Coverage Report

Created: 2026-05-20 07:05

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/ssl/quic/quic_port.c
Line
Count
Source
1
/*
2
 * Copyright 2023-2026 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include "internal/quic_port.h"
11
#include "internal/quic_channel.h"
12
#include "internal/quic_lcidm.h"
13
#include "internal/quic_srtm.h"
14
#include "internal/quic_txp.h"
15
#include "internal/ssl_unwrap.h"
16
#include "quic_port_local.h"
17
#include "quic_channel_local.h"
18
#include "quic_engine_local.h"
19
#include "quic_local.h"
20
#include "../ssl_local.h"
21
#include <openssl/rand.h>
22
23
/*
24
 * QUIC Port Structure
25
 * ===================
26
 */
27
0
#define INIT_DCID_LEN 8
28
29
static int port_init(QUIC_PORT *port);
30
static void port_cleanup(QUIC_PORT *port);
31
static OSSL_TIME get_time(void *arg);
32
static void port_default_packet_handler(QUIC_URXE *e, void *arg,
33
    const QUIC_CONN_ID *dcid);
34
static void port_rx_pre(QUIC_PORT *port);
35
36
/**
37
 * @struct validation_token
38
 * @brief Represents a validation token for secure connection handling.
39
 *
40
 * This struct is used to store information related to a validation token.
41
 *
42
 * @var validation_token::is_retry
43
 * True iff this validation token is for a token sent in a RETRY packet.
44
 * Otherwise, this token is from a NEW_TOKEN_packet. Iff this value is true,
45
 * then ODCID and RSCID are set.
46
 *
47
 * @var validation_token::timestamp
48
 * Time that the validation token was minted.
49
 *
50
 * @var validation_token::odcid
51
 * An original connection ID (`QUIC_CONN_ID`) used to identify the QUIC
52
 * connection. This ID helps associate the token with a specific connection.
53
 * This will only be valid for validation tokens from RETRY packets.
54
 *
55
 * @var validation_token::rscid
56
 * DCID that the client will use as the DCID of the subsequent initial packet
57
 * i.e the "new" DCID.
58
 * This will only be valid for validation tokens from RETRY packets.
59
 *
60
 * @var validation_token::remote_addr_len
61
 * Length of the following character array.
62
 *
63
 * @var validation_token::remote_addr
64
 * A character array holding the raw address of the client requesting the
65
 * connection.
66
 */
67
typedef struct validation_token {
68
    OSSL_TIME timestamp;
69
    QUIC_CONN_ID odcid;
70
    QUIC_CONN_ID rscid;
71
    size_t remote_addr_len;
72
    unsigned char *remote_addr;
73
    unsigned char is_retry;
74
} QUIC_VALIDATION_TOKEN;
75
76
/*
77
 * Maximum length of a marshalled validation token.
78
 *
79
 * - timestamp is 8 bytes
80
 * - odcid and rscid are maximally 42 bytes in total
81
 * - remote_addr_len is a size_t (8 bytes)
82
 * - remote_addr is in the worst case 110 bytes (in the case of using a
83
 *   maximally sized AF_UNIX socket)
84
 * - is_retry is a single byte
85
 */
86
0
#define MARSHALLED_TOKEN_MAX_LEN 169
87
88
/*
89
 * Maximum length of an encrypted marshalled validation token.
90
 *
91
 * This will include the size of the marshalled validation token plus a 16 byte
92
 * tag and a 12 byte IV, so in total 197 bytes.
93
 */
94
0
#define ENCRYPTED_TOKEN_MAX_LEN (MARSHALLED_TOKEN_MAX_LEN + 16 + 12)
95
96
/* Arbitrary choice of default idle timeout (not an RFC value). */
97
0
#define DEFAULT_IDLE_TIMEOUT 30000
98
99
0
#define DEFAULT_INIT_CONN_RXFC_WND (768 * 1024)
100
0
#define DEFAULT_INIT_STREAM_RXFC_WND (512 * 1024)
101
102
0
#define DEFAULT_INIT_CONN_MAX_STREAMS 100
103
104
0
DEFINE_LIST_OF_IMPL(ch, QUIC_CHANNEL);
Unexecuted instantiation: quic_port.c:ossl_list_ch_head
Unexecuted instantiation: quic_port.c:ossl_list_ch_next
105
0
DEFINE_LIST_OF_IMPL(incoming_ch, QUIC_CHANNEL);
Unexecuted instantiation: quic_port.c:ossl_list_incoming_ch_insert_tail
Unexecuted instantiation: quic_port.c:ossl_list_incoming_ch_head
Unexecuted instantiation: quic_port.c:ossl_list_incoming_ch_remove
106
0
DEFINE_LIST_OF_IMPL(port, QUIC_PORT);
Unexecuted instantiation: quic_port.c:ossl_list_port_insert_tail
Unexecuted instantiation: quic_port.c:ossl_list_port_remove
107
108
QUIC_PORT *ossl_quic_port_new(const QUIC_PORT_ARGS *args)
109
0
{
110
0
    QUIC_PORT *port;
111
112
0
    if ((port = OPENSSL_zalloc(sizeof(QUIC_PORT))) == NULL)
113
0
        return NULL;
114
115
0
    port->engine = args->engine;
116
0
    port->channel_ctx = args->channel_ctx;
117
0
    port->is_multi_conn = args->is_multi_conn;
118
0
    port->validate_addr = args->do_addr_validation;
119
0
    port->get_conn_user_ssl = args->get_conn_user_ssl;
120
0
    port->ql = args->ql;
121
122
0
    if (!port_init(port)) {
123
0
        OPENSSL_free(port);
124
0
        return NULL;
125
0
    }
126
127
0
    return port;
128
0
}
129
130
void ossl_quic_port_free(QUIC_PORT *port)
131
0
{
132
0
    if (port == NULL)
133
0
        return;
134
135
0
    port_cleanup(port);
136
0
    OPENSSL_free(port);
137
0
}
138
139
static int port_init(QUIC_PORT *port)
140
0
{
141
0
    size_t rx_short_dcid_len = (port->is_multi_conn ? INIT_DCID_LEN : 0);
142
0
    int key_len = -1;
143
0
    EVP_CIPHER *cipher = NULL;
144
0
    unsigned char *token_key = NULL;
145
0
    int ret = 0;
146
147
0
    if (port->engine == NULL || port->channel_ctx == NULL)
148
0
        goto err;
149
150
0
    if ((port->err_state = OSSL_ERR_STATE_new()) == NULL)
151
0
        goto err;
152
153
0
    if ((port->demux = ossl_quic_demux_new(/*BIO=*/NULL,
154
0
             /*Short CID Len=*/rx_short_dcid_len,
155
0
             get_time, port))
156
0
        == NULL)
157
0
        goto err;
158
159
0
    ossl_quic_demux_set_default_handler(port->demux,
160
0
        port_default_packet_handler,
161
0
        port);
162
163
0
    if ((port->srtm = ossl_quic_srtm_new(port->engine->libctx,
164
0
             port->engine->propq))
165
0
        == NULL)
166
0
        goto err;
167
168
0
    if ((port->lcidm = ossl_quic_lcidm_new(port->engine->libctx,
169
0
             rx_short_dcid_len))
170
0
        == NULL)
171
0
        goto err;
172
173
0
    port->rx_short_dcid_len = (unsigned char)rx_short_dcid_len;
174
0
    port->tx_init_dcid_len = INIT_DCID_LEN;
175
176
0
    port->max_idle_timeout = DEFAULT_IDLE_TIMEOUT;
177
178
    /*
179
     * We tell the peer we can handle at most this many bytes in a datagram payload.
180
     * However, currently the QUIC_DEMUX in the QRX uses the BIO's MTU as upper bound
181
     * on an incoming datagram size.
182
     */
183
0
    port->max_udp_payload_size = QUIC_MIN_INITIAL_DGRAM_LEN;
184
0
    port->init_max_data = DEFAULT_INIT_CONN_RXFC_WND;
185
0
    port->init_max_stream_data_bidi_local = DEFAULT_INIT_STREAM_RXFC_WND;
186
0
    port->init_max_stream_data_bidi_remote = DEFAULT_INIT_STREAM_RXFC_WND;
187
0
    port->init_max_stream_data_uni = DEFAULT_INIT_STREAM_RXFC_WND;
188
0
    port->init_max_streams_bidi = DEFAULT_INIT_CONN_MAX_STREAMS;
189
0
    port->init_max_streams_uni = DEFAULT_INIT_CONN_MAX_STREAMS;
190
0
    port->ack_delay_exponent = QUIC_DEFAULT_ACK_DELAY_EXP;
191
192
    /*
193
     * Our maximum ACK delay on the TX side. This is up to us to choose. Note that
194
     * this could differ from QUIC_DEFAULT_MAX_DELAY in future as that is a protocol
195
     * value which determines the value of the maximum ACK delay if the
196
     * max_ack_delay transport parameter is not set.
