2014-09-19 19:25:00 +04:00
|
|
|
/* vim:set ts=2 sw=2 et cindent: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "TLSServerSocket.h"
|
|
|
|
|
|
|
|
#include "mozilla/net/DNS.h"
|
|
|
|
#include "nsAutoPtr.h"
|
|
|
|
#include "nsComponentManagerUtils.h"
|
2017-02-09 18:11:29 +03:00
|
|
|
#include "nsDependentSubstring.h"
|
2014-09-19 19:25:00 +04:00
|
|
|
#include "nsIServerSocket.h"
|
|
|
|
#include "nsIX509Cert.h"
|
|
|
|
#include "nsIX509CertDB.h"
|
|
|
|
#include "nsNetCID.h"
|
|
|
|
#include "nsProxyRelease.h"
|
|
|
|
#include "nsServiceManagerUtils.h"
|
|
|
|
#include "nsSocketTransport2.h"
|
|
|
|
#include "nsThreadUtils.h"
|
|
|
|
#include "ScopedNSSTypes.h"
|
|
|
|
#include "ssl.h"
|
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
namespace net {
|
|
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// TLSServerSocket
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
TLSServerSocket::TLSServerSocket() : mServerCert(nullptr) {}
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS_INHERITED(TLSServerSocket, nsServerSocket, nsITLSServerSocket)
|
|
|
|
|
|
|
|
nsresult TLSServerSocket::SetSocketDefaults() {
|
|
|
|
// Set TLS options on the listening socket
|
|
|
|
mFD = SSL_ImportFD(nullptr, mFD);
|
|
|
|
if (NS_WARN_IF(!mFD)) {
|
|
|
|
return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
|
|
|
|
}
|
|
|
|
|
|
|
|
SSL_OptionSet(mFD, SSL_SECURITY, true);
|
|
|
|
SSL_OptionSet(mFD, SSL_HANDSHAKE_AS_CLIENT, false);
|
|
|
|
SSL_OptionSet(mFD, SSL_HANDSHAKE_AS_SERVER, true);
|
bug 1485087 - remove the option to use the TLS session cache from nsITLSServerSocket r=jryans,mayhemer
As initially implemented, nsITLSServerSocket by default enabled the use of the
TLS session cache provided by NSS. However, no consumers of nsITLSServerSocket
actually used it. Because it was an option, though, PSM had to jump through some
hoops to a) make it work in the first place and b) not have NSS panic on
shutdown. Furthermore, it meant increased memory usage for every user of Firefox
(and again, nothing actually used the feature, so this was for naught).
In bug 1479918, we discovered that if PSM shut down before Necko, NSS could
attempt to acquire a lock on the session cache that had been deleted, causing a
shutdown hang. We probably should make it less easy to make this mistake in NSS,
but in the meantime bug 1479918 needs uplifting and this workaround is the
safest, most straight-forward way to achieve this.
Differential Revision: https://phabricator.services.mozilla.com/D3919
--HG--
extra : moz-landing-system : lando
2018-08-24 19:00:34 +03:00
|
|
|
SSL_OptionSet(mFD, SSL_NO_CACHE, true);
|
2014-09-19 19:25:00 +04:00
|
|
|
|
|
|
|
// We don't currently notify the server API consumer of renegotiation events
|
|
|
|
// (to revalidate peer certs, etc.), so disable it for now.
|
|
|
|
SSL_OptionSet(mFD, SSL_ENABLE_RENEGOTIATION, SSL_RENEGOTIATE_NEVER);
|
|
|
|
|
|
|
|
SetSessionTickets(true);
|
|
|
|
SetRequestClientCertificate(REQUEST_NEVER);
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TLSServerSocket::CreateClientTransport(PRFileDesc* aClientFD,
|
|
|
|
const NetAddr& aClientAddr) {
|
2017-04-27 21:34:42 +03:00
|
|
|
MOZ_ASSERT(OnSocketThread(), "not on socket thread");
|
2014-09-19 19:25:00 +04:00
|
|
|
nsresult rv;
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<nsSocketTransport> trans = new nsSocketTransport;
|
2014-09-19 19:25:00 +04:00
|
|
|
if (NS_WARN_IF(!trans)) {
|
|
|
|
mCondition = NS_ERROR_OUT_OF_MEMORY;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<TLSServerConnectionInfo> info = new TLSServerConnectionInfo();
|
2014-09-19 19:25:00 +04:00
|
|
|
info->mServerSocket = this;
|
|
|
|
info->mTransport = trans;
|
|
|
|
nsCOMPtr<nsISupports> infoSupports =
|
|
|
|
NS_ISUPPORTS_CAST(nsITLSServerConnectionInfo*, info);
|
|
|
|
rv = trans->InitWithConnectedSocket(aClientFD, &aClientAddr, infoSupports);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
mCondition = rv;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Override the default peer certificate validation, so that server consumers
|
|
|
|
// can make their own choice after the handshake completes.
