Revert "Add SSLConfig object to IceServer."
This reverts commit 4f085434b912060874d6697f17aaedd2adae7c49. Reason for revert: breaks downstream projects. Original change's description: > Add SSLConfig object to IceServer. > > This is a rollforward of https://webrtc-review.googlesource.com/c/src/+/96020, > with the addition of setting the old tlsCertPolicy, tlsAlpnProtocols and > tlsEllipticCurves in the RTCIceServer initializer, for backwards compatibility. > > Bug: webrtc:9662 > Change-Id: I28706ed4ff5abe3f7f913f105779f0e5412aeac5 > Reviewed-on: https://webrtc-review.googlesource.com/98762 > Commit-Queue: Diogo Real <diogor@google.com> > Reviewed-by: Sami Kalliomäki <sakal@webrtc.org> > Reviewed-by: Kári Helgason <kthelgason@webrtc.org> > Reviewed-by: Steve Anton <steveanton@webrtc.org> > Reviewed-by: Qingsi Wang <qingsi@webrtc.org> > Cr-Commit-Position: refs/heads/master@{#24696} TBR=steveanton@webrtc.org,sakal@webrtc.org,kwiberg@webrtc.org,kthelgason@webrtc.org,qingsi@webrtc.org,benwright@webrtc.org,diogor@google.com Change-Id: I1cb64b63fec688b4ac90c2fa368eaf0bc11046af No-Presubmit: true No-Tree-Checks: true No-Try: true Bug: webrtc:9662 Reviewed-on: https://webrtc-review.googlesource.com/99880 Reviewed-by: Sergey Silkin <ssilkin@webrtc.org> Commit-Queue: Sergey Silkin <ssilkin@webrtc.org> Cr-Commit-Position: refs/heads/master@{#24701}
This commit is contained in:

committed by
Commit Bot

parent
289e980708
commit
9c147ddc91
@ -112,7 +112,6 @@
|
||||
#include "rtc_base/rtccertificate.h"
|
||||
#include "rtc_base/rtccertificategenerator.h"
|
||||
#include "rtc_base/socketaddress.h"
|
||||
#include "rtc_base/ssladapter.h"
|
||||
#include "rtc_base/sslcertificate.h"
|
||||
#include "rtc_base/sslstreamadapter.h"
|
||||
|
||||
@ -188,7 +187,6 @@ class PeerConnectionInterface : public rtc::RefCountInterface {
|
||||
kIceConnectionMax,
|
||||
};
|
||||
|
||||
// Deprecated. TODO(diogor, webrtc:9673): Remove from API.
|
||||
// TLS certificate policy.
|
||||
enum TlsCertPolicy {
|
||||
// For TLS based protocols, ensure the connection is secure by not
|
||||
@ -213,29 +211,23 @@ class PeerConnectionInterface : public rtc::RefCountInterface {
|
||||
std::vector<std::string> urls;
|
||||
std::string username;
|
||||
std::string password;
|
||||
// Deprecated. rtc::SSLConfig should be used instead.
|
||||
TlsCertPolicy tls_cert_policy = kTlsCertPolicySecure;
|
||||
// If the URIs in |urls| only contain IP addresses, this field can be used
|
||||
// to indicate the hostname, which may be necessary for TLS (using the SNI
|
||||
// extension). If |urls| itself contains the hostname, this isn't
|
||||
// necessary.
|
||||
std::string hostname;
|
||||
// Deprecated. rtc::SSLConfig should be used instead.
|
||||
// List of protocols to be used in the TLS ALPN extension.
|
||||
std::vector<std::string> tls_alpn_protocols;
|
||||
// Deprecated. rtc::SSLConfig should be used instead.
|
||||
// List of elliptic curves to be used in the TLS elliptic curves extension.
|
||||
std::vector<std::string> tls_elliptic_curves;
|
||||
// SSL configuration options for any SSL/TLS connections to this IceServer.
|
||||
rtc::SSLConfig ssl_config;
|
||||
|
||||
bool operator==(const IceServer& o) const {
|
||||
return uri == o.uri && urls == o.urls && username == o.username &&
|
||||
password == o.password && tls_cert_policy == o.tls_cert_policy &&
|
||||
hostname == o.hostname &&
|
||||
tls_alpn_protocols == o.tls_alpn_protocols &&
|
||||
tls_elliptic_curves == o.tls_elliptic_curves &&
|
||||
ssl_config == o.ssl_config;
|
||||
tls_elliptic_curves == o.tls_elliptic_curves;
|
||||
}
|
||||
bool operator!=(const IceServer& o) const { return !(*this == o); }
|
||||
};
|
||||
|
@ -157,7 +157,12 @@ AsyncPacketSocket* BasicPacketSocketFactory::CreateClientTcpSocket(
|
||||
return NULL;
|
||||
}
|
||||
|
||||
ssl_adapter->SetSSLConfig(tcp_options.ssl_config);
|
||||
if (tlsOpts & PacketSocketFactory::OPT_TLS_INSECURE) {
|
||||
ssl_adapter->SetIgnoreBadCert(true);
|
||||
}
|
||||
|
||||
ssl_adapter->SetAlpnProtocols(tcp_options.tls_alpn_protocols);
|
||||
ssl_adapter->SetEllipticCurves(tcp_options.tls_elliptic_curves);
|
||||
ssl_adapter->SetCertVerifier(tcp_options.tls_cert_verifier);
|
||||
|
||||
socket = ssl_adapter;
|
||||
|
@ -14,10 +14,8 @@
|
||||
#include <string>
|
||||
#include <vector>
|
||||
|
||||
#include "absl/types/optional.h"
|
||||
#include "rtc_base/constructormagic.h"
|
||||
#include "rtc_base/proxyinfo.h"
|
||||
#include "rtc_base/ssladapter.h"
|
||||
#include "rtc_base/sslcertificate.h"
|
||||
|
||||
namespace rtc {
|
||||
@ -28,12 +26,11 @@ struct PacketSocketTcpOptions {
|
||||
~PacketSocketTcpOptions();
|
||||
|
||||
int opts = 0;
|
||||
std::vector<std::string> tls_alpn_protocols;
|
||||
std::vector<std::string> tls_elliptic_curves;
|
||||
// An optional custom SSL certificate verifier that an API user can provide to
|
||||
// inject their own certificate verification logic.
|
||||
SSLCertificateVerifier* tls_cert_verifier = nullptr;
|
||||
|
||||
// SSL configuration options.
|
||||
rtc::SSLConfig ssl_config;
|
||||
};
|
||||
|
||||
class AsyncPacketSocket;
|
||||
|
@ -537,7 +537,8 @@ class PortTest : public testing::Test, public sigslot::has_slots<> {
|
||||
return TurnPort::Create(
|
||||
&main_, socket_factory, MakeNetwork(addr), 0, 0, username_, password_,
|
||||
ProtocolAddress(server_addr, int_proto), kRelayCredentials, 0,
|
||||
std::string(), nullptr, rtc::SSLConfig(), nullptr);
|
||||
std::string(), std::vector<std::string>(), std::vector<std::string>(),
|
||||
nullptr, nullptr);
|
||||
}
|
||||
RelayPort* CreateGturnPort(const SocketAddress& addr,
|
||||
ProtocolType int_proto,
|
||||
|
@ -20,7 +20,6 @@
|
||||
#include "p2p/base/portinterface.h"
|
||||
#include "rtc_base/helpers.h"
|
||||
#include "rtc_base/proxyinfo.h"
|
||||
#include "rtc_base/ssladapter.h"
|
||||
#include "rtc_base/sslcertificate.h"
|
||||
#include "rtc_base/third_party/sigslot/sigslot.h"
|
||||
#include "rtc_base/thread.h"
|
||||
@ -119,6 +118,17 @@ enum : uint32_t {
|
||||
CF_ALL = 0x7,
|
||||
};
|
||||
|
||||
// TLS certificate policy.
|
||||
enum class TlsCertPolicy {
|
||||
// For TLS based protocols, ensure the connection is secure by not
|
||||
// circumventing certificate validation.
|
||||
TLS_CERT_POLICY_SECURE,
|
||||
// For TLS based protocols, disregard security completely by skipping
|
||||
// certificate validation. This is insecure and should never be used unless
|
||||
// security is irrelevant in that particular context.
|
||||
TLS_CERT_POLICY_INSECURE_NO_CHECK,
|
||||
};
|
||||
|
||||
// TODO(deadbeef): Rename to TurnCredentials (and username to ufrag).
|
||||
struct RelayCredentials {
|
||||
RelayCredentials() {}
|
||||
@ -134,17 +144,6 @@ struct RelayCredentials {
|
||||
std::string password;
|
||||
};
|
||||
|
||||
// TLS certificate policy.
|
||||
enum class TlsCertPolicy {
|
||||
// For TLS based protocols, ensure the connection is secure by not
|
||||
// circumventing certificate validation.
|
||||
TLS_CERT_POLICY_SECURE,
|
||||
// For TLS based protocols, disregard security completely by skipping
|
||||
// certificate validation. This is insecure and should never be used unless
|
||||
// security is irrelevant in that particular context.
|
||||
TLS_CERT_POLICY_INSECURE_NO_CHECK,
|
||||
};
|
||||
|
||||
typedef std::vector<ProtocolAddress> PortList;
|
||||
// TODO(deadbeef): Rename to TurnServerConfig.
|
||||
struct RelayServerConfig {
|
||||
@ -181,7 +180,6 @@ struct RelayServerConfig {
|
||||
TlsCertPolicy tls_cert_policy = TlsCertPolicy::TLS_CERT_POLICY_SECURE;
|
||||
std::vector<std::string> tls_alpn_protocols;
|
||||
std::vector<std::string> tls_elliptic_curves;
|
||||
rtc::SSLConfig ssl_config;
|
||||
rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr;
|
||||
};
|
||||
|
||||
|
@ -110,12 +110,7 @@ class TestTurnServer : public TurnAuthInterface {
|
||||
adapter->SetRole(rtc::SSL_SERVER);
|
||||
adapter->SetIdentity(
|
||||
rtc::SSLIdentity::Generate(common_name, rtc::KeyParams()));
|
||||
rtc::SSLConfig ssl_config;
|
||||
if (ignore_bad_cert) {
|
||||
ssl_config.tls_cert_policy =
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
}
|
||||
adapter->SetSSLConfig(ssl_config);
|
||||
adapter->SetIgnoreBadCert(ignore_bad_cert);
|
||||
socket = adapter;
|
||||
}
|
||||
socket->Bind(int_addr);
|
||||
|
@ -244,47 +244,8 @@ TurnPort::TurnPort(rtc::Thread* thread,
|
||||
username,
|
||||
password),
|
||||
server_address_(server_address),
|
||||
tls_cert_verifier_(tls_cert_verifier),
|
||||
credentials_(credentials),
|
||||
socket_(NULL),
|
||||
resolver_(NULL),
|
||||
error_(0),
|
||||
request_manager_(thread),
|
||||
next_channel_number_(TURN_CHANNEL_NUMBER_START),
|
||||
state_(STATE_CONNECTING),
|
||||
server_priority_(server_priority),
|
||||
allocate_mismatch_retries_(0),
|
||||
turn_customizer_(customizer) {
|
||||
ssl_config_.tls_alpn_protocols = tls_alpn_protocols;
|
||||
ssl_config_.tls_elliptic_curves = tls_elliptic_curves;
|
||||
request_manager_.SignalSendPacket.connect(this, &TurnPort::OnSendStunPacket);
|
||||
request_manager_.set_origin(origin);
|
||||
}
|
||||
|
||||
TurnPort::TurnPort(rtc::Thread* thread,
|
||||
rtc::PacketSocketFactory* factory,
|
||||
rtc::Network* network,
|
||||
uint16_t min_port,
|
||||
uint16_t max_port,
|
||||
const std::string& username,
|
||||
const std::string& password,
|
||||
const ProtocolAddress& server_address,
|
||||
const RelayCredentials& credentials,
|
||||
int server_priority,
|
||||
const std::string& origin,
|
||||
webrtc::TurnCustomizer* customizer,
|
||||
const rtc::SSLConfig& ssl_config,
|
||||
rtc::SSLCertificateVerifier* tls_cert_verifier)
|
||||
: Port(thread,
|
||||
RELAY_PORT_TYPE,
|
||||
factory,
|
||||
network,
|
||||
min_port,
|
||||
max_port,
|
||||
username,
|
||||
password),
|
||||
server_address_(server_address),
|
||||
ssl_config_(ssl_config),
|
||||
tls_alpn_protocols_(tls_alpn_protocols),
|
||||
tls_elliptic_curves_(tls_elliptic_curves),
|
||||
tls_cert_verifier_(tls_cert_verifier),
|
||||
credentials_(credentials),
|
||||
socket_(NULL),
|
||||
@ -328,20 +289,20 @@ ProtocolType TurnPort::GetProtocol() const {
|
||||
return server_address_.proto;
|
||||
}
|
||||
|
||||
void TurnPort::SetTlsCertPolicy(TlsCertPolicy tls_cert_policy) {
|
||||
switch (tls_cert_policy) {
|
||||
case TlsCertPolicy::TLS_CERT_POLICY_SECURE:
|
||||
ssl_config_.tls_cert_policy = rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE;
|
||||
break;
|
||||
case TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK:
|
||||
ssl_config_.tls_cert_policy =
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
break;
|
||||
}
|
||||
TlsCertPolicy TurnPort::GetTlsCertPolicy() const {
|
||||
return tls_cert_policy_;
|
||||
}
|
||||
|
||||
const rtc::SSLConfig& TurnPort::GetSslConfig() const {
|
||||
return ssl_config_;
|
||||
void TurnPort::SetTlsCertPolicy(TlsCertPolicy tls_cert_policy) {
|
||||
tls_cert_policy_ = tls_cert_policy;
|
||||
}
|
||||
|
||||
std::vector<std::string> TurnPort::GetTlsAlpnProtocols() const {
|
||||
return tls_alpn_protocols_;
|
||||
}
|
||||
|
||||
std::vector<std::string> TurnPort::GetTlsEllipticCurves() const {
|
||||
return tls_elliptic_curves_;
|
||||
}
|
||||
|
||||
void TurnPort::PrepareAddress() {
|
||||
@ -401,8 +362,8 @@ bool TurnPort::CreateTurnClientSocket() {
|
||||
|
||||
// Apply server address TLS and insecure bits to options.
