/src/openssl/ssl/quic/quic_tls.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2022-2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | #include <openssl/ssl.h> |
10 | | #include "internal/recordmethod.h" |
11 | | #include "internal/quic_tls.h" |
12 | | #include "../ssl_local.h" |
13 | | #include "internal/quic_record_util.h" |
14 | | #include "internal/quic_error.h" |
15 | | #include "internal/quic_types.h" |
16 | | #include "internal/ssl_unwrap.h" |
17 | | |
18 | | #define QUIC_TLS_FATAL(rl, ad, err) \ |
19 | 0 | do { \ |
20 | 0 | if ((rl) != NULL) (rl)->alert = (ad); \ |
21 | 0 | ERR_raise(ERR_LIB_SSL, (err)); \ |
22 | 0 | if ((rl) != NULL) (rl)->qtls->inerror = 1; \ |
23 | 0 | } while(0) |
24 | | |
25 | | struct quic_tls_st { |
26 | | QUIC_TLS_ARGS args; |
27 | | |
28 | | /* |
29 | | * Transport parameters which client should send. Buffer lifetime must |
30 | | * exceed the lifetime of the QUIC_TLS object. |
31 | | */ |
32 | | const unsigned char *local_transport_params; |
33 | | size_t local_transport_params_len; |
34 | | |
35 | | ERR_STATE *error_state; |
36 | | |
37 | | /* |
38 | | * QUIC error code (usually in the TLS Alert-mapped CRYPTO_ERR range). Valid |
39 | | * only if inerror is 1. |
40 | | */ |
41 | | uint64_t error_code; |
42 | | |
43 | | /* |
44 | | * Error message with static storage duration. Valid only if inerror is 1. |
45 | | * Should be suitable for encapsulation in a CONNECTION_CLOSE frame. |
46 | | */ |
47 | | const char *error_msg; |
48 | | |
49 | | /* Whether our SSL object for TLS has been configured for use in QUIC */ |
50 | | unsigned int configured : 1; |
51 | | |
52 | | /* Set if we have hit any error state */ |
53 | | unsigned int inerror : 1; |
54 | | |
55 | | /* Set if the handshake has completed */ |
56 | | unsigned int complete : 1; |
57 | | |
58 | | /* Set if we have consumed the local transport parameters yet. */ |
59 | | unsigned int local_transport_params_consumed : 1; |
60 | | }; |
61 | | |
62 | | struct ossl_record_layer_st { |
63 | | QUIC_TLS *qtls; |
64 | | |
65 | | /* Protection level */ |
66 | | int level; |
67 | | |
68 | | /* Only used for retry flags */ |
69 | | BIO *dummybio; |
70 | | |
71 | | /* Number of bytes written so far if we are part way through a write */ |
72 | | size_t written; |
73 | | |
74 | | /* If we are part way through a write, a copy of the template */ |
75 | | OSSL_RECORD_TEMPLATE template; |
76 | | |
77 | | /* |
78 | | * If we hit an error, what alert code should be used |
79 | | */ |
80 | | int alert; |
81 | | |
82 | | /* Amount of crypto stream data we read in the last call to quic_read_record */ |
83 | | size_t recread; |
84 | | |
85 | | /* Amount of crypto stream data read but not yet released */ |
86 | | size_t recunreleased; |
87 | | |
88 | | /* Callbacks */ |
89 | | OSSL_FUNC_rlayer_msg_callback_fn *msg_callback; |
90 | | void *cbarg; |
91 | | }; |
92 | | |
93 | | static int quic_set1_bio(OSSL_RECORD_LAYER *rl, BIO *bio); |
94 | | static int quic_free(OSSL_RECORD_LAYER *r); |
95 | | |
96 | | static int |
97 | | quic_new_record_layer(OSSL_LIB_CTX *libctx, const char *propq, int vers, |
98 | | int role, int direction, int level, uint16_t epoch, |
99 | | unsigned char *secret, size_t secretlen, |
100 | | unsigned char *key, size_t keylen, unsigned char *iv, |
101 | | size_t ivlen, unsigned char *mackey, size_t mackeylen, |
102 | | const EVP_CIPHER *ciph, size_t taglen, |
103 | | int mactype, |
104 | | const EVP_MD *md, COMP_METHOD *comp, |
105 | | const EVP_MD *kdfdigest, BIO *prev, BIO *transport, |
106 | | BIO *next, BIO_ADDR *local, BIO_ADDR *peer, |
107 | | const OSSL_PARAM *settings, const OSSL_PARAM *options, |
108 | | const OSSL_DISPATCH *fns, void *cbarg, void *rlarg, |
109 | | OSSL_RECORD_LAYER **retrl) |
110 | 0 | { |
111 | 0 | OSSL_RECORD_LAYER *rl = OPENSSL_zalloc(sizeof(*rl)); |
112 | 0 | int qdir; |
113 | 0 | uint32_t suite_id = 0; |
114 | |
|
115 | 0 | if (rl == NULL) { |
116 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
117 | 0 | return 0; |
118 | 0 | } |
119 | | |
120 | 0 | rl->qtls = (QUIC_TLS *)rlarg; |
121 | 0 | rl->level = level; |
122 | 0 | if (!quic_set1_bio(rl, transport)) { |
123 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
124 | 0 | goto err; |
125 | 0 | } |
126 | 0 | rl->cbarg = cbarg; |
