u_char in[NGX_QUIC_COMPAT_RECORD_SIZE + 1];
u_char out[NGX_QUIC_COMPAT_RECORD_SIZE + 1
+ SSL3_RT_HEADER_LENGTH
- + EVP_GCM_TLS_TAG_LEN];
+ + NGX_QUIC_TAG_LEN];
c = ngx_ssl_get_connection(ssl);
} else {
type = SSL3_RT_APPLICATION_DATA;
- len += EVP_GCM_TLS_TAG_LEN;
+ len += NGX_QUIC_TAG_LEN;
}
out[0] = type;
ad.data = res->data;
ad.len = ngx_quic_compat_create_header(rec, ad.data, 0);
- out.len = rec->payload.len + EVP_GCM_TLS_TAG_LEN;
+ out.len = rec->payload.len + NGX_QUIC_TAG_LEN;
out.data = res->data + ad.len;
#ifdef NGX_QUIC_DEBUG_CRYPTO
}
if (EVP_DecryptUpdate(ctx, out->data, &len, in->data,
- in->len - EVP_GCM_TLS_TAG_LEN)
+ in->len - NGX_QUIC_TAG_LEN)
!= 1)
{
EVP_CIPHER_CTX_free(ctx);
}
out->len = len;
- tag = in->data + in->len - EVP_GCM_TLS_TAG_LEN;
+ tag = in->data + in->len - NGX_QUIC_TAG_LEN;
- if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, EVP_GCM_TLS_TAG_LEN, tag)
+ if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, NGX_QUIC_TAG_LEN, tag)
== 0)
{
EVP_CIPHER_CTX_free(ctx);
out->len += len;
- if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_GET_TAG, EVP_GCM_TLS_TAG_LEN,
+ if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_GET_TAG, NGX_QUIC_TAG_LEN,
out->data + in->len)
== 0)
{
EVP_CIPHER_CTX_free(ctx);
- out->len += EVP_GCM_TLS_TAG_LEN;
+ out->len += NGX_QUIC_TAG_LEN;
#endif
return NGX_OK;
}
ad.data = res->data;
ad.len = ngx_quic_create_header(pkt, ad.data, &pnp);
- out.len = pkt->payload.len + EVP_GCM_TLS_TAG_LEN;
+ out.len = pkt->payload.len + NGX_QUIC_TAG_LEN;
out.data = res->data + ad.len;
#ifdef NGX_QUIC_DEBUG_CRYPTO
ad.len = ngx_quic_create_retry_itag(pkt, ad.data, &start);
itag.data = ad.data + ad.len;
- itag.len = EVP_GCM_TLS_TAG_LEN;
+ itag.len = NGX_QUIC_TAG_LEN;
#ifdef NGX_QUIC_DEBUG_CRYPTO
ngx_log_debug2(NGX_LOG_DEBUG_EVENT, pkt->log, 0,
* AES and ChaCha20 algorithms sample 16 bytes
*/
- if (len < EVP_GCM_TLS_TAG_LEN + 4) {
+ if (len < NGX_QUIC_TAG_LEN + 4) {
return NGX_DECLINED;
}
"quic ad len:%uz %xV", ad.len, &ad);
#endif
- pkt->payload.len = in.len - EVP_GCM_TLS_TAG_LEN;
+ pkt->payload.len = in.len - NGX_QUIC_TAG_LEN;
pkt->payload.data = pkt->plaintext + ad.len;
rc = ngx_quic_tls_open(ciphers.c, secret, &pkt->payload,
if (ngx_quic_short_pkt(pkt->flags)) {
- len = 1 + pkt->dcid.len + pkt->num_len + EVP_GCM_TLS_TAG_LEN;
+ len = 1 + pkt->dcid.len + pkt->num_len + NGX_QUIC_TAG_LEN;
if (len > pkt_len) {
return 0;
}
/* (pkt_len - len) is 'remainder' packet length (see RFC 9000, 17.2) */
len += ngx_quic_varint_len(pkt_len - len)
- + pkt->num_len + EVP_GCM_TLS_TAG_LEN;
+ + pkt->num_len + NGX_QUIC_TAG_LEN;
if (len > pkt_len) {
return 0;
size_t rem_len;
u_char *p, *start;
- rem_len = pkt->num_len + pkt->payload.len + EVP_GCM_TLS_TAG_LEN;
+ rem_len = pkt->num_len + pkt->payload.len + NGX_QUIC_TAG_LEN;
if (out == NULL) {
return 5 + 2 + pkt->dcid.len + pkt->scid.len