// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "jingle/glue/fake_ssl_client_socket.h" #include #include "base/basictypes.h" #include "base/compiler_specific.h" #include "base/logging.h" #include "net/base/io_buffer.h" #include "net/base/net_errors.h" namespace jingle_glue { namespace { // The constants below were taken from libjingle's socketadapters.cc. // Basically, we do a "fake" SSL handshake to fool proxies into // thinking this is a real SSL connection. // This is a SSL v2 CLIENT_HELLO message. // TODO(juberti): Should this have a session id? The response doesn't have a // certificate, so the hello should have a session id. static const uint8 kSslClientHello[] = { 0x80, 0x46, // msg len 0x01, // CLIENT_HELLO 0x03, 0x01, // SSL 3.1 0x00, 0x2d, // ciphersuite len 0x00, 0x00, // session id len 0x00, 0x10, // challenge len 0x01, 0x00, 0x80, 0x03, 0x00, 0x80, 0x07, 0x00, 0xc0, // ciphersuites 0x06, 0x00, 0x40, 0x02, 0x00, 0x80, 0x04, 0x00, 0x80, // 0x00, 0x00, 0x04, 0x00, 0xfe, 0xff, 0x00, 0x00, 0x0a, // 0x00, 0xfe, 0xfe, 0x00, 0x00, 0x09, 0x00, 0x00, 0x64, // 0x00, 0x00, 0x62, 0x00, 0x00, 0x03, 0x00, 0x00, 0x06, // 0x1f, 0x17, 0x0c, 0xa6, 0x2f, 0x00, 0x78, 0xfc, // challenge 0x46, 0x55, 0x2e, 0xb1, 0x83, 0x39, 0xf1, 0xea // }; // This is a TLSv1 SERVER_HELLO message. static const uint8 kSslServerHello[] = { 0x16, // handshake message 0x03, 0x01, // SSL 3.1 0x00, 0x4a, // message len 0x02, // SERVER_HELLO 0x00, 0x00, 0x46, // handshake len 0x03, 0x01, // SSL 3.1 0x42, 0x85, 0x45, 0xa7, 0x27, 0xa9, 0x5d, 0xa0, // server random 0xb3, 0xc5, 0xe7, 0x53, 0xda, 0x48, 0x2b, 0x3f, // 0xc6, 0x5a, 0xca, 0x89, 0xc1, 0x58, 0x52, 0xa1, // 0x78, 0x3c, 0x5b, 0x17, 0x46, 0x00, 0x85, 0x3f, // 0x20, // session id len 0x0e, 0xd3, 0x06, 0x72, 0x5b, 0x5b, 0x1b, 0x5f, // session id 0x15, 0xac, 0x13, 0xf9, 0x88, 0x53, 0x9d, 0x9b, // 0xe8, 0x3d, 0x7b, 0x0c, 0x30, 0x32, 0x6e, 0x38, // 0x4d, 0xa2, 0x75, 0x57, 0x41, 0x6c, 0x34, 0x5c, // 0x00, 0x04, // RSA/RC4-128/MD5 0x00 // null compression }; net::DrainableIOBuffer* NewDrainableIOBufferWithSize(int size) { return new net::DrainableIOBuffer(new net::IOBuffer(size), size); } } // namespace base::StringPiece FakeSSLClientSocket::GetSslClientHello() { return base::StringPiece(reinterpret_cast(kSslClientHello), arraysize(kSslClientHello)); } base::StringPiece FakeSSLClientSocket::GetSslServerHello() { return base::StringPiece(reinterpret_cast(kSslServerHello), arraysize(kSslServerHello)); } FakeSSLClientSocket::FakeSSLClientSocket( scoped_ptr transport_socket) : transport_socket_(transport_socket.Pass()), next_handshake_state_(STATE_NONE), handshake_completed_(false), write_buf_(NewDrainableIOBufferWithSize(arraysize(kSslClientHello))), read_buf_(NewDrainableIOBufferWithSize(arraysize(kSslServerHello))) { CHECK(transport_socket_.get()); std::memcpy(write_buf_->data(), kSslClientHello, arraysize(kSslClientHello)); } FakeSSLClientSocket::~FakeSSLClientSocket() {} int FakeSSLClientSocket::Read(net::IOBuffer* buf, int buf_len, const net::CompletionCallback& callback) { DCHECK_EQ(next_handshake_state_, STATE_NONE); DCHECK(handshake_completed_); return transport_socket_->Read(buf, buf_len, callback); } int FakeSSLClientSocket::Write(net::IOBuffer* buf, int buf_len, const net::CompletionCallback& callback) { DCHECK_EQ(next_handshake_state_, STATE_NONE); DCHECK(handshake_completed_); return transport_socket_->Write(buf, buf_len, callback); } bool FakeSSLClientSocket::SetReceiveBufferSize(int32 size) { return transport_socket_->SetReceiveBufferSize(size); } bool FakeSSLClientSocket::SetSendBufferSize(int32 size) { return transport_socket_->SetSendBufferSize(size); } int FakeSSLClientSocket::Connect(const net::CompletionCallback& callback) { // We don't support synchronous operation, even if // |transport_socket_| does. DCHECK(!callback.is_null()); DCHECK_EQ(next_handshake_state_, STATE_NONE); DCHECK(!handshake_completed_); DCHECK(user_connect_callback_.is_null()); DCHECK_EQ(write_buf_->BytesConsumed(), 0); DCHECK_EQ(read_buf_->BytesConsumed(), 0); next_handshake_state_ = STATE_CONNECT; int status = DoHandshakeLoop(); if (status == net::ERR_IO_PENDING) user_connect_callback_ = callback; return status; } int FakeSSLClientSocket::DoHandshakeLoop() { DCHECK_NE(next_handshake_state_, STATE_NONE); int status = net::OK; do { HandshakeState state = next_handshake_state_; next_handshake_state_ = STATE_NONE; switch (state) { case STATE_CONNECT: status = DoConnect(); break; case STATE_SEND_CLIENT_HELLO: status = DoSendClientHello(); break; case STATE_VERIFY_SERVER_HELLO: status = DoVerifyServerHello(); break; default: status = net::ERR_UNEXPECTED; LOG(DFATAL) << "unexpected state: " << state; break; } } while ((status != net::ERR_IO_PENDING) && (next_handshake_state_ != STATE_NONE)); return status; } void FakeSSLClientSocket::RunUserConnectCallback(int status) { DCHECK_LE(status, net::OK); next_handshake_state_ = STATE_NONE; net::CompletionCallback user_connect_callback = user_connect_callback_; user_connect_callback_.Reset(); user_connect_callback.Run(status); } void FakeSSLClientSocket::DoHandshakeLoopWithUserConnectCallback() { int status = DoHandshakeLoop(); if (status != net::ERR_IO_PENDING) { RunUserConnectCallback(status); } } int FakeSSLClientSocket::DoConnect() { int status = transport_socket_->Connect( base::Bind(&FakeSSLClientSocket::OnConnectDone, base::Unretained(this))); if (status != net::OK) { return status; } ProcessConnectDone(); return net::OK; } void FakeSSLClientSocket::OnConnectDone(int status) { DCHECK_NE(status, net::ERR_IO_PENDING); DCHECK_LE(status, net::OK); DCHECK(!user_connect_callback_.is_null()); if (status != net::OK) { RunUserConnectCallback(status); return; } ProcessConnectDone(); DoHandshakeLoopWithUserConnectCallback(); } void FakeSSLClientSocket::ProcessConnectDone() { DCHECK_EQ(write_buf_->BytesConsumed(), 0); DCHECK_EQ(read_buf_->BytesConsumed(), 0); next_handshake_state_ = STATE_SEND_CLIENT_HELLO; } int FakeSSLClientSocket::DoSendClientHello() { int status = transport_socket_->Write( write_buf_.get(), write_buf_->BytesRemaining(), base::Bind(&FakeSSLClientSocket::OnSendClientHelloDone, base::Unretained(this))); if (status < net::OK) { return status; } ProcessSendClientHelloDone(static_cast(status)); return net::OK; } void FakeSSLClientSocket::OnSendClientHelloDone(int status) { DCHECK_NE(status, net::ERR_IO_PENDING); DCHECK(!user_connect_callback_.is_null()); if (status < net::OK) { RunUserConnectCallback(status); return; } ProcessSendClientHelloDone(static_cast(status)); DoHandshakeLoopWithUserConnectCallback(); } void FakeSSLClientSocket::ProcessSendClientHelloDone(size_t written) { DCHECK_LE(written, static_cast(write_buf_->BytesRemaining())); DCHECK_EQ(read_buf_->BytesConsumed(), 0); if (written < static_cast(write_buf_->BytesRemaining())) { next_handshake_state_ = STATE_SEND_CLIENT_HELLO; write_buf_->DidConsume(written); } else { next_handshake_state_ = STATE_VERIFY_SERVER_HELLO; } } int FakeSSLClientSocket::DoVerifyServerHello() { int status = transport_socket_->Read( read_buf_.get(), read_buf_->BytesRemaining(), base::Bind(&FakeSSLClientSocket::OnVerifyServerHelloDone, base::Unretained(this))); if (status < net::OK) { return status; } size_t read = static_cast(status); return ProcessVerifyServerHelloDone(read); } void FakeSSLClientSocket::OnVerifyServerHelloDone(int status) { DCHECK_NE(status, net::ERR_IO_PENDING); DCHECK(!user_connect_callback_.is_null()); if (status < net::OK) { RunUserConnectCallback(status); return; } size_t read = static_cast(status); status = ProcessVerifyServerHelloDone(read); if (status < net::OK) { RunUserConnectCallback(status); return; } if (handshake_completed_) { RunUserConnectCallback(net::OK); } else { DoHandshakeLoopWithUserConnectCallback(); } } net::Error FakeSSLClientSocket::ProcessVerifyServerHelloDone(size_t read) { DCHECK_LE(read, static_cast(read_buf_->BytesRemaining())); if (read == 0U) { return net::ERR_UNEXPECTED; } const uint8* expected_data_start = &kSslServerHello[arraysize(kSslServerHello) - read_buf_->BytesRemaining()]; if (std::memcmp(expected_data_start, read_buf_->data(), read) != 0) { return net::ERR_UNEXPECTED; } if (read < static_cast(read_buf_->BytesRemaining())) { next_handshake_state_ = STATE_VERIFY_SERVER_HELLO; read_buf_->DidConsume(read); } else { next_handshake_state_ = STATE_NONE; handshake_completed_ = true; } return net::OK; } void FakeSSLClientSocket::Disconnect() { transport_socket_->Disconnect(); next_handshake_state_ = STATE_NONE; handshake_completed_ = false; user_connect_callback_.Reset(); write_buf_->SetOffset(0); read_buf_->SetOffset(0); } bool FakeSSLClientSocket::IsConnected() const { return handshake_completed_ && transport_socket_->IsConnected(); } bool FakeSSLClientSocket::IsConnectedAndIdle() const { return handshake_completed_ && transport_socket_->IsConnectedAndIdle(); } int FakeSSLClientSocket::GetPeerAddress(net::IPEndPoint* address) const { return transport_socket_->GetPeerAddress(address); } int FakeSSLClientSocket::GetLocalAddress(net::IPEndPoint* address) const { return transport_socket_->GetLocalAddress(address); } const net::BoundNetLog& FakeSSLClientSocket::NetLog() const { return transport_socket_->NetLog(); } void FakeSSLClientSocket::SetSubresourceSpeculation() { transport_socket_->SetSubresourceSpeculation(); } void FakeSSLClientSocket::SetOmniboxSpeculation() { transport_socket_->SetOmniboxSpeculation(); } bool FakeSSLClientSocket::WasEverUsed() const { return transport_socket_->WasEverUsed(); } bool FakeSSLClientSocket::UsingTCPFastOpen() const { return transport_socket_->UsingTCPFastOpen(); } bool FakeSSLClientSocket::WasNpnNegotiated() const { return transport_socket_->WasNpnNegotiated(); } net::NextProto FakeSSLClientSocket::GetNegotiatedProtocol() const { return transport_socket_->GetNegotiatedProtocol(); } bool FakeSSLClientSocket::GetSSLInfo(net::SSLInfo* ssl_info) { return transport_socket_->GetSSLInfo(ssl_info); } } // namespace jingle_glue