127 | 0 | *retrl = rl; |
128 | |
|
129 | 0 | if (fns != NULL) { |
130 | 0 | for (; fns->function_id != 0; fns++) { |
131 | 0 | switch (fns->function_id) { |
132 | 0 | break; |
133 | 0 | case OSSL_FUNC_RLAYER_MSG_CALLBACK: |
134 | 0 | rl->msg_callback = OSSL_FUNC_rlayer_msg_callback(fns); |
135 | 0 | break; |
136 | 0 | default: |
137 | | /* Just ignore anything we don't understand */ |
138 | 0 | break; |
139 | 0 | } |
140 | 0 | } |
141 | 0 | } |
142 | | |
143 | 0 | if (level == OSSL_RECORD_PROTECTION_LEVEL_NONE) |
144 | 0 | return 1; |
145 | | |
146 | 0 | if (direction == OSSL_RECORD_DIRECTION_READ) |
147 | 0 | qdir = 0; |
148 | 0 | else |
149 | 0 | qdir = 1; |
150 | |
|
151 | 0 | if (rl->qtls->args.ossl_quic) { |
152 | 0 | #ifndef OPENSSL_NO_QUIC |
153 | | /* |
154 | | * We only look up the suite_id/MD for internal callers. Not used in the |
155 | | * public API. We assume that a 3rd party QUIC stack will want to |
156 | | * figure this out by itself (e.g. so that they could add new |
157 | | * ciphersuites at a different pace to us) |
158 | | */ |
159 | 0 | if (EVP_CIPHER_is_a(ciph, "AES-128-GCM")) { |
160 | 0 | suite_id = QRL_SUITE_AES128GCM; |
161 | 0 | } else if (EVP_CIPHER_is_a(ciph, "AES-256-GCM")) { |
162 | 0 | suite_id = QRL_SUITE_AES256GCM; |
163 | 0 | } else if (EVP_CIPHER_is_a(ciph, "CHACHA20-POLY1305")) { |
164 | 0 | suite_id = QRL_SUITE_CHACHA20POLY1305; |
165 | 0 | } else { |
166 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, SSL_R_UNKNOWN_CIPHER_TYPE); |
167 | 0 | goto err; |
168 | 0 | } |
169 | | |
170 | | /* We pass a ref to the md in a successful yield_secret_cb call */ |
171 | | /* TODO(QUIC FUTURE): This cast is horrible. We should try and remove it */ |
172 | 0 | if (!EVP_MD_up_ref((EVP_MD *)kdfdigest)) { |
173 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
174 | 0 | goto err; |
175 | 0 | } |
176 | | #else |
177 | | if (!ossl_assert("Should not happen" == NULL)) |
178 | | goto err; |
179 | | #endif |
180 | 0 | } else { |
181 | 0 | kdfdigest = NULL; |
182 | 0 | } |
183 | | |
184 | 0 | if (!rl->qtls->args.yield_secret_cb(level, qdir, suite_id, |
185 | 0 | (EVP_MD *)kdfdigest, secret, secretlen, |
186 | 0 | rl->qtls->args.yield_secret_cb_arg)) { |
187 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
188 | 0 | EVP_MD_free((EVP_MD *)kdfdigest); |
189 | 0 | goto err; |
190 | 0 | } |
191 | | |
192 | 0 | return 1; |
193 | 0 | err: |
194 | 0 | *retrl = NULL; |
195 | 0 | quic_free(rl); |
196 | 0 | return 0; |
197 | 0 | } |
198 | | |
199 | | static int quic_free(OSSL_RECORD_LAYER *rl) |
200 | 0 | { |
201 | 0 | if (rl == NULL) |
202 | 0 | return 1; |
203 | | |
204 | 0 | BIO_free(rl->dummybio); |
205 | 0 | OPENSSL_free(rl); |
206 | 0 | return 1; |
207 | 0 | } |
208 | | |
209 | | static int quic_unprocessed_read_pending(OSSL_RECORD_LAYER *rl) |
210 | 0 | { |
211 | | /* |
212 | | * Read ahead isn't really a thing for QUIC so we never have unprocessed |
213 | | * data pending |
214 | | */ |
215 | 0 | return 0; |
216 | 0 | } |
217 | | |
218 | | static int quic_processed_read_pending(OSSL_RECORD_LAYER *rl) |
219 | 0 | { |
220 | | /* |
221 | | * This is currently only ever used by: |
222 | | * - SSL_has_pending() |
223 | | * - to check whether we have more records that we want to supply to the |
224 | | * upper layers |
225 | | * |
226 | | * We only ever supply 1 record at a time to the upper layers, and |
227 | | * SSL_has_pending() will go via the QUIC method not the TLS method so that |
228 | | * use case doesn't apply here. |
229 | | * Therefore we can ignore this for now and always return 0. We might |
230 | | * eventually want to change this to check in the receive buffers to see if |
231 | | * we have any more data pending. |
232 | | */ |
233 | 0 | return 0; |
234 | 0 | } |
235 | | |
236 | | static size_t quic_get_max_records(OSSL_RECORD_LAYER *rl, uint8_t type, |
237 | | size_t len, |
238 | | size_t maxfrag, size_t *preffrag) |
239 | 0 | { |
240 | 0 | return 1; |
241 | 0 | } |
242 | | |
243 | | static int quic_write_records(OSSL_RECORD_LAYER *rl, |
244 | | OSSL_RECORD_TEMPLATE *template, |
245 | | size_t numtempl) |
246 | 0 | { |
247 | 0 | size_t consumed; |
248 | 0 | unsigned char alert; |
249 | |
|
250 | 0 | if (!ossl_assert(numtempl == 1)) { |
