Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(30)

Side by Side Diff: webrtc/pc/mediasession.cc

Issue 1528843005: Add support for GCM cipher suites from RFC 7714. (Closed) Base URL: https://chromium.googlesource.com/external/webrtc.git@master
Patch Set: Fix failing SRTP-but-no-DTLS tests. Created 4 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright 2004 The WebRTC project authors. All Rights Reserved. 2 * Copyright 2004 The WebRTC project authors. All Rights Reserved.
3 * 3 *
4 * Use of this source code is governed by a BSD-style license 4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source 5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found 6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may 7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree. 8 * be found in the AUTHORS file in the root of the source tree.
9 */ 9 */
10 10
(...skipping 18 matching lines...) Expand all
29 29
30 #ifdef HAVE_SCTP 30 #ifdef HAVE_SCTP
31 #include "webrtc/media/sctp/sctpdataengine.h" 31 #include "webrtc/media/sctp/sctpdataengine.h"
32 #else 32 #else
33 static const uint32_t kMaxSctpSid = 1023; 33 static const uint32_t kMaxSctpSid = 1023;
34 #endif 34 #endif
35 35
36 namespace { 36 namespace {
37 const char kInline[] = "inline:"; 37 const char kInline[] = "inline:";
38 38
39 void GetSupportedCryptoSuiteNames(void (*func)(std::vector<int>*), 39 void GetSupportedCryptoSuiteNames(void (*func)(const rtc::CryptoOptions&,
40 std::vector<int>*),
41 const rtc::CryptoOptions& crypto_options,
40 std::vector<std::string>* names) { 42 std::vector<std::string>* names) {
41 #ifdef HAVE_SRTP 43 #ifdef HAVE_SRTP
42 std::vector<int> crypto_suites; 44 std::vector<int> crypto_suites;
43 func(&crypto_suites); 45 func(crypto_options, &crypto_suites);
44 for (const auto crypto : crypto_suites) { 46 for (const auto crypto : crypto_suites) {
45 names->push_back(rtc::SrtpCryptoSuiteToName(crypto)); 47 names->push_back(rtc::SrtpCryptoSuiteToName(crypto));
46 } 48 }
47 #endif 49 #endif
48 } 50 }
49 } // namespace 51 } // namespace
50 52
51 namespace cricket { 53 namespace cricket {
52 54
53 55
(...skipping 21 matching lines...) Expand all
75 return false; 77 return false;
76 } 78 }
77 79
78 const MediaContentDescription* mdesc = 80 const MediaContentDescription* mdesc =
79 static_cast<const MediaContentDescription*>(content->description); 81 static_cast<const MediaContentDescription*>(content->description);
80 return mdesc && mdesc->type() == media_type; 82 return mdesc && mdesc->type() == media_type;
81 } 83 }
82 84
83 static bool CreateCryptoParams(int tag, const std::string& cipher, 85 static bool CreateCryptoParams(int tag, const std::string& cipher,
84 CryptoParams *out) { 86 CryptoParams *out) {
87 int key_len;
88 int salt_len;
89 if (!rtc::GetSrtpKeyAndSaltLengths(
90 rtc::SrtpCryptoSuiteFromName(cipher), &key_len, &salt_len)) {
91 return false;
92 }
93
94 int master_key_base64_len = (key_len + salt_len) * 4 / 3;
mattdr 2016/05/06 22:34:14 This is bad. E.g. SRTP_AEAD_AES_256_GCM has key_l
joachim 2016/05/09 23:21:40 Right, and sorry for missing this :-( I now change
95
85 std::string key; 96 std::string key;
86 key.reserve(SRTP_MASTER_KEY_BASE64_LEN); 97 key.reserve(master_key_base64_len);
87 98
88 if (!rtc::CreateRandomString(SRTP_MASTER_KEY_BASE64_LEN, &key)) { 99 if (!rtc::CreateRandomString(master_key_base64_len, &key)) {
89 return false; 100 return false;
90 } 101 }
91 out->tag = tag; 102 out->tag = tag;
92 out->cipher_suite = cipher; 103 out->cipher_suite = cipher;
93 out->key_params = kInline; 104 out->key_params = kInline;
94 out->key_params += key; 105 out->key_params += key;
95 return true; 106 return true;
96 } 107 }
97 108
98 #ifdef HAVE_SRTP 109 #ifdef HAVE_SRTP
(...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after
139 for (CryptoParamsVec::const_iterator it = cryptos.begin(); 150 for (CryptoParamsVec::const_iterator it = cryptos.begin();
140 it != cryptos.end(); ++it) { 151 it != cryptos.end(); ++it) {
141 if (crypto.Matches(*it)) { 152 if (crypto.Matches(*it)) {
142 *out = *it; 153 *out = *it;
143 return true; 154 return true;
144 } 155 }
145 } 156 }
146 return false; 157 return false;
147 } 158 }
148 159
149 // For audio, HMAC 32 is prefered because of the low overhead. 160 // For audio, HMAC 32 is prefered over HMAC 80 because of the low overhead.
