Enforce incrementing counter for TLS 1.2 AES-GCM.
Change-Id: I7e790bc176369f2a57cc486c3dc960971faf019d
Reviewed-on: https://boringssl-review.googlesource.com/16625
Reviewed-by: Adam Langley <agl@google.com>
Commit-Queue: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/tls13_enc.c b/ssl/tls13_enc.c
index 3a7009c..2137fe2 100644
--- a/ssl/tls13_enc.c
+++ b/ssl/tls13_enc.c
@@ -137,7 +137,7 @@
const EVP_AEAD *aead;
size_t discard;
if (!ssl_cipher_get_evp_aead(&aead, &discard, &discard, session->cipher,
- version)) {
+ version, SSL_is_dtls(ssl))) {
return 0;
}
@@ -160,8 +160,9 @@
return 0;
}
- SSL_AEAD_CTX *traffic_aead = SSL_AEAD_CTX_new(
- direction, version, session->cipher, key, key_len, NULL, 0, iv, iv_len);
+ SSL_AEAD_CTX *traffic_aead =
+ SSL_AEAD_CTX_new(direction, version, SSL_is_dtls(ssl), session->cipher,
+ key, key_len, NULL, 0, iv, iv_len);
if (traffic_aead == NULL) {
return 0;
}