Console Output

Started by user Travis Burtrum
Looking up repository moparisthebest/pegh
Querying the current revision of branch master...
Current revision of branch master is a6111c04572e580938e33f68315bd07cf301ff20
Obtained .ci/Jenkinsfile from a6111c04572e580938e33f68315bd07cf301ff20
[Pipeline] Start of Pipeline
[Pipeline] properties
[Pipeline] node
Running on Jenkins in /var/lib/jenkins/workspace/moparisthebest_pegh_master
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] echo
My branch is: master
[Pipeline] checkout
The recommended git tool is: NONE
using credential c6ea0d71-5fe1-48ba-ad49-f6dd0c20363a
 > git rev-parse --resolve-git-dir /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://code.moparisthebest.com/moparisthebest/pegh.git # timeout=10
Fetching upstream changes from https://code.moparisthebest.com/moparisthebest/pegh.git
 > git --version # timeout=10
 > git --version # 'git version 2.42.0'
using GIT_ASKPASS to set credentials jenkins @ code.moparisthebest.com
 > git fetch --tags --force --progress -- https://code.moparisthebest.com/moparisthebest/pegh.git +refs/heads/master:refs/remotes/origin/master # timeout=10
 > git rev-parse refs/remotes/origin/master^{commit} # timeout=10
Checking out Revision a6111c04572e580938e33f68315bd07cf301ff20 (refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f a6111c04572e580938e33f68315bd07cf301ff20 # timeout=10
Commit message: "scrypt_max_mem needs to be uint64_t"
 > git rev-list --no-walk 6e690553fffc7d3b413a094e844c883125485c99 # timeout=10
[Gitea] Notifying branch build status: PENDING Build started...
[Gitea] Notified
[Pipeline] sh
+ set -euxo pipefail
+ git checkout master --
Previous HEAD position was a6111c0 scrypt_max_mem needs to be uint64_t
Switched to branch 'master'
Your branch and 'origin/master' have diverged,
and have 1 and 1 different commits each, respectively.
  (use "git pull" if you want to integrate the remote branch with yours)
+ git reset --hard origin/master
HEAD is now at a6111c0 scrypt_max_mem needs to be uint64_t
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Build + Deploy)
[Pipeline] sh
+ curl --compressed -sL https://code.moparisthebest.com/moparisthebest/self-ci/raw/branch/master/build-ci.sh
+ bash
build-ci.sh: BUILD_LANG=c RELEASE_SCRIPT=.ci/release.sh BUILD_SCRIPT=.ci/build.sh remaining args:
+ mkdir -p bin
+ cd bin
+ curl --compressed -sL -O https://code.moparisthebest.com/moparisthebest/self-ci/raw/branch/master/ci-release-helper.sh -O https://code.moparisthebest.com/moparisthebest/self-ci/raw/branch/master/c/build.sh
+ chmod +x ci-release-helper.sh build.sh
+ cd ..
++ pwd
+ export PATH=/var/lib/jenkins/workspace/moparisthebest_pegh_master/bin:/var/lib/jenkins/.cargo/bin:/var/lib/jenkins/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/lib/rustup/bin
+ PATH=/var/lib/jenkins/workspace/moparisthebest_pegh_master/bin:/var/lib/jenkins/.cargo/bin:/var/lib/jenkins/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/lib/rustup/bin
+ export BRANCH_NAME=master
+ BRANCH_NAME=master
+ export BUILD_UID=971
+ BUILD_UID=971
++ id -g
+ export BUILD_GID=971
+ BUILD_GID=971
+ build.sh .ci/build.sh
+ BUILD_SCRIPT=.ci/build.sh
+ shift
+ '[' '' == .ci/build.sh ']'
+ '[' .ci/build.sh == docker-chown ']'
+ docker_build amd64 alpine .ci/build.sh
+ export ARCH=amd64
+ ARCH=amd64
+ shift
+ DOCKER_IMAGE=alpine
+ shift
++ id -g
++ pwd
++ id -g
+ docker run --rm -e ARCH -e BRANCH_NAME -e BUILD_UID=971 -e BUILD_GID=971 -v /var/lib/jenkins/workspace/moparisthebest_pegh_master:/tmp -w /tmp alpine sh -c 'umask a=rwx; "$@"; exit=$?; chown -R '\''971:971'\'' /tmp; exit $exit' -- .ci/build.sh
+ apk add build-base clang bash libsodium-dev libsodium-static openssl-dev openssl-libs-static
fetch https://dl-cdn.alpinelinux.org/alpine/v3.18/main/x86_64/APKINDEX.tar.gz
fetch https://dl-cdn.alpinelinux.org/alpine/v3.18/community/x86_64/APKINDEX.tar.gz
(1/38) Installing ncurses-terminfo-base (6.4_p20230506-r0)
(2/38) Installing libncursesw (6.4_p20230506-r0)
(3/38) Installing readline (8.2.1-r1)
(4/38) Installing bash (5.2.15-r5)
Executing bash-5.2.15-r5.post-install
(5/38) Installing libgcc (12.2.1_git20220924-r10)
(6/38) Installing libstdc++ (12.2.1_git20220924-r10)
(7/38) Installing zstd-libs (1.5.5-r4)
(8/38) Installing binutils (2.40-r7)
(9/38) Installing libmagic (5.45-r0)
(10/38) Installing file (5.45-r0)
(11/38) Installing libgomp (12.2.1_git20220924-r10)
(12/38) Installing libatomic (12.2.1_git20220924-r10)
(13/38) Installing gmp (6.2.1-r3)
(14/38) Installing isl26 (0.26-r1)
(15/38) Installing mpfr4 (4.2.0_p12-r0)
(16/38) Installing mpc1 (1.3.1-r1)
(17/38) Installing gcc (12.2.1_git20220924-r10)
(18/38) Installing libstdc++-dev (12.2.1_git20220924-r10)
(19/38) Installing musl-dev (1.2.4-r1)
(20/38) Installing libc-dev (0.7.2-r5)
(21/38) Installing g++ (12.2.1_git20220924-r10)
(22/38) Installing make (4.4.1-r1)
(23/38) Installing fortify-headers (1.1-r3)
(24/38) Installing patch (2.7.6-r10)
(25/38) Installing build-base (0.5-r3)
(26/38) Installing libffi (3.4.4-r2)
(27/38) Installing xz-libs (5.4.3-r0)
(28/38) Installing libxml2 (2.11.4-r0)
(29/38) Installing llvm16-libs (16.0.6-r1)
(30/38) Installing clang16-libs (16.0.6-r1)
(31/38) Installing clang16-libclang (16.0.6-r1)
(32/38) Installing clang16 (16.0.6-r1)
(33/38) Installing libsodium (1.0.18-r3)
(34/38) Installing pkgconf (1.9.5-r0)
(35/38) Installing libsodium-dev (1.0.18-r3)
(36/38) Installing libsodium-static (1.0.18-r3)
(37/38) Installing openssl-dev (3.1.2-r0)
(38/38) Installing openssl-libs-static (3.1.2-r0)
Executing busybox-1.36.1-r2.trigger
OK: 515 MiB in 53 packages
+ make clean all 'PEGH_LIBSODIUM=1' 'CC=clang' 'LDFLAGS=-static'
rm -f pegh
clang -Wall -Wextra -Werror -std=c89 -pedantic -Wstrict-prototypes -Wold-style-definition -Wconversion -Wno-missing-prototypes -Wno-missing-noreturn -Wno-format -O3 -D_POSIX_SOURCE -DPEGH_LIBSODIUM  -static  pegh.c  -lsodium -o pegh
+ mv pegh pegh.static.libsodium
+ make clean all 'PEGH_OPENSSL=1' 'CC=clang' 'LDFLAGS=-static'
rm -f pegh
clang -Wall -Wextra -Werror -std=c89 -pedantic -Wstrict-prototypes -Wold-style-definition -Wconversion -Wno-missing-prototypes -Wno-missing-noreturn -Wno-format -O3 -D_POSIX_SOURCE -DPEGH_OPENSSL  -static  pegh.c  -lcrypto -o pegh
+ mv pegh pegh.static.openssl
+ make clean all 'PEGH_LIBSODIUM=1' 'PEGH_OPENSSL=1' 'CC=clang' 'LDFLAGS=-static'
rm -f pegh
clang -Wall -Wextra -Werror -std=c89 -pedantic -Wstrict-prototypes -Wold-style-definition -Wconversion -Wno-missing-prototypes -Wno-missing-noreturn -Wno-format -O3 -D_POSIX_SOURCE -DPEGH_LIBSODIUM -DPEGH_OPENSSL  -static  pegh.c  -lsodium -lcrypto -o pegh
+ mv pegh pegh.static.libsodium-openssl
+ ./pegh.static.libsodium-openssl -h
usage: pegh [options...] password
 password:     minimum required length is 12
 -e            encrypt input to output, default mode
 -d            decrypt input to output
 -i <filename> file to use for input, - means stdin, default stdin
 -o <filename> file to use for output, - means stdout, default stdout
 -a            append to -o instead of truncate
 -v            pegh file format version to output,
               either 0 (AES-256-GCM) or 1 (Chacha20-Poly1305),
               default: 0 if AES is hardware accelerated, 1 otherwise
 -c <mb>       chunk size for encryption, while decrypting/encrypting twice
               this ram will be used, the same amount will be needed for
               decryption as encryption. This value is saved in the file
               format, so decryption will fail if this isn't set high enough,
               these are only allocated after scrypt is finished so max usage
               will be the highest of these only, not both combined,
               max: 65535 (AES-256-GCM) or 262143 (Chacha20-Poly1305),
               default: 32
 -m <max_mb>   maximum megabytes of ram to use when deriving key from password
               with scrypt, applies for encryption AND decryption, must
               almost linearly scale with -N, if too low operation will fail,
               default: 64
 -f <filename> read password from file instead of argument, - means stdin
 -g            prompt for password, confirm on encryption, max characters: 64
 -N <num>      scrypt parameter N, only applies for encryption, default 32768
               this is rounded up to the next highest power of 2
 -r <num>      scrypt parameter r, only applies for encryption, default 8
 -p <num>      scrypt parameter p, only applies for encryption, default 1
 -s <num>      multiplication factor to apply to both -N and -m for easy
               work scaling, rounded up to the next highest power of 2,
               BEWARE: -s 32 requires 2G ram, -s 64 requires 4G and so on,
               default: 1
 -h            print this usage text
 -q            do not print error output to stderr
 -V            show version number and format version support then quit

