Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(144)

Unified Diff: webrtc/pc/srtptransport.cc

Issue 3012333003: Revert of Completed the functionalities of SrtpTransport. (Closed)
Patch Set: Created 3 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « webrtc/pc/srtptransport.h ('k') | webrtc/pc/srtptransport_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: webrtc/pc/srtptransport.cc
diff --git a/webrtc/pc/srtptransport.cc b/webrtc/pc/srtptransport.cc
index d9f054be7ecd1d7cf2991c4e1b3c847748a4bd67..6e6ff062749ba8f6d8cac18ef9484b27ac0df4c1 100644
--- a/webrtc/pc/srtptransport.cc
+++ b/webrtc/pc/srtptransport.cc
@@ -16,7 +16,6 @@
#include "webrtc/pc/rtptransport.h"
#include "webrtc/pc/srtpsession.h"
#include "webrtc/rtc_base/asyncpacketsocket.h"
-#include "webrtc/rtc_base/base64.h"
#include "webrtc/rtc_base/copyonwritebuffer.h"
#include "webrtc/rtc_base/ptr_util.h"
#include "webrtc/rtc_base/trace_event.h"
@@ -43,322 +42,21 @@
&SrtpTransport::OnReadyToSend);
}
-bool SrtpTransport::SendRtpPacket(rtc::CopyOnWriteBuffer* packet,
- const rtc::PacketOptions& options,
- int flags) {
- return SendPacket(false, packet, options, flags);
-}
-
-bool SrtpTransport::SendRtcpPacket(rtc::CopyOnWriteBuffer* packet,
- const rtc::PacketOptions& options,
- int flags) {
- return SendPacket(true, packet, options, flags);
-}
-
bool SrtpTransport::SendPacket(bool rtcp,
rtc::CopyOnWriteBuffer* packet,
const rtc::PacketOptions& options,
int flags) {
- if (!IsActive()) {
- LOG(LS_ERROR)
- << "Failed to send the packet because SRTP transport is inactive.";
- return false;
- }
+ // TODO(zstein): Protect packet.
- rtc::PacketOptions updated_options = options;
- rtc::CopyOnWriteBuffer cp = *packet;
- TRACE_EVENT0("webrtc", "SRTP Encode");
- bool res;
- uint8_t* data = packet->data();
- int len = static_cast<int>(packet->size());
- if (!rtcp) {
-// If ENABLE_EXTERNAL_AUTH flag is on then packet authentication is not done
-// inside libsrtp for a RTP packet. A external HMAC module will be writing
-// a fake HMAC value. This is ONLY done for a RTP packet.
-// Socket layer will update rtp sendtime extension header if present in
-// packet with current time before updating the HMAC.
-#if !defined(ENABLE_EXTERNAL_AUTH)
- res = ProtectRtp(data, len, static_cast<int>(packet->capacity()), &len);
-#else
- if (!IsExternalAuthActive()) {
- res = ProtectRtp(data, len, static_cast<int>(packet->capacity()), &len);
- } else {
- updated_options.packet_time_params.rtp_sendtime_extension_id =
- rtp_abs_sendtime_extn_id_;
- res = ProtectRtp(data, len, static_cast<int>(packet->capacity()), &len,
- &updated_options.packet_time_params.srtp_packet_index);
- // If protection succeeds, let's get auth params from srtp.
- if (res) {
- uint8_t* auth_key = NULL;
- int key_len;
- res = GetRtpAuthParams(
- &auth_key, &key_len,
- &updated_options.packet_time_params.srtp_auth_tag_len);
- if (res) {
- updated_options.packet_time_params.srtp_auth_key.resize(key_len);
- updated_options.packet_time_params.srtp_auth_key.assign(
- auth_key, auth_key + key_len);
- }
- }
- }
-#endif
- if (!res) {
- int seq_num = -1;
- uint32_t ssrc = 0;
- cricket::GetRtpSeqNum(data, len, &seq_num);
- cricket::GetRtpSsrc(data, len, &ssrc);
- LOG(LS_ERROR) << "Failed to protect " << content_name_
- << " RTP packet: size=" << len << ", seqnum=" << seq_num
- << ", SSRC=" << ssrc;
- return false;
- }
- } else {
- res = ProtectRtcp(data, len, static_cast<int>(packet->capacity()), &len);
- if (!res) {
- int type = -1;
- cricket::GetRtcpType(data, len, &type);
- LOG(LS_ERROR) << "Failed to protect " << content_name_
- << " RTCP packet: size=" << len << ", type=" << type;
- return false;
- }
- }
-
- // Update the length of the packet now that we've added the auth tag.
