[email protected] | 61f3ddf | 2012-02-08 02:45:39 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
| 6 | #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 7 | |
[email protected] | ea4a1c6a | 2010-12-09 13:33:28 | [diff] [blame] | 8 | #include <string> |
| 9 | |
[email protected] | a5bd18f | 2012-05-11 15:51:48 | [diff] [blame] | 10 | #include "base/compiler_specific.h" |
[email protected] | 3b63f8f4 | 2011-03-28 01:54:15 | [diff] [blame] | 11 | #include "base/memory/scoped_ptr.h" |
[email protected] | be90ba3 | 2013-05-13 20:05:25 | [diff] [blame] | 12 | #include "base/memory/weak_ptr.h" |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 13 | #include "net/base/completion_callback.h" |
| 14 | #include "net/base/io_buffer.h" |
eroman | 7f9236a | 2015-05-11 21:23:43 | [diff] [blame] | 15 | #include "net/cert/cert_verifier.h" |
[email protected] | 6e7845ae | 2013-03-29 21:48:11 | [diff] [blame] | 16 | #include "net/cert/cert_verify_result.h" |
davidben | eb5f8ef3 | 2014-09-04 14:14:32 | [diff] [blame] | 17 | #include "net/cert/ct_verify_result.h" |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 18 | #include "net/socket/client_socket_handle.h" |
[email protected] | 536fd0b | 2013-03-14 17:41:57 | [diff] [blame] | 19 | #include "net/socket/ssl_client_socket.h" |
[email protected] | 6b8a3c74 | 2014-07-25 00:25:35 | [diff] [blame] | 20 | #include "net/ssl/channel_id_service.h" |
davidben | b8c2321 | 2014-10-28 00:12:16 | [diff] [blame] | 21 | #include "net/ssl/openssl_ssl_util.h" |
[email protected] | c078770 | 2014-05-20 21:51:44 | [diff] [blame] | 22 | #include "net/ssl/ssl_client_cert_type.h" |
[email protected] | 536fd0b | 2013-03-14 17:41:57 | [diff] [blame] | 23 | #include "net/ssl/ssl_config_service.h" |
davidben | f2eaaf9 | 2015-05-15 22:18:42 | [diff] [blame] | 24 | #include "net/ssl/ssl_failure_state.h" |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 25 | |
[email protected] | 03a07b2e | 2013-02-11 20:13:45 | [diff] [blame] | 26 | // Avoid including misc OpenSSL headers, i.e.: |
| 27 | // <openssl/bio.h> |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 28 | typedef struct bio_st BIO; |
[email protected] | 03a07b2e | 2013-02-11 20:13:45 | [diff] [blame] | 29 | // <openssl/evp.h> |
[email protected] | 718c967 | 2010-12-02 10:04:10 | [diff] [blame] | 30 | typedef struct evp_pkey_st EVP_PKEY; |
[email protected] | 03a07b2e | 2013-02-11 20:13:45 | [diff] [blame] | 31 | // <openssl/ssl.h> |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 32 | typedef struct ssl_st SSL; |
[email protected] | 03a07b2e | 2013-02-11 20:13:45 | [diff] [blame] | 33 | // <openssl/x509.h> |
[email protected] | 718c967 | 2010-12-02 10:04:10 | [diff] [blame] | 34 | typedef struct x509_st X509; |
[email protected] | b051cdb6 | 2014-02-28 02:20:16 | [diff] [blame] | 35 | // <openssl/ossl_type.h> |
| 36 | typedef struct x509_store_ctx_st X509_STORE_CTX; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 37 | |
| 38 | namespace net { |
| 39 | |
[email protected] | 170e76c | 2010-10-04 15:04:20 | [diff] [blame] | 40 | class CertVerifier; |
davidben | eb5f8ef3 | 2014-09-04 14:14:32 | [diff] [blame] | 41 | class CTVerifier; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 42 | class SSLCertRequestInfo; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 43 | class SSLInfo; |
| 44 | |
| 45 | // An SSL client socket implemented with OpenSSL. |
| 46 | class SSLClientSocketOpenSSL : public SSLClientSocket { |
| 47 | public: |
| 48 | // Takes ownership of the transport_socket, which may already be connected. |
| 49 | // The given hostname will be compared with the name(s) in the server's |
| 50 | // certificate during the SSL handshake. ssl_config specifies the SSL |
| 51 | // settings. |