For additional info on scrypt params refer to:
    https://blog.filippo.io/the-scrypt-parameters/
    https://tools.ietf.org/html/rfc7914#section-2

+ ls -lah pegh.static.libsodium pegh.static.libsodium-openssl pegh.static.openssl
-rwxrwxrwx    1 root     root      559.4K Aug 29 05:07 pegh.static.libsodium
-rwxrwxrwx    1 root     root       12.5M Aug 29 05:07 pegh.static.libsodium-openssl
-rwxrwxrwx    1 root     root       12.2M Aug 29 05:07 pegh.static.openssl
+ strip pegh.static.libsodium pegh.static.libsodium-openssl pegh.static.openssl
+ ls -lah pegh.static.libsodium pegh.static.libsodium-openssl pegh.static.openssl
-rwxrwxrwx    1 root     root      262.7K Aug 29 05:07 pegh.static.libsodium
-rwxrwxrwx    1 root     root        3.7M Aug 29 05:07 pegh.static.libsodium-openssl
-rwxrwxrwx    1 root     root        3.5M Aug 29 05:07 pegh.static.openssl
+ file pegh.static.libsodium pegh.static.libsodium-openssl pegh.static.openssl
pegh.static.libsodium:         ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=8439efbcc328ac2fd4c7f423d9ce99e7a73fa69f, stripped
pegh.static.libsodium-openssl: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=4b90eefa83d6289ca107e85c23e98a8e67d0ead6, stripped
pegh.static.openssl:           ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=8036ead9cc57436070fb3110f291d273bda67e1b, stripped
+ ldd pegh.static.libsodium pegh.static.libsodium-openssl pegh.static.openssl
/lib/ld-musl-x86_64.so.1: pegh.static.libsodium: Not a valid dynamic program
+ true
+ export 'TEST_BINS=./pegh.static.openssl ./pegh.openssl ./pegh.static.libsodium-openssl ./pegh.libsodium-openssl ./pegh.static.libsodium ./pegh.libsodium'
+ '[' amd64 '==' aarch64 ]
+ ./test.sh
+ '[' -e /tmp/randombytes100 ']'
++ tr -dc a-z0-9
++ head -c12
+ export key=dkzy95dao5g1
+ key=dkzy95dao5g1
+ echo 'key: dkzy95dao5g1'
key: dkzy95dao5g1
+ '[' -e /tmp/leading_zero_key ']'
+ '[' -e /tmp/leading_zero_key_a ']'
+ '[' -e /tmp/leading_zero_key_b ']'
+ rm -f pegh
+ make PEGH_OPENSSL=1
cc -Wall -Wextra -Werror -std=c89 -pedantic -Wstrict-prototypes -Wold-style-definition -Wconversion -Wno-missing-prototypes -Wno-missing-noreturn -Wno-format -O3 -D_POSIX_SOURCE -DPEGH_OPENSSL    pegh.c  -lcrypto -o pegh
+ mv pegh pegh.openssl
+ make PEGH_LIBSODIUM=1
cc -Wall -Wextra -Werror -std=c89 -pedantic -Wstrict-prototypes -Wold-style-definition -Wconversion -Wno-missing-prototypes -Wno-missing-noreturn -Wno-format -O3 -D_POSIX_SOURCE -DPEGH_LIBSODIUM    pegh.c  -lsodium -o pegh
+ mv pegh pegh.libsodium
+ make PEGH_LIBSODIUM=1 PEGH_OPENSSL=1
cc -Wall -Wextra -Werror -std=c89 -pedantic -Wstrict-prototypes -Wold-style-definition -Wconversion -Wno-missing-prototypes -Wno-missing-noreturn -Wno-format -O3 -D_POSIX_SOURCE -DPEGH_LIBSODIUM -DPEGH_OPENSSL    pegh.c  -lsodium -lcrypto -o pegh
+ mv pegh pegh.libsodium-openssl
+ for bin in $TEST_BINS
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.openssl ./pegh.static.openssl
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.openssl'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.openssl

+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.openssl -d dkzy95dao5g1
+ ./pegh.static.openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ ++ ./pegh.static.openssl dkzy95dao5g1
+ cmp /dev/fd/63 /dev/fd/62
echo a
++ echo a
++ ./pegh.static.openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo encrypting then decrypting with the same key should succeed
'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.openssl + + ./pegh.static.openssl -e dkzy95dao5g1
-d dkzy95dao5g1
cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'encrypting with one key and decrypting with another should fail

+ + ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
+ ./pegh.static.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
+ ./pegh.static.openssl dkzy95dao5g1
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.892s
user	0m4.735s
sys	0m2.500s
+ test ./pegh.static.openssl ./pegh.static.openssl -v 0
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.openssl
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ ./pegh.static.openssl -v 0 dkzy95dao5g1+ 
cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.882s
user	0m4.807s
sys	0m2.528s
+ test ./pegh.static.openssl ./pegh.static.openssl -v 1
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.openssl
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.static.openssl -v 1 dkzy95dao5g1
++ ./pegh.static.openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.openssl + ./pegh.static.openssl -d -f /tmp/leading_zero_key
-e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
+ + ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ + cat - /dev/fd/63
./pegh.static.openssl -v 1 dkzy95dao5g1
++ echo -n a
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ echo 'hopefully this doesnt make it to disk'
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.293s
user	0m4.403s
sys	0m2.291s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.openssl ./pegh.openssl
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.openssl -d dkzy95dao5g1
+ ./pegh.static.openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.openssl dkzy95dao5g1
++ ./pegh.static.openssl dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.openssl -e dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1+ cmp - /tmp/randombytes100

+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl + ./pegh.static.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
-d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ + + cmp - /tmp/randombytes100
./pegh.openssl -d -f /tmp/leading_zero_key_b
./pegh.static.openssl -e -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ large values of N without enough memory should fail
echo 'large values of N without enough memory should fail'
+ ./pegh.static.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.685s
user	0m4.794s
sys	0m2.146s
+ test ./pegh.static.openssl ./pegh.openssl -v 0
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.openssl
shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ + ./pegh.static.openssl -v 0 dkzy95dao5g1
./pegh.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ + cmp /dev/fd/63 /dev/fd/62
./pegh.static.openssl -v 0 dkzy95dao5g1
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -e -v + ./pegh.openssl -d -f /tmp/leading_zero_key_b
0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.openssl
encrypting same data with same key should result in different ciphertext
+ '[' -s bla.txt ']'
+ set -e

real	0m6.625s
user	0m4.631s
sys	0m2.221s
+ test ./pegh.static.openssl ./pegh.openssl -v 1
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.static.openssl -v 1 dkzy95dao5g1
++ ./pegh.static.openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -i + /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ + ./pegh.openssl -d -f /tmp/leading_zero_key_b
./pegh.static.openssl -e + cmp - /tmp/randombytes100
-v 1 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ ./pegh.static.openssl -v 1 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ echo 'hopefully this doesnt make it to disk'
+ ++ echo -n a
cat - /dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.512s
user	0m4.648s
sys	0m2.179s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.openssl ./pegh.static.libsodium-openssl
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium-openssl
echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.static.openssl dkzy95dao5g1
+ echo a
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'encrypting same data with same key should result in different ciphertext

+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.openssl dkzy95dao5g1
++ echo a
++ ./pegh.static.openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.static.openssl -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d + dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.123s
user	0m4.222s
sys	0m2.299s
+ test ./pegh.static.openssl ./pegh.static.libsodium-openssl -v 0
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium-openssl
'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ ++ echo a
./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - + /tmp/randombytes100
./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ + cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.198s
user	0m4.244s
sys	0m2.209s
+ test ./pegh.static.openssl ./pegh.static.libsodium-openssl -v 1
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium-openssl'
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium-openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ ./pegh.static.openssl -v 1 + cmp /dev/fd/63 /dev/fd/62
dkzy95dao5g1
++ ./pegh.static.openssl -v 1 dkzy95dao5g1++ echo a
++ echo a

/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl + -d -f /tmp/leading_zero_key_b
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key_a
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
+ ./pegh.static.openssl -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.085s
user	0m4.294s
sys	0m2.124s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.openssl ./pegh.libsodium-openssl
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium-openssl'
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium-openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ ./pegh.static.openssl dkzy95dao5g1
+ echo a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.static.openssl dkzy95dao5g1
++ ./pegh.static.openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo encrypting then decrypting with the same key should succeed
'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.openssl -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl dkzy95dao5g1
decryption failed
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium-openssl
+ '[' -s bla.txt ']'
+ set -e

real	0m6.057s
user	0m4.266s
sys	0m2.083s
+ test ./pegh.static.openssl ./pegh.libsodium-openssl -v 0
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ + ./pegh.libsodium-openssl -d ./pegh.static.openssl dkzy95dao5g1-v 
0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key_a
+ + cmp - /tmp/randombytes100
./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo + ./pegh.static.openssl -v 0 dkzy95dao5g1
'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.420s
user	0m4.452s
sys	0m2.194s
+ test ./pegh.static.openssl ./pegh.libsodium-openssl -v 1
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium-openssl'
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium-openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.openssl -v 1 dkzy95dao5g1
++ ./pegh.static.openssl -v 1 dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.libsodium-openssl + cmp - /tmp/randombytes100
-d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium-openssl + -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100./pegh.static.openssl -e -v 1 
dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ + ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key_a
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.static.openssl -v 1 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.253s
user	0m4.337s
sys	0m2.363s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.openssl ./pegh.static.libsodium
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ + ./pegh.static.libsodium -d dkzy95dao5g1./pegh.static.openssl 
dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.openssl dkzy95dao5g1
++ ./pegh.static.openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ cmp + + ./pegh.static.libsodium ./pegh.static.openssl -d dkzy95dao5g1-e 
dkzy95dao5g1
- /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl dkzy95dao5g1
+ ./pegh.static.libsodium + -d cat - /dev/fd/63
dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium
+ '[' -s bla.txt ']'
+ set -e

real	0m6.278s
user	0m4.313s
sys	0m2.155s
+ test ./pegh.static.openssl ./pegh.static.libsodium -v 0
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ + ./pegh.static.libsodium -d dkzy95dao5g1
./pegh.static.openssl -e -v 0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo encrypting with one key and decrypting with another should fail
'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey

+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ + cat - /dev/fd/63
./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.051s
user	0m4.330s
sys	0m2.138s
+ test ./pegh.static.openssl ./pegh.static.libsodium -v 1
+ bin=./pegh.static.openssl
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium
encrypting same data with same key should result in different ciphertext
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ++ ./pegh.static.openssl -v 1 dkzy95dao5g1
echo a
++ echo a
++ ./pegh.static.openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.042s
user	0m4.245s
sys	0m2.074s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.openssl ./pegh.libsodium
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.libsodium -d dkzy95dao5g1
+ ./pegh.static.openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'encrypting same data with same key should result in different ciphertext

+ ++ cmp /dev/fd/63 /dev/fd/62
++ echo a
./pegh.static.openssl dkzy95dao5g1
++ ./pegh.static.openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
+ ./pegh.static.openssl dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.828s
user	0m4.136s
sys	0m2.077s
+ test ./pegh.static.openssl ./pegh.libsodium -v 0
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.libsodium
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
+ echo a
+ ./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
++ echo a
++ echo a
++ ./pegh.static.openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ cmp + ./pegh.static.openssl -e -v 0 dkzy95dao5g1
- /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl + ./pegh.libsodium -d -f /tmp/leading_zero_key
-e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ + ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp ./pegh.libsodium -d - dkzy95dao5g1-wrongkey/tmp/randombytes100

decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ ./pegh.static.openssl -v 0 dkzy95dao5g1
+ echo 'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.993s
user	0m4.388s
sys	0m2.077s
+ test ./pegh.static.openssl ./pegh.libsodium -v 1
+ bin=./pegh.static.openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium'
testing binaries bin: ./pegh.static.openssl bin_decrypt: ./pegh.libsodium
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ ./pegh.static.openssl -v + cmp /dev/fd/63 /dev/fd/62
1 dkzy95dao5g1
++ ./pegh.static.openssl -v 1 dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey+ 
cmp - /tmp/randombytes100
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
F843780000000000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'bad decryption bytes are never output, file should be 0 bytes

+ echo 'hopefully this doesnt make it to disk'
+ + cat - /dev/fd/63
./pegh.static.openssl -v 1 dkzy95dao5g1
++ echo -n a
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.755s
user	0m4.199s
sys	0m2.037s
+ for bin in $TEST_BINS
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.openssl ./pegh.static.openssl
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.openssl dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o encrypting same data with same key should result in different ciphertext
0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.openssl dkzy95dao5g1++ ++ echo a
echo a
++ ./pegh.openssl dkzy95dao5g1

/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.openssl -e dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -e -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ + cmp ./pegh.static.openssl - /tmp/randombytes100
-d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.openssl -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
482BF9A79F7F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ + ./pegh.openssl dkzy95dao5g1echo 'hopefully this doesnt make it to disk'

+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.271s
user	0m4.701s
sys	0m2.011s
+ test ./pegh.openssl ./pegh.static.openssl -v 0
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.openssl
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ + ./pegh.openssl -v 0 dkzy95dao5g1
echo a
+ ./pegh.static.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.openssl -v 0 dkzy95dao5g1
++ ./pegh.openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1
+ ./pegh.openssl -e -v 0 dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.openssl -d + cmp - /tmp/randombytes100
-f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
486B7565D67F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ + ./pegh.openssl -v 0 dkzy95dao5g1
echo + ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.310s
user	0m4.580s
sys	0m2.059s
+ test ./pegh.openssl ./pegh.static.openssl -v 1
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'encrypting same data with same key should result in different ciphertext

++ + cmp echo /dev/fd/63 a
/dev/fd/62
++ ./pegh.openssl -v 1 dkzy95dao5g1
++ ./pegh.openssl -v 1 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo encrypting then decrypting with the same key should succeed
'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl -e -v 1 dkzy95dao5g1
+ + cmp - /tmp/randombytes100
./pegh.static.openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ + ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl + cmp - /tmp/randombytes100
-d -f /tmp/leading_zero_key_b
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
487BE2CA2F7F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl + ./pegh.openssl -v 1 dkzy95dao5g1
-d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.657s
user	0m4.928s
sys	0m2.188s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.openssl ./pegh.openssl
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.openssl
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.openssl -d dkzy95dao5g1
+ ./pegh.openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo encrypting same data with same key should result in different ciphertext
'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.openssl dkzy95dao5g1
++ echo a
++ ./pegh.openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ + cmp ./pegh.openssl - + /tmp/randombytes100
-d dkzy95dao5g1
./pegh.openssl -e dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ + ./pegh.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -f + /tmp/leading_zero_key_a
./pegh.openssl -d + cmp - /tmp/randombytes100
-f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
486B6B3C6A7F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.703s
user	0m4.794s
sys	0m2.176s
+ test ./pegh.openssl ./pegh.openssl -v 0
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.openssl
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo + ./pegh.openssl -v 0 dkzy95dao5g1
a
+ ./pegh.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ ++ echo a
cmp /dev/fd/63 /dev/fd/62++ ./pegh.openssl -v 0 dkzy95dao5g1

++ ./pegh.openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -e -v 0 dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ + ./pegh.openssl -d -f /tmp/leading_zero_key
./pegh.openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.openssl + ./pegh.openssl -d -f /tmp/leading_zero_key_b
-e + cmp - /tmp/randombytes100
-v 0 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
487BEB89657F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ cat + - /dev/fd/63./pegh.openssl -v 0 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt

++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.489s
user	0m4.726s
sys	0m2.088s
+ test ./pegh.openssl ./pegh.openssl -v 1
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.openssl'
+ set +eutesting binaries bin: ./pegh.openssl bin_decrypt: ./pegh.openssl

+ '[' 1 '!=' 1 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.openssl -v 1 dkzy95dao5g1
++ ./pegh.openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
48CBCE0E727F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -v 1 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.579s
user	0m4.791s
sys	0m2.104s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.openssl ./pegh.static.libsodium-openssl
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium-openssl'
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium-openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.openssl dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
++ ./pegh.openssl dkzy95dao5g1
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl -e dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ + ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
./pegh.openssl -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
48FB8A44307F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl dkzy95dao5g1+ 
./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.767s
user	0m4.195s
sys	0m2.055s
+ test ./pegh.openssl ./pegh.static.libsodium-openssl -v 0
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium-openssl'
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium-openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.openssl -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.openssl -v 0 dkzy95dao5g1
++ ./pegh.openssl -v 0 dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl -e -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -e -v 0 + cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'encrypting/decrypting with key in file where last byte is different should fail

+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
489B7509277F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.831s
user	0m4.223s
sys	0m1.996s
+ test ./pegh.openssl ./pegh.static.libsodium-openssl -v 1
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium-openssl
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.openssl -v 1 dkzy95dao5g1
++ ./pegh.openssl -v 1 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -e -v 1 dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key_a
+ + ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
48EB9E9CB87F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ ++ echo -n a
cat - /dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.838s
user	0m4.206s
sys	0m1.993s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.openssl ./pegh.libsodium-openssl
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium-openssl
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
++ ./pegh.openssl dkzy95dao5g1
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -e dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.openssl -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -f /tmp/leading_zero_key_a
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
48DBDB5EC57F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.125s
user	0m4.410s
sys	0m2.050s
+ test ./pegh.openssl ./pegh.libsodium-openssl -v 0
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium-openssl'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium-openssl

+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.openssl -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.openssl -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo encrypting then decrypting with the same key should succeed
'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl + ./pegh.libsodium-openssl -d dkzy95dao5g1
+ -e cmp - /tmp/randombytes100
-v 0 dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -e -v + 0 ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
482B4306EA7F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -v 0 dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.843s
user	0m4.411s
sys	0m1.957s
+ test ./pegh.openssl ./pegh.libsodium-openssl -v 1
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo encrypting same data with same key should result in different ciphertext
'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo ++ a
./pegh.openssl -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.openssl -e -v 1 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -d + ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
-f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
48EB557F8A7F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -v 1 dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.939s
user	0m4.474s
sys	0m1.874s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.openssl ./pegh.static.libsodium
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ ./pegh.openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.openssl dkzy95dao5g1
++ echo a
++ ./pegh.openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl -e dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.openssl -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.openssl -e + -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
482B079A367F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ + ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
cat - /dev/fd/63
+ ./pegh.openssl dkzy95dao5g1
++ echo -n a
+ echo 'hopefully this doesnt make it to disk'
decryption failed
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium
+ '[' -s bla.txt ']'
+ set -e

real	0m5.944s
user	0m4.304s
sys	0m2.112s
+ test ./pegh.openssl ./pegh.static.libsodium -v 0
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ ./pegh.openssl -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.openssl -v 0 dkzy95dao5g1
++ ./pegh.openssl -v 0 dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.openssl -e -v + ./pegh.static.libsodium -d dkzy95dao5g1
0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
48CBA728B67F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ bad decryption bytes are never output, file should be 0 bytes
echo 'bad decryption bytes are never output, file should be 0 bytes'
+ ./pegh.openssl -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ echo 'hopefully this doesnt make it to disk'+ cat - /dev/fd/63

