OLD | NEW |
---|---|
1 /* | 1 /* |
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved. | 2 * Copyright 2004 The WebRTC Project Authors. All rights reserved. |
3 * | 3 * |
4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
9 */ | 9 */ |
10 | 10 |
(...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
100 const uint8_t* context, | 100 const uint8_t* context, |
101 size_t context_len, | 101 size_t context_len, |
102 bool use_context, | 102 bool use_context, |
103 uint8_t* result, | 103 uint8_t* result, |
104 size_t result_len) override; | 104 size_t result_len) override; |
105 | 105 |
106 // DTLS-SRTP interface | 106 // DTLS-SRTP interface |
107 bool SetDtlsSrtpCryptoSuites(const std::vector<int>& crypto_suites) override; | 107 bool SetDtlsSrtpCryptoSuites(const std::vector<int>& crypto_suites) override; |
108 bool GetDtlsSrtpCryptoSuite(int* crypto_suite) override; | 108 bool GetDtlsSrtpCryptoSuite(int* crypto_suite) override; |
109 | 109 |
110 bool IsTlsConnected() override { return state_ == SSL_CONNECTED; } | |
111 | |
110 // Capabilities interfaces | 112 // Capabilities interfaces |
111 static bool HaveDtls(); | 113 static bool HaveDtls(); |
112 static bool HaveDtlsSrtp(); | 114 static bool HaveDtlsSrtp(); |
113 static bool HaveExporter(); | 115 static bool HaveExporter(); |
114 static bool IsBoringSsl(); | 116 static bool IsBoringSsl(); |
115 | 117 |
116 static bool IsAcceptableCipher(int cipher, KeyType key_type); | 118 static bool IsAcceptableCipher(int cipher, KeyType key_type); |
117 static bool IsAcceptableCipher(const std::string& cipher, KeyType key_type); | 119 static bool IsAcceptableCipher(const std::string& cipher, KeyType key_type); |
118 | 120 |
119 protected: | 121 protected: |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
158 | 160 |
159 // Override MessageHandler | 161 // Override MessageHandler |
160 void OnMessage(Message* msg) override; | 162 void OnMessage(Message* msg) override; |
161 | 163 |
162 // Flush the input buffers by reading left bytes (for DTLS) | 164 // Flush the input buffers by reading left bytes (for DTLS) |
163 void FlushInput(unsigned int left); | 165 void FlushInput(unsigned int left); |
164 | 166 |
165 // SSL library configuration | 167 // SSL library configuration |
166 SSL_CTX* SetupSSLContext(); | 168 SSL_CTX* SetupSSLContext(); |
167 // SSL verification check | 169 // SSL verification check |
168 bool SSLPostConnectionCheck(SSL* ssl, const char* server_name, | 170 bool SSLPostConnectionCheck(); |
169 const X509* peer_cert, | 171 bool VerifyPeerCertificate(); |
170 const std::string& peer_digest); | |
171 // SSL certification verification error handler, called back from | 172 // SSL certification verification error handler, called back from |
172 // the openssl library. Returns an int interpreted as a boolean in | 173 // the openssl library. Returns an int interpreted as a boolean in |
173 // the C style: zero means verification failure, non-zero means | 174 // the C style: zero means verification failure, non-zero means |
174 // passed. | 175 // passed. |
175 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store); | 176 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store); |
176 | 177 |
178 bool waiting_to_verify_client_cert() const { | |
pthatcher1
2016/07/27 19:32:35
Whould this be waiting_to_verify_peer_certificate(
Taylor Brandstetter
2016/08/13 00:09:53
I'll change it to "peer". I prefer "waiting" to "n
| |
179 // If |ssl_server_name_| is non-empty we're in client/server mode and don't | |
180 // need to verify a peer certificate. | |
181 return ssl_server_name_.empty() && client_auth_enabled() && | |
182 !peer_certificate_verified_; | |
183 } | |
pthatcher1
2016/07/27 19:32:35
If we're going to keep the ssl_server_name_ stuff,
| |
184 | |
185 bool have_peer_certificate_digest() const { | |
pthatcher1
2016/07/27 19:32:35
Should this be has_peer_certificate_digest()?
Taylor Brandstetter
2016/08/13 00:09:53
Sure.
| |
186 return !peer_certificate_digest_algorithm_.empty() && | |
187 !peer_certificate_digest_value_.empty(); | |
188 } | |
189 | |
190 // These methods tell us whether we're in "traditional" mode (verifying the | |
191 // server name using the certificate chain) or "peer-to-peer" mode (verifying | |
192 // the digest of a self-signed certificate). | |
193 bool verify_certificate_using_server_name() const { | |
194 return state_ != SSL_NONE && !ssl_server_name_.empty(); | |
pthatcher1
2016/07/27 19:32:35
Here in_peer_mode() would be nice as well.
Taylor Brandstetter
2016/08/13 00:09:53
These functions *were* the equivalent of in_peer_m
| |
195 } | |
196 bool verify_certificate_using_peer_digest() const { | |
197 return state_ != SSL_NONE && ssl_server_name_.empty(); | |
198 } | |
199 | |
177 SSLState state_; | 200 SSLState state_; |
178 SSLRole role_; | 201 SSLRole role_; |
179 int ssl_error_code_; // valid when state_ == SSL_ERROR or SSL_CLOSED | 202 int ssl_error_code_; // valid when state_ == SSL_ERROR or SSL_CLOSED |
180 // Whether the SSL negotiation is blocked on needing to read or | 203 // Whether the SSL negotiation is blocked on needing to read or |
181 // write to the wrapped stream. | 204 // write to the wrapped stream. |
182 bool ssl_read_needs_write_; | 205 bool ssl_read_needs_write_; |
183 bool ssl_write_needs_read_; | 206 bool ssl_write_needs_read_; |
184 | 207 |
185 SSL* ssl_; | 208 SSL* ssl_; |
186 SSL_CTX* ssl_ctx_; | 209 SSL_CTX* ssl_ctx_; |
187 | 210 |
188 // Our key and certificate, mostly useful in peer-to-peer mode. | 211 // Our key and certificate, mostly useful in peer-to-peer mode. |
189 std::unique_ptr<OpenSSLIdentity> identity_; | 212 std::unique_ptr<OpenSSLIdentity> identity_; |
190 // in traditional mode, the server name that the server's certificate | 213 // In traditional mode, the server name that the server's certificate |
191 // must specify. Empty in peer-to-peer mode. | 214 // must specify. Empty in peer-to-peer mode. |
192 std::string ssl_server_name_; | 215 std::string ssl_server_name_; |
193 // The certificate that the peer must present or did present. Initially | 216 // The certificate that the peer must present or did present. Initially |
194 // null in traditional mode, until the connection is established. | 217 // null in traditional mode, until the connection is established. |
195 std::unique_ptr<OpenSSLCertificate> peer_certificate_; | 218 std::unique_ptr<OpenSSLCertificate> peer_certificate_; |
219 bool peer_certificate_verified_ = false; | |
196 // In peer-to-peer mode, the digest of the certificate that | 220 // In peer-to-peer mode, the digest of the certificate that |
197 // the peer must present. | 221 // the peer must present. |
198 Buffer peer_certificate_digest_value_; | 222 Buffer peer_certificate_digest_value_; |
199 std::string peer_certificate_digest_algorithm_; | 223 std::string peer_certificate_digest_algorithm_; |
200 | 224 |
201 // OpenSSLAdapter::custom_verify_callback_ result | 225 // OpenSSLAdapter::custom_verify_callback_ result |
202 bool custom_verification_succeeded_; | 226 bool custom_verification_succeeded_; |
203 | 227 |
204 // The DtlsSrtp ciphers | 228 // The DtlsSrtp ciphers |
205 std::string srtp_ciphers_; | 229 std::string srtp_ciphers_; |
206 | 230 |
207 // Do DTLS or not | 231 // Do DTLS or not |
208 SSLMode ssl_mode_; | 232 SSLMode ssl_mode_; |
209 | 233 |
210 // Max. allowed protocol version | 234 // Max. allowed protocol version |
211 SSLProtocolVersion ssl_max_version_; | 235 SSLProtocolVersion ssl_max_version_; |
212 }; | 236 }; |
213 | 237 |
214 ///////////////////////////////////////////////////////////////////////////// | 238 ///////////////////////////////////////////////////////////////////////////// |
215 | 239 |
216 } // namespace rtc | 240 } // namespace rtc |
217 | 241 |
218 #endif // WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__ | 242 #endif // WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__ |
OLD | NEW |