|
||||
if (server_address_.proto == PROTO_TLS) {
|
||||
if (ssl_config_.tls_cert_policy ==
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK) {
|
||||
if (tls_cert_policy_ ==
|
||||
TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK) {
|
||||
opts |= rtc::PacketSocketFactory::OPT_TLS_INSECURE;
|
||||
} else {
|
||||
opts |= rtc::PacketSocketFactory::OPT_TLS;
|
||||
@ -411,8 +372,9 @@ bool TurnPort::CreateTurnClientSocket() {
|
||||
|
||||
rtc::PacketSocketTcpOptions tcp_options;
|
||||
tcp_options.opts = opts;
|
||||
tcp_options.tls_alpn_protocols = tls_alpn_protocols_;
|
||||
tcp_options.tls_elliptic_curves = tls_elliptic_curves_;
|
||||
tcp_options.tls_cert_verifier = tls_cert_verifier_;
|
||||
tcp_options.ssl_config = ssl_config_;
|
||||
socket_ = socket_factory()->CreateClientTcpSocket(
|
||||
rtc::SocketAddress(Network()->GetBestIP(), 0), server_address_.address,
|
||||
proxy(), user_agent(), tcp_options);
|
||||
|
@ -22,7 +22,6 @@
|
||||
#include "p2p/client/basicportallocator.h"
|
||||
#include "rtc_base/asyncinvoker.h"
|
||||
#include "rtc_base/asyncpacketsocket.h"
|
||||
#include "rtc_base/ssladapter.h"
|
||||
#include "rtc_base/sslcertificate.h"
|
||||
|
||||
namespace rtc {
|
||||
@ -67,7 +66,6 @@ class TurnPort : public Port {
|
||||
customizer);
|
||||
}
|
||||
|
||||
// Deprecated. TODO(diogor, webrtc:9673): Remove this constructor.
|
||||
// Create a TURN port that will use a new socket, bound to |network| and
|
||||
// using a port in the range between |min_port| and |max_port|.
|
||||
static TurnPort* Create(
|
||||
@ -86,34 +84,10 @@ class TurnPort : public Port {
|
||||
const std::vector<std::string>& tls_elliptic_curves,
|
||||
webrtc::TurnCustomizer* customizer,
|
||||
rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr) {
|
||||
rtc::SSLConfig ssl_config;
|
||||
ssl_config.tls_alpn_protocols = tls_alpn_protocols;
|
||||
ssl_config.tls_elliptic_curves = tls_elliptic_curves;
|
||||
return new TurnPort(thread, factory, network, min_port, max_port, username,
|
||||
password, server_address, credentials, server_priority,
|
||||
origin, customizer, ssl_config, tls_cert_verifier);
|
||||
}
|
||||
|
||||
// Create a TURN port that will use a new socket, bound to |network| and
|
||||
// using a port in the range between |min_port| and |max_port|.
|
||||
static TurnPort* Create(
|
||||
rtc::Thread* thread,
|
||||
rtc::PacketSocketFactory* factory,
|
||||
rtc::Network* network,
|
||||
uint16_t min_port,
|
||||
uint16_t max_port,
|
||||
const std::string& username, // ice username.
|
||||
const std::string& password, // ice password.
|
||||
const ProtocolAddress& server_address,
|
||||
const RelayCredentials& credentials,
|
||||
int server_priority,
|
||||
const std::string& origin,
|
||||
webrtc::TurnCustomizer* customizer,
|
||||
const rtc::SSLConfig& ssl_config,
|
||||
rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr) {
|
||||
return new TurnPort(thread, factory, network, min_port, max_port, username,
|
||||
password, server_address, credentials, server_priority,
|
||||
origin, customizer, ssl_config, tls_cert_verifier);
|
||||
origin, tls_alpn_protocols, tls_elliptic_curves,
|
||||
customizer, tls_cert_verifier);
|
||||
}
|
||||
|
||||
~TurnPort() override;
|
||||
@ -130,11 +104,11 @@ class TurnPort : public Port {
|
||||
|
||||
ProtocolType GetProtocol() const override;
|
||||
|
||||
// Deprecated. SSLConfig should be used instead.
|
||||
// TODO(diogor, webrtc:9673): Remove this.
|
||||
virtual TlsCertPolicy GetTlsCertPolicy() const;
|
||||
virtual void SetTlsCertPolicy(TlsCertPolicy tls_cert_policy);
|
||||
|
||||
virtual const rtc::SSLConfig& GetSslConfig() const;
|
||||
virtual std::vector<std::string> GetTlsAlpnProtocols() const;
|
||||
virtual std::vector<std::string> GetTlsEllipticCurves() const;
|
||||
|
||||
// Release a TURN allocation by sending a refresh with lifetime 0.
|
||||
// Sets state to STATE_RECEIVEONLY.
|
||||
@ -246,21 +220,6 @@ class TurnPort : public Port {
|
||||
webrtc::TurnCustomizer* customizer,
|
||||
rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr);
|
||||
|
||||
TurnPort(rtc::Thread* thread,
|
||||
rtc::PacketSocketFactory* factory,
|
||||
rtc::Network* network,
|
||||
uint16_t min_port,
|
||||
uint16_t max_port,
|
||||
const std::string& username,
|
||||
const std::string& password,
|
||||
const ProtocolAddress& server_address,
|
||||
const RelayCredentials& credentials,
|
||||
int server_priority,
|
||||
const std::string& origin,
|
||||
webrtc::TurnCustomizer* customizer,
|
||||
const rtc::SSLConfig& ssl_config,
|
||||
rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr);
|
||||
|
||||
// NOTE: This method needs to be accessible for StacPort
|
||||
// return true if entry was created (i.e channel_number consumed).
|
||||
bool CreateOrRefreshEntry(const rtc::SocketAddress& addr,
|
||||
@ -345,7 +304,9 @@ class TurnPort : public Port {
|
||||
size_t size, bool payload);
|
||||
|
||||
ProtocolAddress server_address_;
|
||||
rtc::SSLConfig ssl_config_;
|
||||
TlsCertPolicy tls_cert_policy_ = TlsCertPolicy::TLS_CERT_POLICY_SECURE;
|
||||
std::vector<std::string> tls_alpn_protocols_;
|
||||
std::vector<std::string> tls_elliptic_curves_;
|
||||
rtc::SSLCertificateVerifier* tls_cert_verifier_;
|
||||
RelayCredentials credentials_;
|
||||
AttemptedServerSet attempted_server_addresses_;
|
||||
|
@ -270,16 +270,21 @@ class TurnPortTest : public testing::Test,
|
||||
const ProtocolAddress& server_address,
|
||||
const std::string& origin) {
|
||||
RelayCredentials credentials(username, password);
|
||||
rtc::SSLConfig ssl_config;
|
||||
ssl_config.tls_cert_policy =
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
turn_port_.reset(TurnPort::Create(&main_, &socket_factory_, network, 0, 0,
|
||||
kIceUfrag1, kIcePwd1, server_address,
|
||||
credentials, 0, origin,
|
||||
turn_customizer_.get(), ssl_config));
|
||||
turn_port_.reset(TurnPort::Create(
|
||||
&main_, &socket_factory_, network, 0, 0, kIceUfrag1, kIcePwd1,
|
||||
server_address, credentials, 0, origin, std::vector<std::string>(),
|
||||
std::vector<std::string>(), turn_customizer_.get()));
|
||||
// This TURN port will be the controlling.
|
||||
turn_port_->SetIceRole(ICEROLE_CONTROLLING);
|
||||
ConnectSignals();
|
||||
|
||||
if (server_address.proto == cricket::PROTO_TLS) {
|
||||
// The test TURN server has a self-signed certificate so will not pass
|
||||
// the normal client validation. Instruct the client to ignore certificate
|
||||
// errors for testing only.
|
||||
turn_port_->SetTlsCertPolicy(
|
||||
TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK);
|
||||
}
|
||||
}
|
||||
|
||||
void CreateSharedTurnPort(const std::string& username,
|
||||
|
@ -26,29 +26,20 @@ std::unique_ptr<Port> TurnPortFactory::Create(
|
||||
args.username, args.password, *args.server_address,
|
||||
args.config->credentials, args.config->priority, args.origin,
|
||||
args.turn_customizer);
|
||||
port->SetTlsCertPolicy(args.config->tls_cert_policy);
|
||||
return std::unique_ptr<Port>(port);
|
||||
}
|
||||
|
||||
std::unique_ptr<Port> TurnPortFactory::Create(const CreateRelayPortArgs& args,
|
||||
int min_port,
|
||||
int max_port) {
|
||||
rtc::SSLConfig ssl_config = args.config->ssl_config;
|
||||
if (!args.config->tls_alpn_protocols.empty()) {
|
||||
ssl_config.tls_alpn_protocols = args.config->tls_alpn_protocols;
|
||||
}
|
||||
if (!args.config->tls_elliptic_curves.empty()) {
|
||||
ssl_config.tls_elliptic_curves = args.config->tls_elliptic_curves;
|
||||
}
|
||||
if (args.config->tls_cert_policy ==
|
||||
TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK) {
|
||||
ssl_config.tls_cert_policy =
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
}
|
||||
TurnPort* port = TurnPort::Create(
|
||||
args.network_thread, args.socket_factory, args.network, min_port,
|
||||
max_port, args.username, args.password, *args.server_address,
|
||||
args.config->credentials, args.config->priority, args.origin,
|
||||
args.turn_customizer, ssl_config, args.config->tls_cert_verifier);
|
||||
args.config->tls_alpn_protocols, args.config->tls_elliptic_curves,
|
||||
args.turn_customizer, args.config->tls_cert_verifier);
|
||||
port->SetTlsCertPolicy(args.config->tls_cert_policy);
|
||||
return std::unique_ptr<Port>(port);
|
||||
}
|
||||
|
||||
|
@ -14,7 +14,6 @@
|
||||
#include <string>
|
||||
|
||||
#include "rtc_base/arraysize.h"
|
||||
#include "rtc_base/ssladapter.h"
|
||||
|
||||
namespace webrtc {
|
||||
|
||||
@ -255,22 +254,13 @@ static RTCErrorType ParseIceServerUrl(
|
||||
}
|
||||
cricket::RelayServerConfig config = cricket::RelayServerConfig(
|
||||
socket_address, username, server.password, turn_transport_type);
|
||||
|
||||
config.ssl_config = server.ssl_config;
|
||||
|
||||
if (server.tls_cert_policy ==
|
||||
PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck) {
|
||||
config.ssl_config.tls_cert_policy =
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
}
|
||||
if (!server.ssl_config.tls_alpn_protocols.has_value() &&
|
||||
!server.tls_alpn_protocols.empty()) {
|
||||
config.ssl_config.tls_alpn_protocols = server.tls_alpn_protocols;
|
||||
}
|
||||
if (!server.ssl_config.tls_elliptic_curves.has_value() &&
|
||||
!server.tls_elliptic_curves.empty()) {
|
||||
config.ssl_config.tls_elliptic_curves = server.tls_elliptic_curves;
|
||||
config.tls_cert_policy =
|
||||
cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
}
|
||||
config.tls_alpn_protocols = server.tls_alpn_protocols;
|
||||
config.tls_elliptic_curves = server.tls_elliptic_curves;
|
||||
|
||||
turn_servers->push_back(config);
|
||||
break;
|
||||
|
@ -86,16 +86,16 @@ TEST_F(IceServerParsingTest, ParseStunPrefixes) {
|
||||
EXPECT_EQ(0U, stun_servers_.size());
|
||||
EXPECT_EQ(1U, turn_servers_.size());
|
||||
EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto);
|
||||
EXPECT_TRUE(turn_servers_[0].ssl_config.tls_cert_policy ==
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE);
|
||||
EXPECT_TRUE(turn_servers_[0].tls_cert_policy ==
|
||||
cricket::TlsCertPolicy::TLS_CERT_POLICY_SECURE);
|
||||
|
||||
EXPECT_TRUE(ParseUrl(
|
||||
"turns:hostname", "username", "password",
|
||||
PeerConnectionInterface::TlsCertPolicy::kTlsCertPolicyInsecureNoCheck));
|
||||
EXPECT_EQ(0U, stun_servers_.size());
|
||||
EXPECT_EQ(1U, turn_servers_.size());
|
||||
EXPECT_TRUE(turn_servers_[0].ssl_config.tls_cert_policy ==
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK);
|
||||
EXPECT_TRUE(turn_servers_[0].tls_cert_policy ==
|
||||
cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK);
|
||||
EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto);
|
||||
|
||||
// invalid prefixes
|
||||
|
@ -209,6 +209,7 @@ OpenSSLAdapter::OpenSSLAdapter(AsyncSocket* socket,
|
||||
ssl_(nullptr),
|
||||
ssl_ctx_(nullptr),
|
||||
ssl_mode_(SSL_MODE_TLS),
|
||||
ignore_bad_cert_(false),
|
||||
custom_cert_verifier_status_(false) {
|
||||
// If a factory is used, take a reference on the factory's SSL_CTX.