150 void GetSupportedAudioCryptoSuites(std::vector<int>* crypto_suites) { 161 void GetSupportedAudioCryptoSuites(const rtc::CryptoOptions& crypto_options,
162 std::vector<int>* crypto_suites) {
151 #ifdef HAVE_SRTP 163 #ifdef HAVE_SRTP
164 if (crypto_options.enable_gcm_crypto_suites) {
165 crypto_suites->push_back(rtc::SRTP_AEAD_AES_256_GCM);
mattdr 2016/05/06 22:47:52 Judging by the comments above, I'm inferring these
joachim 2016/05/09 23:21:41 No particular reason from my side. I didn't find a
166 crypto_suites->push_back(rtc::SRTP_AEAD_AES_128_GCM);
167 }
152 crypto_suites->push_back(rtc::SRTP_AES128_CM_SHA1_32); 168 crypto_suites->push_back(rtc::SRTP_AES128_CM_SHA1_32);
153 crypto_suites->push_back(rtc::SRTP_AES128_CM_SHA1_80); 169 crypto_suites->push_back(rtc::SRTP_AES128_CM_SHA1_80);
154 #endif 170 #endif
155 } 171 }
156 172
157 void GetSupportedAudioCryptoSuiteNames( 173 void GetSupportedAudioCryptoSuiteNames(const rtc::CryptoOptions& crypto_options,
158 std::vector<std::string>* crypto_suite_names) { 174 std::vector<std::string>* crypto_suite_names) {
159 GetSupportedCryptoSuiteNames(GetSupportedAudioCryptoSuites, 175 GetSupportedCryptoSuiteNames(GetSupportedAudioCryptoSuites,
160 crypto_suite_names); 176 crypto_options, crypto_suite_names);
161 } 177 }
162 178
163 void GetSupportedVideoCryptoSuites(std::vector<int>* crypto_suites) { 179 void GetSupportedVideoCryptoSuites(const rtc::CryptoOptions& crypto_options,
164 GetDefaultSrtpCryptoSuites(crypto_suites); 180 std::vector<int>* crypto_suites) {
181 GetDefaultSrtpCryptoSuites(crypto_options, crypto_suites);
165 } 182 }
166 183
167 void GetSupportedVideoCryptoSuiteNames( 184 void GetSupportedVideoCryptoSuiteNames(const rtc::CryptoOptions& crypto_options,
168 std::vector<std::string>* crypto_suite_names) { 185 std::vector<std::string>* crypto_suite_names) {
169 GetSupportedCryptoSuiteNames(GetSupportedVideoCryptoSuites, 186 GetSupportedCryptoSuiteNames(GetSupportedVideoCryptoSuites,
170 crypto_suite_names); 187 crypto_options, crypto_suite_names);
171 } 188 }
172 189
173 void GetSupportedDataCryptoSuites(std::vector<int>* crypto_suites) { 190 void GetSupportedDataCryptoSuites(const rtc::CryptoOptions& crypto_options,
174 GetDefaultSrtpCryptoSuites(crypto_suites); 191 std::vector<int>* crypto_suites) {
192 GetDefaultSrtpCryptoSuites(crypto_options, crypto_suites);
175 } 193 }
176 194
177 void GetSupportedDataCryptoSuiteNames( 195 void GetSupportedDataCryptoSuiteNames(const rtc::CryptoOptions& crypto_options,
178 std::vector<std::string>* crypto_suite_names) { 196 std::vector<std::string>* crypto_suite_names) {
179 GetSupportedCryptoSuiteNames(GetSupportedDataCryptoSuites, 197 GetSupportedCryptoSuiteNames(GetSupportedDataCryptoSuites,
180 crypto_suite_names); 198 crypto_options, crypto_suite_names);
181 } 199 }
182 200
183 void GetDefaultSrtpCryptoSuites(std::vector<int>* crypto_suites) { 201 void GetDefaultSrtpCryptoSuites(const rtc::CryptoOptions& crypto_options,
202 std::vector<int>* crypto_suites) {
184 #ifdef HAVE_SRTP 203 #ifdef HAVE_SRTP
204 if (crypto_options.enable_gcm_crypto_suites) {
205 crypto_suites->push_back(rtc::SRTP_AEAD_AES_256_GCM);
206 crypto_suites->push_back(rtc::SRTP_AEAD_AES_128_GCM);
207 }
185 crypto_suites->push_back(rtc::SRTP_AES128_CM_SHA1_80); 208 crypto_suites->push_back(rtc::SRTP_AES128_CM_SHA1_80);
186 #endif 209 #endif
187 } 210 }
188 211
189 void GetDefaultSrtpCryptoSuiteNames( 212 void GetDefaultSrtpCryptoSuiteNames(const rtc::CryptoOptions& crypto_options,
190 std::vector<std::string>* crypto_suite_names) { 213 std::vector<std::string>* crypto_suite_names) {
191 GetSupportedCryptoSuiteNames(GetDefaultSrtpCryptoSuites, crypto_suite_names); 214 GetSupportedCryptoSuiteNames(GetDefaultSrtpCryptoSuites,
215 crypto_options, crypto_suite_names);
192 } 216 }
193 217
194 // For video support only 80-bit SHA1 HMAC. For audio 32-bit HMAC is 218 // Support any GCM cipher (if enabled through options). For video support only
195 // tolerated unless bundle is enabled because it is low overhead. Pick the 219 // 80-bit SHA1 HMAC. For audio 32-bit HMAC is tolerated unless bundle is enabled
196 // crypto in the list that is supported. 220 // because it is low overhead.
221 // Pick the crypto in the list that is supported.
197 static bool SelectCrypto(const MediaContentDescription* offer, 222 static bool SelectCrypto(const MediaContentDescription* offer,
198 bool bundle, 223 bool bundle,
224 const rtc::CryptoOptions& crypto_options,
199 CryptoParams *crypto) { 225 CryptoParams *crypto) {
200 bool audio = offer->type() == MEDIA_TYPE_AUDIO; 226 bool audio = offer->type() == MEDIA_TYPE_AUDIO;
201 const CryptoParamsVec& cryptos = offer->cryptos(); 227 const CryptoParamsVec& cryptos = offer->cryptos();
202 228
203 for (CryptoParamsVec::const_iterator i = cryptos.begin(); 229 for (CryptoParamsVec::const_iterator i = cryptos.begin();
204 i != cryptos.end(); ++i) { 230 i != cryptos.end(); ++i) {
205 if (rtc::CS_AES_CM_128_HMAC_SHA1_80 == i->cipher_suite || 231 if ((crypto_options.enable_gcm_crypto_suites &&
232 rtc::IsGcmCryptoSuiteName(i->cipher_suite)) ||
mattdr 2016/05/06 22:34:14 one more space on this line to align with the begi
joachim 2016/05/09 23:21:40 Done.
