1 /* 2 * Copyright 2011-2016 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the OpenSSL license (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 /* 11 * DTLS code by Eric Rescorla <ekr@rtfm.com> 12 * 13 * Copyright (C) 2006, Network Resonance, Inc. Copyright (C) 2011, RTFM, Inc. 14 */ 15 16 #include <stdio.h> 17 #include <openssl/objects.h> 18 #include "ssl_local.h" 19 20 #ifndef OPENSSL_NO_SRTP 21 22 static SRTP_PROTECTION_PROFILE srtp_known_profiles[] = { 23 { 24 "SRTP_AES128_CM_SHA1_80", 25 SRTP_AES128_CM_SHA1_80, 26 }, 27 { 28 "SRTP_AES128_CM_SHA1_32", 29 SRTP_AES128_CM_SHA1_32, 30 }, 31 { 32 "SRTP_AEAD_AES_128_GCM", 33 SRTP_AEAD_AES_128_GCM, 34 }, 35 { 36 "SRTP_AEAD_AES_256_GCM", 37 SRTP_AEAD_AES_256_GCM, 38 }, 39 {0} 40 }; 41 42 static int find_profile_by_name(char *profile_name, 43 SRTP_PROTECTION_PROFILE **pptr, size_t len) 44 { 45 SRTP_PROTECTION_PROFILE *p; 46 47 p = srtp_known_profiles; 48 while (p->name) { 49 if ((len == strlen(p->name)) 50 && strncmp(p->name, profile_name, len) == 0) { 51 *pptr = p; 52 return 0; 53 } 54 55 p++; 56 } 57 58 return 1; 59 } 60 61 static int ssl_ctx_make_profiles(const char *profiles_string, 62 STACK_OF(SRTP_PROTECTION_PROFILE) **out) 63 { 64 STACK_OF(SRTP_PROTECTION_PROFILE) *profiles; 65 66 char *col; 67 char *ptr = (char *)profiles_string; 68 SRTP_PROTECTION_PROFILE *p; 69 70 if ((profiles = sk_SRTP_PROTECTION_PROFILE_new_null()) == NULL) { 71 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, 72 SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES); 73 return 1; 74 } 75 76 do { 77 col = strchr(ptr, ':'); 78 79 if (!find_profile_by_name(ptr, &p, col ? (size_t)(col - ptr) 80 : strlen(ptr))) { 81 if (sk_SRTP_PROTECTION_PROFILE_find(profiles, p) >= 0) { 82 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, 83 SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); 84 goto err; 85 } 86 87 if (!sk_SRTP_PROTECTION_PROFILE_push(profiles, p)) { 88 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, 89 SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES); 90 goto err; 91 } 92 } else { 93 SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, 94 SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE); 95 goto err; 96 } 97 98 if (col) 99 ptr = col + 1; 100 } while (col); 101 102 sk_SRTP_PROTECTION_PROFILE_free(*out); 103 104 *out = profiles; 105 106 return 0; 107 err: 108 sk_SRTP_PROTECTION_PROFILE_free(profiles); 109 return 1; 110 } 111 112 int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx, const char *profiles) 113 { 114 return ssl_ctx_make_profiles(profiles, &ctx->srtp_profiles); 115 } 116 117 int SSL_set_tlsext_use_srtp(SSL *s, const char *profiles) 118 { 119 return ssl_ctx_make_profiles(profiles, &s->srtp_profiles); 120 } 121 122 STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *s) 123 { 124 if (s != NULL) { 125 if (s->srtp_profiles != NULL) { 126 return s->srtp_profiles; 127 } else if ((s->ctx != NULL) && (s->ctx->srtp_profiles != NULL)) { 128 return s->ctx->srtp_profiles; 129 } 130 } 131 132 return NULL; 133 } 134 135 SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s) 136 { 137 return s->srtp_profile; 138 } 139 #endif 140