55 lines
5.0 KiB
Plaintext
55 lines
5.0 KiB
Plaintext
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
CONSOLE MESSAGE: AES-CBC and AES-CTR do not provide authentication by default, and implementing it manually can result in minor, but serious mistakes. We recommended using authenticated encryption like AES-GCM to protect against chosen-ciphertext attacks.
|
|
Test encrypting using AES-CTR with an imported 128bit key
|
|
|
|
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
|
|
|
|
|
Length < 64
|
|
PASS bytesToHexString(cipherText) is expectedCipherText
|
|
Length = 64
|
|
PASS bytesToHexString(cipherText) is expectedCipherText
|
|
Length = 65
|
|
PASS bytesToHexString(cipherText) is expectedCipherText
|
|
Length = 2, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText4
|
|
Length = 2, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText5
|
|
Length = 8, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText6
|
|
Length = 8, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText7
|
|
Length = 64, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText8
|
|
Length = 64, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText9
|
|
Length = 66, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText10
|
|
Length = 66, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText11
|
|
Length = 128, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText12
|
|
Length = 128, overflow
|
|
PASS bytesToHexString(cipherText) is expectedCipherText13
|
|
Length = 33
|
|
PASS bytesToHexString(cipherText) is expectedCipherText
|
|
Length = 63
|
|
PASS bytesToHexString(cipherText) is expectedCipherText
|
|
PASS successfullyParsed is true
|
|
|
|
TEST COMPLETE
|
|
|