Rename the CipherBox as Coffio

This commit is contained in:
Rodolphe Bréard 2024-04-07 11:48:33 +02:00
parent 71647c31c5
commit 5dec70af92
3 changed files with 14 additions and 14 deletions

View file

@ -5,11 +5,11 @@ use crate::kdf::derive_key;
use crate::{storage, IkmId, InputKeyMaterialList};
use std::time::{SystemTime, UNIX_EPOCH};
pub struct CipherBox<'a> {
pub struct Coffio<'a> {
ikm_list: &'a InputKeyMaterialList,
}
impl<'a> CipherBox<'a> {
impl<'a> Coffio<'a> {
pub fn new(ikm_list: &'a InputKeyMaterialList) -> Self {
Self { ikm_list }
}
@ -113,7 +113,7 @@ mod tests {
let lst = get_ikm_lst_chacha20poly1305_blake3();
let key_ctx = get_static_empty_key_ctx();
let data_ctx = DataContext::from([]);
let cb = CipherBox::new(&lst);
let cb = Coffio::new(&lst);
// Encrypt
let res = cb.encrypt(&key_ctx, &data_ctx, TEST_DATA);
@ -134,7 +134,7 @@ mod tests {
let lst = get_ikm_lst_aes128gcm_sha256();
let key_ctx = get_static_empty_key_ctx();
let data_ctx = DataContext::from([]);
let cb = CipherBox::new(&lst);
let cb = Coffio::new(&lst);
// Encrypt
let res = cb.encrypt(&key_ctx, &data_ctx, TEST_DATA);
@ -155,7 +155,7 @@ mod tests {
let lst = get_ikm_lst_chacha20poly1305_blake3();
let key_ctx = get_static_key_ctx();
let data_ctx = DataContext::from(TEST_DATA_CTX);
let cb = CipherBox::new(&lst);
let cb = Coffio::new(&lst);
// Encrypt
let res = cb.encrypt(&key_ctx, &data_ctx, TEST_DATA);
@ -176,7 +176,7 @@ mod tests {
let lst = get_ikm_lst_aes128gcm_sha256();
let key_ctx = get_static_key_ctx();
let data_ctx = DataContext::from(TEST_DATA_CTX);
let cb = CipherBox::new(&lst);
let cb = Coffio::new(&lst);
// Encrypt
let res = cb.encrypt(&key_ctx, &data_ctx, TEST_DATA);
@ -197,7 +197,7 @@ mod tests {
let lst = get_ikm_lst_chacha20poly1305_blake3();
let key_ctx = KeyContext::from(TEST_KEY_CTX);
let data_ctx = DataContext::from(TEST_DATA_CTX);
let cb = CipherBox::new(&lst);
let cb = Coffio::new(&lst);
// Encrypt
let res = cb.encrypt(&key_ctx, &data_ctx, TEST_DATA);
@ -218,7 +218,7 @@ mod tests {
let lst = get_ikm_lst_aes128gcm_sha256();
let key_ctx = KeyContext::from(TEST_KEY_CTX);
let data_ctx = DataContext::from(TEST_DATA_CTX);
let cb = CipherBox::new(&lst);
let cb = Coffio::new(&lst);
// Encrypt
let res = cb.encrypt(&key_ctx, &data_ctx, TEST_DATA);
@ -249,7 +249,7 @@ mod tests {
let lst = get_ikm_lst_chacha20poly1305_blake3();
let key_ctx = KeyContext::from(TEST_KEY_CTX);
let data_ctx = DataContext::from(TEST_DATA_CTX);
let cb = CipherBox::new(&lst);
let cb = Coffio::new(&lst);
// Test if the reference ciphertext used for the tests is actually valid
let res = cb.decrypt(&key_ctx, &data_ctx, TEST_CIPHERTEXT);
@ -267,7 +267,7 @@ mod tests {
let lst = get_ikm_lst_chacha20poly1305_blake3();
let key_ctx = KeyContext::from(TEST_KEY_CTX);
let data_ctx = DataContext::from(TEST_DATA_CTX);
let cb = CipherBox::new(&lst);
let cb = Coffio::new(&lst);
let res = cb.decrypt(&key_ctx, &data_ctx, TEST_CIPHERTEXT);
assert!(res.is_ok(), "invalid reference ciphertext");

View file

@ -1,7 +1,7 @@
#[cfg(feature = "encryption")]
mod canonicalization;
#[cfg(feature = "encryption")]
mod cipher_box;
mod coffio;
#[cfg(feature = "encryption")]
mod context;
#[cfg(feature = "encryption")]
@ -18,7 +18,7 @@ mod scheme;
mod storage;
#[cfg(feature = "encryption")]
pub use cipher_box::CipherBox;
pub use coffio::Coffio;
#[cfg(feature = "encryption")]
pub use context::{DataContext, KeyContext};
#[cfg(any(feature = "encryption", feature = "ikm-management"))]

View file

@ -36,10 +36,10 @@ pub(crate) type SchemeSerializeType = u32;
/// In the following scheme description, the following terms are used:
/// - `Max data size` describes the maximal size of data that can safely be encrypted using a
/// single key and nonce, which means you should never pass a `data` parameter to
/// [encrypt][crate::CipherBox::encrypt] that has a higher size. Coffio will not enforce this
/// [encrypt][crate::Coffio::encrypt] that has a higher size. Coffio will not enforce this
/// limit, it is your responsibility to do so.
/// - `Max invocations` describes the maximal number of times you can safely call
/// [encrypt][crate::CipherBox::encrypt] with a single key, which means you should either rotate
/// [encrypt][crate::Coffio::encrypt] with a single key, which means you should either rotate
/// your IKM or use an appropriate key periodicity before reaching this number. Coffio will neither
/// enforce this limit nor count the number of invocations, it is your responsibility to do so.
#[derive(Copy, Clone, Debug, PartialEq)]