/* * Copyright 2022 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "internal/packet_quic.h" #include "internal/nelem.h" #include "internal/quic_wire.h" #include "internal/quic_record_rx.h" #include "internal/quic_ackm.h" #include "internal/quic_rx_depack.h" #include "internal/quic_error.h" #include "internal/quic_fc.h" #include "internal/quic_channel.h" #include "internal/sockets.h" #include "quic_local.h" #include "quic_channel_local.h" #include "../ssl_local.h" /* * Helper functions to process different frame types. * * Typically, those that are ACK eliciting will take an OSSL_ACKM_RX_PKT * pointer argument, the few that aren't ACK eliciting will not. This makes * them a verifiable pattern against tables where this is specified. */ static int depack_do_implicit_stream_create(QUIC_CHANNEL *ch, uint64_t stream_id, uint64_t frame_type, QUIC_STREAM **result); static int depack_do_frame_padding(PACKET *pkt) { /* We ignore this frame */ ossl_quic_wire_decode_padding(pkt); return 1; } static int depack_do_frame_ping(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { /* We ignore this frame, apart from eliciting an ACK */ if (!ossl_quic_wire_decode_frame_ping(pkt)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_PING, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; return 1; } static int depack_do_frame_ack(PACKET *pkt, QUIC_CHANNEL *ch, int packet_space, OSSL_TIME received, uint64_t frame_type, OSSL_QRX_PKT *qpacket) { OSSL_QUIC_FRAME_ACK ack; OSSL_QUIC_ACK_RANGE *ack_ranges = NULL; uint64_t total_ranges = 0; uint32_t ack_delay_exp = ch->rx_ack_delay_exp; if (!ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &total_ranges) /* In case sizeof(uint64_t) > sizeof(size_t) */ || total_ranges > SIZE_MAX / sizeof(ack_ranges[0]) || (ack_ranges = OPENSSL_zalloc(sizeof(ack_ranges[0]) * (size_t)total_ranges)) == NULL) goto malformed; ack.ack_ranges = ack_ranges; ack.num_ack_ranges = (size_t)total_ranges; if (!ossl_quic_wire_decode_frame_ack(pkt, ack_delay_exp, &ack, NULL)) goto malformed; if (qpacket->hdr->type == QUIC_PKT_TYPE_1RTT && (qpacket->key_epoch < ossl_qrx_get_key_epoch(ch->qrx) || ch->rxku_expected) && ack.ack_ranges[0].end >= ch->txku_pn) { /* * RFC 9001 s. 6.2: An endpoint that receives an acknowledgment that is * carried in a packet protected with old keys where any acknowledged * packet was protected with newer keys MAY treat that as a connection * error of type KEY_UPDATE_ERROR. * * Two cases to handle here: * * - We did spontaneous TXKU, the peer has responded in kind and we * have detected RXKU; !ch->rxku_expected, but then it sent a packet * with old keys acknowledging a packet in the new key epoch. * * This also covers the case where we got RXKU and triggered * solicited TXKU, and then for some reason the peer sent an ACK of * a PN in our new TX key epoch with old keys. * * - We did spontaneous TXKU; ch->txku_pn is the starting PN of our * new TX key epoch; the peer has not initiated a solicited TXKU in * response (so we have not detected RXKU); in this case the RX key * epoch has not incremented and ch->rxku_expected is still 1. */ ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_KEY_UPDATE_ERROR, frame_type, "acked packet which initiated a " "key update without a " "corresponding key update"); return 0; } if (!ossl_ackm_on_rx_ack_frame(ch->ackm, &ack, packet_space, received)) goto malformed; OPENSSL_free(ack_ranges); return 1; malformed: ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, frame_type, "decode error"); OPENSSL_free(ack_ranges); return 0; } static int depack_do_frame_reset_stream(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { OSSL_QUIC_FRAME_RESET_STREAM frame_data; QUIC_STREAM *stream = NULL; uint64_t fce; if (!ossl_quic_wire_decode_frame_reset_stream(pkt, &frame_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_RESET_STREAM, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; if (!depack_do_implicit_stream_create(ch, frame_data.stream_id, OSSL_QUIC_FRAME_TYPE_RESET_STREAM, &stream)) return 0; /* error already raised for us */ if (stream == NULL) return 1; /* old deleted stream, not a protocol violation, ignore */ if (!ossl_quic_stream_has_recv(stream)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_STREAM_STATE_ERROR, OSSL_QUIC_FRAME_TYPE_RESET_STREAM, "RESET_STREAM frame for " "TX only stream"); return 0; } /* * The final size field of the RESET_STREAM frame must be used to determine * how much flow control credit the aborted stream was considered to have * consumed. * * We also need to ensure that if we already have a final size for the * stream, the RESET_STREAM frame's Final Size field matches this; we SHOULD * terminate the connection otherwise (RFC 9000 s. 4.5). The RXFC takes care * of this for us. */ if (!ossl_quic_rxfc_on_rx_stream_frame(&stream->rxfc, frame_data.final_size, /*is_fin=*/1)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_INTERNAL_ERROR, OSSL_QUIC_FRAME_TYPE_RESET_STREAM, "internal error (flow control)"); return 0; } /* Has a flow control error occurred? */ fce = ossl_quic_rxfc_get_error(&stream->rxfc, 0); if (fce != QUIC_ERR_NO_ERROR) { ossl_quic_channel_raise_protocol_error(ch, fce, OSSL_QUIC_FRAME_TYPE_RESET_STREAM, "flow control violation"); return 0; } /* * Depending on the receive part state this is handled either as a reset * transition or a no-op (e.g. if a reset has already been received before, * or the application already retired a FIN). Best effort - there are no * protoocol error conditions we need to check for here. */ ossl_quic_stream_map_notify_reset_recv_part(&ch->qsm, stream, frame_data.app_error_code, frame_data.final_size); ossl_quic_stream_map_update_state(&ch->qsm, stream); return 1; } static int depack_do_frame_stop_sending(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { OSSL_QUIC_FRAME_STOP_SENDING frame_data; QUIC_STREAM *stream = NULL; if (!ossl_quic_wire_decode_frame_stop_sending(pkt, &frame_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_STOP_SENDING, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; if (!depack_do_implicit_stream_create(ch, frame_data.stream_id, OSSL_QUIC_FRAME_TYPE_STOP_SENDING, &stream)) return 0; /* error already raised for us */ if (stream == NULL) return 1; /* old deleted stream, not a protocol violation, ignore */ if (!ossl_quic_stream_has_send(stream)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_STREAM_STATE_ERROR, OSSL_QUIC_FRAME_TYPE_STOP_SENDING, "STOP_SENDING frame for " "RX only stream"); return 0; } stream->peer_stop_sending = 1; stream->peer_stop_sending_aec = frame_data.app_error_code; /* * RFC 9000 s. 3.5: Receiving a STOP_SENDING frame means we must respond in * turn with a RESET_STREAM frame for the same part of the stream. The other * part is unaffected. */ ossl_quic_stream_map_reset_stream_send_part(&ch->qsm, stream, frame_data.app_error_code); return 1; } static int depack_do_frame_crypto(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_QRX_PKT *parent_pkt, OSSL_ACKM_RX_PKT *ackm_data, uint64_t *datalen) { OSSL_QUIC_FRAME_CRYPTO f; QUIC_RSTREAM *rstream; *datalen = 0; if (!ossl_quic_wire_decode_frame_crypto(pkt, 0, &f)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_CRYPTO, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; rstream = ch->crypto_recv[ackm_data->pkt_space]; if (!ossl_assert(rstream != NULL)) /* * This should not happen; we should only have a NULL stream here if * the EL has been discarded, and if the EL has been discarded we * shouldn't be here. */ return 0; if (!ossl_quic_rstream_queue_data(rstream, parent_pkt, f.offset, f.data, f.len, 0)) return 0; *datalen = f.len; return 1; } static int depack_do_frame_new_token(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { const uint8_t *token; size_t token_len; if (!ossl_quic_wire_decode_frame_new_token(pkt, &token, &token_len)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_NEW_TOKEN, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; /* TODO(QUIC): ADD CODE to send |token| to the session manager */ return 1; } /* * Returns 1 if no protocol violation has occurred. In this case *result will be * non-NULL unless this is an old deleted stream and we should ignore the frame * causing this function to be called. Returns 0 on protocol violation. */ static int depack_do_implicit_stream_create(QUIC_CHANNEL *ch, uint64_t stream_id, uint64_t frame_type, QUIC_STREAM **result) { QUIC_STREAM *stream; uint64_t peer_role, stream_ordinal; uint64_t *p_next_ordinal_local, *p_next_ordinal_remote; QUIC_RXFC *max_streams_fc; int is_uni, is_remote_init; stream = ossl_quic_stream_map_get_by_id(&ch->qsm, stream_id); if (stream != NULL) { *result = stream; return 1; } /* * If we do not yet have a stream with the given ID, there are three * possibilities: * * (a) The stream ID is for a remotely-created stream and the peer * is creating a stream. * * (b) The stream ID is for a locally-created stream which has * previously been deleted. * * (c) The stream ID is for a locally-created stream which does * not exist yet. This is a protocol violation and we must * terminate the connection in this case. * * We distinguish between (b) and (c) using the stream ID allocator * variable. Since stream ordinals are allocated monotonically, we * simply determine if the stream ordinal is in the future. */ peer_role = ch->is_server ? QUIC_STREAM_INITIATOR_CLIENT : QUIC_STREAM_INITIATOR_SERVER; is_remote_init = ((stream_id & QUIC_STREAM_INITIATOR_MASK) == peer_role); is_uni = ((stream_id & QUIC_STREAM_DIR_MASK) == QUIC_STREAM_DIR_UNI); stream_ordinal = stream_id >> 2; if (is_remote_init) { /* * Peer-created stream which does not yet exist. Create it. QUIC stream * ordinals within a given stream type MUST be used in sequence and * receiving a STREAM frame for ordinal n must implicitly create streams * with ordinals [0, n) within that stream type even if no explicit * STREAM frames are received for those ordinals. */ p_next_ordinal_remote = is_uni ? &ch->next_remote_stream_ordinal_uni : &ch->next_remote_stream_ordinal_bidi; /* Check this isn't violating stream count flow control. */ max_streams_fc = is_uni ? &ch->max_streams_uni_rxfc : &ch->max_streams_bidi_rxfc; if (!ossl_quic_rxfc_on_rx_stream_frame(max_streams_fc, stream_ordinal + 1, /*is_fin=*/0)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_INTERNAL_ERROR, frame_type, "internal error (stream count RXFC)"); return 0; } if (ossl_quic_rxfc_get_error(max_streams_fc, 0) != QUIC_ERR_NO_ERROR) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_STREAM_LIMIT_ERROR, frame_type, "exceeded maximum allowed streams"); return 0; } /* * Create the named stream and any streams coming before it yet to be * created. */ while (*p_next_ordinal_remote <= stream_ordinal) { uint64_t cur_stream_id = (*p_next_ordinal_remote << 2) | (stream_id & (QUIC_STREAM_DIR_MASK | QUIC_STREAM_INITIATOR_MASK)); stream = ossl_quic_channel_new_stream_remote(ch, cur_stream_id); if (stream == NULL) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_INTERNAL_ERROR, frame_type, "internal error (stream allocation)"); return 0; } ++*p_next_ordinal_remote; } *result = stream; } else { /* Locally-created stream which does not yet exist. */ p_next_ordinal_local = is_uni ? &ch->next_local_stream_ordinal_uni : &ch->next_local_stream_ordinal_bidi; if (stream_ordinal >= *p_next_ordinal_local) { /* * We never created this stream yet, this is a protocol * violation. */ ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_STREAM_STATE_ERROR, frame_type, "STREAM frame for nonexistent " "stream"); return 0; } /* * Otherwise this is for an old locally-initiated stream which we * have subsequently deleted. Ignore the data; it may simply be a * retransmission. We already take care of notifying the peer of the * termination of the stream during the stream deletion lifecycle. */ *result = NULL; } return 1; } static int depack_do_frame_stream(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_QRX_PKT *parent_pkt, OSSL_ACKM_RX_PKT *ackm_data, uint64_t frame_type, uint64_t *datalen) { OSSL_QUIC_FRAME_STREAM frame_data; QUIC_STREAM *stream; uint64_t fce; *datalen = 0; if (!ossl_quic_wire_decode_frame_stream(pkt, 0, &frame_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, frame_type, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; if (!depack_do_implicit_stream_create(ch, frame_data.stream_id, frame_type, &stream)) return 0; /* protocol error raised by above call */ if (stream == NULL) /* * Data for old stream which is not a protocol violation but should be * ignored, so stop here. */ return 1; if (!ossl_quic_stream_has_recv(stream)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_STREAM_STATE_ERROR, frame_type, "STREAM