On Tue, Oct 13, 2015 at 6:16 PM, Henrik Gramner <hen...@gramner.com> wrote:
> On Tue, Oct 13, 2015 at 11:58 PM, Ganesh Ajjanagadde <gajja...@mit.edu> wrote:
>> On Tue, Oct 13, 2015 at 5:55 PM, Henrik Gramner <hen...@gramner.com> wrote:
>>> On Tue, Oct 13, 2015 at 11:28 PM, Ganesh Ajjanagadde <gajja...@mit.edu> 
>>> wrote:
>>>> Not really that important, but unless this increases FATE time
>>>> significantly, I would recommend a much larger MAX_COUNT, and multiple
>>>> iterations (e.g #define an ITER_COUNT), so that the testing is more
>>>> extensive over random inputs.
>>>
>>> Each count is in the order of microseconds, but with this kind of
>>> algorithm I don't see how just iterating over a larger buffer will
>>> increase the chance of finding any issues.
>>
>> The random stream will be of longer length, providing more bytes of
>> data over which aes runs (and thereby covering more bit patterns).
>> This was my motivation.
>
> That certainly makes sense in some cases but it doesn't really apply
> here IMO since there's no specific bit pattern in the input buffer
> that could trigger a different behavior such as overflows etc. (unless
> you're trying to find flaws in the AES-NI instructions themselves, but
> that seems pretty far fetched).

Thanks for the explanation - I forgot this was using the CPU crypto,
and not an algorithm (in which case my point has slightly more
validity).

> _______________________________________________
> ffmpeg-devel mailing list
> ffmpeg-devel@ffmpeg.org
> http://ffmpeg.org/mailman/listinfo/ffmpeg-devel
_______________________________________________
ffmpeg-devel mailing list
ffmpeg-devel@ffmpeg.org
http://ffmpeg.org/mailman/listinfo/ffmpeg-devel

Reply via email to