Skip to content

Commit

Permalink
Kill more C++ comments.
Browse files Browse the repository at this point in the history
  • Loading branch information
snhenson committed Aug 31, 2006
1 parent 02c9b66 commit 0fca32a
Showing 1 changed file with 16 additions and 16 deletions.
32 changes: 16 additions & 16 deletions test/igetest.c
Original file line number Diff line number Diff line change
Expand Up @@ -285,9 +285,9 @@ int main(int argc, char **argv)
RAND_pseudo_bytes(iv, sizeof iv);
memcpy(saved_iv, iv, sizeof saved_iv);

// Forward IGE only...
/* Forward IGE only... */

// Straight encrypt/decrypt
/* Straight encrypt/decrypt */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv,
AES_ENCRYPT);
Expand All @@ -305,7 +305,7 @@ int main(int argc, char **argv)
++err;
}

// Now check encrypt chaining works
/* Now check encrypt chaining works */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv,
Expand All @@ -327,7 +327,7 @@ int main(int argc, char **argv)
++err;
}

// And check decrypt chaining
/* And check decrypt chaining */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv,
Expand All @@ -352,13 +352,13 @@ int main(int argc, char **argv)
++err;
}

// make sure garble extends forwards only
/* make sure garble extends forwards only */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT);

// corrupt halfway through
/* corrupt halfway through */
++ciphertext[sizeof ciphertext/2];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv);
Expand All @@ -382,14 +382,14 @@ int main(int argc, char **argv)
++err;
}

// Bi-directional IGE
/* Bi-directional IGE */

// Note that we don't have to recover the IV, because chaining isn't
// possible with biIGE, so the IV is not updated.
/* Note that we don't have to recover the IV, because chaining isn't */
/* possible with biIGE, so the IV is not updated. */

RAND_pseudo_bytes(rkey2, sizeof rkey2);

// Straight encrypt/decrypt
/* Straight encrypt/decrypt */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_bi_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, &key2, iv,
Expand All @@ -408,13 +408,13 @@ int main(int argc, char **argv)
++err;
}

// make sure garble extends both ways
/* make sure garble extends both ways */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT);

// corrupt halfway through
/* corrupt halfway through */
++ciphertext[sizeof ciphertext/2];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);
Expand All @@ -432,13 +432,13 @@ int main(int argc, char **argv)
++err;
}

// make sure garble extends both ways (2)
/* make sure garble extends both ways (2) */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT);

// corrupt right at the end
/* corrupt right at the end */
++ciphertext[sizeof ciphertext-1];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);
Expand All @@ -456,13 +456,13 @@ int main(int argc, char **argv)
++err;
}

// make sure garble extends both ways (3)
/* make sure garble extends both ways (3) */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT);

// corrupt right at the start
/* corrupt right at the start */
++ciphertext[0];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);
Expand Down

0 comments on commit 0fca32a

Please sign in to comment.