blob: dc7b973f1139cff199ab2be4377da333a9bffda7 [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2017 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/quartc/quartc_crypto_helpers.h"
6#include "net/third_party/quiche/src/quic/core/quic_utils.h"
7#include "net/third_party/quiche/src/quic/core/tls_client_handshaker.h"
8#include "net/third_party/quiche/src/quic/core/tls_server_handshaker.h"
9
10namespace quic {
11
12void DummyProofSource::GetProof(const QuicSocketAddress& server_address,
vasilvvc48c8712019-03-11 13:38:16 -070013 const std::string& hostname,
14 const std::string& server_config,
QUICHE teama6ef0a62019-03-07 20:34:33 -050015 QuicTransportVersion transport_version,
16 QuicStringPiece chlo_hash,
17 std::unique_ptr<Callback> callback) {
18 QuicReferenceCountedPointer<ProofSource::Chain> chain =
19 GetCertChain(server_address, hostname);
20 QuicCryptoProof proof;
21 proof.signature = "Dummy signature";
22 proof.leaf_cert_scts = "Dummy timestamp";
23 callback->Run(true, chain, proof, nullptr /* details */);
24}
25
26QuicReferenceCountedPointer<DummyProofSource::Chain>
27DummyProofSource::GetCertChain(const QuicSocketAddress& server_address,
vasilvvc48c8712019-03-11 13:38:16 -070028 const std::string& hostname) {
29 std::vector<std::string> certs;
QUICHE teama6ef0a62019-03-07 20:34:33 -050030 certs.push_back(kDummyCertName);
31 return QuicReferenceCountedPointer<ProofSource::Chain>(
32 new ProofSource::Chain(certs));
33}
34
35void DummyProofSource::ComputeTlsSignature(
36 const QuicSocketAddress& server_address,
vasilvvc48c8712019-03-11 13:38:16 -070037 const std::string& hostname,
QUICHE teama6ef0a62019-03-07 20:34:33 -050038 uint16_t signature_algorithm,
39 QuicStringPiece in,
40 std::unique_ptr<SignatureCallback> callback) {
41 callback->Run(true, "Dummy signature");
42}
43
44QuicAsyncStatus InsecureProofVerifier::VerifyProof(
vasilvvc48c8712019-03-11 13:38:16 -070045 const std::string& hostname,
QUICHE teama6ef0a62019-03-07 20:34:33 -050046 const uint16_t port,
vasilvvc48c8712019-03-11 13:38:16 -070047 const std::string& server_config,
QUICHE teama6ef0a62019-03-07 20:34:33 -050048 QuicTransportVersion transport_version,
49 QuicStringPiece chlo_hash,
vasilvvc48c8712019-03-11 13:38:16 -070050 const std::vector<std::string>& certs,
51 const std::string& cert_sct,
52 const std::string& signature,
QUICHE teama6ef0a62019-03-07 20:34:33 -050053 const ProofVerifyContext* context,
vasilvvc48c8712019-03-11 13:38:16 -070054 std::string* error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -050055 std::unique_ptr<ProofVerifyDetails>* verify_details,
56 std::unique_ptr<ProofVerifierCallback> callback) {
57 return QUIC_SUCCESS;
58}
59
60QuicAsyncStatus InsecureProofVerifier::VerifyCertChain(
vasilvvc48c8712019-03-11 13:38:16 -070061 const std::string& hostname,
62 const std::vector<std::string>& certs,
QUICHE team38c190b2019-05-08 09:12:01 -070063 const std::string& ocsp_response,
64 const std::string& cert_sct,
QUICHE teama6ef0a62019-03-07 20:34:33 -050065 const ProofVerifyContext* context,
vasilvvc48c8712019-03-11 13:38:16 -070066 std::string* error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -050067 std::unique_ptr<ProofVerifyDetails>* details,
68 std::unique_ptr<ProofVerifierCallback> callback) {
69 return QUIC_SUCCESS;
70}
71
72std::unique_ptr<ProofVerifyContext>
73InsecureProofVerifier::CreateDefaultContext() {
74 return nullptr;
75}
76
77QuicConnectionId QuartcCryptoServerStreamHelper::GenerateConnectionIdForReject(
78 QuicTransportVersion version,
79 QuicConnectionId connection_id) const {
80 // TODO(b/124399417): Request a zero-length connection id here when the QUIC
wub4ca3d672019-06-12 08:27:17 -070081 // server perspective supports it.
