/* * Copyright 2018 The WebRTC Project Authors. All rights reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ #include "api/crypto/crypto_options.h" #include "rtc_base/ssl_stream_adapter.h" namespace webrtc { CryptoOptions::CryptoOptions() {} CryptoOptions::CryptoOptions(const CryptoOptions& other) { srtp = other.srtp; sframe = other.sframe; } CryptoOptions::~CryptoOptions() {} // static CryptoOptions CryptoOptions::NoGcm() { CryptoOptions options; options.srtp.enable_gcm_crypto_suites = false; return options; } std::vector CryptoOptions::GetSupportedDtlsSrtpCryptoSuites() const { std::vector crypto_suites; // Note: kSrtpAes128CmSha1_80 is what is required to be supported (by // draft-ietf-rtcweb-security-arch), but kSrtpAes128CmSha1_32 is allowed as // well, and saves a few bytes per packet if it ends up selected. // As the cipher suite is potentially insecure, it will only be used if // enabled by both peers. if (srtp.enable_aes128_sha1_32_crypto_cipher) { crypto_suites.push_back(rtc::kSrtpAes128CmSha1_32); } if (srtp.enable_aes128_sha1_80_crypto_cipher) { crypto_suites.push_back(rtc::kSrtpAes128CmSha1_80); } // Note: GCM cipher suites are not the top choice since they increase the // packet size. In order to negotiate them the other side must not support // kSrtpAes128CmSha1_80. if (srtp.enable_gcm_crypto_suites) { crypto_suites.push_back(rtc::kSrtpAeadAes256Gcm); crypto_suites.push_back(rtc::kSrtpAeadAes128Gcm); } RTC_CHECK(!crypto_suites.empty()); return crypto_suites; } bool CryptoOptions::operator==(const CryptoOptions& other) const { struct data_being_tested_for_equality { struct Srtp { bool enable_gcm_crypto_suites; bool enable_aes128_sha1_32_crypto_cipher; bool enable_aes128_sha1_80_crypto_cipher; bool enable_encrypted_rtp_header_extensions; } srtp; struct SFrame { bool require_frame_encryption; } sframe; }; static_assert(sizeof(data_being_tested_for_equality) == sizeof(*this), "Did you add something to CryptoOptions and forget to " "update operator==?"); return srtp.enable_gcm_crypto_suites == other.srtp.enable_gcm_crypto_suites && srtp.enable_aes128_sha1_32_crypto_cipher == other.srtp.enable_aes128_sha1_32_crypto_cipher && srtp.enable_aes128_sha1_80_crypto_cipher == other.srtp.enable_aes128_sha1_80_crypto_cipher && srtp.enable_encrypted_rtp_header_extensions == other.srtp.enable_encrypted_rtp_header_extensions && sframe.require_frame_encryption == other.sframe.require_frame_encryption; } bool CryptoOptions::operator!=(const CryptoOptions& other) const { return !(*this == other); } } // namespace webrtc