zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2017 The WebRTC project authors. All Rights Reserved. |
| 3 | * |
| 4 | * Use of this source code is governed by a BSD-style license |
| 5 | * that can be found in the LICENSE file in the root of the source |
| 6 | * tree. An additional intellectual property rights grant can be found |
| 7 | * in the file PATENTS. All contributing project authors may |
| 8 | * be found in the AUTHORS file in the root of the source tree. |
| 9 | */ |
| 10 | |
Jonas Olsson | a4d8737 | 2019-07-05 19:08:33 +0200 | [diff] [blame] | 11 | #include "pc/srtp_transport.h" |
| 12 | |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 13 | #include <string.h> |
Jonas Olsson | a4d8737 | 2019-07-05 19:08:33 +0200 | [diff] [blame] | 14 | |
Steve Anton | 36b29d1 | 2017-10-30 09:57:42 -0700 | [diff] [blame] | 15 | #include <vector> |
| 16 | |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 17 | #include "call/rtp_demuxer.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 18 | #include "media/base/fake_rtp.h" |
| 19 | #include "p2p/base/dtls_transport_internal.h" |
| 20 | #include "p2p/base/fake_packet_transport.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 21 | #include "pc/test/rtp_transport_test_util.h" |
| 22 | #include "pc/test/srtp_test_util.h" |
| 23 | #include "rtc_base/async_packet_socket.h" |
| 24 | #include "rtc_base/byte_order.h" |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 25 | #include "rtc_base/checks.h" |
Harald Alvestrand | c24a218 | 2022-02-23 13:44:59 +0000 | [diff] [blame] | 26 | #include "rtc_base/containers/flat_set.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 27 | #include "rtc_base/ssl_stream_adapter.h" |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 28 | #include "rtc_base/third_party/sigslot/sigslot.h" |
| 29 | #include "test/gtest.h" |
Jonas Oreland | ed99dae | 2022-03-09 09:28:10 +0100 | [diff] [blame^] | 30 | #include "test/scoped_key_value_config.h" |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 31 | |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 32 | using rtc::kSrtpAeadAes128Gcm; |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 33 | using rtc::kTestKey1; |
| 34 | using rtc::kTestKey2; |
| 35 | using rtc::kTestKeyLen; |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 36 | |
| 37 | namespace webrtc { |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 38 | static const uint8_t kTestKeyGcm128_1[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ12"; |
| 39 | static const uint8_t kTestKeyGcm128_2[] = "21ZYXWVUTSRQPONMLKJIHGFEDCBA"; |
| 40 | static const int kTestKeyGcm128Len = 28; // 128 bits key + 96 bits salt. |
| 41 | static const uint8_t kTestKeyGcm256_1[] = |
| 42 | "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqr"; |
| 43 | static const uint8_t kTestKeyGcm256_2[] = |
| 44 | "rqponmlkjihgfedcbaZYXWVUTSRQPONMLKJIHGFEDCBA"; |
| 45 | static const int kTestKeyGcm256Len = 44; // 256 bits key + 96 bits salt. |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 46 | |
Mirko Bonadei | 6a489f2 | 2019-04-09 15:11:12 +0200 | [diff] [blame] | 47 | class SrtpTransportTest : public ::testing::Test, public sigslot::has_slots<> { |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 48 | protected: |
| 49 | SrtpTransportTest() { |
| 50 | bool rtcp_mux_enabled = true; |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 51 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 52 | rtp_packet_transport1_ = |
