blob: 3ce33e1f5b11fdbd290db837afeb764442fbd605 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 09:11:00 -080011#ifndef RTC_BASE_OPENSSL_ADAPTER_H_
12#define RTC_BASE_OPENSSL_ADAPTER_H_
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000013
Taylor Brandstetter165c6182020-12-10 16:23:03 -080014#include <openssl/ossl_typ.h>
Yves Gerey988cc082018-10-23 12:03:01 +020015#include <stddef.h>
16#include <stdint.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020017
Benjamin Wright19aab2e2018-04-05 15:39:06 -070018#include <memory>
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020019#include <string>
Benjamin Wright19aab2e2018-04-05 15:39:06 -070020#include <vector>
21
Ali Tofigh7fa90572022-03-17 15:47:49 +010022#include "absl/strings/string_view.h"
Danil Chapovalove7280c32022-08-18 12:01:30 +020023#include "api/task_queue/pending_task_safety_flag.h"
Yves Gerey988cc082018-10-23 12:03:01 +020024#include "rtc_base/buffer.h"
Taylor Brandstetter165c6182020-12-10 16:23:03 -080025#ifdef OPENSSL_IS_BORINGSSL
26#include "rtc_base/boringssl_identity.h"
27#else
Steve Anton10542f22019-01-11 09:11:00 -080028#include "rtc_base/openssl_identity.h"
Taylor Brandstetter165c6182020-12-10 16:23:03 -080029#endif
Steve Anton10542f22019-01-11 09:11:00 -080030#include "rtc_base/openssl_session_cache.h"
Yves Gerey988cc082018-10-23 12:03:01 +020031#include "rtc_base/socket.h"
Steve Anton10542f22019-01-11 09:11:00 -080032#include "rtc_base/socket_address.h"
33#include "rtc_base/ssl_adapter.h"
34#include "rtc_base/ssl_certificate.h"
35#include "rtc_base/ssl_identity.h"
36#include "rtc_base/ssl_stream_adapter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000037
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020038namespace rtc {
39
Niels Möller9aa46c62022-05-11 15:02:55 +020040namespace webrtc_openssl_adapter_internal {
41
42// Local definition, since absl::StrJoin is not allow-listed. Declared in header
43// file only for unittests.
44std::string StrJoin(const std::vector<std::string>& list, char delimiter);
45
46} // namespace webrtc_openssl_adapter_internal
47
Danil Chapovalove7280c32022-08-18 12:01:30 +020048class OpenSSLAdapter final : public SSLAdapter {
Justin Uberti1d445502017-08-14 17:04:34 -070049 public:
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070050 static bool InitializeSSL();
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020051 static bool CleanupSSL();
52
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070053 // Creating an OpenSSLAdapter requires a socket to bind to, an optional
54 // session cache if you wish to improve performance by caching sessions for
55 // hostnames you have previously connected to and an optional
56 // SSLCertificateVerifier which can override any existing trusted roots to
57 // validate a peer certificate. The cache and verifier are effectively
58 // immutable after the the SSL connection starts.
Niels Möllerd0b88792021-08-12 10:32:30 +020059 explicit OpenSSLAdapter(Socket* socket,
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070060 OpenSSLSessionCache* ssl_session_cache = nullptr,
61 SSLCertificateVerifier* ssl_cert_verifier = nullptr);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020062 ~OpenSSLAdapter() override;
63
Sergey Silkin9c147dd2018-09-12 10:45:38 +000064 void SetIgnoreBadCert(bool ignore) override;
65 void SetAlpnProtocols(const std::vector<std::string>& protos) override;
66 void SetEllipticCurves(const std::vector<std::string>& curves) override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020067 void SetMode(SSLMode mode) override;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -070068 void SetCertVerifier(SSLCertificateVerifier* ssl_cert_verifier) override;
Harald Alvestrand8515d5a2020-03-20 22:51:32 +010069 void SetIdentity(std::unique_ptr<SSLIdentity> identity) override;
Steve Anton786de702017-08-17 15:15:46 -070070 void SetRole(SSLRole role) override;
Ali Tofigh2ab914c2022-04-13 12:55:15 +020071 int StartSSL(absl::string_view hostname) override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020072 int Send(const void* pv, size_t cb) override;
73 int SendTo(const void* pv, size_t cb, const SocketAddress& addr) override;
74 int Recv(void* pv, size_t cb, int64_t* timestamp) override;
75 int RecvFrom(void* pv,
76 size_t cb,
77 SocketAddress* paddr,
78 int64_t* timestamp) override;
79 int Close() override;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020080 // Note that the socket returns ST_CONNECTING while SSL is being negotiated.
81 ConnState GetState() const override;
Justin Uberti1d445502017-08-14 17:04:34 -070082 bool IsResumedSession() override;
Justin Uberti1d445502017-08-14 17:04:34 -070083 // Creates a new SSL_CTX object, configured for client-to-server usage
Artem Titov96e3b992021-07-26 16:03:14 +020084 // with SSLMode `mode`, and if `enable_cache` is true, with support for
Justin Uberti1d445502017-08-14 17:04:34 -070085 // storing successful sessions so that they can be later resumed.
86 // OpenSSLAdapterFactory will call this method to create its own internal
87 // SSL_CTX, and OpenSSLAdapter will also call this when used without a
88 // factory.
89 static SSL_CTX* CreateContext(SSLMode mode, bool enable_cache);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +020090
Justin Uberti1d445502017-08-14 17:04:34 -070091 protected:
Niels Möllerd0b88792021-08-12 10:32:30 +020092 void OnConnectEvent(Socket* socket) override;
93 void OnReadEvent(Socket* socket) override;
94 void OnWriteEvent(Socket* socket) override;
95 void OnCloseEvent(Socket* socket, int err) override;
Justin Uberti1d445502017-08-14 17:04:34 -070096
97 private:
Vojin Ilicf11f0e02021-06-30 14:22:11 +020098 class EarlyExitCatcher {
99 public:
100 EarlyExitCatcher(OpenSSLAdapter& adapter_ptr);
101 void disable();
102 ~EarlyExitCatcher();
103
104 private:
105 bool disabled_ = false;
106 OpenSSLAdapter& adapter_ptr_;
107 };
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200108 enum SSLState {
Yves Gerey665174f2018-06-19 15:03:05 +0200109 SSL_NONE,
110 SSL_WAIT,
111 SSL_CONNECTING,
112 SSL_CONNECTED,
113 SSL_ERROR
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200114 };
115
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200116 int BeginSSL();
117 int ContinueSSL();
Ali Tofigh2ab914c2022-04-13 12:55:15 +0200118 void Error(absl::string_view context, int err, bool signal = true);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200119 void Cleanup();
Danil Chapovalove7280c32022-08-18 12:01:30 +0200120 void OnTimeout();
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200121
Artem Titov96e3b992021-07-26 16:03:14 +0200122 // Return value and arguments have the same meanings as for Send; `error` is
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200123 // an output parameter filled with the result of SSL_get_error.
124 int DoSslWrite(const void* pv, size_t cb, int* error);
Ali Tofigh7fa90572022-03-17 15:47:49 +0100125 bool SSLPostConnectionCheck(SSL* ssl, absl::string_view host);
Benjamin Wright9201d1a2018-04-05 12:12:26 -0700126
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200127#if !defined(NDEBUG)
Justin Uberti1d445502017-08-14 17:04:34 -0700128 // In debug builds, logs info about the state of the SSL connection.
129 static void SSLInfoCallback(const SSL* ssl, int where, int ret);
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200130#endif
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800131
132#if defined(OPENSSL_IS_BORINGSSL) && \
133 defined(WEBRTC_EXCLUDE_BUILT_IN_SSL_ROOT_CERTS)
134 static enum ssl_verify_result_t SSLVerifyCallback(SSL* ssl,
135 uint8_t* out_alert);
136 enum ssl_verify_result_t SSLVerifyInternal(SSL* ssl, uint8_t* out_alert);
137#else
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200138 static int SSLVerifyCallback(int ok, X509_STORE_CTX* store);
Harald Alvestrandb32650e2021-09-10 08:03:22 +0000139 // Call a custom verifier, if installed.
140 // Returns 1 on success, `status_on_error` on error or verification failure.
141 int SSLVerifyInternal(int status_on_error, SSL* ssl, X509_STORE_CTX* store);
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800142#endif
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200143 friend class OpenSSLStreamAdapter; // for custom_verify_callback_;
144
Artem Titov96e3b992021-07-26 16:03:14 +0200145 // If the SSL_CTX was created with `enable_cache` set to true, this callback
Justin Uberti1d445502017-08-14 17:04:34 -0700146 // will be called when a SSL session has been successfully established,
147 // to allow its SSL_SESSION* to be cached for later resumption.
148 static int NewSSLSessionCallback(SSL* ssl, SSL_SESSION* session);
149
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700150 // Optional SSL Shared session cache to improve performance.
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700151 OpenSSLSessionCache* ssl_session_cache_ = nullptr;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700152 // Optional SSL Certificate verifier which can be set by a third party.
153 SSLCertificateVerifier* ssl_cert_verifier_ = nullptr;
154 // The current connection state of the (d)TLS connection.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200155 SSLState state_;
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800156
157#ifdef OPENSSL_IS_BORINGSSL
158 std::unique_ptr<BoringSSLIdentity> identity_;
159#else
Steve Anton786de702017-08-17 15:15:46 -0700160 std::unique_ptr<OpenSSLIdentity> identity_;
Taylor Brandstetter165c6182020-12-10 16:23:03 -0800161#endif
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700162 // Indicates whethere this is a client or a server.
Steve Anton786de702017-08-17 15:15:46 -0700163 SSLRole role_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200164 bool ssl_read_needs_write_;
165 bool ssl_write_needs_read_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200166 // This buffer is used if SSL_write fails with SSL_ERROR_WANT_WRITE, which
167 // means we need to keep retrying with *the same exact data* until it
168 // succeeds. Afterwards it will be cleared.
