mirror of
https://github.com/mollyim/webrtc.git
synced 2025-05-15 06:40:43 +01:00

This patchs adds a field trial for enabling DTLS1.3, WebRTC-ForceDtls13 - "Enabled" set max version to DTLS1.3 - "Only" set min & max version to DTLS1.3 Wireup a FieldTrialsView so that this does not use the global string. Also convert the WebRTC-DisableTlsSessionTicketKillswitch from global string to FieldTrialsView. BUG=webrtc:383141571 Change-Id: Ia775efc1dcbffd01bfddb6030490438cb8de89d7 Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/372261 Reviewed-by: Harald Alvestrand <hta@webrtc.org> Commit-Queue: Jonas Oreland <jonaso@webrtc.org> Cr-Commit-Position: refs/heads/main@{#43616}
130 lines
4.3 KiB
C++
130 lines
4.3 KiB
C++
/*
|
|
* Copyright 2004 The WebRTC Project Authors. All rights reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include "rtc_base/ssl_stream_adapter.h"
|
|
|
|
#include <cstddef>
|
|
#include <cstdint>
|
|
#include <memory>
|
|
#include <string>
|
|
#include <utility>
|
|
|
|
#include "absl/functional/any_invocable.h"
|
|
#include "absl/strings/string_view.h"
|
|
#include "api/array_view.h"
|
|
#include "rtc_base/openssl_stream_adapter.h"
|
|
#include "rtc_base/ssl_identity.h"
|
|
#include "rtc_base/stream.h"
|
|
|
|
namespace rtc {
|
|
|
|
// Deprecated, prefer SrtpCryptoSuiteToName.
|
|
const char kCsAesCm128HmacSha1_80[] = "AES_CM_128_HMAC_SHA1_80";
|
|
const char kCsAesCm128HmacSha1_32[] = "AES_CM_128_HMAC_SHA1_32";
|
|
const char kCsAeadAes128Gcm[] = "AEAD_AES_128_GCM";
|
|
const char kCsAeadAes256Gcm[] = "AEAD_AES_256_GCM";
|
|
|
|
std::string SrtpCryptoSuiteToName(int crypto_suite) {
|
|
switch (crypto_suite) {
|
|
case kSrtpAes128CmSha1_80:
|
|
return "AES_CM_128_HMAC_SHA1_80";
|
|
case kSrtpAes128CmSha1_32:
|
|
return "AES_CM_128_HMAC_SHA1_32";
|
|
case kSrtpAeadAes128Gcm:
|
|
return "AEAD_AES_128_GCM";
|
|
case kSrtpAeadAes256Gcm:
|
|
return "AEAD_AES_256_GCM";
|
|
default:
|
|
return std::string();
|
|
}
|
|
}
|
|
|
|
bool GetSrtpKeyAndSaltLengths(int crypto_suite,
|
|
int* key_length,
|
|
int* salt_length) {
|
|
switch (crypto_suite) {
|
|
case kSrtpAes128CmSha1_32:
|
|
case kSrtpAes128CmSha1_80:
|
|
// SRTP_AES128_CM_HMAC_SHA1_32 and SRTP_AES128_CM_HMAC_SHA1_80 are defined
|
|
// in RFC 5764 to use a 128 bits key and 112 bits salt for the cipher.
|
|
*key_length = 16;
|
|
*salt_length = 14;
|
|
break;
|
|
case kSrtpAeadAes128Gcm:
|
|
// kSrtpAeadAes128Gcm is defined in RFC 7714 to use a 128 bits key and
|
|
// a 96 bits salt for the cipher.
|
|
*key_length = 16;
|
|
*salt_length = 12;
|
|
break;
|
|
case kSrtpAeadAes256Gcm:
|
|
// kSrtpAeadAes256Gcm is defined in RFC 7714 to use a 256 bits key and
|
|
// a 96 bits salt for the cipher.
|
|
*key_length = 32;
|
|
*salt_length = 12;
|
|
break;
|
|
default:
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool IsGcmCryptoSuite(int crypto_suite) {
|
|
return (crypto_suite == kSrtpAeadAes256Gcm ||
|
|
crypto_suite == kSrtpAeadAes128Gcm);
|
|
}
|
|
|
|
std::unique_ptr<SSLStreamAdapter> SSLStreamAdapter::Create(
|
|
std::unique_ptr<StreamInterface> stream,
|
|
absl::AnyInvocable<void(SSLHandshakeError)> handshake_error,
|
|
const webrtc::FieldTrialsView* field_trials) {
|
|
return std::make_unique<OpenSSLStreamAdapter>(
|
|
std::move(stream), std::move(handshake_error), field_trials);
|
|
}
|
|
|
|
bool SSLStreamAdapter::IsBoringSsl() {
|
|
return OpenSSLStreamAdapter::IsBoringSsl();
|
|
}
|
|
bool SSLStreamAdapter::IsAcceptableCipher(int cipher, KeyType key_type) {
|
|
return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type);
|
|
}
|
|
bool SSLStreamAdapter::IsAcceptableCipher(absl::string_view cipher,
|
|
KeyType key_type) {
|
|
return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type);
|
|
}
|
|
|
|
// Default shim for backward compat.
|
|
bool SSLStreamAdapter::SetPeerCertificateDigest(
|
|
absl::string_view digest_alg,
|
|
const unsigned char* digest_val,
|
|
size_t digest_len,
|
|
SSLPeerCertificateDigestError* error) {
|
|
unsigned char* nonconst_val = const_cast<unsigned char*>(digest_val);
|
|
SSLPeerCertificateDigestError ret = SetPeerCertificateDigest(
|
|
digest_alg, rtc::ArrayView<uint8_t>(nonconst_val, digest_len));
|
|
if (error)
|
|
*error = ret;
|
|
return ret == SSLPeerCertificateDigestError::NONE;
|
|
}
|
|
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
// Test only settings
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
|
|
void SSLStreamAdapter::EnableTimeCallbackForTesting() {
|
|
OpenSSLStreamAdapter::EnableTimeCallbackForTesting();
|
|
}
|
|
|
|
SSLProtocolVersion SSLStreamAdapter::GetMaxSupportedDTLSProtocolVersion() {
|
|
return OpenSSLStreamAdapter::GetMaxSupportedDTLSProtocolVersion();
|
|
}
|
|
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
|
|
} // namespace rtc
|