Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1)

Side by Side Diff: webrtc/p2p/quic/quictransportchannel.h

Issue 1721673004: Create QuicTransportChannel (Closed) Base URL: https://chromium.googlesource.com/external/webrtc.git@master
Patch Set: Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 /*
2 * Copyright 2016 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11 #ifndef WEBRTC_P2P_QUIC_QUICTRANSPORTCHANNEL_H_
12 #define WEBRTC_P2P_QUIC_QUICTRANSPORTCHANNEL_H_
13
14 #include <string>
15 #include <vector>
16
17 #include "net/quic/quic_packet_writer.h"
18 #include "webrtc/base/scoped_ptr.h"
19 #include "webrtc/p2p/base/transportchannelimpl.h"
20 #include "webrtc/p2p/quic/quicconnectionhelper.h"
21 #include "webrtc/p2p/quic/quicsession.h"
22
23 namespace cricket {
24
25 enum QuicTransportState {
26 // Haven't started QUIC handshake.
27 QUIC_TRANSPORT_NEW = 0,
28 // Started QUIC handshake.
29 QUIC_TRANSPORT_CONNECTING,
30 // Negotiated, and has an ecrypted connection.
pthatcher1 2016/02/24 23:31:13 encrypted
mikescarlett 2016/02/26 00:54:14 Done.
31 QUIC_TRANSPORT_CONNECTED,
32 // Failed due to some error in the handshake process.
33 QUIC_TRANSPORT_FAILED,
34 };
35
36 // QuicTransportChannel uses the QUIC protocol to establish encryption with
37 // another peer, wrapping an existing TransportChannel instance
38 // (e.g a P2PTransportChannel) responsible for connecting peers.
39 // Once the wrapped transport channel is connected, QuicTransportChannel
40 // negotiates the crypto handshake and establishes SRTP keying material.
41 //
42 // How it works:
43 //
44 // QuicTransportChannel {
45 // QuicSession* quic_;
46 // TransportChannelImpl* channel_;
47 // }
48 //
49 // - Data written to SendPacket() is passed directly to |channel_| if the QUIC
50 // handshake has not begun or if an SRTP packet is sent with the
51 // PF_SRTP_BYPASS flag after the QUIC handshake.
pthatcher1 2016/02/24 23:31:13 I understand why we pass SRTP packets directly, bu
mikescarlett 2016/02/26 00:54:14 I am removing this behavior. I only did that becau
52 //
53 // - |quic_| passes outgoing packets to WritePacket(), which are transferred
54 // to |channel_| to be sent across the network.
55 //
56 // - Data which comes into QuicTransportChannel::OnReadPacket is checked to
57 // see if it is QUIC, and if it is, passed to |quic_|. SRTP packets are
58 // signaled upwards as bypass packets.
59 //
60 // - When the QUIC handshake is completed, quic_state() returns
61 // QUIC_TRANSPORT_CONNECTED and SRTP keying material can be exported.
62 //
63 // TODO(mikescarlett): Implement secure QUIC handshake, 0-RTT handshakes, and
64 // QUIC data streams.
65 class QuicTransportChannel : public TransportChannelImpl,
66 public net::QuicPacketWriter,
67 public net::QuicCryptoClientStream::ProofHandler {
68 public:
69 // |channel| - the TransportChannel we are wrapping.
70 explicit QuicTransportChannel(TransportChannelImpl* channel);
pthatcher1 2016/02/24 23:31:13 Why does this need a TransportChannelImpl instead
mikescarlett 2016/02/26 00:54:14 QuicTransportChannel uses |channel| to implement I
pthatcher1 2016/02/27 01:14:19 OK, that seems fine.
71 ~QuicTransportChannel() override;
72
73 // TransportChannel overrides.
74 // TODO(mikescarlett): Certificate authentication is not implemented yet.
75 bool SetLocalCertificate(
76 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override;
77 rtc::scoped_refptr<rtc::RTCCertificate> GetLocalCertificate() const override;
78 // TODO(mikescarlett): Fingerprint authentication is not implemented yet.
79 bool SetRemoteFingerprint(const std::string& digest_alg,
80 const uint8_t* digest,
81 size_t digest_len) override;
82 // Returns true if local certificate is set and this peer supports QUIC.
83 // TODO(mikescarlett): Method name is DTLS-specific.
pthatcher1 2016/02/24 23:31:13 Can you change the TODOs to be action to take, suc
mikescarlett 2016/02/26 00:54:14 Done.
84 bool IsDtlsActive() const override { return quic_active_; }
pthatcher1 2016/02/25 08:24:25 Can we just make this return true? Unlike DTLS, I
mikescarlett 2016/02/26 00:54:14 Done.
85 // Sends a non-QUIC packet. Packets are sent only if the QUIC handshake has
86 // not started, or an RTP packet is sent with the PF_SRTP_BYPASS after the
87 // QUIC handshake is established.
88 int SendPacket(const char* data,
89 size_t size,
90 const rtc::PacketOptions& options,
91 int flags) override;
92
93 // TransportChannel calls that we forward to the wrapped transport.