197
     */
198
0
    port->max_ack_delay = QUIC_DEFAULT_MAX_ACK_DELAY;
199
0
    port->disable_active_migration = 1;
200
0
    port->active_conn_id_limit = QUIC_MIN_ACTIVE_CONN_ID_LIMIT;
201
202
0
    port->state = QUIC_PORT_STATE_RUNNING;
203
204
0
    ossl_list_port_insert_tail(&port->engine->port_list, port);
205
0
    port->on_engine_list = 1;
206
0
    port->bio_changed = 1;
207
208
    /* Generate random key for token encryption */
209
0
    if ((port->token_ctx = EVP_CIPHER_CTX_new()) == NULL
210
0
        || (cipher = EVP_CIPHER_fetch(port->engine->libctx,
211
0
                "AES-256-GCM", NULL))
212
0
            == NULL
213
0
        || !EVP_EncryptInit_ex(port->token_ctx, cipher, NULL, NULL, NULL)
214
0
        || (key_len = EVP_CIPHER_CTX_get_key_length(port->token_ctx)) <= 0
215
0
        || (token_key = OPENSSL_malloc(key_len)) == NULL
216
0
        || !RAND_priv_bytes_ex(port->engine->libctx, token_key, key_len, 0)
217
0
        || !EVP_EncryptInit_ex(port->token_ctx, NULL, NULL, token_key, NULL))
218
0
        goto err;
219
220
0
    ret = 1;
221
0
err:
222
0
    EVP_CIPHER_free(cipher);
223
0
    if (key_len >= 1)
224
0
        OPENSSL_clear_free(token_key, key_len);
225
0
    else
226
0
        OPENSSL_free(token_key);
227
0
    if (!ret)
228
0
        port_cleanup(port);
229
0
    return ret;
230
0
}
231
232
static void port_cleanup(QUIC_PORT *port)
233
0
{
234
0
    assert(ossl_list_ch_num(&port->channel_list) == 0);
235
236
0
    ossl_quic_demux_free(port->demux);
237
0
    port->demux = NULL;
238
239
0
    ossl_quic_srtm_free(port->srtm);
240
0
    port->srtm = NULL;
241
242
0
    ossl_quic_lcidm_free(port->lcidm);
243
0
    port->lcidm = NULL;
244
245
0
    OSSL_ERR_STATE_free(port->err_state);
246
0
    port->err_state = NULL;
247
248
0
    if (port->on_engine_list) {
249
0
        ossl_list_port_remove(&port->engine->port_list, port);
250
0
        port->on_engine_list = 0;
251
0
    }
252
253
0
    EVP_CIPHER_CTX_free(port->token_ctx);
254
0
    port->token_ctx = NULL;
255
0
}
256
257
static void port_transition_failed(QUIC_PORT *port)
258
0
{
259
0
    if (port->state == QUIC_PORT_STATE_FAILED)
260
0
        return;
261
262
0
    port->state = QUIC_PORT_STATE_FAILED;
263
0
}
264
265
int ossl_quic_port_is_running(const QUIC_PORT *port)
266
0
{
267
0
    return port->state == QUIC_PORT_STATE_RUNNING;
268
0
}
269
270
QUIC_ENGINE *ossl_quic_port_get0_engine(QUIC_PORT *port)
271
0
{
272
0
    return port->engine;
273
0
}
274
275
QUIC_REACTOR *ossl_quic_port_get0_reactor(QUIC_PORT *port)
276
0
{
277
0
    return ossl_quic_engine_get0_reactor(port->engine);
278
0
}
279
280
QUIC_DEMUX *ossl_quic_port_get0_demux(QUIC_PORT *port)
281
0
{
282
0
    return port->demux;
283
0
}
284
285
CRYPTO_MUTEX *ossl_quic_port_get0_mutex(QUIC_PORT *port)
286
0
{
287
0
    return ossl_quic_engine_get0_mutex(port->engine);
288
0
}
289
290
OSSL_TIME ossl_quic_port_get_time(QUIC_PORT *port)
291
0
{
292
0
    return ossl_quic_engine_get_time(port->engine);
293
0
}
294
295
static OSSL_TIME get_time(void *port)
296
0
{
297
0
    return ossl_quic_port_get_time((QUIC_PORT *)port);
298
0
}
299
300
int ossl_quic_port_get_rx_short_dcid_len(const QUIC_PORT *port)
301
0
{
302
0
    return port->rx_short_dcid_len;
303
0
}
304
305
int ossl_quic_port_get_tx_init_dcid_len(const QUIC_PORT *port)
306
0
{
307
0
    return port->tx_init_dcid_len;
308
0
}
309
310
size_t ossl_quic_port_get_num_incoming_channels(const QUIC_PORT *port)
311
0
{
312
0
    return ossl_list_incoming_ch_num(&port->incoming_channel_list);
313
0
}
314
315
/*
316
 * QUIC Port: Network BIO Configuration
317
 * ====================================
318
 */
319
320
/* Determines whether we can support a given poll descriptor. */
321
static int validate_poll_descriptor(const BIO_POLL_DESCRIPTOR *d)
322
0
{
323
0
    if (d->type == BIO_POLL_DESCRIPTOR_TYPE_SOCK_FD && d->value.fd < 0) {
324
0
        ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT);
325
0
        return 0;
326
0
    }
327
328
0
    return 1;
329
0
}
330
331
BIO *ossl_quic_port_get_net_rbio(QUIC_PORT *port)
332
0
{
333
0
    return port->net_rbio;
334
0
}
335
336
BIO *ossl_quic_port_get_net_wbio(QUIC_PORT *port)
337
0
{
338
0
    return port->net_wbio;
339
0
}
340
341
static int port_update_poll_desc(QUIC_PORT *port, BIO *net_bio, int for_write)
342
0
{
343
0
    BIO_POLL_DESCRIPTOR d = { 0 };
344
345
0
    if (net_bio == NULL
346
0
        || (!for_write && !BIO_get_rpoll_descriptor(net_bio, &d))
347
0
        || (for_write && !BIO_get_wpoll_descriptor(net_bio, &d)))
348
        /* Non-pollable BIO */
349
0
        d.type = BIO_POLL_DESCRIPTOR_TYPE_NONE;
350
351
0
    if (!validate_poll_descriptor(&d))
352
0
        return 0;
353
354
    /*
355
     * TODO(QUIC MULTIPORT): We currently only support one port per
356
     * engine/domain. This is necessitated because QUIC_REACTOR only supports a
357
     * single pollable currently. In the future, once complete polling
358
     * infrastructure has been implemented, this limitation can be removed.
359
     *
360
     * For now, just update the descriptor on the engine's reactor as we are
361
     * guaranteed to be the only port under it.
362
     */
363
0
    if (for_write)
364
0
        ossl_quic_reactor_set_poll_w(&port->engine->rtor, &d);
365
0
    else
366
0
        ossl_quic_reactor_set_poll_r(&port->engine->rtor, &d);
367
368
0
    return 1;
369
0
}
370
371
int ossl_quic_port_update_poll_descriptors(QUIC_PORT *port, int force)
372
0
{
373
0
    int ok = 1;
374
375
0
    if (!force && !port->bio_changed)
376
0
        return 0;
377
378
0
    if (!port_update_poll_desc(port, port->net_rbio, /*for_write=*/0))
379
0
        ok = 0;
380
381
0
    if (!port_update_poll_desc(port, port->net_wbio, /*for_write=*/1))
382
0
        ok = 0;
383
384
0
    port->bio_changed = 0;
385
0
    return ok;
386
0
}
387
388
/*
389
 * We need to determine our addressing mode. There are basically two ways we can
390
 * use L4 addresses:
391
 *
392
 *   - Addressed mode, in which our BIO_sendmmsg calls have destination
393
 *     addresses attached to them which we expect the underlying network BIO to
394
 *     handle;
395
 *
396
 *   - Unaddressed mode, in which the BIO provided to us on the network side
397
 *     neither provides us with L4 addresses nor is capable of honouring ones we
398
 *     provide. We don't know where the QUIC traffic we send ends up exactly and
399
 *     trust the application to know what it is doing.
400
 *
401
 * Addressed mode is preferred because it enables support for connection
402
 * migration, multipath, etc. in the future. Addressed mode is automatically
403
 * enabled if we are using e.g. BIO_s_datagram, with or without BIO_s_connect.
404
 *
405
 * If we are passed a BIO_s_dgram_pair (or some custom BIO) we may have to use
406
 * unaddressed mode unless that BIO supports capability flags indicating it can
407
 * provide and honour L4 addresses.
408
 *
409
 * Our strategy for determining address mode is simple: we probe the underlying
410
 * network BIOs for their capabilities. If the network BIOs support what we
411
 * need, we use addressed mode. Otherwise, we use unaddressed mode.
412
 *
413
 * If addressed mode is chosen, we require an initial peer address to be set. If
414
 * this is not set, we fail. If unaddressed mode is used, we do not require
415
 * this, as such an address is superfluous, though it can be set if desired.
416
 */
417
static void port_update_addressing_mode(QUIC_PORT *port)
418
0
{
419
0
    long rcaps = 0, wcaps = 0;
420
421
0
    if (port->net_rbio != NULL)
422
0
        rcaps = BIO_dgram_get_effective_caps(port->net_rbio);
423
424
0
    if (port->net_wbio != NULL)
425
0
        wcaps = BIO_dgram_get_effective_caps(port->net_wbio);
426
427
0
    port->addressed_mode_r = ((rcaps & BIO_DGRAM_CAP_PROVIDES_SRC_ADDR) != 0);
428
0
    port->addressed_mode_w = ((wcaps & BIO_DGRAM_CAP_HANDLES_DST_ADDR) != 0);
429
0
    port->bio_changed = 1;
430
0
}
431
432
int ossl_quic_port_is_addressed_r(const QUIC_PORT *port)
433
0
{
434
0
    return port->addressed_mode_r;
435
0
}
436
437
int ossl_quic_port_is_addressed_w(const QUIC_PORT *port)
438
0
{
439
0
    return port->addressed_mode_w;
440
0
}
441
442
int ossl_quic_port_is_addressed(const QUIC_PORT *port)
443
0
{
444
0
    return ossl_quic_port_is_addressed_r(port) && ossl_quic_port_is_addressed_w(port);
445
0
}
446
447
/*
448
 * QUIC_PORT does not ref any BIO it is provided with, nor is any ref
449
 * transferred to it. The caller (e.g., QUIC_CONNECTION) is responsible for
450
 * ensuring the BIO lasts until the channel is freed or the BIO is switched out
451
 * for another BIO by a subsequent successful call to this function.
452
 */
453
int ossl_quic_port_set_net_rbio(QUIC_PORT *port, BIO *net_rbio)
454
0
{
455
0
    if (port->net_rbio == net_rbio)
456
0
        return 1;
457
458
0
    if (!port_update_poll_desc(port, net_rbio, /*for_write=*/0))
459
0
        return 0;
460
461
0
    ossl_quic_demux_set_bio(port->demux, net_rbio);
462
0
    port->net_rbio = net_rbio;
463
0
    port_update_addressing_mode(port);
464
0
    return 1;
465
0
}
466
467
int ossl_quic_port_set_net_wbio(QUIC_PORT *port, BIO *net_wbio)
468
0
{
469
0
    QUIC_CHANNEL *ch;
470
471
0
    if (port->net_wbio == net_wbio)
472
0
        return 1;
473
474
0
    if (!port_update_poll_desc(port, net_wbio, /*for_write=*/1))
475
0
        return 0;
476
477
0
    OSSL_LIST_FOREACH(ch, ch, &port->channel_list)
478
0
    ossl_qtx_set_bio(ch->qtx, net_wbio);
479
480
0
    port->net_wbio = net_wbio;
481
0
    port_update_addressing_mode(port);
482
0
    return 1;
483
0
}
484
485
SSL_CTX *ossl_quic_port_get_channel_ctx(QUIC_PORT *port)
486
0
{
487
0
    return port->channel_ctx;
488
0
}
489
490
/*
491
 * QUIC Port: Channel Lifecycle
492
 * ============================
493
 */
494
495
/**
496
 * @brief Create the inner TLS handshake layer for a QUIC channel.
497
 *
498
 * After a successful return:
499
 *   - @c *user_sslp holds the user_ssl. The caller is expected to also
500
 *     stash the returned @c tls in @c ch->tls so the channel can find its
501
 *     inner TLS.
502
 *   - @c qc->tls and @c qc->ch are both set, so a single
503
 *     @c SSL_free(user_ssl) cascades through @c ossl_quic_free() ->
504
 *     @c qc_cleanup() to free the inner TLS and the channel together.
505
 *
506
 * Failure semantics (returns @c NULL)
507
 * -----------------------------------
508
 *   - If the callback never returned a user_ssl (callback missing or it
509
 *     returned @c NULL), nothing was allocated; @c *user_sslp is left
510
 *     untouched and stays whatever the caller initialised it to.
511
 *   - Otherwise, this function frees what it allocated and resets
512
 *     @c *user_sslp to @c NULL before returning. The caller retains ownership
513
 *     of @c ch on failure.
514
 *
515
 * @param port       Port supplying the channel @c SSL_CTX and the
516
 *                   @c get_conn_user_ssl callback.
