From ed94e8b36944f1077fdd08c32c54234c7e50b3ec Mon Sep 17 00:00:00 2001 From: Lireer Date: Wed, 14 Oct 2020 16:02:03 +0200 Subject: [PATCH] test if using the wrong key size panics --- src/aes_ctr.rs | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/src/aes_ctr.rs b/src/aes_ctr.rs index 307c7530..bba4ffe0 100644 --- a/src/aes_ctr.rs +++ b/src/aes_ctr.rs @@ -150,6 +150,12 @@ fn xor(dest: &mut [u8], src: &[u8]) { mod tests { use super::{Aes128, Aes192, Aes256, AesCipher, AesCtrZipKeyStream}; + #[test] + #[should_panic] + fn new_with_wrong_key_size() { + AesCtrZipKeyStream::::new(&[1, 2, 3, 4, 5]); + } + // The data used in these tests was generated with p7zip without any compression. // It's not possible to recreate the exact same data, since a random salt is used for encryption. // `7z a -phelloworld -mem=AES256 -mx=0 aes256_40byte.zip 40byte_data.txt`