Project import generated by Copybara.
PiperOrigin-RevId: 237361882
Change-Id: I109a68f44db867b20f8c6a7732b0ce657133e52a
diff --git a/quic/core/tls_client_handshaker.cc b/quic/core/tls_client_handshaker.cc
new file mode 100644
index 0000000..f232dc3
--- /dev/null
+++ b/quic/core/tls_client_handshaker.cc
@@ -0,0 +1,308 @@
+// Copyright (c) 2017 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/third_party/quiche/src/quic/core/tls_client_handshaker.h"
+
+#include "third_party/boringssl/src/include/openssl/ssl.h"
+#include "net/third_party/quiche/src/quic/core/crypto/quic_encrypter.h"
+#include "net/third_party/quiche/src/quic/core/crypto/transport_parameters.h"
+#include "net/third_party/quiche/src/quic/core/quic_session.h"
+#include "net/third_party/quiche/src/quic/platform/api/quic_string.h"
+
+namespace quic {
+
+TlsClientHandshaker::ProofVerifierCallbackImpl::ProofVerifierCallbackImpl(
+ TlsClientHandshaker* parent)
+ : parent_(parent) {}
+
+TlsClientHandshaker::ProofVerifierCallbackImpl::~ProofVerifierCallbackImpl() {}
+
+void TlsClientHandshaker::ProofVerifierCallbackImpl::Run(
+ bool ok,
+ const QuicString& error_details,
+ std::unique_ptr<ProofVerifyDetails>* details) {
+ if (parent_ == nullptr) {
+ return;
+ }
+
+ parent_->verify_details_ = std::move(*details);
+ parent_->verify_result_ = ok ? ssl_verify_ok : ssl_verify_invalid;
+ parent_->state_ = STATE_HANDSHAKE_RUNNING;
+ parent_->proof_verify_callback_ = nullptr;
+ parent_->AdvanceHandshake();
+}
+
+void TlsClientHandshaker::ProofVerifierCallbackImpl::Cancel() {
+ parent_ = nullptr;
+}
+
+TlsClientHandshaker::TlsClientHandshaker(
+ QuicCryptoStream* stream,
+ QuicSession* session,
+ const QuicServerId& server_id,
+ ProofVerifier* proof_verifier,
+ SSL_CTX* ssl_ctx,
+ std::unique_ptr<ProofVerifyContext> verify_context,
+ const QuicString& user_agent_id)
+ : TlsHandshaker(stream, session, ssl_ctx),
+ server_id_(server_id),
+ proof_verifier_(proof_verifier),
+ verify_context_(std::move(verify_context)),
+ user_agent_id_(user_agent_id),
+ crypto_negotiated_params_(new QuicCryptoNegotiatedParameters) {}
+
+TlsClientHandshaker::~TlsClientHandshaker() {
+ if (proof_verify_callback_) {
+ proof_verify_callback_->Cancel();
+ }
+}
+
+// static
+bssl::UniquePtr<SSL_CTX> TlsClientHandshaker::CreateSslCtx() {
+ return TlsHandshaker::CreateSslCtx();
+}
+
+bool TlsClientHandshaker::CryptoConnect() {
+ CrypterPair crypters;
+ CryptoUtils::CreateTlsInitialCrypters(
+ Perspective::IS_CLIENT, session()->connection()->transport_version(),
+ session()->connection_id(), &crypters);
+ session()->connection()->SetEncrypter(ENCRYPTION_NONE,
+ std::move(crypters.encrypter));
+ session()->connection()->SetDecrypter(ENCRYPTION_NONE,
+ std::move(crypters.decrypter));
+ state_ = STATE_HANDSHAKE_RUNNING;
+ // Configure certificate verification.
+ // TODO(nharper): This only verifies certs on initial connection, not on
+ // resumption. Chromium has this callback be a no-op and verifies the
+ // certificate after the connection is complete. We need to re-verify on
+ // resumption in case of expiration or revocation/distrust.
+ SSL_set_custom_verify(ssl(), SSL_VERIFY_PEER, &VerifyCallback);
+
+ // Configure the SSL to be a client.
