| OLD | NEW |
| (Empty) |
| 1 /* | |
| 2 * Copyright 2004 The WebRTC Project Authors. All rights reserved. | |
| 3 * | |
| 4 * Use of this source code is governed by a BSD-style license | |
| 5 * that can be found in the LICENSE file in the root of the source | |
| 6 * tree. An additional intellectual property rights grant can be found | |
| 7 * in the file PATENTS. All contributing project authors may | |
| 8 * be found in the AUTHORS file in the root of the source tree. | |
| 9 */ | |
| 10 | |
| 11 #include "webrtc/base/sslstreamadapter.h" | |
| 12 | |
| 13 #include "webrtc/base/opensslstreamadapter.h" | |
| 14 | |
| 15 /////////////////////////////////////////////////////////////////////////////// | |
| 16 | |
| 17 namespace rtc { | |
| 18 | |
| 19 // TODO(guoweis): Move this to SDP layer and use int form internally. | |
| 20 // webrtc:5043. | |
| 21 const char CS_AES_CM_128_HMAC_SHA1_80[] = "AES_CM_128_HMAC_SHA1_80"; | |
| 22 const char CS_AES_CM_128_HMAC_SHA1_32[] = "AES_CM_128_HMAC_SHA1_32"; | |
| 23 const char CS_AEAD_AES_128_GCM[] = "AEAD_AES_128_GCM"; | |
| 24 const char CS_AEAD_AES_256_GCM[] = "AEAD_AES_256_GCM"; | |
| 25 | |
| 26 std::string SrtpCryptoSuiteToName(int crypto_suite) { | |
| 27 switch (crypto_suite) { | |
| 28 case SRTP_AES128_CM_SHA1_32: | |
| 29 return CS_AES_CM_128_HMAC_SHA1_32; | |
| 30 case SRTP_AES128_CM_SHA1_80: | |
| 31 return CS_AES_CM_128_HMAC_SHA1_80; | |
| 32 case SRTP_AEAD_AES_128_GCM: | |
| 33 return CS_AEAD_AES_128_GCM; | |
| 34 case SRTP_AEAD_AES_256_GCM: | |
| 35 return CS_AEAD_AES_256_GCM; | |
| 36 default: | |
| 37 return std::string(); | |
| 38 } | |
| 39 } | |
| 40 | |
| 41 int SrtpCryptoSuiteFromName(const std::string& crypto_suite) { | |
| 42 if (crypto_suite == CS_AES_CM_128_HMAC_SHA1_32) | |
| 43 return SRTP_AES128_CM_SHA1_32; | |
| 44 if (crypto_suite == CS_AES_CM_128_HMAC_SHA1_80) | |
| 45 return SRTP_AES128_CM_SHA1_80; | |
| 46 if (crypto_suite == CS_AEAD_AES_128_GCM) | |
| 47 return SRTP_AEAD_AES_128_GCM; | |
| 48 if (crypto_suite == CS_AEAD_AES_256_GCM) | |
| 49 return SRTP_AEAD_AES_256_GCM; | |
| 50 return SRTP_INVALID_CRYPTO_SUITE; | |
| 51 } | |
| 52 | |
| 53 bool GetSrtpKeyAndSaltLengths(int crypto_suite, int *key_length, | |
| 54 int *salt_length) { | |
| 55 switch (crypto_suite) { | |
| 56 case SRTP_AES128_CM_SHA1_32: | |
| 57 case SRTP_AES128_CM_SHA1_80: | |
| 58 // SRTP_AES128_CM_HMAC_SHA1_32 and SRTP_AES128_CM_HMAC_SHA1_80 are defined | |
| 59 // in RFC 5764 to use a 128 bits key and 112 bits salt for the cipher. | |
| 60 *key_length = 16; | |
| 61 *salt_length = 14; | |
| 62 break; | |
| 63 case SRTP_AEAD_AES_128_GCM: | |
| 64 // SRTP_AEAD_AES_128_GCM is defined in RFC 7714 to use a 128 bits key and | |
| 65 // a 96 bits salt for the cipher. | |
| 66 *key_length = 16; | |
| 67 *salt_length = 12; | |
| 68 break; | |
| 69 case SRTP_AEAD_AES_256_GCM: | |
| 70 // SRTP_AEAD_AES_256_GCM is defined in RFC 7714 to use a 256 bits key and | |
| 71 // a 96 bits salt for the cipher. | |
| 72 *key_length = 32; | |
| 73 *salt_length = 12; | |
| 74 break; | |
| 75 default: | |
| 76 return false; | |
| 77 } | |
| 78 return true; | |
| 79 } | |
| 80 | |
| 81 bool IsGcmCryptoSuite(int crypto_suite) { | |
| 82 return (crypto_suite == SRTP_AEAD_AES_256_GCM || | |