251 | | /* How could this be? quic_get_max_records() always returns 1 */ |
252 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
253 | 0 | return OSSL_RECORD_RETURN_FATAL; |
254 | 0 | } |
255 | | |
256 | 0 | BIO_clear_retry_flags(rl->dummybio); |
257 | |
|
258 | 0 | if (rl->msg_callback != NULL) { |
259 | 0 | unsigned char dummyrec[SSL3_RT_HEADER_LENGTH]; |
260 | | |
261 | | /* |
262 | | * For the purposes of the callback we "pretend" to be normal TLS, |
263 | | * and manufacture a dummy record header |
264 | | */ |
265 | 0 | dummyrec[0] = (rl->level == OSSL_RECORD_PROTECTION_LEVEL_NONE) |
266 | 0 | ? template->type |
267 | 0 | : SSL3_RT_APPLICATION_DATA; |
268 | 0 | dummyrec[1] = (unsigned char)((template->version >> 8) & 0xff); |
269 | 0 | dummyrec[2] = (unsigned char)(template->version & 0xff); |
270 | | /* |
271 | | * We assume that buflen is always <= UINT16_MAX. Since this is |
272 | | * generated by libssl itself we actually expect it to never |
273 | | * exceed SSL3_RT_MAX_PLAIN_LENGTH - so it should be a safe |
274 | | * assumption |
275 | | */ |
276 | 0 | dummyrec[3] = (unsigned char)((template->buflen >> 8) & 0xff); |
277 | 0 | dummyrec[4] = (unsigned char)(template->buflen & 0xff); |
278 | |
|
279 | 0 | rl->msg_callback(1, TLS1_3_VERSION, SSL3_RT_HEADER, dummyrec, |
280 | 0 | SSL3_RT_HEADER_LENGTH, rl->cbarg); |
281 | |
|
282 | 0 | if (rl->level != OSSL_RECORD_PROTECTION_LEVEL_NONE) { |
283 | 0 | rl->msg_callback(1, TLS1_3_VERSION, SSL3_RT_INNER_CONTENT_TYPE, |
284 | 0 | &template->type, 1, rl->cbarg); |
285 | 0 | } |
286 | 0 | } |
287 | |
|
288 | 0 | switch (template->type) { |
289 | 0 | case SSL3_RT_ALERT: |
290 | 0 | if (template->buflen != 2) { |
291 | | /* |
292 | | * We assume that libssl always sends both bytes of an alert to |
293 | | * us in one go, and never fragments it. If we ever get more |
294 | | * or less bytes than exactly 2 then this is very unexpected. |
295 | | */ |
296 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_VALUE); |
297 | 0 | return OSSL_RECORD_RETURN_FATAL; |
298 | 0 | } |
299 | | /* |
300 | | * Byte 0 is the alert level (we ignore it) and byte 1 is the alert |
301 | | * description that we are actually interested in. |
302 | | */ |
303 | 0 | alert = template->buf[1]; |
304 | |
|
305 | 0 | if (!rl->qtls->args.alert_cb(rl->qtls->args.alert_cb_arg, alert)) { |
306 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
307 | 0 | return OSSL_RECORD_RETURN_FATAL; |
308 | 0 | } |
309 | 0 | break; |
310 | | |
311 | 0 | case SSL3_RT_HANDSHAKE: |
312 | | /* |
313 | | * We expect this to only fail on some fatal error (e.g. malloc |
314 | | * failure) |
315 | | */ |
316 | 0 | if (!rl->qtls->args.crypto_send_cb(template->buf + rl->written, |
317 | 0 | template->buflen - rl->written, |
318 | 0 | &consumed, |
319 | 0 | rl->qtls->args.crypto_send_cb_arg)) { |
320 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
321 | 0 | return OSSL_RECORD_RETURN_FATAL; |
322 | 0 | } |
323 | | /* |
324 | | * We might have written less than we wanted to if we have filled the |
325 | | * send stream buffer. |
326 | | */ |
327 | 0 | if (consumed + rl->written != template->buflen) { |
328 | 0 | if (!ossl_assert(consumed + rl->written < template->buflen)) { |
329 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
330 | 0 | return OSSL_RECORD_RETURN_FATAL; |
331 | 0 | } |
332 | | |
333 | | /* |
334 | | * We've not written everything we wanted to. Take a copy of the |
335 | | * template, remember how much we wrote so far and signal a retry. |
336 | | * The buffer supplied in the template is guaranteed to be the same |
337 | | * on a retry for handshake data |
338 | | */ |
339 | 0 | rl->written += consumed; |
340 | 0 | rl->template = *template; |
341 | 0 | BIO_set_retry_write(rl->dummybio); |
342 | |
|
343 | 0 | return OSSL_RECORD_RETURN_RETRY; |
344 | 0 | } |
345 | 0 | rl->written = 0; |
346 | 0 | break; |
347 | | |
348 | 0 | default: |
349 | | /* Anything else is unexpected and an error */ |
350 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
351 | 0 | return OSSL_RECORD_RETURN_FATAL; |
352 | 0 | } |
353 | | |
354 | 0 | return OSSL_RECORD_RETURN_SUCCESS; |
355 | 0 | } |
356 | | |
357 | | static int quic_retry_write_records(OSSL_RECORD_LAYER *rl) |
358 | 0 | { |
