rtspsrc: client-managed MIKEY KeyMgmt

Some servers (e.g. Axis cameras) expect the client to propose the encryption
key(s) to be used for SRTP / SRTCP. This is required to allow re-keying so
as to evade cryptanalysis. Note that the behaviour is not specified by the
RFCs. By setting the 'client-managed-mikey-mode' property to 'true', rtspsrc
acts as follows:

* For a secured profile (RTP/SAVP or RTP/SAVPF), any media in the SDP
  returned by the server for which a MIKEY key management applies is
  elligible for client managed mode. The MIKEY from the server is then
  ignored.
* rtspsrc sends a SETUP with a MIKEY payload proposed by the user. The
  payload is formed by calling the 'request-rtp-key' signal for each
  elligible stream. During initialisation, 'request-rtcp-key' is also
  called as usual. The keys returned by both signals should be the same
  for a single stream, but the mechanism allows a different approach.
* The user can start re-keying of a stream by calling SET_PARAMETER.
  The convenience signal 'set-mikey-parameter' can be used to build a
  'KeyMgmt' parameter with a MIKEY payload.
* After the server accepts the new parameter, the user can call
  'remove-key' and prepare for the new key(s) to be served by signals
  'request-rtp-key' & 'request-rtcp-key'.
* The signals 'soft-limit' & 'hard-limit' are called when a key
  reaches the limits of its utilisation.

This commit adds support for:

* client-managed MIKEY mode to srtpsrc.
* Master Key Index (MKI) parsing and encoding to GstMIKEYMessage.
* re-keying using the signals 'set-mikey-parameter' & 'remove-key' and
  then by serving the new key via 'request-rtp-key' & 'request-rtcp-key'.
* 'soft-limit' & 'hard-limit' signals, similar to those provided by srtpdec.

See also:

* https://www.rfc-editor.org/rfc/rfc3830
* https://www.rfc-editor.org/rfc/rfc4567

Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/7587>
This commit is contained in:
François Laignel 2024-10-23 20:50:31 +02:00 committed by GStreamer Marge Bot
parent efaaa6d888
commit 0f7be28eb1
6 changed files with 1487 additions and 86 deletions

