Index: webrtc/base/opensslstreamadapter.cc |
diff --git a/webrtc/base/opensslstreamadapter.cc b/webrtc/base/opensslstreamadapter.cc |
index 3b3aa5d219b7c04320cc738652daa263e7706a5f..158315f150e9a9d63b926d3d68f1d5d8ca99304d 100644 |
--- a/webrtc/base/opensslstreamadapter.cc |
+++ b/webrtc/base/opensslstreamadapter.cc |
@@ -8,8 +8,6 @@ |
* be found in the AUTHORS file in the root of the source tree. |
*/ |
-#if HAVE_OPENSSL_SSL_H |
- |
#include "webrtc/base/opensslstreamadapter.h" |
#include <openssl/bio.h> |
@@ -45,11 +43,10 @@ namespace { |
namespace rtc { |
-#if (OPENSSL_VERSION_NUMBER >= 0x10001000L) |
-#define HAVE_DTLS_SRTP |
+#if (OPENSSL_VERSION_NUMBER < 0x10001000L) |
+#error "webrtc requires at least OpenSSL version 1.0.1, to support DTLS-SRTP" |
#endif |
-#ifdef HAVE_DTLS_SRTP |
// SRTP cipher suite table. |internal_name| is used to construct a |
// colon-separated profile strings which is needed by |
// SSL_CTX_set_tlsext_use_srtp(). |
@@ -65,7 +62,6 @@ static SrtpCipherMapEntry SrtpCipherMap[] = { |
{"SRTP_AEAD_AES_128_GCM", SRTP_AEAD_AES_128_GCM}, |
{"SRTP_AEAD_AES_256_GCM", SRTP_AEAD_AES_256_GCM}, |
{nullptr, 0}}; |
-#endif |
#ifdef OPENSSL_IS_BORINGSSL |
// Not used in production code. Actual time should be relative to Jan 1, 1970. |
@@ -432,7 +428,6 @@ bool OpenSSLStreamAdapter::ExportKeyingMaterial(const std::string& label, |
bool use_context, |
uint8_t* result, |
size_t result_len) { |
-#ifdef HAVE_DTLS_SRTP |
int i; |
i = SSL_export_keying_material(ssl_, result, result_len, label.c_str(), |
@@ -443,14 +438,10 @@ bool OpenSSLStreamAdapter::ExportKeyingMaterial(const std::string& label, |
return false; |
return true; |
-#else |
- return false; |
-#endif |
} |
bool OpenSSLStreamAdapter::SetDtlsSrtpCryptoSuites( |
const std::vector<int>& ciphers) { |
-#ifdef HAVE_DTLS_SRTP |
std::string internal_ciphers; |
if (state_ != SSL_NONE) |
@@ -481,13 +472,9 @@ bool OpenSSLStreamAdapter::SetDtlsSrtpCryptoSuites( |
srtp_ciphers_ = internal_ciphers; |
return true; |
-#else |
- return false; |
-#endif |
} |
bool OpenSSLStreamAdapter::GetDtlsSrtpCryptoSuite(int* crypto_suite) { |
-#ifdef HAVE_DTLS_SRTP |
RTC_DCHECK(state_ == SSL_CONNECTED); |
if (state_ != SSL_CONNECTED) |
return false; |
@@ -501,9 +488,6 @@ bool OpenSSLStreamAdapter::GetDtlsSrtpCryptoSuite(int* crypto_suite) { |
*crypto_suite = srtp_profile->id; |
RTC_DCHECK(!SrtpCryptoSuiteToName(*crypto_suite).empty()); |
return true; |
-#else |
- return false; |
-#endif |
} |
bool OpenSSLStreamAdapter::IsTlsConnected() { |
@@ -1096,14 +1080,12 @@ SSL_CTX* OpenSSLStreamAdapter::SetupSSLContext() { |
SSL_CTX_set_cipher_list(ctx, |
"DEFAULT:!NULL:!aNULL:!SHA256:!SHA384:!aECDH:!AESGCM+AES256:!aPSK"); |
-#ifdef HAVE_DTLS_SRTP |
if (!srtp_ciphers_.empty()) { |
if (SSL_CTX_set_tlsext_use_srtp(ctx, srtp_ciphers_.c_str())) { |
SSL_CTX_free(ctx); |
return NULL; |
} |
} |
-#endif |
return ctx; |
} |
@@ -1169,26 +1151,6 @@ int OpenSSLStreamAdapter::SSLVerifyCallback(int ok, X509_STORE_CTX* store) { |
return stream->VerifyPeerCertificate(); |
} |
-bool OpenSSLStreamAdapter::HaveDtls() { |
- return true; |
-} |
- |
-bool OpenSSLStreamAdapter::HaveDtlsSrtp() { |
-#ifdef HAVE_DTLS_SRTP |
- return true; |
-#else |
- return false; |
-#endif |
-} |
- |
-bool OpenSSLStreamAdapter::HaveExporter() { |
-#ifdef HAVE_DTLS_SRTP |
- return true; |
-#else |
- return false; |
-#endif |
-} |
- |
bool OpenSSLStreamAdapter::IsBoringSsl() { |
#ifdef OPENSSL_IS_BORINGSSL |
return true; |
@@ -1273,5 +1235,3 @@ void OpenSSLStreamAdapter::enable_time_callback_for_testing() { |
} |
} // namespace rtc |
- |
-#endif // HAVE_OPENSSL_SSL_H |