/*************************************************************************** * _ _ ____ _ * Project ___| | | | _ \| | * / __| | | | |_) | | * | (__| |_| | _ <| |___ * \___|\___/|_| \_\_____| * * Copyright (C) 1998 - 2019, Daniel Stenberg, , et al. * * This software is licensed as described in the file COPYING, which * you should have received as part of this distribution. The terms * are also available at https://curl.haxx.se/docs/copyright.html. * * You may opt to use, copy, modify, merge, publish, distribute and/or sell * copies of the Software, and permit persons to whom the Software is * furnished to do so, under the terms of the COPYING file. * * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY * KIND, either express or implied. * ***************************************************************************/ #include "curl_setup.h" #ifdef USE_NGTCP2 #include #include #include #include "urldata.h" #include "sendf.h" #include "strdup.h" #include "rand.h" #include "ngtcp2.h" #include "ngtcp2-crypto.h" #include "multiif.h" #include "strcase.h" #include "connect.h" #include "strerror.h" /* The last 3 #include files should be in this order */ #include "curl_printf.h" #include "curl_memory.h" #include "memdebug.h" /* #define DEBUG_NGTCP2 */ #define DEBUG_HTTP3 #ifdef DEBUG_HTTP3 #define H3BUGF(x) x #else #define H3BUGF(x) do { } WHILE_FALSE #endif /* * This holds outgoing HTTP/3 stream data that is used by nghttp3 until acked. * It is used as a circular buffer. Add new bytes at the end until it reaches * the far end, then start over at index 0 again. */ #define H3_SEND_SIZE (20*1024) struct h3out { uint8_t buf[H3_SEND_SIZE]; size_t used; /* number of bytes used in the buffer */ size_t windex; /* index in the buffer where to start writing the next data block */ }; #define QUIC_MAX_STREAMS (256*1024) #define QUIC_MAX_DATA (1*1024*1024) #define QUIC_IDLE_TIMEOUT 60000 /* milliseconds */ #define QUIC_CIPHERS \ "TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_" \ "POLY1305_SHA256:TLS_AES_128_CCM_SHA256" #define QUIC_GROUPS "P-256:X25519:P-384:P-521" static CURLcode ng_process_ingress(struct connectdata *conn, curl_socket_t sockfd, struct quicsocket *qs); static CURLcode ng_flush_egress(struct connectdata *conn, int sockfd, struct quicsocket *qs); static int cb_h3_acked_stream_data(nghttp3_conn *conn, int64_t stream_id, size_t datalen, void *user_data, void *stream_user_data); static ngtcp2_tstamp timestamp(void) { struct curltime ct = Curl_now(); return ct.tv_sec * NGTCP2_SECONDS + ct.tv_usec * NGTCP2_MICROSECONDS; } #ifdef DEBUG_NGTCP2 static void quic_printf(void *user_data, const char *fmt, ...) { va_list ap; (void)user_data; /* TODO, use this to do infof() instead long-term */ va_start(ap, fmt); vfprintf(stderr, fmt, ap); va_end(ap); fprintf(stderr, "\n"); } #endif static int setup_initial_crypto_context(struct quicsocket *qs) { int rv; uint8_t initial_secret[32]; uint8_t secret[32]; const ngtcp2_cid *dcid; uint8_t key[16]; ssize_t keylen; uint8_t iv[16]; ssize_t ivlen; uint8_t hp[16]; ssize_t hplen; dcid = ngtcp2_conn_get_dcid(qs->qconn); rv = Curl_qc_derive_initial_secret(initial_secret, sizeof(initial_secret), dcid, (uint8_t *)NGTCP2_INITIAL_SALT, strlen(NGTCP2_INITIAL_SALT)); if(rv) { return -1; } Curl_qc_prf_sha256(&qs->hs_crypto_ctx); Curl_qc_aead_aes_128_gcm(&qs->hs_crypto_ctx); rv = Curl_qc_derive_client_initial_secret(secret, sizeof(secret), initial_secret, sizeof(initial_secret)); if(rv) { return -1; } keylen = Curl_qc_derive_packet_protection_key(key, sizeof(key), secret, sizeof(secret), &qs->hs_crypto_ctx); if(keylen < 0) { return -1; } ivlen = Curl_qc_derive_packet_protection_iv(iv, sizeof(iv), secret, sizeof(secret), &qs->hs_crypto_ctx); if(ivlen < 0) { return -1; } hplen = Curl_qc_derive_header_protection_key(hp, sizeof(hp), secret, sizeof(secret), &qs->hs_crypto_ctx); if(hplen < 0) { return -1; } ngtcp2_conn_install_initial_tx_keys(qs->qconn, key, keylen, iv, ivlen, hp, hplen); rv = Curl_qc_derive_server_initial_secret(secret, sizeof(secret), initial_secret, sizeof(initial_secret)); if(rv) { return -1; } keylen = Curl_qc_derive_packet_protection_key(key, sizeof(key), secret, sizeof(secret), &qs->hs_crypto_ctx); if(keylen < 0) { return -1; } ivlen = Curl_qc_derive_packet_protection_iv(iv, sizeof(iv), secret, sizeof(secret), &qs->hs_crypto_ctx); if(ivlen < 0) { return -1; } hplen = Curl_qc_derive_header_protection_key(hp, sizeof(hp), secret, sizeof(secret), &qs->hs_crypto_ctx); if(hplen < 0) { return -1; } ngtcp2_conn_install_initial_rx_keys(qs->qconn, key, keylen, iv, ivlen, hp, hplen); return 0; } static void quic_settings(ngtcp2_settings *s) { ngtcp2_settings_default(s); #ifdef DEBUG_NGTCP2 s->log_printf = quic_printf; #else s->log_printf = NULL; #endif s->initial_ts = timestamp(); s->max_stream_data_bidi_local = QUIC_MAX_STREAMS; s->max_stream_data_bidi_remote = QUIC_MAX_STREAMS; s->max_stream_data_uni = QUIC_MAX_STREAMS; s->max_data = QUIC_MAX_DATA; s->max_streams_bidi = 1; s->max_streams_uni = 3; s->idle_timeout = QUIC_IDLE_TIMEOUT; } /* SSL extension functions */ static int transport_params_add_cb(SSL *ssl, unsigned int ext_type, unsigned int content, const unsigned char **out, size_t *outlen, X509 *x, size_t chainidx, int *al, void *add_arg) { struct quicsocket *qs = (struct quicsocket *)SSL_get_app_data(ssl); ngtcp2_transport_params params; uint8_t buf[64]; ssize_t nwrite; (void)ext_type; (void)content; (void)x; (void)chainidx; (void)add_arg; ngtcp2_conn_get_local_transport_params(qs->qconn, ¶ms); nwrite = ngtcp2_encode_transport_params( buf, sizeof(buf), NGTCP2_TRANSPORT_PARAMS_TYPE_CLIENT_HELLO, ¶ms); if(nwrite < 0) { fprintf(stderr, "ngtcp2_encode_transport_params: %s\n", ngtcp2_strerror((int)nwrite)); *al = SSL_AD_INTERNAL_ERROR; return -1; } *out = Curl_memdup(buf, nwrite); *outlen = nwrite; return 1; } static void transport_params_free_cb(SSL *ssl, unsigned int ext_type, unsigned int context, const unsigned char *out, void *add_arg) { (void)ssl; (void)ext_type; (void)context; (void)add_arg; free((char *)out); } static int transport_params_parse_cb(SSL *ssl, unsigned int ext_type, unsigned int context, const unsigned char *in, size_t inlen, X509 *x, size_t chainidx, int *al, void *parse_arg) { struct quicsocket *qs = (struct quicsocket *)SSL_get_app_data(ssl); int rv; ngtcp2_transport_params params; (void)ext_type; (void)context; (void)x; (void)chainidx; (void)parse_arg; rv = ngtcp2_decode_transport_params( ¶ms, NGTCP2_TRANSPORT_PARAMS_TYPE_ENCRYPTED_EXTENSIONS, in, inlen); if(rv) { fprintf(stderr, "ngtcp2_decode_transport_params: %s\n", ngtcp2_strerror(rv)); *al = SSL_AD_ILLEGAL_PARAMETER; return -1; } rv = ngtcp2_conn_set_remote_transport_params(qs->qconn, ¶ms); if(rv) { *al = SSL_AD_ILLEGAL_PARAMETER; return -1; } return 1; } static FILE *keylog_file; /* not thread-safe */ static void keylog_callback(const SSL *ssl, const char *line) { (void)ssl; fputs(line, keylog_file); fputc('\n', keylog_file); fflush(keylog_file); } static SSL_CTX *quic_ssl_ctx(struct Curl_easy *data) { SSL_CTX *ssl_ctx = SSL_CTX_new(TLS_method()); const char *keylog_filename; SSL_CTX_set_min_proto_version(ssl_ctx, TLS1_3_VERSION); SSL_CTX_set_max_proto_version(ssl_ctx, TLS1_3_VERSION); /* This makes OpenSSL client not send CCS after an initial ClientHello. */ SSL_CTX_clear_options(ssl_ctx, SSL_OP_ENABLE_MIDDLEBOX_COMPAT); SSL_CTX_set_default_verify_paths(ssl_ctx); if(SSL_CTX_set_ciphersuites(ssl_ctx, QUIC_CIPHERS) != 1) { failf(data, "SSL_CTX_set_ciphersuites: %s", ERR_error_string(ERR_get_error(), NULL)); return NULL; } if(SSL_CTX_set1_groups_list(ssl_ctx, QUIC_GROUPS) != 1) { failf(data, "SSL_CTX_set1_groups_list failed"); return NULL; } SSL_CTX_set_mode(ssl_ctx, SSL_MODE_QUIC_HACK); if(SSL_CTX_add_custom_ext(ssl_ctx, NGTCP2_TLSEXT_QUIC_TRANSPORT_PARAMETERS, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, transport_params_add_cb, transport_params_free_cb, NULL, transport_params_parse_cb, NULL) != 1) { failf(data, "SSL_CTX_add_custom_ext(NGTCP2_TLSEXT_QUIC_TRANSPORT_" "PARAMETERS) failed: %s\n", ERR_error_string(ERR_get_error(), NULL)); return NULL; } keylog_filename = getenv("SSLKEYLOGFILE"); if(keylog_filename) { keylog_file = fopen(keylog_filename, "wb"); if(keylog_file) { SSL_CTX_set_keylog_callback(ssl_ctx, keylog_callback); } } return ssl_ctx; } /** SSL callbacks ***/ static void set_tls_alert(struct quicsocket *qs, uint8_t alert) { qs->tls_alert = alert; } static int init_ngh3_conn(struct quicsocket *qs); static int ssl_on_key(struct quicsocket *qs, int name, const uint8_t *secret, size_t secretlen) { int rv; uint8_t hp[64]; ssize_t hplen; uint8_t key[64]; ssize_t keylen; uint8_t iv[64]; ssize_t ivlen; struct Context *crypto_ctx = &qs->crypto_ctx; switch(name) { case SSL_KEY_CLIENT_EARLY_TRAFFIC: case SSL_KEY_CLIENT_HANDSHAKE_TRAFFIC: case SSL_KEY_CLIENT_APPLICATION_TRAFFIC: case SSL_KEY_SERVER_HANDSHAKE_TRAFFIC: case SSL_KEY_SERVER_APPLICATION_TRAFFIC: break; default: return 0; } /* TODO We don't have to call this everytime we get key generated. */ rv = Curl_qc_negotiated_prf(crypto_ctx, qs->ssl); if(rv != 0) { return -1; } rv = Curl_qc_negotiated_aead(crypto_ctx, qs->ssl); if(rv != 0) { return -1; } keylen = Curl_qc_derive_packet_protection_key(key, sizeof(key), secret, secretlen, crypto_ctx); if(keylen < 0) { return -1; } ivlen = Curl_qc_derive_packet_protection_iv(iv, sizeof(iv), secret, secretlen, crypto_ctx); if(ivlen < 0) { return -1; } hplen = Curl_qc_derive_header_protection_key(hp, sizeof(hp), secret, secretlen, crypto_ctx); if(hplen < 0) return -1; /* TODO Just call this once. */ ngtcp2_conn_set_aead_overhead(qs->qconn, Curl_qc_aead_max_overhead(crypto_ctx)); switch(name) { case SSL_KEY_CLIENT_EARLY_TRAFFIC: ngtcp2_conn_install_early_keys(qs->qconn, key, keylen, iv, ivlen, hp, hplen); break; case SSL_KEY_CLIENT_HANDSHAKE_TRAFFIC: ngtcp2_conn_install_handshake_tx_keys(qs->qconn, key, keylen, iv, ivlen, hp, hplen); qs->tx_crypto_level = NGTCP2_CRYPTO_LEVEL_HANDSHAKE; break; case SSL_KEY_CLIENT_APPLICATION_TRAFFIC: ngtcp2_conn_install_tx_keys(qs->qconn, key, keylen, iv, ivlen, hp, hplen); break; case SSL_KEY_SERVER_HANDSHAKE_TRAFFIC: ngtcp2_conn_install_handshake_rx_keys(qs->qconn, key, keylen, iv, ivlen, hp, hplen); qs->rx_crypto_level = NGTCP2_CRYPTO_LEVEL_HANDSHAKE; break; case SSL_KEY_SERVER_APPLICATION_TRAFFIC: ngtcp2_conn_install_rx_keys(qs->qconn, key, keylen, iv, ivlen, hp, hplen); qs->rx_crypto_level = NGTCP2_CRYPTO_LEVEL_APP; if(init_ngh3_conn(qs) != CURLE_OK) { return NGTCP2_ERR_CALLBACK_FAILURE; } break; } return 0; } static void ssl_msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *user_data) { int rv; struct quicsocket *qs = (struct quicsocket *)user_data; uint8_t *msg = (uint8_t *)buf; struct quic_handshake *crypto_data; (void)version; (void)ssl; if(!write_p) return; switch(content_type) { case SSL3_RT_HANDSHAKE: break; case SSL3_RT_ALERT: assert(len == 2); if(msg[0] != 2 /* FATAL */) { return; } set_tls_alert(qs, msg[1]); return; default: return; } crypto_data = &qs->client_crypto_data[qs->tx_crypto_level]; if(crypto_data->buf == NULL) { crypto_data->buf = malloc(4096); crypto_data->alloclen = 4096; /* TODO Explode if malloc failed */ } /* TODO Just pretend that handshake does not grow more than 4KiB for now */ assert(crypto_data->len + len <= crypto_data->alloclen); memcpy(&crypto_data->buf[crypto_data->len], buf, len); crypto_data->len += len; rv = ngtcp2_conn_submit_crypto_data(qs->qconn, qs->tx_crypto_level, (uint8_t *) (&crypto_data->buf[ crypto_data->len] - len), len); if(rv) { fprintf(stderr, "write_client_handshake failed\n"); } assert(0 == rv); } static int ssl_key_cb(SSL *ssl, int name, const unsigned char *secret, size_t secretlen, void *arg) { struct quicsocket *qs = (struct quicsocket *)arg; (void)ssl; if(ssl_on_key(qs, name, secret, secretlen) != 0) return 0; /* log_secret(ssl, name, secret, secretlen); */ return 1; } static int read_server_handshake(struct quicsocket *qs, char *buf, int buflen) { struct quic_handshake *hs = &qs->handshake; int avail = (int)(hs->len - hs->nread); int n = CURLMIN(buflen, avail); memcpy(buf, &hs->buf[hs->nread], n); #ifdef DEBUG_NGTCP2 infof(qs->conn->data, "read %d bytes of handshake data\n", n); #endif hs->nread += n; return n; } static void write_server_handshake(struct quicsocket *qs, const uint8_t *ptr, size_t datalen) { char *p; struct quic_handshake *hs = &qs->handshake; size_t alloclen = datalen + hs->alloclen; #ifdef