359 | 0 | return quic_write_records(rl, &rl->template, 1); |
360 | 0 | } |
361 | | |
362 | | static int quic_read_record(OSSL_RECORD_LAYER *rl, void **rechandle, |
363 | | int *rversion, uint8_t *type, const unsigned char **data, |
364 | | size_t *datalen, uint16_t *epoch, |
365 | | unsigned char *seq_num) |
366 | 0 | { |
367 | 0 | if (rl->recread != 0 || rl->recunreleased != 0) |
368 | 0 | return OSSL_RECORD_RETURN_FATAL; |
369 | | |
370 | 0 | BIO_clear_retry_flags(rl->dummybio); |
371 | |
|
372 | 0 | if (!rl->qtls->args.crypto_recv_rcd_cb(data, datalen, |
373 | 0 | rl->qtls->args.crypto_recv_rcd_cb_arg)) { |
374 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
375 | 0 | return OSSL_RECORD_RETURN_FATAL; |
376 | 0 | } |
377 | | |
378 | 0 | if (*datalen == 0) { |
379 | 0 | BIO_set_retry_read(rl->dummybio); |
380 | 0 | return OSSL_RECORD_RETURN_RETRY; |
381 | 0 | } |
382 | | |
383 | 0 | *rechandle = rl; |
384 | 0 | *rversion = TLS1_3_VERSION; |
385 | 0 | *type = SSL3_RT_HANDSHAKE; |
386 | 0 | rl->recread = rl->recunreleased = *datalen; |
387 | | /* epoch/seq_num are not relevant for TLS */ |
388 | |
|
389 | 0 | if (rl->msg_callback != NULL) { |
390 | 0 | unsigned char dummyrec[SSL3_RT_HEADER_LENGTH]; |
391 | | |
392 | | /* |
393 | | * For the purposes of the callback we "pretend" to be normal TLS, |
394 | | * and manufacture a dummy record header |
395 | | */ |
396 | 0 | dummyrec[0] = (rl->level == OSSL_RECORD_PROTECTION_LEVEL_NONE) |
397 | 0 | ? SSL3_RT_HANDSHAKE |
398 | 0 | : SSL3_RT_APPLICATION_DATA; |
399 | 0 | dummyrec[1] = (unsigned char)((TLS1_2_VERSION >> 8) & 0xff); |
400 | 0 | dummyrec[2] = (unsigned char)(TLS1_2_VERSION & 0xff); |
401 | | /* |
402 | | * *datalen will always fit into 2 bytes because our original buffer |
403 | | * size is less than that. |
404 | | */ |
405 | 0 | dummyrec[3] = (unsigned char)((*datalen >> 8) & 0xff); |
406 | 0 | dummyrec[4] = (unsigned char)(*datalen & 0xff); |
407 | |
|
408 | 0 | rl->msg_callback(0, TLS1_3_VERSION, SSL3_RT_HEADER, dummyrec, |
409 | 0 | SSL3_RT_HEADER_LENGTH, rl->cbarg); |
410 | 0 | rl->msg_callback(0, TLS1_3_VERSION, SSL3_RT_INNER_CONTENT_TYPE, type, 1, |
411 | 0 | rl->cbarg); |
412 | 0 | } |
413 | |
|
414 | 0 | return OSSL_RECORD_RETURN_SUCCESS; |
415 | 0 | } |
416 | | |
417 | | static int quic_release_record(OSSL_RECORD_LAYER *rl, void *rechandle, |
418 | | size_t length) |
419 | 0 | { |
420 | 0 | if (!ossl_assert(rl->recread > 0) |
421 | 0 | || !ossl_assert(rl->recunreleased <= rl->recread) |
422 | 0 | || !ossl_assert(rl == rechandle) |
423 | 0 | || !ossl_assert(length <= rl->recunreleased)) { |
424 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
425 | 0 | return OSSL_RECORD_RETURN_FATAL; |
426 | 0 | } |
427 | | |
428 | 0 | if (rl->recunreleased == length) { |
429 | 0 | if (!rl->qtls->args.crypto_release_rcd_cb(rl->recread, |
430 | 0 | rl->qtls->args.crypto_release_rcd_cb_arg)) { |
431 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
432 | 0 | return OSSL_RECORD_RETURN_FATAL; |
433 | 0 | } |
434 | 0 | rl->recread = 0; |
435 | 0 | } |
436 | 0 | rl->recunreleased -= length; |
437 | 0 | return OSSL_RECORD_RETURN_SUCCESS; |
438 | 0 | } |
439 | | |
440 | | static int quic_get_alert_code(OSSL_RECORD_LAYER *rl) |
441 | 0 | { |
442 | 0 | return rl->alert; |
443 | 0 | } |
444 | | |
445 | | static int quic_set_protocol_version(OSSL_RECORD_LAYER *rl, int version) |
446 | 0 | { |
447 | | /* We only support TLSv1.3, so its bad if we negotiate anything else */ |
448 | 0 | if (!ossl_assert(version == TLS1_3_VERSION)) { |
449 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); |
450 | 0 | return 0; |
451 | 0 | } |
452 | | |
453 | 0 | return 1; |
454 | 0 | } |
455 | | |
456 | | static void quic_set_plain_alerts(OSSL_RECORD_LAYER *rl, int allow) |
457 | 0 | { |
458 | | /* We don't care */ |
459 | 0 | } |
460 | | |
461 | | static void quic_set_first_handshake(OSSL_RECORD_LAYER *rl, int first) |
462 | 0 | { |
463 | | /* We don't care */ |
464 | 0 | } |
465 | | |
466 | | static void quic_set_max_pipelines(OSSL_RECORD_LAYER *rl, size_t max_pipelines) |
467 | 0 | { |
468 | | /* We don't care */ |
469 | 0 | } |
470 | | |
471 | | static void quic_get_state(OSSL_RECORD_LAYER *rl, const char **shortstr, |
472 | | const char **longstr) |
473 | 0 | { |
474 | | /* |