View file

@ -2258,7 +2258,7 @@ gst_mikey_message_new_from_caps (GstCaps * caps)
GstStructure *s;
GstMapInfo info;
GstBuffer *srtpkey;
const GValue *val;
const GValue *val, *mki_val;
const gchar *cipher, *auth;
const gchar *srtpcipher, *srtpauth, *srtcpcipher, *srtcpauth;
@ -2280,12 +2280,8 @@ gst_mikey_message_new_from_caps (GstCaps * caps)
srtcpcipher = gst_structure_get_string (s, "srtcp-cipher");
srtcpauth = gst_structure_get_string (s, "srtcp-auth");
/* we need srtp cipher/auth or srtcp cipher/auth */
if ((srtpcipher == NULL || srtpauth == NULL)
&& (srtcpcipher == NULL || srtcpauth == NULL)) {
GST_WARNING ("could not find the right SRTP parameters in caps");
return NULL;
}
/* Some mikey messages are intended to only set the SPI/MKI,
* in which case cipher or auth can be absent. */
/* prefer srtp cipher over srtcp */
cipher = srtpcipher;
@ -2298,10 +2294,12 @@ gst_mikey_message_new_from_caps (GstCaps * caps)
auth = srtcpauth;
/* get cipher and auth values */
if (!enc_alg_from_cipher_name (cipher, &enc_alg) ||
!auth_alg_from_cipher_name (cipher, &auth_alg) ||
!enc_key_length_from_cipher_name (cipher, &enc_key_length) ||
!auth_key_length_from_auth_cipher_name (auth, cipher, &auth_key_length)) {
if (cipher && (!enc_alg_from_cipher_name (cipher, &enc_alg) ||
!auth_alg_from_cipher_name (cipher, &auth_alg) ||
!enc_key_length_from_cipher_name (cipher, &enc_key_length) ||
(auth
&& !auth_key_length_from_auth_cipher_name (auth, cipher,
&auth_key_length)))) {
return NULL;
}
@ -2310,37 +2308,47 @@ gst_mikey_message_new_from_caps (GstCaps * caps)
gst_mikey_message_set_info (msg, GST_MIKEY_VERSION, GST_MIKEY_TYPE_PSK_INIT,
FALSE, GST_MIKEY_PRF_MIKEY_1, g_random_int (), GST_MIKEY_MAP_TYPE_SRTP);
/* timestamp is now */
gst_mikey_message_add_t_now_ntp_utc (msg);
/* add some random data */
gst_mikey_message_add_rand_len (msg, 16);
if (cipher || auth) {
/* timestamp is now */
gst_mikey_message_add_t_now_ntp_utc (msg);
/* add some random data */
gst_mikey_message_add_rand_len (msg, 16);
/* the policy '0' is SRTP */
payload = gst_mikey_payload_new (GST_MIKEY_PT_SP);
gst_mikey_payload_sp_set (payload, 0, GST_MIKEY_SEC_PROTO_SRTP);
/* the policy '0' is SRTP */
payload = gst_mikey_payload_new (GST_MIKEY_PT_SP);
gst_mikey_payload_sp_set (payload, 0, GST_MIKEY_SEC_PROTO_SRTP);
/* AES-CM or AES-GCM is supported */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_ENC_ALG, 1,
&enc_alg);
/* encryption key length */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_ENC_KEY_LEN, 1,
&enc_key_length);
/* HMAC-SHA1 or NULL in case of GCM */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_AUTH_ALG, 1,
&auth_alg);
/* authentication key length */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_AUTH_KEY_LEN, 1,
&auth_key_length);
/* we enable encryption on RTP and RTCP */
byte = 1;
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_SRTP_ENC, 1,
&byte);
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_SRTCP_ENC, 1,
&byte);
/* we enable authentication on RTP and RTCP */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_SRTP_AUTH, 1,
&byte);
gst_mikey_message_add_payload (msg, payload);
if (cipher) {
/* AES-CM or AES-GCM is supported */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_ENC_ALG, 1,
&enc_alg);
/* encryption key length */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_ENC_KEY_LEN, 1,
&enc_key_length);
}
if (auth) {
/* HMAC-SHA1 or NULL in case of GCM */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_AUTH_ALG, 1,
&auth_alg);
/* authentication key length */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_AUTH_KEY_LEN,
1, &auth_key_length);
}
/* we enable encryption on RTP and RTCP */
byte = 1;
if (cipher) {
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_SRTP_ENC, 1,
&byte);
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_SRTCP_ENC, 1,
&byte);
}
if (auth) {
/* we enable authentication on RTP and RTCP */
gst_mikey_payload_sp_add_param (payload, GST_MIKEY_SP_SRTP_SRTP_AUTH, 1,
&byte);
}
gst_mikey_message_add_payload (msg, payload);
}
/* make unencrypted KEMAC */
payload = gst_mikey_payload_new (GST_MIKEY_PT_KEMAC);
@ -2351,6 +2359,22 @@ gst_mikey_message_new_from_caps (GstCaps * caps)
gst_mikey_payload_key_data_set_key (pkd, GST_MIKEY_KD_TEK, info.size,
info.data);
gst_buffer_unmap (srtpkey, &info);
/* add optional SPI/MKI
* See: https://www.rfc-editor.org/rfc/rfc3830.html#section-6.14
*/
mki_val = gst_structure_get_value (s, "mki");
if (mki_val) {
GstBuffer *mki = gst_value_get_buffer (mki_val);
if (mki && GST_IS_BUFFER (mki) && gst_buffer_get_size (mki) > 0) {
gst_buffer_map (mki, &info, GST_MAP_READ);
gst_mikey_payload_key_data_set_spi (pkd, info.size, info.data);
gst_buffer_unmap (mki, &info);
} else {
GST_WARNING
("Failed to get 'mki' from caps as a buffer or the buffer is empty");
}
}
gst_mikey_payload_kemac_add_sub (payload, pkd);
gst_mikey_message_add_payload (msg, payload);
@ -2511,6 +2535,16 @@ gst_mikey_message_to_caps (const GstMIKEYMessage * msg, GstCaps * caps)
gst_buffer_unref (buf);
gst_caps_set_simple (caps, "roc", G_TYPE_UINT, srtp->roc, NULL);
/* Get optional SPI/MKI
* See: https://www.rfc-editor.org/rfc/rfc3830.html#section-6.13
*/
if (pkd->kv_type == GST_MIKEY_KV_SPI && pkd->kv_len[0] > 0) {
GstBuffer *mki =
gst_buffer_new_memdup (pkd->kv_data[0], (gsize) pkd->kv_len[0]);
gst_caps_set_simple (caps, "mki", GST_TYPE_BUFFER, mki, NULL);
gst_buffer_unref (mki);
}
}
gst_caps_set_simple (caps,

View file

@ -21760,6 +21760,18 @@
"type": "GstRTSPSrcBufferMode",
"writable": true
},
"client-managed-mikey": {
"blurb": "Enable client-managed MIKEY mode",
"conditionally-available": false,
"construct": false,
"construct-only": false,
"controllable": false,
"default": "false",
"mutable": "null",
"readable": true,
"type": "gboolean",
"writable": true
},
"connection-speed": {
"blurb": "Network connection speed in kbps (0 = unknown)",
"conditionally-available": false,
@ -22415,6 +22427,16 @@
],
"return-type": "void"
},
"hard-limit": {
"args": [
{
"name": "arg0",
"type": "guint"
}
],
"return-type": "void",
"when": "last"
},
"new-manager": {
"args": [
{
@ -22464,6 +22486,17 @@
"return-type": "GstFlowReturn",
"when": "last"
},
"remove-key": {
"action": true,
"args": [
{
"name": "arg0",
"type": "guint"
}
],
"return-type": "gboolean",
"when": "last"
},
"request-rtcp-key": {
"args": [
{
@ -22474,6 +22507,15 @@
"return-type": "GstCaps",
"when": "last"
},
"request-rtp-key": {
"args": [
{
"name": "arg0",
"type": "guint"
}
],
"return-type": "GstCaps"
},
"select-stream": {
"args": [
{
@ -22488,6 +22530,25 @@
"return-type": "gboolean",
"when": "last"
},
"set-mikey-parameter": {
"action": true,
"args": [
{
"name": "arg0",
"type": "guint"
},
{
"name": "arg1",
"type": "GstCaps"
},
{
"name": "arg2",
"type": "GstPromise"
}
],
"return-type": "gboolean",
"when": "last"
},
"set-parameter": {
"action": true,
"args": [
@ -22510,6 +22571,16 @@
],
"return-type": "gboolean",
"when": "last"
},
"soft-limit": {
"args": [
{
"name": "arg0",
"type": "guint"
}
],
"return-type": "void",
"when": "last"
}
}
}

