| // Copyright (c) 2017 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef QUICHE_QUIC_CORE_TLS_HANDSHAKER_H_ |
| #define QUICHE_QUIC_CORE_TLS_HANDSHAKER_H_ |
| |
| #include "absl/strings/string_view.h" |
| #include "third_party/boringssl/src/include/openssl/base.h" |
| #include "third_party/boringssl/src/include/openssl/ssl.h" |
| #include "quic/core/crypto/crypto_handshake.h" |
| #include "quic/core/crypto/crypto_message_parser.h" |
| #include "quic/core/crypto/proof_verifier.h" |
| #include "quic/core/crypto/quic_decrypter.h" |
| #include "quic/core/crypto/quic_encrypter.h" |
| #include "quic/core/crypto/tls_connection.h" |
| #include "quic/core/quic_session.h" |
| #include "quic/platform/api/quic_export.h" |
| #include "quic/platform/api/quic_flags.h" |
| |
| namespace quic { |
| |
| class QuicCryptoStream; |
| |
| // Base class for TlsClientHandshaker and TlsServerHandshaker. TlsHandshaker |
| // provides functionality common to both the client and server, such as moving |
| // messages between the TLS stack and the QUIC crypto stream, and handling |
| // derivation of secrets. |
| class QUIC_EXPORT_PRIVATE TlsHandshaker : public TlsConnection::Delegate, |
| public CryptoMessageParser { |
| public: |
| // TlsHandshaker does not take ownership of any of its arguments; they must |
| // outlive the TlsHandshaker. |
| TlsHandshaker(QuicCryptoStream* stream, QuicSession* session); |
| TlsHandshaker(const TlsHandshaker&) = delete; |
| TlsHandshaker& operator=(const TlsHandshaker&) = delete; |
| |
| ~TlsHandshaker() override; |
| |
| // From CryptoMessageParser |
| bool ProcessInput(absl::string_view input, EncryptionLevel level) override; |
| size_t InputBytesRemaining() const override { return 0; } |
| QuicErrorCode error() const override { return parser_error_; } |
| const std::string& error_detail() const override { |
| return parser_error_detail_; |
| } |
| |
| // The following methods provide implementations to subclasses of |
| // TlsHandshaker which use them to implement methods of QuicCryptoStream. |
| CryptoMessageParser* crypto_message_parser() { return this; } |
| size_t BufferSizeLimitForLevel(EncryptionLevel level) const; |
| ssl_early_data_reason_t EarlyDataReason() const; |
| std::unique_ptr<QuicDecrypter> AdvanceKeysAndCreateCurrentOneRttDecrypter(); |
| std::unique_ptr<QuicEncrypter> CreateCurrentOneRttEncrypter(); |
| virtual HandshakeState GetHandshakeState() const = 0; |
| |
| protected: |
| // Called when a new message is received on the crypto stream and is available |
| // for the TLS stack to read. |
| virtual void AdvanceHandshake(); |
| |
| void CloseConnection(QuicErrorCode error, const std::string& reason_phrase); |
| // Closes the connection, specifying the wire error code |ietf_error| |
| // explicitly. |
| void CloseConnection(QuicErrorCode error, |
| QuicIetfTransportErrorCodes ietf_error, |
| const std::string& reason_phrase); |
| |
| void OnConnectionClosed(QuicErrorCode error, ConnectionCloseSource source); |
| |
| bool is_connection_closed() const { return is_connection_closed_; } |
| |
| // Called when |SSL_do_handshake| returns 1, indicating that the handshake has |
| // finished. Note that a handshake only finishes once, entering early data |
| // does not count. |
| virtual void FinishHandshake() = 0; |
| |
| // Called when |SSL_do_handshake| returns 1 and the connection is in early |
| // data. In that case, |AdvanceHandshake| will call |OnEnterEarlyData| and |
| // retry |SSL_do_handshake| once. |
| virtual void OnEnterEarlyData() { |
| // By default, do nothing but check the preconditions. |
| QUICHE_DCHECK(SSL_in_early_data(ssl())); |
| } |
| |
| // Called when a handshake message is received after the handshake is |
| // complete. |
| virtual void ProcessPostHandshakeMessage() = 0; |
| |
| // Called when an unexpected error code is received from |SSL_get_error|. If a |
| // subclass can expect more than just a single error (as provided by |
| // |set_expected_ssl_error|), it can override this method to handle that case. |
| virtual bool ShouldCloseConnectionOnUnexpectedError(int ssl_error); |
| |
| void set_expected_ssl_error(int ssl_error) { |
| expected_ssl_error_ = ssl_error; |
| } |
| int expected_ssl_error() const { return expected_ssl_error_; } |
| |
| // Called to verify a cert chain. This is a simple wrapper around |
| // ProofVerifier or ServerProofVerifier, which optionally gathers additional |
| // arguments to pass into their VerifyCertChain method. This class retains a |
| // non-owning pointer to |callback|; the callback must live until this |
| // function returns QUIC_SUCCESS or QUIC_FAILURE, or until the callback is |
| // run. |
| // |
| // If certificate verification fails, |*out_alert| may be set to a TLS alert |
