diff options
author | Egor Tensin <Egor.Tensin@gmail.com> | 2015-07-07 17:32:22 +0300 |
---|---|---|
committer | Egor Tensin <Egor.Tensin@gmail.com> | 2015-07-07 17:32:22 +0300 |
commit | ea8e6afe8e553064c427cde26448193811321f05 (patch) | |
tree | 293e7e9395df18becd3f8ebe25d8931583303d82 /test/README.md | |
parent | utils: rearrange files (diff) | |
download | aes-tools-ea8e6afe8e553064c427cde26448193811321f05.tar.gz aes-tools-ea8e6afe8e553064c427cde26448193811321f05.zip |
README updates
Diffstat (limited to 'test/README.md')
-rw-r--r-- | test/README.md | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/test/README.md b/test/README.md index 5121a33..0192a64 100644 --- a/test/README.md +++ b/test/README.md @@ -1,6 +1,6 @@ # Testing -After you've [built](https://github.com/egor-tensin/aesni#building) the block encryption/decryption utilities, you can verify the implementation either [manually](#manually) or [automatically](#using-test-vectors) using test vectors. +After you've [built](../#building) the block encryption/decryption utilities, you can verify the implementation either [manually](#manually) or [automatically](#using-test-vectors) using test vectors. ## Manually @@ -20,7 +20,7 @@ and for AES-192 in CBC mode: 30c81c46a35ce411e5fbc1191a0a52ef f69f2445df4f9b17ad2b417be66c3710 -On older CPUs, you can run the utilities [using Intel SDE](https://github.com/egor-tensin/aesni#running-on-older-cpus). +On older CPUs, you can run the utilities [using Intel SDE](../README.md#running-on-older-cpus). ## Using test vectors @@ -41,11 +41,11 @@ Use `--help` to see the script's usage details. To test the implementation against the vectors from [NIST SP 800-38A](http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf) using `nist-sp-800-32a.py`. - python nist-sp-800-38a.py -p C:\build\utils\block\Debug + python nist-sp-800-38a.py -p C:\build\utils\Debug ### Cryptographic Algorithm Validation Program To test the implementation against the vectors from [CAVP](http://csrc.nist.gov/groups/STM/cavp/) using `cavp.py`. The AES Known Answer Test (KAT) Vectors are used and read from `KAT_AES.zip`. - python cavp.py -p C:\build\utils\block\Debug + python cavp.py -p C:\build\utils\Debug |