+ SSL_set_connect_state(ssl());
+ if (SSL_set_tlsext_host_name(ssl(), server_id_.host().c_str()) != 1) {
+ return false;
+ }
+
+ // Set the Transport Parameters to send in the ClientHello
+ if (!SetTransportParameters()) {
+ CloseConnection(QUIC_HANDSHAKE_FAILED,
+ "Failed to set Transport Parameters");
+ return false;
+ }
+
+ // Start the handshake.
+ AdvanceHandshake();
+ return session()->connection()->connected();
+}
+
+bool TlsClientHandshaker::SetTransportParameters() {
+ TransportParameters params;
+ params.perspective = Perspective::IS_CLIENT;
+ params.version =
+ CreateQuicVersionLabel(session()->supported_versions().front());
+
+ if (!session()->config()->FillTransportParameters(¶ms)) {
+ return false;
+ }
+ params.google_quic_params->SetStringPiece(kUAID, user_agent_id_);
+
+ std::vector<uint8_t> param_bytes;
+ return SerializeTransportParameters(params, ¶m_bytes) &&
+ SSL_set_quic_transport_params(ssl(), param_bytes.data(),
+ param_bytes.size()) == 1;
+}
+
+bool TlsClientHandshaker::ProcessTransportParameters(
+ QuicString* error_details) {
+ TransportParameters params;
+ const uint8_t* param_bytes;
+ size_t param_bytes_len;
+ SSL_get_peer_quic_transport_params(ssl(), ¶m_bytes, ¶m_bytes_len);
+ if (param_bytes_len == 0 ||
+ !ParseTransportParameters(param_bytes, param_bytes_len,
+ Perspective::IS_SERVER, ¶ms)) {
+ *error_details = "Unable to parse Transport Parameters";
+ return false;
+ }
+
+ if (params.version !=
+ CreateQuicVersionLabel(session()->connection()->version())) {
+ *error_details = "Version mismatch detected";
+ return false;
+ }
+ if (CryptoUtils::ValidateServerHelloVersions(
+ params.supported_versions,
+ session()->connection()->server_supported_versions(),
+ error_details) != QUIC_NO_ERROR ||
+ session()->config()->ProcessTransportParameters(
+ params, SERVER, error_details) != QUIC_NO_ERROR) {
+ return false;
+ }
+
+ session()->OnConfigNegotiated();
+ return true;
+}
+
+int TlsClientHandshaker::num_sent_client_hellos() const {
+ // TODO(nharper): Return a sensible value here.
+ return 0;
+}
+
+int TlsClientHandshaker::num_scup_messages_received() const {
+ // SCUP messages aren't sent or received when using the TLS handshake.
+ return 0;
+}
+
+bool TlsClientHandshaker::WasChannelIDSent() const {
+ // Channel ID is not used with TLS in QUIC.
+ return false;
+}
+
+bool TlsClientHandshaker::WasChannelIDSourceCallbackRun() const {
+ // Channel ID is not used with TLS in QUIC.
+ return false;
+}
+
+QuicString TlsClientHandshaker::chlo_hash() const {
+ return "";
+}
+
+bool TlsClientHandshaker::encryption_established() const {
+ return encryption_established_;
+}
+
+bool TlsClientHandshaker::handshake_confirmed() const {
+ return handshake_confirmed_;
+}
+
+const QuicCryptoNegotiatedParameters&
+TlsClientHandshaker::crypto_negotiated_params() const {
+ return *crypto_negotiated_params_;
+}
+
+CryptoMessageParser* TlsClientHandshaker::crypto_message_parser() {
+ return TlsHandshaker::crypto_message_parser();
+}
+
+void TlsClientHandshaker::AdvanceHandshake() {
+ if (state_ == STATE_CONNECTION_CLOSED) {
+ QUIC_LOG(INFO)
+ << "TlsClientHandshaker received message after connection closed";
+ return;
+ }
+ if (state_ == STATE_IDLE) {
+ CloseConnection(QUIC_HANDSHAKE_FAILED, "TLS handshake failed");
+ return;
+ }
+ if (state_ == STATE_HANDSHAKE_COMPLETE) {
+ // TODO(nharper): Handle post-handshake messages.
