aboutsummaryrefslogtreecommitdiff
path: root/src/tests
diff options
context:
space:
mode:
authorMichael Brown <mcb30@ipxe.org>2022-10-28 16:27:10 +0100
committerMichael Brown <mcb30@ipxe.org>2022-11-07 11:19:48 +0000
commit30243ad73957a2e1cc4aedc3f23be66cdf399f00 (patch)
treec0b476b76fed7f2a9c5a3b9ec1ea03f01017a693 /src/tests
parentd1bc872a2e3b682169da4dd708dfe143d539eaaf (diff)
downloadipxe-30243ad73957a2e1cc4aedc3f23be66cdf399f00.zip
ipxe-30243ad73957a2e1cc4aedc3f23be66cdf399f00.tar.gz
ipxe-30243ad73957a2e1cc4aedc3f23be66cdf399f00.tar.bz2
[crypto] Add concept of cipher alignment size
The GCM cipher mode of operation (in common with other counter-based modes of operation) has a notion of blocksize that does not neatly fall into our current abstraction: it does operate in 16-byte blocks but allows for an arbitrary overall data length (i.e. the final block may be incomplete). Model this by adding a concept of alignment size. Each call to encrypt() or decrypt() must begin at a multiple of the alignment size from the start of the data stream. This allows us to model GCM by using a block size of 1 byte and an alignment size of 16 bytes. As a side benefit, this same concept allows us to neatly model the fact that raw AES can encrypt only a single 16-byte block, by specifying an alignment size of zero on this cipher. Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/tests')
-rw-r--r--src/tests/cipher_test.c10
1 files changed, 10 insertions, 0 deletions
diff --git a/src/tests/cipher_test.c b/src/tests/cipher_test.c
index cc732c2..2ead3c8 100644
--- a/src/tests/cipher_test.c
+++ b/src/tests/cipher_test.c
@@ -131,8 +131,18 @@ void cipher_decrypt_okx ( struct cipher_test *test, const char *file,
*/
void cipher_okx ( struct cipher_test *test, const char *file,
unsigned int line ) {
+ struct cipher_algorithm *cipher = test->cipher;
+ size_t len = test->len;
+ /* Sanity checks */
+ okx ( cipher->blocksize != 0, file, line );
+ okx ( ( len % cipher->blocksize ) == 0, file, line );
+ okx ( ( cipher->alignsize % cipher->blocksize ) == 0, file, line );
+
+ /* Report encryption test result */
cipher_encrypt_okx ( test, file, line );
+
+ /* Report decryption test result */
cipher_decrypt_okx ( test, file, line );
}