OLD | NEW |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/crypto/aead_base_encrypter.h" | 5 #include "net/quic/crypto/aead_base_encrypter.h" |
6 | 6 |
7 #include <openssl/err.h> | 7 #include <openssl/err.h> |
8 #include <openssl/evp.h> | 8 #include <openssl/evp.h> |
9 #include <string.h> | 9 #include <string.h> |
10 | 10 |
(...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
113 size_t max_output_length) { | 113 size_t max_output_length) { |
114 size_t ciphertext_size = GetCiphertextSize(plaintext.length()); | 114 size_t ciphertext_size = GetCiphertextSize(plaintext.length()); |
115 if (max_output_length < ciphertext_size) { | 115 if (max_output_length < ciphertext_size) { |
116 return false; | 116 return false; |
117 } | 117 } |
118 // TODO(ianswett): Introduce a check to ensure that we don't encrypt with the | 118 // TODO(ianswett): Introduce a check to ensure that we don't encrypt with the |
119 // same packet number twice. | 119 // same packet number twice. |
120 const size_t nonce_size = nonce_prefix_size_ + sizeof(packet_number); | 120 const size_t nonce_size = nonce_prefix_size_ + sizeof(packet_number); |
121 ALIGNAS(4) char nonce_buffer[kMaxNonceSize]; | 121 ALIGNAS(4) char nonce_buffer[kMaxNonceSize]; |
122 memcpy(nonce_buffer, nonce_prefix_, nonce_prefix_size_); | 122 memcpy(nonce_buffer, nonce_prefix_, nonce_prefix_size_); |
123 if (FLAGS_quic_include_path_id_in_iv) { | 123 uint64_t path_id_packet_number = |
124 uint64_t path_id_packet_number = | 124 QuicUtils::PackPathIdAndPacketNumber(path_id, packet_number); |
125 QuicUtils::PackPathIdAndPacketNumber(path_id, packet_number); | 125 memcpy(nonce_buffer + nonce_prefix_size_, &path_id_packet_number, |
126 memcpy(nonce_buffer + nonce_prefix_size_, &path_id_packet_number, | 126 sizeof(path_id_packet_number)); |
127 sizeof(path_id_packet_number)); | |
128 } else { | |
129 memcpy(nonce_buffer + nonce_prefix_size_, &packet_number, | |
130 sizeof(packet_number)); | |
131 } | |
132 | 127 |
133 if (!Encrypt(StringPiece(nonce_buffer, nonce_size), associated_data, | 128 if (!Encrypt(StringPiece(nonce_buffer, nonce_size), associated_data, |
134 plaintext, reinterpret_cast<unsigned char*>(output))) { | 129 plaintext, reinterpret_cast<unsigned char*>(output))) { |
135 return false; | 130 return false; |
136 } | 131 } |
137 *output_length = ciphertext_size; | 132 *output_length = ciphertext_size; |
138 return true; | 133 return true; |
139 } | 134 } |
140 | 135 |
141 size_t AeadBaseEncrypter::GetKeySize() const { | 136 size_t AeadBaseEncrypter::GetKeySize() const { |
(...skipping 18 matching lines...) Expand all Loading... |
160 | 155 |
161 StringPiece AeadBaseEncrypter::GetNoncePrefix() const { | 156 StringPiece AeadBaseEncrypter::GetNoncePrefix() const { |
162 if (nonce_prefix_size_ == 0) { | 157 if (nonce_prefix_size_ == 0) { |
163 return StringPiece(); | 158 return StringPiece(); |
164 } | 159 } |
165 return StringPiece(reinterpret_cast<const char*>(nonce_prefix_), | 160 return StringPiece(reinterpret_cast<const char*>(nonce_prefix_), |
166 nonce_prefix_size_); | 161 nonce_prefix_size_); |
167 } | 162 } |
168 | 163 |
169 } // namespace net | 164 } // namespace net |
OLD | NEW |