|  | /* | 
|  | *  Copyright 2004 The WebRTC Project Authors. All rights reserved. | 
|  | * | 
|  | *  Use of this source code is governed by a BSD-style license | 
|  | *  that can be found in the LICENSE file in the root of the source | 
|  | *  tree. An additional intellectual property rights grant can be found | 
|  | *  in the file PATENTS.  All contributing project authors may | 
|  | *  be found in the AUTHORS file in the root of the source tree. | 
|  | */ | 
|  |  | 
|  | #include "rtc_base/ssl_stream_adapter.h" | 
|  |  | 
|  | #include <cstddef> | 
|  | #include <cstdint> | 
|  | #include <memory> | 
|  | #include <optional> | 
|  | #include <set> | 
|  | #include <string> | 
|  | #include <utility> | 
|  | #include <vector> | 
|  |  | 
|  | #include "absl/functional/any_invocable.h" | 
|  | #include "absl/strings/string_view.h" | 
|  | #include "api/array_view.h" | 
|  | #include "api/field_trials_view.h" | 
|  | #include "rtc_base/openssl_stream_adapter.h" | 
|  | #include "rtc_base/ssl_identity.h" | 
|  | #include "rtc_base/stream.h" | 
|  |  | 
|  | namespace webrtc { | 
|  |  | 
|  | // Deprecated, prefer SrtpCryptoSuiteToName. | 
|  | const char kCsAesCm128HmacSha1_80[] = "AES_CM_128_HMAC_SHA1_80"; | 
|  | const char kCsAesCm128HmacSha1_32[] = "AES_CM_128_HMAC_SHA1_32"; | 
|  | const char kCsAeadAes128Gcm[] = "AEAD_AES_128_GCM"; | 
|  | const char kCsAeadAes256Gcm[] = "AEAD_AES_256_GCM"; | 
|  |  | 
|  | std::string SrtpCryptoSuiteToName(int crypto_suite) { | 
|  | switch (crypto_suite) { | 
|  | case kSrtpAes128CmSha1_80: | 
|  | return "AES_CM_128_HMAC_SHA1_80"; | 
|  | case kSrtpAes128CmSha1_32: | 
|  | return "AES_CM_128_HMAC_SHA1_32"; | 
|  | case kSrtpAeadAes128Gcm: | 
|  | return "AEAD_AES_128_GCM"; | 
|  | case kSrtpAeadAes256Gcm: | 
|  | return "AEAD_AES_256_GCM"; | 
|  | default: | 
|  | return std::string(); | 
|  | } | 
|  | } | 
|  |  | 
|  | bool GetSrtpKeyAndSaltLengths(int crypto_suite, | 
|  | int* key_length, | 
|  | int* salt_length) { | 
|  | switch (crypto_suite) { | 
|  | case kSrtpAes128CmSha1_32: | 
|  | case kSrtpAes128CmSha1_80: | 
|  | // SRTP_AES128_CM_HMAC_SHA1_32 and SRTP_AES128_CM_HMAC_SHA1_80 are defined | 
|  | // in RFC 5764 to use a 128 bits key and 112 bits salt for the cipher. | 
|  | *key_length = 16; | 
|  | *salt_length = 14; | 
|  | break; | 
|  | case kSrtpAeadAes128Gcm: | 
|  | // kSrtpAeadAes128Gcm is defined in RFC 7714 to use a 128 bits key and | 
|  | // a 96 bits salt for the cipher. | 
|  | *key_length = 16; | 
|  | *salt_length = 12; | 
|  | break; | 
|  | case kSrtpAeadAes256Gcm: | 
|  | // kSrtpAeadAes256Gcm is defined in RFC 7714 to use a 256 bits key and | 
|  | // a 96 bits salt for the cipher. | 
|  | *key_length = 32; | 
|  | *salt_length = 12; | 
|  | break; | 
|  | default: | 
|  | return false; | 
|  | } | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool IsGcmCryptoSuite(int crypto_suite) { | 
|  | return (crypto_suite == kSrtpAeadAes256Gcm || | 
|  | crypto_suite == kSrtpAeadAes128Gcm); | 
|  | } | 
|  |  | 
|  | std::unique_ptr<SSLStreamAdapter> SSLStreamAdapter::Create( | 
|  | std::unique_ptr<StreamInterface> stream, | 
|  | absl::AnyInvocable<void(SSLHandshakeError)> handshake_error, | 
|  | const FieldTrialsView* field_trials) { | 
|  | return std::make_unique<OpenSSLStreamAdapter>( | 
|  | std::move(stream), std::move(handshake_error), field_trials); | 
|  | } | 
|  |  | 
|  | bool SSLStreamAdapter::IsBoringSsl() { | 
|  | return OpenSSLStreamAdapter::IsBoringSsl(); | 
|  | } | 
|  | bool SSLStreamAdapter::IsAcceptableCipher(int cipher, KeyType key_type) { | 
|  | return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type); | 
|  | } | 
|  | bool SSLStreamAdapter::IsAcceptableCipher(absl::string_view cipher, | 
|  | KeyType key_type) { | 
|  | return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type); | 
|  | } | 
|  |  | 
|  | std::optional<std::string> | 
|  | SSLStreamAdapter::GetEphemeralKeyExchangeCipherGroupName(uint16_t group_id) { | 
|  | #if defined(OPENSSL_IS_BORINGSSL) | 
|  | auto val = SSL_get_group_name(group_id); | 
|  | if (val != nullptr) { | 
|  | return std::string(val); | 
|  | } | 
|  | #endif | 
|  | return std::nullopt; | 
|  | } | 
|  |  | 
|  | std::set<uint16_t> | 
|  | SSLStreamAdapter::GetSupportedEphemeralKeyExchangeCipherGroups() { | 
|  | return { | 
|  | // It would be nice if BoringSSL had a function like this! | 
|  | #ifdef SSL_GROUP_SECP224R1 | 
|  | SSL_GROUP_SECP224R1, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_SECP256R1 | 
|  | SSL_GROUP_SECP256R1, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_SECP384R1 | 
|  | SSL_GROUP_SECP384R1, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_SECP521R1 | 
|  | SSL_GROUP_SECP521R1, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_X25519 | 
|  | SSL_GROUP_X25519, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_X25519_MLKEM768 | 
|  | SSL_GROUP_X25519_MLKEM768, | 
|  | #endif | 
|  | }; | 
|  | } | 
|  |  | 
|  | std::vector<uint16_t> | 
|  | SSLStreamAdapter::GetDefaultEphemeralKeyExchangeCipherGroups( | 
|  | const FieldTrialsView* field_trials) { | 
|  | // It would be nice if BoringSSL had a function like this! | 
|  | // from boringssl/src/ssl/extensions.cc kDefaultGroups. | 
|  | if (field_trials && field_trials->IsEnabled("WebRTC-EnableDtlsPqc")) { | 
|  | return { | 
|  | #ifdef SSL_GROUP_X25519_MLKEM768 | 
|  | SSL_GROUP_X25519_MLKEM768, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_X25519 | 
|  | SSL_GROUP_X25519, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_SECP256R1 | 
|  | SSL_GROUP_SECP256R1, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_SECP384R1 | 
|  | SSL_GROUP_SECP384R1, | 
|  | #endif | 
|  | }; | 
|  | } | 
|  | return { | 
|  | #ifdef SSL_GROUP_X25519 | 
|  | SSL_GROUP_X25519, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_SECP256R1 | 
|  | SSL_GROUP_SECP256R1, | 
|  | #endif | 
|  | #ifdef SSL_GROUP_SECP384R1 | 
|  | SSL_GROUP_SECP384R1, | 
|  | #endif | 
|  | }; | 
|  | } | 
|  |  | 
|  | // Default shim for backward compat. | 
|  | bool SSLStreamAdapter::SetPeerCertificateDigest( | 
|  | absl::string_view digest_alg, | 
|  | const unsigned char* digest_val, | 
|  | size_t digest_len, | 
|  | SSLPeerCertificateDigestError* error) { | 
|  | unsigned char* nonconst_val = const_cast<unsigned char*>(digest_val); | 
|  | SSLPeerCertificateDigestError ret = SetPeerCertificateDigest( | 
|  | digest_alg, ArrayView<uint8_t>(nonconst_val, digest_len)); | 
|  | if (error) | 
|  | *error = ret; | 
|  | return ret == SSLPeerCertificateDigestError::NONE; | 
|  | } | 
|  |  | 
|  | /////////////////////////////////////////////////////////////////////////////// | 
|  | // Test only settings | 
|  | /////////////////////////////////////////////////////////////////////////////// | 
|  |  | 
|  | void SSLStreamAdapter::EnableTimeCallbackForTesting() { | 
|  | OpenSSLStreamAdapter::EnableTimeCallbackForTesting(); | 
|  | } | 
|  |  | 
|  | SSLProtocolVersion SSLStreamAdapter::GetMaxSupportedDTLSProtocolVersion() { | 
|  | return OpenSSLStreamAdapter::GetMaxSupportedDTLSProtocolVersion(); | 
|  | } | 
|  |  | 
|  | /////////////////////////////////////////////////////////////////////////////// | 
|  |  | 
|  | }  // namespace webrtc |