| /* | 
 |  *  Copyright 2004 The WebRTC Project Authors. All rights reserved. | 
 |  * | 
 |  *  Use of this source code is governed by a BSD-style license | 
 |  *  that can be found in the LICENSE file in the root of the source | 
 |  *  tree. An additional intellectual property rights grant can be found | 
 |  *  in the file PATENTS.  All contributing project authors may | 
 |  *  be found in the AUTHORS file in the root of the source tree. | 
 |  */ | 
 |  | 
 | #ifndef RTC_BASE_SSL_STREAM_ADAPTER_H_ | 
 | #define RTC_BASE_SSL_STREAM_ADAPTER_H_ | 
 |  | 
 | #include <stddef.h> | 
 | #include <stdint.h> | 
 |  | 
 | #include <memory> | 
 | #include <optional> | 
 | #include <string> | 
 | #include <vector> | 
 |  | 
 | #include "absl/functional/any_invocable.h" | 
 | #include "absl/strings/string_view.h" | 
 | #include "api/array_view.h" | 
 | #include "api/field_trials_view.h" | 
 | #include "rtc_base/buffer.h" | 
 | #include "rtc_base/ssl_certificate.h" | 
 | #include "rtc_base/ssl_identity.h" | 
 | #include "rtc_base/stream.h" | 
 |  | 
 | namespace webrtc { | 
 |  | 
 | // Constants for SSL profile. | 
 | constexpr int kTlsNullWithNullNull = 0; | 
 | constexpr int kSslCipherSuiteMaxValue = 0xFFFF; | 
 |  | 
 | // Constants for SRTP profiles. | 
 | constexpr int kSrtpInvalidCryptoSuite = 0; | 
 | constexpr int kSrtpAes128CmSha1_80 = 0x0001; | 
 | constexpr int kSrtpAes128CmSha1_32 = 0x0002; | 
 | constexpr int kSrtpAeadAes128Gcm = 0x0007; | 
 | constexpr int kSrtpAeadAes256Gcm = 0x0008; | 
 | constexpr int kSrtpCryptoSuiteMaxValue = 0xFFFF; | 
 |  | 
 | // Constants for SSL signature algorithms. | 
 | constexpr int kSslSignatureAlgorithmUnknown = 0; | 
 | constexpr int kSslSignatureAlgorithmMaxValue = 0xFFFF; | 
 |  | 
 | // Names of SRTP profiles listed above. | 
 | // 128-bit AES with 80-bit SHA-1 HMAC. | 
 | extern const char kCsAesCm128HmacSha1_80[]; | 
 | // 128-bit AES with 32-bit SHA-1 HMAC. | 
 | extern const char kCsAesCm128HmacSha1_32[]; | 
 | // 128-bit AES GCM with 16 byte AEAD auth tag. | 
 | extern const char kCsAeadAes128Gcm[]; | 
 | // 256-bit AES GCM with 16 byte AEAD auth tag. | 
 | extern const char kCsAeadAes256Gcm[]; | 
 |  | 
 | // Given the DTLS-SRTP protection profile ID, as defined in | 
 | // https://tools.ietf.org/html/rfc4568#section-6.2 , return the SRTP profile | 
 | // name, as defined in https://tools.ietf.org/html/rfc5764#section-4.1.2. | 
 | std::string SrtpCryptoSuiteToName(int crypto_suite); | 
 |  | 
 | // Get key length and salt length for given crypto suite. Returns true for | 
 | // valid suites, otherwise false. | 
 | bool GetSrtpKeyAndSaltLengths(int crypto_suite, | 
 |                               int* key_length, | 
 |                               int* salt_length); | 
 |  | 
 | // Returns true if the given crypto suite id uses a GCM cipher. | 
 | bool IsGcmCryptoSuite(int crypto_suite); | 
 |  | 
 | // SSLStreamAdapter : A StreamInterfaceAdapter that does SSL/TLS. | 
 | // After SSL has been started, the stream will only open on successful | 
 | // SSL verification of certificates, and the communication is | 
 | // encrypted of course. | 
 | // | 
 | // This class was written with SSLAdapter as a starting point. It | 
 | // offers a similar interface, with two differences: there is no | 
 | // support for a restartable SSL connection, and this class has a | 
 | // peer-to-peer mode. | 
 | // | 
 | // The SSL library requires initialization and cleanup. Static method | 
 | // for doing this are in SSLAdapter. They should possibly be moved out | 
 | // to a neutral class. | 
 |  | 
 | enum SSLRole { SSL_CLIENT, SSL_SERVER }; | 
 | enum SSLMode { SSL_MODE_TLS, SSL_MODE_DTLS }; | 
 |  | 
 | // TODO bugs.webrtc.org/40644300 remove unused legacy constants. | 
 | enum SSLProtocolVersion { | 
 |   SSL_PROTOCOL_NOT_GIVEN = -1, | 
 |   SSL_PROTOCOL_TLS_10 = 0,  // Deprecated and no longer supported. | 
 |   SSL_PROTOCOL_TLS_11 = 1,  // Deprecated and no longer supported. | 
 |   SSL_PROTOCOL_TLS_12 = 2, | 
 |   SSL_PROTOCOL_TLS_13 = 3, | 
 |   SSL_PROTOCOL_DTLS_10 = 1,  // Deprecated and no longer supported. | 
 |   SSL_PROTOCOL_DTLS_12 = SSL_PROTOCOL_TLS_12, | 
 |   SSL_PROTOCOL_DTLS_13 = SSL_PROTOCOL_TLS_13, | 
 | }; | 
 |  | 
 | // Versions returned from BoringSSL. | 
 | const uint16_t kDtls10VersionBytes = 0xfeff; | 
 | const uint16_t kDtls12VersionBytes = 0xfefd; | 
 | const uint16_t kDtls13VersionBytes = 0xfefc; | 
 |  | 
 | enum class SSLPeerCertificateDigestError { | 
 |   NONE, | 
 |   UNKNOWN_ALGORITHM, | 
 |   INVALID_LENGTH, | 
 |   VERIFICATION_FAILED, | 
 | }; | 
 |  | 
 | // Errors for Read -- in the high range so no conflict with OpenSSL. | 
 | enum { SSE_MSG_TRUNC = 0xff0001 }; | 
 |  | 
 | // Used to send back UMA histogram value. Logged when Dtls handshake fails. | 
 | enum class SSLHandshakeError { UNKNOWN, INCOMPATIBLE_CIPHERSUITE, MAX_VALUE }; | 
 |  | 
 | class SSLStreamAdapter : public StreamInterface { | 
 |  public: | 
 |   // Instantiate an SSLStreamAdapter wrapping the given stream, | 
 |   // (using the selected implementation for the platform). | 
 |   // Caller is responsible for freeing the returned object. | 
 |   static std::unique_ptr<SSLStreamAdapter> Create( | 
 |       std::unique_ptr<StreamInterface> stream, | 
 |       absl::AnyInvocable<void(webrtc::SSLHandshakeError)> handshake_error = | 
 |           nullptr, | 
 |       const FieldTrialsView* field_trials = nullptr); | 
 |  | 
 |   SSLStreamAdapter() = default; | 
 |   ~SSLStreamAdapter() override = default; | 
 |  | 
 |   // Specify our SSL identity: key and certificate. SSLStream takes ownership | 
 |   // of the SSLIdentity object and will free it when appropriate. Should be | 
 |   // called no more than once on a given SSLStream instance. | 
 |   virtual void SetIdentity(std::unique_ptr<rtc::SSLIdentity> identity) = 0; | 
 |   virtual rtc::SSLIdentity* GetIdentityForTesting() const = 0; | 
 |  | 
 |   // Call this to indicate that we are to play the server role (or client role, | 
 |   // if the default argument is replaced by SSL_CLIENT). | 
 |   // The default argument is for backward compatibility. | 
 |   // TODO(ekr@rtfm.com): rename this SetRole to reflect its new function | 
 |   virtual void SetServerRole(SSLRole role = SSL_SERVER) = 0; | 
 |  | 
 |   [[deprecated("Only DTLS is supported by the stream adapter")]] virtual void | 
 |   SetMode(SSLMode mode) = 0; | 
 |  | 
 |   // Set maximum supported protocol version. The highest version supported by | 
 |   // both ends will be used for the connection, i.e. if one party supports | 
 |   // DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used. | 
 |   // If requested version is not supported by underlying crypto library, the | 
 |   // next lower will be used. | 
 |   virtual void SetMaxProtocolVersion(SSLProtocolVersion version) = 0; | 
 |  | 
 |   // Set the initial retransmission timeout for DTLS messages. When the timeout | 
 |   // expires, the message gets retransmitted and the timeout is exponentially | 
 |   // increased. | 
 |   // This should only be called before StartSSL(). | 
 |   virtual void SetInitialRetransmissionTimeout(int timeout_ms) = 0; | 
 |  | 
 |   // StartSSL starts negotiation with a peer, whose certificate is verified | 
 |   // using the certificate digest. Generally, SetIdentity() and possibly | 
 |   // SetServerRole() should have been called before this. | 
 |   // SetPeerCertificateDigest() must also be called. It may be called after | 
 |   // StartSSLWithPeer() but must be called before the underlying stream opens. | 
 |   // | 
 |   // Use of the stream prior to calling StartSSL will pass data in clear text. | 
 |   // Calling StartSSL causes SSL negotiation to begin as soon as possible: right | 
 |   // away if the underlying wrapped stream is already opened, or else as soon as | 
 |   // it opens. | 
 |   // | 
 |   // StartSSL returns a negative error code on failure. Returning 0 means | 
 |   // success so far, but negotiation is probably not complete and will continue | 
 |   // asynchronously. In that case, the exposed stream will open after | 
 |   // successful negotiation and verification, or an SE_CLOSE event will be | 
 |   // raised if negotiation fails. | 
 |   virtual int StartSSL() = 0; | 
 |  | 
 |   // Specify the digest of the certificate that our peer is expected to use. | 
 |   // Only this certificate will be accepted during SSL verification. The | 
 |   // certificate is assumed to have been obtained through some other secure | 
 |   // channel (such as the signaling channel). This must specify the terminal | 
 |   // certificate, not just a CA. SSLStream makes a copy of the digest value. | 
 |   // | 
 |   // Returns SSLPeerCertificateDigestError::NONE if successful. | 
 |   virtual SSLPeerCertificateDigestError SetPeerCertificateDigest( | 
 |       absl::string_view digest_alg, | 
 |       rtc::ArrayView<const uint8_t> digest_val) = 0; | 
 |   [[deprecated( | 
 |       "Use SetPeerCertificateDigest with ArrayView instead")]] virtual bool | 
 |   SetPeerCertificateDigest(absl::string_view digest_alg, | 
 |                            const unsigned char* digest_val, | 
 |                            size_t digest_len, | 
 |                            SSLPeerCertificateDigestError* error = nullptr); | 
 |  | 
 |   // Retrieves the peer's certificate chain including leaf certificate, if a | 
 |   // connection has been established. | 
 |   virtual std::unique_ptr<rtc::SSLCertChain> GetPeerSSLCertChain() const = 0; | 
 |  | 
 |   // Retrieves the IANA registration id of the cipher suite used for the | 
 |   // connection (e.g. 0x2F for "TLS_RSA_WITH_AES_128_CBC_SHA"). | 
 |   virtual bool GetSslCipherSuite(int* cipher_suite) const = 0; | 
 |   // Returns the name of the cipher suite used for the DTLS transport, | 
 |   // as defined in the "Description" column of the IANA cipher suite registry. | 
 |   virtual std::optional<absl::string_view> GetTlsCipherSuiteName() const = 0; | 
 |  | 
 |   // Retrieves the enum value for SSL version. | 
 |   // Will return -1 until the version has been negotiated. | 
 |   [[deprecated("Use GetSslVersionBytes")]] virtual SSLProtocolVersion | 
 |   GetSslVersion() const = 0; | 
 |   // Retrieves the 2-byte version from the TLS protocol. | 
 |   // Will return false until the version has been negotiated. | 
 |   virtual bool GetSslVersionBytes(int* version) const = 0; | 
 |  | 
 |   // Key Exporter interface from RFC 5705 | 
 |   virtual bool ExportSrtpKeyingMaterial( | 
 |       rtc::ZeroOnFreeBuffer<uint8_t>& keying_material) = 0; | 
 |  | 
 |   // Returns the signature algorithm or 0 if not applicable. | 
 |   virtual uint16_t GetPeerSignatureAlgorithm() const = 0; | 
 |  | 
 |   // DTLS-SRTP interface | 
 |   virtual bool SetDtlsSrtpCryptoSuites( | 
 |       const std::vector<int>& crypto_suites) = 0; | 
 |   virtual bool GetDtlsSrtpCryptoSuite(int* crypto_suite) const = 0; | 
 |  | 
 |   // Returns true if a TLS connection has been established. | 
 |   // The only difference between this and "GetState() == SE_OPEN" is that if | 
 |   // the peer certificate digest hasn't been verified, the state will still be | 
 |   // SS_OPENING but IsTlsConnected should return true. | 
 |   virtual bool IsTlsConnected() = 0; | 
 |  | 
 |   // Capabilities testing. | 
 |   // Used to have "DTLS supported", "DTLS-SRTP supported" etc. methods, but now | 
 |   // that's assumed. | 
 |   static bool IsBoringSsl(); | 
 |  | 
 |   // Returns true iff the supplied cipher is deemed to be strong. | 
 |   // TODO(torbjorng): Consider removing the KeyType argument. | 
 |   static bool IsAcceptableCipher(int cipher, rtc::KeyType key_type); | 
 |   static bool IsAcceptableCipher(absl::string_view cipher, | 
 |                                  rtc::KeyType key_type); | 
 |  | 
 |   //////////////////////////////////////////////////////////////////////////// | 
 |   // Testing only member functions | 
 |   //////////////////////////////////////////////////////////////////////////// | 
 |  | 
 |   // Use our timeutils.h source of timing in BoringSSL, allowing us to test | 
 |   // using a fake clock. | 
 |   static void EnableTimeCallbackForTesting(); | 
 |  | 
 |   // Return max DTLS SSLProtocolVersion supported by implementation. | 
 |   static SSLProtocolVersion GetMaxSupportedDTLSProtocolVersion(); | 
 |  | 
 |   // Deprecated. Do not use this API outside of testing. | 
 |   // Do not set this to false outside of testing. | 
 |   void SetClientAuthEnabledForTesting(bool enabled) { | 
 |     client_auth_enabled_ = enabled; | 
 |   } | 
 |  | 
 |   // Deprecated. Do not use this API outside of testing. | 
 |   // Returns true by default, else false if explicitly set to disable client | 
 |   // authentication. | 
 |   bool GetClientAuthEnabled() const { return client_auth_enabled_; } | 
 |  | 
 |  private: | 
 |   // If true (default), the client is required to provide a certificate during | 
 |   // handshake. If no certificate is given, handshake fails. This applies to | 
 |   // server mode only. | 
 |   bool client_auth_enabled_ = true; | 
 | }; | 
 |  | 
 | }  //  namespace webrtc | 
 |  | 
 | // Re-export symbols from the webrtc namespace for backwards compatibility. | 
 | // TODO(bugs.webrtc.org/4222596): Remove once all references are updated. | 
 | namespace rtc { | 
 | using ::webrtc::GetSrtpKeyAndSaltLengths; | 
 | using ::webrtc::IsGcmCryptoSuite; | 
 | using ::webrtc::kCsAeadAes128Gcm; | 
 | using ::webrtc::kCsAeadAes256Gcm; | 
 | using ::webrtc::kCsAesCm128HmacSha1_32; | 
 | using ::webrtc::kCsAesCm128HmacSha1_80; | 
 | using ::webrtc::kDtls10VersionBytes; | 
 | using ::webrtc::kDtls12VersionBytes; | 
 | using ::webrtc::kDtls13VersionBytes; | 
 | using ::webrtc::kSrtpAeadAes128Gcm; | 
 | using ::webrtc::kSrtpAeadAes256Gcm; | 
 | using ::webrtc::kSrtpAes128CmSha1_32; | 
 | using ::webrtc::kSrtpAes128CmSha1_80; | 
 | using ::webrtc::kSrtpCryptoSuiteMaxValue; | 
 | using ::webrtc::kSrtpInvalidCryptoSuite; | 
 | using ::webrtc::kSslCipherSuiteMaxValue; | 
 | using ::webrtc::kSslSignatureAlgorithmMaxValue; | 
 | using ::webrtc::kSslSignatureAlgorithmUnknown; | 
 | using ::webrtc::kTlsNullWithNullNull; | 
 | using ::webrtc::SrtpCryptoSuiteToName; | 
 | using ::webrtc::SSE_MSG_TRUNC; | 
 | using ::webrtc::SSL_CLIENT; | 
 | using ::webrtc::SSL_MODE_DTLS; | 
 | using ::webrtc::SSL_MODE_TLS; | 
 | using ::webrtc::SSL_PROTOCOL_DTLS_10; | 
 | using ::webrtc::SSL_PROTOCOL_DTLS_12; | 
 | using ::webrtc::SSL_PROTOCOL_DTLS_13; | 
 | using ::webrtc::SSL_PROTOCOL_NOT_GIVEN; | 
 | using ::webrtc::SSL_PROTOCOL_TLS_10; | 
 | using ::webrtc::SSL_PROTOCOL_TLS_11; | 
 | using ::webrtc::SSL_PROTOCOL_TLS_12; | 
 | using ::webrtc::SSL_PROTOCOL_TLS_13; | 
 | using ::webrtc::SSL_SERVER; | 
 | using ::webrtc::SSLHandshakeError; | 
 | using ::webrtc::SSLMode; | 
 | using ::webrtc::SSLPeerCertificateDigestError; | 
 | using ::webrtc::SSLProtocolVersion; | 
 | using ::webrtc::SSLRole; | 
 | using ::webrtc::SSLStreamAdapter; | 
 | }  // namespace rtc | 
 |  | 
 | #endif  // RTC_BASE_SSL_STREAM_ADAPTER_H_ |