]> git.ipfire.org Git - thirdparty/openssl.git/blob - ssl/d1_srtp.c
ff8f0c5712df54217da26aa1fc7b5d48b1c6abbc
[thirdparty/openssl.git] / ssl / d1_srtp.c
1 /*
2 * Copyright 2011-2016 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 /*
11 * DTLS code by Eric Rescorla <ekr@rtfm.com>
12 *
13 * Copyright (C) 2006, Network Resonance, Inc. Copyright (C) 2011, RTFM, Inc.
14 */
15
16 #include <stdio.h>
17 #include <openssl/objects.h>
18 #include "ssl_locl.h"
19
20 #ifndef OPENSSL_NO_SRTP
21
22 static SRTP_PROTECTION_PROFILE srtp_known_profiles[] = {
23 {
24 "SRTP_AES128_CM_SHA1_80",
25 SRTP_AES128_CM_SHA1_80,
26 },
27 {
28 "SRTP_AES128_CM_SHA1_32",
29 SRTP_AES128_CM_SHA1_32,
30 },
31 {
32 "SRTP_AEAD_AES_128_GCM",
33 SRTP_AEAD_AES_128_GCM,
34 },
35 {
36 "SRTP_AEAD_AES_256_GCM",
37 SRTP_AEAD_AES_256_GCM,
38 },
39 {0}
40 };
41
42 static int find_profile_by_name(char *profile_name,
43 SRTP_PROTECTION_PROFILE **pptr, size_t len)
44 {
45 SRTP_PROTECTION_PROFILE *p;
46
47 p = srtp_known_profiles;
48 while (p->name) {
49 if ((len == strlen(p->name))
50 && strncmp(p->name, profile_name, len) == 0) {
51 *pptr = p;
52 return 0;
53 }
54
55 p++;
56 }
57
58 return 1;
59 }
60
61 static int ssl_ctx_make_profiles(const char *profiles_string,
62 STACK_OF(SRTP_PROTECTION_PROFILE) **out)
63 {
64 STACK_OF(SRTP_PROTECTION_PROFILE) *profiles;
65
66 char *col;
67 char *ptr = (char *)profiles_string;
68 SRTP_PROTECTION_PROFILE *p;
69
70 if ((profiles = sk_SRTP_PROTECTION_PROFILE_new_null()) == NULL) {
71 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES,
72 SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES);
73 return 1;
74 }
75
76 do {
77 col = strchr(ptr, ':');
78
79 if (!find_profile_by_name(ptr, &p, col ? (size_t)(col - ptr)
80 : strlen(ptr))) {
81 if (sk_SRTP_PROTECTION_PROFILE_find(profiles, p) >= 0) {
82 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES,
83 SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
84 goto err;
85 }
86
87 if (!sk_SRTP_PROTECTION_PROFILE_push(profiles, p)) {
88 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES,
89 SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES);
90 goto err;
91 }
92 } else {
93 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES,
94 SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE);
95 goto err;
96 }
97
98 if (col)
99 ptr = col + 1;
100 } while (col);
101
102 sk_SRTP_PROTECTION_PROFILE_free(*out);
103
104 *out = profiles;
105
106 return 0;
107 err:
108 sk_SRTP_PROTECTION_PROFILE_free(profiles);
109 return 1;
110 }
111
112 int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx, const char *profiles)
113 {
114 return ssl_ctx_make_profiles(profiles, &ctx->srtp_profiles);
115 }
116
117 int SSL_set_tlsext_use_srtp(SSL *s, const char *profiles)
118 {
119 return ssl_ctx_make_profiles(profiles, &s->srtp_profiles);
120 }
121
122 STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *s)
123 {
124 if (s != NULL) {
125 if (s->srtp_profiles != NULL) {
126 return s->srtp_profiles;
127 } else if ((s->ctx != NULL) && (s->ctx->srtp_profiles != NULL)) {
128 return s->ctx->srtp_profiles;
129 }
130 }
131
132 return NULL;
133 }
134
135 SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s)
136 {
137 return s->srtp_profile;
138 }
139 #endif