QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
QUICHE team | 5be974e | 2020-12-29 18:35:24 -0500 | [diff] [blame] | 5 | #include "quic/core/quic_crypto_client_handshaker.h" |
dschinazi | 580d30b | 2019-04-26 15:05:20 -0700 | [diff] [blame] | 6 | |
bnc | 463f235 | 2019-10-10 04:49:34 -0700 | [diff] [blame] | 7 | #include <utility> |
| 8 | |
vasilvv | c872ee4 | 2020-10-07 19:50:22 -0700 | [diff] [blame] | 9 | #include "absl/strings/string_view.h" |
QUICHE team | 5be974e | 2020-12-29 18:35:24 -0500 | [diff] [blame] | 10 | #include "quic/core/proto/crypto_server_config_proto.h" |
| 11 | #include "quic/platform/api/quic_test.h" |
| 12 | #include "quic/test_tools/quic_test_utils.h" |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 13 | |
| 14 | namespace quic { |
| 15 | namespace { |
| 16 | |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 17 | class TestProofHandler : public QuicCryptoClientStream::ProofHandler { |
| 18 | public: |
| 19 | ~TestProofHandler() override {} |
| 20 | void OnProofValid( |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 21 | const QuicCryptoClientConfig::CachedState& /*cached*/) override {} |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 22 | void OnProofVerifyDetailsAvailable( |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 23 | const ProofVerifyDetails& /*verify_details*/) override {} |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 24 | }; |
| 25 | |
| 26 | class InsecureProofVerifier : public ProofVerifier { |
| 27 | public: |
| 28 | InsecureProofVerifier() {} |
| 29 | ~InsecureProofVerifier() override {} |
| 30 | |
| 31 | // ProofVerifier override. |
| 32 | QuicAsyncStatus VerifyProof( |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 33 | const std::string& /*hostname*/, |
| 34 | const uint16_t /*port*/, |
| 35 | const std::string& /*server_config*/, |
| 36 | QuicTransportVersion /*transport_version*/, |
vasilvv | c872ee4 | 2020-10-07 19:50:22 -0700 | [diff] [blame] | 37 | absl::string_view /*chlo_hash*/, |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 38 | const std::vector<std::string>& /*certs*/, |
| 39 | const std::string& /*cert_sct*/, |
| 40 | const std::string& /*signature*/, |
| 41 | const ProofVerifyContext* /*context*/, |
| 42 | std::string* /*error_details*/, |
| 43 | std::unique_ptr<ProofVerifyDetails>* /*verify_details*/, |
| 44 | std::unique_ptr<ProofVerifierCallback> /*callback*/) override { |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 45 | return QUIC_SUCCESS; |
| 46 | } |
| 47 | |
| 48 | QuicAsyncStatus VerifyCertChain( |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 49 | const std::string& /*hostname*/, |
nharper | 5ab78c8 | 2020-06-05 15:03:44 -0700 | [diff] [blame] | 50 | const uint16_t /*port*/, |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 51 | const std::vector<std::string>& /*certs*/, |
| 52 | const std::string& /*ocsp_response*/, |
| 53 | const std::string& /*cert_sct*/, |
| 54 | const ProofVerifyContext* /*context*/, |
| 55 | std::string* /*error_details*/, |
| 56 | std::unique_ptr<ProofVerifyDetails>* /*details*/, |
nharper | 54fc9ab | 2020-11-12 11:07:39 -0800 | [diff] [blame] | 57 | uint8_t* /*out_alert*/, |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 58 | std::unique_ptr<ProofVerifierCallback> /*callback*/) override { |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 59 | return QUIC_SUCCESS; |
| 60 | } |
| 61 | |
| 62 | std::unique_ptr<ProofVerifyContext> CreateDefaultContext() override { |
| 63 | return nullptr; |
| 64 | } |
| 65 | }; |
| 66 | |
| 67 | class DummyProofSource : public ProofSource { |
| 68 | public: |
| 69 | DummyProofSource() {} |
| 70 | ~DummyProofSource() override {} |
| 71 | |
| 72 | // ProofSource override. |
| 73 | void GetProof(const QuicSocketAddress& server_address, |
danzh | d1fc591 | 2020-05-01 15:29:04 -0700 | [diff] [blame] | 74 | const QuicSocketAddress& client_address, |
vasilvv | c48c871 | 2019-03-11 13:38:16 -0700 | [diff] [blame] | 75 | const std::string& hostname, |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 76 | const std::string& /*server_config*/, |
| 77 | QuicTransportVersion /*transport_version*/, |
vasilvv | c872ee4 | 2020-10-07 19:50:22 -0700 | [diff] [blame] | 78 | absl::string_view /*chlo_hash*/, |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 79 | std::unique_ptr<Callback> callback) override { |
| 80 | QuicReferenceCountedPointer<ProofSource::Chain> chain = |
danzh | d1fc591 | 2020-05-01 15:29:04 -0700 | [diff] [blame] | 81 | GetCertChain(server_address, client_address, hostname); |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 82 | QuicCryptoProof proof; |
| 83 | proof.signature = "Dummy signature"; |
| 84 | proof.leaf_cert_scts = "Dummy timestamp"; |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 85 | callback->Run(true, chain, proof, /*details=*/nullptr); |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 86 | } |
| 87 | |
| 88 | QuicReferenceCountedPointer<Chain> GetCertChain( |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 89 | const QuicSocketAddress& /*server_address*/, |
danzh | d1fc591 | 2020-05-01 15:29:04 -0700 | [diff] [blame] | 90 | const QuicSocketAddress& /*client_address*/, |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 91 | const std::string& /*hostname*/) override { |
vasilvv | c48c871 | 2019-03-11 13:38:16 -0700 | [diff] [blame] | 92 | std::vector<std::string> certs; |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 93 | certs.push_back("Dummy cert"); |
| 94 | return QuicReferenceCountedPointer<ProofSource::Chain>( |
| 95 | new ProofSource::Chain(certs)); |
| 96 | } |
| 97 | |
| 98 | void ComputeTlsSignature( |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 99 | const QuicSocketAddress& /*server_address*/, |
danzh | d1fc591 | 2020-05-01 15:29:04 -0700 | [diff] [blame] | 100 | const QuicSocketAddress& /*client_address*/, |
dschinazi | 17d4242 | 2019-06-18 16:35:07 -0700 | [diff] [blame] | 101 | const std::string& /*hostname*/, |
| 102 | uint16_t /*signature_algorit*/, |
vasilvv | c872ee4 | 2020-10-07 19:50:22 -0700 | [diff] [blame] | 103 | absl::string_view /*in*/, |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 104 | std::unique_ptr<SignatureCallback> callback) override { |
nharper | 35d6019 | 2020-03-26 12:15:47 -0700 | [diff] [blame] | 105 | callback->Run(true, "Dummy signature", /*details=*/nullptr); |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 106 | } |
nharper | 037c21b | 2020-04-23 14:41:35 -0700 | [diff] [blame] | 107 | |
nharper | 1f8289a | 2020-04-27 11:57:28 -0700 | [diff] [blame] | 108 | TicketCrypter* GetTicketCrypter() override { return nullptr; } |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 109 | }; |
| 110 | |
| 111 | class Handshaker : public QuicCryptoClientHandshaker { |
| 112 | public: |
| 113 | Handshaker(const QuicServerId& server_id, |
| 114 | QuicCryptoClientStream* stream, |
| 115 | QuicSession* session, |
| 116 | std::unique_ptr<ProofVerifyContext> verify_context, |
| 117 | QuicCryptoClientConfig* crypto_config, |
| 118 | QuicCryptoClientStream::ProofHandler* proof_handler) |
| 119 | : QuicCryptoClientHandshaker(server_id, |
| 120 | stream, |
| 121 | session, |
| 122 | std::move(verify_context), |
| 123 | crypto_config, |
| 124 | proof_handler) {} |
| 125 | |
| 126 | void DoSendCHLOTest(QuicCryptoClientConfig::CachedState* cached) { |
| 127 | QuicCryptoClientHandshaker::DoSendCHLO(cached); |
| 128 | } |
| 129 | }; |
| 130 | |
dschinazi | e7b5ae4 | 2020-03-31 14:34:45 -0700 | [diff] [blame] | 131 | class QuicCryptoClientHandshakerTest |
| 132 | : public QuicTestWithParam<ParsedQuicVersion> { |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 133 | protected: |
| 134 | QuicCryptoClientHandshakerTest() |
dschinazi | e7b5ae4 | 2020-03-31 14:34:45 -0700 | [diff] [blame] | 135 | : version_(GetParam()), |
| 136 | proof_handler_(), |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 137 | helper_(), |
| 138 | alarm_factory_(), |
| 139 | server_id_("host", 123), |
| 140 | connection_(new test::MockQuicConnection(&helper_, |
| 141 | &alarm_factory_, |
dschinazi | e7b5ae4 | 2020-03-31 14:34:45 -0700 | [diff] [blame] | 142 | Perspective::IS_CLIENT, |
| 143 | {version_})), |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 144 | session_(connection_, false), |
vasilvv | 0fc587f | 2019-09-06 13:33:08 -0700 | [diff] [blame] | 145 | crypto_client_config_(std::make_unique<InsecureProofVerifier>()), |
renjietang | bcc066a | 2020-04-21 18:05:57 -0700 | [diff] [blame] | 146 | client_stream_( |
| 147 | new QuicCryptoClientStream(server_id_, |