QUICHE teama6ef0a62019-03-07 20:34:33 -050082 return QuicUtils::CreateRandomConnectionId();
83}
84
85bool QuartcCryptoServerStreamHelper::CanAcceptClientHello(
86 const CryptoHandshakeMessage& message,
87 const QuicSocketAddress& client_address,
88 const QuicSocketAddress& peer_address,
89 const QuicSocketAddress& self_address,
vasilvvc48c8712019-03-11 13:38:16 -070090 std::string* error_details) const {
QUICHE teama6ef0a62019-03-07 20:34:33 -050091 return true;
92}
93
94std::unique_ptr<QuicCryptoClientConfig> CreateCryptoClientConfig(
95 QuicStringPiece pre_shared_key) {
96 auto config = QuicMakeUnique<QuicCryptoClientConfig>(
97 QuicMakeUnique<InsecureProofVerifier>(),
98 TlsClientHandshaker::CreateSslCtx());
99 config->set_pad_inchoate_hello(false);
100 config->set_pad_full_hello(false);
101 if (!pre_shared_key.empty()) {
102 config->set_pre_shared_key(pre_shared_key);
103 }
104 return config;
105}
106
107CryptoServerConfig CreateCryptoServerConfig(QuicRandom* random,
108 const QuicClock* clock,
109 QuicStringPiece pre_shared_key) {
110 CryptoServerConfig crypto_server_config;
111
112 // Generate a random source address token secret. For long-running servers
113 // it's better to not regenerate it for each connection to enable zero-RTT
114 // handshakes, but for transient clients it does not matter.
115 char source_address_token_secret[kInputKeyingMaterialLength];
116 random->RandBytes(source_address_token_secret, kInputKeyingMaterialLength);
117 auto config = QuicMakeUnique<QuicCryptoServerConfig>(
vasilvvc48c8712019-03-11 13:38:16 -0700118 std::string(source_address_token_secret, kInputKeyingMaterialLength),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500119 random, QuicMakeUnique<DummyProofSource>(), KeyExchangeSource::Default(),
120 TlsServerHandshaker::CreateSslCtx());
121
122 // We run QUIC over ICE, and ICE is verifying remote side with STUN pings.
123 // We disable source address token validation in order to allow for 0-rtt
124 // setup (plus source ip addresses are changing even during the connection
125 // when ICE is used).
126 config->set_validate_source_address_token(false);
127
128 // Effectively disables the anti-amplification measures (we don't need
129 // them because we use ICE, and we need to disable them because we disable
130 // padding of crypto packets).
131 // This multiplier must be large enough so that the crypto handshake packet
132 // (approx. 300 bytes) multiplied by this multiplier is larger than a fully
133 // sized packet (currently 1200 bytes).
134 // 1500 is a bit extreme: if you can imagine sending a 1 byte packet, and
135 // your largest MTU would be below 1500 bytes, 1500*1 >=
136 // any_packet_that_you_can_imagine_sending.
137 // (again, we hardcode packet size to 1200, so we are not dealing with jumbo
138 // frames).
139 config->set_chlo_multiplier(1500);
140
141 // We are sending small client hello, we must not validate its size.
142 config->set_validate_chlo_size(false);
143
144 // Provide server with serialized config string to prove ownership.
145 QuicCryptoServerConfig::ConfigOptions options;
146 // The |message| is used to handle the return value of AddDefaultConfig
147 // which is raw pointer of the CryptoHandshakeMessage.
148 std::unique_ptr<CryptoHandshakeMessage> message(
149 config->AddDefaultConfig(random, clock, options));
150 config->set_pad_rej(false);
151 config->set_pad_shlo(false);
152 if (!pre_shared_key.empty()) {
153 config->set_pre_shared_key(pre_shared_key);
154 }
155 crypto_server_config.config = std::move(config);
156 const QuicData& data = message->GetSerialized();
157
158 crypto_server_config.serialized_crypto_config =
vasilvvc48c8712019-03-11 13:38:16 -0700159 std::string(data.data(), data.length());
QUICHE teama6ef0a62019-03-07 20:34:33 -0500160 return crypto_server_config;
161}
162
163} // namespace quic