Skip to content

Commit 6ea6f59

Browse files
update tests for Zeroize API
1 parent 240dd5a commit 6ea6f59

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

tests/mod.rs

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,31 @@
1-
use seed_keeper_core::seed::{rand_seed, Seed};
1+
use seed_keeper_core::derive_key;
2+
use seed_keeper_core::seed::rand_seed;
23
use seed_keeper_core::wrap::{decrypt, encrypt};
3-
use seed_keeper_core::{derive_key, ExposeSecret, Secret};
44

55
#[test]
66
pub fn integration_tests() {
77
// Generate a secure random seed of 32 bytes:
88

9-
let seed: Seed = rand_seed();
9+
let seed = rand_seed();
1010
assert_eq!(seed.len(), 32);
1111

1212
// Generate output key material from a username and password:
1313

1414
let password = "some random words that you made up, for sure!".to_string();
1515
let salt = b"[email protected]"; // Salt should be unique per password
1616

17-
let key: Secret<Seed> = derive_key(password, salt).unwrap();
17+
let key = derive_key(password, salt).unwrap();
1818

1919
assert_eq!(
20-
**key.expose_secret(),
20+
key.as_ref(),
2121
[
2222
164, 103, 254, 113, 126, 241, 57, 240, 100, 56, 243, 125, 155, 224, 40, 242, 178, 136,
2323
222, 133, 220, 141, 127, 10, 88, 199, 181, 11, 241, 91, 149, 249
2424
]
2525
);
2626

2727
// Protect your new seed by encrypting it with the password and salt key:
28-
let encrypted = encrypt((**key.expose_secret()).try_into().unwrap(), &seed).unwrap();
29-
let decrypted = decrypt((**key.expose_secret()).try_into().unwrap(), &encrypted).unwrap();
28+
let encrypted = encrypt(key.clone(), seed.clone()).unwrap();
29+
let decrypted = decrypt(key, &encrypted).unwrap();
3030
assert_eq!(*seed, *decrypted.as_slice());
3131
}

0 commit comments

Comments
 (0)