Mirko Bonadei | 317a1f0 | 2019-09-17 17:06:18 +0200 | [diff] [blame] | 53 | std::make_unique<rtc::FakePacketTransport>("fake_packet_transport1"); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 54 | rtp_packet_transport2_ = |
Mirko Bonadei | 317a1f0 | 2019-09-17 17:06:18 +0200 | [diff] [blame] | 55 | std::make_unique<rtc::FakePacketTransport>("fake_packet_transport2"); |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 56 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 57 | bool asymmetric = false; |
| 58 | rtp_packet_transport1_->SetDestination(rtp_packet_transport2_.get(), |
| 59 | asymmetric); |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 60 | |
Jonas Oreland | ed99dae | 2022-03-09 09:28:10 +0100 | [diff] [blame^] | 61 | srtp_transport1_ = |
| 62 | std::make_unique<SrtpTransport>(rtcp_mux_enabled, field_trials_); |
| 63 | srtp_transport2_ = |
| 64 | std::make_unique<SrtpTransport>(rtcp_mux_enabled, field_trials_); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 65 | |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 66 | srtp_transport1_->SetRtpPacketTransport(rtp_packet_transport1_.get()); |
| 67 | srtp_transport2_->SetRtpPacketTransport(rtp_packet_transport2_.get()); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 68 | |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 69 | srtp_transport1_->SignalRtcpPacketReceived.connect( |
| 70 | &rtp_sink1_, &TransportObserver::OnRtcpPacketReceived); |
| 71 | srtp_transport2_->SignalRtcpPacketReceived.connect( |
| 72 | &rtp_sink2_, &TransportObserver::OnRtcpPacketReceived); |
| 73 | |
| 74 | RtpDemuxerCriteria demuxer_criteria; |
| 75 | // 0x00 is the payload type used in kPcmuFrame. |
Tomas Gunnarsson | 8a5ac16 | 2022-01-03 14:16:46 +0000 | [diff] [blame] | 76 | demuxer_criteria.payload_types().insert(0x00); |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 77 | |
| 78 | srtp_transport1_->RegisterRtpDemuxerSink(demuxer_criteria, &rtp_sink1_); |
| 79 | srtp_transport2_->RegisterRtpDemuxerSink(demuxer_criteria, &rtp_sink2_); |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 80 | } |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 81 | |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 82 | ~SrtpTransportTest() { |
| 83 | if (srtp_transport1_) { |
| 84 | srtp_transport1_->UnregisterRtpDemuxerSink(&rtp_sink1_); |
| 85 | } |
| 86 | if (srtp_transport2_) { |
| 87 | srtp_transport2_->UnregisterRtpDemuxerSink(&rtp_sink2_); |
| 88 | } |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 89 | } |
| 90 | |
| 91 | // With external auth enabled, SRTP doesn't write the auth tag and |
| 92 | // unprotect would fail. Check accessing the information about the |
| 93 | // tag instead, similar to what the actual code would do that relies |
| 94 | // on external auth. |
| 95 | void TestRtpAuthParams(SrtpTransport* transport, const std::string& cs) { |
| 96 | int overhead; |
| 97 | EXPECT_TRUE(transport->GetSrtpOverhead(&overhead)); |
| 98 | switch (rtc::SrtpCryptoSuiteFromName(cs)) { |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 99 | case rtc::kSrtpAes128CmSha1_32: |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 100 | EXPECT_EQ(32 / 8, overhead); // 32-bit tag. |
| 101 | break; |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 102 | case rtc::kSrtpAes128CmSha1_80: |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 103 | EXPECT_EQ(80 / 8, overhead); // 80-bit tag. |
| 104 | break; |
| 105 | default: |
