| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 // | |
| 5 // Some helpers for quic crypto | |
| 6 | |
| 7 #ifndef NET_QUIC_CRYPTO_CRYPTO_UTILS_H_ | |
| 8 #define NET_QUIC_CRYPTO_CRYPTO_UTILS_H_ | |
| 9 | |
| 10 #include <stddef.h> | |
| 11 #include <stdint.h> | |
| 12 | |
| 13 #include <string> | |
| 14 | |
| 15 #include "base/macros.h" | |
| 16 #include "base/strings/string_piece.h" | |
| 17 #include "net/base/net_export.h" | |
| 18 #include "net/quic/crypto/crypto_handshake.h" | |
| 19 #include "net/quic/crypto/crypto_handshake_message.h" | |
| 20 #include "net/quic/crypto/crypto_protocol.h" | |
| 21 #include "net/quic/quic_protocol.h" | |
| 22 #include "net/quic/quic_time.h" | |
| 23 | |
| 24 namespace net { | |
| 25 | |
| 26 class QuicTime; | |
| 27 class QuicRandom; | |
| 28 struct QuicCryptoNegotiatedParameters; | |
| 29 | |
| 30 class NET_EXPORT_PRIVATE CryptoUtils { | |
| 31 public: | |
| 32 // Diversification is a utility class that's used to act like a union type. | |
| 33 // Values can be created by calling the functions like |NoDiversification|, | |
| 34 // below. | |
| 35 class Diversification { | |
| 36 public: | |
| 37 enum Mode { | |
| 38 NEVER, // Key diversification will never be used. Forward secure | |
| 39 // crypters will always use this mode. | |
| 40 | |
| 41 PENDING, // Key diversification will happen when a nonce is later | |
| 42 // received. This should only be used by clients initial | |
| 43 // decrypters which are waiting on the divesification nonce | |
| 44 // from the server. | |
| 45 | |
| 46 NOW, // Key diversification will happen immediate based on the nonce. | |
| 47 // This should only be used by servers initial encrypters. | |
| 48 }; | |
| 49 | |
| 50 Diversification(const Diversification& diversification) = default; | |
| 51 | |
| 52 static Diversification Never() { return Diversification(NEVER, nullptr); } | |
| 53 static Diversification Pending() { | |
| 54 return Diversification(PENDING, nullptr); | |
| 55 } | |
| 56 static Diversification Now(DiversificationNonce* nonce) { | |
| 57 return Diversification(NOW, nonce); | |
| 58 } | |
| 59 | |
| 60 Mode mode() const { return mode_; } | |
| 61 DiversificationNonce* nonce() const { | |
| 62 DCHECK_EQ(mode_, NOW); | |
| 63 return nonce_; | |
| 64 } | |
| 65 | |
| 66 private: | |
| 67 Diversification(Mode mode, DiversificationNonce* nonce) | |
| 68 : mode_(mode), nonce_(nonce) {} | |
| 69 | |
| 70 Mode mode_; | |
| 71 DiversificationNonce* nonce_; | |
| 72 }; | |
| 73 | |
| 74 // Generates the connection nonce. The nonce is formed as: | |
| 75 // <4 bytes> current time | |
| 76 // <8 bytes> |orbit| (or random if |orbit| is empty) | |
| 77 // <20 bytes> random | |
| 78 static void GenerateNonce(QuicWallTime now, | |
| 79 QuicRandom* random_generator, | |
| 80 base::StringPiece orbit, | |
| 81 std::string* nonce); | |
| 82 | |
| 83 // Returns true if the sni is valid, false otherwise. | |
| 84 // (1) disallow IP addresses; | |
| 85 // (2) check that the hostname contains valid characters only; and | |
| 86 // (3) contains at least one dot. | |
| 87 static bool IsValidSNI(base::StringPiece sni); | |
| 88 | |
| 89 // Convert hostname to lowercase and remove the trailing '.'. | |
| 90 // Returns |hostname|. NormalizeHostname() doesn't support IP address | |
| 91 // literals. IsValidSNI() should be called before calling NormalizeHostname(). | |
| 92 static std::string NormalizeHostname(const char* hostname); | |
| 93 | |
| 94 // DeriveKeys populates |crypters->encrypter|, |crypters->decrypter|, and | |
| 95 // |subkey_secret| (optional -- may be null) given the contents of | |
| 96 // |premaster_secret|, |client_nonce|, |server_nonce| and |hkdf_input|. |aead| | |
