Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(153)

Side by Side Diff: webrtc/base/opensslstreamadapter.h

Issue 2163683003: Relanding: Allow the DTLS fingerprint verification to occur after the handshake. (Closed) Base URL: https://chromium.googlesource.com/external/webrtc.git@master
Patch Set: Responding to Peter's comments. Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved. 2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 * 3 *
4 * Use of this source code is governed by a BSD-style license 4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source 5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found 6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may 7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree. 8 * be found in the AUTHORS file in the root of the source tree.
9 */ 9 */
10 10
(...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after
100 const uint8_t* context, 100 const uint8_t* context,
101 size_t context_len, 101 size_t context_len,
102 bool use_context, 102 bool use_context,
103 uint8_t* result, 103 uint8_t* result,
104 size_t result_len) override; 104 size_t result_len) override;
105 105
106 // DTLS-SRTP interface 106 // DTLS-SRTP interface
107 bool SetDtlsSrtpCryptoSuites(const std::vector<int>& crypto_suites) override; 107 bool SetDtlsSrtpCryptoSuites(const std::vector<int>& crypto_suites) override;
108 bool GetDtlsSrtpCryptoSuite(int* crypto_suite) override; 108 bool GetDtlsSrtpCryptoSuite(int* crypto_suite) override;
109 109
110 bool IsTlsConnected() override { return state_ == SSL_CONNECTED; }
111
110 // Capabilities interfaces 112 // Capabilities interfaces
111 static bool HaveDtls(); 113 static bool HaveDtls();
112 static bool HaveDtlsSrtp(); 114 static bool HaveDtlsSrtp();
113 static bool HaveExporter(); 115 static bool HaveExporter();
114 static bool IsBoringSsl(); 116 static bool IsBoringSsl();
115 117
116 static bool IsAcceptableCipher(int cipher, KeyType key_type); 118 static bool IsAcceptableCipher(int cipher, KeyType key_type);
117 static bool IsAcceptableCipher(const std::string& cipher, KeyType key_type); 119 static bool IsAcceptableCipher(const std::string& cipher, KeyType key_type);
118 120
119 protected: 121 protected:
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after
158 160
159 // Override MessageHandler 161 // Override MessageHandler
160 void OnMessage(Message* msg) override; 162 void OnMessage(Message* msg) override;
161 163
162 // Flush the input buffers by reading left bytes (for DTLS) 164 // Flush the input buffers by reading left bytes (for DTLS)
163 void FlushInput(unsigned int left); 165 void FlushInput(unsigned int left);
164 166
165 // SSL library configuration 167 // SSL library configuration
166 SSL_CTX* SetupSSLContext(); 168 SSL_CTX* SetupSSLContext();
167 // SSL verification check 169 // SSL verification check
168 bool SSLPostConnectionCheck(SSL* ssl, const char* server_name, 170 bool SSLPostConnectionCheck();
169 const X509* peer_cert, 171 bool VerifyPeerCertificate();
170 const std::string& peer_digest);
171 // SSL certification verification error handler, called back from 172 // SSL certification verification error handler, called back from
172 // the openssl library. Returns an int interpreted as a boolean in 173 // the openssl library. Returns an int interpreted as a boolean in
173 // the C style: zero means verification failure, non-zero means 174 // the C style: zero means verification failure, non-zero means
174 // passed. 175 // passed.
175 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store); 176 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store);
176 177
178 bool waiting_to_verify_client_cert() const {
pthatcher1 2016/07/27 19:32:35 Whould this be waiting_to_verify_peer_certificate(
Taylor Brandstetter 2016/08/13 00:09:53 I'll change it to "peer". I prefer "waiting" to "n
179 // If |ssl_server_name_| is non-empty we're in client/server mode and don't
180 // need to verify a peer certificate.
181 return ssl_server_name_.empty() && client_auth_enabled() &&
182 !peer_certificate_verified_;
183 }
pthatcher1 2016/07/27 19:32:35 If we're going to keep the ssl_server_name_ stuff,
184
185 bool have_peer_certificate_digest() const {
pthatcher1 2016/07/27 19:32:35 Should this be has_peer_certificate_digest()?
Taylor Brandstetter 2016/08/13 00:09:53 Sure.
186 return !peer_certificate_digest_algorithm_.empty() &&
187 !peer_certificate_digest_value_.empty();
188 }
189
190 // These methods tell us whether we're in "traditional" mode (verifying the
191 // server name using the certificate chain) or "peer-to-peer" mode (verifying
192 // the digest of a self-signed certificate).
193 bool verify_certificate_using_server_name() const {
194 return state_ != SSL_NONE && !ssl_server_name_.empty();
pthatcher1 2016/07/27 19:32:35 Here in_peer_mode() would be nice as well.
Taylor Brandstetter 2016/08/13 00:09:53 These functions *were* the equivalent of in_peer_m
195 }
196 bool verify_certificate_using_peer_digest() const {
197 return state_ != SSL_NONE && ssl_server_name_.empty();
198 }
199
177 SSLState state_; 200 SSLState state_;
178 SSLRole role_; 201 SSLRole role_;
179 int ssl_error_code_; // valid when state_ == SSL_ERROR or SSL_CLOSED 202 int ssl_error_code_; // valid when state_ == SSL_ERROR or SSL_CLOSED
180 // Whether the SSL negotiation is blocked on needing to read or 203 // Whether the SSL negotiation is blocked on needing to read or
181 // write to the wrapped stream. 204 // write to the wrapped stream.
182 bool ssl_read_needs_write_; 205 bool ssl_read_needs_write_;
183 bool ssl_write_needs_read_; 206 bool ssl_write_needs_read_;
184 207
185 SSL* ssl_; 208 SSL* ssl_;
186 SSL_CTX* ssl_ctx_; 209 SSL_CTX* ssl_ctx_;
187 210
188 // Our key and certificate, mostly useful in peer-to-peer mode. 211 // Our key and certificate, mostly useful in peer-to-peer mode.
189 std::unique_ptr<OpenSSLIdentity> identity_; 212 std::unique_ptr<OpenSSLIdentity> identity_;
190 // in traditional mode, the server name that the server's certificate 213 // In traditional mode, the server name that the server's certificate
191 // must specify. Empty in peer-to-peer mode. 214 // must specify. Empty in peer-to-peer mode.
192 std::string ssl_server_name_; 215 std::string ssl_server_name_;
193 // The certificate that the peer must present or did present. Initially 216 // The certificate that the peer must present or did present. Initially
194 // null in traditional mode, until the connection is established. 217 // null in traditional mode, until the connection is established.
195 std::unique_ptr<OpenSSLCertificate> peer_certificate_; 218 std::unique_ptr<OpenSSLCertificate> peer_certificate_;
219 bool peer_certificate_verified_ = false;
196 // In peer-to-peer mode, the digest of the certificate that 220 // In peer-to-peer mode, the digest of the certificate that
197 // the peer must present. 221 // the peer must present.
198 Buffer peer_certificate_digest_value_; 222 Buffer peer_certificate_digest_value_;
199 std::string peer_certificate_digest_algorithm_; 223 std::string peer_certificate_digest_algorithm_;
200 224
201 // OpenSSLAdapter::custom_verify_callback_ result 225 // OpenSSLAdapter::custom_verify_callback_ result
202 bool custom_verification_succeeded_; 226 bool custom_verification_succeeded_;
203 227
204 // The DtlsSrtp ciphers 228 // The DtlsSrtp ciphers
205 std::string srtp_ciphers_; 229 std::string srtp_ciphers_;
206 230
207 // Do DTLS or not 231 // Do DTLS or not
208 SSLMode ssl_mode_; 232 SSLMode ssl_mode_;
209 233
210 // Max. allowed protocol version 234 // Max. allowed protocol version
211 SSLProtocolVersion ssl_max_version_; 235 SSLProtocolVersion ssl_max_version_;
212 }; 236 };
213 237
214 ///////////////////////////////////////////////////////////////////////////// 238 /////////////////////////////////////////////////////////////////////////////
215 239
216 } // namespace rtc 240 } // namespace rtc
217 241
218 #endif // WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__ 242 #endif // WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698