475 | | * According to the docs, valid read state strings are: "RH"/"read header", |
476 | | * "RB"/"read body", and "unknown"/"unknown". We don't read records in quite |
477 | | * that way, so we report every "normal" state as "read header". In the |
478 | | * event of error then we report "unknown". |
479 | | */ |
480 | |
|
481 | 0 | if (rl->qtls->inerror) { |
482 | 0 | if (shortstr != NULL) |
483 | 0 | *shortstr = "unknown"; |
484 | 0 | if (longstr != NULL) |
485 | 0 | *longstr = "unknown"; |
486 | 0 | } else { |
487 | 0 | if (shortstr != NULL) |
488 | 0 | *shortstr = "RH"; |
489 | 0 | if (longstr != NULL) |
490 | 0 | *longstr = "read header"; |
491 | 0 | } |
492 | 0 | } |
493 | | |
494 | | static int quic_set_options(OSSL_RECORD_LAYER *rl, const OSSL_PARAM *options) |
495 | 0 | { |
496 | | /* |
497 | | * We don't support any options yet - but we might do at some point so |
498 | | * this could be useful. |
499 | | */ |
500 | 0 | return 1; |
501 | 0 | } |
502 | | |
503 | | static const COMP_METHOD *quic_get_compression(OSSL_RECORD_LAYER *rl) |
504 | 0 | { |
505 | | /* We only support TLSv1.3 which doesn't have compression */ |
506 | 0 | return NULL; |
507 | 0 | } |
508 | | |
509 | | static void quic_set_max_frag_len(OSSL_RECORD_LAYER *rl, size_t max_frag_len) |
510 | 0 | { |
511 | | /* This really doesn't make any sense for QUIC. Ignore it */ |
512 | 0 | } |
513 | | |
514 | | static int quic_alloc_buffers(OSSL_RECORD_LAYER *rl) |
515 | 0 | { |
516 | | /* |
517 | | * This is a hint only. We don't support it (yet), so just ignore the |
518 | | * request |
519 | | */ |
520 | 0 | return 1; |
521 | 0 | } |
522 | | |
523 | | static int quic_free_buffers(OSSL_RECORD_LAYER *rl) |
524 | 0 | { |
525 | | /* |
526 | | * This is a hint only. We don't support it (yet), so just ignore the |
527 | | * request |
528 | | */ |
529 | 0 | return 1; |
530 | 0 | } |
531 | | |
532 | | static int quic_set1_bio(OSSL_RECORD_LAYER *rl, BIO *bio) |
533 | 0 | { |
534 | 0 | if (bio != NULL && !BIO_up_ref(bio)) |
535 | 0 | return 0; |
536 | 0 | BIO_free(rl->dummybio); |
537 | 0 | rl->dummybio = bio; |
538 | |
|
539 | 0 | return 1; |
540 | 0 | } |
541 | | |
542 | | /* |
543 | | * Never called functions |
544 | | * |
545 | | * Due to the way we are configured and used we never expect any of the next set |
546 | | * of functions to be called. Therefore we set them to always fail. |
547 | | */ |
548 | | |
549 | | static size_t quic_app_data_pending(OSSL_RECORD_LAYER *rl) |
550 | 0 | { |
551 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
552 | 0 | return (size_t)ossl_assert(0); |
553 | 0 | } |
554 | | |
555 | | static size_t quic_get_max_record_overhead(OSSL_RECORD_LAYER *rl) |
556 | 0 | { |
557 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
558 | 0 | return (size_t)ossl_assert(0); |
559 | 0 | } |
560 | | |
561 | | static int quic_increment_sequence_ctr(OSSL_RECORD_LAYER *rl) |
562 | 0 | { |
563 | 0 | QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
564 | 0 | return ossl_assert(0); |
565 | 0 | } |
566 | | |
567 | | /* End of never called functions */ |
568 | | |
569 | | static const OSSL_RECORD_METHOD quic_tls_record_method = { |
570 | | quic_new_record_layer, |
571 | | quic_free, |
572 | | quic_unprocessed_read_pending, |
573 | | quic_processed_read_pending, |
574 | | quic_app_data_pending, /* Never called */ |
575 | | quic_get_max_records, |
576 | | quic_write_records, |
577 | | quic_retry_write_records, |
578 | | quic_read_record, |
579 | | quic_release_record, |
580 | | quic_get_alert_code, |
581 | | quic_set1_bio, |
582 | | quic_set_protocol_version, |
583 | | quic_set_plain_alerts, |
584 | | quic_set_first_handshake, |
585 | | quic_set_max_pipelines, |
586 | | NULL, /* set_in_init: Optional - we don't need it */ |
587 | | quic_get_state, |
588 | | quic_set_options, |
589 | | quic_get_compression, |
590 | | quic_set_max_frag_len, |
591 | | quic_get_max_record_overhead, /* Never called */ |
592 | | quic_increment_sequence_ctr, /* Never called */ |
593 | | quic_alloc_buffers, |
594 | | quic_free_buffers |
595 | | }; |
596 | | |
597 | | static int add_transport_params_cb(SSL *s, unsigned int ext_type, |
598 | | unsigned int context, |
599 | | const unsigned char **out, size_t *outlen, |
600 | | X509 *x, size_t chainidx, int *al, |
