Revert "Add SSLConfig object to IceServer."
This reverts commit 4f085434b912060874d6697f17aaedd2adae7c49.
Reason for revert: breaks downstream projects.
Original change's description:
> Add SSLConfig object to IceServer.
>
> This is a rollforward of https://webrtc-review.googlesource.com/c/src/+/96020,
> with the addition of setting the old tlsCertPolicy, tlsAlpnProtocols and
> tlsEllipticCurves in the RTCIceServer initializer, for backwards compatibility.
>
> Bug: webrtc:9662
> Change-Id: I28706ed4ff5abe3f7f913f105779f0e5412aeac5
> Reviewed-on: https://webrtc-review.googlesource.com/98762
> Commit-Queue: Diogo Real <diogor@google.com>
> Reviewed-by: Sami Kalliomäki <sakal@webrtc.org>
> Reviewed-by: Kári Helgason <kthelgason@webrtc.org>
> Reviewed-by: Steve Anton <steveanton@webrtc.org>
> Reviewed-by: Qingsi Wang <qingsi@webrtc.org>
> Cr-Commit-Position: refs/heads/master@{#24696}
TBR=steveanton@webrtc.org,sakal@webrtc.org,kwiberg@webrtc.org,kthelgason@webrtc.org,qingsi@webrtc.org,benwright@webrtc.org,diogor@google.com
Change-Id: I1cb64b63fec688b4ac90c2fa368eaf0bc11046af
No-Presubmit: true
No-Tree-Checks: true
No-Try: true
Bug: webrtc:9662
Reviewed-on: https://webrtc-review.googlesource.com/99880
Reviewed-by: Sergey Silkin <ssilkin@webrtc.org>
Commit-Queue: Sergey Silkin <ssilkin@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#24701}
diff --git a/api/peerconnectioninterface.h b/api/peerconnectioninterface.h
index c6e5a25..1c32b69 100644
--- a/api/peerconnectioninterface.h
+++ b/api/peerconnectioninterface.h
@@ -112,7 +112,6 @@
#include "rtc_base/rtccertificate.h"
#include "rtc_base/rtccertificategenerator.h"
#include "rtc_base/socketaddress.h"
-#include "rtc_base/ssladapter.h"
#include "rtc_base/sslcertificate.h"
#include "rtc_base/sslstreamadapter.h"
@@ -188,7 +187,6 @@
kIceConnectionMax,
};
- // Deprecated. TODO(diogor, webrtc:9673): Remove from API.
// TLS certificate policy.
enum TlsCertPolicy {
// For TLS based protocols, ensure the connection is secure by not
@@ -213,29 +211,23 @@
std::vector<std::string> urls;
std::string username;
std::string password;
- // Deprecated. rtc::SSLConfig should be used instead.
TlsCertPolicy tls_cert_policy = kTlsCertPolicySecure;
// If the URIs in |urls| only contain IP addresses, this field can be used
// to indicate the hostname, which may be necessary for TLS (using the SNI
// extension). If |urls| itself contains the hostname, this isn't
// necessary.
std::string hostname;
- // Deprecated. rtc::SSLConfig should be used instead.
// List of protocols to be used in the TLS ALPN extension.
std::vector<std::string> tls_alpn_protocols;
- // Deprecated. rtc::SSLConfig should be used instead.
// List of elliptic curves to be used in the TLS elliptic curves extension.
std::vector<std::string> tls_elliptic_curves;
- // SSL configuration options for any SSL/TLS connections to this IceServer.
- rtc::SSLConfig ssl_config;
bool operator==(const IceServer& o) const {
return uri == o.uri && urls == o.urls && username == o.username &&
password == o.password && tls_cert_policy == o.tls_cert_policy &&
hostname == o.hostname &&
tls_alpn_protocols == o.tls_alpn_protocols &&
- tls_elliptic_curves == o.tls_elliptic_curves &&
- ssl_config == o.ssl_config;
+ tls_elliptic_curves == o.tls_elliptic_curves;
}
bool operator!=(const IceServer& o) const { return !(*this == o); }
};
diff --git a/p2p/base/basicpacketsocketfactory.cc b/p2p/base/basicpacketsocketfactory.cc
index c80a408..b7eb8ed 100644
--- a/p2p/base/basicpacketsocketfactory.cc
+++ b/p2p/base/basicpacketsocketfactory.cc
@@ -157,7 +157,12 @@
return NULL;
}
- ssl_adapter->SetSSLConfig(tcp_options.ssl_config);
+ if (tlsOpts & PacketSocketFactory::OPT_TLS_INSECURE) {
+ ssl_adapter->SetIgnoreBadCert(true);
+ }
+
+ ssl_adapter->SetAlpnProtocols(tcp_options.tls_alpn_protocols);
+ ssl_adapter->SetEllipticCurves(tcp_options.tls_elliptic_curves);
ssl_adapter->SetCertVerifier(tcp_options.tls_cert_verifier);
socket = ssl_adapter;
diff --git a/p2p/base/packetsocketfactory.h b/p2p/base/packetsocketfactory.h
index bbde113..4667bb1 100644
--- a/p2p/base/packetsocketfactory.h
+++ b/p2p/base/packetsocketfactory.h
@@ -14,10 +14,8 @@
#include <string>
#include <vector>
-#include "absl/types/optional.h"
#include "rtc_base/constructormagic.h"
#include "rtc_base/proxyinfo.h"
-#include "rtc_base/ssladapter.h"
#include "rtc_base/sslcertificate.h"
namespace rtc {
@@ -28,12 +26,11 @@
~PacketSocketTcpOptions();
int opts = 0;
+ std::vector<std::string> tls_alpn_protocols;
+ std::vector<std::string> tls_elliptic_curves;
// An optional custom SSL certificate verifier that an API user can provide to
// inject their own certificate verification logic.
SSLCertificateVerifier* tls_cert_verifier = nullptr;
-
- // SSL configuration options.
- rtc::SSLConfig ssl_config;
};
class AsyncPacketSocket;
diff --git a/p2p/base/port_unittest.cc b/p2p/base/port_unittest.cc
index b2fe9d0..5aaf315 100644
--- a/p2p/base/port_unittest.cc
+++ b/p2p/base/port_unittest.cc
@@ -537,7 +537,8 @@
return TurnPort::Create(
&main_, socket_factory, MakeNetwork(addr), 0, 0, username_, password_,
ProtocolAddress(server_addr, int_proto), kRelayCredentials, 0,
- std::string(), nullptr, rtc::SSLConfig(), nullptr);
+ std::string(), std::vector<std::string>(), std::vector<std::string>(),
+ nullptr, nullptr);
}
RelayPort* CreateGturnPort(const SocketAddress& addr,
ProtocolType int_proto,
diff --git a/p2p/base/portallocator.h b/p2p/base/portallocator.h
index 356b1f1..8bd7096 100644
--- a/p2p/base/portallocator.h
+++ b/p2p/base/portallocator.h
@@ -20,7 +20,6 @@
#include "p2p/base/portinterface.h"
#include "rtc_base/helpers.h"
#include "rtc_base/proxyinfo.h"
-#include "rtc_base/ssladapter.h"
#include "rtc_base/sslcertificate.h"
#include "rtc_base/third_party/sigslot/sigslot.h"
#include "rtc_base/thread.h"
@@ -119,6 +118,17 @@
CF_ALL = 0x7,
};
+// TLS certificate policy.
+enum class TlsCertPolicy {
+ // For TLS based protocols, ensure the connection is secure by not
+ // circumventing certificate validation.
+ TLS_CERT_POLICY_SECURE,
+ // For TLS based protocols, disregard security completely by skipping
+ // certificate validation. This is insecure and should never be used unless
+ // security is irrelevant in that particular context.
+ TLS_CERT_POLICY_INSECURE_NO_CHECK,
+};
+
// TODO(deadbeef): Rename to TurnCredentials (and username to ufrag).
struct RelayCredentials {
RelayCredentials() {}
@@ -134,17 +144,6 @@
std::string password;
};
-// TLS certificate policy.
-enum class TlsCertPolicy {
- // For TLS based protocols, ensure the connection is secure by not
- // circumventing certificate validation.
- TLS_CERT_POLICY_SECURE,
- // For TLS based protocols, disregard security completely by skipping
- // certificate validation. This is insecure and should never be used unless
- // security is irrelevant in that particular context.
- TLS_CERT_POLICY_INSECURE_NO_CHECK,
-};
-
typedef std::vector<ProtocolAddress> PortList;
// TODO(deadbeef): Rename to TurnServerConfig.
struct RelayServerConfig {
@@ -181,7 +180,6 @@
TlsCertPolicy tls_cert_policy = TlsCertPolicy::TLS_CERT_POLICY_SECURE;
std::vector<std::string> tls_alpn_protocols;
std::vector<std::string> tls_elliptic_curves;
- rtc::SSLConfig ssl_config;
rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr;
};
diff --git a/p2p/base/testturnserver.h b/p2p/base/testturnserver.h
index 61a2e10..734ca4d 100644
--- a/p2p/base/testturnserver.h
+++ b/p2p/base/testturnserver.h
@@ -110,12 +110,7 @@
adapter->SetRole(rtc::SSL_SERVER);
adapter->SetIdentity(
rtc::SSLIdentity::Generate(common_name, rtc::KeyParams()));
- rtc::SSLConfig ssl_config;
- if (ignore_bad_cert) {
- ssl_config.tls_cert_policy =
- rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
- }
- adapter->SetSSLConfig(ssl_config);
+ adapter->SetIgnoreBadCert(ignore_bad_cert);
socket = adapter;
}
socket->Bind(int_addr);
diff --git a/p2p/base/turnport.cc b/p2p/base/turnport.cc
index a406d13..0883534 100644
--- a/p2p/base/turnport.cc
+++ b/p2p/base/turnport.cc
@@ -244,47 +244,8 @@
username,
password),
server_address_(server_address),
- tls_cert_verifier_(tls_cert_verifier),
- credentials_(credentials),
- socket_(NULL),
- resolver_(NULL),
- error_(0),
- request_manager_(thread),
- next_channel_number_(TURN_CHANNEL_NUMBER_START),
- state_(STATE_CONNECTING),
- server_priority_(server_priority),
- allocate_mismatch_retries_(0),
- turn_customizer_(customizer) {
- ssl_config_.tls_alpn_protocols = tls_alpn_protocols;
- ssl_config_.tls_elliptic_curves = tls_elliptic_curves;
- request_manager_.SignalSendPacket.connect(this, &TurnPort::OnSendStunPacket);
- request_manager_.set_origin(origin);
-}
-
-TurnPort::TurnPort(rtc::Thread* thread,
- rtc::PacketSocketFactory* factory,
- rtc::Network* network,
- uint16_t min_port,
- uint16_t max_port,
- const std::string& username,
- const std::string& password,
- const ProtocolAddress& server_address,
- const RelayCredentials& credentials,
- int server_priority,
- const std::string& origin,
- webrtc::TurnCustomizer* customizer,
- const rtc::SSLConfig& ssl_config,
- rtc::SSLCertificateVerifier* tls_cert_verifier)
- : Port(thread,
- RELAY_PORT_TYPE,
- factory,
- network,
- min_port,
- max_port,
- username,
- password),
- server_address_(server_address),
- ssl_config_(ssl_config),
+ tls_alpn_protocols_(tls_alpn_protocols),
+ tls_elliptic_curves_(tls_elliptic_curves),
tls_cert_verifier_(tls_cert_verifier),
credentials_(credentials),
socket_(NULL),
@@ -328,20 +289,20 @@
return server_address_.proto;
}
-void TurnPort::SetTlsCertPolicy(TlsCertPolicy tls_cert_policy) {
- switch (tls_cert_policy) {
- case TlsCertPolicy::TLS_CERT_POLICY_SECURE:
- ssl_config_.tls_cert_policy = rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE;
- break;
- case TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK:
- ssl_config_.tls_cert_policy =
- rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
- break;
- }
+TlsCertPolicy TurnPort::GetTlsCertPolicy() const {
+ return tls_cert_policy_;
}
-const rtc::SSLConfig& TurnPort::GetSslConfig() const {
- return ssl_config_;
+void TurnPort::SetTlsCertPolicy(TlsCertPolicy tls_cert_policy) {
+ tls_cert_policy_ = tls_cert_policy;
+}
+
+std::vector<std::string> TurnPort::GetTlsAlpnProtocols() const {
+ return tls_alpn_protocols_;
+}
+
+std::vector<std::string> TurnPort::GetTlsEllipticCurves() const {
+ return tls_elliptic_curves_;
}
void TurnPort::PrepareAddress() {
@@ -401,8 +362,8 @@
// Apply server address TLS and insecure bits to options.
