42d723f634
tls_cbc.c is concerned with the variation in where the padding+mac may end, counted in blocks. Hash blocks are larger than block cipher blocks, and the hash itself appends some padding. Thus maximal padding off a 64-hash.Size() bytes may not fully stress things. Just run all inputs modulo the hash block size, so we don't have to think very hard about the "most difficult" input. Change-Id: I8da1427dfff855931c14a9135c22afbff4f367c0 Reviewed-on: https://boringssl-review.googlesource.com/c/32724 Commit-Queue: Adam Langley <agl@google.com> Reviewed-by: Adam Langley <agl@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> |
||
---|---|---|
.. | ||
nist_cavp | ||
aes_128_cbc_sha1_tls_implicit_iv_tests.txt | ||
aes_128_cbc_sha1_tls_tests.txt | ||
aes_128_cbc_sha256_tls_tests.txt | ||
aes_128_ccm_bluetooth_8_tests.txt | ||
aes_128_ccm_bluetooth_tests.txt | ||
aes_128_ctr_hmac_sha256.txt | ||
aes_128_gcm_siv_tests.txt | ||
aes_128_gcm_tests.txt | ||
aes_256_cbc_sha1_tls_implicit_iv_tests.txt | ||
aes_256_cbc_sha1_tls_tests.txt | ||
aes_256_cbc_sha256_tls_tests.txt | ||
aes_256_cbc_sha384_tls_tests.txt | ||
aes_256_ctr_hmac_sha256.txt | ||
aes_256_gcm_siv_tests.txt | ||
aes_256_gcm_tests.txt | ||
chacha20_poly1305_tests.txt | ||
cipher_tests.txt | ||
des_ede3_cbc_sha1_tls_implicit_iv_tests.txt | ||
des_ede3_cbc_sha1_tls_tests.txt | ||
make_all_legacy_aead_tests.sh | ||
make_legacy_aead_tests.go | ||
xchacha20_poly1305_tests.txt |