View file

@ -93,6 +93,30 @@
* rtspsrc does not know the difference and will send a PAUSE when you wanted
* a TEARDOWN. The workaround is to hook into the `before-send` signal and
* return FALSE in this case.
*
* Some servers (e.g. Axis cameras) expect the client to propose the encryption
* key(s) to be used for SRTP / SRTCP. This is required to allow re-keying so
* as to evade cryptanalysis. Note that the behaviour is not specified by the
* RFCs. By setting the 'client-managed-mikey-mode' property to 'true', rtspsrc
* acts as follows:
*
* * For a secured profile (RTP/SAVP or RTP/SAVPF), any media in the SDP
* returned by the server for which MIKEY key management applies is
* elligible for client managed mode. The MIKEY from the server is then
* ignored.
* * rtspsrc sends a SETUP with a MIKEY payload proposed by the user. The
* payload is formed by calling the 'request-rtp-key' signal for each
* elligible stream. During initialisation, 'request-rtcp-key' is also
* called as usual. The keys returned by both signals should be the same
* for a single stream, but the mechanism allows a different approach.
* * The user can start re-keying of a stream by calling SET_PARAMETER.
* The convenience signal 'set-mikey-parameter' can be used to build a
* 'KeyMgmt' parameter with a MIKEY payload.
* * After the server accepts the new parameter, the user can call
* 'remove-key' and prepare for the new key(s) to be served by signals
* 'request-rtp-key' & 'request-rtcp-key'.
* * The signals 'soft-limit' & 'hard-limit' are called when a key
* reaches the limits of its utilisation.
*/
#ifdef HAVE_CONFIG_H
@ -147,6 +171,9 @@ enum
SIGNAL_SELECT_STREAM,
SIGNAL_NEW_MANAGER,
SIGNAL_REQUEST_RTCP_KEY,
SIGNAL_REQUEST_RTP_KEY,
SIGNAL_SOFT_LIMIT,
SIGNAL_HARD_LIMIT,
SIGNAL_ACCEPT_CERTIFICATE,
SIGNAL_BEFORE_SEND,
SIGNAL_PUSH_BACKCHANNEL_BUFFER,
@ -154,6 +181,8 @@ enum
SIGNAL_GET_PARAMETERS,
SIGNAL_SET_PARAMETER,
SIGNAL_PUSH_BACKCHANNEL_SAMPLE,
SIGNAL_SET_MIKEY_PARAMETER,
SIGNAL_REMOVE_KEY,
LAST_SIGNAL
};
@ -316,6 +345,7 @@ gst_rtsp_backchannel_get_type (void)
#define DEFAULT_IGNORE_X_SERVER_REPLY FALSE
#define DEFAULT_TCP_TIMESTAMP FALSE
#define DEFAULT_FORCE_NON_COMPLIANT_URL FALSE
#define DEFAULT_CLIENT_MANAGED_MIKEY FALSE
enum
{
@ -369,6 +399,7 @@ enum
PROP_EXTRA_HTTP_REQUEST_HEADERS,
PROP_TCP_TIMESTAMP,
PROP_FORCE_NON_COMPLIANT_URL,
PROP_CLIENT_MANAGED_MIKEY,
};
#define GST_TYPE_RTSP_NAT_METHOD (gst_rtsp_nat_method_get_type())
@ -480,6 +511,17 @@ static GstFlowReturn gst_rtspsrc_push_backchannel_sample (GstRTSPSrc * src,
static void gst_rtspsrc_reset_flows (GstRTSPSrc * src);
static GstCaps *signal_get_srtcp_params (GstRTSPSrc * src,
GstRTSPStream * stream);
static GstCaps *signal_get_srtp_params (GstRTSPSrc * src,
GstRTSPStream * stream);
static gboolean set_mikey_parameter (GstRTSPSrc * src, const guint id,
GstCaps * mikey, GstPromise * promise);
static gboolean remove_key (GstRTSPSrc * src, const guint id);
typedef struct
{
guint8 pt;
@ -1172,6 +1214,36 @@ gst_rtspsrc_class_init (GstRTSPSrcClass * klass)
DEFAULT_FORCE_NON_COMPLIANT_URL,
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
/**
* GstRTSPSrc:client-managed-mikey
*
* Some servers (e.g. Axis Cameras) advertise a `key-mgmt:mikey` attribute in
* the SDP from the reply to DESCRIBE, but expect the client to provide the
* key for both the client (SRTCP/RR) and the server (SRTP/SRTCP SR).
*
* When this mode is enabled, for each eligible media, the server crypto
* policy is discarded. The crypto policy for this media is built from the
* key returned by the signals 'request-rtp-key' & 'request-rtcp-key'.
*
* A media is eligible for this mode if:
*
* * No session level MIKEY key-mgmt are defined and the media level key-mgmt
* is MIKEY.
* * A session level MIKEY key-mgmt is defined and no media level key-mgmts
* are defined.
* * A session level MIKEY key-mgmt is defined and the media level key-mgmt is
* also MIKEY.
*
* Since: 1.26
*/
g_object_class_install_property (gobject_class,
PROP_CLIENT_MANAGED_MIKEY,
g_param_spec_boolean ("client-managed-mikey",
"Client-managed MIKEY",
"Enable client-managed MIKEY mode",
DEFAULT_CLIENT_MANAGED_MIKEY,
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
/**
* GstRTSPSrc::handle-request:
* @rtspsrc: a #GstRTSPSrc
@ -1263,6 +1335,58 @@ gst_rtspsrc_class_init (GstRTSPSrcClass * klass)
g_signal_new ("request-rtcp-key", G_TYPE_FROM_CLASS (klass),
0, 0, NULL, NULL, NULL, GST_TYPE_CAPS, 1, G_TYPE_UINT);
/**
* GstRTSPSrc::request-rtp-key:
* @rtspsrc: a #GstRTSPSrc
* @num: the stream number
*
* Signal emitted to get the crypto parameters relevant to the RTP