if (server_address_.proto == PROTO_TLS) {
- if (ssl_config_.tls_cert_policy ==
- rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK) {
+ if (tls_cert_policy_ ==
+ TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK) {
opts |= rtc::PacketSocketFactory::OPT_TLS_INSECURE;
} else {
opts |= rtc::PacketSocketFactory::OPT_TLS;
@@ -411,8 +372,9 @@
rtc::PacketSocketTcpOptions tcp_options;
tcp_options.opts = opts;
+ tcp_options.tls_alpn_protocols = tls_alpn_protocols_;
+ tcp_options.tls_elliptic_curves = tls_elliptic_curves_;
tcp_options.tls_cert_verifier = tls_cert_verifier_;
- tcp_options.ssl_config = ssl_config_;
socket_ = socket_factory()->CreateClientTcpSocket(
rtc::SocketAddress(Network()->GetBestIP(), 0), server_address_.address,
proxy(), user_agent(), tcp_options);
diff --git a/p2p/base/turnport.h b/p2p/base/turnport.h
index 0d9192f..5955aaf 100644
--- a/p2p/base/turnport.h
+++ b/p2p/base/turnport.h
@@ -22,7 +22,6 @@
#include "p2p/client/basicportallocator.h"
#include "rtc_base/asyncinvoker.h"
#include "rtc_base/asyncpacketsocket.h"
-#include "rtc_base/ssladapter.h"
#include "rtc_base/sslcertificate.h"
namespace rtc {
@@ -67,7 +66,6 @@
customizer);
}
- // Deprecated. TODO(diogor, webrtc:9673): Remove this constructor.
// Create a TURN port that will use a new socket, bound to |network| and
// using a port in the range between |min_port| and |max_port|.
static TurnPort* Create(
@@ -86,34 +84,10 @@
const std::vector<std::string>& tls_elliptic_curves,
webrtc::TurnCustomizer* customizer,
rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr) {
- rtc::SSLConfig ssl_config;
- ssl_config.tls_alpn_protocols = tls_alpn_protocols;
- ssl_config.tls_elliptic_curves = tls_elliptic_curves;
return new TurnPort(thread, factory, network, min_port, max_port, username,
password, server_address, credentials, server_priority,
- origin, customizer, ssl_config, tls_cert_verifier);
- }
-
- // Create a TURN port that will use a new socket, bound to |network| and
- // using a port in the range between |min_port| and |max_port|.
- static TurnPort* Create(
- rtc::Thread* thread,
- rtc::PacketSocketFactory* factory,
- rtc::Network* network,
- uint16_t min_port,
- uint16_t max_port,
- const std::string& username, // ice username.
- const std::string& password, // ice password.
- const ProtocolAddress& server_address,
- const RelayCredentials& credentials,
- int server_priority,
- const std::string& origin,
- webrtc::TurnCustomizer* customizer,
- const rtc::SSLConfig& ssl_config,
- rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr) {
- return new TurnPort(thread, factory, network, min_port, max_port, username,
- password, server_address, credentials, server_priority,
- origin, customizer, ssl_config, tls_cert_verifier);
+ origin, tls_alpn_protocols, tls_elliptic_curves,
+ customizer, tls_cert_verifier);
}
~TurnPort() override;
@@ -130,11 +104,11 @@
ProtocolType GetProtocol() const override;
- // Deprecated. SSLConfig should be used instead.
- // TODO(diogor, webrtc:9673): Remove this.
+ virtual TlsCertPolicy GetTlsCertPolicy() const;
virtual void SetTlsCertPolicy(TlsCertPolicy tls_cert_policy);
- virtual const rtc::SSLConfig& GetSslConfig() const;
+ virtual std::vector<std::string> GetTlsAlpnProtocols() const;
+ virtual std::vector<std::string> GetTlsEllipticCurves() const;
// Release a TURN allocation by sending a refresh with lifetime 0.
// Sets state to STATE_RECEIVEONLY.
@@ -246,21 +220,6 @@
webrtc::TurnCustomizer* customizer,
rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr);
- TurnPort(rtc::Thread* thread,
- rtc::PacketSocketFactory* factory,
- rtc::Network* network,
- uint16_t min_port,
- uint16_t max_port,
- const std::string& username,
- const std::string& password,
- const ProtocolAddress& server_address,
- const RelayCredentials& credentials,
- int server_priority,
- const std::string& origin,
- webrtc::TurnCustomizer* customizer,
- const rtc::SSLConfig& ssl_config,
- rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr);
-
// NOTE: This method needs to be accessible for StacPort
// return true if entry was created (i.e channel_number consumed).
bool CreateOrRefreshEntry(const rtc::SocketAddress& addr,
@@ -345,7 +304,9 @@
size_t size, bool payload);
ProtocolAddress server_address_;
- rtc::SSLConfig ssl_config_;
+ TlsCertPolicy tls_cert_policy_ = TlsCertPolicy::TLS_CERT_POLICY_SECURE;
+ std::vector<std::string> tls_alpn_protocols_;
+ std::vector<std::string> tls_elliptic_curves_;
rtc::SSLCertificateVerifier* tls_cert_verifier_;
RelayCredentials credentials_;
AttemptedServerSet attempted_server_addresses_;
diff --git a/p2p/base/turnport_unittest.cc b/p2p/base/turnport_unittest.cc
index 73f469d..bac35e8 100644
--- a/p2p/base/turnport_unittest.cc
+++ b/p2p/base/turnport_unittest.cc
@@ -270,16 +270,21 @@
const ProtocolAddress& server_address,
const std::string& origin) {
RelayCredentials credentials(username, password);
- rtc::SSLConfig ssl_config;
- ssl_config.tls_cert_policy =
- rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
- turn_port_.reset(TurnPort::Create(&main_, &socket_factory_, network, 0, 0,
- kIceUfrag1, kIcePwd1, server_address,
- credentials, 0, origin,
- turn_customizer_.get(), ssl_config));
+ turn_port_.reset(TurnPort::Create(
+ &main_, &socket_factory_, network, 0, 0, kIceUfrag1, kIcePwd1,
+ server_address, credentials, 0, origin, std::vector<std::string>(),
+ std::vector<std::string>(), turn_customizer_.get()));
// This TURN port will be the controlling.
turn_port_->SetIceRole(ICEROLE_CONTROLLING);
ConnectSignals();
+
+ if (server_address.proto == cricket::PROTO_TLS) {
+ // The test TURN server has a self-signed certificate so will not pass
+ // the normal client validation. Instruct the client to ignore certificate
+ // errors for testing only.
+ turn_port_->SetTlsCertPolicy(
+ TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK);
+ }
}
void CreateSharedTurnPort(const std::string& username,
diff --git a/p2p/client/turnportfactory.cc b/p2p/client/turnportfactory.cc
index 68ceff4..6404134 100644
--- a/p2p/client/turnportfactory.cc
+++ b/p2p/client/turnportfactory.cc
@@ -26,29 +26,20 @@
args.username, args.password, *args.server_address,
args.config->credentials, args.config->priority, args.origin,
args.turn_customizer);
+ port->SetTlsCertPolicy(args.config->tls_cert_policy);
return std::unique_ptr<Port>(port);
}
std::unique_ptr<Port> TurnPortFactory::Create(const CreateRelayPortArgs& args,
int min_port,
int max_port) {
- rtc::SSLConfig ssl_config = args.config->ssl_config;
- if (!args.config->tls_alpn_protocols.empty()) {
- ssl_config.tls_alpn_protocols = args.config->tls_alpn_protocols;
- }
- if (!args.config->tls_elliptic_curves.empty()) {
- ssl_config.tls_elliptic_curves = args.config->tls_elliptic_curves;
- }
- if (args.config->tls_cert_policy ==
- TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK) {
- ssl_config.tls_cert_policy =
- rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
- }
TurnPort* port = TurnPort::Create(
args.network_thread, args.socket_factory, args.network, min_port,
max_port, args.username, args.password, *args.server_address,
args.config->credentials, args.config->priority, args.origin,
- args.turn_customizer, ssl_config, args.config->tls_cert_verifier);
+ args.config->tls_alpn_protocols, args.config->tls_elliptic_curves,
+ args.turn_customizer, args.config->tls_cert_verifier);
+ port->SetTlsCertPolicy(args.config->tls_cert_policy);
return std::unique_ptr<Port>(port);
}
diff --git a/pc/iceserverparsing.cc b/pc/iceserverparsing.cc
index 74d1ed2..806fb3b 100644
--- a/pc/iceserverparsing.cc
+++ b/pc/iceserverparsing.cc
@@ -14,7 +14,6 @@
#include <string>
#include "rtc_base/arraysize.h"
-#include "rtc_base/ssladapter.h"
namespace webrtc {
@@ -255,22 +254,13 @@
}
cricket::RelayServerConfig config = cricket::RelayServerConfig(
socket_address, username, server.password, turn_transport_type);
-
- config.ssl_config = server.ssl_config;
-
if (server.tls_cert_policy ==
PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck) {
- config.ssl_config.tls_cert_policy =
- rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
+ config.tls_cert_policy =
+ cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
}
- if (!server.ssl_config.tls_alpn_protocols.has_value() &&
- !server.tls_alpn_protocols.empty()) {
- config.ssl_config.tls_alpn_protocols = server.tls_alpn_protocols;
- }
- if (!server.ssl_config.tls_elliptic_curves.has_value() &&
- !server.tls_elliptic_curves.empty()) {
- config.ssl_config.tls_elliptic_curves = server.tls_elliptic_curves;
- }
+ config.tls_alpn_protocols = server.tls_alpn_protocols;
+ config.tls_elliptic_curves = server.tls_elliptic_curves;
turn_servers->push_back(config);
break;
diff --git a/pc/iceserverparsing_unittest.cc b/pc/iceserverparsing_unittest.cc
index b95f9a5..4ec7a89 100644
--- a/pc/iceserverparsing_unittest.cc
+++ b/pc/iceserverparsing_unittest.cc
@@ -86,16 +86,16 @@
EXPECT_EQ(0U, stun_servers_.size());
EXPECT_EQ(1U, turn_servers_.size());
EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto);
- EXPECT_TRUE(turn_servers_[0].ssl_config.tls_cert_policy ==
- rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE);
+ EXPECT_TRUE(turn_servers_[0].tls_cert_policy ==
+ cricket::TlsCertPolicy::TLS_CERT_POLICY_SECURE);
EXPECT_TRUE(ParseUrl(
"turns:hostname", "username", "password",
PeerConnectionInterface::TlsCertPolicy::kTlsCertPolicyInsecureNoCheck));
EXPECT_EQ(0U, stun_servers_.size());
EXPECT_EQ(1U, turn_servers_.size());
- EXPECT_TRUE(turn_servers_[0].ssl_config.tls_cert_policy ==
- rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK);
+ EXPECT_TRUE(turn_servers_[0].tls_cert_policy ==
+ cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK);
EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto);
// invalid prefixes
diff --git a/rtc_base/openssladapter.cc b/rtc_base/openssladapter.cc
index 2662b37..50284a6 100644
--- a/rtc_base/openssladapter.cc
+++ b/rtc_base/openssladapter.cc
@@ -209,6 +209,7 @@
ssl_(nullptr),
ssl_ctx_(nullptr),
ssl_mode_(SSL_MODE_TLS),
+ ignore_bad_cert_(false),
custom_cert_verifier_status_(false) {
// If a factory is used, take a reference on the factory's SSL_CTX.
