QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
QUICHE team | 5be974e | 2020-12-29 18:35:24 -0500 | [diff] [blame] | 5 | #include "quic/core/quic_crypto_client_stream.h" |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 6 | |
| 7 | #include <memory> |
vasilvv | 872e7a3 | 2019-03-12 16:42:44 -0700 | [diff] [blame] | 8 | #include <string> |
bnc | 463f235 | 2019-10-10 04:49:34 -0700 | [diff] [blame] | 9 | #include <utility> |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 10 | |
QUICHE team | 5be974e | 2020-12-29 18:35:24 -0500 | [diff] [blame] | 11 | #include "quic/core/crypto/crypto_protocol.h" |
| 12 | #include "quic/core/crypto/crypto_utils.h" |
| 13 | #include "quic/core/crypto/null_encrypter.h" |
| 14 | #include "quic/core/crypto/quic_crypto_client_config.h" |
| 15 | #include "quic/core/quic_crypto_client_handshaker.h" |
| 16 | #include "quic/core/quic_packets.h" |
| 17 | #include "quic/core/quic_session.h" |
| 18 | #include "quic/core/quic_utils.h" |
| 19 | #include "quic/core/tls_client_handshaker.h" |
| 20 | #include "quic/platform/api/quic_flags.h" |
| 21 | #include "quic/platform/api/quic_logging.h" |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 22 | |
| 23 | namespace quic { |
| 24 | |
| 25 | const int QuicCryptoClientStream::kMaxClientHellos; |
| 26 | |
| 27 | QuicCryptoClientStreamBase::QuicCryptoClientStreamBase(QuicSession* session) |
| 28 | : QuicCryptoStream(session) {} |
| 29 | |
| 30 | QuicCryptoClientStream::QuicCryptoClientStream( |
| 31 | const QuicServerId& server_id, |
| 32 | QuicSession* session, |
| 33 | std::unique_ptr<ProofVerifyContext> verify_context, |
| 34 | QuicCryptoClientConfig* crypto_config, |
renjietang | bcc066a | 2020-04-21 18:05:57 -0700 | [diff] [blame] | 35 | ProofHandler* proof_handler, |
| 36 | bool has_application_state) |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 37 | : QuicCryptoClientStreamBase(session) { |
vasilvv | f803516 | 2021-02-01 14:49:14 -0800 | [diff] [blame] | 38 | QUICHE_DCHECK_EQ(Perspective::IS_CLIENT, |
| 39 | session->connection()->perspective()); |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 40 | switch (session->connection()->version().handshake_protocol) { |
| 41 | case PROTOCOL_QUIC_CRYPTO: |
vasilvv | 0fc587f | 2019-09-06 13:33:08 -0700 | [diff] [blame] | 42 | handshaker_ = std::make_unique<QuicCryptoClientHandshaker>( |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 43 | server_id, this, session, std::move(verify_context), crypto_config, |
| 44 | proof_handler); |
| 45 | break; |
| 46 | case PROTOCOL_TLS1_3: |
vasilvv | 0fc587f | 2019-09-06 13:33:08 -0700 | [diff] [blame] | 47 | handshaker_ = std::make_unique<TlsClientHandshaker>( |
nharper | df7a77b | 2019-11-11 13:12:45 -0800 | [diff] [blame] | 48 | server_id, this, session, std::move(verify_context), crypto_config, |
renjietang | bcc066a | 2020-04-21 18:05:57 -0700 | [diff] [blame] | 49 | proof_handler, has_application_state); |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 50 | break; |
| 51 | case PROTOCOL_UNSUPPORTED: |