DEBUG_NGTCP2 infof(qs->conn->data, "store %zd bytes of handshake data\n", datalen); #endif if(alloclen > hs->alloclen) { alloclen *= 2; p = realloc(qs->handshake.buf, alloclen); if(!p) return; /* BAAAAAD */ hs->buf = p; hs->alloclen = alloclen; } memcpy(&hs->buf[hs->len], ptr, datalen); hs->len += datalen; } /** BIO functions ***/ static int bio_write(BIO *b, const char *buf, int len) { (void)b; (void)buf; (void)len; assert(0); return -1; } static int bio_read(BIO *b, char *buf, int len) { struct quicsocket *qs; BIO_clear_retry_flags(b); qs = (struct quicsocket *)BIO_get_data(b); len = read_server_handshake(qs, buf, len); if(len == 0) { BIO_set_retry_read(b); return -1; } return len; } static int bio_puts(BIO *b, const char *str) { return bio_write(b, str, (int)strlen(str)); } static int bio_gets(BIO *b, char *buf, int len) { (void)b; (void)buf; (void)len; return -1; } static long bio_ctrl(BIO *b, int cmd, long num, void *ptr) { (void)b; (void)cmd; (void)num; (void)ptr; switch(cmd) { case BIO_CTRL_FLUSH: return 1; } return 0; } static int bio_create(BIO *b) { BIO_set_init(b, 1); return 1; } static int bio_destroy(BIO *b) { if(!b) return 0; return 1; } static BIO_METHOD *create_bio_method(void) { BIO_METHOD *meth = BIO_meth_new(BIO_TYPE_FD, "bio"); BIO_meth_set_write(meth, bio_write); BIO_meth_set_read(meth, bio_read); BIO_meth_set_puts(meth, bio_puts); BIO_meth_set_gets(meth, bio_gets); BIO_meth_set_ctrl(meth, bio_ctrl); BIO_meth_set_create(meth, bio_create); BIO_meth_set_destroy(meth, bio_destroy); return meth; } static int quic_init_ssl(struct quicsocket *qs) { BIO *bio; const uint8_t *alpn = NULL; size_t alpnlen = 0; /* this will need some attention when HTTPS proxy over QUIC get fixed */ const char * const hostname = qs->conn->host.name; if(qs->ssl) SSL_free(qs->ssl); qs->ssl = SSL_new(qs->sslctx); bio = BIO_new(create_bio_method()); /* supposedly this can fail too? */ BIO_set_data(bio, qs); SSL_set_bio(qs->ssl, bio, bio); SSL_set_app_data(qs->ssl, qs); SSL_set_connect_state(qs->ssl); SSL_set_msg_callback(qs->ssl, ssl_msg_cb); SSL_set_msg_callback_arg(qs->ssl, qs); SSL_set_key_callback(qs->ssl, ssl_key_cb, qs); switch(qs->version) { #ifdef NGTCP2_PROTO_VER case NGTCP2_PROTO_VER: alpn = (const uint8_t *)NGTCP2_ALPN_H3; alpnlen = sizeof(NGTCP2_ALPN_H3) - 1; break; #endif } if(alpn) SSL_set_alpn_protos(qs->ssl, alpn, (int)alpnlen); /* set SNI */ SSL_set_tlsext_host_name(qs->ssl, hostname); return 0; } static int quic_tls_handshake(struct quicsocket *qs, bool resumption, bool initial) { int rv; ERR_clear_error(); /* Note that SSL_SESSION_get_max_early_data() and SSL_get_max_early_data() return completely different value. */ if(initial && resumption && SSL_SESSION_get_max_early_data(SSL_get_session(qs->ssl))) { size_t nwrite; /* OpenSSL returns error if SSL_write_early_data is called when resumption is not attempted. Sending empty string is a trick to just early_data extension. */ rv = SSL_write_early_data(qs->ssl, "", 0, &nwrite); if(rv == 0) { int err = SSL_get_error(qs->ssl, rv); switch(err) { case SSL_ERROR_SSL: fprintf(stderr, "TLS handshake error: %s\n", ERR_error_string(ERR_get_error(), NULL)); return -1; default: fprintf(stderr, "TLS handshake error: %d\n", err); return -1; } } } rv = SSL_do_handshake(qs->ssl); if(rv <= 0) { int err = SSL_get_error(qs->ssl, rv); switch(err) { case SSL_ERROR_WANT_READ: case SSL_ERROR_WANT_WRITE: return 0; case SSL_ERROR_SSL: fprintf(stderr, "TLS handshake error: %s\n", ERR_error_string(ERR_get_error(), NULL)); return -1; default: fprintf(stderr, "TLS handshake error: %d\n", err); return -1; } } /* SSL_get_early_data_status works after handshake completes. */ if(resumption && SSL_get_early_data_status(qs->ssl) != SSL_EARLY_DATA_ACCEPTED) { fprintf(stderr, "Early data was rejected by server\n"); ngtcp2_conn_early_data_rejected(qs->qconn); } ngtcp2_conn_handshake_completed(qs->qconn); return 0; } static int cb_initial(ngtcp2_conn *quic, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; (void)quic; if(quic_tls_handshake(qs, false, true) != 0) return NGTCP2_ERR_CALLBACK_FAILURE; return 0; } static int quic_read_tls(struct quicsocket *qs) { uint8_t buf[4096]; size_t nread; ERR_clear_error(); for(;;) { int err; int rv = SSL_read_ex(qs->ssl, buf, sizeof(buf), &nread); if(rv == 1) { #ifdef DEBUG_NGTCP2 infof(qs->conn->data, "Read %zd bytes from TLS crypto stream", nread); #endif continue; } err = SSL_get_error(qs->ssl, 0); switch(err) { case SSL_ERROR_WANT_READ: case SSL_ERROR_WANT_WRITE: return 0; case SSL_ERROR_SSL: case SSL_ERROR_ZERO_RETURN: infof(qs->conn->data, "TLS read error: %s\n", ERR_error_string(ERR_get_error(), NULL)); return NGTCP2_ERR_CRYPTO; default: infof(qs->conn->data, "TLS read error: %d\n", err); return NGTCP2_ERR_CRYPTO; } } /* NEVER-REACHED */ } static int cb_recv_crypto_data(ngtcp2_conn *tconn, ngtcp2_crypto_level crypto_level, uint64_t offset, const uint8_t *data, size_t datalen, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; (void)offset; (void)crypto_level; write_server_handshake(qs, data, datalen); if(!ngtcp2_conn_get_handshake_completed(tconn) && quic_tls_handshake(qs, false, false)) { return NGTCP2_ERR_CRYPTO; } /* SSL_do_handshake() might not consume all data (e.g., NewSessionTicket). */ return quic_read_tls(qs); } static int cb_handshake_completed(ngtcp2_conn *tconn, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; (void)tconn; qs->tx_crypto_level = NGTCP2_CRYPTO_LEVEL_APP; infof(qs->conn->data, "QUIC handshake is completed\n"); return 0; } static ssize_t cb_in_encrypt(ngtcp2_conn *tconn, uint8_t *dest, size_t destlen, const uint8_t *plaintext, size_t plaintextlen, const uint8_t *key, size_t keylen, const uint8_t *nonce, size_t noncelen, const uint8_t *ad, size_t adlen, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; ssize_t nwrite = Curl_qc_encrypt(dest, destlen, plaintext, plaintextlen, &qs->hs_crypto_ctx, key, keylen, nonce, noncelen, ad, adlen); if(nwrite < 0) { return NGTCP2_ERR_CALLBACK_FAILURE; } (void)tconn; return nwrite; } static ssize_t cb_in_decrypt(ngtcp2_conn *tconn, uint8_t *dest, size_t destlen, const uint8_t *ciphertext, size_t ciphertextlen, const uint8_t *key, size_t keylen, const uint8_t *nonce, size_t noncelen, const uint8_t *ad, size_t adlen, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; (void)tconn; return Curl_qc_decrypt(dest, destlen, ciphertext, ciphertextlen, &qs->hs_crypto_ctx, key, keylen, nonce, noncelen, ad, adlen); } static ssize_t cb_encrypt_data(ngtcp2_conn *tconn, uint8_t *dest, size_t destlen, const uint8_t *plaintext, size_t plaintextlen, const uint8_t *key, size_t keylen, const uint8_t *nonce, size_t noncelen, const uint8_t *ad, size_t adlen, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; ssize_t rc; (void)tconn; rc = Curl_qc_encrypt(dest, destlen, plaintext, plaintextlen, &qs->crypto_ctx, key, keylen, nonce, noncelen, ad, adlen); if(rc < 0) return NGTCP2_ERR_CALLBACK_FAILURE; return rc; } static ssize_t cb_decrypt_data(ngtcp2_conn *tconn, uint8_t *dest, size_t destlen, const uint8_t *ciphertext, size_t ciphertextlen, const uint8_t *key, size_t keylen, const uint8_t *nonce, size_t noncelen, const uint8_t *ad, size_t adlen, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; ssize_t rc; (void)tconn; rc = Curl_qc_decrypt(dest, destlen, ciphertext, ciphertextlen, &qs->crypto_ctx, key, keylen, nonce, noncelen, ad, adlen); if(rc < 0) return NGTCP2_ERR_TLS_DECRYPT; return rc; } static int cb_recv_stream_data(ngtcp2_conn *tconn, int64_t stream_id, int fin, uint64_t offset, const uint8_t *buf, size_t buflen, void *user_data, void *stream_user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; ssize_t nconsumed; (void)offset; (void)stream_user_data; infof(qs->conn->data, "Received %ld bytes data on stream %u\n", buflen, stream_id); nconsumed = nghttp3_conn_read_stream(qs->h3conn, stream_id, buf, buflen, fin); if(nconsumed < 0) { failf(qs->conn->data, "nghttp3_conn_read_stream returned error: %s\n", nghttp3_strerror((int)nconsumed)); return NGTCP2_ERR_CALLBACK_FAILURE; } ngtcp2_conn_extend_max_stream_offset(tconn, stream_id, nconsumed); ngtcp2_conn_extend_max_offset(tconn, nconsumed); return 0; } static int cb_acked_stream_data_offset(ngtcp2_conn *tconn, int64_t stream_id, uint64_t offset, size_t datalen, void *user_data, void *stream_user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; int rv; (void)stream_id; (void)tconn; (void)offset; (void)datalen; (void)stream_user_data; rv = nghttp3_conn_add_ack_offset(qs->h3conn, stream_id, datalen); if(rv != 0) { failf(qs->conn->data, "nghttp3_conn_add_ack_offset returned error: %s\n", nghttp3_strerror(rv)); return NGTCP2_ERR_CALLBACK_FAILURE; } return 0; } static int cb_stream_close(ngtcp2_conn *tconn, int64_t stream_id, uint64_t app_error_code, void *user_data, void *stream_user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; int rv; (void)tconn; (void)stream_user_data; /* stream is closed... */ rv = nghttp3_conn_close_stream(qs->h3conn, stream_id, app_error_code); if(rv != 0) { failf(qs->conn->data, "nghttp3_conn_close_stream returned error: %s\n", nghttp3_strerror(rv)); return NGTCP2_ERR_CALLBACK_FAILURE; } return 0; } static int cb_stream_reset(ngtcp2_conn *tconn, int64_t stream_id, uint64_t final_size, uint64_t app_error_code, void *user_data, void *stream_user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; int rv; (void)tconn; (void)final_size; (void)app_error_code; (void)stream_user_data; rv = nghttp3_conn_reset_stream(qs->h3conn, stream_id); if(rv != 0) { failf(qs->conn->data, "nghttp3_conn_reset_stream returned error: %s\n", nghttp3_strerror(rv)); return NGTCP2_ERR_CALLBACK_FAILURE; } return 0; } static int cb_recv_retry(ngtcp2_conn *tconn, const ngtcp2_pkt_hd *hd, const ngtcp2_pkt_retry *retry, void *user_data) { /* Re-generate handshake secrets here because connection ID might change. */ struct quicsocket *qs = (struct quicsocket *)user_data; (void)tconn; (void)hd; (void)retry; setup_initial_crypto_context(qs); return 0; } static ssize_t cb_in_hp_mask(ngtcp2_conn *tconn, uint8_t *dest, size_t destlen, const uint8_t *key, size_t keylen, const uint8_t *sample, size_t samplelen, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; ssize_t nwrite; (void)tconn; nwrite = Curl_qc_hp_mask(dest, destlen, &qs->hs_crypto_ctx, key, keylen, sample, samplelen); if(nwrite < 0) return NGTCP2_ERR_CALLBACK_FAILURE; return nwrite; } static ssize_t cb_hp_mask(ngtcp2_conn *tconn, uint8_t *dest, size_t destlen, const uint8_t *key, size_t keylen, const uint8_t *sample, size_t samplelen, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; ssize_t nwrite; (void)tconn; nwrite = Curl_qc_hp_mask(dest, destlen, &qs->crypto_ctx, key, keylen, sample, samplelen); if(nwrite < 0) return NGTCP2_ERR_CALLBACK_FAILURE; return nwrite; } static int cb_extend_max_local_streams_bidi(ngtcp2_conn *tconn, uint64_t max_streams, void *user_data) { (void)tconn; (void)max_streams; (void)user_data; return 0; } static int cb_extend_max_stream_data(ngtcp2_conn *tconn, int64_t stream_id, uint64_t max_data, void *user_data, void *stream_user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; int rv; (void)tconn; (void)max_data; (void)stream_user_data; rv = nghttp3_conn_unblock_stream(qs->h3conn, stream_id); if(rv != 0) { failf(qs->conn->data, "nghttp3_conn_unblock_stream returned error: %s\n", nghttp3_strerror(rv)); return NGTCP2_ERR_CALLBACK_FAILURE; } return 0; } static int cb_get_new_connection_id(ngtcp2_conn *tconn, ngtcp2_cid *cid, uint8_t *token, size_t cidlen, void *user_data) { struct quicsocket *qs = (struct quicsocket *)user_data; CURLcode result; (void)tconn; result = Curl_rand(qs->conn->data, cid->data, cidlen); if(result) return NGTCP2_ERR_CALLBACK_FAILURE; cid->datalen = cidlen; result = Curl_rand(qs->conn->data, token, NGTCP2_STATELESS_RESET_TOKENLEN); if(result) return NGTCP2_ERR_CALLBACK_FAILURE; return 0; } static ngtcp2_conn_callbacks ng_callbacks = { cb_initial, NULL, /* recv_client_initial */ cb_recv_crypto_data, cb_handshake_completed, NULL, /* recv_version_negotiation */ cb_in_encrypt, cb_in_decrypt, cb_encrypt_data, cb_decrypt_data, cb_in_hp_mask, cb_hp_mask, cb_recv_stream_data, NULL, /* acked_crypto_offset */ cb_acked_stream_data_offset, NULL, /* stream_open */ cb_stream_close, NULL, /* recv_stateless_reset */ cb_recv_retry, cb_extend_max_local_streams_bidi, NULL, /* extend_max_local_streams_uni */ NULL, /* rand */ cb_get_new_connection_id, NULL, /* remove_connection_id */ NULL, /* update_key */ NULL, /* path_validation */ NULL, /* select_preferred_addr */ cb_stream_reset, NULL, /* extend_max_remote_streams_bidi */ NULL, /* extend_max_remote_streams_uni */ cb_extend_max_stream_data, }; /* * Might be called twice for happy eyeballs. */ CURLcode Curl_quic_connect(struct connectdata *conn, curl_socket_t sockfd, int sockindex, const struct sockaddr *addr, socklen_t addrlen) { int rc; int rv; CURLcode result; ngtcp2_path path; /* TODO: this must be initialized properly */ struct Curl_easy *data = conn->data; struct quicsocket *qs = &conn->hequic[sockindex]; char ipbuf[40]; long port; (void)addrlen; qs->conn = conn; /* extract the used address as a string */ if(!Curl_addr2string((struct sockaddr*)addr, ipbuf, &port)) { char buffer[STRERROR_LEN]; failf(data, "ssrem inet_ntop() failed with errno %d: %s", errno, Curl_strerror(errno, buffer, sizeof(buffer))); return CURLE_BAD_FUNCTION_ARGUMENT; } infof(data, "Connect socket %d over QUIC to %s:%ld\n", sockfd, ipbuf, port); qs->version = NGTCP2_PROTO_VER; qs->sslctx = quic_ssl_ctx(data); if(!qs->sslctx) return CURLE_FAILED_INIT; /* TODO: better return code */ if(quic_init_ssl(qs)) return CURLE_FAILED_INIT; /* TODO: better return code */ qs->dcid.datalen = NGTCP2_MAX_CIDLEN; result = Curl_rand(data, qs->dcid.data, NGTCP2_MAX_CIDLEN); if(result) return result; qs->scid.datalen = NGTCP2_MAX_CIDLEN; result = Curl_rand(data, qs->scid.data, NGTCP2_MAX_CIDLEN); if(result) return result; quic_settings(&qs->settings); qs->tx_crypto_level = NGTCP2_CRYPTO_LEVEL_INITIAL; qs->rx_crypto_level = NGTCP2_CRYPTO_LEVEL_INITIAL; qs->local_addrlen = sizeof(qs->local_addr); rv = getsockname(sockfd, (struct sockaddr *)&qs->local_addr, &qs->local_addrlen); if(rv == -1) return CURLE_FAILED_INIT; ngtcp2_addr_init(&path.local, (uint8_t *)&qs->local_addr, qs->local_addrlen, NULL); ngtcp2_addr_init(&path.remote, (uint8_t*)addr, addrlen, NULL); #ifdef NGTCP2_PROTO_VER #define QUICVER NGTCP2_PROTO_VER #else #error "unsupported ngtcp2 version" #endif rc = ngtcp2_conn_client_new(&qs->qconn, &qs->dcid, &qs->scid, &path, QUICVER, &ng_callbacks, &qs->settings, NULL, qs); if(rc) return CURLE_FAILED_INIT; /* TODO: create a QUIC error code */ rc = setup_initial_crypto_context(qs); if(rc) return CURLE_FAILED_INIT; /* TODO: better return code */ return CURLE_OK; } /* * Store ngtp2 version info in this buffer, Prefix with a space. Return total * length written. */ int Curl_quic_ver(char *p, size_t len) { ngtcp2_info *ng2 = ngtcp2_version(0); return msnprintf(p, len, " ngtcp2/%s nghttp3/%s", ng2->version_str, NGHTTP3_VERSION); } static int ng_getsock(struct connectdata *conn, curl_socket_t *socks) { struct SingleRequest *k = &conn->data->req; int bitmap = GETSOCK_BLANK; socks[0] = conn->sock[FIRSTSOCKET]; /* in a HTTP/2 connection we can basically always get a frame so we should always be ready for one */ bitmap |= GETSOCK_READSOCK(FIRSTSOCKET); /* we're still uploading or the HTTP/2 layer wants to send data */ if((k->keepon & (KEEP_SEND|KEEP_SEND_PAUSE)) == KEEP_SEND) bitmap |= GETSOCK_WRITESOCK(FIRSTSOCKET); return bitmap; } static int ng_perform_getsock(const struct connectdata *conn, curl_socket_t *socks) { return ng_getsock((struct connectdata *)conn, socks); } static CURLcode ng_disconnect(struct connectdata *conn, bool dead_connection) { (void)conn; (void)dead_connection; return CURLE_OK; } static unsigned int ng_conncheck(struct connectdata *conn, unsigned int checks_to_perform) { (void)conn; (void)checks_to_perform; return CONNRESULT_NONE; } static const struct Curl_handler Curl_handler_http3 = { "HTTPS", /* scheme */ ZERO_NULL, /* setup_connection */ Curl_http, /* do_it */ Curl_http_done, /* done */ ZERO_NULL, /* do_more */ ZERO_NULL, /* connect_it */ ZERO_NULL, /* connecting */ ZERO_NULL, /* doing */ ng_getsock, /* proto_getsock */ ng_getsock, /* doing_getsock */ ZERO_NULL, /* domore_getsock */ ng_perform_getsock, /* perform_getsock */ ng_disconnect, /* disconnect */ ZERO_NULL, /* readwrite */ ng_conncheck, /* connection_check */ PORT_HTTP, /* defport */ CURLPROTO_HTTPS, /* protocol */ PROTOPT_SSL | PROTOPT_STREAM /* flags */ }; static int cb_h3_stream_close(nghttp3_conn *conn, int64_t stream_id, uint64_t app_error_code, void *user_data, void *stream_user_data) { struct Curl_easy *data = stream_user_data; struct HTTP *stream = data->req.protop; (void)conn; (void)stream_id; (void)app_error_code; (void)user_data; fprintf(stderr, "cb_h3_stream_close CALLED\n"); stream->closed = TRUE; return 0; } static int cb_h3_recv_data(nghttp3_conn *conn, int64_t stream_id, const uint8_t *buf, size_t buflen, void *user_data, void *stream_user_data) { struct quicsocket *qs = user_data; size_t ncopy; struct Curl_easy *data = stream_user_data; struct HTTP *stream = data->req.protop; (void)conn; fprintf(stderr, "cb_h3_recv_data CALLED with %d bytes\n", buflen); /* TODO: this needs to be handled properly */ DEBUGASSERT(buflen <= stream->len); ncopy = CURLMIN(stream->len, buflen); memcpy(stream->mem, buf, ncopy); stream->len -= ncopy; stream->memlen += ncopy; stream->mem += ncopy; ngtcp2_conn_extend_max_stream_offset(qs->qconn, stream_id, buflen); ngtcp2_conn_extend_max_offset(qs->qconn, buflen); return 0; } static int cb_h3_deferred_consume(nghttp3_conn *conn, int64_t stream_id, size_t consumed, void *user_data, void *stream_user_data) { struct quicsocket *qs = user_data; (void)conn; (void)stream_user_data; fprintf(stderr, "cb_h3_deferred_consume CALLED\n"); ngtcp2_conn_extend_max_stream_offset(qs->qconn, stream_id, consumed); ngtcp2_conn_extend_max_offset(qs->qconn, consumed); return 0; } /* Decode HTTP status code. Returns -1 if no valid status code was decoded. (duplicate from http2.c) */ static int decode_status_code(const uint8_t *value, size_t len) { int i; int res; if(len != 3) { return -1; } res = 0; for(i = 0; i < 3; ++i) { char c = value[i]; if(c < '0' || c > '9') { return -1; } res *= 10; res += c - '0'; } return res; } static int cb_h3_end_headers(nghttp3_conn *conn, int64_t stream_id, void *user_data, void *stream_user_data) { struct Curl_easy *data = stream_user_data; struct HTTP *stream = data->req.protop; (void)conn; (void)stream_id; (void)user_data; if(stream->memlen >= 2) { memcpy(stream->mem, "\r\n", 2); stream->len -= 2; stream->memlen += 2; stream->mem += 2; } return 0; } static int cb_h3_recv_header(nghttp3_conn *conn, int64_t stream_id, int32_t token, nghttp3_rcbuf *name, nghttp3_rcbuf *value, uint8_t flags, void *user_data, void *stream_user_data) { nghttp3_vec h3name = nghttp3_rcbuf_get_buf(name); nghttp3_vec h3val = nghttp3_rcbuf_get_buf(value); struct Curl_easy *data = stream_user_data; struct HTTP *stream = data->req.protop; size_t ncopy; (void)conn; (void)stream_id; (void)token; (void)flags; (void)user_data; fprintf(stderr, "cb_h3_recv_header called!