OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/quic_crypto_server_stream.h" | 5 #include "net/quic/quic_crypto_server_stream.h" |
6 | 6 |
7 #include "base/base64.h" | 7 #include "base/base64.h" |
8 #include "crypto/secure_hash.h" | 8 #include "crypto/secure_hash.h" |
9 #include "net/quic/crypto/crypto_protocol.h" | 9 #include "net/quic/crypto/crypto_protocol.h" |
10 #include "net/quic/crypto/crypto_utils.h" | 10 #include "net/quic/crypto/crypto_utils.h" |
11 #include "net/quic/crypto/quic_crypto_server_config.h" | 11 #include "net/quic/crypto/quic_crypto_server_config.h" |
12 #include "net/quic/quic_config.h" | 12 #include "net/quic/quic_config.h" |
13 #include "net/quic/quic_protocol.h" | 13 #include "net/quic/quic_protocol.h" |
14 #include "net/quic/quic_session.h" | 14 #include "net/quic/quic_session.h" |
15 | 15 |
16 namespace net { | 16 namespace net { |
17 | 17 |
| 18 void ServerHelloNotifier::OnAckNotification( |
| 19 int num_original_packets, |
| 20 int num_original_bytes, |
| 21 int num_retransmitted_packets, |
| 22 int num_retransmitted_bytes, |
| 23 QuicTime::Delta delta_largest_observed) { |
| 24 server_stream_->OnServerHelloAcked(); |
| 25 } |
| 26 |
18 QuicCryptoServerStream::QuicCryptoServerStream( | 27 QuicCryptoServerStream::QuicCryptoServerStream( |
19 const QuicCryptoServerConfig& crypto_config, | 28 const QuicCryptoServerConfig& crypto_config, |
20 QuicSession* session) | 29 QuicSession* session) |
21 : QuicCryptoStream(session), | 30 : QuicCryptoStream(session), |
22 crypto_config_(crypto_config), | 31 crypto_config_(crypto_config), |
23 validate_client_hello_cb_(NULL), | 32 validate_client_hello_cb_(NULL), |
24 num_handshake_messages_(0) { | 33 num_handshake_messages_(0), |
| 34 num_server_config_update_messages_sent_(0) { |
25 } | 35 } |
26 | 36 |
27 QuicCryptoServerStream::~QuicCryptoServerStream() { | 37 QuicCryptoServerStream::~QuicCryptoServerStream() { |
28 CancelOutstandingCallbacks(); | 38 CancelOutstandingCallbacks(); |
29 } | 39 } |
30 | 40 |
31 void QuicCryptoServerStream::CancelOutstandingCallbacks() { | 41 void QuicCryptoServerStream::CancelOutstandingCallbacks() { |
32 // Detach from the validation callback. Calling this multiple times is safe. | 42 // Detach from the validation callback. Calling this multiple times is safe. |
33 if (validate_client_hello_cb_ != NULL) { | 43 if (validate_client_hello_cb_ != NULL) { |
34 validate_client_hello_cb_->Cancel(); | 44 validate_client_hello_cb_->Cancel(); |
(...skipping 74 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
109 session()->connection()->SetEncrypter( | 119 session()->connection()->SetEncrypter( |
110 ENCRYPTION_INITIAL, | 120 ENCRYPTION_INITIAL, |
111 crypto_negotiated_params_.initial_crypters.encrypter.release()); | 121 crypto_negotiated_params_.initial_crypters.encrypter.release()); |
112 session()->connection()->SetDefaultEncryptionLevel( | 122 session()->connection()->SetDefaultEncryptionLevel( |
113 ENCRYPTION_INITIAL); | 123 ENCRYPTION_INITIAL); |
114 // Set the decrypter immediately so that we no longer accept unencrypted | 124 // Set the decrypter immediately so that we no longer accept unencrypted |
115 // packets. | 125 // packets. |
116 session()->connection()->SetDecrypter( | 126 session()->connection()->SetDecrypter( |
117 crypto_negotiated_params_.initial_crypters.decrypter.release(), | 127 crypto_negotiated_params_.initial_crypters.decrypter.release(), |
118 ENCRYPTION_INITIAL); | 128 ENCRYPTION_INITIAL); |
119 SendHandshakeMessage(reply); | 129 |
| 130 // We want to be notified when the SHLO is ACKed so that we can disable |
| 131 // HANDSHAKE_MODE in the sent packet manager. |
| 132 if (session()->connection()->version() <= QUIC_VERSION_21) { |
| 133 SendHandshakeMessage(reply); |
| 134 } else { |
| 135 scoped_refptr<ServerHelloNotifier> server_hello_notifier( |
