| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/crypto/crypto_utils.h" | 5 #include "net/quic/crypto/crypto_utils.h" |
| 6 | 6 |
| 7 #include "crypto/hkdf.h" | 7 #include "crypto/hkdf.h" |
| 8 #include "net/base/net_util.h" | 8 #include "net/base/net_util.h" |
| 9 #include "net/quic/crypto/crypto_handshake.h" | 9 #include "net/quic/crypto/crypto_handshake.h" |
| 10 #include "net/quic/crypto/crypto_protocol.h" | 10 #include "net/quic/crypto/crypto_protocol.h" |
| (...skipping 73 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 84 StringPiece server_nonce, | 84 StringPiece server_nonce, |
| 85 const string& hkdf_input, | 85 const string& hkdf_input, |
| 86 Perspective perspective, | 86 Perspective perspective, |
| 87 CrypterPair* crypters, | 87 CrypterPair* crypters, |
| 88 string* subkey_secret) { | 88 string* subkey_secret) { |
| 89 crypters->encrypter.reset(QuicEncrypter::Create(aead)); | 89 crypters->encrypter.reset(QuicEncrypter::Create(aead)); |
| 90 crypters->decrypter.reset(QuicDecrypter::Create(aead)); | 90 crypters->decrypter.reset(QuicDecrypter::Create(aead)); |
| 91 size_t key_bytes = crypters->encrypter->GetKeySize(); | 91 size_t key_bytes = crypters->encrypter->GetKeySize(); |
| 92 size_t nonce_prefix_bytes = crypters->encrypter->GetNoncePrefixSize(); | 92 size_t nonce_prefix_bytes = crypters->encrypter->GetNoncePrefixSize(); |
| 93 size_t subkey_secret_bytes = | 93 size_t subkey_secret_bytes = |
| 94 subkey_secret == NULL ? 0 : premaster_secret.length(); | 94 subkey_secret == nullptr ? 0 : premaster_secret.length(); |
| 95 | 95 |
| 96 StringPiece nonce = client_nonce; | 96 StringPiece nonce = client_nonce; |
| 97 string nonce_storage; | 97 string nonce_storage; |
| 98 if (!server_nonce.empty()) { | 98 if (!server_nonce.empty()) { |
| 99 nonce_storage = client_nonce.as_string() + server_nonce.as_string(); | 99 nonce_storage = client_nonce.as_string() + server_nonce.as_string(); |
| 100 nonce = nonce_storage; | 100 nonce = nonce_storage; |
| 101 } | 101 } |
| 102 | 102 |
| 103 crypto::HKDF hkdf(premaster_secret, nonce, hkdf_input, key_bytes, | 103 crypto::HKDF hkdf(premaster_secret, nonce, hkdf_input, key_bytes, |
| 104 nonce_prefix_bytes, subkey_secret_bytes); | 104 nonce_prefix_bytes, subkey_secret_bytes); |
| 105 if (perspective == SERVER) { | 105 if (perspective == SERVER) { |
| 106 if (!crypters->encrypter->SetKey(hkdf.server_write_key()) || | 106 if (!crypters->encrypter->SetKey(hkdf.server_write_key()) || |
| 107 !crypters->encrypter->SetNoncePrefix(hkdf.server_write_iv()) || | 107 !crypters->encrypter->SetNoncePrefix(hkdf.server_write_iv()) || |
| 108 !crypters->decrypter->SetKey(hkdf.client_write_key()) || | 108 !crypters->decrypter->SetKey(hkdf.client_write_key()) || |
| 109 !crypters->decrypter->SetNoncePrefix(hkdf.client_write_iv())) { | 109 !crypters->decrypter->SetNoncePrefix(hkdf.client_write_iv())) { |
| 110 return false; | 110 return false; |
| 111 } | 111 } |
| 112 } else { | 112 } else { |
| 113 if (!crypters->encrypter->SetKey(hkdf.client_write_key()) || | 113 if (!crypters->encrypter->SetKey(hkdf.client_write_key()) || |
| 114 !crypters->encrypter->SetNoncePrefix(hkdf.client_write_iv()) || | 114 !crypters->encrypter->SetNoncePrefix(hkdf.client_write_iv()) || |
| 115 !crypters->decrypter->SetKey(hkdf.server_write_key()) || | 115 !crypters->decrypter->SetKey(hkdf.server_write_key()) || |
| 116 !crypters->decrypter->SetNoncePrefix(hkdf.server_write_iv())) { | 116 !crypters->decrypter->SetNoncePrefix(hkdf.server_write_iv())) { |
| 117 return false; | 117 return false; |
| 118 } | 118 } |
| 119 } | 119 } |
| 120 if (subkey_secret != NULL) { | 120 if (subkey_secret != nullptr) { |
| 121 hkdf.subkey_secret().CopyToString(subkey_secret); | 121 hkdf.subkey_secret().CopyToString(subkey_secret); |
| 122 } | 122 } |
| 123 | 123 |
| 124 return true; | 124 return true; |
| 125 } | 125 } |
| 126 | 126 |
| 127 // static | 127 // static |
| 128 bool CryptoUtils::ExportKeyingMaterial(StringPiece subkey_secret, | 128 bool CryptoUtils::ExportKeyingMaterial(StringPiece subkey_secret, |
| 129 StringPiece label, | 129 StringPiece label, |
| 130 StringPiece context, | 130 StringPiece context, |
| (...skipping 20 matching lines...) Expand all Loading... |
| 151 StringPiece() /* no salt */, | 151 StringPiece() /* no salt */, |
| 152 info, | 152 info, |
| 153 result_len, | 153 result_len, |
| 154 0 /* no fixed IV */, | 154 0 /* no fixed IV */, |
| 155 0 /* no subkey secret */); | 155 0 /* no subkey secret */); |
| 156 hkdf.client_write_key().CopyToString(result); | 156 hkdf.client_write_key().CopyToString(result); |
| 157 return true; | 157 return true; |
| 158 } | 158 } |
| 159 | 159 |
| 160 } // namespace net | 160 } // namespace net |
| OLD | NEW |