From: Herbert V. R. <hv...@hv...> - 2002-03-02 10:08:32
|
On Sat, 2002-03-02 at 04:01, Kyle McMartin wrote: > > ...which bug? (sorry, I don't know right now what you are referring > > to... :-/) > it's included in the blowfish bug report. has to do with the "c" for the > cipher being for only 256bit. sorry, can't find it, could forward it to me plz? :-) > sure thing. i'm trying to work out a way to easily determine the kernel > version. i think i'm going to have to fall back to frobbing the top > level kernel Makefile. try 'make version', that's a new target I added yesterday - it creates a file 'version'...=20 this approach has the drawback, that the kernel has to be configured already, so it's not the ideal way... one could also try to extract the kernel version out of the Makefile by doing some clever regexp matching with sed... e.g. something like=20 grep '^VERSION' /usr/src/linux/Makefile | sed 's/VERSION *=3D *\([0-9][0-9]= *\)/\1/g' ps: I've just verified, that some ciphers are broken on big endian (mars, rc6, idea, rc5) and another, dfc, seems to be broken completely... :-( so we have quite a TODO list... for mars and rc6 we have test vectors (see the cryptoapi-test module), but not for the rest... :-/ I'll start to fix mars and rc6, as I've got test vectors to verify against... regards, --=20 Herbert Valerio Riedel / Phone: (EUROPE) +43-1-58801-18840 Email: hv...@hv... / Finger hv...@gn... for GnuPG Public Key GnuPG Key Fingerprint: 7BB9 2D6C D485 CE64 4748 5F65 4981 E064 883F 4142 |