Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1113)

Unified Diff: net/socket/ssl_client_socket_openssl.cc

Issue 5528003: Add support for OpenSSL Next Protocol Negotiation (Closed) Base URL: http://src.chromium.org/svn/trunk/src/
Patch Set: '' Created 10 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/socket/ssl_client_socket_openssl.cc
===================================================================
--- net/socket/ssl_client_socket_openssl.cc (revision 67990)
+++ net/socket/ssl_client_socket_openssl.cc (working copy)
@@ -19,6 +19,9 @@
#include "net/base/ssl_cert_request_info.h"
#include "net/base/ssl_connection_status_flags.h"
#include "net/base/ssl_info.h"
+// TODO(willchan): Fix this dependency. It's ugly for net/socket to depend on
+// net/http.
joth 2010/12/02 17:46:55 overlength line
Kristian_ 2010/12/03 14:58:56 Done.
+#include "net/http/http_stream_factory.h"
joth 2010/12/02 17:46:55 Istead of doing this please see if we can use SSLC
willchan no longer on Chromium 2010/12/03 01:35:06 Agreed, this is preferable, primarily in terms of
Kristian_ 2010/12/03 14:58:56 Done
namespace net {
@@ -175,6 +178,10 @@
SSL_CTX_set_timeout(ssl_ctx_.get(), kSessionCacheTimeoutSeconds);
SSL_CTX_sess_set_cache_size(ssl_ctx_.get(), kSessionCacheMaxEntires);
SSL_CTX_set_client_cert_cb(ssl_ctx_.get(), ClientCertCallback);
+#ifdef OPENSSL_NPN_NEGOTIATED
willchan no longer on Chromium 2010/12/03 01:35:06 In Chromium code, we usually do #if defined(OPENSS
Kristian_ 2010/12/03 14:58:56 Done.
+ SSL_CTX_set_next_proto_select_cb(ssl_ctx_.get(), &SelectNextProtoCallback,
joth 2010/12/02 17:46:55 nit: other calls don't use & to get function addre
joth 2010/12/02 17:46:55 Problem: a side effect of calling SSL_CTX_set_next
willchan no longer on Chromium 2010/12/03 01:35:06 NPN next protos are decided on Chrome startup and
Kristian_ 2010/12/03 14:58:56 I'm not sure if setting on first run gives us much
+ NULL);
joth 2010/12/02 17:46:55 align NULL with first param
Kristian_ 2010/12/03 14:58:56 Done.
+#endif
}
static int NewSessionCallbackStatic(SSL* ssl, SSL_SESSION* session) {
@@ -202,6 +209,42 @@
return socket->ClientCertRequestCallback(ssl, x509, pkey);
}
+#ifdef OPENSSL_NPN_NEGOTIATED
+ static int SelectNextProtoCallback(SSL* ssl,
+ unsigned char** out, unsigned char* outlen,
+ const unsigned char* in,
+ unsigned int inlen, void* arg) {
+ if (!HttpStreamFactory::next_protos() ||
+ HttpStreamFactory::next_protos()->empty())
+ return SSL_TLSEXT_ERR_OK;
joth 2010/12/02 17:46:55 The docs for SSL_CTX_set_next_proto_select_cb stat
willchan no longer on Chromium 2010/12/03 01:35:06 You're right. That'd be better, but if it's too m
Kristian_ 2010/12/03 14:58:56 The problem is that the contents of SSLConfig::nex
+
+ const std::string& next_protos = *HttpStreamFactory::next_protos();
joth 2010/12/02 17:46:55 maybe add a comment: CARE: |*out| maybe set to poi
+ SSLClientSocketOpenSSL* socket = Get()->GetClientSocketFromSSL(ssl);
+
+ int status = SSL_select_next_proto(
+ out, outlen, in, inlen,
+ reinterpret_cast<const unsigned char*>(next_protos.data()),
+ next_protos.size());
+
+ socket->set_npn_proto(reinterpret_cast<const char*>(*out), *outlen);
+ switch (status) {
+ case OPENSSL_NPN_UNSUPPORTED:
+ socket->set_npn_status(SSLClientSocket::kNextProtoUnsupported);
+ break;
+ case OPENSSL_NPN_NEGOTIATED:
+ socket->set_npn_status(SSLClientSocket::kNextProtoNegotiated);
+ break;
+ case OPENSSL_NPN_NO_OVERLAP:
+ socket->set_npn_status(SSLClientSocket::kNextProtoNoOverlap);
+ break;
+ default:
+ NOTREACHED();
joth 2010/12/02 17:46:55 nit: NOTREACHED() << status;
Kristian_ 2010/12/03 14:58:56 Done.
+ break;
+ }
+ return SSL_TLSEXT_ERR_OK;
+ }
+#endif
+
// This is the index used with SSL_get_ex_data to retrieve the owner
// SSLClientSocketOpenSSL object from an SSL instance.
int ssl_socket_data_index_;
@@ -248,6 +291,7 @@
host_and_port_(host_and_port),
ssl_config_(ssl_config),
trying_cached_session_(false),
+ npn_status_(kNextProtoUnsupported),
net_log_(transport_socket->socket()->NetLog()) {
}
@@ -370,8 +414,8 @@
SSLClientSocket::NextProtoStatus SSLClientSocketOpenSSL::GetNextProto(
std::string* proto) {
- proto->clear();
- return kNextProtoUnsupported;
+ proto->assign(npn_proto_);
joth 2010/12/02 17:46:55 nit: *proto = npn_proto_; (probably just slightly
Kristian_ 2010/12/03 14:58:56 Done.
+ return npn_status_;
}
void SSLClientSocketOpenSSL::DoReadCallback(int rv) {
« net/socket/ssl_client_socket_openssl.h ('K') | « net/socket/ssl_client_socket_openssl.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698