On Mon, Apr 13, 2009 at 07:11:00PM -0400, Jarod Wilson wrote: > One more time, with feeling. Investigated using test vectors from rfc3610, but > they all use a 13-byte nonce, we only support 11-byte, so I'm sticking with > using the samples from a fips cavs example file I have on hand. > > I swear I tested the first version of the patch before submitting last time, > but upon further testing, don't know how it actually managed to run > correctly w/o some of the additional changes in this version. > > This version contains the same vectors, but some of them had incorrect klen's > in them last time. Additionally, null input and associated data should be > handled more appropriately, as well as the expected decryption verification > failure vectors. > > This version of the patch has been tested on both 2.6.30-rc1-git5 + > cryptodev-2.6 and a Red Hat Enterprise Linux 5.x kernel, with some > extra debugging spew added to verify it really *is* working. > > Signed-off-by: Jarod Wilson <jarod@xxxxxxxxxx> > Acked-by: Neil Horman <nhorman@xxxxxxxxxxxxx> > -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html