/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ // Original author: ekr@rtfm.com #include "logging.h" #include "SrtpFlow.h" #include "srtp.h" #include "transportlayerdtls.h" #include "mozilla/RefPtr.h" using namespace mozilla; namespace mozilla { MOZ_MTLOG_MODULE("mtransport") bool SrtpFlow::initialized; // Static SrtpFlow::~SrtpFlow() { if (session_) { srtp_dealloc(session_); } } unsigned int SrtpFlow::KeySize(int cipher_suite) { srtp_profile_t profile = static_cast(cipher_suite); return srtp_profile_get_master_key_length(profile); } unsigned int SrtpFlow::SaltSize(int cipher_suite) { srtp_profile_t profile = static_cast(cipher_suite); return srtp_profile_get_master_salt_length(profile); } RefPtr SrtpFlow::Create(int cipher_suite, bool inbound, const void* key, size_t key_len) { nsresult res = Init(); if (!NS_SUCCEEDED(res)) return nullptr; RefPtr flow = new SrtpFlow(); if (!key) { MOZ_MTLOG(ML_ERROR, "Null SRTP key specified"); return nullptr; } if ((key_len > SRTP_MAX_KEY_LENGTH) || (key_len < SRTP_MIN_KEY_LENGTH)) { MOZ_ASSERT(false, "Invalid SRTP key length"); return nullptr; } srtp_policy_t policy; memset(&policy, 0, sizeof(srtp_policy_t)); // Note that we set the same cipher suite for RTP and RTCP // since any flow can only have one cipher suite with DTLS-SRTP switch (cipher_suite) { case kDtlsSrtpAeadAes256Gcm: MOZ_MTLOG(ML_DEBUG, "Setting SRTP cipher suite SRTP_AEAD_AES_256_GCM"); srtp_crypto_policy_set_aes_gcm_256_16_auth(&policy.rtp); srtp_crypto_policy_set_aes_gcm_256_16_auth(&policy.rtcp); break; case kDtlsSrtpAeadAes128Gcm: MOZ_MTLOG(ML_DEBUG, "Setting SRTP cipher suite SRTP_AEAD_AES_128_GCM"); srtp_crypto_policy_set_aes_gcm_128_16_auth(&policy.rtp); srtp_crypto_policy_set_aes_gcm_128_16_auth(&policy.rtcp); break; case kDtlsSrtpAes128CmHmacSha1_80: MOZ_MTLOG(ML_DEBUG, "Setting SRTP cipher suite SRTP_AES128_CM_HMAC_SHA1_80"); srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtp); srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp); break; case kDtlsSrtpAes128CmHmacSha1_32: MOZ_MTLOG(ML_DEBUG, "Setting SRTP cipher suite SRTP_AES128_CM_HMAC_SHA1_32"); srtp_crypto_policy_set_aes_cm_128_hmac_sha1_32(&policy.rtp); srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80( &policy.rtcp); // 80-bit per RFC 5764 break; // S 4.1.2. default: MOZ_MTLOG(ML_ERROR, "Request to set unknown SRTP cipher suite"); return nullptr; } // This key is copied into the srtp_t object, so we don't // need to keep it. policy.key = const_cast(static_cast(key)); policy.ssrc.type = inbound ? ssrc_any_inbound : ssrc_any_outbound; policy.ssrc.value = 0; policy.window_size = 1024; // Use the Chrome value. Needs to be revisited. Default is 128 policy.allow_repeat_tx = 1; // Use Chrome value; needed for NACK mode to work policy.next = nullptr; // Now make the session srtp_err_status_t r = srtp_create(&flow->session_, &policy); if (r != srtp_err_status_ok) { MOZ_MTLOG(ML_ERROR, "Error creating srtp session"); return nullptr; } return flow; } nsresult SrtpFlow::CheckInputs(bool protect, void* in, int in_len, int max_len, int* out_len) { MOZ_ASSERT(in); if (!in) { MOZ_MTLOG(ML_ERROR, "NULL input value"); return NS_ERROR_NULL_POINTER; } if (in_len < 0) { MOZ_MTLOG(ML_ERROR, "Input length is negative"); return NS_ERROR_ILLEGAL_VALUE; } if (max_len < 0) { MOZ_MTLOG(ML_ERROR, "Max output length is negative"); return NS_ERROR_ILLEGAL_VALUE; } if (protect) { if ((max_len < SRTP_MAX_EXPANSION) || ((max_len - SRTP_MAX_EXPANSION) < in_len)) { MOZ_MTLOG(ML_ERROR, "Output too short"); return NS_ERROR_ILLEGAL_VALUE; } } else { if (in_len > max_len) { MOZ_MTLOG(ML_ERROR, "Output too short"); return NS_ERROR_ILLEGAL_VALUE; } } return NS_OK; } nsresult SrtpFlow::ProtectRtp(void* in, int in_len, int max_len, int* out_len) { nsresult res = CheckInputs(true, in, in_len, max_len, out_len); if (NS_FAILED(res)) return res; int len = in_len; srtp_err_status_t r = srtp_protect(session_, in, &len); if (r != srtp_err_status_ok) { MOZ_MTLOG(ML_ERROR, "Error protecting SRTP packet"); return NS_ERROR_FAILURE; } MOZ_ASSERT(len <= max_len); *out_len = len; MOZ_MTLOG(ML_DEBUG, "Successfully protected an SRTP packet of len " << *out_len); return NS_OK; } nsresult SrtpFlow::UnprotectRtp(void* in, int in_len, int max_len, int* out_len) { nsresult res = CheckInputs(false, in, in_len, max_len, out_len); if (NS_FAILED(res)) return res; int len = in_len; srtp_err_status_t r = srtp_unprotect(session_, in, &len); if (r != srtp_err_status_ok) { MOZ_MTLOG(ML_ERROR, "Error unprotecting SRTP packet error=" << (int)r); return NS_ERROR_FAILURE; } MOZ_ASSERT(len <= max_len); *out_len = len; MOZ_MTLOG(ML_DEBUG, "Successfully unprotected an SRTP packet of len " << *out_len); return NS_OK; } nsresult SrtpFlow::ProtectRtcp(void* in, int in_len, int max_len, int* out_len) { nsresult res = CheckInputs(true, in, in_len, max_len, out_len); if (NS_FAILED(res)) return res; int len = in_len; srtp_err_status_t r = srtp_protect_rtcp(session_, in, &len); if (r != srtp_err_status_ok) { MOZ_MTLOG(ML_ERROR, "Error protecting SRTCP packet"); return NS_ERROR_FAILURE; } MOZ_ASSERT(len <= max_len); *out_len = len; MOZ_MTLOG(ML_DEBUG, "Successfully protected an SRTCP packet of len " << *out_len); return NS_OK; } nsresult SrtpFlow::UnprotectRtcp(void* in, int in_len, int max_len, int* out_len) { nsresult res = CheckInputs(false, in, in_len, max_len, out_len); if (NS_FAILED(res)) return res; int len = in_len; srtp_err_status_t r = srtp_unprotect_rtcp(session_, in, &len); if (r != srtp_err_status_ok) { MOZ_MTLOG(ML_ERROR, "Error unprotecting SRTCP packet error=" << (int)r); return NS_ERROR_FAILURE; } MOZ_ASSERT(len <= max_len); *out_len = len; MOZ_MTLOG(ML_DEBUG, "Successfully unprotected an SRTCP packet of len " << *out_len); return NS_OK; } // Statics void SrtpFlow::srtp_event_handler(srtp_event_data_t* data) { // TODO(ekr@rtfm.com): Implement this MOZ_CRASH(); } nsresult SrtpFlow::Init() { if (!initialized) { srtp_err_status_t r = srtp_init(); if (r != srtp_err_status_ok) { MOZ_MTLOG(ML_ERROR, "Could not initialize SRTP"); MOZ_ASSERT(PR_FALSE); return NS_ERROR_FAILURE; } r = srtp_install_event_handler(&SrtpFlow::srtp_event_handler); if (r != srtp_err_status_ok) { MOZ_MTLOG(ML_ERROR, "Could not install SRTP event handler"); MOZ_ASSERT(PR_FALSE); return NS_ERROR_FAILURE; } initialized = true; } return NS_OK; } } // namespace mozilla