[email protected] | 18ccfdb | 2013-08-15 00:13:44 | [diff] [blame] | 52 | SSLClientSocketOpenSSL(scoped_ptr<ClientSocketHandle> transport_socket, |
[email protected] | 055d7f2 | 2010-11-15 12:03:12 | [diff] [blame] | 53 | const HostPortPair& host_and_port, |
[email protected] | 822581d | 2010-12-16 17:27:15 | [diff] [blame] | 54 | const SSLConfig& ssl_config, |
[email protected] | feb79bcd | 2011-07-21 16:55:17 | [diff] [blame] | 55 | const SSLClientSocketContext& context); |
dcheng | b03027d | 2014-10-21 12:00:20 | [diff] [blame] | 56 | ~SSLClientSocketOpenSSL() override; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 57 | |
[email protected] | fbef1393 | 2010-11-23 12:38:53 | [diff] [blame] | 58 | const HostPortPair& host_and_port() const { return host_and_port_; } |
[email protected] | c3456bb | 2011-12-12 22:22:19 | [diff] [blame] | 59 | const std::string& ssl_session_cache_shard() const { |
| 60 | return ssl_session_cache_shard_; |
| 61 | } |
[email protected] | fbef1393 | 2010-11-23 12:38:53 | [diff] [blame] | 62 | |
[email protected] | dbf036f | 2011-12-06 23:33:24 | [diff] [blame] | 63 | // SSLClientSocket implementation. |
dcheng | b03027d | 2014-10-21 12:00:20 | [diff] [blame] | 64 | void GetSSLCertRequestInfo(SSLCertRequestInfo* cert_request_info) override; |
davidben | 6974bf7 | 2015-04-27 17:52:48 | [diff] [blame] | 65 | NextProtoStatus GetNextProto(std::string* proto) const override; |
dcheng | b03027d | 2014-10-21 12:00:20 | [diff] [blame] | 66 | ChannelIDService* GetChannelIDService() const override; |
davidben | f2eaaf9 | 2015-05-15 22:18:42 | [diff] [blame] | 67 | SSLFailureState GetSSLFailureState() const override; |
[email protected] | 81ec7c1 | 2012-07-31 18:32:19 | [diff] [blame] | 68 | |
| 69 | // SSLSocket implementation. |
dcheng | b03027d | 2014-10-21 12:00:20 | [diff] [blame] | 70 | int ExportKeyingMaterial(const base::StringPiece& label, |
| 71 | bool has_context, |
| 72 | const base::StringPiece& context, |
| 73 | unsigned char* out, |
| 74 | unsigned int outlen) override; |
| 75 | int GetTLSUniqueChannelBinding(std::string* out) override; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 76 | |
[email protected] | dbf036f | 2011-12-06 23:33:24 | [diff] [blame] | 77 | // StreamSocket implementation. |
dcheng | b03027d | 2014-10-21 12:00:20 | [diff] [blame] | 78 | int Connect(const CompletionCallback& callback) override; |
| 79 | void Disconnect() override; |
| 80 | bool IsConnected() const override; |
| 81 | bool IsConnectedAndIdle() const override; |
| 82 | int GetPeerAddress(IPEndPoint* address) const override; |
| 83 | int GetLocalAddress(IPEndPoint* address) const override; |
| 84 | const BoundNetLog& NetLog() const override; |
| 85 | void SetSubresourceSpeculation() override; |
| 86 | void SetOmniboxSpeculation() override; |
| 87 | bool WasEverUsed() const override; |
| 88 | bool UsingTCPFastOpen() const override; |
| 89 | bool GetSSLInfo(SSLInfo* ssl_info) override; |
ttuttle | 23fdb7b | 2015-05-15 01:28:03 | [diff] [blame] | 90 | void GetConnectionAttempts(ConnectionAttempts* out) const override; |
| 91 | void ClearConnectionAttempts() override {} |
| 92 | void AddConnectionAttempts(const ConnectionAttempts& attempts) override {} |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 93 | |
[email protected] | dbf036f | 2011-12-06 23:33:24 | [diff] [blame] | 94 | // Socket implementation. |
dcheng | b03027d | 2014-10-21 12:00:20 | [diff] [blame] | 95 | int Read(IOBuffer* buf, |
| 96 | int buf_len, |
| 97 | const CompletionCallback& callback) override; |
| 98 | int Write(IOBuffer* buf, |
| 99 | int buf_len, |
| 100 | const CompletionCallback& callback) override; |
| 101 | int SetReceiveBufferSize(int32 size) override; |
