| Index: net/quic/crypto/aead_base_decrypter_nss.cc
|
| diff --git a/net/quic/crypto/aead_base_decrypter_nss.cc b/net/quic/crypto/aead_base_decrypter_nss.cc
|
| index 2401222d3dccce8c9fb7b2b3c090d804d0076877..1ed4f3ab6e2b77739a813106076b77f9292d58dd 100644
|
| --- a/net/quic/crypto/aead_base_decrypter_nss.cc
|
| +++ b/net/quic/crypto/aead_base_decrypter_nss.cc
|
| @@ -48,10 +48,11 @@ bool AeadBaseDecrypter::SetNoncePrefix(StringPiece nonce_prefix) {
|
| }
|
|
|
| bool AeadBaseDecrypter::Decrypt(StringPiece nonce,
|
| - StringPiece associated_data,
|
| - StringPiece ciphertext,
|
| + const StringPiece& associated_data,
|
| + const StringPiece& ciphertext,
|
| uint8* output,
|
| - size_t* output_length) {
|
| + size_t* output_length,
|
| + size_t max_output_length) {
|
| if (ciphertext.length() < auth_tag_size_ ||
|
| nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) {
|
| return false;
|
| @@ -100,8 +101,8 @@ bool AeadBaseDecrypter::Decrypt(StringPiece nonce,
|
| param.len = aead_params.len;
|
|
|
| unsigned int output_len;
|
| - if (pk11_decrypt_(aead_key.get(), aead_mechanism_, ¶m,
|
| - output, &output_len, ciphertext.length(),
|
| + if (pk11_decrypt_(aead_key.get(), aead_mechanism_, ¶m, output,
|
| + &output_len, max_output_length,
|
| reinterpret_cast<const unsigned char*>(ciphertext.data()),
|
| ciphertext.length()) != SECSuccess) {
|
| return false;
|
| @@ -115,28 +116,24 @@ bool AeadBaseDecrypter::Decrypt(StringPiece nonce,
|
| return true;
|
| }
|
|
|
| -QuicData* AeadBaseDecrypter::DecryptPacket(
|
| - QuicPacketSequenceNumber sequence_number,
|
| - StringPiece associated_data,
|
| - StringPiece ciphertext) {
|
| +bool AeadBaseDecrypter::DecryptPacket(QuicPacketSequenceNumber sequence_number,
|
| + const StringPiece& associated_data,
|
| + const StringPiece& ciphertext,
|
| + char* output,
|
| + size_t* output_length,
|
| + size_t max_output_length) {
|
| if (ciphertext.length() < auth_tag_size_) {
|
| - return nullptr;
|
| + return false;
|
| }
|
| - size_t plaintext_size;
|
| - scoped_ptr<char[]> plaintext(new char[ciphertext.length()]);
|
|
|
| uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)];
|
| const size_t nonce_size = nonce_prefix_size_ + sizeof(sequence_number);
|
| DCHECK_LE(nonce_size, sizeof(nonce));
|
| memcpy(nonce, nonce_prefix_, nonce_prefix_size_);
|
| memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number));
|
| - if (!Decrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
| - associated_data, ciphertext,
|
| - reinterpret_cast<uint8*>(plaintext.get()),
|
| - &plaintext_size)) {
|
| - return nullptr;
|
| - }
|
| - return new QuicData(plaintext.release(), plaintext_size, true);
|
| + return Decrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
| + associated_data, ciphertext, reinterpret_cast<uint8*>(output),
|
| + output_length, max_output_length);
|
| }
|
|
|
| StringPiece AeadBaseDecrypter::GetKey() const {
|
|
|