ruby-aes-unroll1 1.0 → 1.1
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG +7 -1
- data/Rakefile +3 -3
- data/doc/rdoc/classes/Aes.html +112 -106
- data/doc/rdoc/classes/AesShared.html +265 -0
- data/doc/rdoc/created.rid +1 -1
- data/doc/rdoc/files/CHANGELOG.html +12 -2
- data/doc/rdoc/files/COPYING.html +2 -2
- data/doc/rdoc/files/README.html +3 -3
- data/doc/rdoc/files/lib/ruby-aes/{aes_cons_rb.html → aes_shared_rb.html} +4 -4
- data/doc/rdoc/files/lib/ruby-aes_rb.html +1 -1
- data/doc/rdoc/fr_class_index.html +1 -2
- data/doc/rdoc/fr_file_index.html +1 -2
- data/doc/rdoc/fr_method_index.html +17 -26
- data/examples/encrypt_block.rb +1 -0
- data/examples/encrypt_buffer.rb +1 -0
- data/examples/encrypt_stream.rb +1 -0
- data/lib/ruby-aes/aes_alg.rb +2 -58
- data/lib/ruby-aes/aes_shared.rb +77 -0
- data/lib/ruby-aes.rb +12 -6
- data/test/test_helper.rb +4 -2
- data/test/test_ruby-aes.rb +25 -12
- metadata +14 -15
- data/doc/rdoc/classes/AesAlg.html +0 -972
- data/doc/rdoc/classes/AesCons.html +0 -168
- data/doc/rdoc/files/lib/ruby-aes/aes_alg_rb.html +0 -108
data/lib/ruby-aes.rb
CHANGED
@@ -47,7 +47,7 @@ module Aes
|
|
47
47
|
|
48
48
|
def Aes.check_key(key_string, kl = 128)
|
49
49
|
kl = Aes.check_kl(kl)
|
50
|
-
k = key_string.length
|
50
|
+
k = key_string ? key_string.length : 0
|
51
51
|
raise "Bad key string or bad key length" if (k != kl/8) && (k != kl/4)
|
52
52
|
hex = (key_string =~ /[a-f0-9A-F]{#{k}}/) == 0 && (k == kl/4)
|
53
53
|
bin = ! hex
|
@@ -131,8 +131,11 @@ module Aes
|
|
131
131
|
sout << @@aes.encrypt_buffer(sin)
|
132
132
|
when IO
|
133
133
|
while buf = sin.read(@@bs)
|
134
|
-
|
135
|
-
|
134
|
+
if buf.length == @@bs
|
135
|
+
sout << @@aes.encrypt_blocks(buf)
|
136
|
+
else
|
137
|
+
sout << @@aes.encrypt_buffer(buf)
|
138
|
+
end
|
136
139
|
end
|
137
140
|
else
|
138
141
|
raise "Bad input stream (String, IO)"
|
@@ -150,9 +153,12 @@ module Aes
|
|
150
153
|
when String
|
151
154
|
sout << @@aes.decrypt_buffer(sin)
|
152
155
|
when IO
|
153
|
-
while buf = sin.read(@@bs)
|
154
|
-
|
155
|
-
|
156
|
+
while buf = sin.read(@@bs)#+1)
|
157
|
+
if buf.length == @@bs
|
158
|
+
sout << @@aes.decrypt_blocks(buf)
|
159
|
+
else
|
160
|
+
sout << @@aes.decrypt_buffer(buf)
|
161
|
+
end
|
156
162
|
end
|
157
163
|
else
|
158
164
|
raise "Bad input stream (String, IO)"
|
data/test/test_helper.rb
CHANGED
@@ -3,8 +3,10 @@ require File.dirname(__FILE__) + '/../lib/ruby-aes'
|
|
3
3
|
|
4
4
|
require 'fileutils'
|
5
5
|
|
6
|
-
|
7
|
-
|
6
|
+
unless defined? KEY_LENGTH
|
7
|
+
KEY_LENGTH = [128,192,256].freeze
|
8
|
+
MODES = ['ECB','CBC','OFB','CFB'].freeze
|
9
|
+
end
|
8
10
|
|
9
11
|
def random_fill(n, buffer)
|
10
12
|
n.times do
|
data/test/test_ruby-aes.rb
CHANGED
@@ -13,24 +13,28 @@ class TestRubyAES < Test::Unit::TestCase
|
|
13
13
|
random_fill(16, @iv)
|
14
14
|
@pt = ""
|
15
15
|
random_fill(64, @pt)
|
16
|
-
@kl = KEY_LENGTH[(rand * KEY_LENGTH).to_i]