QUICHE team | 60aff82 | 2021-03-16 15:21:02 -0700 | [diff] [blame] | 52 | QUIC_BUG(quic_bug_10296_1) |
QUICHE team | 5c9cddc | 2021-03-09 15:52:30 -0800 | [diff] [blame] | 53 | << "Attempting to create QuicCryptoClientStream for unknown " |
| 54 | "handshake protocol"; |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 55 | } |
| 56 | } |
| 57 | |
| 58 | QuicCryptoClientStream::~QuicCryptoClientStream() {} |
| 59 | |
| 60 | bool QuicCryptoClientStream::CryptoConnect() { |
| 61 | return handshaker_->CryptoConnect(); |
| 62 | } |
| 63 | |
| 64 | int QuicCryptoClientStream::num_sent_client_hellos() const { |
| 65 | return handshaker_->num_sent_client_hellos(); |
| 66 | } |
| 67 | |
nharper | 0270396 | 2019-11-07 12:23:13 -0800 | [diff] [blame] | 68 | bool QuicCryptoClientStream::IsResumption() const { |
| 69 | return handshaker_->IsResumption(); |
| 70 | } |
| 71 | |
nharper | 4084fc9 | 2020-02-10 14:43:35 -0800 | [diff] [blame] | 72 | bool QuicCryptoClientStream::EarlyDataAccepted() const { |
| 73 | return handshaker_->EarlyDataAccepted(); |
| 74 | } |
| 75 | |
nharper | 26e3e88 | 2020-09-09 12:30:55 -0700 | [diff] [blame] | 76 | ssl_early_data_reason_t QuicCryptoClientStream::EarlyDataReason() const { |
| 77 | return handshaker_->EarlyDataReason(); |
| 78 | } |
| 79 | |
nharper | 4084fc9 | 2020-02-10 14:43:35 -0800 | [diff] [blame] | 80 | bool QuicCryptoClientStream::ReceivedInchoateReject() const { |
| 81 | return handshaker_->ReceivedInchoateReject(); |
| 82 | } |
| 83 | |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 84 | int QuicCryptoClientStream::num_scup_messages_received() const { |
| 85 | return handshaker_->num_scup_messages_received(); |
| 86 | } |
| 87 | |
| 88 | bool QuicCryptoClientStream::encryption_established() const { |
| 89 | return handshaker_->encryption_established(); |
| 90 | } |
| 91 | |
fayang | 685367a | 2020-01-14 10:40:15 -0800 | [diff] [blame] | 92 | bool QuicCryptoClientStream::one_rtt_keys_available() const { |
| 93 | return handshaker_->one_rtt_keys_available(); |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 94 | } |
| 95 | |
| 96 | const QuicCryptoNegotiatedParameters& |
| 97 | QuicCryptoClientStream::crypto_negotiated_params() const { |
| 98 | return handshaker_->crypto_negotiated_params(); |
| 99 | } |
| 100 | |
| 101 | CryptoMessageParser* QuicCryptoClientStream::crypto_message_parser() { |
| 102 | return handshaker_->crypto_message_parser(); |
| 103 | } |
| 104 | |
fayang | 9a863cf | 2020-01-16 14:12:11 -0800 | [diff] [blame] | 105 | HandshakeState QuicCryptoClientStream::GetHandshakeState() const { |
| 106 | return handshaker_->GetHandshakeState(); |
| 107 | } |
| 108 | |
nharper | 486a8a9 | 2019-08-28 16:25:10 -0700 | [diff] [blame] | 109 | size_t QuicCryptoClientStream::BufferSizeLimitForLevel( |
| 110 | EncryptionLevel level) const { |
| 111 | return handshaker_->BufferSizeLimitForLevel(level); |
| 112 | } |
| 113 | |
mattm | 072a7e3 | 2020-10-09 16:16:56 -0700 | [diff] [blame] | 114 | bool QuicCryptoClientStream::KeyUpdateSupportedLocally() const { |
