blob: 78d2f10a56325ef7d763ec965a6aa3c83b5c6600 [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
QUICHE team5be974e2020-12-29 18:35:24 -05005#include "quic/core/quic_crypto_client_stream.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -05006
7#include <memory>
vasilvv872e7a32019-03-12 16:42:44 -07008#include <string>
bnc463f2352019-10-10 04:49:34 -07009#include <utility>
QUICHE teama6ef0a62019-03-07 20:34:33 -050010
QUICHE team5be974e2020-12-29 18:35:24 -050011#include "quic/core/crypto/crypto_protocol.h"
12#include "quic/core/crypto/crypto_utils.h"
13#include "quic/core/crypto/null_encrypter.h"
14#include "quic/core/crypto/quic_crypto_client_config.h"
15#include "quic/core/quic_crypto_client_handshaker.h"
16#include "quic/core/quic_packets.h"
17#include "quic/core/quic_session.h"
18#include "quic/core/quic_utils.h"
19#include "quic/core/tls_client_handshaker.h"
20#include "quic/platform/api/quic_flags.h"
21#include "quic/platform/api/quic_logging.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050022
23namespace quic {
24
25const int QuicCryptoClientStream::kMaxClientHellos;
26
27QuicCryptoClientStreamBase::QuicCryptoClientStreamBase(QuicSession* session)
28 : QuicCryptoStream(session) {}
29
30QuicCryptoClientStream::QuicCryptoClientStream(
31 const QuicServerId& server_id,
32 QuicSession* session,
33 std::unique_ptr<ProofVerifyContext> verify_context,
34 QuicCryptoClientConfig* crypto_config,
renjietangbcc066a2020-04-21 18:05:57 -070035 ProofHandler* proof_handler,
36 bool has_application_state)
QUICHE teama6ef0a62019-03-07 20:34:33 -050037 : QuicCryptoClientStreamBase(session) {
vasilvvf8035162021-02-01 14:49:14 -080038 QUICHE_DCHECK_EQ(Perspective::IS_CLIENT,
39 session->connection()->perspective());
QUICHE teama6ef0a62019-03-07 20:34:33 -050040 switch (session->connection()->version().handshake_protocol) {
41 case PROTOCOL_QUIC_CRYPTO:
vasilvv0fc587f2019-09-06 13:33:08 -070042 handshaker_ = std::make_unique<QuicCryptoClientHandshaker>(
QUICHE teama6ef0a62019-03-07 20:34:33 -050043 server_id, this, session, std::move(verify_context), crypto_config,
44 proof_handler);
45 break;
46 case PROTOCOL_TLS1_3:
vasilvv0fc587f2019-09-06 13:33:08 -070047 handshaker_ = std::make_unique<TlsClientHandshaker>(
nharperdf7a77b2019-11-11 13:12:45 -080048 server_id, this, session, std::move(verify_context), crypto_config,
renjietangbcc066a2020-04-21 18:05:57 -070049 proof_handler, has_application_state);
QUICHE teama6ef0a62019-03-07 20:34:33 -050050 break;
51 case PROTOCOL_UNSUPPORTED:
QUICHE team60aff822021-03-16 15:21:02 -070052 QUIC_BUG(quic_bug_10296_1)
QUICHE team5c9cddc2021-03-09 15:52:30 -080053 << "Attempting to create QuicCryptoClientStream for unknown "
54 "handshake protocol";
QUICHE teama6ef0a62019-03-07 20:34:33 -050055 }
56}
57
58QuicCryptoClientStream::~QuicCryptoClientStream() {}
59
60bool QuicCryptoClientStream::CryptoConnect() {
61 return handshaker_->CryptoConnect();
62}
63
64int QuicCryptoClientStream::num_sent_client_hellos() const {
65 return handshaker_->num_sent_client_hellos();
66}
67
nharper02703962019-11-07 12:23:13 -080068bool QuicCryptoClientStream::IsResumption() const {
69 return handshaker_->IsResumption();
70}
71
nharper4084fc92020-02-10 14:43:35 -080072bool QuicCryptoClientStream::EarlyDataAccepted() const {
73 return handshaker_->EarlyDataAccepted();
74}
75
nharper26e3e882020-09-09 12:30:55 -070076ssl_early_data_reason_t QuicCryptoClientStream::EarlyDataReason() const {
77 return handshaker_->EarlyDataReason();
78}
79
nharper4084fc92020-02-10 14:43:35 -080080bool QuicCryptoClientStream::ReceivedInchoateReject() const {
81 return handshaker_->ReceivedInchoateReject();
82}
83
QUICHE teama6ef0a62019-03-07 20:34:33 -050084int QuicCryptoClientStream::num_scup_messages_received() const {
85 return handshaker_->num_scup_messages_received();
86}
87
88bool QuicCryptoClientStream::encryption_established() const {
89 return handshaker_->encryption_established();
90}
91
fayang685367a2020-01-14 10:40:15 -080092bool QuicCryptoClientStream::one_rtt_keys_available() const {
93 return handshaker_->one_rtt_keys_available();
QUICHE teama6ef0a62019-03-07 20:34:33 -050094}
95
96const QuicCryptoNegotiatedParameters&
97QuicCryptoClientStream::crypto_negotiated_params() const {
98 return handshaker_->crypto_negotiated_params();
99}
100
101CryptoMessageParser* QuicCryptoClientStream::crypto_message_parser() {
102 return handshaker_->crypto_message_parser();
103}
104
fayang9a863cf2020-01-16 14:12:11 -0800105HandshakeState QuicCryptoClientStream::GetHandshakeState() const {
106 return handshaker_->GetHandshakeState();
107}
108
nharper486a8a92019-08-28 16:25:10 -0700109size_t QuicCryptoClientStream::BufferSizeLimitForLevel(
110 EncryptionLevel level) const {
111 return handshaker_->BufferSizeLimitForLevel(level);
112}
113
mattm072a7e32020-10-09 16:16:56 -0700114bool QuicCryptoClientStream::KeyUpdateSupportedLocally() const {
115 return handshaker_->KeyUpdateSupportedLocally();
116}
117
118std::unique_ptr<QuicDecrypter>
119QuicCryptoClientStream::AdvanceKeysAndCreateCurrentOneRttDecrypter() {
120 return handshaker_->AdvanceKeysAndCreateCurrentOneRttDecrypter();
121}
122
123std::unique_ptr<QuicEncrypter>
124QuicCryptoClientStream::CreateCurrentOneRttEncrypter() {
125 return handshaker_->CreateCurrentOneRttEncrypter();
126}
127
vasilvvc48c8712019-03-11 13:38:16 -0700128std::string QuicCryptoClientStream::chlo_hash() const {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500129 return handshaker_->chlo_hash();
130}
131
fayang2f2915d2020-01-24 06:47:15 -0800132void QuicCryptoClientStream::OnOneRttPacketAcknowledged() {
133 handshaker_->OnOneRttPacketAcknowledged();
134}
135
fayang44ae4e92020-04-28 13:09:42 -0700136void QuicCryptoClientStream::OnHandshakePacketSent() {
137 handshaker_->OnHandshakePacketSent();
138}
139
fayanga6a85a82020-05-04 08:58:53 -0700140void QuicCryptoClientStream::OnConnectionClosed(QuicErrorCode error,
141 ConnectionCloseSource source) {
142 handshaker_->OnConnectionClosed(error, source);
143}
144
fayang01062942020-01-22 07:23:23 -0800145void QuicCryptoClientStream::OnHandshakeDoneReceived() {
146 handshaker_->OnHandshakeDoneReceived();
147}
148
fayang133b8682020-12-08 05:50:33 -0800149void QuicCryptoClientStream::OnNewTokenReceived(absl::string_view token) {
150 handshaker_->OnNewTokenReceived(token);
151}
152
153std::string QuicCryptoClientStream::GetAddressToken() const {
vasilvvf8035162021-02-01 14:49:14 -0800154 QUICHE_DCHECK(false);
fayang133b8682020-12-08 05:50:33 -0800155 return "";
156}
157
158bool QuicCryptoClientStream::ValidateAddressToken(
159 absl::string_view /*token*/) const {
vasilvvf8035162021-02-01 14:49:14 -0800160 QUICHE_DCHECK(false);
fayang133b8682020-12-08 05:50:33 -0800161 return false;
162}
163
nharperac52a862020-06-08 12:41:06 -0700164void QuicCryptoClientStream::SetServerApplicationStateForResumption(
renjietangf21e3852020-04-13 15:45:39 -0700165 std::unique_ptr<ApplicationState> application_state) {
nharperac52a862020-06-08 12:41:06 -0700166 handshaker_->SetServerApplicationStateForResumption(
167 std::move(application_state));
renjietangf21e3852020-04-13 15:45:39 -0700168}
169
QUICHE teama6ef0a62019-03-07 20:34:33 -0500170} // namespace quic