|
|
|
|
SSL_AuthCertificateHook(aClientFD, AuthCertificateHook, nullptr);
|
|
|
|
// Once the TLS handshake has completed, the server consumer is notified and
|
|
|
|
// has access to various TLS state details.
|
|
|
|
// It's safe to pass info here because the socket transport holds it as
|
|
|
|
// |mSecInfo| which keeps it alive for the lifetime of the socket.
|
|
|
|
SSL_HandshakeCallback(aClientFD, TLSServerConnectionInfo::HandshakeCallback,
|
|
|
|
info);
|
|
|
|
|
|
|
|
// Notify the consumer of the new client so it can manage the streams.
|
|
|
|
// Security details aren't known yet. The security observer will be notified
|
|
|
|
// later when they are ready.
|
|
|
|
nsCOMPtr<nsIServerSocket> serverSocket =
|
|
|
|
do_QueryInterface(NS_ISUPPORTS_CAST(nsITLSServerSocket*, this));
|
|
|
|
mListener->OnSocketAccepted(serverSocket, trans);
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult TLSServerSocket::OnSocketListen() {
|
|
|
|
if (NS_WARN_IF(!mServerCert)) {
|
|
|
|
return NS_ERROR_NOT_INITIALIZED;
|
|
|
|
}
|
|
|
|
|
2016-10-23 08:27:33 +03:00
|
|
|
UniqueCERTCertificate cert(mServerCert->GetCert());
|
2014-09-19 19:25:00 +04:00
|
|
|
if (NS_WARN_IF(!cert)) {
|
|
|
|
return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
|
|
|
|
}
|
|
|
|
|
2016-10-23 08:27:33 +03:00
|
|
|
UniqueSECKEYPrivateKey key(PK11_FindKeyByAnyCert(cert.get(), nullptr));
|
2014-09-19 19:25:00 +04:00
|
|
|
if (NS_WARN_IF(!key)) {
|
|
|
|
return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
|
|
|
|
}
|
|
|
|
|
2016-10-23 08:27:33 +03:00
|
|
|
SSLKEAType certKEA = NSS_FindCertKEAType(cert.get());
|
2014-09-19 19:25:00 +04:00
|
|
|
|
2016-10-23 08:27:33 +03:00
|
|
|
nsresult rv =
|
|
|
|
MapSECStatus(SSL_ConfigSecureServer(mFD, cert.get(), key.get(), certKEA));
|
2014-09-19 19:25:00 +04:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
SECStatus TLSServerSocket::AuthCertificateHook(void* arg, PRFileDesc* fd,
|
|
|
|
PRBool checksig,
|
|
|
|
PRBool isServer) {
|
|
|
|
// Allow any client cert here, server consumer code can decide whether it's
|
|
|
|
// okay after being notified of the new client socket.
|
|
|
|
return SECSuccess;
|
|
|
|
}
|
|
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// TLSServerSocket::nsITLSServerSocket
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerSocket::GetServerCert(nsIX509Cert** aCert) {
|
|
|
|
if (NS_WARN_IF(!aCert)) {
|
|
|
|
return NS_ERROR_INVALID_POINTER;
|
|
|
|
}
|
|
|
|
*aCert = mServerCert;
|
|
|
|
NS_IF_ADDREF(*aCert);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerSocket::SetServerCert(nsIX509Cert* aCert) {
|
|
|
|
// If AsyncListen was already called (and set mListener), it's too late to set
|
|
|
|
// this.
|
|
|
|
if (NS_WARN_IF(mListener)) {
|
|
|
|
return NS_ERROR_IN_PROGRESS;
|
|
|
|
}
|
|
|
|
mServerCert = aCert;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerSocket::SetSessionTickets(bool aEnabled) {
|
|
|
|
// If AsyncListen was already called (and set mListener), it's too late to set
|
|
|
|
// this.
