11#include "../shared/qasn1element_p.h"
13#include <QtNetwork/private/qsslcertificate_p.h>
14#include <QtNetwork/private/qsslcipher_p.h>
15#include <QtNetwork/private/qssl_p.h>
17#include <QtNetwork/qsslcertificate.h>
18#include <QtNetwork/qsslcertificateextension.h>
19#include <QtNetwork/qsslsocket.h>
21#include <QtCore/qscopeguard.h>
22#include <QtCore/qoperatingsystemversion.h>
23#include <QtCore/qregularexpression.h>
24#include <QtCore/qdatastream.h>
25#include <QtCore/qmutex.h>
31#if NTDDI_VERSION >= NTDDI_WINBLUE && defined(SECBUFFER_APPLICATION_PROTOCOLS)
33#define SUPPORTS_ALPN 1
37#ifndef SECBUFFER_ALERT
38#define SECBUFFER_ALERT 17
40#ifndef SECPKG_ATTR_APPLICATION_PROTOCOL
41#define SECPKG_ATTR_APPLICATION_PROTOCOL 35
45#ifndef SEC_E_APPLICATION_PROTOCOL_MISMATCH
46#define SEC_E_APPLICATION_PROTOCOL_MISMATCH _HRESULT_TYPEDEF_(0x80090367L
)
50#ifndef SP_PROT_TLS1_SERVER
51#define SP_PROT_TLS1_SERVER 0x00000040
53#ifndef SP_PROT_TLS1_CLIENT
54#define SP_PROT_TLS1_CLIENT 0x00000080
56#ifndef SP_PROT_TLS1_0_SERVER
59#ifndef SP_PROT_TLS1_0_CLIENT
65#ifndef SP_PROT_TLS1_1_SERVER
66#define SP_PROT_TLS1_1_SERVER 0x00000100
68#ifndef SP_PROT_TLS1_1_CLIENT
69#define SP_PROT_TLS1_1_CLIENT 0x00000200
74#ifndef SP_PROT_TLS1_2_SERVER
75#define SP_PROT_TLS1_2_SERVER 0x00000400
77#ifndef SP_PROT_TLS1_2_CLIENT
78#define SP_PROT_TLS1_2_CLIENT 0x00000800
83#ifndef SP_PROT_TLS1_3_SERVER
84#define SP_PROT_TLS1_3_SERVER 0x00001000
86#ifndef SP_PROT_TLS1_3_CLIENT
87#define SP_PROT_TLS1_3_CLIENT 0x00002000
92#ifndef BCRYPT_ECDH_ALGORITHM
93#define BCRYPT_ECDH_ALGORITHM L"ECDH"
95#ifndef BCRYPT_ECDSA_ALGORITHM
96#define BCRYPT_ECDSA_ALGORITHM L"ECDSA"
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
126using namespace Qt::StringLiterals;
132 const QString &passPhrase);
157QT_WARNING_DISABLE_DEPRECATED
159 {
"TLS_AES_256_GCM_SHA384",
"TLS_AES_256_GCM_SHA384",
"",
"",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_3}},
160 {
"TLS_AES_128_GCM_SHA256",
"TLS_AES_128_GCM_SHA256",
"",
"",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_3}},
161 {
"ECDHE-ECDSA-AES256-GCM-SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"ECDH",
"ECDSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
162 {
"ECDHE-ECDSA-AES128-GCM-SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"ECDH",
"ECDSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
163 {
"ECDHE-RSA-AES256-GCM-SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"ECDH",
"RSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
164 {
"ECDHE-RSA-AES128-GCM-SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"ECDH",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
165 {
"DHE-RSA-AES256-GCM-SHA384",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"DH",
"RSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
166 {
"DHE-RSA-AES128-GCM-SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"DH",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
167 {
"ECDHE-ECDSA-AES256-SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"ECDH",
"ECDSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
168 {
"ECDHE-ECDSA-AES128-SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"ECDH",
"ECDSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
169 {
"ECDHE-RSA-AES256-SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"ECDH",
"RSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
170 {
"ECDHE-RSA-AES128-SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"ECDH",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
171 {
"ECDHE-ECDSA-AES256-SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"ECDH",
"ECDSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
172 {
"ECDHE-ECDSA-AES128-SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"ECDH",
"ECDSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
173 {
"ECDHE-RSA-AES256-SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"ECDH",
"RSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
174 {
"ECDHE-RSA-AES128-SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"ECDH",
"RSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
175 {
"AES256-GCM-SHA384",
"TLS_RSA_WITH_AES_256_GCM_SHA384",
"RSA",
"RSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
176 {
"AES128-GCM-SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"RSA",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
177 {
"AES256-SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"RSA",
"RSA",
"AES", 256,
"SHA256", {
QSsl::
TlsV1_2}},
178 {
"AES128-SHA256",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"RSA",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
179 {
"AES256-SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"RSA",
"RSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
180 {
"AES128-SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"RSA",
"RSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
181 {
"DES-CBC3-SHA",
"TLS_RSA_WITH_3DES_EDE_CBC_SHA",
"RSA",
"RSA",
"3DES", 168,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
182 {
"NULL-SHA256",
"TLS_RSA_WITH_NULL_SHA256",
"RSA",
"RSA",
"", 0,
"SHA256", {
QSsl::
TlsV1_2}},
183 {
"NULL-SHA",
"TLS_RSA_WITH_NULL_SHA",
"RSA",
"RSA",
"", 0,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
186 {
"TLS_CHACHA20_POLY1305_SHA256",
"TLS_CHACHA20_POLY1305_SHA256",
"",
"",
"CHACHA20_POLY1305", 0,
"", {
QSsl::
TlsV1_3}},
187 {
"DHE-RSA-AES256-SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"DH",
"RSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
188 {
"DHE-RSA-AES128-SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"DH",
"RSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
189 {
"DHE-DSS-AES256-SHA256",
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA256",
"DH",
"DSA",
"AES", 256,
"SHA256", {
QSsl::
TlsV1_2}},
190 {
"DHE-DSS-AES128-SHA256",
"TLS_DHE_DSS_WITH_AES_128_CBC_SHA256",
"DH",
"DSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
191 {
"DHE-DSS-AES256-SHA",
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA",
"DH",
"DSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
192 {
"DHE-DSS-AES128-SHA",
"TLS_DHE_DSS_WITH_AES_128_CBC_SHA",
"DH",
"DSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
193 {
"EDH-DSS-DES-CBC3-SHA",
"TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA",
"DH",
"DSA",
"3DES", 168,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
194 {
"RC4-SHA",
"TLS_RSA_WITH_RC4_128_SHA",
"RSA",
"RSA",
"RC4", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
195 {
"RC4-MD5",
"TLS_RSA_WITH_RC4_128_MD5",
"RSA",
"RSA",
"RC4", 128,
"MD5", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
196 {
"DES-CBC-SHA",
"TLS_RSA_WITH_DES_CBC_SHA",
"RSA",
"RSA",
"DES", 56,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
197 {
"EDH-DSS-DES-CBC-SHA",
"TLS_DHE_DSS_WITH_DES_CBC_SHA",
"DH",
"DSA",
"DES", 56,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
198 {
"NULL-MD5",
"TLS_RSA_WITH_NULL_MD5",
"RSA",
"RSA",
"", 0,
"MD5", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
201 {
"PSK-AES256-GCM-SHA384",
"TLS_PSK_WITH_AES_256_GCM_SHA384",
"PSK",
"",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
202 {
"PSK-AES128-GCM-SHA256",
"TLS_PSK_WITH_AES_128_GCM_SHA256",
"PSK",
"",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
203 {
"PSK-AES256-CBC-SHA384",
"TLS_PSK_WITH_AES_256_CBC_SHA384",
"PSK",
"",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
204 {
"PSK-AES128-CBC-SHA256",
"TLS_PSK_WITH_AES_128_CBC_SHA256",
"PSK",
"",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
205 {
"PSK-NULL-SHA384",
"TLS_PSK_WITH_NULL_SHA384",
"PSK",
"",
"", 0,
"SHA384", {
QSsl::
TlsV1_2}},
206 {
"PSK-NULL-SHA256",
"TLS_PSK_WITH_NULL_SHA256",
"PSK",
"",
"", 0,
"SHA256", {
QSsl::
TlsV1_2}},
233
234
235
238 static const QList<QSslCipher> defaultCipherList = defaultCiphers();
240 if (defaultCipherList == ciphers) {
245 QList<
const SchannelCipherInfo*> cipherInfo;
247 for (
const auto &cipher : ciphers) {
251 const auto *info = cipherInfoByOpenSslName(cipher.name());
252 if (!cipherInfo.contains(info))
253 cipherInfo.append(info);
256 QList<CRYPTO_SETTINGS> cryptoSettings;
258 const auto assignUnicodeString = [](UNICODE_STRING &unicodeString,
const wchar_t *characters) {
259 unicodeString.Length =
static_cast<USHORT>(wcslen(characters) *
sizeof(WCHAR));
260 unicodeString.MaximumLength = unicodeString.Length +
sizeof(UNICODE_NULL);
261 unicodeString.Buffer =
const_cast<
wchar_t*>(characters);
265 const auto allKeyExchangeAlgorithms = {BCRYPT_RSA_ALGORITHM,
267 BCRYPT_DH_ALGORITHM};
269 for (
const auto &algorithm : allKeyExchangeAlgorithms) {
270 const auto method = QStringView(algorithm);
272 const auto usesMethod = [method](
const SchannelCipherInfo *info) {
273 return QLatin1StringView(info->keyExchangeMethod) == method;
276 const bool exclude = std::none_of(cipherInfo.cbegin(), cipherInfo.cend(), usesMethod);
279 CRYPTO_SETTINGS settings = {};
280 settings.eAlgorithmUsage = TlsParametersCngAlgUsageKeyExchange;
281 assignUnicodeString(settings.strCngAlgId, algorithm);
282 cryptoSettings.append(settings);
287 const auto allAuthenticationAlgorithms = {BCRYPT_RSA_ALGORITHM,
288 BCRYPT_DSA_ALGORITHM,
290 BCRYPT_DH_ALGORITHM};
292 for (
const auto &algorithm : allAuthenticationAlgorithms) {
293 const auto method = QStringView(algorithm);
295 const auto usesMethod = [method](
const SchannelCipherInfo *info) {
296 return QLatin1StringView(info->authenticationMethod) == method;
299 const bool exclude = std::none_of(cipherInfo.begin(), cipherInfo.end(), usesMethod);
302 CRYPTO_SETTINGS settings = {};
303 settings.eAlgorithmUsage = TlsParametersCngAlgUsageSignature;
304 assignUnicodeString(settings.strCngAlgId, algorithm);
305 cryptoSettings.append(settings);
311 const auto allEncryptionAlgorithms = {BCRYPT_AES_ALGORITHM,
312 BCRYPT_RC4_ALGORITHM,
313 BCRYPT_DES_ALGORITHM,
314 BCRYPT_3DES_ALGORITHM};
316 for (
const auto &algorithm : allEncryptionAlgorithms) {
317 const auto method = QStringView(algorithm);
319 if (method == QLatin1StringView(
"AES")) {
320 bool uses128Bit =
false;
321 bool uses256Bit =
false;
322 bool usesGcm =
false;
323 bool usesCbc =
false;
324 for (
const auto *info : cipherInfo) {
325 if (QLatin1StringView(info->encryptionMethod) == method) {
326 uses128Bit = uses128Bit || (info->encryptionBits == 128);
327 uses256Bit = uses256Bit || (info->encryptionBits == 256);
329 QLatin1StringView(info->schannelCipherSuite).contains(
"_GCM_"_L1);
331 QLatin1StringView(info->schannelCipherSuite).contains(
"_CBC_"_L1);
335 CRYPTO_SETTINGS settings = {};
336 settings.eAlgorithmUsage = TlsParametersCngAlgUsageCipher;
337 assignUnicodeString(settings.strCngAlgId, algorithm);
339 if (usesGcm && !usesCbc) {
340 settings.cChainingModes = 1;
341 settings.rgstrChainingModes = &cbcChainingMode;
342 }
else if (!usesGcm && usesCbc) {
343 settings.cChainingModes = 1;
344 settings.rgstrChainingModes = &gcmChainingMode;
347 if (!uses128Bit && uses256Bit) {
348 settings.dwMinBitLength = 256;
349 cryptoSettings.append(settings);
350 }
else if (uses128Bit && !uses256Bit) {
351 settings.dwMaxBitLength = 128;
352 cryptoSettings.append(settings);
353 }
else if (!uses128Bit && !uses256Bit) {
354 cryptoSettings.append(settings);
357 const auto usesMethod = [method](
const SchannelCipherInfo *info) {
358 return QLatin1StringView(info->encryptionMethod) == method;
361 const bool exclude = std::none_of(cipherInfo.begin(), cipherInfo.end(), usesMethod);
364 CRYPTO_SETTINGS settings = {};
365 settings.eAlgorithmUsage = TlsParametersCngAlgUsageCipher;
366 assignUnicodeString(settings.strCngAlgId, algorithm);
367 cryptoSettings.append(settings);
373 const auto allHashAlgorithms = {BCRYPT_MD5_ALGORITHM,
374 BCRYPT_SHA1_ALGORITHM,
375 BCRYPT_SHA256_ALGORITHM,
376 BCRYPT_SHA384_ALGORITHM};
378 for (
const auto &algorithm : allHashAlgorithms) {
379 const auto method = QStringView(algorithm);
381 const auto usesMethod = [method](
const SchannelCipherInfo *info) {
382 return QLatin1StringView(info->hashMethod) == method;
385 const bool exclude = std::none_of(cipherInfo.begin(), cipherInfo.end(), usesMethod);
388 CRYPTO_SETTINGS settings = {};
389 settings.eAlgorithmUsage = TlsParametersCngAlgUsageDigest;
390 assignUnicodeString(settings.strCngAlgId, algorithm);
391 cryptoSettings.append(settings);
395 return cryptoSettings;
400 QList<QSslCipher> ciphers;
402 for (
const auto &cipher : schannelCipherInfo) {
403 if (QLatin1StringView(cipher.schannelCipherSuite) == schannelSuiteName) {
404 for (
const auto &protocol : cipher.protocols) {
406QT_WARNING_DISABLE_DEPRECATED
407 const QString protocolName = (
408 protocol == QSsl::TlsV1_0 ? QStringLiteral(
"TLSv1.0") :
409 protocol == QSsl::TlsV1_1 ? QStringLiteral(
"TLSv1.1") :
410 protocol == QSsl::TlsV1_2 ? QStringLiteral(
"TLSv1.2") :
411 protocol == QSsl::TlsV1_3 ? QStringLiteral(
"TLSv1.3") :
415 ciphers.append(QTlsBackend::createCiphersuite(QLatin1StringView(cipher.openSslCipherSuite),
416 QLatin1StringView(cipher.keyExchangeMethod),
417 QLatin1StringView(cipher.encryptionMethod),
418 QLatin1StringView(cipher.authenticationMethod),
419 cipher.encryptionBits,
420 protocol, protocolName));
430 ULONG contextFunctionsCount = {};
431 PCRYPT_CONTEXT_FUNCTIONS contextFunctions = {};
433 const auto status = BCryptEnumContextFunctions(CRYPT_LOCAL, L"SSL", NCRYPT_SCHANNEL_INTERFACE,
434 &contextFunctionsCount, &contextFunctions);
435 if (!NT_SUCCESS(status)) {
436 qCWarning(lcTlsBackendSchannel,
"Failed to enumerate ciphers");
440 const bool supportsV13 = supportsTls13();
442 QList<QSslCipher> ciphers;
444 for (ULONG index = 0; index < contextFunctions->cFunctions; ++index) {
445 const auto suiteName = QStringView(contextFunctions->rgpszFunctions[index]);
447 const QList<QSslCipher> allCiphers = ciphersByName(suiteName);
449 for (
const auto &cipher : allCiphers) {
450 if (!supportsV13 && (cipher.protocol() == QSsl::TlsV1_3))
453 ciphers.append(cipher);
457 BCryptFreeBuffer(contextFunctions);
464 return std::any_of(ciphers.cbegin(), ciphers.cend(),
465 [](
const QSslCipher &cipher) {
return cipher.protocol() == QSsl::TlsV1_3; });
470bool QSchannelBackend::s_loadedCiphersAndCerts =
false;
473long QSchannelBackend::tlsLibraryVersionNumber()
const
475 const auto os = QOperatingSystemVersion::current();
476 return (os.majorVersion() << 24) | ((os.minorVersion() & 0xFF) << 16) | (os.microVersion() & 0xFFFF);
479QString QSchannelBackend::tlsLibraryVersionString()
const
481 const auto os = QOperatingSystemVersion::current();
482 return "Secure Channel, %1 %2.%3.%4"_L1
484 QString::number(os.majorVersion()),
485 QString::number(os.minorVersion()),
486 QString::number(os.microVersion()));
489long QSchannelBackend::tlsLibraryBuildVersionNumber()
const
491 return NTDDI_VERSION;
494QString QSchannelBackend::tlsLibraryBuildVersionString()
const
496 return "Secure Channel (NTDDI: 0x%1)"_L1
497 .arg(QString::number(NTDDI_VERSION, 16).toUpper());
500void QSchannelBackend::ensureInitialized()
const
502 ensureInitializedImplementation();
505void QSchannelBackend::ensureInitializedImplementation()
507 const QMutexLocker<QRecursiveMutex> locker(qt_schannel_mutex);
508 if (s_loadedCiphersAndCerts)
510 s_loadedCiphersAndCerts =
true;
512 setDefaultCaCertificates(systemCaCertificatesImplementation());
514 QSslSocketPrivate::setRootCertOnDemandLoadingSupported(
true);
516 resetDefaultCiphers();
519void QSchannelBackend::resetDefaultCiphers()
521 setDefaultSupportedCiphers(QTlsPrivate::defaultCiphers());
522 setDefaultCiphers(QTlsPrivate::defaultCiphers());
525QString QSchannelBackend::backendName()
const
527 return builtinBackendNames[nameIndexSchannel];
530QList<QSsl::SslProtocol> QSchannelBackend::supportedProtocols()
const
532 QList<QSsl::SslProtocol> protocols;
534 protocols << QSsl::AnyProtocol;
535 protocols << QSsl::SecureProtocols;
537QT_WARNING_DISABLE_DEPRECATED
538 protocols << QSsl::TlsV1_0;
539 protocols << QSsl::TlsV1_0OrLater;
540 protocols << QSsl::TlsV1_1;
541 protocols << QSsl::TlsV1_1OrLater;
543 protocols << QSsl::TlsV1_2;
544 protocols << QSsl::TlsV1_2OrLater;
546 if (supportsTls13()) {
547 protocols << QSsl::TlsV1_3;
548 protocols << QSsl::TlsV1_3OrLater;
554QList<QSsl::SupportedFeature> QSchannelBackend::supportedFeatures()
const
556 QList<QSsl::SupportedFeature> features;
559 features << QSsl::SupportedFeature::ClientSideAlpn;
560 features << QSsl::SupportedFeature::ServerSideAlpn;
566QList<QSsl::ImplementedClass> QSchannelBackend::implementedClasses()
const
568 QList<QSsl::ImplementedClass> classes;
570 classes << QSsl::ImplementedClass::Socket;
571 classes << QSsl::ImplementedClass::Certificate;
572 classes << QSsl::ImplementedClass::Key;
577QTlsPrivate::TlsKey *QSchannelBackend::createKey()
const
582QTlsPrivate::X509Certificate *QSchannelBackend::createCertificate()
const
587QList<QSslCertificate> QSchannelBackend::systemCaCertificates()
const
589 return systemCaCertificatesImplementation();
592QTlsPrivate::TlsCryptograph *QSchannelBackend::createTlsCryptograph()
const
597QList<QSslCertificate> QSchannelBackend::systemCaCertificatesImplementation()
601 QList<QSslCertificate> systemCerts;
603 auto hSystemStore = QHCertStorePointer(
604 CertOpenStore(CERT_STORE_PROV_SYSTEM, 0, 0,
605 CERT_STORE_READONLY_FLAG | CERT_SYSTEM_STORE_CURRENT_USER, L"ROOT"));
608 PCCERT_CONTEXT pc =
nullptr;
609 while ((pc = CertFindCertificateInStore(hSystemStore.get(), X509_ASN_ENCODING, 0,
610 CERT_FIND_ANY,
nullptr, pc))) {
611 systemCerts.append(QTlsPrivate::X509CertificateSchannel::QSslCertificate_from_CERT_CONTEXT(pc));
617QTlsPrivate::X509PemReaderPtr QSchannelBackend::X509PemReader()
const
619 return QTlsPrivate::X509CertificateGeneric::certificatesFromPem;
622QTlsPrivate::X509DerReaderPtr QSchannelBackend::X509DerReader()
const
624 return QTlsPrivate::X509CertificateGeneric::certificatesFromDer;
627QTlsPrivate::X509Pkcs12ReaderPtr QSchannelBackend::X509Pkcs12Reader()
const
629 return QTlsPrivate::X509CertificateSchannel::importPkcs12;
634SecBuffer createSecBuffer(
void *ptr,
unsigned long length,
unsigned long bufferType)
636 return SecBuffer{ length, bufferType, ptr };
639SecBuffer createSecBuffer(QByteArray &buffer,
unsigned long bufferType)
641 return createSecBuffer(buffer.data(),
static_cast<
unsigned long>(buffer.length()), bufferType);
644QString schannelErrorToString(qint32 status)
647 case SEC_E_INSUFFICIENT_MEMORY:
648 return QSslSocket::tr(
"Insufficient memory");
649 case SEC_E_INTERNAL_ERROR:
650 return QSslSocket::tr(
"Internal error");
651 case SEC_E_INVALID_HANDLE:
652 return QSslSocket::tr(
"An internal handle was invalid");
653 case SEC_E_INVALID_TOKEN:
654 return QSslSocket::tr(
"An internal token was invalid");
655 case SEC_E_LOGON_DENIED:
658 return QSslSocket::tr(
"Access denied");
659 case SEC_E_NO_AUTHENTICATING_AUTHORITY:
660 return QSslSocket::tr(
"No authority could be contacted for authorization");
661 case SEC_E_NO_CREDENTIALS:
662 return QSslSocket::tr(
"No credentials");
663 case SEC_E_TARGET_UNKNOWN:
664 return QSslSocket::tr(
"The target is unknown or unreachable");
665 case SEC_E_UNSUPPORTED_FUNCTION:
666 return QSslSocket::tr(
"An unsupported function was requested");
667 case SEC_E_WRONG_PRINCIPAL:
669 return QSslSocket::tr(
"The hostname provided does not match the one received from the peer");
671 return QSslSocket::tr(
"No common protocol exists between the client and the server");
672 case SEC_E_ILLEGAL_MESSAGE:
673 return QSslSocket::tr(
"Unexpected or badly-formatted message received");
674 case SEC_E_ENCRYPT_FAILURE:
675 return QSslSocket::tr(
"The data could not be encrypted");
676 case SEC_E_DECRYPT_FAILURE:
677 return QSslSocket::tr(
"The data could not be decrypted");
678 case SEC_E_ALGORITHM_MISMATCH:
679 return QSslSocket::tr(
"No cipher suites in common");
680 case SEC_E_UNKNOWN_CREDENTIALS:
682 return QSslSocket::tr(
"The credentials were not recognized / Invalid argument");
683 case SEC_E_MESSAGE_ALTERED:
686 return QSslSocket::tr(
"The message was tampered with, damaged or out of sequence.");
687 case SEC_E_OUT_OF_SEQUENCE:
688 return QSslSocket::tr(
"A message was received out of sequence.");
689 case SEC_E_CONTEXT_EXPIRED:
690 return QSslSocket::tr(
"The TLS/SSL connection has been closed");
692 return QSslSocket::tr(
"Unknown error occurred: %1").arg(status);
698 static bool supported = []() {
699 const auto current = QOperatingSystemVersion::current();
702 QOperatingSystemVersion(QOperatingSystemVersion::Windows, 10, 0, 20221);
703 return current >= minimum;
709DWORD toSchannelProtocol(QSsl::SslProtocol protocol)
711 DWORD protocols = SP_PROT_NONE;
713 case QSsl::UnknownProtocol:
716QT_WARNING_DISABLE_DEPRECATED
718 case QSsl::DtlsV1_0OrLater:
721 case QSsl::DtlsV1_2OrLater:
723 case QSsl::AnyProtocol:
729QT_WARNING_DISABLE_DEPRECATED
744 protocols = DWORD(-1);
747QT_WARNING_DISABLE_DEPRECATED
748 case QSsl::TlsV1_0OrLater:
753 case QSsl::TlsV1_1OrLater:
757 case QSsl::SecureProtocols:
758 case QSsl::TlsV1_2OrLater:
761 case QSsl::TlsV1_3OrLater:
764 else if (protocol == QSsl::TlsV1_3OrLater)
765 protocols = DWORD(-1);
774DWORD negatedSchannelProtocols(DWORD wantedProtocols)
776 DWORD protocols = SP_PROT_ALL;
777 protocols &= ~wantedProtocols;
782
783
784
785
786
787
788QSsl::SslProtocol toQtSslProtocol(DWORD protocol)
790#define MAP_PROTOCOL(sp_protocol, q_protocol)
791 if (protocol & sp_protocol) {
792 Q_ASSERT(!(protocol & ~sp_protocol));
797QT_WARNING_DISABLE_DEPRECATED
805 return QSsl::UnknownProtocol;
809
810
811
812bool netscapeWrongCertType(
const QList<QSslCertificateExtension> &extensions,
bool isClient,
bool isLeaf)
814 const auto netscapeIt = std::find_if(
815 extensions.cbegin(), extensions.cend(),
816 [](
const QSslCertificateExtension &extension) {
817 return extension.oid() == u"2.16.840.1.113730.1.1";
819 if (netscapeIt != extensions.cend()) {
820 const QByteArray netscapeCertTypeByte = netscapeIt->value().toByteArray();
821 int netscapeCertType = 0;
822 QDataStream dataStream(netscapeCertTypeByte);
823 dataStream >> netscapeCertType;
824 if (dataStream.status() != QDataStream::Status::Ok)
826 const int expectedPeerCertType = [&]() {
828 return isClient ? NETSCAPE_SSL_SERVER_AUTH_CERT_TYPE
829 : NETSCAPE_SSL_CLIENT_AUTH_CERT_TYPE;
831 return NETSCAPE_SSL_CA_CERT_TYPE;
833 if ((netscapeCertType & expectedPeerCertType) == 0)
840
841
842
843
844
845
846bool isCertificateAuthority(
const QList<QSslCertificateExtension> &extensions)
848 auto it = std::find_if(extensions.cbegin(), extensions.cend(),
849 [](
const QSslCertificateExtension &extension) {
850 return extension.name() ==
"basicConstraints"_L1;
852 if (it != extensions.cend()) {
853 QVariantMap basicConstraints = it->value().toMap();
854 return basicConstraints.value(
"ca"_L1,
false).toBool();
860
861
862
863
864bool matchesContextRequirements(DWORD attributes, DWORD requirements,
865 QSslSocket::PeerVerifyMode verifyMode,
868#ifdef QSSLSOCKET_DEBUG
869#define DEBUG_WARN(message) qCWarning(lcTlsBackendSchannel, message)
871#define DEBUG_WARN(message)
874#define CHECK_ATTRIBUTE(attributeName)
876 const DWORD req##attributeName = isClient ? ISC_REQ_##attributeName : ASC_REQ_##attributeName;
877 const DWORD ret##attributeName = isClient ? ISC_RET_##attributeName : ASC_RET_##attributeName;
878 if (!(requirements & req##attributeName) != !(attributes & ret##attributeName)) {
879 DEBUG_WARN("Missing attribute \"" #attributeName "\"");
888 if (verifyMode == QSslSocket::PeerVerifyMode::VerifyPeer)
893 const auto reqManualCredValidation = ISC_REQ_MANUAL_CRED_VALIDATION;
894 const auto retManualCredValidation = ISC_RET_MANUAL_CRED_VALIDATION;
895 if (!(requirements & reqManualCredValidation) != !(attributes & retManualCredValidation)) {
896 DEBUG_WARN(
"Missing attribute \"MANUAL_CRED_VALIDATION\"");
902#undef CHECK_ATTRIBUTE
906template<
typename Required,
typename Actual>
907Required const_reinterpret_cast(Actual *p)
913QByteArray createAlpnString(
const QByteArrayList &nextAllowedProtocols)
915 QByteArray alpnString;
916 if (!nextAllowedProtocols.isEmpty()) {
917 const QByteArray names = [&nextAllowedProtocols]() {
918 QByteArray protocolString;
919 for (QByteArray proto : nextAllowedProtocols) {
920 if (proto.size() > 255) {
921 qCWarning(lcTlsBackendSchannel)
922 <<
"TLS ALPN extension" << proto <<
"is too long and will be ignored.";
924 }
else if (proto.isEmpty()) {
927 protocolString +=
char(proto.length()) + proto;
929 return protocolString;
934 const quint16 namesSize = names.size();
935 const quint32 alpnId = SecApplicationProtocolNegotiationExt_ALPN;
936 const quint32 totalSize =
sizeof(alpnId) +
sizeof(namesSize) + namesSize;
937 alpnString = QByteArray::fromRawData(
reinterpret_cast<
const char *>(&totalSize),
sizeof(totalSize))
938 + QByteArray::fromRawData(
reinterpret_cast<
const char *>(&alpnId),
sizeof(alpnId))
939 + QByteArray::fromRawData(
reinterpret_cast<
const char *>(&namesSize),
sizeof(namesSize))
946qint64 readToBuffer(QByteArray &buffer, QTcpSocket *plainSocket)
948 Q_ASSERT(plainSocket);
949 static const qint64 shrinkCutoff = 1024 * 12;
950 static const qint64 defaultRead = 1024 * 16;
951 qint64 bytesRead = 0;
953 const auto toRead =
std::min(defaultRead, plainSocket->bytesAvailable());
955 const auto bufferSize = buffer.size();
956 buffer.reserve(bufferSize + toRead);
957 buffer.resize(bufferSize + toRead);
958 bytesRead = plainSocket->read(buffer.data() + bufferSize, toRead);
959 buffer.resize(bufferSize + bytesRead);
961 if (buffer.size() < shrinkCutoff && buffer.capacity() > defaultRead)
962 buffer.shrink_to_fit();
968void retainExtraData(QByteArray &buffer,
const SecBuffer &secBuffer)
970 Q_ASSERT(secBuffer.BufferType == SECBUFFER_EXTRA);
971 if (
int(secBuffer.cbBuffer) >= buffer.size())
974#ifdef QSSLSOCKET_DEBUG
975 qCDebug(lcTlsBackendSchannel,
"We got SECBUFFER_EXTRA, will retain %lu bytes",
978 std::move(buffer.end() - secBuffer.cbBuffer, buffer.end(), buffer.begin());
979 buffer.resize(secBuffer.cbBuffer);
982qint64 checkIncompleteData(
const SecBuffer &secBuffer)
984 if (secBuffer.BufferType == SECBUFFER_MISSING) {
985#ifdef QSSLSOCKET_DEBUG
986 qCDebug(lcTlsBackendSchannel,
"Need %lu more bytes.", secBuffer.cbBuffer);
988 return secBuffer.cbBuffer;
993DWORD defaultCredsFlag()
995 return qEnvironmentVariableIsSet(
"QT_SCH_DEFAULT_CREDS") ? 0 : SCH_CRED_NO_DEFAULT_CREDS;
1004 SecInvalidateHandle(&credentialHandle);
1005 SecInvalidateHandle(&contextHandle);
1006 QSchannelBackend::ensureInitializedImplementation();
1011 closeCertificateStores();
1012 deallocateContext();
1013 freeCredentialsHandle();
1029 if (tokenLength == 0)
1033 auto *plainSocket = d->plainTcpSocket();
1034 Q_ASSERT(plainSocket);
1035 if (plainSocket->state() == QAbstractSocket::UnconnectedState || !plainSocket->isValid()
1036 || !plainSocket->isOpen()) {
1040 const qint64 written = plainSocket->write(
static_cast<
const char *>(token), tokenLength);
1041 if (written != qint64(tokenLength)) {
1044 setErrorAndEmit(d, plainSocket->error(), plainSocket->errorString());
1056 const auto verificationPeerName = d->verificationName();
1057 return verificationPeerName.isEmpty() ? q->peerName() : verificationPeerName;
1065 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
1068 req |= ISC_REQ_ALLOCATE_MEMORY;
1069 req |= ISC_REQ_CONFIDENTIALITY;
1070 req |= ISC_REQ_REPLAY_DETECT;
1071 req |= ISC_REQ_SEQUENCE_DETECT;
1072 req |= ISC_REQ_STREAM;
1075 req |= ISC_REQ_MANUAL_CRED_VALIDATION;
1077 switch (q->peerVerifyMode()) {
1078 case QSslSocket::PeerVerifyMode::VerifyNone:
1080 case QSslSocket::PeerVerifyMode::AutoVerifyPeer:
1081 case QSslSocket::PeerVerifyMode::QueryPeer:
1083 case QSslSocket::PeerVerifyMode::VerifyPeer:
1084 req |= ISC_REQ_MUTUAL_AUTH;
1096 const auto &configuration = q->sslConfiguration();
1098 Q_ASSERT(schannelState == SchannelState::InitializeHandshake);
1100 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
1101 DWORD protocols = toSchannelProtocol(configuration.protocol());
1102 if (protocols == DWORD(-1)) {
1103 setErrorAndEmit(d, QAbstractSocket::SslInvalidUserDataError,
1104 QSslSocket::tr(
"Invalid protocol chosen"));
1108 DWORD certsCount = 0;
1110 initializeCertificateStores();
1115 if (!configuration.localCertificateChain().isEmpty() && !localCertificateStore)
1118 PCCERT_CONTEXT localCertificate =
nullptr;
1119 if (localCertificateStore !=
nullptr) {
1121 localCertificate =
static_cast<PCCERT_CONTEXT>(configuration.localCertificate().handle());
1122 Q_ASSERT(localCertificate);
1125 const QList<QSslCipher> ciphers = configuration.ciphers();
1126 if (!ciphers.isEmpty() && !containsTls13Cipher(ciphers))
1129 QList<CRYPTO_SETTINGS> cryptoSettings;
1130 if (!ciphers.isEmpty())
1131 cryptoSettings = cryptoSettingsForCiphers(ciphers);
1133 TLS_PARAMETERS tlsParameters = {
1136 negatedSchannelProtocols(protocols),
1137 static_cast<DWORD>(cryptoSettings.size()),
1138 (cryptoSettings.isEmpty() ?
nullptr : cryptoSettings.data()),
1142 SCH_CREDENTIALS credentials = {
1143 SCH_CREDENTIALS_VERSION,
1151 SCH_CRED_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT | defaultCredsFlag(),
1156 TimeStamp expiration{};
1157 auto status = AcquireCredentialsHandle(
nullptr,
1158 const_cast<
wchar_t *>(UNISP_NAME),
1159 isClient ? SECPKG_CRED_OUTBOUND : SECPKG_CRED_INBOUND,
1168 if (status != SEC_E_OK) {
1169 setErrorAndEmit(d, QAbstractSocket::SslInternalError, schannelErrorToString(status));
1177 if (SecIsValidHandle(&contextHandle)) {
1178 DeleteSecurityContext(&contextHandle);
1179 SecInvalidateHandle(&contextHandle);
1185 if (SecIsValidHandle(&credentialHandle)) {
1186 FreeCredentialsHandle(&credentialHandle);
1187 SecInvalidateHandle(&credentialHandle);
1193 localCertificateStore.reset();
1194 peerCertificateStore.reset();
1195 caCertificateStore.reset();
1203 Q_ASSERT(SecIsValidHandle(&credentialHandle));
1204 Q_ASSERT(schannelState == SchannelState::InitializeHandshake);
1205 Q_ASSERT(d->tlsMode() == QSslSocket::SslClientMode);
1206 ULONG contextReq = getContextRequirements();
1208 SecBuffer outBuffers[3];
1209 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
1211 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1212 auto freeBuffers = qScopeGuard([&outBuffers]() {
1213 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
1214 if (outBuffers[i].pvBuffer)
1215 FreeContextBuffer(outBuffers[i].pvBuffer);
1218 SecBufferDesc outputBufferDesc{
1220 ARRAYSIZE(outBuffers),
1226 SecBufferDesc alpnBufferDesc;
1227 bool useAlpn =
false;
1229 QTlsBackend::setAlpnStatus(d, QSslConfiguration::NextProtocolNegotiationNone);
1230 QByteArray alpnString = createAlpnString(q->sslConfiguration().allowedNextProtocols());
1231 useAlpn = !alpnString.isEmpty();
1232 SecBuffer alpnBuffers[1];
1233 alpnBuffers[0] = createSecBuffer(alpnString, SECBUFFER_APPLICATION_PROTOCOLS);
1236 ARRAYSIZE(alpnBuffers),
1241 const QString encodedTargetName = QUrl::fromUserInput(targetName()).host(QUrl::EncodeUnicode);
1242 auto status = InitializeSecurityContext(&credentialHandle,
1244 const_reinterpret_cast<SEC_WCHAR *>(encodedTargetName.utf16()),
1248 useAlpn ? &alpnBufferDesc :
nullptr,
1258 if (status != SEC_I_CONTINUE_NEEDED) {
1259 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1260 QSslSocket::tr(
"Error creating SSL context (%1)").arg(schannelErrorToString(status)));
1264 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1266 schannelState = SchannelState::PerformHandshake;
1275 auto *plainSocket = d->plainTcpSocket();
1276 Q_ASSERT(plainSocket);
1278 Q_ASSERT(SecIsValidHandle(&credentialHandle));
1279 Q_ASSERT(schannelState == SchannelState::InitializeHandshake);
1280 Q_ASSERT(d->tlsMode() == QSslSocket::SslServerMode);
1281 ULONG contextReq = getContextRequirements();
1283 if (missingData > plainSocket->bytesAvailable())
1287 readToBuffer(intermediateBuffer, plainSocket);
1288 if (intermediateBuffer.isEmpty())
1291 SecBuffer inBuffers[2];
1292 inBuffers[0] = createSecBuffer(intermediateBuffer, SECBUFFER_TOKEN);
1295 QTlsBackend::setAlpnStatus(d, QSslConfiguration::NextProtocolNegotiationNone);
1297 QByteArray alpnString = createAlpnString(q->sslConfiguration().allowedNextProtocols());
1298 if (!alpnString.isEmpty()) {
1299 inBuffers[1] = createSecBuffer(alpnString, SECBUFFER_APPLICATION_PROTOCOLS);
1303 inBuffers[1] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1306 SecBufferDesc inputBufferDesc{
1308 ARRAYSIZE(inBuffers),
1312 SecBuffer outBuffers[3];
1313 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
1315 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1316 auto freeBuffers = qScopeGuard([&outBuffers]() {
1317 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
1318 if (outBuffers[i].pvBuffer)
1319 FreeContextBuffer(outBuffers[i].pvBuffer);
1322 SecBufferDesc outputBufferDesc{
1324 ARRAYSIZE(outBuffers),
1329 auto status = AcceptSecurityContext(
1341 if (status == SEC_E_INCOMPLETE_MESSAGE) {
1343 missingData = checkIncompleteData(outBuffers[0]);
1347 if (inBuffers[1].BufferType == SECBUFFER_EXTRA) {
1351 retainExtraData(intermediateBuffer, inBuffers[1]);
1353 intermediateBuffer.resize(0);
1356 if (status != SEC_I_CONTINUE_NEEDED) {
1357 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1358 QSslSocket::tr(
"Error creating SSL context (%1)").arg(schannelErrorToString(status)));
1361 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1363 schannelState = SchannelState::PerformHandshake;
1370 auto *plainSocket = d->plainTcpSocket();
1371 Q_ASSERT(plainSocket);
1373 if (plainSocket->state() == QAbstractSocket::UnconnectedState || !plainSocket->isValid()
1374 || !plainSocket->isOpen()) {
1375 setErrorAndEmit(d, QAbstractSocket::RemoteHostClosedError,
1376 QSslSocket::tr(
"The TLS/SSL connection has been closed"));
1379 Q_ASSERT(SecIsValidHandle(&credentialHandle));
1380 Q_ASSERT(SecIsValidHandle(&contextHandle));
1381 Q_ASSERT(schannelState == SchannelState::PerformHandshake);
1383#ifdef QSSLSOCKET_DEBUG
1384 qCDebug(lcTlsBackendSchannel,
"Bytes available from socket: %lld",
1385 plainSocket->bytesAvailable());
1386 qCDebug(lcTlsBackendSchannel,
"intermediateBuffer size: %d", intermediateBuffer.size());
1389 if (missingData > plainSocket->bytesAvailable())
1393 readToBuffer(intermediateBuffer, plainSocket);
1394 if (intermediateBuffer.isEmpty())
1397 SecBuffer outBuffers[3] = {};
1398 const auto freeOutBuffers = [&outBuffers]() {
1399 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
1400 if (outBuffers[i].pvBuffer)
1401 FreeContextBuffer(outBuffers[i].pvBuffer);
1404 const auto outBuffersGuard = qScopeGuard(freeOutBuffers);
1410 SECURITY_STATUS status;
1413 SecBuffer inputBuffers[2];
1414 inputBuffers[0] = createSecBuffer(intermediateBuffer, SECBUFFER_TOKEN);
1415 inputBuffers[1] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1416 SecBufferDesc inputBufferDesc{
1418 ARRAYSIZE(inputBuffers),
1423 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
1425 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1426 SecBufferDesc outputBufferDesc{
1428 ARRAYSIZE(outBuffers),
1432 ULONG contextReq = getContextRequirements();
1434 status = InitializeSecurityContext(
1437 const_reinterpret_cast<SEC_WCHAR *>(targetName().utf16()),
1449 if (inputBuffers[1].BufferType == SECBUFFER_EXTRA) {
1453 retainExtraData(intermediateBuffer, inputBuffers[1]);
1454 }
else if (status != SEC_E_INCOMPLETE_MESSAGE) {
1456 intermediateBuffer.resize(0);
1460 }
while (status == SEC_I_INCOMPLETE_CREDENTIALS && attempts > 0);
1465 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1467 schannelState = SchannelState::VerifyHandshake;
1469 case SEC_I_CONTINUE_NEEDED:
1470 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1474 case SEC_I_INCOMPLETE_CREDENTIALS:
1477 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1478 QSslSocket::tr(
"Server did not accept any certificate we could present."));
1480 case SEC_I_CONTEXT_EXPIRED:
1482 if (outBuffers[0].BufferType == SECBUFFER_TOKEN) {
1483 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1487 setErrorAndEmit(d, QAbstractSocket::RemoteHostClosedError,
1488 QSslSocket::tr(
"The TLS/SSL connection has been closed"));
1491 case SEC_E_INCOMPLETE_MESSAGE:
1493 missingData = checkIncompleteData(outBuffers[0]);
1495 case SEC_E_ALGORITHM_MISMATCH:
1496 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1497 QSslSocket::tr(
"Algorithm mismatch"));
1505 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1506 QSslSocket::tr(
"Handshake failed: %1").arg(schannelErrorToString(status)));
1514 const auto &configuration = q->sslConfiguration();
1518 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
1519#define CHECK_STATUS(status)
1520 if (status != SEC_E_OK) {
1521 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1522 QSslSocket::tr("Failed to query the TLS context: %1")
1523 .arg(schannelErrorToString(status)));
1528 if (!matchesContextRequirements(contextAttributes, getContextRequirements(),
1529 configuration.peerVerifyMode(), isClient)) {
1530 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1531 QSslSocket::tr(
"Did not get the required attributes for the connection."));
1536 auto status = QueryContextAttributes(&contextHandle,
1537 SECPKG_ATTR_STREAM_SIZES,
1542 status = QueryContextAttributes(&contextHandle,
1543 SECPKG_ATTR_CIPHER_INFO,
1547 status = QueryContextAttributes(&contextHandle,
1548 SECPKG_ATTR_CONNECTION_INFO,
1553 const auto allowedProtos = configuration.allowedNextProtocols();
1554 if (!allowedProtos.isEmpty()) {
1555 SecPkgContext_ApplicationProtocol alpn;
1556 status = QueryContextAttributes(&contextHandle,
1557 SECPKG_ATTR_APPLICATION_PROTOCOL,
1559 CHECK_STATUS(status);
1560 if (alpn.ProtoNegoStatus == SecApplicationProtocolNegotiationStatus_Success) {
1561 QByteArray negotiatedProto = QByteArray((
const char *)alpn.ProtocolId,
1562 alpn.ProtocolIdSize);
1563 if (!allowedProtos.contains(negotiatedProto)) {
1564 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1565 QSslSocket::tr(
"Unwanted protocol was negotiated"));
1568 QTlsBackend::setNegotiatedProtocol(d, negotiatedProto);
1569 QTlsBackend::setAlpnStatus(d, QSslConfiguration::NextProtocolNegotiationNegotiated);
1571 QTlsBackend::setNegotiatedProtocol(d, {});
1572 QTlsBackend::setAlpnStatus(d, QSslConfiguration::NextProtocolNegotiationUnsupported);
1580 CERT_CONTEXT *certificateContext =
nullptr;
1581 auto freeCertificate = qScopeGuard([&certificateContext]() {
1582 if (certificateContext)
1583 CertFreeCertificateContext(certificateContext);
1585 status = QueryContextAttributes(&contextHandle,
1586 SECPKG_ATTR_REMOTE_CERT_CONTEXT,
1587 &certificateContext);
1594 if ((!isClient && configuration.peerVerifyMode() == QSslSocket::PeerVerifyMode::VerifyPeer)
1595 || (isClient && configuration.peerVerifyMode() != QSslSocket::PeerVerifyMode::VerifyNone
1596 && configuration.peerVerifyMode() != QSslSocket::PeerVerifyMode::QueryPeer)) {
1597 if (status != SEC_E_OK) {
1598#ifdef QSSLSOCKET_DEBUG
1599 qCDebug(lcTlsBackendSchannel) <<
"Couldn't retrieve peer certificate, status:"
1600 << schannelErrorToString(status);
1602 const QSslError error{ QSslError::NoPeerCertificate };
1604 emit q->peerVerifyError(error);
1605 if (q->state() != QAbstractSocket::ConnectedState)
1611 if (certificateContext && !verifyCertContext(certificateContext))
1614 if (!checkSslErrors() || q->state() != QAbstractSocket::ConnectedState) {
1615#ifdef QSSLSOCKET_DEBUG
1616 qCDebug(lcTlsBackendSchannel) <<
__func__ <<
"was unsuccessful. Paused:" << d->isPaused();
1619 return d->isPaused() && q->state() == QAbstractSocket::ConnectedState;
1622 schannelState = SchannelState::Done;
1630 SecBuffer outBuffers[3];
1631 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
1633 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1634 auto freeBuffers = qScopeGuard([&outBuffers]() {
1635 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
1636 if (outBuffers[i].pvBuffer)
1637 FreeContextBuffer(outBuffers[i].pvBuffer);
1640 SecBufferDesc outputBufferDesc{
1642 ARRAYSIZE(outBuffers),
1646 ULONG contextReq = getContextRequirements();
1648 SECURITY_STATUS status;
1649 if (d->tlsMode() == QSslSocket::SslClientMode) {
1650 status = InitializeSecurityContext(&credentialHandle,
1652 const_reinterpret_cast<SEC_WCHAR *>(targetName().utf16()),
1664 status = AcceptSecurityContext(
1676 if (status == SEC_I_CONTINUE_NEEDED) {
1677 schannelState = SchannelState::PerformHandshake;
1678 return sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer);
1679 }
else if (status == SEC_E_OK) {
1680 schannelState = SchannelState::PerformHandshake;
1683 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1684 QSslSocket::tr(
"Renegotiation was unsuccessful: %1").arg(schannelErrorToString(status)));
1689
1690
1691
1696 closeCertificateStores();
1697 deallocateContext();
1698 freeCredentialsHandle();
1701 connectionInfo = {};
1704 contextAttributes = 0;
1705 intermediateBuffer.clear();
1706 schannelState = SchannelState::InitializeHandshake;
1709 d->setEncrypted(
false);
1711 renegotiating =
false;
1720 if (q->isEncrypted())
1730 if (q->isEncrypted())
1738 MessageBufferResult result;
1739 QByteArray &fullMessage = result.messageBuffer;
1742 auto &writeBuffer = d->tlsWriteBuffer();
1744 auto allocateMessage = [&fullMessage](qsizetype size) -> QSpan<
char> {
1745 auto targetSize = fullMessage.size() + size;
1746 if (fullMessage.capacity() < targetSize) {
1747 qsizetype newSize = fullMessage.capacity() * 2;
1748 if (newSize < targetSize)
1749 newSize = targetSize;
1750 fullMessage.reserve(newSize);
1752 fullMessage.resizeForOverwrite(targetSize);
1753 return QSpan(fullMessage).subspan(fullMessage.size() - size);
1756 const int headerSize =
int(streamSizes.cbHeader);
1757 const int trailerSize =
int(streamSizes.cbTrailer);
1758 constexpr qsizetype MessageBufferThreshold = 128 * 1024;
1760 qint64 writeBufferSize = 0;
1761 while ((writeBufferSize = writeBuffer.size()) > 0
1762 && fullMessage.size() < MessageBufferThreshold) {
1764 const int bodySize =
int(std::min(writeBufferSize, qint64(streamSizes.cbMaximumMessage)));
1765 const qsizetype messageSize = headerSize + bodySize + trailerSize;
1766 QSpan buffer = allocateMessage(messageSize);
1767 char *header = buffer.data();
1768 char *body = header + headerSize;
1769 char *trailer = body + bodySize;
1772 qint64 copied = writeBuffer.peek(body, bodySize);
1773 Q_ASSERT(copied == bodySize);
1776 SecBuffer inputBuffers[] = {
1777 createSecBuffer(header, headerSize, SECBUFFER_STREAM_HEADER),
1778 createSecBuffer(body, bodySize, SECBUFFER_DATA),
1779 createSecBuffer(trailer, trailerSize, SECBUFFER_STREAM_TRAILER),
1780 createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY)
1782 SecBufferDesc message = {
1784 ARRAYSIZE(inputBuffers),
1788 if (
auto status = EncryptMessage(&contextHandle, 0, &message, 0); status != SEC_E_OK) {
1789 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1790 QSslSocket::tr(
"Schannel failed to encrypt data: %1")
1791 .arg(schannelErrorToString(status)));
1792 result.messageBuffer.chop(messageSize);
1796 writeBuffer.free(bodySize);
1799 auto finalSize = qsizetype(inputBuffers[0].cbBuffer + inputBuffers[1].cbBuffer
1800 + inputBuffers[2].cbBuffer);
1801 fullMessage.chop(messageSize - finalSize);
1811 auto *plainSocket = d->plainTcpSocket();
1812 Q_ASSERT(plainSocket);
1814 if (d->tlsMode() == QSslSocket::UnencryptedMode)
1818 if (plainSocket->state() == QAbstractSocket::UnconnectedState || !plainSocket->isValid()
1819 || !plainSocket->isOpen()) {
1823 if (schannelState != SchannelState::Done) {
1828 auto &buffer = d->tlsBuffer();
1829 if (q->isEncrypted()) {
1830 qint64 totalBytesWritten = 0;
1831 while (d->tlsWriteBuffer().size() > 0) {
1832 MessageBufferResult r = getNextEncryptedMessage();
1833 if (r.messageBuffer.isEmpty() && !r.ok)
1835 QByteArray fullMessage =
std::move(r.messageBuffer);
1836 const qint64 bytesWritten = plainSocket->write(fullMessage);
1837 if (!r.ok && bytesWritten < 0)
1839#ifdef QSSLSOCKET_DEBUG
1840 qCDebug(lcTlsBackendSchannel,
"Wrote %lld of total %d bytes", bytesWritten,
1841 fullMessage.size());
1843 if (bytesWritten >= 0) {
1844 totalBytesWritten += bytesWritten;
1846 setErrorAndEmit(d, plainSocket->error(), plainSocket->errorString());
1851 if (totalBytesWritten > 0) {
1853 bool &emittedBytesWritten = d->tlsEmittedBytesWritten();
1854 if (!emittedBytesWritten) {
1855 emittedBytesWritten =
true;
1856 emit q->bytesWritten(totalBytesWritten);
1857 emittedBytesWritten =
false;
1859 emit q->channelBytesWritten(0, totalBytesWritten);
1864 bool hadIncompleteData =
false;
1865 const auto readBufferMaxSize = d->maxReadBufferSize();
1866 while (!readBufferMaxSize || buffer.size() < readBufferMaxSize) {
1867 if (missingData > plainSocket->bytesAvailable()
1868 && (!readBufferMaxSize || readBufferMaxSize >= missingData)) {
1869#ifdef QSSLSOCKET_DEBUG
1870 qCDebug(lcTlsBackendSchannel,
"We're still missing %lld bytes, will check later.",
1877 const qint64 bytesRead = readToBuffer(intermediateBuffer, plainSocket);
1878#ifdef QSSLSOCKET_DEBUG
1879 qCDebug(lcTlsBackendSchannel,
"Read %lld encrypted bytes from the socket", bytesRead);
1881 if (intermediateBuffer.length() == 0 || (hadIncompleteData && bytesRead == 0)) {
1882#ifdef QSSLSOCKET_DEBUG
1883 qCDebug(lcTlsBackendSchannel,
1884 hadIncompleteData ?
"No new data received, leaving loop!"
1885 :
"Nothing to decrypt, leaving loop!");
1889 hadIncompleteData =
false;
1890#ifdef QSSLSOCKET_DEBUG
1891 qCDebug(lcTlsBackendSchannel,
"Total amount of bytes to decrypt: %d",
1892 intermediateBuffer.length());
1895 SecBuffer dataBuffer[4]{
1896 createSecBuffer(intermediateBuffer, SECBUFFER_DATA),
1897 createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY),
1898 createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY),
1899 createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY)
1901 SecBufferDesc message{
1903 ARRAYSIZE(dataBuffer),
1906 auto status = DecryptMessage(&contextHandle, &message, 0,
nullptr);
1907 if (status == SEC_E_OK || status == SEC_I_RENEGOTIATE || status == SEC_I_CONTEXT_EXPIRED) {
1909 if (dataBuffer[1].cbBuffer > 0) {
1913 buffer.append(
static_cast<
char *>(dataBuffer[1].pvBuffer),
1914 dataBuffer[1].cbBuffer);
1915 totalRead += dataBuffer[1].cbBuffer;
1916#ifdef QSSLSOCKET_DEBUG
1917 qCDebug(lcTlsBackendSchannel,
"Decrypted %lu bytes. New read buffer size: %d",
1918 dataBuffer[1].cbBuffer, buffer.size());
1921 if (dataBuffer[3].BufferType == SECBUFFER_EXTRA) {
1925 retainExtraData(intermediateBuffer, dataBuffer[3]);
1927 intermediateBuffer.resize(0);
1931 if (status == SEC_E_INCOMPLETE_MESSAGE) {
1932 missingData = checkIncompleteData(dataBuffer[0]);
1933#ifdef QSSLSOCKET_DEBUG
1934 qCDebug(lcTlsBackendSchannel,
"We didn't have enough data to decrypt anything, will try again!");
1937 hadIncompleteData =
true;
1938 }
else if (status == SEC_E_INVALID_HANDLE) {
1940 qCWarning(lcTlsBackendSchannel,
"The internal SSPI handle is invalid!");
1942 }
else if (status == SEC_E_INVALID_TOKEN) {
1947 setErrorAndEmit(d, QAbstractSocket::SslInternalError, schannelErrorToString(status));
1949 }
else if (status == SEC_E_MESSAGE_ALTERED) {
1953 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1954 schannelErrorToString(status));
1956 }
else if (status == SEC_E_OUT_OF_SEQUENCE) {
1962 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1963 schannelErrorToString(status));
1965 }
else if (status == SEC_E_DECRYPT_FAILURE) {
1970 setErrorAndEmit(d, QAbstractSocket::SslInternalError, schannelErrorToString(status));
1972 }
else if (status == SEC_I_CONTEXT_EXPIRED) {
1976 }
else if (status == SEC_I_RENEGOTIATE) {
1978#ifdef QSSLSOCKET_DEBUG
1979 qCDebug(lcTlsBackendSchannel,
"The peer wants to renegotiate.");
1981 schannelState = SchannelState::Renegotiate;
1982 renegotiating =
true;
1991 if (
bool *readyReadEmittedPointer = d->readyReadPointer())
1992 *readyReadEmittedPointer =
true;
1993 emit q->readyRead();
1994 emit q->channelReadyRead(0);
2002 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
2003 DWORD shutdownToken = SCHANNEL_SHUTDOWN;
2004 SecBuffer buffer = createSecBuffer(&shutdownToken,
sizeof(DWORD), SECBUFFER_TOKEN);
2005 SecBufferDesc token{
2010 auto status = ApplyControlToken(&contextHandle, &token);
2012 if (status != SEC_E_OK) {
2013#ifdef QSSLSOCKET_DEBUG
2014 qCDebug(lcTlsBackendSchannel)
2015 <<
"Failed to apply shutdown control token:" << schannelErrorToString(status);
2020 SecBuffer outBuffers[3];
2021 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
2023 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
2024 auto freeBuffers = qScopeGuard([&outBuffers]() {
2025 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
2026 if (outBuffers[i].pvBuffer)
2027 FreeContextBuffer(outBuffers[i].pvBuffer);
2030 SecBufferDesc outputBufferDesc{
2032 ARRAYSIZE(outBuffers),
2036 ULONG contextReq = getContextRequirements();
2039 status = InitializeSecurityContext(&credentialHandle,
2041 const_reinterpret_cast<SEC_WCHAR *>(targetName().utf16()),
2053 status = AcceptSecurityContext(
2065 if (status == SEC_E_OK || status == SEC_I_CONTEXT_EXPIRED) {
2066 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer,
false)) {
2072#ifdef QSSLSOCKET_DEBUG
2073 qCDebug(lcTlsBackendSchannel)
2074 <<
"Failed to initialize shutdown:" << schannelErrorToString(status);
2083 auto *plainSocket = d->plainTcpSocket();
2084 Q_ASSERT(plainSocket);
2086 if (SecIsValidHandle(&contextHandle)) {
2089 if (plainSocket->state() != QAbstractSocket::UnconnectedState && q->isEncrypted()) {
2095 plainSocket->disconnectFromHost();
2101 auto *plainSocket = d->plainTcpSocket();
2102 Q_ASSERT(plainSocket);
2103 d->setEncrypted(
false);
2108 qint64 tempMax = d->maxReadBufferSize();
2109 d->setMaxReadBufferSize(0);
2111 d->setMaxReadBufferSize(tempMax);
2116 deallocateContext();
2117 freeCredentialsHandle();
2125 if (!q->isEncrypted())
2128 const auto sessionProtocol = toQtSslProtocol(connectionInfo.dwProtocol);
2130 const auto ciphers = ciphersByName(QStringView(cipherInfo.szCipherSuite));
2131 for (
const auto& cipher : ciphers) {
2132 if (cipher.protocol() == sessionProtocol)
2141 if (!q->isEncrypted())
2142 return QSsl::SslProtocol::UnknownProtocol;
2143 return toQtSslProtocol(connectionInfo.dwProtocol);
2150 auto *plainSocket = d->plainTcpSocket();
2151 Q_ASSERT(plainSocket);
2153 const bool isServer = d->tlsMode() == QSslSocket::SslServerMode;
2154 switch (schannelState) {
2155 case SchannelState::InitializeHandshake:
2156 if (!SecIsValidHandle(&credentialHandle) && !acquireCredentialsHandle()) {
2160 if (!SecIsValidHandle(&credentialHandle))
2162 if (!SecIsValidHandle(&contextHandle) && !(isServer ? acceptContext() : createContext())) {
2166 if (schannelState != SchannelState::PerformHandshake)
2169 case SchannelState::PerformHandshake:
2170 if (!performHandshake()) {
2174 if (schannelState != SchannelState::VerifyHandshake)
2177 case SchannelState::VerifyHandshake:
2180 if (!verifyHandshake()) {
2186 if (schannelState != SchannelState::Done)
2189 case SchannelState::Done:
2191 if (!q->isEncrypted()) {
2192 d->setEncrypted(
true);
2193 emit q->encrypted();
2195 renegotiating =
false;
2196 if (d->isPendingClose()) {
2197 d->setPendingClose(
false);
2203 case SchannelState::Renegotiate:
2204 if (!renegotiate()) {
2207 }
else if (intermediateBuffer.size() || plainSocket->bytesAvailable()) {
2220
2221
2224 if (sslErrors.isEmpty())
2229 const auto &configuration = q->sslConfiguration();
2230 auto *plainSocket = d->plainTcpSocket();
2232 emit q->sslErrors(sslErrors);
2234 const bool doVerifyPeer = configuration.peerVerifyMode() == QSslSocket::VerifyPeer
2235 || (configuration.peerVerifyMode() == QSslSocket::AutoVerifyPeer
2236 && d->tlsMode() == QSslSocket::SslClientMode);
2237 const bool doEmitSslError = !d->verifyErrorsHaveBeenIgnored();
2239 if (doVerifyPeer && doEmitSslError) {
2240 if (q->pauseMode() & QAbstractSocket::PauseOnSslErrors) {
2241 QSslSocketPrivate::pauseSocketNotifiers(q);
2244 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
2245 sslErrors.constFirst().errorString());
2246 plainSocket->disconnectFromHost();
2255 const QSslKey &privateKey)
2257 QAsn1Element elem = _q_PKCS12_key(privateKey);
2259 QDataStream stream(&buffer, QDataStream::WriteOnly);
2261 NCRYPT_PROV_HANDLE provider = 0;
2262 SECURITY_STATUS status = NCryptOpenStorageProvider(&provider, MS_KEY_STORAGE_PROVIDER, 0);
2263 if (status != SEC_E_OK) {
2264 qCWarning(lcTlsBackendSchannel())
2265 <<
"Failed to open ncrypt storage provider:" << schannelErrorToString(status);
2268 const auto freeProvider = qScopeGuard([provider]() { NCryptFreeObject(provider); });
2270 const QString certName = certificate.subjectInfo(QSslCertificate::CommonName).front();
2271 QSpan<
const QChar> nameSpan(certName);
2272 NCryptBuffer nbuffer{ ULONG(nameSpan.size_bytes() +
sizeof(
char16_t)),
2273 NCRYPTBUFFER_PKCS_KEY_NAME,
2274 const_reinterpret_cast<
void *>(nameSpan.data()) };
2275 NCryptBufferDesc bufferDesc{ NCRYPTBUFFER_VERSION, 1, &nbuffer };
2276 NCRYPT_KEY_HANDLE ncryptKey = 0;
2277 status = NCryptImportKey(provider, 0, NCRYPT_PKCS8_PRIVATE_KEY_BLOB, &bufferDesc, &ncryptKey,
2278 PBYTE(buffer.data()), buffer.size(), 0);
2279 if (status != SEC_E_OK) {
2280 qCWarning(lcTlsBackendSchannel())
2281 <<
"Failed to import private key:" << schannelErrorToString(status);
2284 const auto freeKey = qScopeGuard([ncryptKey]() { NCryptFreeObject(ncryptKey); });
2286 CERT_CONTEXT *context = PCERT_CONTEXT(certificate.handle());
2289 CRYPT_DATA_BLOB keyBlob = {
sizeof(ncryptKey), PBYTE(&ncryptKey) };
2291 CertSetCertificateContextProperty(context, CERT_NCRYPT_KEY_HANDLE_PROP_ID, 0, &keyBlob);
2293 auto error = GetLastError();
2294 if (lcTlsBackendSchannel().isWarningEnabled())
2295 qErrnoWarning(
int(error),
"Failed to set ncrypt handle property.");
2299 CRYPT_KEY_PROV_INFO provInfo{
2300 const_reinterpret_cast<LPWSTR>(certName.constData()),
2301 const_cast<LPWSTR>(MS_KEY_STORAGE_PROVIDER),
2303 CERT_SET_KEY_PROV_HANDLE_PROP_ID | CERT_SET_KEY_CONTEXT_PROP_ID,
2308 ok = CertSetCertificateContextProperty(context, CERT_KEY_PROV_INFO_PROP_ID,
2309 CERT_SET_PROPERTY_INHIBIT_PERSIST_FLAG, &provInfo);
2311 auto error = GetLastError();
2312 if (lcTlsBackendSchannel().isWarningEnabled())
2313 qErrnoWarning(
int(error),
"Failed to set key provider info property.");
2323 const auto &configuration = q->sslConfiguration();
2325 auto createStoreFromCertificateChain = [](
const QList<QSslCertificate> certChain,
const QSslKey &privateKey) {
2326 const wchar_t *passphrase = L"";
2328 QByteArray pkcs12 = _q_makePkcs12(certChain,
2330 QString::fromWCharArray(passphrase, 0));
2331 CRYPT_DATA_BLOB pfxBlob;
2332 pfxBlob.cbData = DWORD(pkcs12.length());
2333 pfxBlob.pbData =
reinterpret_cast<
unsigned char *>(pkcs12.data());
2336 constexpr DWORD flags = PKCS12_ALWAYS_CNG_KSP | PKCS12_NO_PERSIST_KEY;
2337 return QHCertStorePointer(PFXImportCertStore(&pfxBlob, passphrase, flags));
2340 if (!configuration.localCertificateChain().isEmpty()) {
2341 if (configuration.privateKey().isNull()) {
2342 setErrorAndEmit(d, QAbstractSocket::SslInvalidUserDataError,
2343 QSslSocket::tr(
"Cannot provide a certificate with no key"));
2346 if (localCertificateStore ==
nullptr) {
2347 localCertificateStore =
2348 createStoreFromCertificateChain(configuration.localCertificateChain(), {});
2349 if (localCertificateStore) {
2350 const CERT_CONTEXT *certificateContext = CertFindCertificateInStore(
2351 localCertificateStore.get(), X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, 0,
2352 CERT_FIND_ANY,
nullptr,
nullptr);
2353 if (certificateContext) {
2354 auto *backend = QTlsBackend::backend<X509CertificateSchannel>(
2355 configuration.localCertificate());
2356 backend->certificateContext.reset(
2357 CertDuplicateCertificateContext(certificateContext));
2360 BOOL mustFree = FALSE;
2361 NCRYPT_KEY_HANDLE testKey = 0;
2362 BOOL ok = CryptAcquireCertificatePrivateKey(
2363 certificateContext, CRYPT_ACQUIRE_ONLY_NCRYPT_KEY_FLAG,
nullptr,
2364 &testKey, &keySpec, &mustFree);
2366 NCryptFreeObject(testKey);
2368 attachPrivateKeyToCertificate(configuration.localCertificate(),
2369 configuration.privateKey());
2373 qCWarning(lcTlsBackendSchannel,
"Failed to load certificate chain!");
2378 if (!configuration.caCertificates().isEmpty() && !caCertificateStore) {
2379 caCertificateStore = createStoreFromCertificateChain(configuration.caCertificates(),
2386 Q_ASSERT(certContext);
2390 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
2394 auto tempCertCollection = QHCertStorePointer(CertOpenStore(CERT_STORE_PROV_COLLECTION,
2397 CERT_STORE_CREATE_NEW_FLAG,
2399 if (!tempCertCollection) {
2400#ifdef QSSLSOCKET_DEBUG
2401 qCWarning(lcTlsBackendSchannel,
"Failed to create certificate store collection!");
2406 if (rootCertOnDemandLoadingAllowed()) {
2411 auto rootStore = QHCertStorePointer(
2412 CertOpenStore(CERT_STORE_PROV_SYSTEM, 0, 0,
2413 CERT_STORE_READONLY_FLAG | CERT_SYSTEM_STORE_CURRENT_USER, L"ROOT"));
2416#ifdef QSSLSOCKET_DEBUG
2417 qCWarning(lcTlsBackendSchannel,
"Failed to open the system root CA certificate store!");
2420 }
else if (!CertAddStoreToCollection(tempCertCollection.get(), rootStore.get(), 0, 1)) {
2421#ifdef QSSLSOCKET_DEBUG
2422 qCWarning(lcTlsBackendSchannel,
2423 "Failed to add the system root CA certificate store to the certificate store "
2429 if (caCertificateStore) {
2430 if (!CertAddStoreToCollection(tempCertCollection.get(), caCertificateStore.get(), 0, 1)) {
2431#ifdef QSSLSOCKET_DEBUG
2432 qCWarning(lcTlsBackendSchannel,
2433 "Failed to add the user's CA certificate store to the certificate store "
2440 if (!CertAddStoreToCollection(tempCertCollection.get(), certContext->hCertStore, 0, 0)) {
2441#ifdef QSSLSOCKET_DEBUG
2442 qCWarning(lcTlsBackendSchannel,
2443 "Failed to add certificate's origin store to the certificate store collection!");
2448 CERT_CHAIN_PARA parameters;
2449 ZeroMemory(¶meters,
sizeof(parameters));
2450 parameters.cbSize =
sizeof(CERT_CHAIN_PARA);
2451 parameters.RequestedUsage.dwType = USAGE_MATCH_TYPE_AND;
2452 parameters.RequestedUsage.Usage.cUsageIdentifier = 1;
2453 LPSTR oid = LPSTR(isClient ? szOID_PKIX_KP_SERVER_AUTH
2454 : szOID_PKIX_KP_CLIENT_AUTH);
2455 parameters.RequestedUsage.Usage.rgpszUsageIdentifier = &oid;
2457 QTlsBackend::clearPeerCertificates(d);
2458 const CERT_CHAIN_CONTEXT *chainContext =
nullptr;
2459 auto freeCertChain = qScopeGuard([&chainContext]() {
2461 CertFreeCertificateChain(chainContext);
2463 BOOL status = CertGetCertificateChain(
nullptr,
2466 tempCertCollection.get(),
2468 CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT,
2472 if (status == FALSE || !chainContext || chainContext->cChain == 0) {
2473 QSslError error(QSslError::UnableToVerifyFirstCertificate);
2475 emit q->peerVerifyError(error);
2476 return q->state() == QAbstractSocket::ConnectedState;
2480 static auto getCertificateFromChainElement = [](CERT_CHAIN_ELEMENT *element) {
2482 return QSslCertificate();
2484 const CERT_CONTEXT *certContext = element->pCertContext;
2485 return QTlsPrivate::X509CertificateSchannel::QSslCertificate_from_CERT_CONTEXT(certContext);
2491 CERT_SIMPLE_CHAIN *chain = chainContext->rgpChain[chainContext->cChain - 1];
2493 if (chain->TrustStatus.dwErrorStatus & CERT_TRUST_IS_PARTIAL_CHAIN) {
2494 auto error = QSslError(QSslError::SslError::UnableToGetIssuerCertificate,
2495 getCertificateFromChainElement(chain->rgpElement[chain->cElement - 1]));
2497 emit q->peerVerifyError(error);
2498 if (q->state() != QAbstractSocket::ConnectedState)
2501 if (chain->TrustStatus.dwErrorStatus & CERT_TRUST_INVALID_BASIC_CONSTRAINTS) {
2505 auto error = QSslError(QSslError::PathLengthExceeded);
2507 emit q->peerVerifyError(error);
2508 if (q->state() != QAbstractSocket::ConnectedState)
2511 static const DWORD leftoverCertChainErrorMask = CERT_TRUST_IS_CYCLIC | CERT_TRUST_INVALID_EXTENSION
2512 | CERT_TRUST_INVALID_POLICY_CONSTRAINTS | CERT_TRUST_INVALID_NAME_CONSTRAINTS
2513 | CERT_TRUST_CTL_IS_NOT_TIME_VALID | CERT_TRUST_CTL_IS_NOT_SIGNATURE_VALID
2514 | CERT_TRUST_CTL_IS_NOT_VALID_FOR_USAGE;
2515 if (chain->TrustStatus.dwErrorStatus & leftoverCertChainErrorMask) {
2516 auto error = QSslError(QSslError::SslError::UnspecifiedError);
2518 emit q->peerVerifyError(error);
2519 if (q->state() != QAbstractSocket::ConnectedState)
2523 DWORD verifyDepth = chain->cElement;
2524 if (q->peerVerifyDepth() > 0 && DWORD(q->peerVerifyDepth()) < verifyDepth)
2525 verifyDepth = DWORD(q->peerVerifyDepth());
2527 const auto &caCertificates = q->sslConfiguration().caCertificates();
2529 if (!rootCertOnDemandLoadingAllowed()
2530 && !(chain->TrustStatus.dwErrorStatus & CERT_TRUST_IS_PARTIAL_CHAIN)
2531 && (q->peerVerifyMode() == QSslSocket::VerifyPeer
2532 || (isClient && q->peerVerifyMode() == QSslSocket::AutoVerifyPeer))) {
2538 CERT_CHAIN_ELEMENT *element = chain->rgpElement[chain->cElement - 1];
2539 QSslCertificate certificate = getCertificateFromChainElement(element);
2540 if (!caCertificates.contains(certificate)) {
2541 auto error = QSslError(QSslError::CertificateUntrusted, certificate);
2543 emit q->peerVerifyError(error);
2544 if (q->state() != QAbstractSocket::ConnectedState)
2549 QList<QSslCertificate> peerCertificateChain;
2550 for (DWORD i = 0; i < verifyDepth; i++) {
2551 CERT_CHAIN_ELEMENT *element = chain->rgpElement[i];
2552 QSslCertificate certificate = getCertificateFromChainElement(element);
2553 if (certificate.isNull()) {
2554 const auto &previousCert = !peerCertificateChain.isEmpty() ? peerCertificateChain.last()
2555 : QSslCertificate();
2556 auto error = QSslError(QSslError::SslError::UnableToGetIssuerCertificate, previousCert);
2558 emit q->peerVerifyError(error);
2559 if (previousCert.isNull() || q->state() != QAbstractSocket::ConnectedState)
2562 const QList<QSslCertificateExtension> extensions = certificate.extensions();
2564#ifdef QSSLSOCKET_DEBUG
2565 qCDebug(lcTlsBackendSchannel) <<
"issuer:" << certificate.issuerDisplayName()
2566 <<
"\nsubject:" << certificate.subjectDisplayName()
2567 <<
"\nQSslCertificate info:" << certificate
2568 <<
"\nextended error info:" << element->pwszExtendedErrorInfo
2569 <<
"\nerror status:" << element->TrustStatus.dwErrorStatus;
2572 peerCertificateChain.append(certificate);
2573 QTlsBackend::storePeerCertificateChain(d, peerCertificateChain);
2575 if (certificate.isBlacklisted()) {
2576 const auto error = QSslError(QSslError::CertificateBlacklisted, certificate);
2578 emit q->peerVerifyError(error);
2579 if (q->state() != QAbstractSocket::ConnectedState)
2583 LONG result = CertVerifyTimeValidity(
nullptr , element->pCertContext->pCertInfo);
2585 auto error = QSslError(result == -1 ? QSslError::CertificateNotYetValid
2586 : QSslError::CertificateExpired,
2589 emit q->peerVerifyError(error);
2590 if (q->state() != QAbstractSocket::ConnectedState)
2595 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_NOT_TIME_VALID) {
2597 Q_ASSERT(!sslErrors.isEmpty());
2599 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_REVOKED) {
2600 auto error = QSslError(QSslError::CertificateRevoked, certificate);
2602 emit q->peerVerifyError(error);
2603 if (q->state() != QAbstractSocket::ConnectedState)
2606 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_NOT_SIGNATURE_VALID) {
2607 auto error = QSslError(QSslError::CertificateSignatureFailed, certificate);
2609 emit q->peerVerifyError(error);
2610 if (q->state() != QAbstractSocket::ConnectedState)
2617 if (netscapeWrongCertType(extensions, isClient, i == 0))
2618 element->TrustStatus.dwErrorStatus |= CERT_TRUST_IS_NOT_VALID_FOR_USAGE;
2620 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_NOT_VALID_FOR_USAGE) {
2621 auto error = QSslError(QSslError::InvalidPurpose, certificate);
2623 emit q->peerVerifyError(error);
2624 if (q->state() != QAbstractSocket::ConnectedState)
2627 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_UNTRUSTED_ROOT) {
2629 const bool isTrustedRoot = caCertificates.contains(certificate);
2630 if (!isTrustedRoot) {
2631 auto error = QSslError(QSslError::CertificateUntrusted, certificate);
2633 emit q->peerVerifyError(error);
2634 if (q->state() != QAbstractSocket::ConnectedState)
2638 static const DWORD certRevocationCheckUnavailableError = CERT_TRUST_IS_OFFLINE_REVOCATION
2639 | CERT_TRUST_REVOCATION_STATUS_UNKNOWN;
2640 if (element->TrustStatus.dwErrorStatus & certRevocationCheckUnavailableError) {
2645 static const DWORD leftoverCertErrorMask = CERT_TRUST_IS_CYCLIC
2646 | CERT_TRUST_INVALID_EXTENSION | CERT_TRUST_INVALID_NAME_CONSTRAINTS
2647 | CERT_TRUST_INVALID_POLICY_CONSTRAINTS
2648 | CERT_TRUST_HAS_EXCLUDED_NAME_CONSTRAINT
2649 | CERT_TRUST_HAS_NOT_SUPPORTED_CRITICAL_EXT
2650 | CERT_TRUST_HAS_NOT_DEFINED_NAME_CONSTRAINT
2651 | CERT_TRUST_HAS_NOT_PERMITTED_NAME_CONSTRAINT
2652 | CERT_TRUST_HAS_NOT_SUPPORTED_NAME_CONSTRAINT;
2653 if (element->TrustStatus.dwErrorStatus & leftoverCertErrorMask) {
2654 auto error = QSslError(QSslError::UnspecifiedError, certificate);
2656 emit q->peerVerifyError(error);
2657 if (q->state() != QAbstractSocket::ConnectedState)
2660 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_INVALID_BASIC_CONSTRAINTS) {
2661 auto it = std::find_if(extensions.cbegin(), extensions.cend(),
2662 [](
const QSslCertificateExtension &extension) {
2663 return extension.name() ==
"basicConstraints"_L1;
2665 if (it != extensions.cend()) {
2669 QVariantMap basicConstraints = it->value().toMap();
2671 if (i > 0 && !basicConstraints.value(
"ca"_L1,
false).toBool())
2672 error = QSslError(QSslError::InvalidPurpose, certificate);
2674 error = QSslError(QSslError::PathLengthExceeded, certificate);
2676 emit q->peerVerifyError(error);
2677 if (q->state() != QAbstractSocket::ConnectedState)
2681 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_EXPLICIT_DISTRUST) {
2682 auto error = QSslError(QSslError::CertificateBlacklisted, certificate);
2684 emit q->peerVerifyError(error);
2685 if (q->state() != QAbstractSocket::ConnectedState)
2689 if (element->TrustStatus.dwInfoStatus & CERT_TRUST_IS_SELF_SIGNED) {
2694 const bool isRootCertificateAuthority = isCertificateAuthority(extensions)
2695 || certificate.version() ==
"1";
2698 if (!isRootCertificateAuthority) {
2699 auto error = QSslError(QSslError::SelfSignedCertificate, certificate);
2701 emit q->peerVerifyError(error);
2702 if (q->state() != QAbstractSocket::ConnectedState)
2708 if (!peerCertificateChain.isEmpty())
2709 QTlsBackend::storePeerCertificate(d, peerCertificateChain.constFirst());
2711 const auto &configuration = q->sslConfiguration();
2713 const bool doVerifyPeer = q->peerVerifyMode() == QSslSocket::VerifyPeer
2714 || (q->peerVerifyMode() == QSslSocket::AutoVerifyPeer
2715 && d->tlsMode() == QSslSocket::SslClientMode);
2719 if (!configuration.peerCertificate().isNull()) {
2722 if (d->tlsMode() == QSslSocket::SslClientMode) {
2723 const auto verificationPeerName = d->verificationName();
2724 const QString peerName(verificationPeerName.isEmpty() ? q->peerName() : verificationPeerName);
2725 if (!isMatchingHostname(configuration.peerCertificate(), peerName)) {
2727 const QSslError error(QSslError::HostNameMismatch, configuration.peerCertificate());
2729 emit q->peerVerifyError(error);
2730 if (q->state() != QAbstractSocket::ConnectedState)
2734 }
else if (doVerifyPeer) {
2737 const QSslError error(QSslError::NoPeerCertificate);
2739 emit q->peerVerifyError(error);
2740 if (q->state() != QAbstractSocket::ConnectedState)
2750 return d->isRootsOnDemandAllowed() && QSslSocketPrivate::rootCertOnDemandLoadingSupported();
void startClientEncryption() override
void disconnected() override
void continueHandshake() override
void init(QSslSocket *q, QSslSocketPrivate *d) override
void startServerEncryption() override
QSsl::SslProtocol sessionProtocol() const override
void disconnectFromHost() override
~TlsCryptographSchannel()
bool hasUndecryptedData() const override
QSslCipher sessionCipher() const override
QList< QSslError > tlsErrors() const override
Q_DISABLE_COPY_MOVE(X509CertificateSchannel)
Combined button and popup list for selecting options.
Namespace containing onternal types that TLS backends implement.
QT_WARNING_PUSH QT_WARNING_DISABLE_DEPRECATED std::array< SchannelCipherInfo, 44 > schannelCipherInfo
QList< QSslCipher > defaultCiphers()
UNICODE_STRING cbcChainingMode
QList< CRYPTO_SETTINGS > cryptoSettingsForCiphers(const QList< QSslCipher > &ciphers)
bool containsTls13Cipher(const QList< QSslCipher > &ciphers)
UNICODE_STRING gcmChainingMode
QList< QSslCipher > ciphersByName(QStringView schannelSuiteName)
static void attachPrivateKeyToCertificate(const QSslCertificate &certificate, const QSslKey &privateKey)
Q_LOGGING_CATEGORY(lcEventDispatcher, "qt.eventdispatcher")
Q_GLOBAL_STATIC(QReadWriteLock, g_updateMutex)
#define SP_PROT_TLS1_0_SERVER
#define SP_PROT_TLS1_1_SERVER
#define SP_PROT_TLS1_2_SERVER
#define BCRYPT_ECDSA_ALGORITHM
#define SP_PROT_TLS1_3_SERVER
#define MAP_PROTOCOL(sp_protocol, q_protocol)
#define CHECK_STATUS(status)
#define CHECK_ATTRIBUTE(attributeName)
#define DEBUG_WARN(message)
QByteArray _q_makePkcs12(const QList< QSslCertificate > &certs, const QSslKey &key, const QString &passPhrase)
#define SP_PROT_TLS1_1_CLIENT
#define SP_PROT_TLS1_SERVER
QAsn1Element _q_PKCS12_key(const QSslKey &key)
#define BCRYPT_ECDH_ALGORITHM
#define SP_PROT_TLS1_3_CLIENT
#define SEC_E_APPLICATION_PROTOCOL_MISMATCH
#define SP_PROT_TLS1_CLIENT
#define SP_PROT_TLS1_0_CLIENT
#define SP_PROT_TLS1_2_CLIENT
const char * authenticationMethod
const char * schannelCipherSuite
QList< QSsl::SslProtocol > protocols
const char * encryptionMethod
const char * openSslCipherSuite
const char * keyExchangeMethod