Kill more C++ comments.

This commit is contained in:
Dr. Stephen Henson 2006-08-31 21:01:15 +00:00
parent 02c9b66a6c
commit 0fca32a7aa

View File

@ -285,9 +285,9 @@ int main(int argc, char **argv)
RAND_pseudo_bytes(iv, sizeof iv); RAND_pseudo_bytes(iv, sizeof iv);
memcpy(saved_iv, iv, sizeof saved_iv); memcpy(saved_iv, iv, sizeof saved_iv);
// Forward IGE only... /* Forward IGE only... */
// Straight encrypt/decrypt /* Straight encrypt/decrypt */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key); AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv,
AES_ENCRYPT); AES_ENCRYPT);
@ -305,7 +305,7 @@ int main(int argc, char **argv)
++err; ++err;
} }
// Now check encrypt chaining works /* Now check encrypt chaining works */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key); AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv); memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv, AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv,
@ -327,7 +327,7 @@ int main(int argc, char **argv)
++err; ++err;
} }
// And check decrypt chaining /* And check decrypt chaining */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key); AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv); memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv, AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv,
@ -352,13 +352,13 @@ int main(int argc, char **argv)
++err; ++err;
} }
// make sure garble extends forwards only /* make sure garble extends forwards only */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key); AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv); memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv, AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT); AES_ENCRYPT);
// corrupt halfway through /* corrupt halfway through */
++ciphertext[sizeof ciphertext/2]; ++ciphertext[sizeof ciphertext/2];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key); AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv); memcpy(iv, saved_iv, sizeof iv);
@ -382,14 +382,14 @@ int main(int argc, char **argv)
++err; ++err;
} }
// Bi-directional IGE /* Bi-directional IGE */
// Note that we don't have to recover the IV, because chaining isn't /* Note that we don't have to recover the IV, because chaining isn't */
// possible with biIGE, so the IV is not updated. /* possible with biIGE, so the IV is not updated. */
RAND_pseudo_bytes(rkey2, sizeof rkey2); RAND_pseudo_bytes(rkey2, sizeof rkey2);
// Straight encrypt/decrypt /* Straight encrypt/decrypt */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key); AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2); AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_bi_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, &key2, iv, AES_bi_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, &key2, iv,
@ -408,13 +408,13 @@ int main(int argc, char **argv)
++err; ++err;
} }
// make sure garble extends both ways /* make sure garble extends both ways */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key); AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2); AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv, AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT); AES_ENCRYPT);
// corrupt halfway through /* corrupt halfway through */
++ciphertext[sizeof ciphertext/2]; ++ciphertext[sizeof ciphertext/2];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key); AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2); AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);
@ -432,13 +432,13 @@ int main(int argc, char **argv)
++err; ++err;
} }
// make sure garble extends both ways (2) /* make sure garble extends both ways (2) */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key); AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2); AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv, AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT); AES_ENCRYPT);
// corrupt right at the end /* corrupt right at the end */
++ciphertext[sizeof ciphertext-1]; ++ciphertext[sizeof ciphertext-1];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key); AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2); AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);
@ -456,13 +456,13 @@ int main(int argc, char **argv)
++err; ++err;
} }
// make sure garble extends both ways (3) /* make sure garble extends both ways (3) */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key); AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2); AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv, AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT); AES_ENCRYPT);
// corrupt right at the start /* corrupt right at the start */
++ciphertext[0]; ++ciphertext[0];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key); AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2); AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);