| Index: webrtc/base/opensslstreamadapter.cc
|
| diff --git a/webrtc/base/opensslstreamadapter.cc b/webrtc/base/opensslstreamadapter.cc
|
| index 3b3aa5d219b7c04320cc738652daa263e7706a5f..158315f150e9a9d63b926d3d68f1d5d8ca99304d 100644
|
| --- a/webrtc/base/opensslstreamadapter.cc
|
| +++ b/webrtc/base/opensslstreamadapter.cc
|
| @@ -8,8 +8,6 @@
|
| * be found in the AUTHORS file in the root of the source tree.
|
| */
|
|
|
| -#if HAVE_OPENSSL_SSL_H
|
| -
|
| #include "webrtc/base/opensslstreamadapter.h"
|
|
|
| #include <openssl/bio.h>
|
| @@ -45,11 +43,10 @@ namespace {
|
|
|
| namespace rtc {
|
|
|
| -#if (OPENSSL_VERSION_NUMBER >= 0x10001000L)
|
| -#define HAVE_DTLS_SRTP
|
| +#if (OPENSSL_VERSION_NUMBER < 0x10001000L)
|
| +#error "webrtc requires at least OpenSSL version 1.0.1, to support DTLS-SRTP"
|
| #endif
|
|
|
| -#ifdef HAVE_DTLS_SRTP
|
| // SRTP cipher suite table. |internal_name| is used to construct a
|
| // colon-separated profile strings which is needed by
|
| // SSL_CTX_set_tlsext_use_srtp().
|
| @@ -65,7 +62,6 @@ static SrtpCipherMapEntry SrtpCipherMap[] = {
|
| {"SRTP_AEAD_AES_128_GCM", SRTP_AEAD_AES_128_GCM},
|
| {"SRTP_AEAD_AES_256_GCM", SRTP_AEAD_AES_256_GCM},
|
| {nullptr, 0}};
|
| -#endif
|
|
|
| #ifdef OPENSSL_IS_BORINGSSL
|
| // Not used in production code. Actual time should be relative to Jan 1, 1970.
|
| @@ -432,7 +428,6 @@ bool OpenSSLStreamAdapter::ExportKeyingMaterial(const std::string& label,
|
| bool use_context,
|
| uint8_t* result,
|
| size_t result_len) {
|
| -#ifdef HAVE_DTLS_SRTP
|
| int i;
|
|
|
| i = SSL_export_keying_material(ssl_, result, result_len, label.c_str(),
|
| @@ -443,14 +438,10 @@ bool OpenSSLStreamAdapter::ExportKeyingMaterial(const std::string& label,
|
| return false;
|
|
|
| return true;
|
| -#else
|
| - return false;
|
| -#endif
|
| }
|
|
|
| bool OpenSSLStreamAdapter::SetDtlsSrtpCryptoSuites(
|
| const std::vector<int>& ciphers) {
|
| -#ifdef HAVE_DTLS_SRTP
|
| std::string internal_ciphers;
|
|
|
| if (state_ != SSL_NONE)
|
| @@ -481,13 +472,9 @@ bool OpenSSLStreamAdapter::SetDtlsSrtpCryptoSuites(
|
|
|
| srtp_ciphers_ = internal_ciphers;
|
| return true;
|
| -#else
|
| - return false;
|
| -#endif
|
| }
|
|
|
| bool OpenSSLStreamAdapter::GetDtlsSrtpCryptoSuite(int* crypto_suite) {
|
| -#ifdef HAVE_DTLS_SRTP
|
| RTC_DCHECK(state_ == SSL_CONNECTED);
|
| if (state_ != SSL_CONNECTED)
|
| return false;
|
| @@ -501,9 +488,6 @@ bool OpenSSLStreamAdapter::GetDtlsSrtpCryptoSuite(int* crypto_suite) {
|
| *crypto_suite = srtp_profile->id;
|
| RTC_DCHECK(!SrtpCryptoSuiteToName(*crypto_suite).empty());
|
| return true;
|
| -#else
|
| - return false;
|
| -#endif
|
| }
|
|
|
| bool OpenSSLStreamAdapter::IsTlsConnected() {
|
| @@ -1096,14 +1080,12 @@ SSL_CTX* OpenSSLStreamAdapter::SetupSSLContext() {
|
| SSL_CTX_set_cipher_list(ctx,
|
| "DEFAULT:!NULL:!aNULL:!SHA256:!SHA384:!aECDH:!AESGCM+AES256:!aPSK");
|
|
|
| -#ifdef HAVE_DTLS_SRTP
|
| if (!srtp_ciphers_.empty()) {
|
| if (SSL_CTX_set_tlsext_use_srtp(ctx, srtp_ciphers_.c_str())) {
|
| SSL_CTX_free(ctx);
|
| return NULL;
|
| }
|
| }
|
| -#endif
|
|
|
| return ctx;
|
| }
|
| @@ -1169,26 +1151,6 @@ int OpenSSLStreamAdapter::SSLVerifyCallback(int ok, X509_STORE_CTX* store) {
|
| return stream->VerifyPeerCertificate();
|
| }
|
|
|
| -bool OpenSSLStreamAdapter::HaveDtls() {
|
| - return true;
|
| -}
|
| -
|
| -bool OpenSSLStreamAdapter::HaveDtlsSrtp() {
|
| -#ifdef HAVE_DTLS_SRTP
|
| - return true;
|
| -#else
|
| - return false;
|
| -#endif
|
| -}
|
| -
|
| -bool OpenSSLStreamAdapter::HaveExporter() {
|
| -#ifdef HAVE_DTLS_SRTP
|
| - return true;
|
| -#else
|
| - return false;
|
| -#endif
|
| -}
|
| -
|
| bool OpenSSLStreamAdapter::IsBoringSsl() {
|
| #ifdef OPENSSL_IS_BORINGSSL
|
| return true;
|
| @@ -1273,5 +1235,3 @@ void OpenSSLStreamAdapter::enable_time_callback_for_testing() {
|
| }
|
|
|
| } // namespace rtc
|
| -
|
| -#endif // HAVE_OPENSSL_SSL_H
|
|
|