MINOR: quic: Split the secrets key allocation in two parts

Implement quic_tls_secrets_keys_alloc()/quic_tls_secrets_keys_free() to allocate
the memory for only one direction (RX or TX).
Modify ha_quic_set_encryption_secrets() to call these functions for one of this
direction (or both). So, for now on we can rely on the value of the secret keys
to know if it was derived.
Remove QUIC_FL_TLS_SECRETS_SET flag which is no more useful.
Consequently, the secrets are dumped by the traces only if derived.

Must be backported to 2.6.
diff --git a/include/haproxy/quic_tls-t.h b/include/haproxy/quic_tls-t.h
index cd2e0a8..3c0448f 100644
--- a/include/haproxy/quic_tls-t.h
+++ b/include/haproxy/quic_tls-t.h
@@ -132,10 +132,8 @@
 
 /* Key update phase bit */
 #define QUIC_FL_TLS_KP_BIT_SET   (1 << 0)
-/* Flag to be used when TLS secrets have been set. */
-#define QUIC_FL_TLS_SECRETS_SET  (1 << 1)
 /* Flag to be used when TLS secrets have been discarded. */
-#define QUIC_FL_TLS_SECRETS_DCD  (1 << 2)
+#define QUIC_FL_TLS_SECRETS_DCD  (1 << 1)
 
 struct quic_tls_secrets {
 	EVP_CIPHER_CTX *ctx;
diff --git a/include/haproxy/quic_tls.h b/include/haproxy/quic_tls.h
index 5c035a4..115d0fe 100644
--- a/include/haproxy/quic_tls.h
+++ b/include/haproxy/quic_tls.h
@@ -426,6 +426,48 @@
 	return 0;
 }
 
+/* Release the memory allocated for <secs> secrets */
+static inline void quic_tls_secrets_keys_free(struct quic_tls_secrets *secs)
+{
+	if (secs->iv) {
+		memset(secs->iv, 0, secs->ivlen);
+		secs->ivlen = 0;
+	}
+
+	if (secs->key) {
+		memset(secs->key, 0, secs->keylen);
+		secs->keylen = 0;
+	}
+
+	/* HP protection */
+	EVP_CIPHER_CTX_free(secs->hp_ctx);
+	/* AEAD decryption */
+	EVP_CIPHER_CTX_free(secs->ctx);
+	pool_free(pool_head_quic_tls_iv,  secs->iv);
+	pool_free(pool_head_quic_tls_key, secs->key);
+
+	secs->iv = secs->key = NULL;
+}
+
+/* Allocate the memory for the <secs> secrets.
+ * Return 1 if succeeded, 0 if not.
+ */
+static inline int quic_tls_secrets_keys_alloc(struct quic_tls_secrets *secs)
+{
+	if (!(secs->iv = pool_alloc(pool_head_quic_tls_iv)) ||
+	    !(secs->key = pool_alloc(pool_head_quic_tls_key)))
+		goto err;
+
+	secs->ivlen = QUIC_TLS_IV_LEN;
+	secs->keylen = QUIC_TLS_KEY_LEN;
+
+	return 1;
+
+ err:
+	quic_tls_secrets_keys_free(secs);
+	return 0;
+}
+
 /* Initialize a TLS cryptographic context for the Initial encryption level. */
 static inline int quic_initial_tls_ctx_init(struct quic_tls_ctx *ctx)
 {
@@ -559,7 +601,6 @@
 	if (!quic_tls_enc_aes_ctx_init(&tx_ctx->hp_ctx, tx_ctx->hp, tx_ctx->hp_key))
 		goto err;
 
-	ctx->flags |= QUIC_FL_TLS_SECRETS_SET;
 	TRACE_LEAVE(QUIC_EV_CONN_ISEC, qc, rx_init_sec, tx_init_sec);
 
 	return 1;
@@ -631,6 +672,18 @@
 	return 0;
 }
 
+/* Return 1 if <qel> has RX secrets, 0 if not. */
+static inline int quic_tls_has_rx_sec(const struct quic_enc_level *qel)
+{
+	return !!qel->tls_ctx.rx.key;
+}
+
+/* Return 1 if <qel> has TX secrets, 0 if not. */
+static inline int quic_tls_has_tx_sec(const struct quic_enc_level *qel)
+{
+	return !!qel->tls_ctx.tx.key;
+}
+
 #endif /* USE_QUIC */
 #endif /* _PROTO_QUIC_TLS_H */
 
