• Adam Langley's avatar
    crypto/tls: only store a single nonce for AES-GCM. · 007c907b
    Adam Langley authored
    Although an AEAD, in general, can be used concurrently in both the seal
    and open directions, TLS is easier. Since the transport keys are
    different for different directions in TLS, an AEAD will only ever be
    used in one direction. Thus we don't need separate buffers for seal and
    open because they can never happen concurrently.
    
    Also, fix the nonce size to twelve bytes since the fixed-prefix
    construction for AEADs is superseded and will never be used for anything
    else now.
    
    Change-Id: Ibbf6c6b1da0e639f4ee0e3604410945dc7dcbb46
    Reviewed-on: https://go-review.googlesource.com/30959
    Run-TryBot: Adam Langley <agl@golang.org>
    Reviewed-by: 's avatarBrad Fitzpatrick <bradfitz@golang.org>
    007c907b
Name
Last commit
Last update
..
testdata Loading commit data...
alert.go Loading commit data...
cipher_suites.go Loading commit data...
common.go Loading commit data...
conn.go Loading commit data...
conn_test.go Loading commit data...
example_test.go Loading commit data...
generate_cert.go Loading commit data...
handshake_client.go Loading commit data...
handshake_client_test.go Loading commit data...
handshake_messages.go Loading commit data...
handshake_messages_test.go Loading commit data...
handshake_server.go Loading commit data...
handshake_server_test.go Loading commit data...
handshake_test.go Loading commit data...
key_agreement.go Loading commit data...
prf.go Loading commit data...
prf_test.go Loading commit data...
ticket.go Loading commit data...
tls.go Loading commit data...
tls_test.go Loading commit data...