GCM cipher suites are optional (disabled by default) and can be enabled through "PeerConnectionFactoryInterface::Options". If compiled with Chromium (i.e. "ENABLE_EXTERNAL_AUTH" is defined), no GCM ciphers can be used yet (see https://crbug.com/628400). BUG=webrtc:5222, 628400 Review-Url: https://codereview.webrtc.org/1528843005 Cr-Commit-Position: refs/heads/master@{#13635}
161 lines
4.9 KiB
C++
161 lines
4.9 KiB
C++
/*
|
|
* Copyright 2004 The WebRTC Project Authors. All rights reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include "webrtc/base/sslstreamadapter.h"
|
|
#include "webrtc/base/sslconfig.h"
|
|
|
|
#if SSL_USE_OPENSSL
|
|
|
|
#include "webrtc/base/opensslstreamadapter.h"
|
|
|
|
#endif // SSL_USE_OPENSSL
|
|
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
|
|
namespace rtc {
|
|
|
|
// TODO(guoweis): Move this to SDP layer and use int form internally.
|
|
// webrtc:5043.
|
|
const char CS_AES_CM_128_HMAC_SHA1_80[] = "AES_CM_128_HMAC_SHA1_80";
|
|
const char CS_AES_CM_128_HMAC_SHA1_32[] = "AES_CM_128_HMAC_SHA1_32";
|
|
const char CS_AEAD_AES_128_GCM[] = "AEAD_AES_128_GCM";
|
|
const char CS_AEAD_AES_256_GCM[] = "AEAD_AES_256_GCM";
|
|
|
|
std::string SrtpCryptoSuiteToName(int crypto_suite) {
|
|
switch (crypto_suite) {
|
|
case SRTP_AES128_CM_SHA1_32:
|
|
return CS_AES_CM_128_HMAC_SHA1_32;
|
|
case SRTP_AES128_CM_SHA1_80:
|
|
return CS_AES_CM_128_HMAC_SHA1_80;
|
|
case SRTP_AEAD_AES_128_GCM:
|
|
return CS_AEAD_AES_128_GCM;
|
|
case SRTP_AEAD_AES_256_GCM:
|
|
return CS_AEAD_AES_256_GCM;
|
|
default:
|
|
return std::string();
|
|
}
|
|
}
|
|
|
|
int SrtpCryptoSuiteFromName(const std::string& crypto_suite) {
|
|
if (crypto_suite == CS_AES_CM_128_HMAC_SHA1_32)
|
|
return SRTP_AES128_CM_SHA1_32;
|
|
if (crypto_suite == CS_AES_CM_128_HMAC_SHA1_80)
|
|
return SRTP_AES128_CM_SHA1_80;
|
|
if (crypto_suite == CS_AEAD_AES_128_GCM)
|
|
return SRTP_AEAD_AES_128_GCM;
|
|
if (crypto_suite == CS_AEAD_AES_256_GCM)
|
|
return SRTP_AEAD_AES_256_GCM;
|
|
return SRTP_INVALID_CRYPTO_SUITE;
|
|
}
|
|
|
|
bool GetSrtpKeyAndSaltLengths(int crypto_suite, int *key_length,
|
|
int *salt_length) {
|
|
switch (crypto_suite) {
|
|
case SRTP_AES128_CM_SHA1_32:
|
|
case SRTP_AES128_CM_SHA1_80:
|
|
// SRTP_AES128_CM_HMAC_SHA1_32 and SRTP_AES128_CM_HMAC_SHA1_80 are defined
|
|
// in RFC 5764 to use a 128 bits key and 112 bits salt for the cipher.
|
|
*key_length = 16;
|
|
*salt_length = 14;
|
|
break;
|
|
case SRTP_AEAD_AES_128_GCM:
|
|
// SRTP_AEAD_AES_128_GCM is defined in RFC 7714 to use a 128 bits key and
|
|
// a 96 bits salt for the cipher.
|
|
*key_length = 16;
|
|
*salt_length = 12;
|
|
break;
|
|
case SRTP_AEAD_AES_256_GCM:
|
|
// SRTP_AEAD_AES_256_GCM is defined in RFC 7714 to use a 256 bits key and
|
|
// a 96 bits salt for the cipher.
|
|
*key_length = 32;
|
|
*salt_length = 12;
|
|
break;
|
|
default:
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool IsGcmCryptoSuite(int crypto_suite) {
|
|
return (crypto_suite == SRTP_AEAD_AES_256_GCM ||
|
|
crypto_suite == SRTP_AEAD_AES_128_GCM);
|
|
}
|
|
|
|
bool IsGcmCryptoSuiteName(const std::string& crypto_suite) {
|
|
return (crypto_suite == CS_AEAD_AES_256_GCM ||
|
|
crypto_suite == CS_AEAD_AES_128_GCM);
|
|
}
|
|
|
|
// static
|
|
CryptoOptions CryptoOptions::NoGcm() {
|
|
CryptoOptions options;
|
|
options.enable_gcm_crypto_suites = false;
|
|
return options;
|
|
}
|
|
|
|
SSLStreamAdapter* SSLStreamAdapter::Create(StreamInterface* stream) {
|
|
#if SSL_USE_OPENSSL
|
|
return new OpenSSLStreamAdapter(stream);
|
|
#else // !SSL_USE_OPENSSL
|
|
return NULL;
|
|
#endif // SSL_USE_OPENSSL
|
|
}
|
|
|
|
bool SSLStreamAdapter::GetSslCipherSuite(int* cipher_suite) {
|
|
return false;
|
|
}
|
|
|
|
bool SSLStreamAdapter::ExportKeyingMaterial(const std::string& label,
|
|
const uint8_t* context,
|
|
size_t context_len,
|
|
bool use_context,
|
|
uint8_t* result,
|
|
size_t result_len) {
|
|
return false; // Default is unsupported
|
|
}
|
|
|
|
bool SSLStreamAdapter::SetDtlsSrtpCryptoSuites(
|
|
const std::vector<int>& crypto_suites) {
|
|
return false;
|
|
}
|
|
|
|
bool SSLStreamAdapter::GetDtlsSrtpCryptoSuite(int* crypto_suite) {
|
|
return false;
|
|
}
|
|
|
|
#if SSL_USE_OPENSSL
|
|
bool SSLStreamAdapter::HaveDtls() {
|
|
return OpenSSLStreamAdapter::HaveDtls();
|
|
}
|
|
bool SSLStreamAdapter::HaveDtlsSrtp() {
|
|
return OpenSSLStreamAdapter::HaveDtlsSrtp();
|
|
}
|
|
bool SSLStreamAdapter::HaveExporter() {
|
|
return OpenSSLStreamAdapter::HaveExporter();
|
|
}
|
|
bool SSLStreamAdapter::IsBoringSsl() {
|
|
return OpenSSLStreamAdapter::IsBoringSsl();
|
|
}
|
|
bool SSLStreamAdapter::IsAcceptableCipher(int cipher, KeyType key_type) {
|
|
return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type);
|
|
}
|
|
bool SSLStreamAdapter::IsAcceptableCipher(const std::string& cipher,
|
|
KeyType key_type) {
|
|
return OpenSSLStreamAdapter::IsAcceptableCipher(cipher, key_type);
|
|
}
|
|
std::string SSLStreamAdapter::SslCipherSuiteToName(int cipher_suite) {
|
|
return OpenSSLStreamAdapter::SslCipherSuiteToName(cipher_suite);
|
|
}
|
|
#endif // SSL_USE_OPENSSL
|
|
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
|
|
} // namespace rtc
|