blob: 5cad3a192041d62478e70e232c35690cac3f496f [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11#ifndef WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__
12#define WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__
13
14#include <string>
15#include <vector>
16
17#include "webrtc/base/buffer.h"
18#include "webrtc/base/sslstreamadapter.h"
19#include "webrtc/base/opensslidentity.h"
20
21typedef struct ssl_st SSL;
22typedef struct ssl_ctx_st SSL_CTX;
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +000023typedef struct ssl_cipher_st SSL_CIPHER;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000024typedef struct x509_store_ctx_st X509_STORE_CTX;
25
26namespace rtc {
27
28// This class was written with OpenSSLAdapter (a socket adapter) as a
29// starting point. It has similar structure and functionality, with
30// the peer-to-peer mode added.
31//
32// Static methods to initialize and deinit the SSL library are in
33// OpenSSLAdapter. This class also uses
34// OpenSSLAdapter::custom_verify_callback_ (a static field). These
35// should probably be moved out to a neutral class.
36//
37// In a few cases I have factored out some OpenSSLAdapter code into
38// static methods so it can be reused from this class. Eventually that
39// code should probably be moved to a common support
40// class. Unfortunately there remain a few duplicated sections of
41// code. I have not done more restructuring because I did not want to
42// affect existing code that uses OpenSSLAdapter.
43//
44// This class does not support the SSL connection restart feature
45// present in OpenSSLAdapter. I am not entirely sure how the feature
46// is useful and I am not convinced that it works properly.
47//
48// This implementation is careful to disallow data exchange after an
49// SSL error, and it has an explicit SSL_CLOSED state. It should not
50// be possible to send any data in clear after one of the StartSSL
51// methods has been called.
52
53// Look in sslstreamadapter.h for documentation of the methods.
54
55class OpenSSLIdentity;
56
57///////////////////////////////////////////////////////////////////////////////
58
59class OpenSSLStreamAdapter : public SSLStreamAdapter {
60 public:
61 explicit OpenSSLStreamAdapter(StreamInterface* stream);
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000062 ~OpenSSLStreamAdapter() override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000063
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000064 void SetIdentity(SSLIdentity* identity) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000065
66 // Default argument is for compatibility
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000067 void SetServerRole(SSLRole role = SSL_SERVER) override;
68 bool SetPeerCertificateDigest(const std::string& digest_alg,
69 const unsigned char* digest_val,
70 size_t digest_len) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000071
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000072 bool GetPeerCertificate(SSLCertificate** cert) const override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000073
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000074 int StartSSLWithServer(const char* server_name) override;
75 int StartSSLWithPeer() override;
76 void SetMode(SSLMode mode) override;
Joachim Bauch831c5582015-05-20 12:48:41 +020077 void SetMaxProtocolVersion(SSLProtocolVersion version) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000078
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000079 StreamResult Read(void* data,
80 size_t data_len,
81 size_t* read,
82 int* error) override;
83 StreamResult Write(const void* data,
84 size_t data_len,
85 size_t* written,
86 int* error) override;
87 void Close() override;
88 StreamState GetState() const override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000089
pthatcher@webrtc.orgf7bb6e72015-02-28 01:41:07 +000090#ifndef OPENSSL_IS_BORINGSSL
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +000091 // Return the RFC (5246, 3268, etc.) cipher name for an OpenSSL cipher.
92 static const char* GetRfcSslCipherName(const SSL_CIPHER* cipher);
pthatcher@webrtc.orgf7bb6e72015-02-28 01:41:07 +000093#endif
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +000094
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000095 bool GetSslCipher(std::string* cipher) override;
pthatcher@webrtc.org3ee4fe52015-02-11 22:34:36 +000096
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000097 // Key Extractor interface
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +000098 bool ExportKeyingMaterial(const std::string& label,
99 const uint8* context,
100 size_t context_len,
101 bool use_context,
102 uint8* result,
103 size_t result_len) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000104
105 // DTLS-SRTP interface
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000106 bool SetDtlsSrtpCiphers(const std::vector<std::string>& ciphers) override;
107 bool GetDtlsSrtpCipher(std::string* cipher) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000108
109 // Capabilities interfaces
110 static bool HaveDtls();
111 static bool HaveDtlsSrtp();
112 static bool HaveExporter();
Joachim Bauch831c5582015-05-20 12:48:41 +0200113 static std::string GetDefaultSslCipher(SSLProtocolVersion version);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000114
115 protected:
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000116 void OnEvent(StreamInterface* stream, int events, int err) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000117
118 private:
119 enum SSLState {
120 // Before calling one of the StartSSL methods, data flows
121 // in clear text.
