diff options
author | kokke <spam@rowdy.dk> | 2017-12-06 18:30:54 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-12-06 18:30:54 +0100 |
commit | 90170cbada6af5700ab00a75ff067e9020fa6527 (patch) | |
tree | 02c7999aa589816c57e8833bead4e39a45980f5a | |
parent | Cosmetic: whitespace and indentation changes (diff) | |
download | tiny-AES-c-90170cbada6af5700ab00a75ff067e9020fa6527.tar tiny-AES-c-90170cbada6af5700ab00a75ff067e9020fa6527.tar.gz tiny-AES-c-90170cbada6af5700ab00a75ff067e9020fa6527.tar.bz2 tiny-AES-c-90170cbada6af5700ab00a75ff067e9020fa6527.tar.lz tiny-AES-c-90170cbada6af5700ab00a75ff067e9020fa6527.tar.xz tiny-AES-c-90170cbada6af5700ab00a75ff067e9020fa6527.tar.zst tiny-AES-c-90170cbada6af5700ab00a75ff067e9020fa6527.zip |
-rw-r--r-- | test.c | 33 |
1 files changed, 18 insertions, 15 deletions
@@ -97,12 +97,14 @@ static void test_encrypt_ecb_verbose(void) // print the resulting cipher as 4 x 16 byte strings printf("ciphertext:\n"); + struct AES_ctx ctx; - AES_init_ctx(&ctx,key); + AES_init_ctx(&ctx, key); + for (i = 0; i < 4; ++i) { - AES_ECB_encrypt(&ctx,plain_text + (i*16)); - phex(plain_text + (i*16)); + AES_ECB_encrypt(&ctx, plain_text + (i * 16)); + phex(plain_text + (i * 16)); } printf("\n"); } @@ -124,9 +126,10 @@ static void test_encrypt_ecb(void) #endif uint8_t in[] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a }; + struct AES_ctx ctx; - struct AES_ctx ctx; AES_init_ctx(&ctx,key); - AES_ECB_encrypt(&ctx,in); + AES_init_ctx(&ctx, key); + AES_ECB_encrypt(&ctx, in); printf("ECB encrypt: "); @@ -170,8 +173,9 @@ static void test_decrypt_cbc(void) 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }; // uint8_t buffer[64]; struct AES_ctx ctx; - AES_init_ctx_iv(&ctx,key,iv); - AES_CBC_decrypt_buffer(&ctx,in, 64); + + AES_init_ctx_iv(&ctx, key, iv); + AES_CBC_decrypt_buffer(&ctx, in, 64); printf("CBC decrypt: "); @@ -212,9 +216,9 @@ static void test_encrypt_cbc(void) 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }; - struct AES_ctx ctx; - AES_init_ctx_iv(&ctx,key,iv); + + AES_init_ctx_iv(&ctx, key, iv); AES_CBC_encrypt_buffer(&ctx, in, 64); printf("CBC encrypt: "); @@ -268,10 +272,9 @@ static void test_xcrypt_ctr(const char* xcrypt) 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }; - struct AES_ctx ctx; - AES_init_ctx_iv(&ctx,key,iv); - + + AES_init_ctx_iv(&ctx, key, iv); AES_CTR_xcrypt_buffer(&ctx, in, 64); printf("CTR %s: ", xcrypt); @@ -303,10 +306,10 @@ static void test_decrypt_ecb(void) #endif uint8_t out[] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a }; - struct AES_ctx ctx; - AES_init_ctx(&ctx,key); - AES_ECB_decrypt(&ctx,in); + + AES_init_ctx(&ctx, key); + AES_ECB_decrypt(&ctx, in); printf("ECB decrypt: "); |