| Index: webrtc/base/sslstreamadapter.cc
|
| diff --git a/webrtc/base/sslstreamadapter.cc b/webrtc/base/sslstreamadapter.cc
|
| deleted file mode 100644
|
| index 0927704cd4afa047c9a53187630aee6ffbceda84..0000000000000000000000000000000000000000
|
| --- a/webrtc/base/sslstreamadapter.cc
|
| +++ /dev/null
|
| @@ -1,165 +0,0 @@
|
| -/*
|
| - * Copyright 2004 The WebRTC Project Authors. All rights reserved.
|
| - *
|
| - * Use of this source code is governed by a BSD-style license
|
| - * that can be found in the LICENSE file in the root of the source
|
| - * tree. An additional intellectual property rights grant can be found
|
| - * in the file PATENTS. All contributing project authors may
|
| - * be found in the AUTHORS file in the root of the source tree.
|
| - */
|
| -
|
| -#include "webrtc/base/sslstreamadapter.h"
|
| -
|
| -#include "webrtc/base/opensslstreamadapter.h"
|
| -
|
| -///////////////////////////////////////////////////////////////////////////////
|
| -
|
| -namespace rtc {
|
| -
|
| -// TODO(guoweis): Move this to SDP layer and use int form internally.
|
| -// webrtc:5043.
|
| -const char CS_AES_CM_128_HMAC_SHA1_80[] = "AES_CM_128_HMAC_SHA1_80";
|
| -const char CS_AES_CM_128_HMAC_SHA1_32[] = "AES_CM_128_HMAC_SHA1_32";
|
| -const char CS_AEAD_AES_128_GCM[] = "AEAD_AES_128_GCM";
|
| -const char CS_AEAD_AES_256_GCM[] = "AEAD_AES_256_GCM";
|
| -
|
| -std::string SrtpCryptoSuiteToName(int crypto_suite) {
|
| - switch (crypto_suite) {
|
| - case SRTP_AES128_CM_SHA1_32:
|
| - return CS_AES_CM_128_HMAC_SHA1_32;
|
| - case SRTP_AES128_CM_SHA1_80:
|
| - return CS_AES_CM_128_HMAC_SHA1_80;
|
| - case SRTP_AEAD_AES_128_GCM:
|
| - return CS_AEAD_AES_128_GCM;
|
| - case SRTP_AEAD_AES_256_GCM:
|
| - return CS_AEAD_AES_256_GCM;
|
| - default:
|
| - return std::string();
|
| - }
|
| -}
|
| -
|
| -int SrtpCryptoSuiteFromName(const std::string& crypto_suite) {
|
| - if (crypto_suite == CS_AES_CM_128_HMAC_SHA1_32)
|
| - return SRTP_AES128_CM_SHA1_32;
|
| - if (crypto_suite == CS_AES_CM_128_HMAC_SHA1_80)
|
| - return SRTP_AES128_CM_SHA1_80;
|
| - if (crypto_suite == CS_AEAD_AES_128_GCM)
|
| - return SRTP_AEAD_AES_128_GCM;
|
| - if (crypto_suite == CS_AEAD_AES_256_GCM)
|
| - return SRTP_AEAD_AES_256_GCM;
|
| - return SRTP_INVALID_CRYPTO_SUITE;
|
| -}
|
| -
|
| -bool GetSrtpKeyAndSaltLengths(int crypto_suite, int *key_length,
|
| - int *salt_length) {
|
| - switch (crypto_suite) {
|
| - case SRTP_AES128_CM_SHA1_32:
|
| - case SRTP_AES128_CM_SHA1_80:
|
| - // SRTP_AES128_CM_HMAC_SHA1_32 and SRTP_AES128_CM_HMAC_SHA1_80 are defined
|
| - // in RFC 5764 to use a 128 bits key and 112 bits salt for the cipher.
|
| - *key_length = 16;
|
| - *salt_length = 14;
|
| - break;
|
| - case SRTP_AEAD_AES_128_GCM:
|
| - // SRTP_AEAD_AES_128_GCM is defined in RFC 7714 to use a 128 bits key and
|
| - // a 96 bits salt for the cipher.
