blob: 76b003a7ddff130ab3b97cf8b67d7664d428e15e [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 09:11:00 -080011#ifndef RTC_BASE_OPENSSL_ADAPTER_H_
12#define RTC_BASE_OPENSSL_ADAPTER_H_
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000013
Taylor Brandstetter165c6182020-12-10 16:23:03 -080014#include <openssl/ossl_typ.h>
Yves Gerey988cc082018-10-23 12:03:01 +020015#include <stddef.h>
16#include <stdint.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020017
Benjamin Wright19aab2e2018-04-05 15:39:06 -070018#include <memory>
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020019#include <string>
Benjamin Wright19aab2e2018-04-05 15:39:06 -070020#include <vector>
21
Steve Anton10542f22019-01-11 09:11:00 -080022#include "rtc_base/async_socket.h"
Yves Gerey988cc082018-10-23 12:03:01 +020023#include "rtc_base/buffer.h"
Steve Anton10542f22019-01-11 09:11:00 -080024#include "rtc_base/message_handler.h"
Taylor Brandstetter165c6182020-12-10 16:23:03 -080025#ifdef OPENSSL_IS_BORINGSSL
26#include "rtc_base/boringssl_identity.h"
27#else
Steve Anton10542f22019-01-11 09:11:00 -080028#include "rtc_base/openssl_identity.h"
Taylor Brandstetter165c6182020-12-10 16:23:03 -080029#endif
Steve Anton10542f22019-01-11 09:11:00 -080030#include "rtc_base/openssl_session_cache.h"
Yves Gerey988cc082018-10-23 12:03:01 +020031#include "rtc_base/socket.h"
Steve Anton10542f22019-01-11 09:11:00 -080032#include "rtc_base/socket_address.h"
33#include "rtc_base/ssl_adapter.h"
34#include "rtc_base/ssl_certificate.h"
35#include "rtc_base/ssl_identity.h"
36#include "rtc_base/ssl_stream_adapter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000037
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020038namespace rtc {
39
Tomas Gunnarssonabdb4702020-09-05 18:43:36 +020040class OpenSSLAdapter final : public SSLAdapter,
41 public MessageHandlerAutoCleanup {
Justin Uberti1d445502017-08-14 17:04:34 -070042 public:
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070043 static bool InitializeSSL();
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020044 static bool CleanupSSL();
45
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070046 // Creating an OpenSSLAdapter requires a socket to bind to, an optional
47 // session cache if you wish to improve performance by caching sessions for
48 // hostnames you have previously connected to and an optional
49 // SSLCertificateVerifier which can override any existing trusted roots to
50 // validate a peer certificate. The cache and verifier are effectively
51 // immutable after the the SSL connection starts.
Justin Uberti1d445502017-08-14 17:04:34 -070052 explicit OpenSSLAdapter(AsyncSocket* socket,
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070053 OpenSSLSessionCache* ssl_session_cache = nullptr,
54 SSLCertificateVerifier* ssl_cert_verifier = nullptr);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020055 ~OpenSSLAdapter() override;
56
Sergey Silkin9c147dd2018-09-12 10:45:38 +000057 void SetIgnoreBadCert(bool ignore) override;
58 void SetAlpnProtocols(const std::vector<std::string>& protos) override;
59 void SetEllipticCurves(const std::vector<std::string>& curves) override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020060 void SetMode(SSLMode mode) override;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070061 void SetCertVerifier(SSLCertificateVerifier* ssl_cert_verifier) override;
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010062 void SetIdentity(std::unique_ptr<SSLIdentity> identity) override;
Steve Anton786de702017-08-17 15:15:46 -070063 void SetRole(SSLRole role) override;
64 AsyncSocket* Accept(SocketAddress* paddr) override;
Mirko Bonadei2d2c2942020-04-11 00:01:43 +020065 int StartSSL(const char* hostname) override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020066 int Send(const void* pv, size_t cb) override;
67 int SendTo(const void* pv, size_t cb, const SocketAddress& addr) override;
68 int Recv(void* pv, size_t cb, int64_t* timestamp) override;
69 int RecvFrom(void* pv,
70 size_t cb,
71 SocketAddress* paddr,
72 int64_t* timestamp) override;
73 int Close() override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020074 // Note that the socket returns ST_CONNECTING while SSL is being negotiated.
75 ConnState GetState() const override;
Justin Uberti1d445502017-08-14 17:04:34 -070076 bool IsResumedSession() override;
Justin Uberti1d445502017-08-14 17:04:34 -070077 // Creates a new SSL_CTX object, configured for client-to-server usage
78 // with SSLMode |mode|, and if |enable_cache| is true, with support for
79 // storing successful sessions so that they can be later resumed.
80 // OpenSSLAdapterFactory will call this method to create its own internal
81 // SSL_CTX, and OpenSSLAdapter will also call this when used without a
82 // factory.
83 static SSL_CTX* CreateContext(SSLMode mode, bool enable_cache);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020084
Justin Uberti1d445502017-08-14 17:04:34 -070085 protected:
86 void OnConnectEvent(AsyncSocket* socket) override;
87 void OnReadEvent(AsyncSocket* socket) override;
88 void OnWriteEvent(AsyncSocket* socket) override;
89 void OnCloseEvent(AsyncSocket* socket, int err) override;
90
91 private:
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020092 enum SSLState {
Yves Gerey665174f2018-06-19 15:03:05 +020093 SSL_NONE,
94 SSL_WAIT,
95 SSL_CONNECTING,
96 SSL_CONNECTED,
97 SSL_ERROR
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020098 };
99
100 enum { MSG_TIMEOUT };
101
102 int BeginSSL();
103 int ContinueSSL();
104 void Error(const char* context, int err, bool signal = true);
105 void Cleanup();
106
107 // Return value and arguments have the same meanings as for Send; |error| is
108 // an output parameter filled with the result of SSL_get_error.
109 int DoSslWrite(const void* pv, size_t cb, int* error);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200110 void OnMessage(Message* msg) override;
Benjamin Wright9201d1a2018-04-05 12:12:26 -0700111 bool SSLPostConnectionCheck(SSL* ssl, const std::string& host);
112
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200113#if !defined(NDEBUG)
Justin Uberti1d445502017-08-14 17:04:34 -0700114 // In debug builds, logs info about the state of the SSL connection.
115 static void SSLInfoCallback(const SSL* ssl, int where, int ret);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200116#endif
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800117
118#if defined(OPENSSL_IS_BORINGSSL) && \
119 defined(WEBRTC_EXCLUDE_BUILT_IN_SSL_ROOT_CERTS)
120 static enum ssl_verify_result_t SSLVerifyCallback(SSL* ssl,
121 uint8_t* out_alert);
122 enum ssl_verify_result_t SSLVerifyInternal(SSL* ssl, uint8_t* out_alert);
123#else
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200124 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store);
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800125 int SSLVerifyInternal(int ok, SSL* ssl, X509_STORE_CTX* store);
126#endif
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200127 friend class OpenSSLStreamAdapter; // for custom_verify_callback_;
128
Justin Uberti1d445502017-08-14 17:04:34 -0700129 // If the SSL_CTX was created with |enable_cache| set to true, this callback
130 // will be called when a SSL session has been successfully established,
131 // to allow its SSL_SESSION* to be cached for later resumption.
132 static int NewSSLSessionCallback(SSL* ssl, SSL_SESSION* session);
133
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700134 // Optional SSL Shared session cache to improve performance.
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700135 OpenSSLSessionCache* ssl_session_cache_ = nullptr;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700136 // Optional SSL Certificate verifier which can be set by a third party.
137 SSLCertificateVerifier* ssl_cert_verifier_ = nullptr;
138 // The current connection state of the (d)TLS connection.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200139 SSLState state_;
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800140
141#ifdef OPENSSL_IS_BORINGSSL
142 std::unique_ptr<BoringSSLIdentity> identity_;
143#else
Steve Anton786de702017-08-17 15:15:46 -0700144 std::unique_ptr<OpenSSLIdentity> identity_;
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800145#endif
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700146 // Indicates whethere this is a client or a server.
Steve Anton786de702017-08-17 15:15:46 -0700147 SSLRole role_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200148 bool ssl_read_needs_write_;
149 bool ssl_write_needs_read_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200150 // This buffer is used if SSL_write fails with SSL_ERROR_WANT_WRITE, which
151 // means we need to keep retrying with *the same exact data* until it
152 // succeeds. Afterwards it will be cleared.
153 Buffer pending_data_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200154 SSL* ssl_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700155 // Holds the SSL context, which may be shared if an session cache is provided.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200156 SSL_CTX* ssl_ctx_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700157 // Hostname of server that is being connected, used for SNI.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200158 std::string ssl_host_name_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700159 // Set the adapter to DTLS or TLS mode before creating the context.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200160 SSLMode ssl_mode_;
Sergey Silkin9c147dd2018-09-12 10:45:38 +0000161 // If true, the server certificate need not match the configured hostname.
162 bool ignore_bad_cert_;
163 // List of protocols to be used in the TLS ALPN extension.
164 std::vector<std::string> alpn_protocols_;
165 // List of elliptic curves to be used in the TLS elliptic curves extension.
166 std::vector<std::string> elliptic_curves_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700167 // Holds the result of the call to run of the ssl_cert_verify_->Verify()
168 bool custom_cert_verifier_status_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200169};
170
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700171// The OpenSSLAdapterFactory is responsbile for creating multiple new
172// OpenSSLAdapters with a shared SSL_CTX and a shared SSL_SESSION cache. The
173// SSL_SESSION cache allows existing SSL_SESSIONS to be reused instead of
174// recreating them leading to a significant performance improvement.
Justin Uberti1d445502017-08-14 17:04:34 -0700175class OpenSSLAdapterFactory : public SSLAdapterFactory {
176 public:
177 OpenSSLAdapterFactory();
178 ~OpenSSLAdapterFactory() override;
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700179 // Set the SSL Mode to use with this factory. This should only be set before
180 // the first adapter is created with the factory. If it is called after it
181 // will DCHECK.
Justin Uberti1d445502017-08-14 17:04:34 -0700182 void SetMode(SSLMode mode) override;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700183 // Set a custom certificate verifier to be passed down to each instance
184 // created with this factory. This should only ever be set before the first
185 // call to the factory and cannot be changed after the fact.
186 void SetCertVerifier(SSLCertificateVerifier* ssl_cert_verifier) override;
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700187 // Constructs a new socket using the shared OpenSSLSessionCache. This means
188 // existing SSLSessions already in the cache will be reused instead of
189 // re-created for improved performance.
Justin Uberti1d445502017-08-14 17:04:34 -0700190 OpenSSLAdapter* CreateAdapter(AsyncSocket* socket) override;
Henrik Kjellanderc0362762017-06-29 08:03:04 +0200191
Justin Uberti1d445502017-08-14 17:04:34 -0700192 private:
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700193 // Holds the SSLMode (DTLS,TLS) that will be used to set the session cache.
194 SSLMode ssl_mode_ = SSL_MODE_TLS;
195 // Holds a cache of existing SSL Sessions.
196 std::unique_ptr<OpenSSLSessionCache> ssl_session_cache_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700197 // Provides an optional custom callback for verifying SSL certificates, this
198 // in currently only used for TLS-TURN connections.
199 SSLCertificateVerifier* ssl_cert_verifier_ = nullptr;
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700200 // TODO(benwright): Remove this when context is moved to OpenSSLCommon.
201 // Hold a friend class to the OpenSSLAdapter to retrieve the context.
Justin Uberti1d445502017-08-14 17:04:34 -0700202 friend class OpenSSLAdapter;
Justin Uberti1d445502017-08-14 17:04:34 -0700203};
204
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700205std::string TransformAlpnProtocols(const std::vector<std::string>& protos);
206
Justin Uberti1d445502017-08-14 17:04:34 -0700207} // namespace rtc
208
Steve Anton10542f22019-01-11 09:11:00 -0800209#endif // RTC_BASE_OPENSSL_ADAPTER_H_