, 0xff, 4U); in main()
267 assert(memcmp(state_copy.k, state->k, sizeof state->k) != 0); in main()
268 assert(memcmp(state_copy.nonce, state->nonce, sizeof state->nonce) != 0); in main()
269 assert(state->nonce[0] == 1U); in main()
270 assert(sodium_is_zero(state->nonce + 1, 3U)); in main()
276 (state, m1, &res_len, &tag, in main()
280 assert(memcmp(m1, m1_, m1_len) == 0); in main()
283 memset(state->nonce, 0xff, 4U); in main()
297 sodium_free(m1); in main()