diff options
author | Karel Miko <miko@dcit.cz> | 2015-04-17 10:51:53 +0200 |
---|---|---|
committer | Karel Miko <miko@dcit.cz> | 2015-04-17 10:51:53 +0200 |
commit | 2da9eda4a233e0292ba14a2312bed377b3c2c3c8 (patch) | |
tree | 15c40c3004a65b66c5814a6b4a7ee963a367d05e /t/auth_enc_gcm.t | |
parent | ae9ebf5d422fe7cfe017ae32f5dafb358b5c6fdf (diff) |
converting newlines for t/*.t
Diffstat (limited to 't/auth_enc_gcm.t')
-rw-r--r-- | t/auth_enc_gcm.t | 116 |
1 files changed, 58 insertions, 58 deletions
diff --git a/t/auth_enc_gcm.t b/t/auth_enc_gcm.t index aa6a7f14..1ff09fee 100644 --- a/t/auth_enc_gcm.t +++ b/t/auth_enc_gcm.t @@ -1,58 +1,58 @@ -use strict;
-use warnings;
-
-use Test::More tests => 12;
-
-use Crypt::AuthEnc::GCM qw( gcm_encrypt_authenticate gcm_decrypt_verify );
-
-my $key = "12345678901234561234567890123456";
-
-{
- my $pt = "plain_half";
- my $ct;
-
- my $m1 = Crypt::AuthEnc::GCM->new("AES", $key);
- $m1->iv_add("123456789012");
- $m1->adata_add("adata-123456789012");
- $ct = $m1->encrypt_add($pt);
- $ct .= $m1->encrypt_add($pt);
- my $tag = $m1->encrypt_done;
-
- is(unpack('H*', $ct), "1d56d8e991a7fc707135a79842ef9b57d885485d", "enc: ciphertext");
- is(unpack('H*', $tag), "d225e849d4d076cf9e85d5303450e793", "enc: tag");
-
- my $d1 = Crypt::AuthEnc::GCM->new("AES", $key);
- $d1->iv_add("123456789012");
- $d1->adata_add("adata-123456789012");
- my $pt2 = $d1->decrypt_add($ct);
- my $tag2 = $d1->decrypt_done();
-
- is($pt2, "plain_halfplain_half", "dec1: plaintext");
- is(unpack('H*', $tag2), "d225e849d4d076cf9e85d5303450e793", "dec1: tag");
-
- my $d2 = Crypt::AuthEnc::GCM->new("AES", $key);
- $d2->iv_add("123456789012");
- $d2->adata_add("adata-123456789012");
- my $pt3;
- $pt3 .= $d2->decrypt_add(substr($ct,$_-1,1)) for (1..length($ct));
- my $tag3 = $d2->decrypt_done();
-
- is($pt3, "plain_halfplain_half", "dec2: plaintext");
- is(unpack('H*', $tag3), "d225e849d4d076cf9e85d5303450e793", "dec2: tag");
-}
-
-{
- my ($ct, $tag) = gcm_encrypt_authenticate('AES', $key, "123456789012", "", "plain_halfplain_half");
- is(unpack('H*', $ct), "1d56d8e991a7fc707135a79842ef9b57d885485d", "gcm_encrypt_authenticate: ciphertext (no header)");
- is(unpack('H*', $tag), "1685ba0eda059ace4aab6539980c30c0", "gcm_encrypt_authenticate: tag (no header)");
- my $pt = gcm_decrypt_verify('AES', $key, "123456789012", "", $ct, $tag);
- is($pt, "plain_halfplain_half", "gcm_decrypt_verify: plaintext (no header)");
-}
-
-{
- my ($ct, $tag) = gcm_encrypt_authenticate('AES', $key, "123456789012", "adata-123456789012", "plain_halfplain_half");
- is(unpack('H*', $ct), "1d56d8e991a7fc707135a79842ef9b57d885485d", "gcm_encrypt_authenticate: ciphertext (no header)");
- is(unpack('H*', $tag), "d225e849d4d076cf9e85d5303450e793", "gcm_encrypt_authenticate: tag (no header)");
- my $pt = gcm_decrypt_verify('AES', $key, "123456789012", "adata-123456789012", $ct, $tag);
- is($pt, "plain_halfplain_half", "gcm_decrypt_verify: plaintext (no header)");
-}
+use strict; +use warnings; + +use Test::More tests => 12; + +use Crypt::AuthEnc::GCM qw( gcm_encrypt_authenticate gcm_decrypt_verify ); + +my $key = "12345678901234561234567890123456"; + +{ + my $pt = "plain_half"; + my $ct; + + my $m1 = Crypt::AuthEnc::GCM->new("AES", $key); + $m1->iv_add("123456789012"); + $m1->adata_add("adata-123456789012"); + $ct = $m1->encrypt_add($pt); + $ct .= $m1->encrypt_add($pt); + my $tag = $m1->encrypt_done; + + is(unpack('H*', $ct), "1d56d8e991a7fc707135a79842ef9b57d885485d", "enc: ciphertext"); + is(unpack('H*', $tag), "d225e849d4d076cf9e85d5303450e793", "enc: tag"); + + my $d1 = Crypt::AuthEnc::GCM->new("AES", $key); + $d1->iv_add("123456789012"); + $d1->adata_add("adata-123456789012"); + my $pt2 = $d1->decrypt_add($ct); + my $tag2 = $d1->decrypt_done(); + + is($pt2, "plain_halfplain_half", "dec1: plaintext"); + is(unpack('H*', $tag2), "d225e849d4d076cf9e85d5303450e793", "dec1: tag"); + + my $d2 = Crypt::AuthEnc::GCM->new("AES", $key); + $d2->iv_add("123456789012"); + $d2->adata_add("adata-123456789012"); + my $pt3; + $pt3 .= $d2->decrypt_add(substr($ct,$_-1,1)) for (1..length($ct)); + my $tag3 = $d2->decrypt_done(); + + is($pt3, "plain_halfplain_half", "dec2: plaintext"); + is(unpack('H*', $tag3), "d225e849d4d076cf9e85d5303450e793", "dec2: tag"); +} + +{ + my ($ct, $tag) = gcm_encrypt_authenticate('AES', $key, "123456789012", "", "plain_halfplain_half"); + is(unpack('H*', $ct), "1d56d8e991a7fc707135a79842ef9b57d885485d", "gcm_encrypt_authenticate: ciphertext (no header)"); + is(unpack('H*', $tag), "1685ba0eda059ace4aab6539980c30c0", "gcm_encrypt_authenticate: tag (no header)"); + my $pt = gcm_decrypt_verify('AES', $key, "123456789012", "", $ct, $tag); + is($pt, "plain_halfplain_half", "gcm_decrypt_verify: plaintext (no header)"); +} + +{ + my ($ct, $tag) = gcm_encrypt_authenticate('AES', $key, "123456789012", "adata-123456789012", "plain_halfplain_half"); + is(unpack('H*', $ct), "1d56d8e991a7fc707135a79842ef9b57d885485d", "gcm_encrypt_authenticate: ciphertext (no header)"); + is(unpack('H*', $tag), "d225e849d4d076cf9e85d5303450e793", "gcm_encrypt_authenticate: tag (no header)"); + my $pt = gcm_decrypt_verify('AES', $key, "123456789012", "adata-123456789012", $ct, $tag); + is($pt, "plain_halfplain_half", "gcm_decrypt_verify: plaintext (no header)"); +} |