// Otherwise, we'll create our own later.
@@ -225,8 +226,16 @@
Cleanup();
}
-void OpenSSLAdapter::SetSSLConfig(const SSLConfig& ssl_config) {
- ssl_config_ = ssl_config;
+void OpenSSLAdapter::SetIgnoreBadCert(bool ignore) {
+ ignore_bad_cert_ = ignore;
+}
+
+void OpenSSLAdapter::SetAlpnProtocols(const std::vector<std::string>& protos) {
+ alpn_protocols_ = protos;
+}
+
+void OpenSSLAdapter::SetEllipticCurves(const std::vector<std::string>& curves) {
+ elliptic_curves_ = curves;
}
void OpenSSLAdapter::SetMode(SSLMode mode) {
@@ -260,7 +269,7 @@
SSLAdapter* adapter = SSLAdapter::Create(socket);
adapter->SetIdentity(identity_->GetReference());
adapter->SetRole(rtc::SSL_SERVER);
- adapter->SetSSLConfig(ssl_config_);
+ adapter->SetIgnoreBadCert(ignore_bad_cert_);
adapter->StartSSL("", false);
return adapter;
}
@@ -358,28 +367,13 @@
}
#ifdef OPENSSL_IS_BORINGSSL
- // Potentially set a couple common TLS extensions; even though we don't use
- // them yet.
- if (ssl_config_.enable_ocsp_stapling) {
- SSL_enable_ocsp_stapling(ssl_);
- }
- if (ssl_config_.enable_signed_cert_timestamp) {
- SSL_enable_signed_cert_timestamps(ssl_);
- }
- SSL_CTX_set_grease_enabled(ssl_ctx_, ssl_config_.enable_grease);
+ // Set a couple common TLS extensions; even though we don't use them yet.
+ SSL_enable_ocsp_stapling(ssl_);
+ SSL_enable_signed_cert_timestamps(ssl_);
#endif
- if (ssl_config_.max_ssl_version.has_value()) {
- SSL_set_max_proto_version(ssl_, ssl_config_.max_ssl_version.value());
- }
-
- if (ssl_config_.enable_tls_channel_id) {
- SSL_enable_tls_channel_id(ssl_);
- }
-
- if (ssl_config_.tls_alpn_protocols.has_value()) {
- std::string tls_alpn_string =
- TransformAlpnProtocols(ssl_config_.tls_alpn_protocols.value());
+ if (!alpn_protocols_.empty()) {
+ std::string tls_alpn_string = TransformAlpnProtocols(alpn_protocols_);
if (!tls_alpn_string.empty()) {
SSL_set_alpn_protos(
ssl_, reinterpret_cast<const unsigned char*>(tls_alpn_string.data()),
@@ -387,9 +381,8 @@
}
}
- if (ssl_config_.tls_elliptic_curves.has_value()) {
- SSL_set1_curves_list(
- ssl_, rtc::join(ssl_config_.tls_elliptic_curves.value(), ':').c_str());
+ if (!elliptic_curves_.empty()) {
+ SSL_set1_curves_list(ssl_, rtc::join(elliptic_curves_, ':').c_str());
}
// Now that the initial config is done, transfer ownership of |bio| to the
@@ -801,10 +794,10 @@
openssl::VerifyPeerCertMatchesHost(ssl, host) &&
(SSL_get_verify_result(ssl) == X509_V_OK || custom_cert_verifier_status_);
- if (!is_valid_cert_name && ShouldIgnoreBadCert()) {
+ if (!is_valid_cert_name && ignore_bad_cert_) {
RTC_DLOG(LS_WARNING) << "Other TLS post connection checks failed. "
- "TLS cert policy set to ignore bad certs. "
- "Overriding name verification failure!";
+ "ignore_bad_cert_ set to true. Overriding name "
+ "verification failure!";
is_valid_cert_name = true;
}
return is_valid_cert_name;
@@ -877,7 +870,7 @@
}
// Should only be used for debugging and development.
- if (!ok && stream->ShouldIgnoreBadCert()) {
+ if (!ok && stream->ignore_bad_cert_) {
RTC_DLOG(LS_WARNING) << "Ignoring cert error while verifying cert chain";
ok = 1;
}
@@ -948,11 +941,6 @@
return ctx;
}
-bool OpenSSLAdapter::ShouldIgnoreBadCert() {
- return ssl_config_.tls_cert_policy ==
- TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
-}
-
std::string TransformAlpnProtocols(
const std::vector<std::string>& alpn_protocols) {
// Transforms the alpn_protocols list to the format expected by
diff --git a/rtc_base/openssladapter.h b/rtc_base/openssladapter.h
index 9455f0f..50a7c08 100644
--- a/rtc_base/openssladapter.h
+++ b/rtc_base/openssladapter.h
@@ -45,7 +45,9 @@
SSLCertificateVerifier* ssl_cert_verifier = nullptr);
~OpenSSLAdapter() override;
- void SetSSLConfig(const SSLConfig& ssl_config) override;
+ void SetIgnoreBadCert(bool ignore) override;
+ void SetAlpnProtocols(const std::vector<std::string>& protos) override;
+ void SetEllipticCurves(const std::vector<std::string>& curves) override;
void SetMode(SSLMode mode) override;
void SetCertVerifier(SSLCertificateVerifier* ssl_cert_verifier) override;
void SetIdentity(SSLIdentity* identity) override;
@@ -93,9 +95,6 @@
void Error(const char* context, int err, bool signal = true);
void Cleanup();
- // If true, the server certificate need not match the configured hostname.
- bool ShouldIgnoreBadCert();
-
// Return value and arguments have the same meanings as for Send; |error| is
// an output parameter filled with the result of SSL_get_error.
int DoSslWrite(const void* pv, size_t cb, int* error);
@@ -139,8 +138,12 @@
std::string ssl_host_name_;
// Set the adapter to DTLS or TLS mode before creating the context.
SSLMode ssl_mode_;
- // SSL configuration for this session.
- SSLConfig ssl_config_;
+ // If true, the server certificate need not match the configured hostname.
+ bool ignore_bad_cert_;
+ // List of protocols to be used in the TLS ALPN extension.
+ std::vector<std::string> alpn_protocols_;
+ // List of elliptic curves to be used in the TLS elliptic curves extension.
+ std::vector<std::string> elliptic_curves_;
// Holds the result of the call to run of the ssl_cert_verify_->Verify()
bool custom_cert_verifier_status_;
};
diff --git a/rtc_base/ssladapter.cc b/rtc_base/ssladapter.cc
index debbd65..e091f00 100644
--- a/rtc_base/ssladapter.cc
+++ b/rtc_base/ssladapter.cc
@@ -16,12 +16,6 @@
namespace rtc {
-SSLConfig::SSLConfig() = default;
-SSLConfig::SSLConfig(const SSLConfig&) = default;
-SSLConfig::~SSLConfig() = default;
-
-///////////////////////////////////////////////////////////////////////////////
-
SSLAdapterFactory* SSLAdapterFactory::Create() {
return new OpenSSLAdapterFactory();
}
diff --git a/rtc_base/ssladapter.h b/rtc_base/ssladapter.h
index 33f008c..4843d26 100644
--- a/rtc_base/ssladapter.h
+++ b/rtc_base/ssladapter.h
@@ -22,57 +22,6 @@
class SSLAdapter;
-// TLS certificate policy.
-enum class TlsCertPolicy {
- // For TLS based protocols, ensure the connection is secure by not
- // circumventing certificate validation.
- TLS_CERT_POLICY_SECURE,
- // For TLS based protocols, disregard security completely by skipping
- // certificate validation. This is insecure and should never be used unless
- // security is irrelevant in that particular context.
- // Do not set to this value in production code.
- // TODO(juberti): Remove the opportunistic encryption mechanism in
- // BasicPacketSocketFactory that uses this value.
- TLS_CERT_POLICY_INSECURE_NO_CHECK,
-};
-
-// SSL configuration options.
-struct SSLConfig final {
- SSLConfig();
- SSLConfig(const SSLConfig&);
- ~SSLConfig();
-
- bool operator==(const SSLConfig& o) const {
- return enable_ocsp_stapling == o.enable_ocsp_stapling &&
- enable_signed_cert_timestamp == o.enable_signed_cert_timestamp &&
- enable_tls_channel_id == o.enable_tls_channel_id &&
- enable_grease == o.enable_grease &&
- max_ssl_version == o.max_ssl_version &&
- tls_alpn_protocols == o.tls_alpn_protocols &&
- tls_elliptic_curves == o.tls_elliptic_curves;
- }
- bool operator!=(const SSLConfig& o) const { return !(*this == o); }
-
- // If true, enables the (unused) OCSP stapling TLS extension.
- bool enable_ocsp_stapling = true;
- // If true, enables the (unused) signed certificate timestamp TLS extension.
- bool enable_signed_cert_timestamp = true;
- // If true, enables the (unused) channel ID TLS extension.
- bool enable_tls_channel_id = false;
- // If true, enables the (unused) GREASE TLS extension.
- bool enable_grease = false;
- // Indicates how to process incoming certificates.
- TlsCertPolicy tls_cert_policy = TlsCertPolicy::TLS_CERT_POLICY_SECURE;
- // If set, indicates the highest supported SSL version.
- absl::optional<int> max_ssl_version;
- // If set, indicates the list of protocols to be used in the TLS ALPN
- // extension.
- absl::optional<std::vector<std::string>> tls_alpn_protocols;
- // If set, indicates the list of curves to be used in the TLS elliptic curves
- // extension.
- absl::optional<std::vector<std::string>> tls_elliptic_curves;
-};
-
// Class for creating SSL adapters with shared state, e.g., a session cache,
// which allows clients to resume SSL sessions to previously-contacted hosts.
// Clients should create the factory using Create(), set up the factory as
@@ -103,8 +52,14 @@
public:
explicit SSLAdapter(AsyncSocket* socket) : AsyncSocketAdapter(socket) {}
- // Sets the SSL configuration for this session.
- virtual void SetSSLConfig(const SSLConfig& ssl_config) = 0;
+ // Methods that control server certificate verification, used in unit tests.
+ // Do not call these methods in production code.
+ // TODO(juberti): Remove the opportunistic encryption mechanism in
+ // BasicPacketSocketFactory that uses this function.
+ virtual void SetIgnoreBadCert(bool ignore) = 0;
+
+ virtual void SetAlpnProtocols(const std::vector<std::string>& protos) = 0;
+ virtual void SetEllipticCurves(const std::vector<std::string>& curves) = 0;
// Do DTLS or TLS (default is TLS, if unspecified)
virtual void SetMode(SSLMode mode) = 0;
diff --git a/rtc_base/ssladapter_unittest.cc b/rtc_base/ssladapter_unittest.cc
index 130cf1f..ec532b1 100644
--- a/rtc_base/ssladapter_unittest.cc
+++ b/rtc_base/ssladapter_unittest.cc
@@ -67,9 +67,7 @@
// Ignore any certificate errors for the purpose of testing.
// Note: We do this only because we don't have a real certificate.
// NEVER USE THIS IN PRODUCTION CODE!
- ssl_config_.tls_cert_policy =
- rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
- ssl_adapter_->SetSSLConfig(ssl_config_);
+ ssl_adapter_->SetIgnoreBadCert(true);
ssl_adapter_->SignalReadEvent.connect(
this, &SSLAdapterTestDummyClient::OnSSLAdapterReadEvent);
@@ -77,52 +75,22 @@
this, &SSLAdapterTestDummyClient::OnSSLAdapterCloseEvent);
}
- void SetTlsCertPolicy(rtc::TlsCertPolicy tls_cert_policy) {
- ssl_config_.tls_cert_policy = tls_cert_policy;
- ssl_adapter_->SetSSLConfig(ssl_config_);
- }
-
- void SetEnableOcspStapling(bool enable_ocsp_stapling) {
- ssl_config_.enable_ocsp_stapling = enable_ocsp_stapling;
- ssl_adapter_->SetSSLConfig(ssl_config_);
- }
-
- void SetEnableSignedCertTimestamp(bool enable_signed_cert_timestamp) {
- ssl_config_.enable_signed_cert_timestamp = enable_signed_cert_timestamp;
- ssl_adapter_->SetSSLConfig(ssl_config_);
- }
-
- void SetEnableTlsChannelId(bool enable_tls_channel_id) {
- ssl_config_.enable_tls_channel_id = enable_tls_channel_id;
- ssl_adapter_->SetSSLConfig(ssl_config_);
- }
-
- void SetEnableGrease(bool enable_grease) {
- ssl_config_.enable_grease = enable_grease;
- ssl_adapter_->SetSSLConfig(ssl_config_);
- }
-
- void SetMaxSslVersion(const absl::optional<int>& max_ssl_version) {
- ssl_config_.max_ssl_version = max_ssl_version;
- ssl_adapter_->SetSSLConfig(ssl_config_);
- }
-
- void SetAlpnProtocols(
- const absl::optional<std::vector<std::string>>& tls_alpn_protocols) {
- ssl_config_.tls_alpn_protocols = tls_alpn_protocols;
- ssl_adapter_->SetSSLConfig(ssl_config_);
- }
-
- void SetEllipticCurves(
- const absl::optional<std::vector<std::string>>& tls_elliptic_curves) {
- ssl_config_.tls_elliptic_curves = tls_elliptic_curves;
- ssl_adapter_->SetSSLConfig(ssl_config_);
+ void SetIgnoreBadCert(bool ignore_bad_cert) {
+ ssl_adapter_->SetIgnoreBadCert(ignore_bad_cert);
}
void SetCertVerifier(rtc::SSLCertificateVerifier* ssl_cert_verifier) {
ssl_adapter_->SetCertVerifier(ssl_cert_verifier);
}
+ void SetAlpnProtocols(const std::vector<std::string>& protos) {
+ ssl_adapter_->SetAlpnProtocols(protos);
+ }
+
+ void SetEllipticCurves(const std::vector<std::string>& curves) {
+ ssl_adapter_->SetEllipticCurves(curves);
+ }
+
rtc::SocketAddress GetAddress() const {
return ssl_adapter_->GetLocalAddress();
}
@@ -186,8 +154,6 @@
std::unique_ptr<rtc::SSLAdapter> ssl_adapter_;
- rtc::SSLConfig ssl_config_;
-
std::string data_;
};
@@ -339,51 +305,29 @@
void SetHandshakeWait(int wait) { handshake_wait_ = wait; }
- void SetTlsCertPolicy(rtc::TlsCertPolicy tls_cert_policy) {
- client_->SetTlsCertPolicy(tls_cert_policy);
- }
-
- void SetEnableOcspStapling(bool enable_ocsp_stapling) {
- client_->SetEnableOcspStapling(enable_ocsp_stapling);
- }
-
- void SetEnableSignedCertTimestamp(bool enable_signed_cert_timestamp) {
- client_->SetEnableSignedCertTimestamp(enable_signed_cert_timestamp);
- }
-
- void SetEnableTlsChannelId(bool enable_tls_channel_id) {
- client_->SetEnableTlsChannelId(enable_tls_channel_id);
- }
-
- void SetEnableGrease(bool enable_grease) {
- client_->SetEnableGrease(enable_grease);
- }
-
- void SetMaxSslVersion(const absl::optional<int>& max_ssl_version) {
- client_->SetMaxSslVersion(max_ssl_version);
- }
-
- void SetAlpnProtocols(
- const absl::optional<std::vector<std::string>>& tls_alpn_protocols) {
- client_->SetAlpnProtocols(tls_alpn_protocols);
- }
-
- void SetEllipticCurves(
- const absl::optional<std::vector<std::string>>& tls_elliptic_curves) {
- client_->SetEllipticCurves(tls_elliptic_curves);
+ void SetIgnoreBadCert(bool ignore_bad_cert) {
+ client_->SetIgnoreBadCert(ignore_bad_cert);
}
void SetCertVerifier(rtc::SSLCertificateVerifier* ssl_cert_verifier) {
client_->SetCertVerifier(ssl_cert_verifier);
}
+ void SetAlpnProtocols(const std::vector<std::string>& protos) {
+ client_->SetAlpnProtocols(protos);
+ }
+
+ void SetEllipticCurves(const std::vector<std::string>& curves) {
+ client_->SetEllipticCurves(curves);
+ }
+
void SetMockCertVerifier(bool return_value) {
auto mock_verifier = absl::make_unique<MockCertVerifier>();
EXPECT_CALL(*mock_verifier, Verify(_)).WillRepeatedly(Return(return_value));
cert_verifier_ =
std::unique_ptr<rtc::SSLCertificateVerifier>(std::move(mock_verifier));
- SetTlsCertPolicy(rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE);
+ SetIgnoreBadCert(false);
SetCertVerifier(cert_verifier_.get());
}
@@ -581,76 +525,6 @@
TestTransfer("Hello, world!");
}
-// Test transfer with OCSP stapling enabled
-TEST_F(SSLAdapterTestTLS_ECDSA, TestOcspStaplingEnabled) {
- SetEnableOcspStapling(true);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// Test transfer with OCSP stapling disabled
-TEST_F(SSLAdapterTestTLS_ECDSA, TestOcspStaplingDisabled) {
- SetEnableOcspStapling(false);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// test transfer with signed cert timestamp enabled
-TEST_F(SSLAdapterTestTLS_ECDSA, TestSignedCertTimestampEnabled) {
- SetEnableSignedCertTimestamp(true);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// Test transfer with signed cert timestamp disabled
-TEST_F(SSLAdapterTestTLS_ECDSA, TestSignedCertTimestampDisabled) {
- SetEnableSignedCertTimestamp(false);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// Test transfer with TLS channel ID enabled
-TEST_F(SSLAdapterTestTLS_ECDSA, TestTLSChannelIdEnabled) {
- SetEnableTlsChannelId(true);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// Test transfer with TLS channel ID disabled
-TEST_F(SSLAdapterTestTLS_ECDSA, TestTLSChannelIdDisabled) {
- SetEnableTlsChannelId(false);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// Test transfer with GREASE enabled
-TEST_F(SSLAdapterTestTLS_ECDSA, TestGreaseEnabled) {
- SetEnableGrease(true);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// Test transfer with GREASE disabled
-TEST_F(SSLAdapterTestTLS_ECDSA, TestGreaseDisabled) {
- SetEnableGrease(false);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// Test transfer with TLS1_3.
-TEST_F(SSLAdapterTestTLS_ECDSA, TestMaxSSLVersionTLS1_3) {
- SetMaxSslVersion(0x0304 /* TLS1_3 */);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
-// Test transfer with TLS1_2.
-TEST_F(SSLAdapterTestTLS_ECDSA, TestMaxSSLVersionTLS1_2) {
- SetMaxSslVersion(0x0303 /* TLS1_2 */);
- TestHandshake(true);
- TestTransfer("Hello, world!");
-}
-
// Test transfer using ALPN with protos as h2 and http/1.1
TEST_F(SSLAdapterTestTLS_ECDSA, TestTLSALPN) {
std::vector<std::string> alpn_protos{"h2", "http/1.1"};
diff --git a/sdk/BUILD.gn b/sdk/BUILD.gn
index 4930ad5..36909e2 100644
--- a/sdk/BUILD.gn
+++ b/sdk/BUILD.gn
@@ -870,9 +870,6 @@
"objc/api/peerconnection/RTCRtpTransceiver.mm",
"objc/api/peerconnection/RTCSSLAdapter.h",
"objc/api/peerconnection/RTCSSLAdapter.mm",
- "objc/api/peerconnection/RTCSSLConfig+Native.h",
- "objc/api/peerconnection/RTCSSLConfig.h",
- "objc/api/peerconnection/RTCSSLConfig.mm",
"objc/api/peerconnection/RTCSessionDescription+Private.h",
"objc/api/peerconnection/RTCSessionDescription.h",
"objc/api/peerconnection/RTCSessionDescription.mm",
@@ -988,7 +985,6 @@
"objc/Framework/Headers/WebRTC/RTCRtpSender.h",
"objc/Framework/Headers/WebRTC/RTCRtpTransceiver.h",
"objc/Framework/Headers/WebRTC/RTCSSLAdapter.h",
- "objc/Framework/Headers/WebRTC/RTCSSLConfig.h",
"objc/Framework/Headers/WebRTC/RTCSessionDescription.h",
"objc/Framework/Headers/WebRTC/RTCTracing.h",
"objc/Framework/Headers/WebRTC/RTCVideoCapturer.h",
diff --git a/sdk/android/BUILD.gn b/sdk/android/BUILD.gn
index 1013f0b..080684a 100644
--- a/sdk/android/BUILD.gn
+++ b/sdk/android/BUILD.gn
@@ -306,7 +306,6 @@
"api/org/webrtc/RtpSender.java",
"api/org/webrtc/RtpTransceiver.java",
"api/org/webrtc/SSLCertificateVerifier.java",
- "api/org/webrtc/SslConfig.java",
"api/org/webrtc/SdpObserver.java",
"api/org/webrtc/SessionDescription.java",
"api/org/webrtc/StatsObserver.java",
@@ -649,8 +648,6 @@
"src/jni/pc/sessiondescription.h",
"src/jni/pc/sslcertificateverifierwrapper.cc",
"src/jni/pc/sslcertificateverifierwrapper.h",
- "src/jni/pc/sslconfig.cc",
- "src/jni/pc/sslconfig.h",
"src/jni/pc/statsobserver.cc",
"src/jni/pc/statsobserver.h",
"src/jni/pc/turncustomizer.cc",
@@ -1196,7 +1193,6 @@
"api/org/webrtc/SSLCertificateVerifier.java",
"api/org/webrtc/SdpObserver.java",
"api/org/webrtc/SessionDescription.java",
- "api/org/webrtc/SslConfig.java",
"api/org/webrtc/StatsObserver.java",
"api/org/webrtc/StatsReport.java",
"api/org/webrtc/TurnCustomizer.java",
diff --git a/sdk/android/api/org/webrtc/PeerConnection.java b/sdk/android/api/org/webrtc/PeerConnection.java
index 2161711..2f9adcf 100644
--- a/sdk/android/api/org/webrtc/PeerConnection.java
+++ b/sdk/android/api/org/webrtc/PeerConnection.java
@@ -50,7 +50,6 @@
}
}
- // TODO(diogor, webrtc:9673): Remove TlsCertPolicy. It's deprecated, in favor of SslConfig.
/** Tracks PeerConnectionInterface::TlsCertPolicy */
public enum TlsCertPolicy {
TLS_CERT_POLICY_SECURE,
@@ -127,9 +126,7 @@
public final List<String> urls;
public final String username;
public final String password;
- // TODO(diogor, webrtc:9673): Remove tlsCertPolicy from this API.
- // This field will be ignored if tlsCertPolicy is also set in SslConfig.
- @Deprecated public final TlsCertPolicy tlsCertPolicy;
+ public final TlsCertPolicy tlsCertPolicy;
// If the URIs in |urls| only contain IP addresses, this field can be used
// to indicate the hostname, which may be necessary for TLS (using the SNI
@@ -137,18 +134,12 @@
// necessary.
public final String hostname;
- // TODO(diogor, webrtc:9673): Remove tlsAlpnProtocols from this API.
// List of protocols to be used in the TLS ALPN extension.
- @Deprecated public final List<String> tlsAlpnProtocols;
+ public final List<String> tlsAlpnProtocols;
- // TODO(diogor, webrtc:9673): Remove tlsEllipticCurves from this API.
// List of elliptic curves to be used in the TLS elliptic curves extension.
// Only curve names supported by OpenSSL should be used (eg. "P-256","X25519").
- // This field will be ignored if tlsEllipticCurves is also set in SslConfig.
- @Deprecated public final List<String> tlsEllipticCurves;
-
- // SSL configuration options for any SSL/TLS connections to this IceServer.
- public final SslConfig sslConfig;
+ public final List<String> tlsEllipticCurves;
/** Convenience constructor for STUN servers. */
@Deprecated
@@ -170,12 +161,12 @@
public IceServer(String uri, String username, String password, TlsCertPolicy tlsCertPolicy,
String hostname) {
this(uri, Collections.singletonList(uri), username, password, tlsCertPolicy, hostname, null,
- null, SslConfig.builder().createSslConfig());
+ null);
}
private IceServer(String uri, List<String> urls, String username, String password,
TlsCertPolicy tlsCertPolicy, String hostname, List<String> tlsAlpnProtocols,
- List<String> tlsEllipticCurves, SslConfig sslConfig) {
+ List<String> tlsEllipticCurves) {
if (uri == null || urls == null || urls.isEmpty()) {
throw new IllegalArgumentException("uri == null || urls == null || urls.isEmpty()");
}
@@ -201,13 +192,12 @@
this.hostname = hostname;
this.tlsAlpnProtocols = tlsAlpnProtocols;
this.tlsEllipticCurves = tlsEllipticCurves;
- this.sslConfig = sslConfig;
}
@Override
public String toString() {
return urls + " [" + username + ":" + password + "] [" + tlsCertPolicy + "] [" + hostname
- + "] [" + tlsAlpnProtocols + "] [" + tlsEllipticCurves + "] [" + sslConfig + "]";
+ + "] [" + tlsAlpnProtocols + "] [" + tlsEllipticCurves + "]";
}
public static Builder builder(String uri) {
@@ -226,7 +216,6 @@
private String hostname = "";
private List<String> tlsAlpnProtocols;
private List<String> tlsEllipticCurves;
- private SslConfig sslConfig = SslConfig.builder().createSslConfig();
private Builder(List<String> urls) {
if (urls == null || urls.isEmpty()) {
@@ -245,7 +234,6 @@
return this;
}
- @Deprecated
public Builder setTlsCertPolicy(TlsCertPolicy tlsCertPolicy) {
this.tlsCertPolicy = tlsCertPolicy;
return this;
@@ -256,26 +244,19 @@
return this;
}
- @Deprecated
public Builder setTlsAlpnProtocols(List<String> tlsAlpnProtocols) {
this.tlsAlpnProtocols = tlsAlpnProtocols;
return this;
}
- @Deprecated
public Builder setTlsEllipticCurves(List<String> tlsEllipticCurves) {
this.tlsEllipticCurves = tlsEllipticCurves;
return this;
}
- public Builder setSslConfig(SslConfig sslConfig) {
- this.sslConfig = sslConfig;
- return this;
- }
-
public IceServer createIceServer() {
return new IceServer(urls.get(0), urls, username, password, tlsCertPolicy, hostname,
- tlsAlpnProtocols, tlsEllipticCurves, sslConfig);
+ tlsAlpnProtocols, tlsEllipticCurves);
}
}
@@ -317,11 +298,6 @@
List<String> getTlsEllipticCurves() {
return tlsEllipticCurves;
}
-
- @CalledByNative("IceServer")
- SslConfig getSslConfig() {
- return sslConfig;
- }
}
/** Java version of PeerConnectionInterface.IceTransportsType */
diff --git a/sdk/android/api/org/webrtc/SslConfig.java b/sdk/android/api/org/webrtc/SslConfig.java
deleted file mode 100644
index 7a94928..0000000
--- a/sdk/android/api/org/webrtc/SslConfig.java
+++ /dev/null
@@ -1,204 +0,0 @@
-/*
- * Copyright 2018 The WebRTC project authors. All Rights Reserved.
- *
- * Use of this source code is governed by a BSD-style license
- * that can be found in the LICENSE file in the root of the source
- * tree. An additional intellectual property rights grant can be found
- * in the file PATENTS. All contributing project authors may
- * be found in the AUTHORS file in the root of the source tree.
- */
-
-package org.webrtc;
-
-import java.util.Collections;
-import java.util.List;
-import javax.annotation.Nullable;
-
-/**
- * Java version of rtc::SSLConfig.
- *
- * Contains the configuration of any SSL/TLS connections that are initiated by
- * our client.
- */
-public class SslConfig {
- /** Tracks rtc::TlsCertPolicy */
- public enum TlsCertPolicy {
- TLS_CERT_POLICY_SECURE,
- TLS_CERT_POLICY_INSECURE_NO_CHECK,
- }
-
- /** Indicates whether to enable OCSP stapling in TLS. */
- public final boolean enableOcspStapling;
- /** Indicates whether to enable the signed certificate timestamp extension in TLS. */
- public final boolean enableSignedCertTimestamp;
- /** Indicates whether to enable the TLS Channel ID extension. */
- public final boolean enableTlsChannelId;
- /** Indicates whether to enable the TLS GREASE extension. */
- public final boolean enableGrease;
-
- /** Indicates how to process TURN server certificates */
- public final TlsCertPolicy tlsCertPolicy;
-
- /**
- * Highest supported SSL version, as defined in the supported_versions TLS extension.
- * If null, the default OpenSSL/BoringSSL max version will be used.
- */
- @Nullable public final Integer maxSslVersion;
-
- /**
- * List of protocols to be used in the TLS ALPN extension.
- * If null, the default list of OpenSSL/BoringSSL ALPN protocols will be used.
- */
- @Nullable public final List<String> tlsAlpnProtocols;
-
- /**
- * List of elliptic curves to be used in the TLS elliptic curves extension.
- * Only curve names supported by OpenSSL should be used (eg. "P-256","X25519").
- * If null, the default list of OpenSSL/BoringSSL curves will be used.
- */
- @Nullable public final List<String> tlsEllipticCurves;
-
- private SslConfig(boolean enableOcspStapling, boolean enableSignedCertTimestamp,
- boolean enableTlsChannelId, boolean enableGrease, TlsCertPolicy tlsCertPolicy,
- Integer maxSslVersion, List<String> tlsAlpnProtocols, List<String> tlsEllipticCurves) {
- this.enableOcspStapling = enableOcspStapling;
- this.enableSignedCertTimestamp = enableSignedCertTimestamp;
- this.enableTlsChannelId = enableTlsChannelId;
- this.enableGrease = enableGrease;
- this.tlsCertPolicy = tlsCertPolicy;
- this.maxSslVersion = maxSslVersion;
- if (tlsAlpnProtocols != null) {
- this.tlsAlpnProtocols = Collections.unmodifiableList(tlsAlpnProtocols);
- } else {
- this.tlsAlpnProtocols = null;
- }
- if (tlsEllipticCurves != null) {
- this.tlsEllipticCurves = Collections.unmodifiableList(tlsEllipticCurves);
- } else {
- this.tlsEllipticCurves = null;
- }
- }
-
- @Override
- public String toString() {
- return "[enableOcspStapling=" + enableOcspStapling + "] [enableSignedCertTimestamp="
- + enableSignedCertTimestamp + "] [enableTlsChannelId=" + enableTlsChannelId
- + "] [enableGrease=" + enableGrease + "] [tlsCertPolicy=" + tlsCertPolicy
- + "] [maxSslVersion=" + maxSslVersion + "] [tlsAlpnProtocols=" + tlsAlpnProtocols
- + "] [tlsEllipticCurves=" + tlsEllipticCurves + "]";
- }
-
- public static Builder builder() {
- return new Builder();
- }
-
- public static class Builder {
- private boolean enableOcspStapling;
- private boolean enableSignedCertTimestamp;
- private boolean enableTlsChannelId;
- private boolean enableGrease;
- private TlsCertPolicy tlsCertPolicy;
- @Nullable private Integer maxSslVersion;
- @Nullable private List<String> tlsAlpnProtocols;
- @Nullable private List<String> tlsEllipticCurves;
-
- private Builder() {
- this.enableOcspStapling = true;
- this.enableSignedCertTimestamp = true;
- this.enableTlsChannelId = false;
- this.enableGrease = false;
- this.tlsCertPolicy = TlsCertPolicy.TLS_CERT_POLICY_SECURE;
- this.maxSslVersion = null;
- this.tlsAlpnProtocols = null;
- this.tlsEllipticCurves = null;
- }
-
- public Builder setEnableOcspStapling(boolean enableOcspStapling) {
- this.enableOcspStapling = enableOcspStapling;
- return this;
- }
-
- public Builder setEnableSignedCertTimestamp(boolean enableSignedCertTimestamp) {
- this.enableSignedCertTimestamp = enableSignedCertTimestamp;
- return this;
- }
-
- public Builder setEnableTlsChannelId(boolean enableTlsChannelId) {
- this.enableTlsChannelId = enableTlsChannelId;
- return this;
- }
-
- public Builder setEnableGrease(boolean enableGrease) {
- this.enableGrease = enableGrease;
- return this;
- }
-
- public Builder setTlsCertPolicy(TlsCertPolicy tlsCertPolicy) {
- this.tlsCertPolicy = tlsCertPolicy;
- return this;
- }
-
- public Builder setMaxSslVersion(int maxSslVersion) {
- this.maxSslVersion = maxSslVersion;
- return this;
- }
-
- public Builder setTlsAlpnProtocols(List<String> tlsAlpnProtocols) {
- this.tlsAlpnProtocols = tlsAlpnProtocols;
- return this;
- }
-
- public Builder setTlsEllipticCurves(List<String> tlsEllipticCurves) {
- this.tlsEllipticCurves = tlsEllipticCurves;
- return this;
- }
-
- public SslConfig createSslConfig() {
- return new SslConfig(enableOcspStapling, enableSignedCertTimestamp, enableTlsChannelId,
- enableGrease, tlsCertPolicy, maxSslVersion, tlsAlpnProtocols, tlsEllipticCurves);
- }
- }
-
- @CalledByNative
- boolean getEnableOcspStapling() {
- return enableOcspStapling;
- }
-
- @CalledByNative
- boolean getEnableSignedCertTimestamp() {
- return enableSignedCertTimestamp;
- }
-
- @CalledByNative
- boolean getEnableTlsChannelId() {
- return enableTlsChannelId;
- }
-
- @CalledByNative
- boolean getEnableGrease() {
- return enableGrease;
- }
-
- @CalledByNative
- TlsCertPolicy getTlsCertPolicy() {
- return tlsCertPolicy;
- }
-
- @Nullable
- @CalledByNative
- Integer getMaxSslVersion() {
- return maxSslVersion;
- }
-
- @Nullable
- @CalledByNative
- List<String> getTlsAlpnProtocols() {
- return tlsAlpnProtocols;
- }
-
- @Nullable
- @CalledByNative
- List<String> getTlsEllipticCurves() {
- return tlsEllipticCurves;
- }
-}
diff --git a/sdk/android/src/jni/pc/peerconnection.cc b/sdk/android/src/jni/pc/peerconnection.cc
index 1d9f945..79da797 100644
--- a/sdk/android/src/jni/pc/peerconnection.cc
+++ b/sdk/android/src/jni/pc/peerconnection.cc
@@ -51,7 +51,6 @@
#include "sdk/android/src/jni/pc/rtpsender.h"
#include "sdk/android/src/jni/pc/sdpobserver.h"
#include "sdk/android/src/jni/pc/sessiondescription.h"
-#include "sdk/android/src/jni/pc/sslconfig.h"
#include "sdk/android/src/jni/pc/statsobserver.h"
#include "sdk/android/src/jni/pc/turncustomizer.h"
@@ -88,8 +87,6 @@
Java_IceServer_getTlsAlpnProtocols(jni, j_ice_server);
ScopedJavaLocalRef<jobject> tls_elliptic_curves =
Java_IceServer_getTlsEllipticCurves(jni, j_ice_server);
- ScopedJavaLocalRef<jobject> ssl_config =
- Java_IceServer_getSslConfig(jni, j_ice_server);
PeerConnectionInterface::IceServer server;
server.urls = JavaListToNativeVector<std::string, jstring>(
jni, urls, &JavaToNativeString);
@@ -101,7 +98,6 @@
jni, tls_alpn_protocols, &JavaToNativeString);
server.tls_elliptic_curves = JavaListToNativeVector<std::string, jstring>(
jni, tls_elliptic_curves, &JavaToNativeString);
- server.ssl_config = JavaToNativeSslConfig(jni, ssl_config);
ice_servers.push_back(server);
}
return ice_servers;
diff --git a/sdk/android/src/jni/pc/sslconfig.cc b/sdk/android/src/jni/pc/sslconfig.cc
deleted file mode 100644
index 678f49a..0000000
--- a/sdk/android/src/jni/pc/sslconfig.cc
+++ /dev/null
@@ -1,78 +0,0 @@
-
-/*
- * Copyright 2018 The WebRTC project authors. All Rights Reserved.
- *
- * Use of this source code is governed by a BSD-style license
- * that can be found in the LICENSE file in the root of the source
- * tree. An additional intellectual property rights grant can be found
- * in the file PATENTS. All contributing project authors may
- * be found in the AUTHORS file in the root of the source tree.
- */
-
-#include "sdk/android/src/jni/pc/sslconfig.h"
-
-#include <string>
-
-#include "rtc_base/ssladapter.h"
-#include "sdk/android/generated_peerconnection_jni/jni/SslConfig_jni.h"
-#include "sdk/android/native_api/jni/java_types.h"
-#include "sdk/android/src/jni/jni_helpers.h"
-
-namespace webrtc {
-namespace jni {
-
-rtc::TlsCertPolicy JavaToNativeRtcTlsCertPolicy(
- JNIEnv* jni,
- const JavaRef<jobject>& j_ssl_config_tls_cert_policy) {
- std::string enum_name = GetJavaEnumName(jni, j_ssl_config_tls_cert_policy);
-
- if (enum_name == "TLS_CERT_POLICY_SECURE")
- return rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE;
-
- if (enum_name == "TLS_CERT_POLICY_INSECURE_NO_CHECK")
- return rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
-
- RTC_NOTREACHED();
- return rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE;
-}
-
-rtc::SSLConfig JavaToNativeSslConfig(JNIEnv* jni,
- const JavaRef<jobject>& j_ssl_config) {
- rtc::SSLConfig ssl_config;
- ssl_config.enable_ocsp_stapling =
- Java_SslConfig_getEnableOcspStapling(jni, j_ssl_config);
- ssl_config.enable_signed_cert_timestamp =
- Java_SslConfig_getEnableSignedCertTimestamp(jni, j_ssl_config);
- ssl_config.enable_tls_channel_id =
- Java_SslConfig_getEnableTlsChannelId(jni, j_ssl_config);
- ssl_config.enable_grease = Java_SslConfig_getEnableGrease(jni, j_ssl_config);
-
- ScopedJavaLocalRef<jobject> j_ssl_config_max_ssl_version =
- Java_SslConfig_getMaxSslVersion(jni, j_ssl_config);
- ssl_config.max_ssl_version =
- JavaToNativeOptionalInt(jni, j_ssl_config_max_ssl_version);
-
- ScopedJavaLocalRef<jobject> j_ssl_config_tls_cert_policy =
- Java_SslConfig_getTlsCertPolicy(jni, j_ssl_config);
- ssl_config.tls_cert_policy =
- JavaToNativeRtcTlsCertPolicy(jni, j_ssl_config_tls_cert_policy);
-
- ScopedJavaLocalRef<jobject> j_ssl_config_tls_alpn_protocols =
- Java_SslConfig_getTlsAlpnProtocols(jni, j_ssl_config);
- if (!IsNull(jni, j_ssl_config_tls_alpn_protocols)) {
- ssl_config.tls_alpn_protocols =
- JavaListToNativeVector<std::string, jstring>(
- jni, j_ssl_config_tls_alpn_protocols, &JavaToNativeString);
- }
- ScopedJavaLocalRef<jobject> j_ssl_config_tls_elliptic_curves =
- Java_SslConfig_getTlsEllipticCurves(jni, j_ssl_config);
- if (!IsNull(jni, j_ssl_config_tls_elliptic_curves)) {
- ssl_config.tls_elliptic_curves =
- JavaListToNativeVector<std::string, jstring>(
- jni, j_ssl_config_tls_elliptic_curves, &JavaToNativeString);
- }
- return ssl_config;
-}
-
-} // namespace jni
-} // namespace webrtc
diff --git a/sdk/android/src/jni/pc/sslconfig.h b/sdk/android/src/jni/pc/sslconfig.h
deleted file mode 100644
index 38de114..0000000
--- a/sdk/android/src/jni/pc/sslconfig.h
+++ /dev/null
@@ -1,30 +0,0 @@
-/*
- * Copyright 2018 The WebRTC project authors. All Rights Reserved.
- *
- * Use of this source code is governed by a BSD-style license
- * that can be found in the LICENSE file in the root of the source
- * tree. An additional intellectual property rights grant can be found
- * in the file PATENTS. All contributing project authors may
- * be found in the AUTHORS file in the root of the source tree.
- */
-
-#ifndef SDK_ANDROID_SRC_JNI_PC_SSLCONFIG_H_
-#define SDK_ANDROID_SRC_JNI_PC_SSLCONFIG_H_
-
-#include "api/peerconnectioninterface.h"
-#include "sdk/android/native_api/jni/scoped_java_ref.h"
-
-namespace webrtc {
-namespace jni {
-
-rtc::TlsCertPolicy JavaToNativeRtcTlsCertPolicy(
- JNIEnv* jni,
- const JavaRef<jobject>& j_ssl_config_tls_cert_policy);
-
-rtc::SSLConfig JavaToNativeSslConfig(JNIEnv* env,
- const JavaRef<jobject>& j_ssl_config);
-
-} // namespace jni
-} // namespace webrtc
-
-#endif // SDK_ANDROID_SRC_JNI_PC_SSLCONFIG_H_
diff --git a/sdk/objc/Framework/Headers/WebRTC/RTCSSLConfig.h b/sdk/objc/Framework/Headers/WebRTC/RTCSSLConfig.h
deleted file mode 100644
index b572522..0000000
--- a/sdk/objc/Framework/Headers/WebRTC/RTCSSLConfig.h
+++ /dev/null
@@ -1,11 +0,0 @@
-/*
- * Copyright 2018 The WebRTC project authors. All Rights Reserved.