diff --git a/src/quic_conn.c b/src/quic_conn.c
index aa11d2c..92333db 100644
--- a/src/quic_conn.c
+++ b/src/quic_conn.c
@@ -293,48 +293,44 @@
 			const unsigned char *tx_sec = a3;
 
 			tls_ctx = &qc->els[level].tls_ctx;
-			if (tls_ctx->flags & QUIC_FL_TLS_SECRETS_SET) {
-				chunk_appendf(&trace_buf, "\n  RX el=%c", quic_enc_level_char(level));
-				if (rx_sec)
-					quic_tls_secret_hexdump(&trace_buf, rx_sec, 32);
-				quic_tls_keys_hexdump(&trace_buf, &tls_ctx->rx);
-				chunk_appendf(&trace_buf, "\n  TX el=%c", quic_enc_level_char(level));
-				if (tx_sec)
-					quic_tls_secret_hexdump(&trace_buf, tx_sec, 32);
-				quic_tls_keys_hexdump(&trace_buf, &tls_ctx->tx);
-			}
+			chunk_appendf(&trace_buf, "\n  RX el=%c", quic_enc_level_char(level));
+			if (rx_sec)
+				quic_tls_secret_hexdump(&trace_buf, rx_sec, 32);
+			quic_tls_keys_hexdump(&trace_buf, &tls_ctx->rx);
+			chunk_appendf(&trace_buf, "\n  TX el=%c", quic_enc_level_char(level));
+			if (tx_sec)
+				quic_tls_secret_hexdump(&trace_buf, tx_sec, 32);
+			quic_tls_keys_hexdump(&trace_buf, &tls_ctx->tx);
 		}
 		if (mask & (QUIC_EV_CONN_RSEC|QUIC_EV_CONN_RWSEC)) {
 			const enum ssl_encryption_level_t *level = a2;
-			const unsigned char *secret = a3;
-			const size_t *secret_len = a4;
 
 			if (level) {
 				enum quic_tls_enc_level lvl = ssl_to_quic_enc_level(*level);
 
 				chunk_appendf(&trace_buf, "\n  RX el=%c", quic_enc_level_char(lvl));
-				if (secret && secret_len)
-					quic_tls_secret_hexdump(&trace_buf, secret, *secret_len);
-				tls_ctx = &qc->els[lvl].tls_ctx;
-				if (tls_ctx->flags & QUIC_FL_TLS_SECRETS_SET)
+				if (quic_tls_has_rx_sec(&qc->els[lvl])) {
+					tls_ctx = &qc->els[lvl].tls_ctx;
 					quic_tls_keys_hexdump(&trace_buf, &tls_ctx->rx);
+				}
+				else
+					chunk_appendf(&trace_buf, " (none)");
 			}
 		}
 
 		if (mask & (QUIC_EV_CONN_WSEC|QUIC_EV_CONN_RWSEC)) {
 			const enum ssl_encryption_level_t *level = a2;
-			const unsigned char *secret = a3;
-			const size_t *secret_len = a4;
 
 			if (level) {
 				enum quic_tls_enc_level lvl = ssl_to_quic_enc_level(*level);
 
 				chunk_appendf(&trace_buf, "\n  TX el=%c", quic_enc_level_char(lvl));
-				if (secret && secret_len)
-					quic_tls_secret_hexdump(&trace_buf, secret, *secret_len);
-				tls_ctx = &qc->els[lvl].tls_ctx;
-				if (tls_ctx->flags & QUIC_FL_TLS_SECRETS_SET)
+				if (quic_tls_has_tx_sec(&qc->els[lvl])) {
+					tls_ctx = &qc->els[lvl].tls_ctx;
 					quic_tls_keys_hexdump(&trace_buf, &tls_ctx->tx);
+				}
+				else
+					chunk_appendf(&trace_buf, " (none)");
 			}
 
 		}
@@ -914,7 +910,7 @@
 	struct quic_conn *qc = SSL_get_ex_data(ssl, ssl_qc_app_data_index);
 	struct quic_tls_ctx *tls_ctx = &qc->els[ssl_to_quic_enc_level(level)].tls_ctx;
 	const SSL_CIPHER *cipher = SSL_get_current_cipher(ssl);
-	struct quic_tls_secrets *rx, *tx;
+	struct quic_tls_secrets *rx = NULL, *tx = NULL;
 	const struct quic_version *ver =
 		qc->negotiated_version ? qc->negotiated_version : qc->original_version;
 	int ret = 0;
@@ -923,28 +919,26 @@
 	BUG_ON(secret_len > QUIC_TLS_SECRET_LEN);
 	if (qc->flags & QUIC_FL_CONN_IMMEDIATE_CLOSE) {
 		TRACE_PROTO("CC required", QUIC_EV_CONN_RWSEC, qc);
-		goto no_secret;
+		goto out;
 	}
 