| 102 | int SetSendBufferSize(int32 size) override; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 103 | |
[email protected] | 7f38da8a | 2014-03-17 16:44:26 | [diff] [blame] | 104 | protected: |
| 105 | // SSLClientSocket implementation. |
dcheng | b03027d | 2014-10-21 12:00:20 | [diff] [blame] | 106 | scoped_refptr<X509Certificate> GetUnverifiedServerCertificateChain() |
mostynb | ba063d603 | 2014-10-09 11:01:13 | [diff] [blame] | 107 | const override; |
[email protected] | 7f38da8a | 2014-03-17 16:44:26 | [diff] [blame] | 108 | |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 109 | private: |
[email protected] | 7f38da8a | 2014-03-17 16:44:26 | [diff] [blame] | 110 | class PeerCertificateChain; |
[email protected] | 821e3bb | 2013-11-08 01:06:01 | [diff] [blame] | 111 | class SSLContext; |
| 112 | friend class SSLClientSocket; |
| 113 | friend class SSLContext; |
| 114 | |
[email protected] | c8a80e9 | 2014-05-17 16:02:08 | [diff] [blame] | 115 | int Init(); |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 116 | void DoReadCallback(int result); |
| 117 | void DoWriteCallback(int result); |
| 118 | |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 119 | bool DoTransportIO(); |
| 120 | int DoHandshake(); |
davidben | c4212c0 | 2015-05-12 22:30:18 | [diff] [blame] | 121 | int DoHandshakeComplete(int result); |
[email protected] | faff985 | 2014-06-21 06:13:46 | [diff] [blame] | 122 | int DoChannelIDLookup(); |
| 123 | int DoChannelIDLookupComplete(int result); |
[email protected] | 170e76c | 2010-10-04 15:04:20 | [diff] [blame] | 124 | int DoVerifyCert(int result); |
| 125 | int DoVerifyCertComplete(int result); |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 126 | void DoConnectCallback(int result); |
davidben | 30798ed8 | 2014-09-19 19:28:20 | [diff] [blame] | 127 | void UpdateServerCert(); |
davidben | eb5f8ef3 | 2014-09-04 14:14:32 | [diff] [blame] | 128 | void VerifyCT(); |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 129 | |
| 130 | void OnHandshakeIOComplete(int result); |
| 131 | void OnSendComplete(int result); |
| 132 | void OnRecvComplete(int result); |
| 133 | |
| 134 | int DoHandshakeLoop(int last_io_result); |
davidben | 1b133ad | 2014-10-23 04:23:13 | [diff] [blame] | 135 | int DoReadLoop(); |
| 136 | int DoWriteLoop(); |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 137 | int DoPayloadRead(); |
| 138 | int DoPayloadWrite(); |
| 139 | |
| 140 | int BufferSend(); |
| 141 | int BufferRecv(); |
| 142 | void BufferSendComplete(int result); |
| 143 | void BufferRecvComplete(int result); |
| 144 | void TransportWriteComplete(int result); |
[email protected] | 3e5c692 | 2014-02-06 02:42:16 | [diff] [blame] | 145 | int TransportReadComplete(int result); |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 146 | |
[email protected] | 821e3bb | 2013-11-08 01:06:01 | [diff] [blame] | 147 | // Callback from the SSL layer that indicates the remote server is requesting |
| 148 | // a certificate for this client. |
[email protected] | 82c5902 | 2014-08-15 09:38:27 | [diff] [blame] | 149 | int ClientCertRequestCallback(SSL* ssl); |
[email protected] | 821e3bb | 2013-11-08 01:06:01 | [diff] [blame] | 150 | |
[email protected] | b051cdb6 | 2014-02-28 02:20:16 | [diff] [blame] | 151 | // CertVerifyCallback is called to verify the server's certificates. We do |
| 152 | // verification after the handshake so this function only enforces that the |
| 153 | // certificates don't change during renegotiation. |
| 154 | int CertVerifyCallback(X509_STORE_CTX *store_ctx); |
| 155 | |
[email protected] | 821e3bb | 2013-11-08 01:06:01 | [diff] [blame] | 156 | // Callback from the SSL layer to check which NPN protocol we are supporting |
| 157 | int SelectNextProtoCallback(unsigned char** out, unsigned char* outlen, |
| 158 | const unsigned char* in, unsigned int inlen); |
| 159 | |
[email protected] | 5aea7918 | 2014-07-14 20:43:41 | [diff] [blame] | 160 | // Called during an operation on |transport_bio_|'s peer. Checks saved |
| 161 | // transport error state and, if appropriate, returns an error through |
| 162 | // OpenSSL's error system. |
| 163 | long MaybeReplayTransportError(BIO *bio, |
| 164 | int cmd, |
| 165 | const char *argp, int argi, long argl, |
| 166 | long retvalue); |
| 167 | |
| 168 | // Callback from the SSL layer when an operation is performed on |
| 169 | // |transport_bio_|'s peer. |
| 170 | static long BIOCallback(BIO *bio, |
| 171 | int cmd, |
| 172 | const char *argp, int argi, long argl, |
| 173 | long retvalue); |
| 174 | |
davidben | dafe4e5 | 2015-04-08 22:53:52 | [diff] [blame] | 175 | // Called after the initial handshake completes and after the server |
| 176 | // certificate has been verified. The order of handshake completion and |
| 177 | // certificate verification depends on whether the connection was false |
| 178 | // started. After both have happened (thus calling this twice), the session is |
| 179 | // safe to cache and will be cached. |
| 180 | void MaybeCacheSession(); |
| 181 | |
| 182 | // Callback from the SSL layer when the internal state machine progresses. It |
| 183 | // is used to listen for when the handshake completes entirely; |Connect| may |
| 184 | // return early if false starting. |
| 185 | void InfoCallback(int type, int val); |
| 186 | |
davidben | eb5f8ef3 | 2014-09-04 14:14:32 | [diff] [blame] | 187 | // Adds the SignedCertificateTimestamps from ct_verify_result_ to |ssl_info|. |
| 188 | // SCTs are held in three separate vectors in ct_verify_result, each |
| 189 | // vetor representing a particular verification state, this method associates |
| 190 | // each of the SCTs with the corresponding SCTVerifyStatus as it adds it to |
| 191 | // the |ssl_info|.signed_certificate_timestamps list. |
| 192 | void AddSCTInfoToSSLInfo(SSLInfo* ssl_info) const; |
| 193 | |
rsleevi | f020edc | 2015-03-16 19:31:24 | [diff] [blame] | 194 | // Returns a unique key string for the SSL session cache for |
| 195 | // this socket. |
| 196 | std::string GetSessionCacheKey() const; |
| 197 | |
davidben | 421116c | 2015-05-12 19:56:51 | [diff] [blame] | 198 | // Returns true if renegotiations are allowed. |
| 199 | bool IsRenegotiationAllowed() const; |
| 200 | |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 201 | bool transport_send_busy_; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 202 | bool transport_recv_busy_; |
[email protected] | 4b76856 | 2013-02-16 04:10:07 | [diff] [blame] | 203 | |
haavardm | 2d92e72 | 2014-12-19 13:45:44 | [diff] [blame] | 204 | // Buffers which are shared by BoringSSL and SSLClientSocketOpenSSL. |
| 205 | // GrowableIOBuffer is used to keep ownership and setting offset. |
| 206 | scoped_refptr<GrowableIOBuffer> send_buffer_; |
| 207 | scoped_refptr<GrowableIOBuffer> recv_buffer_; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 208 | |
[email protected] | dbf036f | 2011-12-06 23:33:24 | [diff] [blame] | 209 | CompletionCallback user_connect_callback_; |
[email protected] | 3f55aa1 | 2011-12-07 02:03:33 | [diff] [blame] | 210 | CompletionCallback user_read_callback_; |
[email protected] | 83039bb | 2011-12-09 18:43:55 | [diff] [blame] | 211 | CompletionCallback user_write_callback_; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 212 | |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 213 | // Used by Read function. |
| 214 | scoped_refptr<IOBuffer> user_read_buf_; |
| 215 | int user_read_buf_len_; |
| 216 | |
| 217 | // Used by Write function. |
| 218 | scoped_refptr<IOBuffer> user_write_buf_; |
