mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-03 20:27:35 +03:00
104 lines
3.5 KiB
Go
104 lines
3.5 KiB
Go
package handshake
|
|
|
|
import (
|
|
"errors"
|
|
|
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
|
"github.com/lucas-clemente/quic-go/internal/qerr"
|
|
"github.com/lucas-clemente/quic-go/internal/utils"
|
|
"github.com/marten-seemann/qtls"
|
|
)
|
|
|
|
type extensionHandlerClient struct {
|
|
ourParams *TransportParameters
|
|
paramsChan chan<- TransportParameters
|
|
|
|
initialVersion protocol.VersionNumber
|
|
supportedVersions []protocol.VersionNumber
|
|
version protocol.VersionNumber
|
|
|
|
logger utils.Logger
|
|
}
|
|
|
|
var _ tlsExtensionHandler = &extensionHandlerClient{}
|
|
|
|
// newExtensionHandlerClient creates a new extension handler for the client.
|
|
func newExtensionHandlerClient(
|
|
params *TransportParameters,
|
|
initialVersion protocol.VersionNumber,
|
|
supportedVersions []protocol.VersionNumber,
|
|
version protocol.VersionNumber,
|
|
logger utils.Logger,
|
|
) (tlsExtensionHandler, <-chan TransportParameters) {
|
|
// The client reads the transport parameters from the Encrypted Extensions message.
|
|
// The paramsChan is used in the session's run loop's select statement.
|
|
// We have to use an unbuffered channel here to make sure that the session actually processes the transport parameters immediately.
|
|
paramsChan := make(chan TransportParameters)
|
|
return &extensionHandlerClient{
|
|
ourParams: params,
|
|
paramsChan: paramsChan,
|
|
initialVersion: initialVersion,
|
|
supportedVersions: supportedVersions,
|
|
version: version,
|
|
logger: logger,
|
|
}, paramsChan
|
|
}
|
|
|
|
func (h *extensionHandlerClient) GetExtensions(msgType uint8) []qtls.Extension {
|
|
if messageType(msgType) != typeClientHello {
|
|
return nil
|
|
}
|
|
h.logger.Debugf("Sending Transport Parameters: %s", h.ourParams)
|
|
return []qtls.Extension{{
|
|
Type: quicTLSExtensionType,
|
|
Data: (&clientHelloTransportParameters{
|
|
InitialVersion: h.initialVersion,
|
|
Parameters: *h.ourParams,
|
|
}).Marshal(),
|
|
}}
|
|
}
|
|
|
|
func (h *extensionHandlerClient) ReceivedExtensions(msgType uint8, exts []qtls.Extension) error {
|
|
if messageType(msgType) != typeEncryptedExtensions {
|
|
return nil
|
|
}
|
|
|
|
var found bool
|
|
eetp := &encryptedExtensionsTransportParameters{}
|
|
for _, ext := range exts {
|
|
if ext.Type != quicTLSExtensionType {
|
|
continue
|
|
}
|
|
if err := eetp.Unmarshal(ext.Data); err != nil {
|
|
return err
|
|
}
|
|
found = true
|
|
}
|
|
if !found {
|
|
return errors.New("EncryptedExtensions message didn't contain a QUIC extension")
|
|
}
|
|
|
|
// check that the negotiated_version is the current version
|
|
if eetp.NegotiatedVersion != h.version {
|
|
return qerr.Error(qerr.VersionNegotiationMismatch, "current version doesn't match negotiated_version")
|
|
}
|
|
// check that the current version is included in the supported versions
|
|
if !protocol.IsSupportedVersion(eetp.SupportedVersions, h.version) {
|
|
return qerr.Error(qerr.VersionNegotiationMismatch, "current version not included in the supported versions")
|
|
}
|
|
// if version negotiation was performed, check that we would have selected the current version based on the supported versions sent by the server
|
|
if h.version != h.initialVersion {
|
|
negotiatedVersion, ok := protocol.ChooseSupportedVersion(h.supportedVersions, eetp.SupportedVersions)
|
|
if !ok || h.version != negotiatedVersion {
|
|
return qerr.Error(qerr.VersionNegotiationMismatch, "would have picked a different version")
|
|
}
|
|
}
|
|
|
|
// check that the server sent a stateless reset token
|
|
if len(eetp.Parameters.StatelessResetToken) == 0 {
|
|
return errors.New("server didn't sent stateless_reset_token")
|
|
}
|
|
h.logger.Debugf("Received Transport Parameters: %s", &eetp.Parameters)
|
|
h.paramsChan <- eetp.Parameters
|
|
return nil
|
|
}
|