Artem Titov | d325196 | 2021-11-15 16:57:07 +0100 | [diff] [blame] | 106 | RTC_DCHECK_NOTREACHED(); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 107 | break; |
| 108 | } |
| 109 | |
| 110 | uint8_t* auth_key = nullptr; |
| 111 | int key_len = 0; |
| 112 | int tag_len = 0; |
| 113 | EXPECT_TRUE(transport->GetRtpAuthParams(&auth_key, &key_len, &tag_len)); |
| 114 | EXPECT_NE(nullptr, auth_key); |
| 115 | EXPECT_EQ(160 / 8, key_len); // Length of SHA-1 is 160 bits. |
| 116 | EXPECT_EQ(overhead, tag_len); |
| 117 | } |
| 118 | |
| 119 | void TestSendRecvRtpPacket(const std::string& cipher_suite_name) { |
| 120 | size_t rtp_len = sizeof(kPcmuFrame); |
| 121 | size_t packet_size = rtp_len + rtc::rtp_auth_tag_len(cipher_suite_name); |
| 122 | rtc::Buffer rtp_packet_buffer(packet_size); |
| 123 | char* rtp_packet_data = rtp_packet_buffer.data<char>(); |
| 124 | memcpy(rtp_packet_data, kPcmuFrame, rtp_len); |
| 125 | // In order to be able to run this test function multiple times we can not |
| 126 | // use the same sequence number twice. Increase the sequence number by one. |
| 127 | rtc::SetBE16(reinterpret_cast<uint8_t*>(rtp_packet_data) + 2, |
| 128 | ++sequence_number_); |
| 129 | rtc::CopyOnWriteBuffer rtp_packet1to2(rtp_packet_data, rtp_len, |
| 130 | packet_size); |
| 131 | rtc::CopyOnWriteBuffer rtp_packet2to1(rtp_packet_data, rtp_len, |
| 132 | packet_size); |
| 133 | |
| 134 | char original_rtp_data[sizeof(kPcmuFrame)]; |
| 135 | memcpy(original_rtp_data, rtp_packet_data, rtp_len); |
| 136 | |
| 137 | rtc::PacketOptions options; |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 138 | // Send a packet from `srtp_transport1_` to `srtp_transport2_` and verify |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 139 | // that the packet can be successfully received and decrypted. |
| 140 | ASSERT_TRUE(srtp_transport1_->SendRtpPacket(&rtp_packet1to2, options, |
| 141 | cricket::PF_SRTP_BYPASS)); |
| 142 | if (srtp_transport1_->IsExternalAuthActive()) { |
| 143 | TestRtpAuthParams(srtp_transport1_.get(), cipher_suite_name); |
| 144 | } else { |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 145 | ASSERT_TRUE(rtp_sink2_.last_recv_rtp_packet().data()); |
| 146 | EXPECT_EQ(0, memcmp(rtp_sink2_.last_recv_rtp_packet().data(), |
| 147 | original_rtp_data, rtp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 148 | // Get the encrypted packet from underneath packet transport and verify |
| 149 | // the data is actually encrypted. |
| 150 | auto fake_rtp_packet_transport = static_cast<rtc::FakePacketTransport*>( |
| 151 | srtp_transport1_->rtp_packet_transport()); |
Steve Anton | 36b29d1 | 2017-10-30 09:57:42 -0700 | [diff] [blame] | 152 | EXPECT_NE(0, memcmp(fake_rtp_packet_transport->last_sent_packet()->data(), |
| 153 | original_rtp_data, rtp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 154 | } |
| 155 | |
| 156 | // Do the same thing in the opposite direction; |
| 157 | ASSERT_TRUE(srtp_transport2_->SendRtpPacket(&rtp_packet2to1, options, |
| 158 | cricket::PF_SRTP_BYPASS)); |
| 159 | if (srtp_transport2_->IsExternalAuthActive()) { |
| 160 | TestRtpAuthParams(srtp_transport2_.get(), cipher_suite_name); |
| 161 | } else { |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 162 | ASSERT_TRUE(rtp_sink1_.last_recv_rtp_packet().data()); |
| 163 | EXPECT_EQ(0, memcmp(rtp_sink1_.last_recv_rtp_packet().data(), |
| 164 | original_rtp_data, rtp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 165 | auto fake_rtp_packet_transport = static_cast<rtc::FakePacketTransport*>( |