601 | | void *add_arg) |
602 | 0 | { |
603 | 0 | QUIC_TLS *qtls = add_arg; |
604 | |
|
605 | 0 | *out = qtls->local_transport_params; |
606 | 0 | *outlen = qtls->local_transport_params_len; |
607 | 0 | qtls->local_transport_params_consumed = 1; |
608 | 0 | return 1; |
609 | 0 | } |
610 | | |
611 | | static void free_transport_params_cb(SSL *s, unsigned int ext_type, |
612 | | unsigned int context, |
613 | | const unsigned char *out, |
614 | | void *add_arg) |
615 | 0 | { |
616 | 0 | } |
617 | | |
618 | | static int parse_transport_params_cb(SSL *s, unsigned int ext_type, |
619 | | unsigned int context, |
620 | | const unsigned char *in, |
621 | | size_t inlen, X509 *x, |
622 | | size_t chainidx, |
623 | | int *al, void *parse_arg) |
624 | 0 | { |
625 | 0 | QUIC_TLS *qtls = parse_arg; |
626 | |
|
627 | 0 | return qtls->args.got_transport_params_cb(in, inlen, |
628 | 0 | qtls->args.got_transport_params_cb_arg); |
629 | 0 | } |
630 | | |
631 | | QUIC_TLS *ossl_quic_tls_new(const QUIC_TLS_ARGS *args) |
632 | 0 | { |
633 | 0 | QUIC_TLS *qtls; |
634 | |
|
635 | 0 | if (args->crypto_send_cb == NULL |
636 | 0 | || args->crypto_recv_rcd_cb == NULL |
637 | 0 | || args->crypto_release_rcd_cb == NULL) { |
638 | 0 | ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); |
639 | 0 | return NULL; |
640 | 0 | } |
641 | | |
642 | 0 | qtls = OPENSSL_zalloc(sizeof(*qtls)); |
643 | 0 | if (qtls == NULL) |
644 | 0 | return NULL; |
645 | | |
646 | 0 | if (args->ossl_quic && (qtls->error_state = OSSL_ERR_STATE_new()) == NULL) { |
647 | 0 | OPENSSL_free(qtls); |
648 | 0 | return NULL; |
649 | 0 | } |
650 | | |
651 | 0 | qtls->args = *args; |
652 | 0 | return qtls; |
653 | 0 | } |
654 | | |
655 | | void ossl_quic_tls_free(QUIC_TLS *qtls) |
656 | 7.21k | { |
657 | 7.21k | if (qtls == NULL) |
658 | 7.21k | return; |
659 | 0 | OSSL_ERR_STATE_free(qtls->error_state); |
660 | 0 | OPENSSL_free(qtls); |
661 | 0 | } |
662 | | |
663 | | static int raise_error(QUIC_TLS *qtls, uint64_t error_code, |
664 | | const char *error_msg, |
665 | | const char *src_file, |
666 | | int src_line, |
667 | | const char *src_func) |
668 | 0 | { |
669 | | /* |
670 | | * When QTLS fails, add a "cover letter" error with information, potentially |
671 | | * with any underlying libssl errors underneath it (but our cover error may |
672 | | * be the only error in some cases). Then capture this into an ERR_STATE so |
673 | | * we can report it later if need be when the QUIC_CHANNEL asks for it. |
674 | | * For external QUIC TLS we just raise the error. |
675 | | */ |
676 | 0 | ERR_new(); |
677 | 0 | ERR_set_debug(src_file, src_line, src_func); |
678 | 0 | ERR_set_error(ERR_LIB_SSL, SSL_R_QUIC_HANDSHAKE_LAYER_ERROR, |
679 | 0 | "handshake layer error, error code %llu (0x%llx) (\"%s\")", |
680 | 0 | error_code, error_code, error_msg); |
681 | |
|
682 | 0 | if (qtls->args.ossl_quic) { |
683 | 0 | OSSL_ERR_STATE_save_to_mark(qtls->error_state); |
684 | | |
685 | | /* |
686 | | * We record the error information reported via the QUIC protocol |
687 | | * separately. |
688 | | */ |
689 | 0 | qtls->error_code = error_code; |
690 | 0 | qtls->error_msg = error_msg; |
691 | 0 | qtls->inerror = 1; |
692 | |
|
693 | 0 | ERR_pop_to_mark(); |
694 | 0 | } |
695 | 0 | return 0; |
696 | 0 | } |
697 | | |
698 | | #define RAISE_ERROR(qtls, error_code, error_msg) \ |
699 | 0 | raise_error((qtls), (error_code), (error_msg), \ |
700 | 0 | OPENSSL_FILE, OPENSSL_LINE, OPENSSL_FUNC) |
701 | | |
702 | | #ifndef OPENSSL_NO_QUIC |
703 | | # define RAISE_INTERNAL_ERROR(qtls) \ |
704 | 0 | RAISE_ERROR((qtls), OSSL_QUIC_ERR_INTERNAL_ERROR, "internal error") |
705 | | #else |
706 | | # define RAISE_INTERNAL_ERROR(qtls) \ |
707 | | RAISE_ERROR((qtls), 0x01, "internal error") |
708 | | #endif |
709 | | |
710 | | int ossl_quic_tls_configure(QUIC_TLS *qtls) |
711 | 0 | { |
712 | 0 | SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(qtls->args.s); |
713 | 0 | BIO *nullbio; |
714 | |
|
715 | 0 | if (sc == NULL || !SSL_set_min_proto_version(qtls->args.s, TLS1_3_VERSION)) |
716 | 0 | return RAISE_INTERNAL_ERROR(qtls); |
717 | | |
718 | 0 | nullbio = BIO_new(BIO_s_null()); |
719 | 0 | if (nullbio == NULL) |
720 | 0 | return RAISE_INTERNAL_ERROR(qtls); |
721 | | |
722 | | /* |