| 97 // determines which cipher will be used. |perspective| controls whether the | |
| 98 // server's keys are assigned to |encrypter| or |decrypter|. |server_nonce| is | |
| 99 // optional and, if non-empty, is mixed into the key derivation. | |
| 100 // |subkey_secret| will have the same length as |premaster_secret|. | |
| 101 // | |
| 102 // If the mode of |diversification| is NEVER, the the crypters will be | |
| 103 // configured to never perform key diversification. If the mode is | |
| 104 // NOW (which is only for servers, then the encrypter will be keyed via a | |
| 105 // two-step process that uses the nonce from |diversification|. | |
| 106 // If the mode is PENDING (which is only for servres), then the | |
| 107 // decrypter will only be keyed to a preliminary state: a call to | |
| 108 // |SetDiversificationNonce| with a diversification nonce will be needed to | |
| 109 // complete keying. | |
| 110 static bool DeriveKeys(base::StringPiece premaster_secret, | |
| 111 QuicTag aead, | |
| 112 base::StringPiece client_nonce, | |
| 113 base::StringPiece server_nonce, | |
| 114 const std::string& hkdf_input, | |
| 115 Perspective perspective, | |
| 116 Diversification diversification, | |
| 117 CrypterPair* crypters, | |
| 118 std::string* subkey_secret); | |
| 119 | |
| 120 // Performs key extraction to derive a new secret of |result_len| bytes | |
| 121 // dependent on |subkey_secret|, |label|, and |context|. Returns false if the | |
| 122 // parameters are invalid (e.g. |label| contains null bytes); returns true on | |
| 123 // success. | |
| 124 static bool ExportKeyingMaterial(base::StringPiece subkey_secret, | |
| 125 base::StringPiece label, | |
| 126 base::StringPiece context, | |
| 127 size_t result_len, | |
| 128 std::string* result); | |
| 129 | |
| 130 // Computes the FNV-1a hash of the provided DER-encoded cert for use in the | |
| 131 // XLCT tag. | |
| 132 static uint64_t ComputeLeafCertHash(const std::string& cert); | |
| 133 | |
| 134 // Validates that |server_hello| is actually an SHLO message and that it is | |
| 135 // not part of a downgrade attack. | |
| 136 // | |
| 137 // Returns QUIC_NO_ERROR if this is the case or returns the appropriate error | |
| 138 // code and sets |error_details|. | |
| 139 static QuicErrorCode ValidateServerHello( | |
| 140 const CryptoHandshakeMessage& server_hello, | |
| 141 const QuicVersionVector& negotiated_versions, | |
| 142 std::string* error_details); | |
| 143 | |
| 144 // Validates that |client_hello| is actually a CHLO and that this is not part | |
| 145 // of a downgrade attack. | |
| 146 // This includes verifiying versions and detecting downgrade attacks. | |
| 147 // | |
| 148 // Returns QUIC_NO_ERROR if this is the case or returns the appropriate error | |
| 149 // code and sets |error_details|. | |
| 150 static QuicErrorCode ValidateClientHello( | |
| 151 const CryptoHandshakeMessage& client_hello, | |
| 152 QuicVersion version, | |
| 153 const QuicVersionVector& supported_versions, | |
| 154 std::string* error_details); | |
| 155 | |
| 156 // Returns the name of the HandshakeFailureReason as a char* | |
| 157 static const char* HandshakeFailureReasonToString( | |
| 158 HandshakeFailureReason reason); | |
| 159 | |
| 160 // Writes a hash of the serialized |message| into |output|. | |
| 161 static void HashHandshakeMessage(const CryptoHandshakeMessage& message, | |
| 162 std::string* output); | |
| 163 | |
| 164 private: | |
| 165 DISALLOW_COPY_AND_ASSIGN(CryptoUtils); | |
| 166 }; | |
| 167 | |
| 168 } // namespace net | |
| 169 | |
| 170 #endif // NET_QUIC_CRYPTO_CRYPTO_UTILS_H_ | |
| OLD | NEW |