]>
Commit | Line | Data |
---|---|---|
846e33c7 RS |
1 | /* |
2 | * Copyright 2011-2016 The OpenSSL Project Authors. All Rights Reserved. | |
333f926d | 3 | * |
846e33c7 RS |
4 | * Licensed under the OpenSSL license (the "License"). You may not use |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
333f926d | 8 | */ |
846e33c7 | 9 | |
333f926d | 10 | /* |
0f113f3e MC |
11 | * DTLS code by Eric Rescorla <ekr@rtfm.com> |
12 | * | |
13 | * Copyright (C) 2006, Network Resonance, Inc. Copyright (C) 2011, RTFM, Inc. | |
14 | */ | |
333f926d BL |
15 | |
16 | #include <stdio.h> | |
17 | #include <openssl/objects.h> | |
18 | #include "ssl_locl.h" | |
333f926d | 19 | |
32b07f5a | 20 | #ifndef OPENSSL_NO_SRTP |
333f926d | 21 | |
0f113f3e | 22 | static SRTP_PROTECTION_PROFILE srtp_known_profiles[] = { |
333f926d | 23 | { |
0f113f3e MC |
24 | "SRTP_AES128_CM_SHA1_80", |
25 | SRTP_AES128_CM_SHA1_80, | |
26 | }, | |
333f926d | 27 | { |
0f113f3e MC |
28 | "SRTP_AES128_CM_SHA1_32", |
29 | SRTP_AES128_CM_SHA1_32, | |
30 | }, | |
43e5faa2 DS |
31 | { |
32 | "SRTP_AEAD_AES_128_GCM", | |
a230b26e | 33 | SRTP_AEAD_AES_128_GCM, |
43e5faa2 DS |
34 | }, |
35 | { | |
36 | "SRTP_AEAD_AES_256_GCM", | |
a230b26e | 37 | SRTP_AEAD_AES_256_GCM, |
43e5faa2 | 38 | }, |
333f926d | 39 | {0} |
0f113f3e | 40 | }; |
333f926d BL |
41 | |
42 | static int find_profile_by_name(char *profile_name, | |
8b0e934a | 43 | SRTP_PROTECTION_PROFILE **pptr, size_t len) |
0f113f3e MC |
44 | { |
45 | SRTP_PROTECTION_PROFILE *p; | |
46 | ||
47 | p = srtp_known_profiles; | |
48 | while (p->name) { | |
86885c28 RS |
49 | if ((len == strlen(p->name)) |
50 | && strncmp(p->name, profile_name, len) == 0) { | |
0f113f3e MC |
51 | *pptr = p; |
52 | return 0; | |
53 | } | |
54 | ||
55 | p++; | |
56 | } | |
57 | ||
58 | return 1; | |
59 | } | |
60 | ||
61 | static int ssl_ctx_make_profiles(const char *profiles_string, | |
62 | STACK_OF(SRTP_PROTECTION_PROFILE) **out) | |
63 | { | |
64 | STACK_OF(SRTP_PROTECTION_PROFILE) *profiles; | |
65 | ||
66 | char *col; | |
67 | char *ptr = (char *)profiles_string; | |
0f113f3e MC |
68 | SRTP_PROTECTION_PROFILE *p; |
69 | ||
75ebbd9a | 70 | if ((profiles = sk_SRTP_PROTECTION_PROFILE_new_null()) == NULL) { |
0f113f3e MC |
71 | SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, |
72 | SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES); | |
73 | return 1; | |
74 | } | |
75 | ||
76 | do { | |
77 | col = strchr(ptr, ':'); | |
78 | ||
8b0e934a MC |
79 | if (!find_profile_by_name(ptr, &p, col ? (size_t)(col - ptr) |
80 | : strlen(ptr))) { | |
0f113f3e MC |
81 | if (sk_SRTP_PROTECTION_PROFILE_find(profiles, p) >= 0) { |
82 | SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, | |
83 | SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); | |
3c82e437 | 84 | goto err; |
0f113f3e MC |
85 | } |
86 | ||
3c82e437 F |
87 | if (!sk_SRTP_PROTECTION_PROFILE_push(profiles, p)) { |
88 | SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, | |
89 | SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES); | |
90 | goto err; | |
91 | } | |
0f113f3e MC |
92 | } else { |
93 | SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, | |
94 | SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE); | |
3c82e437 | 95 | goto err; |
0f113f3e MC |
96 | } |
97 | ||
98 | if (col) | |
99 | ptr = col + 1; | |
100 | } while (col); | |
101 | ||
fbdf0299 MC |
102 | sk_SRTP_PROTECTION_PROFILE_free(*out); |
103 | ||
0f113f3e MC |
104 | *out = profiles; |
105 | ||
106 | return 0; | |
a230b26e | 107 | err: |
3c82e437 F |
108 | sk_SRTP_PROTECTION_PROFILE_free(profiles); |
109 | return 1; | |
0f113f3e MC |
110 | } |
111 | ||
112 | int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx, const char *profiles) | |
113 | { | |
114 | return ssl_ctx_make_profiles(profiles, &ctx->srtp_profiles); | |
115 | } | |
116 | ||
117 | int SSL_set_tlsext_use_srtp(SSL *s, const char *profiles) | |
118 | { | |
119 | return ssl_ctx_make_profiles(profiles, &s->srtp_profiles); | |
120 | } | |
333f926d BL |
121 | |
122 | STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *s) | |
0f113f3e MC |
123 | { |
124 | if (s != NULL) { | |
125 | if (s->srtp_profiles != NULL) { | |
126 | return s->srtp_profiles; | |
127 | } else if ((s->ctx != NULL) && (s->ctx->srtp_profiles != NULL)) { | |
128 | return s->ctx->srtp_profiles; | |
129 | } | |
130 | } | |
131 | ||
132 | return NULL; | |
133 | } | |
333f926d BL |
134 | |
135 | SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s) | |
0f113f3e MC |
136 | { |
137 | return s->srtp_profile; | |
138 | } | |
333f926d | 139 | #endif |