- packet->SetSize(len);
- return rtcp ? rtp_transport_->SendRtcpPacket(packet, updated_options, flags)
- : rtp_transport_->SendRtpPacket(packet, updated_options, flags);
+ return rtp_transport_->SendPacket(rtcp, packet, options, flags);
}
void SrtpTransport::OnPacketReceived(bool rtcp,
rtc::CopyOnWriteBuffer* packet,
const rtc::PacketTime& packet_time) {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Inactive SRTP transport received a packet. Drop it.";
- return;
- }
+ // TODO(zstein): Unprotect packet.
- TRACE_EVENT0("webrtc", "SRTP Decode");
- char* data = packet->data<char>();
- int len = static_cast<int>(packet->size());
- bool res;
- if (!rtcp) {
- res = UnprotectRtp(data, len, &len);
- if (!res) {
- int seq_num = -1;
- uint32_t ssrc = 0;
- cricket::GetRtpSeqNum(data, len, &seq_num);
- cricket::GetRtpSsrc(data, len, &ssrc);
- LOG(LS_ERROR) << "Failed to unprotect " << content_name_
- << " RTP packet: size=" << len << ", seqnum=" << seq_num
- << ", SSRC=" << ssrc;
- return;
- }
- } else {
- res = UnprotectRtcp(data, len, &len);
- if (!res) {
- int type = -1;
- cricket::GetRtcpType(data, len, &type);
- LOG(LS_ERROR) << "Failed to unprotect " << content_name_
- << " RTCP packet: size=" << len << ", type=" << type;
- return;
- }
- }
-
- packet->SetSize(len);
SignalPacketReceived(rtcp, packet, packet_time);
}
-bool SrtpTransport::SetRtpParams(int send_cs,
- const uint8_t* send_key,
- int send_key_len,
- int recv_cs,
- const uint8_t* recv_key,
- int recv_key_len) {
- CreateSrtpSessions();
- send_session_->SetEncryptedHeaderExtensionIds(
- send_encrypted_header_extension_ids_);
- if (external_auth_enabled_) {
- send_session_->EnableExternalAuth();
- }
- if (!send_session_->SetSend(send_cs, send_key, send_key_len)) {
- ResetParams();
- return false;
- }
-
- recv_session_->SetEncryptedHeaderExtensionIds(
- recv_encrypted_header_extension_ids_);
- if (!recv_session_->SetRecv(recv_cs, recv_key, recv_key_len)) {
- ResetParams();
- return false;
- }
-
- LOG(LS_INFO) << "SRTP activated with negotiated parameters:"
- << " send cipher_suite " << send_cs << " recv cipher_suite "
- << recv_cs;
- return true;
-}
-
-bool SrtpTransport::SetRtcpParams(int send_cs,
- const uint8_t* send_key,
- int send_key_len,
- int recv_cs,
- const uint8_t* recv_key,
- int recv_key_len) {
- // This can only be called once, but can be safely called after
- // SetRtpParams
- if (send_rtcp_session_ || recv_rtcp_session_) {
- LOG(LS_ERROR) << "Tried to set SRTCP Params when filter already active";
- return false;
- }
-
- send_rtcp_session_.reset(new cricket::SrtpSession());
- if (!send_rtcp_session_->SetRecv(send_cs, send_key, send_key_len)) {
- return false;
- }
-
- recv_rtcp_session_.reset(new cricket::SrtpSession());
- if (!recv_rtcp_session_->SetRecv(recv_cs, recv_key, recv_key_len)) {
- return false;
- }
-
- LOG(LS_INFO) << "SRTCP activated with negotiated parameters:"
- << " send cipher_suite " << send_cs << " recv cipher_suite "
- << recv_cs;
-
- return true;
-}
-
-bool SrtpTransport::IsActive() const {
- return send_session_ && recv_session_;
-}
-
-void SrtpTransport::ResetParams() {
- send_session_ = nullptr;
- recv_session_ = nullptr;
- send_rtcp_session_ = nullptr;
- recv_rtcp_session_ = nullptr;
- LOG(LS_INFO) << "The params in SRTP transport are reset.";
-}
-
-void SrtpTransport::SetEncryptedHeaderExtensionIds(
