diff options
author | Kelly McLaughlin <[email protected]> | 2015-01-30 15:25:03 -0700 |
---|---|---|
committer | Kelly McLaughlin <[email protected]> | 2015-02-04 11:52:59 -0700 |
commit | a1fa5b86e2241a6409d3278ebc39dbc6a07fcae4 (patch) | |
tree | bd141e2b98ebf12b64465e276b9ee37459ec1a2d /lib/test_server/include | |
parent | 6f19eae6d1df8d6892a3f665d3cf38d3cc5359fc (diff) | |
download | otp-a1fa5b86e2241a6409d3278ebc39dbc6a07fcae4.tar.gz otp-a1fa5b86e2241a6409d3278ebc39dbc6a07fcae4.tar.bz2 otp-a1fa5b86e2241a6409d3278ebc39dbc6a07fcae4.zip |
Accept all valid key sizes in aes_cfb functions
Despite the confusion caused by the name, aes_cfb_8_crypt and
aes_cfb_128_crypt can use key lengths of 128, 192, or 256. The integer
in the function name refers to the block size for CFB mode. Change
the aes_cfb_8_crypt and aes_cfb_128_crypt functions to accept and use
keys of length 128, 192, or 256. Also augment the existing testing for
these functions using the NIST test vectors for the additional key
lengths to ensure the changes function properly.
Diffstat (limited to 'lib/test_server/include')
0 files changed, 0 insertions, 0 deletions