@@ -73,10 +73,13 @@ pub fn pbkdf2(
7373
7474#[ cfg( test) ]
7575mod tests {
76+ use test_fixture:: fixture_init;
77+
7678 use super :: * ;
7779
7880 #[ test]
7981 fn rfc_7914_vector_1 ( ) {
82+ fixture_init ( ) ;
8083 // RFC 7914 §11 provides PBKDF2-HMAC-SHA256 vectors. Using a common one:
8184 // password="password", salt="salt", iter=1, dkLen=32.
8285 let dk = pbkdf2 ( & HmacAlgorithm :: HMAC_SHA2_256 , b"password" , b"salt" , 1 , 32 ) . unwrap ( ) ;
@@ -90,6 +93,7 @@ mod tests {
9093
9194 #[ test]
9295 fn rfc_7914_vector_iter_2 ( ) {
96+ fixture_init ( ) ;
9397 let dk = pbkdf2 ( & HmacAlgorithm :: HMAC_SHA2_256 , b"password" , b"salt" , 2 , 32 ) . unwrap ( ) ;
9498 let expected = [
9599 0xae , 0x4d , 0x0c , 0x95 , 0xaf , 0x6b , 0x46 , 0xd3 , 0x2d , 0x0a , 0xdf , 0xf9 , 0x28 , 0xf0 ,
@@ -101,6 +105,7 @@ mod tests {
101105
102106 #[ test]
103107 fn pbkdf2_sha384_vector ( ) {
108+ fixture_init ( ) ;
104109 let dk = pbkdf2 ( & HmacAlgorithm :: HMAC_SHA2_384 , b"password" , b"salt" , 1 , 20 ) . unwrap ( ) ;
105110 let expected = [
106111 0xc0 , 0xe1 , 0x4f , 0x06 , 0xe4 , 0x9e , 0x32 , 0xd7 , 0x3f , 0x9f , 0x52 , 0xdd , 0xf1 , 0xd0 ,
@@ -111,6 +116,7 @@ mod tests {
111116
112117 #[ test]
113118 fn pbkdf2_sha512_vector ( ) {
119+ fixture_init ( ) ;
114120 let dk = pbkdf2 ( & HmacAlgorithm :: HMAC_SHA2_512 , b"password" , b"salt" , 1 , 20 ) . unwrap ( ) ;
115121 let expected = [
116122 0x86 , 0x7f , 0x70 , 0xcf , 0x1a , 0xde , 0x02 , 0xcf , 0xf3 , 0x75 , 0x25 , 0x99 , 0xa3 , 0xa5 ,
@@ -121,6 +127,7 @@ mod tests {
121127
122128 #[ test]
123129 fn deterministic_across_calls ( ) {
130+ fixture_init ( ) ;
124131 let a = pbkdf2 (
125132 & HmacAlgorithm :: HMAC_SHA2_256 ,
126133 b"hello" ,
@@ -142,6 +149,7 @@ mod tests {
142149
143150 #[ test]
144151 fn different_salt_different_key ( ) {
152+ fixture_init ( ) ;
145153 let a = pbkdf2 (
146154 & HmacAlgorithm :: HMAC_SHA2_256 ,
147155 b"hello" ,
0 commit comments