summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_internal.h
diff options
context:
space:
mode:
authorjsing <>2022-07-24 14:16:29 +0000
committerjsing <>2022-07-24 14:16:29 +0000
commitd82a186f8c966e9a7dddbe974f3492a8d6fc42c8 (patch)
tree513bd66d8a8e45ea9b3a80cfdde2155254f69204 /src/lib/libssl/tls13_internal.h
parentd7c47c20d5f183b9417a79c956e0563e69e243cc (diff)
downloadopenbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.tar.gz
openbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.tar.bz2
openbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.zip
Provide QUIC encryption levels.
QUIC wants to know what "encryption level" handshake messages should be sent at. Provide an ssl_encryption_level_t enum (via BoringSSL) that defines these (of course quictls decided to make this an OSSL_ENCRYPTION_LEVEL typedef, so provide that as well). Wire these through to tls13_record_layer_set_{read,write}_traffic_key() so that they can be used in upcoming commits. ok tb@
Diffstat (limited to '')
-rw-r--r--src/lib/libssl/tls13_internal.h6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/tls13_internal.h b/src/lib/libssl/tls13_internal.h
index 599eb200cb..6382f8b048 100644
--- a/src/lib/libssl/tls13_internal.h
+++ b/src/lib/libssl/tls13_internal.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_internal.h,v 1.99 2022/07/20 06:32:24 jsing Exp $ */ 1/* $OpenBSD: tls13_internal.h,v 1.100 2022/07/24 14:16:29 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2018 Bob Beck <beck@openbsd.org> 3 * Copyright (c) 2018 Bob Beck <beck@openbsd.org>
4 * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> 4 * Copyright (c) 2018 Theo Buehler <tb@openbsd.org>
@@ -199,9 +199,9 @@ void tls13_record_layer_set_legacy_version(struct tls13_record_layer *rl,
199void tls13_record_layer_set_retry_after_phh(struct tls13_record_layer *rl, int retry); 199void tls13_record_layer_set_retry_after_phh(struct tls13_record_layer *rl, int retry);
200void tls13_record_layer_handshake_completed(struct tls13_record_layer *rl); 200void tls13_record_layer_handshake_completed(struct tls13_record_layer *rl);
201int tls13_record_layer_set_read_traffic_key(struct tls13_record_layer *rl, 201int tls13_record_layer_set_read_traffic_key(struct tls13_record_layer *rl,
202 struct tls13_secret *read_key); 202 struct tls13_secret *read_key, enum ssl_encryption_level_t read_level);
203int tls13_record_layer_set_write_traffic_key(struct tls13_record_layer *rl, 203int tls13_record_layer_set_write_traffic_key(struct tls13_record_layer *rl,
204 struct tls13_secret *write_key); 204 struct tls13_secret *write_key, enum ssl_encryption_level_t write_level);
205ssize_t tls13_record_layer_send_pending(struct tls13_record_layer *rl); 205ssize_t tls13_record_layer_send_pending(struct tls13_record_layer *rl);
206ssize_t tls13_record_layer_phh(struct tls13_record_layer *rl, CBS *cbs); 206ssize_t tls13_record_layer_phh(struct tls13_record_layer *rl, CBS *cbs);
207ssize_t tls13_record_layer_flush(struct tls13_record_layer *rl); 207ssize_t tls13_record_layer_flush(struct tls13_record_layer *rl);