-
Notifications
You must be signed in to change notification settings - Fork 5.8k
8305091: Change ChaCha20 cipher init behavior to match AES-GCM #13428
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
/csr needed |
/issue 8305091 |
👋 Welcome back jnimeh! A progress list of the required criteria for merging this PR into |
@jnimeh This issue is referenced in the PR title - it will now be updated. |
@jnimeh This pull request has been inactive for more than 4 weeks and will be automatically closed if another 4 weeks passes without any activity. To avoid this, simply add a new comment to the pull request. Feel free to ask for assistance if you need help with progressing this pull request towards integration! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for that. This is actually required for decrypting QUIC packets; the QUIC specification permits dropping duplicate packets only after fully decrypting them.
LGTM.
May I have a reference, for example the section number, of the specification? |
Here you go:
https://www.rfc-editor.org/rfc/rfc9001#section-9.5
Additionally check out the header protection section https://www.rfc-editor.org/rfc/rfc9001#name-chacha20-based-header-prote:
|
@djelinski Thank you! |
@jnimeh This change now passes all automated pre-integration checks. ℹ️ This project also has non-automated pre-integration requirements. Please see the file CONTRIBUTING.md for details. After integration, the commit message for the final commit will be:
You can use pull request commands such as /summary, /contributor and /issue to adjust it as needed. At the time when this comment was updated there had been 840 new commits pushed to the
As there are no conflicts, your changes will automatically be rebased on top of these commits when integrating. If you prefer to avoid this automatic rebasing, please check the documentation for the /integrate command for further details. ➡️ To integrate this PR with the above commit message to the |
/integrate |
Going to push as commit bb0ff48.
Your commit was automatically rebased without conflicts. |
This fixes an issue where the key/nonce reuse policy for SunJCE ChaCha20 and ChaCha20-Poly1305 was overly strict in enforcing no-reuse when the Cipher was in DECRYPT_MODE. For decryption, this should be allowed and be consistent with the AES-GCM decryption initialization behavior.
Progress
Issues
Reviewers
Reviewing
Using
git
Checkout this PR locally:
$ git fetch https://git.openjdk.org/jdk.git pull/13428/head:pull/13428
$ git checkout pull/13428
Update a local copy of the PR:
$ git checkout pull/13428
$ git pull https://git.openjdk.org/jdk.git pull/13428/head
Using Skara CLI tools
Checkout this PR locally:
$ git pr checkout 13428
View PR using the GUI difftool:
$ git pr show -t 13428
Using diff file
Download this PR as a diff file:
https://git.openjdk.org/jdk/pull/13428.diff
Webrev
Link to Webrev Comment