Page MenuHomeFreeBSD

armv8crypto: Fix some edge cases in the AES-GCM implementation
ClosedPublic

Authored by markj on Feb 5 2021, 2:25 PM.
Tags
None
Referenced Files
Unknown Object (File)
Oct 12 2024, 3:46 PM
Unknown Object (File)
Oct 5 2024, 11:03 AM
Unknown Object (File)
Oct 5 2024, 5:02 AM
Unknown Object (File)
Oct 2 2024, 5:10 PM
Unknown Object (File)
Oct 2 2024, 2:22 PM
Unknown Object (File)
Oct 2 2024, 1:21 AM
Unknown Object (File)
Sep 27 2024, 10:23 AM
Unknown Object (File)
Sep 25 2024, 6:10 PM
Subscribers

Details

Summary
  • We only hash up to the first 16 bytes of the AAD.
  • When computing the digest during decryption, handle the case where len == trailer properly.

While here:

  • trailer is always smaller than AES_BLOCK_LEN, so remove a pair of unnecessary modulus operations.
  • Replace some byte-by-byte loops with memcpy() and memset() calls. In particular, zero the full block before copying a partial block into it since we do that elsewhere and it means that the memset() length is known at compile time.
Test Plan

Noticed when doing some refactoring, verified with cryptocheck.

Specifically, I used cryptocheck -d soft -a aes-gcm -z.

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable