OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/socket/ssl_client_socket_impl.h" | 5 #include "net/socket/ssl_client_socket_impl.h" |
6 | 6 |
7 #include <errno.h> | 7 #include <errno.h> |
8 #include <openssl/bio.h> | 8 #include <openssl/bio.h> |
9 #include <openssl/bytestring.h> | 9 #include <openssl/bytestring.h> |
10 #include <openssl/err.h> | 10 #include <openssl/err.h> |
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
71 const int kNoPendingResult = 1; | 71 const int kNoPendingResult = 1; |
72 | 72 |
73 // Default size of the internal BoringSSL buffers. | 73 // Default size of the internal BoringSSL buffers. |
74 const int kDefaultOpenSSLBufferSize = 17 * 1024; | 74 const int kDefaultOpenSSLBufferSize = 17 * 1024; |
75 | 75 |
76 // TLS extension number use for Token Binding. | 76 // TLS extension number use for Token Binding. |
77 const unsigned int kTbExtNum = 24; | 77 const unsigned int kTbExtNum = 24; |
78 | 78 |
79 // Token Binding ProtocolVersions supported. | 79 // Token Binding ProtocolVersions supported. |
80 const uint8_t kTbProtocolVersionMajor = 0; | 80 const uint8_t kTbProtocolVersionMajor = 0; |
81 const uint8_t kTbProtocolVersionMinor = 8; | 81 const uint8_t kTbProtocolVersionMinor = 10; |
82 const uint8_t kTbMinProtocolVersionMajor = 0; | 82 const uint8_t kTbMinProtocolVersionMajor = 0; |
83 const uint8_t kTbMinProtocolVersionMinor = 6; | 83 const uint8_t kTbMinProtocolVersionMinor = 10; |
84 | 84 |
85 bool EVP_MDToPrivateKeyHash(const EVP_MD* md, SSLPrivateKey::Hash* hash) { | 85 bool EVP_MDToPrivateKeyHash(const EVP_MD* md, SSLPrivateKey::Hash* hash) { |
86 switch (EVP_MD_type(md)) { | 86 switch (EVP_MD_type(md)) { |
87 case NID_md5_sha1: | 87 case NID_md5_sha1: |
88 *hash = SSLPrivateKey::Hash::MD5_SHA1; | 88 *hash = SSLPrivateKey::Hash::MD5_SHA1; |
89 return true; | 89 return true; |
90 case NID_sha1: | 90 case NID_sha1: |
91 *hash = SSLPrivateKey::Hash::SHA1; | 91 *hash = SSLPrivateKey::Hash::SHA1; |
92 return true; | 92 return true; |
93 case NID_sha256: | 93 case NID_sha256: |
(...skipping 386 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
480 transport_read_error_(OK), | 480 transport_read_error_(OK), |
481 transport_write_error_(OK), | 481 transport_write_error_(OK), |
482 server_cert_chain_(new PeerCertificateChain(NULL)), | 482 server_cert_chain_(new PeerCertificateChain(NULL)), |
483 completed_connect_(false), | 483 completed_connect_(false), |
484 was_ever_used_(false), | 484 was_ever_used_(false), |
485 cert_verifier_(context.cert_verifier), | 485 cert_verifier_(context.cert_verifier), |
486 cert_transparency_verifier_(context.cert_transparency_verifier), | 486 cert_transparency_verifier_(context.cert_transparency_verifier), |
487 channel_id_service_(context.channel_id_service), | 487 channel_id_service_(context.channel_id_service), |
488 tb_was_negotiated_(false), | 488 tb_was_negotiated_(false), |
489 tb_negotiated_param_(TB_PARAM_ECDSAP256), | 489 tb_negotiated_param_(TB_PARAM_ECDSAP256), |
490 tb_signed_ekm_map_(10), | 490 tb_signature_map_(10), |
491 ssl_(NULL), | 491 ssl_(NULL), |
492 transport_bio_(NULL), | 492 transport_bio_(NULL), |
493 transport_(std::move(transport_socket)), | 493 transport_(std::move(transport_socket)), |
494 host_and_port_(host_and_port), | 494 host_and_port_(host_and_port), |
495 ssl_config_(ssl_config), | 495 ssl_config_(ssl_config), |
496 ssl_session_cache_shard_(context.ssl_session_cache_shard), | 496 ssl_session_cache_shard_(context.ssl_session_cache_shard), |
497 next_handshake_state_(STATE_NONE), | 497 next_handshake_state_(STATE_NONE), |
498 disconnected_(false), | 498 disconnected_(false), |
499 negotiated_protocol_(kProtoUnknown), | 499 negotiated_protocol_(kProtoUnknown), |
500 channel_id_sent_(false), | 500 channel_id_sent_(false), |
(...skipping 26 matching lines...) Expand all Loading... |
527 SSLCertRequestInfo* cert_request_info) { | 527 SSLCertRequestInfo* cert_request_info) { |
528 cert_request_info->host_and_port = host_and_port_; | 528 cert_request_info->host_and_port = host_and_port_; |
529 cert_request_info->cert_authorities = cert_authorities_; | 529 cert_request_info->cert_authorities = cert_authorities_; |
530 cert_request_info->cert_key_types = cert_key_types_; | 530 cert_request_info->cert_key_types = cert_key_types_; |
531 } | 531 } |
532 | 532 |
533 ChannelIDService* SSLClientSocketImpl::GetChannelIDService() const { | 533 ChannelIDService* SSLClientSocketImpl::GetChannelIDService() const { |
534 return channel_id_service_; | 534 return channel_id_service_; |
535 } | 535 } |
536 | 536 |
537 Error SSLClientSocketImpl::GetSignedEKMForTokenBinding( | 537 Error SSLClientSocketImpl::GetTokenBindingSignature(crypto::ECPrivateKey* key, |
538 crypto::ECPrivateKey* key, | 538 TokenBindingType tb_type, |
539 std::vector<uint8_t>* out) { | 539 std::vector<uint8_t>* out) { |
540 // The same key will be used across multiple requests to sign the same value, | 540 // The same key will be used across multiple requests to sign the same value, |
541 // so the signature is cached. | 541 // so the signature is cached. |
542 std::string raw_public_key; | 542 std::string raw_public_key; |
543 if (!key->ExportRawPublicKey(&raw_public_key)) | 543 if (!key->ExportRawPublicKey(&raw_public_key)) |
544 return ERR_FAILED; | 544 return ERR_FAILED; |
545 SignedEkmMap::iterator it = tb_signed_ekm_map_.Get(raw_public_key); | 545 auto it = tb_signature_map_.Get(std::make_pair(tb_type, raw_public_key)); |
546 if (it != tb_signed_ekm_map_.end()) { | 546 if (it != tb_signature_map_.end()) { |
547 *out = it->second; | 547 *out = it->second; |
548 return OK; | 548 return OK; |
549 } | 549 } |
550 | 550 |
551 uint8_t tb_ekm_buf[32]; | 551 uint8_t tb_ekm_buf[32]; |
552 static const char kTokenBindingExporterLabel[] = "EXPORTER-Token-Binding"; | 552 static const char kTokenBindingExporterLabel[] = "EXPORTER-Token-Binding"; |
553 if (!SSL_export_keying_material(ssl_, tb_ekm_buf, sizeof(tb_ekm_buf), | 553 if (!SSL_export_keying_material(ssl_, tb_ekm_buf, sizeof(tb_ekm_buf), |
554 kTokenBindingExporterLabel, | 554 kTokenBindingExporterLabel, |
555 strlen(kTokenBindingExporterLabel), nullptr, | 555 strlen(kTokenBindingExporterLabel), nullptr, |
556 0, false /* no context */)) { | 556 0, false /* no context */)) { |
557 return ERR_FAILED; | 557 return ERR_FAILED; |
558 } | 558 } |
559 | 559 |
560 if (!SignTokenBindingEkm( | 560 if (!CreateTokenBindingSignature( |
561 base::StringPiece(reinterpret_cast<char*>(tb_ekm_buf), | 561 base::StringPiece(reinterpret_cast<char*>(tb_ekm_buf), |
562 sizeof(tb_ekm_buf)), | 562 sizeof(tb_ekm_buf)), |
563 key, out)) | 563 tb_type, key, out)) |
564 return ERR_FAILED; | 564 return ERR_FAILED; |
565 | 565 |