- *
- * Use of this source code is governed by a BSD-style license
- * that can be found in the LICENSE file in the root of the source
- * tree. An additional intellectual property rights grant can be found
- * in the file PATENTS. All contributing project authors may
- * be found in the AUTHORS file in the root of the source tree.
- */
-
-#import "api/peerconnection/RTCSSLConfig.h"
diff --git a/sdk/objc/api/peerconnection/RTCIceServer.h b/sdk/objc/api/peerconnection/RTCIceServer.h
index a9760c7..c2def04 100644
--- a/sdk/objc/api/peerconnection/RTCIceServer.h
+++ b/sdk/objc/api/peerconnection/RTCIceServer.h
@@ -11,7 +11,11 @@
#import <Foundation/Foundation.h>
#import "RTCMacros.h"
-#import "RTCSSLConfig.h"
+
+typedef NS_ENUM(NSUInteger, RTCTlsCertPolicy) {
+ RTCTlsCertPolicySecure,
+ RTCTlsCertPolicyInsecureNoCheck
+};
NS_ASSUME_NONNULL_BEGIN
@@ -28,8 +32,7 @@
@property(nonatomic, readonly, nullable) NSString *credential;
/**
- Deprecated. TODO(diogor, webrtc:9673): Remove from API.
- TLS certificate policy to use if this RTCIceServer object is a TURN server.
+ * TLS certificate policy to use if this RTCIceServer object is a TURN server.
*/
@property(nonatomic, readonly) RTCTlsCertPolicy tlsCertPolicy;
@@ -40,24 +43,15 @@
*/
@property(nonatomic, readonly, nullable) NSString *hostname;
-/**
- Deprecated. TODO(diogor, webrtc:9673): Remove from API.
- List of protocols to be used in the TLS ALPN extension.
- This field will be ignored if also set in RTCSSLConfig.
- */
+/** List of protocols to be used in the TLS ALPN extension. */
@property(nonatomic, readonly) NSArray<NSString *> *tlsAlpnProtocols;
/**
- Deprecated. TODO(diogor, webrtc:9673): Remove from API.
List elliptic curves to be used in the TLS elliptic curves extension.
Only curve names supported by OpenSSL should be used (eg. "P-256","X25519").
- This field will be ignored if also set in RTCSSLConfig.
*/
@property(nonatomic, readonly) NSArray<NSString *> *tlsEllipticCurves;
-/** SSL configuration options for any SSL/TLS connections to this IceServer. */
-@property(nonatomic, readonly) RTCSSLConfig *sslConfig;
-
- (nonnull instancetype)init NS_UNAVAILABLE;
/** Convenience initializer for a server with no authentication (e.g. STUN). */
@@ -112,17 +106,8 @@
tlsCertPolicy:(RTCTlsCertPolicy)tlsCertPolicy
hostname:(nullable NSString *)hostname
tlsAlpnProtocols:(nullable NSArray<NSString *> *)tlsAlpnProtocols
- tlsEllipticCurves:(nullable NSArray<NSString *> *)tlsEllipticCurves;
-
-/**
- * Initialize an RTCIceServer with its associated URLs, optional
- * username, optional credential, hostname and SSL config.
- */
-- (instancetype)initWithURLStrings:(NSArray<NSString *> *)urlStrings
- username:(nullable NSString *)username
- credential:(nullable NSString *)credential
- hostname:(nullable NSString *)hostname
- sslConfig:(RTCSSLConfig *)sslConfig NS_DESIGNATED_INITIALIZER;
+ tlsEllipticCurves:(nullable NSArray<NSString *> *)tlsEllipticCurves
+ NS_DESIGNATED_INITIALIZER;
@end
diff --git a/sdk/objc/api/peerconnection/RTCIceServer.mm b/sdk/objc/api/peerconnection/RTCIceServer.mm
index d03fd81..2138e4c 100644
--- a/sdk/objc/api/peerconnection/RTCIceServer.mm
+++ b/sdk/objc/api/peerconnection/RTCIceServer.mm
@@ -9,7 +9,6 @@
*/
#import "RTCIceServer+Private.h"
-#import "RTCSSLConfig+Native.h"
#import "helpers/NSString+StdString.h"
@@ -22,7 +21,6 @@
@synthesize hostname = _hostname;
@synthesize tlsAlpnProtocols = _tlsAlpnProtocols;
@synthesize tlsEllipticCurves = _tlsEllipticCurves;
-@synthesize sslConfig = _sslConfig;
- (instancetype)initWithURLStrings:(NSArray<NSString *> *)urlStrings {
return [self initWithURLStrings:urlStrings
@@ -85,50 +83,28 @@
hostname:(NSString *)hostname
tlsAlpnProtocols:(NSArray<NSString *> *)tlsAlpnProtocols
tlsEllipticCurves:(NSArray<NSString *> *)tlsEllipticCurves {
- RTCSSLConfig *sslConfig = [[RTCSSLConfig alloc] init];
- sslConfig.tlsCertPolicy = tlsCertPolicy;
- sslConfig.tlsALPNProtocols = [[NSArray alloc] initWithArray:tlsAlpnProtocols copyItems:YES];
- sslConfig.tlsEllipticCurves = [[NSArray alloc] initWithArray:tlsEllipticCurves copyItems:YES];
- return [self initWithURLStrings:urlStrings
- username:username
- credential:credential
- hostname:hostname
- sslConfig:sslConfig];
-}
-
-- (instancetype)initWithURLStrings:(NSArray<NSString *> *)urlStrings
- username:(NSString *)username
- credential:(NSString *)credential
- hostname:(NSString *)hostname
- sslConfig:(RTCSSLConfig *)sslConfig {
NSParameterAssert(urlStrings.count);
if (self = [super init]) {
_urlStrings = [[NSArray alloc] initWithArray:urlStrings copyItems:YES];
_username = [username copy];
_credential = [credential copy];
+ _tlsCertPolicy = tlsCertPolicy;
_hostname = [hostname copy];
- _sslConfig = sslConfig;
-
- // TODO(diogor, webrtc:9673): Remove these duplicate assignments.
- _tlsCertPolicy = sslConfig.tlsCertPolicy;
- if (sslConfig.tlsALPNProtocols) {
- _tlsAlpnProtocols = [[NSArray alloc] initWithArray:sslConfig.tlsALPNProtocols copyItems:YES];
- }
- if (sslConfig.tlsEllipticCurves) {
- _tlsEllipticCurves =
- [[NSArray alloc] initWithArray:sslConfig.tlsEllipticCurves copyItems:YES];
- }
+ _tlsAlpnProtocols = [[NSArray alloc] initWithArray:tlsAlpnProtocols copyItems:YES];
+ _tlsEllipticCurves = [[NSArray alloc] initWithArray:tlsEllipticCurves copyItems:YES];
}
return self;
}
- (NSString *)description {
- return [NSString stringWithFormat:@"RTCIceServer:\n%@\n%@\n%@\n%@\n%@",
+ return [NSString stringWithFormat:@"RTCIceServer:\n%@\n%@\n%@\n%@\n%@\n%@\n%@",
_urlStrings,
_username,
_credential,
+ [self stringForTlsCertPolicy:_tlsCertPolicy],
_hostname,
- _sslConfig];
+ _tlsAlpnProtocols,
+ _tlsEllipticCurves];
}
#pragma mark - Private
@@ -173,8 +149,6 @@
webrtc::PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck;
break;
}
-
- iceServer.ssl_config = [_sslConfig nativeConfig];
return iceServer;
}
@@ -188,38 +162,34 @@
NSString *username = [NSString stringForStdString:nativeServer.username];
NSString *credential = [NSString stringForStdString:nativeServer.password];
NSString *hostname = [NSString stringForStdString:nativeServer.hostname];
- RTCSSLConfig *sslConfig = [[RTCSSLConfig alloc] initWithNativeConfig:nativeServer.ssl_config];
-
- if (!nativeServer.ssl_config.tls_alpn_protocols.has_value() &&
- !nativeServer.tls_alpn_protocols.empty()) {
- NSMutableArray *tlsALPNProtocols =
- [NSMutableArray arrayWithCapacity:nativeServer.tls_alpn_protocols.size()];
- for (auto const &proto : nativeServer.tls_alpn_protocols) {
- [tlsALPNProtocols addObject:[NSString stringForStdString:proto]];
- }
- sslConfig.tlsALPNProtocols = tlsALPNProtocols;
+ NSMutableArray *tlsAlpnProtocols =
+ [NSMutableArray arrayWithCapacity:nativeServer.tls_alpn_protocols.size()];
+ for (auto const &proto : nativeServer.tls_alpn_protocols) {
+ [tlsAlpnProtocols addObject:[NSString stringForStdString:proto]];
}
-
- if (!nativeServer.ssl_config.tls_elliptic_curves.has_value() &&
- !nativeServer.tls_elliptic_curves.empty()) {
- NSMutableArray *tlsEllipticCurves =
- [NSMutableArray arrayWithCapacity:nativeServer.tls_elliptic_curves.size()];
- for (auto const &curve : nativeServer.tls_elliptic_curves) {
- [tlsEllipticCurves addObject:[NSString stringForStdString:curve]];
- }
- sslConfig.tlsEllipticCurves = tlsEllipticCurves;
+ NSMutableArray *tlsEllipticCurves =
+ [NSMutableArray arrayWithCapacity:nativeServer.tls_elliptic_curves.size()];
+ for (auto const &curve : nativeServer.tls_elliptic_curves) {
+ [tlsEllipticCurves addObject:[NSString stringForStdString:curve]];
}
+ RTCTlsCertPolicy tlsCertPolicy;
- if (nativeServer.tls_cert_policy ==
- webrtc::PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck) {
- sslConfig.tlsCertPolicy = RTCTlsCertPolicyInsecureNoCheck;
+ switch (nativeServer.tls_cert_policy) {
+ case webrtc::PeerConnectionInterface::kTlsCertPolicySecure:
+ tlsCertPolicy = RTCTlsCertPolicySecure;
+ break;
+ case webrtc::PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck:
+ tlsCertPolicy = RTCTlsCertPolicyInsecureNoCheck;
+ break;
}
self = [self initWithURLStrings:urls
username:username
credential:credential
+ tlsCertPolicy:tlsCertPolicy
hostname:hostname
- sslConfig:sslConfig];
+ tlsAlpnProtocols:tlsAlpnProtocols
+ tlsEllipticCurves:tlsEllipticCurves];
return self;
}
diff --git a/sdk/objc/api/peerconnection/RTCSSLConfig+Native.h b/sdk/objc/api/peerconnection/RTCSSLConfig+Native.h
deleted file mode 100644
index 7a38edc..0000000
--- a/sdk/objc/api/peerconnection/RTCSSLConfig+Native.h
+++ /dev/null
@@ -1,27 +0,0 @@
-/*
- * Copyright 2018 The WebRTC project authors. All Rights Reserved.