|
|
|
|
if (NS_WARN_IF(mListener)) {
|
|
|
|
return NS_ERROR_IN_PROGRESS;
|
|
|
|
}
|
|
|
|
SSL_OptionSet(mFD, SSL_ENABLE_SESSION_TICKETS, aEnabled);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerSocket::SetRequestClientCertificate(uint32_t aMode) {
|
|
|
|
// If AsyncListen was already called (and set mListener), it's too late to set
|
|
|
|
// this.
|
|
|
|
if (NS_WARN_IF(mListener)) {
|
|
|
|
return NS_ERROR_IN_PROGRESS;
|
|
|
|
}
|
|
|
|
SSL_OptionSet(mFD, SSL_REQUEST_CERTIFICATE, aMode != REQUEST_NEVER);
|
|
|
|
|
|
|
|
switch (aMode) {
|
|
|
|
case REQUEST_ALWAYS:
|
|
|
|
SSL_OptionSet(mFD, SSL_REQUIRE_CERTIFICATE, SSL_REQUIRE_NO_ERROR);
|
|
|
|
break;
|
|
|
|
case REQUIRE_FIRST_HANDSHAKE:
|
|
|
|
SSL_OptionSet(mFD, SSL_REQUIRE_CERTIFICATE, SSL_REQUIRE_FIRST_HANDSHAKE);
|
|
|
|
break;
|
|
|
|
case REQUIRE_ALWAYS:
|
|
|
|
SSL_OptionSet(mFD, SSL_REQUIRE_CERTIFICATE, SSL_REQUIRE_ALWAYS);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SSL_OptionSet(mFD, SSL_REQUIRE_CERTIFICATE, SSL_REQUIRE_NEVER);
|
|
|
|
}
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2016-07-16 16:50:12 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerSocket::SetVersionRange(uint16_t aMinVersion, uint16_t aMaxVersion) {
|
|
|
|
// If AsyncListen was already called (and set mListener), it's too late to set
|
|
|
|
// this.
|
|
|
|
if (NS_WARN_IF(mListener)) {
|
|
|
|
return NS_ERROR_IN_PROGRESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
SSLVersionRange range = {aMinVersion, aMaxVersion};
|
|
|
|
if (SSL_VersionRangeSet(mFD, &range) != SECSuccess) {
|
|
|
|
return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2014-09-19 19:25:00 +04:00
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// TLSServerConnectionInfo
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2015-03-21 19:28:04 +03:00
|
|
|
class TLSServerSecurityObserverProxy final
|
|
|
|
: public nsITLSServerSecurityObserver {
|
2018-04-30 19:46:04 +03:00
|
|
|
~TLSServerSecurityObserverProxy() = default;
|
2014-09-19 19:25:00 +04:00
|
|
|
|
|
|
|
public:
|
|
|
|
explicit TLSServerSecurityObserverProxy(
|
|
|
|
nsITLSServerSecurityObserver* aListener)
|
2017-06-14 04:27:17 +03:00
|
|
|
: mListener(new nsMainThreadPtrHolder<nsITLSServerSecurityObserver>(
|
|
|
|
"TLSServerSecurityObserverProxy::mListener", aListener)) {}
|
2014-09-19 19:25:00 +04:00
|
|
|
|
|
|
|
NS_DECL_THREADSAFE_ISUPPORTS
|
|
|
|
NS_DECL_NSITLSSERVERSECURITYOBSERVER
|
|
|
|
|
2016-04-26 03:23:21 +03:00
|
|
|
class OnHandshakeDoneRunnable : public Runnable {
|
2014-09-19 19:25:00 +04:00
|
|
|
public:
|
2017-06-12 22:34:10 +03:00
|
|
|
OnHandshakeDoneRunnable(
|
|
|
|
const nsMainThreadPtrHandle<nsITLSServerSecurityObserver>& aListener,
|
|
|
|
nsITLSServerSocket* aServer, nsITLSClientStatus* aStatus)
|
|
|
|
: Runnable(
|
|
|
|
"net::TLSServerSecurityObserverProxy::OnHandshakeDoneRunnable"),
|
|
|
|
mListener(aListener),
|
2014-09-19 19:25:00 +04:00
|
|
|
mServer(aServer),
|
|
|
|
mStatus(aStatus) {}
|
|
|
|
|
|
|
|
NS_DECL_NSIRUNNABLE
|
|
|
|
|
|
|
|
private:
|
|
|
|
nsMainThreadPtrHandle<nsITLSServerSecurityObserver> mListener;
|
|
|
|
nsCOMPtr<nsITLSServerSocket> mServer;
|
|
|
|
nsCOMPtr<nsITLSClientStatus> mStatus;
|
|
|
|
};
|
|
|
|
|
|
|
|
private:
|
|
|
|
nsMainThreadPtrHandle<nsITLSServerSecurityObserver> mListener;
|
|
|
|
};
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS(TLSServerSecurityObserverProxy, nsITLSServerSecurityObserver)