* stream. User should provide the key and the RTP encryption ciphers
* and authentication, and return them wrapped in a GstCaps.
*
* Applications should connect to this signal when 'client-managed-mikey'
* mode is enabled. The crypto parameters are usually the same as those
* use by the 'request-rtcp-key' signal.
*
* Since: 1.26
*/
gst_rtspsrc_signals[SIGNAL_REQUEST_RTP_KEY] =
g_signal_new ("request-rtp-key", G_TYPE_FROM_CLASS (klass),
0, 0, NULL, NULL, NULL, GST_TYPE_CAPS, 1, G_TYPE_UINT);
/**
* GstRTSPSrc::soft-limit:
* @rtspsrc: a #GstRTSPSrc
* @id: The id of the stream
*
* When the 'client-managed-mikey' mode is enabled, this signal
* is emitted when the stream with @id has reached the
* soft limit of utilisation of it's master encryption key.
* User should start a re-keying procedure.
*
* Since: 1.26
*/
gst_rtspsrc_signals[SIGNAL_SOFT_LIMIT] =
g_signal_new ("soft-limit", G_TYPE_FROM_CLASS (klass),
G_SIGNAL_RUN_LAST, 0, NULL, NULL, NULL, G_TYPE_NONE, 1, G_TYPE_UINT);
/**
* GstRTSPSrc::hard-limit:
* @rtspsrc: a #GstRTSPSrc
* @id: The id of the stream
*
* When the 'client-managed-mikey' mode is enabled, this signal
* is emitted when the stream with @id has reached the
* hard limit of utilisation of it's master encryption key.
* User should start a re-keying procedure. Failure to do so,
* will lead to buffers of this stream being dropped.
*
* Since: 1.26
*/
gst_rtspsrc_signals[SIGNAL_HARD_LIMIT] =
g_signal_new ("hard-limit", G_TYPE_FROM_CLASS (klass),
G_SIGNAL_RUN_LAST, 0, NULL, NULL, NULL, G_TYPE_NONE, 1, G_TYPE_UINT);
/**
* GstRTSPSrc::accept-certificate:
* @rtspsrc: a #GstRTSPSrc
@ -1384,6 +1508,12 @@ gst_rtspsrc_class_init (GstRTSPSrcClass * klass)
*
* Handle the SET_PARAMETER signal.
*
* The #GstPromise reply consists in the following fields:
*
* * 'rtsp-result': set to 0 if the HTTP request could be processed.
* * 'rtsp-code': the HTTP status code returned by the server.
* * 'rtsp-reason': a human-readable version of the HTTP status code.
*
* Returns: %TRUE when the command could be issued, %FALSE otherwise
*
*/
@ -1393,6 +1523,55 @@ gst_rtspsrc_class_init (GstRTSPSrcClass * klass)
set_parameter), NULL, NULL, NULL, G_TYPE_BOOLEAN, 4, G_TYPE_STRING,
G_TYPE_STRING, G_TYPE_STRING, GST_TYPE_PROMISE);
/**
* GstRTSPSrc::set-mikey-parameter:
* @rtspsrc: a #GstRTSPSrc
* @parameter: the id of the stream
* @parameter: the caps for the MIKEY payload
* @parameter: a pointer to #GstPromise
*
* Sends a SET_PARAMETER to the server with a MIKEY payload.
*
* This will call SET_PARAMETER with parameter 'KeyMgmt' and a MIKEY
* payload formed from the provided stream's ssrc and MIKEY caps.
*
* The #GstPromise reply consists in the following fields:
*
* * 'rtsp-result': set to 0 if the HTTP request could be processed.
* * 'rtsp-code': the HTTP status code returned by the server.
* * 'rtsp-reason': a human-readable version of the HTTP status code.
*
* Returns: %TRUE when the command could be issued, %FALSE otherwise
*
* Since: 1.26
*/
gst_rtspsrc_signals[SIGNAL_SET_MIKEY_PARAMETER] =
g_signal_new ("set-mikey-parameter", G_TYPE_FROM_CLASS (klass),
G_SIGNAL_RUN_LAST | G_SIGNAL_ACTION, G_STRUCT_OFFSET (GstRTSPSrcClass,
set_mikey_parameter), NULL, NULL, NULL, G_TYPE_BOOLEAN, 3,
G_TYPE_UINT, GST_TYPE_CAPS, GST_TYPE_PROMISE);
/**
* GstRTSPSrc::remove-key:
* @rtspsrc: a #GstRTSPSrc
* @parameter: the id of the stream for which to remove the key.
*
* Removes the key for a specific stream.
*
* When the 'client-managed-mikey' mode is enabled, this can be used
* after informing the server of the new crypto params (see signal
* 'set-mikey-parameter') to remove previous keys and force srtpdec
* to request new keys.
*
* Returns: %TRUE when the command could be issued, %FALSE otherwise
*
* Since: 1.26
*/
gst_rtspsrc_signals[SIGNAL_REMOVE_KEY] =
g_signal_new ("remove-key", G_TYPE_FROM_CLASS (klass),
G_SIGNAL_RUN_LAST | G_SIGNAL_ACTION, G_STRUCT_OFFSET (GstRTSPSrcClass,
remove_key), NULL, NULL, NULL, G_TYPE_BOOLEAN, 1, G_TYPE_UINT);
gstelement_class->send_event = gst_rtspsrc_send_event;
gstelement_class->provide_clock = gst_rtspsrc_provide_clock;
gstelement_class->change_state = gst_rtspsrc_change_state;
@ -1413,6 +1592,8 @@ gst_rtspsrc_class_init (GstRTSPSrcClass * klass)
klass->get_parameter = GST_DEBUG_FUNCPTR (get_parameter);
klass->get_parameters = GST_DEBUG_FUNCPTR (get_parameters);
klass->set_parameter = GST_DEBUG_FUNCPTR (set_parameter);
klass->set_mikey_parameter = GST_DEBUG_FUNCPTR (set_mikey_parameter);
klass->remove_key = GST_DEBUG_FUNCPTR (remove_key);
gst_rtsp_ext_list_init ();
