blob: 2f2b92b18ea581aa92ee9080d6124ad274bd3404 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
|
#ifndef _HAPROXY_QUIC_OPENSSL_COMPAT_T_H_
#define _HAPROXY_QUIC_OPENSSL_COMPAT_T_H_
#ifdef USE_QUIC_OPENSSL_COMPAT
#ifndef USE_OPENSSL
#error "Must define USE_OPENSSL"
#endif
#define QUIC_OPENSSL_COMPAT_TLS_SECRET_LEN 48
#define QUIC_OPENSSL_COMPAT_TLS_IV_LEN 12
/* Highly inspired from nginx QUIC TLS compatibility code */
enum ssl_encryption_level_t {
ssl_encryption_initial = 0,
ssl_encryption_early_data,
ssl_encryption_handshake,
ssl_encryption_application
};
typedef struct ssl_quic_method_st {
int (*set_encryption_secrets)(SSL *ssl, enum ssl_encryption_level_t level,
const uint8_t *rsecret, const uint8_t *wsecret,
size_t secret_len);
int (*add_handshake_data)(SSL *ssl, enum ssl_encryption_level_t level,
const uint8_t *data, size_t len);
int (*flush_flight)(SSL *ssl);
int (*send_alert)(SSL *ssl, enum ssl_encryption_level_t level,
uint8_t alert);
} SSL_QUIC_METHOD;
struct quic_tls_md {
unsigned char data[QUIC_OPENSSL_COMPAT_TLS_SECRET_LEN];
size_t len;
};
struct quic_tls_iv {
unsigned char data[QUIC_OPENSSL_COMPAT_TLS_IV_LEN];
size_t len;
};
struct quic_tls_secret {
struct quic_tls_md secret;
struct quic_tls_md key;
struct quic_tls_iv iv;
};
struct quic_tls_compat_keys {
struct quic_tls_secret secret;
const EVP_CIPHER *cipher;
};
struct quic_openssl_compat {
BIO *rbio;
BIO *wbio;
const SSL_QUIC_METHOD *method;
enum ssl_encryption_level_t write_level;
enum ssl_encryption_level_t read_level;
uint64_t read_record;
struct quic_tls_compat_keys keys;
};
#endif /* USE_QUIC_OPENSSL_COMPAT */
#endif /* _HAPROXY_QUIC_OPENSSL_COMPAT_T_H_ */
|