\n"); if(h3name.len == sizeof(":status") - 1 && !memcmp(":status", h3name.base, h3name.len)) { int status = decode_status_code(h3val.base, h3val.len); DEBUGASSERT(status != -1); msnprintf(stream->mem, stream->len, "HTTP/3 %03d \r\n", status); } else { /* store as a HTTP1-style header */ msnprintf(stream->mem, stream->len, "%.*s: %.*s\n", h3name.len, h3name.base, h3val.len, h3val.base); } ncopy = strlen(stream->mem); stream->len -= ncopy; stream->memlen += ncopy; stream->mem += ncopy; return 0; } static int cb_h3_send_stop_sending(nghttp3_conn *conn, int64_t stream_id, uint64_t app_error_code, void *user_data, void *stream_user_data) { (void)conn; (void)stream_id; (void)app_error_code; (void)user_data; (void)stream_user_data; fprintf(stderr, "cb_h3_send_stop_sending CALLED\n"); return 0; } static nghttp3_conn_callbacks ngh3_callbacks = { cb_h3_acked_stream_data, /* acked_stream_data */ cb_h3_stream_close, cb_h3_recv_data, cb_h3_deferred_consume, NULL, /* begin_headers */ cb_h3_recv_header, cb_h3_end_headers, NULL, /* begin_trailers */ cb_h3_recv_header, NULL, /* end_trailers */ NULL, /* http_begin_push_promise */ NULL, /* http_recv_push_promise */ NULL, /* http_end_push_promise */ NULL, /* http_cancel_push */ cb_h3_send_stop_sending, NULL, /* push_stream */ NULL, /* end_stream */ }; static int init_ngh3_conn(struct quicsocket *qs) { CURLcode result; int rc; int64_t ctrl_stream_id, qpack_enc_stream_id, qpack_dec_stream_id; if(ngtcp2_conn_get_max_local_streams_uni(qs->qconn) < 3) { failf(qs->conn->data, "too few available QUIC streams"); return CURLE_FAILED_INIT; } nghttp3_conn_settings_default(&qs->h3settings); rc = nghttp3_conn_client_new(&qs->h3conn, &ngh3_callbacks, &qs->h3settings, nghttp3_mem_default(), qs); if(rc) { result = CURLE_OUT_OF_MEMORY; goto fail; } rc = ngtcp2_conn_open_uni_stream(qs->qconn, &ctrl_stream_id, NULL); if(rc) { result = CURLE_FAILED_INIT; goto fail; } rc = nghttp3_conn_bind_control_stream(qs->h3conn, ctrl_stream_id); if(rc) { result = CURLE_FAILED_INIT; goto fail; } rc = ngtcp2_conn_open_uni_stream(qs->qconn, &qpack_enc_stream_id, NULL); if(rc) { result = CURLE_FAILED_INIT; goto fail; } rc = ngtcp2_conn_open_uni_stream(qs->qconn, &qpack_dec_stream_id, NULL); if(rc) { result = CURLE_FAILED_INIT; goto fail; } rc = nghttp3_conn_bind_qpack_streams(qs->h3conn, qpack_enc_stream_id, qpack_dec_stream_id); if(rc) { result = CURLE_FAILED_INIT; goto fail; } return CURLE_OK; fail: return result; } static Curl_recv ngh3_stream_recv; static Curl_send ngh3_stream_send; /* incoming data frames on the h3 stream */ static ssize_t ngh3_stream_recv(struct connectdata *conn, int sockindex, char *buf, size_t buffersize, CURLcode *curlcode) { curl_socket_t sockfd = conn->sock[sockindex]; struct HTTP *stream = conn->data->req.protop; struct quicsocket *qs = conn->quic; fprintf(stderr, "ngh3_stream_recv CALLED (easy %p, socket %d)\n", conn->data, sockfd); /* remember where to store incoming data for this stream and how big the buffer is */ stream->mem = buf; stream->len = buffersize; stream->memlen = 0; if(ng_process_ingress(conn, sockfd, qs)) { *curlcode = CURLE_RECV_ERROR; return -1; } if(ng_flush_egress(conn, sockfd, qs)) { *curlcode = CURLE_SEND_ERROR; return -1; } if(stream->memlen) { /* data arrived */ *curlcode = CURLE_OK; infof(conn->data, "ngh3_stream_recv returns %zd bytes\n", stream->memlen); return stream->memlen; } if(stream->closed) { *curlcode = CURLE_OK; return 0; } infof(conn->data, "ngh3_stream_recv returns 0 bytes and EAGAIN\n"); *curlcode = CURLE_AGAIN; return -1; } /* this amount of data has now been acked on this stream */ static int cb_h3_acked_stream_data(nghttp3_conn *conn, int64_t stream_id, size_t datalen, void *user_data, void *stream_user_data) { struct Curl_easy *data = stream_user_data; struct HTTP *stream = data->req.protop; (void)conn; (void)stream_id; (void)user_data; if(!data->set.postfields) { stream->h3out->used -= datalen; fprintf(stderr, "cb_h3_acked_stream_data, %zd bytes, %zd left unacked\n", datalen, stream->h3out->used); DEBUGASSERT(stream->h3out->used < H3_SEND_SIZE); } return 0; } static int cb_h3_readfunction(nghttp3_conn *conn, int64_t stream_id, const uint8_t **pdata, size_t *pdatalen, uint32_t *pflags, void *user_data, void *stream_user_data) { struct Curl_easy *data = stream_user_data; size_t nread; struct HTTP *stream = data->req.protop; (void)conn; (void)stream_id; (void)user_data; if(data->set.postfields) { *pdata = data->set.postfields; *pdatalen = data->state.infilesize; *pflags = NGHTTP3_DATA_FLAG_EOF; return 0; } nread = CURLMIN(stream->upload_len, H3_SEND_SIZE - stream->h3out->used); if(nread > 0) { /* nghttp3 wants us to hold on to the data until it tells us it is okay to delete it. Append the data at the end of the h3out buffer. Since we can only return consecutive data, copy the amount that fits and the next part comes in next invoke. */ struct h3out *out = stream->h3out; if(nread + out->windex > H3_SEND_SIZE) nread = H3_SEND_SIZE - out->windex; memcpy(&out->buf[out->windex], stream->upload_mem, nread); out->windex += nread; out->used += nread; /* that's the chunk we return to nghttp3 */ *pdata = &out->buf[out->windex]; *pdatalen = nread; if(out->windex == H3_SEND_SIZE) out->windex = 0; /* wrap */ stream->upload_mem += nread; stream->upload_len -= nread; if(data->state.infilesize != -1) { stream->upload_left -= nread; if(!stream->upload_left) *pflags = NGHTTP3_DATA_FLAG_EOF; } fprintf(stderr, "cb_h3_readfunction %zd bytes%s (at %zd unacked)\n", nread, *pflags == NGHTTP3_DATA_FLAG_EOF?" EOF":"", out->used); } if(stream->upload_done && !stream->upload_len && (stream->upload_left <= 0)) { fprintf(stderr, "!!!!!!!!! cb_h3_readfunction sets EOF\n"); *pdata = NULL; *pdatalen = 0; *pflags = NGHTTP3_DATA_FLAG_EOF; } else if(!nread) { *pdatalen = 0; return NGHTTP3_ERR_WOULDBLOCK; } return 0; } /* Index where :authority header field will appear in request header field list. */ #define AUTHORITY_DST_IDX 3 static CURLcode http_request(struct connectdata *conn, const void *mem, size_t len) { struct HTTP *stream = conn->data->req.protop; size_t nheader; size_t i; size_t authority_idx; char *hdbuf = (char *)mem; char *end, *line_end; struct quicsocket *qs = conn->quic; CURLcode result = CURLE_OK; struct Curl_easy *data = conn->data; nghttp3_nv *nva = NULL; int64_t stream3_id; int rc; struct h3out *h3out = NULL; rc = ngtcp2_conn_open_bidi_stream(qs->qconn, &stream3_id, NULL); if(rc) { failf(conn->data, "can get bidi streams"); result = CURLE_SEND_ERROR; goto fail; } stream->stream3_id = stream3_id; stream->h3req = TRUE; /* senf off! */ /* Calculate number of headers contained in [mem, mem + len). Assumes a correctly generated HTTP header field block. */ nheader = 0; for(i = 1; i < len; ++i) { if(hdbuf[i] == '\n' && hdbuf[i - 1] == '\r') { ++nheader; ++i; } } if(nheader < 2) goto fail; /* We counted additional 2 \r\n in the first and last line. We need 3 new headers: :method, :path and :scheme. Therefore we need one more space. */ nheader += 1; nva = malloc(sizeof(nghttp3_nv) * nheader); if(!nva) { result = CURLE_OUT_OF_MEMORY; goto fail; } /* Extract :method, :path from request line We do line endings with CRLF so checking for CR is enough */ line_end = memchr(hdbuf, '\r', len); if(!line_end) { result = CURLE_BAD_FUNCTION_ARGUMENT; /* internal error */ goto fail; } /* Method does not contain spaces */ end = memchr(hdbuf, ' ', line_end - hdbuf); if(!end || end == hdbuf) goto fail; nva[0].name = (unsigned char *)":method"; nva[0].namelen = strlen((char *)nva[0].name); nva[0].value = (unsigned char *)hdbuf; nva[0].valuelen = (size_t)(end - hdbuf); nva[0].flags = NGHTTP3_NV_FLAG_NONE; hdbuf = end + 1; /* Path may contain spaces so scan backwards */ end = NULL; for(i = (size_t)(line_end - hdbuf); i; --i) { if(hdbuf[i - 1] == ' ') { end = &hdbuf[i - 1]; break; } } if(!end || end == hdbuf) goto fail; nva[1].name = (unsigned char *)":path"; nva[1].namelen = strlen((char *)nva[1].name); nva[1].value = (unsigned char *)hdbuf; nva[1].valuelen = (size_t)(end - hdbuf); nva[1].flags = NGHTTP3_NV_FLAG_NONE; nva[2].name = (unsigned char *)":scheme"; nva[2].namelen = strlen((char *)nva[2].name); if(conn->handler->flags & PROTOPT_SSL) nva[2].value = (unsigned char *)"https"; else nva[2].value = (unsigned char *)"http"; nva[2].valuelen = strlen((char *)nva[2].value); nva[2].flags = NGHTTP3_NV_FLAG_NONE; authority_idx = 0; i = 3; while(i < nheader) { size_t hlen; hdbuf = line_end + 2; /* check for next CR, but only within the piece of data left in the given buffer */ line_end = memchr(hdbuf, '\r', len - (hdbuf - (char *)mem)); if(!line_end || (line_end == hdbuf)) goto fail; /* header continuation lines are not supported */ if(*hdbuf == ' ' || *hdbuf == '\t') goto fail; for(end = hdbuf; end < line_end && *end != ':'; ++end) ; if(end == hdbuf || end == line_end) goto fail; hlen = end - hdbuf; if(hlen == 4 && strncasecompare("host", hdbuf, 4)) { authority_idx = i; nva[i].name = (unsigned char *)":authority"; nva[i].namelen = strlen((char *)nva[i].name); } else { nva[i].name = (unsigned char *)hdbuf; nva[i].namelen = (size_t)(end - hdbuf); } nva[i].flags = NGHTTP3_NV_FLAG_NONE; hdbuf = end + 1; while(*hdbuf == ' ' || *hdbuf == '\t') ++hdbuf; end = line_end; #if 0 /* This should probably go in more or less like this */ switch(inspect_header((const char *)nva[i].name, nva[i].namelen, hdbuf, end - hdbuf)) { case HEADERINST_IGNORE: /* skip header fields prohibited by HTTP/2 specification. */ --nheader; continue; case HEADERINST_TE_TRAILERS: nva[i].value = (uint8_t*)"trailers"; nva[i].value_len = sizeof("trailers") - 1; break; default: nva[i].value = (unsigned char *)hdbuf; nva[i].value_len = (size_t)(end - hdbuf); } #endif nva[i].value = (unsigned char *)hdbuf; nva[i].valuelen = (size_t)(end - hdbuf); nva[i].flags = NGHTTP3_NV_FLAG_NONE; ++i; } /* :authority must come before non-pseudo header fields */ if(authority_idx != 0 && authority_idx != AUTHORITY_DST_IDX) { nghttp3_nv authority = nva[authority_idx]; for(i = authority_idx; i > AUTHORITY_DST_IDX; --i) { nva[i] = nva[i - 1]; } nva[i] = authority; } /* Warn stream may be rejected if cumulative length of headers is too large. */ #define MAX_ACC 60000 /* <64KB to account for some overhead */ { size_t acc = 0; for(i = 0; i < nheader; ++i) acc += nva[i].namelen + nva[i].valuelen; if(acc > MAX_ACC) { infof(data, "http_request: Warning: The cumulative length of all " "headers exceeds %zu bytes and that could cause the " "stream to be rejected.\n", MAX_ACC); } } switch(data->set.httpreq) { case HTTPREQ_POST: case HTTPREQ_POST_FORM: case HTTPREQ_POST_MIME: case HTTPREQ_PUT: { nghttp3_data_reader data_reader; if(data->state.infilesize != -1) stream->upload_left = data->state.infilesize; else /* data sending without specifying the data amount up front */ stream->upload_left = -1; /* unknown, but not zero */ data_reader.read_data = cb_h3_readfunction; h3out = calloc(sizeof(struct h3out), 1); if(!h3out) { result = CURLE_OUT_OF_MEMORY; goto fail; } stream->h3out = h3out; rc = nghttp3_conn_submit_request(qs->h3conn, stream->stream3_id, nva, nheader, &data_reader, conn->data); if(rc) { result = CURLE_SEND_ERROR; goto fail; } break; } default: stream->upload_left = 0; /* nothing left to send */ rc = nghttp3_conn_submit_request(qs->h3conn, stream->stream3_id, nva, nheader, NULL, /* no body! */ conn->data); if(rc) { result = CURLE_SEND_ERROR; goto fail; } break; } Curl_safefree(nva); infof(data, "Using HTTP/3 Stream ID: %x (easy handle %p)\n", stream3_id, (void *)data); return CURLE_OK; fail: free(nva); return result; } static ssize_t ngh3_stream_send(struct connectdata *conn, int sockindex, const void *mem, size_t len, CURLcode *curlcode) { ssize_t sent; struct quicsocket *qs = conn->quic; curl_socket_t sockfd = conn->sock[sockindex]; struct