-	if (!quic_tls_ctx_keys_alloc(tls_ctx)) {
-		TRACE_ERROR("keys allocation failed", QUIC_EV_CONN_RWSEC, qc);
-		goto leave;
-	}
+	if (!read_secret)
+		goto write;
 
 	rx = &tls_ctx->rx;
-	tx = &tls_ctx->tx;
-
-	rx->aead = tx->aead = tls_aead(cipher);
-	rx->md   = tx->md   = tls_md(cipher);
-	rx->hp   = tx->hp   = tls_hp(cipher);
+	if (!quic_tls_secrets_keys_alloc(rx)) {
+		TRACE_ERROR("RX keys allocation failed", QUIC_EV_CONN_RWSEC, qc);
+		goto leave;
+	}
 
-	if (!read_secret)
-		goto write;
+	rx->aead = tls_aead(cipher);
+	rx->md   = tls_md(cipher);
+	rx->hp   = tls_hp(cipher);
 
 	if (!quic_tls_derive_keys(rx->aead, rx->hp, rx->md, ver, rx->key, rx->keylen,
 	                          rx->iv, rx->ivlen, rx->hp_key, sizeof rx->hp_key,
 	                          read_secret, secret_len)) {
-		TRACE_ERROR("RX key derivation failed", QUIC_EV_CONN_RWSEC, qc);
+		TRACE_ERROR("TX key derivation failed", QUIC_EV_CONN_RWSEC, qc);
 		goto leave;
 	}
 
@@ -972,6 +966,16 @@
 	if (!write_secret)
 		goto out;
 
+	tx = &tls_ctx->tx;
+	if (!quic_tls_secrets_keys_alloc(tx)) {
+		TRACE_ERROR("TX keys allocation failed", QUIC_EV_CONN_RWSEC, qc);
+		goto leave;
+	}
+
+	tx->aead = tls_aead(cipher);
+	tx->md   = tls_md(cipher);
+	tx->hp   = tls_hp(cipher);
+
 	if (!quic_tls_derive_keys(tx->aead, tx->hp, tx->md, ver, tx->key, tx->keylen,
 	                          tx->iv, tx->ivlen, tx->hp_key, sizeof tx->hp_key,
 	                          write_secret, secret_len)) {
@@ -994,29 +998,31 @@
 		struct quic_tls_kp *nxt_rx = &qc->ku.nxt_rx;
 		struct quic_tls_kp *nxt_tx = &qc->ku.nxt_tx;
 
-		/* These secrets must be stored only for Application encryption level */
-		if (!(rx->secret = pool_alloc(pool_head_quic_tls_secret)) ||
-		    !(tx->secret = pool_alloc(pool_head_quic_tls_secret))) {
-			TRACE_ERROR("Could not allocate secrete keys", QUIC_EV_CONN_RWSEC, qc);
-			goto leave;
-		}
+		if (rx) {
+			if (!(rx->secret = pool_alloc(pool_head_quic_tls_secret))) {
+				TRACE_ERROR("Could not allocate RX Application secrete keys", QUIC_EV_CONN_RWSEC, qc);
+				goto leave;
+			}
 
-		if (read_secret) {
 			memcpy(rx->secret, read_secret, secret_len);
 			rx->secretlen = secret_len;
 		}
-		if (write_secret) {
+
+		if (tx) {
+			if (!(tx->secret = pool_alloc(pool_head_quic_tls_secret))) {
+				TRACE_ERROR("Could not allocate TX Application secrete keys", QUIC_EV_CONN_RWSEC, qc);
+				goto leave;
+			}
+
 			memcpy(tx->secret, write_secret, secret_len);
 			tx->secretlen = secret_len;
 		}
+
 		/* Initialize all the secret keys lengths */
 		prv_rx->secretlen = nxt_rx->secretlen = nxt_tx->secretlen = secret_len;
-		/* Prepare the next key update */
 	}
 
  out:
-	tls_ctx->flags |= QUIC_FL_TLS_SECRETS_SET;
- no_secret:
 	ret = 1;
  leave:
 	TRACE_LEAVE(QUIC_EV_CONN_RWSEC, qc, &level);
@@ -2281,6 +2287,7 @@
 			qc->state = QUIC_HS_ST_COMPLETE;
 		}
 
