diff options
author | Niels Möller <nisse@lysator.liu.se> | 2001-06-17 00:45:18 +0200 |
---|---|---|
committer | Niels Möller <nisse@lysator.liu.se> | 2001-06-17 00:45:18 +0200 |
commit | 512eb5655d4645b4f0c10cf66d1f9abee56432d2 (patch) | |
tree | a7141317d024d16244423771346c642700538c7c /serpent.h | |
parent | 1699f5222b936d8b86c53a4e114df375abf1c32f (diff) | |
download | nettle-512eb5655d4645b4f0c10cf66d1f9abee56432d2.tar.gz |
*** empty log message ***
Rev: src/nettle/ChangeLog:1.8
Rev: src/nettle/serpent.h:1.3
Rev: src/nettle/testsuite/.cvsignore:1.4
Rev: src/nettle/testsuite/twofish-test.m4:1.2
Rev: src/nettle/twofish.h:1.2
Diffstat (limited to 'serpent.h')
-rw-r--r-- | serpent.h | 14 |
1 files changed, 7 insertions, 7 deletions
@@ -33,14 +33,14 @@ #include <stdint.h> -#define SERPENT_BLOCKSIZE 16 +#define SERPENT_BLOCK_SIZE 16 -/* Other key lengths are possible, but we only use 256 bits. Besides, the - design of Serpent makes other key lengths useless; they cheated with the - AES requirements, using a 256-bit key length exclusively and just padding - it out if the desired key length was less, so there really is no advantage - to using key lengths less than 256 bits. */ -#define SERPENT_KEYSIZE 32 +/* Other key lengths are possible, but the design of Serpent makes + * smaller key lengths quite pointless; they cheated with the AES + * requirements, using a 256-bit key length exclusively and just + * padding it out if the desired key length was less, so there really + * is no advantage to using key lengths less than 256 bits. */ +#define SERPENT_KEY_SIZE 32 /* Allow keys of size 128 <= bits <= 256 */ |