| 219 | int user_write_buf_len_; |
| 220 | |
[email protected] | 4b76856 | 2013-02-16 04:10:07 | [diff] [blame] | 221 | // Used by DoPayloadRead() when attempting to fill the caller's buffer with |
| 222 | // as much data as possible without blocking. |
| 223 | // If DoPayloadRead() encounters an error after having read some data, stores |
| 224 | // the result to return on the *next* call to DoPayloadRead(). A value > 0 |
| 225 | // indicates there is no pending result, otherwise 0 indicates EOF and < 0 |
| 226 | // indicates an error. |
| 227 | int pending_read_error_; |
| 228 | |
davidben | b8c2321 | 2014-10-28 00:12:16 | [diff] [blame] | 229 | // If there is a pending read result, the OpenSSL result code (output of |
| 230 | // SSL_get_error) associated with it. |
| 231 | int pending_read_ssl_error_; |
| 232 | |
| 233 | // If there is a pending read result, the OpenSSLErrorInfo associated with it. |
| 234 | OpenSSLErrorInfo pending_read_error_info_; |
| 235 | |
[email protected] | 5aea7918 | 2014-07-14 20:43:41 | [diff] [blame] | 236 | // Used by TransportReadComplete() to signify an error reading from the |
| 237 | // transport socket. A value of OK indicates the socket is still |
| 238 | // readable. EOFs are mapped to ERR_CONNECTION_CLOSED. |
| 239 | int transport_read_error_; |
| 240 | |
[email protected] | 3e5c692 | 2014-02-06 02:42:16 | [diff] [blame] | 241 | // Used by TransportWriteComplete() and TransportReadComplete() to signify an |
| 242 | // error writing to the transport socket. A value of OK indicates no error. |
| 243 | int transport_write_error_; |
| 244 | |
[email protected] | 64b5c89 | 2014-08-08 09:39:26 | [diff] [blame] | 245 | // Set when Connect finishes. |
[email protected] | 7f38da8a | 2014-03-17 16:44:26 | [diff] [blame] | 246 | scoped_ptr<PeerCertificateChain> server_cert_chain_; |
[email protected] | 170e76c | 2010-10-04 15:04:20 | [diff] [blame] | 247 | scoped_refptr<X509Certificate> server_cert_; |
| 248 | CertVerifyResult server_cert_verify_result_; |
[email protected] | 64b5c89 | 2014-08-08 09:39:26 | [diff] [blame] | 249 | bool completed_connect_; |
[email protected] | 170e76c | 2010-10-04 15:04:20 | [diff] [blame] | 250 | |
[email protected] | 0dc88b3 | 2014-03-26 20:12:28 | [diff] [blame] | 251 | // Set when Read() or Write() successfully reads or writes data to or from the |
| 252 | // network. |
| 253 | bool was_ever_used_; |
| 254 | |
[email protected] | 515adc2 | 2013-01-09 16:01:23 | [diff] [blame] | 255 | // List of DER-encoded X.509 DistinguishedName of certificate authorities |
| 256 | // allowed by the server. |
| 257 | std::vector<std::string> cert_authorities_; |
[email protected] | c078770 | 2014-05-20 21:51:44 | [diff] [blame] | 258 | // List of SSLClientCertType values for client certificates allowed by the |
| 259 | // server. |
| 260 | std::vector<SSLClientCertType> cert_key_types_; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 261 | |
[email protected] | 822581d | 2010-12-16 17:27:15 | [diff] [blame] | 262 | CertVerifier* const cert_verifier_; |
eroman | 7f9236a | 2015-05-11 21:23:43 | [diff] [blame] | 263 | scoped_ptr<CertVerifier::Request> cert_verifier_request_; |
davidben | 09c3d07 | 2014-08-25 20:33:58 | [diff] [blame] | 264 | base::TimeTicks start_cert_verification_time_; |
[email protected] | 170e76c | 2010-10-04 15:04:20 | [diff] [blame] | 265 | |
davidben | eb5f8ef3 | 2014-09-04 14:14:32 | [diff] [blame] | 266 | // Certificate Transparency: Verifier and result holder. |
| 267 | ct::CTVerifyResult ct_verify_result_; |
| 268 | CTVerifier* cert_transparency_verifier_; |
| 269 | |
[email protected] | ee0f2aa8 | 2013-10-25 11:59:26 | [diff] [blame] | 270 | // The service for retrieving Channel ID keys. May be NULL. |