517
 * @param ch         Channel that the new handshake layer is being attached
518
 *                   to. Borrowed; on success the channel is shared with
519
 *                   user_ssl via @c qc->ch.
520
 * @param user_sslp  In/out parameter. On success, set to the user_ssl
521
 *                   so the caller can later free the whole graph with
522
 *                   @c SSL_free(*user_sslp). On failure, set to @c NULL
523
 *                   if the function actually obtained and freed a
524
 *                   user_ssl; otherwise left untouched.
525
 *
526
 * @return The inner TLS @c SSL_CONNECTION (also stored as @c qc->tls)
527
 *         on success, or @c NULL on failure.
528
 */
529
static SSL *port_new_handshake_layer(QUIC_PORT *port, QUIC_CHANNEL *ch, SSL **user_sslp)
530
0
{
531
0
    SSL *tls = NULL;
532
0
    SSL_CONNECTION *tls_conn = NULL;
533
0
    SSL *user_ssl = NULL;
534
0
    QUIC_CONNECTION *qc = NULL;
535
0
    QUIC_LISTENER *ql = NULL;
536
537
    /*
538
     * It only makes sense to call this function if we know how to associate
539
     * the handshake layer we are about to create with some user_ssl object.
540
     */
541
0
    if (!ossl_assert(port->get_conn_user_ssl != NULL))
542
0
        return NULL;
543
0
    user_ssl = port->get_conn_user_ssl(ch, port->ql);
544
0
    if (user_ssl == NULL)
545
0
        return NULL;
546
0
    qc = (QUIC_CONNECTION *)user_ssl;
547
0
    ql = port->ql;
548
549
    /*
550
     * We expect the user_ssl to be newly created so it must not have an
551
     * existing qc->tls
552
     */
553
0
    if (!ossl_assert(qc->tls == NULL))
554
0
        goto err;
555
556
0
    tls = ossl_ssl_connection_new_int(port->channel_ctx, user_ssl, TLS_method());
557
0
    if (tls == NULL || (tls_conn = SSL_CONNECTION_FROM_SSL(tls)) == NULL)
558
0
        goto err;
559
560
0
    if (ql != NULL && ql->obj.ssl.ctx->new_pending_conn_cb != NULL)
561
0
        if (!ql->obj.ssl.ctx->new_pending_conn_cb(ql->obj.ssl.ctx, user_ssl,
562
0
                ql->obj.ssl.ctx->new_pending_conn_arg))
563
0
            goto err;
564
0
    qc->tls = tls;
565
0
    qc->ch = ch;
566
0
    *user_sslp = user_ssl;
567
568
    /* Override the user_ssl of the inner connection. */
569
0
    tls_conn->s3.flags |= TLS1_FLAGS_QUIC | TLS1_FLAGS_QUIC_INTERNAL;
570
571
    /* Restrict options derived from the SSL_CTX. */
572
0
    tls_conn->options &= OSSL_QUIC_PERMITTED_OPTIONS_CONN;
573
0
    tls_conn->pha_enabled = 0;
574
575
0
    return qc->tls;
576
577
0
err:
578
0
    SSL_free(tls);
579
0
    SSL_free(user_ssl);
580
0
    *user_sslp = NULL;
581
582
0
    return NULL;
583
0
}
584
585
static QUIC_CHANNEL *port_make_channel(QUIC_PORT *port, SSL *tls, OSSL_QRX *qrx,
586
    int is_server, int is_tserver)
587
0
{
588
0
    QUIC_CHANNEL_ARGS args = { 0 };
589
0
    QUIC_CHANNEL *ch;
590
0
    SSL *user_ssl = NULL;
591
0
    int ch_cleaned = 0;
592
593
0
    args.port = port;
594
0
    args.is_server = is_server;
595
0
    args.lcidm = port->lcidm;
596
0
    args.srtm = port->srtm;
597
0
    args.qrx = qrx;
598
0
    args.is_tserver_ch = is_tserver;
599
600
0
    args.max_idle_timeout = port->max_idle_timeout;
601
0
    args.max_udp_payload_size = port->max_udp_payload_size;
602
0
    args.init_max_data = port->init_max_data;
603
0
    args.init_max_stream_data_bidi_local = port->init_max_stream_data_bidi_local;
604
0
    args.init_max_stream_data_bidi_remote = port->init_max_stream_data_bidi_remote;
605
0
    args.init_max_stream_data_uni = port->init_max_stream_data_uni;
606
0
    args.init_max_streams_bidi = port->init_max_streams_bidi;
607
0
    args.init_max_streams_uni = port->init_max_streams_uni;
608
0
    args.ack_delay_exponent = port->ack_delay_exponent;
609
0
    args.max_ack_delay = port->max_ack_delay;
610
0
    args.disable_active_migration = port->disable_active_migration;
611
0
    args.active_conn_id_limit = port->active_conn_id_limit;
612
613
    /*
614
     * Creating a new channel is made a bit tricky here as there is a
615
     * bit of a circular dependency.  Initializing a channel requires that
616
     * the ch->tls and optionally the qlog_title be configured prior to
617
     * initialization, but we need the channel at least partially configured
618
     * to create the new handshake layer, so we have to do this in a few steps.
619
     */
620
621
    /*
622
     * start by allocation and provisioning as much of the channel as we can
623
     */
624
0
    ch = ossl_quic_channel_alloc(&args);
625
0
    if (ch == NULL)
626
0
        return NULL;
627
628
0
    if (tls != NULL) {
629
0
        ch->tls = tls;
630
0
    } else {
631
0
        if (ossl_quic_port_test_and_set_peeloff(port, PEELOFF_ACCEPT)) {
632
            /*
633
             * We're using the normal SSL_accept_connection_path
634
             */
635
0
            tls = port_new_handshake_layer(port, ch, &user_ssl);
636
0
            if (tls == NULL)
637
0
                goto err;
638
0
            ch->tls = tls;
639
0
        } else {
640
            /*
641
             * We're deferring user ssl creation until SSL_listen_ex is called
642
             */
643
0
            ch->tls = NULL;
644
0
        }
645
0
    }
646
0
#ifndef OPENSSL_NO_QLOG
647
    /*
648
     * If we're using qlog, make sure the tls get further configured properly
649
     */
650
0
    ch->use_qlog = 1;
651
0
    if (ch->tls != NULL && ch->tls->ctx->qlog_title != NULL) {
652
0
        OPENSSL_free(ch->qlog_title);
653
0
        if ((ch->qlog_title = OPENSSL_strdup(ch->tls->ctx->qlog_title)) == NULL)
654
0
            goto err;
655
0
    }
656
0
#endif
657
658
    /*
659
     * And finally init the channel struct
660
     */
661
0
    if (!ossl_quic_channel_init(ch)) {
662
0
        ch_cleaned = 1;
663
0
        goto err;
664
0
    }
665
666
0
    ossl_qtx_set_bio(ch->qtx, port->net_wbio);
667
0
    return ch;
668
669
0
err:
670
0
    if (user_ssl != NULL)
671
0
        ((QUIC_CONNECTION *)user_ssl)->ch = NULL;
672
673
0
    if (ch_cleaned)
674
0
        OPENSSL_free(ch);
675
0
    else
676
0
        ossl_quic_channel_free(ch);
677
678
0
    SSL_free(user_ssl);
679
680
0
    return NULL;
681
0
}
682
683
QUIC_CHANNEL *ossl_quic_port_create_outgoing(QUIC_PORT *port, SSL *tls)
684
0
{
685
0
    return port_make_channel(port, tls, NULL, /* is_server= */ 0,
686
0
        /* is_tserver= */ 0);
687
0
}
688
689
QUIC_CHANNEL *ossl_quic_port_create_incoming(QUIC_PORT *port, SSL *tls)
690
0
{
691
0
    QUIC_CHANNEL *ch;
692
693
0
    assert(port->tserver_ch == NULL);
694
695
    /*
696
     * pass -1 for qrx to indicate port will create qrx
697
     * later in port_default_packet_handler() when calling port_bind_channel().
698
     */
699
0
    ch = port_make_channel(port, tls, NULL, /* is_server= */ 1,
700
0
        /* is_tserver_ch */ 1);
701
0
    port->tserver_ch = ch;
702
0
    port->allow_incoming = 1;
703
0
    return ch;
704
0
}
705
706
QUIC_CHANNEL *ossl_quic_port_pop_incoming(QUIC_PORT *port)
707
0
{
708
0
    QUIC_CHANNEL *ch;
709
710
0
    ch = ossl_list_incoming_ch_head(&port->incoming_channel_list);
711
0
    if (ch == NULL)
712
0
        return NULL;
713
714
0
    ossl_list_incoming_ch_remove(&port->incoming_channel_list, ch);
715
0
    return ch;
716
0
}
717
718
int ossl_quic_port_have_incoming(QUIC_PORT *port)
719
0
{
720
0
    return ossl_list_incoming_ch_head(&port->incoming_channel_list) != NULL;
721
0
}
722
723
void ossl_quic_port_drop_incoming(QUIC_PORT *port)
724
0
{
725
0
    QUIC_CHANNEL *ch;
726
0
    SSL *tls;
727
0
    SSL *user_ssl;
728
0
    SSL_CONNECTION *sc;
729
730
0
    for (;;) {
731
0
        ch = ossl_quic_port_pop_incoming(port);
732
0
        if (ch == NULL)
733
0
            break;
734
735
0
        tls = ossl_quic_channel_get0_tls(ch);
736
        /*
737
         * The user ssl may or may not have been created via the
738
         * get_conn_user_ssl callback in the QUIC stack.  The
739
         * differentiation being if the user_ssl pointer and tls pointer
740
         * are different.  If they are, then the user_ssl needs freeing here
741
         * which sends us through ossl_quic_free, which then drops the actual
742
         * ch->tls ref and frees the channel
743
         */
744
0
        sc = SSL_CONNECTION_FROM_SSL(tls);
745
0
        if (sc == NULL)
746
0
            break;
747
748
0
        user_ssl = SSL_CONNECTION_GET_USER_SSL(sc);
749
0
        if (user_ssl == tls) {
750
0
            ossl_quic_channel_free(ch);
751
0
            SSL_free(tls);
752
0
        } else {
753
0
            SSL_free(user_ssl);
754
0
        }
755
0
    }
756
0
}
757
758
void ossl_quic_port_set_allow_incoming(QUIC_PORT *port, int allow_incoming)
759
0
{
760
0
    port->allow_incoming = allow_incoming;
761
0
}
762
763
int ossl_quic_port_test_and_set_peeloff(QUIC_PORT *port, int using_peeloff)
764
0
{
765
766
    /*
767
     * Peeloff state must be one of PEELOFF_LISTEN or PEELOFF_ACCEPT
768
     */
769
0
    if (using_peeloff != PEELOFF_LISTEN && using_peeloff != PEELOFF_ACCEPT)
770
0
        return 0;
771
772
    /*
773
     * We can only set the peeloff state if its not already been set
774
     * or if we're setting it to the already set value
775
     * i.e. this is a trapdoor, once we set using_peeloff to LISTEN or ACCEPT
776
     * Then the only thing we can set that port too in the future is the same value.
777
     */
778
0
    if (port->peeloff_mode != using_peeloff && port->peeloff_mode != PEELOFF_UNSET)
779
0
        return 0;
780
0
    port->peeloff_mode = using_peeloff;
781
0
    return 1;
782
0
}
783
784
/*
785
 * QUIC Port: Ticker-Mutator
786
 * =========================
787
 */
788
789
/*
790
 * Tick function for this port. This does everything related to network I/O for
791
 * this port's network BIOs, and services child channels.
792
 */
793
void ossl_quic_port_subtick(QUIC_PORT *port, QUIC_TICK_RESULT *res,
794
    uint32_t flags)
795
0
{
796
0
    QUIC_CHANNEL *ch;
797
798
0
    res->net_read_desired = ossl_quic_port_is_running(port);
799
0
    res->net_write_desired = 0;
800
0
    res->notify_other_threads = 0;
801
0
    res->tick_deadline = ossl_time_infinite();
802
803
0
    if (!port->engine->inhibit_tick) {
804
        /* Handle any incoming data from network. */
805
0
        if (ossl_quic_port_is_running(port))
806
0
            port_rx_pre(port);
807
808
        /* Iterate through all channels and service them. */
809
0
        OSSL_LIST_FOREACH(ch, ch, &port->channel_list)
810
0
        {
811
0
            QUIC_TICK_RESULT subr = { 0 };
812
813
0
            ossl_quic_channel_subtick(ch, &subr, flags);
814
0
            ossl_quic_tick_result_merge_into(res, &subr);
815
0
        }
816
0
    }
817
0
}
818
819
/* Process incoming datagrams, if any. */
820
static void port_rx_pre(QUIC_PORT *port)
821
0
{
822
0
    int ret;
823
824
    /*
825
     * Originally, this check (don't RX before we have sent anything if we are
826
     * not a server, because there can't be anything) was just intended as a
827
     * minor optimisation. However, it is actually required on Windows, and
828
     * removing this check will cause Windows to break.
829
     *
830
     * The reason is that under Win32, recvfrom() does not work on a UDP socket
831
     * which has not had bind() called (???). However, calling sendto() will
832
     * automatically bind an unbound UDP socket. Therefore, if we call a Winsock
833
     * recv-type function before calling a Winsock send-type function, that call
834
     * will fail with WSAEINVAL, which we will regard as a permanent network
835
     * error.
836
     *
837
     * Therefore, this check is essential as we do not require our API users to
838
     * bind a socket first when using the API in client mode.
839
     */
840
0
    if (!port->allow_incoming && !port->have_sent_any_pkt)
841
0
        return;
842
843
    /*
844
     * Get DEMUX to BIO_recvmmsg from the network and queue incoming datagrams
845
     * to the appropriate QRX instances.
846
     */
847
0
    ret = ossl_quic_demux_pump(port->demux);
848
0
    if (ret == QUIC_DEMUX_PUMP_RES_PERMANENT_FAIL)
849
        /*
850
         * We don't care about transient failure, but permanent failure means we
851
         * should tear down the port. All connections skip straight to the
852
         * Terminated state as there is no point trying to send CONNECTION_CLOSE
853
         * frames if the network BIO is not operating correctly.
854
         */
855
0
        ossl_quic_port_raise_net_error(port, NULL);
856
0
}
857
858
/*
859
 * Handles an incoming connection request and potentially decides to make a
860
 * connection from it. If a new connection is made, the new channel is written
861
 * to *new_ch.
862
 */
863
static void port_bind_channel(QUIC_PORT *port, const BIO_ADDR *peer,
864
    const QUIC_CONN_ID *dcid,
865
    const QUIC_CONN_ID *odcid, OSSL_QRX *qrx,
866
    QUIC_CHANNEL **new_ch)
867
0
{
868
0
    QUIC_CHANNEL *ch;
869
870
    /*
871
     * If we're running with a simulated tserver, it will already have
872
     * a dummy channel created, use that instead
873
     */
874
0
    if (port->tserver_ch != NULL) {
875
0
        ch = port->tserver_ch;
876
0
        port->tserver_ch = NULL;
877
0
        if (peer != NULL && BIO_ADDR_family(peer) != AF_UNSPEC)
878
0
            ossl_quic_channel_set_peer_addr(ch, peer);
879
880
0
        ossl_quic_channel_bind_qrx(ch, qrx);
881
0
        ossl_qrx_set_msg_callback(ch->qrx, ch->msg_callback,
882
0
            ch->msg_callback_ssl);
883
0
        ossl_qrx_set_msg_callback_arg(ch->qrx, ch->msg_callback_arg);
884
0
    } else {
885
0
        ch = port_make_channel(port, NULL, qrx, /* is_server= */ 1,
886
0
            /* is_tserver */ 0);
887
0
    }
888
889
0
    if (ch == NULL)
890
0
        return;
891
892
    /*
893
     * If we didn't provide a qrx here that means we need to set our initial
894
     * secret here, since we just created a qrx
895
     * Normally its not needed, as the initial secret gets added when we send
896
     * our first server hello, but if we get a huge client hello, crossing
897
     * multiple datagrams, we don't have a chance to do that, and datagrams
898
     * after the first won't get decoded properly, for lack of secrets
899
     */
900
0
    if (qrx == NULL)
901
0
        if (!ossl_quic_provide_initial_secret(ch->port->engine->libctx,
902
0
                ch->port->engine->propq,
903
0
                dcid, /* is_server */ 1,
904
0
                ch->qrx, NULL)) {
905
0
            ossl_quic_channel_free(ch);
906
0
            return;
907
0
        }
908
909
0
    if (odcid->id_len != 0) {
910
        /*
911
         * If we have an odcid, then we went through server address validation
912
         * and as such, this channel need not conform to the 3x validation cap
913
         * See RFC 9000 s. 8.1
914
         */
915
0
        ossl_quic_tx_packetiser_set_validated(ch->txp);
916
0
        if (!ossl_quic_bind_channel(ch, peer, dcid, odcid)) {
917
0
            ossl_quic_channel_free(ch);
918
0
            return;
919
0
        }
920
0
    } else {
921
        /*
922
         * No odcid means we didn't do server validation, so we need to
923
         * generate a cid via ossl_quic_channel_on_new_conn
924
         */
925
0
        if (!ossl_quic_channel_on_new_conn(ch, peer, dcid)) {
926
0
            ossl_quic_channel_free(ch);
927
0
            return;
928
0
        }
929
0
    }
930
931
0
    ossl_list_incoming_ch_insert_tail(&port->incoming_channel_list, ch);
932
0
    *new_ch = ch;
933
0
}
934
935
static int port_try_handle_stateless_reset(QUIC_PORT *port, const QUIC_URXE *e)
936
0
{
937
0
    size_t i;
938
0
    const unsigned char *data = ossl_quic_urxe_data(e);
939
0
    void *opaque = NULL;
940
941
    /*
942
     * Perform some fast and cheap checks for a packet not being a stateless
943
     * reset token.  RFC 9000 s. 10.3 specifies this layout for stateless
944
     * reset packets:
945
     *
946
     *  Stateless Reset {
947
     *      Fixed Bits (2) = 1,
948
     *      Unpredictable Bits (38..),
949
     *      Stateless Reset Token (128),
950
     *  }
951
     *
952
     * It also specifies:
953
     *      However, endpoints MUST treat any packet ending in a valid
954
     *      stateless reset token as a Stateless Reset, as other QUIC
955
     *      versions might allow the use of a long header.
956
     *
957
     * We can rapidly check for the minimum length and that the first pair
958
     * of bits in the first byte are 01 or 11.
959
     *
960
     * The function returns 1 if it is a stateless reset packet, 0 if it isn't
961
     * and -1 if an error was encountered.
962
     */
963
0
    if (e->data_len < QUIC_STATELESS_RESET_TOKEN_LEN + 5
964
0
        || (0100 & *data) != 0100)
965
0
        return 0;
966
967
0
    for (i = 0;; ++i) {
968
0
        if (!ossl_quic_srtm_lookup(port->srtm,
969
0
                (const QUIC_STATELESS_RESET_TOKEN *)(data + e->data_len
970
0
                    - sizeof(QUIC_STATELESS_RESET_TOKEN)),
971
0
                i, &opaque, NULL))
972
0
            break;
973
974
0
        assert(opaque != NULL);
975
0
        ossl_quic_channel_on_stateless_reset((QUIC_CHANNEL *)opaque);
976
0
    }
977
978
0
    return i > 0;
979
0
}
980
981
static void cleanup_validation_token(QUIC_VALIDATION_TOKEN *token)
982
0
{
983
0
    OPENSSL_free(token->remote_addr);
984
0
}
985
986
/**
987
 * @brief Generates a validation token for a RETRY/NEW_TOKEN packet.
988
 *
989
 *
990
 * @param peer  Address of the client peer receiving the packet.
991
 * @param odcid DCID of the connection attempt.
992
 * @param rscid Retry source connection ID of the connection attempt.
993
 * @param token Address of token to fill data.
994
 *
995
 * @return 1 if validation token is filled successfully, 0 otherwise.
996
 */
997
static int generate_token(BIO_ADDR *peer, QUIC_CONN_ID odcid,
998
    QUIC_CONN_ID rscid, QUIC_VALIDATION_TOKEN *token,
999
    int is_retry)
1000
0
{
1001
0
    token->is_retry = is_retry;
1002
0
    token->timestamp = ossl_time_now();
1003
0
    token->remote_addr = NULL;
1004
0
    token->odcid = odcid;
1005
0
    token->rscid = rscid;
1006
1007
0
    if (!BIO_ADDR_rawaddress(peer, NULL, &token->remote_addr_len)
1008
0
        || token->remote_addr_len == 0
1009
0
        || (token->remote_addr = OPENSSL_malloc(token->remote_addr_len)) == NULL
1010
0
        || !BIO_ADDR_rawaddress(peer, token->remote_addr,
1011
0
            &token->remote_addr_len)) {
1012
0
        cleanup_validation_token(token);
1013
0
        return 0;
1014
0
    }
1015
1016
0
    return 1;
1017
0
}
1018
1019
/**
1020
 * @brief Marshals a validation token into a new buffer.
1021
 *
1022
 * |buffer| should already be allocated and at least MARSHALLED_TOKEN_MAX_LEN
1023
 * bytes long. Stores the length of data stored in |buffer| in |buffer_len|.
1024
 *
1025
 * @param token      Validation token.
1026
 * @param buffer     Address to store the marshalled token.
1027
 * @param buffer_len Size of data stored in |buffer|.
1028
 */
1029
static int marshal_validation_token(QUIC_VALIDATION_TOKEN *token,
1030
    unsigned char *buffer, size_t *buffer_len)
1031
0
{
1032
0
    WPACKET wpkt = { 0 };
1033
0
    BUF_MEM *buf_mem = BUF_MEM_new();
1034
1035
0
    if (buffer == NULL || buf_mem == NULL
1036
0
        || (token->is_retry != 0 && token->is_retry != 1)) {
1037
0
        BUF_MEM_free(buf_mem);
1038
0
        return 0;
1039
0
    }
1040
1041
0
    if (!WPACKET_init(&wpkt, buf_mem)
1042
0
        || !WPACKET_put_bytes_u8(&wpkt, token->is_retry)
1043
0
        || !WPACKET_memcpy(&wpkt, &token->timestamp,
1044
0
            sizeof(token->timestamp))
1045
0
        || (token->is_retry
1046
0
            && (!WPACKET_sub_memcpy_u8(&wpkt, &token->odcid.id,
1047
0
                    token->odcid.id_len)
1048
0
                || !WPACKET_sub_memcpy_u8(&wpkt, &token->rscid.id,
1049
0
                    token->rscid.id_len)))
1050
0
        || !WPACKET_sub_memcpy_u8(&wpkt, token->remote_addr, token->remote_addr_len)
1051
0
        || !WPACKET_get_total_written(&wpkt, buffer_len)
1052
0
        || *buffer_len > MARSHALLED_TOKEN_MAX_LEN
1053
0
        || !WPACKET_finish(&wpkt)) {
1054
0
        WPACKET_cleanup(&wpkt);
1055
0
        BUF_MEM_free(buf_mem);
1056
0
        return 0;
1057
0
    }
1058
1059
0
    memcpy(buffer, buf_mem->data, *buffer_len);
1060
0
    BUF_MEM_free(buf_mem);
1061
0
    return 1;
1062
0
}
1063
1064
/**
1065
 * @brief Encrypts a validation token using AES-256-GCM
1066
 *
1067
 * @param port       The QUIC port containing the encryption key
1068
 * @param plaintext  The data to encrypt
1069
 * @param pt_len     Length of the plaintext
1070
 * @param ciphertext Buffer to receive encrypted data. If NULL, ct_len will be
1071
 *                   set to the required buffer size and function returns
1072
 *                   immediately.
1073
 * @param ct_len     Pointer to size_t that will receive the ciphertext length.
1074
 *                   This also includes bytes for QUIC_RETRY_INTEGRITY_TAG_LEN.
1075
 *
1076
 * @return 1 on success, 0 on failure
1077
 *
1078
 * The ciphertext format is:
1079
 * [EVP_GCM_IV_LEN bytes IV][encrypted data][EVP_GCM_TAG_LEN bytes tag]
1080
 */
1081
static int encrypt_validation_token(const QUIC_PORT *port,
1082
    const unsigned char *plaintext,
1083
    size_t pt_len,
1084
    unsigned char *ciphertext,
1085
    size_t *ct_len)
1086
0
{
1087
0
    int iv_len, len, ret = 0;
1088
0
    int tag_len;
1089
0
    unsigned char *iv = ciphertext, *data, *tag;
1090
1091
0
    if ((tag_len = EVP_CIPHER_CTX_get_tag_length(port->token_ctx)) <= 0
1092
0
        || (iv_len = EVP_CIPHER_CTX_get_iv_length(port->token_ctx)) <= 0)
1093
0
        goto err;
1094
1095
0
    *ct_len = iv_len + pt_len + tag_len + QUIC_RETRY_INTEGRITY_TAG_LEN;
1096
0
    if (ciphertext == NULL) {
1097
0
        ret = 1;
1098
0
        goto err;
1099
0
    }
1100
1101
0
    data = ciphertext + iv_len;
1102
0
    tag = data + pt_len;
1103
1104
0
    if (!RAND_bytes_ex(port->engine->libctx, ciphertext, iv_len, 0)
1105
0
        || !EVP_EncryptInit_ex(port->token_ctx, NULL, NULL, NULL, iv)
1106
0
        || !EVP_EncryptUpdate(port->token_ctx, data, &len, plaintext, (int)pt_len)
1107
0
        || !EVP_EncryptFinal_ex(port->token_ctx, data + pt_len, &len)
1108
0
        || !EVP_CIPHER_CTX_ctrl(port->token_ctx, EVP_CTRL_GCM_GET_TAG, tag_len, tag))
1109
0
        goto err;
1110
1111
0
    ret = 1;
1112
0
err:
1113
0
    return ret;
1114
0
}
1115
1116
/**
1117
 * @brief Decrypts a validation token using AES-256-GCM
1118
 *
1119
 * @param port       The QUIC port containing the decryption key
1120
 * @param ciphertext The encrypted data (including IV and tag)
1121
 * @param ct_len     Length of the ciphertext
1122
 * @param plaintext  Buffer to receive decrypted data. If NULL, pt_len will be
1123
 *                   set to the required buffer size.
1124
 * @param pt_len     Pointer to size_t that will receive the plaintext length
1125
 *
1126
 * @return 1 on success, 0 on failure
1127
 *
1128
 * Expected ciphertext format:
1129
 * [EVP_GCM_IV_LEN bytes IV][encrypted data][EVP_GCM_TAG_LEN bytes tag]
1130
 */
1131
static int decrypt_validation_token(const QUIC_PORT *port,
1132
    const unsigned char *ciphertext,
1133
    size_t ct_len,
1134
    unsigned char *plaintext,
1135
    size_t *pt_len)
1136
0
{
1137
0
    int iv_len, len = 0, ret = 0;
1138
0
    int tag_len;
1139
0
    const unsigned char *iv = ciphertext, *data, *tag;
1140
1141
0
    if ((tag_len = EVP_CIPHER_CTX_get_tag_length(port->token_ctx)) <= 0
1142
0
        || (iv_len = EVP_CIPHER_CTX_get_iv_length(port->token_ctx)) <= 0)
1143
0
        goto err;
1144
1145
    /* Prevent decryption of a buffer that is not within reasonable bounds */
1146
0
    if (ct_len < (size_t)(iv_len + tag_len) || ct_len > ENCRYPTED_TOKEN_MAX_LEN)
1147
0
        goto err;
1148
1149
0
    *pt_len = ct_len - iv_len - tag_len;
1150
0
    if (plaintext == NULL) {
1151
0
        ret = 1;
1152
0
        goto err;
1153
0
    }
1154
1155
0
    data = ciphertext + iv_len;
1156
0
    tag = ciphertext + ct_len - tag_len;
1157
1158
0
    if (!EVP_DecryptInit_ex(port->token_ctx, NULL, NULL, NULL, iv)
1159
0
        || !EVP_DecryptUpdate(port->token_ctx, plaintext, &len, data,
1160
0
            (int)(ct_len - iv_len - tag_len))
1161
0
        || !EVP_CIPHER_CTX_ctrl(port->token_ctx, EVP_CTRL_GCM_SET_TAG, tag_len,
1162
0
            (void *)tag)
1163
0
        || !EVP_DecryptFinal_ex(port->token_ctx, plaintext + len, &len))
1164
0
        goto err;
1165
1166
0
    ret = 1;
1167
1168
0
err:
1169
0
    return ret;
1170
0
}
1171
1172
/**
1173
 * @brief Parses contents of a buffer into a validation token.
1174
 *
1175
 * VALIDATION_TOKEN should already be initialized. Does some basic sanity checks.
1176
 *
1177
 * @param token   Validation token to fill data in.
1178
 * @param buf     Buffer of previously marshaled validation token.
1179
 * @param buf_len Length of |buf|.
1180
 */
1181
static int parse_validation_token(QUIC_VALIDATION_TOKEN *token,
1182
    const unsigned char *buf, size_t buf_len)
1183
0
{
1184
0
    PACKET pkt, subpkt;
1185
1186
0
    if (buf == NULL || token == NULL)
1187
0
        return 0;
1188
1189
0
    token->remote_addr = NULL;
1190
1191
0
    if (!PACKET_buf_init(&pkt, buf, buf_len)
1192
0
        || !PACKET_copy_bytes(&pkt, &token->is_retry, sizeof(token->is_retry))
1193
0
        || !(token->is_retry == 0 || token->is_retry == 1)
1194
0
        || !PACKET_copy_bytes(&pkt, (unsigned char *)&token->timestamp,
1195
0
            sizeof(token->timestamp))
1196
0
        || (token->is_retry
1197
0
            && (!PACKET_get_length_prefixed_1(&pkt, &subpkt)
1198
0
                || (token->odcid.id_len = (unsigned char)PACKET_remaining(&subpkt))
1199
0
                    > QUIC_MAX_CONN_ID_LEN
1200
0
                || !PACKET_copy_bytes(&subpkt,
1201
0
                    (unsigned char *)&token->odcid.id,
1202
0
                    token->odcid.id_len)
1203
0
                || !PACKET_get_length_prefixed_1(&pkt, &subpkt)
1204
0
                || (token->rscid.id_len = (unsigned char)PACKET_remaining(&subpkt))
1205
0
                    > QUIC_MAX_CONN_ID_LEN
1206
0
                || !PACKET_copy_bytes(&subpkt, (unsigned char *)&token->rscid.id,
1207
0
                    token->rscid.id_len)))
1208
0
        || !PACKET_get_length_prefixed_1(&pkt, &subpkt)
1209
0
        || (token->remote_addr_len = PACKET_remaining(&subpkt)) == 0
1210
0
        || (token->remote_addr = OPENSSL_malloc(token->remote_addr_len)) == NULL
1211
0
        || !PACKET_copy_bytes(&subpkt, token->remote_addr, token->remote_addr_len)
1212
0
        || PACKET_remaining(&pkt) != 0) {
1213
0
        cleanup_validation_token(token);
1214
0
        return 0;
1215
0
    }
1216
1217
0
    return 1;
1218
0
}
1219
1220
/**
1221
 * @brief Sends a QUIC Retry packet to a client.
1222
 *
1223
 * This function constructs and sends a Retry packet to the specified client
1224
 * using the provided connection header information. The Retry packet
1225
 * includes a generated validation token and a new connection ID, following
1226
 * the QUIC protocol specifications for connection establishment.
1227
 *
1228
 * @param port        Pointer to the QUIC port from which to send the packet.
1229
 * @param peer        Address of the client peer receiving the packet.
1230
 * @param client_hdr  Header of the client's initial packet, containing
1231
 *                    connection IDs and other relevant information.
1232
 *
1233
 * This function performs the following steps:
1234
 * - Generates a validation token for the client.
1235
 * - Sets the destination and source connection IDs.
1236
 * - Calculates the integrity tag and sets the token length.
1237
 * - Encodes and sends the packet via the BIO network interface.
1238
 *
1239
 * Error handling is included for failures in CID generation, encoding, and
1240
 * network transmiss
1241
 */
1242
static void port_send_retry(QUIC_PORT *port,
1243
    BIO_ADDR *peer,
1244
    QUIC_PKT_HDR *client_hdr)
1245
0
{
1246
0
    BIO_MSG msg[1];
1247
    /*
1248
     * Buffer is used for both marshalling the token as well as for the RETRY
1249
     * packet. The size of buffer should not be less than
1250
     * MARSHALLED_TOKEN_MAX_LEN.