| 166 | srtp_transport2_->rtp_packet_transport()); |
Steve Anton | 36b29d1 | 2017-10-30 09:57:42 -0700 | [diff] [blame] | 167 | EXPECT_NE(0, memcmp(fake_rtp_packet_transport->last_sent_packet()->data(), |
| 168 | original_rtp_data, rtp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 169 | } |
| 170 | } |
| 171 | |
| 172 | void TestSendRecvRtcpPacket(const std::string& cipher_suite_name) { |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 173 | size_t rtcp_len = sizeof(::kRtcpReport); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 174 | size_t packet_size = |
| 175 | rtcp_len + 4 + rtc::rtcp_auth_tag_len(cipher_suite_name); |
| 176 | rtc::Buffer rtcp_packet_buffer(packet_size); |
| 177 | char* rtcp_packet_data = rtcp_packet_buffer.data<char>(); |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 178 | memcpy(rtcp_packet_data, ::kRtcpReport, rtcp_len); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 179 | |
| 180 | rtc::CopyOnWriteBuffer rtcp_packet1to2(rtcp_packet_data, rtcp_len, |
| 181 | packet_size); |
| 182 | rtc::CopyOnWriteBuffer rtcp_packet2to1(rtcp_packet_data, rtcp_len, |
| 183 | packet_size); |
| 184 | |
| 185 | rtc::PacketOptions options; |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 186 | // Send a packet from `srtp_transport1_` to `srtp_transport2_` and verify |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 187 | // that the packet can be successfully received and decrypted. |
| 188 | ASSERT_TRUE(srtp_transport1_->SendRtcpPacket(&rtcp_packet1to2, options, |
| 189 | cricket::PF_SRTP_BYPASS)); |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 190 | ASSERT_TRUE(rtp_sink2_.last_recv_rtcp_packet().data()); |
| 191 | EXPECT_EQ(0, memcmp(rtp_sink2_.last_recv_rtcp_packet().data(), |
| 192 | rtcp_packet_data, rtcp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 193 | // Get the encrypted packet from underneath packet transport and verify the |
| 194 | // data is actually encrypted. |
| 195 | auto fake_rtp_packet_transport = static_cast<rtc::FakePacketTransport*>( |
| 196 | srtp_transport1_->rtp_packet_transport()); |
Steve Anton | 36b29d1 | 2017-10-30 09:57:42 -0700 | [diff] [blame] | 197 | EXPECT_NE(0, memcmp(fake_rtp_packet_transport->last_sent_packet()->data(), |
| 198 | rtcp_packet_data, rtcp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 199 | |
| 200 | // Do the same thing in the opposite direction; |
| 201 | ASSERT_TRUE(srtp_transport2_->SendRtcpPacket(&rtcp_packet2to1, options, |
| 202 | cricket::PF_SRTP_BYPASS)); |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 203 | ASSERT_TRUE(rtp_sink1_.last_recv_rtcp_packet().data()); |
| 204 | EXPECT_EQ(0, memcmp(rtp_sink1_.last_recv_rtcp_packet().data(), |
| 205 | rtcp_packet_data, rtcp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 206 | fake_rtp_packet_transport = static_cast<rtc::FakePacketTransport*>( |
| 207 | srtp_transport2_->rtp_packet_transport()); |
Steve Anton | 36b29d1 | 2017-10-30 09:57:42 -0700 | [diff] [blame] | 208 | EXPECT_NE(0, memcmp(fake_rtp_packet_transport->last_sent_packet()->data(), |
| 209 | rtcp_packet_data, rtcp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 210 | } |
| 211 | |
| 212 | void TestSendRecvPacket(bool enable_external_auth, |
| 213 | int cs, |
| 214 | const uint8_t* key1, |
| 215 | int key1_len, |
| 216 | const uint8_t* key2, |
| 217 | int key2_len, |
| 218 | const std::string& cipher_suite_name) { |
| 219 | EXPECT_EQ(key1_len, key2_len); |
| 220 | EXPECT_EQ(cipher_suite_name, rtc::SrtpCryptoSuiteToName(cs)); |
