| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| // |
| // TODO(ukai): code is similar with http_network_transaction.cc. We should |
| // think about ways to share code, if possible. |
| |
| #include "net/socket_stream/socket_stream.h" |
| |
| #include <set> |
| #include <string> |
| #include <vector> |
| |
| #include "base/bind.h" |
| #include "base/bind_helpers.h" |
| #include "base/compiler_specific.h" |
| #include "base/logging.h" |
| #include "base/message_loop.h" |
| #include "base/string_util.h" |
| #include "base/stringprintf.h" |
| #include "base/utf_string_conversions.h" |
| #include "net/base/auth.h" |
| #include "net/base/host_resolver.h" |
| #include "net/base/io_buffer.h" |
| #include "net/base/net_errors.h" |
| #include "net/base/net_util.h" |
| #include "net/base/ssl_cert_request_info.h" |
| #include "net/http/http_auth_controller.h" |
| #include "net/http/http_network_session.h" |
| #include "net/http/http_request_headers.h" |
| #include "net/http/http_request_info.h" |
| #include "net/http/http_response_headers.h" |
| #include "net/http/http_stream_factory.h" |
| #include "net/http/http_transaction_factory.h" |
| #include "net/http/http_util.h" |
| #include "net/socket/client_socket_factory.h" |
| #include "net/socket/socks5_client_socket.h" |
| #include "net/socket/socks_client_socket.h" |
| #include "net/socket/ssl_client_socket.h" |
| #include "net/socket/tcp_client_socket.h" |
| #include "net/socket_stream/socket_stream_metrics.h" |
| #include "net/url_request/url_request.h" |
| #include "starboard/memory.h" |
| #include "starboard/client_porting/poem/string_poem.h" |
| |
| static const int kMaxPendingSendAllowed = 32768; // 32 kilobytes. |
| static const int kReadBufferSize = 4096; |
| |
| namespace net { |
| |
| int SocketStream::Delegate::OnStartOpenConnection( |
| SocketStream* socket, const CompletionCallback& callback) { |
| return OK; |
| } |
| |
| void SocketStream::Delegate::OnAuthRequired(SocketStream* socket, |
| AuthChallengeInfo* auth_info) { |
| // By default, no credential is available and close the connection. |
| socket->Close(); |
| } |
| |
| void SocketStream::Delegate::OnSSLCertificateError( |
| SocketStream* socket, |
| const SSLInfo& ssl_info, |
| bool fatal) { |
| socket->CancelWithSSLError(ssl_info); |
| } |
| |
| bool SocketStream::Delegate::CanGetCookies(SocketStream* socket, |
| const GURL& url) { |
| return true; |
| } |
| |
| bool SocketStream::Delegate::CanSetCookie(SocketStream* request, |
| const GURL& url, |
| const std::string& cookie_line, |
| CookieOptions* options) { |
| return true; |
| } |
| |
| SocketStream::ResponseHeaders::ResponseHeaders() : IOBuffer() {} |
| |
| void SocketStream::ResponseHeaders::Realloc(size_t new_size) { |
| headers_.reset( |
| static_cast<char*>(SbMemoryReallocate(headers_.release(), new_size))); |
| } |
| |
| SocketStream::ResponseHeaders::~ResponseHeaders() { data_ = NULL; } |
| |
| SocketStream::SocketStream(const GURL& url, Delegate* delegate) |
| : delegate_(delegate), |
| url_(url), |
| max_pending_send_allowed_(kMaxPendingSendAllowed), |
| context_(NULL), |
| next_state_(STATE_NONE), |
| host_resolver_(NULL), |
| cert_verifier_(NULL), |
| server_bound_cert_service_(NULL), |
| factory_(ClientSocketFactory::GetDefaultFactory()), |
| proxy_mode_(kDirectConnection), |
| proxy_url_(url), |
| pac_request_(NULL), |
| // Unretained() is required; without it, Bind() creates a circular |
| // dependency and the SocketStream object will not be freed. |
| ALLOW_THIS_IN_INITIALIZER_LIST( |
| io_callback_(base::Bind(&SocketStream::OnIOCompleted, |
| base::Unretained(this)))), |
| read_buf_(NULL), |
| write_buf_(NULL), |
| current_write_buf_(NULL), |
| write_buf_offset_(0), |
| write_buf_size_(0), |
| closing_(false), |
| server_closed_(false), |
| metrics_(new SocketStreamMetrics(url)) { |
| DCHECK(MessageLoop::current()) << |
| "The current MessageLoop must exist"; |
| DCHECK_EQ(MessageLoop::TYPE_IO, MessageLoop::current()->type()) << |
| "The current MessageLoop must be TYPE_IO"; |
| DCHECK(delegate_); |
| } |
| |
| SocketStream::UserData* SocketStream::GetUserData( |
| const void* key) const { |
| UserDataMap::const_iterator found = user_data_.find(key); |
| if (found != user_data_.end()) |
| return found->second.get(); |
| return NULL; |
| } |
| |
| void SocketStream::SetUserData(const void* key, UserData* data) { |
| user_data_[key] = linked_ptr<UserData>(data); |
| } |
| |
| bool SocketStream::is_secure() const { |
| return url_.SchemeIs("wss"); |
| } |
| |
| void SocketStream::set_context(const URLRequestContext* context) { |
| const URLRequestContext* prev_context = context_; |
| |
| context_ = context; |
| |
| if (prev_context != context) { |
| if (prev_context && pac_request_) { |
| prev_context->proxy_service()->CancelPacRequest(pac_request_); |
| pac_request_ = NULL; |
| } |
| |
| net_log_.EndEvent(NetLog::TYPE_REQUEST_ALIVE); |
| net_log_ = BoundNetLog(); |
| |
| if (context) { |
| net_log_ = BoundNetLog::Make( |
| context->net_log(), |
| NetLog::SOURCE_SOCKET_STREAM); |
| |
| net_log_.BeginEvent(NetLog::TYPE_REQUEST_ALIVE); |
| } |
| } |
| |
| if (context_) { |
