blob: 7968ef78d9dd74d95f7770468be8004ca3a7dda1 [file] [log] [blame]
[email protected]013c17c2012-01-21 19:09:011// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]d518cd92010-09-29 12:27:442// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
svaldeze83af292016-04-26 14:33:375#include "net/socket/ssl_client_socket_impl.h"
[email protected]d518cd92010-09-29 12:27:446
[email protected]edfd0f42014-07-22 18:20:377#include <errno.h>
bnc67da3de2015-01-15 21:02:268#include <string.h>
[email protected]d518cd92010-09-29 12:27:449
mabb51c5142016-12-07 09:32:4010#include <algorithm>
David Benjaminf8ebd2b2017-12-15 19:22:4111#include <map>
davidben752bcf22015-12-21 22:55:5012#include <utility>
13
[email protected]0f7804ec2011-10-07 20:04:1814#include "base/bind.h"
[email protected]f2da6ac2013-02-04 08:22:5315#include "base/callback_helpers.h"
David Benjamin9ba36b02017-11-10 19:01:5316#include "base/containers/span.h"
davidben1d489522015-07-01 18:48:4617#include "base/lazy_instance.h"
Avi Drissman13fc8932015-12-20 04:40:4618#include "base/macros.h"
[email protected]3b63f8f42011-03-28 01:54:1519#include "base/memory/singleton.h"
mmenke1beda3d2016-07-22 03:33:4520#include "base/metrics/field_trial.h"
Adam Langley074164132018-01-17 03:27:3221#include "base/metrics/field_trial_params.h"
Ilya Sherman0eb39802017-12-08 20:58:1822#include "base/metrics/histogram_functions.h"
asvitkinec3c93722015-06-17 14:48:3723#include "base/metrics/histogram_macros.h"
nharper49b27d992016-02-09 18:28:5124#include "base/strings/string_number_conversions.h"
davidben018aad62014-09-12 02:25:1925#include "base/strings/string_piece.h"
xunjieli9f8c5fb52016-12-07 22:59:3326#include "base/strings/stringprintf.h"
[email protected]20305ec2011-01-21 04:55:5227#include "base/synchronization/lock.h"
xunjieli9f8c5fb52016-12-07 22:59:3328#include "base/trace_event/process_memory_dump.h"
ssid6d6b40102016-04-05 18:59:5629#include "base/trace_event/trace_event.h"
estade5e5529d2015-05-21 20:59:1130#include "base/values.h"
[email protected]ee0f2aa82013-10-25 11:59:2631#include "crypto/ec_private_key.h"
[email protected]4b559b4d2011-04-14 17:37:1432#include "crypto/openssl_util.h"
David Benjamin570460e2018-10-16 06:01:2933#include "net/base/features.h"
martijna2e83bd2016-03-18 13:10:4534#include "net/base/ip_address.h"
[email protected]d518cd92010-09-29 12:27:4435#include "net/base/net_errors.h"
xunjieli0b7f5b62016-12-06 20:43:4836#include "net/base/trace_constants.h"
David Benjamind5503c82018-02-01 20:59:3837#include "net/base/url_util.h"
[email protected]6e7845ae2013-03-29 21:48:1138#include "net/cert/cert_verifier.h"
estark6f9b3d82016-01-12 21:37:0539#include "net/cert/ct_policy_enforcer.h"
estark723b5eeb2016-02-18 21:01:1240#include "net/cert/ct_policy_status.h"
davidbeneb5f8ef32014-09-04 14:14:3241#include "net/cert/ct_verifier.h"
David Benjaminf8ebd2b2017-12-15 19:22:4142#include "net/cert/internal/parse_certificate.h"
[email protected]6e7845ae2013-03-29 21:48:1143#include "net/cert/x509_certificate_net_log_param.h"
mattm316af822017-02-23 04:05:5644#include "net/cert/x509_util.h"
David Benjaminf8ebd2b2017-12-15 19:22:4145#include "net/der/parse_values.h"
[email protected]8bd4e7a2014-08-09 14:49:1746#include "net/http/transport_security_state.h"
mikecironef22f9812016-10-04 03:40:1947#include "net/log/net_log.h"
mikecirone8b85c432016-09-08 19:11:0048#include "net/log/net_log_event_type.h"
mikecironef22f9812016-10-04 03:40:1949#include "net/log/net_log_parameters_callback.h"
[email protected]536fd0b2013-03-14 17:41:5750#include "net/ssl/ssl_cert_request_info.h"
davidben281d13f02016-04-27 20:43:2851#include "net/ssl/ssl_cipher_suite_names.h"
svaldeze83af292016-04-26 14:33:3752#include "net/ssl/ssl_client_session_cache.h"
[email protected]536fd0b2013-03-14 17:41:5753#include "net/ssl/ssl_connection_status_flags.h"
54#include "net/ssl/ssl_info.h"
David Benjaminbd37c172018-07-11 17:24:5755#include "net/ssl/ssl_key_logger.h"
davidben1d489522015-07-01 18:48:4656#include "net/ssl/ssl_private_key.h"
[email protected]a2b2cfc2017-12-06 09:06:0857#include "net/traffic_annotation/network_traffic_annotation.h"
tfarinae8cb8aa2016-10-21 02:44:0158#include "third_party/boringssl/src/include/openssl/bio.h"
59#include "third_party/boringssl/src/include/openssl/bytestring.h"
60#include "third_party/boringssl/src/include/openssl/err.h"
61#include "third_party/boringssl/src/include/openssl/evp.h"
62#include "third_party/boringssl/src/include/openssl/mem.h"
63#include "third_party/boringssl/src/include/openssl/ssl.h"
[email protected]d518cd92010-09-29 12:27:4464
Adam Langley93cbfad12018-07-06 22:07:1665#if !defined(NET_DISABLE_BROTLI)
66#include "third_party/brotli/include/brotli/decode.h"
67#endif
68
[email protected]d518cd92010-09-29 12:27:4469namespace net {
70
71namespace {
72
[email protected]4b768562013-02-16 04:10:0773// This constant can be any non-negative/non-zero value (eg: it does not
74// overlap with any value of the net::Error range, including net::OK).
Oscar Johanssond49464e2018-07-02 09:35:4575const int kSSLClientSocketNoPendingResult = 1;
[email protected]4b768562013-02-16 04:10:0776
haavardm2d92e722014-12-19 13:45:4477// Default size of the internal BoringSSL buffers.
mmenke1beda3d2016-07-22 03:33:4578const int kDefaultOpenSSLBufferSize = 17 * 1024;
haavardm2d92e722014-12-19 13:45:4479
danakj655b66c2016-04-16 00:51:3880std::unique_ptr<base::Value> NetLogPrivateKeyOperationCallback(
David Benjaminb9bafbe2017-11-07 21:41:3881 uint16_t algorithm,
davidben752bcf22015-12-21 22:55:5082 NetLogCaptureMode mode) {
danakj655b66c2016-04-16 00:51:3883 std::unique_ptr<base::DictionaryValue> value(new base::DictionaryValue);
David Benjaminb9bafbe2017-11-07 21:41:3884 value->SetString("algorithm", SSL_get_signature_algorithm_name(
85 algorithm, 0 /* exclude curve */));
davidben752bcf22015-12-21 22:55:5086 return std::move(value);
87}
88
danakj655b66c2016-04-16 00:51:3889std::unique_ptr<base::Value> NetLogChannelIDLookupCallback(
nharper49b27d992016-02-09 18:28:5190 ChannelIDService* channel_id_service,
91 NetLogCaptureMode capture_mode) {
92 ChannelIDStore* store = channel_id_service->GetChannelIDStore();
danakj655b66c2016-04-16 00:51:3893 std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
nharper49b27d992016-02-09 18:28:5194 dict->SetBoolean("ephemeral", store->IsEphemeral());
95 dict->SetString("service", base::HexEncode(&channel_id_service,
96 sizeof(channel_id_service)));
97 dict->SetString("store", base::HexEncode(&store, sizeof(store)));
98 return std::move(dict);
99}
100
danakj655b66c2016-04-16 00:51:38101std::unique_ptr<base::Value> NetLogChannelIDLookupCompleteCallback(
nharper49b27d992016-02-09 18:28:51102 crypto::ECPrivateKey* key,
103 int result,
104 NetLogCaptureMode capture_mode) {
danakj655b66c2016-04-16 00:51:38105 std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
nharper49b27d992016-02-09 18:28:51106 dict->SetInteger("net_error", result);
107 std::string raw_key;
108 if (result == OK && key && key->ExportRawPublicKey(&raw_key)) {
nharper837b2af2016-12-21 21:48:36109 std::string key_to_log = base::HexEncode(raw_key.data(), raw_key.length());
nharper49b27d992016-02-09 18:28:51110 dict->SetString("key", key_to_log);
111 }
112 return std::move(dict);
113}
114
davidben281d13f02016-04-27 20:43:28115std::unique_ptr<base::Value> NetLogSSLInfoCallback(
116 SSLClientSocketImpl* socket,
117 NetLogCaptureMode capture_mode) {
118 SSLInfo ssl_info;
119 if (!socket->GetSSLInfo(&ssl_info))
120 return nullptr;
121
122 std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
123 const char* version_str;
124 SSLVersionToString(&version_str,
125 SSLConnectionStatusToVersion(ssl_info.connection_status));
126 dict->SetString("version", version_str);
127 dict->SetBoolean("is_resumed",
128 ssl_info.handshake_type == SSLInfo::HANDSHAKE_RESUME);
129 dict->SetInteger("cipher_suite", SSLConnectionStatusToCipherSuite(
130 ssl_info.connection_status));
131
bnc3472afd2016-11-17 15:27:21132 dict->SetString("next_proto",
133 NextProtoToString(socket->GetNegotiatedProtocol()));
davidben281d13f02016-04-27 20:43:28134
135 return std::move(dict);
136}
137
davidbencef9e212017-04-19 15:00:10138std::unique_ptr<base::Value> NetLogSSLAlertCallback(
139 const void* bytes,
140 size_t len,
141 NetLogCaptureMode capture_mode) {
142 std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
143 dict->SetString("hex_encoded_bytes", base::HexEncode(bytes, len));
144 return std::move(dict);
145}
146
147std::unique_ptr<base::Value> NetLogSSLMessageCallback(
148 bool is_write,
149 const void* bytes,
150 size_t len,
151 NetLogCaptureMode capture_mode) {
152 std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
153 if (len == 0) {
154 NOTREACHED();
155 return std::move(dict);
156 }
157
158 // The handshake message type is the first byte. Include it so elided messages
159 // still report their type.
160 uint8_t type = reinterpret_cast<const uint8_t*>(bytes)[0];
161 dict->SetInteger("type", type);
162
163 // Elide client certificate messages unless logging socket bytes. The client
164 // certificate does not contain information needed to impersonate the user
165 // (that's the private key which isn't sent over the wire), but it may contain
166 // information on the user's identity.
167 if (!is_write || type != SSL3_MT_CERTIFICATE ||
168 capture_mode.include_socket_bytes()) {
169 dict->SetString("hex_encoded_bytes", base::HexEncode(bytes, len));
170 }
171
172 return std::move(dict);
173}
174
David Benjaminf8ebd2b2017-12-15 19:22:41175// This enum is used in histograms, so values may not be reused.
176enum class RSAKeyUsage {
177 // The TLS cipher suite was not RSA or ECDHE_RSA.
178 kNotRSA = 0,
179 // The Key Usage extension is not present, which is consistent with TLS usage.
180 kOKNoExtension = 1,
181 // The Key Usage extension has both the digitalSignature and keyEncipherment
182 // bits, which is consistent with TLS usage.
183 kOKHaveBoth = 2,
184 // The Key Usage extension contains only the digitalSignature bit, which is
185 // consistent with TLS usage.
186 kOKHaveDigitalSignature = 3,
187 // The Key Usage extension contains only the keyEncipherment bit, which is
188 // consistent with TLS usage.
189 kOKHaveKeyEncipherment = 4,
190 // The Key Usage extension is missing the digitalSignature bit.
191 kMissingDigitalSignature = 5,
192 // The Key Usage extension is missing the keyEncipherment bit.
193 kMissingKeyEncipherment = 6,
194 // There was an error processing the certificate.
195 kError = 7,
196
197 kLastValue = kError,
198};
199
200RSAKeyUsage CheckRSAKeyUsage(const X509Certificate* cert,
201 const SSL_CIPHER* cipher) {
202 bool need_key_encipherment = false;
203 switch (SSL_CIPHER_get_kx_nid(cipher)) {
204 case NID_kx_rsa:
205 need_key_encipherment = true;
206 break;
207 case NID_kx_ecdhe:
208 if (SSL_CIPHER_get_auth_nid(cipher) != NID_auth_rsa) {
209 return RSAKeyUsage::kNotRSA;
210 }
211 break;
212 default:
213 return RSAKeyUsage::kNotRSA;
214 }
215
216 const CRYPTO_BUFFER* buffer = cert->cert_buffer();
217 der::Input tbs_certificate_tlv;
218 der::Input signature_algorithm_tlv;
219 der::BitString signature_value;
220 ParsedTbsCertificate tbs;
221 if (!ParseCertificate(
222 der::Input(CRYPTO_BUFFER_data(buffer), CRYPTO_BUFFER_len(buffer)),
223 &tbs_certificate_tlv, &signature_algorithm_tlv, &signature_value,
224 nullptr) ||
225 !ParseTbsCertificate(tbs_certificate_tlv,
226 x509_util::DefaultParseCertificateOptions(), &tbs,
227 nullptr)) {
228 return RSAKeyUsage::kError;
229 }
230
231 if (!tbs.has_extensions) {
232 return RSAKeyUsage::kOKNoExtension;
233 }
234
235 std::map<der::Input, ParsedExtension> extensions;
236 if (!ParseExtensions(tbs.extensions_tlv, &extensions)) {
237 return RSAKeyUsage::kError;
238 }
239 ParsedExtension key_usage_ext;
240 if (!ConsumeExtension(KeyUsageOid(), &extensions, &key_usage_ext)) {
241 return RSAKeyUsage::kOKNoExtension;
242 }
243 der::BitString key_usage;
244 if (!ParseKeyUsage(key_usage_ext.value, &key_usage)) {
245 return RSAKeyUsage::kError;
246 }
247
248 bool have_digital_signature =
249 key_usage.AssertsBit(KEY_USAGE_BIT_DIGITAL_SIGNATURE);
250 bool have_key_encipherment =
251 key_usage.AssertsBit(KEY_USAGE_BIT_KEY_ENCIPHERMENT);
252 if (have_digital_signature && have_key_encipherment) {
253 return RSAKeyUsage::kOKHaveBoth;
254 }
255
256 if (need_key_encipherment) {
257 return have_key_encipherment ? RSAKeyUsage::kOKHaveKeyEncipherment
258 : RSAKeyUsage::kMissingKeyEncipherment;
259 }
260 return have_digital_signature ? RSAKeyUsage::kOKHaveDigitalSignature
261 : RSAKeyUsage::kMissingDigitalSignature;
262}
263
Adam Langley93cbfad12018-07-06 22:07:16264#if !defined(NET_DISABLE_BROTLI)
265int DecompressBrotliCert(SSL* ssl,
266 CRYPTO_BUFFER** out,
267 size_t uncompressed_len,
268 const uint8_t* in,
269 size_t in_len) {
270 uint8_t* data;
271 bssl::UniquePtr<CRYPTO_BUFFER> decompressed(
272 CRYPTO_BUFFER_alloc(&data, uncompressed_len));
273 if (!decompressed) {
274 return 0;
275 }
276
277 size_t output_size = uncompressed_len;
278 if (BrotliDecoderDecompress(in_len, in, &output_size, data) !=
279 BROTLI_DECODER_RESULT_SUCCESS ||
280 output_size != uncompressed_len) {
281 return 0;
282 }
283
284 *out = decompressed.release();
285 return 1;
286}
287#endif
288
[email protected]821e3bb2013-11-08 01:06:01289} // namespace
290
svaldeze83af292016-04-26 14:33:37291class SSLClientSocketImpl::SSLContext {
[email protected]fbef13932010-11-23 12:38:53292 public:
olli.raula36aa8be2015-09-10 11:14:22293 static SSLContext* GetInstance() {
fdoray33e7c3c52017-01-19 18:37:23294 return base::Singleton<SSLContext,
295 base::LeakySingletonTraits<SSLContext>>::get();
olli.raula36aa8be2015-09-10 11:14:22296 }
[email protected]fbef13932010-11-23 12:38:53297 SSL_CTX* ssl_ctx() { return ssl_ctx_.get(); }
svaldeze83af292016-04-26 14:33:37298 SSLClientSessionCache* session_cache() { return &session_cache_; }
[email protected]fbef13932010-11-23 12:38:53299
svaldeze83af292016-04-26 14:33:37300 SSLClientSocketImpl* GetClientSocketFromSSL(const SSL* ssl) {
[email protected]fbef13932010-11-23 12:38:53301 DCHECK(ssl);
svaldeze83af292016-04-26 14:33:37302 SSLClientSocketImpl* socket = static_cast<SSLClientSocketImpl*>(
[email protected]fbef13932010-11-23 12:38:53303 SSL_get_ex_data(ssl, ssl_socket_data_index_));
304 DCHECK(socket);
305 return socket;
306 }
307
svaldeze83af292016-04-26 14:33:37308 bool SetClientSocketForSSL(SSL* ssl, SSLClientSocketImpl* socket) {
[email protected]fbef13932010-11-23 12:38:53309 return SSL_set_ex_data(ssl, ssl_socket_data_index_, socket) != 0;
310 }
311
David Benjaminbd37c172018-07-11 17:24:57312 void SetSSLKeyLogger(std::unique_ptr<SSLKeyLogger> logger) {
davidben2a811e4e2015-12-01 10:49:34313 DCHECK(!ssl_key_logger_);
David Benjaminbd37c172018-07-11 17:24:57314 ssl_key_logger_ = std::move(logger);
davidben2a811e4e2015-12-01 10:49:34315 SSL_CTX_set_keylog_callback(ssl_ctx_.get(), KeyLogCallback);
316 }
davidben2a811e4e2015-12-01 10:49:34317
davidben1d489522015-07-01 18:48:46318 static const SSL_PRIVATE_KEY_METHOD kPrivateKeyMethod;
319
[email protected]fbef13932010-11-23 12:38:53320 private:
olli.raula36aa8be2015-09-10 11:14:22321 friend struct base::DefaultSingletonTraits<SSLContext>;
[email protected]fbef13932010-11-23 12:38:53322
svaldeze83af292016-04-26 14:33:37323 SSLContext() : session_cache_(SSLClientSessionCache::Config()) {
[email protected]4b559b4d2011-04-14 17:37:14324 crypto::EnsureOpenSSLInit();
[email protected]fbef13932010-11-23 12:38:53325 ssl_socket_data_index_ = SSL_get_ex_new_index(0, 0, 0, 0, 0);
326 DCHECK_NE(ssl_socket_data_index_, -1);
davidbena35b40c32017-03-09 17:33:45327 ssl_ctx_.reset(SSL_CTX_new(TLS_with_buffers_method()));
[email protected]82c59022014-08-15 09:38:27328 SSL_CTX_set_cert_cb(ssl_ctx_.get(), ClientCertRequestCallback, NULL);
davidbena35b40c32017-03-09 17:33:45329
330 // The server certificate is verified after the handshake in DoVerifyCert.
Steven Valdez3eaa9962017-07-18 21:51:05331 SSL_CTX_set_custom_verify(ssl_ctx_.get(), SSL_VERIFY_PEER,
332 CertVerifyCallback);
davidbendafe4e52015-04-08 22:53:52333
334 // Disable the internal session cache. Session caching is handled
svaldeze83af292016-04-26 14:33:37335 // externally (i.e. by SSLClientSessionCache).
davidbendafe4e52015-04-08 22:53:52336 SSL_CTX_set_session_cache_mode(
337 ssl_ctx_.get(), SSL_SESS_CACHE_CLIENT | SSL_SESS_CACHE_NO_INTERNAL);
davidben44aeae62015-06-24 20:47:43338 SSL_CTX_sess_set_new_cb(ssl_ctx_.get(), NewSessionCallback);
davidben99ce6302016-11-09 17:30:28339 SSL_CTX_set_timeout(ssl_ctx_.get(), 1 * 60 * 60 /* one hour */);
nharper736ceda2015-11-07 00:16:59340
davidbenfacfac7b2016-09-27 22:39:53341 SSL_CTX_set_grease_enabled(ssl_ctx_.get(), 1);
342
davidbenbf0fcf12017-02-10 21:00:34343 // Deduplicate all certificates minted from the SSL_CTX in memory.
344 SSL_CTX_set0_buffer_pool(ssl_ctx_.get(), x509_util::GetBufferPool());
345
David Benjamin7a8e4dfa2018-06-12 23:07:21346 SSL_CTX_set_info_callback(ssl_ctx_.get(), InfoCallback);
davidbencef9e212017-04-19 15:00:10347 SSL_CTX_set_msg_callback(ssl_ctx_.get(), MessageCallback);
Adam Langley93cbfad12018-07-06 22:07:16348
349#if !defined(NET_DISABLE_BROTLI)
350 SSL_CTX_add_cert_compression_alg(
351 ssl_ctx_.get(), TLSEXT_cert_compression_brotli,
352 nullptr /* compression not supported */, DecompressBrotliCert);
353#endif
[email protected]fbef13932010-11-23 12:38:53354 }
355
[email protected]82c59022014-08-15 09:38:27356 static int ClientCertRequestCallback(SSL* ssl, void* arg) {
svaldeze83af292016-04-26 14:33:37357 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
[email protected]82c59022014-08-15 09:38:27358 DCHECK(socket);
359 return socket->ClientCertRequestCallback(ssl);
[email protected]718c9672010-12-02 10:04:10360 }
361
Steven Valdez3eaa9962017-07-18 21:51:05362 static ssl_verify_result_t CertVerifyCallback(SSL* ssl, uint8_t* out_alert) {
363 // The certificate is verified after the handshake in DoVerifyCert.
364 return ssl_verify_ok;
365 }
366
davidben44aeae62015-06-24 20:47:43367 static int NewSessionCallback(SSL* ssl, SSL_SESSION* session) {
svaldeze83af292016-04-26 14:33:37368 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
davidben44aeae62015-06-24 20:47:43369 return socket->NewSessionCallback(session);
davidbendafe4e52015-04-08 22:53:52370 }
371
David Benjaminb9bafbe2017-11-07 21:41:38372 static ssl_private_key_result_t PrivateKeySignCallback(SSL* ssl,
373 uint8_t* out,
374 size_t* out_len,
375 size_t max_out,
376 uint16_t algorithm,
377 const uint8_t* in,
378 size_t in_len) {
svaldeze83af292016-04-26 14:33:37379 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
David Benjaminb9bafbe2017-11-07 21:41:38380 return socket->PrivateKeySignCallback(out, out_len, max_out, algorithm, in,
381 in_len);
davidben0bca07fd2016-07-18 15:12:03382 }
383
384 static ssl_private_key_result_t PrivateKeyCompleteCallback(SSL* ssl,
385 uint8_t* out,
386 size_t* out_len,
387 size_t max_out) {
388 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
389 return socket->PrivateKeyCompleteCallback(out, out_len, max_out);
davidben1d489522015-07-01 18:48:46390 }
391
davidben2a811e4e2015-12-01 10:49:34392 static void KeyLogCallback(const SSL* ssl, const char* line) {
393 GetInstance()->ssl_key_logger_->WriteLine(line);
394 }
davidben2a811e4e2015-12-01 10:49:34395
David Benjamin7a8e4dfa2018-06-12 23:07:21396 static void InfoCallback(const SSL* ssl, int type, int value) {
397 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
398 socket->InfoCallback(type, value);
399 }
400
davidbencef9e212017-04-19 15:00:10401 static void MessageCallback(int is_write,
402 int version,
403 int content_type,
404 const void* buf,
405 size_t len,
406 SSL* ssl,
407 void* arg) {
408 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
409 return socket->MessageCallback(is_write, content_type, buf, len);
410 }
411
[email protected]fbef13932010-11-23 12:38:53412 // This is the index used with SSL_get_ex_data to retrieve the owner
svaldeze83af292016-04-26 14:33:37413 // SSLClientSocketImpl object from an SSL instance.
[email protected]fbef13932010-11-23 12:38:53414 int ssl_socket_data_index_;
415
davidbend80c12c2016-10-11 00:13:49416 bssl::UniquePtr<SSL_CTX> ssl_ctx_;
davidbendafe4e52015-04-08 22:53:52417
danakj655b66c2016-04-16 00:51:38418 std::unique_ptr<SSLKeyLogger> ssl_key_logger_;
davidben2a811e4e2015-12-01 10:49:34419
davidbendafe4e52015-04-08 22:53:52420 // TODO(davidben): Use a separate cache per URLRequestContext.
421 // https://crbug.com/458365
422 //
423 // TODO(davidben): Sessions should be invalidated on fatal
424 // alerts. https://crbug.com/466352
svaldeze83af292016-04-26 14:33:37425 SSLClientSessionCache session_cache_;
[email protected]1279de12013-12-03 15:13:32426};
427
davidben1d489522015-07-01 18:48:46428const SSL_PRIVATE_KEY_METHOD
svaldeze83af292016-04-26 14:33:37429 SSLClientSocketImpl::SSLContext::kPrivateKeyMethod = {
David Benjaminb9bafbe2017-11-07 21:41:38430 &SSLClientSocketImpl::SSLContext::PrivateKeySignCallback,
davidben0bca07fd2016-07-18 15:12:03431 nullptr /* decrypt */,
432 &SSLClientSocketImpl::SSLContext::PrivateKeyCompleteCallback,
davidben1d489522015-07-01 18:48:46433};
434
[email protected]1279de12013-12-03 15:13:32435// static
[email protected]c3456bb2011-12-12 22:22:19436void SSLClientSocket::ClearSessionCache() {
svaldeze83af292016-04-26 14:33:37437 SSLClientSocketImpl::SSLContext* context =
438 SSLClientSocketImpl::SSLContext::GetInstance();
[email protected]c3456bb2011-12-12 22:22:19439 context->session_cache()->Flush();
440}
441
svaldeze83af292016-04-26 14:33:37442SSLClientSocketImpl::SSLClientSocketImpl(
danakj655b66c2016-04-16 00:51:38443 std::unique_ptr<ClientSocketHandle> transport_socket,
[email protected]055d7f22010-11-15 12:03:12444 const HostPortPair& host_and_port,
[email protected]822581d2010-12-16 17:27:15445 const SSLConfig& ssl_config,
[email protected]feb79bcd2011-07-21 16:55:17446 const SSLClientSocketContext& context)
Oscar Johanssond49464e2018-07-02 09:35:45447 : pending_read_error_(kSSLClientSocketNoPendingResult),
davidbenb8c23212014-10-28 00:12:16448 pending_read_ssl_error_(SSL_ERROR_NONE),
[email protected]64b5c892014-08-08 09:39:26449 completed_connect_(false),
[email protected]0dc88b32014-03-26 20:12:28450 was_ever_used_(false),
[email protected]feb79bcd2011-07-21 16:55:17451 cert_verifier_(context.cert_verifier),
davidbeneb5f8ef32014-09-04 14:14:32452 cert_transparency_verifier_(context.cert_transparency_verifier),
[email protected]6b8a3c742014-07-25 00:25:35453 channel_id_service_(context.channel_id_service),
dchengc7eeda422015-12-26 03:56:48454 transport_(std::move(transport_socket)),
[email protected]055d7f22010-11-15 12:03:12455 host_and_port_(host_and_port),
[email protected]d518cd92010-09-29 12:27:44456 ssl_config_(ssl_config),
[email protected]c3456bb2011-12-12 22:22:19457 ssl_session_cache_shard_(context.ssl_session_cache_shard),
[email protected]013c17c2012-01-21 19:09:01458 next_handshake_state_(STATE_NONE),
Steven Valdez6af02df2018-07-15 21:52:33459 in_confirm_handshake_(false),
svaldez4af14d22015-08-20 13:48:24460 disconnected_(false),
bnc3cf2a592016-08-11 14:48:36461 negotiated_protocol_(kProtoUnknown),
davidben52053b382015-04-27 19:22:29462 channel_id_sent_(false),
davidbendafe4e52015-04-08 22:53:52463 certificate_verified_(false),
davidbenfe132d92016-09-27 18:07:21464 certificate_requested_(false),
Oscar Johanssond49464e2018-07-02 09:35:45465 signature_result_(kSSLClientSocketNoPendingResult),
[email protected]8bd4e7a2014-08-09 14:49:17466 transport_security_state_(context.transport_security_state),
estark6f9b3d82016-01-12 21:37:05467 policy_enforcer_(context.ct_policy_enforcer),
dadriandf302c42016-06-10 18:48:59468 pkp_bypassed_(false),
Carlos IL81133382017-12-06 17:18:45469 is_fatal_cert_error_(false),
kulkarni.acd7b4462014-08-28 07:41:34470 net_log_(transport_->socket()->NetLog()),
471 weak_factory_(this) {
rsleevibe81cd62016-06-24 01:38:59472 CHECK(cert_verifier_);
473 CHECK(transport_security_state_);
474 CHECK(cert_transparency_verifier_);
475 CHECK(policy_enforcer_);
[email protected]8e458552014-08-05 00:02:15476}
[email protected]d518cd92010-09-29 12:27:44477
svaldeze83af292016-04-26 14:33:37478SSLClientSocketImpl::~SSLClientSocketImpl() {
[email protected]d518cd92010-09-29 12:27:44479 Disconnect();
480}
481
David Benjaminbd37c172018-07-11 17:24:57482void SSLClientSocketImpl::SetSSLKeyLogger(
483 std::unique_ptr<SSLKeyLogger> logger) {
484 SSLContext::GetInstance()->SetSSLKeyLogger(std::move(logger));
zhongyi81f85c6d92015-10-16 19:34:14485}
486
svaldeze83af292016-04-26 14:33:37487int SSLClientSocketImpl::ExportKeyingMaterial(const base::StringPiece& label,
488 bool has_context,
489 const base::StringPiece& context,
490 unsigned char* out,
491 unsigned int outlen) {
davidben86935f72015-05-06 22:24:49492 if (!IsConnected())
493 return ERR_SOCKET_NOT_CONNECTED;
494
[email protected]b9b651f2013-11-09 04:32:22495 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
496
davidbenf225b262016-09-15 22:09:22497 if (!SSL_export_keying_material(
davidbend80c12c2016-10-11 00:13:49498 ssl_.get(), out, outlen, label.data(), label.size(),
davidbenf225b262016-09-15 22:09:22499 reinterpret_cast<const unsigned char*>(context.data()),
500 context.length(), has_context ? 1 : 0)) {
501 LOG(ERROR) << "Failed to export keying material.";
502 return ERR_FAILED;
[email protected]b9b651f2013-11-09 04:32:22503 }
davidbenf225b262016-09-15 22:09:22504
[email protected]b9b651f2013-11-09 04:32:22505 return OK;
506}
507
Brad Lassey3a814172018-04-26 03:30:21508int SSLClientSocketImpl::Connect(CompletionOnceCallback callback) {
svaldez4af14d22015-08-20 13:48:24509 // Although StreamSocket does allow calling Connect() after Disconnect(),
510 // this has never worked for layered sockets. CHECK to detect any consumers
511 // reconnecting an SSL socket.
512 //
513 // TODO(davidben,mmenke): Remove this API feature. See
514 // https://crbug.com/499289.
515 CHECK(!disconnected_);
516
mikecirone8b85c432016-09-08 19:11:00517 net_log_.BeginEvent(NetLogEventType::SSL_CONNECT);
[email protected]b9b651f2013-11-09 04:32:22518
519 // Set up new ssl object.
[email protected]c8a80e92014-05-17 16:02:08520 int rv = Init();
521 if (rv != OK) {
davidben281d13f02016-04-27 20:43:28522 LogConnectEndEvent(rv);
[email protected]c8a80e92014-05-17 16:02:08523 return rv;
[email protected]b9b651f2013-11-09 04:32:22524 }
525
526 // Set SSL to client mode. Handshake happens in the loop below.
davidbend80c12c2016-10-11 00:13:49527 SSL_set_connect_state(ssl_.get());
[email protected]b9b651f2013-11-09 04:32:22528
rsleeviadbd4982016-06-13 22:10:27529 next_handshake_state_ = STATE_HANDSHAKE;
[email protected]c8a80e92014-05-17 16:02:08530 rv = DoHandshakeLoop(OK);
[email protected]b9b651f2013-11-09 04:32:22531 if (rv == ERR_IO_PENDING) {
Brad Lassey3a814172018-04-26 03:30:21532 user_connect_callback_ = std::move(callback);
[email protected]b9b651f2013-11-09 04:32:22533 } else {
davidben281d13f02016-04-27 20:43:28534 LogConnectEndEvent(rv);
[email protected]b9b651f2013-11-09 04:32:22535 }
536
537 return rv > OK ? OK : rv;
538}
539
svaldeze83af292016-04-26 14:33:37540void SSLClientSocketImpl::Disconnect() {
svaldez4af14d22015-08-20 13:48:24541 disconnected_ = true;
542
[email protected]b9b651f2013-11-09 04:32:22543 // Shut down anything that may call us back.
eroman7f9236a2015-05-11 21:23:43544 cert_verifier_request_.reset();
davidben67e83912016-10-12 18:36:32545 channel_id_request_.Cancel();
546 weak_factory_.InvalidateWeakPtrs();
davidben3418e81f2016-10-19 00:09:45547 transport_adapter_.reset();
[email protected]b9b651f2013-11-09 04:32:22548
davidben67e83912016-10-12 18:36:32549 // Release user callbacks.
[email protected]b9b651f2013-11-09 04:32:22550 user_connect_callback_.Reset();
551 user_read_callback_.Reset();
552 user_write_callback_.Reset();
svaldeze83af292016-04-26 14:33:37553 user_read_buf_ = NULL;
554 user_read_buf_len_ = 0;
555 user_write_buf_ = NULL;
556 user_write_buf_len_ = 0;
[email protected]b9b651f2013-11-09 04:32:22557
davidben67e83912016-10-12 18:36:32558 transport_->socket()->Disconnect();
[email protected]b9b651f2013-11-09 04:32:22559}
560
Steven Valdez6af02df2018-07-15 21:52:33561// ConfirmHandshake may only be called on a connected socket and, like other
562// socket methods, there may only be one ConfirmHandshake operation in progress
563// at once.
564int SSLClientSocketImpl::ConfirmHandshake(CompletionOnceCallback callback) {
565 CHECK(completed_connect_);
566 CHECK(!in_confirm_handshake_);
567 if (!SSL_in_early_data(ssl_.get())) {
568 return OK;
569 }
570
571 net_log_.BeginEvent(NetLogEventType::SSL_CONFIRM_HANDSHAKE);
572 next_handshake_state_ = STATE_HANDSHAKE;
573 in_confirm_handshake_ = true;
574 int rv = DoHandshakeLoop(OK);
575 if (rv == ERR_IO_PENDING) {
576 user_connect_callback_ = std::move(callback);
577 } else {
578 net_log_.EndEvent(NetLogEventType::SSL_CONFIRM_HANDSHAKE);
579 in_confirm_handshake_ = false;
580 }
581
582 return rv > OK ? OK : rv;
583}
584
svaldeze83af292016-04-26 14:33:37585bool SSLClientSocketImpl::IsConnected() const {
davidben67e83912016-10-12 18:36:32586 // If the handshake has not yet completed or the socket has been explicitly
587 // disconnected.
588 if (!completed_connect_ || disconnected_)
[email protected]b9b651f2013-11-09 04:32:22589 return false;
590 // If an asynchronous operation is still pending.
591 if (user_read_buf_.get() || user_write_buf_.get())
592 return true;
593
594 return transport_->socket()->IsConnected();
595}
596
svaldeze83af292016-04-26 14:33:37597bool SSLClientSocketImpl::IsConnectedAndIdle() const {
davidben67e83912016-10-12 18:36:32598 // If the handshake has not yet completed or the socket has been explicitly
599 // disconnected.
600 if (!completed_connect_ || disconnected_)
[email protected]b9b651f2013-11-09 04:32:22601 return false;
602 // If an asynchronous operation is still pending.
603 if (user_read_buf_.get() || user_write_buf_.get())
604 return false;
davidbenfc9a6b82015-04-15 23:47:32605
606 // If there is data read from the network that has not yet been consumed, do
607 // not treat the connection as idle.
608 //
davidben3418e81f2016-10-19 00:09:45609 // Note that this does not check whether there is ciphertext that has not yet
610 // been flushed to the network. |Write| returns early, so this can cause race
611 // conditions which cause a socket to not be treated reusable when it should
612 // be. See https://crbug.com/466147.
613 if (transport_adapter_->HasPendingReadData())
[email protected]b9b651f2013-11-09 04:32:22614 return false;
[email protected]b9b651f2013-11-09 04:32:22615
616 return transport_->socket()->IsConnectedAndIdle();
617}
618
svaldeze83af292016-04-26 14:33:37619int SSLClientSocketImpl::GetPeerAddress(IPEndPoint* addressList) const {
[email protected]b9b651f2013-11-09 04:32:22620 return transport_->socket()->GetPeerAddress(addressList);
621}
622
svaldeze83af292016-04-26 14:33:37623int SSLClientSocketImpl::GetLocalAddress(IPEndPoint* addressList) const {
[email protected]b9b651f2013-11-09 04:32:22624 return transport_->socket()->GetLocalAddress(addressList);
625}
626
tfarina42834112016-09-22 13:38:20627const NetLogWithSource& SSLClientSocketImpl::NetLog() const {
[email protected]b9b651f2013-11-09 04:32:22628 return net_log_;
629}
630
svaldeze83af292016-04-26 14:33:37631bool SSLClientSocketImpl::WasEverUsed() const {
[email protected]0dc88b32014-03-26 20:12:28632 return was_ever_used_;
[email protected]b9b651f2013-11-09 04:32:22633}
634
tfarina2846404c2016-12-25 14:31:37635bool SSLClientSocketImpl::WasAlpnNegotiated() const {
bnc3cf2a592016-08-11 14:48:36636 return negotiated_protocol_ != kProtoUnknown;
637}
638
639NextProto SSLClientSocketImpl::GetNegotiatedProtocol() const {
640 return negotiated_protocol_;
641}
642
svaldeze83af292016-04-26 14:33:37643bool SSLClientSocketImpl::GetSSLInfo(SSLInfo* ssl_info) {
[email protected]b9b651f2013-11-09 04:32:22644 ssl_info->Reset();
davidbenc7e06c92017-03-07 18:54:11645 if (!server_cert_)
[email protected]b9b651f2013-11-09 04:32:22646 return false;
647
648 ssl_info->cert = server_cert_verify_result_.verified_cert;
estark03d644f2015-06-13 00:11:32649 ssl_info->unverified_cert = server_cert_;
[email protected]b9b651f2013-11-09 04:32:22650 ssl_info->cert_status = server_cert_verify_result_.cert_status;
651 ssl_info->is_issued_by_known_root =
652 server_cert_verify_result_.is_issued_by_known_root;
dadriandf302c42016-06-10 18:48:59653 ssl_info->pkp_bypassed = pkp_bypassed_;
svaldeze83af292016-04-26 14:33:37654 ssl_info->public_key_hashes = server_cert_verify_result_.public_key_hashes;
[email protected]b9b651f2013-11-09 04:32:22655 ssl_info->client_cert_sent =
656 ssl_config_.send_client_cert && ssl_config_.client_cert.get();
davidben52053b382015-04-27 19:22:29657 ssl_info->channel_id_sent = channel_id_sent_;
[email protected]8bd4e7a2014-08-09 14:49:17658 ssl_info->pinning_failure_log = pinning_failure_log_;
dadrian612337a2016-07-20 22:36:58659 ssl_info->ocsp_result = server_cert_verify_result_.ocsp_result;
Carlos IL81133382017-12-06 17:18:45660 ssl_info->is_fatal_cert_error = is_fatal_cert_error_;
estark723b5eeb2016-02-18 21:01:12661 AddCTInfoToSSLInfo(ssl_info);
davidbeneb5f8ef32014-09-04 14:14:32662
davidbend80c12c2016-10-11 00:13:49663 const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_.get());
[email protected]b9b651f2013-11-09 04:32:22664 CHECK(cipher);
665 ssl_info->security_bits = SSL_CIPHER_get_bits(cipher, NULL);
davidben3b00e402016-09-20 14:31:06666 // Historically, the "group" was known as "curve".
davidbend80c12c2016-10-11 00:13:49667 ssl_info->key_exchange_group = SSL_get_curve_id(ssl_.get());
[email protected]b9b651f2013-11-09 04:32:22668
ryanchung987b2ff2016-02-19 00:17:12669 SSLConnectionStatusSetCipherSuite(
670 static_cast<uint16_t>(SSL_CIPHER_get_id(cipher)),
671 &ssl_info->connection_status);
davidbend80c12c2016-10-11 00:13:49672 SSLConnectionStatusSetVersion(GetNetSSLVersion(ssl_.get()),
ryanchung987b2ff2016-02-19 00:17:12673 &ssl_info->connection_status);
[email protected]b9b651f2013-11-09 04:32:22674
davidbend80c12c2016-10-11 00:13:49675 ssl_info->handshake_type = SSL_session_reused(ssl_.get())
svaldeze83af292016-04-26 14:33:37676 ? SSLInfo::HANDSHAKE_RESUME
677 : SSLInfo::HANDSHAKE_FULL;
[email protected]b9b651f2013-11-09 04:32:22678
[email protected]b9b651f2013-11-09 04:32:22679 return true;
680}
681
svaldeze83af292016-04-26 14:33:37682void SSLClientSocketImpl::GetConnectionAttempts(ConnectionAttempts* out) const {
ttuttle23fdb7b2015-05-15 01:28:03683 out->clear();
684}
685
svaldeze83af292016-04-26 14:33:37686int64_t SSLClientSocketImpl::GetTotalReceivedBytes() const {
tbansalf82cc8e2015-10-14 20:05:49687 return transport_->socket()->GetTotalReceivedBytes();
688}
689
xunjieli998d2472017-01-12 01:12:28690void SSLClientSocketImpl::DumpMemoryStats(SocketMemoryStats* stats) const {
691 if (transport_adapter_)
692 stats->buffer_size = transport_adapter_->GetAllocationSize();
davidbena35b40c32017-03-09 17:33:45693 const STACK_OF(CRYPTO_BUFFER)* server_cert_chain =
694 SSL_get0_peer_certificates(ssl_.get());
davidbenc7e06c92017-03-07 18:54:11695 if (server_cert_chain) {
David Benjamin8a4bc32b2018-03-30 15:24:53696 for (const CRYPTO_BUFFER* cert : server_cert_chain) {
davidbena35b40c32017-03-09 17:33:45697 stats->cert_size += CRYPTO_BUFFER_len(cert);
xunjieli9f8c5fb52016-12-07 22:59:33698 }
davidbena35b40c32017-03-09 17:33:45699 stats->cert_count = sk_CRYPTO_BUFFER_num(server_cert_chain);
xunjieli9f8c5fb52016-12-07 22:59:33700 }
xunjieliffe62df62017-02-23 18:22:41701 stats->total_size = stats->buffer_size + stats->cert_size;
xunjieli9f8c5fb52016-12-07 22:59:33702}
703
Bence Békydae8af5f2018-04-13 08:53:17704void SSLClientSocketImpl::GetSSLCertRequestInfo(
705 SSLCertRequestInfo* cert_request_info) const {
706 if (!ssl_) {
707 NOTREACHED();
708 return;
709 }
710
711 cert_request_info->host_and_port = host_and_port_;
712
713 cert_request_info->cert_authorities.clear();
714 const STACK_OF(CRYPTO_BUFFER)* authorities =
715 SSL_get0_server_requested_CAs(ssl_.get());
716 for (const CRYPTO_BUFFER* ca_name : authorities) {
717 cert_request_info->cert_authorities.push_back(
718 std::string(reinterpret_cast<const char*>(CRYPTO_BUFFER_data(ca_name)),
719 CRYPTO_BUFFER_len(ca_name)));
720 }
721
722 cert_request_info->cert_key_types.clear();
723 const uint8_t* client_cert_types;
724 size_t num_client_cert_types =
725 SSL_get0_certificate_types(ssl_.get(), &client_cert_types);
726 for (size_t i = 0; i < num_client_cert_types; i++) {
727 cert_request_info->cert_key_types.push_back(
728 static_cast<SSLClientCertType>(client_cert_types[i]));
729 }
730}
731
732ChannelIDService* SSLClientSocketImpl::GetChannelIDService() const {
733 return channel_id_service_;
734}
735
Bence Békydae8af5f2018-04-13 08:53:17736crypto::ECPrivateKey* SSLClientSocketImpl::GetChannelIDKey() const {
737 return channel_id_key_.get();
738}
739
Paul Jensen0f49dec2017-12-12 23:39:58740void SSLClientSocketImpl::ApplySocketTag(const SocketTag& tag) {
741 return transport_->socket()->ApplySocketTag(tag);
742}
743
xunjieli9f8c5fb52016-12-07 22:59:33744// static
745void SSLClientSocketImpl::DumpSSLClientSessionMemoryStats(
746 base::trace_event::ProcessMemoryDump* pmd) {
747 SSLContext::GetInstance()->session_cache()->DumpMemoryStats(pmd);
748}
749
svaldeze83af292016-04-26 14:33:37750int SSLClientSocketImpl::Read(IOBuffer* buf,
751 int buf_len,
Brad Lassey3a814172018-04-26 03:30:21752 CompletionOnceCallback callback) {
753 int rv = ReadIfReady(buf, buf_len, std::move(callback));
xunjieli321a96f32017-03-07 19:42:17754 if (rv == ERR_IO_PENDING) {
755 user_read_buf_ = buf;
756 user_read_buf_len_ = buf_len;
757 }
758 return rv;
759}
[email protected]b9b651f2013-11-09 04:32:22760
xunjieli321a96f32017-03-07 19:42:17761int SSLClientSocketImpl::ReadIfReady(IOBuffer* buf,
762 int buf_len,
Brad Lassey3a814172018-04-26 03:30:21763 CompletionOnceCallback callback) {
xunjieli321a96f32017-03-07 19:42:17764 int rv = DoPayloadRead(buf, buf_len);
[email protected]b9b651f2013-11-09 04:32:22765
766 if (rv == ERR_IO_PENDING) {
Brad Lassey3a814172018-04-26 03:30:21767 user_read_callback_ = std::move(callback);
[email protected]b9b651f2013-11-09 04:32:22768 } else {
[email protected]0dc88b32014-03-26 20:12:28769 if (rv > 0)
770 was_ever_used_ = true;
[email protected]b9b651f2013-11-09 04:32:22771 }
[email protected]b9b651f2013-11-09 04:32:22772 return rv;
773}
774
Helen Li5f3d96a2018-08-10 20:37:24775int SSLClientSocketImpl::CancelReadIfReady() {
776 int result = transport_->socket()->CancelReadIfReady();
777 // Cancel |user_read_callback_|, because caller does not expect the callback
778 // to be invoked after they have canceled the ReadIfReady.
779 user_read_callback_.Reset();
780 return result;
781}
782
[email protected]a2b2cfc2017-12-06 09:06:08783int SSLClientSocketImpl::Write(
784 IOBuffer* buf,
785 int buf_len,
Brad Lassey3a814172018-04-26 03:30:21786 CompletionOnceCallback callback,
[email protected]a2b2cfc2017-12-06 09:06:08787 const NetworkTrafficAnnotationTag& traffic_annotation) {
[email protected]b9b651f2013-11-09 04:32:22788 user_write_buf_ = buf;
789 user_write_buf_len_ = buf_len;
790
davidben3418e81f2016-10-19 00:09:45791 int rv = DoPayloadWrite();
[email protected]b9b651f2013-11-09 04:32:22792
793 if (rv == ERR_IO_PENDING) {
Brad Lassey3a814172018-04-26 03:30:21794 user_write_callback_ = std::move(callback);
[email protected]b9b651f2013-11-09 04:32:22795 } else {
[email protected]0dc88b32014-03-26 20:12:28796 if (rv > 0)
797 was_ever_used_ = true;
[email protected]b9b651f2013-11-09 04:32:22798 user_write_buf_ = NULL;
799 user_write_buf_len_ = 0;
800 }
801
802 return rv;
803}
804
svaldeze83af292016-04-26 14:33:37805int SSLClientSocketImpl::SetReceiveBufferSize(int32_t size) {
[email protected]b9b651f2013-11-09 04:32:22806 return transport_->socket()->SetReceiveBufferSize(size);
807}
808
svaldeze83af292016-04-26 14:33:37809int SSLClientSocketImpl::SetSendBufferSize(int32_t size) {
[email protected]b9b651f2013-11-09 04:32:22810 return transport_->socket()->SetSendBufferSize(size);
811}
812
davidben3418e81f2016-10-19 00:09:45813void SSLClientSocketImpl::OnReadReady() {
814 // During a renegotiation, either Read or Write calls may be blocked on a
815 // transport read.
816 RetryAllOperations();
817}
818
819void SSLClientSocketImpl::OnWriteReady() {
820 // During a renegotiation, either Read or Write calls may be blocked on a
821 // transport read.
822 RetryAllOperations();
823}
824
svaldeze83af292016-04-26 14:33:37825int SSLClientSocketImpl::Init() {
[email protected]9e733f32010-10-04 18:19:08826 DCHECK(!ssl_);
[email protected]9e733f32010-10-04 18:19:08827
[email protected]b29af7d2010-12-14 11:52:47828 SSLContext* context = SSLContext::GetInstance();
[email protected]4b559b4d2011-04-14 17:37:14829 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
[email protected]d518cd92010-09-29 12:27:44830
davidbend80c12c2016-10-11 00:13:49831 ssl_.reset(SSL_new(context->ssl_ctx()));
832 if (!ssl_ || !context->SetClientSocketForSSL(ssl_.get(), this))
[email protected]c8a80e92014-05-17 16:02:08833 return ERR_UNEXPECTED;
[email protected]fbef13932010-11-23 12:38:53834
davidben9bc0466f2015-06-16 22:21:27835 // SNI should only contain valid DNS hostnames, not IP addresses (see RFC
836 // 6066, Section 3).
837 //
838 // TODO(rsleevi): Should this code allow hostnames that violate the LDH rule?
839 // See https://crbug.com/496472 and https://crbug.com/496468 for discussion.
martijna2e83bd2016-03-18 13:10:45840 IPAddress unused;
841 if (!unused.AssignFromIPLiteral(host_and_port_.host()) &&
davidbend80c12c2016-10-11 00:13:49842 !SSL_set_tlsext_host_name(ssl_.get(), host_and_port_.host().c_str())) {
[email protected]c8a80e92014-05-17 16:02:08843 return ERR_UNEXPECTED;
davidben9bc0466f2015-06-16 22:21:27844 }
[email protected]fbef13932010-11-23 12:38:53845
David Benjaminb3840f42017-08-03 15:50:16846 if (!ssl_session_cache_shard_.empty()) {
Steven Valdeze6112f42017-10-05 22:20:12847 bssl::UniquePtr<SSL_SESSION> session =
848 context->session_cache()->Lookup(GetSessionCacheKey());
David Benjaminb3840f42017-08-03 15:50:16849 if (session)
850 SSL_set_session(ssl_.get(), session.get());
851 }
[email protected]d518cd92010-09-29 12:27:44852
Helen Lif3aa9622018-05-24 00:18:07853 transport_adapter_.reset(
854 new SocketBIOAdapter(transport_->socket(), kDefaultOpenSSLBufferSize,
855 kDefaultOpenSSLBufferSize, this));
davidben3418e81f2016-10-19 00:09:45856 BIO* transport_bio = transport_adapter_->bio();
mmenke1beda3d2016-07-22 03:33:45857
davidben3418e81f2016-10-19 00:09:45858 BIO_up_ref(transport_bio); // SSL_set0_rbio takes ownership.
859 SSL_set0_rbio(ssl_.get(), transport_bio);
haavardm2d92e722014-12-19 13:45:44860
davidben3418e81f2016-10-19 00:09:45861 BIO_up_ref(transport_bio); // SSL_set0_wbio takes ownership.
862 SSL_set0_wbio(ssl_.get(), transport_bio);
[email protected]d518cd92010-09-29 12:27:44863
davidbenb937d6c2015-05-14 04:53:42864 DCHECK_LT(SSL3_VERSION, ssl_config_.version_min);
865 DCHECK_LT(SSL3_VERSION, ssl_config_.version_max);
davidbend80c12c2016-10-11 00:13:49866 if (!SSL_set_min_proto_version(ssl_.get(), ssl_config_.version_min) ||
867 !SSL_set_max_proto_version(ssl_.get(), ssl_config_.version_max)) {
davidben952bdf22016-09-21 23:42:16868 return ERR_UNEXPECTED;
869 }
davidbenb937d6c2015-05-14 04:53:42870
Steven Valdez6af02df2018-07-15 21:52:33871 SSL_set_early_data_enabled(ssl_.get(), ssl_config_.early_data_enabled);
872
Steven Valdez4584b2482017-07-14 01:11:57873 switch (ssl_config_.tls13_variant) {
Steven Valdez781157b2018-01-11 13:32:04874 case kTLS13VariantDraft23:
David Benjamin50cf7b42018-05-14 20:03:52875 SSL_set_tls13_variant(ssl_.get(), tls13_draft23);
Steven Valdez4584b2482017-07-14 01:11:57876 break;
Steven Valdezf27cb7f2018-08-21 18:34:33877 case kTLS13VariantFinal:
878 SSL_set_tls13_variant(ssl_.get(), tls13_rfc);
879 break;
Steven Valdez4584b2482017-07-14 01:11:57880 }
881
David Benjamin570460e2018-10-16 06:01:29882 if (!base::FeatureList::IsEnabled(features::kEnforceTLS13Downgrade)) {
883 SSL_set_ignore_tls13_downgrade(ssl_.get(), 1);
884 }
885
[email protected]9e733f32010-10-04 18:19:08886 // OpenSSL defaults some options to on, others to off. To avoid ambiguity,
887 // set everything we care about to an absolute value.
[email protected]fb10e2282010-12-01 17:08:48888 SslSetClearMask options;
[email protected]d0f00492012-08-03 22:35:13889 options.ConfigureFlag(SSL_OP_NO_COMPRESSION, true);
[email protected]9e733f32010-10-04 18:19:08890
891 // TODO(joth): Set this conditionally, see http://crbug.com/55410
[email protected]fb10e2282010-12-01 17:08:48892 options.ConfigureFlag(SSL_OP_LEGACY_SERVER_CONNECT, true);
[email protected]9e733f32010-10-04 18:19:08893
davidbend80c12c2016-10-11 00:13:49894 SSL_set_options(ssl_.get(), options.set_mask);
895 SSL_clear_options(ssl_.get(), options.clear_mask);
[email protected]9e733f32010-10-04 18:19:08896
[email protected]fb10e2282010-12-01 17:08:48897 // Same as above, this time for the SSL mode.
898 SslSetClearMask mode;
[email protected]9e733f32010-10-04 18:19:08899
[email protected]fb10e2282010-12-01 17:08:48900 mode.ConfigureFlag(SSL_MODE_RELEASE_BUFFERS, true);
ishermane5c05e12014-09-09 20:32:15901 mode.ConfigureFlag(SSL_MODE_CBC_RECORD_SPLITTING, true);
[email protected]fb10e2282010-12-01 17:08:48902
davidben818d93b2015-02-19 22:27:32903 mode.ConfigureFlag(SSL_MODE_ENABLE_FALSE_START,
[email protected]b788de02014-04-23 18:06:07904 ssl_config_.false_start_enabled);
905
davidbend80c12c2016-10-11 00:13:49906 SSL_set_mode(ssl_.get(), mode.set_mask);
907 SSL_clear_mode(ssl_.get(), mode.clear_mask);
[email protected]109805a2010-12-07 18:17:06908
Steven Valdez99a85a62018-05-03 18:13:45909 // Use BoringSSL defaults, but disable HMAC-SHA1 ciphers in ECDSA. These are
910 // the remaining CBC-mode ECDSA ciphers.
911 std::string command("ALL::!aPSK:!ECDSA+SHA1");
davidben9b4a9b9c2015-10-12 18:46:51912
913 if (ssl_config_.require_ecdhe)
davidben1863716b2017-05-03 20:06:20914 command.append(":!kRSA");
davidben8ecc3072014-09-03 23:19:09915
davidben9b4a9b9c2015-10-12 18:46:51916 // Remove any disabled ciphers.
917 for (uint16_t id : ssl_config_.disabled_cipher_suites) {
918 const SSL_CIPHER* cipher = SSL_get_cipher_by_value(id);
919 if (cipher) {
920 command.append(":!");
921 command.append(SSL_CIPHER_get_name(cipher));
922 }
923 }
924
davidben1863716b2017-05-03 20:06:20925 if (!SSL_set_strict_cipher_list(ssl_.get(), command.c_str())) {
926 LOG(ERROR) << "SSL_set_cipher_list('" << command << "') failed";
927 return ERR_UNEXPECTED;
928 }
[email protected]ee0f2aa82013-10-25 11:59:26929
930 // TLS channel ids.
bnc3cf2a592016-08-11 14:48:36931 if (IsChannelIDEnabled()) {
davidbend80c12c2016-10-11 00:13:49932 SSL_enable_tls_channel_id(ssl_.get());
[email protected]ee0f2aa82013-10-25 11:59:26933 }
934
bnc1f295372015-10-21 23:24:22935 if (!ssl_config_.alpn_protos.empty()) {
bnc988e68d2016-06-27 14:03:21936 std::vector<uint8_t> wire_protos =
937 SerializeNextProtos(ssl_config_.alpn_protos);
davidbend80c12c2016-10-11 00:13:49938 SSL_set_alpn_protos(ssl_.get(),
939 wire_protos.empty() ? NULL : &wire_protos[0],
[email protected]abc44b752014-07-30 03:52:15940 wire_protos.size());
941 }
942
Ryan Sleevid1a894e2018-04-03 20:24:07943 SSL_enable_signed_cert_timestamps(ssl_.get());
944 SSL_enable_ocsp_stapling(ssl_.get());
davidbeneb5f8ef32014-09-04 14:14:32945
davidben971a681a2017-02-16 18:57:46946 // Configure BoringSSL to allow renegotiations. Once the initial handshake
947 // completes, if renegotiations are not allowed, the default reject value will
948 // be restored. This is done in this order to permit a BoringSSL
949 // optimization. See https://crbug.com/boringssl/123.
950 SSL_set_renegotiate_mode(ssl_.get(), ssl_renegotiate_freely);
951
David Benjamin8373dea2018-05-07 15:39:10952 SSL_set_shed_handshake_config(ssl_.get(), 1);
[email protected]c8a80e92014-05-17 16:02:08953 return OK;
[email protected]d518cd92010-09-29 12:27:44954}
955
svaldeze83af292016-04-26 14:33:37956void SSLClientSocketImpl::DoReadCallback(int rv) {
[email protected]b9b651f2013-11-09 04:32:22957 // Since Run may result in Read being called, clear |user_read_callback_|
958 // up front.
[email protected]0dc88b32014-03-26 20:12:28959 if (rv > 0)
960 was_ever_used_ = true;
xunjieli321a96f32017-03-07 19:42:17961 user_read_buf_ = nullptr;
[email protected]b9b651f2013-11-09 04:32:22962 user_read_buf_len_ = 0;
Brad Lassey3a814172018-04-26 03:30:21963 std::move(user_read_callback_).Run(rv);
[email protected]b9b651f2013-11-09 04:32:22964}
965
svaldeze83af292016-04-26 14:33:37966void SSLClientSocketImpl::DoWriteCallback(int rv) {
[email protected]b9b651f2013-11-09 04:32:22967 // Since Run may result in Write being called, clear |user_write_callback_|
968 // up front.
[email protected]0dc88b32014-03-26 20:12:28969 if (rv > 0)
970 was_ever_used_ = true;
[email protected]b9b651f2013-11-09 04:32:22971 user_write_buf_ = NULL;
972 user_write_buf_len_ = 0;
Brad Lassey3a814172018-04-26 03:30:21973 std::move(user_write_callback_).Run(rv);
[email protected]b9b651f2013-11-09 04:32:22974}
975
svaldeze83af292016-04-26 14:33:37976int SSLClientSocketImpl::DoHandshake() {
[email protected]b9b651f2013-11-09 04:32:22977 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
vadimt5a243282014-12-24 00:26:16978
David Benjamin5f98efe2018-04-12 07:32:41979 int rv = SSL_do_handshake(ssl_.get());
davidbenc4212c02015-05-12 22:30:18980 int net_error = OK;
981 if (rv <= 0) {
davidbend80c12c2016-10-11 00:13:49982 int ssl_error = SSL_get_error(ssl_.get(), rv);
[email protected]b9b651f2013-11-09 04:32:22983 if (ssl_error == SSL_ERROR_WANT_CHANNEL_ID_LOOKUP) {
[email protected]faff9852014-06-21 06:13:46984 // The server supports channel ID. Stop to look one up before returning to
985 // the handshake.
rsleeviadbd4982016-06-13 22:10:27986 next_handshake_state_ = STATE_CHANNEL_ID_LOOKUP;
[email protected]faff9852014-06-21 06:13:46987 return OK;
[email protected]b9b651f2013-11-09 04:32:22988 }
davidbenced4aa9b2015-05-12 21:22:35989 if (ssl_error == SSL_ERROR_WANT_X509_LOOKUP &&
990 !ssl_config_.send_client_cert) {
991 return ERR_SSL_CLIENT_AUTH_CERT_NEEDED;
992 }
davidben1d489522015-07-01 18:48:46993 if (ssl_error == SSL_ERROR_WANT_PRIVATE_KEY_OPERATION) {
svaldez7872fd02015-11-19 21:10:54994 DCHECK(ssl_config_.client_private_key);
Oscar Johanssond49464e2018-07-02 09:35:45995 DCHECK_NE(kSSLClientSocketNoPendingResult, signature_result_);
rsleeviadbd4982016-06-13 22:10:27996 next_handshake_state_ = STATE_HANDSHAKE;
davidben1d489522015-07-01 18:48:46997 return ERR_IO_PENDING;
998 }
[email protected]b9b651f2013-11-09 04:32:22999
davidbena4409c62014-08-27 17:05:511000 OpenSSLErrorInfo error_info;
davidbenfe132d92016-09-27 18:07:211001 net_error = MapLastOpenSSLError(ssl_error, err_tracer, &error_info);
[email protected]b9b651f2013-11-09 04:32:221002 if (net_error == ERR_IO_PENDING) {
davidbenc4212c02015-05-12 22:30:181003 // If not done, stay in this state
rsleeviadbd4982016-06-13 22:10:271004 next_handshake_state_ = STATE_HANDSHAKE;
davidbenc4212c02015-05-12 22:30:181005 return ERR_IO_PENDING;
1006 }
1007
1008 LOG(ERROR) << "handshake failed; returned " << rv << ", SSL error code "
1009 << ssl_error << ", net_error " << net_error;
1010 net_log_.AddEvent(
mikecirone8b85c432016-09-08 19:11:001011 NetLogEventType::SSL_HANDSHAKE_ERROR,
davidbenc4212c02015-05-12 22:30:181012 CreateNetLogOpenSSLErrorCallback(net_error, ssl_error, error_info));
1013 }
1014
rsleeviadbd4982016-06-13 22:10:271015 next_handshake_state_ = STATE_HANDSHAKE_COMPLETE;
davidbenc4212c02015-05-12 22:30:181016 return net_error;
1017}
1018
svaldeze83af292016-04-26 14:33:371019int SSLClientSocketImpl::DoHandshakeComplete(int result) {
davidbenc4212c02015-05-12 22:30:181020 if (result < 0)
1021 return result;
1022
Steven Valdez6af02df2018-07-15 21:52:331023 if (in_confirm_handshake_) {
1024 next_handshake_state_ = STATE_NONE;
1025 return OK;
1026 }
1027
davidben095ebb52017-04-12 22:23:341028 if (ssl_config_.version_interference_probe) {
1029 DCHECK_LT(ssl_config_.version_max, TLS1_3_VERSION);
1030 return ERR_SSL_VERSION_INTERFERENCE;
1031 }
1032
David Benjaminb3840f42017-08-03 15:50:161033 if (!ssl_session_cache_shard_.empty()) {
1034 SSLContext::GetInstance()->session_cache()->ResetLookupCount(
1035 GetSessionCacheKey());
1036 }
1037
bncce6ea242016-09-15 20:22:321038 const uint8_t* alpn_proto = NULL;
1039 unsigned alpn_len = 0;
davidbend80c12c2016-10-11 00:13:491040 SSL_get0_alpn_selected(ssl_.get(), &alpn_proto, &alpn_len);
bncce6ea242016-09-15 20:22:321041 if (alpn_len > 0) {
1042 base::StringPiece proto(reinterpret_cast<const char*>(alpn_proto),
1043 alpn_len);
1044 negotiated_protocol_ = NextProtoFromString(proto);
[email protected]b9b651f2013-11-09 04:32:221045 }
davidbenc4212c02015-05-12 22:30:181046
bncbd442c22016-09-14 20:49:161047 RecordNegotiatedProtocol();
davidbenc4212c02015-05-12 22:30:181048
dadriand476e652016-07-26 21:33:241049 const uint8_t* ocsp_response_raw;
1050 size_t ocsp_response_len;
davidbend80c12c2016-10-11 00:13:491051 SSL_get0_ocsp_response(ssl_.get(), &ocsp_response_raw, &ocsp_response_len);
dadriand476e652016-07-26 21:33:241052 set_stapled_ocsp_response_received(ocsp_response_len != 0);
1053 UMA_HISTOGRAM_BOOLEAN("Net.OCSPResponseStapled", ocsp_response_len != 0);
davidbenc4212c02015-05-12 22:30:181054
1055 const uint8_t* sct_list;
1056 size_t sct_list_len;
davidbend80c12c2016-10-11 00:13:491057 SSL_get0_signed_cert_timestamp_list(ssl_.get(), &sct_list, &sct_list_len);
davidbenc4212c02015-05-12 22:30:181058 set_signed_cert_timestamps_received(sct_list_len != 0);
1059
davidben971a681a2017-02-16 18:57:461060 if (!IsRenegotiationAllowed())
1061 SSL_set_renegotiate_mode(ssl_.get(), ssl_renegotiate_never);
davidbenc4212c02015-05-12 22:30:181062
davidbend80c12c2016-10-11 00:13:491063 uint16_t signature_algorithm = SSL_get_peer_signature_algorithm(ssl_.get());
davidben0653c8d2016-07-08 02:16:171064 if (signature_algorithm != 0) {
Ilya Sherman0eb39802017-12-08 20:58:181065 base::UmaHistogramSparse("Net.SSLSignatureAlgorithm", signature_algorithm);
davidben4fe4f982015-11-11 22:00:121066 }
1067
davidbenc4212c02015-05-12 22:30:181068 // Verify the certificate.
rsleeviadbd4982016-06-13 22:10:271069 next_handshake_state_ = STATE_VERIFY_CERT;
davidbenc4212c02015-05-12 22:30:181070 return OK;
[email protected]b9b651f2013-11-09 04:32:221071}
1072
svaldeze83af292016-04-26 14:33:371073int SSLClientSocketImpl::DoChannelIDLookup() {
mikecironef22f9812016-10-04 03:40:191074 NetLogParametersCallback callback = base::Bind(
nharper49b27d992016-02-09 18:28:511075 &NetLogChannelIDLookupCallback, base::Unretained(channel_id_service_));
mikecirone8b85c432016-09-08 19:11:001076 net_log_.BeginEvent(NetLogEventType::SSL_GET_CHANNEL_ID, callback);
rsleeviadbd4982016-06-13 22:10:271077 next_handshake_state_ = STATE_CHANNEL_ID_LOOKUP_COMPLETE;
[email protected]6b8a3c742014-07-25 00:25:351078 return channel_id_service_->GetOrCreateChannelID(
nharper2e171cf2015-06-01 20:29:231079 host_and_port_.host(), &channel_id_key_,
svaldeze83af292016-04-26 14:33:371080 base::Bind(&SSLClientSocketImpl::OnHandshakeIOComplete,
[email protected]faff9852014-06-21 06:13:461081 base::Unretained(this)),
nharper75ade892015-06-10 19:05:351082 &channel_id_request_);
[email protected]faff9852014-06-21 06:13:461083}
1084
svaldeze83af292016-04-26 14:33:371085int SSLClientSocketImpl::DoChannelIDLookupComplete(int result) {
mikecirone8b85c432016-09-08 19:11:001086 net_log_.EndEvent(NetLogEventType::SSL_GET_CHANNEL_ID,
nharper49b27d992016-02-09 18:28:511087 base::Bind(&NetLogChannelIDLookupCompleteCallback,
1088 channel_id_key_.get(), result));
[email protected]faff9852014-06-21 06:13:461089 if (result < 0)
1090 return result;
1091
[email protected]faff9852014-06-21 06:13:461092 // Hand the key to OpenSSL. Check for error in case OpenSSL rejects the key
1093 // type.
davidben8a208fc2016-01-22 17:08:081094 DCHECK(channel_id_key_);
[email protected]faff9852014-06-21 06:13:461095 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
davidbend80c12c2016-10-11 00:13:491096 if (!SSL_set1_tls_channel_id(ssl_.get(), channel_id_key_->key())) {
[email protected]faff9852014-06-21 06:13:461097 LOG(ERROR) << "Failed to set Channel ID.";
davidbenf225b262016-09-15 22:09:221098 return ERR_FAILED;
[email protected]faff9852014-06-21 06:13:461099 }
1100
1101 // Return to the handshake.
davidben52053b382015-04-27 19:22:291102 channel_id_sent_ = true;
rsleeviadbd4982016-06-13 22:10:271103 next_handshake_state_ = STATE_HANDSHAKE;
[email protected]faff9852014-06-21 06:13:461104 return OK;
1105}
1106
svaldeze83af292016-04-26 14:33:371107int SSLClientSocketImpl::DoVerifyCert(int result) {
davidben09c3d072014-08-25 20:33:581108 DCHECK(start_cert_verification_time_.is_null());
davidben30798ed82014-09-19 19:28:201109
David Benjaminb8ab3852017-08-04 00:17:321110 server_cert_ = x509_util::CreateX509CertificateFromBuffers(
1111 SSL_get0_peer_certificates(ssl_.get()));
[email protected]b9b651f2013-11-09 04:32:221112
Matt Muellerba33e862017-09-28 20:15:521113 // OpenSSL decoded the certificate, but the X509Certificate implementation
1114 // could not. This is treated as a fatal SSL-level protocol error rather than
1115 // a certificate error. See https://crbug.com/91341.
rsleevi74e99742016-09-13 20:35:251116 if (!server_cert_)
davidbenc6435a72015-08-17 18:28:521117 return ERR_SSL_SERVER_CERT_BAD_FORMAT;
1118
davidbenc7e06c92017-03-07 18:54:111119 net_log_.AddEvent(NetLogEventType::SSL_CERTIFICATES_RECEIVED,
1120 base::Bind(&NetLogX509CertificateCallback,
1121 base::Unretained(server_cert_.get())));
1122
1123 next_handshake_state_ = STATE_VERIFY_CERT_COMPLETE;
1124
davidben30798ed82014-09-19 19:28:201125 // If the certificate is bad and has been previously accepted, use
1126 // the previous status and bypass the error.
[email protected]b9b651f2013-11-09 04:32:221127 CertStatus cert_status;
rsleevi74e99742016-09-13 20:35:251128 if (ssl_config_.IsAllowedBadCert(server_cert_.get(), &cert_status)) {
[email protected]b9b651f2013-11-09 04:32:221129 server_cert_verify_result_.Reset();
1130 server_cert_verify_result_.cert_status = cert_status;
1131 server_cert_verify_result_.verified_cert = server_cert_;
1132 return OK;
1133 }
1134
davidben09c3d072014-08-25 20:33:581135 start_cert_verification_time_ = base::TimeTicks::Now();
1136
rsleevi22cae1672016-12-28 01:53:361137 const uint8_t* ocsp_response_raw;
1138 size_t ocsp_response_len;
1139 SSL_get0_ocsp_response(ssl_.get(), &ocsp_response_raw, &ocsp_response_len);
1140 base::StringPiece ocsp_response(
1141 reinterpret_cast<const char*>(ocsp_response_raw), ocsp_response_len);
1142
eroman7f9236a2015-05-11 21:23:431143 return cert_verifier_->Verify(
rsleevi06bd78552016-06-08 22:34:461144 CertVerifier::RequestParams(server_cert_, host_and_port_.host(),
1145 ssl_config_.GetCertVerifyFlags(),
Ryan Sleevi73bdca62018-08-22 16:34:231146 ocsp_response.as_string()),
Ryan Sleevib369d712018-08-20 16:43:221147 &server_cert_verify_result_,
svaldeze83af292016-04-26 14:33:371148 base::Bind(&SSLClientSocketImpl::OnHandshakeIOComplete,
[email protected]b9b651f2013-11-09 04:32:221149 base::Unretained(this)),
eroman7f9236a2015-05-11 21:23:431150 &cert_verifier_request_, net_log_);
[email protected]b9b651f2013-11-09 04:32:221151}
1152
svaldeze83af292016-04-26 14:33:371153int SSLClientSocketImpl::DoVerifyCertComplete(int result) {
eroman7f9236a2015-05-11 21:23:431154 cert_verifier_request_.reset();
[email protected]b9b651f2013-11-09 04:32:221155
davidben09c3d072014-08-25 20:33:581156 if (!start_cert_verification_time_.is_null()) {
1157 base::TimeDelta verify_time =
1158 base::TimeTicks::Now() - start_cert_verification_time_;
1159 if (result == OK) {
1160 UMA_HISTOGRAM_TIMES("Net.SSLCertVerificationTime", verify_time);
1161 } else {
1162 UMA_HISTOGRAM_TIMES("Net.SSLCertVerificationTimeError", verify_time);
1163 }
1164 }
1165
rsleevi4a6ca8c2016-06-24 03:05:221166 // If the connection was good, check HPKP and CT status simultaneously,
1167 // but prefer to treat the HPKP error as more serious, if there was one.
[email protected]8bd4e7a2014-08-09 14:49:171168 const CertStatus cert_status = server_cert_verify_result_.cert_status;
rsleevi4a6ca8c2016-06-24 03:05:221169 if ((result == OK ||
dadrian8f8946652016-06-21 23:48:311170 (IsCertificateError(result) && IsCertStatusMinorError(cert_status)))) {
rsleevi4a6ca8c2016-06-24 03:05:221171 int ct_result = VerifyCT();
dadrian8f8946652016-06-21 23:48:311172 TransportSecurityState::PKPStatus pin_validity =
1173 transport_security_state_->CheckPublicKeyPins(
1174 host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
1175 server_cert_verify_result_.public_key_hashes, server_cert_.get(),
1176 server_cert_verify_result_.verified_cert.get(),
1177 TransportSecurityState::ENABLE_PIN_REPORTS, &pinning_failure_log_);
1178 switch (pin_validity) {
1179 case TransportSecurityState::PKPStatus::VIOLATED:
1180 server_cert_verify_result_.cert_status |=
1181 CERT_STATUS_PINNED_KEY_MISSING;
1182 result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN;
1183 break;
1184 case TransportSecurityState::PKPStatus::BYPASSED:
1185 pkp_bypassed_ = true;
Nico Weber63e03762018-01-26 17:55:141186 FALLTHROUGH;
dadrian8f8946652016-06-21 23:48:311187 case TransportSecurityState::PKPStatus::OK:
1188 // Do nothing.
1189 break;
rsleevi9545d342016-06-21 03:17:371190 }
rsleevi4a6ca8c2016-06-24 03:05:221191 if (result != ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN && ct_result != OK)
1192 result = ct_result;
[email protected]8bd4e7a2014-08-09 14:49:171193 }
1194
Carlos IL81133382017-12-06 17:18:451195 is_fatal_cert_error_ =
1196 IsCertStatusError(cert_status) && !IsCertStatusMinorError(cert_status) &&
1197 transport_security_state_->ShouldSSLErrorsBeFatal(host_and_port_.host());
1198
[email protected]b9b651f2013-11-09 04:32:221199 if (result == OK) {
davidbendafe4e52015-04-08 22:53:521200 DCHECK(!certificate_verified_);
1201 certificate_verified_ = true;
1202 MaybeCacheSession();
dadriand476e652016-07-26 21:33:241203 SSLInfo ssl_info;
1204 bool ok = GetSSLInfo(&ssl_info);
1205 DCHECK(ok);
rsleevi22cae1672016-12-28 01:53:361206
David Benjaminf8ebd2b2017-12-15 19:22:411207 // See how feasible enforcing RSA key usage would be. See
1208 // https://crbug.com/795089.
1209 RSAKeyUsage rsa_key_usage = CheckRSAKeyUsage(
1210 server_cert_.get(), SSL_get_current_cipher(ssl_.get()));
1211 if (rsa_key_usage != RSAKeyUsage::kNotRSA) {
1212 if (server_cert_verify_result_.is_issued_by_known_root) {
1213 UMA_HISTOGRAM_ENUMERATION(
1214 "Net.SSLRSAKeyUsage.KnownRoot", rsa_key_usage,
1215 static_cast<int>(RSAKeyUsage::kLastValue) + 1);
1216 } else {
1217 UMA_HISTOGRAM_ENUMERATION(
1218 "Net.SSLRSAKeyUsage.UnknownRoot", rsa_key_usage,
1219 static_cast<int>(RSAKeyUsage::kLastValue) + 1);
1220 }
1221 }
David Benjamin570460e2018-10-16 06:01:291222
1223 if (!base::FeatureList::IsEnabled(features::kEnforceTLS13Downgrade)) {
1224 // Record metrics on the TLS 1.3 anti-downgrade mechanism. This is only
1225 // recorded when enforcement is disabled. (When enforcement is enabled,
1226 // the connection will fail with ERR_TLS13_DOWNGRADE_DETECTED.) See
1227 // https://crbug.com/boringssl/226.
1228 //
1229 // Record metrics for both servers overall and the TLS 1.3 experiment
1230 // set. These metrics are only useful on TLS 1.3 servers, so the latter is
1231 // more precise, but there is a large enough TLS 1.3 deployment that the
1232 // overall numbers may be more robust. In particular, the DowngradeType
1233 // metrics do not need to be filtered.
1234 bool is_downgrade = !!SSL_is_tls13_downgrade(ssl_.get());
1235 UMA_HISTOGRAM_BOOLEAN("Net.SSLTLS13Downgrade", is_downgrade);
1236 bool is_tls13_experiment_host =
1237 IsTLS13ExperimentHost(host_and_port_.host());
1238 if (is_tls13_experiment_host) {
1239 UMA_HISTOGRAM_BOOLEAN("Net.SSLTLS13DowngradeTLS13Experiment",
1240 is_downgrade);
1241 }
1242
1243 if (is_downgrade) {
1244 // Record whether connections which hit the downgrade used known vs
1245 // unknown roots and which key exchange type.
1246
1247 // This enum is persisted into histograms. Values may not be renumbered.
1248 enum class DowngradeType {
1249 kKnownRootRSA = 0,
1250 kKnownRootECDHE = 1,
1251 kUnknownRootRSA = 2,
1252 kUnknownRootECDHE = 3,
1253 kMaxValue = kUnknownRootECDHE,
1254 };
1255
1256 DowngradeType type;
1257 int kx_nid = SSL_CIPHER_get_kx_nid(SSL_get_current_cipher(ssl_.get()));
1258 DCHECK(kx_nid == NID_kx_rsa || kx_nid == NID_kx_ecdhe);
1259 if (server_cert_verify_result_.is_issued_by_known_root) {
1260 type = kx_nid == NID_kx_rsa ? DowngradeType::kKnownRootRSA
1261 : DowngradeType::kKnownRootECDHE;
1262 } else {
1263 type = kx_nid == NID_kx_rsa ? DowngradeType::kUnknownRootRSA
1264 : DowngradeType::kUnknownRootECDHE;
1265 }
1266 UMA_HISTOGRAM_ENUMERATION("Net.SSLTLS13DowngradeType", type);
1267 if (is_tls13_experiment_host) {
1268 UMA_HISTOGRAM_ENUMERATION("Net.SSLTLS13DowngradeTypeTLS13Experiment",
1269 type);
1270 }
1271 }
1272 }
[email protected]b9b651f2013-11-09 04:32:221273 }
1274
[email protected]64b5c892014-08-08 09:39:261275 completed_connect_ = true;
[email protected]b9b651f2013-11-09 04:32:221276 // Exit DoHandshakeLoop and return the result to the caller to Connect.
1277 DCHECK_EQ(STATE_NONE, next_handshake_state_);
1278 return result;
1279}
1280
svaldeze83af292016-04-26 14:33:371281void SSLClientSocketImpl::DoConnectCallback(int rv) {
[email protected]b9b651f2013-11-09 04:32:221282 if (!user_connect_callback_.is_null()) {
Brad Lassey3a814172018-04-26 03:30:211283 std::move(user_connect_callback_).Run(rv > OK ? OK : rv);
[email protected]b9b651f2013-11-09 04:32:221284 }
1285}
1286
svaldeze83af292016-04-26 14:33:371287void SSLClientSocketImpl::OnHandshakeIOComplete(int result) {
[email protected]b9b651f2013-11-09 04:32:221288 int rv = DoHandshakeLoop(result);
1289 if (rv != ERR_IO_PENDING) {
Steven Valdez6af02df2018-07-15 21:52:331290 if (in_confirm_handshake_) {
1291 in_confirm_handshake_ = false;
1292 net_log_.EndEvent(NetLogEventType::SSL_CONFIRM_HANDSHAKE);
1293 } else {
1294 LogConnectEndEvent(rv);
1295 }
[email protected]b9b651f2013-11-09 04:32:221296 DoConnectCallback(rv);
1297 }
1298}
1299
svaldeze83af292016-04-26 14:33:371300int SSLClientSocketImpl::DoHandshakeLoop(int last_io_result) {
xunjieli0b7f5b62016-12-06 20:43:481301 TRACE_EVENT0(kNetTracingCategory, "SSLClientSocketImpl::DoHandshakeLoop");
[email protected]b9b651f2013-11-09 04:32:221302 int rv = last_io_result;
1303 do {
1304 // Default to STATE_NONE for next state.
1305 // (This is a quirk carried over from the windows
1306 // implementation. It makes reading the logs a bit harder.)
1307 // State handlers can and often do call GotoState just
1308 // to stay in the current state.
1309 State state = next_handshake_state_;
rsleeviadbd4982016-06-13 22:10:271310 next_handshake_state_ = STATE_NONE;
[email protected]b9b651f2013-11-09 04:32:221311 switch (state) {
1312 case STATE_HANDSHAKE:
1313 rv = DoHandshake();
1314 break;
davidbenc4212c02015-05-12 22:30:181315 case STATE_HANDSHAKE_COMPLETE:
1316 rv = DoHandshakeComplete(rv);
1317 break;
[email protected]faff9852014-06-21 06:13:461318 case STATE_CHANNEL_ID_LOOKUP:
1319 DCHECK_EQ(OK, rv);
1320 rv = DoChannelIDLookup();
svaldeze83af292016-04-26 14:33:371321 break;
[email protected]faff9852014-06-21 06:13:461322 case STATE_CHANNEL_ID_LOOKUP_COMPLETE:
1323 rv = DoChannelIDLookupComplete(rv);
1324 break;
[email protected]b9b651f2013-11-09 04:32:221325 case STATE_VERIFY_CERT:
[email protected]faff9852014-06-21 06:13:461326 DCHECK_EQ(OK, rv);
[email protected]b9b651f2013-11-09 04:32:221327 rv = DoVerifyCert(rv);
svaldeze83af292016-04-26 14:33:371328 break;
[email protected]b9b651f2013-11-09 04:32:221329 case STATE_VERIFY_CERT_COMPLETE:
1330 rv = DoVerifyCertComplete(rv);
1331 break;
1332 case STATE_NONE:
1333 default:
1334 rv = ERR_UNEXPECTED;
1335 NOTREACHED() << "unexpected state" << state;
1336 break;
1337 }
[email protected]b9b651f2013-11-09 04:32:221338 } while (rv != ERR_IO_PENDING && next_handshake_state_ != STATE_NONE);
1339 return rv;
1340}
1341
xunjieli321a96f32017-03-07 19:42:171342int SSLClientSocketImpl::DoPayloadRead(IOBuffer* buf, int buf_len) {
[email protected]b9b651f2013-11-09 04:32:221343 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
1344
xunjieli321a96f32017-03-07 19:42:171345 DCHECK_LT(0, buf_len);
1346 DCHECK(buf);
davidben7e555daf2015-03-25 17:03:291347
[email protected]b9b651f2013-11-09 04:32:221348 int rv;
Oscar Johanssond49464e2018-07-02 09:35:451349 if (pending_read_error_ != kSSLClientSocketNoPendingResult) {
[email protected]b9b651f2013-11-09 04:32:221350 rv = pending_read_error_;
Oscar Johanssond49464e2018-07-02 09:35:451351 pending_read_error_ = kSSLClientSocketNoPendingResult;
[email protected]b9b651f2013-11-09 04:32:221352 if (rv == 0) {
mikecirone8b85c432016-09-08 19:11:001353 net_log_.AddByteTransferEvent(NetLogEventType::SSL_SOCKET_BYTES_RECEIVED,
xunjieli321a96f32017-03-07 19:42:171354 rv, buf->data());
davidbenb8c23212014-10-28 00:12:161355 } else {
1356 net_log_.AddEvent(
mikecirone8b85c432016-09-08 19:11:001357 NetLogEventType::SSL_READ_ERROR,
davidbenb8c23212014-10-28 00:12:161358 CreateNetLogOpenSSLErrorCallback(rv, pending_read_ssl_error_,
1359 pending_read_error_info_));
[email protected]b9b651f2013-11-09 04:32:221360 }
davidbenb8c23212014-10-28 00:12:161361 pending_read_ssl_error_ = SSL_ERROR_NONE;
1362 pending_read_error_info_ = OpenSSLErrorInfo();
[email protected]b9b651f2013-11-09 04:32:221363 return rv;
1364 }
1365
1366 int total_bytes_read = 0;
davidben7e555daf2015-03-25 17:03:291367 int ssl_ret;
[email protected]b9b651f2013-11-09 04:32:221368 do {
xunjieli321a96f32017-03-07 19:42:171369 ssl_ret = SSL_read(ssl_.get(), buf->data() + total_bytes_read,
1370 buf_len - total_bytes_read);
davidben7e555daf2015-03-25 17:03:291371 if (ssl_ret > 0)
1372 total_bytes_read += ssl_ret;
davidben8ea6b172017-03-07 23:53:501373 // Continue processing records as long as there is more data available
1374 // synchronously.
1375 } while (total_bytes_read < buf_len && ssl_ret > 0 &&
1376 transport_adapter_->HasPendingReadData());
[email protected]b9b651f2013-11-09 04:32:221377
davidben7e555daf2015-03-25 17:03:291378 // Although only the final SSL_read call may have failed, the failure needs to
1379 // processed immediately, while the information still available in OpenSSL's
1380 // error queue.
davidbenced4aa9b2015-05-12 21:22:351381 if (ssl_ret <= 0) {
davidbend80c12c2016-10-11 00:13:491382 pending_read_ssl_error_ = SSL_get_error(ssl_.get(), ssl_ret);
davidben7e555daf2015-03-25 17:03:291383 if (pending_read_ssl_error_ == SSL_ERROR_ZERO_RETURN) {
1384 pending_read_error_ = 0;
davidbenced4aa9b2015-05-12 21:22:351385 } else if (pending_read_ssl_error_ == SSL_ERROR_WANT_X509_LOOKUP &&
1386 !ssl_config_.send_client_cert) {
1387 pending_read_error_ = ERR_SSL_CLIENT_AUTH_CERT_NEEDED;
davidben1d489522015-07-01 18:48:461388 } else if (pending_read_ssl_error_ ==
1389 SSL_ERROR_WANT_PRIVATE_KEY_OPERATION) {
svaldez7872fd02015-11-19 21:10:541390 DCHECK(ssl_config_.client_private_key);
Oscar Johanssond49464e2018-07-02 09:35:451391 DCHECK_NE(kSSLClientSocketNoPendingResult, signature_result_);
davidben1d489522015-07-01 18:48:461392 pending_read_error_ = ERR_IO_PENDING;
davidben7e555daf2015-03-25 17:03:291393 } else {
davidbenfe132d92016-09-27 18:07:211394 pending_read_error_ = MapLastOpenSSLError(
davidben7e555daf2015-03-25 17:03:291395 pending_read_ssl_error_, err_tracer, &pending_read_error_info_);
[email protected]b9b651f2013-11-09 04:32:221396 }
1397
davidben7e555daf2015-03-25 17:03:291398 // Many servers do not reliably send a close_notify alert when shutting down
1399 // a connection, and instead terminate the TCP connection. This is reported
1400 // as ERR_CONNECTION_CLOSED. Because of this, map the unclean shutdown to a
1401 // graceful EOF, instead of treating it as an error as it should be.
1402 if (pending_read_error_ == ERR_CONNECTION_CLOSED)
1403 pending_read_error_ = 0;
1404 }
davidbenbe6ce7ec2014-10-20 19:15:561405
davidben7e555daf2015-03-25 17:03:291406 if (total_bytes_read > 0) {
1407 // Return any bytes read to the caller. The error will be deferred to the
1408 // next call of DoPayloadRead.
1409 rv = total_bytes_read;
davidbenbe6ce7ec2014-10-20 19:15:561410
davidben7e555daf2015-03-25 17:03:291411 // Do not treat insufficient data as an error to return in the next call to
1412 // DoPayloadRead() - instead, let the call fall through to check SSL_read()
davidben3418e81f2016-10-19 00:09:451413 // again. The transport may have data available by then.
davidben7e555daf2015-03-25 17:03:291414 if (pending_read_error_ == ERR_IO_PENDING)
Oscar Johanssond49464e2018-07-02 09:35:451415 pending_read_error_ = kSSLClientSocketNoPendingResult;
davidben7e555daf2015-03-25 17:03:291416 } else {
1417 // No bytes were returned. Return the pending read error immediately.
Oscar Johanssond49464e2018-07-02 09:35:451418 DCHECK_NE(kSSLClientSocketNoPendingResult, pending_read_error_);
davidben7e555daf2015-03-25 17:03:291419 rv = pending_read_error_;
Oscar Johanssond49464e2018-07-02 09:35:451420 pending_read_error_ = kSSLClientSocketNoPendingResult;
[email protected]b9b651f2013-11-09 04:32:221421 }
1422
1423 if (rv >= 0) {
mikecirone8b85c432016-09-08 19:11:001424 net_log_.AddByteTransferEvent(NetLogEventType::SSL_SOCKET_BYTES_RECEIVED,
xunjieli321a96f32017-03-07 19:42:171425 rv, buf->data());
davidbenb8c23212014-10-28 00:12:161426 } else if (rv != ERR_IO_PENDING) {
1427 net_log_.AddEvent(
mikecirone8b85c432016-09-08 19:11:001428 NetLogEventType::SSL_READ_ERROR,
davidbenb8c23212014-10-28 00:12:161429 CreateNetLogOpenSSLErrorCallback(rv, pending_read_ssl_error_,
1430 pending_read_error_info_));
1431 pending_read_ssl_error_ = SSL_ERROR_NONE;
1432 pending_read_error_info_ = OpenSSLErrorInfo();
[email protected]b9b651f2013-11-09 04:32:221433 }
1434 return rv;
1435}
1436
svaldeze83af292016-04-26 14:33:371437int SSLClientSocketImpl::DoPayloadWrite() {
[email protected]b9b651f2013-11-09 04:32:221438 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
davidbend80c12c2016-10-11 00:13:491439 int rv = SSL_write(ssl_.get(), user_write_buf_->data(), user_write_buf_len_);
rsleevif020edc2015-03-16 19:31:241440
[email protected]b9b651f2013-11-09 04:32:221441 if (rv >= 0) {
mikecirone8b85c432016-09-08 19:11:001442 net_log_.AddByteTransferEvent(NetLogEventType::SSL_SOCKET_BYTES_SENT, rv,
[email protected]b9b651f2013-11-09 04:32:221443 user_write_buf_->data());
1444 return rv;
1445 }
1446
davidbend80c12c2016-10-11 00:13:491447 int ssl_error = SSL_get_error(ssl_.get(), rv);
davidben1d489522015-07-01 18:48:461448 if (ssl_error == SSL_ERROR_WANT_PRIVATE_KEY_OPERATION)
1449 return ERR_IO_PENDING;
davidbenb8c23212014-10-28 00:12:161450 OpenSSLErrorInfo error_info;
davidbenfe132d92016-09-27 18:07:211451 int net_error = MapLastOpenSSLError(ssl_error, err_tracer, &error_info);
davidbenb8c23212014-10-28 00:12:161452
1453 if (net_error != ERR_IO_PENDING) {
1454 net_log_.AddEvent(
mikecirone8b85c432016-09-08 19:11:001455 NetLogEventType::SSL_WRITE_ERROR,
davidbenb8c23212014-10-28 00:12:161456 CreateNetLogOpenSSLErrorCallback(net_error, ssl_error, error_info));
1457 }
1458 return net_error;
[email protected]b9b651f2013-11-09 04:32:221459}
1460
davidben3418e81f2016-10-19 00:09:451461void SSLClientSocketImpl::RetryAllOperations() {
1462 // SSL_do_handshake, SSL_read, and SSL_write may all be retried when blocked,
1463 // so retry all operations for simplicity. (Otherwise, SSL_get_error for each
1464 // operation may be remembered to retry only the blocked ones.)
1465
Steven Valdez6af02df2018-07-15 21:52:331466 // Performing these callbacks may cause |this| to be deleted. If this
1467 // happens, the other callbacks should not be invoked. Guard against this by
1468 // holding a WeakPtr to |this| and ensuring it's still valid.
1469 base::WeakPtr<SSLClientSocketImpl> guard(weak_factory_.GetWeakPtr());
davidben3418e81f2016-10-19 00:09:451470 if (next_handshake_state_ == STATE_HANDSHAKE) {
1471 // In handshake phase. The parameter to OnHandshakeIOComplete is unused.
1472 OnHandshakeIOComplete(OK);
davidben3418e81f2016-10-19 00:09:451473 }
1474
Steven Valdez6af02df2018-07-15 21:52:331475 if (!guard.get())
1476 return;
1477
davidben1d489522015-07-01 18:48:461478 int rv_read = ERR_IO_PENDING;
1479 int rv_write = ERR_IO_PENDING;
xunjieli321a96f32017-03-07 19:42:171480 if (user_read_buf_) {
1481 rv_read = DoPayloadRead(user_read_buf_.get(), user_read_buf_len_);
1482 } else if (!user_read_callback_.is_null()) {
1483 // ReadIfReady() is called by the user. Skip DoPayloadRead() and just let
1484 // the user know that read can be retried.
1485 rv_read = OK;
1486 }
1487
davidben3418e81f2016-10-19 00:09:451488 if (user_write_buf_)
1489 rv_write = DoPayloadWrite();
davidben1d489522015-07-01 18:48:461490
davidben3418e81f2016-10-19 00:09:451491 if (rv_read != ERR_IO_PENDING)
davidben1d489522015-07-01 18:48:461492 DoReadCallback(rv_read);
1493
1494 if (!guard.get())
1495 return;
1496
davidben3418e81f2016-10-19 00:09:451497 if (rv_write != ERR_IO_PENDING)
davidben1d489522015-07-01 18:48:461498 DoWriteCallback(rv_write);
1499}
1500
rsleevi4a6ca8c2016-06-24 03:05:221501int SSLClientSocketImpl::VerifyCT() {
rsleevi4a6ca8c2016-06-24 03:05:221502 const uint8_t* sct_list_raw;
1503 size_t sct_list_len;
davidbend80c12c2016-10-11 00:13:491504 SSL_get0_signed_cert_timestamp_list(ssl_.get(), &sct_list_raw, &sct_list_len);
rsleevi22cae1672016-12-28 01:53:361505 base::StringPiece sct_list(reinterpret_cast<const char*>(sct_list_raw),
1506 sct_list_len);
1507
1508 const uint8_t* ocsp_response_raw;
1509 size_t ocsp_response_len;
1510 SSL_get0_ocsp_response(ssl_.get(), &ocsp_response_raw, &ocsp_response_len);
1511 base::StringPiece ocsp_response(
1512 reinterpret_cast<const char*>(ocsp_response_raw), ocsp_response_len);
rsleevi4a6ca8c2016-06-24 03:05:221513
1514 // Note that this is a completely synchronous operation: The CT Log Verifier
1515 // gets all the data it needs for SCT verification and does not do any
1516 // external communication.
1517 cert_transparency_verifier_->Verify(
Rob Percivalbc658a22017-12-13 08:24:421518 host_and_port().host(), server_cert_verify_result_.verified_cert.get(),
1519 ocsp_response, sct_list, &ct_verify_result_.scts, net_log_);
rsleevi4a6ca8c2016-06-24 03:05:221520
Ryan Sleevi8a9c9c12018-05-09 02:36:231521 ct::SCTList verified_scts =
eranm4bed0b572016-08-14 21:00:351522 ct::SCTsMatchingStatus(ct_verify_result_.scts, ct::SCT_STATUS_OK);
1523
Emily Stark627238f2017-11-29 03:29:541524 ct_verify_result_.policy_compliance = policy_enforcer_->CheckCompliance(
1525 server_cert_verify_result_.verified_cert.get(), verified_scts, net_log_);
Emily Stark0d9809e2017-10-18 08:29:151526 if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) {
Emily Stark627238f2017-11-29 03:29:541527 if (ct_verify_result_.policy_compliance !=
Ryan Sleevi8a9c9c12018-05-09 02:36:231528 ct::CTPolicyCompliance::CT_POLICY_COMPLIES_VIA_SCTS &&
1529 ct_verify_result_.policy_compliance !=
1530 ct::CTPolicyCompliance::CT_POLICY_BUILD_NOT_TIMELY) {
Emily Stark0d9809e2017-10-18 08:29:151531 server_cert_verify_result_.cert_status |=
1532 CERT_STATUS_CT_COMPLIANCE_FAILED;
1533 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV;
1534 }
1535
1536 // Record the CT compliance status for connections with EV certificates, to
1537 // distinguish how often EV status is being dropped due to failing CT
1538 // compliance.
Emily Starkefce7832017-11-30 03:16:161539 if (server_cert_verify_result_.is_issued_by_known_root) {
1540 UMA_HISTOGRAM_ENUMERATION("Net.CertificateTransparency.EVCompliance2.SSL",
1541 ct_verify_result_.policy_compliance,
Kunihiko Sakamoto36469732018-09-27 03:33:451542 ct::CTPolicyCompliance::CT_POLICY_COUNT);
Emily Starkefce7832017-11-30 03:16:161543 }
rsleevicd7390e2017-06-14 10:18:261544 }
rsleevi4a6ca8c2016-06-24 03:05:221545
Emily Stark0d9809e2017-10-18 08:29:151546 // Record the CT compliance of every connection to get an overall picture of
1547 // how many connections are CT-compliant.
Emily Starkefce7832017-11-30 03:16:161548 if (server_cert_verify_result_.is_issued_by_known_root) {
1549 UMA_HISTOGRAM_ENUMERATION(
1550 "Net.CertificateTransparency.ConnectionComplianceStatus2.SSL",
1551 ct_verify_result_.policy_compliance,
Kunihiko Sakamoto36469732018-09-27 03:33:451552 ct::CTPolicyCompliance::CT_POLICY_COUNT);
Emily Starkefce7832017-11-30 03:16:161553 }
Emily Starkc96e9bc2017-10-10 00:10:391554
Emily Stark0d9809e2017-10-18 08:29:151555 TransportSecurityState::CTRequirementsStatus ct_requirement_status =
1556 transport_security_state_->CheckCTRequirements(
estarkbf1b52962017-05-05 17:05:251557 host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
1558 server_cert_verify_result_.public_key_hashes,
1559 server_cert_verify_result_.verified_cert.get(), server_cert_.get(),
1560 ct_verify_result_.scts,
1561 TransportSecurityState::ENABLE_EXPECT_CT_REPORTS,
Emily Stark627238f2017-11-29 03:29:541562 ct_verify_result_.policy_compliance);
Emily Stark0d9809e2017-10-18 08:29:151563 if (ct_requirement_status != TransportSecurityState::CT_NOT_REQUIRED) {
Emily Stark8b411de02017-11-23 20:21:271564 ct_verify_result_.policy_compliance_required = true;
Emily Starkefce7832017-11-30 03:16:161565 if (server_cert_verify_result_.is_issued_by_known_root) {
1566 // Record the CT compliance of connections for which compliance is
1567 // required; this helps answer the question: "Of all connections that are
1568 // supposed to be serving valid CT information, how many fail to do so?"
1569 UMA_HISTOGRAM_ENUMERATION(
1570 "Net.CertificateTransparency.CTRequiredConnectionComplianceStatus2."
1571 "SSL",
1572 ct_verify_result_.policy_compliance,
Kunihiko Sakamoto36469732018-09-27 03:33:451573 ct::CTPolicyCompliance::CT_POLICY_COUNT);
Emily Starkefce7832017-11-30 03:16:161574 }
Emily Stark8b411de02017-11-23 20:21:271575 } else {
1576 ct_verify_result_.policy_compliance_required = false;
rsleevi4a6ca8c2016-06-24 03:05:221577 }
1578
Emily Stark0d9809e2017-10-18 08:29:151579 switch (ct_requirement_status) {
1580 case TransportSecurityState::CT_REQUIREMENTS_NOT_MET:
1581 server_cert_verify_result_.cert_status |=
1582 CERT_STATUS_CERTIFICATE_TRANSPARENCY_REQUIRED;
1583 return ERR_CERTIFICATE_TRANSPARENCY_REQUIRED;
1584 case TransportSecurityState::CT_REQUIREMENTS_MET:
1585 case TransportSecurityState::CT_NOT_REQUIRED:
1586 return OK;
1587 }
1588
1589 NOTREACHED();
rsleevi4a6ca8c2016-06-24 03:05:221590 return OK;
1591}
1592
svaldeze83af292016-04-26 14:33:371593int SSLClientSocketImpl::ClientCertRequestCallback(SSL* ssl) {
davidbend80c12c2016-10-11 00:13:491594 DCHECK(ssl == ssl_.get());
[email protected]82c59022014-08-15 09:38:271595
mikecirone8b85c432016-09-08 19:11:001596 net_log_.AddEvent(NetLogEventType::SSL_CLIENT_CERT_REQUESTED);
davidbenfe132d92016-09-27 18:07:211597 certificate_requested_ = true;
davidbenaf42cbe2014-11-13 03:27:461598
[email protected]82c59022014-08-15 09:38:271599 // Clear any currently configured certificates.
davidbend80c12c2016-10-11 00:13:491600 SSL_certs_clear(ssl_.get());
[email protected]97a854f2014-07-29 07:51:361601
1602#if defined(OS_IOS)
1603 // TODO(droger): Support client auth on iOS. See http://crbug.com/145954).
1604 LOG(WARNING) << "Client auth is not supported";
svaldeze83af292016-04-26 14:33:371605#else // !defined(OS_IOS)
[email protected]5ac981e182010-12-06 17:56:271606 if (!ssl_config_.send_client_cert) {
[email protected]515adc22013-01-09 16:01:231607 // First pass: we know that a client certificate is needed, but we do not
davidbenb11fd212017-01-12 17:08:031608 // have one at hand. Suspend the handshake. SSL_get_error will return
1609 // SSL_ERROR_WANT_X509_LOOKUP.
davidbenced4aa9b2015-05-12 21:22:351610 return -1;
[email protected]5ac981e182010-12-06 17:56:271611 }
1612
1613 // Second pass: a client certificate should have been selected.
[email protected]13914c92013-06-13 22:42:421614 if (ssl_config_.client_cert.get()) {
svaldez7872fd02015-11-19 21:10:541615 if (!ssl_config_.client_private_key) {
1616 // The caller supplied a null private key. Fail the handshake and surface
1617 // an appropriate error to the caller.
davidben1d489522015-07-01 18:48:461618 LOG(WARNING) << "Client cert found without private key";
1619 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY);
1620 return -1;
1621 }
1622
David Benjaminb8ab3852017-08-04 00:17:321623 if (!SetSSLChainAndKey(ssl_.get(), ssl_config_.client_cert.get(), nullptr,
1624 &SSLContext::kPrivateKeyMethod)) {
davidbena35b40c32017-03-09 17:33:451625 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_CERT_BAD_FORMAT);
1626 return -1;
1627 }
svaldezf3db006f2015-09-29 16:43:581628
David Benjaminb9bafbe2017-11-07 21:41:381629 std::vector<uint16_t> preferences =
1630 ssl_config_.client_private_key->GetAlgorithmPreferences();
1631 SSL_set_signing_algorithm_prefs(ssl_.get(), preferences.data(),
1632 preferences.size());
davidbenaf42cbe2014-11-13 03:27:461633
David Benjaminb8ab3852017-08-04 00:17:321634 net_log_.AddEvent(
1635 NetLogEventType::SSL_CLIENT_CERT_PROVIDED,
1636 NetLog::IntCallback(
1637 "cert_count",
Matt Muellera4193272017-12-07 00:23:341638 1 + ssl_config_.client_cert->intermediate_buffers().size()));
[email protected]6bad5052014-07-12 01:25:131639 return 1;
[email protected]c0787702014-05-20 21:51:441640 }
[email protected]97a854f2014-07-29 07:51:361641#endif // defined(OS_IOS)
[email protected]5ac981e182010-12-06 17:56:271642
1643 // Send no client certificate.
mikecirone8b85c432016-09-08 19:11:001644 net_log_.AddEvent(NetLogEventType::SSL_CLIENT_CERT_PROVIDED,
tfarina5e24b242015-10-27 13:11:281645 NetLog::IntCallback("cert_count", 0));
[email protected]82c59022014-08-15 09:38:271646 return 1;
[email protected]5ac981e182010-12-06 17:56:271647}
1648
svaldeze83af292016-04-26 14:33:371649void SSLClientSocketImpl::MaybeCacheSession() {
davidben44aeae62015-06-24 20:47:431650 // Only cache the session once both a new session has been established and the
1651 // certificate has been verified. Due to False Start, these events may happen
1652 // in either order.
David Benjaminb3840f42017-08-03 15:50:161653 if (!pending_session_ || !certificate_verified_ ||
1654 ssl_session_cache_shard_.empty()) {
davidbendafe4e52015-04-08 22:53:521655 return;
David Benjaminb3840f42017-08-03 15:50:161656 }
davidbendafe4e52015-04-08 22:53:521657
1658 SSLContext::GetInstance()->session_cache()->Insert(GetSessionCacheKey(),
davidbenc269cc4b2016-07-27 14:55:031659 pending_session_.get());
1660 pending_session_ = nullptr;
davidbendafe4e52015-04-08 22:53:521661}
1662
svaldeze83af292016-04-26 14:33:371663int SSLClientSocketImpl::NewSessionCallback(SSL_SESSION* session) {
David Benjaminb3840f42017-08-03 15:50:161664 if (ssl_session_cache_shard_.empty())
1665 return 0;
1666
davidbenc269cc4b2016-07-27 14:55:031667 // OpenSSL passes a reference to |session|.
1668 pending_session_.reset(session);
davidbendafe4e52015-04-08 22:53:521669 MaybeCacheSession();
davidben44aeae62015-06-24 20:47:431670 return 1;
davidbendafe4e52015-04-08 22:53:521671}
1672
svaldeze83af292016-04-26 14:33:371673void SSLClientSocketImpl::AddCTInfoToSSLInfo(SSLInfo* ssl_info) const {
estark723b5eeb2016-02-18 21:01:121674 ssl_info->UpdateCertificateTransparencyInfo(ct_verify_result_);
davidbeneb5f8ef32014-09-04 14:14:321675}
1676
svaldeze83af292016-04-26 14:33:371677std::string SSLClientSocketImpl::GetSessionCacheKey() const {
David Benjaminb3840f42017-08-03 15:50:161678 // If there is no session cache shard configured, disable session
1679 // caching. GetSessionCacheKey may not be called. When
1680 // https://crbug.com/458365 is fixed, this check will not be needed.
1681 DCHECK(!ssl_session_cache_shard_.empty());
1682
rsleevif020edc2015-03-16 19:31:241683 std::string result = host_and_port_.ToString();
davidben095ebb52017-04-12 22:23:341684 result.push_back('/');
rsleevif020edc2015-03-16 19:31:241685 result.append(ssl_session_cache_shard_);
1686
davidben095ebb52017-04-12 22:23:341687 result.push_back('/');
davidben095ebb52017-04-12 22:23:341688 result.push_back(ssl_config_.channel_id_enabled ? '1' : '0');
1689 result.push_back(ssl_config_.version_interference_probe ? '1' : '0');
rsleevif020edc2015-03-16 19:31:241690 return result;
1691}
1692
svaldeze83af292016-04-26 14:33:371693bool SSLClientSocketImpl::IsRenegotiationAllowed() const {
bncce6ea242016-09-15 20:22:321694 if (negotiated_protocol_ == kProtoUnknown)
davidben421116c2015-05-12 19:56:511695 return ssl_config_.renego_allowed_default;
1696
davidben421116c2015-05-12 19:56:511697 for (NextProto allowed : ssl_config_.renego_allowed_for_protos) {
bnc3cf2a592016-08-11 14:48:361698 if (negotiated_protocol_ == allowed)
davidben421116c2015-05-12 19:56:511699 return true;
1700 }
1701 return false;
1702}
1703
David Benjaminb9bafbe2017-11-07 21:41:381704ssl_private_key_result_t SSLClientSocketImpl::PrivateKeySignCallback(
davidben1d489522015-07-01 18:48:461705 uint8_t* out,
1706 size_t* out_len,
1707 size_t max_out,
David Benjaminb9bafbe2017-11-07 21:41:381708 uint16_t algorithm,
davidben1d489522015-07-01 18:48:461709 const uint8_t* in,
1710 size_t in_len) {
Oscar Johanssond49464e2018-07-02 09:35:451711 DCHECK_EQ(kSSLClientSocketNoPendingResult, signature_result_);
davidben1d489522015-07-01 18:48:461712 DCHECK(signature_.empty());
svaldez7872fd02015-11-19 21:10:541713 DCHECK(ssl_config_.client_private_key);
davidben1d489522015-07-01 18:48:461714
David Benjaminb9bafbe2017-11-07 21:41:381715 net_log_.BeginEvent(
1716 NetLogEventType::SSL_PRIVATE_KEY_OP,
1717 base::Bind(&NetLogPrivateKeyOperationCallback, algorithm));
1718
davidben1d489522015-07-01 18:48:461719 signature_result_ = ERR_IO_PENDING;
David Benjamin9ba36b02017-11-10 19:01:531720 ssl_config_.client_private_key->Sign(
1721 algorithm, base::make_span(in, in_len),
David Benjamin8f2d2c12018-02-27 00:08:261722 base::BindOnce(&SSLClientSocketImpl::OnPrivateKeyComplete,
1723 weak_factory_.GetWeakPtr()));
davidben1d489522015-07-01 18:48:461724 return ssl_private_key_retry;
1725}
1726
davidben0bca07fd2016-07-18 15:12:031727ssl_private_key_result_t SSLClientSocketImpl::PrivateKeyCompleteCallback(
davidben1d489522015-07-01 18:48:461728 uint8_t* out,
1729 size_t* out_len,
1730 size_t max_out) {
Oscar Johanssond49464e2018-07-02 09:35:451731 DCHECK_NE(kSSLClientSocketNoPendingResult, signature_result_);
svaldez7872fd02015-11-19 21:10:541732 DCHECK(ssl_config_.client_private_key);
davidben1d489522015-07-01 18:48:461733
1734 if (signature_result_ == ERR_IO_PENDING)
1735 return ssl_private_key_retry;
1736 if (signature_result_ != OK) {
1737 OpenSSLPutNetError(FROM_HERE, signature_result_);
1738 return ssl_private_key_failure;
1739 }
1740 if (signature_.size() > max_out) {
1741 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED);
1742 return ssl_private_key_failure;
1743 }
davidben5f8b6bc2015-11-25 03:19:541744 memcpy(out, signature_.data(), signature_.size());
davidben1d489522015-07-01 18:48:461745 *out_len = signature_.size();
1746 signature_.clear();
1747 return ssl_private_key_success;
1748}
1749
davidben0bca07fd2016-07-18 15:12:031750void SSLClientSocketImpl::OnPrivateKeyComplete(
davidben1d489522015-07-01 18:48:461751 Error error,
1752 const std::vector<uint8_t>& signature) {
1753 DCHECK_EQ(ERR_IO_PENDING, signature_result_);
1754 DCHECK(signature_.empty());
svaldez7872fd02015-11-19 21:10:541755 DCHECK(ssl_config_.client_private_key);
davidben1d489522015-07-01 18:48:461756
mikecirone8b85c432016-09-08 19:11:001757 net_log_.EndEventWithNetErrorCode(NetLogEventType::SSL_PRIVATE_KEY_OP, error);
davidben1d489522015-07-01 18:48:461758
1759 signature_result_ = error;
1760 if (signature_result_ == OK)
1761 signature_ = signature;
1762
davidben1d489522015-07-01 18:48:461763 // During a renegotiation, either Read or Write calls may be blocked on an
1764 // asynchronous private key operation.
davidben3418e81f2016-10-19 00:09:451765 RetryAllOperations();
davidben1d489522015-07-01 18:48:461766}
1767
David Benjamin7a8e4dfa2018-06-12 23:07:211768void SSLClientSocketImpl::InfoCallback(int type, int value) {
1769 if (type == SSL_CB_HANDSHAKE_START && completed_connect_) {
1770 UMA_HISTOGRAM_BOOLEAN("Net.SSLSecureRenegotiation",
1771 SSL_get_secure_renegotiation_support(ssl_.get()));
1772 }
1773}
1774
davidbencef9e212017-04-19 15:00:101775void SSLClientSocketImpl::MessageCallback(int is_write,
1776 int content_type,
1777 const void* buf,
1778 size_t len) {
1779 switch (content_type) {
1780 case SSL3_RT_ALERT:
1781 net_log_.AddEvent(is_write ? NetLogEventType::SSL_ALERT_SENT
1782 : NetLogEventType::SSL_ALERT_RECEIVED,
1783 base::Bind(&NetLogSSLAlertCallback, buf, len));
1784 break;
1785 case SSL3_RT_HANDSHAKE:
1786 net_log_.AddEvent(
1787 is_write ? NetLogEventType::SSL_HANDSHAKE_MESSAGE_SENT
1788 : NetLogEventType::SSL_HANDSHAKE_MESSAGE_RECEIVED,
1789 base::Bind(&NetLogSSLMessageCallback, !!is_write, buf, len));
1790 break;
1791 default:
1792 return;
1793 }
1794}
1795
davidben281d13f02016-04-27 20:43:281796void SSLClientSocketImpl::LogConnectEndEvent(int rv) {
1797 if (rv != OK) {
mikecirone8b85c432016-09-08 19:11:001798 net_log_.EndEventWithNetErrorCode(NetLogEventType::SSL_CONNECT, rv);
davidben281d13f02016-04-27 20:43:281799 return;
1800 }
1801
mikecirone8b85c432016-09-08 19:11:001802 net_log_.EndEvent(NetLogEventType::SSL_CONNECT,
davidben281d13f02016-04-27 20:43:281803 base::Bind(&NetLogSSLInfoCallback, base::Unretained(this)));
1804}
1805
bncbd442c22016-09-14 20:49:161806void SSLClientSocketImpl::RecordNegotiatedProtocol() const {
1807 UMA_HISTOGRAM_ENUMERATION("Net.SSLNegotiatedAlpnProtocol",
1808 negotiated_protocol_, kProtoLast + 1);
bnc3cf2a592016-08-11 14:48:361809}
1810
bnc3cf2a592016-08-11 14:48:361811bool SSLClientSocketImpl::IsChannelIDEnabled() const {
1812 return ssl_config_.channel_id_enabled && channel_id_service_;
1813}
1814
davidbenfe132d92016-09-27 18:07:211815int SSLClientSocketImpl::MapLastOpenSSLError(
1816 int ssl_error,
1817 const crypto::OpenSSLErrStackTracer& tracer,
1818 OpenSSLErrorInfo* info) {
1819 int net_error = MapOpenSSLErrorWithDetails(ssl_error, tracer, info);
1820
1821 if (ssl_error == SSL_ERROR_SSL &&
1822 ERR_GET_LIB(info->error_code) == ERR_LIB_SSL) {
1823 // TLS does not provide an alert for missing client certificates, so most
1824 // servers send a generic handshake_failure alert. Detect this case by
1825 // checking if we have received a CertificateRequest but sent no
1826 // certificate. See https://crbug.com/646567.
1827 if (ERR_GET_REASON(info->error_code) ==
1828 SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE &&
1829 certificate_requested_ && ssl_config_.send_client_cert &&
1830 !ssl_config_.client_cert) {
1831 net_error = ERR_BAD_SSL_CLIENT_AUTH_CERT;
1832 }
1833
1834 // Per spec, access_denied is only for client-certificate-based access
1835 // control, but some buggy firewalls use it when blocking a page. To avoid a
1836 // confusing error, map it to a generic protocol error if no
1837 // CertificateRequest was sent. See https://crbug.com/630883.
1838 if (ERR_GET_REASON(info->error_code) == SSL_R_TLSV1_ALERT_ACCESS_DENIED &&
1839 !certificate_requested_) {
1840 net_error = ERR_SSL_PROTOCOL_ERROR;
1841 }
David Benjamin5b4410e2017-11-10 21:50:231842
1843 // This error is specific to the client, so map it here.
1844 if (ERR_GET_REASON(info->error_code) ==
1845 SSL_R_NO_COMMON_SIGNATURE_ALGORITHMS) {
1846 net_error = ERR_SSL_CLIENT_AUTH_NO_COMMON_ALGORITHMS;
1847 }
davidbenfe132d92016-09-27 18:07:211848 }
1849
1850 return net_error;
1851}
1852
[email protected]7e5dd49f2010-12-08 18:33:491853} // namespace net