lockbox

password manager
Log | Files | Refs | README | LICENSE

commit a4fde7f7f824ef4623132356d0c836ca894e846f
parent a82ae406619704ec696dab12c0dc15e84ab475a9
Author: Sean Enck <sean@ttypty.com>
Date:   Sat, 17 Sep 2022 13:22:29 -0400

reset versions to match last release of lb

Diffstat:
Minternal/encrypt/core.go | 10+++++++---
Minternal/encrypt/core_test.go | 6+++++-
2 files changed, 12 insertions(+), 4 deletions(-)

diff --git a/internal/encrypt/core.go b/internal/encrypt/core.go @@ -13,9 +13,13 @@ import ( ) const ( - keyLength = 32 - algorithmBaseVersion = 0 - secretBoxAlgorithmVersion algorithmVersions = iota + keyLength = 32 + algorithmBaseVersion = 0 +) + +const ( + noopBoxAlgorithVersion algorithmVersions = iota + secretBoxAlgorithmVersion aesGCMAlgorithmVersion ) diff --git a/internal/encrypt/core_test.go b/internal/encrypt/core_test.go @@ -154,7 +154,11 @@ func TestDecryptErrors(t *testing.T) { if _, err := e.Decrypt(); err.Error() != "unable to detect algorithm" { t.Errorf("failed to decrypt, bad algorithm: %v", err) } - os.WriteFile(d, []byte{0, 2, 1}, 0600) + os.WriteFile(d, []byte{0, 0, 1}, 0600) + if _, err := e.Decrypt(); err.Error() != "unable to detect algorithm" { + t.Errorf("failed to decrypt, bad algorithm: %v", err) + } + os.WriteFile(d, []byte{0, 1, 1}, 0600) if _, err := e.Decrypt(); err.Error() != "data is invalid for decryption" { t.Errorf("failed to decrypt, bad data: %v", err) }