mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-08-14 11:06:56 +02:00
Highly inspired from nginx openssl wrapper code. This wrapper implement this list of functions: SSL_set_quic_method(), SSL_quic_read_level(), SSL_quic_write_level(), SSL_set_quic_transport_params(), SSL_provide_quic_data(), SSL_process_quic_post_handshake() and SSL_QUIC_METHOD QUIC specific bio method which are also implemented by quictls to support QUIC from OpenSSL. So, its aims is to support QUIC from a standard OpenSSL stack without QUIC support. It relies on the OpenSSL keylog feature to retreive the secrets derived by the OpenSSL stack during a handshake and to pass them to the ->set_encryption_secrets() callback as this is done by quictls. It makes usage of a callback (quic_tls_compat_msg_callback()) to handle some TLS messages only on the receipt path. Some of them must be passed to the ->add_handshake_data() callback as this is done with quictls to be sent to the peer as CRYPTO data. quic_tls_compat_msg_callback() callback also sends the received TLS alert with ->send_alert() callback. AES 128-bits with CCM mode is not supported at this time. It is often disabled by the OpenSSL stack, but as it can be enabled by "ssl-default-bind-ciphersuites", the wrapper will send a TLS alerts (Handhshake failure) if this algorithm is negotiated between the client and the server. 0rtt is also not supported by this wrapper.
31 lines
1.3 KiB
C
31 lines
1.3 KiB
C
#ifndef _HAPROXY_QUIC_OPENSSL_COMPAT_H_
|
|
#define _HAPROXY_QUIC_OPENSSL_COMPAT_H_
|
|
|
|
#ifdef USE_QUIC_OPENSSL_COMPAT
|
|
|
|
/* Highly inspired from nginx QUIC TLS compatibilty code */
|
|
#include <haproxy/listener-t.h>
|
|
#include <haproxy/quic_openssl_compat-t.h>
|
|
|
|
#define QUIC_OPENSSL_COMPAT_SSL_TP_EXT 0x39
|
|
|
|
/* Used by keylog */
|
|
#define QUIC_OPENSSL_COMPAT_CLIENT_HANDSHAKE "CLIENT_HANDSHAKE_TRAFFIC_SECRET"
|
|
#define QUIC_OPENSSL_COMPAT_SERVER_HANDSHAKE "SERVER_HANDSHAKE_TRAFFIC_SECRET"
|
|
#define QUIC_OPENSSL_COMPAT_CLIENT_APPLICATION "CLIENT_TRAFFIC_SECRET_0"
|
|
#define QUIC_OPENSSL_COMPAT_SERVER_APPLICATION "SERVER_TRAFFIC_SECRET_0"
|
|
|
|
int quic_tls_compat_init(struct bind_conf *bind_conf, SSL_CTX *ctx);
|
|
void quic_tls_compat_keylog_callback(const SSL *ssl, const char *line);
|
|
|
|
int SSL_set_quic_method(SSL *ssl, const SSL_QUIC_METHOD *quic_method);
|
|
enum ssl_encryption_level_t SSL_quic_read_level(const SSL *ssl);
|
|
enum ssl_encryption_level_t SSL_quic_write_level(const SSL *ssl);
|
|
int SSL_set_quic_transport_params(SSL *ssl, const uint8_t *params, size_t params_len);
|
|
int SSL_provide_quic_data(SSL *ssl, enum ssl_encryption_level_t level,
|
|
const uint8_t *data, size_t len);
|
|
int SSL_process_quic_post_handshake(SSL *ssl);
|
|
|
|
#endif /* USE_QUIC_OPENSSL_COMPAT */
|
|
#endif /* _HAPROXY_QUIC_OPENSSL_COMPAT_H_ */
|