- *
- * Use of this source code is governed by a BSD-style license
- * that can be found in the LICENSE file in the root of the source
- * tree. An additional intellectual property rights grant can be found
- * in the file PATENTS. All contributing project authors may
- * be found in the AUTHORS file in the root of the source tree.
- */
-
-#import "RTCSSLConfig.h"
-
-#include "api/peerconnectioninterface.h"
-#include "rtc_base/ssladapter.h"
-
-NS_ASSUME_NONNULL_BEGIN
-
-@interface RTCSSLConfig (Native)
-
-- (rtc::SSLConfig)nativeConfig;
-
-/** Initialize an RTCSSLConfig from a native SSLConfig. */
-- (instancetype)initWithNativeConfig:(const rtc::SSLConfig &)config;
-
-@end
-
-NS_ASSUME_NONNULL_END
diff --git a/sdk/objc/api/peerconnection/RTCSSLConfig.h b/sdk/objc/api/peerconnection/RTCSSLConfig.h
deleted file mode 100644
index 5421609..0000000
--- a/sdk/objc/api/peerconnection/RTCSSLConfig.h
+++ /dev/null
@@ -1,56 +0,0 @@
-/*
- * Copyright 2018 The WebRTC project authors. All Rights Reserved.
- *
- * Use of this source code is governed by a BSD-style license
- * that can be found in the LICENSE file in the root of the source
- * tree. An additional intellectual property rights grant can be found
- * in the file PATENTS. All contributing project authors may
- * be found in the AUTHORS file in the root of the source tree.
- */
-
-#import <Foundation/Foundation.h>
-
-#import <WebRTC/RTCMacros.h>
-
-typedef NS_ENUM(NSUInteger, RTCTlsCertPolicy) {
- RTCTlsCertPolicySecure,
- RTCTlsCertPolicyInsecureNoCheck
-};
-
-NS_ASSUME_NONNULL_BEGIN
-
-RTC_EXPORT
-@interface RTCSSLConfig : NSObject
-
-/** Indicates whether to enable OCSP stapling in TLS. */
-@property(nonatomic) BOOL enableOCSPStapling;
-
-/** Indicates whether to enable the signed certificate timestamp extension in TLS. */
-@property(nonatomic) BOOL enableSignedCertTimestamp;
-
-/** Indicates whether to enable the TLS Channel ID extension. */
-@property(nonatomic) BOOL enableTlsChannelId;
-
-/** Indicates whether to enable the TLS GREASE extension. */
-@property(nonatomic) BOOL enableGrease;
-
-/** Indicates how to process TURN server certificates */
-@property(nonatomic) RTCTlsCertPolicy tlsCertPolicy;
-
-/** Highest supported SSL version, as defined in the supported_versions TLS extension. */
-@property(nonatomic, nullable) NSNumber *maxSSLVersion;
-
-/** List of protocols to be used in the TLS ALPN extension. */
-@property(nonatomic, copy, nullable) NSArray<NSString *> *tlsALPNProtocols;
-
-/**
- List of elliptic curves to be used in the TLS elliptic curves extension.
- Only curve names supported by OpenSSL should be used (eg. "P-256","X25519").
- */
-@property(nonatomic, copy, nullable) NSArray<NSString *> *tlsEllipticCurves;
-
-- (instancetype)init;
-
-@end
-
-NS_ASSUME_NONNULL_END
diff --git a/sdk/objc/api/peerconnection/RTCSSLConfig.mm b/sdk/objc/api/peerconnection/RTCSSLConfig.mm
deleted file mode 100644
index 60ff47c..0000000
--- a/sdk/objc/api/peerconnection/RTCSSLConfig.mm
+++ /dev/null
@@ -1,134 +0,0 @@
-/*
- * Copyright 2018 The WebRTC project authors. All Rights Reserved.
- *
- * Use of this source code is governed by a BSD-style license
- * that can be found in the LICENSE file in the root of the source
- * tree. An additional intellectual property rights grant can be found
- * in the file PATENTS. All contributing project authors may
- * be found in the AUTHORS file in the root of the source tree.
- */
-
-#import "RTCSSLConfig+Native.h"
-
-#import "helpers/NSString+StdString.h"
-
-@implementation RTCSSLConfig
-
-@synthesize enableOCSPStapling = _enableOCSPStapling;
-@synthesize enableSignedCertTimestamp = _enableSignedCertTimestamp;
-@synthesize enableTlsChannelId = _enableTlsChannelId;
-@synthesize enableGrease = _enableGrease;
-@synthesize tlsCertPolicy = _tlsCertPolicy;
-@synthesize maxSSLVersion = _maxSSLVersion;
-@synthesize tlsALPNProtocols = _tlsALPNProtocols;
-@synthesize tlsEllipticCurves = _tlsEllipticCurves;
-
-- (instancetype)init {
- // Copy defaults
- rtc::SSLConfig config;
- return [self initWithNativeConfig:config];
-}
-
-- (instancetype)initWithNativeConfig:(const rtc::SSLConfig &)config {
- if (self = [super init]) {
- _enableOCSPStapling = config.enable_ocsp_stapling;
- _enableSignedCertTimestamp = config.enable_signed_cert_timestamp;
- _enableTlsChannelId = config.enable_tls_channel_id;
- _enableGrease = config.enable_grease;
-
- switch (config.tls_cert_policy) {
- case rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE:
- _tlsCertPolicy = RTCTlsCertPolicySecure;
- break;
- case rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK:
- _tlsCertPolicy = RTCTlsCertPolicyInsecureNoCheck;
- break;
- }
-
- if (config.max_ssl_version) {
- _maxSSLVersion = [NSNumber numberWithInt:*config.max_ssl_version];
- }
- if (config.tls_alpn_protocols) {
- NSMutableArray *tlsALPNProtocols =
- [NSMutableArray arrayWithCapacity:config.tls_alpn_protocols.value().size()];
- for (auto const &proto : config.tls_alpn_protocols.value()) {
- [tlsALPNProtocols addObject:[NSString stringForStdString:proto]];
- }
- _tlsALPNProtocols = tlsALPNProtocols;
- }
- if (config.tls_elliptic_curves) {
- NSMutableArray *tlsEllipticCurves =
- [NSMutableArray arrayWithCapacity:config.tls_elliptic_curves.value().size()];
- for (auto const &curve : config.tls_elliptic_curves.value()) {
- [tlsEllipticCurves addObject:[NSString stringForStdString:curve]];
- }
- _tlsEllipticCurves = tlsEllipticCurves;
- }
- }
- return self;
-}
-
-- (NSString *)description {
- return [NSString stringWithFormat:@"RTCSSLConfig:\n%d\n%d\n%d\n%d\n%@\n%@\n%@\n%@",
- _enableOCSPStapling,
- _enableSignedCertTimestamp,
- _enableTlsChannelId,
- _enableGrease,
- [self stringForTlsCertPolicy:_tlsCertPolicy],
- _maxSSLVersion,
- _tlsALPNProtocols,
- _tlsEllipticCurves];
-}
-
-#pragma mark - Private
-
-- (NSString *)stringForTlsCertPolicy:(RTCTlsCertPolicy)tlsCertPolicy {
- switch (tlsCertPolicy) {
- case RTCTlsCertPolicySecure:
- return @"RTCTlsCertPolicySecure";
- case RTCTlsCertPolicyInsecureNoCheck:
- return @"RTCTlsCertPolicyInsecureNoCheck";
- }
-}
-
-- (rtc::SSLConfig)nativeConfig {
- __block rtc::SSLConfig sslConfig;
-
- sslConfig.enable_ocsp_stapling = _enableOCSPStapling;
- sslConfig.enable_signed_cert_timestamp = _enableSignedCertTimestamp;
- sslConfig.enable_tls_channel_id = _enableTlsChannelId;
- sslConfig.enable_grease = _enableGrease;
-
- switch (_tlsCertPolicy) {
- case RTCTlsCertPolicySecure:
- sslConfig.tls_cert_policy = rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE;
- break;
- case RTCTlsCertPolicyInsecureNoCheck:
- sslConfig.tls_cert_policy = rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
- break;
- }
-
- if (_maxSSLVersion != nil) {
- sslConfig.max_ssl_version = absl::optional<int>(_maxSSLVersion.intValue);
- }
-
- if (_tlsALPNProtocols != nil) {
- __block std::vector<std::string> alpn_protocols;
- [_tlsALPNProtocols enumerateObjectsUsingBlock:^(NSString *proto, NSUInteger idx, BOOL *stop) {
- alpn_protocols.push_back(proto.stdString);
- }];
- sslConfig.tls_alpn_protocols = absl::optional<std::vector<std::string>>(alpn_protocols);
- }
-
- if (_tlsEllipticCurves != nil) {
- __block std::vector<std::string> elliptic_curves;
- [_tlsEllipticCurves enumerateObjectsUsingBlock:^(NSString *curve, NSUInteger idx, BOOL *stop) {
- elliptic_curves.push_back(curve.stdString);
- }];
- sslConfig.tls_elliptic_curves = absl::optional<std::vector<std::string>>(elliptic_curves);
- }
-
- return sslConfig;
-}
-
-@end
diff --git a/sdk/objc/unittests/RTCIceServerTest.mm b/sdk/objc/unittests/RTCIceServerTest.mm
index 7659196..8ef5195 100644
--- a/sdk/objc/unittests/RTCIceServerTest.mm
+++ b/sdk/objc/unittests/RTCIceServerTest.mm
@@ -89,7 +89,7 @@
EXPECT_EQ("username", iceStruct.username);
EXPECT_EQ("credential", iceStruct.password);
EXPECT_EQ("hostname", iceStruct.hostname);
- EXPECT_EQ(2u, iceStruct.ssl_config.tls_alpn_protocols.value().size());
+ EXPECT_EQ(2u, iceStruct.tls_alpn_protocols.size());
}
- (void)testTlsEllipticCurves {
@@ -106,8 +106,8 @@
EXPECT_EQ("username", iceStruct.username);
EXPECT_EQ("credential", iceStruct.password);
EXPECT_EQ("hostname", iceStruct.hostname);
- EXPECT_EQ(2u, iceStruct.ssl_config.tls_alpn_protocols.value().size());
- EXPECT_EQ(2u, iceStruct.ssl_config.tls_elliptic_curves.value().size());
+ EXPECT_EQ(2u, iceStruct.tls_alpn_protocols.size());
+ EXPECT_EQ(2u, iceStruct.tls_elliptic_curves.size());
}
- (void)testInitFromNativeServer {
@@ -129,8 +129,8 @@
EXPECT_EQ("username", [NSString stdStringForString:iceServer.username]);
EXPECT_EQ("password", [NSString stdStringForString:iceServer.credential]);
EXPECT_EQ("hostname", [NSString stdStringForString:iceServer.hostname]);
- EXPECT_EQ(2u, iceServer.sslConfig.tlsALPNProtocols.count);
- EXPECT_EQ(2u, iceServer.sslConfig.tlsEllipticCurves.count);
+ EXPECT_EQ(2u, iceServer.tlsAlpnProtocols.count);
+ EXPECT_EQ(2u, iceServer.tlsEllipticCurves.count);
}
@end