diff --git a/src/aes.rs b/src/aes.rs index 2b057f68..4e8abff7 100644 --- a/src/aes.rs +++ b/src/aes.rs @@ -120,6 +120,15 @@ pub struct AesReaderValid { } impl Read for AesReaderValid { + /// This implementation does not fulfill all requirements set in the trait documentation. + /// + /// ```txt + /// "If an error is returned then it must be guaranteed that no bytes were read." + /// ``` + /// + /// Whether this applies to errors that occur while reading the encrypted data depends on the + /// underlying reader. If the error occurs while verifying the HMAC, the reader might become + /// practically unusable, since its position after the error is not known. fn read(&mut self, buf: &mut [u8]) -> io::Result { if self.data_remaining == 0 { return Ok(0); @@ -129,13 +138,13 @@ impl Read for AesReaderValid { // 2^32 bytes even on 32 bit systems. let bytes_to_read = self.data_remaining.min(buf.len() as u64) as usize; let read = self.reader.read(&mut buf[0..bytes_to_read])?; + self.data_remaining -= read as u64; // Update the hmac with the encrypted data self.hmac.update(&buf[0..read]); // decrypt the data self.cipher.crypt_in_place(&mut buf[0..read]); - self.data_remaining -= read as u64; // if there is no data left to read, check the integrity of the data if self.data_remaining == 0 { diff --git a/src/aes_ctr.rs b/src/aes_ctr.rs index f5d5f7cf..db8957ee 100644 --- a/src/aes_ctr.rs +++ b/src/aes_ctr.rs @@ -104,7 +104,7 @@ where C: AesKind, C::Cipher: BlockCipher, { - /// Decrypt or encrypt given data. + /// Decrypt or encrypt `target`. #[inline] fn crypt_in_place(&mut self, mut target: &mut [u8]) { while !target.is_empty() {