@@ -137,33 +137,6 @@ void set1_challenge_5_test()
check( expected[i] == po_ch1[i] );
}
/*
I've a strong feeling that keylen is 29
i'm 'ack knD*i'm Ringin'eth
be%- *A rockSne on T-o mi$e s
Hileethe llY*GirlS yell OInee
cs= sY in th_ ack O#*me EWeh
L th$t's gyNj DeShay cu1ti+'
a%- Them Z'I HHittI+- ha=d eN
d t-e gixlIoS goIn' cra?y OVa
n -lA's on Nh' mikEi*manoI'in
otelazy$ *i'm Lettin'emyedru.
akIck in 0I6 conT7els "y iOut
heand C BoGin *To jus1 l t i=
afLow, leN /y coN&optsogo$*My
5osse-s~O thE side <el)in'ea
GO VanilVabGo! *OYmoo;h #Caus
tha~'S*The Way I w,llebe Cn
D if yoO &on't"cve . deMn, 1h
en WHsyoustarinb a1 meiKSO ge
t o
b'cauS *I c ntvOl t-e stk
gE**TheRe's noedi6sinnaaLlowe
d 0Iem in(s ow! plAse OThe mi
RfIes Sa y th y )ovei,eand th
*/
void set1_challenge_6_test()
{
const unsigned max_block_size=200;
@@ -182,17 +155,18 @@ void set1_challenge_6_test()
memset(out_buf,0,sizeof(out_buf));
int best_key_size = find_best_keysize(base64_buf, strlen(base64_buf));
best_key_size=decrypt_repeted_xor(base64_buf, out_buf, best_key_size);
check(best_key_size==29);
best_key_size=crack_repeted_xor(base64_buf, out_buf, best_key_size);
// sprintf((char*)error_buf, "Wrong keysize. Expected 5 got %d\n", best_key_size);
// check(memcmp(expected_plaintext1, out_buf, sizeof(expected_plaintext1))==0, out_buf);
printf("Key size: %d. Content:\n ", best_key_size);
for(int i=0; i<len; ++i)
printf("%.2x ", out_buf[i]);
printf("%c ", out_buf[i]);
//check(memcmp(expected_plaintext3, buf, sizeof(expected_plaintext3))==0, buf);
}
void decrypt _repeted_xor_test()
void crack _repeted_xor_test()
{
unsigned char error_buf[256];
@@ -217,7 +191,7 @@ void decrypt_repeted_xor_test()
memset(buf,0,sizeof(buf));
int best_key_size = find_best_keysize(hex_str1, strlen(hex_str1));
decrypt _repeted_xor(hex_str1, buf, best_key_size);
crack _repeted_xor(hex_str1, buf, best_key_size);
sprintf((char*)error_buf, "Wrong keysize. Expected 5 got %d\n", best_key_size);
check(best_key_size==5, error_buf);
check(memcmp(expected_plaintext1, buf, sizeof(expected_plaintext1))==0, buf);
@@ -225,7 +199,7 @@ void decrypt_repeted_xor_test()
// here I have to reduce key size otherwise with keylength 39 there is better score
memset(buf,0,sizeof(buf));
best_key_size = find_best_keysize(hex_str2, strlen(hex_str2),2,38);
decrypt _repeted_xor(hex_str2, buf, best_key_size);
crack _repeted_xor(hex_str2, buf, best_key_size);
sprintf((char*)error_buf, "Wrong keysize. Expected 13 got %d\n", best_key_size);
check(best_key_size==13, error_buf);
check(memcmp(expected_plaintext2, buf, sizeof(expected_plaintext2))==0, buf);
@@ -233,7 +207,7 @@ void decrypt_repeted_xor_test()
// here I have to reduce key size otherwise with keylength 39 there is better score
memset(buf,0,sizeof(buf));
best_key_size = find_best_keysize(hex_str3, strlen(hex_str3));
decrypt _repeted_xor(hex_str3, buf, best_key_size);
crack _repeted_xor(hex_str3, buf, best_key_size);
sprintf((char*)error_buf, "Wrong keysize. Expected 20 got %d\n", best_key_size);
check(best_key_size==20, error_buf);
check(memcmp(expected_plaintext3, buf, sizeof(expected_plaintext3))==0, buf);
@@ -241,7 +215,7 @@ void decrypt_repeted_xor_test()
/* this doesn't work
memset(buf,0,sizeof(buf));
best_key_size = find_best_keysize(hex_str4, strlen(hex_str4));
decrypt _repeted_xor(hex_str4, buf, best_key_size);
crack _repeted_xor(hex_str4, buf, best_key_size);
sprintf((char*)error_buf, "Wrong keysize. Expected 3 got %d\n", best_key_size);
check(best_key_size==3, error_buf);
check(memcmp(expected_plaintext4, buf, sizeof(expected_plaintext4))==0, buf);