[email protected] | 6b8a3c74 | 2014-07-25 00:25:35 | [diff] [blame] | 271 | ChannelIDService* channel_id_service_; |
[email protected] | ee0f2aa8 | 2013-10-25 11:59:26 | [diff] [blame] | 272 | |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 273 | // OpenSSL stuff |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 274 | SSL* ssl_; |
| 275 | BIO* transport_bio_; |
| 276 | |
| 277 | scoped_ptr<ClientSocketHandle> transport_; |
[email protected] | 055d7f2 | 2010-11-15 12:03:12 | [diff] [blame] | 278 | const HostPortPair host_and_port_; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 279 | SSLConfig ssl_config_; |
[email protected] | c3456bb | 2011-12-12 22:22:19 | [diff] [blame] | 280 | // ssl_session_cache_shard_ is an opaque string that partitions the SSL |
| 281 | // session cache. i.e. sessions created with one value will not attempt to |
| 282 | // resume on the socket with a different value. |
| 283 | const std::string ssl_session_cache_shard_; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 284 | |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 285 | enum State { |
| 286 | STATE_NONE, |
| 287 | STATE_HANDSHAKE, |
davidben | c4212c0 | 2015-05-12 22:30:18 | [diff] [blame] | 288 | STATE_HANDSHAKE_COMPLETE, |
[email protected] | faff985 | 2014-06-21 06:13:46 | [diff] [blame] | 289 | STATE_CHANNEL_ID_LOOKUP, |
| 290 | STATE_CHANNEL_ID_LOOKUP_COMPLETE, |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 291 | STATE_VERIFY_CERT, |
| 292 | STATE_VERIFY_CERT_COMPLETE, |
| 293 | }; |
| 294 | State next_handshake_state_; |
[email protected] | ea4a1c6a | 2010-12-09 13:33:28 | [diff] [blame] | 295 | NextProtoStatus npn_status_; |
| 296 | std::string npn_proto_; |
[email protected] | 6b8a3c74 | 2014-07-25 00:25:35 | [diff] [blame] | 297 | // Written by the |channel_id_service_|. |
nharper | 2e171cf | 2015-06-01 20:29:23 | [diff] [blame] | 298 | scoped_ptr<crypto::ECPrivateKey> channel_id_key_; |
davidben | 52053b38 | 2015-04-27 19:22:29 | [diff] [blame] | 299 | // True if a channel ID was sent. |
| 300 | bool channel_id_sent_; |
davidben | dafe4e5 | 2015-04-08 22:53:52 | [diff] [blame] | 301 | // True if the initial handshake has completed. |
| 302 | bool handshake_completed_; |
| 303 | // True if the initial handshake's certificate has been verified. |
| 304 | bool certificate_verified_; |
[email protected] | 6b8a3c74 | 2014-07-25 00:25:35 | [diff] [blame] | 305 | // The request handle for |channel_id_service_|. |
nharper | 75ade89 | 2015-06-10 19:05:35 | [diff] [blame^] | 306 | ChannelIDService::Request channel_id_request_; |
davidben | f2eaaf9 | 2015-05-15 22:18:42 | [diff] [blame] | 307 | SSLFailureState ssl_failure_state_; |
[email protected] | 8bd4e7a | 2014-08-09 14:49:17 | [diff] [blame] | 308 | |
| 309 | TransportSecurityState* transport_security_state_; |
| 310 | |
eranm | 6571b2b | 2014-12-03 15:53:23 | [diff] [blame] | 311 | CertPolicyEnforcer* const policy_enforcer_; |
| 312 | |
[email protected] | 8bd4e7a | 2014-08-09 14:49:17 | [diff] [blame] | 313 | // pinning_failure_log contains a message produced by |
| 314 | // TransportSecurityState::CheckPublicKeyPins in the event of a |
| 315 | // pinning failure. It is a (somewhat) human-readable string. |
| 316 | std::string pinning_failure_log_; |
| 317 | |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 318 | BoundNetLog net_log_; |
kulkarni.a | cd7b446 | 2014-08-28 07:41:34 | [diff] [blame] | 319 | base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; |
[email protected] | d518cd9 | 2010-09-29 12:27:44 | [diff] [blame] | 320 | }; |
| 321 | |
| 322 | } // namespace net |
| 323 | |
[email protected] | 7e5dd49f | 2010-12-08 18:33:49 | [diff] [blame] | 324 | #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |