Maxim,

> I suppose the AES algorithm work with blocks by 16 bytes for encryption
data + 2  bytes for padding in AES_WITH_PADDING mode

Why do you make this conclusion?

Actually, in AES_WITH_PADDING mode we should add 2 more *BLOCK*: for IV and
for padding info.
You can find sanity check in KeystoreEncryptionSpiSelfTest.
Please, take a look into KeystoreEncryptionSpiSelfTest#testEncryptDecrypt
which check the case you described.

чт, 31 янв. 2019 г. в 17:08, Максим Степачёв <maksim.stepac...@gmail.com>:
>
> Nikolay,
> I see. We should close IGNITE-11129 as invalid. I'm going to ask the
> reporter, what he means.
>
> > Please, explain, why do you think so?
> I answered to Dmitriy Pavlov with explaining.
>
> In short, your method encryptedSize(int dataSize) returns the *"*wrong
> result*"* when I call it with dataSize = 20.
> I suppose the AES algorithm work with blocks by 16 bytes for
> encryption data + 2  bytes for padding in AES_WITH_PADDING mode.
> The current implementation works for dataSize = 20: ( (20 / 16) + 2 ) *
> 16.  " 20 / 16 = 1." , Are we lost one block for 4 bytes? Or is it fine?
>
>
>
>
>
>
> чт, 31 янв. 2019 г. в 16:15, Nikolay Izhikov <nizhi...@apache.org>:
>
> > Hello, Maxim.
> >
> > > IGNITE-11129
> >
> > Do we have reproducer for this ticket?
> > WalRecord will be encrypted only if record class
> > implements WalRecordCacheGroupAwarei.e it contains some cache data that
> > should be protected with encryption.
> > Please, look into private boolean needEncryption(WALRecord rec).
> > SwitchSegmentRecord does not implement WalRecordCacheGroupAware, so not
> > encryption would be applied for this types of records.
> >
> > I think we should close IGNITE-11129 as invalid.
> >
> > > Should we use this code:
> >
> > Please, explain, why do you think so?
> > Do you find some bug?
> > Can you send a reproducer?
> >
> > You can find details of encrypted data size calculation in AES algorithm
> > description.
> >
> > чт, 31 янв. 2019 г. в 15:24, Максим Степачёв <maksim.stepac...@gmail.com
>:
> >
> > > Dmitriy Pavlov,
> > >
> > > Your statement about page size is true. But our case about plainSize
of
> > > serialized record in bytes. This method calculates it:
> > plainSize(WALRecord
> > > record). For example, if you look in this method, you will see
> > > DATA_PAGE_UPDATE_RECORD section. A size of record calculates a sum
of: 4
> > +
> > > 8 + 2 + 4 +  uRec.payload().length where a length is an arbitrary
number.
> > >
> > > чт, 31 янв. 2019 г. в 14:54, Dmitriy Pavlov <dpav...@apache.org>:
> > >
> > >> Hi Maxim, why do you think that data size can be divided to cipher
block
> > >> size with 0 remainder.
> > >>
> > >> I used to think that page size 4096 is always divisible by a usual
block
> > >> cipher block size, e.g 32, 16 or 8 bytes
> > >>
> > >> чт, 31 янв. 2019 г. в 13:11, Максим Степачёв <
> > maksim.stepac...@gmail.com
> > >> >:
> > >>
> > >> > Hi, I have been trying to solve a problem with calculation size for
> > >> > encryption mode, it's ticket IGNITE-11129. But I found an
additional
> > >> place
> > >> > for wrong behavior. I'm confused, Is it fine or wrong? Look at
> > >> > *KeystoreEncryptionSpi#encryptedSize*, the result calculation
works as
> > >> >
> > >> > (dataSize / BLOCK_SZ + cntBlocks) * BLOCK_SZ;
> > >> >
> > >> > But we don't have a guarantee that dataSize is multiple of
BLOCK_SZ.
> > >> > Should we use this code:
> > >> >
> > >> > ((dataSize + BLOCK_SZ - 1) / BLOCK_SZ + cntBlocks) * BLOCK_SZ;
> > >> >
> > >> > If yes, I'll fix it.
> > >> >
> > >>
> > >
> >

Reply via email to