| /**************************************************************************** |
| ** |
| ** Copyright (C) 2018 The Qt Company Ltd. |
| ** Contact: https://www.qt.io/licensing/ |
| ** |
| ** This file is part of the QtNetwork module of the Qt Toolkit. |
| ** |
| ** $QT_BEGIN_LICENSE:LGPL$ |
| ** Commercial License Usage |
| ** Licensees holding valid commercial Qt licenses may use this file in |
| ** accordance with the commercial license agreement provided with the |
| ** Software or, alternatively, in accordance with the terms contained in |
| ** a written agreement between you and The Qt Company. For licensing terms |
| ** and conditions see https://www.qt.io/terms-conditions. For further |
| ** information use the contact form at https://www.qt.io/contact-us. |
| ** |
| ** GNU Lesser General Public License Usage |
| ** Alternatively, this file may be used under the terms of the GNU Lesser |
| ** General Public License version 3 as published by the Free Software |
| ** Foundation and appearing in the file LICENSE.LGPL3 included in the |
| ** packaging of this file. Please review the following information to |
| ** ensure the GNU Lesser General Public License version 3 requirements |
| ** will be met: https://www.gnu.org/licenses/lgpl-3.0.html. |
| ** |
| ** GNU General Public License Usage |
| ** Alternatively, this file may be used under the terms of the GNU |
| ** General Public License version 2.0 or (at your option) the GNU General |
| ** Public license version 3 or any later version approved by the KDE Free |
| ** Qt Foundation. The licenses are as published by the Free Software |
| ** Foundation and appearing in the file LICENSE.GPL2 and LICENSE.GPL3 |
| ** included in the packaging of this file. Please review the following |
| ** information to ensure the GNU General Public License requirements will |
| ** be met: https://www.gnu.org/licenses/gpl-2.0.html and |
| ** https://www.gnu.org/licenses/gpl-3.0.html. |
| ** |
| ** $QT_END_LICENSE$ |
| ** |
| ****************************************************************************/ |
| |
| #ifndef QDTLS_OPENSSL_P_H |
| #define QDTLS_OPENSSL_P_H |
| |
| #include <private/qtnetworkglobal_p.h> |
| |
| #include <QtCore/qglobal.h> |
| |
| #include <openssl/ossl_typ.h> |
| |
| #include "qdtls_p.h" |
| |
| #include <private/qsslcontext_openssl_p.h> |
| #include <private/qsslsocket_openssl_p.h> |
| |
| #include <QtNetwork/qsslpresharedkeyauthenticator.h> |
| #include <QtNetwork/qhostaddress.h> |
| |
| #include <QtCore/qcryptographichash.h> |
| #include <QtCore/qsharedpointer.h> |
| #include <QtCore/qbytearray.h> |
| #include <QtCore/qvector.h> |
| |
| // |
| // W A R N I N G |
| // ------------- |
| // |
| // This file is not part of the Qt API. It exists purely as an |
| // implementation detail. This header file may change from version to |
| // version without notice, or even be removed. |
| // |
| // We mean it. |
| // |
| |
| QT_REQUIRE_CONFIG(openssl); |
| QT_REQUIRE_CONFIG(dtls); |
| |
| QT_BEGIN_NAMESPACE |
| |
| class QDtlsPrivateOpenSSL; |
| class QUdpSocket; |
| |
| namespace dtlsopenssl |
| { |
| |
| class DtlsState |
| { |
| public: |
| // Note, bioMethod, if allocated (i.e. OpenSSL version >= 1.1) _must_ |
| // outlive BIOs it was used to create. Thus the order of declarations |
| // here matters. |
| using BioMethod = QSharedPointer<BIO_METHOD>; |
| BioMethod bioMethod; |
| |
| using TlsContext = QSharedPointer<QSslContext>; |
| TlsContext tlsContext; |
| |
| using TlsConnection = QSharedPointer<SSL>; |
| TlsConnection tlsConnection; |
| |
| QByteArray dgram; |
| |
| QHostAddress remoteAddress; |
| quint16 remotePort = 0; |
| |
| QVector<QSslErrorEntry> x509Errors; |
| |
| long peeking = false; |
| QUdpSocket *udpSocket = nullptr; |
| bool writeSuppressed = false; |
| |
| bool init(QDtlsBasePrivate *dtlsBase, QUdpSocket *socket, |
| const QHostAddress &remote, quint16 port, |
| const QByteArray &receivedMessage); |
| |
| void reset(); |
| |
| QDtlsPrivateOpenSSL *dtlsPrivate = nullptr; |
| QByteArray secret; |
| |
| #ifdef QT_CRYPTOGRAPHICHASH_ONLY_SHA1 |
| QCryptographicHash::Algorithm hashAlgorithm = QCryptographicHash::Sha1; |
| #else |
| QCryptographicHash::Algorithm hashAlgorithm = QCryptographicHash::Sha256; |
| #endif |
| |
| private: |
| |
| bool initTls(QDtlsBasePrivate *dtlsBase); |
| bool initCtxAndConnection(QDtlsBasePrivate *dtlsBase); |
| bool initBIO(QDtlsBasePrivate *dtlsBase); |
| void setLinkMtu(QDtlsBasePrivate *dtlsBase); |
| }; |
| |
| } // namespace dtlsopenssl |
| |
| class QDtlsClientVerifierOpenSSL : public QDtlsClientVerifierPrivate |
| { |
| public: |
| |
| QDtlsClientVerifierOpenSSL(); |
| |
| bool verifyClient(QUdpSocket *socket, const QByteArray &dgram, |
| const QHostAddress &address, quint16 port) override; |
| |
| private: |
| dtlsopenssl::DtlsState dtls; |
| }; |
| |
| class QDtlsPrivateOpenSSL : public QDtlsPrivate |
| { |
| public: |
| QDtlsPrivateOpenSSL(); |
| |
| bool startHandshake(QUdpSocket *socket, const QByteArray &datagram) override; |
| bool continueHandshake(QUdpSocket *socket, const QByteArray &datagram) override; |
| bool resumeHandshake(QUdpSocket *socket) override; |
| void abortHandshake(QUdpSocket *socket) override; |
| bool handleTimeout(QUdpSocket *socket) override; |
| void sendShutdownAlert(QUdpSocket *socket) override; |
| |
| qint64 writeDatagramEncrypted(QUdpSocket *socket, const QByteArray &datagram) override; |
| QByteArray decryptDatagram(QUdpSocket *socket, const QByteArray &tlsdgram) override; |
| |
| unsigned pskClientCallback(const char *hint, char *identity, unsigned max_identity_len, |
| unsigned char *psk, unsigned max_psk_len); |
| unsigned pskServerCallback(const char *identity, unsigned char *psk, |
| unsigned max_psk_len); |
| |
| private: |
| |
| bool verifyPeer(); |
| void storePeerCertificates(); |
| bool tlsErrorsWereIgnored() const; |
| void fetchNegotiatedParameters(); |
| void reportTimeout(); |
| void resetDtls(); |
| |
| QVector<QSslErrorEntry> opensslErrors; |
| dtlsopenssl::DtlsState dtls; |
| |
| // We have to externally handle timeouts since we have non-blocking |
| // sockets and OpenSSL(DTLS) with non-blocking UDP sockets does not |
| // know if a timeout has occurred. |
| struct TimeoutHandler : QObject |
| { |
| TimeoutHandler() = default; |
| |
| void start(int hintMs = 0); |
| void doubleTimeout(); |
| void resetTimeout() {timeoutMs = 1000;} |
| void stop(); |
| void timerEvent(QTimerEvent *event); |
| |
| int timerId = -1; |
| int timeoutMs = 1000; |
| |
| QDtlsPrivateOpenSSL *dtlsConnection = nullptr; |
| }; |
| |
| // We will initialize it 'lazily', just in case somebody wants to move |
| // QDtls to another thread. |
| QScopedPointer<TimeoutHandler> timeoutHandler; |
| bool connectionWasShutdown = false; |
| QSslPreSharedKeyAuthenticator pskAuthenticator; |
| QByteArray identityHint; |
| |
| Q_DECLARE_PUBLIC(QDtls) |
| }; |
| |
| |
| |
| QT_END_NAMESPACE |
| |
| #endif // QDTLS_OPENSSL_P_H |