/* * Copyright 2018 The WebRTC Project Authors. All rights reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ #include "api/crypto/crypto_options.h" #include #include #include #include #include #include #include "absl/algorithm/container.h" #include "api/field_trials_view.h" #include "rtc_base/checks.h" #include "rtc_base/ssl_stream_adapter.h" namespace webrtc { CryptoOptions::CryptoOptions() {} // static CryptoOptions CryptoOptions::NoGcm() { CryptoOptions options; options.srtp.enable_gcm_crypto_suites = false; return options; } std::vector CryptoOptions::GetSupportedDtlsSrtpCryptoSuites() const { std::vector crypto_suites; // Note: kSrtpAes128CmSha1_80 is what is required to be supported (by // draft-ietf-rtcweb-security-arch), but kSrtpAes128CmSha1_32 is allowed as // well, and saves a few bytes per packet if it ends up selected. // As the cipher suite is potentially insecure, it will only be used if // enabled by both peers. if (srtp.enable_aes128_sha1_32_crypto_cipher) { crypto_suites.push_back(kSrtpAes128CmSha1_32); } if (srtp.enable_aes128_sha1_80_crypto_cipher) { crypto_suites.push_back(kSrtpAes128CmSha1_80); } // Note: GCM cipher suites are not the top choice since they increase the // packet size. In order to negotiate them the other side must not support // kSrtpAes128CmSha1_80. if (srtp.enable_gcm_crypto_suites) { crypto_suites.push_back(kSrtpAeadAes256Gcm); crypto_suites.push_back(kSrtpAeadAes128Gcm); } RTC_CHECK(!crypto_suites.empty()); return crypto_suites; } bool CryptoOptions::operator==(const CryptoOptions& other) const { struct data_being_tested_for_equality { struct Srtp { bool enable_gcm_crypto_suites; bool enable_aes128_sha1_32_crypto_cipher; bool enable_aes128_sha1_80_crypto_cipher; bool enable_encrypted_rtp_header_extensions; } srtp; struct SFrame { bool require_frame_encryption; } sframe; EphemeralKeyExchangeCipherGroups ephemeral_key_exchange_cipher_groups; }; static_assert(sizeof(data_being_tested_for_equality) == sizeof(*this), "Did you add something to CryptoOptions and forget to " "update operator==?"); return srtp.enable_gcm_crypto_suites == other.srtp.enable_gcm_crypto_suites && srtp.enable_aes128_sha1_32_crypto_cipher == other.srtp.enable_aes128_sha1_32_crypto_cipher && srtp.enable_aes128_sha1_80_crypto_cipher == other.srtp.enable_aes128_sha1_80_crypto_cipher && srtp.enable_encrypted_rtp_header_extensions == other.srtp.enable_encrypted_rtp_header_extensions && sframe.require_frame_encryption == other.sframe.require_frame_encryption && ephemeral_key_exchange_cipher_groups == other.ephemeral_key_exchange_cipher_groups; } bool CryptoOptions::operator!=(const CryptoOptions& other) const { return !(*this == other); } CryptoOptions::EphemeralKeyExchangeCipherGroups:: EphemeralKeyExchangeCipherGroups() : enabled_(SSLStreamAdapter::GetDefaultEphemeralKeyExchangeCipherGroups( /* field_trials= */ nullptr)) {} bool CryptoOptions::EphemeralKeyExchangeCipherGroups::operator==( const CryptoOptions::EphemeralKeyExchangeCipherGroups& other) const { return enabled_ == other.enabled_; } std::set CryptoOptions::EphemeralKeyExchangeCipherGroups::GetSupported() { return SSLStreamAdapter::GetSupportedEphemeralKeyExchangeCipherGroups(); } std::optional CryptoOptions::EphemeralKeyExchangeCipherGroups::GetName(uint16_t group_id) { return SSLStreamAdapter::GetEphemeralKeyExchangeCipherGroupName(group_id); } void CryptoOptions::EphemeralKeyExchangeCipherGroups::AddFirst(uint16_t group) { std::erase(enabled_, group); enabled_.insert(enabled_.begin(), group); } void CryptoOptions::EphemeralKeyExchangeCipherGroups::Update( const FieldTrialsView* field_trials, const std::vector* disabled_groups) { // Note: assumption is that these lists contains few elements...so converting // to set<> is not worth it. std::vector default_groups = SSLStreamAdapter::GetDefaultEphemeralKeyExchangeCipherGroups( field_trials); // Remove all disabled. if (disabled_groups) { std::erase_if(default_groups, [&](uint16_t val) { return absl::c_linear_search(*disabled_groups, val); }); std::erase_if(enabled_, [&](uint16_t val) { return absl::c_linear_search(*disabled_groups, val); }); } // Add those enabled by field-trials first. std::vector current = std::move(enabled_); enabled_.clear(); for (auto val : default_groups) { if (!absl::c_linear_search(current, val)) { enabled_.push_back(val); } } // Then re-add those present (unless already there). for (auto val : current) { if (!absl::c_linear_search(enabled_, val)) { enabled_.push_back(val); } } } } // namespace webrtc