@ -1971,6 +2152,9 @@ gst_rtspsrc_set_property (GObject * object, guint prop_id, const GValue * value,
case PROP_FORCE_NON_COMPLIANT_URL:
rtspsrc->force_non_compliant_url = g_value_get_boolean (value);
break;
case PROP_CLIENT_MANAGED_MIKEY:
rtspsrc->client_managed_mikey = g_value_get_boolean (value);
break;
default:
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
break;
@ -2153,6 +2337,9 @@ gst_rtspsrc_get_property (GObject * object, guint prop_id, GValue * value,
case PROP_FORCE_NON_COMPLIANT_URL:
g_value_set_boolean (value, rtspsrc->force_non_compliant_url);
break;
case PROP_CLIENT_MANAGED_MIKEY:
g_value_set_boolean (value, rtspsrc->client_managed_mikey);
break;
default:
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
break;
@ -3753,6 +3940,25 @@ stream_get_caps_for_pt (GstRTSPStream * stream, guint pt)
return NULL;
}
/* @caps: (transfer-full) */
static void
stream_set_caps_for_pt (GstRTSPStream * stream, guint pt, GstCaps * caps)
{
guint i, len;
len = stream->ptmap->len;
for (i = 0; i < len; i++) {
PtMapItem *item = &g_array_index (stream->ptmap, PtMapItem, i);
if (item->pt == pt) {
if (item->caps)
gst_caps_unref (item->caps);
item->caps = caps;
return;
}
}
}
static GstCaps *
request_pt_map (GstElement * manager, guint session, guint pt, GstRTSPSrc * src)
{
@ -3941,17 +4147,87 @@ set_manager_buffer_mode (GstRTSPSrc * src)
}
}
static void
update_srtcp_params (GstRTSPStream * stream)
{
GstStructure *s = gst_caps_get_structure (stream->srtcpparams, 0);
if (s) {
GstBuffer *buf;
const gchar *str;
GType ciphertype, authtype;
GValue rtcp_cipher = G_VALUE_INIT, rtcp_auth = G_VALUE_INIT;
ciphertype = g_type_from_name ("GstSrtpCipherType");
authtype = g_type_from_name ("GstSrtpAuthType");
g_value_init (&rtcp_cipher, ciphertype);
g_value_init (&rtcp_auth, authtype);
str = gst_structure_get_string (s, "srtcp-cipher");
gst_value_deserialize (&rtcp_cipher, str);
str = gst_structure_get_string (s, "srtcp-auth");
gst_value_deserialize (&rtcp_auth, str);
gst_structure_get (s, "srtp-key", GST_TYPE_BUFFER, &buf, NULL);
g_object_set_property (G_OBJECT (stream->srtpenc), "rtp-cipher",
&rtcp_cipher);
g_object_set_property (G_OBJECT (stream->srtpenc), "rtp-auth", &rtcp_auth);
g_object_set_property (G_OBJECT (stream->srtpenc), "rtcp-cipher",
&rtcp_cipher);
g_object_set_property (G_OBJECT (stream->srtpenc), "rtcp-auth", &rtcp_auth);
g_object_set (stream->srtpenc, "key", buf, NULL);
g_value_unset (&rtcp_cipher);
g_value_unset (&rtcp_auth);
gst_buffer_unref (buf);
}
}
static GstCaps *
request_key (GstElement * srtpdec, guint ssrc, GstRTSPStream * stream)
{
guint i;
GstCaps *caps;
GstMIKEYMessage *msg = stream->mikey;
GstCaps *key_caps;
GstMIKEYMessage *msg = NULL;
GstRTSPSrc *rtspsrc = GST_RTSPSRC (stream->parent);
GST_DEBUG ("request key SSRC %u", ssrc);
GST_DEBUG_OBJECT (rtspsrc, "request key stream with id %u SSRC %u",
stream->id, ssrc);
caps = gst_caps_ref (stream_get_caps_for_pt (stream, stream->default_pt));
caps = gst_caps_make_writable (caps);
if (stream->mikey) {
key_caps =
gst_caps_ref (stream_get_caps_for_pt (stream, stream->default_pt));
} else if (rtspsrc->client_managed_mikey) {
key_caps = signal_get_srtp_params (rtspsrc, stream);
if (key_caps == NULL) {
GST_ERROR_OBJECT (rtspsrc, "no key caps returned for stream with id %u",
stream->id);
return NULL;
}
stream->mikey = gst_mikey_message_new_from_caps (key_caps);
if (stream->mikey == NULL) {
GST_ERROR_OBJECT (rtspsrc, "failed to create MIKEY for stream with id %u",
stream->id);
gst_caps_unref (key_caps);
return NULL;
}
stream_set_caps_for_pt (stream, stream->default_pt,
gst_caps_ref (key_caps));
/* also renew RTCP crypto params in case we are re-keying */
if (stream->srtcpparams)
gst_caps_unref (stream->srtcpparams);
stream->srtcpparams = signal_get_srtcp_params (rtspsrc, stream);
update_srtcp_params (stream);
} else {
GST_ERROR_OBJECT (rtspsrc, "No MIKEYs for stream with id %u", stream->id);
return NULL;
}
key_caps = gst_caps_make_writable (key_caps);
/* parse crypto sessions and look for the SSRC rollover counter */
msg = stream->mikey;
@ -3959,12 +4235,44 @@ request_key (GstElement * srtpdec, guint ssrc, GstRTSPStream * stream)
const GstMIKEYMapSRTP *map = gst_mikey_message_get_cs_srtp (msg, i);
if (ssrc == map->ssrc) {
gst_caps_set_simple (caps, "roc", G_TYPE_UINT, map->roc, NULL);
gst_caps_set_simple (key_caps, "roc", G_TYPE_UINT, map->roc, NULL);
break;
}
}
return caps;
return key_caps;
}
static GstCaps *
on_soft_limit (GstElement * srtpdec, guint ssrc, gpointer user_data)
{
GstRTSPStream *stream = (GstRTSPStream *) user_data;