|
||||
// Otherwise, we'll create our own later.
|
||||
@ -225,8 +226,16 @@ OpenSSLAdapter::~OpenSSLAdapter() {
|
||||
Cleanup();
|
||||
}
|
||||
|
||||
void OpenSSLAdapter::SetSSLConfig(const SSLConfig& ssl_config) {
|
||||
ssl_config_ = ssl_config;
|
||||
void OpenSSLAdapter::SetIgnoreBadCert(bool ignore) {
|
||||
ignore_bad_cert_ = ignore;
|
||||
}
|
||||
|
||||
void OpenSSLAdapter::SetAlpnProtocols(const std::vector<std::string>& protos) {
|
||||
alpn_protocols_ = protos;
|
||||
}
|
||||
|
||||
void OpenSSLAdapter::SetEllipticCurves(const std::vector<std::string>& curves) {
|
||||
elliptic_curves_ = curves;
|
||||
}
|
||||
|
||||
void OpenSSLAdapter::SetMode(SSLMode mode) {
|
||||
@ -260,7 +269,7 @@ AsyncSocket* OpenSSLAdapter::Accept(SocketAddress* paddr) {
|
||||
SSLAdapter* adapter = SSLAdapter::Create(socket);
|
||||
adapter->SetIdentity(identity_->GetReference());
|
||||
adapter->SetRole(rtc::SSL_SERVER);
|
||||
adapter->SetSSLConfig(ssl_config_);
|
||||
adapter->SetIgnoreBadCert(ignore_bad_cert_);
|
||||
adapter->StartSSL("", false);
|
||||
return adapter;
|
||||
}
|
||||
@ -358,28 +367,13 @@ int OpenSSLAdapter::BeginSSL() {
|
||||
}
|
||||
|
||||
#ifdef OPENSSL_IS_BORINGSSL
|
||||
// Potentially set a couple common TLS extensions; even though we don't use
|
||||
// them yet.
|
||||
if (ssl_config_.enable_ocsp_stapling) {
|
||||
SSL_enable_ocsp_stapling(ssl_);
|
||||
}
|
||||
if (ssl_config_.enable_signed_cert_timestamp) {
|
||||
SSL_enable_signed_cert_timestamps(ssl_);
|
||||
}
|
||||
SSL_CTX_set_grease_enabled(ssl_ctx_, ssl_config_.enable_grease);
|
||||
// Set a couple common TLS extensions; even though we don't use them yet.
|
||||
SSL_enable_ocsp_stapling(ssl_);
|
||||
SSL_enable_signed_cert_timestamps(ssl_);
|
||||
#endif
|
||||
|
||||
if (ssl_config_.max_ssl_version.has_value()) {
|
||||
SSL_set_max_proto_version(ssl_, ssl_config_.max_ssl_version.value());
|
||||
}
|
||||
|
||||
if (ssl_config_.enable_tls_channel_id) {
|
||||
SSL_enable_tls_channel_id(ssl_);
|
||||
}
|
||||
|
||||
if (ssl_config_.tls_alpn_protocols.has_value()) {
|
||||
std::string tls_alpn_string =
|
||||
TransformAlpnProtocols(ssl_config_.tls_alpn_protocols.value());
|
||||
if (!alpn_protocols_.empty()) {
|
||||
std::string tls_alpn_string = TransformAlpnProtocols(alpn_protocols_);
|
||||
if (!tls_alpn_string.empty()) {
|
||||
SSL_set_alpn_protos(
|
||||
ssl_, reinterpret_cast<const unsigned char*>(tls_alpn_string.data()),
|
||||
@ -387,9 +381,8 @@ int OpenSSLAdapter::BeginSSL() {
|
||||
}
|
||||
}
|
||||
|
||||
if (ssl_config_.tls_elliptic_curves.has_value()) {
|
||||
SSL_set1_curves_list(
|
||||
ssl_, rtc::join(ssl_config_.tls_elliptic_curves.value(), ':').c_str());
|
||||
if (!elliptic_curves_.empty()) {
|
||||
SSL_set1_curves_list(ssl_, rtc::join(elliptic_curves_, ':').c_str());
|
||||
}
|
||||
|
||||
// Now that the initial config is done, transfer ownership of |bio| to the
|
||||
@ -801,10 +794,10 @@ bool OpenSSLAdapter::SSLPostConnectionCheck(SSL* ssl, const std::string& host) {
|
||||
openssl::VerifyPeerCertMatchesHost(ssl, host) &&
|
||||
(SSL_get_verify_result(ssl) == X509_V_OK || custom_cert_verifier_status_);
|
||||
|
||||
if (!is_valid_cert_name && ShouldIgnoreBadCert()) {
|
||||
if (!is_valid_cert_name && ignore_bad_cert_) {
|
||||
RTC_DLOG(LS_WARNING) << "Other TLS post connection checks failed. "
|
||||
"TLS cert policy set to ignore bad certs. "
|
||||
"Overriding name verification failure!";
|
||||
"ignore_bad_cert_ set to true. Overriding name "
|
||||
"verification failure!";
|
||||
is_valid_cert_name = true;
|
||||
}
|
||||
return is_valid_cert_name;
|
||||
@ -877,7 +870,7 @@ int OpenSSLAdapter::SSLVerifyCallback(int ok, X509_STORE_CTX* store) {
|
||||
}
|
||||
|
||||
// Should only be used for debugging and development.
|
||||
if (!ok && stream->ShouldIgnoreBadCert()) {
|
||||
if (!ok && stream->ignore_bad_cert_) {
|
||||
RTC_DLOG(LS_WARNING) << "Ignoring cert error while verifying cert chain";
|
||||
ok = 1;
|
||||
}
|
||||
@ -948,11 +941,6 @@ SSL_CTX* OpenSSLAdapter::CreateContext(SSLMode mode, bool enable_cache) {
|
||||
return ctx;
|
||||
}
|
||||
|
||||
bool OpenSSLAdapter::ShouldIgnoreBadCert() {
|
||||
return ssl_config_.tls_cert_policy ==
|
||||
TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
}
|
||||
|
||||
std::string TransformAlpnProtocols(
|
||||
const std::vector<std::string>& alpn_protocols) {
|
||||
// Transforms the alpn_protocols list to the format expected by
|
||||
|
@ -45,7 +45,9 @@ class OpenSSLAdapter : public SSLAdapter, public MessageHandler {
|
||||
SSLCertificateVerifier* ssl_cert_verifier = nullptr);
|
||||
~OpenSSLAdapter() override;
|
||||
|
||||
void SetSSLConfig(const SSLConfig& ssl_config) override;
|
||||
void SetIgnoreBadCert(bool ignore) override;
|
||||
void SetAlpnProtocols(const std::vector<std::string>& protos) override;
|
||||
void SetEllipticCurves(const std::vector<std::string>& curves) override;
|
||||
void SetMode(SSLMode mode) override;
|
||||
void SetCertVerifier(SSLCertificateVerifier* ssl_cert_verifier) override;
|
||||
void SetIdentity(SSLIdentity* identity) override;
|
||||
@ -93,9 +95,6 @@ class OpenSSLAdapter : public SSLAdapter, public MessageHandler {
|
||||
void Error(const char* context, int err, bool signal = true);
|
||||
void Cleanup();
|
||||
|
||||
// If true, the server certificate need not match the configured hostname.
|
||||
bool ShouldIgnoreBadCert();
|
||||
|
||||
// Return value and arguments have the same meanings as for Send; |error| is
|
||||
// an output parameter filled with the result of SSL_get_error.
|
||||
int DoSslWrite(const void* pv, size_t cb, int* error);
|
||||
@ -139,8 +138,12 @@ class OpenSSLAdapter : public SSLAdapter, public MessageHandler {
|
||||
std::string ssl_host_name_;
|
||||
// Set the adapter to DTLS or TLS mode before creating the context.
|
||||
SSLMode ssl_mode_;
|
||||
// SSL configuration for this session.
|
||||
SSLConfig ssl_config_;
|
||||
// If true, the server certificate need not match the configured hostname.
|
||||
bool ignore_bad_cert_;
|
||||
// List of protocols to be used in the TLS ALPN extension.
|
||||
std::vector<std::string> alpn_protocols_;
|
||||
// List of elliptic curves to be used in the TLS elliptic curves extension.
|
||||
std::vector<std::string> elliptic_curves_;
|
||||
// Holds the result of the call to run of the ssl_cert_verify_->Verify()
|
||||
bool custom_cert_verifier_status_;
|
||||
};
|
||||
|
@ -16,12 +16,6 @@
|
||||
|
||||
namespace rtc {
|
||||
|
||||
SSLConfig::SSLConfig() = default;
|
||||
SSLConfig::SSLConfig(const SSLConfig&) = default;
|
||||
SSLConfig::~SSLConfig() = default;
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
SSLAdapterFactory* SSLAdapterFactory::Create() {
|
||||
return new OpenSSLAdapterFactory();
|
||||
}
|
||||
|
@ -22,57 +22,6 @@ namespace rtc {
|
||||
|
||||
class SSLAdapter;
|
||||
|
||||
// TLS certificate policy.
|
||||
enum class TlsCertPolicy {
|
||||
// For TLS based protocols, ensure the connection is secure by not
|
||||
// circumventing certificate validation.
|
||||
TLS_CERT_POLICY_SECURE,
|
||||
// For TLS based protocols, disregard security completely by skipping
|
||||
// certificate validation. This is insecure and should never be used unless
|
||||
// security is irrelevant in that particular context.
|
||||
// Do not set to this value in production code.
|
||||
// TODO(juberti): Remove the opportunistic encryption mechanism in
|
||||
// BasicPacketSocketFactory that uses this value.
|
||||
TLS_CERT_POLICY_INSECURE_NO_CHECK,
|
||||
};
|
||||
|
||||
// SSL configuration options.
