Files
zig/lib
David Rubin 8efd539305 crypto: correct aes-siv s2v
The first issue is that when len(Sn) >= 128,
we perform Sn xor D instead of the Sn xorend D
that is specified in RFC 5297.

The second issue is that we truncate the Sn
if it is larger than 4096 bytes, which could
lead to collisions between inputs. We solve
this by absoring the Sn into the CMAC state
perform the last 16 bytes, xoring those 16
bytes with D as described in the first issue,
and then updating and squeezing the CMAC.
2026-03-22 07:21:41 -07:00
..
2026-03-17 23:33:10 +01:00
2026-03-12 17:44:03 -04:00
2026-03-08 18:41:21 -07:00
2026-03-17 23:33:10 +01:00
2026-03-22 07:21:41 -07:00
2026-03-11 21:14:46 -04:00