| host_resolver_ = context_->host_resolver(); |
| cert_verifier_ = context_->cert_verifier(); |
| server_bound_cert_service_ = context_->server_bound_cert_service(); |
| } |
| } |
| |
| void SocketStream::Connect() { |
| DCHECK(MessageLoop::current()) << |
| "The current MessageLoop must exist"; |
| DCHECK_EQ(MessageLoop::TYPE_IO, MessageLoop::current()->type()) << |
| "The current MessageLoop must be TYPE_IO"; |
| if (context_) { |
| ssl_config_service()->GetSSLConfig(&server_ssl_config_); |
| proxy_ssl_config_ = server_ssl_config_; |
| } |
| DCHECK_EQ(next_state_, STATE_NONE); |
| |
| AddRef(); // Released in Finish() |
| // Open a connection asynchronously, so that delegate won't be called |
| // back before returning Connect(). |
| next_state_ = STATE_BEFORE_CONNECT; |
| net_log_.BeginEvent( |
| NetLog::TYPE_SOCKET_STREAM_CONNECT, |
| NetLog::StringCallback("url", &url_.possibly_invalid_spec())); |
| MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SocketStream::DoLoop, this, OK)); |
| } |
| |
| bool SocketStream::SendData(const char* data, int len) { |
| DCHECK(MessageLoop::current()) << |
| "The current MessageLoop must exist"; |
| DCHECK_EQ(MessageLoop::TYPE_IO, MessageLoop::current()->type()) << |
| "The current MessageLoop must be TYPE_IO"; |
| if (!socket_.get() || !socket_->IsConnected() || next_state_ == STATE_NONE) |
| return false; |
| if (write_buf_) { |
| int current_amount_send = write_buf_size_ - write_buf_offset_; |
| for (PendingDataQueue::const_iterator iter = pending_write_bufs_.begin(); |
| iter != pending_write_bufs_.end(); |
| ++iter) |
| current_amount_send += (*iter)->size(); |
| |
| current_amount_send += len; |
| if (current_amount_send > max_pending_send_allowed_) |
| return false; |
| |
| pending_write_bufs_.push_back(make_scoped_refptr( |
| new IOBufferWithSize(len))); |
| memcpy(pending_write_bufs_.back()->data(), data, len); |
| return true; |
| } |
| DCHECK(!current_write_buf_); |
| write_buf_ = new IOBuffer(len); |
| memcpy(write_buf_->data(), data, len); |
| write_buf_size_ = len; |
| write_buf_offset_ = 0; |
| // Send pending data asynchronously, so that delegate won't be called |
| // back before returning SendData(). |
| MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SocketStream::DoLoop, this, OK)); |
| return true; |
| } |
| |
| void SocketStream::Close() { |
| DCHECK(MessageLoop::current()) << |
| "The current MessageLoop must exist"; |
| DCHECK_EQ(MessageLoop::TYPE_IO, MessageLoop::current()->type()) << |
| "The current MessageLoop must be TYPE_IO"; |
| // If next_state_ is STATE_NONE, the socket was not opened, or already |
| // closed. So, return immediately. |
| // Otherwise, it might call Finish() more than once, so breaks balance |
| // of AddRef() and Release() in Connect() and Finish(), respectively. |
| if (next_state_ == STATE_NONE) |
| return; |
| MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SocketStream::DoClose, this)); |
| } |
| |
| void SocketStream::RestartWithAuth(const AuthCredentials& credentials) { |
| DCHECK(MessageLoop::current()) << |
| "The current MessageLoop must exist"; |
| DCHECK_EQ(MessageLoop::TYPE_IO, MessageLoop::current()->type()) << |
| "The current MessageLoop must be TYPE_IO"; |
| DCHECK(proxy_auth_controller_.get()); |
| if (!socket_.get()) { |
| LOG(ERROR) << "Socket is closed before restarting with auth."; |
| return; |
| } |
| |
| proxy_auth_controller_->ResetAuth(credentials); |
| |
| MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SocketStream::DoRestartWithAuth, this)); |
| } |
| |
| void SocketStream::DetachDelegate() { |
| if (!delegate_) |
| return; |
| delegate_ = NULL; |
| net_log_.AddEvent(NetLog::TYPE_CANCELLED); |
| // We don't need to send pending data when client detach the delegate. |
| pending_write_bufs_.clear(); |
| Close(); |
| } |
| |
| const ProxyServer& SocketStream::proxy_server() const { |
| return proxy_info_.proxy_server(); |
| } |
| |
| void SocketStream::SetClientSocketFactory( |
| ClientSocketFactory* factory) { |
| DCHECK(factory); |
| factory_ = factory; |
| } |
| |
| void SocketStream::CancelWithError(int error) { |
| MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SocketStream::DoLoop, this, error)); |
| } |
| |
| void SocketStream::CancelWithSSLError(const SSLInfo& ssl_info) { |
| CancelWithError(MapCertStatusToNetError(ssl_info.cert_status)); |
| } |
| |
| void SocketStream::ContinueDespiteError() { |
| MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SocketStream::DoLoop, this, OK)); |
| } |
| |
| SocketStream::~SocketStream() { |
| set_context(NULL); |
| DCHECK(!delegate_); |
| DCHECK(!pac_request_); |
| } |
| |
| SocketStream::RequestHeaders::~RequestHeaders() { data_ = NULL; } |
| |
| void SocketStream::set_addresses(const AddressList& addresses) { |
| addresses_ = addresses; |
| } |
| |
| void SocketStream::DoClose() { |
| closing_ = true; |
| // If next_state_ is STATE_TCP_CONNECT, it's waiting other socket |
| // establishing connection. If next_state_ is STATE_AUTH_REQUIRED, it's |
| // waiting for restarting. In these states, we'll close the SocketStream |
| // now. |
| if (next_state_ == STATE_TCP_CONNECT || next_state_ == STATE_AUTH_REQUIRED) { |
| DoLoop(ERR_ABORTED); |
| return; |
| } |
| // If next_state_ is STATE_READ_WRITE, we'll run DoLoop and close |
| // the SocketStream. |
| // If it's writing now, we should defer the closing after the current |
| // writing is completed. |
| if (next_state_ == STATE_READ_WRITE && !current_write_buf_) |
| DoLoop(ERR_ABORTED); |
| |
| // In other next_state_, we'll wait for callback of other APIs, such as |
| // ResolveProxy(). |
| } |
| |
| void SocketStream::Finish(int result) { |
| DCHECK(MessageLoop::current()) << |
| "The current MessageLoop must exist"; |
| DCHECK_EQ(MessageLoop::TYPE_IO, MessageLoop::current()->type()) << |
| "The current MessageLoop must be TYPE_IO"; |
| DCHECK_LE(result, OK); |
| if (result == OK) |
| result = ERR_CONNECTION_CLOSED; |
| DCHECK_EQ(next_state_, STATE_NONE); |
| DVLOG(1) << "Finish result=" << ErrorToString(result); |
| |
| metrics_->OnClose(); |
| Delegate* delegate = delegate_; |
| delegate_ = NULL; |
| if (delegate) { |
| delegate->OnError(this, result); |
| if (result != ERR_PROTOCOL_SWITCHED) |
| delegate->OnClose(this); |
| } |
| Release(); |
| } |
| |
| int SocketStream::DidEstablishConnection() { |
| if (!socket_.get() || !socket_->IsConnected()) { |
| next_state_ = STATE_CLOSE; |
| return ERR_CONNECTION_FAILED; |
| } |
| next_state_ = STATE_READ_WRITE; |
| metrics_->OnConnected(); |
| |
| net_log_.EndEvent(NetLog::TYPE_SOCKET_STREAM_CONNECT); |
| if (delegate_) |
| delegate_->OnConnected(this, max_pending_send_allowed_); |
| |
| return OK; |
| } |
| |
| int SocketStream::DidReceiveData(int result) { |
| DCHECK(read_buf_); |
| DCHECK_GT(result, 0); |
| net_log_.AddEvent(NetLog::TYPE_SOCKET_STREAM_RECEIVED); |
| int len = result; |
| metrics_->OnRead(len); |
| if (delegate_) { |
| // Notify recevied data to delegate. |
| delegate_->OnReceivedData(this, read_buf_->data(), len); |
| } |
| read_buf_ = NULL; |
| return OK; |
| } |
| |
| int SocketStream::DidSendData(int result) { |
| DCHECK_GT(result, 0); |
| net_log_.AddEvent(NetLog::TYPE_SOCKET_STREAM_SENT); |
| int len = result; |
| metrics_->OnWrite(len); |
| current_write_buf_ = NULL; |
| if (delegate_) |
| delegate_->OnSentData(this, len); |
| |
| int remaining_size = write_buf_size_ - write_buf_offset_ - len; |
| if (remaining_size == 0) { |
| if (!pending_write_bufs_.empty()) { |
| write_buf_size_ = pending_write_bufs_.front()->size(); |
| write_buf_ = pending_write_bufs_.front(); |
| pending_write_bufs_.pop_front(); |
| } else { |
| write_buf_size_ = 0; |
| write_buf_ = NULL; |
| } |
| write_buf_offset_ = 0; |
| } else { |
| write_buf_offset_ += len; |
| } |
| return OK; |
| } |
| |
| void SocketStream::OnIOCompleted(int result) { |
| DoLoop(result); |
| } |
| |
| void SocketStream::OnReadCompleted(int result) { |
| if (result == 0) { |
| // 0 indicates end-of-file, so socket was closed. |
| // Don't close the socket if it's still writing. |
| server_closed_ = true; |
| } else if (result > 0 && read_buf_) { |
| result = DidReceiveData(result); |
| } |
| DoLoop(result); |
| } |
| |
| void SocketStream::OnWriteCompleted(int result) { |
| if (result > 0 && write_buf_) { |
| result = DidSendData(result); |
| } |
| DoLoop(result); |
| } |
| |
| void SocketStream::DoLoop(int result) { |
| // If context was not set, close immediately. |
| if (!context_) |
| next_state_ = STATE_CLOSE; |
| |
| if (next_state_ == STATE_NONE) |
| return; |
| |
| do { |
| State state = next_state_; |
| next_state_ = STATE_NONE; |
| switch (state) { |
| case STATE_BEFORE_CONNECT: |
| DCHECK_EQ(OK, result); |
| result = DoBeforeConnect(); |
| break; |
| case STATE_BEFORE_CONNECT_COMPLETE: |
| result = DoBeforeConnectComplete(result); |
| break; |
| case STATE_RESOLVE_PROXY: |
| DCHECK_EQ(OK, result); |
| result = DoResolveProxy(); |
| break; |
| case STATE_RESOLVE_PROXY_COMPLETE: |
| result = DoResolveProxyComplete(result); |
| break; |
| case STATE_RESOLVE_HOST: |
| DCHECK_EQ(OK, result); |
| result = DoResolveHost(); |
| break; |
| case STATE_RESOLVE_HOST_COMPLETE: |
| result = DoResolveHostComplete(result); |
| break; |
| case STATE_RESOLVE_PROTOCOL: |
| result = DoResolveProtocol(result); |
| break; |
| case STATE_RESOLVE_PROTOCOL_COMPLETE: |
| result = DoResolveProtocolComplete(result); |
| break; |
| case STATE_TCP_CONNECT: |
| result = DoTcpConnect(result); |
| break; |
| case STATE_TCP_CONNECT_COMPLETE: |
| result = DoTcpConnectComplete(result); |
| break; |
| case STATE_GENERATE_PROXY_AUTH_TOKEN: |
| result = DoGenerateProxyAuthToken(); |
| break; |
| case STATE_GENERATE_PROXY_AUTH_TOKEN_COMPLETE: |
| result = DoGenerateProxyAuthTokenComplete(result); |
| break; |
| case STATE_WRITE_TUNNEL_HEADERS: |
| DCHECK_EQ(OK, result); |
| result = DoWriteTunnelHeaders(); |
| break; |
| case STATE_WRITE_TUNNEL_HEADERS_COMPLETE: |
| result = DoWriteTunnelHeadersComplete(result); |
| break; |
| case STATE_READ_TUNNEL_HEADERS: |
| DCHECK_EQ(OK, result); |
| result = DoReadTunnelHeaders(); |
| break; |
| case STATE_READ_TUNNEL_HEADERS_COMPLETE: |
| result = DoReadTunnelHeadersComplete(result); |
| break; |
| case STATE_SOCKS_CONNECT: |
| DCHECK_EQ(OK, result); |
| result = DoSOCKSConnect(); |
| break; |
| case STATE_SOCKS_CONNECT_COMPLETE: |
| result = DoSOCKSConnectComplete(result); |
| break; |
| case STATE_SECURE_PROXY_CONNECT: |
| DCHECK_EQ(OK, result); |
| result = DoSecureProxyConnect(); |
| break; |
| case STATE_SECURE_PROXY_CONNECT_COMPLETE: |
| result = DoSecureProxyConnectComplete(result); |
| break; |
| case STATE_SECURE_PROXY_HANDLE_CERT_ERROR: |
| result = DoSecureProxyHandleCertError(result); |
| break; |
| case STATE_SECURE_PROXY_HANDLE_CERT_ERROR_COMPLETE: |
| result = DoSecureProxyHandleCertErrorComplete(result); |
| break; |
| case STATE_SSL_CONNECT: |
| DCHECK_EQ(OK, result); |
| result = DoSSLConnect(); |
| break; |
| case STATE_SSL_CONNECT_COMPLETE: |
| result = DoSSLConnectComplete(result); |
| break; |
| case STATE_SSL_HANDLE_CERT_ERROR: |
| result = DoSSLHandleCertError(result); |
| break; |
| case STATE_SSL_HANDLE_CERT_ERROR_COMPLETE: |
| result = DoSSLHandleCertErrorComplete(result); |
| break; |
| case STATE_READ_WRITE: |
| result = DoReadWrite(result); |
| break; |
| case STATE_AUTH_REQUIRED: |
| // It might be called when DoClose is called while waiting in |
| // STATE_AUTH_REQUIRED. |
| Finish(result); |
| return; |
| case STATE_CLOSE: |
| DCHECK_LE(result, OK); |
| Finish(result); |
| return; |
| default: |
| NOTREACHED() << "bad state " << state; |
| Finish(result); |
| return; |
| } |
| if (state == STATE_RESOLVE_PROTOCOL && result == ERR_PROTOCOL_SWITCHED) |
| continue; |
| // If the connection is not established yet and had actual errors, |
| // record the error. In next iteration, it will close the connection. |
| if (state != STATE_READ_WRITE && result < ERR_IO_PENDING) { |
| net_log_.EndEventWithNetErrorCode( |
| NetLog::TYPE_SOCKET_STREAM_CONNECT, result); |
| } |
| } while (result != ERR_IO_PENDING); |
| } |
| |
| int SocketStream::DoBeforeConnect() { |
| next_state_ = STATE_BEFORE_CONNECT_COMPLETE; |
| if (!context_ || !context_->network_delegate()) |
| return OK; |
| |
| int result = context_->network_delegate()->NotifyBeforeSocketStreamConnect( |
| this, io_callback_); |
| if (result != OK && result != ERR_IO_PENDING) |
| next_state_ = STATE_CLOSE; |
| |
| return result; |
| } |
| |
| int SocketStream::DoBeforeConnectComplete(int result) { |
| DCHECK_NE(ERR_IO_PENDING, result); |
| |
| if (result == OK) |
| next_state_ = STATE_RESOLVE_PROXY; |
| else |
| next_state_ = STATE_CLOSE; |
| |
| return result; |
| } |
| |
| int SocketStream::DoResolveProxy() { |
| DCHECK(!pac_request_); |
| next_state_ = STATE_RESOLVE_PROXY_COMPLETE; |
| |
| if (!proxy_url_.is_valid()) { |
| next_state_ = STATE_CLOSE; |
| return ERR_INVALID_ARGUMENT; |
| } |
| |
| // TODO(toyoshim): Check server advertisement of SPDY through the HTTP |
| // Alternate-Protocol header, then switch to SPDY if SPDY is available. |
| // Usually we already have a session to the SPDY server because JavaScript |
| // running WebSocket itself would be served by SPDY. But, in some situation |
| // (E.g. Used by Chrome Extensions or used for cross origin connection), this |
| // connection might be the first one. At that time, we should check |
| // Alternate-Protocol header here for ws:// or TLS NPN extension for wss:// . |
| |
| return proxy_service()->ResolveProxy( |
| proxy_url_, &proxy_info_, io_callback_, &pac_request_, net_log_); |
| } |
| |
| int SocketStream::DoResolveProxyComplete(int result) { |
| pac_request_ = NULL; |
| if (result != OK) { |
| LOG(ERROR) << "Failed to resolve proxy: " << result; |
| if (delegate_) |
| delegate_->OnError(this, result); |
| proxy_info_.UseDirect(); |
| } |
| if (proxy_info_.is_direct()) { |
| // If proxy was not found for original URL (i.e. websocket URL), |
| // try again with https URL, like Safari implementation. |
| // Note that we don't want to use http proxy, because we'll use tunnel |
| // proxy using CONNECT method, which is used by https proxy. |
| if (!proxy_url_.SchemeIs("https")) { |
| const std::string scheme = "https"; |
| GURL::Replacements repl; |
| repl.SetSchemeStr(scheme); |
| proxy_url_ = url_.ReplaceComponents(repl); |
| DVLOG(1) << "Try https proxy: " << proxy_url_; |
| next_state_ = STATE_RESOLVE_PROXY; |
| return OK; |
| } |
| } |
| |
| if (proxy_info_.is_empty()) { |
| // No proxies/direct to choose from. This happens when we don't support any |
| // of the proxies in the returned list. |
| return ERR_NO_SUPPORTED_PROXIES; |
| } |
| |
| next_state_ = STATE_RESOLVE_HOST; |
| return OK; |
| } |
| |
| int SocketStream::DoResolveHost() { |
| next_state_ = STATE_RESOLVE_HOST_COMPLETE; |
| |
| DCHECK(!proxy_info_.is_empty()); |
| if (proxy_info_.is_direct()) |
| proxy_mode_ = kDirectConnection; |
| else if (proxy_info_.proxy_server().is_socks()) |
| proxy_mode_ = kSOCKSProxy; |
| else |
| proxy_mode_ = kTunnelProxy; |
| |
| // Determine the host and port to connect to. |
| HostPortPair host_port_pair; |
| if (proxy_mode_ != kDirectConnection) { |
| host_port_pair = proxy_info_.proxy_server().host_port_pair(); |
| } else { |
| host_port_pair = HostPortPair::FromURL(url_); |
| } |
| |
| HostResolver::RequestInfo resolve_info(host_port_pair); |
| |
| DCHECK(host_resolver_); |
| resolver_.reset(new SingleRequestHostResolver(host_resolver_)); |
| return resolver_->Resolve( |
| resolve_info, &addresses_, base::Bind(&SocketStream::OnIOCompleted, this), |
| net_log_); |
| } |
| |
| int SocketStream::DoResolveHostComplete(int result) { |
| if (result == OK && delegate_) |
| next_state_ = STATE_RESOLVE_PROTOCOL; |
| else |
| next_state_ = STATE_CLOSE; |
| // TODO(ukai): if error occured, reconsider proxy after error. |
| return result; |
| } |
| |
| int SocketStream::DoResolveProtocol(int result) { |
| DCHECK_EQ(OK, result); |
| next_state_ = STATE_RESOLVE_PROTOCOL_COMPLETE; |
| result = delegate_->OnStartOpenConnection(this, io_callback_); |
| if (result == ERR_IO_PENDING) |
| metrics_->OnWaitConnection(); |
| else if (result != OK && result != ERR_PROTOCOL_SWITCHED) |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| int SocketStream::DoResolveProtocolComplete(int result) { |
| DCHECK_NE(ERR_IO_PENDING, result); |
| |
| if (result == ERR_PROTOCOL_SWITCHED) { |
| next_state_ = STATE_CLOSE; |
| metrics_->OnCountWireProtocolType( |
| SocketStreamMetrics::WIRE_PROTOCOL_SPDY); |
| } else if (result == OK) { |
| next_state_ = STATE_TCP_CONNECT; |
| metrics_->OnCountWireProtocolType( |
| SocketStreamMetrics::WIRE_PROTOCOL_WEBSOCKET); |
| } else { |
| next_state_ = STATE_CLOSE; |
| } |
| return result; |
| } |
| |
| int SocketStream::DoTcpConnect(int result) { |
| if (result != OK) { |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| next_state_ = STATE_TCP_CONNECT_COMPLETE; |
| DCHECK(factory_); |
| socket_.reset(factory_->CreateTransportClientSocket(addresses_, |
| net_log_.net_log(), |
| net_log_.source())); |
| metrics_->OnStartConnection(); |
| return socket_->Connect(io_callback_); |
| } |
| |
| int SocketStream::DoTcpConnectComplete(int result) { |
| // TODO(ukai): if error occured, reconsider proxy after error. |
| if (result != OK) { |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| if (proxy_mode_ == kTunnelProxy) { |
| if (proxy_info_.is_https()) |
| next_state_ = STATE_SECURE_PROXY_CONNECT; |
| else |
| next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN; |
| } else if (proxy_mode_ == kSOCKSProxy) { |
| next_state_ = STATE_SOCKS_CONNECT; |
| } else if (is_secure()) { |
| next_state_ = STATE_SSL_CONNECT; |
| } else { |
| result = DidEstablishConnection(); |
| } |
| return result; |
| } |
| |
| int SocketStream::DoGenerateProxyAuthToken() { |
| next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN_COMPLETE; |
| if (!proxy_auth_controller_.get()) { |
| DCHECK(context_); |
| DCHECK(context_->http_transaction_factory()); |
| DCHECK(context_->http_transaction_factory()->GetSession()); |
| HttpNetworkSession* session = |
| context_->http_transaction_factory()->GetSession(); |
| const char* scheme = proxy_info_.is_https() ? "https://" : "http://"; |
| GURL auth_url(scheme + |
| proxy_info_.proxy_server().host_port_pair().ToString()); |
| proxy_auth_controller_ = |
| new HttpAuthController(HttpAuth::AUTH_PROXY, |
| auth_url, |
| session->http_auth_cache(), |
| session->http_auth_handler_factory()); |
| } |
| HttpRequestInfo request_info; |
| request_info.url = url_; |
| request_info.method = "CONNECT"; |
| return proxy_auth_controller_->MaybeGenerateAuthToken( |
| &request_info, io_callback_, net_log_); |
| } |
| |
| int SocketStream::DoGenerateProxyAuthTokenComplete(int result) { |
| if (result != OK) { |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| next_state_ = STATE_WRITE_TUNNEL_HEADERS; |
| return result; |
| } |
| |
| int SocketStream::DoWriteTunnelHeaders() { |
| DCHECK_EQ(kTunnelProxy, proxy_mode_); |
| |
| next_state_ = STATE_WRITE_TUNNEL_HEADERS_COMPLETE; |
| |
| if (!tunnel_request_headers_.get()) { |
| metrics_->OnCountConnectionType(SocketStreamMetrics::TUNNEL_CONNECTION); |
| tunnel_request_headers_ = new RequestHeaders(); |
| tunnel_request_headers_bytes_sent_ = 0; |
| } |
| if (tunnel_request_headers_->headers_.empty()) { |
| HttpRequestHeaders request_headers; |
| request_headers.SetHeader("Host", GetHostAndOptionalPort(url_)); |
| request_headers.SetHeader("Proxy-Connection", "keep-alive"); |
| if (proxy_auth_controller_.get() && proxy_auth_controller_->HaveAuth()) |
| proxy_auth_controller_->AddAuthorizationHeader(&request_headers); |
| tunnel_request_headers_->headers_ = base::StringPrintf( |
| "CONNECT %s HTTP/1.1\r\n" |
| "%s", |
| GetHostAndPort(url_).c_str(), |
| request_headers.ToString().c_str()); |
| } |
| tunnel_request_headers_->SetDataOffset(tunnel_request_headers_bytes_sent_); |
| int buf_len = static_cast<int>(tunnel_request_headers_->headers_.size() - |
| tunnel_request_headers_bytes_sent_); |
| DCHECK_GT(buf_len, 0); |
| return socket_->Write(tunnel_request_headers_, buf_len, io_callback_); |
| } |
| |
| int SocketStream::DoWriteTunnelHeadersComplete(int result) { |
| DCHECK_EQ(kTunnelProxy, proxy_mode_); |
| |
| if (result < 0) { |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| tunnel_request_headers_bytes_sent_ += result; |
| if (tunnel_request_headers_bytes_sent_ < |
| tunnel_request_headers_->headers_.size()) { |
| next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN; |
| } else { |
| // Handling a cert error or a client cert request requires reconnection. |
| // DoWriteTunnelHeaders() will be called again. |
| // Thus |tunnel_request_headers_bytes_sent_| should be reset to 0 for |
| // sending |tunnel_request_headers_| correctly. |
| tunnel_request_headers_bytes_sent_ = 0; |
| next_state_ = STATE_READ_TUNNEL_HEADERS; |
| } |
| return OK; |
| } |
| |
| int SocketStream::DoReadTunnelHeaders() { |
| DCHECK_EQ(kTunnelProxy, proxy_mode_); |
| |
| next_state_ = STATE_READ_TUNNEL_HEADERS_COMPLETE; |
| |
| if (!tunnel_response_headers_.get()) { |
| tunnel_response_headers_ = new ResponseHeaders(); |
| tunnel_response_headers_capacity_ = kMaxTunnelResponseHeadersSize; |
| tunnel_response_headers_->Realloc(tunnel_response_headers_capacity_); |
| tunnel_response_headers_len_ = 0; |
| } |
| |
| int buf_len = tunnel_response_headers_capacity_ - |
| tunnel_response_headers_len_; |
| tunnel_response_headers_->SetDataOffset(tunnel_response_headers_len_); |
| CHECK(tunnel_response_headers_->data()); |
| |
| return socket_->Read(tunnel_response_headers_, buf_len, io_callback_); |
| } |
| |
| int SocketStream::DoReadTunnelHeadersComplete(int result) { |
| DCHECK_EQ(kTunnelProxy, proxy_mode_); |
| |
| if (result < 0) { |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| if (result == 0) { |
| // 0 indicates end-of-file, so socket was closed. |
| next_state_ = STATE_CLOSE; |
| return ERR_CONNECTION_CLOSED; |
| } |
| |
| tunnel_response_headers_len_ += result; |
| DCHECK(tunnel_response_headers_len_ <= tunnel_response_headers_capacity_); |
| |
| int eoh = HttpUtil::LocateEndOfHeaders( |
| tunnel_response_headers_->headers(), tunnel_response_headers_len_, 0); |
| if (eoh == -1) { |
| if (tunnel_response_headers_len_ >= kMaxTunnelResponseHeadersSize) { |
| next_state_ = STATE_CLOSE; |
| return ERR_RESPONSE_HEADERS_TOO_BIG; |
| } |
| |
| next_state_ = STATE_READ_TUNNEL_HEADERS; |
| return OK; |
| } |
| // DidReadResponseHeaders |
| scoped_refptr<HttpResponseHeaders> headers; |
| headers = new HttpResponseHeaders( |
| HttpUtil::AssembleRawHeaders(tunnel_response_headers_->headers(), eoh)); |
| if (headers->GetParsedHttpVersion() < HttpVersion(1, 0)) { |
| // Require the "HTTP/1.x" status line. |
| next_state_ = STATE_CLOSE; |
| return ERR_TUNNEL_CONNECTION_FAILED; |
| } |
| switch (headers->response_code()) { |
| case 200: // OK |
| if (is_secure()) { |
| DCHECK_EQ(eoh, tunnel_response_headers_len_); |
| next_state_ = STATE_SSL_CONNECT; |
| } else { |
| result = DidEstablishConnection(); |
| if (result < 0) { |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| if ((eoh < tunnel_response_headers_len_) && delegate_) |
| delegate_->OnReceivedData( |
| this, tunnel_response_headers_->headers() + eoh, |
| tunnel_response_headers_len_ - eoh); |
| } |
| return OK; |
| case 407: // Proxy Authentication Required. |
| if (proxy_mode_ != kTunnelProxy) |
| return ERR_UNEXPECTED_PROXY_AUTH; |
| |
| result = proxy_auth_controller_->HandleAuthChallenge( |
| headers, false, true, net_log_); |
| if (result != OK) |
| return result; |
| DCHECK(!proxy_info_.is_empty()); |
| next_state_ = STATE_AUTH_REQUIRED; |
| if (proxy_auth_controller_->HaveAuth()) { |
| MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SocketStream::DoRestartWithAuth, this)); |
| return ERR_IO_PENDING; |
| } |
| if (delegate_) { |
| // Wait until RestartWithAuth or Close is called. |
| MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SocketStream::DoAuthRequired, this)); |
| return ERR_IO_PENDING; |
| } |
| break; |
| default: |
| break; |
| } |
| next_state_ = STATE_CLOSE; |
| return ERR_TUNNEL_CONNECTION_FAILED; |
| } |
| |
| int SocketStream::DoSOCKSConnect() { |
| DCHECK_EQ(kSOCKSProxy, proxy_mode_); |
| |
| next_state_ = STATE_SOCKS_CONNECT_COMPLETE; |
| |
| StreamSocket* s = socket_.release(); |
| HostResolver::RequestInfo req_info(HostPortPair::FromURL(url_)); |
| |
| DCHECK(!proxy_info_.is_empty()); |
| if (proxy_info_.proxy_server().scheme() == ProxyServer::SCHEME_SOCKS5) |
| s = new SOCKS5ClientSocket(s, req_info); |
| else |
| s = new SOCKSClientSocket(s, req_info, host_resolver_); |
| socket_.reset(s); |
| metrics_->OnCountConnectionType(SocketStreamMetrics::SOCKS_CONNECTION); |
| return socket_->Connect(io_callback_); |
| } |
| |
| int SocketStream::DoSOCKSConnectComplete(int result) { |
| DCHECK_EQ(kSOCKSProxy, proxy_mode_); |
| |
| if (result == OK) { |
| if (is_secure()) |
| next_state_ = STATE_SSL_CONNECT; |
| else |
| result = DidEstablishConnection(); |
| } else { |
| next_state_ = STATE_CLOSE; |
| } |
| return result; |
| } |
| |
| int SocketStream::DoSecureProxyConnect() { |
| DCHECK(factory_); |
| SSLClientSocketContext ssl_context; |
| ssl_context.cert_verifier = cert_verifier_; |
| ssl_context.server_bound_cert_service = server_bound_cert_service_; |
| socket_.reset(factory_->CreateSSLClientSocket( |
| socket_.release(), |
| proxy_info_.proxy_server().host_port_pair(), |
| proxy_ssl_config_, |
| ssl_context)); |
| next_state_ = STATE_SECURE_PROXY_CONNECT_COMPLETE; |
| metrics_->OnCountConnectionType(SocketStreamMetrics::SECURE_PROXY_CONNECTION); |
| return socket_->Connect(io_callback_); |
| } |
| |
| int SocketStream::DoSecureProxyConnectComplete(int result) { |
| DCHECK_EQ(STATE_NONE, next_state_); |
| // Reconnect with client authentication. |
| if (result == ERR_SSL_CLIENT_AUTH_CERT_NEEDED) |
| return HandleCertificateRequest(result, &proxy_ssl_config_); |
| |
| if (IsCertificateError(result)) |
| next_state_ = STATE_SECURE_PROXY_HANDLE_CERT_ERROR; |
| else if (result == OK) |
| next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN; |
| else |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| int SocketStream::DoSecureProxyHandleCertError(int result) { |
| DCHECK_EQ(STATE_NONE, next_state_); |
| DCHECK(IsCertificateError(result)); |
| result = HandleCertificateError(result); |
| if (result == ERR_IO_PENDING) |
| next_state_ = STATE_SECURE_PROXY_HANDLE_CERT_ERROR_COMPLETE; |
| else |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| int SocketStream::DoSecureProxyHandleCertErrorComplete(int result) { |
| DCHECK_EQ(STATE_NONE, next_state_); |
| if (result == OK) { |
| if (!socket_->IsConnectedAndIdle()) |
| return AllowCertErrorForReconnection(&proxy_ssl_config_); |
| next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN; |
| } else { |
| next_state_ = STATE_CLOSE; |
| } |
| return result; |
| } |
| |
| int SocketStream::DoSSLConnect() { |
| DCHECK(factory_); |
| SSLClientSocketContext ssl_context; |
| ssl_context.cert_verifier = cert_verifier_; |
| ssl_context.server_bound_cert_service = server_bound_cert_service_; |
| socket_.reset(factory_->CreateSSLClientSocket(socket_.release(), |
| HostPortPair::FromURL(url_), |
| server_ssl_config_, |
| ssl_context)); |
| next_state_ = STATE_SSL_CONNECT_COMPLETE; |
| metrics_->OnCountConnectionType(SocketStreamMetrics::SSL_CONNECTION); |
| return socket_->Connect(io_callback_); |
| } |
| |
| int SocketStream::DoSSLConnectComplete(int result) { |
| DCHECK_EQ(STATE_NONE, next_state_); |
| // Reconnect with client authentication. |
| if (result == ERR_SSL_CLIENT_AUTH_CERT_NEEDED) |
| return HandleCertificateRequest(result, &server_ssl_config_); |
| |
| if (IsCertificateError(result)) |
| next_state_ = STATE_SSL_HANDLE_CERT_ERROR; |
| else if (result == OK) |
| result = DidEstablishConnection(); |
| else |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| int SocketStream::DoSSLHandleCertError(int result) { |
| DCHECK_EQ(STATE_NONE, next_state_); |
| DCHECK(IsCertificateError(result)); |
| result = HandleCertificateError(result); |
| if (result == OK || result == ERR_IO_PENDING) |
| next_state_ = STATE_SSL_HANDLE_CERT_ERROR_COMPLETE; |
| else |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| |
| int SocketStream::DoSSLHandleCertErrorComplete(int result) { |
| DCHECK_EQ(STATE_NONE, next_state_); |
| // TODO(toyoshim): Upgrade to SPDY through TLS NPN extension if possible. |
| // If we use HTTPS and this is the first connection to the SPDY server, |
| // we should take care of TLS NPN extension here. |
| |
| if (result == OK) { |
| if (!socket_->IsConnectedAndIdle()) |
| return AllowCertErrorForReconnection(&server_ssl_config_); |
| result = DidEstablishConnection(); |
| } else { |
| next_state_ = STATE_CLOSE; |
| } |
| return result; |
| } |
| |
| int SocketStream::DoReadWrite(int result) { |
| if (result < OK) { |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| if (!socket_.get() || !socket_->IsConnected()) { |
| next_state_ = STATE_CLOSE; |
| return ERR_CONNECTION_CLOSED; |
| } |
| |
| // If client has requested close(), and there's nothing to write, then |
| // let's close the socket. |
| // We don't care about receiving data after the socket is closed. |
| if (closing_ && !write_buf_ && pending_write_bufs_.empty()) { |
| socket_->Disconnect(); |
| next_state_ = STATE_CLOSE; |
| return OK; |
| } |
| |
| next_state_ = STATE_READ_WRITE; |
| |
| // If server already closed the socket, we don't try to read. |
| if (!server_closed_) { |
| if (!read_buf_) { |
| // No read pending and server didn't close the socket. |
| read_buf_ = new IOBuffer(kReadBufferSize); |
| result = socket_->Read(read_buf_, kReadBufferSize, |
| base::Bind(&SocketStream::OnReadCompleted, |
| base::Unretained(this))); |
| if (result > 0) { |
| return DidReceiveData(result); |
| } else if (result == 0) { |
| // 0 indicates end-of-file, so socket was closed. |
| next_state_ = STATE_CLOSE; |
| server_closed_ = true; |
| return ERR_CONNECTION_CLOSED; |
| } |
| // If read is pending, try write as well. |
| // Otherwise, return the result and do next loop (to close the |
| // connection). |
| if (result != ERR_IO_PENDING) { |
| next_state_ = STATE_CLOSE; |
| server_closed_ = true; |
| return result; |
| } |
| } |
| // Read is pending. |
| DCHECK(read_buf_); |
| } |
| |
| if (write_buf_ && !current_write_buf_) { |
| // No write pending. |
| current_write_buf_ = new DrainableIOBuffer(write_buf_, write_buf_size_); |
| current_write_buf_->SetOffset(write_buf_offset_); |
| result = socket_->Write(current_write_buf_, |
| current_write_buf_->BytesRemaining(), |
| base::Bind(&SocketStream::OnWriteCompleted, |
| base::Unretained(this))); |
| if (result > 0) { |
| return DidSendData(result); |
| } |
| // If write is not pending, return the result and do next loop (to close |
| // the connection). |
| if (result != 0 && result != ERR_IO_PENDING) { |
| next_state_ = STATE_CLOSE; |
| return result; |
| } |
| return result; |
| } |
| |
| // We arrived here when both operation is pending. |
| return ERR_IO_PENDING; |
| } |
| |
| GURL SocketStream::ProxyAuthOrigin() const { |
| DCHECK(!proxy_info_.is_empty()); |
| return GURL("http://" + |
| proxy_info_.proxy_server().host_port_pair().ToString()); |
| } |
| |
| int SocketStream::HandleCertificateRequest(int result, SSLConfig* ssl_config) { |
| if (ssl_config->send_client_cert) |
| // We already have performed SSL client authentication once and failed. |
| return result; |
| |
| DCHECK(socket_.get()); |
| scoped_refptr<SSLCertRequestInfo> cert_request_info = new SSLCertRequestInfo; |
| SSLClientSocket* ssl_socket = |
| static_cast<SSLClientSocket*>(socket_.get()); |
| ssl_socket->GetSSLCertRequestInfo(cert_request_info); |
| |
| HttpTransactionFactory* factory = context_->http_transaction_factory(); |
| if (!factory) |
| return result; |
| scoped_refptr<HttpNetworkSession> session = factory->GetSession(); |
| if (!session.get()) |
| return result; |
| |
| scoped_refptr<X509Certificate> client_cert; |
| bool found_cached_cert = session->ssl_client_auth_cache()->Lookup( |
| cert_request_info->host_and_port, &client_cert); |
| if (!found_cached_cert) |
| return result; |
| if (!client_cert) |
| return result; |
| |
| const std::vector<scoped_refptr<X509Certificate> >& client_certs = |
| cert_request_info->client_certs; |
| bool cert_still_valid = false; |
| for (size_t i = 0; i < client_certs.size(); ++i) { |
| if (client_cert->Equals(client_certs[i])) { |
| cert_still_valid = true; |
| break; |
| } |
| } |
| if (!cert_still_valid) |
| return result; |
| |
| ssl_config->send_client_cert = true; |
| ssl_config->client_cert = client_cert; |
| next_state_ = STATE_TCP_CONNECT; |
| return OK; |
| } |
| |
| int SocketStream::AllowCertErrorForReconnection(SSLConfig* ssl_config) { |
| DCHECK(ssl_config); |
| // The SSL handshake didn't finish, or the server closed the SSL connection. |
| // So, we should restart establishing connection with the certificate in |
| // allowed bad certificates in |ssl_config|. |
| // See also net/http/http_network_transaction.cc HandleCertificateError() and |
| // RestartIgnoringLastError(). |
| SSLClientSocket* ssl_socket = static_cast<SSLClientSocket*>(socket_.get()); |
| SSLInfo ssl_info; |
| ssl_socket->GetSSLInfo(&ssl_info); |
| if (ssl_info.cert == NULL || |
| ssl_config->IsAllowedBadCert(ssl_info.cert, NULL)) { |
| // If we already have the certificate in the set of allowed bad |
| // certificates, we did try it and failed again, so we should not |
| // retry again: the connection should fail at last. |
| next_state_ = STATE_CLOSE; |
| return ERR_UNEXPECTED; |
| } |
| // Add the bad certificate to the set of allowed certificates in the |
| // SSL config object. |
| SSLConfig::CertAndStatus bad_cert; |
| if (!X509Certificate::GetDEREncoded(ssl_info.cert->os_cert_handle(), |
| &bad_cert.der_cert)) { |
| next_state_ = STATE_CLOSE; |
| return ERR_UNEXPECTED; |
| } |
| bad_cert.cert_status = ssl_info.cert_status; |
| ssl_config->allowed_bad_certs.push_back(bad_cert); |
| // Restart connection ignoring the bad certificate. |
| socket_->Disconnect(); |
| socket_.reset(); |
| next_state_ = STATE_TCP_CONNECT; |
| return OK; |
| } |
| |
| void SocketStream::DoAuthRequired() { |
| if (delegate_ && proxy_auth_controller_.get()) |
| delegate_->OnAuthRequired(this, proxy_auth_controller_->auth_info().get()); |
| else |
| DoLoop(ERR_UNEXPECTED); |
| } |
| |
| void SocketStream::DoRestartWithAuth() { |
| DCHECK_EQ(next_state_, STATE_AUTH_REQUIRED); |
| tunnel_request_headers_ = NULL; |
| tunnel_request_headers_bytes_sent_ = 0; |
| tunnel_response_headers_ = NULL; |
| tunnel_response_headers_capacity_ = 0; |
| tunnel_response_headers_len_ = 0; |
| |
| next_state_ = STATE_TCP_CONNECT; |
| DoLoop(OK); |
| } |
| |
| int SocketStream::HandleCertificateError(int result) { |
| DCHECK(IsCertificateError(result)); |
| SSLClientSocket* ssl_socket = static_cast<SSLClientSocket*>(socket_.get()); |
| DCHECK(ssl_socket); |
| |
| if (SSLClientSocket::IgnoreCertError(result, LOAD_IGNORE_ALL_CERT_ERRORS)) { |
| const HttpNetworkSession::Params* session_params = |
| context_->GetNetworkSessionParams(); |
| if (session_params && session_params->ignore_certificate_errors) |
| return OK; |
| } |
| |
| if (!delegate_) |
| return result; |
| |
| SSLInfo ssl_info; |
| ssl_socket->GetSSLInfo(&ssl_info); |
| |
| TransportSecurityState::DomainState domain_state; |
| DCHECK(context_); |
| const bool fatal = |
| context_->transport_security_state() && |
| context_->transport_security_state()->GetDomainState( |
| url_.host(), |
| SSLConfigService::IsSNIAvailable(context_->ssl_config_service()), |
| &domain_state); |
| |
| delegate_->OnSSLCertificateError(this, ssl_info, fatal); |
| return ERR_IO_PENDING; |
| } |
| |
| SSLConfigService* SocketStream::ssl_config_service() const { |
| return context_->ssl_config_service(); |
| } |
| |
| ProxyService* SocketStream::proxy_service() const { |
| return context_->proxy_service(); |
| } |
| |
| } // namespace net |