723 | | * Our custom record layer doesn't use the BIO - but libssl generally |
724 | | * expects one to be present. |
725 | | */ |
726 | 0 | SSL_set_bio(qtls->args.s, nullbio, nullbio); |
727 | |
|
728 | 0 | SSL_clear_options(qtls->args.s, SSL_OP_ENABLE_MIDDLEBOX_COMPAT); |
729 | 0 | ossl_ssl_set_custom_record_layer(sc, &quic_tls_record_method, qtls); |
730 | |
|
731 | 0 | if (!ossl_tls_add_custom_ext_intern(NULL, &sc->cert->custext, |
732 | 0 | qtls->args.is_server ? ENDPOINT_SERVER |
733 | 0 | : ENDPOINT_CLIENT, |
734 | 0 | TLSEXT_TYPE_quic_transport_parameters, |
735 | 0 | SSL_EXT_TLS1_3_ONLY |
736 | 0 | | SSL_EXT_CLIENT_HELLO |
737 | 0 | | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, |
738 | 0 | add_transport_params_cb, |
739 | 0 | free_transport_params_cb, qtls, |
740 | 0 | parse_transport_params_cb, qtls)) |
741 | 0 | return 0; |
742 | | |
743 | 0 | sc->s3.flags |= TLS1_FLAGS_QUIC; |
744 | |
|
745 | 0 | return 1; |
746 | 0 | } |
747 | | |
748 | | #ifndef OPENSSL_NO_QUIC |
749 | | int ossl_quic_tls_tick(QUIC_TLS *qtls) |
750 | 0 | { |
751 | 0 | int ret, err; |
752 | 0 | const unsigned char *alpn; |
753 | 0 | unsigned int alpnlen; |
754 | |
|
755 | 0 | if (qtls->inerror) |
756 | 0 | return 0; |
757 | | |
758 | | /* |
759 | | * SSL_get_error does not truly know what the cause of an SSL_read failure |
760 | | * is and to some extent guesses based on contextual information. In |
761 | | * particular, if there is _any_ ERR on the error stack, SSL_ERROR_SSL or |
762 | | * SSL_ERROR_SYSCALL will be returned no matter what and there is no |
763 | | * possibility of SSL_ERROR_WANT_READ/WRITE being returned, even if that was |
764 | | * the actual cause of the SSL_read() failure. |
765 | | * |
766 | | * This means that ordinarily, the below code might not work right if the |
767 | | * application has any ERR on the error stack. In order to make this code |
768 | | * perform correctly regardless of prior ERR state, we use a variant of |
769 | | * SSL_get_error() which ignores the error stack. However, some ERRs are |
770 | | * raised by SSL_read() and actually indicate that something has gone wrong |
771 | | * during the call to SSL_read(). We therefore adopt a strategy of marking |
772 | | * the ERR stack and seeing if any errors get appended during the call to |
773 | | * SSL_read(). If they are, we assume SSL_read() has raised an error and |
774 | | * that we should use normal SSL_get_error() handling. |
775 | | * |
776 | | * NOTE: Ensure all escape paths from this function call |
777 | | * ERR_clear_to_mark(). The RAISE macros handle this in failure cases. |
778 | | */ |
779 | 0 | ERR_set_mark(); |
780 | |
|
781 | 0 | if (!qtls->configured) { |
782 | 0 | SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(qtls->args.s); |
783 | 0 | SSL_CTX *sctx; |
784 | |
|
785 | 0 | if (sc == NULL) |
786 | 0 | return RAISE_INTERNAL_ERROR(qtls); |
787 | 0 | sctx = SSL_CONNECTION_GET_CTX(sc); |
788 | | |
789 | | /* |
790 | | * No matter how the user has configured us, there are certain |
791 | | * requirements for QUIC-TLS that we enforce |
792 | | */ |
793 | | |
794 | | /* ALPN is a requirement for QUIC and must be set */ |
795 | 0 | if (qtls->args.is_server) { |
796 | 0 | if (sctx->ext.alpn_select_cb == NULL) |
797 | 0 | return RAISE_INTERNAL_ERROR(qtls); |
798 | 0 | } else { |
799 | 0 | if (sc->ext.alpn == NULL || sc->ext.alpn_len == 0) |
800 | 0 | return RAISE_ERROR(qtls, OSSL_QUIC_ERR_CRYPTO_NO_APP_PROTO, |
801 | 0 | "ALPN must be configured when using QUIC"); |
802 | 0 | } |
803 | | |
804 | 0 | if (!ossl_quic_tls_configure(qtls)) |
805 | 0 | return RAISE_INTERNAL_ERROR(qtls); |
806 | | |
807 | 0 | sc->s3.flags |= TLS1_FLAGS_QUIC_INTERNAL; |
808 | |
|
809 | 0 | if (qtls->args.is_server) |
810 | 0 | SSL_set_accept_state(qtls->args.s); |
811 | 0 | else |
812 | 0 | SSL_set_connect_state(qtls->args.s); |
813 | |
|
814 | 0 | qtls->configured = 1; |
815 | 0 | } |
816 | | |
817 | 0 | if (qtls->complete) |
818 | | /* |
819 | | * There should never be app data to read, but calling SSL_read() will |
820 | | * ensure any post-handshake messages are processed. |
821 | | */ |
822 | 0 | ret = SSL_read(qtls->args.s, NULL, 0); |
823 | 0 | else |
824 | 0 | ret = SSL_do_handshake(qtls->args.s); |
825 | |
|