|
||||
struct SSLConfig final {
|
||||
SSLConfig();
|
||||
SSLConfig(const SSLConfig&);
|
||||
~SSLConfig();
|
||||
|
||||
bool operator==(const SSLConfig& o) const {
|
||||
return enable_ocsp_stapling == o.enable_ocsp_stapling &&
|
||||
enable_signed_cert_timestamp == o.enable_signed_cert_timestamp &&
|
||||
enable_tls_channel_id == o.enable_tls_channel_id &&
|
||||
enable_grease == o.enable_grease &&
|
||||
max_ssl_version == o.max_ssl_version &&
|
||||
tls_alpn_protocols == o.tls_alpn_protocols &&
|
||||
tls_elliptic_curves == o.tls_elliptic_curves;
|
||||
}
|
||||
bool operator!=(const SSLConfig& o) const { return !(*this == o); }
|
||||
|
||||
// If true, enables the (unused) OCSP stapling TLS extension.
|
||||
bool enable_ocsp_stapling = true;
|
||||
// If true, enables the (unused) signed certificate timestamp TLS extension.
|
||||
bool enable_signed_cert_timestamp = true;
|
||||
// If true, enables the (unused) channel ID TLS extension.
|
||||
bool enable_tls_channel_id = false;
|
||||
// If true, enables the (unused) GREASE TLS extension.
|
||||
bool enable_grease = false;
|
||||
// Indicates how to process incoming certificates.
|
||||
TlsCertPolicy tls_cert_policy = TlsCertPolicy::TLS_CERT_POLICY_SECURE;
|
||||
// If set, indicates the highest supported SSL version.
|
||||
absl::optional<int> max_ssl_version;
|
||||
// If set, indicates the list of protocols to be used in the TLS ALPN
|
||||
// extension.
|
||||
absl::optional<std::vector<std::string>> tls_alpn_protocols;
|
||||
// If set, indicates the list of curves to be used in the TLS elliptic curves
|
||||
// extension.
|
||||
absl::optional<std::vector<std::string>> tls_elliptic_curves;
|
||||
};
|
||||
|
||||
// Class for creating SSL adapters with shared state, e.g., a session cache,
|
||||
// which allows clients to resume SSL sessions to previously-contacted hosts.
|
||||
// Clients should create the factory using Create(), set up the factory as
|
||||
@ -103,8 +52,14 @@ class SSLAdapter : public AsyncSocketAdapter {
|
||||
public:
|
||||
explicit SSLAdapter(AsyncSocket* socket) : AsyncSocketAdapter(socket) {}
|
||||
|
||||
// Sets the SSL configuration for this session.
|
||||
virtual void SetSSLConfig(const SSLConfig& ssl_config) = 0;
|
||||
// Methods that control server certificate verification, used in unit tests.
|
||||
// Do not call these methods in production code.
|
||||
// TODO(juberti): Remove the opportunistic encryption mechanism in
|
||||
// BasicPacketSocketFactory that uses this function.
|
||||
virtual void SetIgnoreBadCert(bool ignore) = 0;
|
||||
|
||||
virtual void SetAlpnProtocols(const std::vector<std::string>& protos) = 0;
|
||||
virtual void SetEllipticCurves(const std::vector<std::string>& curves) = 0;
|
||||
|
||||
// Do DTLS or TLS (default is TLS, if unspecified)
|
||||
virtual void SetMode(SSLMode mode) = 0;
|
||||
|
@ -67,9 +67,7 @@ class SSLAdapterTestDummyClient : public sigslot::has_slots<> {
|
||||
// Ignore any certificate errors for the purpose of testing.
|
||||
// Note: We do this only because we don't have a real certificate.
|
||||
// NEVER USE THIS IN PRODUCTION CODE!
|
||||
ssl_config_.tls_cert_policy =
|
||||
rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
ssl_adapter_->SetIgnoreBadCert(true);
|
||||
|
||||
ssl_adapter_->SignalReadEvent.connect(
|
||||
this, &SSLAdapterTestDummyClient::OnSSLAdapterReadEvent);
|
||||
@ -77,52 +75,22 @@ class SSLAdapterTestDummyClient : public sigslot::has_slots<> {
|
||||
this, &SSLAdapterTestDummyClient::OnSSLAdapterCloseEvent);
|
||||
}
|
||||
|
||||
void SetTlsCertPolicy(rtc::TlsCertPolicy tls_cert_policy) {
|
||||
ssl_config_.tls_cert_policy = tls_cert_policy;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
}
|
||||
|
||||
void SetEnableOcspStapling(bool enable_ocsp_stapling) {
|
||||
ssl_config_.enable_ocsp_stapling = enable_ocsp_stapling;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
}
|
||||
|
||||
void SetEnableSignedCertTimestamp(bool enable_signed_cert_timestamp) {
|
||||
ssl_config_.enable_signed_cert_timestamp = enable_signed_cert_timestamp;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
}
|
||||
|
||||
void SetEnableTlsChannelId(bool enable_tls_channel_id) {
|
||||
ssl_config_.enable_tls_channel_id = enable_tls_channel_id;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
}
|
||||
|
||||
void SetEnableGrease(bool enable_grease) {
|
||||
ssl_config_.enable_grease = enable_grease;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
}
|
||||
|
||||
void SetMaxSslVersion(const absl::optional<int>& max_ssl_version) {
|
||||
ssl_config_.max_ssl_version = max_ssl_version;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
}
|
||||
|
||||
void SetAlpnProtocols(
|
||||
const absl::optional<std::vector<std::string>>& tls_alpn_protocols) {
|
||||
ssl_config_.tls_alpn_protocols = tls_alpn_protocols;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
}
|
||||
|
||||
void SetEllipticCurves(
|
||||
const absl::optional<std::vector<std::string>>& tls_elliptic_curves) {
|
||||
ssl_config_.tls_elliptic_curves = tls_elliptic_curves;
|
||||
ssl_adapter_->SetSSLConfig(ssl_config_);
|
||||
void SetIgnoreBadCert(bool ignore_bad_cert) {
|
||||
ssl_adapter_->SetIgnoreBadCert(ignore_bad_cert);
|
||||
}
|
||||
|
||||
void SetCertVerifier(rtc::SSLCertificateVerifier* ssl_cert_verifier) {
|
||||
ssl_adapter_->SetCertVerifier(ssl_cert_verifier);
|
||||
}
|
||||
|
||||
void SetAlpnProtocols(const std::vector<std::string>& protos) {
|
||||
ssl_adapter_->SetAlpnProtocols(protos);
|
||||
}
|
||||
|
||||
void SetEllipticCurves(const std::vector<std::string>& curves) {
|
||||
ssl_adapter_->SetEllipticCurves(curves);
|
||||
}
|
||||
|
||||
rtc::SocketAddress GetAddress() const {
|
||||
return ssl_adapter_->GetLocalAddress();
|
||||
}
|
||||
@ -186,8 +154,6 @@ class SSLAdapterTestDummyClient : public sigslot::has_slots<> {
|
||||
|
||||
std::unique_ptr<rtc::SSLAdapter> ssl_adapter_;
|
||||
|
||||
rtc::SSLConfig ssl_config_;
|
||||
|
||||
std::string data_;
|
||||
};
|
||||
|
||||
@ -339,51 +305,29 @@ class SSLAdapterTestBase : public testing::Test, public sigslot::has_slots<> {
|
||||
|
||||
void SetHandshakeWait(int wait) { handshake_wait_ = wait; }
|
||||
|
||||
void SetTlsCertPolicy(rtc::TlsCertPolicy tls_cert_policy) {
|
||||
client_->SetTlsCertPolicy(tls_cert_policy);
|
||||
}
|
||||
|
||||
void SetEnableOcspStapling(bool enable_ocsp_stapling) {
|
||||
client_->SetEnableOcspStapling(enable_ocsp_stapling);
|
||||
}
|
||||
|
||||
void SetEnableSignedCertTimestamp(bool enable_signed_cert_timestamp) {
|
||||
client_->SetEnableSignedCertTimestamp(enable_signed_cert_timestamp);
|
||||
}
|
||||
|
||||
void SetEnableTlsChannelId(bool enable_tls_channel_id) {
|
||||
client_->SetEnableTlsChannelId(enable_tls_channel_id);
|
||||
}
|
||||
|
||||
void SetEnableGrease(bool enable_grease) {
|
||||
client_->SetEnableGrease(enable_grease);
|
||||
}
|
||||
|
||||
void SetMaxSslVersion(const absl::optional<int>& max_ssl_version) {
|
||||
client_->SetMaxSslVersion(max_ssl_version);
|
||||
}
|
||||
|
||||
void SetAlpnProtocols(
|
||||
const absl::optional<std::vector<std::string>>& tls_alpn_protocols) {
|
||||
client_->SetAlpnProtocols(tls_alpn_protocols);
|
||||
}
|
||||
|
||||
void SetEllipticCurves(
|
||||
const absl::optional<std::vector<std::string>>& tls_elliptic_curves) {
|
||||
client_->SetEllipticCurves(tls_elliptic_curves);
|
||||
void SetIgnoreBadCert(bool ignore_bad_cert) {
|
||||
client_->SetIgnoreBadCert(ignore_bad_cert);
|
||||
}
|
||||
|
||||
void SetCertVerifier(rtc::SSLCertificateVerifier* ssl_cert_verifier) {
|
||||
client_->SetCertVerifier(ssl_cert_verifier);
|
||||
}
|
||||
|
||||
void SetAlpnProtocols(const std::vector<std::string>& protos) {
|
||||
client_->SetAlpnProtocols(protos);
|
||||
}
|
||||
|
||||
void SetEllipticCurves(const std::vector<std::string>& curves) {
|
||||
client_->SetEllipticCurves(curves);
|
||||
}
|
||||
|
||||
void SetMockCertVerifier(bool return_value) {
|
||||
auto mock_verifier = absl::make_unique<MockCertVerifier>();
|
||||
EXPECT_CALL(*mock_verifier, Verify(_)).WillRepeatedly(Return(return_value));
|
||||
cert_verifier_ =
|
||||
std::unique_ptr<rtc::SSLCertificateVerifier>(std::move(mock_verifier));
|
||||
|
||||
SetTlsCertPolicy(rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE);
|
||||
SetIgnoreBadCert(false);
|
||||
SetCertVerifier(cert_verifier_.get());
|
||||
}
|
||||
|
||||
@ -581,76 +525,6 @@ TEST_F(SSLAdapterTestTLS_ECDSA, TestTLSTransferCustomCertVerifier) {
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with OCSP stapling enabled
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestOcspStaplingEnabled) {
|
||||
SetEnableOcspStapling(true);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with OCSP stapling disabled
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestOcspStaplingDisabled) {
|
||||
SetEnableOcspStapling(false);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// test transfer with signed cert timestamp enabled
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestSignedCertTimestampEnabled) {
|
||||
SetEnableSignedCertTimestamp(true);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with signed cert timestamp disabled
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestSignedCertTimestampDisabled) {
|
||||
SetEnableSignedCertTimestamp(false);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with TLS channel ID enabled
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestTLSChannelIdEnabled) {
|
||||
SetEnableTlsChannelId(true);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with TLS channel ID disabled
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestTLSChannelIdDisabled) {
|
||||
SetEnableTlsChannelId(false);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with GREASE enabled
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestGreaseEnabled) {
|
||||
SetEnableGrease(true);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with GREASE disabled
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestGreaseDisabled) {
|
||||
SetEnableGrease(false);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with TLS1_3.
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestMaxSSLVersionTLS1_3) {
|
||||
SetMaxSslVersion(0x0304 /* TLS1_3 */);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer with TLS1_2.
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestMaxSSLVersionTLS1_2) {
|
||||
SetMaxSslVersion(0x0303 /* TLS1_2 */);
|
||||
TestHandshake(true);
|
||||
TestTransfer("Hello, world!");
|
||||
}
|
||||
|
||||
// Test transfer using ALPN with protos as h2 and http/1.1
|
||||
TEST_F(SSLAdapterTestTLS_ECDSA, TestTLSALPN) {
|
||||
std::vector<std::string> alpn_protos{"h2", "http/1.1"};
|
||||
|
@ -870,9 +870,6 @@ if (is_ios || is_mac) {
|
||||
"objc/api/peerconnection/RTCRtpTransceiver.mm",
|
||||
"objc/api/peerconnection/RTCSSLAdapter.h",
|
||||
"objc/api/peerconnection/RTCSSLAdapter.mm",
|
||||
"objc/api/peerconnection/RTCSSLConfig+Native.h",
|
||||
"objc/api/peerconnection/RTCSSLConfig.h",
|
||||
"objc/api/peerconnection/RTCSSLConfig.mm",
|
||||
"objc/api/peerconnection/RTCSessionDescription+Private.h",
|
||||
"objc/api/peerconnection/RTCSessionDescription.h",
|
||||
"objc/api/peerconnection/RTCSessionDescription.mm",
|
||||
@ -988,7 +985,6 @@ if (is_ios || is_mac) {
|
||||
"objc/Framework/Headers/WebRTC/RTCRtpSender.h",
|
||||
"objc/Framework/Headers/WebRTC/RTCRtpTransceiver.h",
|
||||
"objc/Framework/Headers/WebRTC/RTCSSLAdapter.h",
|
||||
"objc/Framework/Headers/WebRTC/RTCSSLConfig.h",
|
||||
"objc/Framework/Headers/WebRTC/RTCSessionDescription.h",
|
||||
"objc/Framework/Headers/WebRTC/RTCTracing.h",
|
||||
"objc/Framework/Headers/WebRTC/RTCVideoCapturer.h",
|
||||
|
@ -306,7 +306,6 @@ if (is_android) {
|
||||
"api/org/webrtc/RtpSender.java",
|
||||
"api/org/webrtc/RtpTransceiver.java",
|
||||
"api/org/webrtc/SSLCertificateVerifier.java",
|
||||
"api/org/webrtc/SslConfig.java",
|
||||
"api/org/webrtc/SdpObserver.java",
|
||||
"api/org/webrtc/SessionDescription.java",
|
||||
"api/org/webrtc/StatsObserver.java",
|
||||
@ -649,8 +648,6 @@ if (is_android) {
|
||||
"src/jni/pc/sessiondescription.h",
|
||||
"src/jni/pc/sslcertificateverifierwrapper.cc",
|
||||
"src/jni/pc/sslcertificateverifierwrapper.h",
|
||||
"src/jni/pc/sslconfig.cc",
|
||||
"src/jni/pc/sslconfig.h",
|
||||
"src/jni/pc/statsobserver.cc",
|
||||
"src/jni/pc/statsobserver.h",
|
||||
"src/jni/pc/turncustomizer.cc",
|
||||
@ -1196,7 +1193,6 @@ if (is_android) {
|
||||
"api/org/webrtc/SSLCertificateVerifier.java",
|
||||
"api/org/webrtc/SdpObserver.java",
|
||||
"api/org/webrtc/SessionDescription.java",
|
||||
"api/org/webrtc/SslConfig.java",
|
||||
"api/org/webrtc/StatsObserver.java",
|
||||
"api/org/webrtc/StatsReport.java",
|
||||
"api/org/webrtc/TurnCustomizer.java",
|
||||
|
@ -50,7 +50,6 @@ public class PeerConnection {
|
||||
}
|
||||
}
|
||||
|
||||
// TODO(diogor, webrtc:9673): Remove TlsCertPolicy. It's deprecated, in favor of SslConfig.
|
||||
/** Tracks PeerConnectionInterface::TlsCertPolicy */
|
||||
public enum TlsCertPolicy {
|
||||
TLS_CERT_POLICY_SECURE,
|
||||
@ -127,9 +126,7 @@ public class PeerConnection {
|
||||
public final List<String> urls;
|
||||
public final String username;
|
||||
public final String password;
|
||||
// TODO(diogor, webrtc:9673): Remove tlsCertPolicy from this API.
|
||||
// This field will be ignored if tlsCertPolicy is also set in SslConfig.
|
||||
@Deprecated public final TlsCertPolicy tlsCertPolicy;
|
||||
public final TlsCertPolicy tlsCertPolicy;
|
||||
|
||||
// If the URIs in |urls| only contain IP addresses, this field can be used
|
||||
// to indicate the hostname, which may be necessary for TLS (using the SNI
|
||||
@ -137,18 +134,12 @@ public class PeerConnection {
|
||||
// necessary.
|
||||
public final String hostname;
|
||||
|
||||
// TODO(diogor, webrtc:9673): Remove tlsAlpnProtocols from this API.
|
||||
// List of protocols to be used in the TLS ALPN extension.
|
||||
@Deprecated public final List<String> tlsAlpnProtocols;
|
||||
public final List<String> tlsAlpnProtocols;
|
||||
|
||||
// TODO(diogor, webrtc:9673): Remove tlsEllipticCurves from this API.
|
||||
// List of elliptic curves to be used in the TLS elliptic curves extension.
|
||||
// Only curve names supported by OpenSSL should be used (eg. "P-256","X25519").
|
||||
// This field will be ignored if tlsEllipticCurves is also set in SslConfig.
|
||||
@Deprecated public final List<String> tlsEllipticCurves;
|
||||
|
||||
// SSL configuration options for any SSL/TLS connections to this IceServer.
|
||||
public final SslConfig sslConfig;
|
||||
public final List<String> tlsEllipticCurves;
|
||||
|
||||
/** Convenience constructor for STUN servers. */
|
||||
@Deprecated
|
||||
@ -170,12 +161,12 @@ public class PeerConnection {
|
||||
public IceServer(String uri, String username, String password, TlsCertPolicy tlsCertPolicy,
|
||||
String hostname) {
|
||||
this(uri, Collections.singletonList(uri), username, password, tlsCertPolicy, hostname, null,
|
||||
null, SslConfig.builder().createSslConfig());
|
||||
null);
|
||||
}
|
||||
|
||||
private IceServer(String uri, List<String> urls, String username, String password,
|
||||
TlsCertPolicy tlsCertPolicy, String hostname, List<String> tlsAlpnProtocols,
|
||||
List<String> tlsEllipticCurves, SslConfig sslConfig) {
|
||||
List<String> tlsEllipticCurves) {
|
||||
if (uri == null || urls == null || urls.isEmpty()) {
|
||||
throw new IllegalArgumentException("uri == null || urls == null || urls.isEmpty()");
|
||||
}
|
||||
@ -201,13 +192,12 @@ public class PeerConnection {
|
||||
this.hostname = hostname;
|
||||
this.tlsAlpnProtocols = tlsAlpnProtocols;
|
||||
this.tlsEllipticCurves = tlsEllipticCurves;
|
||||
this.sslConfig = sslConfig;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String toString() {
|
||||
return urls + " [" + username + ":" + password + "] [" + tlsCertPolicy + "] [" + hostname
|
||||
+ "] [" + tlsAlpnProtocols + "] [" + tlsEllipticCurves + "] [" + sslConfig + "]";
|
||||
+ "] [" + tlsAlpnProtocols + "] [" + tlsEllipticCurves + "]";
|
||||
}
|
||||
|
||||
public static Builder builder(String uri) {
|
||||
@ -226,7 +216,6 @@ public class PeerConnection {
|
||||
private String hostname = "";
|
||||
private List<String> tlsAlpnProtocols;
|
||||
private List<String> tlsEllipticCurves;
|
||||
private SslConfig sslConfig = SslConfig.builder().createSslConfig();
|
||||
|
||||
private Builder(List<String> urls) {
|
||||
if (urls == null || urls.isEmpty()) {
|
||||
@ -245,7 +234,6 @@ public class PeerConnection {
|
||||
return this;
|
||||
}
|
||||
|
||||
@Deprecated
|
||||
public Builder setTlsCertPolicy(TlsCertPolicy tlsCertPolicy) {
|
||||
this.tlsCertPolicy = tlsCertPolicy;
|
||||
return this;
|
||||
@ -256,26 +244,19 @@ public class PeerConnection {
|
||||
return this;
|
||||
}
|
||||
|
||||
@Deprecated
|
||||
public Builder setTlsAlpnProtocols(List<String> tlsAlpnProtocols) {
|
||||
this.tlsAlpnProtocols = tlsAlpnProtocols;
|
||||
return this;
|
||||
}
|
||||
|
||||
@Deprecated
|
||||
public Builder setTlsEllipticCurves(List<String> tlsEllipticCurves) {
|
||||
this.tlsEllipticCurves = tlsEllipticCurves;
|
||||
return this;
|
||||
}
|
||||
|
||||
public Builder setSslConfig(SslConfig sslConfig) {
|
||||
this.sslConfig = sslConfig;
|
||||
return this;
|
||||
}
|
||||
|
||||
public IceServer createIceServer() {
|
||||
return new IceServer(urls.get(0), urls, username, password, tlsCertPolicy, hostname,
|
||||
tlsAlpnProtocols, tlsEllipticCurves, sslConfig);
|
||||
tlsAlpnProtocols, tlsEllipticCurves);
|
||||
}
|
||||
}
|
||||
|
||||
@ -317,11 +298,6 @@ public class PeerConnection {
|
||||
List<String> getTlsEllipticCurves() {
|
||||
return tlsEllipticCurves;
|
||||
}
|
||||
|
||||
@CalledByNative("IceServer")
|
||||
SslConfig getSslConfig() {
|
||||
return sslConfig;
|
||||
}
|
||||
}
|
||||
|
||||
/** Java version of PeerConnectionInterface.IceTransportsType */
|
||||
|
@ -1,204 +0,0 @@
|
||||
/*
|
||||
* Copyright 2018 The WebRTC project authors. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by a BSD-style license
|
||||
* that can be found in the LICENSE file in the root of the source
|
||||
* tree. An additional intellectual property rights grant can be found
|
||||
* in the file PATENTS. All contributing project authors may
|
||||
* be found in the AUTHORS file in the root of the source tree.
|
||||
*/
|
||||
|
||||
package org.webrtc;
|
||||
|
||||
import java.util.Collections;
|
||||
import java.util.List;
|
||||
import javax.annotation.Nullable;
|
||||
|
||||
/**
|
||||
* Java version of rtc::SSLConfig.
|
||||
*
|
||||
* Contains the configuration of any SSL/TLS connections that are initiated by
|
||||
* our client.
|
||||
*/
|
||||
public class SslConfig {
|
||||
/** Tracks rtc::TlsCertPolicy */
|
||||
public enum TlsCertPolicy {
|
||||
TLS_CERT_POLICY_SECURE,
|
||||
TLS_CERT_POLICY_INSECURE_NO_CHECK,
|
||||
}
|
||||
|
||||
/** Indicates whether to enable OCSP stapling in TLS. */
|
||||
public final boolean enableOcspStapling;
|
||||
/** Indicates whether to enable the signed certificate timestamp extension in TLS. */
|
||||
public final boolean enableSignedCertTimestamp;
|
||||
/** Indicates whether to enable the TLS Channel ID extension. */
|
||||
public final boolean enableTlsChannelId;
|
||||
/** Indicates whether to enable the TLS GREASE extension. */
|
||||
public final boolean enableGrease;
|
||||
|
||||
/** Indicates how to process TURN server certificates */
|
||||
public final TlsCertPolicy tlsCertPolicy;
|
||||
|
||||
/**
|
||||
* Highest supported SSL version, as defined in the supported_versions TLS extension.
|
||||
* If null, the default OpenSSL/BoringSSL max version will be used.
|
||||
*/
|
||||
@Nullable public final Integer maxSslVersion;
|
||||
|
||||
/**
|
||||
* List of protocols to be used in the TLS ALPN extension.
|
||||
* If null, the default list of OpenSSL/BoringSSL ALPN protocols will be used.
|
||||
*/
|
||||
@Nullable public final List<String> tlsAlpnProtocols;
|
||||
|
||||
/**
|
||||
* List of elliptic curves to be used in the TLS elliptic curves extension.
|
||||
* Only curve names supported by OpenSSL should be used (eg. "P-256","X25519").
|
||||
* If null, the default list of OpenSSL/BoringSSL curves will be used.
