|
1 |
| -use seed_keeper_core::seed::{rand_seed, Seed}; |
| 1 | +use seed_keeper_core::derive_key; |
| 2 | +use seed_keeper_core::seed::rand_seed; |
2 | 3 | use seed_keeper_core::wrap::{decrypt, encrypt};
|
3 |
| -use seed_keeper_core::{derive_key, ExposeSecret, Secret}; |
4 | 4 |
|
5 | 5 | #[test]
|
6 | 6 | pub fn integration_tests() {
|
7 | 7 | // Generate a secure random seed of 32 bytes:
|
8 | 8 |
|
9 |
| - let seed: Seed = rand_seed(); |
| 9 | + let seed = rand_seed(); |
10 | 10 | assert_eq!(seed.len(), 32);
|
11 | 11 |
|
12 | 12 | // Generate output key material from a username and password:
|
13 | 13 |
|
14 | 14 | let password = "some random words that you made up, for sure!".to_string();
|
15 | 15 | let salt = b"[email protected]"; // Salt should be unique per password
|
16 | 16 |
|
17 |
| - let key: Secret<Seed> = derive_key(password, salt).unwrap(); |
| 17 | + let key = derive_key(password, salt).unwrap(); |
18 | 18 |
|
19 | 19 | assert_eq!(
|
20 |
| - **key.expose_secret(), |
| 20 | + key.as_ref(), |
21 | 21 | [
|
22 | 22 | 164, 103, 254, 113, 126, 241, 57, 240, 100, 56, 243, 125, 155, 224, 40, 242, 178, 136,
|
23 | 23 | 222, 133, 220, 141, 127, 10, 88, 199, 181, 11, 241, 91, 149, 249
|
24 | 24 | ]
|
25 | 25 | );
|
26 | 26 |
|
27 | 27 | // Protect your new seed by encrypting it with the password and salt key:
|
28 |
| - let encrypted = encrypt((**key.expose_secret()).try_into().unwrap(), &seed).unwrap(); |
29 |
| - let decrypted = decrypt((**key.expose_secret()).try_into().unwrap(), &encrypted).unwrap(); |
| 28 | + let encrypted = encrypt(key.clone(), seed.clone()).unwrap(); |
| 29 | + let decrypted = decrypt(key, &encrypted).unwrap(); |
30 | 30 | assert_eq!(*seed, *decrypted.as_slice());
|
31 | 31 | }
|
0 commit comments