aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/test/README.md
diff options
context:
space:
mode:
authorEgor Tensin <Egor.Tensin@gmail.com>2015-07-07 17:32:22 +0300
committerEgor Tensin <Egor.Tensin@gmail.com>2015-07-07 17:32:22 +0300
commitea8e6afe8e553064c427cde26448193811321f05 (patch)
tree293e7e9395df18becd3f8ebe25d8931583303d82 /test/README.md
parentutils: rearrange files (diff)
downloadaes-tools-ea8e6afe8e553064c427cde26448193811321f05.tar.gz
aes-tools-ea8e6afe8e553064c427cde26448193811321f05.zip
README updates
Diffstat (limited to 'test/README.md')
-rw-r--r--test/README.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/test/README.md b/test/README.md
index 5121a33..0192a64 100644
--- a/test/README.md
+++ b/test/README.md
@@ -1,6 +1,6 @@
# Testing
-After you've [built](https://github.com/egor-tensin/aesni#building) the block encryption/decryption utilities, you can verify the implementation either [manually](#manually) or [automatically](#using-test-vectors) using test vectors.
+After you've [built](../#building) the block encryption/decryption utilities, you can verify the implementation either [manually](#manually) or [automatically](#using-test-vectors) using test vectors.
## Manually
@@ -20,7 +20,7 @@ and for AES-192 in CBC mode:
30c81c46a35ce411e5fbc1191a0a52ef
f69f2445df4f9b17ad2b417be66c3710
-On older CPUs, you can run the utilities [using Intel SDE](https://github.com/egor-tensin/aesni#running-on-older-cpus).
+On older CPUs, you can run the utilities [using Intel SDE](../README.md#running-on-older-cpus).
## Using test vectors
@@ -41,11 +41,11 @@ Use `--help` to see the script's usage details.
To test the implementation against the vectors from [NIST SP 800-38A](http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf) using `nist-sp-800-32a.py`.
- python nist-sp-800-38a.py -p C:\build\utils\block\Debug
+ python nist-sp-800-38a.py -p C:\build\utils\Debug
### Cryptographic Algorithm Validation Program
To test the implementation against the vectors from [CAVP](http://csrc.nist.gov/groups/STM/cavp/) using `cavp.py`.
The AES Known Answer Test (KAT) Vectors are used and read from `KAT_AES.zip`.
- python cavp.py -p C:\build\utils\block\Debug
+ python cavp.py -p C:\build\utils\Debug