blob: 12fc9a2601473ac7a9f23474861a27c01923b759 [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/core/quic_crypto_client_stream.h"
6
7#include <memory>
vasilvv872e7a32019-03-12 16:42:44 -07008#include <string>
QUICHE teama6ef0a62019-03-07 20:34:33 -05009
10#include "net/third_party/quiche/src/quic/core/crypto/aes_128_gcm_12_encrypter.h"
11#include "net/third_party/quiche/src/quic/core/crypto/quic_decrypter.h"
12#include "net/third_party/quiche/src/quic/core/crypto/quic_encrypter.h"
13#include "net/third_party/quiche/src/quic/core/quic_packets.h"
14#include "net/third_party/quiche/src/quic/core/quic_server_id.h"
15#include "net/third_party/quiche/src/quic/core/quic_utils.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050016#include "net/third_party/quiche/src/quic/platform/api/quic_arraysize.h"
17#include "net/third_party/quiche/src/quic/platform/api/quic_flags.h"
18#include "net/third_party/quiche/src/quic/platform/api/quic_ptr_util.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050019#include "net/third_party/quiche/src/quic/platform/api/quic_test.h"
20#include "net/third_party/quiche/src/quic/test_tools/crypto_test_utils.h"
21#include "net/third_party/quiche/src/quic/test_tools/quic_stream_peer.h"
22#include "net/third_party/quiche/src/quic/test_tools/quic_stream_sequencer_peer.h"
23#include "net/third_party/quiche/src/quic/test_tools/quic_test_utils.h"
24#include "net/third_party/quiche/src/quic/test_tools/simple_quic_framer.h"
25
26using testing::_;
27
28namespace quic {
29namespace test {
30namespace {
31
32const char kServerHostname[] = "test.example.com";
33const uint16_t kServerPort = 443;
34
35class QuicCryptoClientStreamTest : public QuicTest {
36 public:
37 QuicCryptoClientStreamTest()
38 : supported_versions_(AllSupportedVersions()),
39 server_id_(kServerHostname, kServerPort, false),
nharper6ebe83b2019-06-13 17:43:52 -070040 crypto_config_(crypto_test_utils::ProofVerifierForTesting()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -050041 CreateConnection();
42 }
43
44 void CreateConnection() {
45 connection_ =
46 new PacketSavingConnection(&client_helper_, &alarm_factory_,
47 Perspective::IS_CLIENT, supported_versions_);
48 // Advance the time, because timers do not like uninitialized times.
49 connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
50
51 session_ = QuicMakeUnique<TestQuicSpdyClientSession>(
52 connection_, DefaultQuicConfig(), supported_versions_, server_id_,
53 &crypto_config_);
54 }
55
56 void CompleteCryptoHandshake() {
57 if (stream()->handshake_protocol() != PROTOCOL_TLS1_3) {
58 EXPECT_CALL(*session_, OnProofValid(testing::_));
59 }
60 EXPECT_CALL(*session_, OnProofVerifyDetailsAvailable(testing::_))
61 .Times(testing::AnyNumber());
62 stream()->CryptoConnect();
63 QuicConfig config;
nharperba5f32c2019-05-13 12:21:31 -070064 crypto_test_utils::HandshakeWithFakeServer(
65 &config, &server_helper_, &alarm_factory_, connection_, stream());
QUICHE teama6ef0a62019-03-07 20:34:33 -050066 }
67
68 QuicCryptoClientStream* stream() {
69 return session_->GetMutableCryptoStream();
70 }
71
72 MockQuicConnectionHelper server_helper_;
73 MockQuicConnectionHelper client_helper_;
74 MockAlarmFactory alarm_factory_;
75 PacketSavingConnection* connection_;
76 ParsedQuicVersionVector supported_versions_;
77 std::unique_ptr<TestQuicSpdyClientSession> session_;
78 QuicServerId server_id_;
79 CryptoHandshakeMessage message_;
80 QuicCryptoClientConfig crypto_config_;
QUICHE teama6ef0a62019-03-07 20:34:33 -050081};
82
83TEST_F(QuicCryptoClientStreamTest, NotInitiallyConected) {