|
||||
*/
|
||||
@Nullable public final List<String> tlsEllipticCurves;
|
||||
|
||||
private SslConfig(boolean enableOcspStapling, boolean enableSignedCertTimestamp,
|
||||
boolean enableTlsChannelId, boolean enableGrease, TlsCertPolicy tlsCertPolicy,
|
||||
Integer maxSslVersion, List<String> tlsAlpnProtocols, List<String> tlsEllipticCurves) {
|
||||
this.enableOcspStapling = enableOcspStapling;
|
||||
this.enableSignedCertTimestamp = enableSignedCertTimestamp;
|
||||
this.enableTlsChannelId = enableTlsChannelId;
|
||||
this.enableGrease = enableGrease;
|
||||
this.tlsCertPolicy = tlsCertPolicy;
|
||||
this.maxSslVersion = maxSslVersion;
|
||||
if (tlsAlpnProtocols != null) {
|
||||
this.tlsAlpnProtocols = Collections.unmodifiableList(tlsAlpnProtocols);
|
||||
} else {
|
||||
this.tlsAlpnProtocols = null;
|
||||
}
|
||||
if (tlsEllipticCurves != null) {
|
||||
this.tlsEllipticCurves = Collections.unmodifiableList(tlsEllipticCurves);
|
||||
} else {
|
||||
this.tlsEllipticCurves = null;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public String toString() {
|
||||
return "[enableOcspStapling=" + enableOcspStapling + "] [enableSignedCertTimestamp="
|
||||
+ enableSignedCertTimestamp + "] [enableTlsChannelId=" + enableTlsChannelId
|
||||
+ "] [enableGrease=" + enableGrease + "] [tlsCertPolicy=" + tlsCertPolicy
|
||||
+ "] [maxSslVersion=" + maxSslVersion + "] [tlsAlpnProtocols=" + tlsAlpnProtocols
|
||||
+ "] [tlsEllipticCurves=" + tlsEllipticCurves + "]";
|
||||
}
|
||||
|
||||
public static Builder builder() {
|
||||
return new Builder();
|
||||
}
|
||||
|
||||
public static class Builder {
|
||||
private boolean enableOcspStapling;
|
||||
private boolean enableSignedCertTimestamp;
|
||||
private boolean enableTlsChannelId;
|
||||
private boolean enableGrease;
|
||||
private TlsCertPolicy tlsCertPolicy;
|
||||
@Nullable private Integer maxSslVersion;
|
||||
@Nullable private List<String> tlsAlpnProtocols;
|
||||
@Nullable private List<String> tlsEllipticCurves;
|
||||
|
||||
private Builder() {
|
||||
this.enableOcspStapling = true;
|
||||
this.enableSignedCertTimestamp = true;
|
||||
this.enableTlsChannelId = false;
|
||||
this.enableGrease = false;
|
||||
this.tlsCertPolicy = TlsCertPolicy.TLS_CERT_POLICY_SECURE;
|
||||
this.maxSslVersion = null;
|
||||
this.tlsAlpnProtocols = null;
|
||||
this.tlsEllipticCurves = null;
|
||||
}
|
||||
|
||||
public Builder setEnableOcspStapling(boolean enableOcspStapling) {
|
||||
this.enableOcspStapling = enableOcspStapling;
|
||||
return this;
|
||||
}
|
||||
|
||||
public Builder setEnableSignedCertTimestamp(boolean enableSignedCertTimestamp) {
|
||||
this.enableSignedCertTimestamp = enableSignedCertTimestamp;
|
||||
return this;
|
||||
}
|
||||
|
||||
public Builder setEnableTlsChannelId(boolean enableTlsChannelId) {
|
||||
this.enableTlsChannelId = enableTlsChannelId;
|
||||
return this;
|
||||
}
|
||||
|
||||
public Builder setEnableGrease(boolean enableGrease) {
|
||||
this.enableGrease = enableGrease;
|
||||
return this;
|
||||
}
|
||||
|
||||
public Builder setTlsCertPolicy(TlsCertPolicy tlsCertPolicy) {
|
||||
this.tlsCertPolicy = tlsCertPolicy;
|
||||
return this;
|
||||
}
|
||||
|
||||
public Builder setMaxSslVersion(int maxSslVersion) {
|
||||
this.maxSslVersion = maxSslVersion;
|
||||
return this;
|
||||
}
|
||||
|
||||
public Builder setTlsAlpnProtocols(List<String> tlsAlpnProtocols) {
|
||||
this.tlsAlpnProtocols = tlsAlpnProtocols;
|
||||
return this;
|
||||
}
|
||||
|
||||
public Builder setTlsEllipticCurves(List<String> tlsEllipticCurves) {
|
||||
this.tlsEllipticCurves = tlsEllipticCurves;
|
||||
return this;
|
||||
}
|
||||
|
||||
public SslConfig createSslConfig() {
|
||||
return new SslConfig(enableOcspStapling, enableSignedCertTimestamp, enableTlsChannelId,
|
||||
enableGrease, tlsCertPolicy, maxSslVersion, tlsAlpnProtocols, tlsEllipticCurves);
|
||||
}
|
||||
}
|
||||
|
||||
@CalledByNative
|
||||
boolean getEnableOcspStapling() {
|
||||
return enableOcspStapling;
|
||||
}
|
||||
|
||||
@CalledByNative
|
||||
boolean getEnableSignedCertTimestamp() {
|
||||
return enableSignedCertTimestamp;
|
||||
}
|
||||
|
||||
@CalledByNative
|
||||
boolean getEnableTlsChannelId() {
|
||||
return enableTlsChannelId;
|
||||
}
|
||||
|
||||
@CalledByNative
|
||||
boolean getEnableGrease() {
|
||||
return enableGrease;
|
||||
}
|
||||
|
||||
@CalledByNative
|
||||
TlsCertPolicy getTlsCertPolicy() {
|
||||
return tlsCertPolicy;
|
||||
}
|
||||
|
||||
@Nullable
|
||||
@CalledByNative
|
||||
Integer getMaxSslVersion() {
|
||||
return maxSslVersion;
|
||||
}
|
||||
|
||||
@Nullable
|
||||
@CalledByNative
|
||||
List<String> getTlsAlpnProtocols() {
|
||||
return tlsAlpnProtocols;
|
||||
}
|
||||
|
||||
@Nullable
|
||||
@CalledByNative
|
||||
List<String> getTlsEllipticCurves() {
|
||||
return tlsEllipticCurves;
|
||||
}
|
||||
}
|
@ -51,7 +51,6 @@
|
||||
#include "sdk/android/src/jni/pc/rtpsender.h"
|
||||
#include "sdk/android/src/jni/pc/sdpobserver.h"
|
||||
#include "sdk/android/src/jni/pc/sessiondescription.h"
|
||||
#include "sdk/android/src/jni/pc/sslconfig.h"
|
||||
#include "sdk/android/src/jni/pc/statsobserver.h"
|
||||
#include "sdk/android/src/jni/pc/turncustomizer.h"
|
||||
|
||||
@ -88,8 +87,6 @@ PeerConnectionInterface::IceServers JavaToNativeIceServers(
|
||||
Java_IceServer_getTlsAlpnProtocols(jni, j_ice_server);
|
||||
ScopedJavaLocalRef<jobject> tls_elliptic_curves =
|
||||
Java_IceServer_getTlsEllipticCurves(jni, j_ice_server);
|
||||
ScopedJavaLocalRef<jobject> ssl_config =
|
||||
Java_IceServer_getSslConfig(jni, j_ice_server);
|
||||
PeerConnectionInterface::IceServer server;
|
||||
server.urls = JavaListToNativeVector<std::string, jstring>(
|
||||
jni, urls, &JavaToNativeString);
|
||||
@ -101,7 +98,6 @@ PeerConnectionInterface::IceServers JavaToNativeIceServers(
|
||||
jni, tls_alpn_protocols, &JavaToNativeString);
|
||||
server.tls_elliptic_curves = JavaListToNativeVector<std::string, jstring>(
|
||||
jni, tls_elliptic_curves, &JavaToNativeString);
|
||||
server.ssl_config = JavaToNativeSslConfig(jni, ssl_config);
|
||||
ice_servers.push_back(server);
|
||||
}
|
||||
return ice_servers;
|
||||
|
@ -1,78 +0,0 @@
|
||||
|
||||
/*
|
||||
* Copyright 2018 The WebRTC project authors. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by a BSD-style license
|
||||
* that can be found in the LICENSE file in the root of the source
|
||||
* tree. An additional intellectual property rights grant can be found
|
||||
* in the file PATENTS. All contributing project authors may
|
||||
* be found in the AUTHORS file in the root of the source tree.
|
||||
*/
|
||||
|
||||
#include "sdk/android/src/jni/pc/sslconfig.h"
|
||||
|
||||
#include <string>
|
||||
|
||||
#include "rtc_base/ssladapter.h"
|
||||
#include "sdk/android/generated_peerconnection_jni/jni/SslConfig_jni.h"
|
||||
#include "sdk/android/native_api/jni/java_types.h"
|
||||
#include "sdk/android/src/jni/jni_helpers.h"
|
||||
|
||||
namespace webrtc {
|
||||
namespace jni {
|
||||
|
||||
rtc::TlsCertPolicy JavaToNativeRtcTlsCertPolicy(
|
||||
JNIEnv* jni,
|
||||
const JavaRef<jobject>& j_ssl_config_tls_cert_policy) {
|
||||
std::string enum_name = GetJavaEnumName(jni, j_ssl_config_tls_cert_policy);
|
||||
|
||||
if (enum_name == "TLS_CERT_POLICY_SECURE")
|
||||
return rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE;
|
||||
|
||||
if (enum_name == "TLS_CERT_POLICY_INSECURE_NO_CHECK")
|
||||
return rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
|
||||
RTC_NOTREACHED();
|
||||
return rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE;
|
||||
}
|
||||
|
||||
rtc::SSLConfig JavaToNativeSslConfig(JNIEnv* jni,
|
||||
const JavaRef<jobject>& j_ssl_config) {
|
||||
rtc::SSLConfig ssl_config;
|
||||
ssl_config.enable_ocsp_stapling =
|
||||
Java_SslConfig_getEnableOcspStapling(jni, j_ssl_config);
|
||||
ssl_config.enable_signed_cert_timestamp =
|
||||
Java_SslConfig_getEnableSignedCertTimestamp(jni, j_ssl_config);
|
||||
ssl_config.enable_tls_channel_id =
|
||||
Java_SslConfig_getEnableTlsChannelId(jni, j_ssl_config);
|
||||
ssl_config.enable_grease = Java_SslConfig_getEnableGrease(jni, j_ssl_config);
|
||||
|
||||
ScopedJavaLocalRef<jobject> j_ssl_config_max_ssl_version =
|
||||
Java_SslConfig_getMaxSslVersion(jni, j_ssl_config);
|
||||
ssl_config.max_ssl_version =
|
||||
JavaToNativeOptionalInt(jni, j_ssl_config_max_ssl_version);
|
||||
|
||||
ScopedJavaLocalRef<jobject> j_ssl_config_tls_cert_policy =
|
||||
Java_SslConfig_getTlsCertPolicy(jni, j_ssl_config);
|
||||
ssl_config.tls_cert_policy =
|
||||
JavaToNativeRtcTlsCertPolicy(jni, j_ssl_config_tls_cert_policy);
|
||||
|
||||
ScopedJavaLocalRef<jobject> j_ssl_config_tls_alpn_protocols =
|
||||
Java_SslConfig_getTlsAlpnProtocols(jni, j_ssl_config);
|
||||
if (!IsNull(jni, j_ssl_config_tls_alpn_protocols)) {
|
||||
ssl_config.tls_alpn_protocols =
|
||||
JavaListToNativeVector<std::string, jstring>(
|
||||
jni, j_ssl_config_tls_alpn_protocols, &JavaToNativeString);
|
||||
}
|
||||
ScopedJavaLocalRef<jobject> j_ssl_config_tls_elliptic_curves =
|
||||
Java_SslConfig_getTlsEllipticCurves(jni, j_ssl_config);
|
||||
if (!IsNull(jni, j_ssl_config_tls_elliptic_curves)) {
|
||||
ssl_config.tls_elliptic_curves =
|
||||
JavaListToNativeVector<std::string, jstring>(
|
||||
jni, j_ssl_config_tls_elliptic_curves, &JavaToNativeString);
|
||||
}
|
||||
return ssl_config;
|
||||
}
|
||||
|
||||
} // namespace jni
|
||||
} // namespace webrtc
|
@ -1,30 +0,0 @@
|
||||
/*
|
||||
* Copyright 2018 The WebRTC project authors. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by a BSD-style license
|
||||
* that can be found in the LICENSE file in the root of the source
|
||||
* tree. An additional intellectual property rights grant can be found
|
||||
* in the file PATENTS. All contributing project authors may
|
||||
* be found in the AUTHORS file in the root of the source tree.
|
||||
*/
|
||||
|
||||
#ifndef SDK_ANDROID_SRC_JNI_PC_SSLCONFIG_H_
|
||||
#define SDK_ANDROID_SRC_JNI_PC_SSLCONFIG_H_
|
||||
|
||||
#include "api/peerconnectioninterface.h"
|
||||
#include "sdk/android/native_api/jni/scoped_java_ref.h"
|
||||
|
||||
namespace webrtc {
|
||||
namespace jni {
|
||||
|
||||
rtc::TlsCertPolicy JavaToNativeRtcTlsCertPolicy(
|
||||
JNIEnv* jni,
|
||||
const JavaRef<jobject>& j_ssl_config_tls_cert_policy);
|
||||
|
||||
rtc::SSLConfig JavaToNativeSslConfig(JNIEnv* env,
|
||||
const JavaRef<jobject>& j_ssl_config);
|
||||
|
||||
} // namespace jni
|
||||
} // namespace webrtc
|
||||
|
||||
#endif // SDK_ANDROID_SRC_JNI_PC_SSLCONFIG_H_
|
@ -1,11 +0,0 @@
|
||||
/*
|
||||
* Copyright 2018 The WebRTC project authors. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by a BSD-style license
|
||||
* that can be found in the LICENSE file in the root of the source
|
||||
* tree. An additional intellectual property rights grant can be found
|
||||
* in the file PATENTS. All contributing project authors may
|
||||
* be found in the AUTHORS file in the root of the source tree.