+ return;
+ }
+
+ QUIC_LOG(INFO) << "TlsClientHandshaker: continuing handshake";
+ int rv = SSL_do_handshake(ssl());
+ if (rv == 1) {
+ FinishHandshake();
+ return;
+ }
+ int ssl_error = SSL_get_error(ssl(), rv);
+ bool should_close = true;
+ switch (state_) {
+ case STATE_HANDSHAKE_RUNNING:
+ should_close = ssl_error != SSL_ERROR_WANT_READ;
+ break;
+ case STATE_CERT_VERIFY_PENDING:
+ should_close = ssl_error != SSL_ERROR_WANT_CERTIFICATE_VERIFY;
+ break;
+ default:
+ should_close = true;
+ }
+ if (should_close && state_ != STATE_CONNECTION_CLOSED) {
+ // TODO(nharper): Surface error details from the error queue when ssl_error
+ // is SSL_ERROR_SSL.
+ QUIC_LOG(WARNING) << "SSL_do_handshake failed; closing connection";
+ CloseConnection(QUIC_HANDSHAKE_FAILED, "TLS handshake failed");
+ }
+}
+
+void TlsClientHandshaker::CloseConnection(QuicErrorCode error,
+ const QuicString& reason_phrase) {
+ state_ = STATE_CONNECTION_CLOSED;
+ stream()->CloseConnectionWithDetails(error, reason_phrase);
+}
+
+void TlsClientHandshaker::FinishHandshake() {
+ QUIC_LOG(INFO) << "Client: handshake finished";
+ state_ = STATE_HANDSHAKE_COMPLETE;
+
+ QuicString error_details;
+ if (!ProcessTransportParameters(&error_details)) {
+ CloseConnection(QUIC_HANDSHAKE_FAILED, error_details);
+ return;
+ }
+
+ session()->connection()->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
+ session()->NeuterUnencryptedData();
+ encryption_established_ = true;
+ handshake_confirmed_ = true;
+}
+
+// static
+TlsClientHandshaker* TlsClientHandshaker::HandshakerFromSsl(SSL* ssl) {
+ return static_cast<TlsClientHandshaker*>(
+ TlsHandshaker::HandshakerFromSsl(ssl));
+}
+
+// static
+enum ssl_verify_result_t TlsClientHandshaker::VerifyCallback(
+ SSL* ssl,
+ uint8_t* out_alert) {
+ return HandshakerFromSsl(ssl)->VerifyCert(out_alert);
+}
+
+enum ssl_verify_result_t TlsClientHandshaker::VerifyCert(uint8_t* out_alert) {
+ if (verify_result_ != ssl_verify_retry ||
+ state_ == STATE_CERT_VERIFY_PENDING) {
+ enum ssl_verify_result_t result = verify_result_;
+ verify_result_ = ssl_verify_retry;
+ return result;
+ }
+ const STACK_OF(CRYPTO_BUFFER)* cert_chain = SSL_get0_peer_certificates(ssl());
+ if (cert_chain == nullptr) {
+ *out_alert = SSL_AD_INTERNAL_ERROR;
+ return ssl_verify_invalid;
+ }
+ // TODO(nharper): Pass the CRYPTO_BUFFERs into the QUIC stack to avoid copies.
+ std::vector<QuicString> certs;
+ for (CRYPTO_BUFFER* cert : cert_chain) {
+ certs.push_back(
+ QuicString(reinterpret_cast<const char*>(CRYPTO_BUFFER_data(cert)),
+ CRYPTO_BUFFER_len(cert)));
+ }
+
+ ProofVerifierCallbackImpl* proof_verify_callback =
+ new ProofVerifierCallbackImpl(this);
+
+ QuicAsyncStatus verify_result = proof_verifier_->VerifyCertChain(
+ server_id_.host(), certs, verify_context_.get(),
+ &cert_verify_error_details_, &verify_details_,
+ std::unique_ptr<ProofVerifierCallback>(proof_verify_callback));
+ switch (verify_result) {
+ case QUIC_SUCCESS:
+ return ssl_verify_ok;
+ case QUIC_PENDING:
+ proof_verify_callback_ = proof_verify_callback;
+ state_ = STATE_CERT_VERIFY_PENDING;
+ return ssl_verify_retry;
+ case QUIC_FAILURE:
+ default:
+ QUIC_LOG(INFO) << "Cert chain verification failed: "
+ << cert_verify_error_details_;
+ return ssl_verify_invalid;
+ }
+}
+
+} // namespace quic