blob: 2f3aaae332220588931ea2064f9d81168900e0a7 [file] [log] [blame]
mikescarlettcd0e4752016-02-08 17:35:47 -08001/*
2 * Copyright 2016 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11#include "webrtc/p2p/quic/quicsession.h"
12
kwiberg3ec46792016-04-27 07:22:53 -070013#include <memory>
mikescarlettcd0e4752016-02-08 17:35:47 -080014#include <string>
15#include <vector>
16
17#include "net/base/ip_endpoint.h"
18#include "net/quic/crypto/crypto_server_config_protobuf.h"
19#include "net/quic/crypto/quic_random.h"
20#include "net/quic/crypto/proof_source.h"
21#include "net/quic/crypto/proof_verifier.h"
22#include "net/quic/crypto/quic_crypto_client_config.h"
23#include "net/quic/crypto/quic_crypto_server_config.h"
24#include "net/quic/quic_crypto_client_stream.h"
25#include "net/quic/quic_crypto_server_stream.h"
26#include "webrtc/base/common.h"
27#include "webrtc/base/gunit.h"
28#include "webrtc/p2p/base/faketransportcontroller.h"
29#include "webrtc/p2p/quic/quicconnectionhelper.h"
30#include "webrtc/p2p/quic/reliablequicstream.h"
31
mikescarlettf5377682016-03-29 12:14:55 -070032using net::IPAddress;
mikescarlettcd0e4752016-02-08 17:35:47 -080033using net::IPEndPoint;
mikescarlettf5377682016-03-29 12:14:55 -070034using net::PerPacketOptions;
mikescarlettcd0e4752016-02-08 17:35:47 -080035using net::Perspective;
36using net::ProofVerifyContext;
37using net::ProofVerifyDetails;
38using net::QuicByteCount;
39using net::QuicClock;
mikescarlett8d37d292016-04-29 15:35:00 -070040using net::QuicCompressedCertsCache;
mikescarlettcd0e4752016-02-08 17:35:47 -080041using net::QuicConfig;
42using net::QuicConnection;
43using net::QuicCryptoClientConfig;
44using net::QuicCryptoServerConfig;
45using net::QuicCryptoClientStream;
46using net::QuicCryptoServerStream;
47using net::QuicCryptoStream;
48using net::QuicErrorCode;
49using net::QuicPacketWriter;
50using net::QuicRandom;
51using net::QuicServerConfigProtobuf;
52using net::QuicServerId;
53using net::QuicStreamId;
54using net::WriteResult;
55using net::WriteStatus;
56
57using cricket::FakeTransportChannel;
58using cricket::QuicConnectionHelper;
59using cricket::QuicSession;
60using cricket::ReliableQuicStream;
61using cricket::TransportChannel;
62
63using rtc::Thread;
64
65// Timeout for running asynchronous operations within unit tests.
mikescarlettf5377682016-03-29 12:14:55 -070066static const int kTimeoutMs = 1000;
mikescarlettcd0e4752016-02-08 17:35:47 -080067// Testing SpdyPriority value for creating outgoing ReliableQuicStream.
mikescarlettf5377682016-03-29 12:14:55 -070068static const uint8_t kDefaultPriority = 3;
mikescarlettcd0e4752016-02-08 17:35:47 -080069// TExport keying material function
mikescarlettf5377682016-03-29 12:14:55 -070070static const char kExporterLabel[] = "label";
71static const char kExporterContext[] = "context";
72static const size_t kExporterContextLen = sizeof(kExporterContext);
mikescarlettcd0e4752016-02-08 17:35:47 -080073// Identifies QUIC server session
mikescarlettf5377682016-03-29 12:14:55 -070074static const QuicServerId kServerId("www.google.com", 443);
mikescarlettcd0e4752016-02-08 17:35:47 -080075
76// Used by QuicCryptoServerConfig to provide server credentials, returning a
77// canned response equal to |success|.