HTTP *stream = conn->data->req.protop; if(!stream->h3req) { CURLcode result = http_request(conn, mem, len); if(result) { *curlcode = CURLE_SEND_ERROR; return -1; } sent = len; } else { fprintf(stderr, "ngh3_stream_send() wants to send %zd bytes\n", len); if(!stream->upload_len) { stream->upload_mem = mem; stream->upload_len = len; (void)nghttp3_conn_resume_stream(qs->h3conn, stream->stream3_id); sent = len; } else { *curlcode = CURLE_AGAIN; return -1; } } if(ng_flush_egress(conn, sockfd, qs)) { *curlcode = CURLE_SEND_ERROR; return -1; } *curlcode = CURLE_OK; return sent; } static void ng_has_connected(struct connectdata *conn, int tempindex) { conn->recv[FIRSTSOCKET] = ngh3_stream_recv; conn->send[FIRSTSOCKET] = ngh3_stream_send; conn->handler = &Curl_handler_http3; conn->bits.multiplex = TRUE; /* at least potentially multiplexed */ conn->httpversion = 30; conn->bundle->multiuse = BUNDLE_MULTIPLEX; conn->quic = &conn->hequic[tempindex]; DEBUGF(infof(conn->data, "ngtcp2 established connection!\n")); } /* * There can be multiple connection attempts going on in parallel. */ CURLcode Curl_quic_is_connected(struct connectdata *conn, int sockindex, bool *done) { CURLcode result; struct quicsocket *qs = &conn->hequic[sockindex]; curl_socket_t sockfd = conn->tempsock[sockindex]; result = ng_process_ingress(conn, sockfd, qs); if(result) return result; result = ng_flush_egress(conn, sockfd, qs); if(result) return result; if(ngtcp2_conn_get_handshake_completed(qs->qconn)) { *done = TRUE; ng_has_connected(conn, sockindex); } return result; } static CURLcode ng_process_ingress(struct connectdata *conn, int sockfd, struct quicsocket *qs) { ssize_t recvd; int rv; uint8_t buf[65536]; size_t bufsize = sizeof(buf); struct sockaddr_storage remote_addr; socklen_t remote_addrlen; ngtcp2_path path; ngtcp2_tstamp ts = timestamp(); for(;;) { remote_addrlen = sizeof(remote_addr); while((recvd = recvfrom(sockfd, buf, bufsize, MSG_DONTWAIT, (struct sockaddr *)&remote_addr, &remote_addrlen)) == -1 && errno == EINTR) ; if(recvd == -1) { if(errno == EAGAIN || errno == EWOULDBLOCK) break; failf(conn->data, "ngtcp2: recvfrom() unexpectedly returned %d", recvd); return CURLE_RECV_ERROR; } ngtcp2_addr_init(&path.local, (uint8_t *)&qs->local_addr, qs->local_addrlen, NULL); ngtcp2_addr_init(&path.remote, (uint8_t *)&remote_addr, remote_addrlen, NULL); rv = ngtcp2_conn_read_pkt(qs->qconn, &path, buf, recvd, ts); if(rv != 0) { /* TODO Send CONNECTION_CLOSE if possible */ return CURLE_RECV_ERROR; } } return CURLE_OK; } static CURLcode ng_flush_egress(struct connectdata *conn, int sockfd, struct quicsocket *qs) { int rv; ssize_t sent; ssize_t outlen; uint8_t out[NGTCP2_MAX_PKTLEN_IPV4]; size_t pktlen; ngtcp2_path_storage ps; ngtcp2_tstamp ts = timestamp(); struct sockaddr_storage remote_addr; ngtcp2_tstamp expiry; ngtcp2_duration timeout; int64_t stream_id; ssize_t veccnt; int fin; nghttp3_vec vec[16]; ssize_t ndatalen; switch(qs->local_addr.ss_family) { case AF_INET: pktlen = NGTCP2_MAX_PKTLEN_IPV4; break; case AF_INET6: pktlen = NGTCP2_MAX_PKTLEN_IPV6; break; default: assert(0); } rv = ngtcp2_conn_handle_expiry(qs->qconn, ts); if(rv != 0) { failf(conn->data, "ngtcp2_conn_handle_expiry returned error: %s\n", ngtcp2_strerror(rv)); return CURLE_SEND_ERROR; } ngtcp2_path_storage_zero(&ps); for(;;) { outlen = -1; if(qs->h3conn && ngtcp2_conn_get_max_data_left(qs->qconn)) { veccnt = nghttp3_conn_writev_stream(qs->h3conn, &stream_id, &fin, vec, sizeof(vec) / sizeof(vec[0])); if(veccnt < 0) { failf(conn->data, "nghttp3_conn_writev_stream returned error: %s\n", nghttp3_strerror((int)veccnt)); return CURLE_SEND_ERROR; } else if(veccnt > 0) { outlen = ngtcp2_conn_writev_stream(qs->qconn, &ps.path, out, pktlen, &ndatalen, NGTCP2_WRITE_STREAM_FLAG_MORE, stream_id, fin, (const ngtcp2_vec *)vec, veccnt, ts); if(outlen == 0) { break; } if(outlen < 0) { if(outlen == NGTCP2_ERR_STREAM_DATA_BLOCKED || outlen == NGTCP2_ERR_STREAM_SHUT_WR) { rv = nghttp3_conn_block_stream(qs->h3conn, stream_id); if(rv != 0) { failf(conn->data, "nghttp3_conn_block_stream returned error: %s\n", nghttp3_strerror(rv)); return CURLE_SEND_ERROR; } continue; } else if(outlen == NGTCP2_ERR_WRITE_STREAM_MORE) { assert(ndatalen > 0); rv = nghttp3_conn_add_write_offset(qs->h3conn, stream_id, ndatalen); if(rv != 0) { failf(conn->data, "nghttp3_conn_add_write_offset returned error: %s\n", nghttp3_strerror(rv)); return CURLE_SEND_ERROR; } continue; } else { failf(conn->data, "ngtcp2_conn_writev_stream returned error: %s\n", ngtcp2_strerror((int)outlen)); return CURLE_SEND_ERROR; } } else if(ndatalen > 0) { rv = nghttp3_conn_add_write_offset(qs->h3conn, stream_id, ndatalen); if(rv != 0) { failf(conn->data, "nghttp3_conn_add_write_offset returned error: %s\n", nghttp3_strerror(rv)); return CURLE_SEND_ERROR; } } } } if(outlen < 0) { outlen = ngtcp2_conn_write_pkt(qs->qconn, &ps.path, out, pktlen, ts); if(outlen < 0) { failf(conn->data, "ngtcp2_conn_write_pkt returned error: %s\n", ngtcp2_strerror((int)outlen)); return CURLE_SEND_ERROR; } if(outlen == 0) break; } memcpy(&remote_addr, ps.path.remote.addr, ps.path.remote.addrlen); while((sent = sendto(sockfd, out, outlen, MSG_DONTWAIT, (struct sockaddr *)&remote_addr, (socklen_t)ps.path.remote.addrlen)) == -1 && errno == EINTR) ; if(sent == -1) { if(errno == EAGAIN || errno == EWOULDBLOCK) { /* TODO Cache packet */ break; } else { failf(conn->data, "sendto() returned %zd (errno %d)\n", sent, SOCKERRNO); return CURLE_SEND_ERROR; } } } expiry = ngtcp2_conn_get_expiry(qs->qconn); if(expiry != UINT64_MAX) { if(expiry <= ts) { timeout = NGTCP2_MILLISECONDS; } else { timeout = expiry - ts; } Curl_expire(conn->data, timeout / NGTCP2_MILLISECONDS, EXPIRE_QUIC); } return CURLE_OK; } /* * Called from transfer.c:done_sending when we stop HTTP/3 uploading. */ CURLcode Curl_quic_done_sending(struct connectdata *conn) { if(conn->handler == &Curl_handler_http3) { /* only for HTTP/3 transfers */ struct HTTP *stream = conn->data->req.protop; struct quicsocket *qs = conn->quic; fprintf(stderr, "!!! Curl_quic_done_sending stream %zu\n", stream->stream3_id); stream->upload_done = TRUE; (void)nghttp3_conn_resume_stream(qs->h3conn, stream->stream3_id); } return CURLE_OK; } #endif