84 EXPECT_FALSE(stream()->encryption_established());
85 EXPECT_FALSE(stream()->handshake_confirmed());
86}
87
88TEST_F(QuicCryptoClientStreamTest, ConnectedAfterSHLO) {
89 CompleteCryptoHandshake();
90 EXPECT_TRUE(stream()->encryption_established());
91 EXPECT_TRUE(stream()->handshake_confirmed());
92}
93
94TEST_F(QuicCryptoClientStreamTest, ConnectedAfterTlsHandshake) {
wub49855982019-05-01 14:16:26 -070095 SetQuicFlag(FLAGS_quic_supports_tls_handshake, true);
QUICHE teama6ef0a62019-03-07 20:34:33 -050096 supported_versions_.clear();
97 for (QuicTransportVersion transport_version :
98 AllSupportedTransportVersions()) {
99 supported_versions_.push_back(
100 ParsedQuicVersion(PROTOCOL_TLS1_3, transport_version));
101 }
102 CreateConnection();
103 CompleteCryptoHandshake();
104 EXPECT_EQ(PROTOCOL_TLS1_3, stream()->handshake_protocol());
105 EXPECT_TRUE(stream()->encryption_established());
106 EXPECT_TRUE(stream()->handshake_confirmed());
107}
108
109TEST_F(QuicCryptoClientStreamTest, MessageAfterHandshake) {
110 CompleteCryptoHandshake();
111
112 EXPECT_CALL(
113 *connection_,
114 CloseConnection(QUIC_CRYPTO_MESSAGE_AFTER_HANDSHAKE_COMPLETE, _, _));
115 message_.set_tag(kCHLO);
116 crypto_test_utils::SendHandshakeMessageToStream(stream(), message_,
117 Perspective::IS_CLIENT);
118}
119
120TEST_F(QuicCryptoClientStreamTest, BadMessageType) {
121 stream()->CryptoConnect();
122
123 message_.set_tag(kCHLO);
124
125 EXPECT_CALL(*connection_, CloseConnection(QUIC_INVALID_CRYPTO_MESSAGE_TYPE,
126 "Expected REJ", _));
127 crypto_test_utils::SendHandshakeMessageToStream(stream(), message_,
128 Perspective::IS_CLIENT);
129}
130
131TEST_F(QuicCryptoClientStreamTest, NegotiatedParameters) {
132 CompleteCryptoHandshake();
133
134 const QuicConfig* config = session_->config();
135 EXPECT_EQ(kMaximumIdleTimeoutSecs, config->IdleNetworkTimeout().ToSeconds());
136
137 const QuicCryptoNegotiatedParameters& crypto_params(
138 stream()->crypto_negotiated_params());
139 EXPECT_EQ(crypto_config_.aead[0], crypto_params.aead);
140 EXPECT_EQ(crypto_config_.kexs[0], crypto_params.key_exchange);
141}
142
143TEST_F(QuicCryptoClientStreamTest, ExpiredServerConfig) {
144 // Seed the config with a cached server config.
145 CompleteCryptoHandshake();
146
147 // Recreate connection with the new config.
148 CreateConnection();
149
150 // Advance time 5 years to ensure that we pass the expiry time of the cached
151 // server config.
152 connection_->AdvanceTime(
153 QuicTime::Delta::FromSeconds(60 * 60 * 24 * 365 * 5));
154
155 EXPECT_CALL(*session_, OnProofValid(testing::_));
156 stream()->CryptoConnect();
157 // Check that a client hello was sent.
158 ASSERT_EQ(1u, connection_->encrypted_packets_.size());
QUICHE team6987b4a2019-03-15 16:23:04 -0700159 EXPECT_EQ(ENCRYPTION_INITIAL, connection_->encryption_level());
QUICHE teama6ef0a62019-03-07 20:34:33 -0500160}
161
162TEST_F(QuicCryptoClientStreamTest, ClockSkew) {
163 // Test that if the client's clock is skewed with respect to the server,
164 // the handshake succeeds. In the past, the client would get the server
165 // config, notice that it had already expired and then close the connection.
166
167 // Advance time 5 years to ensure that we pass the expiry time in the server
168 // config, but the TTL is used instead.
169 connection_->AdvanceTime(
170 QuicTime::Delta::FromSeconds(60 * 60 * 24 * 365 * 5));
171
172 // The handshakes completes!
173 CompleteCryptoHandshake();
174}
175
176TEST_F(QuicCryptoClientStreamTest, InvalidCachedServerConfig) {
177 // Seed the config with a cached server config.
