diff options
author | jsing <> | 2022-07-24 14:16:29 +0000 |
---|---|---|
committer | jsing <> | 2022-07-24 14:16:29 +0000 |
commit | d82a186f8c966e9a7dddbe974f3492a8d6fc42c8 (patch) | |
tree | 513bd66d8a8e45ea9b3a80cfdde2155254f69204 /src/lib/libssl/tls13_internal.h | |
parent | d7c47c20d5f183b9417a79c956e0563e69e243cc (diff) | |
download | openbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.tar.gz openbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.tar.bz2 openbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.zip |
Provide QUIC encryption levels.
QUIC wants to know what "encryption level" handshake messages should be
sent at. Provide an ssl_encryption_level_t enum (via BoringSSL) that
defines these (of course quictls decided to make this an
OSSL_ENCRYPTION_LEVEL typedef, so provide that as well).
Wire these through to tls13_record_layer_set_{read,write}_traffic_key() so
that they can be used in upcoming commits.
ok tb@
Diffstat (limited to '')
-rw-r--r-- | src/lib/libssl/tls13_internal.h | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/tls13_internal.h b/src/lib/libssl/tls13_internal.h index 599eb200cb..6382f8b048 100644 --- a/src/lib/libssl/tls13_internal.h +++ b/src/lib/libssl/tls13_internal.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_internal.h,v 1.99 2022/07/20 06:32:24 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_internal.h,v 1.100 2022/07/24 14:16:29 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2018 Bob Beck <beck@openbsd.org> |
4 | * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> | 4 | * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> |
@@ -199,9 +199,9 @@ void tls13_record_layer_set_legacy_version(struct tls13_record_layer *rl, | |||
199 | void tls13_record_layer_set_retry_after_phh(struct tls13_record_layer *rl, int retry); | 199 | void tls13_record_layer_set_retry_after_phh(struct tls13_record_layer *rl, int retry); |
200 | void tls13_record_layer_handshake_completed(struct tls13_record_layer *rl); | 200 | void tls13_record_layer_handshake_completed(struct tls13_record_layer *rl); |
201 | int tls13_record_layer_set_read_traffic_key(struct tls13_record_layer *rl, | 201 | int tls13_record_layer_set_read_traffic_key(struct tls13_record_layer *rl, |
202 | struct tls13_secret *read_key); | 202 | struct tls13_secret *read_key, enum ssl_encryption_level_t read_level); |
203 | int tls13_record_layer_set_write_traffic_key(struct tls13_record_layer *rl, | 203 | int tls13_record_layer_set_write_traffic_key(struct tls13_record_layer *rl, |
204 | struct tls13_secret *write_key); | 204 | struct tls13_secret *write_key, enum ssl_encryption_level_t write_level); |
205 | ssize_t tls13_record_layer_send_pending(struct tls13_record_layer *rl); | 205 | ssize_t tls13_record_layer_send_pending(struct tls13_record_layer *rl); |
206 | ssize_t tls13_record_layer_phh(struct tls13_record_layer *rl, CBS *cbs); | 206 | ssize_t tls13_record_layer_phh(struct tls13_record_layer *rl, CBS *cbs); |
207 | ssize_t tls13_record_layer_flush(struct tls13_record_layer *rl); | 207 | ssize_t tls13_record_layer_flush(struct tls13_record_layer *rl); |