diff options
author | Nick Mathewson <nickm@torproject.org> | 2016-09-16 11:21:33 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2016-09-16 11:21:33 -0400 |
commit | 6cb9c2cf77cc8375f89cc8d625d0b60e292d8160 (patch) | |
tree | 85dc1028688591761703dd06ee9de7ebc8563649 /src/common/aes.c | |
parent | 83129031b1a1a3c719810d30df0e3ec6fa320661 (diff) | |
download | tor-6cb9c2cf77cc8375f89cc8d625d0b60e292d8160.tar.gz tor-6cb9c2cf77cc8375f89cc8d625d0b60e292d8160.zip |
Add support for AES256 and AES192
(This will be used by prop224)
Diffstat (limited to 'src/common/aes.c')
-rw-r--r-- | src/common/aes.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/common/aes.c b/src/common/aes.c index 7131ce199d..cb8fb681e4 100644 --- a/src/common/aes.c +++ b/src/common/aes.c @@ -48,7 +48,7 @@ ENABLE_GCC_WARNING(redundant-decls) /* We have five strategies for implementing AES counter mode. * - * Best with x86 and x86_64: Use EVP_aes_ctr128() and EVP_EncryptUpdate(). + * Best with x86 and x86_64: Use EVP_aes_*_ctr() and EVP_EncryptUpdate(). * This is possible with OpenSSL 1.0.1, where the counter-mode implementation * can use bit-sliced or vectorized AES or AESNI as appropriate. * |