182 lines
4.7 KiB
C
182 lines
4.7 KiB
C
/* $OpenBSD: tls13_quic.c,v 1.7 2022/11/26 16:08:56 tb Exp $ */
|
|
/*
|
|
* Copyright (c) 2022 Joel Sing <jsing@openbsd.org>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
|
|
#include "ssl_local.h"
|
|
#include "tls13_internal.h"
|
|
|
|
static ssize_t
|
|
tls13_quic_wire_read_cb(void *buf, size_t n, void *arg)
|
|
{
|
|
struct tls13_ctx *ctx = arg;
|
|
SSL *ssl = ctx->ssl;
|
|
|
|
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
|
|
return TLS13_IO_FAILURE;
|
|
}
|
|
|
|
static ssize_t
|
|
tls13_quic_wire_write_cb(const void *buf, size_t n, void *arg)
|
|
{
|
|
struct tls13_ctx *ctx = arg;
|
|
SSL *ssl = ctx->ssl;
|
|
|
|
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
|
|
return TLS13_IO_FAILURE;
|
|
}
|
|
|
|
static ssize_t
|
|
tls13_quic_wire_flush_cb(void *arg)
|
|
{
|
|
struct tls13_ctx *ctx = arg;
|
|
SSL *ssl = ctx->ssl;
|
|
|
|
if (!ssl->quic_method->flush_flight(ssl)) {
|
|
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
|
|
return TLS13_IO_FAILURE;
|
|
}
|
|
|
|
return TLS13_IO_SUCCESS;
|
|
}
|
|
|
|
static ssize_t
|
|
tls13_quic_handshake_read_cb(void *buf, size_t n, void *arg)
|
|
{
|
|
struct tls13_ctx *ctx = arg;
|
|
|
|
if (ctx->hs->tls13.quic_read_buffer == NULL)
|
|
return TLS13_IO_WANT_POLLIN;
|
|
|
|
return tls_buffer_read(ctx->hs->tls13.quic_read_buffer, buf, n);
|
|
}
|
|
|
|
static ssize_t
|
|
tls13_quic_handshake_write_cb(const void *buf, size_t n, void *arg)
|
|
{
|
|
struct tls13_ctx *ctx = arg;
|
|
SSL *ssl = ctx->ssl;
|
|
|
|
if (!ssl->quic_method->add_handshake_data(ssl,
|
|
ctx->hs->tls13.quic_write_level, buf, n)) {
|
|
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
|
|
return TLS13_IO_FAILURE;
|
|
}
|
|
|
|
return n;
|
|
}
|
|
|
|
static int
|
|
tls13_quic_set_read_traffic_key(struct tls13_secret *read_key,
|
|
enum ssl_encryption_level_t read_level, void *arg)
|
|
{
|
|
struct tls13_ctx *ctx = arg;
|
|
SSL *ssl = ctx->ssl;
|
|
|
|
ctx->hs->tls13.quic_read_level = read_level;
|
|
|
|
/* Handle both the new (BoringSSL) and old (quictls) APIs. */
|
|
|
|
if (ssl->quic_method->set_read_secret != NULL)
|
|
return ssl->quic_method->set_read_secret(ssl,
|
|
ctx->hs->tls13.quic_read_level, ctx->hs->cipher,
|
|
read_key->data, read_key->len);
|
|
|
|
if (ssl->quic_method->set_encryption_secrets != NULL)
|
|
return ssl->quic_method->set_encryption_secrets(ssl,
|
|
ctx->hs->tls13.quic_read_level, read_key->data, NULL,
|
|
read_key->len);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
tls13_quic_set_write_traffic_key(struct tls13_secret *write_key,
|
|
enum ssl_encryption_level_t write_level, void *arg)
|
|
{
|
|
struct tls13_ctx *ctx = arg;
|
|
SSL *ssl = ctx->ssl;
|
|
|
|
ctx->hs->tls13.quic_write_level = write_level;
|
|
|
|
/* Handle both the new (BoringSSL) and old (quictls) APIs. */
|
|
|
|
if (ssl->quic_method->set_write_secret != NULL)
|
|
return ssl->quic_method->set_write_secret(ssl,
|
|
ctx->hs->tls13.quic_write_level, ctx->hs->cipher,
|
|
write_key->data, write_key->len);
|
|
|
|
if (ssl->quic_method->set_encryption_secrets != NULL)
|
|
return ssl->quic_method->set_encryption_secrets(ssl,
|
|
ctx->hs->tls13.quic_write_level, NULL, write_key->data,
|
|
write_key->len);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
tls13_quic_alert_send_cb(int alert_desc, void *arg)
|
|
{
|
|
struct tls13_ctx *ctx = arg;
|
|
SSL *ssl = ctx->ssl;
|
|
|
|
if (!ssl->quic_method->send_alert(ssl, ctx->hs->tls13.quic_write_level,
|
|
alert_desc)) {
|
|
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
|
|
return TLS13_IO_FAILURE;
|
|
}
|
|
|
|
return TLS13_IO_SUCCESS;
|
|
}
|
|
|
|
static const struct tls13_record_layer_callbacks quic_rl_callbacks = {
|
|
.wire_read = tls13_quic_wire_read_cb,
|
|
.wire_write = tls13_quic_wire_write_cb,
|
|
.wire_flush = tls13_quic_wire_flush_cb,
|
|
|
|
.handshake_read = tls13_quic_handshake_read_cb,
|
|
.handshake_write = tls13_quic_handshake_write_cb,
|
|
.set_read_traffic_key = tls13_quic_set_read_traffic_key,
|
|
.set_write_traffic_key = tls13_quic_set_write_traffic_key,
|
|
.alert_send = tls13_quic_alert_send_cb,
|
|
|
|
.alert_recv = tls13_alert_received_cb,
|
|
.alert_sent = tls13_alert_sent_cb,
|
|
.phh_recv = tls13_phh_received_cb,
|
|
.phh_sent = tls13_phh_done_cb,
|
|
};
|
|
|
|
int
|
|
tls13_quic_init(struct tls13_ctx *ctx)
|
|
{
|
|
BIO *bio;
|
|
|
|
tls13_record_layer_set_callbacks(ctx->rl, &quic_rl_callbacks, ctx);
|
|
|
|
ctx->middlebox_compat = 0;
|
|
|
|
/*
|
|
* QUIC does not use BIOs, however we currently expect a BIO to exist
|
|
* for status handling.
|
|
*/
|
|
if ((bio = BIO_new(BIO_s_null())) == NULL)
|
|
return 0;
|
|
|
|
SSL_set_bio(ctx->ssl, bio, bio);
|
|
bio = NULL;
|
|
|
|
return 1;
|
|
}
|