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerSecurityObserverProxy::OnHandshakeDone(nsITLSServerSocket* aServer,
|
|
|
|
nsITLSClientStatus* aStatus) {
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<OnHandshakeDoneRunnable> r =
|
2014-09-19 19:25:00 +04:00
|
|
|
new OnHandshakeDoneRunnable(mListener, aServer, aStatus);
|
|
|
|
return NS_DispatchToMainThread(r);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerSecurityObserverProxy::OnHandshakeDoneRunnable::Run() {
|
|
|
|
mListener->OnHandshakeDone(mServer, mStatus);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2014-09-19 19:25:00 +04:00
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS(TLSServerConnectionInfo, nsITLSServerConnectionInfo,
|
|
|
|
nsITLSClientStatus)
|
|
|
|
|
|
|
|
TLSServerConnectionInfo::TLSServerConnectionInfo()
|
|
|
|
: mServerSocket(nullptr),
|
|
|
|
mTransport(nullptr),
|
|
|
|
mPeerCert(nullptr),
|
|
|
|
mTlsVersionUsed(TLS_VERSION_UNKNOWN),
|
|
|
|
mKeyLength(0),
|
|
|
|
mMacLength(0),
|
|
|
|
mLock("TLSServerConnectionInfo.mLock"),
|
|
|
|
mSecurityObserver(nullptr) {}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2014-09-19 19:25:00 +04:00
|
|
|
TLSServerConnectionInfo::~TLSServerConnectionInfo() {
|
2016-02-10 10:23:00 +03:00
|
|
|
RefPtr<nsITLSServerSecurityObserver> observer;
|
2014-09-19 19:25:00 +04:00
|
|
|
{
|
|
|
|
MutexAutoLock lock(mLock);
|
2016-02-10 10:23:00 +03:00
|
|
|
observer = mSecurityObserver.forget();
|
2014-09-19 19:25:00 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (observer) {
|
2017-07-14 09:49:22 +03:00
|
|
|
NS_ReleaseOnMainThreadSystemGroup(
|
2017-06-14 04:27:17 +03:00
|
|
|
"TLSServerConnectionInfo::mSecurityObserver", observer.forget());
|
2014-09-19 19:25:00 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerConnectionInfo::SetSecurityObserver(
|
|
|
|
nsITLSServerSecurityObserver* aObserver) {
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mLock);
|
2019-12-24 23:16:34 +03:00
|
|
|
if (!aObserver) {
|
|
|
|
mSecurityObserver = nullptr;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2014-09-19 19:25:00 +04:00
|
|
|
mSecurityObserver = new TLSServerSecurityObserverProxy(aObserver);
|
2019-12-24 23:16:34 +03:00
|
|
|
// Call `OnHandshakeDone` if TLS handshake is already completed.
|
|
|
|
if (mTlsVersionUsed != TLS_VERSION_UNKNOWN) {
|
|
|
|
nsCOMPtr<nsITLSServerSocket> serverSocket;
|
|
|
|
GetServerSocket(getter_AddRefs(serverSocket));
|
|
|
|
mSecurityObserver->OnHandshakeDone(serverSocket, this);
|
|
|
|
mSecurityObserver = nullptr;
|
|
|
|
}
|
2014-09-19 19:25:00 +04:00
|
|
|
}
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerConnectionInfo::GetServerSocket(nsITLSServerSocket** aSocket) {
|
|
|
|
if (NS_WARN_IF(!aSocket)) {
|
|
|
|
return NS_ERROR_INVALID_POINTER;
|
|
|
|
}
|
|
|
|
*aSocket = mServerSocket;
|
|
|
|
NS_IF_ADDREF(*aSocket);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerConnectionInfo::GetStatus(nsITLSClientStatus** aStatus) {
|
|
|
|
if (NS_WARN_IF(!aStatus)) {
|
|
|
|
return NS_ERROR_INVALID_POINTER;
|
|
|
|
}
|
|
|
|
*aStatus = this;
|
|
|
|
NS_IF_ADDREF(*aStatus);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerConnectionInfo::GetPeerCert(nsIX509Cert** aCert) {
|
|
|
|
if (NS_WARN_IF(!aCert)) {
|
|
|
|
return NS_ERROR_INVALID_POINTER;
|
|
|
|
}
|
|
|
|
*aCert = mPeerCert;
|
|
|
|
NS_IF_ADDREF(*aCert);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerConnectionInfo::GetTlsVersionUsed(int16_t* aTlsVersionUsed) {