233 rtc::CS_AES_CM_128_HMAC_SHA1_80 == i->cipher_suite ||
206 (rtc::CS_AES_CM_128_HMAC_SHA1_32 == i->cipher_suite && audio && 234 (rtc::CS_AES_CM_128_HMAC_SHA1_32 == i->cipher_suite && audio &&
207 !bundle)) { 235 !bundle)) {
208 return CreateCryptoParams(i->tag, i->cipher_suite, crypto); 236 return CreateCryptoParams(i->tag, i->cipher_suite, crypto);
209 } 237 }
210 } 238 }
211 return false; 239 return false;
212 } 240 }
213 241
214 static const StreamParams* FindFirstStreamParamsByCname( 242 static const StreamParams* FindFirstStreamParamsByCname(
215 const StreamParamsVec& params_vec, 243 const StreamParamsVec& params_vec,
(...skipping 844 matching lines...) Expand 10 before | Expand all | Expand 10 after
1060 &negotiated_rtp_extensions); 1088 &negotiated_rtp_extensions);
1061 answer->set_rtp_header_extensions(negotiated_rtp_extensions); 1089 answer->set_rtp_header_extensions(negotiated_rtp_extensions);
1062 1090
1063 answer->set_rtcp_mux(options.rtcp_mux_enabled && offer->rtcp_mux()); 1091 answer->set_rtcp_mux(options.rtcp_mux_enabled && offer->rtcp_mux());
1064 if (answer->type() == cricket::MEDIA_TYPE_VIDEO) { 1092 if (answer->type() == cricket::MEDIA_TYPE_VIDEO) {
1065 answer->set_rtcp_reduced_size(offer->rtcp_reduced_size()); 1093 answer->set_rtcp_reduced_size(offer->rtcp_reduced_size());
1066 } 1094 }
1067 1095
1068 if (sdes_policy != SEC_DISABLED) { 1096 if (sdes_policy != SEC_DISABLED) {
1069 CryptoParams crypto; 1097 CryptoParams crypto;
1070 if (SelectCrypto(offer, bundle_enabled, &crypto)) { 1098 if (SelectCrypto(offer, bundle_enabled, options.crypto_options, &crypto)) {
1071 if (current_cryptos) { 1099 if (current_cryptos) {
1072 FindMatchingCrypto(*current_cryptos, crypto, &crypto); 1100 FindMatchingCrypto(*current_cryptos, crypto, &crypto);
1073 } 1101 }
1074 answer->AddCrypto(crypto); 1102 answer->AddCrypto(crypto);
1075 } 1103 }
1076 } 1104 }
1077 1105
1078 if (answer->cryptos().empty() && 1106 if (answer->cryptos().empty() &&
1079 (offer->crypto_required() == CT_SDES || sdes_policy == SEC_REQUIRED)) { 1107 (offer->crypto_required() == CT_SDES || sdes_policy == SEC_REQUIRED)) {
1080 return false; 1108 return false;
(...skipping 495 matching lines...) Expand 10 before | Expand all | Expand 10 after
1576 GetFirstAudioContent(current_description); 1604 GetFirstAudioContent(current_description);
1577 std::string content_name = 1605 std::string content_name =
1578 current_audio_content ? current_audio_content->name : CN_AUDIO; 1606 current_audio_content ? current_audio_content->name : CN_AUDIO;
1579 1607
1580 cricket::SecurePolicy sdes_policy = 1608 cricket::SecurePolicy sdes_policy =
1581 IsDtlsActive(content_name, current_description) ? cricket::SEC_DISABLED 1609 IsDtlsActive(content_name, current_description) ? cricket::SEC_DISABLED
1582 : secure(); 1610 : secure();
1583 1611
1584 std::unique_ptr<AudioContentDescription> audio(new AudioContentDescription()); 1612 std::unique_ptr<AudioContentDescription> audio(new AudioContentDescription());
1585 std::vector<std::string> crypto_suites; 1613 std::vector<std::string> crypto_suites;
1586 GetSupportedAudioCryptoSuiteNames(&crypto_suites); 1614 GetSupportedAudioCryptoSuiteNames(options.crypto_options, &crypto_suites);
1587 if (!CreateMediaContentOffer( 1615 if (!CreateMediaContentOffer(
1588 options, 1616 options,
1589 audio_codecs, 1617 audio_codecs,
1590 sdes_policy, 1618 sdes_policy,
1591 GetCryptos(GetFirstAudioContentDescription(current_description)), 1619 GetCryptos(GetFirstAudioContentDescription(current_description)),
1592 crypto_suites, 1620 crypto_suites,
1593 audio_rtp_extensions, 1621 audio_rtp_extensions,
1594 add_legacy_, 1622 add_legacy_,
1595 current_streams, 1623 current_streams,
1596 audio.get())) { 1624 audio.get())) {
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after
1636 GetFirstVideoContent(current_description); 1664 GetFirstVideoContent(current_description);