frame for TX only " "stream"); return 0; } /* Notify stream flow controller. */ if (!ossl_quic_rxfc_on_rx_stream_frame(&stream->rxfc, frame_data.offset + frame_data.len, frame_data.is_fin)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_INTERNAL_ERROR, frame_type, "internal error (flow control)"); return 0; } /* Has a flow control error occurred? */ fce = ossl_quic_rxfc_get_error(&stream->rxfc, 0); if (fce != QUIC_ERR_NO_ERROR) { ossl_quic_channel_raise_protocol_error(ch, fce, frame_type, "flow control violation"); return 0; } switch (stream->recv_state) { case QUIC_RSTREAM_STATE_RECV: case QUIC_RSTREAM_STATE_SIZE_KNOWN: /* * It only makes sense to process incoming STREAM frames in these * states. */ break; case QUIC_RSTREAM_STATE_DATA_RECVD: case QUIC_RSTREAM_STATE_DATA_READ: case QUIC_RSTREAM_STATE_RESET_RECVD: case QUIC_RSTREAM_STATE_RESET_READ: default: /* * We have no use for STREAM frames once the receive part reaches any of * these states, so just ignore. */ return 1; } /* If we are in RECV, auto-transition to SIZE_KNOWN on FIN. */ if (frame_data.is_fin && !ossl_quic_stream_recv_get_final_size(stream, NULL)) { /* State was already checked above, so can't fail. */ ossl_quic_stream_map_notify_size_known_recv_part(&ch->qsm, stream, frame_data.offset + frame_data.len); } /* * If we requested STOP_SENDING do not bother buffering the data. Note that * this must happen after RXFC checks above as even if we sent STOP_SENDING * we must still enforce correct flow control (RFC 9000 s. 3.5). */ if (stream->stop_sending) return 1; /* not an error - packet reordering, etc. */ /* * The receive stream buffer may or may not choose to consume the data * without copying by reffing the OSSL_QRX_PKT. In this case * ossl_qrx_pkt_release() will be eventually called when the data is no * longer needed. */ if (!ossl_quic_rstream_queue_data(stream->rstream, parent_pkt, frame_data.offset, frame_data.data, frame_data.len, frame_data.is_fin)) return 0; *datalen = frame_data.len; return 1; } static void update_streams(QUIC_STREAM *s, void *arg) { QUIC_CHANNEL *ch = arg; ossl_quic_stream_map_update_state(&ch->qsm, s); } static void update_streams_bidi(QUIC_STREAM *s, void *arg) { QUIC_CHANNEL *ch = arg; if (!ossl_quic_stream_is_bidi(s)) return; ossl_quic_stream_map_update_state(&ch->qsm, s); } static void update_streams_uni(QUIC_STREAM *s, void *arg) { QUIC_CHANNEL *ch = arg; if (ossl_quic_stream_is_bidi(s)) return; ossl_quic_stream_map_update_state(&ch->qsm, s); } static int depack_do_frame_max_data(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { uint64_t max_data = 0; if (!ossl_quic_wire_decode_frame_max_data(pkt, &max_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_MAX_DATA, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; ossl_quic_txfc_bump_cwm(&ch->conn_txfc, max_data); ossl_quic_stream_map_visit(&ch->qsm, update_streams, ch); return 1; } static int depack_do_frame_max_stream_data(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { uint64_t stream_id = 0; uint64_t max_stream_data = 0; QUIC_STREAM *stream; if (!ossl_quic_wire_decode_frame_max_stream_data(pkt, &stream_id, &max_stream_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; if (!depack_do_implicit_stream_create(ch, stream_id, OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA, &stream)) return 0; /* error already raised for us */ if (stream == NULL) return 1; /* old deleted stream, not a protocol violation, ignore */ if (!ossl_quic_stream_has_send(stream)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_STREAM_STATE_ERROR, OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA, "MAX_STREAM_DATA for TX only " "stream"); return 0; } ossl_quic_txfc_bump_cwm(&stream->txfc, max_stream_data); ossl_quic_stream_map_update_state(&ch->qsm, stream); return 1; } static int depack_do_frame_max_streams(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data, uint64_t frame_type) { uint64_t max_streams = 0; if (!ossl_quic_wire_decode_frame_max_streams(pkt, &max_streams)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, frame_type, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; if (max_streams > (((uint64_t)1) << 60)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, frame_type, "invalid