- cricket::ContentSource source,
- const std::vector<int>& extension_ids) {
- if (source == cricket::CS_LOCAL) {
- recv_encrypted_header_extension_ids_ = extension_ids;
- } else {
- send_encrypted_header_extension_ids_ = extension_ids;
- }
-}
-
-void SrtpTransport::CreateSrtpSessions() {
- send_session_.reset(new cricket::SrtpSession());
- recv_session_.reset(new cricket::SrtpSession());
-
- if (external_auth_enabled_) {
- send_session_->EnableExternalAuth();
- }
-}
-
-bool SrtpTransport::ProtectRtp(void* p, int in_len, int max_len, int* out_len) {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Failed to ProtectRtp: SRTP not active";
- return false;
- }
- RTC_CHECK(send_session_);
- return send_session_->ProtectRtp(p, in_len, max_len, out_len);
-}
-
-bool SrtpTransport::ProtectRtp(void* p,
- int in_len,
- int max_len,
- int* out_len,
- int64_t* index) {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Failed to ProtectRtp: SRTP not active";
- return false;
- }
- RTC_CHECK(send_session_);
- return send_session_->ProtectRtp(p, in_len, max_len, out_len, index);
-}
-
-bool SrtpTransport::ProtectRtcp(void* p,
- int in_len,
- int max_len,
- int* out_len) {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Failed to ProtectRtcp: SRTP not active";
- return false;
- }
- if (send_rtcp_session_) {
- return send_rtcp_session_->ProtectRtcp(p, in_len, max_len, out_len);
- } else {
- RTC_CHECK(send_session_);
- return send_session_->ProtectRtcp(p, in_len, max_len, out_len);
- }
-}
-
-bool SrtpTransport::UnprotectRtp(void* p, int in_len, int* out_len) {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Failed to UnprotectRtp: SRTP not active";
- return false;
- }
- RTC_CHECK(recv_session_);
- return recv_session_->UnprotectRtp(p, in_len, out_len);
-}
-
-bool SrtpTransport::UnprotectRtcp(void* p, int in_len, int* out_len) {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Failed to UnprotectRtcp: SRTP not active";
- return false;
- }
- if (recv_rtcp_session_) {
- return recv_rtcp_session_->UnprotectRtcp(p, in_len, out_len);
- } else {
- RTC_CHECK(recv_session_);
- return recv_session_->UnprotectRtcp(p, in_len, out_len);
- }
-}
-
-bool SrtpTransport::GetRtpAuthParams(uint8_t** key,
- int* key_len,
- int* tag_len) {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Failed to GetRtpAuthParams: SRTP not active";
- return false;
- }
-
- RTC_CHECK(send_session_);
- return send_session_->GetRtpAuthParams(key, key_len, tag_len);
-}
-
-bool SrtpTransport::GetSrtpOverhead(int* srtp_overhead) const {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Failed to GetSrtpOverhead: SRTP not active";
- return false;
- }
-
- RTC_CHECK(send_session_);
- *srtp_overhead = send_session_->GetSrtpOverhead();
- return true;
-}
-
-void SrtpTransport::EnableExternalAuth() {
- RTC_DCHECK(!IsActive());
- external_auth_enabled_ = true;
-}
-
-bool SrtpTransport::IsExternalAuthEnabled() const {
- return external_auth_enabled_;
-}
-
-bool SrtpTransport::IsExternalAuthActive() const {
- if (!IsActive()) {
- LOG(LS_WARNING) << "Failed to check IsExternalAuthActive: SRTP not active";
- return false;
- }
-
- RTC_CHECK(send_session_);
- return send_session_->IsExternalAuthActive();
-}
-
} // namespace webrtc
« no previous file with comments | « webrtc/pc/srtptransport.h ('k') | webrtc/pc/srtptransport_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698