|
|
|
|
if (NS_WARN_IF(!aTlsVersionUsed)) {
|
|
|
|
return NS_ERROR_INVALID_POINTER;
|
|
|
|
}
|
|
|
|
*aTlsVersionUsed = mTlsVersionUsed;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerConnectionInfo::GetCipherName(nsACString& aCipherName) {
|
|
|
|
aCipherName.Assign(mCipherName);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerConnectionInfo::GetKeyLength(uint32_t* aKeyLength) {
|
|
|
|
if (NS_WARN_IF(!aKeyLength)) {
|
|
|
|
return NS_ERROR_INVALID_POINTER;
|
|
|
|
}
|
|
|
|
*aKeyLength = mKeyLength;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TLSServerConnectionInfo::GetMacLength(uint32_t* aMacLength) {
|
|
|
|
if (NS_WARN_IF(!aMacLength)) {
|
|
|
|
return NS_ERROR_INVALID_POINTER;
|
|
|
|
}
|
|
|
|
*aMacLength = mMacLength;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
void TLSServerConnectionInfo::HandshakeCallback(PRFileDesc* aFD, void* aArg) {
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<TLSServerConnectionInfo> info =
|
2014-09-19 19:25:00 +04:00
|
|
|
static_cast<TLSServerConnectionInfo*>(aArg);
|
|
|
|
nsISocketTransport* transport = info->mTransport;
|
|
|
|
// No longer needed outside this function, so clear the weak ref
|
|
|
|
info->mTransport = nullptr;
|
|
|
|
nsresult rv = info->HandshakeCallback(aFD);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
transport->Close(rv);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult TLSServerConnectionInfo::HandshakeCallback(PRFileDesc* aFD) {
|
|
|
|
nsresult rv;
|
|
|
|
|
2016-10-23 08:27:33 +03:00
|
|
|
UniqueCERTCertificate clientCert(SSL_PeerCertificate(aFD));
|
2014-09-19 19:25:00 +04:00
|
|
|
if (clientCert) {
|
|
|
|
nsCOMPtr<nsIX509CertDB> certDB =
|
|
|
|
do_GetService(NS_X509CERTDB_CONTRACTID, &rv);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIX509Cert> clientCertPSM;
|
2019-11-12 23:59:02 +03:00
|
|
|
nsTArray<uint8_t> clientCertBytes;
|
|
|
|
clientCertBytes.AppendElements(clientCert->derCert.data,
|
|
|
|
clientCert->derCert.len);
|
|
|
|
rv = certDB->ConstructX509(clientCertBytes, getter_AddRefs(clientCertPSM));
|
2014-09-19 19:25:00 +04:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
mPeerCert = clientCertPSM;
|
|
|
|
}
|
|
|
|
|
|
|
|
SSLChannelInfo channelInfo;
|
|
|
|
rv = MapSECStatus(SSL_GetChannelInfo(aFD, &channelInfo, sizeof(channelInfo)));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
SSLCipherSuiteInfo cipherInfo;
|
|
|
|
rv = MapSECStatus(SSL_GetCipherSuiteInfo(channelInfo.cipherSuite, &cipherInfo,
|
|
|
|
sizeof(cipherInfo)));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
mCipherName.Assign(cipherInfo.cipherSuiteName);
|
|
|
|
mKeyLength = cipherInfo.effectiveKeyBits;
|
|
|
|
mMacLength = cipherInfo.macBits;
|
|
|
|
|
|
|
|
// Notify consumer code that handshake is complete
|
|
|
|
nsCOMPtr<nsITLSServerSecurityObserver> observer;
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mLock);
|
2019-12-24 23:16:34 +03:00
|
|
|
mTlsVersionUsed = channelInfo.protocolVersion;
|
2019-12-12 16:42:43 +03:00
|
|
|
if (!mSecurityObserver) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
2014-09-19 19:25:00 +04:00
|
|
|
mSecurityObserver.swap(observer);
|
|
|
|
}
|
|
|
|
nsCOMPtr<nsITLSServerSocket> serverSocket;
|
|
|
|
GetServerSocket(getter_AddRefs(serverSocket));
|
|
|
|
observer->OnHandshakeDone(serverSocket, this);
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace net
|
|
|
|
} // namespace mozilla
|