MINOR: quic: remove qc from quic_rx_packet
quic_rx_packet struct had a reference to the quic_conn instance. This is
useless as qc instance is always passed through function argument. In
fact, pkt.qc is used only in qc_pkt_decrypt() on key update, even though
qc is also passed as argument.
Simplify this by removing qc field from quic_rx_packet structure
definition. Also clean up qc_pkt_decrypt() documentation and interface
to align it with other quic-conn related functions.
This should be backported up to 2.7.
diff --git a/include/haproxy/quic_conn-t.h b/include/haproxy/quic_conn-t.h
index 9730b7d..119adf8 100644
--- a/include/haproxy/quic_conn-t.h
+++ b/include/haproxy/quic_conn-t.h
@@ -400,7 +400,6 @@
/* QUIC version used in packet. */
const struct quic_version *version;
- struct quic_conn *qc;
unsigned char type;
/* Initial desctination connection ID. */
diff --git a/src/quic_conn.c b/src/quic_conn.c
index d54c3b5..2095263 100644
--- a/src/quic_conn.c
+++ b/src/quic_conn.c
@@ -1424,11 +1424,13 @@
goto leave;
}
-/* Decrypt <pkt> QUIC packet with <tls_ctx> as QUIC TLS cryptographic context.
- * Returns 1 if succeeded, 0 if not.
+/* Decrypt <pkt> packet using encryption level <qel> for <qc> connection.
+ * Decryption is done in place in packet buffer.
+ *
+ * Returns 1 on sucess else 0.
*/
-static int qc_pkt_decrypt(struct quic_rx_packet *pkt, struct quic_enc_level *qel,
- struct quic_conn *qc)
+static int qc_pkt_decrypt(struct quic_conn *qc, struct quic_enc_level *qel,
+ struct quic_rx_packet *pkt)
{
int ret, kp_changed;
unsigned char iv[QUIC_TLS_IV_LEN];
@@ -1454,21 +1456,21 @@
* secrets.
*/
// TODO: check if BUG_ON() more suitable
- if (!pkt->qc->ku.prv_rx.pn) {
+ if (!qc->ku.prv_rx.pn) {
TRACE_ERROR("null previous packet number", QUIC_EV_CONN_RXPKT, qc);
goto leave;
}
- rx_ctx = pkt->qc->ku.prv_rx.ctx;
- rx_iv = pkt->qc->ku.prv_rx.iv;
- rx_key = pkt->qc->ku.prv_rx.key;
+ rx_ctx = qc->ku.prv_rx.ctx;
+ rx_iv = qc->ku.prv_rx.iv;
+ rx_key = qc->ku.prv_rx.key;
}
else if (pkt->pn > qel->pktns->rx.largest_pn) {
/* Next key phase */
kp_changed = 1;
- rx_ctx = pkt->qc->ku.nxt_rx.ctx;
- rx_iv = pkt->qc->ku.nxt_rx.iv;
- rx_key = pkt->qc->ku.nxt_rx.key;
+ rx_ctx = qc->ku.nxt_rx.ctx;
+ rx_iv = qc->ku.nxt_rx.iv;
+ rx_key = qc->ku.nxt_rx.key;
}
}
}
@@ -1488,13 +1490,13 @@
/* Update the keys only if the packet decryption succeeded. */
if (kp_changed) {
- quic_tls_rotate_keys(pkt->qc);
+ quic_tls_rotate_keys(qc);
/* Toggle the Key Phase bit */
tls_ctx->flags ^= QUIC_FL_TLS_KP_BIT_SET;
/* Store the lowest packet number received for the current key phase */
tls_ctx->rx.pn = pkt->pn;
/* Prepare the next key update */
- if (!quic_tls_key_update(pkt->qc)) {
+ if (!quic_tls_key_update(qc)) {
TRACE_ERROR("quic_tls_key_update() failed", QUIC_EV_CONN_RXPKT, qc);
goto leave;
}
@@ -3935,7 +3937,7 @@
pkt = eb64_entry(node, struct quic_rx_packet, pn_node);
TRACE_DATA("new packet", QUIC_EV_CONN_RXPKT,
qc, pkt, NULL, qc->xprt_ctx->ssl);
- if (!qc_pkt_decrypt(pkt, qel, qc)) {
+ if (!qc_pkt_decrypt(qc, qel, pkt)) {
/* Drop the packet */
TRACE_ERROR("packet decryption failed -> dropped",
QUIC_EV_CONN_RXPKT, qc, pkt);
@@ -6059,8 +6061,6 @@
goto err;
}
- pkt->qc = qc;
-
out:
TRACE_LEAVE(QUIC_EV_CONN_LPKT, qc);
return qc;