|
||||
*/
|
||||
|
||||
#import "api/peerconnection/RTCSSLConfig.h"
|
@ -11,7 +11,11 @@
|
||||
#import <Foundation/Foundation.h>
|
||||
|
||||
#import "RTCMacros.h"
|
||||
#import "RTCSSLConfig.h"
|
||||
|
||||
typedef NS_ENUM(NSUInteger, RTCTlsCertPolicy) {
|
||||
RTCTlsCertPolicySecure,
|
||||
RTCTlsCertPolicyInsecureNoCheck
|
||||
};
|
||||
|
||||
NS_ASSUME_NONNULL_BEGIN
|
||||
|
||||
@ -28,8 +32,7 @@ RTC_EXPORT
|
||||
@property(nonatomic, readonly, nullable) NSString *credential;
|
||||
|
||||
/**
|
||||
Deprecated. TODO(diogor, webrtc:9673): Remove from API.
|
||||
TLS certificate policy to use if this RTCIceServer object is a TURN server.
|
||||
* TLS certificate policy to use if this RTCIceServer object is a TURN server.
|
||||
*/
|
||||
@property(nonatomic, readonly) RTCTlsCertPolicy tlsCertPolicy;
|
||||
|
||||
@ -40,24 +43,15 @@ RTC_EXPORT
|
||||
*/
|
||||
@property(nonatomic, readonly, nullable) NSString *hostname;
|
||||
|
||||
/**
|
||||
Deprecated. TODO(diogor, webrtc:9673): Remove from API.
|
||||
List of protocols to be used in the TLS ALPN extension.
|
||||
This field will be ignored if also set in RTCSSLConfig.
|
||||
*/
|
||||
/** List of protocols to be used in the TLS ALPN extension. */
|
||||
@property(nonatomic, readonly) NSArray<NSString *> *tlsAlpnProtocols;
|
||||
|
||||
/**
|
||||
Deprecated. TODO(diogor, webrtc:9673): Remove from API.
|
||||
List elliptic curves to be used in the TLS elliptic curves extension.
|
||||
Only curve names supported by OpenSSL should be used (eg. "P-256","X25519").
|
||||
This field will be ignored if also set in RTCSSLConfig.
|
||||
*/
|
||||
@property(nonatomic, readonly) NSArray<NSString *> *tlsEllipticCurves;
|
||||
|
||||
/** SSL configuration options for any SSL/TLS connections to this IceServer. */
|
||||
@property(nonatomic, readonly) RTCSSLConfig *sslConfig;
|
||||
|
||||
- (nonnull instancetype)init NS_UNAVAILABLE;
|
||||
|
||||
/** Convenience initializer for a server with no authentication (e.g. STUN). */
|
||||
@ -112,17 +106,8 @@ RTC_EXPORT
|
||||
tlsCertPolicy:(RTCTlsCertPolicy)tlsCertPolicy
|
||||
hostname:(nullable NSString *)hostname
|
||||
tlsAlpnProtocols:(nullable NSArray<NSString *> *)tlsAlpnProtocols
|
||||
tlsEllipticCurves:(nullable NSArray<NSString *> *)tlsEllipticCurves;
|
||||
|
||||
/**
|
||||
* Initialize an RTCIceServer with its associated URLs, optional
|
||||
* username, optional credential, hostname and SSL config.
|
||||
*/
|
||||
- (instancetype)initWithURLStrings:(NSArray<NSString *> *)urlStrings
|
||||
username:(nullable NSString *)username
|
||||
credential:(nullable NSString *)credential
|
||||
hostname:(nullable NSString *)hostname
|
||||
sslConfig:(RTCSSLConfig *)sslConfig NS_DESIGNATED_INITIALIZER;
|
||||
tlsEllipticCurves:(nullable NSArray<NSString *> *)tlsEllipticCurves
|
||||
NS_DESIGNATED_INITIALIZER;
|
||||
|
||||
@end
|
||||
|
||||
|
@ -9,7 +9,6 @@
|
||||
*/
|
||||
|
||||
#import "RTCIceServer+Private.h"
|
||||
#import "RTCSSLConfig+Native.h"
|
||||
|
||||
#import "helpers/NSString+StdString.h"
|
||||
|
||||
@ -22,7 +21,6 @@
|
||||
@synthesize hostname = _hostname;
|
||||
@synthesize tlsAlpnProtocols = _tlsAlpnProtocols;
|
||||
@synthesize tlsEllipticCurves = _tlsEllipticCurves;
|
||||
@synthesize sslConfig = _sslConfig;
|
||||
|
||||
- (instancetype)initWithURLStrings:(NSArray<NSString *> *)urlStrings {
|
||||
return [self initWithURLStrings:urlStrings
|
||||
@ -85,50 +83,28 @@
|
||||
hostname:(NSString *)hostname
|
||||
tlsAlpnProtocols:(NSArray<NSString *> *)tlsAlpnProtocols
|
||||
tlsEllipticCurves:(NSArray<NSString *> *)tlsEllipticCurves {
|
||||
RTCSSLConfig *sslConfig = [[RTCSSLConfig alloc] init];
|
||||
sslConfig.tlsCertPolicy = tlsCertPolicy;
|
||||
sslConfig.tlsALPNProtocols = [[NSArray alloc] initWithArray:tlsAlpnProtocols copyItems:YES];
|
||||
sslConfig.tlsEllipticCurves = [[NSArray alloc] initWithArray:tlsEllipticCurves copyItems:YES];
|
||||
return [self initWithURLStrings:urlStrings
|
||||
username:username
|
||||
credential:credential
|
||||
hostname:hostname
|
||||
sslConfig:sslConfig];
|
||||
}
|
||||
|
||||
- (instancetype)initWithURLStrings:(NSArray<NSString *> *)urlStrings
|
||||
username:(NSString *)username
|
||||
credential:(NSString *)credential
|
||||
hostname:(NSString *)hostname
|
||||
sslConfig:(RTCSSLConfig *)sslConfig {
|
||||
NSParameterAssert(urlStrings.count);
|
||||
if (self = [super init]) {
|
||||
_urlStrings = [[NSArray alloc] initWithArray:urlStrings copyItems:YES];
|
||||
_username = [username copy];
|
||||
_credential = [credential copy];
|
||||
_tlsCertPolicy = tlsCertPolicy;
|
||||
_hostname = [hostname copy];
|
||||
_sslConfig = sslConfig;
|
||||
|
||||
// TODO(diogor, webrtc:9673): Remove these duplicate assignments.
|
||||
_tlsCertPolicy = sslConfig.tlsCertPolicy;
|
||||
if (sslConfig.tlsALPNProtocols) {
|
||||
_tlsAlpnProtocols = [[NSArray alloc] initWithArray:sslConfig.tlsALPNProtocols copyItems:YES];
|
||||
}
|
||||
if (sslConfig.tlsEllipticCurves) {
|
||||
_tlsEllipticCurves =
|
||||
[[NSArray alloc] initWithArray:sslConfig.tlsEllipticCurves copyItems:YES];
|
||||
}
|
||||
_tlsAlpnProtocols = [[NSArray alloc] initWithArray:tlsAlpnProtocols copyItems:YES];
|
||||
_tlsEllipticCurves = [[NSArray alloc] initWithArray:tlsEllipticCurves copyItems:YES];
|
||||
}
|
||||
return self;
|
||||
}
|
||||
|
||||
- (NSString *)description {
|
||||
return [NSString stringWithFormat:@"RTCIceServer:\n%@\n%@\n%@\n%@\n%@",
|
||||
return [NSString stringWithFormat:@"RTCIceServer:\n%@\n%@\n%@\n%@\n%@\n%@\n%@",
|
||||
_urlStrings,
|
||||
_username,
|
||||
_credential,
|
||||
[self stringForTlsCertPolicy:_tlsCertPolicy],
|
||||
_hostname,
|
||||
_sslConfig];
|
||||
_tlsAlpnProtocols,
|
||||
_tlsEllipticCurves];
|
||||
}
|
||||
|
||||
#pragma mark - Private
|
||||
@ -173,8 +149,6 @@
|
||||
webrtc::PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck;
|
||||
break;
|
||||
}
|
||||
|
||||
iceServer.ssl_config = [_sslConfig nativeConfig];
|
||||
return iceServer;
|
||||
}
|
||||
|
||||
@ -188,38 +162,34 @@
|
||||
NSString *username = [NSString stringForStdString:nativeServer.username];
|
||||
NSString *credential = [NSString stringForStdString:nativeServer.password];
|
||||
NSString *hostname = [NSString stringForStdString:nativeServer.hostname];
|
||||
RTCSSLConfig *sslConfig = [[RTCSSLConfig alloc] initWithNativeConfig:nativeServer.ssl_config];
|
||||
|
||||
if (!nativeServer.ssl_config.tls_alpn_protocols.has_value() &&
|
||||
!nativeServer.tls_alpn_protocols.empty()) {
|
||||
NSMutableArray *tlsALPNProtocols =
|
||||
[NSMutableArray arrayWithCapacity:nativeServer.tls_alpn_protocols.size()];
|
||||
for (auto const &proto : nativeServer.tls_alpn_protocols) {
|
||||
[tlsALPNProtocols addObject:[NSString stringForStdString:proto]];
|
||||
}
|
||||
sslConfig.tlsALPNProtocols = tlsALPNProtocols;
|
||||
NSMutableArray *tlsAlpnProtocols =
|
||||
[NSMutableArray arrayWithCapacity:nativeServer.tls_alpn_protocols.size()];
|
||||
for (auto const &proto : nativeServer.tls_alpn_protocols) {
|
||||
[tlsAlpnProtocols addObject:[NSString stringForStdString:proto]];
|
||||
}
|
||||
|
||||
if (!nativeServer.ssl_config.tls_elliptic_curves.has_value() &&
|
||||
!nativeServer.tls_elliptic_curves.empty()) {
|
||||
NSMutableArray *tlsEllipticCurves =
|
||||
[NSMutableArray arrayWithCapacity:nativeServer.tls_elliptic_curves.size()];
|
||||
for (auto const &curve : nativeServer.tls_elliptic_curves) {
|
||||
[tlsEllipticCurves addObject:[NSString stringForStdString:curve]];
|
||||
}
|
||||
sslConfig.tlsEllipticCurves = tlsEllipticCurves;
|
||||
NSMutableArray *tlsEllipticCurves =
|
||||
[NSMutableArray arrayWithCapacity:nativeServer.tls_elliptic_curves.size()];
|
||||
for (auto const &curve : nativeServer.tls_elliptic_curves) {
|
||||
[tlsEllipticCurves addObject:[NSString stringForStdString:curve]];
|
||||
}
|
||||
RTCTlsCertPolicy tlsCertPolicy;
|
||||
|
||||
if (nativeServer.tls_cert_policy ==
|
||||
webrtc::PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck) {
|
||||
sslConfig.tlsCertPolicy = RTCTlsCertPolicyInsecureNoCheck;
|
||||
switch (nativeServer.tls_cert_policy) {
|
||||
case webrtc::PeerConnectionInterface::kTlsCertPolicySecure:
|
||||
tlsCertPolicy = RTCTlsCertPolicySecure;
|
||||
break;
|
||||
case webrtc::PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck:
|
||||
tlsCertPolicy = RTCTlsCertPolicyInsecureNoCheck;
|
||||
break;
|
||||
}
|
||||
|
||||
self = [self initWithURLStrings:urls
|
||||
username:username
|
||||
credential:credential
|
||||
tlsCertPolicy:tlsCertPolicy
|
||||
hostname:hostname
|
||||
sslConfig:sslConfig];
|
||||
tlsAlpnProtocols:tlsAlpnProtocols
|
||||
tlsEllipticCurves:tlsEllipticCurves];
|
||||
return self;
|
||||
}
|
||||
|
||||
|
@ -1,27 +0,0 @@
|
||||
/*
|
||||
* Copyright 2018 The WebRTC project authors. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by a BSD-style license
|
||||
* that can be found in the LICENSE file in the root of the source
|
||||
* tree. An additional intellectual property rights grant can be found
|
||||
* in the file PATENTS. All contributing project authors may
|
||||
* be found in the AUTHORS file in the root of the source tree.
