blob: 266ed354214de77b401db83a8bcb41606921c382 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 09:11:00 -080011#ifndef RTC_BASE_OPENSSL_ADAPTER_H_
12#define RTC_BASE_OPENSSL_ADAPTER_H_
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000013
Taylor Brandstetter165c6182020-12-10 16:23:03 -080014#include <openssl/ossl_typ.h>
Yves Gerey988cc082018-10-23 12:03:01 +020015#include <stddef.h>
16#include <stdint.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020017
Benjamin Wright19aab2e2018-04-05 15:39:06 -070018#include <memory>
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020019#include <string>
Benjamin Wright19aab2e2018-04-05 15:39:06 -070020#include <vector>
21
Yves Gerey988cc082018-10-23 12:03:01 +020022#include "rtc_base/buffer.h"
Steve Anton10542f22019-01-11 09:11:00 -080023#include "rtc_base/message_handler.h"
Taylor Brandstetter165c6182020-12-10 16:23:03 -080024#ifdef OPENSSL_IS_BORINGSSL
25#include "rtc_base/boringssl_identity.h"
26#else
Steve Anton10542f22019-01-11 09:11:00 -080027#include "rtc_base/openssl_identity.h"
Taylor Brandstetter165c6182020-12-10 16:23:03 -080028#endif
Steve Anton10542f22019-01-11 09:11:00 -080029#include "rtc_base/openssl_session_cache.h"
Yves Gerey988cc082018-10-23 12:03:01 +020030#include "rtc_base/socket.h"
Steve Anton10542f22019-01-11 09:11:00 -080031#include "rtc_base/socket_address.h"
32#include "rtc_base/ssl_adapter.h"
33#include "rtc_base/ssl_certificate.h"
34#include "rtc_base/ssl_identity.h"
35#include "rtc_base/ssl_stream_adapter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000036
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020037namespace rtc {
38
Tomas Gunnarssonabdb4702020-09-05 18:43:36 +020039class OpenSSLAdapter final : public SSLAdapter,
40 public MessageHandlerAutoCleanup {
Justin Uberti1d445502017-08-14 17:04:34 -070041 public:
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070042 static bool InitializeSSL();
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020043 static bool CleanupSSL();
44
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070045 // Creating an OpenSSLAdapter requires a socket to bind to, an optional
46 // session cache if you wish to improve performance by caching sessions for
47 // hostnames you have previously connected to and an optional
48 // SSLCertificateVerifier which can override any existing trusted roots to
49 // validate a peer certificate. The cache and verifier are effectively
50 // immutable after the the SSL connection starts.
Niels Möllerd0b88792021-08-12 10:32:30 +020051 explicit OpenSSLAdapter(Socket* socket,
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070052 OpenSSLSessionCache* ssl_session_cache = nullptr,
53 SSLCertificateVerifier* ssl_cert_verifier = nullptr);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020054 ~OpenSSLAdapter() override;
55
Sergey Silkin9c147dd2018-09-12 10:45:38 +000056 void SetIgnoreBadCert(bool ignore) override;
57 void SetAlpnProtocols(const std::vector<std::string>& protos) override;
58 void SetEllipticCurves(const std::vector<std::string>& curves) override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020059 void SetMode(SSLMode mode) override;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070060 void SetCertVerifier(SSLCertificateVerifier* ssl_cert_verifier) override;
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010061 void SetIdentity(std::unique_ptr<SSLIdentity> identity) override;
Steve Anton786de702017-08-17 15:15:46 -070062 void SetRole(SSLRole role) override;
Niels Möllerd0b88792021-08-12 10:32:30 +020063 Socket* Accept(SocketAddress* paddr) override;
Mirko Bonadei2d2c2942020-04-11 00:01:43 +020064 int StartSSL(const char* hostname) override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020065 int Send(const void* pv, size_t cb) override;
66 int SendTo(const void* pv, size_t cb, const SocketAddress& addr) override;
67 int Recv(void* pv, size_t cb, int64_t* timestamp) override;
68 int RecvFrom(void* pv,
69 size_t cb,
70 SocketAddress* paddr,
71 int64_t* timestamp) override;
72 int Close() override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020073 // Note that the socket returns ST_CONNECTING while SSL is being negotiated.
74 ConnState GetState() const override;
Justin Uberti1d445502017-08-14 17:04:34 -070075 bool IsResumedSession() override;
Justin Uberti1d445502017-08-14 17:04:34 -070076 // Creates a new SSL_CTX object, configured for client-to-server usage
Artem Titov96e3b992021-07-26 16:03:14 +020077 // with SSLMode `mode`, and if `enable_cache` is true, with support for
Justin Uberti1d445502017-08-14 17:04:34 -070078 // storing successful sessions so that they can be later resumed.
79 // OpenSSLAdapterFactory will call this method to create its own internal
80 // SSL_CTX, and OpenSSLAdapter will also call this when used without a
81 // factory.
82 static SSL_CTX* CreateContext(SSLMode mode, bool enable_cache);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020083
Justin Uberti1d445502017-08-14 17:04:34 -070084 protected:
Niels Möllerd0b88792021-08-12 10:32:30 +020085 void OnConnectEvent(Socket* socket) override;
86 void OnReadEvent(Socket* socket) override;
87 void OnWriteEvent(Socket* socket) override;
88 void OnCloseEvent(Socket* socket, int err) override;
Justin Uberti1d445502017-08-14 17:04:34 -070089
90 private:
Vojin Ilicf11f0e02021-06-30 14:22:11 +020091 class EarlyExitCatcher {
92 public:
93 EarlyExitCatcher(OpenSSLAdapter& adapter_ptr);
94 void disable();
95 ~EarlyExitCatcher();
96
97 private:
98 bool disabled_ = false;
99 OpenSSLAdapter& adapter_ptr_;
100 };
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200101 enum SSLState {
Yves Gerey665174f2018-06-19 15:03:05 +0200102 SSL_NONE,
103 SSL_WAIT,
104 SSL_CONNECTING,
105 SSL_CONNECTED,
106 SSL_ERROR
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200107 };
108
109 enum { MSG_TIMEOUT };
110
111 int BeginSSL();
112 int ContinueSSL();
113 void Error(const char* context, int err, bool signal = true);
114 void Cleanup();
115
Artem Titov96e3b992021-07-26 16:03:14 +0200116 // Return value and arguments have the same meanings as for Send; `error` is
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200117 // an output parameter filled with the result of SSL_get_error.
118 int DoSslWrite(const void* pv, size_t cb, int* error);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200119 void OnMessage(Message* msg) override;
Benjamin Wright9201d1a2018-04-05 12:12:26 -0700120 bool SSLPostConnectionCheck(SSL* ssl, const std::string& host);
121
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200122#if !defined(NDEBUG)
Justin Uberti1d445502017-08-14 17:04:34 -0700123 // In debug builds, logs info about the state of the SSL connection.
124 static void SSLInfoCallback(const SSL* ssl, int where, int ret);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200125#endif
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800126
127#if defined(OPENSSL_IS_BORINGSSL) && \
128 defined(WEBRTC_EXCLUDE_BUILT_IN_SSL_ROOT_CERTS)
129 static enum ssl_verify_result_t SSLVerifyCallback(SSL* ssl,
130 uint8_t* out_alert);
131 enum ssl_verify_result_t SSLVerifyInternal(SSL* ssl, uint8_t* out_alert);
132#else
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200133 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store);
Harald Alvestrandb32650e2021-09-10 08:03:22 +0000134 // Call a custom verifier, if installed.
135 // Returns 1 on success, `status_on_error` on error or verification failure.
136 int SSLVerifyInternal(int status_on_error, SSL* ssl, X509_STORE_CTX* store);
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800137#endif
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200138 friend class OpenSSLStreamAdapter; // for custom_verify_callback_;
139
Artem Titov96e3b992021-07-26 16:03:14 +0200140 // If the SSL_CTX was created with `enable_cache` set to true, this callback
Justin Uberti1d445502017-08-14 17:04:34 -0700141 // will be called when a SSL session has been successfully established,
142 // to allow its SSL_SESSION* to be cached for later resumption.
143 static int NewSSLSessionCallback(SSL* ssl, SSL_SESSION* session);
144
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700145 // Optional SSL Shared session cache to improve performance.
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700146 OpenSSLSessionCache* ssl_session_cache_ = nullptr;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700147 // Optional SSL Certificate verifier which can be set by a third party.
148 SSLCertificateVerifier* ssl_cert_verifier_ = nullptr;
149 // The current connection state of the (d)TLS connection.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200150 SSLState state_;
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800151
152#ifdef OPENSSL_IS_BORINGSSL
153 std::unique_ptr<BoringSSLIdentity> identity_;
154#else
Steve Anton786de702017-08-17 15:15:46 -0700155 std::unique_ptr<OpenSSLIdentity> identity_;
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800156#endif
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700157 // Indicates whethere this is a client or a server.
Steve Anton786de702017-08-17 15:15:46 -0700158 SSLRole role_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200159 bool ssl_read_needs_write_;
160 bool ssl_write_needs_read_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200161 // This buffer is used if SSL_write fails with SSL_ERROR_WANT_WRITE, which
162 // means we need to keep retrying with *the same exact data* until it
163 // succeeds. Afterwards it will be cleared.
164 Buffer pending_data_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200165 SSL* ssl_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700166 // Holds the SSL context, which may be shared if an session cache is provided.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200167 SSL_CTX* ssl_ctx_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700168 // Hostname of server that is being connected, used for SNI.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200169 std::string ssl_host_name_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700170 // Set the adapter to DTLS or TLS mode before creating the context.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200171 SSLMode ssl_mode_;
Sergey Silkin9c147dd2018-09-12 10:45:38 +0000172 // If true, the server certificate need not match the configured hostname.
173 bool ignore_bad_cert_;
174 // List of protocols to be used in the TLS ALPN extension.
175 std::vector<std::string> alpn_protocols_;
176 // List of elliptic curves to be used in the TLS elliptic curves extension.
177 std::vector<std::string> elliptic_curves_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700178 // Holds the result of the call to run of the ssl_cert_verify_->Verify()
179 bool custom_cert_verifier_status_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200180};
181
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700182// The OpenSSLAdapterFactory is responsbile for creating multiple new
183// OpenSSLAdapters with a shared SSL_CTX and a shared SSL_SESSION cache. The
184// SSL_SESSION cache allows existing SSL_SESSIONS to be reused instead of
185// recreating them leading to a significant performance improvement.
Justin Uberti1d445502017-08-14 17:04:34 -0700186class OpenSSLAdapterFactory : public SSLAdapterFactory {
187 public:
188 OpenSSLAdapterFactory();
189 ~OpenSSLAdapterFactory() override;
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700190 // Set the SSL Mode to use with this factory. This should only be set before
191 // the first adapter is created with the factory. If it is called after it
192 // will DCHECK.
Justin Uberti1d445502017-08-14 17:04:34 -0700193 void SetMode(SSLMode mode) override;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700194 // Set a custom certificate verifier to be passed down to each instance
195 // created with this factory. This should only ever be set before the first
196 // call to the factory and cannot be changed after the fact.
197 void SetCertVerifier(SSLCertificateVerifier* ssl_cert_verifier) override;
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700198 // Constructs a new socket using the shared OpenSSLSessionCache. This means
199 // existing SSLSessions already in the cache will be reused instead of
200 // re-created for improved performance.
Niels Möllerd0b88792021-08-12 10:32:30 +0200201 OpenSSLAdapter* CreateAdapter(Socket* socket) override;
Henrik Kjellanderc0362762017-06-29 08:03:04 +0200202
Justin Uberti1d445502017-08-14 17:04:34 -0700203 private:
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700204 // Holds the SSLMode (DTLS,TLS) that will be used to set the session cache.
205 SSLMode ssl_mode_ = SSL_MODE_TLS;
206 // Holds a cache of existing SSL Sessions.
207 std::unique_ptr<OpenSSLSessionCache> ssl_session_cache_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700208 // Provides an optional custom callback for verifying SSL certificates, this
209 // in currently only used for TLS-TURN connections.
210 SSLCertificateVerifier* ssl_cert_verifier_ = nullptr;
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700211 // TODO(benwright): Remove this when context is moved to OpenSSLCommon.
212 // Hold a friend class to the OpenSSLAdapter to retrieve the context.
Justin Uberti1d445502017-08-14 17:04:34 -0700213 friend class OpenSSLAdapter;
Justin Uberti1d445502017-08-14 17:04:34 -0700214};
215
Vojin Ilicf11f0e02021-06-30 14:22:11 +0200216// The EarlyExitCatcher is responsible for calling OpenSSLAdapter::Cleanup on
217// destruction. By doing this we have scoped cleanup which can be disabled if
218// there were no errors, aka early exits.
219
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700220std::string TransformAlpnProtocols(const std::vector<std::string>& protos);
221
Justin Uberti1d445502017-08-14 17:04:34 -0700222} // namespace rtc
223
Steve Anton10542f22019-01-11 09:11:00 -0800224#endif // RTC_BASE_OPENSSL_ADAPTER_H_