GstRTSPSrc *rtspsrc = GST_RTSPSRC_CAST (stream->parent);
GST_DEBUG_OBJECT (rtspsrc,
"Emitting 'soft-limit' for stream with id %u SSRC %u", stream->id, ssrc);
g_signal_emit (rtspsrc, gst_rtspsrc_signals[SIGNAL_SOFT_LIMIT], 0,
stream->id);
/* don't return CAPS, user needs to start a re-keying procedure */
return NULL;
}
static GstCaps *
on_hard_limit (GstElement * srtpdec, guint ssrc, gpointer user_data)
{
GstRTSPStream *stream = (GstRTSPStream *) user_data;
GstRTSPSrc *rtspsrc = GST_RTSPSRC_CAST (stream->parent);
GST_DEBUG_OBJECT (rtspsrc,
"Emitting 'hard-limit' for stream with id %u SSRC %u", stream->id, ssrc);
g_signal_emit (rtspsrc, gst_rtspsrc_signals[SIGNAL_HARD_LIMIT], 0,
stream->id);
/* don't return CAPS, user needs to start a re-keying procedure */
return NULL;
}
static GstElement *
@ -3980,6 +4288,7 @@ request_rtp_decoder (GstElement * rtpbin, guint session, GstRTSPStream * stream)
if (stream->srtpdec == NULL) {
gchar *name;
GstRTSPSrc *rtspsrc;
name = g_strdup_printf ("srtpdec_%u", session);
stream->srtpdec = gst_element_factory_make ("srtpdec", name);
@ -3992,6 +4301,15 @@ request_rtp_decoder (GstElement * rtpbin, guint session, GstRTSPStream * stream)
}
g_signal_connect (stream->srtpdec, "request-key",
(GCallback) request_key, stream);
rtspsrc = GST_RTSPSRC_CAST (stream->parent);
if (rtspsrc->client_managed_mikey) {
g_signal_connect (stream->srtpdec, "soft-limit",
(GCallback) on_soft_limit, stream);
g_signal_connect (stream->srtpdec, "hard-limit",
(GCallback) on_hard_limit, stream);
}
}
return gst_object_ref (stream->srtpdec);
}
@ -4012,8 +4330,6 @@ request_rtcp_encoder (GstElement * rtpbin, guint session,
return NULL;
if (stream->srtpenc == NULL) {
GstStructure *s;
name = g_strdup_printf ("srtpenc_%u", session);
stream->srtpenc = gst_element_factory_make ("srtpenc", name);
g_free (name);
@ -4025,38 +4341,7 @@ request_rtcp_encoder (GstElement * rtpbin, guint session,
}
/* get RTCP crypto parameters from caps */
s = gst_caps_get_structure (stream->srtcpparams, 0);
if (s) {
GstBuffer *buf;
const gchar *str;
GType ciphertype, authtype;
GValue rtcp_cipher = G_VALUE_INIT, rtcp_auth = G_VALUE_INIT;
ciphertype = g_type_from_name ("GstSrtpCipherType");
authtype = g_type_from_name ("GstSrtpAuthType");
g_value_init (&rtcp_cipher, ciphertype);
g_value_init (&rtcp_auth, authtype);
str = gst_structure_get_string (s, "srtcp-cipher");
gst_value_deserialize (&rtcp_cipher, str);
str = gst_structure_get_string (s, "srtcp-auth");
gst_value_deserialize (&rtcp_auth, str);
gst_structure_get (s, "srtp-key", GST_TYPE_BUFFER, &buf, NULL);
g_object_set_property (G_OBJECT (stream->srtpenc), "rtp-cipher",
&rtcp_cipher);
g_object_set_property (G_OBJECT (stream->srtpenc), "rtp-auth",
&rtcp_auth);
g_object_set_property (G_OBJECT (stream->srtpenc), "rtcp-cipher",
&rtcp_cipher);
g_object_set_property (G_OBJECT (stream->srtpenc), "rtcp-auth",
&rtcp_auth);
g_object_set (stream->srtpenc, "key", buf, NULL);
g_value_unset (&rtcp_cipher);
g_value_unset (&rtcp_auth);
gst_buffer_unref (buf);
}
update_srtcp_params (stream);
}
name = g_strdup_printf ("rtcp_sink_%d", session);
pad = gst_element_request_pad_simple (stream->srtpenc, name);
@ -7407,6 +7692,20 @@ signal_get_srtcp_params (GstRTSPSrc * src, GstRTSPStream * stream)
g_signal_emit (src, gst_rtspsrc_signals[SIGNAL_REQUEST_RTCP_KEY], 0,
stream->id, &caps);
if (caps != NULL)
GST_DEBUG_OBJECT (src, "SRTCP parameters received");
return caps;
}
static GstCaps *
signal_get_srtp_params (GstRTSPSrc * src, GstRTSPStream * stream)
{
GstCaps *caps = NULL;
g_signal_emit (src, gst_rtspsrc_signals[SIGNAL_REQUEST_RTP_KEY], 0,
stream->id, &caps);
if (caps != NULL)
GST_DEBUG_OBJECT (src, "SRTP parameters received");
@ -8093,6 +8392,127 @@ cleanup_error:
}
}
static gchar *
gst_rtspsrc_stream_make_renew_keymgmt (GstRTSPSrc * src, GstRTSPStream * stream,
GstCaps * mikey)
{
gchar *base64, *result = NULL;
GstMIKEYMessage *mikey_msg;
mikey_msg = gst_mikey_message_new_from_caps (mikey);
if (mikey_msg == NULL)
return NULL;
/* add policy '0' for our SSRC */
gst_mikey_message_add_cs_srtp (mikey_msg, 0, stream->ssrc, 0);
base64 = gst_mikey_message_base64_encode (mikey_msg);
gst_mikey_message_unref (mikey_msg);
if (base64) {
result = gst_sdp_make_keymgmt (stream->conninfo.location, base64);
g_free (base64);
}
return result;
}
static gboolean
set_mikey_parameter (GstRTSPSrc * src, const guint id, GstCaps * mikey_caps,
GstPromise * promise)
{
gboolean res;
GstRTSPStream *stream;
gchar *keymgmt;
GST_LOG_OBJECT (src,
"setting MIKEY parameter for stream with id %u: %" GST_PTR_FORMAT, id,
mikey_caps);
