Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(283)

Side by Side Diff: net/socket/ssl_client_socket_openssl.cc

Issue 383003002: Pass the client certificate into OpenSSL in common code. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/base/net_error_list.h ('k') | tools/metrics/histograms/histograms.xml » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // OpenSSL binding for SSLClientSocket. The class layout and general principle 5 // OpenSSL binding for SSLClientSocket. The class layout and general principle
6 // of operation is derived from SSLClientSocketNSS. 6 // of operation is derived from SSLClientSocketNSS.
7 7
8 #include "net/socket/ssl_client_socket_openssl.h" 8 #include "net/socket/ssl_client_socket_openssl.h"
9 9
10 #include <openssl/err.h> 10 #include <openssl/err.h>
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after
45 #endif 45 #endif
46 46
47 // This constant can be any non-negative/non-zero value (eg: it does not 47 // This constant can be any non-negative/non-zero value (eg: it does not
48 // overlap with any value of the net::Error range, including net::OK). 48 // overlap with any value of the net::Error range, including net::OK).
49 const int kNoPendingReadResult = 1; 49 const int kNoPendingReadResult = 1;
50 50
51 // If a client doesn't have a list of protocols that it supports, but 51 // If a client doesn't have a list of protocols that it supports, but
52 // the server supports NPN, choosing "http/1.1" is the best answer. 52 // the server supports NPN, choosing "http/1.1" is the best answer.
53 const char kDefaultSupportedNPNProtocol[] = "http/1.1"; 53 const char kDefaultSupportedNPNProtocol[] = "http/1.1";
54 54
55 typedef crypto::ScopedOpenSSL<X509, X509_free>::Type ScopedX509;
56
55 #if OPENSSL_VERSION_NUMBER < 0x1000103fL 57 #if OPENSSL_VERSION_NUMBER < 0x1000103fL
56 // This method doesn't seem to have made it into the OpenSSL headers. 58 // This method doesn't seem to have made it into the OpenSSL headers.
57 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } 59 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; }
58 #endif 60 #endif
59 61
60 // Used for encoding the |connection_status| field of an SSLInfo object. 62 // Used for encoding the |connection_status| field of an SSLInfo object.
61 int EncodeSSLConnectionStatus(int cipher_suite, 63 int EncodeSSLConnectionStatus(int cipher_suite,
62 int compression, 64 int compression,
63 int version) { 65 int version) {
64 return ((cipher_suite & SSL_CONNECTION_CIPHERSUITE_MASK) << 66 return ((cipher_suite & SSL_CONNECTION_CIPHERSUITE_MASK) <<
(...skipping 25 matching lines...) Expand all
90 92
91 // Compute a unique key string for the SSL session cache. |socket| is an 93 // Compute a unique key string for the SSL session cache. |socket| is an
92 // input socket object. Return a string. 94 // input socket object. Return a string.
93 std::string GetSocketSessionCacheKey(const SSLClientSocketOpenSSL& socket) { 95 std::string GetSocketSessionCacheKey(const SSLClientSocketOpenSSL& socket) {
94 std::string result = socket.host_and_port().ToString(); 96 std::string result = socket.host_and_port().ToString();
95 result.append("/"); 97 result.append("/");
96 result.append(socket.ssl_session_cache_shard()); 98 result.append(socket.ssl_session_cache_shard());
97 return result; 99 return result;
98 } 100 }
99 101
100 static void FreeX509Stack(STACK_OF(X509) * ptr) { 102 void FreeX509Stack(STACK_OF(X509) * ptr) {
101 sk_X509_pop_free(ptr, X509_free); 103 sk_X509_pop_free(ptr, X509_free);
102 } 104 }
103 105
106 ScopedX509 OSCertHandleToOpenSSL(
107 X509Certificate::OSCertHandle os_handle) {
108 #if defined(USE_OPENSSL_CERTS)
109 return ScopedX509(X509Certificate::DupOSCertHandle(os_handle));
110 #else // !defined(USE_OPENSSL_CERTS)
111 std::string der_encoded;
112 if (!X509Certificate::GetDEREncoded(os_handle, &der_encoded))
113 return ScopedX509();
114 const uint8_t* bytes = reinterpret_cast<const uint8_t*>(der_encoded.data());
115 return ScopedX509(d2i_X509(NULL, &bytes, der_encoded.size()));
116 #endif // defined(USE_OPENSSL_CERTS)
117 }
118
104 } // namespace 119 } // namespace
105 120
106 class SSLClientSocketOpenSSL::SSLContext { 121 class SSLClientSocketOpenSSL::SSLContext {
107 public: 122 public:
108 static SSLContext* GetInstance() { return Singleton<SSLContext>::get(); } 123 static SSLContext* GetInstance() { return Singleton<SSLContext>::get(); }
109 SSL_CTX* ssl_ctx() { return ssl_ctx_.get(); } 124 SSL_CTX* ssl_ctx() { return ssl_ctx_.get(); }
110 SSLSessionCacheOpenSSL* session_cache() { return &session_cache_; } 125 SSLSessionCacheOpenSSL* session_cache() { return &session_cache_; }
111 126
112 SSLClientSocketOpenSSL* GetClientSocketFromSSL(const SSL* ssl) { 127 SSLClientSocketOpenSSL* GetClientSocketFromSSL(const SSL* ssl) {
113 DCHECK(ssl); 128 DCHECK(ssl);
(...skipping 1228 matching lines...) Expand 10 before | Expand all | Expand 10 after
1342 for (size_t i = 0; i < num_client_cert_types; i++) { 1357 for (size_t i = 0; i < num_client_cert_types; i++) {
1343 cert_key_types_.push_back( 1358 cert_key_types_.push_back(
1344 static_cast<SSLClientCertType>(client_cert_types[i])); 1359 static_cast<SSLClientCertType>(client_cert_types[i]));
1345 } 1360 }
1346 1361
1347 return -1; // Suspends handshake. 1362 return -1; // Suspends handshake.
1348 } 1363 }
1349 1364
1350 // Second pass: a client certificate should have been selected. 1365 // Second pass: a client certificate should have been selected.
1351 if (ssl_config_.client_cert.get()) { 1366 if (ssl_config_.client_cert.get()) {
1367 // TODO(davidben): Configure OpenSSL to also send the intermediates.
1368 ScopedX509 leaf_x509 =
1369 OSCertHandleToOpenSSL(ssl_config_.client_cert->os_cert_handle());
1370 if (!leaf_x509) {
1371 LOG(WARNING) << "Failed to import certificate";
1372 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_CERT_BAD_FORMAT);
Ryan Sleevi 2014/07/11 18:20:14 Update NSS to use this code too?
davidben 2014/07/11 18:32:20 Hrm. So it doesn't look like NSS actually gives yo
1373 return -1;
1374 }
1375
1376 OpenSSLClientKeyStore::ScopedEVP_PKEY privkey;
1352 #if defined(USE_OPENSSL_CERTS) 1377 #if defined(USE_OPENSSL_CERTS)
1353 // A note about ownership: FetchClientCertPrivateKey() increments 1378 // A note about ownership: FetchClientCertPrivateKey() increments
1354 // the reference count of the EVP_PKEY. Ownership of this reference 1379 // the reference count of the EVP_PKEY. Ownership of this reference
1355 // is passed directly to OpenSSL, which will release the reference 1380 // is passed directly to OpenSSL, which will release the reference
1356 // using EVP_PKEY_free() when the SSL object is destroyed. 1381 // using EVP_PKEY_free() when the SSL object is destroyed.
1357 OpenSSLClientKeyStore::ScopedEVP_PKEY privkey; 1382 if (!OpenSSLClientKeyStore::GetInstance()->FetchClientCertPrivateKey(
1358 if (OpenSSLClientKeyStore::GetInstance()->FetchClientCertPrivateKey(
1359 ssl_config_.client_cert.get(), &privkey)) { 1383 ssl_config_.client_cert.get(), &privkey)) {
1360 // TODO(joth): (copied from NSS) We should wait for server certificate 1384 // Could not find the private key. Fail the handshake and surface an
1361 // verification before sending our credentials. See http://crbug.com/13934 1385 // appropriate error to the caller.
1362 *x509 = X509Certificate::DupOSCertHandle( 1386 LOG(WARNING) << "Client cert found without private key";
1363 ssl_config_.client_cert->os_cert_handle()); 1387 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY);
1364 *pkey = privkey.release(); 1388 return -1;
1365 return 1;
1366 } 1389 }
1390 #else // !defined(USE_OPENSSL_CERTS)
1391 // OS handling of private keys is not yet implemented.
1392 NOTIMPLEMENTED();
1393 return 0;
1394 #endif // defined(USE_OPENSSL_CERTS)
1367 1395
1368 // Could not find the private key. Fail the handshake and surface an 1396 // TODO(joth): (copied from NSS) We should wait for server certificate
1369 // appropriate error to the caller. 1397 // verification before sending our credentials. See http://crbug.com/13934
1370 LOG(WARNING) << "Client cert found without private key"; 1398 *x509 = leaf_x509.release();
1371 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY); 1399 *pkey = privkey.release();
1372 return -1; 1400 return 1;
1373 #else // !defined(USE_OPENSSL_CERTS)
1374 // OS handling of client certificates is not yet implemented.
1375 NOTIMPLEMENTED();
1376 #endif // defined(USE_OPENSSL_CERTS)
1377 } 1401 }
1378 1402
1379 // Send no client certificate. 1403 // Send no client certificate.
1380 return 0; 1404 return 0;
1381 } 1405 }
1382 1406
1383 int SSLClientSocketOpenSSL::CertVerifyCallback(X509_STORE_CTX* store_ctx) { 1407 int SSLClientSocketOpenSSL::CertVerifyCallback(X509_STORE_CTX* store_ctx) {
1384 if (!completed_handshake_) { 1408 if (!completed_handshake_) {
1385 // If the first handshake hasn't completed then we accept any certificates 1409 // If the first handshake hasn't completed then we accept any certificates
1386 // because we verify after the handshake. 1410 // because we verify after the handshake.
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after
1449 DVLOG(2) << "next protocol: '" << npn_proto_ << "' status: " << npn_status_; 1473 DVLOG(2) << "next protocol: '" << npn_proto_ << "' status: " << npn_status_;
1450 return SSL_TLSEXT_ERR_OK; 1474 return SSL_TLSEXT_ERR_OK;
1451 } 1475 }
1452 1476
1453 scoped_refptr<X509Certificate> 1477 scoped_refptr<X509Certificate>
1454 SSLClientSocketOpenSSL::GetUnverifiedServerCertificateChain() const { 1478 SSLClientSocketOpenSSL::GetUnverifiedServerCertificateChain() const {
1455 return server_cert_; 1479 return server_cert_;
1456 } 1480 }
1457 1481
1458 } // namespace net 1482 } // namespace net
OLDNEW
« no previous file with comments | « net/base/net_error_list.h ('k') | tools/metrics/histograms/histograms.xml » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698