aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
context:
space:
mode:
authorEgor Tensin <Egor.Tensin@gmail.com>2015-06-18 04:45:31 +0300
committerEgor Tensin <Egor.Tensin@gmail.com>2015-06-18 04:45:31 +0300
commit3a66bc6832f081aff36bbdea13bb1c8f57a09869 (patch)
tree4bd592b343545e957dad400733e5f4de11750a38
parentREADME update (diff)
downloadaes-tools-3a66bc6832f081aff36bbdea13bb1c8f57a09869.tar.gz
aes-tools-3a66bc6832f081aff36bbdea13bb1c8f57a09869.zip
test: README update
-rw-r--r--test/README.md37
1 files changed, 11 insertions, 26 deletions
diff --git a/test/README.md b/test/README.md
index f00d3d4..28f1769 100644
--- a/test/README.md
+++ b/test/README.md
@@ -4,36 +4,21 @@ After you've [built](https://github.com/egor-tensin/aesni#building) the block en
## Manually
-The block encryption/decryption utilities have uniform interfaces.
-For the ECB mode of operation, the usage is:
+You can test the AES implementation using the block encryption/decryption utilities `encrypt_block_aes.exe` and `decrypt_block_aes.exe`.
+Use the `--help` option to examine the usage info of a utility.
- aesNNNecb_encrypt_block.exe KEY0 [PLAIN0...] [-- KEY1 [PLAIN1...]...]
+For example, for AES-128 in ECB mode:
-and
-
- aesNNNecb_decrypt_block.exe KEY0 [CIPHER0...] [-- KEY1 [CIPHER1--]...]
-
-where `NNN` is either `128`, `192` or `256`.
-
-For the modes of operation involving initialization vectors (CBC, CFB, OFB, CTR, etc.), use the utilities like this:
-
- aesNNNxxx_encrypt_block.exe KEY0 IV0 [PLAIN0...] [-- KEY1 IV1 [PLAIN1...]...]
-
-and
-
- aesNNNxxx_decrypt_block.exe KEY0 IV0 [CIPHER0...] [-- KEY1 IV1 [CIPHER1...]...]
-
-where `NNN` is the same and `xxx` is either `cbc`, `cfb`, `ofb`, `ctr` or some other mode of operation.
-
-For example,
-
- > aes128ecb_encrypt_block.exe 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff
+ > encrypt_block_aes.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff
69c4e0d86a7b0430d8cdb78070b4c55a
- > aes192cbc_encrypt_block.exe 000102030405060708090a0b0c0d0e0f1011121314151617 1032547698badcfe1032547698badcfe 00112233445566778899aabbccddeeff 00112233445566778899aabbccddeeff 00112233445566778899aabbccddeeff
- 92c01276b27eb8baaa3cabe2c661d4a8
- d42bdf90c1a48221a92a5137c1445418
- 96248fca82fbefa31345ae7d8fb7933e
+and for AES-192 in CBC mode:
+
+ > decrypt_block_aes.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd
+ 6bc1bee22e409f96e93d7e117393172a
+ ae2d8a571e03ac9c9eb76fac45af8e51
+ 30c81c46a35ce411e5fbc1191a0a52ef
+ f69f2445df4f9b17ad2b417be66c3710
On older CPUs, you can run the utilities [using Intel SDE](https://github.com/egor-tensin/aesni#running-on-older-cpus).