566 tb_signed_ekm_map_.Put(raw_public_key, *out); | 566 tb_signature_map_.Put(std::make_pair(tb_type, raw_public_key), *out); |
567 return OK; | 567 return OK; |
568 } | 568 } |
569 | 569 |
570 crypto::ECPrivateKey* SSLClientSocketImpl::GetChannelIDKey() const { | 570 crypto::ECPrivateKey* SSLClientSocketImpl::GetChannelIDKey() const { |
571 return channel_id_key_.get(); | 571 return channel_id_key_.get(); |
572 } | 572 } |
573 | 573 |
574 int SSLClientSocketImpl::ExportKeyingMaterial(const base::StringPiece& label, | 574 int SSLClientSocketImpl::ExportKeyingMaterial(const base::StringPiece& label, |
575 bool has_context, | 575 bool has_context, |
576 const base::StringPiece& context, | 576 const base::StringPiece& context, |
(...skipping 590 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1167 // afterwards. This is to aid in diagnosing connection failures because a | 1167 // afterwards. This is to aid in diagnosing connection failures because a |
1168 // server requires DHE ciphers. | 1168 // server requires DHE ciphers. |
1169 // | 1169 // |
1170 // TODO(davidben): A few releases after DHE's removal, remove this logic. | 1170 // TODO(davidben): A few releases after DHE's removal, remove this logic. |
1171 if (!ssl_config_.dhe_enabled && | 1171 if (!ssl_config_.dhe_enabled && |
1172 SSL_CIPHER_is_DHE(SSL_get_current_cipher(ssl_))) { | 1172 SSL_CIPHER_is_DHE(SSL_get_current_cipher(ssl_))) { |
1173 return ERR_SSL_OBSOLETE_CIPHER; | 1173 return ERR_SSL_OBSOLETE_CIPHER; |
1174 } | 1174 } |
1175 | 1175 |
1176 // Check that if token binding was negotiated, then extended master secret | 1176 // Check that if token binding was negotiated, then extended master secret |
1177 // must also be negotiated. | 1177 // and renegotiation indication must also be negotiated. |
1178 if (tb_was_negotiated_ && !SSL_get_extms_support(ssl_)) | 1178 if (tb_was_negotiated_ && |
| 1179 !(SSL_get_extms_support(ssl_) && |
| 1180 SSL_get_secure_renegotiation_support(ssl_))) { |
1179 return ERR_SSL_PROTOCOL_ERROR; | 1181 return ERR_SSL_PROTOCOL_ERROR; |
| 1182 } |
1180 | 1183 |
1181 const uint8_t* alpn_proto = NULL; | 1184 const uint8_t* alpn_proto = NULL; |
1182 unsigned alpn_len = 0; | 1185 unsigned alpn_len = 0; |
1183 SSL_get0_alpn_selected(ssl_, &alpn_proto, &alpn_len); | 1186 SSL_get0_alpn_selected(ssl_, &alpn_proto, &alpn_len); |
1184 if (alpn_len > 0) { | 1187 if (alpn_len > 0) { |
1185 base::StringPiece proto(reinterpret_cast<const char*>(alpn_proto), | 1188 base::StringPiece proto(reinterpret_cast<const char*>(alpn_proto), |
1186 alpn_len); | 1189 alpn_len); |
1187 negotiated_protocol_ = NextProtoFromString(proto); | 1190 negotiated_protocol_ = NextProtoFromString(proto); |
1188 } | 1191 } |
1189 | 1192 |
(...skipping 1090 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2280 } | 2283 } |
2281 UMA_HISTOGRAM_ENUMERATION("DomainBoundCerts.Support", supported, | 2284 UMA_HISTOGRAM_ENUMERATION("DomainBoundCerts.Support", supported, |
2282 CHANNEL_ID_USAGE_MAX); | 2285 CHANNEL_ID_USAGE_MAX); |
2283 } | 2286 } |
2284 | 2287 |
2285 bool SSLClientSocketImpl::IsChannelIDEnabled() const { | 2288 bool SSLClientSocketImpl::IsChannelIDEnabled() const { |
2286 return ssl_config_.channel_id_enabled && channel_id_service_; | 2289 return ssl_config_.channel_id_enabled && channel_id_service_; |
2287 } | 2290 } |
2288 | 2291 |
2289 } // namespace net | 2292 } // namespace net |
OLD | NEW |