169 Buffer pending_data_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200170 SSL* ssl_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700171 // Holds the SSL context, which may be shared if an session cache is provided.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200172 SSL_CTX* ssl_ctx_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700173 // Hostname of server that is being connected, used for SNI.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200174 std::string ssl_host_name_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700175 // Set the adapter to DTLS or TLS mode before creating the context.
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200176 SSLMode ssl_mode_;
Sergey Silkin9c147dd2018-09-12 10:45:38 +0000177 // If true, the server certificate need not match the configured hostname.
178 bool ignore_bad_cert_;
179 // List of protocols to be used in the TLS ALPN extension.
180 std::vector<std::string> alpn_protocols_;
181 // List of elliptic curves to be used in the TLS elliptic curves extension.
182 std::vector<std::string> elliptic_curves_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700183 // Holds the result of the call to run of the ssl_cert_verify_->Verify()
184 bool custom_cert_verifier_status_;
Danil Chapovalove7280c32022-08-18 12:01:30 +0200185 // Flag to cancel pending timeout task.
186 webrtc::ScopedTaskSafety timer_;
Henrik Kjellanderec78f1c2017-06-29 07:52:50 +0200187};
188
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700189// The OpenSSLAdapterFactory is responsbile for creating multiple new
190// OpenSSLAdapters with a shared SSL_CTX and a shared SSL_SESSION cache. The
191// SSL_SESSION cache allows existing SSL_SESSIONS to be reused instead of
192// recreating them leading to a significant performance improvement.
Justin Uberti1d445502017-08-14 17:04:34 -0700193class OpenSSLAdapterFactory : public SSLAdapterFactory {
194 public:
195 OpenSSLAdapterFactory();
196 ~OpenSSLAdapterFactory() override;
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700197 // Set the SSL Mode to use with this factory. This should only be set before
198 // the first adapter is created with the factory. If it is called after it
199 // will DCHECK.
Justin Uberti1d445502017-08-14 17:04:34 -0700200 void SetMode(SSLMode mode) override;
Niels Möllerac9a2882021-10-20 15:25:09 +0200201
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700202 // Set a custom certificate verifier to be passed down to each instance
203 // created with this factory. This should only ever be set before the first
204 // call to the factory and cannot be changed after the fact.
205 void SetCertVerifier(SSLCertificateVerifier* ssl_cert_verifier) override;
Niels Möllerac9a2882021-10-20 15:25:09 +0200206
207 void SetIdentity(std::unique_ptr<SSLIdentity> identity) override;
208
209 // Choose whether the socket acts as a server socket or client socket.
210 void SetRole(SSLRole role) override;
211
212 // Methods that control server certificate verification, used in unit tests.
213 // Do not call these methods in production code.
214 void SetIgnoreBadCert(bool ignore) override;
215
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700216 // Constructs a new socket using the shared OpenSSLSessionCache. This means
217 // existing SSLSessions already in the cache will be reused instead of
218 // re-created for improved performance.
Niels Möllerd0b88792021-08-12 10:32:30 +0200219 OpenSSLAdapter* CreateAdapter(Socket* socket) override;
Henrik Kjellanderc0362762017-06-29 08:03:04 +0200220
Justin Uberti1d445502017-08-14 17:04:34 -0700221 private:
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700222 // Holds the SSLMode (DTLS,TLS) that will be used to set the session cache.
223 SSLMode ssl_mode_ = SSL_MODE_TLS;
Niels Möllerac9a2882021-10-20 15:25:09 +0200224 SSLRole ssl_role_ = SSL_CLIENT;
225 bool ignore_bad_cert_ = false;
226
227 std::unique_ptr<SSLIdentity> identity_;
228
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700229 // Holds a cache of existing SSL Sessions.
230 std::unique_ptr<OpenSSLSessionCache> ssl_session_cache_;
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700231 // Provides an optional custom callback for verifying SSL certificates, this
232 // in currently only used for TLS-TURN connections.
233 SSLCertificateVerifier* ssl_cert_verifier_ = nullptr;
Benjamin Wright19aab2e2018-04-05 15:39:06 -0700234 // TODO(benwright): Remove this when context is moved to OpenSSLCommon.
235 // Hold a friend class to the OpenSSLAdapter to retrieve the context.
Justin Uberti1d445502017-08-14 17:04:34 -0700236 friend class OpenSSLAdapter;
Justin Uberti1d445502017-08-14 17:04:34 -0700237};
238
Vojin Ilicf11f0e02021-06-30 14:22:11 +0200239// The EarlyExitCatcher is responsible for calling OpenSSLAdapter::Cleanup on
240// destruction. By doing this we have scoped cleanup which can be disabled if
241// there were no errors, aka early exits.
242
Benjamin Wrightd6f86e82018-05-08 13:12:25 -0700243std::string TransformAlpnProtocols(const std::vector<std::string>& protos);
244
Justin Uberti1d445502017-08-14 17:04:34 -0700245} // namespace rtc
246
Steve Anton10542f22019-01-11 09:11:00 -0800247#endif // RTC_BASE_OPENSSL_ADAPTER_H_