| // that will be sent when closing the connection; it defaults to |
| // certificate_unknown. Implementations of VerifyCertChain may retain the |
| // |out_alert| pointer while performing an async operation. |
| virtual QuicAsyncStatus VerifyCertChain( |
| const std::vector<std::string>& certs, |
| std::string* error_details, |
| std::unique_ptr<ProofVerifyDetails>* details, |
| uint8_t* out_alert, |
| std::unique_ptr<ProofVerifierCallback> callback) = 0; |
| // Called when certificate verification is completed. |
| virtual void OnProofVerifyDetailsAvailable( |
| const ProofVerifyDetails& verify_details) = 0; |
| |
| // Returns the PRF used by the cipher suite negotiated in the TLS handshake. |
| const EVP_MD* Prf(const SSL_CIPHER* cipher); |
| |
| virtual const TlsConnection* tls_connection() const = 0; |
| |
| SSL* ssl() const { return tls_connection()->ssl(); } |
| |
| QuicCryptoStream* stream() { return stream_; } |
| HandshakerDelegateInterface* handshaker_delegate() { |
| return handshaker_delegate_; |
| } |
| |
| enum ssl_verify_result_t VerifyCert(uint8_t* out_alert) override; |
| |
| // SetWriteSecret provides the encryption secret used to encrypt messages at |
| // encryption level |level|. The secret provided here is the one from the TLS |
| // 1.3 key schedule (RFC 8446 section 7.1), in particular the handshake |
| // traffic secrets and application traffic secrets. The provided write secret |
| // must be used with the provided cipher suite |cipher|. |
| void SetWriteSecret(EncryptionLevel level, |
| const SSL_CIPHER* cipher, |
| const std::vector<uint8_t>& write_secret) override; |
| |
| // SetReadSecret is similar to SetWriteSecret, except that it is used for |
| // decrypting messages. SetReadSecret at a particular level is always called |
| // after SetWriteSecret for that level, except for ENCRYPTION_ZERO_RTT, where |
| // the EncryptionLevel for SetWriteSecret is ENCRYPTION_FORWARD_SECURE. |
| bool SetReadSecret(EncryptionLevel level, |
| const SSL_CIPHER* cipher, |
| const std::vector<uint8_t>& read_secret) override; |
| |
| // WriteMessage is called when there is |data| from the TLS stack ready for |
| // the QUIC stack to write in a crypto frame. The data must be transmitted at |
| // encryption level |level|. |
| void WriteMessage(EncryptionLevel level, absl::string_view data) override; |
| |
| // FlushFlight is called to signal that the current flight of |
| // messages have all been written (via calls to WriteMessage) and can be |
| // flushed to the underlying transport. |
| void FlushFlight() override; |
| |
| // SendAlert causes this TlsHandshaker to close the QUIC connection with an |
| // error code corresponding to the TLS alert description |desc|. |
| void SendAlert(EncryptionLevel level, uint8_t desc) override; |
| |
| private: |
| // ProofVerifierCallbackImpl handles the result of an asynchronous certificate |
| // verification operation. |
| class QUIC_EXPORT_PRIVATE ProofVerifierCallbackImpl |
| : public ProofVerifierCallback { |
| public: |
| explicit ProofVerifierCallbackImpl(TlsHandshaker* parent); |
| ~ProofVerifierCallbackImpl() override; |
| |
| // ProofVerifierCallback interface. |
| void Run(bool ok, |
| const std::string& error_details, |
| std::unique_ptr<ProofVerifyDetails>* details) override; |
| |
| // If called, Cancel causes the pending callback to be a no-op. |
| void Cancel(); |
| |
| private: |
| // Non-owning pointer to the TlsHandshaker responsible for this callback. |
| // |parent_| must be valid for the life of this callback or until |Cancel| |
| // is called. |
| TlsHandshaker* parent_; |
| }; |
| |
| // ProofVerifierCallback used for async certificate verification. Ownership of |
| // this object is transferred to |VerifyCertChain|; |
| ProofVerifierCallbackImpl* proof_verify_callback_ = nullptr; |
| std::unique_ptr<ProofVerifyDetails> verify_details_; |
| enum ssl_verify_result_t verify_result_ = ssl_verify_retry; |
| uint8_t cert_verify_tls_alert_ = SSL_AD_CERTIFICATE_UNKNOWN; |
| std::string cert_verify_error_details_; |
| |
| int expected_ssl_error_ = SSL_ERROR_WANT_READ; |
| bool is_connection_closed_ = false; |
| |
| QuicCryptoStream* stream_; |
| HandshakerDelegateInterface* handshaker_delegate_; |
| |
| QuicErrorCode parser_error_ = QUIC_NO_ERROR; |
| std::string parser_error_detail_; |
| |
| // The most recently derived 1-RTT read and write secrets, which are updated |
| // on each key update. |
| std::vector<uint8_t> latest_read_secret_; |
| std::vector<uint8_t> latest_write_secret_; |
| // 1-RTT header protection keys, which are not changed during key update. |
| std::vector<uint8_t> one_rtt_read_header_protection_key_; |
| std::vector<uint8_t> one_rtt_write_header_protection_key_; |
| }; |
| |
| } // namespace quic |
| |
| #endif // QUICHE_QUIC_CORE_TLS_HANDSHAKER_H_ |