2022-03-10 09:44:48 +00:00
|
|
|
package srtp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pion/logging"
|
|
|
|
"github.com/pion/rtp"
|
|
|
|
)
|
|
|
|
|
|
|
|
const defaultSessionSRTPReplayProtectionWindow = 64
|
|
|
|
|
|
|
|
// SessionSRTP implements io.ReadWriteCloser and provides a bi-directional SRTP session
|
|
|
|
// SRTP itself does not have a design like this, but it is common in most applications
|
|
|
|
// for local/remote to each have their own keying material. This provides those patterns
|
|
|
|
// instead of making everyone re-implement
|
|
|
|
type SessionSRTP struct {
|
|
|
|
session
|
|
|
|
writeStream *WriteStreamSRTP
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewSessionSRTP creates a SRTP session using conn as the underlying transport.
|
|
|
|
func NewSessionSRTP(conn net.Conn, config *Config) (*SessionSRTP, error) { //nolint:dupl
|
|
|
|
if config == nil {
|
|
|
|
return nil, errNoConfig
|
|
|
|
} else if conn == nil {
|
|
|
|
return nil, errNoConn
|
|
|
|
}
|
|
|
|
|
|
|
|
loggerFactory := config.LoggerFactory
|
|
|
|
if loggerFactory == nil {
|
|
|
|
loggerFactory = logging.NewDefaultLoggerFactory()
|
|
|
|
}
|
|
|
|
|
|
|
|
localOpts := append(
|
|
|
|
[]ContextOption{},
|
|
|
|
config.LocalOptions...,
|
|
|
|
)
|
|
|
|
remoteOpts := append(
|
|
|
|
[]ContextOption{
|
|
|
|
// Default options
|
|
|
|
SRTPReplayProtection(defaultSessionSRTPReplayProtectionWindow),
|
|
|
|
},
|
|
|
|
config.RemoteOptions...,
|
|
|
|
)
|
|
|
|
|
|
|
|
s := &SessionSRTP{
|
|
|
|
session: session{
|
2024-01-18 18:54:54 +00:00
|
|
|
nextConn: conn,
|
|
|
|
localOptions: localOpts,
|
|
|
|
remoteOptions: remoteOpts,
|
|
|
|
readStreams: map[uint32]readStream{},
|
|
|
|
newStream: make(chan readStream),
|
|
|
|
started: make(chan interface{}),
|
|
|
|
closed: make(chan interface{}),
|
|
|
|
bufferFactory: config.BufferFactory,
|
|
|
|
log: loggerFactory.NewLogger("srtp"),
|
2022-03-10 09:44:48 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
s.writeStream = &WriteStreamSRTP{s}
|
|
|
|
|
|
|
|
err := s.session.start(
|
|
|
|
config.Keys.LocalMasterKey, config.Keys.LocalMasterSalt,
|
|
|
|
config.Keys.RemoteMasterKey, config.Keys.RemoteMasterSalt,
|
|
|
|
config.Profile,
|
|
|
|
s,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// OpenWriteStream returns the global write stream for the Session
|
|
|
|
func (s *SessionSRTP) OpenWriteStream() (*WriteStreamSRTP, error) {
|
|
|
|
return s.writeStream, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// OpenReadStream opens a read stream for the given SSRC, it can be used
|
|
|
|
// if you want a certain SSRC, but don't want to wait for AcceptStream
|
|
|
|
func (s *SessionSRTP) OpenReadStream(ssrc uint32) (*ReadStreamSRTP, error) {
|
|
|
|
r, _ := s.session.getOrCreateReadStream(ssrc, s, newReadStreamSRTP)
|
|
|
|
|
|
|
|
if readStream, ok := r.(*ReadStreamSRTP); ok {
|
|
|
|
return readStream, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, errFailedTypeAssertion
|
|
|
|
}
|
|
|
|
|
|
|
|
// AcceptStream returns a stream to handle RTCP for a single SSRC
|
|
|
|
func (s *SessionSRTP) AcceptStream() (*ReadStreamSRTP, uint32, error) {
|
|
|
|
stream, ok := <-s.newStream
|
|
|
|
if !ok {
|
|
|
|
return nil, 0, errStreamAlreadyClosed
|
|
|
|
}
|
|
|
|
|
|
|
|
readStream, ok := stream.(*ReadStreamSRTP)
|
|
|
|
if !ok {
|
|
|
|
return nil, 0, errFailedTypeAssertion
|
|
|
|
}
|
|
|
|
|
|
|
|
return readStream, stream.GetSSRC(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close ends the session
|
|
|
|
func (s *SessionSRTP) Close() error {
|
|
|
|
return s.session.close()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *SessionSRTP) write(b []byte) (int, error) {
|
|
|
|
packet := &rtp.Packet{}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
err := packet.Unmarshal(b)
|
|
|
|
if err != nil {
|
|
|
|
return 0, nil
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return s.writeRTP(&packet.Header, packet.Payload)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *SessionSRTP) writeRTP(header *rtp.Header, payload []byte) (int, error) {
|
|
|
|
if _, ok := <-s.session.started; ok {
|
|
|
|
return 0, errStartedChannelUsedIncorrectly
|
|
|
|
}
|
|
|
|
|
|
|
|
s.session.localContextMutex.Lock()
|
2024-01-18 18:54:54 +00:00
|
|
|
encrypted, err := s.localContext.encryptRTP(nil, header, payload)
|
2022-03-10 09:44:48 +00:00
|
|
|
s.session.localContextMutex.Unlock()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return s.session.nextConn.Write(encrypted)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *SessionSRTP) setWriteDeadline(t time.Time) error {
|
|
|
|
return s.session.nextConn.SetWriteDeadline(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *SessionSRTP) decrypt(buf []byte) error {
|
|
|
|
h := &rtp.Header{}
|
|
|
|
headerLen, err := h.Unmarshal(buf)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
r, isNew := s.session.getOrCreateReadStream(h.SSRC, s, newReadStreamSRTP)
|
|
|
|
if r == nil {
|
|
|
|
return nil // Session has been closed
|
|
|
|
} else if isNew {
|
|
|
|
s.session.newStream <- r // Notify AcceptStream
|
|
|
|
}
|
|
|
|
|
|
|
|
readStream, ok := r.(*ReadStreamSRTP)
|
|
|
|
if !ok {
|
|
|
|
return errFailedTypeAssertion
|
|
|
|
}
|
|
|
|
|
|
|
|
decrypted, err := s.remoteContext.decryptRTP(buf, buf, h, headerLen)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = readStream.write(decrypted)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|