Specify an ECDH group for ECDHE.

By default, OpenSSL cannot negotiate ECDHE cipher suites as a server because it
doesn't know what curve to use.

BUG=chromium:406458
TEST=Download Firefox nightly build from 2014-08-12.
  https://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/2014-08-12-mozilla-central-debug/
  Point Firefox to https://apprtc.appspot.com
  Point Chrome on Android to the URL Firefox redirects to (it'll say ?r=NUMBERS at the end)
  After tapping through various permissions prompts on either side, the call goes through.

R=agl@chromium.org, henrike@webrtc.org, jiayl@webrtc.org, juberti@webrtc.org

Review URL: https://webrtc-codereview.appspot.com/18269004

git-svn-id: http://webrtc.googlecode.com/svn/trunk@7002 4adac7df-926f-26a2-2b94-8c16560cd09d
This commit is contained in:
jiayl@webrtc.org 2014-08-28 16:14:38 +00:00
parent 55e9da1772
commit 11c6bde474

View File

@ -615,6 +615,16 @@ int OpenSSLStreamAdapter::BeginSSL() {
SSL_set_mode(ssl_, SSL_MODE_ENABLE_PARTIAL_WRITE |
SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
// Specify an ECDH group for ECDHE ciphers, otherwise they cannot be
// negotiated when acting as the server. Use NIST's P-256 which is commonly
// supported.
EC_KEY* ecdh = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
if (ecdh == NULL)
return -1;
SSL_set_options(ssl_, SSL_OP_SINGLE_ECDH_USE);
SSL_set_tmp_ecdh(ssl_, ecdh);
EC_KEY_free(ecdh);
// Do the connect
return ContinueSSL();
}