| // Copyright (c) 2019 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #ifndef QUICHE_QUIC_CORE_CRYPTO_TLS_CONNECTION_H_ | 
 | #define QUICHE_QUIC_CORE_CRYPTO_TLS_CONNECTION_H_ | 
 |  | 
 | #include <vector> | 
 |  | 
 | #include "third_party/boringssl/src/include/openssl/ssl.h" | 
 | #include "net/third_party/quiche/src/quic/core/quic_types.h" | 
 | #include "net/third_party/quiche/src/common/platform/api/quiche_string_piece.h" | 
 |  | 
 | namespace quic { | 
 |  | 
 | // TlsConnection wraps BoringSSL's SSL object which represents a single TLS | 
 | // connection. Callbacks set in BoringSSL which are called with an SSL* argument | 
 | // will get dispatched to the TlsConnection object owning that SSL. In turn, the | 
 | // TlsConnection will delegate the implementation of that callback to its | 
 | // Delegate. | 
 | // | 
 | // The owner of the TlsConnection is responsible for driving the TLS handshake | 
 | // (and other interactions with the SSL*). This class only handles mapping | 
 | // callbacks to the correct instance. | 
 | class QUIC_EXPORT_PRIVATE TlsConnection { | 
 |  public: | 
 |   // A TlsConnection::Delegate implements the methods that are set as callbacks | 
 |   // of TlsConnection. | 
 |   class QUIC_EXPORT_PRIVATE Delegate { | 
 |    public: | 
 |     virtual ~Delegate() {} | 
 |  | 
 |    protected: | 
 |     // SetEncryptionSecret provides the encryption secrets to use at a | 
 |     // particular encryption level |level|. The secrets provided here are the | 
 |     // ones from the TLS 1.3 key schedule (RFC 8446 section 7.1), in particular | 
 |     // the handshake traffic secrets and application traffic secrets. For a | 
 |     // given level |level|, |read_secret| is the secret used for reading data, | 
 |     // and |write_secret| is the secret used for writing data. | 
 |     virtual void SetEncryptionSecret( | 
 |         EncryptionLevel level, | 
 |         const std::vector<uint8_t>& read_secret, | 
 |         const std::vector<uint8_t>& write_secret) = 0; | 
 |  | 
 |     // WriteMessage is called when there is |data| from the TLS stack ready for | 
 |     // the QUIC stack to write in a crypto frame. The data must be transmitted | 
 |     // at encryption level |level|. | 
 |     virtual void WriteMessage(EncryptionLevel level, | 
 |                               quiche::QuicheStringPiece data) = 0; | 
 |  | 
 |     // FlushFlight is called to signal that the current flight of messages have | 
 |     // all been written (via calls to WriteMessage) and can be flushed to the | 
 |     // underlying transport. | 
 |     virtual void FlushFlight() = 0; | 
 |  | 
 |     // SendAlert causes this TlsConnection to close the QUIC connection with an | 
 |     // error code corersponding to the TLS alert description |desc| sent at | 
 |     // level |level|. | 
 |     virtual void SendAlert(EncryptionLevel level, uint8_t desc) = 0; | 
 |  | 
 |     friend class TlsConnection; | 
 |   }; | 
 |  | 
 |   TlsConnection(const TlsConnection&) = delete; | 
 |   TlsConnection& operator=(const TlsConnection&) = delete; | 
 |  | 
 |   // Functions to convert between BoringSSL's enum ssl_encryption_level_t and | 
 |   // QUIC's EncryptionLevel. | 
 |   static EncryptionLevel QuicEncryptionLevel(enum ssl_encryption_level_t level); | 
 |   static enum ssl_encryption_level_t BoringEncryptionLevel( | 
 |       EncryptionLevel level); | 
 |  | 
 |   SSL* ssl() const { return ssl_.get(); } | 
 |  | 
 |  protected: | 
 |   // TlsConnection does not take ownership of any of its arguments; they must | 
 |   // outlive the TlsConnection object. | 
 |   TlsConnection(SSL_CTX* ssl_ctx, Delegate* delegate); | 
 |  | 
 |   // Creates an SSL_CTX and configures it with the options that are appropriate | 
 |   // for both client and server. The caller is responsible for ownership of the | 
 |   // newly created struct. | 
 |   static bssl::UniquePtr<SSL_CTX> CreateSslCtx(); | 
 |  | 
 |   // From a given SSL* |ssl|, returns a pointer to the TlsConnection that it | 
 |   // belongs to. This helper method allows the callbacks set in BoringSSL to be | 
 |   // dispatched to the correct TlsConnection from the SSL* passed into the | 
 |   // callback. | 
 |   static TlsConnection* ConnectionFromSsl(const SSL* ssl); | 
 |  | 
 |  private: | 
 |   // TlsConnection implements SSL_QUIC_METHOD, which provides the interface | 
 |   // between BoringSSL's TLS stack and a QUIC implementation. | 
 |   static const SSL_QUIC_METHOD kSslQuicMethod; | 
 |  | 
 |   // The following static functions make up the members of kSslQuicMethod: | 
 |   static int SetEncryptionSecretCallback(SSL* ssl, | 
 |                                          enum ssl_encryption_level_t level, | 
 |                                          const uint8_t* read_key, | 
 |                                          const uint8_t* write_key, | 
 |                                          size_t key_length); | 
 |   static int WriteMessageCallback(SSL* ssl, | 
 |                                   enum ssl_encryption_level_t level, | 
 |                                   const uint8_t* data, | 
 |                                   size_t len); | 
 |   static int FlushFlightCallback(SSL* ssl); | 
 |   static int SendAlertCallback(SSL* ssl, | 
 |                                enum ssl_encryption_level_t level, | 
 |                                uint8_t desc); | 
 |  | 
 |   Delegate* delegate_; | 
 |   bssl::UniquePtr<SSL> ssl_; | 
 | }; | 
 |  | 
 | }  // namespace quic | 
 |  | 
 | #endif  // QUICHE_QUIC_CORE_CRYPTO_TLS_CONNECTION_H_ |