blob: 6b24c9b891dd13ac87e3e799af445740e054789d [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11#ifndef WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__
12#define WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__
13
14#include <string>
15#include <vector>
16
17#include "webrtc/base/buffer.h"
18#include "webrtc/base/sslstreamadapter.h"
19#include "webrtc/base/opensslidentity.h"
20
21typedef struct ssl_st SSL;
22typedef struct ssl_ctx_st SSL_CTX;
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +000023typedef struct ssl_cipher_st SSL_CIPHER;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000024typedef struct x509_store_ctx_st X509_STORE_CTX;
25
26namespace rtc {
27
28// This class was written with OpenSSLAdapter (a socket adapter) as a
29// starting point. It has similar structure and functionality, with
30// the peer-to-peer mode added.
31//
32// Static methods to initialize and deinit the SSL library are in
33// OpenSSLAdapter. This class also uses
34// OpenSSLAdapter::custom_verify_callback_ (a static field). These
35// should probably be moved out to a neutral class.
36//
37// In a few cases I have factored out some OpenSSLAdapter code into
38// static methods so it can be reused from this class. Eventually that
39// code should probably be moved to a common support
40// class. Unfortunately there remain a few duplicated sections of
41// code. I have not done more restructuring because I did not want to
42// affect existing code that uses OpenSSLAdapter.
43//
44// This class does not support the SSL connection restart feature
45// present in OpenSSLAdapter. I am not entirely sure how the feature
46// is useful and I am not convinced that it works properly.
47//
48// This implementation is careful to disallow data exchange after an
49// SSL error, and it has an explicit SSL_CLOSED state. It should not
50// be possible to send any data in clear after one of the StartSSL
51// methods has been called.
52
53// Look in sslstreamadapter.h for documentation of the methods.
54
55class OpenSSLIdentity;
56
57///////////////////////////////////////////////////////////////////////////////
58
59class OpenSSLStreamAdapter : public SSLStreamAdapter {
60 public:
61 explicit OpenSSLStreamAdapter(StreamInterface* stream);
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000062 ~OpenSSLStreamAdapter() override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000063
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000064 void SetIdentity(SSLIdentity* identity) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000065
66 // Default argument is for compatibility
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000067 void SetServerRole(SSLRole role = SSL_SERVER) override;
68 bool SetPeerCertificateDigest(const std::string& digest_alg,
69 const unsigned char* digest_val,
70 size_t digest_len) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000071
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000072 bool GetPeerCertificate(SSLCertificate** cert) const override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000073
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000074 int StartSSLWithServer(const char* server_name) override;
75 int StartSSLWithPeer() override;
76 void SetMode(SSLMode mode) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000077
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000078 StreamResult Read(void* data,
79 size_t data_len,
80 size_t* read,
81 int* error) override;
82 StreamResult Write(const void* data,
83 size_t data_len,
84 size_t* written,
85 int* error) override;
86 void Close() override;
87 StreamState GetState() const override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000088
pthatcher@webrtc.orgf7bb6e72015-02-28 01:41:07 +000089#ifndef OPENSSL_IS_BORINGSSL
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +000090 // Return the RFC (5246, 3268, etc.) cipher name for an OpenSSL cipher.
91 static const char* GetRfcSslCipherName(const SSL_CIPHER* cipher);
pthatcher@webrtc.orgf7bb6e72015-02-28 01:41:07 +000092#endif
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +000093
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000094 bool GetSslCipher(std::string* cipher) override;
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +000095
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000096 // Key Extractor interface
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000097 bool ExportKeyingMaterial(const std::string& label,
98 const uint8* context,
99 size_t context_len,
100 bool use_context,
101 uint8* result,
102 size_t result_len) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000103
104 // DTLS-SRTP interface
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000105 bool SetDtlsSrtpCiphers(const std::vector<std::string>& ciphers) override;
106 bool GetDtlsSrtpCipher(std::string* cipher) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000107
108 // Capabilities interfaces
109 static bool HaveDtls();
110 static bool HaveDtlsSrtp();
111 static bool HaveExporter();
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +0000112 static std::string GetDefaultSslCipher();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000113
114 protected:
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000115 void OnEvent(StreamInterface* stream, int events, int err) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000116
117 private:
118 enum SSLState {
119 // Before calling one of the StartSSL methods, data flows
120 // in clear text.
121 SSL_NONE,
122 SSL_WAIT, // waiting for the stream to open to start SSL negotiation
123 SSL_CONNECTING, // SSL negotiation in progress
124 SSL_CONNECTED, // SSL stream successfully established
125 SSL_ERROR, // some SSL error occurred, stream is closed
126 SSL_CLOSED // Clean close
127 };
128
129 enum { MSG_TIMEOUT = MSG_MAX+1};
130
131 // The following three methods return 0 on success and a negative
132 // error code on failure. The error code may be from OpenSSL or -1
133 // on some other error cases, so it can't really be interpreted
134 // unfortunately.
135
136 // Go from state SSL_NONE to either SSL_CONNECTING or SSL_WAIT,
137 // depending on whether the underlying stream is already open or
138 // not.
139 int StartSSL();
140 // Prepare SSL library, state is SSL_CONNECTING.
141 int BeginSSL();
142 // Perform SSL negotiation steps.
143 int ContinueSSL();
144
145 // Error handler helper. signal is given as true for errors in
146 // asynchronous contexts (when an error method was not returned
147 // through some other method), and in that case an SE_CLOSE event is
148 // raised on the stream with the specified error.
149 // A 0 error means a graceful close, otherwise there is not really enough
150 // context to interpret the error code.
151 void Error(const char* context, int err, bool signal);
152 void Cleanup();
153
154 // Override MessageHandler
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000155 void OnMessage(Message* msg) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000156
157 // Flush the input buffers by reading left bytes (for DTLS)
158 void FlushInput(unsigned int left);
159
160 // SSL library configuration
161 SSL_CTX* SetupSSLContext();
162 // SSL verification check
163 bool SSLPostConnectionCheck(SSL* ssl, const char* server_name,
164 const X509* peer_cert,
165 const std::string& peer_digest);
166 // SSL certification verification error handler, called back from
167 // the openssl library. Returns an int interpreted as a boolean in
168 // the C style: zero means verification failure, non-zero means
169 // passed.
170 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store);
171
172 SSLState state_;
173 SSLRole role_;
174 int ssl_error_code_; // valid when state_ == SSL_ERROR or SSL_CLOSED
175 // Whether the SSL negotiation is blocked on needing to read or
176 // write to the wrapped stream.
177 bool ssl_read_needs_write_;
178 bool ssl_write_needs_read_;
179
180 SSL* ssl_;
181 SSL_CTX* ssl_ctx_;
182
183 // Our key and certificate, mostly useful in peer-to-peer mode.
184 scoped_ptr<OpenSSLIdentity> identity_;
185 // in traditional mode, the server name that the server's certificate
186 // must specify. Empty in peer-to-peer mode.
187 std::string ssl_server_name_;
188 // The certificate that the peer must present or did present. Initially
189 // null in traditional mode, until the connection is established.
190 scoped_ptr<OpenSSLCertificate> peer_certificate_;
191 // In peer-to-peer mode, the digest of the certificate that
192 // the peer must present.
193 Buffer peer_certificate_digest_value_;
194 std::string peer_certificate_digest_algorithm_;
195
196 // OpenSSLAdapter::custom_verify_callback_ result
197 bool custom_verification_succeeded_;
198
199 // The DtlsSrtp ciphers
200 std::string srtp_ciphers_;
201
202 // Do DTLS or not
203 SSLMode ssl_mode_;
204};
205
206/////////////////////////////////////////////////////////////////////////////
207
208} // namespace rtc
209
210#endif // WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__