1251
     */
1252
0
    unsigned char buffer[512];
1253
0
    unsigned char ct_buf[ENCRYPTED_TOKEN_MAX_LEN];
1254
0
    WPACKET wpkt;
1255
0
    size_t written, token_buf_len, ct_len;
1256
0
    QUIC_PKT_HDR hdr = { 0 };
1257
0
    QUIC_VALIDATION_TOKEN token = { 0 };
1258
0
    int ok;
1259
1260
0
    if (!ossl_assert(sizeof(buffer) >= MARSHALLED_TOKEN_MAX_LEN))
1261
0
        return;
1262
    /*
1263
     * 17.2.5.1 Sending a Retry packet
1264
     *   dst ConnId is src ConnId we got from client
1265
     *   src ConnId comes from local conn ID manager
1266
     */
1267
0
    memset(&hdr, 0, sizeof(QUIC_PKT_HDR));
1268
0
    hdr.dst_conn_id = client_hdr->src_conn_id;
1269
    /*
1270
     * this is the random connection ID, we expect client is
1271
     * going to send the ID with next INITIAL packet which
1272
     * will also come with token we generate here.
1273
     */
1274
0
    ok = ossl_quic_lcidm_get_unused_cid(port->lcidm, &hdr.src_conn_id);
1275
0
    if (ok == 0)
1276
0
        goto err;
1277
1278
0
    memset(&token, 0, sizeof(QUIC_VALIDATION_TOKEN));
1279
1280
    /* Generate retry validation token */
1281
0
    if (!generate_token(peer, client_hdr->dst_conn_id,
1282
0
            hdr.src_conn_id, &token, 1)
1283
0
        || !marshal_validation_token(&token, buffer, &token_buf_len)
1284
0
        || !encrypt_validation_token(port, buffer, token_buf_len, NULL,
1285
0
            &ct_len)
1286
0
        || ct_len > ENCRYPTED_TOKEN_MAX_LEN
1287
0
        || !encrypt_validation_token(port, buffer, token_buf_len, ct_buf,
1288
0
            &ct_len)
1289
0
        || !ossl_assert(ct_len >= QUIC_RETRY_INTEGRITY_TAG_LEN))
1290
0
        goto err;
1291
1292
0
    hdr.dst_conn_id = client_hdr->src_conn_id;
1293
0
    hdr.type = QUIC_PKT_TYPE_RETRY;
1294
0
    hdr.fixed = 1;
1295
0
    hdr.version = 1;
1296
0
    hdr.len = ct_len;
1297
0
    hdr.data = ct_buf;
1298
0
    ok = ossl_quic_calculate_retry_integrity_tag(port->engine->libctx,
1299
0
        port->engine->propq, &hdr,
1300
0
        &client_hdr->dst_conn_id,
1301
0
        ct_buf + ct_len
1302
0
            - QUIC_RETRY_INTEGRITY_TAG_LEN);
1303
0
    if (ok == 0)
1304
0
        goto err;
1305
1306
0
    hdr.token = hdr.data;
1307
0
    hdr.token_len = hdr.len;
1308
1309
0
    msg[0].data = buffer;
1310
0
    msg[0].peer = peer;
1311
0
    msg[0].local = NULL;
1312
0
    msg[0].flags = 0;
1313
1314
0
    ok = WPACKET_init_static_len(&wpkt, buffer, sizeof(buffer), 0);
1315
0
    if (ok == 0)
1316
0
        goto err;
1317
1318
0
    ok = ossl_quic_wire_encode_pkt_hdr(&wpkt, client_hdr->dst_conn_id.id_len,
1319
0
        &hdr, NULL);
1320
0
    if (ok == 0)
1321
0
        goto err;
1322
1323
0
    ok = WPACKET_get_total_written(&wpkt, &msg[0].data_len);
1324
0
    if (ok == 0)
1325
0
        goto err;
1326
1327
0
    ok = WPACKET_finish(&wpkt);
1328
0
    if (ok == 0)
1329
0
        goto err;
1330
1331
    /*
1332
     * TODO(QUIC FUTURE) need to retry this in the event it return EAGAIN
1333
     * on a non-blocking BIO
1334
     */
1335
0
    if (!BIO_sendmmsg(port->net_wbio, msg, sizeof(BIO_MSG), 1, 0, &written))
1336
0
        ERR_raise_data(ERR_LIB_SSL, SSL_R_QUIC_NETWORK_ERROR,
1337
0
            "port retry send failed due to network BIO I/O error");
1338
1339
0
err:
1340
0
    cleanup_validation_token(&token);
1341
0
}
1342
1343
/**
1344
 * @brief Sends a QUIC Version Negotiation packet to the specified peer.
1345
 *
1346
 * This function constructs and sends a Version Negotiation packet using
1347
 * the connection IDs from the client's initial packet header. The
1348
 * Version Negotiation packet indicates support for QUIC version 1.
1349
 *
1350
 * @param port      Pointer to the QUIC_PORT structure representing the port
1351
 *                  context used for network communication.
1352
 * @param peer      Pointer to the BIO_ADDR structure specifying the address
1353
 *                  of the peer to which the Version Negotiation packet
1354
 *                  will be sent.
1355
 * @param client_hdr Pointer to the QUIC_PKT_HDR structure containing the
1356
 *                  client's packet header used to extract connection IDs.
1357
 *
1358
 * @note The function will raise an error if sending the message fails.
1359
 */
1360
static void port_send_version_negotiation(QUIC_PORT *port, BIO_ADDR *peer,
1361
    QUIC_PKT_HDR *client_hdr)
1362
0
{
1363
0
    BIO_MSG msg[1];
1364
0
    unsigned char buffer[1024];
1365
0
    QUIC_PKT_HDR hdr;
1366
0
    WPACKET wpkt;
1367
0
    uint32_t supported_versions[1];
1368
0
    size_t written;
1369
0
    size_t i;
1370
1371
0
    memset(&hdr, 0, sizeof(QUIC_PKT_HDR));
1372
    /*
1373
     * Reverse the source and dst conn ids
1374
     */
1375
0
    hdr.dst_conn_id = client_hdr->src_conn_id;
1376
0
    hdr.src_conn_id = client_hdr->dst_conn_id;
1377
1378
    /*
1379
     * This is our list of supported protocol versions
1380
     * Currently only QUIC_VERSION_1
1381
     */
1382
0
    supported_versions[0] = QUIC_VERSION_1;
1383
1384
    /*
1385
     * Fill out the header fields
1386
     * Note: Version negotiation packets, must, unlike
1387
     * other packet types have a version of 0
1388
     */
1389
0
    hdr.type = QUIC_PKT_TYPE_VERSION_NEG;
1390
0
    hdr.version = 0;
1391
0
    hdr.token = 0;
1392
0
    hdr.token_len = 0;
1393
0
    hdr.len = sizeof(supported_versions);
1394
0
    hdr.data = (unsigned char *)supported_versions;
1395
1396
0
    msg[0].data = buffer;
1397
0
    msg[0].peer = peer;
1398
0
    msg[0].local = NULL;
1399
0
    msg[0].flags = 0;
1400
1401
0
    if (!WPACKET_init_static_len(&wpkt, buffer, sizeof(buffer), 0))
1402
0
        return;
1403
1404
0
    if (!ossl_quic_wire_encode_pkt_hdr(&wpkt, client_hdr->dst_conn_id.id_len,
1405
0
            &hdr, NULL))
1406
0
        return;
1407
1408
    /*
1409
     * Add the array of supported versions to the end of the packet
1410
     */
1411
0
    for (i = 0; i < OSSL_NELEM(supported_versions); i++) {
1412
0
        if (!WPACKET_put_bytes_u32(&wpkt, supported_versions[i]))
1413
0
            return;
1414
0
    }
1415
1416
0
    if (!WPACKET_get_total_written(&wpkt, &msg[0].data_len))
1417
0
        return;
1418
1419
0
    if (!WPACKET_finish(&wpkt))
1420
0
        return;
1421
1422
    /*
1423
     * Send it back to the client attempting to connect
1424
     * TODO(QUIC FUTURE): Need to handle the EAGAIN case here, if the
1425
     * BIO_sendmmsg call falls in a retryable manner
1426
     */
1427
0
    if (!BIO_sendmmsg(port->net_wbio, msg, sizeof(BIO_MSG), 1, 0, &written))
1428
0
        ERR_raise_data(ERR_LIB_SSL, SSL_R_QUIC_NETWORK_ERROR,
1429
0
            "port version negotiation send failed");
1430
0
}
1431
1432
/**
1433
 * @brief definitions of token lifetimes
1434
 *
1435
 * RETRY tokens are only valid for 10 seconds
1436
 * NEW_TOKEN tokens have a lifetime of 3600 sec (1 hour)
1437
 */
1438
1439
0
#define RETRY_LIFETIME 10
1440
0
#define NEW_TOKEN_LIFETIME 3600
1441
/**
1442
 * @brief Validates a received token in a QUIC packet header.
1443
 *
1444
 * This function checks the validity of a token contained in the provided
1445
 * QUIC packet header (`QUIC_PKT_HDR *hdr`). The validation process involves
1446
 * verifying that the token matches an expected format and value. If the
1447
 * token is from a RETRY packet, the function extracts the original connection
1448
 * ID (ODCID)/original source connection ID (SCID) and stores it in the provided
1449
 * parameters. If the token is from a NEW_TOKEN packet, the values will be
1450
 * derived instead.
1451
 *
1452
 * @param hdr   Pointer to the QUIC packet header containing the token.
1453
 * @param port  Pointer to the QUIC port from which to send the packet.
1454
 * @param peer  Address of the client peer receiving the packet.
1455
 * @param odcid Pointer to the connection ID structure to store the ODCID if the
1456
 *              token is valid.
1457
 * @param scid  Pointer to the connection ID structure to store the SCID if the
1458
 *              token is valid.
1459
 *
1460
 * @return      1 if the token is valid and ODCID/SCID are successfully set.
1461
 *              0 otherwise.
1462
 *
1463
 * The function performs the following checks:
1464
 * - Token length meets the required minimum.
1465
 * - Buffer matches expected format.
1466
 * - Peer address matches previous connection address.
1467
 * - Token has not expired. Currently set to 10 seconds for tokens from RETRY
1468
 *   packets and 60 minutes for tokens from NEW_TOKEN packets. This may be
1469
 *   configurable in the future.
1470
 */
1471
static int port_validate_token(QUIC_PKT_HDR *hdr, QUIC_PORT *port,
1472
    BIO_ADDR *peer, QUIC_CONN_ID *odcid, uint8_t *gen_new_token)
1473
0
{
1474
0
    int ret = 0;
1475
0
    QUIC_VALIDATION_TOKEN token = { 0 };
1476
0
    uint64_t time_diff;
1477
0
    size_t remote_addr_len, dec_token_len;
1478
0
    unsigned char *remote_addr = NULL, dec_token[MARSHALLED_TOKEN_MAX_LEN];
1479
0
    OSSL_TIME now = ossl_time_now();
1480
1481
0
    *gen_new_token = 0;
1482
1483
0
    if (!decrypt_validation_token(port, hdr->token, hdr->token_len, NULL,
1484
0
            &dec_token_len)
1485
0
        || dec_token_len > MARSHALLED_TOKEN_MAX_LEN
1486
0
        || !decrypt_validation_token(port, hdr->token, hdr->token_len,
1487
0
            dec_token, &dec_token_len)
1488
0
        || !parse_validation_token(&token, dec_token, dec_token_len))
1489
0
        goto err;
1490
1491
    /*
1492
     * Validate token timestamp. Current time should not be before the token
1493
     * timestamp.