122 SSL_NONE,
123 SSL_WAIT, // waiting for the stream to open to start SSL negotiation
124 SSL_CONNECTING, // SSL negotiation in progress
125 SSL_CONNECTED, // SSL stream successfully established
126 SSL_ERROR, // some SSL error occurred, stream is closed
127 SSL_CLOSED // Clean close
128 };
129
130 enum { MSG_TIMEOUT = MSG_MAX+1};
131
132 // The following three methods return 0 on success and a negative
133 // error code on failure. The error code may be from OpenSSL or -1
134 // on some other error cases, so it can't really be interpreted
135 // unfortunately.
136
137 // Go from state SSL_NONE to either SSL_CONNECTING or SSL_WAIT,
138 // depending on whether the underlying stream is already open or
139 // not.
140 int StartSSL();
141 // Prepare SSL library, state is SSL_CONNECTING.
142 int BeginSSL();
143 // Perform SSL negotiation steps.
144 int ContinueSSL();
145
146 // Error handler helper. signal is given as true for errors in
147 // asynchronous contexts (when an error method was not returned
148 // through some other method), and in that case an SE_CLOSE event is
149 // raised on the stream with the specified error.
150 // A 0 error means a graceful close, otherwise there is not really enough
151 // context to interpret the error code.
152 void Error(const char* context, int err, bool signal);
153 void Cleanup();
154
155 // Override MessageHandler
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000156 void OnMessage(Message* msg) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000157
158 // Flush the input buffers by reading left bytes (for DTLS)
159 void FlushInput(unsigned int left);
160
161 // SSL library configuration
162 SSL_CTX* SetupSSLContext();
163 // SSL verification check
164 bool SSLPostConnectionCheck(SSL* ssl, const char* server_name,
165 const X509* peer_cert,
166 const std::string& peer_digest);
167 // SSL certification verification error handler, called back from
168 // the openssl library. Returns an int interpreted as a boolean in
169 // the C style: zero means verification failure, non-zero means
170 // passed.
171 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store);
172
173 SSLState state_;
174 SSLRole role_;
175 int ssl_error_code_; // valid when state_ == SSL_ERROR or SSL_CLOSED
176 // Whether the SSL negotiation is blocked on needing to read or
177 // write to the wrapped stream.
178 bool ssl_read_needs_write_;
179 bool ssl_write_needs_read_;
180
181 SSL* ssl_;
182 SSL_CTX* ssl_ctx_;
183
184 // Our key and certificate, mostly useful in peer-to-peer mode.
185 scoped_ptr<OpenSSLIdentity> identity_;
186 // in traditional mode, the server name that the server's certificate
187 // must specify. Empty in peer-to-peer mode.
188 std::string ssl_server_name_;
189 // The certificate that the peer must present or did present. Initially
190 // null in traditional mode, until the connection is established.
191 scoped_ptr<OpenSSLCertificate> peer_certificate_;
192 // In peer-to-peer mode, the digest of the certificate that
193 // the peer must present.
194 Buffer peer_certificate_digest_value_;
195 std::string peer_certificate_digest_algorithm_;
196
197 // OpenSSLAdapter::custom_verify_callback_ result
198 bool custom_verification_succeeded_;
199
200 // The DtlsSrtp ciphers
201 std::string srtp_ciphers_;
202
203 // Do DTLS or not
204 SSLMode ssl_mode_;
Joachim Bauch831c5582015-05-20 12:48:41 +0200205
206 // Max. allowed protocol version
207 SSLProtocolVersion ssl_max_version_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000208};
209
210/////////////////////////////////////////////////////////////////////////////
211
212} // namespace rtc
213
214#endif // WEBRTC_BASE_OPENSSLSTREAMADAPTER_H__