| 148 | &session_, |
| 149 | nullptr, |
| 150 | &crypto_client_config_, |
| 151 | &proof_handler_, |
| 152 | /*has_application_state = */ false)), |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 153 | handshaker_(server_id_, |
| 154 | client_stream_, |
| 155 | &session_, |
| 156 | nullptr, |
| 157 | &crypto_client_config_, |
| 158 | &proof_handler_), |
| 159 | state_() { |
| 160 | // Session takes the ownership of the client stream! (but handshaker also |
| 161 | // takes a reference to it, but doesn't take the ownership). |
| 162 | session_.SetCryptoStream(client_stream_); |
| 163 | session_.Initialize(); |
| 164 | } |
| 165 | |
| 166 | void InitializeServerParametersToEnableFullHello() { |
| 167 | QuicCryptoServerConfig::ConfigOptions options; |
QUICHE team | bbaa8be | 2019-03-21 12:54:17 -0700 | [diff] [blame] | 168 | QuicServerConfigProtobuf config = QuicCryptoServerConfig::GenerateConfig( |
| 169 | helper_.GetRandomGenerator(), helper_.GetClock(), options); |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 170 | state_.Initialize( |
QUICHE team | bbaa8be | 2019-03-21 12:54:17 -0700 | [diff] [blame] | 171 | config.config(), "sourcetoken", std::vector<std::string>{"Dummy cert"}, |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 172 | "", "chlo_hash", "signature", helper_.GetClock()->WallNow(), |
| 173 | helper_.GetClock()->WallNow().Add(QuicTime::Delta::FromSeconds(30))); |
| 174 | |
| 175 | state_.SetProofValid(); |
| 176 | } |
| 177 | |
dschinazi | e7b5ae4 | 2020-03-31 14:34:45 -0700 | [diff] [blame] | 178 | ParsedQuicVersion version_; |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 179 | TestProofHandler proof_handler_; |
| 180 | test::MockQuicConnectionHelper helper_; |
| 181 | test::MockAlarmFactory alarm_factory_; |
| 182 | QuicServerId server_id_; |
| 183 | // Session takes the ownership of the connection. |
| 184 | test::MockQuicConnection* connection_; |
| 185 | test::MockQuicSession session_; |
| 186 | QuicCryptoClientConfig crypto_client_config_; |
| 187 | QuicCryptoClientStream* client_stream_; |
| 188 | Handshaker handshaker_; |
| 189 | QuicCryptoClientConfig::CachedState state_; |
| 190 | }; |
| 191 | |
dschinazi | e7b5ae4 | 2020-03-31 14:34:45 -0700 | [diff] [blame] | 192 | INSTANTIATE_TEST_SUITE_P( |
| 193 | QuicCryptoClientHandshakerTests, |
| 194 | QuicCryptoClientHandshakerTest, |
| 195 | ::testing::ValuesIn(AllSupportedVersionsWithQuicCrypto()), |
| 196 | ::testing::PrintToStringParamName()); |
| 197 | |
| 198 | TEST_P(QuicCryptoClientHandshakerTest, TestSendFullPaddingInInchoateHello) { |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 199 | handshaker_.DoSendCHLOTest(&state_); |
| 200 | |
| 201 | EXPECT_TRUE(connection_->fully_pad_during_crypto_handshake()); |
| 202 | } |
| 203 | |
dschinazi | e7b5ae4 | 2020-03-31 14:34:45 -0700 | [diff] [blame] | 204 | TEST_P(QuicCryptoClientHandshakerTest, TestDisabledPaddingInInchoateHello) { |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 205 | crypto_client_config_.set_pad_inchoate_hello(false); |
| 206 | handshaker_.DoSendCHLOTest(&state_); |
| 207 | EXPECT_FALSE(connection_->fully_pad_during_crypto_handshake()); |
| 208 | } |
| 209 | |
dschinazi | e7b5ae4 | 2020-03-31 14:34:45 -0700 | [diff] [blame] | 210 | TEST_P(QuicCryptoClientHandshakerTest, |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 211 | TestPaddingInFullHelloEvenIfInchoateDisabled) { |
| 212 | // Disable inchoate, but full hello should still be padded. |
| 213 | crypto_client_config_.set_pad_inchoate_hello(false); |
| 214 | |
| 215 | InitializeServerParametersToEnableFullHello(); |
| 216 | |
| 217 | handshaker_.DoSendCHLOTest(&state_); |
| 218 | EXPECT_TRUE(connection_->fully_pad_during_crypto_handshake()); |
| 219 | } |
| 220 | |
dschinazi | e7b5ae4 | 2020-03-31 14:34:45 -0700 | [diff] [blame] | 221 | TEST_P(QuicCryptoClientHandshakerTest, TestNoPaddingInFullHelloWhenDisabled) { |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 222 | crypto_client_config_.set_pad_full_hello(false); |
| 223 | |
| 224 | InitializeServerParametersToEnableFullHello(); |
| 225 | |
| 226 | handshaker_.DoSendCHLOTest(&state_); |
| 227 | EXPECT_FALSE(connection_->fully_pad_during_crypto_handshake()); |
| 228 | } |
| 229 | |
| 230 | } // namespace |
| 231 | } // namespace quic |