|
||||
*/
|
||||
|
||||
#import "RTCSSLConfig.h"
|
||||
|
||||
#include "api/peerconnectioninterface.h"
|
||||
#include "rtc_base/ssladapter.h"
|
||||
|
||||
NS_ASSUME_NONNULL_BEGIN
|
||||
|
||||
@interface RTCSSLConfig (Native)
|
||||
|
||||
- (rtc::SSLConfig)nativeConfig;
|
||||
|
||||
/** Initialize an RTCSSLConfig from a native SSLConfig. */
|
||||
- (instancetype)initWithNativeConfig:(const rtc::SSLConfig &)config;
|
||||
|
||||
@end
|
||||
|
||||
NS_ASSUME_NONNULL_END
|
@ -1,56 +0,0 @@
|
||||
/*
|
||||
* Copyright 2018 The WebRTC project authors. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by a BSD-style license
|
||||
* that can be found in the LICENSE file in the root of the source
|
||||
* tree. An additional intellectual property rights grant can be found
|
||||
* in the file PATENTS. All contributing project authors may
|
||||
* be found in the AUTHORS file in the root of the source tree.
|
||||
*/
|
||||
|
||||
#import <Foundation/Foundation.h>
|
||||
|
||||
#import <WebRTC/RTCMacros.h>
|
||||
|
||||
typedef NS_ENUM(NSUInteger, RTCTlsCertPolicy) {
|
||||
RTCTlsCertPolicySecure,
|
||||
RTCTlsCertPolicyInsecureNoCheck
|
||||
};
|
||||
|
||||
NS_ASSUME_NONNULL_BEGIN
|
||||
|
||||
RTC_EXPORT
|
||||
@interface RTCSSLConfig : NSObject
|
||||
|
||||
/** Indicates whether to enable OCSP stapling in TLS. */
|
||||
@property(nonatomic) BOOL enableOCSPStapling;
|
||||
|
||||
/** Indicates whether to enable the signed certificate timestamp extension in TLS. */
|
||||
@property(nonatomic) BOOL enableSignedCertTimestamp;
|
||||
|
||||
/** Indicates whether to enable the TLS Channel ID extension. */
|
||||
@property(nonatomic) BOOL enableTlsChannelId;
|
||||
|
||||
/** Indicates whether to enable the TLS GREASE extension. */
|
||||
@property(nonatomic) BOOL enableGrease;
|
||||
|
||||
/** Indicates how to process TURN server certificates */
|
||||
@property(nonatomic) RTCTlsCertPolicy tlsCertPolicy;
|
||||
|
||||
/** Highest supported SSL version, as defined in the supported_versions TLS extension. */
|
||||
@property(nonatomic, nullable) NSNumber *maxSSLVersion;
|
||||
|
||||
/** List of protocols to be used in the TLS ALPN extension. */
|
||||
@property(nonatomic, copy, nullable) NSArray<NSString *> *tlsALPNProtocols;
|
||||
|
||||
/**
|
||||
List of elliptic curves to be used in the TLS elliptic curves extension.
|
||||
Only curve names supported by OpenSSL should be used (eg. "P-256","X25519").
|
||||
*/
|
||||
@property(nonatomic, copy, nullable) NSArray<NSString *> *tlsEllipticCurves;
|
||||
|
||||
- (instancetype)init;
|
||||
|
||||
@end
|
||||
|
||||
NS_ASSUME_NONNULL_END
|
@ -1,134 +0,0 @@
|
||||
/*
|
||||
* Copyright 2018 The WebRTC project authors. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by a BSD-style license
|
||||
* that can be found in the LICENSE file in the root of the source
|
||||
* tree. An additional intellectual property rights grant can be found
|
||||
* in the file PATENTS. All contributing project authors may
|
||||
* be found in the AUTHORS file in the root of the source tree.
|
||||
*/
|
||||
|
||||
#import "RTCSSLConfig+Native.h"
|
||||
|
||||
#import "helpers/NSString+StdString.h"
|
||||
|
||||
@implementation RTCSSLConfig
|
||||
|
||||
@synthesize enableOCSPStapling = _enableOCSPStapling;
|
||||
@synthesize enableSignedCertTimestamp = _enableSignedCertTimestamp;
|
||||
@synthesize enableTlsChannelId = _enableTlsChannelId;
|
||||
@synthesize enableGrease = _enableGrease;
|
||||
@synthesize tlsCertPolicy = _tlsCertPolicy;
|
||||
@synthesize maxSSLVersion = _maxSSLVersion;
|
||||
@synthesize tlsALPNProtocols = _tlsALPNProtocols;
|
||||
@synthesize tlsEllipticCurves = _tlsEllipticCurves;
|
||||
|
||||
- (instancetype)init {
|
||||
// Copy defaults
|
||||
rtc::SSLConfig config;
|
||||
return [self initWithNativeConfig:config];
|
||||
}
|
||||
|
||||
- (instancetype)initWithNativeConfig:(const rtc::SSLConfig &)config {
|
||||
if (self = [super init]) {
|
||||
_enableOCSPStapling = config.enable_ocsp_stapling;
|
||||
_enableSignedCertTimestamp = config.enable_signed_cert_timestamp;
|
||||
_enableTlsChannelId = config.enable_tls_channel_id;
|
||||
_enableGrease = config.enable_grease;
|
||||
|
||||
switch (config.tls_cert_policy) {
|
||||
case rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE:
|
||||
_tlsCertPolicy = RTCTlsCertPolicySecure;
|
||||
break;
|
||||
case rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK:
|
||||
_tlsCertPolicy = RTCTlsCertPolicyInsecureNoCheck;
|
||||
break;
|
||||
}
|
||||
|
||||
if (config.max_ssl_version) {
|
||||
_maxSSLVersion = [NSNumber numberWithInt:*config.max_ssl_version];
|
||||
}
|
||||
if (config.tls_alpn_protocols) {
|
||||
NSMutableArray *tlsALPNProtocols =
|
||||
[NSMutableArray arrayWithCapacity:config.tls_alpn_protocols.value().size()];
|
||||
for (auto const &proto : config.tls_alpn_protocols.value()) {
|
||||
[tlsALPNProtocols addObject:[NSString stringForStdString:proto]];
|
||||
}
|
||||
_tlsALPNProtocols = tlsALPNProtocols;
|
||||
}
|
||||
if (config.tls_elliptic_curves) {
|
||||
NSMutableArray *tlsEllipticCurves =
|
||||
[NSMutableArray arrayWithCapacity:config.tls_elliptic_curves.value().size()];
|
||||
for (auto const &curve : config.tls_elliptic_curves.value()) {
|
||||
[tlsEllipticCurves addObject:[NSString stringForStdString:curve]];
|
||||
}
|
||||
_tlsEllipticCurves = tlsEllipticCurves;
|
||||
}
|
||||
}
|
||||
return self;
|
||||
}
|
||||
|
||||
- (NSString *)description {
|
||||
return [NSString stringWithFormat:@"RTCSSLConfig:\n%d\n%d\n%d\n%d\n%@\n%@\n%@\n%@",
|
||||
_enableOCSPStapling,
|
||||
_enableSignedCertTimestamp,
|
||||
_enableTlsChannelId,
|
||||
_enableGrease,
|
||||
[self stringForTlsCertPolicy:_tlsCertPolicy],
|
||||
_maxSSLVersion,
|
||||
_tlsALPNProtocols,
|
||||
_tlsEllipticCurves];
|
||||
}
|
||||
|
||||
#pragma mark - Private
|
||||
|
||||
- (NSString *)stringForTlsCertPolicy:(RTCTlsCertPolicy)tlsCertPolicy {
|
||||
switch (tlsCertPolicy) {
|
||||
case RTCTlsCertPolicySecure:
|
||||
return @"RTCTlsCertPolicySecure";
|
||||
case RTCTlsCertPolicyInsecureNoCheck:
|
||||
return @"RTCTlsCertPolicyInsecureNoCheck";
|
||||
}
|
||||
}
|
||||
|
||||
- (rtc::SSLConfig)nativeConfig {
|
||||
__block rtc::SSLConfig sslConfig;
|
||||
|
||||
sslConfig.enable_ocsp_stapling = _enableOCSPStapling;
|
||||
sslConfig.enable_signed_cert_timestamp = _enableSignedCertTimestamp;
|
||||
sslConfig.enable_tls_channel_id = _enableTlsChannelId;
|
||||
sslConfig.enable_grease = _enableGrease;
|
||||
|
||||
switch (_tlsCertPolicy) {
|
||||
case RTCTlsCertPolicySecure:
|
||||
sslConfig.tls_cert_policy = rtc::TlsCertPolicy::TLS_CERT_POLICY_SECURE;
|
||||
break;
|
||||
case RTCTlsCertPolicyInsecureNoCheck:
|
||||
sslConfig.tls_cert_policy = rtc::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
|
||||
break;
|
||||
}
|
||||
|
||||
if (_maxSSLVersion != nil) {
|
||||
sslConfig.max_ssl_version = absl::optional<int>(_maxSSLVersion.intValue);
|
||||
}
|
||||
|
||||
if (_tlsALPNProtocols != nil) {
|
||||
__block std::vector<std::string> alpn_protocols;
|
||||
[_tlsALPNProtocols enumerateObjectsUsingBlock:^(NSString *proto, NSUInteger idx, BOOL *stop) {
|
||||
alpn_protocols.push_back(proto.stdString);
|
||||
}];
|
||||
sslConfig.tls_alpn_protocols = absl::optional<std::vector<std::string>>(alpn_protocols);
|
||||
}
|
||||
|
||||
if (_tlsEllipticCurves != nil) {
|
||||
__block std::vector<std::string> elliptic_curves;
|
||||
[_tlsEllipticCurves enumerateObjectsUsingBlock:^(NSString *curve, NSUInteger idx, BOOL *stop) {
|
||||
elliptic_curves.push_back(curve.stdString);
|
||||
}];
|
||||
sslConfig.tls_elliptic_curves = absl::optional<std::vector<std::string>>(elliptic_curves);
|
||||
}
|
||||
|
||||
return sslConfig;
|
||||
}
|
||||
|
||||
@end
|
@ -89,7 +89,7 @@
|
||||
EXPECT_EQ("username", iceStruct.username);
|
||||
EXPECT_EQ("credential", iceStruct.password);
|
||||
EXPECT_EQ("hostname", iceStruct.hostname);
|
||||
EXPECT_EQ(2u, iceStruct.ssl_config.tls_alpn_protocols.value().size());
|
||||
EXPECT_EQ(2u, iceStruct.tls_alpn_protocols.size());
|
||||
}
|
||||
|
||||
- (void)testTlsEllipticCurves {
|
||||
@ -106,8 +106,8 @@
|
||||
EXPECT_EQ("username", iceStruct.username);
|
||||
EXPECT_EQ("credential", iceStruct.password);
|
||||
EXPECT_EQ("hostname", iceStruct.hostname);
|
||||
EXPECT_EQ(2u, iceStruct.ssl_config.tls_alpn_protocols.value().size());
|
||||
EXPECT_EQ(2u, iceStruct.ssl_config.tls_elliptic_curves.value().size());
|
||||
EXPECT_EQ(2u, iceStruct.tls_alpn_protocols.size());
|
||||
EXPECT_EQ(2u, iceStruct.tls_elliptic_curves.size());
|
||||
}
|
||||
|
||||
- (void)testInitFromNativeServer {
|
||||
@ -129,8 +129,8 @@
|
||||
EXPECT_EQ("username", [NSString stdStringForString:iceServer.username]);
|
||||
EXPECT_EQ("password", [NSString stdStringForString:iceServer.credential]);
|
||||
EXPECT_EQ("hostname", [NSString stdStringForString:iceServer.hostname]);
|
||||
EXPECT_EQ(2u, iceServer.sslConfig.tlsALPNProtocols.count);
|
||||
EXPECT_EQ(2u, iceServer.sslConfig.tlsEllipticCurves.count);
|
||||
EXPECT_EQ(2u, iceServer.tlsAlpnProtocols.count);
|
||||
EXPECT_EQ(2u, iceServer.tlsEllipticCurves.count);
|
||||
}
|
||||
|
||||
@end
|
||||
|
Reference in New Issue
Block a user