++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.867s
user	0m4.171s
sys	0m2.100s
+ test ./pegh.openssl ./pegh.static.libsodium -v 1
+ bin=./pegh.openssl
+ shift
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ++ ./pegh.openssl -v 1 dkzy95dao5g1
++ echo a
echo a
++ ./pegh.openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.openssl -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo encrypting with one key and decrypting with another should fail
'encrypting with one key and decrypting with another should fail'
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.openssl -e -v 1 + ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
-f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
486BC7661C7F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -v 1 dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium
+ set -e

real	0m5.970s
user	0m4.354s
sys	0m1.980s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.openssl ./pegh.libsodium
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.openssl dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ encrypting same data with same key should result in different ciphertext
echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.openssl dkzy95dao5g1
++ echo a
++ ./pegh.openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl -e dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
482B0A41757F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'+ ./pegh.openssl dkzy95dao5g1

+ ./pegh.libsodium + -d cat - /dev/fd/63
dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.810s
user	0m4.291s
sys	0m1.957s
+ test ./pegh.openssl ./pegh.libsodium -v 0
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium'
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium
+ set +eu
+ '[' 0 '!=' 1 ']'
+ + ./pegh.openssl echo -v 0 adkzy95dao5g1

+ ./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.openssl -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -d dkzy95dao5g1
+ ./pegh.openssl -e -v 0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ + ./pegh.libsodium -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
./pegh.openssl -e -v 0 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
481BCD63B87F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -v 0 dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.644s
user	0m4.179s
sys	0m1.975s
+ test ./pegh.openssl ./pegh.libsodium -v 1
testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium
+ bin=./pegh.openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.openssl bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.openssl -v 1 dkzy95dao5g1
++ ++ ++ echo a
echo a
./pegh.openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.openssl -e -v 1 dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ + ./pegh.openssl -e -v 1 -f /tmp/leading_zero_key_a
./pegh.libsodium -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error
488BF116C67F0000:error:030000AC:digital envelope routines:scrypt_alg:memory limit exceeded:providers/implementations/kdfs/scrypt.c:521:
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium + ./pegh.openssl -v 1 dkzy95dao5g1
-d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.628s
user	0m4.012s
sys	0m1.926s
+ for bin in $TEST_BINS
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium-openssl ./pegh.static.openssl
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.openssl
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ + ./pegh.static.libsodium-openssl dkzy95dao5g1
+ echo a
./pegh.static.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ encrypting same data with same key should result in different ciphertext
set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ++ echo a
./pegh.static.libsodium-openssl dkzy95dao5g1
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium-openssl -e -f + ./pegh.static.openssl -d -f /tmp/leading_zero_key
/tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - + /tmp/randombytes100
./pegh.static.openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl + cmp - /tmp/randombytes100
-e -f /tmp/leading_zero_key_a
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.775s
user	0m3.920s
sys	0m2.003s
+ test ./pegh.static.libsodium-openssl ./pegh.static.openssl -v 0
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ + echo ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
a+ ./pegh.static.openssl -d dkzy95dao5g1

+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ + ./pegh.static.libsodium-openssl -e -v ./pegh.static.openssl 0 -d dkzy95dao5g1
dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl -e -v 0 + cmp - /tmp/randombytes100
-f /tmp/leading_zero_key_a
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.874s
user	0m4.111s
sys	0m2.017s
+ test ./pegh.static.libsodium-openssl ./pegh.static.openssl -v 1
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.openssl
+ set +eu
+ encrypting same data with same key should result in different ciphertext
'[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline

+ ./pegh.static.openssl + ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
-d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
+ ./pegh.static.libsodium-openssl -e -v 1 + cmp - /tmp/randombytes100
-f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt

+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.795s
user	0m4.260s
sys	0m1.894s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium-openssl ./pegh.openssl
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.openssl
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo + ./pegh.static.libsodium-openssl dkzy95dao5g1
a
+ ./pegh.openssl -d dkzy95dao5g1
encrypting same data with same key should result in different ciphertext
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl -d dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium-openssl -e -f /tmp/leading_zero_key
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl -e + ./pegh.openssl -d -f /tmp/leading_zero_key_b
-f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ + ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
echo 'hopefully this doesnt make it to disk'
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.556s
user	0m3.879s
sys	0m1.909s
+ test ./pegh.static.libsodium-openssl ./pegh.openssl -v 0
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.openssl -d dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl + ./pegh.openssl -d dkzy95dao5g1
-e -v 0 dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ cmp + ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
- /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ + ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.146s
user	0m4.222s
sys	0m2.188s
+ test ./pegh.static.libsodium-openssl ./pegh.openssl -v 1
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl -e -v 1 + -f ./pegh.openssl -d -f /tmp/leading_zero_key_b
/tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'large values of N without enough memory should fail

+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -d dkzy95dao5g1 + ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
-o bla.txt
+ ++ echo -n a
cat - /dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.009s
user	0m4.258s
sys	0m1.999s
+ for bin_decrypt in $TEST_BINS
+ test testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl
./pegh.static.libsodium-openssl ./pegh.static.libsodium-openssl
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium-openssl -e -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl -e -f + ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ /tmp/leading_zero_key_acmp - /tmp/randombytes100

decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'bad decryption bytes are never output, file should be 0 bytes

+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.417s
user	0m3.594s
sys	0m2.153s
+ test ./pegh.static.libsodium-openssl ./pegh.static.libsodium-openssl -v 0
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ++ ./pegh.static.libsodium-openssl ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
-v 0 dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.252s
user	0m3.635s
sys	0m1.954s
+ test ./pegh.static.libsodium-openssl ./pegh.static.libsodium-openssl -v 1
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
echo a
++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ + ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo bad decryption bytes are never output, file should be 0 bytes
'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.450s
user	0m3.728s
sys	0m1.992s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium-openssl ./pegh.libsodium-openssl
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
++ ++ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ cmp /dev/fd/63 /dev/fd/62
echo a
++ echo a
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium-openssl -e -f /tmp/leading_zero_key
+ + cmp - /tmp/randombytes100
./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ + ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium-openssl -e -f /tmp/leading_zero_key_a
+ cmp + ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
- /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo + ./pegh.static.libsodium-openssl dkzy95dao5g1
'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
++ + ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.422s
user	0m3.607s
sys	0m2.132s
+ test ./pegh.static.libsodium-openssl ./pegh.libsodium-openssl -v 0
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1
+ + cmp - /tmp/randombytes100
./pegh.libsodium-openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b

+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.248s
user	0m3.543s
sys	0m2.110s
+ test ./pegh.static.libsodium-openssl ./pegh.libsodium-openssl -v 1
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo encrypting same data with same key should result in different ciphertext
'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1++ echo a

++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.474s
user	0m3.868s
sys	0m1.949s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium-openssl ./pegh.static.libsodium
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium
+ set +eu
+ '[' '' '!=' 1 ']'
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ echo a
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
++ ++ echo echo a
a
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ + ./pegh.static.libsodium -d dkzy95dao5g1
+ ./pegh.static.libsodium-openssl cmp - /tmp/randombytes100
-e dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -d + cmp - /tmp/randombytes100
-f + ./pegh.static.libsodium-openssl -e -f /tmp/leading_zero_key
/tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium-openssl + -e ./pegh.static.libsodium dkzy95dao5g1 -d dkzy95dao5g1-wrongkey
-i /tmp/randombytes100
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
+ ./pegh.static.libsodium-openssl -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'bad decryption bytes are never output, file should be 0 bytes

+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.072s
user	0m3.502s
sys	0m1.913s
+ test ./pegh.static.libsodium-openssl ./pegh.static.libsodium -v 0
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium
echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
++ echo a
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ encrypting then decrypting with the same key should succeed
echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -e -v 0 + ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'encrypting/decrypting with key in file where last byte is different should fail

+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo + 'hopefully this doesnt make it to disk'
./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.148s
user	0m3.400s
sys	0m2.023s
+ test ./pegh.static.libsodium-openssl ./pegh.static.libsodium -v 1
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium'
+ testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.static.libsodium
set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
echo a
++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'encrypting then decrypting with the same key should succeed

+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo encrypting with one key and decrypting with another should fail
'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
+ + cmp - /tmp/randombytes100
./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'+ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1 
-o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.538s
user	0m3.985s
sys	0m1.919s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium-openssl ./pegh.libsodium
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium-openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium -d dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ + ./pegh.static.libsodium-openssl -e -f /tmp/leading_zero_key
./pegh.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium + -d dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl + -e -f /tmp/leading_zero_key_a
./pegh.libsodium + -d -f /tmp/leading_zero_key_b
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.237s
user	0m3.554s
sys	0m2.044s
+ test ./pegh.static.libsodium-openssl ./pegh.libsodium -v 0
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium'
testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ + ./pegh.libsodium -d dkzy95dao5g1./pegh.static.libsodium-openssl 
-v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'encrypting then decrypting with the same key should succeed

+ ./pegh.static.libsodium-openssl -e + ./pegh.libsodium -d dkzy95dao5g1
-v 0 dkzy95dao5g1+ cmp - /tmp/randombytes100

+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ + ./pegh.libsodium -d -f /tmp/leading_zero_key
cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ + ./pegh.libsodium -d -f /tmp/leading_zero_key_b
./pegh.static.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo + ./pegh.static.libsodium-openssl -v 0 dkzy95dao5g1
'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
+ ++ cat - /dev/fd/63
echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.346s
user	0m3.586s
sys	0m2.002s
+ test ./pegh.static.libsodium-openssl ./pegh.libsodium -v 1
+ bin=./pegh.static.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium
'testing binaries bin: ./pegh.static.libsodium-openssl bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
+ cmp /dev/fd/63 /dev/fd/62

++ echo a
++ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -v 1 dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.582s
user	0m3.859s
sys	0m2.029s
+ for bin in $TEST_BINS
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium-openssl ./pegh.static.openssl
+ bin=./pegh.libsodium-openssl
+ shift
+ testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.openssl
bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.openssl -d dkzy95dao5g1
+ ./pegh.libsodium-openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ echo a
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium-openssl -e dkzy95dao5g1
+ ./pegh.static.openssl -d + cmp - /tmp/randombytes100
dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.openssl + -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
./pegh.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key_a
+ + cmp - /tmp/randombytes100
./pegh.static.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ + ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
./pegh.libsodium-openssl dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.815s
user	0m3.936s
sys	0m2.241s
+ test ./pegh.libsodium-openssl ./pegh.static.openssl -v 0
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ encrypting same data with same key should result in different ciphertext
set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ + ./pegh.static.openssl -d dkzy95dao5g1
./pegh.libsodium-openssl -e -v + cmp - /tmp/randombytes100
0 dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ + cmp - /tmp/randombytes100+ 
./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
./pegh.static.openssl -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
+ cat - ++ /dev/fd/63echo -n a

decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.090s
user	0m4.107s
sys	0m2.325s
+ test ./pegh.libsodium-openssl ./pegh.static.openssl -v 1
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'bad decryption bytes are never output, file should be 0 bytes

+ + ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ ++ echo -n a
cat - /dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.038s
user	0m4.310s
sys	0m2.017s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium-openssl ./pegh.openssl
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.openssl
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo + ./pegh.openssl -d dkzy95dao5g1
+ a
./pegh.libsodium-openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ ./pegh.libsodium-openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium-openssl -e dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key
+ + ./pegh.openssl -d -f /tmp/leading_zero_key
cmp - /tmp/randombytes100
+ set +e
+ encrypting with one key and decrypting with another should fail
echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -d -f + cmp - /tmp/randombytes100
/tmp/leading_zero_key_b
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ ./pegh.libsodium-openssl dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ echo 'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.437s
user	0m3.809s
sys	0m1.846s
+ test ./pegh.libsodium-openssl ./pegh.openssl -v 0
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.723s
user	0m4.054s
sys	0m1.999s
+ test ./pegh.libsodium-openssl ./pegh.openssl -v 1
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ++ echo a
./pegh.libsodium-openssl -v 1 dkzy95dao5g1++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1

/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
+ + cmp - /tmp/randombytes100
./pegh.openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
decryption failed
encrypting/decrypting with key in file where last byte is different should fail
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.029s
user	0m4.361s
sys	0m1.988s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium-openssl ./pegh.static.libsodium-openssl
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.libsodium-openssl dkzy95dao5g1
+ echo a
encrypting same data with same key should result in different ciphertext
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ echo a
++ echo a
++ ./pegh.libsodium-openssl dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'encrypting then decrypting with the same key should succeed

+ ./pegh.libsodium-openssl -e dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.242s
user	0m3.548s
sys	0m2.021s
+ test ./pegh.libsodium-openssl ./pegh.static.libsodium-openssl -v 0
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl
'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1

+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key

+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ + ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1

+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.163s
user	0m3.454s
sys	0m2.030s
+ test ./pegh.libsodium-openssl ./pegh.static.libsodium-openssl -v 1
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.libsodium-openssl -v 1 ++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo encrypting then decrypting with the same key should succeed
'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -v 1 + ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
-f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e + ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
-v 1 -f + /tmp/leading_zero_key_acmp - /tmp/randombytes100

decryption failed
cmp: EOF on -
+ echo large values of N without enough memory should fail
'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.916s
user	0m4.079s
sys	0m2.149s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium-openssl ./pegh.libsodium-openssl
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl'
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ echo a
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium-openssl -e dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.232s
user	0m3.561s
sys	0m2.044s
+ test ./pegh.libsodium-openssl ./pegh.libsodium-openssl -v 0
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl

+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ + ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ + ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ cat - /dev/fd/63
++ echo + ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
-n + ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.262s
user	0m3.657s
sys	0m2.012s
+ test ./pegh.libsodium-openssl ./pegh.libsodium-openssl -v 1
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl
encrypting same data with same key should result in different ciphertext
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.756s
user	0m4.016s
sys	0m2.030s
+ testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium
for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium-openssl ./pegh.static.libsodium
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ ./pegh.libsodium-openssl dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium-openssl -e dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key_a+ cmp - /tmp/randombytes100

+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo + ./pegh.libsodium-openssl dkzy95dao5g1
'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.279s
user	0m3.667s
sys	0m2.012s
+ test ./pegh.libsodium-openssl ./pegh.static.libsodium -v 0
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium'
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -v + 0 dkzy95dao5g1
./pegh.static.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ encrypting then decrypting with the same key should succeed
echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ ./pegh.libsodium-openssl -e -v + cmp - /tmp/randombytes100
0 dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - + ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
/tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
bad decryption bytes are never output, file should be 0 bytes
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.404s
user	0m3.710s
sys	0m2.070s
+ test ./pegh.libsodium-openssl ./pegh.static.libsodium -v 1
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium'
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.static.libsodium
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium -d dkzy95dao5g1+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1

+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key
+ + cmp - /tmp/randombytes100
./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo + ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
'hopefully this doesnt make it to disk'
+ + cat - /dev/fd/63
./pegh.libsodium-openssl -v 1 dkzy95dao5g1
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.627s
user	0m3.871s
sys	0m1.979s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium-openssl ./pegh.libsodium
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' '' '!=' 1 ']'
+ + echo a
./pegh.libsodium-openssl dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ ./pegh.libsodium-openssl dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium-openssl -e dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -e -f /tmp/leading_zero_key_a
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.325s
user	0m3.744s
sys	0m1.946s
+ test ./pegh.libsodium-openssl ./pegh.libsodium -v 0
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
echo ++ echo a
a
++ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl -v 0 dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.301s
user	0m3.541s
sys	0m2.110s
+ test ./pegh.libsodium-openssl ./pegh.libsodium -v 1
testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium
+ bin=./pegh.libsodium-openssl
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium-openssl bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
++ echo a
++ echo a
++ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ + cmp - /tmp/randombytes100
./pegh.libsodium-openssl -e -v + 1 -f /tmp/leading_zero_key
./pegh.libsodium -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium-openssl -e -v 1 -f /tmp/leading_zero_key_a
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium-openssl -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ + cat - /dev/fd/63
+ ./pegh.libsodium-openssl -v 1 dkzy95dao5g1
++ echo -n a
echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.613s
user	0m3.964s
sys	0m2.006s
+ for bin in $TEST_BINS
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium ./pegh.static.openssl
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.openssl
'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.openssl -d dkzy95dao5g1
+ ./pegh.static.libsodium dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ ++ echo a
++ ./pegh.static.libsodium dkzy95dao5g1
cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.openssl -d -f + cmp - /tmp/randombytes100
/tmp/leading_zero_key
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key_a
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.732s
user	0m3.921s
sys	0m2.107s
+ test ./pegh.static.libsodium ./pegh.static.openssl -v 0
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ + ./pegh.static.libsodium -v 0 dkzy95dao5g1
echo a+ ./pegh.static.openssl -d dkzy95dao5g1

encrypting same data with same key should result in different ciphertext
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -e + ./pegh.static.openssl -d -f /tmp/leading_zero_key
-v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
+ ./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo + ./pegh.static.libsodium -v 0 'hopefully this doesnt make it to disk'dkzy95dao5g1

+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.260s
user	0m4.167s
sys	0m2.170s
+ test ./pegh.static.libsodium ./pegh.static.openssl -v 1
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo encrypting same data with same key should result in different ciphertext
'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ++ echo a
++ ./pegh.static.libsodium echo a
-v 1 dkzy95dao5g1
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.openssl -d + cmp - /tmp/randombytes100
dkzy95dao5g1
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey+ ./pegh.static.libsodium -e -v 1 
+ dkzy95dao5g1 cmp -i /tmp/randombytes100- 
/tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium -e -v 1 -f + + ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
/tmp/leading_zero_key_a
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo + ./pegh.static.libsodium -v 1 dkzy95dao5g1
'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.851s
user	0m4.242s
sys	0m1.965s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium ./pegh.openssl
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.openssl
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.openssl -d dkzy95dao5g1
+ ./pegh.static.libsodium dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ + cmp - /tmp/randombytes100
+ ./pegh.openssl ./pegh.static.libsodium -e dkzy95dao5g1
-d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ + ./pegh.openssl -d dkzy95dao5g1-wrongkey
./pegh.static.libsodium -e dkzy95dao5g1 + cmp - /tmp/randombytes100
-i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ ++ echo -n a
cat - /dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.720s
user	0m4.002s
sys	0m2.048s
+ test ./pegh.static.libsodium ./pegh.openssl -v 0
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ + ./pegh.static.libsodium -v 0 dkzy95dao5g1
+ ./pegh.openssl echo a
-d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key
+ cmp + - /tmp/randombytes100
./pegh.openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.openssl -d -f + ./pegh.static.libsodium /tmp/leading_zero_key_b+ cmp - /tmp/randombytes100
-e -v 0 -f /tmp/leading_zero_key_a

decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -v 0 dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt++ echo -n a

decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.865s
user	0m4.000s
sys	0m2.172s
+ test ./pegh.static.libsodium ./pegh.openssl -v 1
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo encrypting same data with same key should result in different ciphertext
'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium + cmp - /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
-e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium -e -v 1 -f /tmp/leading_zero_key_a
+ ./pegh.openssl + cmp - /tmp/randombytes100
-d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -v 1 dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.899s
user	0m4.199s
sys	0m2.072s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium ./pegh.static.libsodium-openssl
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium-openssl
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ + ./pegh.static.libsodium dkzy95dao5g1
echo a+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1