if (mikey_caps == NULL) {
GST_ERROR_OBJECT (src, "invalid caps");
return FALSE;
}
if (src->state == GST_RTSP_STATE_INVALID) {
GST_ERROR_OBJECT (src, "invalid state");
return FALSE;
}
GST_OBJECT_LOCK (src);
stream = find_stream (src, &id, (gpointer) find_stream_by_id);
if (stream == NULL) {
GST_OBJECT_UNLOCK (src);
GST_ERROR_OBJECT (src, "no streams with id %u", id);
return FALSE;
}
if (stream->profile != GST_RTSP_PROFILE_SAVP &&
stream->profile != GST_RTSP_PROFILE_SAVPF) {
GST_OBJECT_UNLOCK (src);
GST_WARNING_OBJECT (src, "stream with id %u, is not encrypted", id);
return FALSE;
}
keymgmt = gst_rtspsrc_stream_make_renew_keymgmt (src, stream, mikey_caps);
GST_OBJECT_UNLOCK (src);
if (keymgmt == NULL) {
GST_ERROR_OBJECT (src,
"failed to build MIKEY for stream with id %u: %"
GST_PTR_FORMAT, id, mikey_caps);
return FALSE;
}
res = set_parameter (src, "KeyMgmt", keymgmt, NULL, promise);
g_free (keymgmt);
return res;
}
static gboolean
remove_key (GstRTSPSrc * src, const guint id)
{
GstRTSPStream *stream;
GST_LOG_OBJECT (src, "Removing key for stream with id %u", id);
if (src->state == GST_RTSP_STATE_INVALID) {
GST_ERROR_OBJECT (src, "invalid state");
return FALSE;
}
GST_OBJECT_LOCK (src);
stream = find_stream (src, &id, (gpointer) find_stream_by_id);
if (stream == NULL) {
GST_ERROR_OBJECT (src, "no streams with id %u", id);
GST_OBJECT_UNLOCK (src);
return FALSE;
}
if (stream->profile != GST_RTSP_PROFILE_SAVP &&
stream->profile != GST_RTSP_PROFILE_SAVPF) {
GST_OBJECT_UNLOCK (src);
GST_WARNING_OBJECT (src, "stream with id %u, is not encrypted", id);
return FALSE;
}
g_signal_emit_by_name (stream->srtpdec, "remove-key", stream->ssrc, NULL);
if (stream->mikey) {
gst_mikey_message_unref (stream->mikey);
stream->mikey = NULL;
}
GST_OBJECT_UNLOCK (src);
return TRUE;
}
static gboolean
gst_rtspsrc_parse_range (GstRTSPSrc * src, const gchar * range,
GstSegment * segment, gboolean update_duration)
@ -8336,6 +8756,99 @@ gst_rtspsrc_open_from_sdp (GstRTSPSrc * src, GstSDPMessage * sdp,
}
}
if (src->client_managed_mikey) {
guint len = gst_sdp_message_attributes_len (sdp);
GST_DEBUG_OBJECT (src, "client-managed-mikey mode enabled");
/* Remove key-mgmt:mikey attributes from incoming sdp.
* The key parameters will be requested by srtpdec when needed.
*/
/* RFC 4567 § 3.1:
*
* > The attribute MAY be used at session level, media level, or at both
* > levels. An attribute defined at media level overrides an attribute
* > defined at session level.
*
* See: https://www.rfc-editor.org/rfc/rfc4567.html#section-3.1
*/
for (i = 0; i < len; i++) {
const GstSDPAttribute *attr = gst_sdp_message_get_attribute (sdp, i);
if (g_str_equal (attr->key, "key-mgmt")) {
if (g_str_has_prefix (attr->value, "mikey")) {
GST_DEBUG_OBJECT (src,
"client-managed-mikey mode enabled, "
"removing session level key-mgmt:mikey");
gst_sdp_message_remove_attribute (sdp, i);
} else {
GST_DEBUG_OBJECT (src, "Keeping session level key-mgmt:%s",
attr->value);
}
/* Not expecting more than one key-mgmt attribute at the session level
* aternatively, we could keep iterating and error out if several are
* found */
break;
}
}
len = gst_sdp_message_medias_len (sdp);
for (i = 0; i < len; i++) {
guint32 ssrc = 0;
guint j, jlen, mikey_id = 0;
gboolean mikey_found, other_keymgmt_found, ssrc_found = FALSE;
const GstSDPMedia *media = gst_sdp_message_get_media (sdp, i);
jlen = gst_sdp_media_attributes_len (media);
for (j = 0; j < jlen; j++) {
const GstSDPAttribute *attr = gst_sdp_media_get_attribute (media, j);
if (g_str_equal (attr->key, "key-mgmt")) {
/* Not expecting more than one key-mgmt attribute at the media level
* aternatively, we could keep iterating and error out if several are
* found */
if (g_str_has_prefix (attr->value, "mikey")) {
mikey_id = j;
mikey_found = TRUE;
} else {
other_keymgmt_found = TRUE;
}
if (ssrc_found)
break;
} else if (g_str_equal (attr->key, "ssrc")) {
if (!sscanf (attr->value, "%u", &ssrc)) {
GST_ERROR_OBJECT (src, "Unexpected ssrc value: %s", attr->value);
res = GST_RTSP_ERROR;
goto setup_failed;
}
ssrc_found = TRUE;
if (mikey_found)
break;
}
}
if (ssrc_found && mikey_found) {
GST_DEBUG_OBJECT (src,
"replacing media level key-mgmt:mikey for ssrc: %"
G_GUINT32_FORMAT, ssrc);
gst_sdp_media_remove_attribute ((GstSDPMedia *) media, mikey_id);
} else if (ssrc_found && other_keymgmt_found) {
GST_INFO_OBJECT (src,
"Found non-MIKEY media level key-mgmt for ssrc: %"
G_GUINT32_FORMAT ", client-managed-mikey mode will not be used",
ssrc);
}
}
}
/* create streams */
n_streams = gst_sdp_message_medias_len (sdp);
for (i = 0; i < n_streams; i++) {