1637 std::string content_name = 1665 std::string content_name =
1638 current_video_content ? current_video_content->name : CN_VIDEO; 1666 current_video_content ? current_video_content->name : CN_VIDEO;
1639 1667
1640 cricket::SecurePolicy sdes_policy = 1668 cricket::SecurePolicy sdes_policy =
1641 IsDtlsActive(content_name, current_description) ? cricket::SEC_DISABLED 1669 IsDtlsActive(content_name, current_description) ? cricket::SEC_DISABLED
1642 : secure(); 1670 : secure();
1643 1671
1644 std::unique_ptr<VideoContentDescription> video(new VideoContentDescription()); 1672 std::unique_ptr<VideoContentDescription> video(new VideoContentDescription());
1645 std::vector<std::string> crypto_suites; 1673 std::vector<std::string> crypto_suites;
1646 GetSupportedVideoCryptoSuiteNames(&crypto_suites); 1674 GetSupportedVideoCryptoSuiteNames(options.crypto_options, &crypto_suites);
1647 if (!CreateMediaContentOffer( 1675 if (!CreateMediaContentOffer(
1648 options, 1676 options,
1649 video_codecs, 1677 video_codecs,
1650 sdes_policy, 1678 sdes_policy,
1651 GetCryptos(GetFirstVideoContentDescription(current_description)), 1679 GetCryptos(GetFirstVideoContentDescription(current_description)),
1652 crypto_suites, 1680 crypto_suites,
1653 video_rtp_extensions, 1681 video_rtp_extensions,
1654 add_legacy_, 1682 add_legacy_,
1655 current_streams, 1683 current_streams,
1656 video.get())) { 1684 video.get())) {
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after
1712 // SDES doesn't make sense for SCTP, so we disable it, and we only 1740 // SDES doesn't make sense for SCTP, so we disable it, and we only
1713 // get SDES crypto suites for RTP-based data channels. 1741 // get SDES crypto suites for RTP-based data channels.
1714 sdes_policy = cricket::SEC_DISABLED; 1742 sdes_policy = cricket::SEC_DISABLED;
1715 // Unlike SetMediaProtocol below, we need to set the protocol 1743 // Unlike SetMediaProtocol below, we need to set the protocol
1716 // before we call CreateMediaContentOffer. Otherwise, 1744 // before we call CreateMediaContentOffer. Otherwise,
1717 // CreateMediaContentOffer won't know this is SCTP and will 1745 // CreateMediaContentOffer won't know this is SCTP and will
1718 // generate SSRCs rather than SIDs. 1746 // generate SSRCs rather than SIDs.
1719 data->set_protocol( 1747 data->set_protocol(
1720 secure_transport ? kMediaProtocolDtlsSctp : kMediaProtocolSctp); 1748 secure_transport ? kMediaProtocolDtlsSctp : kMediaProtocolSctp);
1721 } else { 1749 } else {
1722 GetSupportedDataCryptoSuiteNames(&crypto_suites); 1750 GetSupportedDataCryptoSuiteNames(options.crypto_options, &crypto_suites);
1723 } 1751 }
1724 1752
1725 if (!CreateMediaContentOffer( 1753 if (!CreateMediaContentOffer(
1726 options, 1754 options,
1727 *data_codecs, 1755 *data_codecs,
1728 sdes_policy, 1756 sdes_policy,
1729 GetCryptos(GetFirstDataContentDescription(current_description)), 1757 GetCryptos(GetFirstDataContentDescription(current_description)),
1730 crypto_suites, 1758 crypto_suites,
1731 RtpHeaderExtensions(), 1759 RtpHeaderExtensions(),
1732 add_legacy_, 1760 add_legacy_,
(...skipping 271 matching lines...) Expand 10 before | Expand all | Expand 10 after
2004 GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_VIDEO)); 2032 GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_VIDEO));
2005 } 2033 }
2006 2034
2007 const DataContentDescription* GetFirstDataContentDescription( 2035 const DataContentDescription* GetFirstDataContentDescription(
2008 const SessionDescription* sdesc) { 2036 const SessionDescription* sdesc) {
2009 return static_cast<const DataContentDescription*>( 2037 return static_cast<const DataContentDescription*>(
2010 GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_DATA)); 2038 GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_DATA));
2011 } 2039 }
2012 2040
2013 } // namespace cricket 2041 } // namespace cricket
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698