| 115 | return handshaker_->KeyUpdateSupportedLocally(); |
| 116 | } |
| 117 | |
| 118 | std::unique_ptr<QuicDecrypter> |
| 119 | QuicCryptoClientStream::AdvanceKeysAndCreateCurrentOneRttDecrypter() { |
| 120 | return handshaker_->AdvanceKeysAndCreateCurrentOneRttDecrypter(); |
| 121 | } |
| 122 | |
| 123 | std::unique_ptr<QuicEncrypter> |
| 124 | QuicCryptoClientStream::CreateCurrentOneRttEncrypter() { |
| 125 | return handshaker_->CreateCurrentOneRttEncrypter(); |
| 126 | } |
| 127 | |
vasilvv | c48c871 | 2019-03-11 13:38:16 -0700 | [diff] [blame] | 128 | std::string QuicCryptoClientStream::chlo_hash() const { |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 129 | return handshaker_->chlo_hash(); |
| 130 | } |
| 131 | |
fayang | 2f2915d | 2020-01-24 06:47:15 -0800 | [diff] [blame] | 132 | void QuicCryptoClientStream::OnOneRttPacketAcknowledged() { |
| 133 | handshaker_->OnOneRttPacketAcknowledged(); |
| 134 | } |
| 135 | |
fayang | 44ae4e9 | 2020-04-28 13:09:42 -0700 | [diff] [blame] | 136 | void QuicCryptoClientStream::OnHandshakePacketSent() { |
| 137 | handshaker_->OnHandshakePacketSent(); |
| 138 | } |
| 139 | |
fayang | a6a85a8 | 2020-05-04 08:58:53 -0700 | [diff] [blame] | 140 | void QuicCryptoClientStream::OnConnectionClosed(QuicErrorCode error, |
| 141 | ConnectionCloseSource source) { |
| 142 | handshaker_->OnConnectionClosed(error, source); |
| 143 | } |
| 144 | |
fayang | 0106294 | 2020-01-22 07:23:23 -0800 | [diff] [blame] | 145 | void QuicCryptoClientStream::OnHandshakeDoneReceived() { |
| 146 | handshaker_->OnHandshakeDoneReceived(); |
| 147 | } |
| 148 | |
fayang | 133b868 | 2020-12-08 05:50:33 -0800 | [diff] [blame] | 149 | void QuicCryptoClientStream::OnNewTokenReceived(absl::string_view token) { |
| 150 | handshaker_->OnNewTokenReceived(token); |
| 151 | } |
| 152 | |
| 153 | std::string QuicCryptoClientStream::GetAddressToken() const { |
vasilvv | f803516 | 2021-02-01 14:49:14 -0800 | [diff] [blame] | 154 | QUICHE_DCHECK(false); |
fayang | 133b868 | 2020-12-08 05:50:33 -0800 | [diff] [blame] | 155 | return ""; |
| 156 | } |
| 157 | |
| 158 | bool QuicCryptoClientStream::ValidateAddressToken( |
| 159 | absl::string_view /*token*/) const { |
vasilvv | f803516 | 2021-02-01 14:49:14 -0800 | [diff] [blame] | 160 | QUICHE_DCHECK(false); |
fayang | 133b868 | 2020-12-08 05:50:33 -0800 | [diff] [blame] | 161 | return false; |
| 162 | } |
| 163 | |
nharper | ac52a86 | 2020-06-08 12:41:06 -0700 | [diff] [blame] | 164 | void QuicCryptoClientStream::SetServerApplicationStateForResumption( |
renjietang | f21e385 | 2020-04-13 15:45:39 -0700 | [diff] [blame] | 165 | std::unique_ptr<ApplicationState> application_state) { |
nharper | ac52a86 | 2020-06-08 12:41:06 -0700 | [diff] [blame] | 166 | handshaker_->SetServerApplicationStateForResumption( |
| 167 | std::move(application_state)); |
renjietang | f21e385 | 2020-04-13 15:45:39 -0700 | [diff] [blame] | 168 | } |
| 169 | |
QUICHE team | a6ef0a6 | 2019-03-07 20:34:33 -0500 | [diff] [blame] | 170 | } // namespace quic |