94 void SetIceRole(IceRole role) override { channel_->SetIceRole(role); }
95 IceRole GetIceRole() const override { return channel_->GetIceRole(); }
96 int SetOption(rtc::Socket::Option opt, int value) override {
97 return channel_->SetOption(opt, value);
98 }
99 bool GetOption(rtc::Socket::Option opt, int* value) override {
100 return channel_->GetOption(opt, value);
101 }
102 int GetError() override { return channel_->GetError(); }
103 bool GetStats(ConnectionInfos* infos) override {
104 return channel_->GetStats(infos);
105 }
106 const std::string SessionId() const override { return channel_->SessionId(); }
107 TransportChannelState GetState() const override {
108 return channel_->GetState();
109 }
110 void SetIceTiebreaker(uint64_t tiebreaker) override {
111 channel_->SetIceTiebreaker(tiebreaker);
112 }
113 void SetIceCredentials(const std::string& ice_ufrag,
114 const std::string& ice_pwd) override {
115 channel_->SetIceCredentials(ice_ufrag, ice_pwd);
116 }
117 void SetRemoteIceCredentials(const std::string& ice_ufrag,
118 const std::string& ice_pwd) override {
119 channel_->SetRemoteIceCredentials(ice_ufrag, ice_pwd);
120 }
121 void SetRemoteIceMode(IceMode mode) override {
122 channel_->SetRemoteIceMode(mode);
123 }
124 void MaybeStartGathering() override { channel_->MaybeStartGathering(); }
125 IceGatheringState gathering_state() const override {
126 return channel_->gathering_state();
127 }
128
129 void AddRemoteCandidate(const Candidate& candidate) override {
130 channel_->AddRemoteCandidate(candidate);
131 }
132
133 void SetIceConfig(const IceConfig& config) override {
134 channel_->SetIceConfig(config);
135 }
136
137 // Sets up the ciphers to use for SRTP.
138 // TODO(mikescarlett): SRTP ciphers are currently ignored by QuicSession.
139 bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override {
140 return true;
141 }
142 // Determines which SRTP cipher was negotiated.
143 // TODO(mikescarlett): Cipher negotiation is not implemented by QUIC. This
144 // always uses SRTP_AES128_CM_SHA1_80.
145 bool GetSrtpCryptoSuite(int* cipher) override;
pthatcher1 2016/02/24 23:31:13 In voice-only calls, we tend to use SRTP_AES128_CM
mikescarlett 2016/02/26 00:54:14 Agreed. A hacky solution (which isn't exactly nego
146 bool SetSslRole(rtc::SSLRole role) override;
147 bool GetSslRole(rtc::SSLRole* role) const override;
148 // Determines which SSL cipher was negotiated.
149 // TODO(mikescarlett): Cipher negotiation is not implemented by QUIC.
150 bool GetSslCipherSuite(int* cipher) override { return false; }
151 // Once QUIC has been established, retrieves the certificate in
152 // use by the remote peer, for use in external identity verification.
pthatcher1 2016/02/24 23:31:13 This is really just used for stats, so we should f
mikescarlett 2016/02/26 00:54:14 Ok. In that case I'll ignore this method and move
153 // TODO(mikescarlett): Not implemented unless QUIC connections are secure.
154 bool GetRemoteSSLCertificate(rtc::SSLCertificate** cert) const override {
155 return false;
156 }
157 // Once QUIC is established (i.e., |quic_state_| is QUIC_TRANSPORT_CONNECTED),
158 // this extracts the keys negotiated during the QUIC handshake, for use
159 // in external encryption such as for extracting SRTP keys.
160 bool ExportKeyingMaterial(const std::string& label,
161 const uint8_t* context,
162 size_t context_len,
163 bool use_context,
164 uint8_t* result,
165 size_t result_len) override;
166 void Connect() override;
167
168 // QuicPacketWriter overrides.
169 // Called from net::QuicConnection when |quic_| has packets to write.
170 net::WriteResult WritePacket(const char* buffer,
171 size_t buf_len,
172 const net::IPAddressNumber& self_address,
173 const net::IPEndPoint& peer_address) override;
174 // Whether QuicTransportChannel buffers data when unable to write. If this is
175 // set to false, then net::QuicConnection buffers unsent packets.
176 bool IsWriteBlockedDataBuffered() const override { return false; }
177 // Whether QuicTransportChannel is write blocked. If this returns true,
178 // outgoing QUIC packets are queued until OnCanWrite() is called.
179 bool IsWriteBlocked() const override;
180 // Maximum size of the QUIC packet which can be written.
181 net::QuicByteCount GetMaxPacketSize(
182 const net::IPEndPoint& peer_address) const override {
183 return net::kMaxPacketSize;
184 }
185
186 // QuicCryptoClientStream::ProofHandler overrides.
187 // Called by client crypto handshake when cached proof is marked valid.
188 void OnProofValid(
189 const net::QuicCryptoClientConfig::CachedState& cached) override;
190 // Called by client crypto handshake when proof verification details become
191 // available, either because proof verification is complete, or when cached
192 // details are used.