| 136 new ServerHelloNotifier(this)); |
| 137 SendHandshakeMessage(reply, server_hello_notifier.get()); |
| 138 } |
120 | 139 |
121 session()->connection()->SetEncrypter( | 140 session()->connection()->SetEncrypter( |
122 ENCRYPTION_FORWARD_SECURE, | 141 ENCRYPTION_FORWARD_SECURE, |
123 crypto_negotiated_params_.forward_secure_crypters.encrypter.release()); | 142 crypto_negotiated_params_.forward_secure_crypters.encrypter.release()); |
124 session()->connection()->SetDefaultEncryptionLevel( | 143 session()->connection()->SetDefaultEncryptionLevel( |
125 ENCRYPTION_FORWARD_SECURE); | 144 ENCRYPTION_FORWARD_SECURE); |
126 session()->connection()->SetAlternativeDecrypter( | 145 session()->connection()->SetAlternativeDecrypter( |
127 crypto_negotiated_params_.forward_secure_crypters.decrypter.release(), | 146 crypto_negotiated_params_.forward_secure_crypters.decrypter.release(), |
128 ENCRYPTION_FORWARD_SECURE, false /* don't latch */); | 147 ENCRYPTION_FORWARD_SECURE, false /* don't latch */); |
129 | 148 |
130 encryption_established_ = true; | 149 encryption_established_ = true; |
131 handshake_confirmed_ = true; | 150 handshake_confirmed_ = true; |
132 session()->OnCryptoHandshakeEvent(QuicSession::HANDSHAKE_CONFIRMED); | 151 session()->OnCryptoHandshakeEvent(QuicSession::HANDSHAKE_CONFIRMED); |
| 152 |
| 153 // Now that the handshake is complete, send an updated server config and |
| 154 // source-address token to the client. |
| 155 SendServerConfigUpdate(); |
| 156 } |
| 157 |
| 158 void QuicCryptoServerStream::SendServerConfigUpdate() { |
| 159 if (session()->connection()->version() <= QUIC_VERSION_21) { |
| 160 return; |
| 161 } |
| 162 |
| 163 CryptoHandshakeMessage server_config_update_message; |
| 164 if (!crypto_config_.BuildServerConfigUpdateMessage( |
| 165 session()->connection()->peer_address(), |
| 166 session()->connection()->clock(), |
| 167 session()->connection()->random_generator(), |
| 168 crypto_negotiated_params_, &server_config_update_message)) { |
| 169 DVLOG(1) << "Server: Failed to build server config update (SCUP)!"; |
| 170 return; |
| 171 } |
| 172 |
| 173 DVLOG(1) << "Server: Sending server config update (SCUP): " |
| 174 << server_config_update_message.DebugString(); |
| 175 const QuicData& data = server_config_update_message.GetSerialized(); |
| 176 WriteOrBufferData(string(data.data(), data.length()), false, NULL); |
| 177 |
| 178 ++num_server_config_update_messages_sent_; |
| 179 } |
| 180 |
| 181 void QuicCryptoServerStream::OnServerHelloAcked() { |
| 182 session()->connection()->OnHandshakeComplete(); |
133 } | 183 } |
134 | 184 |
135 bool QuicCryptoServerStream::GetBase64SHA256ClientChannelID( | 185 bool QuicCryptoServerStream::GetBase64SHA256ClientChannelID( |
136 string* output) const { | 186 string* output) const { |
137 if (!encryption_established_ || | 187 if (!encryption_established_ || |
138 crypto_negotiated_params_.channel_id.empty()) { | 188 crypto_negotiated_params_.channel_id.empty()) { |
139 return false; | 189 return false; |
140 } | 190 } |
141 | 191 |
142 const string& channel_id(crypto_negotiated_params_.channel_id); | 192 const string& channel_id(crypto_negotiated_params_.channel_id); |
(...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
191 | 241 |
192 void QuicCryptoServerStream::ValidateCallback::RunImpl( | 242 void QuicCryptoServerStream::ValidateCallback::RunImpl( |
193 const CryptoHandshakeMessage& client_hello, | 243 const CryptoHandshakeMessage& client_hello, |
194 const Result& result) { | 244 const Result& result) { |
195 if (parent_ != NULL) { | 245 if (parent_ != NULL) { |
196 parent_->FinishProcessingHandshakeMessage(client_hello, result); | 246 parent_->FinishProcessingHandshakeMessage(client_hello, result); |
197 } | 247 } |
198 } | 248 } |
199 | 249 |
200 } // namespace net | 250 } // namespace net |
OLD | NEW |