826 | 0 | if (ret <= 0) { |
827 | 0 | err = ossl_ssl_get_error(qtls->args.s, ret, |
828 | 0 | /*check_err=*/ERR_count_to_mark() > 0); |
829 | |
|
830 | 0 | switch (err) { |
831 | 0 | case SSL_ERROR_WANT_READ: |
832 | 0 | case SSL_ERROR_WANT_WRITE: |
833 | 0 | case SSL_ERROR_WANT_CLIENT_HELLO_CB: |
834 | 0 | case SSL_ERROR_WANT_X509_LOOKUP: |
835 | 0 | case SSL_ERROR_WANT_RETRY_VERIFY: |
836 | 0 | ERR_pop_to_mark(); |
837 | 0 | return 1; |
838 | | |
839 | 0 | default: |
840 | 0 | return RAISE_INTERNAL_ERROR(qtls); |
841 | 0 | } |
842 | 0 | } |
843 | | |
844 | 0 | if (!qtls->complete) { |
845 | | /* Validate that we have ALPN */ |
846 | 0 | SSL_get0_alpn_selected(qtls->args.s, &alpn, &alpnlen); |
847 | 0 | if (alpn == NULL || alpnlen == 0) |
848 | 0 | return RAISE_ERROR(qtls, OSSL_QUIC_ERR_CRYPTO_NO_APP_PROTO, |
849 | 0 | "no application protocol negotiated"); |
850 | | |
851 | 0 | qtls->complete = 1; |
852 | 0 | ERR_pop_to_mark(); |
853 | 0 | return qtls->args.handshake_complete_cb(qtls->args.handshake_complete_cb_arg); |
854 | 0 | } |
855 | | |
856 | 0 | ERR_pop_to_mark(); |
857 | 0 | return 1; |
858 | 0 | } |
859 | | #endif |
860 | | |
861 | | void ossl_quic_tls_clear(QUIC_TLS *qtls) |
862 | 14.4k | { |
863 | 14.4k | if (qtls == NULL) |
864 | 14.4k | return; |
865 | 0 | qtls->local_transport_params_consumed = 0; |
866 | 0 | } |
867 | | |
868 | | int ossl_quic_tls_set_transport_params(QUIC_TLS *qtls, |
869 | | const unsigned char *transport_params, |
870 | | size_t transport_params_len) |
871 | 0 | { |
872 | 0 | if (qtls->local_transport_params_consumed) |
873 | 0 | return 0; |
874 | | |
875 | 0 | qtls->local_transport_params = transport_params; |
876 | 0 | qtls->local_transport_params_len = transport_params_len; |
877 | 0 | return 1; |
878 | 0 | } |
879 | | |
880 | | int ossl_quic_tls_get_error(QUIC_TLS *qtls, |
881 | | uint64_t *error_code, |
882 | | const char **error_msg, |
883 | | ERR_STATE **error_state) |
884 | 0 | { |
885 | 0 | if (qtls->inerror) { |
886 | 0 | *error_code = qtls->error_code; |
887 | 0 | *error_msg = qtls->error_msg; |
888 | 0 | *error_state = qtls->error_state; |
889 | 0 | } |
890 | |
|
891 | 0 | return qtls->inerror; |
892 | 0 | } |
893 | | |
894 | | /* |
895 | | * Returns true if the last handshake record message we processed was a |
896 | | * CertificateRequest |
897 | | */ |
898 | | int ossl_quic_tls_is_cert_request(QUIC_TLS *qtls) |
899 | 0 | { |
900 | 0 | SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(qtls->args.s); |
901 | |
|
902 | 0 | if (sc == NULL) |
903 | 0 | return 0; |
904 | | |
905 | 0 | return sc->s3.tmp.message_type == SSL3_MT_CERTIFICATE_REQUEST; |
906 | 0 | } |
907 | | |
908 | | /* |
909 | | * Returns true if the last session associated with the connection has an |
910 | | * invalid max_early_data value for QUIC. |
911 | | */ |
912 | | int ossl_quic_tls_has_bad_max_early_data(QUIC_TLS *qtls) |
913 | 0 | { |
914 | 0 | uint32_t max_early_data = SSL_get0_session(qtls->args.s)->ext.max_early_data; |
915 | | |
916 | | /* |
917 | | * If max_early_data was present we always ensure a non-zero value is |
918 | | * stored in the session for QUIC. Therefore if max_early_data == 0 here |
919 | | * we can be confident that it was not present in the NewSessionTicket |
920 | | */ |
921 | 0 | return max_early_data != 0xffffffff && max_early_data != 0; |
922 | 0 | } |
923 | | |
924 | | int ossl_quic_tls_set_early_data_enabled(QUIC_TLS *qtls, int enabled) |
925 | 0 | { |
926 | 0 | SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(qtls->args.s); |
927 | |
|
928 | 0 | if (sc == NULL || !SSL_IS_QUIC_HANDSHAKE(sc) || !SSL_in_before(qtls->args.s)) |
929 | 0 | return 0; |
930 | | |
931 | 0 | if (!enabled) { |
932 | 0 | sc->max_early_data = 0; |
933 | 0 | sc->early_data_state = SSL_EARLY_DATA_NONE; |
934 | 0 | return 1; |
935 | 0 | } |
936 | | |
937 | 0 | if (sc->server) { |
938 | 0 | sc->max_early_data = 0xffffffff; |
939 | 0 | sc->early_data_state = SSL_EARLY_DATA_ACCEPTING; |
940 | 0 | return 1; |
941 | 0 | } |
942 | | |
943 | 0 | if ((sc->session == NULL || sc->session->ext.max_early_data != 0xffffffff) |
944 | 0 | && sc->psk_use_session_cb == NULL) |
945 | 0 | return 0; |
946 | | |
947 | 0 | sc->early_data_state = SSL_EARLY_DATA_CONNECTING; |
948 | 0 | return 1; |
949 | 0 | } |