78class FakeProofSource : public net::ProofSource {
79 public:
80 explicit FakeProofSource(bool success) : success_(success) {}
81
82 // ProofSource override.
mikescarlettf5377682016-03-29 12:14:55 -070083 bool GetProof(const IPAddress& server_ip,
mikescarlettcd0e4752016-02-08 17:35:47 -080084 const std::string& hostname,
85 const std::string& server_config,
mikescarlettf5377682016-03-29 12:14:55 -070086 net::QuicVersion quic_version,
87 base::StringPiece chlo_hash,
mikescarlettcd0e4752016-02-08 17:35:47 -080088 bool ecdsa_ok,
mikescarlettf5377682016-03-29 12:14:55 -070089 scoped_refptr<net::ProofSource::Chain>* out_certs,
mikescarlettcd0e4752016-02-08 17:35:47 -080090 std::string* out_signature,
91 std::string* out_leaf_cert_sct) override {
92 if (success_) {
mikescarlettf5377682016-03-29 12:14:55 -070093 std::vector<std::string> certs;
94 certs.push_back("Required to establish handshake");
95 *out_certs = new ProofSource::Chain(certs);
96 *out_signature = "Signature";
97 *out_leaf_cert_sct = "Time";
mikescarlettcd0e4752016-02-08 17:35:47 -080098 }
99 return success_;
100 }
101
102 private:
103 // Whether or not obtaining proof source succeeds.
104 bool success_;
105};
106
107// Used by QuicCryptoClientConfig to verify server credentials, returning a
108// canned response of QUIC_SUCCESS if |success| is true.
109class FakeProofVerifier : public net::ProofVerifier {
110 public:
111 explicit FakeProofVerifier(bool success) : success_(success) {}
112
113 // ProofVerifier override
114 net::QuicAsyncStatus VerifyProof(
115 const std::string& hostname,
mikescarlett8d37d292016-04-29 15:35:00 -0700116 const uint16_t port,
mikescarlettcd0e4752016-02-08 17:35:47 -0800117 const std::string& server_config,
mikescarlett8d37d292016-04-29 15:35:00 -0700118 net::QuicVersion quic_version,
119 base::StringPiece chlo_hash,
mikescarlettcd0e4752016-02-08 17:35:47 -0800120 const std::vector<std::string>& certs,
121 const std::string& cert_sct,
122 const std::string& signature,
mikescarlett8d37d292016-04-29 15:35:00 -0700123 const ProofVerifyContext* context,
mikescarlettcd0e4752016-02-08 17:35:47 -0800124 std::string* error_details,
kwiberg3ec46792016-04-27 07:22:53 -0700125 std::unique_ptr<net::ProofVerifyDetails>* verify_details,
mikescarlettcd0e4752016-02-08 17:35:47 -0800126 net::ProofVerifierCallback* callback) override {
127 return success_ ? net::QUIC_SUCCESS : net::QUIC_FAILURE;
128 }
129
130 private:
131 // Whether or not proof verification succeeds.
132 bool success_;
133};
134
135// Writes QUIC packets to a fake transport channel that simulates a network.
136class FakeQuicPacketWriter : public QuicPacketWriter {
137 public:
138 explicit FakeQuicPacketWriter(FakeTransportChannel* fake_channel)
139 : fake_channel_(fake_channel) {}
140
141 // Sends packets across the network.
142 WriteResult WritePacket(const char* buffer,
143 size_t buf_len,
mikescarlettf5377682016-03-29 12:14:55 -0700144 const IPAddress& self_address,
145 const IPEndPoint& peer_address,
146 PerPacketOptions* options) override {
mikescarlettcd0e4752016-02-08 17:35:47 -0800147 rtc::PacketOptions packet_options;
148 int rv = fake_channel_->SendPacket(buffer, buf_len, packet_options, 0);
149 net::WriteStatus status;
150 if (rv > 0) {
151 status = net::WRITE_STATUS_OK;
152 } else if (fake_channel_->GetError() == EWOULDBLOCK) {
153 status = net::WRITE_STATUS_BLOCKED;
154 } else {
155 status = net::WRITE_STATUS_ERROR;
156 }
157 return net::WriteResult(status, rv);
158 }
159
160 // Returns true if the writer buffers and subsequently rewrites data
161 // when an attempt to write results in the underlying socket becoming
162 // write blocked.
163 bool IsWriteBlockedDataBuffered() const override { return true; }
164
165 // Returns true if the network socket is not writable.