| 221 | if (enable_external_auth) { |
| 222 | srtp_transport1_->EnableExternalAuth(); |
| 223 | srtp_transport2_->EnableExternalAuth(); |
| 224 | } |
Zhi Huang | c99b6c7 | 2017-11-10 16:44:46 -0800 | [diff] [blame] | 225 | std::vector<int> extension_ids; |
| 226 | EXPECT_TRUE(srtp_transport1_->SetRtpParams( |
| 227 | cs, key1, key1_len, extension_ids, cs, key2, key2_len, extension_ids)); |
| 228 | EXPECT_TRUE(srtp_transport2_->SetRtpParams( |
| 229 | cs, key2, key2_len, extension_ids, cs, key1, key1_len, extension_ids)); |
| 230 | EXPECT_TRUE(srtp_transport1_->SetRtcpParams( |
| 231 | cs, key1, key1_len, extension_ids, cs, key2, key2_len, extension_ids)); |
| 232 | EXPECT_TRUE(srtp_transport2_->SetRtcpParams( |
| 233 | cs, key2, key2_len, extension_ids, cs, key1, key1_len, extension_ids)); |
Zhi Huang | e830e68 | 2018-03-30 10:48:35 -0700 | [diff] [blame] | 234 | EXPECT_TRUE(srtp_transport1_->IsSrtpActive()); |
| 235 | EXPECT_TRUE(srtp_transport2_->IsSrtpActive()); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 236 | if (rtc::IsGcmCryptoSuite(cs)) { |
| 237 | EXPECT_FALSE(srtp_transport1_->IsExternalAuthActive()); |
| 238 | EXPECT_FALSE(srtp_transport2_->IsExternalAuthActive()); |
| 239 | } else if (enable_external_auth) { |
| 240 | EXPECT_TRUE(srtp_transport1_->IsExternalAuthActive()); |
| 241 | EXPECT_TRUE(srtp_transport2_->IsExternalAuthActive()); |
| 242 | } |
| 243 | TestSendRecvRtpPacket(cipher_suite_name); |
| 244 | TestSendRecvRtcpPacket(cipher_suite_name); |
| 245 | } |
| 246 | |
| 247 | void TestSendRecvPacketWithEncryptedHeaderExtension( |
| 248 | const std::string& cs, |
| 249 | const std::vector<int>& encrypted_header_ids) { |
| 250 | size_t rtp_len = sizeof(kPcmuFrameWithExtensions); |
| 251 | size_t packet_size = rtp_len + rtc::rtp_auth_tag_len(cs); |
| 252 | rtc::Buffer rtp_packet_buffer(packet_size); |
| 253 | char* rtp_packet_data = rtp_packet_buffer.data<char>(); |
| 254 | memcpy(rtp_packet_data, kPcmuFrameWithExtensions, rtp_len); |
| 255 | // In order to be able to run this test function multiple times we can not |
| 256 | // use the same sequence number twice. Increase the sequence number by one. |
| 257 | rtc::SetBE16(reinterpret_cast<uint8_t*>(rtp_packet_data) + 2, |
| 258 | ++sequence_number_); |
| 259 | rtc::CopyOnWriteBuffer rtp_packet1to2(rtp_packet_data, rtp_len, |
| 260 | packet_size); |
| 261 | rtc::CopyOnWriteBuffer rtp_packet2to1(rtp_packet_data, rtp_len, |
| 262 | packet_size); |
| 263 | |
| 264 | char original_rtp_data[sizeof(kPcmuFrameWithExtensions)]; |
| 265 | memcpy(original_rtp_data, rtp_packet_data, rtp_len); |
| 266 | |
| 267 | rtc::PacketOptions options; |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 268 | // Send a packet from `srtp_transport1_` to `srtp_transport2_` and verify |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 269 | // that the packet can be successfully received and decrypted. |
| 270 | ASSERT_TRUE(srtp_transport1_->SendRtpPacket(&rtp_packet1to2, options, |
| 271 | cricket::PF_SRTP_BYPASS)); |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 272 | ASSERT_TRUE(rtp_sink2_.last_recv_rtp_packet().data()); |
| 273 | EXPECT_EQ(0, memcmp(rtp_sink2_.last_recv_rtp_packet().data(), |
| 274 | original_rtp_data, rtp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 275 | // Get the encrypted packet from underneath packet transport and verify the |
| 276 | // data and header extension are actually encrypted. |
| 277 | auto fake_rtp_packet_transport = static_cast<rtc::FakePacketTransport*>( |
| 278 | srtp_transport1_->rtp_packet_transport()); |
Steve Anton | 36b29d1 | 2017-10-30 09:57:42 -0700 | [diff] [blame] | 279 | EXPECT_NE(0, memcmp(fake_rtp_packet_transport->last_sent_packet()->data(), |
| 280 | original_rtp_data, rtp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 281 | CompareHeaderExtensions( |
| 282 | reinterpret_cast<const char*>( |
| 283 | fake_rtp_packet_transport->last_sent_packet()->data()), |
| 284 | fake_rtp_packet_transport->last_sent_packet()->size(), |
| 285 | original_rtp_data, rtp_len, encrypted_header_ids, false); |
| 286 | |
| 287 | // Do the same thing in the opposite direction; |
| 288 | ASSERT_TRUE(srtp_transport2_->SendRtpPacket(&rtp_packet2to1, options, |
| 289 | cricket::PF_SRTP_BYPASS)); |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 290 | ASSERT_TRUE(rtp_sink1_.last_recv_rtp_packet().data()); |
| 291 | EXPECT_EQ(0, memcmp(rtp_sink1_.last_recv_rtp_packet().data(), |
| 292 | original_rtp_data, rtp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 293 | fake_rtp_packet_transport = static_cast<rtc::FakePacketTransport*>( |
| 294 | srtp_transport2_->rtp_packet_transport()); |
Steve Anton | 36b29d1 | 2017-10-30 09:57:42 -0700 | [diff] [blame] | 295 | EXPECT_NE(0, memcmp(fake_rtp_packet_transport->last_sent_packet()->data(), |
| 296 | original_rtp_data, rtp_len)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 297 | CompareHeaderExtensions( |
| 298 | reinterpret_cast<const char*>( |
| 299 | fake_rtp_packet_transport->last_sent_packet()->data()), |
| 300 | fake_rtp_packet_transport->last_sent_packet()->size(), |
| 301 | original_rtp_data, rtp_len, encrypted_header_ids, false); |
| 302 | } |
| 303 | |
| 304 | void TestSendRecvEncryptedHeaderExtension(int cs, |
| 305 | const uint8_t* key1, |
| 306 | int key1_len, |
| 307 | const uint8_t* key2, |
| 308 | int key2_len, |
| 309 | const std::string& cs_name) { |
| 310 | std::vector<int> encrypted_headers; |
Zhi Huang | f2d7beb | 2017-11-20 14:35:11 -0800 | [diff] [blame] | 311 | encrypted_headers.push_back(kHeaderExtensionIDs[0]); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 312 | // Don't encrypt header ids 2 and 3. |
Zhi Huang | f2d7beb | 2017-11-20 14:35:11 -0800 | [diff] [blame] | 313 | encrypted_headers.push_back(kHeaderExtensionIDs[1]); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 314 | EXPECT_EQ(key1_len, key2_len); |
| 315 | EXPECT_EQ(cs_name, rtc::SrtpCryptoSuiteToName(cs)); |
Zhi Huang | c99b6c7 | 2017-11-10 16:44:46 -0800 | [diff] [blame] | 316 | EXPECT_TRUE(srtp_transport1_->SetRtpParams(cs, key1, key1_len, |
| 317 | encrypted_headers, cs, key2, |
| 318 | key2_len, encrypted_headers)); |
| 319 | EXPECT_TRUE(srtp_transport2_->SetRtpParams(cs, key2, key2_len, |
| 320 | encrypted_headers, cs, key1, |
| 321 | key1_len, encrypted_headers)); |
Zhi Huang | e830e68 | 2018-03-30 10:48:35 -0700 | [diff] [blame] | 322 | EXPECT_TRUE(srtp_transport1_->IsSrtpActive()); |
| 323 | EXPECT_TRUE(srtp_transport2_->IsSrtpActive()); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 324 | EXPECT_FALSE(srtp_transport1_->IsExternalAuthActive()); |
| 325 | EXPECT_FALSE(srtp_transport2_->IsExternalAuthActive()); |
| 326 | TestSendRecvPacketWithEncryptedHeaderExtension(cs_name, encrypted_headers); |
| 327 | } |
| 328 | |
| 329 | std::unique_ptr<SrtpTransport> srtp_transport1_; |
| 330 | std::unique_ptr<SrtpTransport> srtp_transport2_; |
| 331 | |
| 332 | std::unique_ptr<rtc::FakePacketTransport> rtp_packet_transport1_; |
| 333 | std::unique_ptr<rtc::FakePacketTransport> rtp_packet_transport2_; |
| 334 | |
Zhi Huang | 365381f | 2018-04-13 16:44:34 -0700 | [diff] [blame] | 335 | TransportObserver rtp_sink1_; |
| 336 | TransportObserver rtp_sink2_; |
| 337 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 338 | int sequence_number_ = 0; |
Jonas Oreland | ed99dae | 2022-03-09 09:28:10 +0100 | [diff] [blame^] | 339 | webrtc::test::ScopedKeyValueConfig field_trials_; |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 340 | }; |
| 341 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 342 | class SrtpTransportTestWithExternalAuth |
| 343 | : public SrtpTransportTest, |
Mirko Bonadei | 6a489f2 | 2019-04-09 15:11:12 +0200 | [diff] [blame] | 344 | public ::testing::WithParamInterface<bool> {}; |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 345 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 346 | TEST_P(SrtpTransportTestWithExternalAuth, |
| 347 | SendAndRecvPacket_AES_CM_128_HMAC_SHA1_80) { |
| 348 | bool enable_external_auth = GetParam(); |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 349 | TestSendRecvPacket(enable_external_auth, rtc::kSrtpAes128CmSha1_80, kTestKey1, |
| 350 | kTestKeyLen, kTestKey2, kTestKeyLen, |
| 351 | rtc::kCsAesCm128HmacSha1_80); |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 352 | } |
| 353 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 354 | TEST_F(SrtpTransportTest, |
| 355 | SendAndRecvPacketWithHeaderExtension_AES_CM_128_HMAC_SHA1_80) { |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 356 | TestSendRecvEncryptedHeaderExtension(rtc::kSrtpAes128CmSha1_80, kTestKey1, |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 357 | kTestKeyLen, kTestKey2, kTestKeyLen, |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 358 | rtc::kCsAesCm128HmacSha1_80); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 359 | } |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 360 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 361 | TEST_P(SrtpTransportTestWithExternalAuth, |
| 362 | SendAndRecvPacket_AES_CM_128_HMAC_SHA1_32) { |
| 363 | bool enable_external_auth = GetParam(); |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 364 | TestSendRecvPacket(enable_external_auth, rtc::kSrtpAes128CmSha1_32, kTestKey1, |
| 365 | kTestKeyLen, kTestKey2, kTestKeyLen, |
| 366 | rtc::kCsAesCm128HmacSha1_32); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 367 | } |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 368 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 369 | TEST_F(SrtpTransportTest, |
| 370 | SendAndRecvPacketWithHeaderExtension_AES_CM_128_HMAC_SHA1_32) { |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 371 | TestSendRecvEncryptedHeaderExtension(rtc::kSrtpAes128CmSha1_32, kTestKey1, |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 372 | kTestKeyLen, kTestKey2, kTestKeyLen, |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 373 | rtc::kCsAesCm128HmacSha1_32); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 374 | } |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 375 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 376 | TEST_P(SrtpTransportTestWithExternalAuth, |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 377 | SendAndRecvPacket_kSrtpAeadAes128Gcm) { |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 378 | bool enable_external_auth = GetParam(); |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 379 | TestSendRecvPacket(enable_external_auth, rtc::kSrtpAeadAes128Gcm, |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 380 | kTestKeyGcm128_1, kTestKeyGcm128Len, kTestKeyGcm128_2, |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 381 | kTestKeyGcm128Len, rtc::kCsAeadAes128Gcm); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 382 | } |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 383 | |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 384 | TEST_F(SrtpTransportTest, |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 385 | SendAndRecvPacketWithHeaderExtension_kSrtpAeadAes128Gcm) { |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 386 | TestSendRecvEncryptedHeaderExtension( |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 387 | rtc::kSrtpAeadAes128Gcm, kTestKeyGcm128_1, kTestKeyGcm128Len, |
| 388 | kTestKeyGcm128_2, kTestKeyGcm128Len, rtc::kCsAeadAes128Gcm); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 389 | } |
| 390 | |
| 391 | TEST_P(SrtpTransportTestWithExternalAuth, |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 392 | SendAndRecvPacket_kSrtpAeadAes256Gcm) { |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 393 | bool enable_external_auth = GetParam(); |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 394 | TestSendRecvPacket(enable_external_auth, rtc::kSrtpAeadAes256Gcm, |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 395 | kTestKeyGcm256_1, kTestKeyGcm256Len, kTestKeyGcm256_2, |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 396 | kTestKeyGcm256Len, rtc::kCsAeadAes256Gcm); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 397 | } |
| 398 | |
| 399 | TEST_F(SrtpTransportTest, |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 400 | SendAndRecvPacketWithHeaderExtension_kSrtpAeadAes256Gcm) { |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 401 | TestSendRecvEncryptedHeaderExtension( |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 402 | rtc::kSrtpAeadAes256Gcm, kTestKeyGcm256_1, kTestKeyGcm256Len, |
| 403 | kTestKeyGcm256_2, kTestKeyGcm256Len, rtc::kCsAeadAes256Gcm); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 404 | } |
| 405 | |
| 406 | // Run all tests both with and without external auth enabled. |
Mirko Bonadei | c84f661 | 2019-01-31 12:20:57 +0100 | [diff] [blame] | 407 | INSTANTIATE_TEST_SUITE_P(ExternalAuth, |
| 408 | SrtpTransportTestWithExternalAuth, |
| 409 | ::testing::Values(true, false)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 410 | |
| 411 | // Test directly setting the params with bogus keys. |
| 412 | TEST_F(SrtpTransportTest, TestSetParamsKeyTooShort) { |
Zhi Huang | c99b6c7 | 2017-11-10 16:44:46 -0800 | [diff] [blame] | 413 | std::vector<int> extension_ids; |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 414 | EXPECT_FALSE(srtp_transport1_->SetRtpParams( |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 415 | rtc::kSrtpAes128CmSha1_80, kTestKey1, kTestKeyLen - 1, extension_ids, |
| 416 | rtc::kSrtpAes128CmSha1_80, kTestKey1, kTestKeyLen - 1, extension_ids)); |
Zhi Huang | cf990f5 | 2017-09-22 12:12:30 -0700 | [diff] [blame] | 417 | EXPECT_FALSE(srtp_transport1_->SetRtcpParams( |
Mirko Bonadei | 7750d80 | 2021-07-26 17:27:42 +0200 | [diff] [blame] | 418 | rtc::kSrtpAes128CmSha1_80, kTestKey1, kTestKeyLen - 1, extension_ids, |
| 419 | rtc::kSrtpAes128CmSha1_80, kTestKey1, kTestKeyLen - 1, extension_ids)); |
zstein | 398c3fd | 2017-07-19 13:38:02 -0700 | [diff] [blame] | 420 | } |
| 421 | |
| 422 | } // namespace webrtc |