mirror of
				https://github.com/ossrs/srs.git
				synced 2025-03-09 15:49:59 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			139 lines
		
	
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			139 lines
		
	
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright 2011-2016 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the OpenSSL license (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| /*
 | |
|  * DTLS code by Eric Rescorla <ekr@rtfm.com>
 | |
|  *
 | |
|  * Copyright (C) 2006, Network Resonance, Inc. Copyright (C) 2011, RTFM, Inc.
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <openssl/objects.h>
 | |
| #include "ssl_local.h"
 | |
| 
 | |
| #ifndef OPENSSL_NO_SRTP
 | |
| 
 | |
| static SRTP_PROTECTION_PROFILE srtp_known_profiles[] = {
 | |
|     {
 | |
|      "SRTP_AES128_CM_SHA1_80",
 | |
|      SRTP_AES128_CM_SHA1_80,
 | |
|      },
 | |
|     {
 | |
|      "SRTP_AES128_CM_SHA1_32",
 | |
|      SRTP_AES128_CM_SHA1_32,
 | |
|      },
 | |
|     {
 | |
|      "SRTP_AEAD_AES_128_GCM",
 | |
|      SRTP_AEAD_AES_128_GCM,
 | |
|      },
 | |
|     {
 | |
|      "SRTP_AEAD_AES_256_GCM",
 | |
|      SRTP_AEAD_AES_256_GCM,
 | |
|      },
 | |
|     {0}
 | |
| };
 | |
| 
 | |
| static int find_profile_by_name(char *profile_name,
 | |
|                                 SRTP_PROTECTION_PROFILE **pptr, size_t len)
 | |
| {
 | |
|     SRTP_PROTECTION_PROFILE *p;
 | |
| 
 | |
|     p = srtp_known_profiles;
 | |
|     while (p->name) {
 | |
|         if ((len == strlen(p->name))
 | |
|             && strncmp(p->name, profile_name, len) == 0) {
 | |
|             *pptr = p;
 | |
|             return 0;
 | |
|         }
 | |
| 
 | |
|         p++;
 | |
|     }
 | |
| 
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| static int ssl_ctx_make_profiles(const char *profiles_string,
 | |
|                                  STACK_OF(SRTP_PROTECTION_PROFILE) **out)
 | |
| {
 | |
|     STACK_OF(SRTP_PROTECTION_PROFILE) *profiles;
 | |
| 
 | |
|     char *col;
 | |
|     char *ptr = (char *)profiles_string;
 | |
|     SRTP_PROTECTION_PROFILE *p;
 | |
| 
 | |
|     if ((profiles = sk_SRTP_PROTECTION_PROFILE_new_null()) == NULL) {
 | |
|         SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES,
 | |
|                SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES);
 | |
|         return 1;
 | |
|     }
 | |
| 
 | |
|     do {
 | |
|         col = strchr(ptr, ':');
 | |
| 
 | |
|         if (!find_profile_by_name(ptr, &p, col ? (size_t)(col - ptr)
 | |
|                                                : strlen(ptr))) {
 | |
|             if (sk_SRTP_PROTECTION_PROFILE_find(profiles, p) >= 0) {
 | |
|                 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES,
 | |
|                        SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
 | |
|                 goto err;
 | |
|             }
 | |
| 
 | |
|             if (!sk_SRTP_PROTECTION_PROFILE_push(profiles, p)) {
 | |
|                 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES,
 | |
|                        SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES);
 | |
|                 goto err;
 | |
|             }
 | |
|         } else {
 | |
|             SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES,
 | |
|                    SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE);
 | |
|             goto err;
 | |
|         }
 | |
| 
 | |
|         if (col)
 | |
|             ptr = col + 1;
 | |
|     } while (col);
 | |
| 
 | |
|     sk_SRTP_PROTECTION_PROFILE_free(*out);
 | |
| 
 | |
|     *out = profiles;
 | |
| 
 | |
|     return 0;
 | |
|  err:
 | |
|     sk_SRTP_PROTECTION_PROFILE_free(profiles);
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx, const char *profiles)
 | |
| {
 | |
|     return ssl_ctx_make_profiles(profiles, &ctx->srtp_profiles);
 | |
| }
 | |
| 
 | |
| int SSL_set_tlsext_use_srtp(SSL *s, const char *profiles)
 | |
| {
 | |
|     return ssl_ctx_make_profiles(profiles, &s->srtp_profiles);
 | |
| }
 | |
| 
 | |
| STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *s)
 | |
| {
 | |
|     if (s != NULL) {
 | |
|         if (s->srtp_profiles != NULL) {
 | |
|             return s->srtp_profiles;
 | |
|         } else if ((s->ctx != NULL) && (s->ctx->srtp_profiles != NULL)) {
 | |
|             return s->ctx->srtp_profiles;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s)
 | |
| {
 | |
|     return s->srtp_profile;
 | |
| }
 | |
| #endif
 |