166 bool IsWriteBlocked() const override { return !fake_channel_->writable(); }
167
168 // Records that the socket has become writable, for example when an EPOLLOUT
169 // is received or an asynchronous write completes.
170 void SetWritable() override { fake_channel_->SetWritable(true); }
171
172 // Returns the maximum size of the packet which can be written using this
173 // writer for the supplied peer address. This size may actually exceed the
174 // size of a valid QUIC packet.
175 QuicByteCount GetMaxPacketSize(
176 const IPEndPoint& peer_address) const override {
177 return net::kMaxPacketSize;
178 }
179
180 private:
181 FakeTransportChannel* fake_channel_;
182};
183
mikescarlettcd0e4752016-02-08 17:35:47 -0800184// Wrapper for QuicSession and transport channel that stores incoming data.
185class QuicSessionForTest : public QuicSession {
186 public:
kwiberg3ec46792016-04-27 07:22:53 -0700187 QuicSessionForTest(std::unique_ptr<net::QuicConnection> connection,
mikescarlettcd0e4752016-02-08 17:35:47 -0800188 const net::QuicConfig& config,
kwiberg3ec46792016-04-27 07:22:53 -0700189 std::unique_ptr<FakeTransportChannel> channel)
mikescarlettcd0e4752016-02-08 17:35:47 -0800190 : QuicSession(std::move(connection), config),
191 channel_(std::move(channel)) {
192 channel_->SignalReadPacket.connect(
193 this, &QuicSessionForTest::OnChannelReadPacket);
194 }
195
196 // Called when channel has packets to read.
197 void OnChannelReadPacket(TransportChannel* channel,
198 const char* data,
199 size_t size,
200 const rtc::PacketTime& packet_time,
201 int flags) {
202 OnReadPacket(data, size);
203 }
204
205 // Called when peer receives incoming stream from another peer.
206 void OnIncomingStream(ReliableQuicStream* stream) {
207 stream->SignalDataReceived.connect(this,
208 &QuicSessionForTest::OnDataReceived);
209 last_incoming_stream_ = stream;
210 }
211
212 // Called when peer has data to read from incoming stream.
213 void OnDataReceived(net::QuicStreamId id, const char* data, size_t length) {
214 last_received_data_ = std::string(data, length);
215 }
216
217 std::string data() { return last_received_data_; }
218
219 bool has_data() { return data().size() > 0; }
220
221 FakeTransportChannel* channel() { return channel_.get(); }
222
223 ReliableQuicStream* incoming_stream() { return last_incoming_stream_; }
224
225 private:
226 // Transports QUIC packets to/from peer.
kwiberg3ec46792016-04-27 07:22:53 -0700227 std::unique_ptr<FakeTransportChannel> channel_;
mikescarlettcd0e4752016-02-08 17:35:47 -0800228 // Stores data received by peer once it is sent from the other peer.
229 std::string last_received_data_;
230 // Handles incoming streams from sender.
231 ReliableQuicStream* last_incoming_stream_ = nullptr;
232};
233
234// Simulates data transfer between two peers using QUIC.
235class QuicSessionTest : public ::testing::Test,
236 public QuicCryptoClientStream::ProofHandler {
237 public:
mikescarlett8d37d292016-04-29 15:35:00 -0700238 QuicSessionTest()
239 : quic_helper_(rtc::Thread::Current()),
240 quic_compressed_certs_cache_(
241 QuicCompressedCertsCache::kQuicCompressedCertsCacheSize) {}
mikescarlettcd0e4752016-02-08 17:35:47 -0800242
243 // Instantiates |client_peer_| and |server_peer_|.
244 void CreateClientAndServerSessions();
245
kwiberg3ec46792016-04-27 07:22:53 -0700246 std::unique_ptr<QuicSessionForTest> CreateSession(
247 std::unique_ptr<FakeTransportChannel> channel,
mikescarlettcd0e4752016-02-08 17:35:47 -0800248 Perspective perspective);
249
250 QuicCryptoClientStream* CreateCryptoClientStream(QuicSessionForTest* session,
251 bool handshake_success);
252 QuicCryptoServerStream* CreateCryptoServerStream(QuicSessionForTest* session,
253 bool handshake_success);
254
kwiberg3ec46792016-04-27 07:22:53 -0700255 std::unique_ptr<QuicConnection> CreateConnection(
mikescarlettf5377682016-03-29 12:14:55 -0700256 FakeTransportChannel* channel,
257 Perspective perspective);
mikescarlettcd0e4752016-02-08 17:35:47 -0800258
259 void StartHandshake(bool client_handshake_success,
260 bool server_handshake_success);
261
262 // Test handshake establishment and sending/receiving of data.
