-
Notifications
You must be signed in to change notification settings - Fork 169
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
QUIC Crypto Primitives Support #168
Comments
Thanks for this, this is a reasonable ask. For the 4-byte
|
Hey @btoms20, Thanks for this proposal. As @Lukasa said, we swift-crypto already provides the AES permutation function, from which you can do one-block ECB since you only need a single block for header protection. Regarding the proposal to expose counters, the challenge is that The However, as it currently stands, we are not supporting stream ciphers without authentication. And therefore, it would be a bit of a stretch to have a way to set the counter on top of our existing But we can keep this request to revisit this if we have any developments on unauthenticated stream ciphers. |
@Lukasa, thanks for pointing that out! @FredericJacobs, sounds good and understood. Hopefully it can make its way into the Insecure API in the future. Thanks for the quick responses! |
I had completely overlooked _CryptoExtras. Maybe if / when the Insecure ChaCha20 Counter extension gets implemented, it could be tucked away in _CryptoExtras with a not-so-public API and all of the appropriate / necessary warnings. That might help deter your average user from unknowingly misusing it. |
It may be worth double-checking whether BoringSSL supports setting this flag. I did a quick scan earlier today and couldn't see an interface for it, but I might have missed something. If they don't, we'd want to make sure that they added that support. If they do, then you're welcome to open a PR to |
New API Proposal: QUIC Crypto Primitives Support
Request:
Insecure
umbrella structCounter
alongside theNonce
/IV
when initializing aChaCha20
Cipher
.Importance:
Adds the missing cryptographic functions required to support the QUIC protocol as defined in RFC 9001
The text was updated successfully, but these errors were encountered: