Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(370)

Unified Diff: remoting/protocol/simple_client_channel_authenticator.cc

Issue 8604001: Move SSL layer initialization into ChannelAuthenticator implementations. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: - Created 9 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: remoting/protocol/simple_client_channel_authenticator.cc
diff --git a/remoting/protocol/simple_client_channel_authenticator.cc b/remoting/protocol/simple_client_channel_authenticator.cc
new file mode 100644
index 0000000000000000000000000000000000000000..6af4186bf1b7b0205f56586b695f24335bec7a1c
--- /dev/null
+++ b/remoting/protocol/simple_client_channel_authenticator.cc
@@ -0,0 +1,146 @@
+// Copyright (c) 2011 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "remoting/protocol/simple_client_channel_authenticator.h"
+
+#include "net/base/cert_verifier.h"
+#include "net/base/host_port_pair.h"
+#include "net/base/io_buffer.h"
+#include "net/base/net_errors.h"
+#include "net/base/ssl_config_service.h"
+#include "net/socket/client_socket_factory.h"
+#include "net/socket/ssl_client_socket.h"
+#include "remoting/protocol/auth_util.h"
+
+namespace remoting {
+namespace protocol {
+
+namespace {
+
+// Helper method to create a SSL client socket.
+net::SSLClientSocket* CreateSSLClientSocket(
Wez 2011/11/22 22:29:48 Is it really worth having this a separate method f
Sergey Ulanov 2011/11/23 01:23:42 Done.
+ net::StreamSocket* socket, const std::string& der_cert,
+ net::CertVerifier* cert_verifier) {
+ net::SSLConfig ssl_config;
+
+ // Certificate provided by the host doesn't need authority.
Wez 2011/11/22 22:29:48 Isn't this also to do with being self-signed, as b
Sergey Ulanov 2011/11/23 01:23:42 Done.
+ net::SSLConfig::CertAndStatus cert_and_status;
+ cert_and_status.cert_status = net::CERT_STATUS_AUTHORITY_INVALID;
+ cert_and_status.der_cert = der_cert;
+ ssl_config.allowed_bad_certs.push_back(cert_and_status);
+
+ // Revocation checking is not needed because we use self-signed
+ // certs. Disable it so that SSL layer doesn't try to initialize
Wez 2011/11/22 22:29:48 nit: that _the_ SSL layer
Sergey Ulanov 2011/11/23 01:23:42 Done.
+ // OCSP (OCSP works only on IO thread).
Wez 2011/11/22 22:29:48 nit: on _the_ IO thread
Sergey Ulanov 2011/11/23 01:23:42 Done.
+ ssl_config.rev_checking_enabled = false;
+
+ // SSLClientSocket takes ownership of the adapter.
Wez 2011/11/22 22:29:48 nit: What adapter?
Sergey Ulanov 2011/11/23 01:23:42 Done.
+ net::HostPortPair host_and_port(kSslFakeHostName, 0);
+ net::SSLClientSocketContext context;
+ context.cert_verifier = cert_verifier;
+ net::SSLClientSocket* ssl_socket =
+ net::ClientSocketFactory::GetDefaultFactory()->CreateSSLClientSocket(
+ socket, host_and_port, ssl_config, NULL, context);
+ return ssl_socket;
+}
+
+} // namespace
+
+SimpleClientChannelAuthenticator::SimpleClientChannelAuthenticator(
+ const std::string& remote_cert,
Wez 2011/11/22 22:29:48 nit: |remote_cert| -> |peer_cert|?
Sergey Ulanov 2011/11/23 01:23:42 Changed it to host_cert as it is more specific.
+ const std::string& shared_secret)
+ : remote_cert_(remote_cert),
+ shared_secret_(shared_secret),
+ socket_(NULL),
+ ALLOW_THIS_IN_INITIALIZER_LIST(connect_callback_(
+ this, &SimpleClientChannelAuthenticator::OnConnected)),
+ ALLOW_THIS_IN_INITIALIZER_LIST(auth_write_callback_(
+ this, &SimpleClientChannelAuthenticator::OnAuthBytesWritten)) {
