11#include "../shared/qasn1element_p.h"
13#include <QtNetwork/private/qsslcertificate_p.h>
14#include <QtNetwork/private/qsslcipher_p.h>
15#include <QtNetwork/private/qssl_p.h>
17#include <QtNetwork/qsslcertificate.h>
18#include <QtNetwork/qsslcertificateextension.h>
19#include <QtNetwork/qsslsocket.h>
21#include <QtCore/qscopeguard.h>
22#include <QtCore/qoperatingsystemversion.h>
23#include <QtCore/qregularexpression.h>
24#include <QtCore/qdatastream.h>
25#include <QtCore/qmutex.h>
31#if NTDDI_VERSION >= NTDDI_WINBLUE && defined(SECBUFFER_APPLICATION_PROTOCOLS)
33#define SUPPORTS_ALPN 1
37#ifndef SECBUFFER_ALERT
38#define SECBUFFER_ALERT 17
40#ifndef SECPKG_ATTR_APPLICATION_PROTOCOL
41#define SECPKG_ATTR_APPLICATION_PROTOCOL 35
45#ifndef SEC_E_APPLICATION_PROTOCOL_MISMATCH
46#define SEC_E_APPLICATION_PROTOCOL_MISMATCH _HRESULT_TYPEDEF_(0x80090367L
)
50#ifndef SP_PROT_TLS1_SERVER
51#define SP_PROT_TLS1_SERVER 0x00000040
53#ifndef SP_PROT_TLS1_CLIENT
54#define SP_PROT_TLS1_CLIENT 0x00000080
56#ifndef SP_PROT_TLS1_0_SERVER
59#ifndef SP_PROT_TLS1_0_CLIENT
65#ifndef SP_PROT_TLS1_1_SERVER
66#define SP_PROT_TLS1_1_SERVER 0x00000100
68#ifndef SP_PROT_TLS1_1_CLIENT
69#define SP_PROT_TLS1_1_CLIENT 0x00000200
74#ifndef SP_PROT_TLS1_2_SERVER
75#define SP_PROT_TLS1_2_SERVER 0x00000400
77#ifndef SP_PROT_TLS1_2_CLIENT
78#define SP_PROT_TLS1_2_CLIENT 0x00000800
83#ifndef SP_PROT_TLS1_3_SERVER
84#define SP_PROT_TLS1_3_SERVER 0x00001000
86#ifndef SP_PROT_TLS1_3_CLIENT
87#define SP_PROT_TLS1_3_CLIENT 0x00002000
92#ifndef BCRYPT_ECDH_ALGORITHM
93#define BCRYPT_ECDH_ALGORITHM L"ECDH"
95#ifndef BCRYPT_ECDSA_ALGORITHM
96#define BCRYPT_ECDSA_ALGORITHM L"ECDSA"
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
126using namespace Qt::StringLiterals;
132 const QString &passPhrase);
157QT_WARNING_DISABLE_DEPRECATED
159 {
"TLS_AES_256_GCM_SHA384",
"TLS_AES_256_GCM_SHA384",
"",
"",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_3}},
160 {
"TLS_AES_128_GCM_SHA256",
"TLS_AES_128_GCM_SHA256",
"",
"",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_3}},
161 {
"ECDHE-ECDSA-AES256-GCM-SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"ECDH",
"ECDSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
162 {
"ECDHE-ECDSA-AES128-GCM-SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"ECDH",
"ECDSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
163 {
"ECDHE-RSA-AES256-GCM-SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"ECDH",
"RSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
164 {
"ECDHE-RSA-AES128-GCM-SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"ECDH",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
165 {
"DHE-RSA-AES256-GCM-SHA384",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"DH",
"RSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
166 {
"DHE-RSA-AES128-GCM-SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"DH",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
167 {
"ECDHE-ECDSA-AES256-SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"ECDH",
"ECDSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
168 {
"ECDHE-ECDSA-AES128-SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"ECDH",
"ECDSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
169 {
"ECDHE-RSA-AES256-SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"ECDH",
"RSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
170 {
"ECDHE-RSA-AES128-SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"ECDH",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
171 {
"ECDHE-ECDSA-AES256-SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"ECDH",
"ECDSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
172 {
"ECDHE-ECDSA-AES128-SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"ECDH",
"ECDSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
173 {
"ECDHE-RSA-AES256-SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"ECDH",
"RSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
174 {
"ECDHE-RSA-AES128-SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"ECDH",
"RSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
175 {
"AES256-GCM-SHA384",
"TLS_RSA_WITH_AES_256_GCM_SHA384",
"RSA",
"RSA",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
176 {
"AES128-GCM-SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"RSA",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
177 {
"AES256-SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"RSA",
"RSA",
"AES", 256,
"SHA256", {
QSsl::
TlsV1_2}},
178 {
"AES128-SHA256",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"RSA",
"RSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
179 {
"AES256-SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"RSA",
"RSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
180 {
"AES128-SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"RSA",
"RSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
181 {
"DES-CBC3-SHA",
"TLS_RSA_WITH_3DES_EDE_CBC_SHA",
"RSA",
"RSA",
"3DES", 168,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
182 {
"NULL-SHA256",
"TLS_RSA_WITH_NULL_SHA256",
"RSA",
"RSA",
"", 0,
"SHA256", {
QSsl::
TlsV1_2}},
183 {
"NULL-SHA",
"TLS_RSA_WITH_NULL_SHA",
"RSA",
"RSA",
"", 0,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
186 {
"TLS_CHACHA20_POLY1305_SHA256",
"TLS_CHACHA20_POLY1305_SHA256",
"",
"",
"CHACHA20_POLY1305", 0,
"", {
QSsl::
TlsV1_3}},
187 {
"DHE-RSA-AES256-SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"DH",
"RSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
188 {
"DHE-RSA-AES128-SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"DH",
"RSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
189 {
"DHE-DSS-AES256-SHA256",
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA256",
"DH",
"DSA",
"AES", 256,
"SHA256", {
QSsl::
TlsV1_2}},
190 {
"DHE-DSS-AES128-SHA256",
"TLS_DHE_DSS_WITH_AES_128_CBC_SHA256",
"DH",
"DSA",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
191 {
"DHE-DSS-AES256-SHA",
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA",
"DH",
"DSA",
"AES", 256,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
192 {
"DHE-DSS-AES128-SHA",
"TLS_DHE_DSS_WITH_AES_128_CBC_SHA",
"DH",
"DSA",
"AES", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
193 {
"EDH-DSS-DES-CBC3-SHA",
"TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA",
"DH",
"DSA",
"3DES", 168,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
194 {
"RC4-SHA",
"TLS_RSA_WITH_RC4_128_SHA",
"RSA",
"RSA",
"RC4", 128,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
195 {
"RC4-MD5",
"TLS_RSA_WITH_RC4_128_MD5",
"RSA",
"RSA",
"RC4", 128,
"MD5", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
196 {
"DES-CBC-SHA",
"TLS_RSA_WITH_DES_CBC_SHA",
"RSA",
"RSA",
"DES", 56,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
197 {
"EDH-DSS-DES-CBC-SHA",
"TLS_DHE_DSS_WITH_DES_CBC_SHA",
"DH",
"DSA",
"DES", 56,
"SHA1", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
198 {
"NULL-MD5",
"TLS_RSA_WITH_NULL_MD5",
"RSA",
"RSA",
"", 0,
"MD5", {
QSsl::
TlsV1_2,
QSsl::
TlsV1_1,
QSsl::
TlsV1_0}},
201 {
"PSK-AES256-GCM-SHA384",
"TLS_PSK_WITH_AES_256_GCM_SHA384",
"PSK",
"",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
202 {
"PSK-AES128-GCM-SHA256",
"TLS_PSK_WITH_AES_128_GCM_SHA256",
"PSK",
"",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
203 {
"PSK-AES256-CBC-SHA384",
"TLS_PSK_WITH_AES_256_CBC_SHA384",
"PSK",
"",
"AES", 256,
"SHA384", {
QSsl::
TlsV1_2}},
204 {
"PSK-AES128-CBC-SHA256",
"TLS_PSK_WITH_AES_128_CBC_SHA256",
"PSK",
"",
"AES", 128,
"SHA256", {
QSsl::
TlsV1_2}},
205 {
"PSK-NULL-SHA384",
"TLS_PSK_WITH_NULL_SHA384",
"PSK",
"",
"", 0,
"SHA384", {
QSsl::
TlsV1_2}},
206 {
"PSK-NULL-SHA256",
"TLS_PSK_WITH_NULL_SHA256",
"PSK",
"",
"", 0,
"SHA256", {
QSsl::
TlsV1_2}},
233
234
235
238 static const QList<QSslCipher> defaultCipherList = defaultCiphers();
240 if (defaultCipherList == ciphers) {
245 QList<
const SchannelCipherInfo*> cipherInfo;
247 for (
const auto &cipher : ciphers) {
251 const auto *info = cipherInfoByOpenSslName(cipher.name());
252 if (!cipherInfo.contains(info))
253 cipherInfo.append(info);
256 QList<CRYPTO_SETTINGS> cryptoSettings;
258 const auto assignUnicodeString = [](UNICODE_STRING &unicodeString,
const wchar_t *characters) {
259 unicodeString.Length =
static_cast<USHORT>(wcslen(characters) *
sizeof(WCHAR));
260 unicodeString.MaximumLength = unicodeString.Length +
sizeof(UNICODE_NULL);
261 unicodeString.Buffer =
const_cast<
wchar_t*>(characters);
265 const auto allKeyExchangeAlgorithms = {BCRYPT_RSA_ALGORITHM,
267 BCRYPT_DH_ALGORITHM};
269 for (
const auto &algorithm : allKeyExchangeAlgorithms) {
270 const auto method = QStringView(algorithm);
272 const auto usesMethod = [method](
const SchannelCipherInfo *info) {
273 return QLatin1StringView(info->keyExchangeMethod) == method;
276 const bool exclude = std::none_of(cipherInfo.cbegin(), cipherInfo.cend(), usesMethod);
279 CRYPTO_SETTINGS settings = {};
280 settings.eAlgorithmUsage = TlsParametersCngAlgUsageKeyExchange;
281 assignUnicodeString(settings.strCngAlgId, algorithm);
282 cryptoSettings.append(settings);
287 const auto allAuthenticationAlgorithms = {BCRYPT_RSA_ALGORITHM,
288 BCRYPT_DSA_ALGORITHM,
290 BCRYPT_DH_ALGORITHM};
292 for (
const auto &algorithm : allAuthenticationAlgorithms) {
293 const auto method = QStringView(algorithm);
295 const auto usesMethod = [method](
const SchannelCipherInfo *info) {
296 return QLatin1StringView(info->authenticationMethod) == method;
299 const bool exclude = std::none_of(cipherInfo.begin(), cipherInfo.end(), usesMethod);
302 CRYPTO_SETTINGS settings = {};
303 settings.eAlgorithmUsage = TlsParametersCngAlgUsageSignature;
304 assignUnicodeString(settings.strCngAlgId, algorithm);
305 cryptoSettings.append(settings);
311 const auto allEncryptionAlgorithms = {BCRYPT_AES_ALGORITHM,
312 BCRYPT_RC4_ALGORITHM,
313 BCRYPT_DES_ALGORITHM,
314 BCRYPT_3DES_ALGORITHM};
316 for (
const auto &algorithm : allEncryptionAlgorithms) {
317 const auto method = QStringView(algorithm);
319 if (method == QLatin1StringView(
"AES")) {
320 bool uses128Bit =
false;
321 bool uses256Bit =
false;
322 bool usesGcm =
false;
323 bool usesCbc =
false;
324 for (
const auto *info : cipherInfo) {
325 if (QLatin1StringView(info->encryptionMethod) == method) {
326 uses128Bit = uses128Bit || (info->encryptionBits == 128);
327 uses256Bit = uses256Bit || (info->encryptionBits == 256);
329 QLatin1StringView(info->schannelCipherSuite).contains(
"_GCM_"_L1);
331 QLatin1StringView(info->schannelCipherSuite).contains(
"_CBC_"_L1);
335 CRYPTO_SETTINGS settings = {};
336 settings.eAlgorithmUsage = TlsParametersCngAlgUsageCipher;
337 assignUnicodeString(settings.strCngAlgId, algorithm);
339 if (usesGcm && !usesCbc) {
340 settings.cChainingModes = 1;
341 settings.rgstrChainingModes = &cbcChainingMode;
342 }
else if (!usesGcm && usesCbc) {
343 settings.cChainingModes = 1;
344 settings.rgstrChainingModes = &gcmChainingMode;
347 if (!uses128Bit && uses256Bit) {
348 settings.dwMinBitLength = 256;
349 cryptoSettings.append(settings);
350 }
else if (uses128Bit && !uses256Bit) {
351 settings.dwMaxBitLength = 128;
352 cryptoSettings.append(settings);
353 }
else if (!uses128Bit && !uses256Bit) {
354 cryptoSettings.append(settings);
357 const auto usesMethod = [method](
const SchannelCipherInfo *info) {
358 return QLatin1StringView(info->encryptionMethod) == method;
361 const bool exclude = std::none_of(cipherInfo.begin(), cipherInfo.end(), usesMethod);
364 CRYPTO_SETTINGS settings = {};
365 settings.eAlgorithmUsage = TlsParametersCngAlgUsageCipher;
366 assignUnicodeString(settings.strCngAlgId, algorithm);
367 cryptoSettings.append(settings);
373 const auto allHashAlgorithms = {BCRYPT_MD5_ALGORITHM,
374 BCRYPT_SHA1_ALGORITHM,
375 BCRYPT_SHA256_ALGORITHM,
376 BCRYPT_SHA384_ALGORITHM};
378 for (
const auto &algorithm : allHashAlgorithms) {
379 const auto method = QStringView(algorithm);
381 const auto usesMethod = [method](
const SchannelCipherInfo *info) {
382 return QLatin1StringView(info->hashMethod) == method;
385 const bool exclude = std::none_of(cipherInfo.begin(), cipherInfo.end(), usesMethod);
388 CRYPTO_SETTINGS settings = {};
389 settings.eAlgorithmUsage = TlsParametersCngAlgUsageDigest;
390 assignUnicodeString(settings.strCngAlgId, algorithm);
391 cryptoSettings.append(settings);
395 return cryptoSettings;
400 QList<QSslCipher> ciphers;
402 for (
const auto &cipher : schannelCipherInfo) {
403 if (QLatin1StringView(cipher.schannelCipherSuite) == schannelSuiteName) {
404 for (
const auto &protocol : cipher.protocols) {
406QT_WARNING_DISABLE_DEPRECATED
407 const QString protocolName = (
408 protocol == QSsl::TlsV1_0 ? QStringLiteral(
"TLSv1.0") :
409 protocol == QSsl::TlsV1_1 ? QStringLiteral(
"TLSv1.1") :
410 protocol == QSsl::TlsV1_2 ? QStringLiteral(
"TLSv1.2") :
411 protocol == QSsl::TlsV1_3 ? QStringLiteral(
"TLSv1.3") :
415 ciphers.append(QTlsBackend::createCiphersuite(QLatin1StringView(cipher.openSslCipherSuite),
416 QLatin1StringView(cipher.keyExchangeMethod),
417 QLatin1StringView(cipher.encryptionMethod),
418 QLatin1StringView(cipher.authenticationMethod),
419 cipher.encryptionBits,
420 protocol, protocolName));
430 ULONG contextFunctionsCount = {};
431 PCRYPT_CONTEXT_FUNCTIONS contextFunctions = {};
433 const auto status = BCryptEnumContextFunctions(CRYPT_LOCAL, L"SSL", NCRYPT_SCHANNEL_INTERFACE,
434 &contextFunctionsCount, &contextFunctions);
435 if (!NT_SUCCESS(status)) {
436 qCWarning(lcTlsBackendSchannel,
"Failed to enumerate ciphers");
440 const bool supportsV13 = supportsTls13();
442 QList<QSslCipher> ciphers;
444 for (ULONG index = 0; index < contextFunctions->cFunctions; ++index) {
445 const auto suiteName = QStringView(contextFunctions->rgpszFunctions[index]);
447 const QList<QSslCipher> allCiphers = ciphersByName(suiteName);
449 for (
const auto &cipher : allCiphers) {
450 if (!supportsV13 && (cipher.protocol() == QSsl::TlsV1_3))
453 ciphers.append(cipher);
457 BCryptFreeBuffer(contextFunctions);
464 return std::any_of(ciphers.cbegin(), ciphers.cend(),
465 [](
const QSslCipher &cipher) {
return cipher.protocol() == QSsl::TlsV1_3; });
470bool QSchannelBackend::s_loadedCiphersAndCerts =
false;
473long QSchannelBackend::tlsLibraryVersionNumber()
const
475 const auto os = QOperatingSystemVersion::current();
476 return (os.majorVersion() << 24) | ((os.minorVersion() & 0xFF) << 16) | (os.microVersion() & 0xFFFF);
479QString QSchannelBackend::tlsLibraryVersionString()
const
481 const auto os = QOperatingSystemVersion::current();
482 return "Secure Channel, %1 %2.%3.%4"_L1
484 QString::number(os.majorVersion()),
485 QString::number(os.minorVersion()),
486 QString::number(os.microVersion()));
489long QSchannelBackend::tlsLibraryBuildVersionNumber()
const
491 return NTDDI_VERSION;
494QString QSchannelBackend::tlsLibraryBuildVersionString()
const
496 return "Secure Channel (NTDDI: 0x%1)"_L1
497 .arg(QString::number(NTDDI_VERSION, 16).toUpper());
500void QSchannelBackend::ensureInitialized()
const
502 ensureInitializedImplementation();
505void QSchannelBackend::ensureInitializedImplementation()
507 const QMutexLocker<QRecursiveMutex> locker(qt_schannel_mutex);
508 if (s_loadedCiphersAndCerts)
510 s_loadedCiphersAndCerts =
true;
512 setDefaultCaCertificates(systemCaCertificatesImplementation());
514 QSslSocketPrivate::setRootCertOnDemandLoadingSupported(
true);
516 resetDefaultCiphers();
519void QSchannelBackend::resetDefaultCiphers()
521 setDefaultSupportedCiphers(QTlsPrivate::defaultCiphers());
522 setDefaultCiphers(QTlsPrivate::defaultCiphers());
525QString QSchannelBackend::backendName()
const
527 return builtinBackendNames[nameIndexSchannel];
530QList<QSsl::SslProtocol> QSchannelBackend::supportedProtocols()
const
532 QList<QSsl::SslProtocol> protocols;
534 protocols << QSsl::AnyProtocol;
535 protocols << QSsl::SecureProtocols;
537QT_WARNING_DISABLE_DEPRECATED
538 protocols << QSsl::TlsV1_0;
539 protocols << QSsl::TlsV1_0OrLater;
540 protocols << QSsl::TlsV1_1;
541 protocols << QSsl::TlsV1_1OrLater;
543 protocols << QSsl::TlsV1_2;
544 protocols << QSsl::TlsV1_2OrLater;
546 if (supportsTls13()) {
547 protocols << QSsl::TlsV1_3;
548 protocols << QSsl::TlsV1_3OrLater;
554QList<QSsl::SupportedFeature> QSchannelBackend::supportedFeatures()
const
556 QList<QSsl::SupportedFeature> features;
559 features << QSsl::SupportedFeature::ClientSideAlpn;
560 features << QSsl::SupportedFeature::ServerSideAlpn;
566QList<QSsl::ImplementedClass> QSchannelBackend::implementedClasses()
const
568 QList<QSsl::ImplementedClass> classes;
570 classes << QSsl::ImplementedClass::Socket;
571 classes << QSsl::ImplementedClass::Certificate;
572 classes << QSsl::ImplementedClass::Key;
577QTlsPrivate::TlsKey *QSchannelBackend::createKey()
const
582QTlsPrivate::X509Certificate *QSchannelBackend::createCertificate()
const
587QList<QSslCertificate> QSchannelBackend::systemCaCertificates()
const
589 return systemCaCertificatesImplementation();
592QTlsPrivate::TlsCryptograph *QSchannelBackend::createTlsCryptograph()
const
597QList<QSslCertificate> QSchannelBackend::systemCaCertificatesImplementation()
601 QList<QSslCertificate> systemCerts;
603 auto hSystemStore = QHCertStorePointer(
604 CertOpenStore(CERT_STORE_PROV_SYSTEM, 0, 0,
605 CERT_STORE_READONLY_FLAG | CERT_SYSTEM_STORE_CURRENT_USER, L"ROOT"));
608 PCCERT_CONTEXT pc =
nullptr;
609 while ((pc = CertFindCertificateInStore(hSystemStore.get(), X509_ASN_ENCODING, 0,
610 CERT_FIND_ANY,
nullptr, pc))) {
611 systemCerts.append(QTlsPrivate::X509CertificateSchannel::QSslCertificate_from_CERT_CONTEXT(pc));
617QTlsPrivate::X509PemReaderPtr QSchannelBackend::X509PemReader()
const
619 return QTlsPrivate::X509CertificateGeneric::certificatesFromPem;
622QTlsPrivate::X509DerReaderPtr QSchannelBackend::X509DerReader()
const
624 return QTlsPrivate::X509CertificateGeneric::certificatesFromDer;
627QTlsPrivate::X509Pkcs12ReaderPtr QSchannelBackend::X509Pkcs12Reader()
const
629 return QTlsPrivate::X509CertificateSchannel::importPkcs12;
634SecBuffer createSecBuffer(
void *ptr,
unsigned long length,
unsigned long bufferType)
636 return SecBuffer{ length, bufferType, ptr };
639SecBuffer createSecBuffer(QByteArray &buffer,
unsigned long bufferType)
641 return createSecBuffer(buffer.data(),
static_cast<
unsigned long>(buffer.length()), bufferType);
644QString schannelErrorToString(qint32 status)
647 case SEC_E_INSUFFICIENT_MEMORY:
648 return QSslSocket::tr(
"Insufficient memory");
649 case SEC_E_INTERNAL_ERROR:
650 return QSslSocket::tr(
"Internal error");
651 case SEC_E_INVALID_HANDLE:
652 return QSslSocket::tr(
"An internal handle was invalid");
653 case SEC_E_INVALID_TOKEN:
654 return QSslSocket::tr(
"An internal token was invalid");
655 case SEC_E_LOGON_DENIED:
658 return QSslSocket::tr(
"Access denied");
659 case SEC_E_NO_AUTHENTICATING_AUTHORITY:
660 return QSslSocket::tr(
"No authority could be contacted for authorization");
661 case SEC_E_NO_CREDENTIALS:
662 return QSslSocket::tr(
"No credentials");
663 case SEC_E_TARGET_UNKNOWN:
664 return QSslSocket::tr(
"The target is unknown or unreachable");
665 case SEC_E_UNSUPPORTED_FUNCTION:
666 return QSslSocket::tr(
"An unsupported function was requested");
667 case SEC_E_WRONG_PRINCIPAL:
669 return QSslSocket::tr(
"The hostname provided does not match the one received from the peer");
671 return QSslSocket::tr(
"No common protocol exists between the client and the server");
672 case SEC_E_ILLEGAL_MESSAGE:
673 return QSslSocket::tr(
"Unexpected or badly-formatted message received");
674 case SEC_E_ENCRYPT_FAILURE:
675 return QSslSocket::tr(
"The data could not be encrypted");
676 case SEC_E_DECRYPT_FAILURE:
677 return QSslSocket::tr(
"The data could not be decrypted");
678 case SEC_E_ALGORITHM_MISMATCH:
679 return QSslSocket::tr(
"No cipher suites in common");
680 case SEC_E_UNKNOWN_CREDENTIALS:
682 return QSslSocket::tr(
"The credentials were not recognized / Invalid argument");
683 case SEC_E_MESSAGE_ALTERED:
686 return QSslSocket::tr(
"The message was tampered with, damaged or out of sequence.");
687 case SEC_E_OUT_OF_SEQUENCE:
688 return QSslSocket::tr(
"A message was received out of sequence.");
689 case SEC_E_CONTEXT_EXPIRED:
690 return QSslSocket::tr(
"The TLS/SSL connection has been closed");
692 return QSslSocket::tr(
"Unknown error occurred: %1").arg(status);
698 static bool supported = []() {
699 const auto current = QOperatingSystemVersion::current();
702 QOperatingSystemVersion(QOperatingSystemVersion::Windows, 10, 0, 20221);
703 return current >= minimum;
709DWORD toSchannelProtocol(QSsl::SslProtocol protocol)
711 DWORD protocols = SP_PROT_NONE;
713 case QSsl::UnknownProtocol:
716QT_WARNING_DISABLE_DEPRECATED
718 case QSsl::DtlsV1_0OrLater:
721 case QSsl::DtlsV1_2OrLater:
723 case QSsl::AnyProtocol:
729QT_WARNING_DISABLE_DEPRECATED
744 protocols = DWORD(-1);
747QT_WARNING_DISABLE_DEPRECATED
748 case QSsl::TlsV1_0OrLater:
753 case QSsl::TlsV1_1OrLater:
757 case QSsl::SecureProtocols:
758 case QSsl::TlsV1_2OrLater:
761 case QSsl::TlsV1_3OrLater:
764 else if (protocol == QSsl::TlsV1_3OrLater)
765 protocols = DWORD(-1);
774DWORD negatedSchannelProtocols(DWORD wantedProtocols)
776 DWORD protocols = SP_PROT_ALL;
777 protocols &= ~wantedProtocols;
782
783
784
785
786
787
788QSsl::SslProtocol toQtSslProtocol(DWORD protocol)
790#define MAP_PROTOCOL(sp_protocol, q_protocol)
791 if (protocol & sp_protocol) {
792 Q_ASSERT(!(protocol & ~sp_protocol));
797QT_WARNING_DISABLE_DEPRECATED
805 return QSsl::UnknownProtocol;
809
810
811
812bool netscapeWrongCertType(
const QList<QSslCertificateExtension> &extensions,
bool isClient,
bool isLeaf)
814 const auto netscapeIt = std::find_if(
815 extensions.cbegin(), extensions.cend(),
816 [](
const QSslCertificateExtension &extension) {
817 return extension.oid() == u"2.16.840.1.113730.1.1";
819 if (netscapeIt != extensions.cend()) {
820 const QByteArray netscapeCertTypeByte = netscapeIt->value().toByteArray();
821 int netscapeCertType = 0;
822 QDataStream dataStream(netscapeCertTypeByte);
823 dataStream >> netscapeCertType;
824 if (dataStream.status() != QDataStream::Status::Ok)
826 const int expectedPeerCertType = [&]() {
828 return isClient ? NETSCAPE_SSL_SERVER_AUTH_CERT_TYPE
829 : NETSCAPE_SSL_CLIENT_AUTH_CERT_TYPE;
831 return NETSCAPE_SSL_CA_CERT_TYPE;
833 if ((netscapeCertType & expectedPeerCertType) == 0)
840
841
842
843
844
845
846bool isCertificateAuthority(
const QList<QSslCertificateExtension> &extensions)
848 auto it = std::find_if(extensions.cbegin(), extensions.cend(),
849 [](
const QSslCertificateExtension &extension) {
850 return extension.name() ==
"basicConstraints"_L1;
852 if (it != extensions.cend()) {
853 QVariantMap basicConstraints = it->value().toMap();
854 return basicConstraints.value(
"ca"_L1,
false).toBool();
860
861
862
863
864bool matchesContextRequirements(DWORD attributes, DWORD requirements,
865 QSslSocket::PeerVerifyMode verifyMode,
868#ifdef QSSLSOCKET_DEBUG
869#define DEBUG_WARN(message) qCWarning(lcTlsBackendSchannel, message)
871#define DEBUG_WARN(message)
874#define CHECK_ATTRIBUTE(attributeName)
876 const DWORD req##attributeName = isClient ? ISC_REQ_##attributeName : ASC_REQ_##attributeName;
877 const DWORD ret##attributeName = isClient ? ISC_RET_##attributeName : ASC_RET_##attributeName;
878 if (!(requirements & req##attributeName) != !(attributes & ret##attributeName)) {
879 DEBUG_WARN("Missing attribute \"" #attributeName "\"");
888 if (verifyMode == QSslSocket::PeerVerifyMode::VerifyPeer)
893 const auto reqManualCredValidation = ISC_REQ_MANUAL_CRED_VALIDATION;
894 const auto retManualCredValidation = ISC_RET_MANUAL_CRED_VALIDATION;
895 if (!(requirements & reqManualCredValidation) != !(attributes & retManualCredValidation)) {
896 DEBUG_WARN(
"Missing attribute \"MANUAL_CRED_VALIDATION\"");
902#undef CHECK_ATTRIBUTE
906template<
typename Required,
typename Actual>
907Required const_reinterpret_cast(Actual *p)
913QByteArray createAlpnString(
const QByteArrayList &nextAllowedProtocols)
915 QByteArray alpnString;
916 if (!nextAllowedProtocols.isEmpty()) {
917 const QByteArray names = [&nextAllowedProtocols]() {
918 QByteArray protocolString;
919 for (QByteArray proto : nextAllowedProtocols) {
920 if (proto.size() > 255) {
921 qCWarning(lcTlsBackendSchannel)
922 <<
"TLS ALPN extension" << proto <<
"is too long and will be ignored.";
924 }
else if (proto.isEmpty()) {
927 protocolString +=
char(proto.length()) + proto;
929 return protocolString;
934 const quint16 namesSize = names.size();
935 const quint32 alpnId = SecApplicationProtocolNegotiationExt_ALPN;
936 const quint32 totalSize =
sizeof(alpnId) +
sizeof(namesSize) + namesSize;
937 alpnString = QByteArray::fromRawData(
reinterpret_cast<
const char *>(&totalSize),
sizeof(totalSize))
938 + QByteArray::fromRawData(
reinterpret_cast<
const char *>(&alpnId),
sizeof(alpnId))
939 + QByteArray::fromRawData(
reinterpret_cast<
const char *>(&namesSize),
sizeof(namesSize))
946qint64 readToBuffer(QByteArray &buffer, QTcpSocket *plainSocket)
948 Q_ASSERT(plainSocket);
949 static const qint64 shrinkCutoff = 1024 * 12;
950 static const qint64 defaultRead = 1024 * 16;
951 qint64 bytesRead = 0;
953 const auto toRead =
std::min(defaultRead, plainSocket->bytesAvailable());
955 const auto bufferSize = buffer.size();
956 buffer.reserve(bufferSize + toRead);
957 buffer.resize(bufferSize + toRead);
958 bytesRead = plainSocket->read(buffer.data() + bufferSize, toRead);
959 buffer.resize(bufferSize + bytesRead);
961 if (buffer.size() < shrinkCutoff && buffer.capacity() > defaultRead)
962 buffer.shrink_to_fit();
968void retainExtraData(QByteArray &buffer,
const SecBuffer &secBuffer)
970 Q_ASSERT(secBuffer.BufferType == SECBUFFER_EXTRA);
971 if (
int(secBuffer.cbBuffer) >= buffer.size())
974#ifdef QSSLSOCKET_DEBUG
975 qCDebug(lcTlsBackendSchannel,
"We got SECBUFFER_EXTRA, will retain %lu bytes",
978 std::move(buffer.end() - secBuffer.cbBuffer, buffer.end(), buffer.begin());
979 buffer.resize(secBuffer.cbBuffer);
982qint64 checkIncompleteData(
const SecBuffer &secBuffer)
984 if (secBuffer.BufferType == SECBUFFER_MISSING) {
985#ifdef QSSLSOCKET_DEBUG
986 qCDebug(lcTlsBackendSchannel,
"Need %lu more bytes.", secBuffer.cbBuffer);
988 return secBuffer.cbBuffer;
993DWORD defaultCredsFlag()
995 return qEnvironmentVariableIsSet(
"QT_SCH_DEFAULT_CREDS") ? 0 : SCH_CRED_NO_DEFAULT_CREDS;
1004 SecInvalidateHandle(&credentialHandle);
1005 SecInvalidateHandle(&contextHandle);
1006 QSchannelBackend::ensureInitializedImplementation();
1011 closeCertificateStores();
1012 deallocateContext();
1013 freeCredentialsHandle();
1029 if (tokenLength == 0)
1033 auto *plainSocket = d->plainTcpSocket();
1034 Q_ASSERT(plainSocket);
1035 if (plainSocket->state() == QAbstractSocket::UnconnectedState || !plainSocket->isValid()
1036 || !plainSocket->isOpen()) {
1040 const qint64 written = plainSocket->write(
static_cast<
const char *>(token), tokenLength);
1041 if (written != qint64(tokenLength)) {
1044 setErrorAndEmit(d, plainSocket->error(), plainSocket->errorString());
1056 const auto verificationPeerName = d->verificationName();
1057 return verificationPeerName.isEmpty() ? q->peerName() : verificationPeerName;
1065 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
1068 req |= ISC_REQ_ALLOCATE_MEMORY;
1069 req |= ISC_REQ_CONFIDENTIALITY;
1070 req |= ISC_REQ_REPLAY_DETECT;
1071 req |= ISC_REQ_SEQUENCE_DETECT;
1072 req |= ISC_REQ_STREAM;
1075 req |= ISC_REQ_MANUAL_CRED_VALIDATION;
1077 switch (q->peerVerifyMode()) {
1078 case QSslSocket::PeerVerifyMode::VerifyNone:
1080 case QSslSocket::PeerVerifyMode::AutoVerifyPeer:
1081 case QSslSocket::PeerVerifyMode::QueryPeer:
1083 case QSslSocket::PeerVerifyMode::VerifyPeer:
1084 req |= ISC_REQ_MUTUAL_AUTH;
1096 const auto &configuration = q->sslConfiguration();
1098 Q_ASSERT(schannelState == SchannelState::InitializeHandshake);
1100 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
1101 DWORD protocols = toSchannelProtocol(configuration.protocol());
1102 if (protocols == DWORD(-1)) {
1103 setErrorAndEmit(d, QAbstractSocket::SslInvalidUserDataError,
1104 QSslSocket::tr(
"Invalid protocol chosen"));
1108 DWORD certsCount = 0;
1110 initializeCertificateStores();
1115 if (!configuration.localCertificateChain().isEmpty() && !localCertificateStore)
1118 PCCERT_CONTEXT localCertificate =
nullptr;
1119 if (localCertificateStore !=
nullptr) {
1121 localCertificate =
static_cast<PCCERT_CONTEXT>(configuration.localCertificate().handle());
1122 Q_ASSERT(localCertificate);
1125 const QList<QSslCipher> ciphers = configuration.ciphers();
1126 if (!ciphers.isEmpty() && !containsTls13Cipher(ciphers))
1129 QList<CRYPTO_SETTINGS> cryptoSettings;
1130 if (!ciphers.isEmpty())
1131 cryptoSettings = cryptoSettingsForCiphers(ciphers);
1133 TLS_PARAMETERS tlsParameters = {
1136 negatedSchannelProtocols(protocols),
1137 static_cast<DWORD>(cryptoSettings.size()),
1138 (cryptoSettings.isEmpty() ?
nullptr : cryptoSettings.data()),
1142 SCH_CREDENTIALS credentials = {
1143 SCH_CREDENTIALS_VERSION,
1151 SCH_CRED_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT | defaultCredsFlag(),
1156 TimeStamp expiration{};
1157 auto status = AcquireCredentialsHandle(
nullptr,
1158 const_cast<
wchar_t *>(UNISP_NAME),
1159 isClient ? SECPKG_CRED_OUTBOUND : SECPKG_CRED_INBOUND,
1168 if (status != SEC_E_OK) {
1169 setErrorAndEmit(d, QAbstractSocket::SslInternalError, schannelErrorToString(status));
1177 if (SecIsValidHandle(&contextHandle)) {
1178 DeleteSecurityContext(&contextHandle);
1179 SecInvalidateHandle(&contextHandle);
1185 if (SecIsValidHandle(&credentialHandle)) {
1186 FreeCredentialsHandle(&credentialHandle);
1187 SecInvalidateHandle(&credentialHandle);
1193 localCertificateStore.reset();
1194 peerCertificateStore.reset();
1195 caCertificateStore.reset();
1203 Q_ASSERT(SecIsValidHandle(&credentialHandle));
1204 Q_ASSERT(schannelState == SchannelState::InitializeHandshake);
1205 Q_ASSERT(d->tlsMode() == QSslSocket::SslClientMode);
1206 ULONG contextReq = getContextRequirements();
1208 SecBuffer outBuffers[3];
1209 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
1211 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1212 auto freeBuffers = qScopeGuard([&outBuffers]() {
1213 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
1214 if (outBuffers[i].pvBuffer)
1215 FreeContextBuffer(outBuffers[i].pvBuffer);
1218 SecBufferDesc outputBufferDesc{
1220 ARRAYSIZE(outBuffers),
1226 SecBufferDesc alpnBufferDesc;
1227 bool useAlpn =
false;
1229 QTlsBackend::setAlpnStatus(d, QSslConfiguration::NextProtocolNegotiationNone);
1230 QByteArray alpnString = createAlpnString(q->sslConfiguration().allowedNextProtocols());
1231 useAlpn = !alpnString.isEmpty();
1232 SecBuffer alpnBuffers[1];
1233 alpnBuffers[0] = createSecBuffer(alpnString, SECBUFFER_APPLICATION_PROTOCOLS);
1236 ARRAYSIZE(alpnBuffers),
1241 auto status = InitializeSecurityContext(&credentialHandle,
1243 const_reinterpret_cast<SEC_WCHAR *>(targetName().utf16()),
1247 useAlpn ? &alpnBufferDesc :
nullptr,
1257 if (status != SEC_I_CONTINUE_NEEDED) {
1258 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1259 QSslSocket::tr(
"Error creating SSL context (%1)").arg(schannelErrorToString(status)));
1263 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1265 schannelState = SchannelState::PerformHandshake;
1274 auto *plainSocket = d->plainTcpSocket();
1275 Q_ASSERT(plainSocket);
1277 Q_ASSERT(SecIsValidHandle(&credentialHandle));
1278 Q_ASSERT(schannelState == SchannelState::InitializeHandshake);
1279 Q_ASSERT(d->tlsMode() == QSslSocket::SslServerMode);
1280 ULONG contextReq = getContextRequirements();
1282 if (missingData > plainSocket->bytesAvailable())
1286 readToBuffer(intermediateBuffer, plainSocket);
1287 if (intermediateBuffer.isEmpty())
1290 SecBuffer inBuffers[2];
1291 inBuffers[0] = createSecBuffer(intermediateBuffer, SECBUFFER_TOKEN);
1294 QTlsBackend::setAlpnStatus(d, QSslConfiguration::NextProtocolNegotiationNone);
1296 QByteArray alpnString = createAlpnString(q->sslConfiguration().allowedNextProtocols());
1297 if (!alpnString.isEmpty()) {
1298 inBuffers[1] = createSecBuffer(alpnString, SECBUFFER_APPLICATION_PROTOCOLS);
1302 inBuffers[1] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1305 SecBufferDesc inputBufferDesc{
1307 ARRAYSIZE(inBuffers),
1311 SecBuffer outBuffers[3];
1312 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
1314 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1315 auto freeBuffers = qScopeGuard([&outBuffers]() {
1316 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
1317 if (outBuffers[i].pvBuffer)
1318 FreeContextBuffer(outBuffers[i].pvBuffer);
1321 SecBufferDesc outputBufferDesc{
1323 ARRAYSIZE(outBuffers),
1328 auto status = AcceptSecurityContext(
1340 if (status == SEC_E_INCOMPLETE_MESSAGE) {
1342 missingData = checkIncompleteData(outBuffers[0]);
1346 if (inBuffers[1].BufferType == SECBUFFER_EXTRA) {
1350 retainExtraData(intermediateBuffer, inBuffers[1]);
1352 intermediateBuffer.resize(0);
1355 if (status != SEC_I_CONTINUE_NEEDED) {
1356 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1357 QSslSocket::tr(
"Error creating SSL context (%1)").arg(schannelErrorToString(status)));
1360 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1362 schannelState = SchannelState::PerformHandshake;
1369 auto *plainSocket = d->plainTcpSocket();
1370 Q_ASSERT(plainSocket);
1372 if (plainSocket->state() == QAbstractSocket::UnconnectedState || !plainSocket->isValid()
1373 || !plainSocket->isOpen()) {
1374 setErrorAndEmit(d, QAbstractSocket::RemoteHostClosedError,
1375 QSslSocket::tr(
"The TLS/SSL connection has been closed"));
1378 Q_ASSERT(SecIsValidHandle(&credentialHandle));
1379 Q_ASSERT(SecIsValidHandle(&contextHandle));
1380 Q_ASSERT(schannelState == SchannelState::PerformHandshake);
1382#ifdef QSSLSOCKET_DEBUG
1383 qCDebug(lcTlsBackendSchannel,
"Bytes available from socket: %lld",
1384 plainSocket->bytesAvailable());
1385 qCDebug(lcTlsBackendSchannel,
"intermediateBuffer size: %d", intermediateBuffer.size());
1388 if (missingData > plainSocket->bytesAvailable())
1392 readToBuffer(intermediateBuffer, plainSocket);
1393 if (intermediateBuffer.isEmpty())
1396 SecBuffer outBuffers[3] = {};
1397 const auto freeOutBuffers = [&outBuffers]() {
1398 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
1399 if (outBuffers[i].pvBuffer)
1400 FreeContextBuffer(outBuffers[i].pvBuffer);
1403 const auto outBuffersGuard = qScopeGuard(freeOutBuffers);
1409 SECURITY_STATUS status;
1412 SecBuffer inputBuffers[2];
1413 inputBuffers[0] = createSecBuffer(intermediateBuffer, SECBUFFER_TOKEN);
1414 inputBuffers[1] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1415 SecBufferDesc inputBufferDesc{
1417 ARRAYSIZE(inputBuffers),
1422 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
1424 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1425 SecBufferDesc outputBufferDesc{
1427 ARRAYSIZE(outBuffers),
1431 ULONG contextReq = getContextRequirements();
1433 status = InitializeSecurityContext(
1436 const_reinterpret_cast<SEC_WCHAR *>(targetName().utf16()),
1448 if (inputBuffers[1].BufferType == SECBUFFER_EXTRA) {
1452 retainExtraData(intermediateBuffer, inputBuffers[1]);
1453 }
else if (status != SEC_E_INCOMPLETE_MESSAGE) {
1455 intermediateBuffer.resize(0);
1459 }
while (status == SEC_I_INCOMPLETE_CREDENTIALS && attempts > 0);
1464 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1466 schannelState = SchannelState::VerifyHandshake;
1468 case SEC_I_CONTINUE_NEEDED:
1469 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1473 case SEC_I_INCOMPLETE_CREDENTIALS:
1476 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1477 QSslSocket::tr(
"Server did not accept any certificate we could present."));
1479 case SEC_I_CONTEXT_EXPIRED:
1481 if (outBuffers[0].BufferType == SECBUFFER_TOKEN) {
1482 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer))
1486 setErrorAndEmit(d, QAbstractSocket::RemoteHostClosedError,
1487 QSslSocket::tr(
"The TLS/SSL connection has been closed"));
1490 case SEC_E_INCOMPLETE_MESSAGE:
1492 missingData = checkIncompleteData(outBuffers[0]);
1494 case SEC_E_ALGORITHM_MISMATCH:
1495 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1496 QSslSocket::tr(
"Algorithm mismatch"));
1504 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1505 QSslSocket::tr(
"Handshake failed: %1").arg(schannelErrorToString(status)));
1513 const auto &configuration = q->sslConfiguration();
1517 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
1518#define CHECK_STATUS(status)
1519 if (status != SEC_E_OK) {
1520 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1521 QSslSocket::tr("Failed to query the TLS context: %1")
1522 .arg(schannelErrorToString(status)));
1527 if (!matchesContextRequirements(contextAttributes, getContextRequirements(),
1528 configuration.peerVerifyMode(), isClient)) {
1529 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1530 QSslSocket::tr(
"Did not get the required attributes for the connection."));
1535 auto status = QueryContextAttributes(&contextHandle,
1536 SECPKG_ATTR_STREAM_SIZES,
1541 status = QueryContextAttributes(&contextHandle,
1542 SECPKG_ATTR_CIPHER_INFO,
1546 status = QueryContextAttributes(&contextHandle,
1547 SECPKG_ATTR_CONNECTION_INFO,
1552 const auto allowedProtos = configuration.allowedNextProtocols();
1553 if (!allowedProtos.isEmpty()) {
1554 SecPkgContext_ApplicationProtocol alpn;
1555 status = QueryContextAttributes(&contextHandle,
1556 SECPKG_ATTR_APPLICATION_PROTOCOL,
1558 CHECK_STATUS(status);
1559 if (alpn.ProtoNegoStatus == SecApplicationProtocolNegotiationStatus_Success) {
1560 QByteArray negotiatedProto = QByteArray((
const char *)alpn.ProtocolId,
1561 alpn.ProtocolIdSize);
1562 if (!allowedProtos.contains(negotiatedProto)) {
1563 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1564 QSslSocket::tr(
"Unwanted protocol was negotiated"));
1567 QTlsBackend::setNegotiatedProtocol(d, negotiatedProto);
1568 QTlsBackend::setAlpnStatus(d, QSslConfiguration::NextProtocolNegotiationNegotiated);
1570 QTlsBackend::setNegotiatedProtocol(d, {});
1571 QTlsBackend::setAlpnStatus(d, QSslConfiguration::NextProtocolNegotiationUnsupported);
1579 CERT_CONTEXT *certificateContext =
nullptr;
1580 auto freeCertificate = qScopeGuard([&certificateContext]() {
1581 if (certificateContext)
1582 CertFreeCertificateContext(certificateContext);
1584 status = QueryContextAttributes(&contextHandle,
1585 SECPKG_ATTR_REMOTE_CERT_CONTEXT,
1586 &certificateContext);
1593 if ((!isClient && configuration.peerVerifyMode() == QSslSocket::PeerVerifyMode::VerifyPeer)
1594 || (isClient && configuration.peerVerifyMode() != QSslSocket::PeerVerifyMode::VerifyNone
1595 && configuration.peerVerifyMode() != QSslSocket::PeerVerifyMode::QueryPeer)) {
1596 if (status != SEC_E_OK) {
1597#ifdef QSSLSOCKET_DEBUG
1598 qCDebug(lcTlsBackendSchannel) <<
"Couldn't retrieve peer certificate, status:"
1599 << schannelErrorToString(status);
1601 const QSslError error{ QSslError::NoPeerCertificate };
1603 emit q->peerVerifyError(error);
1604 if (q->state() != QAbstractSocket::ConnectedState)
1610 if (certificateContext && !verifyCertContext(certificateContext))
1613 if (!checkSslErrors() || q->state() != QAbstractSocket::ConnectedState) {
1614#ifdef QSSLSOCKET_DEBUG
1615 qCDebug(lcTlsBackendSchannel) <<
__func__ <<
"was unsuccessful. Paused:" << d->isPaused();
1618 return d->isPaused() && q->state() == QAbstractSocket::ConnectedState;
1621 schannelState = SchannelState::Done;
1629 SecBuffer outBuffers[3];
1630 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
1632 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
1633 auto freeBuffers = qScopeGuard([&outBuffers]() {
1634 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
1635 if (outBuffers[i].pvBuffer)
1636 FreeContextBuffer(outBuffers[i].pvBuffer);
1639 SecBufferDesc outputBufferDesc{
1641 ARRAYSIZE(outBuffers),
1645 ULONG contextReq = getContextRequirements();
1647 SECURITY_STATUS status;
1648 if (d->tlsMode() == QSslSocket::SslClientMode) {
1649 status = InitializeSecurityContext(&credentialHandle,
1651 const_reinterpret_cast<SEC_WCHAR *>(targetName().utf16()),
1663 status = AcceptSecurityContext(
1675 if (status == SEC_I_CONTINUE_NEEDED) {
1676 schannelState = SchannelState::PerformHandshake;
1677 return sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer);
1678 }
else if (status == SEC_E_OK) {
1679 schannelState = SchannelState::PerformHandshake;
1682 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
1683 QSslSocket::tr(
"Renegotiation was unsuccessful: %1").arg(schannelErrorToString(status)));
1688
1689
1690
1695 closeCertificateStores();
1696 deallocateContext();
1697 freeCredentialsHandle();
1700 connectionInfo = {};
1703 contextAttributes = 0;
1704 intermediateBuffer.clear();
1705 schannelState = SchannelState::InitializeHandshake;
1708 d->setEncrypted(
false);
1710 renegotiating =
false;
1719 if (q->isEncrypted())
1729 if (q->isEncrypted())
1737 MessageBufferResult result;
1738 QByteArray &fullMessage = result.messageBuffer;
1741 auto &writeBuffer = d->tlsWriteBuffer();
1743 auto allocateMessage = [&fullMessage](qsizetype size) -> QSpan<
char> {
1744 auto targetSize = fullMessage.size() + size;
1745 if (fullMessage.capacity() < targetSize) {
1746 qsizetype newSize = fullMessage.capacity() * 2;
1747 if (newSize < targetSize)
1748 newSize = targetSize;
1749 fullMessage.reserve(newSize);
1751 fullMessage.resizeForOverwrite(targetSize);
1752 return QSpan(fullMessage).subspan(fullMessage.size() - size);
1755 const int headerSize =
int(streamSizes.cbHeader);
1756 const int trailerSize =
int(streamSizes.cbTrailer);
1757 constexpr qsizetype MessageBufferThreshold = 128 * 1024;
1759 qint64 writeBufferSize = 0;
1760 while ((writeBufferSize = writeBuffer.size()) > 0
1761 && fullMessage.size() < MessageBufferThreshold) {
1763 const int bodySize =
int(std::min(writeBufferSize, qint64(streamSizes.cbMaximumMessage)));
1764 const qsizetype messageSize = headerSize + bodySize + trailerSize;
1765 QSpan buffer = allocateMessage(messageSize);
1766 char *header = buffer.data();
1767 char *body = header + headerSize;
1768 char *trailer = body + bodySize;
1771 qint64 copied = writeBuffer.peek(body, bodySize);
1772 Q_ASSERT(copied == bodySize);
1775 SecBuffer inputBuffers[] = {
1776 createSecBuffer(header, headerSize, SECBUFFER_STREAM_HEADER),
1777 createSecBuffer(body, bodySize, SECBUFFER_DATA),
1778 createSecBuffer(trailer, trailerSize, SECBUFFER_STREAM_TRAILER),
1779 createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY)
1781 SecBufferDesc message = {
1783 ARRAYSIZE(inputBuffers),
1787 if (
auto status = EncryptMessage(&contextHandle, 0, &message, 0); status != SEC_E_OK) {
1788 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1789 QSslSocket::tr(
"Schannel failed to encrypt data: %1")
1790 .arg(schannelErrorToString(status)));
1791 result.messageBuffer.chop(messageSize);
1795 writeBuffer.free(bodySize);
1798 auto finalSize = qsizetype(inputBuffers[0].cbBuffer + inputBuffers[1].cbBuffer
1799 + inputBuffers[2].cbBuffer);
1800 fullMessage.chop(messageSize - finalSize);
1810 auto *plainSocket = d->plainTcpSocket();
1811 Q_ASSERT(plainSocket);
1813 if (d->tlsMode() == QSslSocket::UnencryptedMode)
1817 if (plainSocket->state() == QAbstractSocket::UnconnectedState || !plainSocket->isValid()
1818 || !plainSocket->isOpen()) {
1822 if (schannelState != SchannelState::Done) {
1827 auto &buffer = d->tlsBuffer();
1828 if (q->isEncrypted()) {
1829 qint64 totalBytesWritten = 0;
1830 while (d->tlsWriteBuffer().size() > 0) {
1831 MessageBufferResult r = getNextEncryptedMessage();
1832 if (r.messageBuffer.isEmpty() && !r.ok)
1834 QByteArray fullMessage =
std::move(r.messageBuffer);
1835 const qint64 bytesWritten = plainSocket->write(fullMessage);
1836 if (!r.ok && bytesWritten < 0)
1838#ifdef QSSLSOCKET_DEBUG
1839 qCDebug(lcTlsBackendSchannel,
"Wrote %lld of total %d bytes", bytesWritten,
1840 fullMessage.size());
1842 if (bytesWritten >= 0) {
1843 totalBytesWritten += bytesWritten;
1845 setErrorAndEmit(d, plainSocket->error(), plainSocket->errorString());
1850 if (totalBytesWritten > 0) {
1852 bool &emittedBytesWritten = d->tlsEmittedBytesWritten();
1853 if (!emittedBytesWritten) {
1854 emittedBytesWritten =
true;
1855 emit q->bytesWritten(totalBytesWritten);
1856 emittedBytesWritten =
false;
1858 emit q->channelBytesWritten(0, totalBytesWritten);
1863 bool hadIncompleteData =
false;
1864 const auto readBufferMaxSize = d->maxReadBufferSize();
1865 while (!readBufferMaxSize || buffer.size() < readBufferMaxSize) {
1866 if (missingData > plainSocket->bytesAvailable()
1867 && (!readBufferMaxSize || readBufferMaxSize >= missingData)) {
1868#ifdef QSSLSOCKET_DEBUG
1869 qCDebug(lcTlsBackendSchannel,
"We're still missing %lld bytes, will check later.",
1876 const qint64 bytesRead = readToBuffer(intermediateBuffer, plainSocket);
1877#ifdef QSSLSOCKET_DEBUG
1878 qCDebug(lcTlsBackendSchannel,
"Read %lld encrypted bytes from the socket", bytesRead);
1880 if (intermediateBuffer.length() == 0 || (hadIncompleteData && bytesRead == 0)) {
1881#ifdef QSSLSOCKET_DEBUG
1882 qCDebug(lcTlsBackendSchannel,
1883 hadIncompleteData ?
"No new data received, leaving loop!"
1884 :
"Nothing to decrypt, leaving loop!");
1888 hadIncompleteData =
false;
1889#ifdef QSSLSOCKET_DEBUG
1890 qCDebug(lcTlsBackendSchannel,
"Total amount of bytes to decrypt: %d",
1891 intermediateBuffer.length());
1894 SecBuffer dataBuffer[4]{
1895 createSecBuffer(intermediateBuffer, SECBUFFER_DATA),
1896 createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY),
1897 createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY),
1898 createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY)
1900 SecBufferDesc message{
1902 ARRAYSIZE(dataBuffer),
1905 auto status = DecryptMessage(&contextHandle, &message, 0,
nullptr);
1906 if (status == SEC_E_OK || status == SEC_I_RENEGOTIATE || status == SEC_I_CONTEXT_EXPIRED) {
1908 if (dataBuffer[1].cbBuffer > 0) {
1912 buffer.append(
static_cast<
char *>(dataBuffer[1].pvBuffer),
1913 dataBuffer[1].cbBuffer);
1914 totalRead += dataBuffer[1].cbBuffer;
1915#ifdef QSSLSOCKET_DEBUG
1916 qCDebug(lcTlsBackendSchannel,
"Decrypted %lu bytes. New read buffer size: %d",
1917 dataBuffer[1].cbBuffer, buffer.size());
1920 if (dataBuffer[3].BufferType == SECBUFFER_EXTRA) {
1924 retainExtraData(intermediateBuffer, dataBuffer[3]);
1926 intermediateBuffer.resize(0);
1930 if (status == SEC_E_INCOMPLETE_MESSAGE) {
1931 missingData = checkIncompleteData(dataBuffer[0]);
1932#ifdef QSSLSOCKET_DEBUG
1933 qCDebug(lcTlsBackendSchannel,
"We didn't have enough data to decrypt anything, will try again!");
1936 hadIncompleteData =
true;
1937 }
else if (status == SEC_E_INVALID_HANDLE) {
1939 qCWarning(lcTlsBackendSchannel,
"The internal SSPI handle is invalid!");
1941 }
else if (status == SEC_E_INVALID_TOKEN) {
1946 setErrorAndEmit(d, QAbstractSocket::SslInternalError, schannelErrorToString(status));
1948 }
else if (status == SEC_E_MESSAGE_ALTERED) {
1952 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1953 schannelErrorToString(status));
1955 }
else if (status == SEC_E_OUT_OF_SEQUENCE) {
1961 setErrorAndEmit(d, QAbstractSocket::SslInternalError,
1962 schannelErrorToString(status));
1964 }
else if (status == SEC_E_DECRYPT_FAILURE) {
1969 setErrorAndEmit(d, QAbstractSocket::SslInternalError, schannelErrorToString(status));
1971 }
else if (status == SEC_I_CONTEXT_EXPIRED) {
1975 }
else if (status == SEC_I_RENEGOTIATE) {
1977#ifdef QSSLSOCKET_DEBUG
1978 qCDebug(lcTlsBackendSchannel,
"The peer wants to renegotiate.");
1980 schannelState = SchannelState::Renegotiate;
1981 renegotiating =
true;
1990 if (
bool *readyReadEmittedPointer = d->readyReadPointer())
1991 *readyReadEmittedPointer =
true;
1992 emit q->readyRead();
1993 emit q->channelReadyRead(0);
2001 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
2002 DWORD shutdownToken = SCHANNEL_SHUTDOWN;
2003 SecBuffer buffer = createSecBuffer(&shutdownToken,
sizeof(DWORD), SECBUFFER_TOKEN);
2004 SecBufferDesc token{
2009 auto status = ApplyControlToken(&contextHandle, &token);
2011 if (status != SEC_E_OK) {
2012#ifdef QSSLSOCKET_DEBUG
2013 qCDebug(lcTlsBackendSchannel)
2014 <<
"Failed to apply shutdown control token:" << schannelErrorToString(status);
2019 SecBuffer outBuffers[3];
2020 outBuffers[0] = createSecBuffer(
nullptr, 0, SECBUFFER_TOKEN);
2022 outBuffers[2] = createSecBuffer(
nullptr, 0, SECBUFFER_EMPTY);
2023 auto freeBuffers = qScopeGuard([&outBuffers]() {
2024 for (
auto i = 0ull; i < ARRAYSIZE(outBuffers); i++) {
2025 if (outBuffers[i].pvBuffer)
2026 FreeContextBuffer(outBuffers[i].pvBuffer);
2029 SecBufferDesc outputBufferDesc{
2031 ARRAYSIZE(outBuffers),
2035 ULONG contextReq = getContextRequirements();
2038 status = InitializeSecurityContext(&credentialHandle,
2040 const_reinterpret_cast<SEC_WCHAR *>(targetName().utf16()),
2052 status = AcceptSecurityContext(
2064 if (status == SEC_E_OK || status == SEC_I_CONTEXT_EXPIRED) {
2065 if (!sendToken(outBuffers[0].pvBuffer, outBuffers[0].cbBuffer,
false)) {
2071#ifdef QSSLSOCKET_DEBUG
2072 qCDebug(lcTlsBackendSchannel)
2073 <<
"Failed to initialize shutdown:" << schannelErrorToString(status);
2082 auto *plainSocket = d->plainTcpSocket();
2083 Q_ASSERT(plainSocket);
2085 if (SecIsValidHandle(&contextHandle)) {
2088 if (plainSocket->state() != QAbstractSocket::UnconnectedState && q->isEncrypted()) {
2094 plainSocket->disconnectFromHost();
2100 auto *plainSocket = d->plainTcpSocket();
2101 Q_ASSERT(plainSocket);
2102 d->setEncrypted(
false);
2107 qint64 tempMax = d->maxReadBufferSize();
2108 d->setMaxReadBufferSize(0);
2110 d->setMaxReadBufferSize(tempMax);
2115 deallocateContext();
2116 freeCredentialsHandle();
2124 if (!q->isEncrypted())
2127 const auto sessionProtocol = toQtSslProtocol(connectionInfo.dwProtocol);
2129 const auto ciphers = ciphersByName(QStringView(cipherInfo.szCipherSuite));
2130 for (
const auto& cipher : ciphers) {
2131 if (cipher.protocol() == sessionProtocol)
2140 if (!q->isEncrypted())
2141 return QSsl::SslProtocol::UnknownProtocol;
2142 return toQtSslProtocol(connectionInfo.dwProtocol);
2149 auto *plainSocket = d->plainTcpSocket();
2150 Q_ASSERT(plainSocket);
2152 const bool isServer = d->tlsMode() == QSslSocket::SslServerMode;
2153 switch (schannelState) {
2154 case SchannelState::InitializeHandshake:
2155 if (!SecIsValidHandle(&credentialHandle) && !acquireCredentialsHandle()) {
2159 if (!SecIsValidHandle(&credentialHandle))
2161 if (!SecIsValidHandle(&contextHandle) && !(isServer ? acceptContext() : createContext())) {
2165 if (schannelState != SchannelState::PerformHandshake)
2168 case SchannelState::PerformHandshake:
2169 if (!performHandshake()) {
2173 if (schannelState != SchannelState::VerifyHandshake)
2176 case SchannelState::VerifyHandshake:
2179 if (!verifyHandshake()) {
2185 if (schannelState != SchannelState::Done)
2188 case SchannelState::Done:
2190 if (!q->isEncrypted()) {
2191 d->setEncrypted(
true);
2192 emit q->encrypted();
2194 renegotiating =
false;
2195 if (d->isPendingClose()) {
2196 d->setPendingClose(
false);
2202 case SchannelState::Renegotiate:
2203 if (!renegotiate()) {
2206 }
else if (intermediateBuffer.size() || plainSocket->bytesAvailable()) {
2219
2220
2223 if (sslErrors.isEmpty())
2228 const auto &configuration = q->sslConfiguration();
2229 auto *plainSocket = d->plainTcpSocket();
2231 emit q->sslErrors(sslErrors);
2233 const bool doVerifyPeer = configuration.peerVerifyMode() == QSslSocket::VerifyPeer
2234 || (configuration.peerVerifyMode() == QSslSocket::AutoVerifyPeer
2235 && d->tlsMode() == QSslSocket::SslClientMode);
2236 const bool doEmitSslError = !d->verifyErrorsHaveBeenIgnored();
2238 if (doVerifyPeer && doEmitSslError) {
2239 if (q->pauseMode() & QAbstractSocket::PauseOnSslErrors) {
2240 QSslSocketPrivate::pauseSocketNotifiers(q);
2243 setErrorAndEmit(d, QAbstractSocket::SslHandshakeFailedError,
2244 sslErrors.constFirst().errorString());
2245 plainSocket->disconnectFromHost();
2254 const QSslKey &privateKey)
2258 QDataStream stream(&buffer, QDataStream::WriteOnly);
2260 NCRYPT_PROV_HANDLE provider = 0;
2261 SECURITY_STATUS status = NCryptOpenStorageProvider(&provider, MS_KEY_STORAGE_PROVIDER, 0);
2262 if (status != SEC_E_OK) {
2263 qCWarning(lcTlsBackendSchannel())
2264 <<
"Failed to open ncrypt storage provider:" << schannelErrorToString(status);
2267 const auto freeProvider = qScopeGuard([provider]() { NCryptFreeObject(provider); });
2269 const QString certName = certificate.subjectInfo(QSslCertificate::CommonName).front();
2270 QSpan<
const QChar> nameSpan(certName);
2271 NCryptBuffer nbuffer{ ULONG(nameSpan.size_bytes() +
sizeof(
char16_t)),
2272 NCRYPTBUFFER_PKCS_KEY_NAME,
2273 const_reinterpret_cast<
void *>(nameSpan.data()) };
2274 NCryptBufferDesc bufferDesc{ NCRYPTBUFFER_VERSION, 1, &nbuffer };
2275 NCRYPT_KEY_HANDLE ncryptKey = 0;
2276 status = NCryptImportKey(provider, 0, NCRYPT_PKCS8_PRIVATE_KEY_BLOB, &bufferDesc, &ncryptKey,
2277 PBYTE(buffer.data()), buffer.size(), 0);
2278 if (status != SEC_E_OK) {
2279 qCWarning(lcTlsBackendSchannel())
2280 <<
"Failed to import private key:" << schannelErrorToString(status);
2283 const auto freeKey = qScopeGuard([ncryptKey]() { NCryptFreeObject(ncryptKey); });
2285 CERT_CONTEXT *context = PCERT_CONTEXT(certificate.handle());
2288 CRYPT_DATA_BLOB keyBlob = {
sizeof(ncryptKey), PBYTE(&ncryptKey) };
2290 CertSetCertificateContextProperty(context, CERT_NCRYPT_KEY_HANDLE_PROP_ID, 0, &keyBlob);
2292 auto error = GetLastError();
2293 if (lcTlsBackendSchannel().isWarningEnabled())
2294 qErrnoWarning(
int(error),
"Failed to set ncrypt handle property.");
2298 CRYPT_KEY_PROV_INFO provInfo{
2299 const_reinterpret_cast<LPWSTR>(certName.constData()),
2300 const_cast<LPWSTR>(MS_KEY_STORAGE_PROVIDER),
2302 CERT_SET_KEY_PROV_HANDLE_PROP_ID | CERT_SET_KEY_CONTEXT_PROP_ID,
2307 ok = CertSetCertificateContextProperty(context, CERT_KEY_PROV_INFO_PROP_ID,
2308 CERT_SET_PROPERTY_INHIBIT_PERSIST_FLAG, &provInfo);
2310 auto error = GetLastError();
2311 if (lcTlsBackendSchannel().isWarningEnabled())
2312 qErrnoWarning(
int(error),
"Failed to set key provider info property.");
2322 const auto &configuration = q->sslConfiguration();
2324 auto createStoreFromCertificateChain = [](
const QList<QSslCertificate> certChain,
const QSslKey &privateKey) {
2325 const wchar_t *passphrase = L"";
2327 QByteArray pkcs12 = _q_makePkcs12(certChain,
2329 QString::fromWCharArray(passphrase, 0));
2330 CRYPT_DATA_BLOB pfxBlob;
2331 pfxBlob.cbData = DWORD(pkcs12.length());
2332 pfxBlob.pbData =
reinterpret_cast<
unsigned char *>(pkcs12.data());
2335 constexpr DWORD flags = PKCS12_ALWAYS_CNG_KSP | PKCS12_NO_PERSIST_KEY;
2336 return QHCertStorePointer(PFXImportCertStore(&pfxBlob, passphrase, flags));
2339 if (!configuration.localCertificateChain().isEmpty()) {
2340 if (configuration.privateKey().isNull()) {
2341 setErrorAndEmit(d, QAbstractSocket::SslInvalidUserDataError,
2342 QSslSocket::tr(
"Cannot provide a certificate with no key"));
2345 if (localCertificateStore ==
nullptr) {
2346 localCertificateStore =
2347 createStoreFromCertificateChain(configuration.localCertificateChain(), {});
2348 if (localCertificateStore) {
2349 const CERT_CONTEXT *certificateContext = CertFindCertificateInStore(
2350 localCertificateStore.get(), X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, 0,
2351 CERT_FIND_ANY,
nullptr,
nullptr);
2352 if (certificateContext) {
2353 auto *backend = QTlsBackend::backend<X509CertificateSchannel>(
2354 configuration.localCertificate());
2355 backend->certificateContext.reset(
2356 CertDuplicateCertificateContext(certificateContext));
2359 BOOL mustFree = FALSE;
2360 NCRYPT_KEY_HANDLE testKey = 0;
2361 BOOL ok = CryptAcquireCertificatePrivateKey(
2362 certificateContext, CRYPT_ACQUIRE_ONLY_NCRYPT_KEY_FLAG,
nullptr,
2363 &testKey, &keySpec, &mustFree);
2365 NCryptFreeObject(testKey);
2367 attachPrivateKeyToCertificate(configuration.localCertificate(),
2368 configuration.privateKey());
2372 qCWarning(lcTlsBackendSchannel,
"Failed to load certificate chain!");
2377 if (!configuration.caCertificates().isEmpty() && !caCertificateStore) {
2378 caCertificateStore = createStoreFromCertificateChain(configuration.caCertificates(),
2385 Q_ASSERT(certContext);
2389 const bool isClient = d->tlsMode() == QSslSocket::SslClientMode;
2393 auto tempCertCollection = QHCertStorePointer(CertOpenStore(CERT_STORE_PROV_COLLECTION,
2396 CERT_STORE_CREATE_NEW_FLAG,
2398 if (!tempCertCollection) {
2399#ifdef QSSLSOCKET_DEBUG
2400 qCWarning(lcTlsBackendSchannel,
"Failed to create certificate store collection!");
2405 if (rootCertOnDemandLoadingAllowed()) {
2410 auto rootStore = QHCertStorePointer(
2411 CertOpenStore(CERT_STORE_PROV_SYSTEM, 0, 0,
2412 CERT_STORE_READONLY_FLAG | CERT_SYSTEM_STORE_CURRENT_USER, L"ROOT"));
2415#ifdef QSSLSOCKET_DEBUG
2416 qCWarning(lcTlsBackendSchannel,
"Failed to open the system root CA certificate store!");
2419 }
else if (!CertAddStoreToCollection(tempCertCollection.get(), rootStore.get(), 0, 1)) {
2420#ifdef QSSLSOCKET_DEBUG
2421 qCWarning(lcTlsBackendSchannel,
2422 "Failed to add the system root CA certificate store to the certificate store "
2428 if (caCertificateStore) {
2429 if (!CertAddStoreToCollection(tempCertCollection.get(), caCertificateStore.get(), 0, 1)) {
2430#ifdef QSSLSOCKET_DEBUG
2431 qCWarning(lcTlsBackendSchannel,
2432 "Failed to add the user's CA certificate store to the certificate store "
2439 if (!CertAddStoreToCollection(tempCertCollection.get(), certContext->hCertStore, 0, 0)) {
2440#ifdef QSSLSOCKET_DEBUG
2441 qCWarning(lcTlsBackendSchannel,
2442 "Failed to add certificate's origin store to the certificate store collection!");
2447 CERT_CHAIN_PARA parameters;
2448 ZeroMemory(¶meters,
sizeof(parameters));
2449 parameters.cbSize =
sizeof(CERT_CHAIN_PARA);
2450 parameters.RequestedUsage.dwType = USAGE_MATCH_TYPE_AND;
2451 parameters.RequestedUsage.Usage.cUsageIdentifier = 1;
2452 LPSTR oid = LPSTR(isClient ? szOID_PKIX_KP_SERVER_AUTH
2453 : szOID_PKIX_KP_CLIENT_AUTH);
2454 parameters.RequestedUsage.Usage.rgpszUsageIdentifier = &oid;
2456 QTlsBackend::clearPeerCertificates(d);
2457 const CERT_CHAIN_CONTEXT *chainContext =
nullptr;
2458 auto freeCertChain = qScopeGuard([&chainContext]() {
2460 CertFreeCertificateChain(chainContext);
2462 BOOL status = CertGetCertificateChain(
nullptr,
2465 tempCertCollection.get(),
2467 CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT,
2471 if (status == FALSE || !chainContext || chainContext->cChain == 0) {
2472 QSslError error(QSslError::UnableToVerifyFirstCertificate);
2474 emit q->peerVerifyError(error);
2475 return q->state() == QAbstractSocket::ConnectedState;
2479 static auto getCertificateFromChainElement = [](CERT_CHAIN_ELEMENT *element) {
2481 return QSslCertificate();
2483 const CERT_CONTEXT *certContext = element->pCertContext;
2484 return QTlsPrivate::X509CertificateSchannel::QSslCertificate_from_CERT_CONTEXT(certContext);
2490 CERT_SIMPLE_CHAIN *chain = chainContext->rgpChain[chainContext->cChain - 1];
2492 if (chain->TrustStatus.dwErrorStatus & CERT_TRUST_IS_PARTIAL_CHAIN) {
2493 auto error = QSslError(QSslError::SslError::UnableToGetIssuerCertificate,
2494 getCertificateFromChainElement(chain->rgpElement[chain->cElement - 1]));
2496 emit q->peerVerifyError(error);
2497 if (q->state() != QAbstractSocket::ConnectedState)
2500 if (chain->TrustStatus.dwErrorStatus & CERT_TRUST_INVALID_BASIC_CONSTRAINTS) {
2504 auto error = QSslError(QSslError::PathLengthExceeded);
2506 emit q->peerVerifyError(error);
2507 if (q->state() != QAbstractSocket::ConnectedState)
2510 static const DWORD leftoverCertChainErrorMask = CERT_TRUST_IS_CYCLIC | CERT_TRUST_INVALID_EXTENSION
2511 | CERT_TRUST_INVALID_POLICY_CONSTRAINTS | CERT_TRUST_INVALID_NAME_CONSTRAINTS
2512 | CERT_TRUST_CTL_IS_NOT_TIME_VALID | CERT_TRUST_CTL_IS_NOT_SIGNATURE_VALID
2513 | CERT_TRUST_CTL_IS_NOT_VALID_FOR_USAGE;
2514 if (chain->TrustStatus.dwErrorStatus & leftoverCertChainErrorMask) {
2515 auto error = QSslError(QSslError::SslError::UnspecifiedError);
2517 emit q->peerVerifyError(error);
2518 if (q->state() != QAbstractSocket::ConnectedState)
2522 DWORD verifyDepth = chain->cElement;
2523 if (q->peerVerifyDepth() > 0 && DWORD(q->peerVerifyDepth()) < verifyDepth)
2524 verifyDepth = DWORD(q->peerVerifyDepth());
2526 const auto &caCertificates = q->sslConfiguration().caCertificates();
2528 if (!rootCertOnDemandLoadingAllowed()
2529 && !(chain->TrustStatus.dwErrorStatus & CERT_TRUST_IS_PARTIAL_CHAIN)
2530 && (q->peerVerifyMode() == QSslSocket::VerifyPeer
2531 || (isClient && q->peerVerifyMode() == QSslSocket::AutoVerifyPeer))) {
2537 CERT_CHAIN_ELEMENT *element = chain->rgpElement[chain->cElement - 1];
2538 QSslCertificate certificate = getCertificateFromChainElement(element);
2539 if (!caCertificates.contains(certificate)) {
2540 auto error = QSslError(QSslError::CertificateUntrusted, certificate);
2542 emit q->peerVerifyError(error);
2543 if (q->state() != QAbstractSocket::ConnectedState)
2548 QList<QSslCertificate> peerCertificateChain;
2549 for (DWORD i = 0; i < verifyDepth; i++) {
2550 CERT_CHAIN_ELEMENT *element = chain->rgpElement[i];
2551 QSslCertificate certificate = getCertificateFromChainElement(element);
2552 if (certificate.isNull()) {
2553 const auto &previousCert = !peerCertificateChain.isEmpty() ? peerCertificateChain.last()
2554 : QSslCertificate();
2555 auto error = QSslError(QSslError::SslError::UnableToGetIssuerCertificate, previousCert);
2557 emit q->peerVerifyError(error);
2558 if (previousCert.isNull() || q->state() != QAbstractSocket::ConnectedState)
2561 const QList<QSslCertificateExtension> extensions = certificate.extensions();
2563#ifdef QSSLSOCKET_DEBUG
2564 qCDebug(lcTlsBackendSchannel) <<
"issuer:" << certificate.issuerDisplayName()
2565 <<
"\nsubject:" << certificate.subjectDisplayName()
2566 <<
"\nQSslCertificate info:" << certificate
2567 <<
"\nextended error info:" << element->pwszExtendedErrorInfo
2568 <<
"\nerror status:" << element->TrustStatus.dwErrorStatus;
2571 peerCertificateChain.append(certificate);
2572 QTlsBackend::storePeerCertificateChain(d, peerCertificateChain);
2574 if (certificate.isBlacklisted()) {
2575 const auto error = QSslError(QSslError::CertificateBlacklisted, certificate);
2577 emit q->peerVerifyError(error);
2578 if (q->state() != QAbstractSocket::ConnectedState)
2582 LONG result = CertVerifyTimeValidity(
nullptr , element->pCertContext->pCertInfo);
2584 auto error = QSslError(result == -1 ? QSslError::CertificateNotYetValid
2585 : QSslError::CertificateExpired,
2588 emit q->peerVerifyError(error);
2589 if (q->state() != QAbstractSocket::ConnectedState)
2594 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_NOT_TIME_VALID) {
2596 Q_ASSERT(!sslErrors.isEmpty());
2598 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_REVOKED) {
2599 auto error = QSslError(QSslError::CertificateRevoked, certificate);
2601 emit q->peerVerifyError(error);
2602 if (q->state() != QAbstractSocket::ConnectedState)
2605 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_NOT_SIGNATURE_VALID) {
2606 auto error = QSslError(QSslError::CertificateSignatureFailed, certificate);
2608 emit q->peerVerifyError(error);
2609 if (q->state() != QAbstractSocket::ConnectedState)
2616 if (netscapeWrongCertType(extensions, isClient, i == 0))
2617 element->TrustStatus.dwErrorStatus |= CERT_TRUST_IS_NOT_VALID_FOR_USAGE;
2619 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_NOT_VALID_FOR_USAGE) {
2620 auto error = QSslError(QSslError::InvalidPurpose, certificate);
2622 emit q->peerVerifyError(error);
2623 if (q->state() != QAbstractSocket::ConnectedState)
2626 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_UNTRUSTED_ROOT) {
2628 const bool isTrustedRoot = caCertificates.contains(certificate);
2629 if (!isTrustedRoot) {
2630 auto error = QSslError(QSslError::CertificateUntrusted, certificate);
2632 emit q->peerVerifyError(error);
2633 if (q->state() != QAbstractSocket::ConnectedState)
2637 static const DWORD certRevocationCheckUnavailableError = CERT_TRUST_IS_OFFLINE_REVOCATION
2638 | CERT_TRUST_REVOCATION_STATUS_UNKNOWN;
2639 if (element->TrustStatus.dwErrorStatus & certRevocationCheckUnavailableError) {
2644 static const DWORD leftoverCertErrorMask = CERT_TRUST_IS_CYCLIC
2645 | CERT_TRUST_INVALID_EXTENSION | CERT_TRUST_INVALID_NAME_CONSTRAINTS
2646 | CERT_TRUST_INVALID_POLICY_CONSTRAINTS
2647 | CERT_TRUST_HAS_EXCLUDED_NAME_CONSTRAINT
2648 | CERT_TRUST_HAS_NOT_SUPPORTED_CRITICAL_EXT
2649 | CERT_TRUST_HAS_NOT_DEFINED_NAME_CONSTRAINT
2650 | CERT_TRUST_HAS_NOT_PERMITTED_NAME_CONSTRAINT
2651 | CERT_TRUST_HAS_NOT_SUPPORTED_NAME_CONSTRAINT;
2652 if (element->TrustStatus.dwErrorStatus & leftoverCertErrorMask) {
2653 auto error = QSslError(QSslError::UnspecifiedError, certificate);
2655 emit q->peerVerifyError(error);
2656 if (q->state() != QAbstractSocket::ConnectedState)
2659 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_INVALID_BASIC_CONSTRAINTS) {
2660 auto it = std::find_if(extensions.cbegin(), extensions.cend(),
2661 [](
const QSslCertificateExtension &extension) {
2662 return extension.name() ==
"basicConstraints"_L1;
2664 if (it != extensions.cend()) {
2668 QVariantMap basicConstraints = it->value().toMap();
2670 if (i > 0 && !basicConstraints.value(
"ca"_L1,
false).toBool())
2671 error = QSslError(QSslError::InvalidPurpose, certificate);
2673 error = QSslError(QSslError::PathLengthExceeded, certificate);
2675 emit q->peerVerifyError(error);
2676 if (q->state() != QAbstractSocket::ConnectedState)
2680 if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_EXPLICIT_DISTRUST) {
2681 auto error = QSslError(QSslError::CertificateBlacklisted, certificate);
2683 emit q->peerVerifyError(error);
2684 if (q->state() != QAbstractSocket::ConnectedState)
2688 if (element->TrustStatus.dwInfoStatus & CERT_TRUST_IS_SELF_SIGNED) {
2693 const bool isRootCertificateAuthority = isCertificateAuthority(extensions)
2694 || certificate.version() ==
"1";
2697 if (!isRootCertificateAuthority) {
2698 auto error = QSslError(QSslError::SelfSignedCertificate, certificate);
2700 emit q->peerVerifyError(error);
2701 if (q->state() != QAbstractSocket::ConnectedState)
2707 if (!peerCertificateChain.isEmpty())
2708 QTlsBackend::storePeerCertificate(d, peerCertificateChain.constFirst());
2710 const auto &configuration = q->sslConfiguration();
2712 const bool doVerifyPeer = q->peerVerifyMode() == QSslSocket::VerifyPeer
2713 || (q->peerVerifyMode() == QSslSocket::AutoVerifyPeer
2714 && d->tlsMode() == QSslSocket::SslClientMode);
2718 if (!configuration.peerCertificate().isNull()) {
2721 if (d->tlsMode() == QSslSocket::SslClientMode) {
2722 const auto verificationPeerName = d->verificationName();
2723 const QString peerName(verificationPeerName.isEmpty() ? q->peerName() : verificationPeerName);
2724 if (!isMatchingHostname(configuration.peerCertificate(), peerName)) {
2726 const QSslError error(QSslError::HostNameMismatch, configuration.peerCertificate());
2728 emit q->peerVerifyError(error);
2729 if (q->state() != QAbstractSocket::ConnectedState)
2733 }
else if (doVerifyPeer) {
2736 const QSslError error(QSslError::NoPeerCertificate);
2738 emit q->peerVerifyError(error);
2739 if (q->state() != QAbstractSocket::ConnectedState)
2749 return d->isRootsOnDemandAllowed() && QSslSocketPrivate::rootCertOnDemandLoadingSupported();
void startClientEncryption() override
void disconnected() override
void continueHandshake() override
void init(QSslSocket *q, QSslSocketPrivate *d) override
void startServerEncryption() override
QSsl::SslProtocol sessionProtocol() const override
void disconnectFromHost() override
~TlsCryptographSchannel()
bool hasUndecryptedData() const override
QSslCipher sessionCipher() const override
QList< QSslError > tlsErrors() const override
Q_DISABLE_COPY_MOVE(X509CertificateSchannel)
Namespace containing onternal types that TLS backends implement.
QT_WARNING_PUSH QT_WARNING_DISABLE_DEPRECATED std::array< SchannelCipherInfo, 44 > schannelCipherInfo
QList< QSslCipher > defaultCiphers()
UNICODE_STRING cbcChainingMode
QList< CRYPTO_SETTINGS > cryptoSettingsForCiphers(const QList< QSslCipher > &ciphers)
bool containsTls13Cipher(const QList< QSslCipher > &ciphers)
UNICODE_STRING gcmChainingMode
QList< QSslCipher > ciphersByName(QStringView schannelSuiteName)
static void attachPrivateKeyToCertificate(const QSslCertificate &certificate, const QSslKey &privateKey)
Q_LOGGING_CATEGORY(lcEventDispatcher, "qt.eventdispatcher")
Q_GLOBAL_STATIC(QReadWriteLock, g_updateMutex)
#define SP_PROT_TLS1_0_SERVER
#define SP_PROT_TLS1_1_SERVER
#define SP_PROT_TLS1_2_SERVER
#define BCRYPT_ECDSA_ALGORITHM
#define SP_PROT_TLS1_3_SERVER
#define MAP_PROTOCOL(sp_protocol, q_protocol)
#define CHECK_STATUS(status)
#define CHECK_ATTRIBUTE(attributeName)
#define DEBUG_WARN(message)
QByteArray _q_makePkcs12(const QList< QSslCertificate > &certs, const QSslKey &key, const QString &passPhrase)
#define SP_PROT_TLS1_1_CLIENT
#define SP_PROT_TLS1_SERVER
QAsn1Element _q_PKCS12_key(const QSslKey &key)
#define BCRYPT_ECDH_ALGORITHM
#define SP_PROT_TLS1_3_CLIENT
#define SEC_E_APPLICATION_PROTOCOL_MISMATCH
#define SP_PROT_TLS1_CLIENT
#define SP_PROT_TLS1_0_CLIENT
#define SP_PROT_TLS1_2_CLIENT
const char * authenticationMethod
const char * schannelCipherSuite
QList< QSsl::SslProtocol > protocols
const char * encryptionMethod
const char * openSslCipherSuite
const char * keyExchangeMethod