OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/core/crypto/quic_crypto_server_config.h" | 5 #include "net/quic/core/crypto/quic_crypto_server_config.h" |
6 | 6 |
7 #include <stdlib.h> | 7 #include <stdlib.h> |
8 | 8 |
9 #include <algorithm> | 9 #include <algorithm> |
10 #include <memory> | 10 #include <memory> |
(...skipping 756 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
767 params->sct_supported_by_client = true; | 767 params->sct_supported_by_client = true; |
768 } | 768 } |
769 | 769 |
770 std::unique_ptr<CryptoHandshakeMessage> out(new CryptoHandshakeMessage); | 770 std::unique_ptr<CryptoHandshakeMessage> out(new CryptoHandshakeMessage); |
771 if (!info.reject_reasons.empty() || !requested_config.get()) { | 771 if (!info.reject_reasons.empty() || !requested_config.get()) { |
772 BuildRejection(version, clock->WallNow(), *primary_config, client_hello, | 772 BuildRejection(version, clock->WallNow(), *primary_config, client_hello, |
773 info, validate_chlo_result.cached_network_params, | 773 info, validate_chlo_result.cached_network_params, |
774 use_stateless_rejects, server_designated_connection_id, rand, | 774 use_stateless_rejects, server_designated_connection_id, rand, |
775 compressed_certs_cache, params, *signed_config, | 775 compressed_certs_cache, params, *signed_config, |
776 total_framing_overhead, chlo_packet_size, out.get()); | 776 total_framing_overhead, chlo_packet_size, out.get()); |
777 if (FLAGS_quic_reloadable_flag_quic_export_rej_for_all_rejects && | 777 if (rejection_observer_ != nullptr) { |
778 rejection_observer_ != nullptr) { | |
779 rejection_observer_->OnRejectionBuilt(info.reject_reasons, out.get()); | 778 rejection_observer_->OnRejectionBuilt(info.reject_reasons, out.get()); |
780 } | 779 } |
781 helper.Succeed(std::move(out), std::move(out_diversification_nonce), | 780 helper.Succeed(std::move(out), std::move(out_diversification_nonce), |
782 std::move(proof_source_details)); | 781 std::move(proof_source_details)); |
783 return; | 782 return; |
784 } | 783 } |
785 | 784 |
786 if (reject_only) { | 785 if (reject_only) { |
787 helper.Succeed(std::move(out), std::move(out_diversification_nonce), | 786 helper.Succeed(std::move(out), std::move(out_diversification_nonce), |
788 std::move(proof_source_details)); | 787 std::move(proof_source_details)); |
(...skipping 531 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1320 client_hello_state, | 1319 client_hello_state, |
1321 std::unique_ptr<ValidateClientHelloResultCallback> done_cb) const { | 1320 std::unique_ptr<ValidateClientHelloResultCallback> done_cb) const { |
1322 ValidateClientHelloHelper helper(client_hello_state, &done_cb); | 1321 ValidateClientHelloHelper helper(client_hello_state, &done_cb); |
1323 const CryptoHandshakeMessage& client_hello = client_hello_state->client_hello; | 1322 const CryptoHandshakeMessage& client_hello = client_hello_state->client_hello; |
1324 ClientHelloInfo* info = &(client_hello_state->info); | 1323 ClientHelloInfo* info = &(client_hello_state->info); |
1325 | 1324 |
1326 if (get_proof_failed) { | 1325 if (get_proof_failed) { |
1327 info->reject_reasons.push_back(SERVER_CONFIG_UNKNOWN_CONFIG_FAILURE); | 1326 info->reject_reasons.push_back(SERVER_CONFIG_UNKNOWN_CONFIG_FAILURE); |
1328 } | 1327 } |
1329 | 1328 |
1330 if (!ValidateExpectedLeafCertificate(client_hello, *signed_config)) { | 1329 if (signed_config->chain != nullptr && |
| 1330 !ValidateExpectedLeafCertificate(client_hello, |
| 1331 signed_config->chain->certs)) { |
1331 info->reject_reasons.push_back(INVALID_EXPECTED_LEAF_CERTIFICATE); | 1332 info->reject_reasons.push_back(INVALID_EXPECTED_LEAF_CERTIFICATE); |
1332 } | 1333 } |
1333 | 1334 |
1334 if (info->client_nonce.size() != kNonceSize) { | 1335 if (info->client_nonce.size() != kNonceSize) { |
1335 info->reject_reasons.push_back(CLIENT_NONCE_INVALID_FAILURE); | 1336 info->reject_reasons.push_back(CLIENT_NONCE_INVALID_FAILURE); |
1336 // Invalid client nonce. | 1337 // Invalid client nonce. |
1337 LOG(ERROR) << "Invalid client nonce: " << client_hello.DebugString(); | 1338 LOG(ERROR) << "Invalid client nonce: " << client_hello.DebugString(); |
1338 DVLOG(1) << "Invalid client nonce."; | 1339 DVLOG(1) << "Invalid client nonce."; |
1339 } | 1340 } |
1340 | 1341 |
(...skipping 638 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1979 rand->RandBytes(&server_nonce[sizeof(timestamp)], | 1980 rand->RandBytes(&server_nonce[sizeof(timestamp)], |
1980 sizeof(server_nonce) - sizeof(timestamp)); | 1981 sizeof(server_nonce) - sizeof(timestamp)); |
1981 | 1982 |
1982 return server_nonce_boxer_.Box( | 1983 return server_nonce_boxer_.Box( |
1983 rand, | 1984 rand, |
1984 StringPiece(reinterpret_cast<char*>(server_nonce), sizeof(server_nonce))); | 1985 StringPiece(reinterpret_cast<char*>(server_nonce), sizeof(server_nonce))); |
1985 } | 1986 } |
1986 | 1987 |
1987 bool QuicCryptoServerConfig::ValidateExpectedLeafCertificate( | 1988 bool QuicCryptoServerConfig::ValidateExpectedLeafCertificate( |
1988 const CryptoHandshakeMessage& client_hello, | 1989 const CryptoHandshakeMessage& client_hello, |
1989 const QuicSignedServerConfig& signed_config) const { | 1990 const std::vector<string>& certs) const { |
1990 if (signed_config.chain->certs.empty()) { | 1991 if (certs.empty()) { |
1991 return false; | 1992 return false; |
1992 } | 1993 } |
1993 | 1994 |
1994 uint64_t hash_from_client; | 1995 uint64_t hash_from_client; |
1995 if (client_hello.GetUint64(kXLCT, &hash_from_client) != QUIC_NO_ERROR) { | 1996 if (client_hello.GetUint64(kXLCT, &hash_from_client) != QUIC_NO_ERROR) { |
1996 return false; | 1997 return false; |
1997 } | 1998 } |
1998 return CryptoUtils::ComputeLeafCertHash(signed_config.chain->certs.at(0)) == | 1999 return CryptoUtils::ComputeLeafCertHash(certs.at(0)) == hash_from_client; |
1999 hash_from_client; | |
2000 } | 2000 } |
2001 | 2001 |
2002 bool QuicCryptoServerConfig::ClientDemandsX509Proof( | 2002 bool QuicCryptoServerConfig::ClientDemandsX509Proof( |
2003 const CryptoHandshakeMessage& client_hello) const { | 2003 const CryptoHandshakeMessage& client_hello) const { |
2004 const QuicTag* their_proof_demands; | 2004 const QuicTag* their_proof_demands; |
2005 size_t num_their_proof_demands; | 2005 size_t num_their_proof_demands; |
2006 | 2006 |
2007 if (client_hello.GetTaglist(kPDMD, &their_proof_demands, | 2007 if (client_hello.GetTaglist(kPDMD, &their_proof_demands, |
2008 &num_their_proof_demands) != QUIC_NO_ERROR) { | 2008 &num_their_proof_demands) != QUIC_NO_ERROR) { |
2009 return false; | 2009 return false; |
(...skipping 15 matching lines...) Expand all Loading... |
2025 expiry_time(QuicWallTime::Zero()), | 2025 expiry_time(QuicWallTime::Zero()), |
2026 priority(0), | 2026 priority(0), |
2027 source_address_token_boxer(nullptr) {} | 2027 source_address_token_boxer(nullptr) {} |
2028 | 2028 |
2029 QuicCryptoServerConfig::Config::~Config() {} | 2029 QuicCryptoServerConfig::Config::~Config() {} |
2030 | 2030 |
2031 QuicSignedServerConfig::QuicSignedServerConfig() {} | 2031 QuicSignedServerConfig::QuicSignedServerConfig() {} |
2032 QuicSignedServerConfig::~QuicSignedServerConfig() {} | 2032 QuicSignedServerConfig::~QuicSignedServerConfig() {} |
2033 | 2033 |
2034 } // namespace net | 2034 } // namespace net |
OLD | NEW |