+		/* Prepare the next key update */
 		if (!quic_tls_key_update(qc)) {
 			TRACE_ERROR("quic_tls_key_update() failed", QUIC_EV_CONN_IO_CB, qc);
 			goto leave;
@@ -2983,7 +2990,7 @@
 	 * and if there is no more ack-eliciting frames to send or in flight
 	 * congestion control limit is reached for prepared data
 	 */
-	if (!(qel->tls_ctx.flags & QUIC_FL_TLS_SECRETS_SET) ||
+	if (!quic_tls_has_tx_sec(qel) ||
 	    (!cc && !probe && !must_ack &&
 	     (LIST_ISEMPTY(frms) || qc->path->prep_in_flight >= qc->path->cwnd))) {
 		return 0;
@@ -3986,7 +3993,7 @@
 		goto cant_rm_hp;
 	}
 
-	if (!(qel->tls_ctx.flags & QUIC_FL_TLS_SECRETS_SET)) {
+	if (!quic_tls_has_rx_sec(qel)) {
 		TRACE_DEVEL("non available secrets", QUIC_EV_CONN_TRMHP, qc);
 		goto cant_rm_hp;
 	}
@@ -4347,7 +4354,7 @@
 	}
 	ssl_err = SSL_ERROR_NONE;
 	zero_rtt = st < QUIC_HS_ST_COMPLETE &&
-		(eqel->tls_ctx.flags & QUIC_FL_TLS_SECRETS_SET) &&
+		quic_tls_has_rx_sec(eqel) &&
 		(!LIST_ISEMPTY(&eqel->rx.pqpkts) || qc_el_rx_pkts(eqel));
  start:
 	if (st >= QUIC_HS_ST_COMPLETE &&
@@ -4378,7 +4385,7 @@
 		goto out;
 
 	zero_rtt = st < QUIC_HS_ST_COMPLETE &&
-		(eqel->tls_ctx.flags & QUIC_FL_TLS_SECRETS_SET) &&
+		quic_tls_has_rx_sec(eqel) &&
 		(!LIST_ISEMPTY(&eqel->rx.pqpkts) || qc_el_rx_pkts(eqel));
 	if (next_qel && next_qel == eqel && zero_rtt) {
 		TRACE_DEVEL("select 0RTT as next encryption level",
@@ -4447,7 +4454,7 @@
 	/* Check if there is something to do for the next level.
 	 */
 	if (next_qel && next_qel != qel &&
-	    (next_qel->tls_ctx.flags & QUIC_FL_TLS_SECRETS_SET) &&
+	    quic_tls_has_rx_sec(next_qel) &&
 	    (!LIST_ISEMPTY(&next_qel->rx.pqpkts) || qc_el_rx_pkts(next_qel))) {
 		qel = next_qel;
 		next_qel = NULL;
@@ -4639,9 +4646,9 @@
 		struct quic_enc_level *iel = &qc->els[QUIC_TLS_ENC_LEVEL_INITIAL];
 		struct quic_enc_level *hel = &qc->els[QUIC_TLS_ENC_LEVEL_HANDSHAKE];
 
-		if (hel->tls_ctx.flags == QUIC_FL_TLS_SECRETS_SET)
+		if (quic_tls_has_tx_sec(hel))
 			hel->pktns->tx.pto_probe = 1;
-		if (iel->tls_ctx.flags == QUIC_FL_TLS_SECRETS_SET)
+		if (quic_tls_has_tx_sec(iel))
 			iel->pktns->tx.pto_probe = 1;
 	}
 
diff --git a/src/quic_loss.c b/src/quic_loss.c
index 94b21d7..0c7c3a1 100644
--- a/src/quic_loss.c
+++ b/src/quic_loss.c
@@ -2,7 +2,7 @@
 
 #include <haproxy/quic_conn-t.h>
 #include <haproxy/quic_loss.h>
-#include <haproxy/quic_tls-t.h>
+#include <haproxy/quic_tls.h>
 
 #include <haproxy/atomic.h>
 #include <haproxy/list.h>
@@ -97,7 +97,7 @@
 		struct quic_enc_level *hel;
 
 		hel = &qc->els[QUIC_TLS_ENC_LEVEL_HANDSHAKE];
-		if (hel->tls_ctx.flags & QUIC_FL_TLS_SECRETS_SET) {
+		if (quic_tls_has_tx_sec(hel)) {
 			pktns = &qc->pktns[QUIC_TLS_PKTNS_HANDSHAKE];
 		}
 		else {