diff options
author | jsing <> | 2022-07-24 14:16:29 +0000 |
---|---|---|
committer | jsing <> | 2022-07-24 14:16:29 +0000 |
commit | d82a186f8c966e9a7dddbe974f3492a8d6fc42c8 (patch) | |
tree | 513bd66d8a8e45ea9b3a80cfdde2155254f69204 /src/lib/libssl/tls13_record_layer.c | |
parent | d7c47c20d5f183b9417a79c956e0563e69e243cc (diff) | |
download | openbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.tar.gz openbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.tar.bz2 openbsd-d82a186f8c966e9a7dddbe974f3492a8d6fc42c8.zip |
Provide QUIC encryption levels.
QUIC wants to know what "encryption level" handshake messages should be
sent at. Provide an ssl_encryption_level_t enum (via BoringSSL) that
defines these (of course quictls decided to make this an
OSSL_ENCRYPTION_LEVEL typedef, so provide that as well).
Wire these through to tls13_record_layer_set_{read,write}_traffic_key() so
that they can be used in upcoming commits.
ok tb@
Diffstat (limited to 'src/lib/libssl/tls13_record_layer.c')
-rw-r--r-- | src/lib/libssl/tls13_record_layer.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/tls13_record_layer.c b/src/lib/libssl/tls13_record_layer.c index 2b7052c30e..c92fd8d193 100644 --- a/src/lib/libssl/tls13_record_layer.c +++ b/src/lib/libssl/tls13_record_layer.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_record_layer.c,v 1.68 2022/07/20 06:32:24 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_record_layer.c,v 1.69 2022/07/24 14:16:29 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -487,7 +487,7 @@ tls13_record_layer_set_traffic_key(const EVP_AEAD *aead, const EVP_MD *hash, | |||
487 | 487 | ||
488 | int | 488 | int |
489 | tls13_record_layer_set_read_traffic_key(struct tls13_record_layer *rl, | 489 | tls13_record_layer_set_read_traffic_key(struct tls13_record_layer *rl, |
490 | struct tls13_secret *read_key) | 490 | struct tls13_secret *read_key, enum ssl_encryption_level_t read_level) |
491 | { | 491 | { |
492 | return tls13_record_layer_set_traffic_key(rl->aead, rl->hash, | 492 | return tls13_record_layer_set_traffic_key(rl->aead, rl->hash, |
493 | rl->read, read_key); | 493 | rl->read, read_key); |
@@ -495,7 +495,7 @@ tls13_record_layer_set_read_traffic_key(struct tls13_record_layer *rl, | |||
495 | 495 | ||
496 | int | 496 | int |
497 | tls13_record_layer_set_write_traffic_key(struct tls13_record_layer *rl, | 497 | tls13_record_layer_set_write_traffic_key(struct tls13_record_layer *rl, |
498 | struct tls13_secret *write_key) | 498 | struct tls13_secret *write_key, enum ssl_encryption_level_t write_level) |
499 | { | 499 | { |
500 | return tls13_record_layer_set_traffic_key(rl->aead, rl->hash, | 500 | return tls13_record_layer_set_traffic_key(rl->aead, rl->hash, |
501 | rl->write, write_key); | 501 | rl->write, write_key); |