+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key
+ + cmp - /tmp/randombytes100
./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - ++ echo -n a
/dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.430s
user	0m3.682s
sys	0m2.104s
+ test ./pegh.static.libsodium ./pegh.static.libsodium-openssl -v 0
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium-openssl'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium-openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ cmp - + /tmp/randombytes100
./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ + ./pegh.static.libsodium-openssl cmp - /tmp/randombytes100
-d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key_a
+ + ./pegh.static.libsodium-openssl cmp - -d -f /tmp/randombytes100
/tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -v 0 dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.258s
user	0m3.549s
sys	0m2.033s
+ test ./pegh.static.libsodium ./pegh.static.libsodium-openssl -v 1
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium-openssl'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium-openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -e -v 1 -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium -e + ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
-v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.769s
user	0m4.171s
sys	0m1.971s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium ./pegh.libsodium-openssl
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium-openssl'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium-openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.static.libsodium dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium dkzy95dao5g1
++ ++ echo a
echo a
++ ./pegh.static.libsodium dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -e dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -e + cmp - /tmp/randombytes100
-f /tmp/leading_zero_key
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ + ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
./pegh.static.libsodium -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ + cat - /dev/fd/63
++ echo -n a
./pegh.static.libsodium dkzy95dao5g1
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.453s
user	0m3.737s
sys	0m2.059s
+ test ./pegh.static.libsodium ./pegh.libsodium-openssl -v 0
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium-openssl'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium-openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.static.libsodium -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -v 0 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium-openssl
encrypting same data with same key should result in different ciphertext

real	0m5.568s
user	0m3.669s
sys	0m2.206s
+ test ./pegh.static.libsodium ./pegh.libsodium-openssl -v 1
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -e + ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ -v 1 dkzy95dao5g1 -i /tmp/randombytes100
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium -e -v 1 -f /tmp/leading_zero_key_a+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b

+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -v 1 dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.711s
user	0m3.984s
sys	0m2.050s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium ./pegh.static.libsodium
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium dkzy95dao5g1
++ echo a
++ echo a
++ ./pegh.static.libsodium dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium -e dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -d + cmp - /tmp/randombytes100
dkzy95dao5g1-wrongkey
+ ./pegh.static.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ + ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
./pegh.static.libsodium -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ ./pegh.static.libsodium dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.418s
user	0m3.741s
sys	0m1.963s
+ test ./pegh.static.libsodium ./pegh.static.libsodium -v 0
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ + ./pegh.static.libsodium -v 0 dkzy95dao5g1
./pegh.static.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ encrypting same data with same key should result in different ciphertext
set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ + ./pegh.static.libsodium -e -v 0 dkzy95dao5g1
./pegh.static.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -e -v + ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key_a+ cmp - /tmp/randombytes100

+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -v 0 dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.345s
user	0m3.616s
sys	0m2.081s
+ test ./pegh.static.libsodium ./pegh.static.libsodium -v 1
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.static.libsodium
encrypting same data with same key should result in different ciphertext
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -e -v + 1 -f cmp - /tmp/randombytes100/tmp/leading_zero_key

+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium -e -v + ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
1 -f /tmp/leading_zero_key_a+ cmp - /tmp/randombytes100

decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat ++ - echo -n /dev/fd/63a

decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.669s
user	0m3.940s
sys	0m2.066s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.static.libsodium ./pegh.libsodium
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium'
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ + ./pegh.static.libsodium dkzy95dao5g1
./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
++ echo a
++ ./pegh.static.libsodium dkzy95dao5g1
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.libsodium dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ + ./pegh.libsodium -d dkzy95dao5g1-wrongkey
cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.static.libsodium -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.301s
user	0m3.538s
sys	0m2.044s
+ test ./pegh.static.libsodium ./pegh.libsodium -v 0
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium
+ bin=./pegh.static.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium -v 0 dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1++ echo a
++ ./pegh.static.libsodium -v 0 dkzy95dao5g1

/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ + cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -e ./pegh.libsodium -v 0 -d dkzy95dao5g1
dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.static.libsodium -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ set +e
+ echo encrypting with one key and decrypting with another should fail
'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey+ 
+ cmp - /tmp/randombytes100
./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ + ./pegh.libsodium -d -f /tmp/leading_zero_key_b
+ ./pegh.static.libsodium cmp - /tmp/randombytes100
-e -v 0 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.static.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ + ./pegh.static.libsodium -v 0 dkzy95dao5g1
echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
+ ++ echo -n a
cat - /dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.101s
user	0m3.442s
sys	0m2.005s
+ test ./pegh.static.libsodium ./pegh.libsodium -v 1
+ bin=./pegh.static.libsodium
testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium
encrypting same data with same key should result in different ciphertext
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.static.libsodium bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.static.libsodium -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.static.libsodium -e -v + 1 ./pegh.libsodium -d dkzy95dao5g1
dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ set +e
+ encrypting with one key and decrypting with another should fail
echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo encrypting/decrypting with key in file where last byte is different should fail
'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.static.libsodium -e + ./pegh.libsodium -d -f /tmp/leading_zero_key_b
-v 1 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.static.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -d dkzy95dao5g1 -o + bla.txt
+ ./pegh.static.libsodium -v 1 dkzy95dao5g1
cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.704s
user	0m3.980s
sys	0m2.043s
+ for bin in $TEST_BINS
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium ./pegh.static.openssl
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.openssl -d dkzy95dao5g1
+ ./pegh.libsodium dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
++ + echo a
cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium dkzy95dao5g1
++ echo a
++ ./pegh.libsodium dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -e dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -e -f /tmp/leading_zero_key
+ + cmp - /tmp/randombytes100./pegh.static.openssl 
-d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium -e -f /tmp/leading_zero_key_a
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b+ 
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m6.069s
user	0m4.038s
sys	0m2.262s
+ test ./pegh.libsodium ./pegh.static.openssl -v 0
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.openssl'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.openssl -d dkzy95dao5g1
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium -v 0 dkzy95dao5g1++ echo a

++ echo a
++ ./pegh.libsodium -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key
+ + ./pegh.static.openssl cmp - /tmp/randombytes100
-d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium + cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
-e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ cat ++ echo -n a
- /dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.872s
user	0m4.252s
sys	0m2.014s
+ test ./pegh.libsodium ./pegh.static.openssl -v 1
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.openssl
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'encrypting same data with same key should result in different ciphertext

+ cmp /dev/fd/63 /dev/fd/62
++ ++ ./pegh.libsodium -v echo 1 a
dkzy95dao5g1
++ ./pegh.libsodium -v 1 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1
+ ./pegh.static.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline

+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e + ./pegh.static.openssl -d dkzy95dao5g1-wrongkey
-v 1 dkzy95dao5g1 + cmp - /tmp/randombytes100
-i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ + ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key_a
+ ./pegh.static.openssl -d -f /tmp/leading_zero_key_b
cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.openssl -d dkzy95dao5g1 -o bla.txt
+ ./pegh.libsodium -v 1 dkzy95dao5g1
++ echo -n a
+ cat - /dev/fd/63
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.787s
user	0m4.151s
sys	0m2.000s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium ./pegh.openssl
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.openssl -d dkzy95dao5g1+ ./pegh.libsodium dkzy95dao5g1

+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.libsodium dkzy95dao5g1
++ echo a
++ ./pegh.libsodium dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -e dkzy95dao5g1+ 
./pegh.openssl -d dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ ./pegh.libsodium -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo encrypting with one key and decrypting with another should fail
'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.743s
user	0m4.056s
sys	0m2.040s
+ test ./pegh.libsodium ./pegh.openssl -v 0
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' 0 '!=' 1 ']'
+ + echo a
+ ./pegh.libsodium -v 0 dkzy95dao5g1
./pegh.openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.libsodium -v 0 dkzy95dao5g1
++ ./pegh.libsodium -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo encrypting then decrypting with the same key should succeed
'encrypting then decrypting with the same key should succeed'
+ + ./pegh.openssl -d cmp dkzy95dao5g1- 
/tmp/randombytes100
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.openssl -d -f /tmp/leading_zero_key
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.984s
user	0m4.118s
sys	0m2.239s
+ test ./pegh.libsodium ./pegh.openssl -v 1
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.openssl'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.openssl
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ echo a
++ ./pegh.libsodium -v 1 dkzy95dao5g1
++ ./pegh.libsodium -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1
+ ./pegh.openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key
+ + ./pegh.openssl -d -f /tmp/leading_zero_key
cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.openssl + ./pegh.libsodium -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
-d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ + ./pegh.openssl -d -f /tmp/leading_zero_key_b
cmp - /tmp/randombytes100
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key_a
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
+ ./pegh.libsodium -v ++ echo -n a
1 dkzy95dao5g1
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.837s
user	0m4.304s
sys	0m1.911s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium ./pegh.static.libsodium-openssl
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium-openssl'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium-openssl
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium-openssl + ./pegh.libsodium dkzy95dao5g1
-d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ encrypting same data with same key should result in different ciphertext
echo 'encrypting same data with same key should result in different ciphertext'
++ echo a
++ + ./pegh.libsodium cmp /dev/fd/63 /dev/fd/62
dkzy95dao5g1
++ ++ ./pegh.libsodium dkzy95dao5g1
echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -e dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1+ cmp - /tmp/randombytes100

encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium-openssl + ./pegh.libsodium -e -f /tmp/leading_zero_key
-d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium -e -f /tmp/leading_zero_key_a
+ + cmp - /tmp/randombytes100
./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ ./pegh.libsodium dkzy95dao5g1
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium-openssl
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.122s
user	0m3.492s
sys	0m2.043s
+ test ./pegh.libsodium ./pegh.static.libsodium-openssl -v 0
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ echo a
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium -v 0 dkzy95dao5g1
++ echo a
++ ./pegh.libsodium -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
bad decryption bytes are never output, file should be 0 bytes
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium-openssl
+ '[' -s bla.txt ']'
+ set -e

real	0m5.109s
user	0m3.509s
sys	0m1.937s
+ test ./pegh.libsodium ./pegh.static.libsodium-openssl -v 1
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium-openssl
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium-openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium -v 1 dkzy95dao5g1
++ echo a
++ echo a
++ ./pegh.libsodium -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium-openssl + cmp - /tmp/randombytes100
-d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.482s
user	0m3.952s
sys	0m2.022s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium ./pegh.libsodium-openssl
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium-openssl
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.libsodium dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium dkzy95dao5g1
++ ./pegh.libsodium dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -e dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ + cmp - /tmp/randombytes100
./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium -e -f /tmp/leading_zero_key_a
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium dkzy95dao5g1
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.265s
user	0m3.601s
sys	0m2.015s
+ test ./pegh.libsodium ./pegh.libsodium-openssl -v 0
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium-openssl
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
encrypting same data with same key should result in different ciphertext
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium -v 0 dkzy95dao5g1
++ ./pegh.libsodium -v 0 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1
++ echo a
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
++ echo a
+ cmp - /tmp/randombytes100
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ encrypting/decrypting with key in file where last byte is different should fail
echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat ++ echo -n - a
/dev/fd/63
+ ./pegh.libsodium -v 0 dkzy95dao5g1
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.166s
user	0m3.556s
sys	0m2.071s
+ test ./pegh.libsodium ./pegh.libsodium-openssl -v 1
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium-openssl
+ shift
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium-openssl
encrypting same data with same key should result in different ciphertext
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium-openssl'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo ++ ./pegh.libsodium -v 1 dkzy95dao5g1
a++ ./pegh.libsodium -v 1 dkzy95dao5g1