|
16
|
+
@kl = KEY_LENGTH[(rand * KEY_LENGTH.length).to_i]
|
17
17
|
@mode = MODES[(rand * MODES.length).to_i]
|
18
18
|
end
|
19
19
|
|
20
20
|
def test_modes_and_key_lengths
|
21
|
+
pt = @pt[0...16]
|
21
22
|
MODES.each do |mode|
|
22
23
|
KEY_LENGTH.each do |kl|
|
23
|
-
ct = Aes.encrypt_block(kl, mode, @keys[kl], @iv,
|
24
|
+
ct = Aes.encrypt_block(kl, mode, @keys[kl], @iv, pt)
|
24
25
|
npt = Aes.decrypt_block(kl, mode, @keys[kl], @iv, ct)
|
25
|
-
assert_equal(
|
26
|
+
assert_equal(pt, npt, "Error in encryption/decryption (#{kl}-#{mode})")
|
26
27
|
end
|
27
28
|
end
|
28
29
|
end
|
29
30
|
|
30
|
-
def
|
31
|
+
def test_encrypt_decrypt_stream
|
31
32
|
file = "_ruby-aes_test_encrypt_stream_"
|
32
33
|
sin = File.open(file, "w+b")
|
33
34
|
random_fill(4242, sin)
|
35
|
+
sin.close
|
36
|
+
|
37
|
+
sin = File.open(file, "rb")
|
34
38
|
sout = File.open("#{file}.aes", "w+b")
|
35
39
|
Aes.encrypt_stream(@kl, @mode, @keys[@kl], @iv, sin, sout)
|
36
40
|
sin.close
|
@@ -42,18 +46,27 @@ class TestRubyAES < Test::Unit::TestCase
|
|
42
46
|
sin.close
|
43
47
|
sout.close
|
44
48
|
|
45
|
-
|
46
|
-
|
49
|
+
pt, npt = IO.read(file), IO.read("#{file}.plain")
|
50
|
+
|
51
|
+
assert_equal pt, npt, "Error in encrypt_decrypt_stream"
|
52
|
+
ensure
|
47
53
|
FileUtils.rm_f [ file, "#{file}.aes", "#{file}.plain" ]
|
48
54
|
end
|
49
55
|
|
50
|
-
def
|
56
|
+
def test_encrypt_decrypt_buffer
|
57
|
+
MODES.each do |mode|
|
58
|
+
KEY_LENGTH.each do |kl|
|
59
|
+
ct = Aes.encrypt_buffer(kl, mode, @keys[kl], @iv, @pt)
|
60
|
+
npt = Aes.decrypt_buffer(kl, mode, @keys[kl], @iv, ct)
|
61
|
+
assert_equal(@pt, npt, "Error in encrypt_decrypt_buffer")
|
62
|
+
end
|
63
|
+
end
|
51
64
|
pt = ""
|
52
65
|
42.times do
|
53
66
|
pt << random_fill(1, pt)
|
54
67
|
ct = Aes.encrypt_buffer(@kl, @mode, @keys[@kl], @iv, pt)
|
55
68
|
npt = Aes.decrypt_buffer(@kl, @mode, @keys[@kl], @iv, ct)
|
56
|
-
assert_equal(pt, npt, "Error in
|
69
|
+
assert_equal(pt, npt, "Error in encrypt_decrypt_buffer")
|
57
70
|
end
|
58
71
|
end
|
59
72
|
|
@@ -79,19 +92,19 @@ class TestRubyAES < Test::Unit::TestCase
|
|
79
92
|
|
80
93
|
def test_check_key
|
81
94
|
assert_raise(RuntimeError) do
|
82
|
-
Aes.check_key(@
|
95
|
+
Aes.check_key(@keys[128], 64)
|
83
96
|
end # bad key length
|
84
97
|
assert_raise(RuntimeError) do
|
85
98
|
Aes.check_key('123', 128)
|
86
99
|
end # bad key string
|
87
100
|
assert_raise(RuntimeError) do
|
88
|
-
Aes.check_key(
|
101
|
+
Aes.check_key(nil, 256)
|
89
102
|
end # bad key string
|
90
103
|
assert_raise(RuntimeError) do
|
91
|
-
Aes.check_key(@
|
104
|
+
Aes.check_key(@keys[128].unpack('H*'), 128)
|
92
105
|
end # bad key string
|
93
106
|
assert_nothing_raised do
|
94
|
-
Aes.check_key(@
|
107
|
+
Aes.check_key(@keys[@kl], @kl)
|
95
108
|
end
|
96
109
|
end
|
97
110
|
|
metadata
CHANGED
@@ -1,10 +1,10 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
|
-
rubygems_version: 0.9.
