boringssl/crypto/modes
David Benjamin 14e18ca257 Fix AES-GCM-SIV on large inputs.
This was noticed by observing we had one line of missing test coverage
in polyval.c. CRYPTO_POLYVAL_update_blocks acts 32 blocks at a time and
all existing test vectors are smaller than that.

Test vector obtained by just picking random values and seeing what our
existing implementation did if I modified CRYPTO_POLYVAL_update_blocks
to consume many more blocks at a time. Then I fixed the bug and ensured
the answer was still the same.

Change-Id: Ib7002dbc10952229ff42a17132c30d0e290d4be5
Reviewed-on: https://boringssl-review.googlesource.com/13041
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Adam Langley <agl@google.com>
2017-01-04 01:45:31 +00:00
..
asm
cbc.c Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00
cfb.c Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00
CMakeLists.txt Add generic AES-GCM-SIV support. 2016-12-07 00:13:50 +00:00
ctr.c Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00
gcm_test.cc Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00
gcm.c Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00
internal.h Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00
ofb.c Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00
polyval.c Fix AES-GCM-SIV on large inputs. 2017-01-04 01:45:31 +00:00