| 83 crypto_suite == SRTP_AEAD_AES_128_GCM); | |
| 84 } | |
| 85 | |
| 86 bool IsGcmCryptoSuiteName(const std::string& crypto_suite) { | |
| 87 return (crypto_suite == CS_AEAD_AES_256_GCM || | |
| 88 crypto_suite == CS_AEAD_AES_128_GCM); | |
| 89 } | |
| 90 | |
| 91 // static | |
| 92 CryptoOptions CryptoOptions::NoGcm() { | |
| 93 CryptoOptions options; | |
| 94 options.enable_gcm_crypto_suites = false; | |
| 95 return options; | |
| 96 } | |
| 97 | |
| 98 std::vector<int> GetSupportedDtlsSrtpCryptoSuites( | |
| 99 const rtc::CryptoOptions& crypto_options) { | |
| 100 std::vector<int> crypto_suites; | |
| 101 if (crypto_options.enable_gcm_crypto_suites) { | |
| 102 crypto_suites.push_back(rtc::SRTP_AEAD_AES_256_GCM); | |
| 103 crypto_suites.push_back(rtc::SRTP_AEAD_AES_128_GCM); | |
| 104 } | |
| 105 // Note: SRTP_AES128_CM_SHA1_80 is what is required to be supported (by | |
| 106 // draft-ietf-rtcweb-security-arch), but SRTP_AES128_CM_SHA1_32 is allowed as | |
| 107 // well, and saves a few bytes per packet if it ends up selected. | |
| 108 crypto_suites.push_back(rtc::SRTP_AES128_CM_SHA1_32); | |
| 109 crypto_suites.push_back(rtc::SRTP_AES128_CM_SHA1_80); | |
| 110 return crypto_suites; | |
| 111 } | |
| 112 | |
| 113 SSLStreamAdapter* SSLStreamAdapter::Create(StreamInterface* stream) { | |
| 114 return new OpenSSLStreamAdapter(stream); | |
| 115 } | |
| 116 | |
| 117 SSLStreamAdapter::SSLStreamAdapter(StreamInterface* stream) | |
| 118 : StreamAdapterInterface(stream), | |
| 119 ignore_bad_cert_(false), | |
| 120 client_auth_enabled_(true) {} | |
| 121 | |
| 122 SSLStreamAdapter::~SSLStreamAdapter() {} | |
| 123 | |
| 124 bool SSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) { | |
| 125 return false; | |
| 126 } | |
| 127 | |
| 128 bool SSLStreamAdapter::ExportKeyingMaterial(const std::string& label, | |
| 129 const uint8_t* context, | |
| 130 size_t context_len, | |
| 131 bool use_context, | |
| 132 uint8_t* result, | |
| 133 size_t result_len) { | |
| 134 return false; // Default is unsupported | |
| 135 } | |
| 136 | |
| 137 bool SSLStreamAdapter::SetDtlsSrtpCryptoSuites( | |
| 138 const std::vector<int>& crypto_suites) { | |
| 139 return false; | |
| 140 } | |
| 141 | |
| 142 bool SSLStreamAdapter::GetDtlsSrtpCryptoSuite(int* crypto_suite) { | |
| 143 return false; | |
| 144 } | |
| 145 | |
| 146 bool SSLStreamAdapter::IsBoringSsl() { | |
| 147 return OpenSSLStreamAdapter::IsBoringSsl(); | |
| 148 } | |
| 149 bool SSLStreamAdapter::IsAcceptableCipher(int cipher, KeyType key_type) { | |
| 150 return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type); | |
| 151 } | |
| 152 bool SSLStreamAdapter::IsAcceptableCipher(const std::string& cipher, | |
| 153 KeyType key_type) { | |
| 154 return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type); | |
| 155 } | |
| 156 std::string SSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) { | |
| 157 return OpenSSLStreamAdapter::SslCipherSuiteToName(cipher_suite); | |
| 158 } | |
| 159 void SSLStreamAdapter::enable_time_callback_for_testing() { | |
| 160 OpenSSLStreamAdapter::enable_time_callback_for_testing(); | |
| 161 } | |
| 162 | |
| 163 /////////////////////////////////////////////////////////////////////////////// | |
| 164 | |
| 165 } // namespace rtc | |
| OLD | NEW |