blob: fd21c7342bf18a270e8cc7d5140396c8ba8ee9a3 [file] [log] [blame]
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "quic/core/crypto/aes_base_decrypter.h"
#include "absl/strings/string_view.h"
#include "third_party/boringssl/src/include/openssl/aes.h"
#include "quic/platform/api/quic_bug_tracker.h"
namespace quic {
bool AesBaseDecrypter::SetHeaderProtectionKey(absl::string_view key) {
if (key.size() != GetKeySize()) {
QUIC_BUG(quic_bug_10649_1) << "Invalid key size for header protection";
return false;
if (AES_set_encrypt_key(reinterpret_cast<const uint8_t*>(,
key.size() * 8, &pne_key_) != 0) {
QUIC_BUG(quic_bug_10649_2) << "Unexpected failure of AES_set_encrypt_key";
return false;
return true;
std::string AesBaseDecrypter::GenerateHeaderProtectionMask(
QuicDataReader* sample_reader) {
absl::string_view sample;
if (!sample_reader->ReadStringPiece(&sample, AES_BLOCK_SIZE)) {
return std::string();
std::string out(AES_BLOCK_SIZE, 0);
AES_encrypt(reinterpret_cast<const uint8_t*>(,
return out;
QuicPacketCount AesBaseDecrypter::GetIntegrityLimit() const {
// For AEAD_AES_128_GCM ... endpoints that do not attempt to remove
// protection from packets larger than 2^11 bytes can attempt to remove
// protection from at most 2^57 packets.
// For AEAD_AES_256_GCM [the limit] is substantially larger than the limit for
// AEAD_AES_128_GCM. However, this document recommends that the same limit be
// applied to both functions as either limit is acceptably large.
static_assert(kMaxIncomingPacketSize <= 2048,
"This key limit requires limits on decryption payload sizes");
return 144115188075855872U;
} // namespace quic