mirror of
https://github.com/mollyim/webrtc.git
synced 2025-05-18 08:07:56 +01:00

CryptoOptions provided top level optional fields to support Chromium and internal use cases. These locations have been updated to use the new API and this CL removes these legacy compatability options. This CL will be checked in after the chromium CL lands: https://chromium-review.googlesource.com/c/chromium/src/+/1275025 Bug: webrtc:9860 Change-Id: I2790b42c91c49b83e5380a5271df2ceda556c53f Reviewed-on: https://webrtc-review.googlesource.com/c/105644 Commit-Queue: Benjamin Wright <benwright@webrtc.org> Reviewed-by: Steve Anton <steveanton@webrtc.org> Cr-Commit-Position: refs/heads/master@{#25148}
49 lines
1.6 KiB
C++
49 lines
1.6 KiB
C++
/*
|
|
* Copyright 2018 The WebRTC Project Authors. All rights reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include "api/crypto/cryptooptions.h"
|
|
#include "rtc_base/sslstreamadapter.h"
|
|
|
|
namespace webrtc {
|
|
|
|
CryptoOptions::CryptoOptions() {}
|
|
|
|
CryptoOptions::CryptoOptions(const CryptoOptions& other) {
|
|
srtp = other.srtp;
|
|
}
|
|
|
|
CryptoOptions::~CryptoOptions() {}
|
|
|
|
// static
|
|
CryptoOptions CryptoOptions::NoGcm() {
|
|
CryptoOptions options;
|
|
options.srtp.enable_gcm_crypto_suites = false;
|
|
return options;
|
|
}
|
|
|
|
std::vector<int> CryptoOptions::GetSupportedDtlsSrtpCryptoSuites() const {
|
|
std::vector<int> crypto_suites;
|
|
if (srtp.enable_gcm_crypto_suites) {
|
|
crypto_suites.push_back(rtc::SRTP_AEAD_AES_256_GCM);
|
|
crypto_suites.push_back(rtc::SRTP_AEAD_AES_128_GCM);
|
|
}
|
|
// Note: SRTP_AES128_CM_SHA1_80 is what is required to be supported (by
|
|
// draft-ietf-rtcweb-security-arch), but SRTP_AES128_CM_SHA1_32 is allowed as
|
|
// well, and saves a few bytes per packet if it ends up selected.
|
|
// As the cipher suite is potentially insecure, it will only be used if
|
|
// enabled by both peers.
|
|
if (srtp.enable_aes128_sha1_32_crypto_cipher) {
|
|
crypto_suites.push_back(rtc::SRTP_AES128_CM_SHA1_32);
|
|
}
|
|
crypto_suites.push_back(rtc::SRTP_AES128_CM_SHA1_80);
|
|
return crypto_suites;
|
|
}
|
|
|
|
} // namespace webrtc
|