blob: fbb947187d4757eae397d026bd872fd831644d4d [file] [log] [blame]
[email protected]013c17c2012-01-21 19:09:011// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]d518cd92010-09-29 12:27:442// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
svaldeze83af292016-04-26 14:33:375#include "net/socket/ssl_client_socket_impl.h"
[email protected]d518cd92010-09-29 12:27:446
[email protected]edfd0f42014-07-22 18:20:377#include <errno.h>
bnc67da3de2015-01-15 21:02:268#include <string.h>
[email protected]d518cd92010-09-29 12:27:449
mabb51c5142016-12-07 09:32:4010#include <algorithm>
David Benjaminf8ebd2b2017-12-15 19:22:4111#include <map>
davidben752bcf22015-12-21 22:55:5012#include <utility>
13
[email protected]0f7804ec2011-10-07 20:04:1814#include "base/bind.h"
[email protected]f2da6ac2013-02-04 08:22:5315#include "base/callback_helpers.h"
David Benjamin9ba36b02017-11-10 19:01:5316#include "base/containers/span.h"
David Benjamin6f2da652019-06-26 23:36:3517#include "base/feature_list.h"
davidben1d489522015-07-01 18:48:4618#include "base/lazy_instance.h"
Avi Drissman13fc8932015-12-20 04:40:4619#include "base/macros.h"
[email protected]3b63f8f42011-03-28 01:54:1520#include "base/memory/singleton.h"
mmenke1beda3d2016-07-22 03:33:4521#include "base/metrics/field_trial.h"
Adam Langley074164132018-01-17 03:27:3222#include "base/metrics/field_trial_params.h"
Ilya Sherman0eb39802017-12-08 20:58:1823#include "base/metrics/histogram_functions.h"
asvitkinec3c93722015-06-17 14:48:3724#include "base/metrics/histogram_macros.h"
davidben018aad62014-09-12 02:25:1925#include "base/strings/string_piece.h"
xunjieli9f8c5fb52016-12-07 22:59:3326#include "base/strings/stringprintf.h"
[email protected]20305ec2011-01-21 04:55:5227#include "base/synchronization/lock.h"
ssid6d6b40102016-04-05 18:59:5628#include "base/trace_event/trace_event.h"
estade5e5529d2015-05-21 20:59:1129#include "base/values.h"
Adam Langleya0301772019-08-01 22:10:4930#include "build/build_config.h"
[email protected]ee0f2aa82013-10-25 11:59:2631#include "crypto/ec_private_key.h"
[email protected]4b559b4d2011-04-14 17:37:1432#include "crypto/openssl_util.h"
David Benjamin570460e2018-10-16 06:01:2933#include "net/base/features.h"
martijna2e83bd2016-03-18 13:10:4534#include "net/base/ip_address.h"
[email protected]d518cd92010-09-29 12:27:4435#include "net/base/net_errors.h"
xunjieli0b7f5b62016-12-06 20:43:4836#include "net/base/trace_constants.h"
David Benjamind5503c82018-02-01 20:59:3837#include "net/base/url_util.h"
[email protected]6e7845ae2013-03-29 21:48:1138#include "net/cert/cert_verifier.h"
estark6f9b3d82016-01-12 21:37:0539#include "net/cert/ct_policy_enforcer.h"
estark723b5eeb2016-02-18 21:01:1240#include "net/cert/ct_policy_status.h"
davidbeneb5f8ef32014-09-04 14:14:3241#include "net/cert/ct_verifier.h"
David Benjaminf8ebd2b2017-12-15 19:22:4142#include "net/cert/internal/parse_certificate.h"
[email protected]6e7845ae2013-03-29 21:48:1143#include "net/cert/x509_certificate_net_log_param.h"
mattm316af822017-02-23 04:05:5644#include "net/cert/x509_util.h"
David Benjaminf8ebd2b2017-12-15 19:22:4145#include "net/der/parse_values.h"
[email protected]8bd4e7a2014-08-09 14:49:1746#include "net/http/transport_security_state.h"
mikecirone8b85c432016-09-08 19:11:0047#include "net/log/net_log_event_type.h"
Eric Roman45f155c2019-07-15 19:47:3148#include "net/log/net_log_values.h"
[email protected]536fd0b2013-03-14 17:41:5749#include "net/ssl/ssl_cert_request_info.h"
davidben281d13f02016-04-27 20:43:2850#include "net/ssl/ssl_cipher_suite_names.h"
[email protected]536fd0b2013-03-14 17:41:5751#include "net/ssl/ssl_connection_status_flags.h"
David Benjamin0627236e2019-06-27 02:01:1852#include "net/ssl/ssl_handshake_details.h"
[email protected]536fd0b2013-03-14 17:41:5753#include "net/ssl/ssl_info.h"
David Benjaminbd37c172018-07-11 17:24:5754#include "net/ssl/ssl_key_logger.h"
davidben1d489522015-07-01 18:48:4655#include "net/ssl/ssl_private_key.h"
[email protected]a2b2cfc2017-12-06 09:06:0856#include "net/traffic_annotation/network_traffic_annotation.h"
tfarinae8cb8aa2016-10-21 02:44:0157#include "third_party/boringssl/src/include/openssl/bio.h"
58#include "third_party/boringssl/src/include/openssl/bytestring.h"
59#include "third_party/boringssl/src/include/openssl/err.h"
60#include "third_party/boringssl/src/include/openssl/evp.h"
61#include "third_party/boringssl/src/include/openssl/mem.h"
62#include "third_party/boringssl/src/include/openssl/ssl.h"
[email protected]d518cd92010-09-29 12:27:4463
Adam Langley93cbfad12018-07-06 22:07:1664#if !defined(NET_DISABLE_BROTLI)
65#include "third_party/brotli/include/brotli/decode.h"
66#endif
67
[email protected]d518cd92010-09-29 12:27:4468namespace net {
69
70namespace {
71
Adam Langleya0301772019-08-01 22:10:4972#if defined(ARCH_CPU_X86_64) || defined(ARCH_CPU_ARM64)
Adam Langleyc9c8d11d2019-07-31 20:21:4673constexpr base::FeatureParam<std::string> kPostQuantumGroup{
74 &features::kPostQuantumCECPQ2, "group", ""};
Adam Langleya0301772019-08-01 22:10:4975#endif
Adam Langleyc9c8d11d2019-07-31 20:21:4676
[email protected]4b768562013-02-16 04:10:0777// This constant can be any non-negative/non-zero value (eg: it does not
78// overlap with any value of the net::Error range, including net::OK).
Oscar Johanssond49464e2018-07-02 09:35:4579const int kSSLClientSocketNoPendingResult = 1;
Jesse Selover94c9a942019-01-16 01:18:0480// This constant can be any non-negative/non-zero value (eg: it does not
81// overlap with any value of the net::Error range, including net::OK).
82const int kCertVerifyPending = 1;
[email protected]4b768562013-02-16 04:10:0783
haavardm2d92e722014-12-19 13:45:4484// Default size of the internal BoringSSL buffers.
mmenke1beda3d2016-07-22 03:33:4585const int kDefaultOpenSSLBufferSize = 17 * 1024;
haavardm2d92e722014-12-19 13:45:4486
Eric Roman06bd9742019-07-13 15:19:1387base::Value NetLogPrivateKeyOperationParams(uint16_t algorithm,
88 SSLPrivateKey* key) {
Eric Romanb0436912019-04-30 23:38:4289 base::DictionaryValue value;
90 value.SetString("algorithm", SSL_get_signature_algorithm_name(
91 algorithm, 0 /* exclude curve */));
92 value.SetString("provider", key->GetProviderName());
davidben752bcf22015-12-21 22:55:5093 return std::move(value);
94}
95
Eric Roman06bd9742019-07-13 15:19:1396base::Value NetLogSSLInfoParams(SSLClientSocketImpl* socket) {
davidben281d13f02016-04-27 20:43:2897 SSLInfo ssl_info;
98 if (!socket->GetSSLInfo(&ssl_info))
Eric Romanb0436912019-04-30 23:38:4299 return base::Value();
davidben281d13f02016-04-27 20:43:28100
Eric Romanb0436912019-04-30 23:38:42101 base::DictionaryValue dict;
davidben281d13f02016-04-27 20:43:28102 const char* version_str;
103 SSLVersionToString(&version_str,
104 SSLConnectionStatusToVersion(ssl_info.connection_status));
Eric Romanb0436912019-04-30 23:38:42105 dict.SetString("version", version_str);
106 dict.SetBoolean("is_resumed",
107 ssl_info.handshake_type == SSLInfo::HANDSHAKE_RESUME);
108 dict.SetInteger("cipher_suite",
109 SSLConnectionStatusToCipherSuite(ssl_info.connection_status));
davidben281d13f02016-04-27 20:43:28110
Eric Romanb0436912019-04-30 23:38:42111 dict.SetString("next_proto",
112 NextProtoToString(socket->GetNegotiatedProtocol()));
davidben281d13f02016-04-27 20:43:28113
114 return std::move(dict);
115}
116
Eric Roman06bd9742019-07-13 15:19:13117base::Value NetLogSSLAlertParams(const void* bytes, size_t len) {
Eric Romanb0436912019-04-30 23:38:42118 base::DictionaryValue dict;
119 dict.SetKey("bytes", NetLogBinaryValue(bytes, len));
davidbencef9e212017-04-19 15:00:10120 return std::move(dict);
121}
122
Eric Roman06bd9742019-07-13 15:19:13123base::Value NetLogSSLMessageParams(bool is_write,
124 const void* bytes,
125 size_t len,
126 NetLogCaptureMode capture_mode) {
Eric Romanb0436912019-04-30 23:38:42127 base::DictionaryValue dict;
davidbencef9e212017-04-19 15:00:10128 if (len == 0) {
129 NOTREACHED();
130 return std::move(dict);
131 }
132
133 // The handshake message type is the first byte. Include it so elided messages
134 // still report their type.
135 uint8_t type = reinterpret_cast<const uint8_t*>(bytes)[0];
Eric Romanb0436912019-04-30 23:38:42136 dict.SetInteger("type", type);
davidbencef9e212017-04-19 15:00:10137
138 // Elide client certificate messages unless logging socket bytes. The client
139 // certificate does not contain information needed to impersonate the user
140 // (that's the private key which isn't sent over the wire), but it may contain
141 // information on the user's identity.
142 if (!is_write || type != SSL3_MT_CERTIFICATE ||
Eric Roman3124cde2019-07-10 22:26:15143 NetLogCaptureIncludesSocketBytes(capture_mode)) {
Eric Romanb0436912019-04-30 23:38:42144 dict.SetKey("bytes", NetLogBinaryValue(bytes, len));
davidbencef9e212017-04-19 15:00:10145 }
146
147 return std::move(dict);
148}
149
David Benjaminf8ebd2b2017-12-15 19:22:41150// This enum is used in histograms, so values may not be reused.
151enum class RSAKeyUsage {
152 // The TLS cipher suite was not RSA or ECDHE_RSA.
153 kNotRSA = 0,
154 // The Key Usage extension is not present, which is consistent with TLS usage.
155 kOKNoExtension = 1,
156 // The Key Usage extension has both the digitalSignature and keyEncipherment
157 // bits, which is consistent with TLS usage.
158 kOKHaveBoth = 2,
159 // The Key Usage extension contains only the digitalSignature bit, which is
160 // consistent with TLS usage.
161 kOKHaveDigitalSignature = 3,
162 // The Key Usage extension contains only the keyEncipherment bit, which is
163 // consistent with TLS usage.
164 kOKHaveKeyEncipherment = 4,
165 // The Key Usage extension is missing the digitalSignature bit.
166 kMissingDigitalSignature = 5,
167 // The Key Usage extension is missing the keyEncipherment bit.
168 kMissingKeyEncipherment = 6,
169 // There was an error processing the certificate.
170 kError = 7,
171
172 kLastValue = kError,
173};
174
175RSAKeyUsage CheckRSAKeyUsage(const X509Certificate* cert,
176 const SSL_CIPHER* cipher) {
177 bool need_key_encipherment = false;
178 switch (SSL_CIPHER_get_kx_nid(cipher)) {
179 case NID_kx_rsa:
180 need_key_encipherment = true;
181 break;
182 case NID_kx_ecdhe:
183 if (SSL_CIPHER_get_auth_nid(cipher) != NID_auth_rsa) {
184 return RSAKeyUsage::kNotRSA;
185 }
186 break;
187 default:
188 return RSAKeyUsage::kNotRSA;
189 }
190
191 const CRYPTO_BUFFER* buffer = cert->cert_buffer();
192 der::Input tbs_certificate_tlv;
193 der::Input signature_algorithm_tlv;
194 der::BitString signature_value;
195 ParsedTbsCertificate tbs;
196 if (!ParseCertificate(
197 der::Input(CRYPTO_BUFFER_data(buffer), CRYPTO_BUFFER_len(buffer)),
198 &tbs_certificate_tlv, &signature_algorithm_tlv, &signature_value,
199 nullptr) ||
200 !ParseTbsCertificate(tbs_certificate_tlv,
201 x509_util::DefaultParseCertificateOptions(), &tbs,
202 nullptr)) {
203 return RSAKeyUsage::kError;
204 }
205
206 if (!tbs.has_extensions) {
207 return RSAKeyUsage::kOKNoExtension;
208 }
209
210 std::map<der::Input, ParsedExtension> extensions;
211 if (!ParseExtensions(tbs.extensions_tlv, &extensions)) {
212 return RSAKeyUsage::kError;
213 }
214 ParsedExtension key_usage_ext;
215 if (!ConsumeExtension(KeyUsageOid(), &extensions, &key_usage_ext)) {
216 return RSAKeyUsage::kOKNoExtension;
217 }
218 der::BitString key_usage;
219 if (!ParseKeyUsage(key_usage_ext.value, &key_usage)) {
220 return RSAKeyUsage::kError;
221 }
222
223 bool have_digital_signature =
224 key_usage.AssertsBit(KEY_USAGE_BIT_DIGITAL_SIGNATURE);
225 bool have_key_encipherment =
226 key_usage.AssertsBit(KEY_USAGE_BIT_KEY_ENCIPHERMENT);
227 if (have_digital_signature && have_key_encipherment) {
228 return RSAKeyUsage::kOKHaveBoth;
229 }
230
231 if (need_key_encipherment) {
232 return have_key_encipherment ? RSAKeyUsage::kOKHaveKeyEncipherment
233 : RSAKeyUsage::kMissingKeyEncipherment;
234 }
235 return have_digital_signature ? RSAKeyUsage::kOKHaveDigitalSignature
236 : RSAKeyUsage::kMissingDigitalSignature;
237}
238
Adam Langley93cbfad12018-07-06 22:07:16239#if !defined(NET_DISABLE_BROTLI)
240int DecompressBrotliCert(SSL* ssl,
241 CRYPTO_BUFFER** out,
242 size_t uncompressed_len,
243 const uint8_t* in,
244 size_t in_len) {
245 uint8_t* data;
246 bssl::UniquePtr<CRYPTO_BUFFER> decompressed(
247 CRYPTO_BUFFER_alloc(&data, uncompressed_len));
248 if (!decompressed) {
249 return 0;
250 }
251
252 size_t output_size = uncompressed_len;
253 if (BrotliDecoderDecompress(in_len, in, &output_size, data) !=
254 BROTLI_DECODER_RESULT_SUCCESS ||
255 output_size != uncompressed_len) {
256 return 0;
257 }
258
259 *out = decompressed.release();
260 return 1;
261}
262#endif
263
[email protected]821e3bb2013-11-08 01:06:01264} // namespace
265
svaldeze83af292016-04-26 14:33:37266class SSLClientSocketImpl::SSLContext {
[email protected]fbef13932010-11-23 12:38:53267 public:
olli.raula36aa8be2015-09-10 11:14:22268 static SSLContext* GetInstance() {
fdoray33e7c3c52017-01-19 18:37:23269 return base::Singleton<SSLContext,
270 base::LeakySingletonTraits<SSLContext>>::get();
olli.raula36aa8be2015-09-10 11:14:22271 }
[email protected]fbef13932010-11-23 12:38:53272 SSL_CTX* ssl_ctx() { return ssl_ctx_.get(); }
[email protected]fbef13932010-11-23 12:38:53273
svaldeze83af292016-04-26 14:33:37274 SSLClientSocketImpl* GetClientSocketFromSSL(const SSL* ssl) {
[email protected]fbef13932010-11-23 12:38:53275 DCHECK(ssl);
svaldeze83af292016-04-26 14:33:37276 SSLClientSocketImpl* socket = static_cast<SSLClientSocketImpl*>(
[email protected]fbef13932010-11-23 12:38:53277 SSL_get_ex_data(ssl, ssl_socket_data_index_));
278 DCHECK(socket);
279 return socket;
280 }
281
svaldeze83af292016-04-26 14:33:37282 bool SetClientSocketForSSL(SSL* ssl, SSLClientSocketImpl* socket) {
[email protected]fbef13932010-11-23 12:38:53283 return SSL_set_ex_data(ssl, ssl_socket_data_index_, socket) != 0;
284 }
285
David Benjaminbd37c172018-07-11 17:24:57286 void SetSSLKeyLogger(std::unique_ptr<SSLKeyLogger> logger) {
davidben2a811e4e2015-12-01 10:49:34287 DCHECK(!ssl_key_logger_);
David Benjaminbd37c172018-07-11 17:24:57288 ssl_key_logger_ = std::move(logger);
davidben2a811e4e2015-12-01 10:49:34289 SSL_CTX_set_keylog_callback(ssl_ctx_.get(), KeyLogCallback);
290 }
davidben2a811e4e2015-12-01 10:49:34291
davidben1d489522015-07-01 18:48:46292 static const SSL_PRIVATE_KEY_METHOD kPrivateKeyMethod;
293
[email protected]fbef13932010-11-23 12:38:53294 private:
olli.raula36aa8be2015-09-10 11:14:22295 friend struct base::DefaultSingletonTraits<SSLContext>;
[email protected]fbef13932010-11-23 12:38:53296
Daniel McArdle3a663d62019-01-31 00:48:47297 SSLContext() {
[email protected]4b559b4d2011-04-14 17:37:14298 crypto::EnsureOpenSSLInit();
Raul Tambre94493c652019-03-11 17:18:35299 ssl_socket_data_index_ =
300 SSL_get_ex_new_index(0, nullptr, nullptr, nullptr, nullptr);
[email protected]fbef13932010-11-23 12:38:53301 DCHECK_NE(ssl_socket_data_index_, -1);
davidbena35b40c32017-03-09 17:33:45302 ssl_ctx_.reset(SSL_CTX_new(TLS_with_buffers_method()));
Raul Tambre94493c652019-03-11 17:18:35303 SSL_CTX_set_cert_cb(ssl_ctx_.get(), ClientCertRequestCallback, nullptr);
davidbena35b40c32017-03-09 17:33:45304
Jesse Selover94c9a942019-01-16 01:18:04305 // Verifies the server certificate even on resumed sessions.
306 SSL_CTX_set_reverify_on_resume(ssl_ctx_.get(), 1);
Steven Valdez3eaa9962017-07-18 21:51:05307 SSL_CTX_set_custom_verify(ssl_ctx_.get(), SSL_VERIFY_PEER,
Jesse Selover94c9a942019-01-16 01:18:04308 VerifyCertCallback);
davidbendafe4e52015-04-08 22:53:52309 // Disable the internal session cache. Session caching is handled
svaldeze83af292016-04-26 14:33:37310 // externally (i.e. by SSLClientSessionCache).
davidbendafe4e52015-04-08 22:53:52311 SSL_CTX_set_session_cache_mode(
312 ssl_ctx_.get(), SSL_SESS_CACHE_CLIENT | SSL_SESS_CACHE_NO_INTERNAL);
davidben44aeae62015-06-24 20:47:43313 SSL_CTX_sess_set_new_cb(ssl_ctx_.get(), NewSessionCallback);
davidben99ce6302016-11-09 17:30:28314 SSL_CTX_set_timeout(ssl_ctx_.get(), 1 * 60 * 60 /* one hour */);
nharper736ceda2015-11-07 00:16:59315
davidbenfacfac7b2016-09-27 22:39:53316 SSL_CTX_set_grease_enabled(ssl_ctx_.get(), 1);
317
davidbenbf0fcf12017-02-10 21:00:34318 // Deduplicate all certificates minted from the SSL_CTX in memory.
319 SSL_CTX_set0_buffer_pool(ssl_ctx_.get(), x509_util::GetBufferPool());
320
davidbencef9e212017-04-19 15:00:10321 SSL_CTX_set_msg_callback(ssl_ctx_.get(), MessageCallback);
Adam Langley93cbfad12018-07-06 22:07:16322
323#if !defined(NET_DISABLE_BROTLI)
324 SSL_CTX_add_cert_compression_alg(
325 ssl_ctx_.get(), TLSEXT_cert_compression_brotli,
326 nullptr /* compression not supported */, DecompressBrotliCert);
327#endif
Adam Langleybb7f87fa2019-01-25 02:03:10328
Adam Langleya0301772019-08-01 22:10:49329#if defined(ARCH_CPU_X86_64) || defined(ARCH_CPU_ARM64)
330 // CECPQ2b is only optimised for x86-64 and aarch64, and is too slow on
331 // other CPUs to even experiment with.
Adam Langleyc9c8d11d2019-07-31 20:21:46332 const std::string post_quantum_group = kPostQuantumGroup.Get();
333 if (!post_quantum_group.empty()) {
334 bool send_signal = false;
335 if (post_quantum_group == "Control") {
336 send_signal = true;
337 } else if (post_quantum_group == "CECPQ2") {
338 send_signal = true;
339 static const int kCurves[] = {NID_CECPQ2, NID_X25519,
340 NID_X9_62_prime256v1, NID_secp384r1};
341 SSL_CTX_set1_curves(ssl_ctx_.get(), kCurves, base::size(kCurves));
342 } else if (post_quantum_group == "CECPQ2b") {
343 send_signal = true;
344 static const int kCurves[] = {NID_CECPQ2b, NID_X25519,
345 NID_X9_62_prime256v1, NID_secp384r1};
346 SSL_CTX_set1_curves(ssl_ctx_.get(), kCurves, base::size(kCurves));
347 }
348
349 if (send_signal) {
350 SSL_CTX_enable_pq_experiment_signal(ssl_ctx_.get());
351 }
Adam Langleybb7f87fa2019-01-25 02:03:10352 }
Adam Langleya0301772019-08-01 22:10:49353#endif
[email protected]fbef13932010-11-23 12:38:53354 }
355
[email protected]82c59022014-08-15 09:38:27356 static int ClientCertRequestCallback(SSL* ssl, void* arg) {
svaldeze83af292016-04-26 14:33:37357 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
[email protected]82c59022014-08-15 09:38:27358 DCHECK(socket);
359 return socket->ClientCertRequestCallback(ssl);
[email protected]718c9672010-12-02 10:04:10360 }
361
davidben44aeae62015-06-24 20:47:43362 static int NewSessionCallback(SSL* ssl, SSL_SESSION* session) {
svaldeze83af292016-04-26 14:33:37363 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
davidben44aeae62015-06-24 20:47:43364 return socket->NewSessionCallback(session);
davidbendafe4e52015-04-08 22:53:52365 }
366
David Benjaminb9bafbe2017-11-07 21:41:38367 static ssl_private_key_result_t PrivateKeySignCallback(SSL* ssl,
368 uint8_t* out,
369 size_t* out_len,
370 size_t max_out,
371 uint16_t algorithm,
372 const uint8_t* in,
373 size_t in_len) {
svaldeze83af292016-04-26 14:33:37374 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
David Benjaminb9bafbe2017-11-07 21:41:38375 return socket->PrivateKeySignCallback(out, out_len, max_out, algorithm, in,
376 in_len);
davidben0bca07fd2016-07-18 15:12:03377 }
378
379 static ssl_private_key_result_t PrivateKeyCompleteCallback(SSL* ssl,
380 uint8_t* out,
381 size_t* out_len,
382 size_t max_out) {
383 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
384 return socket->PrivateKeyCompleteCallback(out, out_len, max_out);
davidben1d489522015-07-01 18:48:46385 }
386
davidben2a811e4e2015-12-01 10:49:34387 static void KeyLogCallback(const SSL* ssl, const char* line) {
388 GetInstance()->ssl_key_logger_->WriteLine(line);
389 }
davidben2a811e4e2015-12-01 10:49:34390
davidbencef9e212017-04-19 15:00:10391 static void MessageCallback(int is_write,
392 int version,
393 int content_type,
394 const void* buf,
395 size_t len,
396 SSL* ssl,
397 void* arg) {
398 SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
399 return socket->MessageCallback(is_write, content_type, buf, len);
400 }
401
[email protected]fbef13932010-11-23 12:38:53402 // This is the index used with SSL_get_ex_data to retrieve the owner
svaldeze83af292016-04-26 14:33:37403 // SSLClientSocketImpl object from an SSL instance.
[email protected]fbef13932010-11-23 12:38:53404 int ssl_socket_data_index_;
405
davidbend80c12c2016-10-11 00:13:49406 bssl::UniquePtr<SSL_CTX> ssl_ctx_;
davidbendafe4e52015-04-08 22:53:52407
danakj655b66c2016-04-16 00:51:38408 std::unique_ptr<SSLKeyLogger> ssl_key_logger_;
[email protected]1279de12013-12-03 15:13:32409};
410
davidben1d489522015-07-01 18:48:46411const SSL_PRIVATE_KEY_METHOD
svaldeze83af292016-04-26 14:33:37412 SSLClientSocketImpl::SSLContext::kPrivateKeyMethod = {
David Benjaminb9bafbe2017-11-07 21:41:38413 &SSLClientSocketImpl::SSLContext::PrivateKeySignCallback,
davidben0bca07fd2016-07-18 15:12:03414 nullptr /* decrypt */,
415 &SSLClientSocketImpl::SSLContext::PrivateKeyCompleteCallback,
davidben1d489522015-07-01 18:48:46416};
417
svaldeze83af292016-04-26 14:33:37418SSLClientSocketImpl::SSLClientSocketImpl(
David Benjamin24725be2019-07-24 20:57:18419 SSLClientContext* context,
Matt Menke841fc412019-03-05 23:20:12420 std::unique_ptr<StreamSocket> stream_socket,
[email protected]055d7f22010-11-15 12:03:12421 const HostPortPair& host_and_port,
David Benjamin24725be2019-07-24 20:57:18422 const SSLConfig& ssl_config)
Oscar Johanssond49464e2018-07-02 09:35:45423 : pending_read_error_(kSSLClientSocketNoPendingResult),
davidbenb8c23212014-10-28 00:12:16424 pending_read_ssl_error_(SSL_ERROR_NONE),
[email protected]64b5c892014-08-08 09:39:26425 completed_connect_(false),
[email protected]0dc88b32014-03-26 20:12:28426 was_ever_used_(false),
David Benjamin24725be2019-07-24 20:57:18427 context_(context),
Jesse Selover94c9a942019-01-16 01:18:04428 cert_verification_result_(kCertVerifyPending),
Matt Menke841fc412019-03-05 23:20:12429 stream_socket_(std::move(stream_socket)),
Matt Menkefd956922019-02-04 23:44:03430 host_and_port_(host_and_port),
431 ssl_config_(ssl_config),
Matt Menkefd956922019-02-04 23:44:03432 next_handshake_state_(STATE_NONE),
433 in_confirm_handshake_(false),
434 disconnected_(false),
435 negotiated_protocol_(kProtoUnknown),
436 certificate_requested_(false),
437 signature_result_(kSSLClientSocketNoPendingResult),
Matt Menkefd956922019-02-04 23:44:03438 pkp_bypassed_(false),
439 is_fatal_cert_error_(false),
Jeremy Romand54000b22019-07-08 18:40:16440 net_log_(stream_socket_->NetLog()) {
David Benjamin24725be2019-07-24 20:57:18441 CHECK(context_);
[email protected]8e458552014-08-05 00:02:15442}
[email protected]d518cd92010-09-29 12:27:44443
svaldeze83af292016-04-26 14:33:37444SSLClientSocketImpl::~SSLClientSocketImpl() {
[email protected]d518cd92010-09-29 12:27:44445 Disconnect();
446}
447
David Benjaminbd37c172018-07-11 17:24:57448void SSLClientSocketImpl::SetSSLKeyLogger(
449 std::unique_ptr<SSLKeyLogger> logger) {
450 SSLContext::GetInstance()->SetSSLKeyLogger(std::move(logger));
zhongyi81f85c6d92015-10-16 19:34:14451}
452
svaldeze83af292016-04-26 14:33:37453int SSLClientSocketImpl::ExportKeyingMaterial(const base::StringPiece& label,
454 bool has_context,
455 const base::StringPiece& context,
456 unsigned char* out,
457 unsigned int outlen) {
davidben86935f72015-05-06 22:24:49458 if (!IsConnected())
459 return ERR_SOCKET_NOT_CONNECTED;
460
[email protected]b9b651f2013-11-09 04:32:22461 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
462
davidbenf225b262016-09-15 22:09:22463 if (!SSL_export_keying_material(
davidbend80c12c2016-10-11 00:13:49464 ssl_.get(), out, outlen, label.data(), label.size(),
davidbenf225b262016-09-15 22:09:22465 reinterpret_cast<const unsigned char*>(context.data()),
466 context.length(), has_context ? 1 : 0)) {
467 LOG(ERROR) << "Failed to export keying material.";
468 return ERR_FAILED;
[email protected]b9b651f2013-11-09 04:32:22469 }
davidbenf225b262016-09-15 22:09:22470
[email protected]b9b651f2013-11-09 04:32:22471 return OK;
472}
473
Brad Lassey3a814172018-04-26 03:30:21474int SSLClientSocketImpl::Connect(CompletionOnceCallback callback) {
svaldez4af14d22015-08-20 13:48:24475 // Although StreamSocket does allow calling Connect() after Disconnect(),
476 // this has never worked for layered sockets. CHECK to detect any consumers
477 // reconnecting an SSL socket.
478 //
479 // TODO(davidben,mmenke): Remove this API feature. See
480 // https://crbug.com/499289.
481 CHECK(!disconnected_);
482
mikecirone8b85c432016-09-08 19:11:00483 net_log_.BeginEvent(NetLogEventType::SSL_CONNECT);
[email protected]b9b651f2013-11-09 04:32:22484
485 // Set up new ssl object.
[email protected]c8a80e92014-05-17 16:02:08486 int rv = Init();
487 if (rv != OK) {
davidben281d13f02016-04-27 20:43:28488 LogConnectEndEvent(rv);
[email protected]c8a80e92014-05-17 16:02:08489 return rv;
[email protected]b9b651f2013-11-09 04:32:22490 }
491
492 // Set SSL to client mode. Handshake happens in the loop below.
davidbend80c12c2016-10-11 00:13:49493 SSL_set_connect_state(ssl_.get());
[email protected]b9b651f2013-11-09 04:32:22494
rsleeviadbd4982016-06-13 22:10:27495 next_handshake_state_ = STATE_HANDSHAKE;
[email protected]c8a80e92014-05-17 16:02:08496 rv = DoHandshakeLoop(OK);
[email protected]b9b651f2013-11-09 04:32:22497 if (rv == ERR_IO_PENDING) {
Brad Lassey3a814172018-04-26 03:30:21498 user_connect_callback_ = std::move(callback);
[email protected]b9b651f2013-11-09 04:32:22499 } else {
davidben281d13f02016-04-27 20:43:28500 LogConnectEndEvent(rv);
[email protected]b9b651f2013-11-09 04:32:22501 }
502
503 return rv > OK ? OK : rv;
504}
505
svaldeze83af292016-04-26 14:33:37506void SSLClientSocketImpl::Disconnect() {
svaldez4af14d22015-08-20 13:48:24507 disconnected_ = true;
508
[email protected]b9b651f2013-11-09 04:32:22509 // Shut down anything that may call us back.
eroman7f9236a2015-05-11 21:23:43510 cert_verifier_request_.reset();
davidben67e83912016-10-12 18:36:32511 weak_factory_.InvalidateWeakPtrs();
davidben3418e81f2016-10-19 00:09:45512 transport_adapter_.reset();
[email protected]b9b651f2013-11-09 04:32:22513
davidben67e83912016-10-12 18:36:32514 // Release user callbacks.
[email protected]b9b651f2013-11-09 04:32:22515 user_connect_callback_.Reset();
516 user_read_callback_.Reset();
517 user_write_callback_.Reset();
Raul Tambre94493c652019-03-11 17:18:35518 user_read_buf_ = nullptr;
svaldeze83af292016-04-26 14:33:37519 user_read_buf_len_ = 0;
Raul Tambre94493c652019-03-11 17:18:35520 user_write_buf_ = nullptr;
svaldeze83af292016-04-26 14:33:37521 user_write_buf_len_ = 0;
[email protected]b9b651f2013-11-09 04:32:22522
Matt Menkefd956922019-02-04 23:44:03523 stream_socket_->Disconnect();
[email protected]b9b651f2013-11-09 04:32:22524}
525
Steven Valdez6af02df2018-07-15 21:52:33526// ConfirmHandshake may only be called on a connected socket and, like other
527// socket methods, there may only be one ConfirmHandshake operation in progress
528// at once.
529int SSLClientSocketImpl::ConfirmHandshake(CompletionOnceCallback callback) {
530 CHECK(completed_connect_);
531 CHECK(!in_confirm_handshake_);
532 if (!SSL_in_early_data(ssl_.get())) {
533 return OK;
534 }
535
536 net_log_.BeginEvent(NetLogEventType::SSL_CONFIRM_HANDSHAKE);
537 next_handshake_state_ = STATE_HANDSHAKE;
538 in_confirm_handshake_ = true;
539 int rv = DoHandshakeLoop(OK);
540 if (rv == ERR_IO_PENDING) {
541 user_connect_callback_ = std::move(callback);
542 } else {
543 net_log_.EndEvent(NetLogEventType::SSL_CONFIRM_HANDSHAKE);
544 in_confirm_handshake_ = false;
545 }
546
547 return rv > OK ? OK : rv;
548}
549
svaldeze83af292016-04-26 14:33:37550bool SSLClientSocketImpl::IsConnected() const {
davidben67e83912016-10-12 18:36:32551 // If the handshake has not yet completed or the socket has been explicitly
552 // disconnected.
553 if (!completed_connect_ || disconnected_)
[email protected]b9b651f2013-11-09 04:32:22554 return false;
555 // If an asynchronous operation is still pending.
556 if (user_read_buf_.get() || user_write_buf_.get())
557 return true;
558
Matt Menkefd956922019-02-04 23:44:03559 return stream_socket_->IsConnected();
[email protected]b9b651f2013-11-09 04:32:22560}
561
svaldeze83af292016-04-26 14:33:37562bool SSLClientSocketImpl::IsConnectedAndIdle() const {
davidben67e83912016-10-12 18:36:32563 // If the handshake has not yet completed or the socket has been explicitly
564 // disconnected.
565 if (!completed_connect_ || disconnected_)
[email protected]b9b651f2013-11-09 04:32:22566 return false;
567 // If an asynchronous operation is still pending.
568 if (user_read_buf_.get() || user_write_buf_.get())
569 return false;
davidbenfc9a6b82015-04-15 23:47:32570
571 // If there is data read from the network that has not yet been consumed, do
572 // not treat the connection as idle.
573 //
davidben3418e81f2016-10-19 00:09:45574 // Note that this does not check whether there is ciphertext that has not yet
575 // been flushed to the network. |Write| returns early, so this can cause race
576 // conditions which cause a socket to not be treated reusable when it should
577 // be. See https://crbug.com/466147.
578 if (transport_adapter_->HasPendingReadData())
[email protected]b9b651f2013-11-09 04:32:22579 return false;
[email protected]b9b651f2013-11-09 04:32:22580
Matt Menkefd956922019-02-04 23:44:03581 return stream_socket_->IsConnectedAndIdle();
[email protected]b9b651f2013-11-09 04:32:22582}
583
svaldeze83af292016-04-26 14:33:37584int SSLClientSocketImpl::GetPeerAddress(IPEndPoint* addressList) const {
Matt Menkefd956922019-02-04 23:44:03585 return stream_socket_->GetPeerAddress(addressList);
[email protected]b9b651f2013-11-09 04:32:22586}
587
svaldeze83af292016-04-26 14:33:37588int SSLClientSocketImpl::GetLocalAddress(IPEndPoint* addressList) const {
Matt Menkefd956922019-02-04 23:44:03589 return stream_socket_->GetLocalAddress(addressList);
[email protected]b9b651f2013-11-09 04:32:22590}
591
tfarina428341112016-09-22 13:38:20592const NetLogWithSource& SSLClientSocketImpl::NetLog() const {
[email protected]b9b651f2013-11-09 04:32:22593 return net_log_;
594}
595
svaldeze83af292016-04-26 14:33:37596bool SSLClientSocketImpl::WasEverUsed() const {
[email protected]0dc88b32014-03-26 20:12:28597 return was_ever_used_;
[email protected]b9b651f2013-11-09 04:32:22598}
599
tfarina2846404c2016-12-25 14:31:37600bool SSLClientSocketImpl::WasAlpnNegotiated() const {
bnc3cf2a592016-08-11 14:48:36601 return negotiated_protocol_ != kProtoUnknown;
602}
603
604NextProto SSLClientSocketImpl::GetNegotiatedProtocol() const {
605 return negotiated_protocol_;
606}
607
svaldeze83af292016-04-26 14:33:37608bool SSLClientSocketImpl::GetSSLInfo(SSLInfo* ssl_info) {
[email protected]b9b651f2013-11-09 04:32:22609 ssl_info->Reset();
davidbenc7e06c92017-03-07 18:54:11610 if (!server_cert_)
[email protected]b9b651f2013-11-09 04:32:22611 return false;
612
613 ssl_info->cert = server_cert_verify_result_.verified_cert;
estark03d644f2015-06-13 00:11:32614 ssl_info->unverified_cert = server_cert_;
[email protected]b9b651f2013-11-09 04:32:22615 ssl_info->cert_status = server_cert_verify_result_.cert_status;
616 ssl_info->is_issued_by_known_root =
617 server_cert_verify_result_.is_issued_by_known_root;
dadriandf302c42016-06-10 18:48:59618 ssl_info->pkp_bypassed = pkp_bypassed_;
svaldeze83af292016-04-26 14:33:37619 ssl_info->public_key_hashes = server_cert_verify_result_.public_key_hashes;
[email protected]b9b651f2013-11-09 04:32:22620 ssl_info->client_cert_sent =
621 ssl_config_.send_client_cert && ssl_config_.client_cert.get();
[email protected]8bd4e7a2014-08-09 14:49:17622 ssl_info->pinning_failure_log = pinning_failure_log_;
dadrian612337a2016-07-20 22:36:58623 ssl_info->ocsp_result = server_cert_verify_result_.ocsp_result;
Carlos IL81133382017-12-06 17:18:45624 ssl_info->is_fatal_cert_error = is_fatal_cert_error_;
estark723b5eeb2016-02-18 21:01:12625 AddCTInfoToSSLInfo(ssl_info);
davidbeneb5f8ef32014-09-04 14:14:32626
davidbend80c12c2016-10-11 00:13:49627 const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_.get());
[email protected]b9b651f2013-11-09 04:32:22628 CHECK(cipher);
davidben3b00e402016-09-20 14:31:06629 // Historically, the "group" was known as "curve".
davidbend80c12c2016-10-11 00:13:49630 ssl_info->key_exchange_group = SSL_get_curve_id(ssl_.get());
David Benjamine7e073ef2018-10-25 01:26:06631 ssl_info->peer_signature_algorithm =
632 SSL_get_peer_signature_algorithm(ssl_.get());
Adam Langleyc9c8d11d2019-07-31 20:21:46633 ssl_info->server_in_post_quantum_experiment =
634 SSL_pq_experiment_signal_seen(ssl_.get());
[email protected]b9b651f2013-11-09 04:32:22635
ryanchung987b2ff2016-02-19 00:17:12636 SSLConnectionStatusSetCipherSuite(
637 static_cast<uint16_t>(SSL_CIPHER_get_id(cipher)),
638 &ssl_info->connection_status);
davidbend80c12c2016-10-11 00:13:49639 SSLConnectionStatusSetVersion(GetNetSSLVersion(ssl_.get()),
ryanchung987b2ff2016-02-19 00:17:12640 &ssl_info->connection_status);
[email protected]b9b651f2013-11-09 04:32:22641
davidbend80c12c2016-10-11 00:13:49642 ssl_info->handshake_type = SSL_session_reused(ssl_.get())
svaldeze83af292016-04-26 14:33:37643 ? SSLInfo::HANDSHAKE_RESUME
644 : SSLInfo::HANDSHAKE_FULL;
[email protected]b9b651f2013-11-09 04:32:22645
[email protected]b9b651f2013-11-09 04:32:22646 return true;
647}
648
svaldeze83af292016-04-26 14:33:37649void SSLClientSocketImpl::GetConnectionAttempts(ConnectionAttempts* out) const {
ttuttle23fdb7b2015-05-15 01:28:03650 out->clear();
651}
652
svaldeze83af292016-04-26 14:33:37653int64_t SSLClientSocketImpl::GetTotalReceivedBytes() const {
Matt Menkefd956922019-02-04 23:44:03654 return stream_socket_->GetTotalReceivedBytes();
tbansalf82cc8e2015-10-14 20:05:49655}
656
xunjieli998d2472017-01-12 01:12:28657void SSLClientSocketImpl::DumpMemoryStats(SocketMemoryStats* stats) const {
658 if (transport_adapter_)
659 stats->buffer_size = transport_adapter_->GetAllocationSize();
davidbena35b40c32017-03-09 17:33:45660 const STACK_OF(CRYPTO_BUFFER)* server_cert_chain =
661 SSL_get0_peer_certificates(ssl_.get());
davidbenc7e06c92017-03-07 18:54:11662 if (server_cert_chain) {
David Benjamin8a4bc32b2018-03-30 15:24:53663 for (const CRYPTO_BUFFER* cert : server_cert_chain) {
davidbena35b40c32017-03-09 17:33:45664 stats->cert_size += CRYPTO_BUFFER_len(cert);
xunjieli9f8c5fb52016-12-07 22:59:33665 }
davidbena35b40c32017-03-09 17:33:45666 stats->cert_count = sk_CRYPTO_BUFFER_num(server_cert_chain);
xunjieli9f8c5fb52016-12-07 22:59:33667 }
xunjieliffe62df62017-02-23 18:22:41668 stats->total_size = stats->buffer_size + stats->cert_size;
xunjieli9f8c5fb52016-12-07 22:59:33669}
670
Bence Békydae8af5f2018-04-13 08:53:17671void SSLClientSocketImpl::GetSSLCertRequestInfo(
672 SSLCertRequestInfo* cert_request_info) const {
673 if (!ssl_) {
674 NOTREACHED();
675 return;
676 }
677
678 cert_request_info->host_and_port = host_and_port_;
679
680 cert_request_info->cert_authorities.clear();
681 const STACK_OF(CRYPTO_BUFFER)* authorities =
682 SSL_get0_server_requested_CAs(ssl_.get());
683 for (const CRYPTO_BUFFER* ca_name : authorities) {
684 cert_request_info->cert_authorities.push_back(
685 std::string(reinterpret_cast<const char*>(CRYPTO_BUFFER_data(ca_name)),
686 CRYPTO_BUFFER_len(ca_name)));
687 }
688
689 cert_request_info->cert_key_types.clear();
690 const uint8_t* client_cert_types;
691 size_t num_client_cert_types =
692 SSL_get0_certificate_types(ssl_.get(), &client_cert_types);
693 for (size_t i = 0; i < num_client_cert_types; i++) {
694 cert_request_info->cert_key_types.push_back(
695 static_cast<SSLClientCertType>(client_cert_types[i]));
696 }
697}
698
Paul Jensen0f49dec2017-12-12 23:39:58699void SSLClientSocketImpl::ApplySocketTag(const SocketTag& tag) {
Matt Menkefd956922019-02-04 23:44:03700 return stream_socket_->ApplySocketTag(tag);
Paul Jensen0f49dec2017-12-12 23:39:58701}
702
svaldeze83af292016-04-26 14:33:37703int SSLClientSocketImpl::Read(IOBuffer* buf,
704 int buf_len,
Brad Lassey3a814172018-04-26 03:30:21705 CompletionOnceCallback callback) {
706 int rv = ReadIfReady(buf, buf_len, std::move(callback));
xunjieli321a96f32017-03-07 19:42:17707 if (rv == ERR_IO_PENDING) {
708 user_read_buf_ = buf;
709 user_read_buf_len_ = buf_len;
710 }
711 return rv;
712}
[email protected]b9b651f2013-11-09 04:32:22713
xunjieli321a96f32017-03-07 19:42:17714int SSLClientSocketImpl::ReadIfReady(IOBuffer* buf,
715 int buf_len,
Brad Lassey3a814172018-04-26 03:30:21716 CompletionOnceCallback callback) {
xunjieli321a96f32017-03-07 19:42:17717 int rv = DoPayloadRead(buf, buf_len);
[email protected]b9b651f2013-11-09 04:32:22718
719 if (rv == ERR_IO_PENDING) {
Brad Lassey3a814172018-04-26 03:30:21720 user_read_callback_ = std::move(callback);
[email protected]b9b651f2013-11-09 04:32:22721 } else {
[email protected]0dc88b32014-03-26 20:12:28722 if (rv > 0)
723 was_ever_used_ = true;
[email protected]b9b651f2013-11-09 04:32:22724 }
[email protected]b9b651f2013-11-09 04:32:22725 return rv;
726}
727
Helen Li5f3d96a2018-08-10 20:37:24728int SSLClientSocketImpl::CancelReadIfReady() {
Matt Menkefd956922019-02-04 23:44:03729 int result = stream_socket_->CancelReadIfReady();
Helen Li5f3d96a2018-08-10 20:37:24730 // Cancel |user_read_callback_|, because caller does not expect the callback
731 // to be invoked after they have canceled the ReadIfReady.
732 user_read_callback_.Reset();
733 return result;
734}
735
[email protected]a2b2cfc2017-12-06 09:06:08736int SSLClientSocketImpl::Write(
737 IOBuffer* buf,
738 int buf_len,
Brad Lassey3a814172018-04-26 03:30:21739 CompletionOnceCallback callback,
[email protected]a2b2cfc2017-12-06 09:06:08740 const NetworkTrafficAnnotationTag& traffic_annotation) {
[email protected]b9b651f2013-11-09 04:32:22741 user_write_buf_ = buf;
742 user_write_buf_len_ = buf_len;
743
davidben3418e81f2016-10-19 00:09:45744 int rv = DoPayloadWrite();
[email protected]b9b651f2013-11-09 04:32:22745
746 if (rv == ERR_IO_PENDING) {
Brad Lassey3a814172018-04-26 03:30:21747 user_write_callback_ = std::move(callback);
[email protected]b9b651f2013-11-09 04:32:22748 } else {
[email protected]0dc88b32014-03-26 20:12:28749 if (rv > 0)
750 was_ever_used_ = true;
Raul Tambre94493c652019-03-11 17:18:35751 user_write_buf_ = nullptr;
[email protected]b9b651f2013-11-09 04:32:22752 user_write_buf_len_ = 0;
753 }
754
755 return rv;
756}
757
svaldeze83af292016-04-26 14:33:37758int SSLClientSocketImpl::SetReceiveBufferSize(int32_t size) {
Matt Menkefd956922019-02-04 23:44:03759 return stream_socket_->SetReceiveBufferSize(size);
[email protected]b9b651f2013-11-09 04:32:22760}
761
svaldeze83af292016-04-26 14:33:37762int SSLClientSocketImpl::SetSendBufferSize(int32_t size) {
Matt Menkefd956922019-02-04 23:44:03763 return stream_socket_->SetSendBufferSize(size);
[email protected]b9b651f2013-11-09 04:32:22764}
765
davidben3418e81f2016-10-19 00:09:45766void SSLClientSocketImpl::OnReadReady() {
767 // During a renegotiation, either Read or Write calls may be blocked on a
768 // transport read.
769 RetryAllOperations();
770}
771
772void SSLClientSocketImpl::OnWriteReady() {
773 // During a renegotiation, either Read or Write calls may be blocked on a
774 // transport read.
775 RetryAllOperations();
776}
777
Steven Valdezeec684e3e2018-12-13 16:28:23778static bool EnforceTLS13DowngradeForKnownRootsOnly() {
779 return base::FeatureList::IsEnabled(features::kEnforceTLS13Downgrade) &&
780 base::GetFieldTrialParamByFeatureAsBool(
781 features::kEnforceTLS13Downgrade, "known_roots_only", true);
782}
783
svaldeze83af292016-04-26 14:33:37784int SSLClientSocketImpl::Init() {
[email protected]9e733f32010-10-04 18:19:08785 DCHECK(!ssl_);
[email protected]9e733f32010-10-04 18:19:08786
[email protected]b29af7d2010-12-14 11:52:47787 SSLContext* context = SSLContext::GetInstance();
[email protected]4b559b4d2011-04-14 17:37:14788 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
[email protected]d518cd92010-09-29 12:27:44789
davidbend80c12c2016-10-11 00:13:49790 ssl_.reset(SSL_new(context->ssl_ctx()));
791 if (!ssl_ || !context->SetClientSocketForSSL(ssl_.get(), this))
[email protected]c8a80e92014-05-17 16:02:08792 return ERR_UNEXPECTED;
[email protected]fbef13932010-11-23 12:38:53793
davidben9bc0466f2015-06-16 22:21:27794 // SNI should only contain valid DNS hostnames, not IP addresses (see RFC
795 // 6066, Section 3).
796 //
797 // TODO(rsleevi): Should this code allow hostnames that violate the LDH rule?
798 // See https://crbug.com/496472 and https://crbug.com/496468 for discussion.
martijna2e83bd2016-03-18 13:10:45799 IPAddress unused;
800 if (!unused.AssignFromIPLiteral(host_and_port_.host()) &&
davidbend80c12c2016-10-11 00:13:49801 !SSL_set_tlsext_host_name(ssl_.get(), host_and_port_.host().c_str())) {
[email protected]c8a80e92014-05-17 16:02:08802 return ERR_UNEXPECTED;
davidben9bc0466f2015-06-16 22:21:27803 }
[email protected]fbef13932010-11-23 12:38:53804
Daniel McArdle3a663d62019-01-31 00:48:47805 if (IsCachingEnabled()) {
David Benjamin24725be2019-07-24 20:57:18806 bssl::UniquePtr<SSL_SESSION> session =
807 context_->ssl_client_session_cache()->Lookup(
808 GetSessionCacheKey(/*dest_ip_addr=*/base::nullopt));
Adam Langley26cf55a2019-07-01 21:14:57809 if (!session) {
810 // If a previous session negotiated an RSA cipher suite then it may have
811 // been inserted into the cache keyed by both hostname and resolved IP
812 // address. See https://crbug.com/969684.
813 IPEndPoint peer_address;
814 if (stream_socket_->GetPeerAddress(&peer_address) == OK) {
David Benjamin24725be2019-07-24 20:57:18815 session = context_->ssl_client_session_cache()->Lookup(
Adam Langley26cf55a2019-07-01 21:14:57816 GetSessionCacheKey(peer_address.address()));
817 }
818 }
David Benjaminb3840f42017-08-03 15:50:16819 if (session)
820 SSL_set_session(ssl_.get(), session.get());
821 }
[email protected]d518cd92010-09-29 12:27:44822
Helen Lif3aa9622018-05-24 00:18:07823 transport_adapter_.reset(
Matt Menke841fc412019-03-05 23:20:12824 new SocketBIOAdapter(stream_socket_.get(), kDefaultOpenSSLBufferSize,
Helen Lif3aa9622018-05-24 00:18:07825 kDefaultOpenSSLBufferSize, this));
davidben3418e81f2016-10-19 00:09:45826 BIO* transport_bio = transport_adapter_->bio();
mmenke1beda3d2016-07-22 03:33:45827
davidben3418e81f2016-10-19 00:09:45828 BIO_up_ref(transport_bio); // SSL_set0_rbio takes ownership.
829 SSL_set0_rbio(ssl_.get(), transport_bio);
haavardm2d92e722014-12-19 13:45:44830
davidben3418e81f2016-10-19 00:09:45831 BIO_up_ref(transport_bio); // SSL_set0_wbio takes ownership.
832 SSL_set0_wbio(ssl_.get(), transport_bio);
[email protected]d518cd92010-09-29 12:27:44833
David Benjamin151ec6b2019-08-02 19:38:52834 uint16_t version_min =
835 ssl_config_.version_min_override.value_or(context_->config().version_min);
836 uint16_t version_max =
837 ssl_config_.version_max_override.value_or(context_->config().version_max);
838 DCHECK_LT(SSL3_VERSION, version_min);
839 DCHECK_LT(SSL3_VERSION, version_max);
840 if (!SSL_set_min_proto_version(ssl_.get(), version_min) ||
841 !SSL_set_max_proto_version(ssl_.get(), version_max)) {
davidben952bdf22016-09-21 23:42:16842 return ERR_UNEXPECTED;
843 }
davidbenb937d6c2015-05-14 04:53:42844
Steven Valdez6af02df2018-07-15 21:52:33845 SSL_set_early_data_enabled(ssl_.get(), ssl_config_.early_data_enabled);
846
Steven Valdez50a3d2c92018-11-14 19:45:59847 if (!base::FeatureList::IsEnabled(features::kEnforceTLS13Downgrade) ||
Steven Valdezeec684e3e2018-12-13 16:28:23848 EnforceTLS13DowngradeForKnownRootsOnly()) {
David Benjamin570460e2018-10-16 06:01:29849 SSL_set_ignore_tls13_downgrade(ssl_.get(), 1);
850 }
851
[email protected]9e733f32010-10-04 18:19:08852 // OpenSSL defaults some options to on, others to off. To avoid ambiguity,
853 // set everything we care about to an absolute value.
[email protected]fb10e2282010-12-01 17:08:48854 SslSetClearMask options;
[email protected]d0f00492012-08-03 22:35:13855 options.ConfigureFlag(SSL_OP_NO_COMPRESSION, true);
[email protected]9e733f32010-10-04 18:19:08856
857 // TODO(joth): Set this conditionally, see http://crbug.com/55410
[email protected]fb10e2282010-12-01 17:08:48858 options.ConfigureFlag(SSL_OP_LEGACY_SERVER_CONNECT, true);
[email protected]9e733f32010-10-04 18:19:08859
davidbend80c12c2016-10-11 00:13:49860 SSL_set_options(ssl_.get(), options.set_mask);
861 SSL_clear_options(ssl_.get(), options.clear_mask);
[email protected]9e733f32010-10-04 18:19:08862
[email protected]fb10e2282010-12-01 17:08:48863 // Same as above, this time for the SSL mode.
864 SslSetClearMask mode;
[email protected]9e733f32010-10-04 18:19:08865
[email protected]fb10e2282010-12-01 17:08:48866 mode.ConfigureFlag(SSL_MODE_RELEASE_BUFFERS, true);
ishermane5c05e12014-09-09 20:32:15867 mode.ConfigureFlag(SSL_MODE_CBC_RECORD_SPLITTING, true);
[email protected]fb10e2282010-12-01 17:08:48868
davidben818d93b2015-02-19 22:27:32869 mode.ConfigureFlag(SSL_MODE_ENABLE_FALSE_START,
[email protected]b788de02014-04-23 18:06:07870 ssl_config_.false_start_enabled);
871
davidbend80c12c2016-10-11 00:13:49872 SSL_set_mode(ssl_.get(), mode.set_mask);
873 SSL_clear_mode(ssl_.get(), mode.clear_mask);
[email protected]109805a2010-12-07 18:17:06874
Steven Valdez99a85a62018-05-03 18:13:45875 // Use BoringSSL defaults, but disable HMAC-SHA1 ciphers in ECDSA. These are
876 // the remaining CBC-mode ECDSA ciphers.
877 std::string command("ALL::!aPSK:!ECDSA+SHA1");
davidben9b4a9b9c2015-10-12 18:46:51878
879 if (ssl_config_.require_ecdhe)
davidben1863716b2017-05-03 20:06:20880 command.append(":!kRSA");
davidben8ecc3072014-09-03 23:19:09881
davidben9b4a9b9c2015-10-12 18:46:51882 // Remove any disabled ciphers.
David Benjamin151ec6b2019-08-02 19:38:52883 for (uint16_t id : context_->config().disabled_cipher_suites) {
davidben9b4a9b9c2015-10-12 18:46:51884 const SSL_CIPHER* cipher = SSL_get_cipher_by_value(id);
885 if (cipher) {
886 command.append(":!");
887 command.append(SSL_CIPHER_get_name(cipher));
888 }
889 }
890
davidben1863716b2017-05-03 20:06:20891 if (!SSL_set_strict_cipher_list(ssl_.get(), command.c_str())) {
892 LOG(ERROR) << "SSL_set_cipher_list('" << command << "') failed";
893 return ERR_UNEXPECTED;
894 }
[email protected]ee0f2aa82013-10-25 11:59:26895
bnc1f295372015-10-21 23:24:22896 if (!ssl_config_.alpn_protos.empty()) {
bnc988e68d2016-06-27 14:03:21897 std::vector<uint8_t> wire_protos =
898 SerializeNextProtos(ssl_config_.alpn_protos);
David Benjamin0627236e2019-06-27 02:01:18899 SSL_set_alpn_protos(ssl_.get(), wire_protos.data(), wire_protos.size());
[email protected]abc44b752014-07-30 03:52:15900 }
901
Ryan Sleevid1a894e2018-04-03 20:24:07902 SSL_enable_signed_cert_timestamps(ssl_.get());
903 SSL_enable_ocsp_stapling(ssl_.get());
davidbeneb5f8ef32014-09-04 14:14:32904
davidben971a681a2017-02-16 18:57:46905 // Configure BoringSSL to allow renegotiations. Once the initial handshake
906 // completes, if renegotiations are not allowed, the default reject value will
907 // be restored. This is done in this order to permit a BoringSSL
908 // optimization. See https://crbug.com/boringssl/123.
909 SSL_set_renegotiate_mode(ssl_.get(), ssl_renegotiate_freely);
910
David Benjamin8373dea2018-05-07 15:39:10911 SSL_set_shed_handshake_config(ssl_.get(), 1);
[email protected]c8a80e92014-05-17 16:02:08912 return OK;
[email protected]d518cd92010-09-29 12:27:44913}
914
svaldeze83af292016-04-26 14:33:37915void SSLClientSocketImpl::DoReadCallback(int rv) {
[email protected]b9b651f2013-11-09 04:32:22916 // Since Run may result in Read being called, clear |user_read_callback_|
917 // up front.
[email protected]0dc88b32014-03-26 20:12:28918 if (rv > 0)
919 was_ever_used_ = true;
xunjieli321a96f32017-03-07 19:42:17920 user_read_buf_ = nullptr;
[email protected]b9b651f2013-11-09 04:32:22921 user_read_buf_len_ = 0;
Brad Lassey3a814172018-04-26 03:30:21922 std::move(user_read_callback_).Run(rv);
[email protected]b9b651f2013-11-09 04:32:22923}
924
svaldeze83af292016-04-26 14:33:37925void SSLClientSocketImpl::DoWriteCallback(int rv) {
[email protected]b9b651f2013-11-09 04:32:22926 // Since Run may result in Write being called, clear |user_write_callback_|
927 // up front.
[email protected]0dc88b32014-03-26 20:12:28928 if (rv > 0)
929 was_ever_used_ = true;
Raul Tambre94493c652019-03-11 17:18:35930 user_write_buf_ = nullptr;
[email protected]b9b651f2013-11-09 04:32:22931 user_write_buf_len_ = 0;
Brad Lassey3a814172018-04-26 03:30:21932 std::move(user_write_callback_).Run(rv);
[email protected]b9b651f2013-11-09 04:32:22933}
934
svaldeze83af292016-04-26 14:33:37935int SSLClientSocketImpl::DoHandshake() {
[email protected]b9b651f2013-11-09 04:32:22936 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
vadimt5a243282014-12-24 00:26:16937
David Benjamin5f98efe2018-04-12 07:32:41938 int rv = SSL_do_handshake(ssl_.get());
davidbenc4212c02015-05-12 22:30:18939 int net_error = OK;
940 if (rv <= 0) {
davidbend80c12c2016-10-11 00:13:49941 int ssl_error = SSL_get_error(ssl_.get(), rv);
davidbenced4aa9b2015-05-12 21:22:35942 if (ssl_error == SSL_ERROR_WANT_X509_LOOKUP &&
943 !ssl_config_.send_client_cert) {
944 return ERR_SSL_CLIENT_AUTH_CERT_NEEDED;
945 }
davidben1d489522015-07-01 18:48:46946 if (ssl_error == SSL_ERROR_WANT_PRIVATE_KEY_OPERATION) {
svaldez7872fd02015-11-19 21:10:54947 DCHECK(ssl_config_.client_private_key);
Oscar Johanssond49464e2018-07-02 09:35:45948 DCHECK_NE(kSSLClientSocketNoPendingResult, signature_result_);
rsleeviadbd4982016-06-13 22:10:27949 next_handshake_state_ = STATE_HANDSHAKE;
davidben1d489522015-07-01 18:48:46950 return ERR_IO_PENDING;
951 }
Jesse Selover94c9a942019-01-16 01:18:04952 if (ssl_error == SSL_ERROR_WANT_CERTIFICATE_VERIFY) {
953 DCHECK(cert_verifier_request_);
954 next_handshake_state_ = STATE_HANDSHAKE;
955 return ERR_IO_PENDING;
956 }
[email protected]b9b651f2013-11-09 04:32:22957
davidbena4409c62014-08-27 17:05:51958 OpenSSLErrorInfo error_info;
davidbenfe132d92016-09-27 18:07:21959 net_error = MapLastOpenSSLError(ssl_error, err_tracer, &error_info);
[email protected]b9b651f2013-11-09 04:32:22960 if (net_error == ERR_IO_PENDING) {
davidbenc4212c02015-05-12 22:30:18961 // If not done, stay in this state
rsleeviadbd4982016-06-13 22:10:27962 next_handshake_state_ = STATE_HANDSHAKE;
davidbenc4212c02015-05-12 22:30:18963 return ERR_IO_PENDING;
964 }
965
966 LOG(ERROR) << "handshake failed; returned " << rv << ", SSL error code "
967 << ssl_error << ", net_error " << net_error;
Eric Roman06bd9742019-07-13 15:19:13968 NetLogOpenSSLError(net_log_, NetLogEventType::SSL_HANDSHAKE_ERROR,
969 net_error, ssl_error, error_info);
davidbenc4212c02015-05-12 22:30:18970 }
971
rsleeviadbd4982016-06-13 22:10:27972 next_handshake_state_ = STATE_HANDSHAKE_COMPLETE;
davidbenc4212c02015-05-12 22:30:18973 return net_error;
974}
975
svaldeze83af292016-04-26 14:33:37976int SSLClientSocketImpl::DoHandshakeComplete(int result) {
davidbenc4212c02015-05-12 22:30:18977 if (result < 0)
978 return result;
979
Steven Valdez6af02df2018-07-15 21:52:33980 if (in_confirm_handshake_) {
981 next_handshake_state_ = STATE_NONE;
982 return OK;
983 }
984
Raul Tambre94493c652019-03-11 17:18:35985 const uint8_t* alpn_proto = nullptr;
bncce6ea242016-09-15 20:22:32986 unsigned alpn_len = 0;
davidbend80c12c2016-10-11 00:13:49987 SSL_get0_alpn_selected(ssl_.get(), &alpn_proto, &alpn_len);
bncce6ea242016-09-15 20:22:32988 if (alpn_len > 0) {
989 base::StringPiece proto(reinterpret_cast<const char*>(alpn_proto),
990 alpn_len);
991 negotiated_protocol_ = NextProtoFromString(proto);
[email protected]b9b651f2013-11-09 04:32:22992 }
davidbenc4212c02015-05-12 22:30:18993
bncbd442c22016-09-14 20:49:16994 RecordNegotiatedProtocol();
davidbenc4212c02015-05-12 22:30:18995
dadriand476e652016-07-26 21:33:24996 const uint8_t* ocsp_response_raw;
997 size_t ocsp_response_len;
davidbend80c12c2016-10-11 00:13:49998 SSL_get0_ocsp_response(ssl_.get(), &ocsp_response_raw, &ocsp_response_len);
dadriand476e652016-07-26 21:33:24999 set_stapled_ocsp_response_received(ocsp_response_len != 0);
davidbenc4212c02015-05-12 22:30:181000
1001 const uint8_t* sct_list;
1002 size_t sct_list_len;
davidbend80c12c2016-10-11 00:13:491003 SSL_get0_signed_cert_timestamp_list(ssl_.get(), &sct_list, &sct_list_len);
davidbenc4212c02015-05-12 22:30:181004 set_signed_cert_timestamps_received(sct_list_len != 0);
1005
davidben971a681a2017-02-16 18:57:461006 if (!IsRenegotiationAllowed())
1007 SSL_set_renegotiate_mode(ssl_.get(), ssl_renegotiate_never);
davidbenc4212c02015-05-12 22:30:181008
davidbend80c12c2016-10-11 00:13:491009 uint16_t signature_algorithm = SSL_get_peer_signature_algorithm(ssl_.get());
davidben0653c8d2016-07-08 02:16:171010 if (signature_algorithm != 0) {
Ilya Sherman0eb39802017-12-08 20:58:181011 base::UmaHistogramSparse("Net.SSLSignatureAlgorithm", signature_algorithm);
davidben4fe4f982015-11-11 22:00:121012 }
1013
Jesse Seloverdaf87902018-12-03 20:44:301014 SSLInfo ssl_info;
1015 bool ok = GetSSLInfo(&ssl_info);
Jesse Selover94c9a942019-01-16 01:18:041016 // Ensure the verify callback was called, and got far enough to fill
1017 // in server_cert_.
1018 CHECK(ok);
Jesse Seloverdaf87902018-12-03 20:44:301019
1020 // See how feasible enforcing RSA key usage would be. See
1021 // https://crbug.com/795089.
1022 RSAKeyUsage rsa_key_usage =
1023 CheckRSAKeyUsage(server_cert_.get(), SSL_get_current_cipher(ssl_.get()));
1024 if (rsa_key_usage != RSAKeyUsage::kNotRSA) {
1025 if (server_cert_verify_result_.is_issued_by_known_root) {
1026 UMA_HISTOGRAM_ENUMERATION("Net.SSLRSAKeyUsage.KnownRoot", rsa_key_usage,
1027 static_cast<int>(RSAKeyUsage::kLastValue) + 1);
1028 } else {
1029 UMA_HISTOGRAM_ENUMERATION("Net.SSLRSAKeyUsage.UnknownRoot", rsa_key_usage,
1030 static_cast<int>(RSAKeyUsage::kLastValue) + 1);
1031 }
1032 }
1033
Jesse Seloverdaf87902018-12-03 20:44:301034 if (!base::FeatureList::IsEnabled(features::kEnforceTLS13Downgrade) ||
Steven Valdezeec684e3e2018-12-13 16:28:231035 EnforceTLS13DowngradeForKnownRootsOnly()) {
Jesse Seloverdaf87902018-12-03 20:44:301036 // Record metrics on the TLS 1.3 anti-downgrade mechanism. This is only
1037 // recorded when enforcement is disabled. (When enforcement is enabled,
1038 // the connection will fail with ERR_TLS13_DOWNGRADE_DETECTED.) See
1039 // https://crbug.com/boringssl/226.
1040 //
1041 // Record metrics for both servers overall and the TLS 1.3 experiment
1042 // set. These metrics are only useful on TLS 1.3 servers, so the latter
1043 // is more precise, but there is a large enough TLS 1.3 deployment that
1044 // the overall numbers may be more robust. In particular, the
1045 // DowngradeType metrics do not need to be filtered.
1046 bool is_downgrade = !!SSL_is_tls13_downgrade(ssl_.get());
1047 UMA_HISTOGRAM_BOOLEAN("Net.SSLTLS13Downgrade", is_downgrade);
1048 bool is_tls13_experiment_host =
1049 IsTLS13ExperimentHost(host_and_port_.host());
1050 if (is_tls13_experiment_host) {
1051 UMA_HISTOGRAM_BOOLEAN("Net.SSLTLS13DowngradeTLS13Experiment",
1052 is_downgrade);
1053 }
1054
1055 if (is_downgrade) {
1056 // Record whether connections which hit the downgrade used known vs
1057 // unknown roots and which key exchange type.
1058
1059 // This enum is persisted into histograms. Values may not be
1060 // renumbered.
1061 enum class DowngradeType {
1062 kKnownRootRSA = 0,
1063 kKnownRootECDHE = 1,
1064 kUnknownRootRSA = 2,
1065 kUnknownRootECDHE = 3,
1066 kMaxValue = kUnknownRootECDHE,
1067 };
1068
1069 DowngradeType type;
1070 int kx_nid = SSL_CIPHER_get_kx_nid(SSL_get_current_cipher(ssl_.get()));
1071 DCHECK(kx_nid == NID_kx_rsa || kx_nid == NID_kx_ecdhe);
David Benjaminf8ebd2b2017-12-15 19:22:411072 if (server_cert_verify_result_.is_issued_by_known_root) {
Jesse Seloverdaf87902018-12-03 20:44:301073 type = kx_nid == NID_kx_rsa ? DowngradeType::kKnownRootRSA
1074 : DowngradeType::kKnownRootECDHE;
David Benjaminf8ebd2b2017-12-15 19:22:411075 } else {
Jesse Seloverdaf87902018-12-03 20:44:301076 type = kx_nid == NID_kx_rsa ? DowngradeType::kUnknownRootRSA
1077 : DowngradeType::kUnknownRootECDHE;
1078 }
1079 UMA_HISTOGRAM_ENUMERATION("Net.SSLTLS13DowngradeType", type);
1080 if (is_tls13_experiment_host) {
1081 UMA_HISTOGRAM_ENUMERATION("Net.SSLTLS13DowngradeTypeTLS13Experiment",
1082 type);
David Benjaminf8ebd2b2017-12-15 19:22:411083 }
David Benjamin570460e2018-10-16 06:01:291084
Steven Valdezeec684e3e2018-12-13 16:28:231085 if (EnforceTLS13DowngradeForKnownRootsOnly() &&
Steven Valdezbf059c752018-12-12 16:32:531086 server_cert_verify_result_.is_issued_by_known_root) {
1087 // Exit DoHandshakeLoop and return the result to the caller to
1088 // Connect.
1089 DCHECK_EQ(STATE_NONE, next_handshake_state_);
1090 return ERR_TLS13_DOWNGRADE_DETECTED;
1091 }
David Benjamin570460e2018-10-16 06:01:291092 }
[email protected]b9b651f2013-11-09 04:32:221093 }
1094
David Benjamin0627236e2019-06-27 02:01:181095 SSLHandshakeDetails details;
1096 if (SSL_version(ssl_.get()) < TLS1_3_VERSION) {
1097 if (SSL_session_reused(ssl_.get())) {
1098 details = SSLHandshakeDetails::kTLS12Resume;
1099 } else if (SSL_in_false_start(ssl_.get())) {
1100 details = SSLHandshakeDetails::kTLS12FalseStart;
1101 } else {
1102 details = SSLHandshakeDetails::kTLS12Full;
1103 }
1104 } else {
1105 if (SSL_in_early_data(ssl_.get())) {
1106 details = SSLHandshakeDetails::kTLS13Early;
1107 } else if (SSL_session_reused(ssl_.get())) {
1108 details = SSLHandshakeDetails::kTLS13Resume;
1109 } else {
1110 details = SSLHandshakeDetails::kTLS13Full;
1111 }
1112 }
1113 UMA_HISTOGRAM_ENUMERATION("Net.SSLHandshakeDetails", details);
1114
[email protected]64b5c892014-08-08 09:39:261115 completed_connect_ = true;
Jesse Selover94c9a942019-01-16 01:18:041116 next_handshake_state_ = STATE_NONE;
Jesse Seloverdaf87902018-12-03 20:44:301117 return OK;
[email protected]b9b651f2013-11-09 04:32:221118}
1119
Jesse Selover94c9a942019-01-16 01:18:041120ssl_verify_result_t SSLClientSocketImpl::VerifyCertCallback(
1121 SSL* ssl,
1122 uint8_t* out_alert) {
1123 SSLClientSocketImpl* socket =
1124 SSLContext::GetInstance()->GetClientSocketFromSSL(ssl);
1125 DCHECK(socket);
1126 return socket->VerifyCert();
1127}
1128
1129// This function is called by BoringSSL, so it has to return an
1130// ssl_verify_result_t. When specific //net errors need to be
1131// returned, use OpenSSLPutNetError to add them directly to the
1132// OpenSSL error queue.
1133ssl_verify_result_t SSLClientSocketImpl::VerifyCert() {
1134 if (cert_verification_result_ != kCertVerifyPending) {
1135 // The certificate verifier updates cert_verification_result_ when
1136 // it returns asynchronously. If there is a result in
1137 // cert_verification_result_, return it instead of triggering
1138 // another verify.
1139 return HandleVerifyResult();
1140 }
1141
1142 // In this configuration, BoringSSL will perform exactly one certificate
1143 // verification, so there cannot be state from a previous verification.
1144 CHECK(!server_cert_);
1145 server_cert_ = x509_util::CreateX509CertificateFromBuffers(
1146 SSL_get0_peer_certificates(ssl_.get()));
1147
1148 // OpenSSL decoded the certificate, but the X509Certificate implementation
1149 // could not. This is treated as a fatal SSL-level protocol error rather than
1150 // a certificate error. See https://crbug.com/91341.
1151 if (!server_cert_) {
1152 OpenSSLPutNetError(FROM_HERE, ERR_SSL_SERVER_CERT_BAD_FORMAT);
1153 return ssl_verify_invalid;
1154 }
1155
Eric Roman06bd9742019-07-13 15:19:131156 net_log_.AddEvent(NetLogEventType::SSL_CERTIFICATES_RECEIVED, [&] {
1157 return NetLogX509CertificateParams(server_cert_.get());
1158 });
Jesse Selover94c9a942019-01-16 01:18:041159
1160 // If the certificate is bad and has been previously accepted, use
1161 // the previous status and bypass the error.
1162 CertStatus cert_status;
1163 if (ssl_config_.IsAllowedBadCert(server_cert_.get(), &cert_status)) {
1164 server_cert_verify_result_.Reset();
1165 server_cert_verify_result_.cert_status = cert_status;
1166 server_cert_verify_result_.verified_cert = server_cert_;
1167 cert_verification_result_ = OK;
1168 return HandleVerifyResult();
1169 }
1170
1171 start_cert_verification_time_ = base::TimeTicks::Now();
1172
1173 const uint8_t* ocsp_response_raw;
1174 size_t ocsp_response_len;
1175 SSL_get0_ocsp_response(ssl_.get(), &ocsp_response_raw, &ocsp_response_len);
1176 base::StringPiece ocsp_response(
1177 reinterpret_cast<const char*>(ocsp_response_raw), ocsp_response_len);
1178
Matt Mueller7d5464b2019-05-15 20:18:451179 const uint8_t* sct_list_raw;
1180 size_t sct_list_len;
1181 SSL_get0_signed_cert_timestamp_list(ssl_.get(), &sct_list_raw, &sct_list_len);
1182 base::StringPiece sct_list(reinterpret_cast<const char*>(sct_list_raw),
1183 sct_list_len);
1184
David Benjamin24725be2019-07-24 20:57:181185 cert_verification_result_ = context_->cert_verifier()->Verify(
Matt Mueller7d5464b2019-05-15 20:18:451186 CertVerifier::RequestParams(
1187 server_cert_, host_and_port_.host(), ssl_config_.GetCertVerifyFlags(),
1188 ocsp_response.as_string(), sct_list.as_string()),
Jesse Selover94c9a942019-01-16 01:18:041189 &server_cert_verify_result_,
1190 base::BindOnce(&SSLClientSocketImpl::OnVerifyComplete,
1191 base::Unretained(this)),
1192 &cert_verifier_request_, net_log_);
1193
Jesse Selover4ae157d2019-04-10 21:06:371194 // Enforce keyUsage extension for RSA leaf certificates chaining up to known
1195 // roots.
1196 // TODO(795089): Enforce this unconditionally.
1197 if (server_cert_verify_result_.is_issued_by_known_root) {
1198 SSL_set_enforce_rsa_key_usage(ssl_.get(), 1);
1199 }
1200
Jesse Selover94c9a942019-01-16 01:18:041201 return HandleVerifyResult();
1202}
1203
1204void SSLClientSocketImpl::OnVerifyComplete(int result) {
1205 cert_verification_result_ = result;
1206 // In handshake phase. The parameter to OnHandshakeIOComplete is unused.
1207 OnHandshakeIOComplete(OK);
1208}
1209
1210ssl_verify_result_t SSLClientSocketImpl::HandleVerifyResult() {
1211 // Verification is in progress. Inform BoringSSL it should retry the
1212 // callback later. The next call to VerifyCertCallback will be a
1213 // continuation of the same verification, so leave
1214 // cert_verification_result_ as-is.
1215 if (cert_verification_result_ == ERR_IO_PENDING)
1216 return ssl_verify_retry;
1217
1218 // In BoringSSL's calling convention for asynchronous callbacks,
1219 // after a callback returns a non-retry value, the operation has
1220 // completed. Subsequent calls are of new operations with potentially
1221 // different arguments. Reset cert_verification_result_ to inform
1222 // VerifyCertCallback not to replay the result on subsequent calls.
1223 int result = cert_verification_result_;
1224 cert_verification_result_ = kCertVerifyPending;
1225
1226 cert_verifier_request_.reset();
1227
1228 if (!start_cert_verification_time_.is_null()) {
1229 base::TimeDelta verify_time =
1230 base::TimeTicks::Now() - start_cert_verification_time_;
1231 if (result == OK) {
1232 UMA_HISTOGRAM_TIMES("Net.SSLCertVerificationTime", verify_time);
1233 } else {
1234 UMA_HISTOGRAM_TIMES("Net.SSLCertVerificationTimeError", verify_time);
1235 }
1236 }
1237
1238 // If the connection was good, check HPKP and CT status simultaneously,
1239 // but prefer to treat the HPKP error as more serious, if there was one.
1240 if ((result == OK ||
1241 (IsCertificateError(result) &&
1242 IsCertStatusMinorError(server_cert_verify_result_.cert_status)))) {
1243 int ct_result = VerifyCT();
1244 TransportSecurityState::PKPStatus pin_validity =
David Benjamin24725be2019-07-24 20:57:181245 context_->transport_security_state()->CheckPublicKeyPins(
Jesse Selover94c9a942019-01-16 01:18:041246 host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
1247 server_cert_verify_result_.public_key_hashes, server_cert_.get(),
1248 server_cert_verify_result_.verified_cert.get(),
1249 TransportSecurityState::ENABLE_PIN_REPORTS, &pinning_failure_log_);
1250 switch (pin_validity) {
1251 case TransportSecurityState::PKPStatus::VIOLATED:
1252 server_cert_verify_result_.cert_status |=
1253 CERT_STATUS_PINNED_KEY_MISSING;
1254 result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN;
1255 break;
1256 case TransportSecurityState::PKPStatus::BYPASSED:
1257 pkp_bypassed_ = true;
1258 FALLTHROUGH;
1259 case TransportSecurityState::PKPStatus::OK:
1260 // Do nothing.
1261 break;
1262 }
1263 if (result != ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN && ct_result != OK)
1264 result = ct_result;
1265 }
1266
1267 is_fatal_cert_error_ =
1268 IsCertStatusError(server_cert_verify_result_.cert_status) &&
1269 !IsCertStatusMinorError(server_cert_verify_result_.cert_status) &&
David Benjamin24725be2019-07-24 20:57:181270 context_->transport_security_state()->ShouldSSLErrorsBeFatal(
1271 host_and_port_.host());
Jesse Selover94c9a942019-01-16 01:18:041272
1273 if (IsCertificateError(result) && ssl_config_.ignore_certificate_errors) {
1274 result = OK;
1275 }
1276
1277 if (result == OK) {
1278 return ssl_verify_ok;
1279 }
1280
1281 OpenSSLPutNetError(FROM_HERE, result);
1282 return ssl_verify_invalid;
1283}
1284
svaldeze83af292016-04-26 14:33:371285void SSLClientSocketImpl::DoConnectCallback(int rv) {
[email protected]b9b651f2013-11-09 04:32:221286 if (!user_connect_callback_.is_null()) {
Brad Lassey3a814172018-04-26 03:30:211287 std::move(user_connect_callback_).Run(rv > OK ? OK : rv);
[email protected]b9b651f2013-11-09 04:32:221288 }
1289}
1290
svaldeze83af292016-04-26 14:33:371291void SSLClientSocketImpl::OnHandshakeIOComplete(int result) {
[email protected]b9b651f2013-11-09 04:32:221292 int rv = DoHandshakeLoop(result);
1293 if (rv != ERR_IO_PENDING) {
Steven Valdez6af02df2018-07-15 21:52:331294 if (in_confirm_handshake_) {
1295 in_confirm_handshake_ = false;
1296 net_log_.EndEvent(NetLogEventType::SSL_CONFIRM_HANDSHAKE);
1297 } else {
1298 LogConnectEndEvent(rv);
1299 }
[email protected]b9b651f2013-11-09 04:32:221300 DoConnectCallback(rv);
1301 }
1302}
1303
svaldeze83af292016-04-26 14:33:371304int SSLClientSocketImpl::DoHandshakeLoop(int last_io_result) {
Alexandr Ilin33126632018-11-14 14:48:171305 TRACE_EVENT0(NetTracingCategory(), "SSLClientSocketImpl::DoHandshakeLoop");
[email protected]b9b651f2013-11-09 04:32:221306 int rv = last_io_result;
1307 do {
1308 // Default to STATE_NONE for next state.
1309 // (This is a quirk carried over from the windows
1310 // implementation. It makes reading the logs a bit harder.)
1311 // State handlers can and often do call GotoState just
1312 // to stay in the current state.
1313 State state = next_handshake_state_;
rsleeviadbd4982016-06-13 22:10:271314 next_handshake_state_ = STATE_NONE;
[email protected]b9b651f2013-11-09 04:32:221315 switch (state) {
1316 case STATE_HANDSHAKE:
1317 rv = DoHandshake();
1318 break;
davidbenc4212c02015-05-12 22:30:181319 case STATE_HANDSHAKE_COMPLETE:
1320 rv = DoHandshakeComplete(rv);
1321 break;
[email protected]b9b651f2013-11-09 04:32:221322 case STATE_NONE:
1323 default:
1324 rv = ERR_UNEXPECTED;
1325 NOTREACHED() << "unexpected state" << state;
1326 break;
1327 }
[email protected]b9b651f2013-11-09 04:32:221328 } while (rv != ERR_IO_PENDING && next_handshake_state_ != STATE_NONE);
1329 return rv;
1330}
1331
xunjieli321a96f32017-03-07 19:42:171332int SSLClientSocketImpl::DoPayloadRead(IOBuffer* buf, int buf_len) {
[email protected]b9b651f2013-11-09 04:32:221333 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
1334
xunjieli321a96f32017-03-07 19:42:171335 DCHECK_LT(0, buf_len);
1336 DCHECK(buf);
davidben7e555daf2015-03-25 17:03:291337
[email protected]b9b651f2013-11-09 04:32:221338 int rv;
Oscar Johanssond49464e2018-07-02 09:35:451339 if (pending_read_error_ != kSSLClientSocketNoPendingResult) {
[email protected]b9b651f2013-11-09 04:32:221340 rv = pending_read_error_;
Oscar Johanssond49464e2018-07-02 09:35:451341 pending_read_error_ = kSSLClientSocketNoPendingResult;
[email protected]b9b651f2013-11-09 04:32:221342 if (rv == 0) {
mikecirone8b85c432016-09-08 19:11:001343 net_log_.AddByteTransferEvent(NetLogEventType::SSL_SOCKET_BYTES_RECEIVED,
xunjieli321a96f32017-03-07 19:42:171344 rv, buf->data());
davidbenb8c23212014-10-28 00:12:161345 } else {
Eric Roman06bd9742019-07-13 15:19:131346 NetLogOpenSSLError(net_log_, NetLogEventType::SSL_READ_ERROR, rv,
1347 pending_read_ssl_error_, pending_read_error_info_);
[email protected]b9b651f2013-11-09 04:32:221348 }
davidbenb8c23212014-10-28 00:12:161349 pending_read_ssl_error_ = SSL_ERROR_NONE;
1350 pending_read_error_info_ = OpenSSLErrorInfo();
[email protected]b9b651f2013-11-09 04:32:221351 return rv;
1352 }
1353
1354 int total_bytes_read = 0;
davidben7e555daf2015-03-25 17:03:291355 int ssl_ret;
[email protected]b9b651f2013-11-09 04:32:221356 do {
xunjieli321a96f32017-03-07 19:42:171357 ssl_ret = SSL_read(ssl_.get(), buf->data() + total_bytes_read,
1358 buf_len - total_bytes_read);
davidben7e555daf2015-03-25 17:03:291359 if (ssl_ret > 0)
1360 total_bytes_read += ssl_ret;
davidben8ea6b172017-03-07 23:53:501361 // Continue processing records as long as there is more data available
1362 // synchronously.
1363 } while (total_bytes_read < buf_len && ssl_ret > 0 &&
1364 transport_adapter_->HasPendingReadData());
[email protected]b9b651f2013-11-09 04:32:221365
davidben7e555daf2015-03-25 17:03:291366 // Although only the final SSL_read call may have failed, the failure needs to
1367 // processed immediately, while the information still available in OpenSSL's
1368 // error queue.
davidbenced4aa9b2015-05-12 21:22:351369 if (ssl_ret <= 0) {
davidbend80c12c2016-10-11 00:13:491370 pending_read_ssl_error_ = SSL_get_error(ssl_.get(), ssl_ret);
davidben7e555daf2015-03-25 17:03:291371 if (pending_read_ssl_error_ == SSL_ERROR_ZERO_RETURN) {
1372 pending_read_error_ = 0;
davidbenced4aa9b2015-05-12 21:22:351373 } else if (pending_read_ssl_error_ == SSL_ERROR_WANT_X509_LOOKUP &&
1374 !ssl_config_.send_client_cert) {
1375 pending_read_error_ = ERR_SSL_CLIENT_AUTH_CERT_NEEDED;
davidben1d489522015-07-01 18:48:461376 } else if (pending_read_ssl_error_ ==
1377 SSL_ERROR_WANT_PRIVATE_KEY_OPERATION) {
svaldez7872fd02015-11-19 21:10:541378 DCHECK(ssl_config_.client_private_key);
Oscar Johanssond49464e2018-07-02 09:35:451379 DCHECK_NE(kSSLClientSocketNoPendingResult, signature_result_);
davidben1d489522015-07-01 18:48:461380 pending_read_error_ = ERR_IO_PENDING;
davidben7e555daf2015-03-25 17:03:291381 } else {
davidbenfe132d92016-09-27 18:07:211382 pending_read_error_ = MapLastOpenSSLError(
davidben7e555daf2015-03-25 17:03:291383 pending_read_ssl_error_, err_tracer, &pending_read_error_info_);
[email protected]b9b651f2013-11-09 04:32:221384 }
1385
davidben7e555daf2015-03-25 17:03:291386 // Many servers do not reliably send a close_notify alert when shutting down
1387 // a connection, and instead terminate the TCP connection. This is reported
1388 // as ERR_CONNECTION_CLOSED. Because of this, map the unclean shutdown to a
1389 // graceful EOF, instead of treating it as an error as it should be.
1390 if (pending_read_error_ == ERR_CONNECTION_CLOSED)
1391 pending_read_error_ = 0;
1392 }
davidbenbe6ce7ec2014-10-20 19:15:561393
davidben7e555daf2015-03-25 17:03:291394 if (total_bytes_read > 0) {
1395 // Return any bytes read to the caller. The error will be deferred to the
1396 // next call of DoPayloadRead.
1397 rv = total_bytes_read;
davidbenbe6ce7ec2014-10-20 19:15:561398
davidben7e555daf2015-03-25 17:03:291399 // Do not treat insufficient data as an error to return in the next call to
1400 // DoPayloadRead() - instead, let the call fall through to check SSL_read()
davidben3418e81f2016-10-19 00:09:451401 // again. The transport may have data available by then.
davidben7e555daf2015-03-25 17:03:291402 if (pending_read_error_ == ERR_IO_PENDING)
Oscar Johanssond49464e2018-07-02 09:35:451403 pending_read_error_ = kSSLClientSocketNoPendingResult;
davidben7e555daf2015-03-25 17:03:291404 } else {
1405 // No bytes were returned. Return the pending read error immediately.
Oscar Johanssond49464e2018-07-02 09:35:451406 DCHECK_NE(kSSLClientSocketNoPendingResult, pending_read_error_);
davidben7e555daf2015-03-25 17:03:291407 rv = pending_read_error_;
Oscar Johanssond49464e2018-07-02 09:35:451408 pending_read_error_ = kSSLClientSocketNoPendingResult;
[email protected]b9b651f2013-11-09 04:32:221409 }
1410
1411 if (rv >= 0) {
mikecirone8b85c432016-09-08 19:11:001412 net_log_.AddByteTransferEvent(NetLogEventType::SSL_SOCKET_BYTES_RECEIVED,
xunjieli321a96f32017-03-07 19:42:171413 rv, buf->data());
davidbenb8c23212014-10-28 00:12:161414 } else if (rv != ERR_IO_PENDING) {
Eric Roman06bd9742019-07-13 15:19:131415 NetLogOpenSSLError(net_log_, NetLogEventType::SSL_READ_ERROR, rv,
1416 pending_read_ssl_error_, pending_read_error_info_);
davidbenb8c23212014-10-28 00:12:161417 pending_read_ssl_error_ = SSL_ERROR_NONE;
1418 pending_read_error_info_ = OpenSSLErrorInfo();
[email protected]b9b651f2013-11-09 04:32:221419 }
1420 return rv;
1421}
1422
svaldeze83af292016-04-26 14:33:371423int SSLClientSocketImpl::DoPayloadWrite() {
[email protected]b9b651f2013-11-09 04:32:221424 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
davidbend80c12c2016-10-11 00:13:491425 int rv = SSL_write(ssl_.get(), user_write_buf_->data(), user_write_buf_len_);
rsleevif020edc2015-03-16 19:31:241426
[email protected]b9b651f2013-11-09 04:32:221427 if (rv >= 0) {
mikecirone8b85c432016-09-08 19:11:001428 net_log_.AddByteTransferEvent(NetLogEventType::SSL_SOCKET_BYTES_SENT, rv,
[email protected]b9b651f2013-11-09 04:32:221429 user_write_buf_->data());
Adam Langley68df3af2019-01-19 00:37:101430 if (first_post_handshake_write_ && SSL_is_init_finished(ssl_.get())) {
1431 if (base::FeatureList::IsEnabled(features::kTLS13KeyUpdate) &&
1432 SSL_version(ssl_.get()) == TLS1_3_VERSION) {
1433 const int ok = SSL_key_update(ssl_.get(), SSL_KEY_UPDATE_REQUESTED);
1434 DCHECK(ok);
1435 }
1436 first_post_handshake_write_ = false;
1437 }
[email protected]b9b651f2013-11-09 04:32:221438 return rv;
1439 }
1440
davidbend80c12c2016-10-11 00:13:491441 int ssl_error = SSL_get_error(ssl_.get(), rv);
davidben1d489522015-07-01 18:48:461442 if (ssl_error == SSL_ERROR_WANT_PRIVATE_KEY_OPERATION)
1443 return ERR_IO_PENDING;
davidbenb8c23212014-10-28 00:12:161444 OpenSSLErrorInfo error_info;
davidbenfe132d92016-09-27 18:07:211445 int net_error = MapLastOpenSSLError(ssl_error, err_tracer, &error_info);
davidbenb8c23212014-10-28 00:12:161446
1447 if (net_error != ERR_IO_PENDING) {
Eric Roman06bd9742019-07-13 15:19:131448 NetLogOpenSSLError(net_log_, NetLogEventType::SSL_WRITE_ERROR, net_error,
1449 ssl_error, error_info);
davidbenb8c23212014-10-28 00:12:161450 }
1451 return net_error;
[email protected]b9b651f2013-11-09 04:32:221452}
1453
davidben3418e81f2016-10-19 00:09:451454void SSLClientSocketImpl::RetryAllOperations() {
1455 // SSL_do_handshake, SSL_read, and SSL_write may all be retried when blocked,
1456 // so retry all operations for simplicity. (Otherwise, SSL_get_error for each
1457 // operation may be remembered to retry only the blocked ones.)
1458
Steven Valdez6af02df2018-07-15 21:52:331459 // Performing these callbacks may cause |this| to be deleted. If this
1460 // happens, the other callbacks should not be invoked. Guard against this by
1461 // holding a WeakPtr to |this| and ensuring it's still valid.
1462 base::WeakPtr<SSLClientSocketImpl> guard(weak_factory_.GetWeakPtr());
davidben3418e81f2016-10-19 00:09:451463 if (next_handshake_state_ == STATE_HANDSHAKE) {
1464 // In handshake phase. The parameter to OnHandshakeIOComplete is unused.
1465 OnHandshakeIOComplete(OK);
davidben3418e81f2016-10-19 00:09:451466 }
1467
Steven Valdez6af02df2018-07-15 21:52:331468 if (!guard.get())
1469 return;
1470
davidben1d489522015-07-01 18:48:461471 int rv_read = ERR_IO_PENDING;
1472 int rv_write = ERR_IO_PENDING;
xunjieli321a96f32017-03-07 19:42:171473 if (user_read_buf_) {
1474 rv_read = DoPayloadRead(user_read_buf_.get(), user_read_buf_len_);
1475 } else if (!user_read_callback_.is_null()) {
1476 // ReadIfReady() is called by the user. Skip DoPayloadRead() and just let
1477 // the user know that read can be retried.
1478 rv_read = OK;
1479 }
1480
davidben3418e81f2016-10-19 00:09:451481 if (user_write_buf_)
1482 rv_write = DoPayloadWrite();
davidben1d489522015-07-01 18:48:461483
davidben3418e81f2016-10-19 00:09:451484 if (rv_read != ERR_IO_PENDING)
davidben1d489522015-07-01 18:48:461485 DoReadCallback(rv_read);
1486
1487 if (!guard.get())
1488 return;
1489
davidben3418e81f2016-10-19 00:09:451490 if (rv_write != ERR_IO_PENDING)
davidben1d489522015-07-01 18:48:461491 DoWriteCallback(rv_write);
1492}
1493
rsleevi4a6ca8c2016-06-24 03:05:221494int SSLClientSocketImpl::VerifyCT() {
rsleevi4a6ca8c2016-06-24 03:05:221495 const uint8_t* sct_list_raw;
1496 size_t sct_list_len;
davidbend80c12c2016-10-11 00:13:491497 SSL_get0_signed_cert_timestamp_list(ssl_.get(), &sct_list_raw, &sct_list_len);
rsleevi22cae1672016-12-28 01:53:361498 base::StringPiece sct_list(reinterpret_cast<const char*>(sct_list_raw),
1499 sct_list_len);
1500
1501 const uint8_t* ocsp_response_raw;
1502 size_t ocsp_response_len;
1503 SSL_get0_ocsp_response(ssl_.get(), &ocsp_response_raw, &ocsp_response_len);
1504 base::StringPiece ocsp_response(
1505 reinterpret_cast<const char*>(ocsp_response_raw), ocsp_response_len);
rsleevi4a6ca8c2016-06-24 03:05:221506
1507 // Note that this is a completely synchronous operation: The CT Log Verifier
1508 // gets all the data it needs for SCT verification and does not do any
1509 // external communication.
David Benjamin24725be2019-07-24 20:57:181510 context_->cert_transparency_verifier()->Verify(
Rob Percivalbc658a22017-12-13 08:24:421511 host_and_port().host(), server_cert_verify_result_.verified_cert.get(),
1512 ocsp_response, sct_list, &ct_verify_result_.scts, net_log_);
rsleevi4a6ca8c2016-06-24 03:05:221513
Ryan Sleevi8a9c9c12018-05-09 02:36:231514 ct::SCTList verified_scts =
eranm4bed0b572016-08-14 21:00:351515 ct::SCTsMatchingStatus(ct_verify_result_.scts, ct::SCT_STATUS_OK);
1516
David Benjamin24725be2019-07-24 20:57:181517 ct_verify_result_.policy_compliance =
1518 context_->ct_policy_enforcer()->CheckCompliance(
1519 server_cert_verify_result_.verified_cert.get(), verified_scts,
1520 net_log_);
Emily Stark0d9809e2017-10-18 08:29:151521 if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) {
Emily Stark627238f2017-11-29 03:29:541522 if (ct_verify_result_.policy_compliance !=
Ryan Sleevi8a9c9c12018-05-09 02:36:231523 ct::CTPolicyCompliance::CT_POLICY_COMPLIES_VIA_SCTS &&
1524 ct_verify_result_.policy_compliance !=
1525 ct::CTPolicyCompliance::CT_POLICY_BUILD_NOT_TIMELY) {
Emily Stark0d9809e2017-10-18 08:29:151526 server_cert_verify_result_.cert_status |=
1527 CERT_STATUS_CT_COMPLIANCE_FAILED;
1528 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV;
1529 }
1530
1531 // Record the CT compliance status for connections with EV certificates, to
1532 // distinguish how often EV status is being dropped due to failing CT
1533 // compliance.
Emily Starkefce7832017-11-30 03:16:161534 if (server_cert_verify_result_.is_issued_by_known_root) {
1535 UMA_HISTOGRAM_ENUMERATION("Net.CertificateTransparency.EVCompliance2.SSL",
1536 ct_verify_result_.policy_compliance,
Kunihiko Sakamoto36469732018-09-27 03:33:451537 ct::CTPolicyCompliance::CT_POLICY_COUNT);
Emily Starkefce7832017-11-30 03:16:161538 }
rsleevicd7390e2017-06-14 10:18:261539 }
rsleevi4a6ca8c2016-06-24 03:05:221540
Emily Stark0d9809e2017-10-18 08:29:151541 // Record the CT compliance of every connection to get an overall picture of
1542 // how many connections are CT-compliant.
Emily Starkefce7832017-11-30 03:16:161543 if (server_cert_verify_result_.is_issued_by_known_root) {
1544 UMA_HISTOGRAM_ENUMERATION(
1545 "Net.CertificateTransparency.ConnectionComplianceStatus2.SSL",
1546 ct_verify_result_.policy_compliance,
Kunihiko Sakamoto36469732018-09-27 03:33:451547 ct::CTPolicyCompliance::CT_POLICY_COUNT);
Emily Starkefce7832017-11-30 03:16:161548 }
Emily Starkc96e9bc2017-10-10 00:10:391549
Emily Stark0d9809e2017-10-18 08:29:151550 TransportSecurityState::CTRequirementsStatus ct_requirement_status =
David Benjamin24725be2019-07-24 20:57:181551 context_->transport_security_state()->CheckCTRequirements(
estarkbf1b52962017-05-05 17:05:251552 host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
1553 server_cert_verify_result_.public_key_hashes,
1554 server_cert_verify_result_.verified_cert.get(), server_cert_.get(),
1555 ct_verify_result_.scts,
1556 TransportSecurityState::ENABLE_EXPECT_CT_REPORTS,
Emily Stark627238f2017-11-29 03:29:541557 ct_verify_result_.policy_compliance);
Emily Stark0d9809e2017-10-18 08:29:151558 if (ct_requirement_status != TransportSecurityState::CT_NOT_REQUIRED) {
Emily Stark8b411de02017-11-23 20:21:271559 ct_verify_result_.policy_compliance_required = true;
Emily Starkefce7832017-11-30 03:16:161560 if (server_cert_verify_result_.is_issued_by_known_root) {
1561 // Record the CT compliance of connections for which compliance is
1562 // required; this helps answer the question: "Of all connections that are
1563 // supposed to be serving valid CT information, how many fail to do so?"
1564 UMA_HISTOGRAM_ENUMERATION(
1565 "Net.CertificateTransparency.CTRequiredConnectionComplianceStatus2."
1566 "SSL",
1567 ct_verify_result_.policy_compliance,
Kunihiko Sakamoto36469732018-09-27 03:33:451568 ct::CTPolicyCompliance::CT_POLICY_COUNT);
Emily Starkefce7832017-11-30 03:16:161569 }
Emily Stark8b411de02017-11-23 20:21:271570 } else {
1571 ct_verify_result_.policy_compliance_required = false;
rsleevi4a6ca8c2016-06-24 03:05:221572 }
1573
Emily Stark0d9809e2017-10-18 08:29:151574 switch (ct_requirement_status) {
1575 case TransportSecurityState::CT_REQUIREMENTS_NOT_MET:
1576 server_cert_verify_result_.cert_status |=
1577 CERT_STATUS_CERTIFICATE_TRANSPARENCY_REQUIRED;
1578 return ERR_CERTIFICATE_TRANSPARENCY_REQUIRED;
1579 case TransportSecurityState::CT_REQUIREMENTS_MET:
1580 case TransportSecurityState::CT_NOT_REQUIRED:
1581 return OK;
1582 }
1583
1584 NOTREACHED();
rsleevi4a6ca8c2016-06-24 03:05:221585 return OK;
1586}
1587
svaldeze83af292016-04-26 14:33:371588int SSLClientSocketImpl::ClientCertRequestCallback(SSL* ssl) {
davidbend80c12c2016-10-11 00:13:491589 DCHECK(ssl == ssl_.get());
[email protected]82c59022014-08-15 09:38:271590
mikecirone8b85c432016-09-08 19:11:001591 net_log_.AddEvent(NetLogEventType::SSL_CLIENT_CERT_REQUESTED);
davidbenfe132d92016-09-27 18:07:211592 certificate_requested_ = true;
davidbenaf42cbe2014-11-13 03:27:461593
[email protected]82c59022014-08-15 09:38:271594 // Clear any currently configured certificates.
davidbend80c12c2016-10-11 00:13:491595 SSL_certs_clear(ssl_.get());
[email protected]97a854f2014-07-29 07:51:361596
1597#if defined(OS_IOS)
1598 // TODO(droger): Support client auth on iOS. See http://crbug.com/145954).
1599 LOG(WARNING) << "Client auth is not supported";
svaldeze83af292016-04-26 14:33:371600#else // !defined(OS_IOS)
[email protected]5ac981e182010-12-06 17:56:271601 if (!ssl_config_.send_client_cert) {
[email protected]515adc22013-01-09 16:01:231602 // First pass: we know that a client certificate is needed, but we do not
davidbenb11fd212017-01-12 17:08:031603 // have one at hand. Suspend the handshake. SSL_get_error will return
1604 // SSL_ERROR_WANT_X509_LOOKUP.
davidbenced4aa9b2015-05-12 21:22:351605 return -1;
[email protected]5ac981e182010-12-06 17:56:271606 }
1607
1608 // Second pass: a client certificate should have been selected.
[email protected]13914c92013-06-13 22:42:421609 if (ssl_config_.client_cert.get()) {
svaldez7872fd02015-11-19 21:10:541610 if (!ssl_config_.client_private_key) {
1611 // The caller supplied a null private key. Fail the handshake and surface
1612 // an appropriate error to the caller.
davidben1d489522015-07-01 18:48:461613 LOG(WARNING) << "Client cert found without private key";
1614 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY);
1615 return -1;
1616 }
1617
David Benjaminb8ab3852017-08-04 00:17:321618 if (!SetSSLChainAndKey(ssl_.get(), ssl_config_.client_cert.get(), nullptr,
1619 &SSLContext::kPrivateKeyMethod)) {
davidbena35b40c32017-03-09 17:33:451620 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_CERT_BAD_FORMAT);
1621 return -1;
1622 }
svaldezf3db006f2015-09-29 16:43:581623
David Benjaminb9bafbe2017-11-07 21:41:381624 std::vector<uint16_t> preferences =
1625 ssl_config_.client_private_key->GetAlgorithmPreferences();
1626 SSL_set_signing_algorithm_prefs(ssl_.get(), preferences.data(),
1627 preferences.size());
davidbenaf42cbe2014-11-13 03:27:461628
Eric Roman06bd9742019-07-13 15:19:131629 net_log_.AddEventWithIntParams(
1630 NetLogEventType::SSL_CLIENT_CERT_PROVIDED, "cert_count",
1631 base::checked_cast<int>(
1632 1 + ssl_config_.client_cert->intermediate_buffers().size()));
[email protected]6bad5052014-07-12 01:25:131633 return 1;
[email protected]c0787702014-05-20 21:51:441634 }
[email protected]97a854f2014-07-29 07:51:361635#endif // defined(OS_IOS)
[email protected]5ac981e182010-12-06 17:56:271636
1637 // Send no client certificate.
Eric Roman06bd9742019-07-13 15:19:131638 net_log_.AddEventWithIntParams(NetLogEventType::SSL_CLIENT_CERT_PROVIDED,
1639 "cert_count", 0);
[email protected]82c59022014-08-15 09:38:271640 return 1;
[email protected]5ac981e182010-12-06 17:56:271641}
1642
svaldeze83af292016-04-26 14:33:371643int SSLClientSocketImpl::NewSessionCallback(SSL_SESSION* session) {
Daniel McArdle3a663d62019-01-31 00:48:471644 if (!IsCachingEnabled())
David Benjaminb3840f42017-08-03 15:50:161645 return 0;
1646
Adam Langley26cf55a2019-07-01 21:14:571647 base::Optional<IPAddress> ip_addr;
1648 if (SSL_CIPHER_get_kx_nid(SSL_SESSION_get0_cipher(session)) == NID_kx_rsa) {
1649 // If RSA key exchange was used, additionally key the cache with the
1650 // destination IP address. Of course, if a proxy is being used, the
1651 // semantics of this are a little complex, but we're doing our best. See
1652 // https://crbug.com/969684
1653 IPEndPoint ip_endpoint;
1654 if (stream_socket_->GetPeerAddress(&ip_endpoint) != OK) {
1655 return 0;
1656 }
1657 ip_addr = ip_endpoint.address();
1658 }
1659
David Benjamin6617c392019-02-12 18:08:571660 // OpenSSL optionally passes ownership of |session|. Returning one signals
1661 // that this function has claimed it.
David Benjamin24725be2019-07-24 20:57:181662 context_->ssl_client_session_cache()->Insert(
1663 GetSessionCacheKey(ip_addr), bssl::UniquePtr<SSL_SESSION>(session));
David Benjamin6617c392019-02-12 18:08:571664 return 1;
davidbendafe4e52015-04-08 22:53:521665}
1666
svaldeze83af292016-04-26 14:33:371667void SSLClientSocketImpl::AddCTInfoToSSLInfo(SSLInfo* ssl_info) const {
estark723b5eeb2016-02-18 21:01:121668 ssl_info->UpdateCertificateTransparencyInfo(ct_verify_result_);
davidbeneb5f8ef32014-09-04 14:14:321669}
1670
David Benjamin79d85bd32019-08-02 23:27:571671SSLClientSessionCache::Key SSLClientSocketImpl::GetSessionCacheKey(
Adam Langley26cf55a2019-07-01 21:14:571672 base::Optional<IPAddress> dest_ip_addr) const {
David Benjamin79d85bd32019-08-02 23:27:571673 SSLClientSessionCache::Key key;
1674 key.server = host_and_port_;
1675 key.dest_ip_addr = dest_ip_addr;
David Benjamin6f2da652019-06-26 23:36:351676 if (base::FeatureList::IsEnabled(
1677 features::kPartitionSSLSessionsByNetworkIsolationKey)) {
David Benjamin79d85bd32019-08-02 23:27:571678 key.network_isolation_key = ssl_config_.network_isolation_key;
David Benjamin6f2da652019-06-26 23:36:351679 }
David Benjamin79d85bd32019-08-02 23:27:571680 key.privacy_mode = ssl_config_.privacy_mode;
1681 return key;
rsleevif020edc2015-03-16 19:31:241682}
1683
svaldeze83af292016-04-26 14:33:371684bool SSLClientSocketImpl::IsRenegotiationAllowed() const {
bncce6ea242016-09-15 20:22:321685 if (negotiated_protocol_ == kProtoUnknown)
davidben421116c2015-05-12 19:56:511686 return ssl_config_.renego_allowed_default;
1687
davidben421116c2015-05-12 19:56:511688 for (NextProto allowed : ssl_config_.renego_allowed_for_protos) {
bnc3cf2a592016-08-11 14:48:361689 if (negotiated_protocol_ == allowed)
davidben421116c2015-05-12 19:56:511690 return true;
1691 }
1692 return false;
1693}
1694
Daniel McArdle3a663d62019-01-31 00:48:471695bool SSLClientSocketImpl::IsCachingEnabled() const {
David Benjamin24725be2019-07-24 20:57:181696 return context_->ssl_client_session_cache() != nullptr;
Daniel McArdle3a663d62019-01-31 00:48:471697}
1698
David Benjaminb9bafbe2017-11-07 21:41:381699ssl_private_key_result_t SSLClientSocketImpl::PrivateKeySignCallback(
davidben1d489522015-07-01 18:48:461700 uint8_t* out,
1701 size_t* out_len,
1702 size_t max_out,
David Benjaminb9bafbe2017-11-07 21:41:381703 uint16_t algorithm,
davidben1d489522015-07-01 18:48:461704 const uint8_t* in,
1705 size_t in_len) {
Oscar Johanssond49464e2018-07-02 09:35:451706 DCHECK_EQ(kSSLClientSocketNoPendingResult, signature_result_);
davidben1d489522015-07-01 18:48:461707 DCHECK(signature_.empty());
svaldez7872fd02015-11-19 21:10:541708 DCHECK(ssl_config_.client_private_key);
davidben1d489522015-07-01 18:48:461709
Eric Roman06bd9742019-07-13 15:19:131710 net_log_.BeginEvent(NetLogEventType::SSL_PRIVATE_KEY_OP, [&] {
1711 return NetLogPrivateKeyOperationParams(
1712 algorithm,
1713 // Pass the SSLPrivateKey pointer to avoid making copies of the
1714 // provider name in the common case with logging disabled.
1715 ssl_config_.client_private_key.get());
1716 });
David Benjaminb9bafbe2017-11-07 21:41:381717
davidben1d489522015-07-01 18:48:461718 signature_result_ = ERR_IO_PENDING;
David Benjamin9ba36b02017-11-10 19:01:531719 ssl_config_.client_private_key->Sign(
1720 algorithm, base::make_span(in, in_len),
David Benjamin8f2d2c12018-02-27 00:08:261721 base::BindOnce(&SSLClientSocketImpl::OnPrivateKeyComplete,
1722 weak_factory_.GetWeakPtr()));
davidben1d489522015-07-01 18:48:461723 return ssl_private_key_retry;
1724}
1725
davidben0bca07fd2016-07-18 15:12:031726ssl_private_key_result_t SSLClientSocketImpl::PrivateKeyCompleteCallback(
davidben1d489522015-07-01 18:48:461727 uint8_t* out,
1728 size_t* out_len,
1729 size_t max_out) {
Oscar Johanssond49464e2018-07-02 09:35:451730 DCHECK_NE(kSSLClientSocketNoPendingResult, signature_result_);
svaldez7872fd02015-11-19 21:10:541731 DCHECK(ssl_config_.client_private_key);
davidben1d489522015-07-01 18:48:461732
1733 if (signature_result_ == ERR_IO_PENDING)
1734 return ssl_private_key_retry;
1735 if (signature_result_ != OK) {
1736 OpenSSLPutNetError(FROM_HERE, signature_result_);
1737 return ssl_private_key_failure;
1738 }
1739 if (signature_.size() > max_out) {
1740 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED);
1741 return ssl_private_key_failure;
1742 }
davidben5f8b6bc2015-11-25 03:19:541743 memcpy(out, signature_.data(), signature_.size());
davidben1d489522015-07-01 18:48:461744 *out_len = signature_.size();
1745 signature_.clear();
1746 return ssl_private_key_success;
1747}
1748
davidben0bca07fd2016-07-18 15:12:031749void SSLClientSocketImpl::OnPrivateKeyComplete(
davidben1d489522015-07-01 18:48:461750 Error error,
1751 const std::vector<uint8_t>& signature) {
1752 DCHECK_EQ(ERR_IO_PENDING, signature_result_);
1753 DCHECK(signature_.empty());
svaldez7872fd02015-11-19 21:10:541754 DCHECK(ssl_config_.client_private_key);
davidben1d489522015-07-01 18:48:461755
mikecirone8b85c432016-09-08 19:11:001756 net_log_.EndEventWithNetErrorCode(NetLogEventType::SSL_PRIVATE_KEY_OP, error);
davidben1d489522015-07-01 18:48:461757
1758 signature_result_ = error;
1759 if (signature_result_ == OK)
1760 signature_ = signature;
1761
davidben1d489522015-07-01 18:48:461762 // During a renegotiation, either Read or Write calls may be blocked on an
1763 // asynchronous private key operation.
davidben3418e81f2016-10-19 00:09:451764 RetryAllOperations();
davidben1d489522015-07-01 18:48:461765}
1766
davidbencef9e212017-04-19 15:00:101767void SSLClientSocketImpl::MessageCallback(int is_write,
1768 int content_type,
1769 const void* buf,
1770 size_t len) {
1771 switch (content_type) {
1772 case SSL3_RT_ALERT:
1773 net_log_.AddEvent(is_write ? NetLogEventType::SSL_ALERT_SENT
1774 : NetLogEventType::SSL_ALERT_RECEIVED,
Eric Roman06bd9742019-07-13 15:19:131775 [&] { return NetLogSSLAlertParams(buf, len); });
davidbencef9e212017-04-19 15:00:101776 break;
1777 case SSL3_RT_HANDSHAKE:
1778 net_log_.AddEvent(
1779 is_write ? NetLogEventType::SSL_HANDSHAKE_MESSAGE_SENT
1780 : NetLogEventType::SSL_HANDSHAKE_MESSAGE_RECEIVED,
Eric Roman06bd9742019-07-13 15:19:131781 [&](NetLogCaptureMode capture_mode) {
1782 return NetLogSSLMessageParams(!!is_write, buf, len, capture_mode);
1783 });
davidbencef9e212017-04-19 15:00:101784 break;
1785 default:
1786 return;
1787 }
1788}
1789
davidben281d13f02016-04-27 20:43:281790void SSLClientSocketImpl::LogConnectEndEvent(int rv) {
1791 if (rv != OK) {
mikecirone8b85c432016-09-08 19:11:001792 net_log_.EndEventWithNetErrorCode(NetLogEventType::SSL_CONNECT, rv);
davidben281d13f02016-04-27 20:43:281793 return;
1794 }
1795
mikecirone8b85c432016-09-08 19:11:001796 net_log_.EndEvent(NetLogEventType::SSL_CONNECT,
Eric Roman06bd9742019-07-13 15:19:131797 [&] { return NetLogSSLInfoParams(this); });
davidben281d13f02016-04-27 20:43:281798}
1799
bncbd442c22016-09-14 20:49:161800void SSLClientSocketImpl::RecordNegotiatedProtocol() const {
1801 UMA_HISTOGRAM_ENUMERATION("Net.SSLNegotiatedAlpnProtocol",
1802 negotiated_protocol_, kProtoLast + 1);
bnc3cf2a592016-08-11 14:48:361803}
1804
davidbenfe132d92016-09-27 18:07:211805int SSLClientSocketImpl::MapLastOpenSSLError(
1806 int ssl_error,
1807 const crypto::OpenSSLErrStackTracer& tracer,
1808 OpenSSLErrorInfo* info) {
1809 int net_error = MapOpenSSLErrorWithDetails(ssl_error, tracer, info);
1810
1811 if (ssl_error == SSL_ERROR_SSL &&
1812 ERR_GET_LIB(info->error_code) == ERR_LIB_SSL) {
1813 // TLS does not provide an alert for missing client certificates, so most
1814 // servers send a generic handshake_failure alert. Detect this case by
1815 // checking if we have received a CertificateRequest but sent no
1816 // certificate. See https://crbug.com/646567.
1817 if (ERR_GET_REASON(info->error_code) ==
1818 SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE &&
1819 certificate_requested_ && ssl_config_.send_client_cert &&
1820 !ssl_config_.client_cert) {
1821 net_error = ERR_BAD_SSL_CLIENT_AUTH_CERT;
1822 }
1823
1824 // Per spec, access_denied is only for client-certificate-based access
1825 // control, but some buggy firewalls use it when blocking a page. To avoid a
1826 // confusing error, map it to a generic protocol error if no
1827 // CertificateRequest was sent. See https://crbug.com/630883.
1828 if (ERR_GET_REASON(info->error_code) == SSL_R_TLSV1_ALERT_ACCESS_DENIED &&
1829 !certificate_requested_) {
1830 net_error = ERR_SSL_PROTOCOL_ERROR;
1831 }
David Benjamin5b4410e2017-11-10 21:50:231832
1833 // This error is specific to the client, so map it here.
1834 if (ERR_GET_REASON(info->error_code) ==
1835 SSL_R_NO_COMMON_SIGNATURE_ALGORITHMS) {
1836 net_error = ERR_SSL_CLIENT_AUTH_NO_COMMON_ALGORITHMS;
1837 }
davidbenfe132d92016-09-27 18:07:211838 }
1839
1840 return net_error;
1841}
1842
[email protected]7e5dd49f2010-12-08 18:33:491843} // namespace net