summaryrefslogtreecommitdiffhomepage
path: root/src/event
diff options
context:
space:
mode:
authorSergey Kandaurov <pluknet@nginx.com>2020-02-28 13:09:52 +0300
committerSergey Kandaurov <pluknet@nginx.com>2020-02-28 13:09:52 +0300
commita3620d469f2378420b52199b5da4fff9fa0b8995 (patch)
tree5367db25589e0421081c39b0feec5b83e8d20f0a /src/event
parent56eead6176d2d63392fc82668b2233dfadbae33e (diff)
downloadnginx-a3620d469f2378420b52199b5da4fff9fa0b8995.tar.gz
nginx-a3620d469f2378420b52199b5da4fff9fa0b8995.tar.bz2
QUIC header protection routines, introduced ngx_quic_tls_hp().
Diffstat (limited to 'src/event')
-rw-r--r--src/event/ngx_event_openssl.c19
-rw-r--r--src/event/ngx_event_quic.c34
-rw-r--r--src/event/ngx_event_quic.h3
3 files changed, 38 insertions, 18 deletions
diff --git a/src/event/ngx_event_openssl.c b/src/event/ngx_event_openssl.c
index 561819e0b..7d12b9625 100644
--- a/src/event/ngx_event_openssl.c
+++ b/src/event/ngx_event_openssl.c
@@ -593,29 +593,12 @@ quic_add_handshake_data(ngx_ssl_conn_t *ssl_conn,
return 0;
}
- EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new();
u_char *sample = &out.data[3]; // pnl=0
uint8_t mask[16];
- int outlen;
-
- if (EVP_EncryptInit_ex(ctx, EVP_aes_128_ecb(), NULL, secret->hp.data, NULL)
- != 1)
- {
- EVP_CIPHER_CTX_free(ctx);
- ngx_ssl_error(NGX_LOG_INFO, c->log, 0,
- "EVP_EncryptInit_ex() failed");
- return 0;
- }
-
- if (!EVP_EncryptUpdate(ctx, mask, &outlen, sample, 16)) {
- EVP_CIPHER_CTX_free(ctx);
- ngx_ssl_error(NGX_LOG_INFO, c->log, 0,
- "EVP_EncryptUpdate() failed");
+ if (ngx_quic_tls_hp(c, EVP_aes_128_ecb(), secret, mask, sample) != NGX_OK) {
return 0;
}
- EVP_CIPHER_CTX_free(ctx);
-
m = ngx_hex_dump(buf, (u_char *) sample, 16) - buf;
ngx_log_debug3(NGX_LOG_DEBUG_EVENT, c->log, 0,
"quic_add_handshake_data sample: %*s, len: %uz",
diff --git a/src/event/ngx_event_quic.c b/src/event/ngx_event_quic.c
index 106ca0d34..b453d95f8 100644
--- a/src/event/ngx_event_quic.c
+++ b/src/event/ngx_event_quic.c
@@ -371,3 +371,37 @@ ngx_quic_tls_seal(ngx_connection_t *c, const ngx_aead_cipher_t *cipher,
return NGX_OK;
}
+
+
+ngx_int_t
+ngx_quic_tls_hp(ngx_connection_t *c, const EVP_CIPHER *cipher,
+ ngx_quic_secret_t *s, u_char *out, u_char *in)
+{
+ int outlen;
+ EVP_CIPHER_CTX *ctx;
+
+ ctx = EVP_CIPHER_CTX_new();
+ if (ctx == NULL) {
+ return NGX_ERROR;
+ }
+
+ if (EVP_EncryptInit_ex(ctx, cipher, NULL, s->hp.data, NULL) != 1) {
+ ngx_ssl_error(NGX_LOG_INFO, c->log, 0, "EVP_EncryptInit_ex() failed");
+ goto failed;
+ }
+
+ if (!EVP_EncryptUpdate(ctx, out, &outlen, in, 16)) {
+ ngx_ssl_error(NGX_LOG_INFO, c->log, 0, "EVP_EncryptUpdate() failed");
+ goto failed;
+ }
+
+ EVP_CIPHER_CTX_free(ctx);
+
+ return NGX_OK;
+
+failed:
+
+ EVP_CIPHER_CTX_free(ctx);
+
+ return NGX_ERROR;
+}
diff --git a/src/event/ngx_event_quic.h b/src/event/ngx_event_quic.h
index c1b20f65b..1b900208b 100644
--- a/src/event/ngx_event_quic.h
+++ b/src/event/ngx_event_quic.h
@@ -60,5 +60,8 @@ ngx_int_t ngx_quic_tls_seal(ngx_connection_t *c,
const ngx_aead_cipher_t *cipher, ngx_quic_secret_t *s, ngx_str_t *out,
u_char *nonce, ngx_str_t *in, ngx_str_t *ad);
+ngx_int_t
+ngx_quic_tls_hp(ngx_connection_t *c, const EVP_CIPHER *cipher,
+ ngx_quic_secret_t *s, u_char *out, u_char *in);
#endif /* _NGX_EVENT_QUIC_H_INCLUDED_ */