+}
+
+SimpleClientChannelAuthenticator::~SimpleClientChannelAuthenticator() {
+}
+
+void SimpleClientChannelAuthenticator::SecureAndAuthenticate(
+ net::StreamSocket* socket, const DoneCallback& done_callback) {
+ DCHECK(CalledOnValidThread());
+
+ done_callback_ = done_callback;
+
+ cert_verifier_.reset(new net::CertVerifier());
Wez 2011/11/22 22:29:48 Why do we pass in a standard CertVerifier if we ne
Sergey Ulanov 2011/11/23 01:23:42 This is because SSLClientSocket still expects to g
+ socket_.reset(CreateSSLClientSocket(
+ socket, remote_cert_, cert_verifier_.get()));
+
+ int result = socket_->Connect(&connect_callback_);
Wez 2011/11/22 22:29:48 It seems strange for connecting the SteramSocket t
Sergey Ulanov 2011/11/23 01:23:42 This connects SSL layer, not the socket itself. Th
+ if (result == net::ERR_IO_PENDING) {
+ return;
+ }
+ OnConnected(result);
+}
+
+void SimpleClientChannelAuthenticator::OnConnected(int result) {
+ if (result != net::OK) {
+ LOG(ERROR) << "Failed to establish SSL connection";
Wez 2011/11/22 22:29:48 nit: I don't think this needs logging here; callin
Sergey Ulanov 2011/11/23 01:23:42 This log message should be very rare, and I think
+ done_callback_.Run(static_cast<net::Error>(result), NULL);
+ }
+
+ unsigned char key_material[kAuthDigestLength];
+ int export_result = socket_->ExportKeyingMaterial(
+ kClientAuthSslExporterLabel, "", key_material, kAuthDigestLength);
+ if (export_result != net::OK) {
+ LOG(ERROR) << "Error fetching keying material: " << export_result;
Wez 2011/11/22 22:29:48 nit: See above.
Sergey Ulanov 2011/11/23 01:23:42 same here
+ done_callback_.Run(static_cast<net::Error>(export_result), NULL);
+ return;
+ }
+
+ std::string auth_bytes;
+ if (!GetAuthBytes(shared_secret_,
+ std::string(key_material, key_material + kAuthDigestLength),
Wez 2011/11/22 22:29:48 Why not just std::string(key_material, kAuthDigest
Sergey Ulanov 2011/11/23 01:23:42 key_material is unsigned int, so std::string(key_m
+ &auth_bytes)) {
+ done_callback_.Run(net::ERR_FAILED, NULL);
+ return;
+ }
+
+ // Allocate a buffer to write the authentication digest.
Wez 2011/11/22 22:29:48 nit: This function doesn't have comments on earlie
Sergey Ulanov 2011/11/23 01:23:42 Done.
+ auth_write_buf_ = new net::DrainableIOBuffer(
+ new net::StringIOBuffer(auth_bytes), auth_bytes.size());
+ DoAuthWrite();
+}
+
+void SimpleClientChannelAuthenticator::DoAuthWrite() {
Wez 2011/11/22 22:29:48 nit: DoAuthWrite -> WriteAuthenticationBytes() or
Sergey Ulanov 2011/11/23 01:23:42 Done.
+ while (true) {
+ int result = socket_->Write(auth_write_buf_,
+ auth_write_buf_->BytesRemaining(),
+ &auth_write_callback_);
+ if (result == net::ERR_IO_PENDING)
+ break;
+ if (!HandleAuthBytesWritten(result))
+ break;
+ }
+}
+
+void SimpleClientChannelAuthenticator::OnAuthBytesWritten(int result) {
+ DCHECK(CalledOnValidThread());
+
+ if (HandleAuthBytesWritten(result))
+ DoAuthWrite();
+}
+
+bool SimpleClientChannelAuthenticator::HandleAuthBytesWritten(int result) {
+ if (result <= 0) {
+ LOG(ERROR) << "Error writing authentication: " << result;
+ done_callback_.Run(static_cast<net::Error>(result), NULL);
+ return false;
+ }
+
+ auth_write_buf_->DidConsume(result);
+ if (auth_write_buf_->BytesRemaining() > 0)
+ return true;
+
+ done_callback_.Run(net::OK, socket_.release());
+ return false;
+}
+
+} // namespace protocol
+} // namespace remoting

Powered by Google App Engine
This is Rietveld 408576698