193 void OnProofVerifyDetailsAvailable(
194 const net::ProofVerifyDetails& verify_details) override;
195
196 // Returns true if |quic_| has queued data which wasn't written due
197 // to |channel_| being write blocked.
198 bool HasDataToWrite() const;
199 // Writes queued data for |quic_| when |channel_| is no longer write blocked.
200 void OnCanWrite();
201 // Connectivity state of QuicTransportChannel.
202 QuicTransportState quic_state() const { return quic_state_; }
203
204 private:
205 // QuicPacketWriter override.
206 // This method is not used -- call set_writable(bool writable) instead.
207 void SetWritable() override {}
208
209 // Callbacks for |channel_|.
210 void OnReadableState(TransportChannel* channel);
211 void OnWritableState(TransportChannel* channel);
212 void OnReadPacket(TransportChannel* channel,
213 const char* data,
214 size_t size,
215 const rtc::PacketTime& packet_time,
216 int flags);
217 void OnSentPacket(TransportChannel* channel,
218 const rtc::SentPacket& sent_packet);
219 void OnReadyToSend(TransportChannel* channel);
220 void OnReceivingState(TransportChannel* channel);
221 void OnGatheringState(TransportChannelImpl* channel);
222 void OnCandidateGathered(TransportChannelImpl* channel, const Candidate& c);
223 void OnRoleConflict(TransportChannelImpl* channel);
224 void OnRouteChange(TransportChannel* channel, const Candidate& candidate);
225 void OnConnectionRemoved(TransportChannelImpl* channel);
226
227 // Callbacks for |quic_|.
228 // Called when |quic_| has established crypto handshake.
229 void OnHandshakeComplete();
230 // Called when |quic_| has connection closed.
231 void OnConnectionClosed(net::QuicErrorCode error, bool from_peer);
232
233 // Called by OnReadPacket() when QUIC packet is received.
234 bool HandleQuicPacket(const char* data, size_t size);
235 // Sets up the QUIC handshake.
236 bool MaybeStartQuic();
237 // Creates the QUIC connection and |quic_|.
238 bool CreateQuicSession();
239 // Creates the crypto stream and initializes handshake.
240 bool StartQuicHandshake();
241 // Sets QuicTransportChannel connectivity state.
242 void set_quic_state(QuicTransportState state);
243
244 // Everything should occur on this thread.
245 rtc::Thread* worker_thread_;
246 // Underlying channel which is responsible for connecting with the remote peer
247 // and sending/receiving packets across the network.
248 TransportChannelImpl* const channel_;
249 // Connectivity state of QuicTransportChannel.
250 QuicTransportState quic_state_ = QUIC_TRANSPORT_NEW;
251 // QUIC session which establishes the crypto handshake and converts data
252 // to/from QUIC packets.
253 rtc::scoped_ptr<QuicSession> quic_;
254 // Config for |quic_|.
255 net::QuicConfig config_;
256 // Helper for net::QuicConnection that provides timing and
257 // random number generation.
258 QuicConnectionHelper helper_;
259 // This peer's role in the QUIC crypto handshake. SSL_CLIENT implies this peer
260 // initiates the handshake, while SSL_SERVER implies the remote peer initiates
261 // the handshake.
262 rtc::SSLRole ssl_role_;
263 // Config for QUIC crypto client stream, used when |ssl_role_| is SSL_CLIENT.
264 rtc::scoped_ptr<net::QuicCryptoClientConfig> quic_crypto_client_config_;
265 // Config for QUIC crypto server stream, used when |ssl_role_| is SSL_SERVER.
266 rtc::scoped_ptr<net::QuicCryptoServerConfig> quic_crypto_server_config_;
267 // Remote fingerprint parameters that are established before we start QUIC.
268 std::string remote_fingerprint_value_;
269 std::string remote_fingerprint_algorithm_;
270 // This peer's certificate.
271 rtc::scoped_refptr<rtc::RTCCertificate> local_certificate_;
272 // True if local certificate is set and this peer supports QUIC.
273 bool quic_active_ = false;
pthatcher1 2016/02/25 08:24:25 Instead of having a separate bool, I'd suggest usi
mikescarlett 2016/02/26 00:54:14 Done.
274 // True if remote fingerprint is set.
275 bool set_remote_fingerprint_ = false;
pthatcher1 2016/02/25 08:24:25 I'd suggest making a RemoteFingerprint struct that
mikescarlett 2016/02/26 00:54:14 Done.
276 // True if SetSslRole() has been called.
277 bool set_ssl_role_ = false;
pthatcher1 2016/02/25 08:24:25 Same here: Optional<rtc::SSLRole> instead of two s
mikescarlett 2016/02/26 00:54:14 Done.
278
279 RTC_DISALLOW_COPY_AND_ASSIGN(QuicTransportChannel);
280 };
281
282 } // namespace cricket
283
284 #endif // WEBRTC_P2P_QUIC_QUICTRANSPORTCHANNEL_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698