Remove no-op code in tlsserverhandshaker, not flag protected
This code was added in cl/297650164 to simulate pending behavior in
BoringSSL, which landed in
https://boringssl-review.googlesource.com/c/boringssl/+/40127.
PiperOrigin-RevId: 314920425
Change-Id: Id41e82d474711c8f87e67b5563f7f1aea169e9ee
diff --git a/quic/core/tls_server_handshaker.cc b/quic/core/tls_server_handshaker.cc
index cdc89d8..7d97bdb 100644
--- a/quic/core/tls_server_handshaker.cc
+++ b/quic/core/tls_server_handshaker.cc
@@ -214,19 +214,6 @@
void TlsServerHandshaker::OverrideQuicConfigDefaults(QuicConfig* /*config*/) {}
-bool TlsServerHandshaker::SetReadSecret(
- EncryptionLevel level,
- const SSL_CIPHER* cipher,
- const std::vector<uint8_t>& read_secret) {
- if (level != ENCRYPTION_FORWARD_SECURE || one_rtt_keys_available_) {
- return TlsHandshaker::SetReadSecret(level, cipher, read_secret);
- }
- // Delay setting read secret for ENCRYPTION_FORWARD_SECURE until handshake
- // completes.
- app_data_read_secret_ = read_secret;
- return true;
-}
-
void TlsServerHandshaker::AdvanceHandshake() {
if (state_ == STATE_CONNECTION_CLOSED) {
QUIC_LOG(INFO) << "TlsServerHandshaker received handshake message after "
@@ -390,18 +377,6 @@
state_ = STATE_HANDSHAKE_COMPLETE;
one_rtt_keys_available_ = true;
- const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl());
-
- if (!app_data_read_secret_.empty()) {
- if (!SetReadSecret(ENCRYPTION_FORWARD_SECURE, cipher,
- app_data_read_secret_)) {
- QUIC_BUG << "Failed to set forward secure read key.";
- CloseConnection(QUIC_HANDSHAKE_FAILED, "Failed to set app data read key");
- return;
- }
- app_data_read_secret_.clear();
- }
-
handshaker_delegate()->OnOneRttKeysAvailable();
handshaker_delegate()->DiscardOldEncryptionKey(ENCRYPTION_HANDSHAKE);
handshaker_delegate()->DiscardOldDecryptionKey(ENCRYPTION_HANDSHAKE);
diff --git a/quic/core/tls_server_handshaker.h b/quic/core/tls_server_handshaker.h
index 85c1b86..9d4bc5c 100644
--- a/quic/core/tls_server_handshaker.h
+++ b/quic/core/tls_server_handshaker.h
@@ -82,13 +82,6 @@
virtual void ProcessAdditionalTransportParameters(
const TransportParameters& /*params*/) {}
- // Override of TlsHandshaker::SetReadSecret so that setting the read secret
- // for ENCRYPTION_FORWARD_SECURE can be delayed until the handshake is
- // complete.
- bool SetReadSecret(EncryptionLevel level,
- const SSL_CIPHER* cipher,
- const std::vector<uint8_t>& read_secret) override;
-
// Called when a new message is received on the crypto stream and is available
// for the TLS stack to read.
void AdvanceHandshake() override;
@@ -195,11 +188,6 @@
// Pre-shared key used during the handshake.
std::string pre_shared_key_;
- // Used to hold the ENCRYPTION_FORWARD_SECURE read secret until the handshake
- // is complete. This is temporary until
- // https://bugs.chromium.org/p/boringssl/issues/detail?id=303 is resolved.
- std::vector<uint8_t> app_data_read_secret_;
-
bool encryption_established_ = false;
bool one_rtt_keys_available_ = false;
bool valid_alpn_received_ = false;