| /* |
| * Copyright 2018 The WebRTC Project Authors. All rights reserved. |
| * |
| * Use of this source code is governed by a BSD-style license |
| * that can be found in the LICENSE file in the root of the source |
| * tree. An additional intellectual property rights grant can be found |
| * in the file PATENTS. All contributing project authors may |
| * be found in the AUTHORS file in the root of the source tree. |
| */ |
| |
| #include "rtc_base/openssl_utility.h" |
| #if defined(WEBRTC_WIN) |
| // Must be included first before openssl headers. |
| #include "rtc_base/win32.h" // NOLINT |
| #endif // WEBRTC_WIN |
| |
| #include <openssl/err.h> |
| #include <openssl/x509.h> |
| #include <openssl/x509v3.h> |
| #include "rtc_base/openssl.h" |
| |
| #include <stddef.h> |
| |
| #include "rtc_base/arraysize.h" |
| #include "rtc_base/logging.h" |
| #include "rtc_base/numerics/safe_conversions.h" |
| #include "rtc_base/openssl_certificate.h" |
| #ifndef WEBRTC_EXCLUDE_BUILT_IN_SSL_ROOT_CERTS |
| #include "rtc_base/ssl_roots.h" |
| #endif // WEBRTC_EXCLUDE_BUILT_IN_SSL_ROOT_CERTS |
| |
| namespace rtc { |
| namespace openssl { |
| |
| // Holds various helper methods. |
| namespace { |
| void LogCertificates(SSL* ssl, X509* certificate) { |
| // Logging certificates is extremely verbose. So it is disabled by default. |
| #ifdef LOG_CERTIFICATES |
| BIO* mem = BIO_new(BIO_s_mem()); |
| if (mem == nullptr) { |
| RTC_DLOG(LS_ERROR) << "BIO_new() failed to allocate memory."; |
| return; |
| } |
| |
| RTC_DLOG(LS_INFO) << "Certificate from server:"; |
| X509_print_ex(mem, certificate, XN_FLAG_SEP_CPLUS_SPC, X509_FLAG_NO_HEADER); |
| BIO_write(mem, "\0", 1); |
| |
| char* buffer = nullptr; |
| BIO_get_mem_data(mem, &buffer); |
| if (buffer != nullptr) { |
| RTC_DLOG(LS_INFO) << buffer; |
| } else { |
| RTC_DLOG(LS_ERROR) << "BIO_get_mem_data() failed to get buffer."; |
| } |
| BIO_free(mem); |
| |
| const char* cipher_name = SSL_CIPHER_get_name(SSL_get_current_cipher(ssl)); |
| if (cipher_name != nullptr) { |
| RTC_DLOG(LS_INFO) << "Cipher: " << cipher_name; |
| } else { |
| RTC_DLOG(LS_ERROR) << "SSL_CIPHER_DESCRIPTION() failed to get cipher_name."; |
| } |
| #endif |
| } |
| } // namespace |
| |
| bool VerifyPeerCertMatchesHost(SSL* ssl, const std::string& host) { |
| if (host.empty()) { |
| RTC_DLOG(LS_ERROR) << "Hostname is empty. Cannot verify peer certificate."; |
| return false; |
| } |
| |
| if (ssl == nullptr) { |
| RTC_DLOG(LS_ERROR) << "SSL is nullptr. Cannot verify peer certificate."; |
| return false; |
| } |
| |
| X509* certificate = SSL_get_peer_certificate(ssl); |
| if (certificate == nullptr) { |
| RTC_DLOG(LS_ERROR) |
| << "SSL_get_peer_certificate failed. This should never happen."; |
| return false; |
| } |
| |
| LogCertificates(ssl, certificate); |
| |
| bool is_valid_cert_name = |
| X509_check_host(certificate, host.c_str(), host.size(), 0, nullptr) == 1; |
| X509_free(certificate); |
| return is_valid_cert_name; |
| } |
| |
| void LogSSLErrors(const std::string& prefix) { |
| char error_buf[200]; |
| unsigned long err; // NOLINT |
| |
| while ((err = ERR_get_error()) != 0) { |
| ERR_error_string_n(err, error_buf, sizeof(error_buf)); |
| RTC_LOG(LS_ERROR) << prefix << ": " << error_buf << "\n"; |
| } |
| } |
| |
| #ifndef WEBRTC_EXCLUDE_BUILT_IN_SSL_ROOT_CERTS |
| bool LoadBuiltinSSLRootCertificates(SSL_CTX* ctx) { |
| int count_of_added_certs = 0; |
| for (size_t i = 0; i < arraysize(kSSLCertCertificateList); i++) { |
| const unsigned char* cert_buffer = kSSLCertCertificateList[i]; |
| size_t cert_buffer_len = kSSLCertCertificateSizeList[i]; |
| X509* cert = d2i_X509(nullptr, &cert_buffer, |
| checked_cast<long>(cert_buffer_len)); // NOLINT |
| if (cert) { |
| int return_value = X509_STORE_add_cert(SSL_CTX_get_cert_store(ctx), cert); |
| if (return_value == 0) { |
| RTC_LOG(LS_WARNING) << "Unable to add certificate."; |
| } else { |
| count_of_added_certs++; |
| } |
| X509_free(cert); |
| } |
| } |
| return count_of_added_certs > 0; |
| } |
| #endif // WEBRTC_EXCLUDE_BUILT_IN_SSL_ROOT_CERTS |
| |
| } // namespace openssl |
| } // namespace rtc |