178 CompleteCryptoHandshake();
179
180 // Recreate connection with the new config.
181 CreateConnection();
182
183 QuicCryptoClientConfig::CachedState* state =
184 crypto_config_.LookupOrCreate(server_id_);
185
vasilvvc48c8712019-03-11 13:38:16 -0700186 std::vector<std::string> certs = state->certs();
187 std::string cert_sct = state->cert_sct();
188 std::string signature = state->signature();
189 std::string chlo_hash = state->chlo_hash();
QUICHE teama6ef0a62019-03-07 20:34:33 -0500190 state->SetProof(certs, cert_sct, chlo_hash, signature + signature);
191
192 EXPECT_CALL(*session_, OnProofVerifyDetailsAvailable(testing::_))
193 .Times(testing::AnyNumber());
194 stream()->CryptoConnect();
195 // Check that a client hello was sent.
196 ASSERT_EQ(1u, connection_->encrypted_packets_.size());
197}
198
199TEST_F(QuicCryptoClientStreamTest, ServerConfigUpdate) {
200 // Test that the crypto client stream can receive server config updates after
201 // the connection has been established.
202 CompleteCryptoHandshake();
203
204 QuicCryptoClientConfig::CachedState* state =
205 crypto_config_.LookupOrCreate(server_id_);
206
207 // Ensure cached STK is different to what we send in the handshake.
208 EXPECT_NE("xstk", state->source_address_token());
209
210 // Initialize using {...} syntax to avoid trailing \0 if converting from
211 // string.
212 unsigned char stk[] = {'x', 's', 't', 'k'};
213
214 // Minimum SCFG that passes config validation checks.
215 unsigned char scfg[] = {// SCFG
216 0x53, 0x43, 0x46, 0x47,
217 // num entries
218 0x01, 0x00,
219 // padding
220 0x00, 0x00,
221 // EXPY
222 0x45, 0x58, 0x50, 0x59,
223 // EXPY end offset
224 0x08, 0x00, 0x00, 0x00,
225 // Value
226 '1', '2', '3', '4', '5', '6', '7', '8'};
227
228 CryptoHandshakeMessage server_config_update;
229 server_config_update.set_tag(kSCUP);
230 server_config_update.SetValue(kSourceAddressTokenTag, stk);
231 server_config_update.SetValue(kSCFG, scfg);
232 const uint64_t expiry_seconds = 60 * 60 * 24 * 2;
233 server_config_update.SetValue(kSTTL, expiry_seconds);
234
235 crypto_test_utils::SendHandshakeMessageToStream(
236 stream(), server_config_update, Perspective::IS_SERVER);
237
238 // Make sure that the STK and SCFG are cached correctly.
239 EXPECT_EQ("xstk", state->source_address_token());
240
vasilvvc48c8712019-03-11 13:38:16 -0700241 const std::string& cached_scfg = state->server_config();
QUICHE teama6ef0a62019-03-07 20:34:33 -0500242 test::CompareCharArraysWithHexError(
243 "scfg", cached_scfg.data(), cached_scfg.length(),
244 reinterpret_cast<char*>(scfg), QUIC_ARRAYSIZE(scfg));
245
246 QuicStreamSequencer* sequencer = QuicStreamPeer::sequencer(stream());
247 EXPECT_FALSE(QuicStreamSequencerPeer::IsUnderlyingBufferAllocated(sequencer));
248}
249
250TEST_F(QuicCryptoClientStreamTest, ServerConfigUpdateWithCert) {
251 // Test that the crypto client stream can receive and use server config
252 // updates with certificates after the connection has been established.
253 CompleteCryptoHandshake();
254
255 // Build a server config update message with certificates
256 QuicCryptoServerConfig crypto_config(
257 QuicCryptoServerConfig::TESTING, QuicRandom::GetInstance(),
nharper6ebe83b2019-06-13 17:43:52 -0700258 crypto_test_utils::ProofSourceForTesting(), KeyExchangeSource::Default());
QUICHE teama6ef0a62019-03-07 20:34:33 -0500259 crypto_test_utils::SetupCryptoServerConfigForTest(
nharperba5f32c2019-05-13 12:21:31 -0700260 connection_->clock(), QuicRandom::GetInstance(), &crypto_config);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500261 SourceAddressTokens tokens;
262 QuicCompressedCertsCache cache(1);
263 CachedNetworkParameters network_params;
264 CryptoHandshakeMessage server_config_update;
265
266 class Callback : public BuildServerConfigUpdateMessageResultCallback {
267 public:
268 Callback(bool* ok, CryptoHandshakeMessage* message)
269 : ok_(ok), message_(message) {}
270 void Run(bool ok, const CryptoHandshakeMessage& message) override {
271 *ok_ = ok;
272 *message_ = message;
273 }
274
275 private:
276 bool* ok_;
277 CryptoHandshakeMessage* message_;
278 };
279
280 // Note: relies on the callback being invoked synchronously
281 bool ok = false;
282 crypto_config.BuildServerConfigUpdateMessage(
283 session_->connection()->transport_version(), stream()->chlo_hash(),
284 tokens, QuicSocketAddress(QuicIpAddress::Loopback6(), 1234),
285 QuicIpAddress::Loopback6(), connection_->clock(),
286 QuicRandom::GetInstance(), &cache, stream()->crypto_negotiated_params(),
287 &network_params,
288 std::unique_ptr<BuildServerConfigUpdateMessageResultCallback>(
289 new Callback(&ok, &server_config_update)));
290 EXPECT_TRUE(ok);
291
292 EXPECT_CALL(*session_, OnProofValid(testing::_));
293 crypto_test_utils::SendHandshakeMessageToStream(
294 stream(), server_config_update, Perspective::IS_SERVER);
295
296 // Recreate connection with the new config and verify a 0-RTT attempt.
297 CreateConnection();
298
299 EXPECT_CALL(*connection_, OnCanWrite());
300 EXPECT_CALL(*session_, OnProofValid(testing::_));
301 EXPECT_CALL(*session_, OnProofVerifyDetailsAvailable(testing::_))
302 .Times(testing::AnyNumber());
303 stream()->CryptoConnect();
304 EXPECT_TRUE(session_->IsEncryptionEstablished());
305}
306
307TEST_F(QuicCryptoClientStreamTest, ServerConfigUpdateBeforeHandshake) {
308 EXPECT_CALL(
309 *connection_,
310 CloseConnection(QUIC_CRYPTO_UPDATE_BEFORE_HANDSHAKE_COMPLETE, _, _));
311 CryptoHandshakeMessage server_config_update;
312 server_config_update.set_tag(kSCUP);
313 crypto_test_utils::SendHandshakeMessageToStream(
314 stream(), server_config_update, Perspective::IS_SERVER);
315}
316
QUICHE teama6ef0a62019-03-07 20:34:33 -0500317TEST_F(QuicCryptoClientStreamTest, PreferredVersion) {
nharperd43f1d62019-07-01 15:18:20 -0700318 SetQuicReloadableFlag(quic_fix_get_packet_header_size, true);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500319 // This mimics the case where client receives version negotiation packet, such
320 // that, the preferred version is different from the packets' version.
321 connection_ = new PacketSavingConnection(
322 &client_helper_, &alarm_factory_, Perspective::IS_CLIENT,
323 ParsedVersionOfIndex(supported_versions_, 1));
324 connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
325
326 session_ = QuicMakeUnique<TestQuicSpdyClientSession>(
327 connection_, DefaultQuicConfig(), supported_versions_, server_id_,
328 &crypto_config_);
329 CompleteCryptoHandshake();
330 // 2 CHLOs are sent.
331 ASSERT_EQ(2u, session_->sent_crypto_handshake_messages().size());
332 // Verify preferred version is the highest version that session supports, and
333 // is different from connection's version.
334 QuicVersionLabel client_version_label;
335 EXPECT_EQ(QUIC_NO_ERROR,
336 session_->sent_crypto_handshake_messages()[0].GetVersionLabel(
337 kVER, &client_version_label));
338 EXPECT_EQ(CreateQuicVersionLabel(supported_versions_[0]),
339 client_version_label);
340 EXPECT_EQ(QUIC_NO_ERROR,
341 session_->sent_crypto_handshake_messages()[1].GetVersionLabel(
342 kVER, &client_version_label));
343 EXPECT_EQ(CreateQuicVersionLabel(supported_versions_[0]),
344 client_version_label);
345 EXPECT_NE(CreateQuicVersionLabel(connection_->version()),
346 client_version_label);
347}
348
QUICHE teama6ef0a62019-03-07 20:34:33 -0500349} // namespace
350} // namespace test
351} // namespace quic