summaryrefslogtreecommitdiffstats
path: root/include/haproxy/quic_openssl_compat-t.h
blob: 2f2b92b18ea581aa92ee9080d6124ad274bd3404 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
#ifndef _HAPROXY_QUIC_OPENSSL_COMPAT_T_H_
#define _HAPROXY_QUIC_OPENSSL_COMPAT_T_H_

#ifdef USE_QUIC_OPENSSL_COMPAT
#ifndef USE_OPENSSL
#error "Must define USE_OPENSSL"
#endif

#define QUIC_OPENSSL_COMPAT_TLS_SECRET_LEN 48
#define QUIC_OPENSSL_COMPAT_TLS_IV_LEN     12

/* Highly inspired from nginx QUIC TLS compatibility code */

enum ssl_encryption_level_t {
	ssl_encryption_initial = 0,
	ssl_encryption_early_data,
	ssl_encryption_handshake,
	ssl_encryption_application
};

typedef struct ssl_quic_method_st {
	int (*set_encryption_secrets)(SSL *ssl, enum ssl_encryption_level_t level,
	                              const uint8_t *rsecret, const uint8_t *wsecret,
	                              size_t secret_len);
	int (*add_handshake_data)(SSL *ssl, enum ssl_encryption_level_t level,
	                          const uint8_t *data, size_t len);
	int (*flush_flight)(SSL *ssl);
	int (*send_alert)(SSL *ssl, enum ssl_encryption_level_t level,
	                  uint8_t alert);
} SSL_QUIC_METHOD;

struct quic_tls_md {
	unsigned char data[QUIC_OPENSSL_COMPAT_TLS_SECRET_LEN];
	size_t len;
};

struct quic_tls_iv {
	unsigned char data[QUIC_OPENSSL_COMPAT_TLS_IV_LEN];
	size_t len;
};

struct quic_tls_secret {
	struct quic_tls_md secret;
	struct quic_tls_md key;
	struct quic_tls_iv iv;
};

struct quic_tls_compat_keys {
	struct quic_tls_secret secret;
	const EVP_CIPHER *cipher;
};

struct quic_openssl_compat {
	BIO *rbio;
	BIO *wbio;
	const SSL_QUIC_METHOD *method;
	enum ssl_encryption_level_t write_level;
	enum ssl_encryption_level_t read_level;
	uint64_t read_record;
	struct quic_tls_compat_keys keys;
};

#endif /* USE_QUIC_OPENSSL_COMPAT */
#endif /* _HAPROXY_QUIC_OPENSSL_COMPAT_T_H_ */