summaryrefslogtreecommitdiff
path: root/test/igetest.c
diff options
context:
space:
mode:
authorsteve <steve>2006-08-31 21:01:15 +0000
committersteve <steve>2006-08-31 21:01:15 +0000
commit74d1aa92bde7a3495ef8f92f8b3fcae5417d9ab4 (patch)
tree34751b56869e602e515cfd44f7f3a1fc47a52b22 /test/igetest.c
parent3637e19a557b2d68ce5d1a746b1e202a9560279f (diff)
downloadopenssl-74d1aa92bde7a3495ef8f92f8b3fcae5417d9ab4.tar.gz
Kill more C++ comments.
Diffstat (limited to 'test/igetest.c')
-rw-r--r--test/igetest.c32
1 files changed, 16 insertions, 16 deletions
diff --git a/test/igetest.c b/test/igetest.c
index 2f2271b4a..d93428f42 100644
--- a/test/igetest.c
+++ b/test/igetest.c
@@ -285,9 +285,9 @@ int main(int argc, char **argv)
RAND_pseudo_bytes(iv, sizeof iv);
memcpy(saved_iv, iv, sizeof saved_iv);
- // Forward IGE only...
+ /* Forward IGE only... */
- // Straight encrypt/decrypt
+ /* Straight encrypt/decrypt */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv,
AES_ENCRYPT);
@@ -305,7 +305,7 @@ int main(int argc, char **argv)
++err;
}
- // Now check encrypt chaining works
+ /* Now check encrypt chaining works */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv,
@@ -327,7 +327,7 @@ int main(int argc, char **argv)
++err;
}
- // And check decrypt chaining
+ /* And check decrypt chaining */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv,
@@ -352,13 +352,13 @@ int main(int argc, char **argv)
++err;
}
- // make sure garble extends forwards only
+ /* make sure garble extends forwards only */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT);
- // corrupt halfway through
+ /* corrupt halfway through */
++ciphertext[sizeof ciphertext/2];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
memcpy(iv, saved_iv, sizeof iv);
@@ -382,14 +382,14 @@ int main(int argc, char **argv)
++err;
}
- // Bi-directional IGE
+ /* Bi-directional IGE */
- // Note that we don't have to recover the IV, because chaining isn't
- // possible with biIGE, so the IV is not updated.
+ /* Note that we don't have to recover the IV, because chaining isn't */
+ /* possible with biIGE, so the IV is not updated. */
RAND_pseudo_bytes(rkey2, sizeof rkey2);
- // Straight encrypt/decrypt
+ /* Straight encrypt/decrypt */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_bi_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, &key2, iv,
@@ -408,13 +408,13 @@ int main(int argc, char **argv)
++err;
}
- // make sure garble extends both ways
+ /* make sure garble extends both ways */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT);
- // corrupt halfway through
+ /* corrupt halfway through */
++ciphertext[sizeof ciphertext/2];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);
@@ -432,13 +432,13 @@ int main(int argc, char **argv)
++err;
}
- // make sure garble extends both ways (2)
+ /* make sure garble extends both ways (2) */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT);
- // corrupt right at the end
+ /* corrupt right at the end */
++ciphertext[sizeof ciphertext-1];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);
@@ -456,13 +456,13 @@ int main(int argc, char **argv)
++err;
}
- // make sure garble extends both ways (3)
+ /* make sure garble extends both ways (3) */
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_encrypt_key(rkey2, 8*sizeof rkey2, &key2);
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
AES_ENCRYPT);
- // corrupt right at the start
+ /* corrupt right at the start */
++ciphertext[0];
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
AES_set_decrypt_key(rkey2, 8*sizeof rkey2, &key2);