1494
     */
1495
0
    if (ossl_time_compare(now, token.timestamp) < 0)
1496
0
        goto err;
1497
0
    time_diff = ossl_time2seconds(ossl_time_abs_difference(token.timestamp,
1498
0
        now));
1499
0
    if ((token.is_retry && time_diff > RETRY_LIFETIME)
1500
0
        || (!token.is_retry && time_diff > NEW_TOKEN_LIFETIME))
1501
0
        goto err;
1502
1503
    /* Validate remote address */
1504
0
    if (!BIO_ADDR_rawaddress(peer, NULL, &remote_addr_len)
1505
0
        || remote_addr_len != token.remote_addr_len
1506
0
        || (remote_addr = OPENSSL_malloc(remote_addr_len)) == NULL
1507
0
        || !BIO_ADDR_rawaddress(peer, remote_addr, &remote_addr_len)
1508
0
        || memcmp(remote_addr, token.remote_addr, remote_addr_len) != 0)
1509
0
        goto err;
1510
1511
    /*
1512
     * Set ODCID and SCID. If the token is from a RETRY packet, retrieve both
1513
     * from the token. Otherwise, generate a new ODCID and use the header's
1514
     * source connection ID for SCID.
1515
     */
1516
0
    if (token.is_retry) {
1517
        /*
1518
         * We're parsing a packet header before its gone through AEAD validation
1519
         * here, so there is a chance we are dealing with corrupted data. Make
1520
         * Sure the dcid encoded in the token matches the headers dcid to
1521
         * mitigate that.
1522
         * TODO(QUIC FUTURE): Consider handling AEAD validation at the port
1523
         * level rather than the QRX/channel level to eliminate the need for
1524
         * this.
1525
         */
1526
0
        if (token.rscid.id_len != hdr->dst_conn_id.id_len
1527
0
            || memcmp(&token.rscid.id, &hdr->dst_conn_id.id,
1528
0
                   token.rscid.id_len)
1529
0
                != 0)
1530
0
            goto err;
1531
0
        *odcid = token.odcid;
1532
0
    } else {
1533
0
        if (!ossl_quic_lcidm_get_unused_cid(port->lcidm, odcid))
1534
0
            goto err;
1535
0
    }
1536
1537
    /*
1538
     * Determine if we need to send a NEW_TOKEN frame
1539
     * If we validated a retry token, we should always
1540
     * send a NEW_TOKEN frame to the client
1541
     *
1542
     * If however, we validated a NEW_TOKEN, which may be
1543
     * reused multiple times, only send a NEW_TOKEN frame
1544
     * if the existing received token has less than 10% of its lifetime
1545
     * remaining.  This prevents us from constantly sending
1546
     * NEW_TOKEN frames on every connection when not needed
1547
     */
1548
0
    if (token.is_retry) {
1549
0
        *gen_new_token = 1;
1550
0
    } else {
1551
0
        if (time_diff > ((NEW_TOKEN_LIFETIME * 9) / 10))
1552
0
            *gen_new_token = 1;
1553
0
    }
1554
1555
0
    ret = 1;
1556
0
err:
1557
0
    cleanup_validation_token(&token);
1558
0
    OPENSSL_free(remote_addr);
1559
0
    return ret;
1560
0
}
1561
1562
static void generate_new_token(QUIC_CHANNEL *ch, BIO_ADDR *peer)
1563
0
{
1564
0
    QUIC_CONN_ID rscid = { 0 };
1565
0
    QUIC_VALIDATION_TOKEN token;
1566
0
    unsigned char buffer[ENCRYPTED_TOKEN_MAX_LEN];
1567
0
    unsigned char *ct_buf;
1568
0
    size_t ct_len;
1569
0
    size_t token_buf_len = 0;
1570
1571
    /* Clients never send a NEW_TOKEN */
1572
0
    if (!ch->is_server)
1573
0
        return;
1574
1575
0
    ct_buf = OPENSSL_zalloc(ENCRYPTED_TOKEN_MAX_LEN);
1576
0
    if (ct_buf == NULL)
1577
0
        return;
1578
1579
    /*
1580
     * NEW_TOKEN tokens may be used for multiple subsequent connections
1581
     * within their timeout period, so don't reserve an rscid here
1582
     * like we do for retry tokens, instead, just fill it with random
1583
     * data, as we won't use it anyway
1584
     */
1585
0
    rscid.id_len = 8;
1586
0
    if (!RAND_bytes_ex(ch->port->engine->libctx, rscid.id, 8, 0)) {
1587
0
        OPENSSL_free(ct_buf);
1588
0
        return;
1589
0
    }
1590
1591
0
    memset(&token, 0, sizeof(QUIC_VALIDATION_TOKEN));
1592
1593
0
    if (!generate_token(peer, ch->init_dcid, rscid, &token, 0)
1594
0
        || !marshal_validation_token(&token, buffer, &token_buf_len)
1595
0
        || !encrypt_validation_token(ch->port, buffer, token_buf_len, NULL,
1596
0
            &ct_len)
1597
0
        || ct_len > ENCRYPTED_TOKEN_MAX_LEN
1598
0
        || !encrypt_validation_token(ch->port, buffer, token_buf_len, ct_buf,
1599
0
            &ct_len)
1600
0
        || !ossl_assert(ct_len >= QUIC_RETRY_INTEGRITY_TAG_LEN)) {
1601
0
        OPENSSL_free(ct_buf);
1602
0
        cleanup_validation_token(&token);
1603
0
        return;
1604
0
    }
1605
1606
0
    ch->pending_new_token = ct_buf;
1607
0
    ch->pending_new_token_len = ct_len;
1608
1609
0
    cleanup_validation_token(&token);
1610
0
}
1611
1612
/*
1613
 * This is called by the demux when we get a packet not destined for any known
1614
 * DCID.
1615
 */
1616
static void port_default_packet_handler(QUIC_URXE *e, void *arg,
1617
    const QUIC_CONN_ID *dcid)
1618
0
{
1619
0
    QUIC_PORT *port = arg;
1620
0
    PACKET pkt;
1621
0
    QUIC_PKT_HDR hdr;
1622
0
    QUIC_CHANNEL *ch = NULL, *new_ch = NULL;
1623
0
    QUIC_CONN_ID odcid;
1624
0
    uint8_t gen_new_token = 0;
1625
0
    OSSL_QRX *qrx = NULL;
1626
0
    OSSL_QRX *qrx_src = NULL;
1627
0
    OSSL_QRX_ARGS qrx_args = { 0 };
1628
0
    uint64_t cause_flags = 0;
1629
0
    OSSL_QRX_PKT *qrx_pkt = NULL;
1630
1631
    /* Don't handle anything if we are no longer running. */
1632
0
    if (!ossl_quic_port_is_running(port))
1633
0
        goto undesirable;
1634
1635
0
    if (port_try_handle_stateless_reset(port, e))
1636
0
        goto undesirable;
1637
1638
0
    if (dcid != NULL
1639
0
        && ossl_quic_lcidm_lookup(port->lcidm, dcid, NULL,
1640
0
            (void **)&ch)) {
1641
0
        assert(ch != NULL);
1642
0
        ossl_quic_channel_inject(ch, e);
1643
0
        return;
1644
0
    }
1645
1646
    /*
1647
     * If we have an incoming packet which doesn't match any existing connection
1648
     * we assume this is an attempt to make a new connection.
1649
     */
1650
0
    if (!port->allow_incoming)
1651
0
        goto undesirable;
1652
1653
    /*
1654
     * packet without destination connection id is invalid/corrupted here.
1655
     * stop wasting CPU cycles now.
1656
     */
1657
0
    if (dcid == NULL)
1658
0
        goto undesirable;
1659
1660
    /*
1661
     * We have got a packet for an unknown DCID. This might be an attempt to
1662
     * open a new connection.
1663
     */
1664
0
    if (e->data_len < QUIC_MIN_INITIAL_DGRAM_LEN)
1665
0
        goto undesirable;
1666
1667
0
    if (!PACKET_buf_init(&pkt, ossl_quic_urxe_data(e), e->data_len))
1668
0
        goto undesirable;
1669
1670
    /*
1671
     * We set short_conn_id_len to SIZE_MAX here which will cause the decode
1672
     * operation to fail if we get a 1-RTT packet. This is fine since we only
1673
     * care about Initial packets.
1674
     */
1675
0
    if (!ossl_quic_wire_decode_pkt_hdr(&pkt, SIZE_MAX, 1, 0, &hdr, NULL,
1676
0
            &cause_flags)) {
1677
        /*
1678
         * If we fail due to a bad version, we know the packet up to the version
1679
         * number was decoded, and we use it below to send a version
1680
         * negotiation packet
1681
         */
1682
0
        if ((cause_flags & QUIC_PKT_HDR_DECODE_BAD_VERSION) == 0)
1683
0
            goto undesirable;
1684
0
    }
1685
1686
0
    switch (hdr.version) {
1687
0
    case QUIC_VERSION_1:
1688
0
        break;
1689
1690
0
    case QUIC_VERSION_NONE:
1691
0
    default:
1692
1693
        /*
1694
         * If we get here, then we have a bogus version, and might need
1695
         * to send a version negotiation packet.  According to
1696
         * RFC 9000 s. 6 and 14.1, we only do so however, if the UDP datagram
1697
         * is a minimum of 1200 bytes in size
1698
         */
1699
0
        if (e->data_len < 1200)
1700
0
            goto undesirable;
1701
1702
        /*
1703
         * If we don't get a supported version, respond with a ver
1704
         * negotiation packet, and discard
1705
         * TODO(QUIC FUTURE): Rate limit the reception of these
1706
         */
1707
0
        port_send_version_negotiation(port, &e->peer, &hdr);
1708
0
        goto undesirable;
1709
0
    }
1710
1711
    /*
1712
     * We only care about Initial packets which might be trying to establish a
1713
     * connection.
1714
     */
1715
0
    if (hdr.type != QUIC_PKT_TYPE_INITIAL)
1716
0
        goto undesirable;
1717
1718
0
    odcid.id_len = 0;
1719
1720
    /*
1721
     * Create qrx now so we can check integrity of packet
1722
     * which does not belong to any channel.
1723
     */
1724
0
    qrx_args.libctx = port->engine->libctx;
1725
0
    qrx_args.demux = port->demux;
1726
0
    qrx_args.short_conn_id_len = dcid->id_len;
1727
0
    qrx_args.max_deferred = 32;
1728
0
    qrx = ossl_qrx_new(&qrx_args);
1729
0
    if (qrx == NULL)
1730
0
        goto undesirable;
1731
1732
    /*
1733
     * Derive secrets for qrx only.
1734
     */
1735
0
    if (!ossl_quic_provide_initial_secret(port->engine->libctx,
1736
0
            port->engine->propq,
1737
0
            &hdr.dst_conn_id,
1738
0
            /* is_server */ 1,
1739
0
            qrx, NULL))
1740
0
        goto undesirable;
1741
1742
0
    if (ossl_qrx_validate_initial_packet(qrx, e, (const QUIC_CONN_ID *)dcid) == 0)
1743
0
        goto undesirable;
1744
1745
0
    if (port->validate_addr == 0) {
1746
        /*
1747
         * Forget qrx, because it becomes (almost) useless here. We must let
1748
         * channel to create a new QRX for connection ID server chooses. The
1749
         * validation keys for new DCID will be derived by
1750
         * ossl_quic_channel_on_new_conn() when we will be creating channel.
1751
         * See RFC 9000 section 7.2 negotiating connection id to better
1752
         * understand what's going on here.
1753
         *
1754
         * Did we say qrx is almost useless? Why? Because qrx remembers packets
1755
         * we just validated. Those packets must be injected to channel we are
1756
         * going to create. We use qrx_src alias so we can read packets from
1757
         * qrx and inject them to channel.
1758
         */
1759
0
        qrx_src = qrx;
1760
0
        qrx = NULL;
1761
0
    }
1762
    /*
1763
     * TODO(QUIC FUTURE): there should be some logic similar to accounting half-open
1764
     * states in TCP. If we reach certain threshold, then we want to
1765
     * validate clients.
1766
     */
1767
0
    if (port->validate_addr == 1 && hdr.token == NULL) {
1768
0
        port_send_retry(port, &e->peer, &hdr);
1769
0
        goto undesirable;
1770
0
    }
1771
1772
    /*
1773
     * Note, even if we don't enforce the sending of retry frames for
1774
     * server address validation, we may still get a token if we sent
1775
     * a NEW_TOKEN frame during a prior connection, which we should still
1776
     * validate here
1777
     */
1778
0
    if (hdr.token != NULL
1779
0
        && port_validate_token(&hdr, port, &e->peer,
1780
0
               &odcid, &gen_new_token)
1781
0
            == 0) {
1782
        /*
1783
         * RFC 9000 s 8.1.3
1784
         * When a server receives an Initial packet with an address
1785
         * validation token, it MUST attempt to validate the token,
1786
         * unless it has already completed address validation.
1787
         * If the token is invalid, then the server SHOULD proceed as
1788
         * if the client did not have a validated address,
1789
         * including potentially sending a Retry packet
1790
         * Note: If address validation is disabled, just act like
1791
         * the request is valid
1792
         */
1793
0
        if (port->validate_addr == 1) {
1794
            /*
1795
             * Again: we should consider saving initial encryption level
1796
             * secrets to token here to save some CPU cycles.
1797
             */
1798
0
            port_send_retry(port, &e->peer, &hdr);
1799
0
            goto undesirable;
1800
0
        }
1801
1802
        /*
1803
         * client is under amplification limit, until it completes
1804
         * handshake.
1805
         *
1806
         * forget qrx so channel can create a new one
1807
         * with valid initial encryption level keys.
1808
         */
1809
0
        qrx_src = qrx;
1810
0
        qrx = NULL;
1811
0
    }
1812
1813
0
    port_bind_channel(port, &e->peer, &hdr.dst_conn_id,
1814
0
        &odcid, qrx, &new_ch);
1815
1816
    /*
1817
     * if packet validates it gets moved to channel, we've just bound
1818
     * to port.
1819
     */
1820
0
    if (new_ch == NULL)
1821
0
        goto undesirable;
1822
1823
    /*
1824
     * Generate a token for sending in a later NEW_TOKEN frame
1825
     */
1826
0
    if (gen_new_token == 1)
1827
0
        generate_new_token(new_ch, &e->peer);
1828
1829
0
    if (qrx != NULL) {
1830
        /*
1831
         * The qrx belongs to channel now, so don't free it.
1832
         */
1833
0
        qrx = NULL;
1834
0
    } else {
1835
        /*
1836
         * We still need to salvage packets from almost forgotten qrx
1837
         * and pass them to channel.
1838
         */
1839
0
        while (ossl_qrx_read_pkt(qrx_src, &qrx_pkt) == 1)
1840
0
            ossl_quic_channel_inject_pkt(new_ch, qrx_pkt);
1841
0
        ossl_qrx_update_pn_space(qrx_src, new_ch->qrx);
1842
0
    }
1843
1844
    /*
1845
     * If function reaches this place, then packet got validated in
1846
     * ossl_qrx_validate_initial_packet(). Keep in mind the function
1847
     * ossl_qrx_validate_initial_packet() decrypts the packet to validate it.
1848
     * If packet validation was successful (and it was because we are here),
1849
     * then the function puts the packet to qrx->rx_pending. We must not call
1850
     * ossl_qrx_inject_urxe() here now, because we don't want to insert
1851
     * the packet to qrx->urx_pending which keeps packet waiting for decryption.
1852
     *
1853
     * We are going to call ossl_quic_demux_release_urxe() to dispose buffer
1854
     * which still holds encrypted data.
1855
     */
1856
1857
0
undesirable:
1858
0
    ossl_qrx_free(qrx);
1859
0
    ossl_qrx_free(qrx_src);
1860
0
    ossl_quic_demux_release_urxe(port->demux, e);
1861
0
}
1862
1863
void ossl_quic_port_raise_net_error(QUIC_PORT *port,
1864
    QUIC_CHANNEL *triggering_ch)
1865
0
{
1866
0
    QUIC_CHANNEL *ch;
1867
1868
0
    if (!ossl_quic_port_is_running(port))
1869
0
        return;
1870
1871
    /*
1872
     * Immediately capture any triggering error on the error stack, with a
1873
     * cover error.
1874
     */
1875
0
    ERR_raise_data(ERR_LIB_SSL, SSL_R_QUIC_NETWORK_ERROR,
1876
0
        "port failed due to network BIO I/O error");
1877
0
    OSSL_ERR_STATE_save(port->err_state);
1878
1879
0
    port_transition_failed(port);
1880
1881
    /* Give the triggering channel (if any) the first notification. */
1882
0
    if (triggering_ch != NULL)
1883
0
        ossl_quic_channel_raise_net_error(triggering_ch);
1884
1885
0
    OSSL_LIST_FOREACH(ch, ch, &port->channel_list)
1886
0
    if (ch != triggering_ch)
1887
0
        ossl_quic_channel_raise_net_error(ch);
1888
0
}
1889
1890
void ossl_quic_port_restore_err_state(const QUIC_PORT *port)
1891
0
{
1892
0
    ERR_clear_error();
1893
0
    OSSL_ERR_STATE_restore(port->err_state);
1894
0
}
1895
1896
void ossl_quic_port_set_max_idle_timeout(QUIC_PORT *port, uint64_t ms)
1897
0
{
1898
0
    port->max_idle_timeout = ms;
1899
0
}
1900
1901
uint64_t ossl_quic_port_get_max_idle_timeout(const QUIC_PORT *port)
1902
0
{
1903
0
    return port->max_idle_timeout;
1904
0
}
1905
1906
void ossl_quic_port_set_max_udp_payload_size(QUIC_PORT *port, uint64_t size)
1907
0
{
1908
0
    port->max_udp_payload_size = size;
1909
0
}
1910
1911
uint64_t ossl_quic_port_get_max_udp_payload_size(const QUIC_PORT *port)
1912
0
{
1913
0
    return port->max_udp_payload_size;
1914
0
}
1915
1916
void ossl_quic_port_set_init_max_data(QUIC_PORT *port, uint64_t max_data)
1917
0
{
1918
0
    port->init_max_data = max_data;
1919
0
}
1920
1921
uint64_t ossl_quic_port_get_init_max_data(const QUIC_PORT *port)
1922
0
{
1923
0
    return port->init_max_data;
1924
0
}
1925
1926
void ossl_quic_port_set_init_max_stream_data(QUIC_PORT *port, uint64_t max_data, int is_uni, int is_remote)
1927
0
{
1928
0
    if (is_uni) {
1929
0
        port->init_max_stream_data_uni = max_data;
1930
0
    } else {
1931
0
        if (is_remote)
1932
0
            port->init_max_stream_data_bidi_remote = max_data;
1933
0
        else
1934
0
            port->init_max_stream_data_bidi_local = max_data;
1935
0
    }
1936
0
}
1937
1938
uint64_t ossl_quic_port_get_init_max_stream_data(const QUIC_PORT *port, int is_uni, int is_remote)
1939
0
{
1940
0
    if (is_uni)
1941
0
        return port->init_max_stream_data_uni;
1942
0
    else
1943
0
        return is_remote ? port->init_max_stream_data_bidi_remote : port->init_max_stream_data_bidi_local;
1944
0
}
1945
1946
void ossl_quic_port_set_init_max_streams(QUIC_PORT *port, uint64_t max_streams, int is_uni)
1947
0
{
1948
0
    if (is_uni) {
1949
0
        port->init_max_streams_uni = max_streams;
1950
0
    } else {
1951
0
        port->init_max_streams_bidi = max_streams;
1952
0
    }
1953
0
}
1954
1955
uint64_t ossl_quic_port_get_init_max_streams(const QUIC_PORT *port, int is_uni)
1956
0
{
1957
0
    return is_uni ? port->init_max_streams_uni : port->init_max_streams_bidi;
1958
0
}
1959
1960
void ossl_quic_port_set_ack_delay_exponent(QUIC_PORT *port, uint64_t exp)
1961
0
{
1962
0
    port->ack_delay_exponent = (unsigned char)exp;
1963
0
}
1964
1965
uint64_t ossl_quic_port_get_ack_delay_exponent(const QUIC_PORT *port)
1966
0
{
1967
0
    return port->ack_delay_exponent;
1968
0
}
1969
1970
void ossl_quic_port_set_max_ack_delay(QUIC_PORT *port, uint64_t ms)
1971
0
{
1972
0
    port->max_ack_delay = ms;
1973
0
}
1974
1975
uint64_t ossl_quic_port_get_max_ack_delay(const QUIC_PORT *port)
1976
0
{
1977
0
    return port->max_ack_delay;
1978
0
}
1979
1980
void ossl_quic_port_set_disable_active_migration(QUIC_PORT *port, uint64_t disable)
1981
0
{
1982
0
    port->disable_active_migration = (unsigned char)disable;
1983
0
}
1984
1985
uint64_t ossl_quic_port_get_disable_active_migration(const QUIC_PORT *port)
1986
0
{
1987
0
    return port->disable_active_migration;
1988
0
}
1989
1990
void ossl_quic_port_set_active_conn_id_limit(QUIC_PORT *port, uint64_t limit)
1991
0
{
1992
0
    port->active_conn_id_limit = limit;
1993
0
}
1994
1995
uint64_t ossl_quic_port_get_active_conn_id_limit(const QUIC_PORT *port)
1996
0
{
1997
0
    return port->active_conn_id_limit;
1998
0
}