++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo encrypting then decrypting with the same key should succeed
'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d dkzy95dao5g1
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key
+ set +e
encrypting with one key and decrypting with another should fail
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 + ./pegh.libsodium-openssl -d dkzy95dao5g1-wrongkey
-i /tmp/randombytes100
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key_a
+ ./pegh.libsodium-openssl -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -v 1 dkzy95dao5g1
+ ./pegh.libsodium-openssl -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.684s
user	0m4.052s
sys	0m1.971s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium ./pegh.static.libsodium
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.libsodium dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
encrypting same data with same key should result in different ciphertext
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.libsodium dkzy95dao5g1
++ ./pegh.libsodium dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ + cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1
./pegh.libsodium -e dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium -e -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ ./pegh.libsodium dkzy95dao5g1
+ cat - /dev/fd/63
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
++ echo -n a
+ echo 'hopefully this doesnt make it to disk'
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.017s
user	0m3.447s
sys	0m1.924s
+ test ./pegh.libsodium ./pegh.static.libsodium -v 0
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium
+ set +eu
+ '[' 0 '!=' 1 ']'
+ echo a
+ ./pegh.static.libsodium -d dkzy95dao5g1
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ++ ./pegh.libsodium -v 0 ./pegh.libsodium dkzy95dao5g1
-v 0 dkzy95dao5g1
++ echo a
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1+ cmp + - /tmp/randombytes100
./pegh.static.libsodium -d dkzy95dao5g1

+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d + cmp - /tmp/randombytes100
-f /tmp/leading_zero_key
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
encrypting with one key and decrypting with another should fail
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
large values of N without enough memory should fail
+ echo 'large values of N without enough memory should fail'
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium
encrypting same data with same key should result in different ciphertext
+ '[' -s bla.txt ']'
+ set -e

real	0m5.220s
user	0m3.559s
sys	0m2.067s
+ test ./pegh.libsodium ./pegh.static.libsodium -v 1
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.static.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.static.libsodium'
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.libsodium -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.libsodium -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
encrypting then decrypting with the same key should succeed
+ echo 'encrypting then decrypting with the same key should succeed'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1+ cmp - /tmp/randombytes100

+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key+ 
cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -i /tmp/randombytes100
+ cmp - /tmp/randombytes100
+ ./pegh.static.libsodium -d dkzy95dao5g1-wrongkey
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key_a
+ ./pegh.static.libsodium -d -f /tmp/leading_zero_key_b
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.static.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ + echo ./pegh.libsodium 'hopefully this doesnt make it to disk'
-v 1 dkzy95dao5g1
+ ./pegh.static.libsodium -d dkzy95dao5g1 -o bla.txt
+ cat - /dev/fd/63
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.840s
user	0m4.041s
sys	0m2.128s
+ for bin_decrypt in $TEST_BINS
+ test ./pegh.libsodium ./pegh.libsodium
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium
+ set +eu
+ '[' '' '!=' 1 ']'
+ echo a
+ ./pegh.libsodium dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ ./pegh.libsodium dkzy95dao5g1
++ echo a
++ echo a
++ ./pegh.libsodium dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
encrypting then decrypting with the same key should succeed
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1
+ ./pegh.libsodium -e dkzy95dao5g1
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium -e -f /tmp/leading_zero_key
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e dkzy95dao5g1 -i /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium -e -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
bad decryption bytes are never output, file should be 0 bytes
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium dkzy95dao5g1
+ cat + - /dev/fd/63
./pegh.libsodium -d dkzy95dao5g1 -o bla.txt
++ echo -n a
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.485s
user	0m3.649s
sys	0m2.173s
+ test ./pegh.libsodium ./pegh.libsodium -v 0
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium'
+ set +eu
+ '[' 0 '!=' 1 ']'
+ ./pegh.libsodium -d dkzy95dao5g1
+ echo a
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ '[' 0 -eq 19 -o 0 -eq 19 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
++ echo a
++ ./pegh.libsodium -v 0 + cmp /dev/fd/63 /dev/fd/62
dkzy95dao5g1
++ ./pegh.libsodium -v 0 dkzy95dao5g1
++ echo a
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1+ ./pegh.libsodium -d dkzy95dao5g1

+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium -d -f + ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key
/tmp/leading_zero_key
+ cmp - /tmp/randombytes100
encrypting with one key and decrypting with another should fail
+ set +e
+ echo 'encrypting with one key and decrypting with another should fail'
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -d dkzy95dao5g1-wrongkey
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -i /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
encrypting/decrypting with key in file where last byte is different should fail
+ ./pegh.libsodium -d -f /tmp/leading_zero_key_b
+ ./pegh.libsodium -e -v 0 -f /tmp/leading_zero_key_a
+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e -v 0 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ echo 'hopefully this doesnt make it to disk'
+ ./pegh.libsodium -v 0 dkzy95dao5g1
+ ./pegh.libsodium -d + cat - /dev/fd/63dkzy95dao5g1 
-o bla.txt
++ echo -n a
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.328s
user	0m3.640s
sys	0m2.008s
+ test ./pegh.libsodium ./pegh.libsodium -v 1
+ bin=./pegh.libsodium
+ shift
+ bin_decrypt=./pegh.libsodium
+ shift
+ echo 'testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium'
testing binaries bin: ./pegh.libsodium bin_decrypt: ./pegh.libsodium
+ set +eu
+ '[' 1 '!=' 1 ']'
+ set -eu
+ echo 'encrypting same data with same key should result in different ciphertext'
encrypting same data with same key should result in different ciphertext
+ cmp /dev/fd/63 /dev/fd/62
++ echo a
++ ./pegh.libsodium -v 1 dkzy95dao5g1
++ echo a
++ ./pegh.libsodium -v 1 dkzy95dao5g1
/dev/fd/63 /dev/fd/62 differ: char 12, line 1
+ true
+ echo 'encrypting then decrypting with the same key should succeed'
encrypting then decrypting with the same key should succeed
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1
+ ./pegh.libsodium -d dkzy95dao5g1
+ cmp - /tmp/randombytes100
encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline
+ echo 'encrypting/decrypting with key in file should work, even when key has leading 0s and a trailing newline'
+ ./pegh.libsodium -d -f /tmp/leading_zero_key
+ cmp - /tmp/randombytes100
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key
+ set +e
+ echo encrypting with one key and decrypting with another should fail
'encrypting with one key and decrypting with another should fail'
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -i + /tmp/randombytes100./pegh.libsodium -d dkzy95dao5g1-wrongkey

+ cmp - /tmp/randombytes100
decryption failed
cmp: EOF on -
encrypting/decrypting with key in file where last byte is different should fail
+ echo 'encrypting/decrypting with key in file where last byte is different should fail'
+ ./pegh.libsodium -e -v 1 -f /tmp/leading_zero_key_a
+ cmp + ./pegh.libsodium -d -f /tmp/leading_zero_key_b
- /tmp/randombytes100
decryption failed
cmp: EOF on -
+ echo 'large values of N without enough memory should fail'
large values of N without enough memory should fail
+ ./pegh.libsodium -e -v 1 dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
scrypt key derivation error, needed memory 2049 mb, allowed memory 64 mb, increase -m
+ ./pegh.libsodium -d dkzy95dao5g1 -N 2000000 -i /tmp/randombytes100
Error: unsupported file format version 155, we only support version 0 (AES-256-GCM) and 1 (Chacha20-Poly1305)
Error: decryption aborting, this file cannot be decrypted with this version/CPU
+ echo 'bad decryption bytes are never output, file should be 0 bytes'
bad decryption bytes are never output, file should be 0 bytes
+ cat - /dev/fd/63
++ echo -n a
+ ./pegh.libsodium -v 1 dkzy95dao5g1+ ./pegh.libsodium -d dkzy95dao5g1 -o bla.txt

+ echo 'hopefully this doesnt make it to disk'
decryption failed
+ '[' -s bla.txt ']'
+ set -e