max streams value"); return 0; } switch (frame_type) { case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI: if (max_streams > ch->max_local_streams_bidi) ch->max_local_streams_bidi = max_streams; /* Some streams may now be able to send. */ ossl_quic_stream_map_visit(&ch->qsm, update_streams_bidi, ch); break; case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI: if (max_streams > ch->max_local_streams_uni) ch->max_local_streams_uni = max_streams; /* Some streams may now be able to send. */ ossl_quic_stream_map_visit(&ch->qsm, update_streams_uni, ch); break; default: ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, frame_type, "decode error"); return 0; } return 1; } static int depack_do_frame_data_blocked(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { uint64_t max_data = 0; if (!ossl_quic_wire_decode_frame_data_blocked(pkt, &max_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; /* No-op - informative/debugging frame. */ return 1; } static int depack_do_frame_stream_data_blocked(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { uint64_t stream_id = 0; uint64_t max_data = 0; QUIC_STREAM *stream; if (!ossl_quic_wire_decode_frame_stream_data_blocked(pkt, &stream_id, &max_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; /* * This is an informative/debugging frame, so we don't have to do anything, * but it does trigger stream creation. */ if (!depack_do_implicit_stream_create(ch, stream_id, OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED, &stream)) return 0; /* error already raised for us */ /* No-op - informative/debugging frame. */ return 1; } static int depack_do_frame_streams_blocked(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data, uint64_t frame_type) { uint64_t max_data = 0; if (!ossl_quic_wire_decode_frame_streams_blocked(pkt, &max_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, frame_type, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; /* No-op - informative/debugging frame. */ return 1; } static int depack_do_frame_new_conn_id(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { OSSL_QUIC_FRAME_NEW_CONN_ID frame_data; if (!ossl_quic_wire_decode_frame_new_conn_id(pkt, &frame_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; ossl_quic_channel_on_new_conn_id(ch, &frame_data); return 1; } static int depack_do_frame_retire_conn_id(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { uint64_t seq_num; if (!ossl_quic_wire_decode_frame_retire_conn_id(pkt, &seq_num)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; /* TODO(QUIC): Post MVP ADD CODE to send |seq_num| to the ch manager */ return 1; } static int depack_do_frame_path_challenge(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { uint64_t frame_data = 0; if (!ossl_quic_wire_decode_frame_path_challenge(pkt, &frame_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; /* TODO(QUIC): ADD CODE to send |frame_data| to the ch manager */ return 1; } static int depack_do_frame_path_response(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { uint64_t frame_data = 0; if (!ossl_quic_wire_decode_frame_path_response(pkt, &frame_data)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE, "decode error"); return 0; } /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; /* TODO(QUIC): ADD CODE to send |frame_data| to the ch manager */ return 1; } static int depack_do_frame_conn_close(PACKET *pkt, QUIC_CHANNEL *ch) { OSSL_QUIC_FRAME_CONN_CLOSE frame_data; if (!ossl_quic_wire_decode_frame_conn_close(pkt, &frame_data)) return 0; ossl_quic_channel_on_remote_conn_close(ch, &frame_data); return 1; } static int depack_do_frame_handshake_done(PACKET *pkt, QUIC_CHANNEL *ch, OSSL_ACKM_RX_PKT *ackm_data) { if (!ossl_quic_wire_decode_frame_handshake_done(pkt)) return 0; /* This frame makes the packet ACK eliciting */ ackm_data->is_ack_eliciting = 1; ossl_quic_channel_on_handshake_confirmed(ch); return 1; } /* Main frame processor */ static int depack_process_frames(QUIC_CHANNEL *ch, PACKET *pkt, OSSL_QRX_PKT *parent_pkt, int packet_space, OSSL_TIME received, OSSL_ACKM_RX_PKT *ackm_data) { uint32_t pkt_type = parent_pkt->hdr->type; if (PACKET_remaining(pkt) == 0) { /* * RFC 9000 s. 12.4: An