// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/socket/client_socket_factory.h" #include "base/lazy_instance.h" #include "base/thread_task_runner_handle.h" #include "base/threading/sequenced_worker_pool.h" #include "build/build_config.h" #include "net/base/cert_database.h" #include "net/socket/client_socket_handle.h" #if defined(OS_WIN) #include "net/socket/ssl_client_socket_nss.h" #include "net/socket/ssl_client_socket_win.h" #elif defined(USE_OPENSSL) #include "net/socket/ssl_client_socket_openssl.h" #elif defined(USE_NSS) #include "net/socket/ssl_client_socket_nss.h" #elif defined(OS_MACOSX) #include "net/socket/ssl_client_socket_mac.h" #include "net/socket/ssl_client_socket_nss.h" #endif #include "net/socket/tcp_client_socket.h" #include "net/udp/udp_client_socket.h" namespace net { class X509Certificate; namespace { bool g_use_system_ssl = false; // ChromeOS and Linux may require interaction with smart cards or TPMs, which // may cause NSS functions to block for upwards of several seconds. To avoid // blocking all activity on the current task runner, such as network or IPC // traffic, run NSS SSL functions on a dedicated thread. #if defined(OS_CHROMEOS) || defined(OS_LINUX) bool g_use_dedicated_nss_thread = true; #else bool g_use_dedicated_nss_thread = false; #endif class DefaultClientSocketFactory : public ClientSocketFactory, public CertDatabase::Observer { public: DefaultClientSocketFactory() { if (g_use_dedicated_nss_thread) { // Use a single thread for the worker pool. worker_pool_ = new base::SequencedWorkerPool(1, "NSS SSL Thread"); nss_thread_task_runner_ = worker_pool_->GetSequencedTaskRunnerWithShutdownBehavior( worker_pool_->GetSequenceToken(), base::SequencedWorkerPool::CONTINUE_ON_SHUTDOWN); } CertDatabase::AddObserver(this); } virtual ~DefaultClientSocketFactory() { // Note: This code never runs, as the factory is defined as a Leaky // singleton. CertDatabase::RemoveObserver(this); } virtual void OnUserCertAdded(const X509Certificate* cert) OVERRIDE { ClearSSLSessionCache(); } virtual void OnCertTrustChanged(const X509Certificate* cert) OVERRIDE { // Per wtc, we actually only need to flush when trust is reduced. // Always flush now because OnCertTrustChanged does not tell us this. // See comments in ClientSocketPoolManager::OnCertTrustChanged. ClearSSLSessionCache(); } virtual DatagramClientSocket* CreateDatagramClientSocket( DatagramSocket::BindType bind_type, const RandIntCallback& rand_int_cb, NetLog* net_log, const NetLog::Source& source) OVERRIDE { return new UDPClientSocket(bind_type, rand_int_cb, net_log, source); } virtual StreamSocket* CreateTransportClientSocket( const AddressList& addresses, NetLog* net_log, const NetLog::Source& source) OVERRIDE { return new TCPClientSocket(addresses, net_log, source); } virtual SSLClientSocket* CreateSSLClientSocket( ClientSocketHandle* transport_socket, const HostPortPair& host_and_port, const SSLConfig& ssl_config, const SSLClientSocketContext& context) OVERRIDE { // nss_thread_task_runner_ may be NULL if g_use_dedicated_nss_thread is // false or if the dedicated NSS thread failed to start. If so, cause NSS // functions to execute on the current task runner. // // Note: The current task runner is obtained on each call due to unit // tests, which may create and tear down the current thread's TaskRunner // between each test. Because the DefaultClientSocketFactory is leaky, it // may span multiple tests, and thus the current task runner may change // from call to call. scoped_refptr nss_task_runner( nss_thread_task_runner_); if (!nss_task_runner) nss_task_runner = base::ThreadTaskRunnerHandle::Get(); #if defined(USE_OPENSSL) return new SSLClientSocketOpenSSL(transport_socket, host_and_port, ssl_config, context); #elif defined(USE_NSS) return new SSLClientSocketNSS(nss_task_runner, transport_socket, host_and_port, ssl_config, context); #elif defined(OS_WIN) if (g_use_system_ssl) { return new SSLClientSocketWin(transport_socket, host_and_port, ssl_config, context); } return new SSLClientSocketNSS(nss_task_runner, transport_socket, host_and_port, ssl_config, context); #elif defined(OS_MACOSX) if (g_use_system_ssl) { return new SSLClientSocketMac(transport_socket, host_and_port, ssl_config, context); } return new SSLClientSocketNSS(nss_task_runner, transport_socket, host_and_port, ssl_config, context); #else NOTIMPLEMENTED(); return NULL; #endif } virtual void ClearSSLSessionCache() OVERRIDE { SSLClientSocket::ClearSessionCache(); } private: scoped_refptr worker_pool_; scoped_refptr nss_thread_task_runner_; }; static base::LazyInstance::Leaky g_default_client_socket_factory = LAZY_INSTANCE_INITIALIZER; } // namespace // Deprecated function (http://crbug.com/37810) that takes a StreamSocket. SSLClientSocket* ClientSocketFactory::CreateSSLClientSocket( StreamSocket* transport_socket, const HostPortPair& host_and_port, const SSLConfig& ssl_config, const SSLClientSocketContext& context) { ClientSocketHandle* socket_handle = new ClientSocketHandle(); socket_handle->set_socket(transport_socket); return CreateSSLClientSocket(socket_handle, host_and_port, ssl_config, context); } // static ClientSocketFactory* ClientSocketFactory::GetDefaultFactory() { return g_default_client_socket_factory.Pointer(); } // static void ClientSocketFactory::UseSystemSSL() { g_use_system_ssl = true; #if defined(OS_WIN) // Reflect the capability of SSLClientSocketWin. SSLConfigService::SetDefaultVersionMax(SSL_PROTOCOL_VERSION_TLS1); #elif defined(OS_MACOSX) // Reflect the capability of SSLClientSocketMac. SSLConfigService::SetDefaultVersionMax(SSL_PROTOCOL_VERSION_TLS1); #endif } } // namespace net