263 void TestStreamConnection(QuicSessionForTest* from_session,
264 QuicSessionForTest* to_session);
265 // Test that client and server are not connected after handshake failure.
266 void TestDisconnectAfterFailedHandshake();
267
268 // QuicCryptoClientStream::ProofHelper overrides.
269 void OnProofValid(
270 const QuicCryptoClientConfig::CachedState& cached) override {}
271 void OnProofVerifyDetailsAvailable(
272 const ProofVerifyDetails& verify_details) override {}
273
274 protected:
275 QuicConnectionHelper quic_helper_;
276 QuicConfig config_;
277 QuicClock clock_;
mikescarlett8d37d292016-04-29 15:35:00 -0700278 QuicCompressedCertsCache quic_compressed_certs_cache_;
mikescarlettcd0e4752016-02-08 17:35:47 -0800279
kwiberg3ec46792016-04-27 07:22:53 -0700280 std::unique_ptr<QuicSessionForTest> client_peer_;
281 std::unique_ptr<QuicSessionForTest> server_peer_;
mikescarlettcd0e4752016-02-08 17:35:47 -0800282};
283
284// Initializes "client peer" who begins crypto handshake and "server peer" who
285// establishes encryption with client.
286void QuicSessionTest::CreateClientAndServerSessions() {
kwiberg3ec46792016-04-27 07:22:53 -0700287 std::unique_ptr<FakeTransportChannel> channel1(
mikescarlettb9dd7c52016-02-19 20:43:45 -0800288 new FakeTransportChannel("channel1", 0));
kwiberg3ec46792016-04-27 07:22:53 -0700289 std::unique_ptr<FakeTransportChannel> channel2(
mikescarlettb9dd7c52016-02-19 20:43:45 -0800290 new FakeTransportChannel("channel2", 0));
mikescarlettcd0e4752016-02-08 17:35:47 -0800291
292 // Prevent channel1->OnReadPacket and channel2->OnReadPacket from calling
293 // themselves in a loop, which causes to future packets to be recursively
294 // consumed while the current thread blocks consumption of current ones.
295 channel2->SetAsync(true);
296
297 // Configure peers to send packets to each other.
298 channel1->Connect();
299 channel2->Connect();
300 channel1->SetDestination(channel2.get());
301
302 client_peer_ = CreateSession(std::move(channel1), Perspective::IS_CLIENT);
303 server_peer_ = CreateSession(std::move(channel2), Perspective::IS_SERVER);
304}
305
kwiberg3ec46792016-04-27 07:22:53 -0700306std::unique_ptr<QuicSessionForTest> QuicSessionTest::CreateSession(
307 std::unique_ptr<FakeTransportChannel> channel,
mikescarlettcd0e4752016-02-08 17:35:47 -0800308 Perspective perspective) {
kwiberg3ec46792016-04-27 07:22:53 -0700309 std::unique_ptr<QuicConnection> quic_connection =
mikescarlettcd0e4752016-02-08 17:35:47 -0800310 CreateConnection(channel.get(), perspective);
kwiberg3ec46792016-04-27 07:22:53 -0700311 return std::unique_ptr<QuicSessionForTest>(new QuicSessionForTest(
mikescarlettcd0e4752016-02-08 17:35:47 -0800312 std::move(quic_connection), config_, std::move(channel)));
313}
314
315QuicCryptoClientStream* QuicSessionTest::CreateCryptoClientStream(
316 QuicSessionForTest* session,
317 bool handshake_success) {
318 QuicCryptoClientConfig* client_config =
319 new QuicCryptoClientConfig(new FakeProofVerifier(handshake_success));
320 return new QuicCryptoClientStream(
321 kServerId, session, new ProofVerifyContext(), client_config, this);
322}
323
324QuicCryptoServerStream* QuicSessionTest::CreateCryptoServerStream(
325 QuicSessionForTest* session,
326 bool handshake_success) {
327 QuicCryptoServerConfig* server_config =
328 new QuicCryptoServerConfig("TESTING", QuicRandom::GetInstance(),
329 new FakeProofSource(handshake_success));
330 // Provide server with serialized config string to prove ownership.
