diff options
author | Egor Tensin <Egor.Tensin@gmail.com> | 2015-07-07 17:32:22 +0300 |
---|---|---|
committer | Egor Tensin <Egor.Tensin@gmail.com> | 2015-07-07 17:32:22 +0300 |
commit | ea8e6afe8e553064c427cde26448193811321f05 (patch) | |
tree | 293e7e9395df18becd3f8ebe25d8931583303d82 | |
parent | utils: rearrange files (diff) | |
download | aes-tools-ea8e6afe8e553064c427cde26448193811321f05.tar.gz aes-tools-ea8e6afe8e553064c427cde26448193811321f05.zip |
README updates
Diffstat (limited to '')
-rw-r--r-- | README.md | 6 | ||||
-rw-r--r-- | test/README.md | 8 | ||||
-rw-r--r-- | utils/README.md | 4 |
3 files changed, 11 insertions, 7 deletions
@@ -30,9 +30,13 @@ You can then run an executable like this: You can generate the docs using [Doxygen](http://www.stack.nl/~dimitri/doxygen/). The docs will be put into the `doc` directory in the repository's root. +## Utilities + +See [Utilities](utils#utilities). + ## Testing -See [Testing](https://github.com/egor-tensin/aesni/tree/master/test#testing). +See [Testing](test#testing). ## Licensing diff --git a/test/README.md b/test/README.md index 5121a33..0192a64 100644 --- a/test/README.md +++ b/test/README.md @@ -1,6 +1,6 @@ # Testing -After you've [built](https://github.com/egor-tensin/aesni#building) the block encryption/decryption utilities, you can verify the implementation either [manually](#manually) or [automatically](#using-test-vectors) using test vectors. +After you've [built](../#building) the block encryption/decryption utilities, you can verify the implementation either [manually](#manually) or [automatically](#using-test-vectors) using test vectors. ## Manually @@ -20,7 +20,7 @@ and for AES-192 in CBC mode: 30c81c46a35ce411e5fbc1191a0a52ef f69f2445df4f9b17ad2b417be66c3710 -On older CPUs, you can run the utilities [using Intel SDE](https://github.com/egor-tensin/aesni#running-on-older-cpus). +On older CPUs, you can run the utilities [using Intel SDE](../README.md#running-on-older-cpus). ## Using test vectors @@ -41,11 +41,11 @@ Use `--help` to see the script's usage details. To test the implementation against the vectors from [NIST SP 800-38A](http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf) using `nist-sp-800-32a.py`. - python nist-sp-800-38a.py -p C:\build\utils\block\Debug + python nist-sp-800-38a.py -p C:\build\utils\Debug ### Cryptographic Algorithm Validation Program To test the implementation against the vectors from [CAVP](http://csrc.nist.gov/groups/STM/cavp/) using `cavp.py`. The AES Known Answer Test (KAT) Vectors are used and read from `KAT_AES.zip`. - python cavp.py -p C:\build\utils\block\Debug + python cavp.py -p C:\build\utils\Debug diff --git a/utils/README.md b/utils/README.md index 47db570..29c5abc 100644 --- a/utils/README.md +++ b/utils/README.md @@ -9,9 +9,9 @@ The included utilities are: * [file encryption](#file-encryption) utilities, * and [bitmap encryption](#bitmap-encryption) utilities. -## Block encryption +On older CPUs, you can run the utilities [using Intel SDE](../README.md#running-on-older-cpus). -On older CPUs, you can run the utilities [using Intel SDE](https://github.com/egor-tensin/aesni#running-on-older-cpus). +## Block encryption ### aes_encrypt_block.exe |