blob: c432d3244fd50f5fa187f7ebc993b836cb3fe2da [file] [log] [blame]
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/ssl/ssl_manager.h"
#include "base/utf_string_conversions.h"
#include "chrome/browser/load_from_memory_cache_details.h"
#include "chrome/browser/net/url_request_tracking.h"
#include "chrome/browser/ssl/ssl_cert_error_handler.h"
#include "chrome/browser/ssl/ssl_policy.h"
#include "chrome/browser/ssl/ssl_request_info.h"
#include "content/browser/browser_thread.h"
#include "content/browser/renderer_host/resource_dispatcher_host.h"
#include "content/browser/renderer_host/resource_dispatcher_host_request_info.h"
#include "content/browser/renderer_host/resource_request_details.h"
#include "content/browser/tab_contents/navigation_controller.h"
#include "content/browser/tab_contents/navigation_entry.h"
#include "content/browser/tab_contents/provisional_load_details.h"
#include "content/browser/tab_contents/tab_contents.h"
#include "content/common/notification_service.h"
#include "grit/generated_resources.h"
#include "net/base/cert_status_flags.h"
#include "ui/base/l10n/l10n_util.h"
// static
void SSLManager::OnSSLCertificateError(ResourceDispatcherHost* rdh,
net::URLRequest* request,
int cert_error,
net::X509Certificate* cert) {
DVLOG(1) << "OnSSLCertificateError() cert_error: " << cert_error
<< " url: " << request->url().spec();
ResourceDispatcherHostRequestInfo* info =
ResourceDispatcherHost::InfoForRequest(request);
DCHECK(info);
// A certificate error occurred. Construct a SSLCertErrorHandler object and
// hand it over to the UI thread for processing.
BrowserThread::PostTask(
BrowserThread::UI, FROM_HERE,
NewRunnableMethod(new SSLCertErrorHandler(rdh,
request,
info->resource_type(),
cert_error,
cert),
&SSLCertErrorHandler::Dispatch));
}
// static
void SSLManager::NotifySSLInternalStateChanged() {
NotificationService::current()->Notify(
NotificationType::SSL_INTERNAL_STATE_CHANGED,
NotificationService::AllSources(),
NotificationService::NoDetails());
}
// static
std::string SSLManager::SerializeSecurityInfo(int cert_id,
int cert_status,
int security_bits,
int ssl_connection_status) {
Pickle pickle;
pickle.WriteInt(cert_id);
pickle.WriteInt(cert_status);
pickle.WriteInt(security_bits);
pickle.WriteInt(ssl_connection_status);
return std::string(static_cast<const char*>(pickle.data()), pickle.size());
}
// static
bool SSLManager::DeserializeSecurityInfo(const std::string& state,
int* cert_id,
int* cert_status,
int* security_bits,
int* ssl_connection_status) {
DCHECK(cert_id && cert_status && security_bits && ssl_connection_status);
if (state.empty()) {
// No SSL used.
*cert_id = 0;
// The following are not applicable and are set to the default values.
*cert_status = 0;
*security_bits = -1;
*ssl_connection_status = 0;
return false;
}
Pickle pickle(state.data(), static_cast<int>(state.size()));
void * iter = NULL;
return pickle.ReadInt(&iter, cert_id) &&
pickle.ReadInt(&iter, cert_status) &&
pickle.ReadInt(&iter, security_bits) &&
pickle.ReadInt(&iter, ssl_connection_status);
}
// static
string16 SSLManager::GetEVCertName(const net::X509Certificate& cert) {
// EV are required to have an organization name and country.
if (cert.subject().organization_names.empty() ||
cert.subject().country_name.empty()) {
NOTREACHED();
return string16();
}
return l10n_util::GetStringFUTF16(
IDS_SECURE_CONNECTION_EV,
UTF8ToUTF16(cert.subject().organization_names[0]),
UTF8ToUTF16(cert.subject().country_name));
}
SSLManager::SSLManager(NavigationController* controller)
: backend_(controller),
policy_(new SSLPolicy(&backend_)),
controller_(controller) {
DCHECK(controller_);
// Subscribe to various notifications.
registrar_.Add(this, NotificationType::FAIL_PROVISIONAL_LOAD_WITH_ERROR,
Source<NavigationController>(controller_));
registrar_.Add(this, NotificationType::RESOURCE_RESPONSE_STARTED,
Source<RenderViewHostDelegate>(controller_->tab_contents()));
registrar_.Add(this, NotificationType::RESOURCE_RECEIVED_REDIRECT,
Source<RenderViewHostDelegate>(controller_->tab_contents()));
registrar_.Add(this, NotificationType::LOAD_FROM_MEMORY_CACHE,
Source<NavigationController>(controller_));
registrar_.Add(this, NotificationType::SSL_INTERNAL_STATE_CHANGED,
NotificationService::AllSources());
}
SSLManager::~SSLManager() {
}
void SSLManager::DidCommitProvisionalLoad(
const NotificationDetails& in_details) {
NavigationController::LoadCommittedDetails* details =
Details<NavigationController::LoadCommittedDetails>(in_details).ptr();
NavigationEntry* entry = controller_->GetActiveEntry();
if (details->is_main_frame) {
if (entry) {
// Decode the security details.
int ssl_cert_id, ssl_cert_status, ssl_security_bits,
ssl_connection_status;
DeserializeSecurityInfo(details->serialized_security_info,
&ssl_cert_id,
&ssl_cert_status,
&ssl_security_bits,
&ssl_connection_status);
// We may not have an entry if this is a navigation to an initial blank
// page. Reset the SSL information and add the new data we have.
entry->ssl() = NavigationEntry::SSLStatus();
entry->ssl().set_cert_id(ssl_cert_id);
entry->ssl().set_cert_status(ssl_cert_status);
entry->ssl().set_security_bits(ssl_security_bits);
entry->ssl().set_connection_status(ssl_connection_status);
}
}
UpdateEntry(entry);
}
void SSLManager::DidRunInsecureContent(const std::string& security_origin) {
policy()->DidRunInsecureContent(controller_->GetActiveEntry(),
security_origin);
}
bool SSLManager::ProcessedSSLErrorFromRequest() const {
NavigationEntry* entry = controller_->GetActiveEntry();
if (!entry) {
NOTREACHED();
return false;
}
return net::IsCertStatusError(entry->ssl().cert_status());
}
void SSLManager::Observe(NotificationType type,
const NotificationSource& source,
const NotificationDetails& details) {
// Dispatch by type.
switch (type.value) {
case NotificationType::FAIL_PROVISIONAL_LOAD_WITH_ERROR:
// Do nothing.
break;
case NotificationType::RESOURCE_RESPONSE_STARTED:
DidStartResourceResponse(Details<ResourceRequestDetails>(details).ptr());
break;
case NotificationType::RESOURCE_RECEIVED_REDIRECT:
DidReceiveResourceRedirect(
Details<ResourceRedirectDetails>(details).ptr());
break;
case NotificationType::LOAD_FROM_MEMORY_CACHE:
DidLoadFromMemoryCache(
Details<LoadFromMemoryCacheDetails>(details).ptr());
break;
case NotificationType::SSL_INTERNAL_STATE_CHANGED:
DidChangeSSLInternalState();
break;
default:
NOTREACHED() << "The SSLManager received an unexpected notification.";
}
}
void SSLManager::DidLoadFromMemoryCache(LoadFromMemoryCacheDetails* details) {
// Simulate loading this resource through the usual path.
// Note that we specify SUB_RESOURCE as the resource type as WebCore only
// caches sub-resources.
// This resource must have been loaded with no filtering because filtered
// resouces aren't cachable.
scoped_refptr<SSLRequestInfo> info(new SSLRequestInfo(
details->url(),
ResourceType::SUB_RESOURCE,
details->pid(),
details->ssl_cert_id(),
details->ssl_cert_status()));
// Simulate loading this resource through the usual path.
policy()->OnRequestStarted(info.get());
}
void SSLManager::DidStartResourceResponse(ResourceRequestDetails* details) {
scoped_refptr<SSLRequestInfo> info(new SSLRequestInfo(
details->url(),
details->resource_type(),
details->origin_child_id(),
details->ssl_cert_id(),
details->ssl_cert_status()));
// Notify our policy that we started a resource request. Ideally, the
// policy should have the ability to cancel the request, but we can't do
// that yet.
policy()->OnRequestStarted(info.get());
}
void SSLManager::DidReceiveResourceRedirect(ResourceRedirectDetails* details) {
// TODO(abarth): Make sure our redirect behavior is correct. If we ever see a
// non-HTTPS resource in the redirect chain, we want to trigger
// insecure content, even if the redirect chain goes back to
// HTTPS. This is because the network attacker can redirect the
// HTTP request to https://attacker.com/payload.js.
}
void SSLManager::DidChangeSSLInternalState() {
UpdateEntry(controller_->GetActiveEntry());
}
void SSLManager::UpdateEntry(NavigationEntry* entry) {
// We don't always have a navigation entry to update, for example in the
// case of the Web Inspector.
if (!entry)
return;
NavigationEntry::SSLStatus original_ssl_status = entry->ssl(); // Copy!
policy()->UpdateEntry(entry, controller_->tab_contents());
if (!entry->ssl().Equals(original_ssl_status)) {
NotificationService::current()->Notify(
NotificationType::SSL_VISIBLE_STATE_CHANGED,
Source<NavigationController>(controller_),
NotificationService::NoDetails());
}
}