real	0m5.612s
user	0m3.874s
sys	0m2.136s
+ echo 'successful test run!'
successful test run!
+ echo 'successfully built and tested static pegh against libsodium and openssl!'
successfully built and tested static pegh against libsodium and openssl!
+ mkdir -p release
+ mv pegh.static.libsodium ./release/pegh-linux-amd64-libsodium
+ '[' amd64 '==' aarch64 ]
+ mv pegh.static.openssl ./release/pegh-linux-amd64-openssl
+ mv pegh.static.libsodium-openssl ./release/pegh-linux-amd64-libsodium-openssl
+ '[' amd64 '==' amd64 ]
+ apk add git
(1/9) Installing ca-certificates (20230506-r0)
(2/9) Installing brotli-libs (1.0.9-r14)
(3/9) Installing libunistring (1.1-r1)
(4/9) Installing libidn2 (2.3.4-r1)
(5/9) Installing nghttp2-libs (1.55.1-r0)
(6/9) Installing libcurl (8.2.1-r0)
(7/9) Installing libexpat (2.5.0-r1)
(8/9) Installing pcre2 (10.42-r1)
(9/9) Installing git (2.40.1-r0)
Executing busybox-1.36.1-r2.trigger
Executing ca-certificates-20230506-r0.trigger
OK: 526 MiB in 62 packages
+ git archive HEAD -9 --format zip -o ./release/pegh-source.zip
+ git archive HEAD -9 --format tar.gz -o ./release/pegh-source.tar.gz
+ '[' amd64 '==' amd64 ]
going to try to build windows here...
+ echo 'going to try to build windows here...'
+ apk add mingw-w64-gcc curl wine
(1/77) Installing curl (8.2.1-r0)
(2/77) Installing mingw-w64-binutils (2.40-r1)
(3/77) Installing mingw-w64-crt (11.0.0-r0)
(4/77) Installing mingw-w64-headers (11.0.0-r0)
(5/77) Installing mingw-w64-winpthreads (11.0.0-r0)
(6/77) Installing mingw-w64-gcc (12.2.0-r3)
(7/77) Installing libxau (1.0.11-r2)
(8/77) Installing libmd (1.0.4-r2)
(9/77) Installing libbsd (0.11.7-r1)
(10/77) Installing libxdmcp (1.1.4-r2)
(11/77) Installing libxcb (1.15-r1)
(12/77) Installing libx11 (1.8.4-r4)
(13/77) Installing libxext (1.3.5-r2)
(14/77) Installing libxi (1.8.1-r0)
(15/77) Installing libxrender (0.9.11-r3)
(16/77) Installing libxrandr (1.5.3-r2)
(17/77) Installing opencl (2023.04.17-r1)
(18/77) Installing alsa-lib (1.2.9-r1)
(19/77) Installing libintl (0.21.1-r7)
(20/77) Installing libblkid (2.38.1-r8)
(21/77) Installing libmount (2.38.1-r8)
(22/77) Installing glib (2.76.4-r0)
(23/77) Installing libexif (0.6.24-r1)
(24/77) Installing libjpeg-turbo (2.1.5.1-r3)
(25/77) Installing libltdl (2.4.7-r2)
(26/77) Installing libusb (1.0.26-r2)
(27/77) Installing libgphoto2 (2.5.30-r0)
Executing libgphoto2-2.5.30-r0.pre-install
(28/77) Installing mesa (23.0.4-r0)
(29/77) Installing hwdata-pci (0.370-r0)
(30/77) Installing libpciaccess (0.17-r2)
(31/77) Installing libdrm (2.4.115-r4)
(32/77) Installing wayland-libs-server (1.22.0-r2)
(33/77) Installing mesa-gbm (23.0.4-r0)
(34/77) Installing mesa-glapi (23.0.4-r0)
(35/77) Installing wayland-libs-client (1.22.0-r2)
(36/77) Installing libxshmfence (1.3.2-r2)
(37/77) Installing mesa-egl (23.0.4-r0)
(38/77) Installing libxfixes (6.0.1-r2)
(39/77) Installing libxxf86vm (1.1.5-r3)
(40/77) Installing mesa-gl (23.0.4-r0)
(41/77) Installing libxv (1.0.12-r3)
(42/77) Installing libbz2 (1.0.8-r5)
(43/77) Installing libpng (1.6.39-r3)
(44/77) Installing freetype (2.13.0-r5)
(45/77) Installing fontconfig (2.14.2-r3)
(46/77) Installing pixman (0.42.2-r1)
(47/77) Installing cairo (1.17.8-r1)
(48/77) Installing cdparanoia-libs (10.2-r14)
(49/77) Installing graphene (1.10.8-r2)
(50/77) Installing libcap2 (2.69-r0)
(51/77) Installing gstreamer (1.22.5-r0)
(52/77) Installing libogg (1.3.5-r4)
(53/77) Installing opus (1.4-r0)
(54/77) Installing orc (0.4.34-r0)
(55/77) Installing libxft (2.3.8-r1)
(56/77) Installing fribidi (1.0.13-r0)
(57/77) Installing graphite2 (1.3.14-r5)
(58/77) Installing harfbuzz (7.3.0-r0)
(59/77) Installing pango (1.50.14-r1)
(60/77) Installing libtheora (1.1.1-r17)
(61/77) Installing libvorbis (1.3.7-r1)
(62/77) Installing wayland-libs-cursor (1.22.0-r2)
(63/77) Installing wayland-libs-egl (1.22.0-r2)
(64/77) Installing gst-plugins-base (1.22.5-r0)
(65/77) Installing libpcap (1.10.4-r1)
(66/77) Installing pcsc-lite-libs (1.9.9-r3)
(67/77) Installing libasyncns (0.8-r1)
(68/77) Installing dbus-libs (1.14.8-r0)
(69/77) Installing flac-libs (1.4.3-r0)
(70/77) Installing libsndfile (1.2.0-r2)
(71/77) Installing soxr (0.1.3-r5)
(72/77) Installing speexdsp (1.2.1-r1)
(73/77) Installing tdb-libs (1.4.8-r1)
(74/77) Installing libpulse (16.1-r10)
(75/77) Installing sane (1.1.1-r2)
Executing sane-1.1.1-r2.pre-install
(76/77) Installing eudev-libs (3.2.11-r8)
(77/77) Installing wine (8.13-r0)
Executing busybox-1.36.1-r2.trigger
Executing glib-2.76.4-r0.trigger
OK: 1304 MiB in 139 packages
+ pwd
+ STATIC_LIB_DIR=/tmp
+ LIBSODIUM_VERSION=1.0.18
+ OPENSSL_VERSION=1.1.1h_3
+ OPENSSL_CURL_VERSION=7.73.0_3
+ '[' '!' -d /tmp/libsodium-win32 ]
+ curl -L -O https://download.libsodium.org/libsodium/releases/libsodium-1.0.18-mingw.tar.gz -O https://curl.se/windows/dl-7.73.0_3/openssl-1.1.1h_3-win64-mingw.zip -O https://curl.se/windows/dl-7.73.0_3/openssl-1.1.1h_3-win32-mingw.zip
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed

  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
 93 1013k   93  943k    0     0  3398k      0 --:--:-- --:--:-- --:--:-- 3395k
100 1013k  100 1013k    0     0  3634k      0 --:--:-- --:--:-- --:--:-- 3633k
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed

  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100  6156  100  6156    0     0   121k      0 --:--:-- --:--:-- --:--:--  122k
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed

  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100  6156  100  6156    0     0   829k      0 --:--:-- --:--:-- --:--:--  858k
+ echo 'e499c65b1c511cbc6700e436deb3771c3baa737981114c9e9f85f2ec90176861  libsodium-1.0.18-mingw.tar.gz'
+ echo 'fcaa181d848ac56150f00bc46d204d81fde4448a9afe9ef3ca04cc21d3132cb4  openssl-1.1.1h_3-win32-mingw.zip'
+ echo '913ddfa264ed9bae51f9deaa8ebce9d9450fa89fdf4c74ab41a6dfffb5880c67  openssl-1.1.1h_3-win64-mingw.zip'
+ sha256sum -c libs.sha256
libsodium-1.0.18-mingw.tar.gz: OK
openssl-1.1.1h_3-win32-mingw.zip: FAILED
openssl-1.1.1h_3-win64-mingw.zip: FAILED
sha256sum: WARNING: 2 of 3 computed checksums did NOT match
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Email)
[Pipeline] step
Sending e-mails to: admin.jenkins@moparisthebest.com
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
+ ./bin/build.sh docker-chown
+ BUILD_SCRIPT=docker-chown
+ shift
+ '[' '' == docker-chown ']'
+ '[' docker-chown == docker-chown ']'
++ pwd
++ id -g
+ docker run --rm -v /var/lib/jenkins/workspace/moparisthebest_pegh_master:/tmp alpine chown -R 971:971 /tmp
+ exit 0
[Pipeline] deleteDir
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/branches: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/applypatch-msg.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/commit-msg.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/fsmonitor-watchman.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/post-update.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/pre-applypatch.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/pre-commit.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/pre-merge-commit.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/pre-push.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
Also:   java.nio.file.FileSystemException: /var/lib/jenkins/workspace/moparisthebest_pegh_master/.git/hooks/pre-rebase.sample: Operation not permitted
		at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:100)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
		at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:116)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setMode(UnixFileAttributeViews.java:254)
		at java.base/sun.nio.fs.UnixFileAttributeViews$Posix.setPermissions(UnixFileAttributeViews.java:276)
		at java.base/java.nio.file.Files.setPosixFilePermissions(Files.java:2080)
		at jenkins.util.io.PathRemover.makeWritable(PathRemover.java:285)
		at jenkins.util.io.PathRemover.makeRemovable(PathRemover.java:258)
		at jenkins.util.io.PathRemover.removeOrMakeRemovableThenRemove(PathRemover.java:238)
		at jenkins.util.io.PathRemover.tryRemoveFile(PathRemover.java:202)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:213)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.tryRemoveDirectoryContents(PathRemover.java:224)
		at jenkins.util.io.PathRemover.tryRemoveRecursive(PathRemover.java:212)
		at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:93)
jenkins.util.io.CompositeIOException: Unable to delete '/var/lib/jenkins/workspace/moparisthebest_pegh_master'. Tried 3 times (of a maximum of 3) waiting 0.1 sec between attempts. (Discarded 76 additional exceptions)
	at jenkins.util.io.PathRemover.forceRemoveRecursive(PathRemover.java:96)
	at hudson.Util.deleteRecursive(Util.java:319)
	at hudson.FilePath$DeleteRecursive.invoke(FilePath.java:1444)
	at hudson.FilePath$DeleteRecursive.invoke(FilePath.java:1439)
	at hudson.FilePath.act(FilePath.java:1200)
	at hudson.FilePath.act(FilePath.java:1183)
	at hudson.FilePath.deleteRecursive(FilePath.java:1436)
	at org.jenkinsci.plugins.workflow.steps.DeleteDirStep$Execution.run(DeleteDirStep.java:77)
	at org.jenkinsci.plugins.workflow.steps.DeleteDirStep$Execution.run(DeleteDirStep.java:69)
	at org.jenkinsci.plugins.workflow.steps.SynchronousNonBlockingStepExecution.lambda$start$0(SynchronousNonBlockingStepExecution.java:47)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
[Gitea] Notifying branch build status: FAILURE There was a failure building this commit
[Gitea] Notified
Finished: FAILURE