|
2
|
+
rubygems_version: 0.9.4
|
3
3
|
specification_version: 1
|
4
4
|
name: ruby-aes-unroll1
|
5
5
|
version: !ruby/object:Gem::Version
|
6
|
-
version: "1.
|
7
|
-
date:
|
6
|
+
version: "1.1"
|
7
|
+
date: 2008-01-05 00:00:00 +01:00
|
8
8
|
summary: ruby-aes is an implementation of the Rijndael algorithm (AES)
|
9
9
|
require_paths:
|
10
10
|
- lib
|
@@ -35,6 +35,13 @@ files:
|
|
35
35
|
- Rakefile
|
36
36
|
- doc/rdoc
|
37
37
|
- doc/rdoc/files
|
38
|
+
- doc/rdoc/files/lib
|
39
|
+
- doc/rdoc/files/lib/ruby-aes_rb.html
|
40
|
+
- doc/rdoc/files/lib/ruby-aes
|
41
|
+
- doc/rdoc/files/lib/ruby-aes/aes_shared_rb.html
|
42
|
+
- doc/rdoc/files/CHANGELOG.html
|
43
|
+
- doc/rdoc/files/README.html
|
44
|
+
- doc/rdoc/files/COPYING.html
|
38
45
|
- doc/rdoc/index.html
|
39
46
|
- doc/rdoc/rdoc-style.css
|
40
47
|
- doc/rdoc/fr_method_index.html
|
@@ -42,25 +49,15 @@ files:
|
|
42
49
|
- doc/rdoc/fr_file_index.html
|
43
50
|
- doc/rdoc/created.rid
|
44
51
|
- doc/rdoc/classes
|
45
|
-
- doc/rdoc/files/lib
|
46
|
-
- doc/rdoc/files/CHANGELOG.html
|
47
|
-
- doc/rdoc/files/README.html
|
48
|
-
- doc/rdoc/files/COPYING.html
|
49
|
-
- doc/rdoc/files/lib/ruby-aes_rb.html
|
50
|
-
- doc/rdoc/files/lib/ruby-aes
|
51
|
-
- doc/rdoc/files/lib/ruby-aes/aes_cons_rb.html
|
52
|
-
- doc/rdoc/files/lib/ruby-aes/aes_alg_rb.html
|
53
|
-
- doc/rdoc/classes/AesAlg.html
|
54
52
|
- doc/rdoc/classes/Aes.html
|
55
|
-
- doc/rdoc/classes/
|
53
|
+
- doc/rdoc/classes/AesShared.html
|
56
54
|
- examples/encrypt_block.rb
|
57
55
|
- examples/example_helper.rb
|
58
56
|
- examples/encrypt_stream.rb
|
59
57
|
- examples/encrypt_buffer.rb
|
60
58
|
- lib/ruby-aes
|
59
|
+
- lib/ruby-aes/aes_shared.rb
|
61
60
|
- lib/ruby-aes.rb
|
62
|
-
- lib/ruby-aes/aes_alg.rb
|
63
|
-
- lib/ruby-aes/aes_cons.rb
|
64
61
|
- test/test_ruby-aes.rb
|
65
62
|
- test/test_helper.rb
|
66
63
|
- test/KAT_MCT
|
@@ -69,6 +66,8 @@ files:
|
|
69
66
|
- test/KAT_MCT/table.192
|
70
67
|
- test/KAT_MCT/table.256
|
71
68
|
- test/KAT_MCT/aes_kat_mct.rb
|
69
|
+
- lib/ruby-aes/aes_alg.rb
|
70
|
+
- lib/ruby-aes/aes_cons.rb
|
72
71
|
test_files:
|
73
72
|
- test/test_ruby-aes.rb
|
74
73
|
- test/test_helper.rb
|