| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "quiche/quic/core/quic_crypto_client_stream.h" |
| |
| #include <memory> |
| #include <string> |
| #include <utility> |
| |
| #include "quiche/quic/core/crypto/crypto_protocol.h" |
| #include "quiche/quic/core/crypto/crypto_utils.h" |
| #include "quiche/quic/core/crypto/null_encrypter.h" |
| #include "quiche/quic/core/crypto/quic_crypto_client_config.h" |
| #include "quiche/quic/core/quic_crypto_client_handshaker.h" |
| #include "quiche/quic/core/quic_packets.h" |
| #include "quiche/quic/core/quic_session.h" |
| #include "quiche/quic/core/quic_utils.h" |
| #include "quiche/quic/core/tls_client_handshaker.h" |
| #include "quiche/quic/platform/api/quic_flags.h" |
| #include "quiche/quic/platform/api/quic_logging.h" |
| |
| namespace quic { |
| |
| const int QuicCryptoClientStream::kMaxClientHellos; |
| |
| QuicCryptoClientStreamBase::QuicCryptoClientStreamBase(QuicSession* session) |
| : QuicCryptoStream(session) {} |
| |
| QuicCryptoClientStream::QuicCryptoClientStream( |
| const QuicServerId& server_id, QuicSession* session, |
| std::unique_ptr<ProofVerifyContext> verify_context, |
| QuicCryptoClientConfig* crypto_config, ProofHandler* proof_handler, |
| bool has_application_state) |
| : QuicCryptoClientStreamBase(session) { |
| QUICHE_DCHECK_EQ(Perspective::IS_CLIENT, |
| session->connection()->perspective()); |
| switch (session->connection()->version().handshake_protocol) { |
| case PROTOCOL_QUIC_CRYPTO: |
| handshaker_ = std::make_unique<QuicCryptoClientHandshaker>( |
| server_id, this, session, std::move(verify_context), crypto_config, |
| proof_handler); |
| break; |
| case PROTOCOL_TLS1_3: { |
| auto handshaker = std::make_unique<TlsClientHandshaker>( |
| server_id, this, session, std::move(verify_context), crypto_config, |
| proof_handler, has_application_state); |
| tls_handshaker_ = handshaker.get(); |
| handshaker_ = std::move(handshaker); |
| break; |
| } |
| case PROTOCOL_UNSUPPORTED: |
| QUIC_BUG(quic_bug_10296_1) |
| << "Attempting to create QuicCryptoClientStream for unknown " |
| "handshake protocol"; |
| } |
| } |
| |
| QuicCryptoClientStream::~QuicCryptoClientStream() {} |
| |
| bool QuicCryptoClientStream::CryptoConnect() { |
| return handshaker_->CryptoConnect(); |
| } |
| |
| int QuicCryptoClientStream::num_sent_client_hellos() const { |
| return handshaker_->num_sent_client_hellos(); |
| } |
| |
| bool QuicCryptoClientStream::ResumptionAttempted() const { |
| return handshaker_->ResumptionAttempted(); |
| } |
| |
| bool QuicCryptoClientStream::IsResumption() const { |
| return handshaker_->IsResumption(); |
| } |
| |
| bool QuicCryptoClientStream::EarlyDataAccepted() const { |
| return handshaker_->EarlyDataAccepted(); |
| } |
| |
| ssl_early_data_reason_t QuicCryptoClientStream::EarlyDataReason() const { |
| return handshaker_->EarlyDataReason(); |
| } |
| |
| bool QuicCryptoClientStream::ReceivedInchoateReject() const { |
| return handshaker_->ReceivedInchoateReject(); |
| } |
| |
| int QuicCryptoClientStream::num_scup_messages_received() const { |
| return handshaker_->num_scup_messages_received(); |
| } |
| |
| bool QuicCryptoClientStream::encryption_established() const { |
| return handshaker_->encryption_established(); |
| } |
| |
| bool QuicCryptoClientStream::one_rtt_keys_available() const { |
| return handshaker_->one_rtt_keys_available(); |
| } |
| |
| const QuicCryptoNegotiatedParameters& |
| QuicCryptoClientStream::crypto_negotiated_params() const { |
| return handshaker_->crypto_negotiated_params(); |
| } |
| |
| CryptoMessageParser* QuicCryptoClientStream::crypto_message_parser() { |
| return handshaker_->crypto_message_parser(); |
| } |
| |
| HandshakeState QuicCryptoClientStream::GetHandshakeState() const { |
| return handshaker_->GetHandshakeState(); |
| } |
| |
| size_t QuicCryptoClientStream::BufferSizeLimitForLevel( |
| EncryptionLevel level) const { |
| return handshaker_->BufferSizeLimitForLevel(level); |
| } |
| |
| std::unique_ptr<QuicDecrypter> |
| QuicCryptoClientStream::AdvanceKeysAndCreateCurrentOneRttDecrypter() { |
| return handshaker_->AdvanceKeysAndCreateCurrentOneRttDecrypter(); |
| } |
| |
| std::unique_ptr<QuicEncrypter> |
| QuicCryptoClientStream::CreateCurrentOneRttEncrypter() { |
| return handshaker_->CreateCurrentOneRttEncrypter(); |
| } |
| |
| bool QuicCryptoClientStream::ExportKeyingMaterial(absl::string_view label, |
| absl::string_view context, |
| size_t result_len, |
| std::string* result) { |
| return handshaker_->ExportKeyingMaterial(label, context, result_len, result); |
| } |
| |
| std::string QuicCryptoClientStream::chlo_hash() const { |
| return handshaker_->chlo_hash(); |
| } |
| |
| void QuicCryptoClientStream::OnOneRttPacketAcknowledged() { |
| handshaker_->OnOneRttPacketAcknowledged(); |
| } |
| |
| void QuicCryptoClientStream::OnHandshakePacketSent() { |
| handshaker_->OnHandshakePacketSent(); |
| } |
| |
| void QuicCryptoClientStream::OnConnectionClosed( |
| const QuicConnectionCloseFrame& frame, ConnectionCloseSource source) { |
| handshaker_->OnConnectionClosed(frame.quic_error_code, source); |
| } |
| |
| void QuicCryptoClientStream::OnHandshakeDoneReceived() { |
| handshaker_->OnHandshakeDoneReceived(); |
| } |
| |
| void QuicCryptoClientStream::OnNewTokenReceived(absl::string_view token) { |
| handshaker_->OnNewTokenReceived(token); |
| } |
| |
| void QuicCryptoClientStream::SetServerApplicationStateForResumption( |
| std::unique_ptr<ApplicationState> application_state) { |
| handshaker_->SetServerApplicationStateForResumption( |
| std::move(application_state)); |
| } |
| |
| SSL* QuicCryptoClientStream::GetSsl() const { |
| return tls_handshaker_ == nullptr ? nullptr : tls_handshaker_->ssl(); |
| } |
| |
| bool QuicCryptoClientStream::IsCryptoFrameExpectedForEncryptionLevel( |
| EncryptionLevel level) const { |
| return handshaker_->IsCryptoFrameExpectedForEncryptionLevel(level); |
| } |
| |
| EncryptionLevel |
| QuicCryptoClientStream::GetEncryptionLevelToSendCryptoDataOfSpace( |
| PacketNumberSpace space) const { |
| return handshaker_->GetEncryptionLevelToSendCryptoDataOfSpace(space); |
| } |
| |
| } // namespace quic |