331 QuicCryptoServerConfig::ConfigOptions options;
332 QuicServerConfigProtobuf* primary_config = server_config->GenerateConfig(
333 QuicRandom::GetInstance(), &clock_, options);
334 server_config->AddConfig(primary_config, clock_.WallNow());
mikescarlett8d37d292016-04-29 15:35:00 -0700335 bool use_stateless_rejects_if_peer_supported = false;
336 return new QuicCryptoServerStream(
337 server_config, &quic_compressed_certs_cache_,
338 use_stateless_rejects_if_peer_supported, session);
mikescarlettcd0e4752016-02-08 17:35:47 -0800339}
340
kwiberg3ec46792016-04-27 07:22:53 -0700341std::unique_ptr<QuicConnection> QuicSessionTest::CreateConnection(
mikescarlettcd0e4752016-02-08 17:35:47 -0800342 FakeTransportChannel* channel,
343 Perspective perspective) {
mikescarlettf5377682016-03-29 12:14:55 -0700344 FakeQuicPacketWriter* writer = new FakeQuicPacketWriter(channel);
mikescarlettcd0e4752016-02-08 17:35:47 -0800345
mikescarlettf5377682016-03-29 12:14:55 -0700346 IPAddress ip(0, 0, 0, 0);
mikescarlettcd0e4752016-02-08 17:35:47 -0800347 bool owns_writer = true;
348
kwiberg3ec46792016-04-27 07:22:53 -0700349 return std::unique_ptr<QuicConnection>(new QuicConnection(
mikescarlettf5377682016-03-29 12:14:55 -0700350 0, net::IPEndPoint(ip, 0), &quic_helper_, writer, owns_writer,
mikescarlettcd0e4752016-02-08 17:35:47 -0800351 perspective, net::QuicSupportedVersions()));
352}
353
354void QuicSessionTest::StartHandshake(bool client_handshake_success,
355 bool server_handshake_success) {
356 server_peer_->StartServerHandshake(
357 CreateCryptoServerStream(server_peer_.get(), server_handshake_success));
358 client_peer_->StartClientHandshake(
359 CreateCryptoClientStream(client_peer_.get(), client_handshake_success));
360}
361
362void QuicSessionTest::TestStreamConnection(QuicSessionForTest* from_session,
363 QuicSessionForTest* to_session) {
364 // Wait for crypto handshake to finish then check if encryption established.
365 ASSERT_TRUE_WAIT(from_session->IsCryptoHandshakeConfirmed() &&
366 to_session->IsCryptoHandshakeConfirmed(),
367 kTimeoutMs);
368
369 ASSERT_TRUE(from_session->IsEncryptionEstablished());
370 ASSERT_TRUE(to_session->IsEncryptionEstablished());
371
mikescarlett8d37d292016-04-29 15:35:00 -0700372 std::string from_key;
373 std::string to_key;
mikescarlettcd0e4752016-02-08 17:35:47 -0800374
375 bool from_success = from_session->ExportKeyingMaterial(
376 kExporterLabel, kExporterContext, kExporterContextLen, &from_key);
377 ASSERT_TRUE(from_success);
378 bool to_success = to_session->ExportKeyingMaterial(
379 kExporterLabel, kExporterContext, kExporterContextLen, &to_key);
380 ASSERT_TRUE(to_success);
381
382 EXPECT_EQ(from_key.size(), kExporterContextLen);
383 EXPECT_EQ(from_key, to_key);
384
385 // Now we can establish encrypted outgoing stream.
386 ReliableQuicStream* outgoing_stream =
387 from_session->CreateOutgoingDynamicStream(kDefaultPriority);
388 ASSERT_NE(nullptr, outgoing_stream);
389 EXPECT_TRUE(from_session->HasOpenDynamicStreams());
390
391 outgoing_stream->SignalDataReceived.connect(
392 from_session, &QuicSessionForTest::OnDataReceived);
393 to_session->SignalIncomingStream.connect(
394 to_session, &QuicSessionForTest::OnIncomingStream);
395
396 // Send a test message from peer 1 to peer 2.