endpoint MUST treat receipt of a packet * containing no frames as a connection error of type * PROTOCOL_VIOLATION. */ ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, 0, "empty packet payload"); return 0; } while (PACKET_remaining(pkt) > 0) { int was_minimal; uint64_t frame_type; const unsigned char *sof = NULL; uint64_t datalen = 0; if (ch->msg_callback != NULL) sof = PACKET_data(pkt); if (!ossl_quic_wire_peek_frame_header(pkt, &frame_type, &was_minimal)) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, 0, "malformed frame header"); return 0; } if (!was_minimal) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "non-minimal frame type encoding"); return 0; } switch (frame_type) { case OSSL_QUIC_FRAME_TYPE_PING: /* Allowed in all packet types */ if (!depack_do_frame_ping(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_PADDING: /* Allowed in all packet types */ if (!depack_do_frame_padding(pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN: case OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN: /* ACK frames are valid everywhere except in 0RTT packets */ if (pkt_type == QUIC_PKT_TYPE_0RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "ACK not valid in 0-RTT"); return 0; } if (!depack_do_frame_ack(pkt, ch, packet_space, received, frame_type, parent_pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_RESET_STREAM: /* RESET_STREAM frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "RESET_STREAM not valid in " "INITIAL/HANDSHAKE"); return 0; } if (!depack_do_frame_reset_stream(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_STOP_SENDING: /* STOP_SENDING frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "STOP_SENDING not valid in " "INITIAL/HANDSHAKE"); return 0; } if (!depack_do_frame_stop_sending(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_CRYPTO: /* CRYPTO frames are valid everywhere except in 0RTT packets */ if (pkt_type == QUIC_PKT_TYPE_0RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "CRYPTO frame not valid in 0-RTT"); return 0; } if (!depack_do_frame_crypto(pkt, ch, parent_pkt, ackm_data, &datalen)) return 0; break; case OSSL_QUIC_FRAME_TYPE_NEW_TOKEN: /* NEW_TOKEN frames are valid in 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "NEW_TOKEN valid only in 1-RTT"); return 0; } if (!depack_do_frame_new_token(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_STREAM: case OSSL_QUIC_FRAME_TYPE_STREAM_FIN: case OSSL_QUIC_FRAME_TYPE_STREAM_LEN: case OSSL_QUIC_FRAME_TYPE_STREAM_LEN_FIN: case OSSL_QUIC_FRAME_TYPE_STREAM_OFF: case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_FIN: case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN: case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN_FIN: /* STREAM frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "STREAM valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_stream(pkt, ch, parent_pkt, ackm_data, frame_type, &datalen)) return 0; break; case OSSL_QUIC_FRAME_TYPE_MAX_DATA: /* MAX_DATA frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "MAX_DATA valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_max_data(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA: /* MAX_STREAM_DATA frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "MAX_STREAM_DATA valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_max_stream_data(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI: case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI: /* MAX_STREAMS frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "MAX_STREAMS valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_max_streams(pkt, ch, ackm_data, frame_type)) return 0; break; case OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED: /* DATA_BLOCKED frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "DATA_BLOCKED valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_data_blocked(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED: /* STREAM_DATA_BLOCKED frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "STREAM_DATA_BLOCKED valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_stream_data_blocked(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI: case OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI: /* STREAMS_BLOCKED frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "STREAMS valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_streams_blocked(pkt, ch, ackm_data, frame_type)) return 0; break; case OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID: /* NEW_CONN_ID frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "NEW_CONN_ID valid only in 0/1-RTT"); } if (!depack_do_frame_new_conn_id(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID: /* RETIRE_CONN_ID frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "RETIRE_CONN_ID valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_retire_conn_id(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE: /* PATH_CHALLENGE frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "PATH_CHALLENGE valid only in 0/1-RTT"); return 0; } if (!depack_do_frame_path_challenge(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE: /* PATH_RESPONSE frames are valid in 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "PATH_CHALLENGE valid only in 1-RTT"); return 0; } if (!depack_do_frame_path_response(pkt, ch, ackm_data)) return 0; break; case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_APP: /* CONN_CLOSE_APP frames are valid in 0RTT and 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_0RTT && pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "CONN_CLOSE (APP) valid only in 0/1-RTT"); return 0; } /* FALLTHRU */ case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_TRANSPORT: /* CONN_CLOSE_TRANSPORT frames are valid in all packets */ if (!depack_do_frame_conn_close(pkt, ch)) return 0; break; case OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE: /* HANDSHAKE_DONE frames are valid in 1RTT packets */ if (pkt_type != QUIC_PKT_TYPE_1RTT) { ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_PROTOCOL_VIOLATION, frame_type, "HANDSHAKE_DONE valid only in 1-RTT"); return 0; } if (!depack_do_frame_handshake_done(pkt, ch, ackm_data)) return 0; break; default: /* Unknown frame type */ ackm_data->is_ack_eliciting = 1; ossl_quic_channel_raise_protocol_error(ch, QUIC_ERR_FRAME_ENCODING_ERROR, frame_type, "Unknown frame type received"); return 0; } if (ch->msg_callback != NULL) { int ctype = SSL3_RT_QUIC_FRAME_FULL; size_t framelen = PACKET_data(pkt) - sof; if (frame_type == OSSL_QUIC_FRAME_TYPE_PADDING) { ctype = SSL3_RT_QUIC_FRAME_PADDING; } else if (OSSL_QUIC_FRAME_TYPE_IS_STREAM(frame_type) || frame_type == OSSL_QUIC_FRAME_TYPE_CRYPTO) { ctype = SSL3_RT_QUIC_FRAME_HEADER; framelen -= (size_t)datalen; } ch->msg_callback(0, OSSL_QUIC1_VERSION, ctype, sof, framelen, ch->msg_callback_ssl, ch->msg_callback_arg); } } return 1; } QUIC_NEEDS_LOCK int ossl_quic_handle_frames(QUIC_CHANNEL *ch, OSSL_QRX_PKT *qpacket) { PACKET pkt; OSSL_ACKM_RX_PKT ackm_data; /* * ok has three states: * -1 error with ackm_data uninitialized * 0 error with ackm_data initialized * 1 success (ackm_data initialized) */ int ok = -1; /* Assume the worst */ if (ch == NULL) goto end; /* Initialize |ackm_data| (and reinitialize |ok|)*/ memset(&ackm_data, 0, sizeof(ackm_data)); /* * TODO(QUIC): ASSUMPTION: All packets that aren't special case have a * packet number */ ackm_data.pkt_num = qpacket->pn; ackm_data.time = qpacket->time; switch (qpacket->hdr->type) { case QUIC_PKT_TYPE_INITIAL: ackm_data.pkt_space = QUIC_PN_SPACE_INITIAL; break; case QUIC_PKT_TYPE_HANDSHAKE: ackm_data.pkt_space = QUIC_PN_SPACE_HANDSHAKE; break; case QUIC_PKT_TYPE_0RTT: case QUIC_PKT_TYPE_1RTT: ackm_data.pkt_space = QUIC_PN_SPACE_APP; break; default: /* * Retry and Version Negotiation packets should not be passed to this * function. */ goto end; } ok = 0; /* Still assume the worst */ /* Now that special cases are out of the way, parse frames */ if (!PACKET_buf_init(&pkt, qpacket->hdr->data, qpacket->hdr->len) || !depack_process_frames(ch, &pkt, qpacket, ackm_data.pkt_space, qpacket->time, &ackm_data)) goto end; ok = 1; end: /* * TODO(QUIC): ASSUMPTION: If this function is called at all, |qpacket| is * a legitimate packet, even if its contents aren't. * Therefore, we call ossl_ackm_on_rx_packet() unconditionally, as long as * |ackm_data| has at least been initialized. */ if (ok >= 0) ossl_ackm_on_rx_packet(ch->ackm, &ackm_data); return ok > 0; }