- ), []byte{0x1f, 0x18, 0x29, 0xa9, 0x4b, 0xdf, 0xf5, 0xbe, 0x10, 0xd0, 0xae, 0xb3, 0x6a, 0xf4, 0x98, 0xe7, 0xa9, 0x74, 0x67, 0xf3, 0xb3, 0x11, 0x16, 0xa5, 0xa7, 0xc1, 0xaf, 0xff, 0x9d, 0xea, 0xda, 0xfe}) != 0 {
- t.Fail()
+ ), []byte{
+ 0x1f, 0x18, 0x29, 0xa9, 0x4b, 0xdf, 0xf5, 0xbe,
+ 0x10, 0xd0, 0xae, 0xb3, 0x6a, 0xf4, 0x98, 0xe7,
+ 0xa9, 0x74, 0x67, 0xf3, 0xb3, 0x11, 0x16, 0xa5,
+ 0xa7, 0xc1, 0xaf, 0xff, 0x9d, 0xea, 0xda, 0xfe,
+ }) != 0 {
+ t.FailNow()
+ }
+ /* It takes too long
+ if bytes.Compare(pbkdf2.Key(
+ []byte("password"),
+ []byte("salt"),
+ 16777216,
+ 32,
+ PBKDF2Hash,
+ ), []byte{
+ 0xa5, 0x7a, 0xe5, 0xa6, 0x08, 0x83, 0x96, 0xd1,
+ 0x20, 0x85, 0x0c, 0x5c, 0x09, 0xde, 0x0a, 0x52,
+ 0x51, 0x00, 0x93, 0x8a, 0x59, 0xb1, 0xb5, 0xc3,
+ 0xf7, 0x81, 0x09, 0x10, 0xd0, 0x5f, 0xcd, 0x97,
+ }) != 0 {
+ t.FailNow()