397 const char kTestMessage[] = "Hello, World!";
398 outgoing_stream->Write(kTestMessage, strlen(kTestMessage));
399
400 // Wait for peer 2 to receive messages.
401 ASSERT_TRUE_WAIT(to_session->has_data(), kTimeoutMs);
402
403 ReliableQuicStream* incoming = to_session->incoming_stream();
404 ASSERT_TRUE(incoming);
405 EXPECT_TRUE(to_session->HasOpenDynamicStreams());
406
407 EXPECT_EQ(to_session->data(), kTestMessage);
408
409 // Send a test message from peer 2 to peer 1.
410 const char kTestResponse[] = "Response";
411 incoming->Write(kTestResponse, strlen(kTestResponse));
412
413 // Wait for peer 1 to receive messages.
414 ASSERT_TRUE_WAIT(from_session->has_data(), kTimeoutMs);
415
416 EXPECT_EQ(from_session->data(), kTestResponse);
417}
418
419// Client and server should disconnect when proof verification fails.
420void QuicSessionTest::TestDisconnectAfterFailedHandshake() {
421 EXPECT_TRUE_WAIT(!client_peer_->connection()->connected(), kTimeoutMs);
422 EXPECT_TRUE_WAIT(!server_peer_->connection()->connected(), kTimeoutMs);
423
424 EXPECT_FALSE(client_peer_->IsEncryptionEstablished());
425 EXPECT_FALSE(client_peer_->IsCryptoHandshakeConfirmed());
426
427 EXPECT_FALSE(server_peer_->IsEncryptionEstablished());
428 EXPECT_FALSE(server_peer_->IsCryptoHandshakeConfirmed());
429}
430
431// Establish encryption then send message from client to server.
432TEST_F(QuicSessionTest, ClientToServer) {
433 CreateClientAndServerSessions();
434 StartHandshake(true, true);
435 TestStreamConnection(client_peer_.get(), server_peer_.get());
436}
437
438// Establish encryption then send message from server to client.
439TEST_F(QuicSessionTest, ServerToClient) {
440 CreateClientAndServerSessions();
441 StartHandshake(true, true);
442 TestStreamConnection(server_peer_.get(), client_peer_.get());
443}
444
445// Make client fail to verify proof from server.
446TEST_F(QuicSessionTest, ClientRejection) {
447 CreateClientAndServerSessions();
448 StartHandshake(false, true);
449 TestDisconnectAfterFailedHandshake();
450}
451
452// Make server fail to give proof to client.
453TEST_F(QuicSessionTest, ServerRejection) {
454 CreateClientAndServerSessions();
455 StartHandshake(true, false);
456 TestDisconnectAfterFailedHandshake();
457}
458
459// Test that data streams are not created before handshake.
460TEST_F(QuicSessionTest, CannotCreateDataStreamBeforeHandshake) {
461 CreateClientAndServerSessions();
462 EXPECT_EQ(nullptr, server_peer_->CreateOutgoingDynamicStream(5));
463 EXPECT_EQ(nullptr, client_peer_->CreateOutgoingDynamicStream(5));
464}
mikescarlett18b67a52016-04-11 16:56:23 -0700465
466// Test that closing a QUIC stream causes the QuicSession to remove it.
467TEST_F(QuicSessionTest, CloseQuicStream) {
468 CreateClientAndServerSessions();
469 StartHandshake(true, true);
470 ASSERT_TRUE_WAIT(client_peer_->IsCryptoHandshakeConfirmed() &&
471 server_peer_->IsCryptoHandshakeConfirmed(),
472 kTimeoutMs);
473 ReliableQuicStream* stream = client_peer_->CreateOutgoingDynamicStream(5);
474 ASSERT_NE(nullptr, stream);
475 EXPECT_FALSE(client_peer_->IsClosedStream(stream->id()));
476 stream->Close();
477 EXPECT_TRUE(client_peer_->IsClosedStream(stream->id()));
478}