|
| - *key_length = 16;
|
| - *salt_length = 12;
|
| - break;
|
| - case SRTP_AEAD_AES_256_GCM:
|
| - // SRTP_AEAD_AES_256_GCM is defined in RFC 7714 to use a 256 bits key and
|
| - // a 96 bits salt for the cipher.
|
| - *key_length = 32;
|
| - *salt_length = 12;
|
| - break;
|
| - default:
|
| - return false;
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -bool IsGcmCryptoSuite(int crypto_suite) {
|
| - return (crypto_suite == SRTP_AEAD_AES_256_GCM ||
|
| - crypto_suite == SRTP_AEAD_AES_128_GCM);
|
| -}
|
| -
|
| -bool IsGcmCryptoSuiteName(const std::string& crypto_suite) {
|
| - return (crypto_suite == CS_AEAD_AES_256_GCM ||
|
| - crypto_suite == CS_AEAD_AES_128_GCM);
|
| -}
|
| -
|
| -// static
|
| -CryptoOptions CryptoOptions::NoGcm() {
|
| - CryptoOptions options;
|
| - options.enable_gcm_crypto_suites = false;
|
| - return options;
|
| -}
|
| -
|
| -std::vector<int> GetSupportedDtlsSrtpCryptoSuites(
|
| - const rtc::CryptoOptions& crypto_options) {
|
| - std::vector<int> crypto_suites;
|
| - if (crypto_options.enable_gcm_crypto_suites) {
|
| - crypto_suites.push_back(rtc::SRTP_AEAD_AES_256_GCM);
|
| - crypto_suites.push_back(rtc::SRTP_AEAD_AES_128_GCM);
|
| - }
|
| - // Note: SRTP_AES128_CM_SHA1_80 is what is required to be supported (by
|
| - // draft-ietf-rtcweb-security-arch), but SRTP_AES128_CM_SHA1_32 is allowed as
|
| - // well, and saves a few bytes per packet if it ends up selected.
|
| - crypto_suites.push_back(rtc::SRTP_AES128_CM_SHA1_32);
|
| - crypto_suites.push_back(rtc::SRTP_AES128_CM_SHA1_80);
|
| - return crypto_suites;
|
| -}
|
| -
|
| -SSLStreamAdapter* SSLStreamAdapter::Create(StreamInterface* stream) {
|
| - return new OpenSSLStreamAdapter(stream);
|
| -}
|
| -
|
| -SSLStreamAdapter::SSLStreamAdapter(StreamInterface* stream)
|
| - : StreamAdapterInterface(stream),
|
| - ignore_bad_cert_(false),
|
| - client_auth_enabled_(true) {}
|
| -
|
| -SSLStreamAdapter::~SSLStreamAdapter() {}
|
| -
|
| -bool SSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) {
|
| - return false;
|
| -}
|
| -
|
| -bool SSLStreamAdapter::ExportKeyingMaterial(const std::string& label,
|
| - const uint8_t* context,
|
| - size_t context_len,
|
| - bool use_context,
|
| - uint8_t* result,
|
| - size_t result_len) {
|
| - return false; // Default is unsupported
|
| -}
|
| -
|
| -bool SSLStreamAdapter::SetDtlsSrtpCryptoSuites(
|
| - const std::vector<int>& crypto_suites) {
|
| - return false;
|
| -}
|
| -
|
| -bool SSLStreamAdapter::GetDtlsSrtpCryptoSuite(int* crypto_suite) {
|
| - return false;
|
| -}
|
| -
|
| -bool SSLStreamAdapter::IsBoringSsl() {
|
| - return OpenSSLStreamAdapter::IsBoringSsl();
|
| -}
|
| -bool SSLStreamAdapter::IsAcceptableCipher(int cipher, KeyType key_type) {
|
| - return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type);
|
| -}
|
| -bool SSLStreamAdapter::IsAcceptableCipher(const std::string& cipher,
|
| - KeyType key_type) {
|
| - return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type);
|
| -}
|
| -std::string SSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) {
|
| - return OpenSSLStreamAdapter::SslCipherSuiteToName(cipher_suite);
|
| -}
|
| -void SSLStreamAdapter::enable_time_callback_for_testing() {
|
| - OpenSSLStreamAdapter::enable_time_callback_for_testing();
|
| -}
|
| -
|
| -///////////////////////////////////////////////////////////////////////////////
|
| -
|
| -} // namespace rtc
|
|
|