View file

@ -282,6 +282,7 @@ struct _GstRTSPSrc {
GstStructure *prop_extra_http_request_headers;
gboolean tcp_timestamp;
gboolean force_non_compliant_url;
gboolean client_managed_mikey;
/* state */
GstRTSPState state;
@ -340,6 +341,8 @@ struct _GstRTSPSrcClass {
gboolean (*get_parameter) (GstRTSPSrc *rtsp, const gchar *parameter, const gchar *content_type, GstPromise *promise);
gboolean (*get_parameters) (GstRTSPSrc *rtsp, gchar **parameters, const gchar *content_type, GstPromise *promise);
gboolean (*set_parameter) (GstRTSPSrc *rtsp, const gchar *name, const gchar *value, const gchar *content_type, GstPromise *promise);
gboolean (*set_mikey_parameter) (GstRTSPSrc *rtsp, guint id, GstCaps *mikey, GstPromise *promise);
gboolean (*remove_key) (GstRTSPSrc *rtsp, guint id);
GstFlowReturn (*push_backchannel_buffer) (GstRTSPSrc *src, guint id, GstSample *sample);
GstFlowReturn (*push_backchannel_sample) (GstRTSPSrc *src, guint id, GstSample *sample);
};

View file

@ -1,5 +1,12 @@
executable('test-onvif', 'test-onvif.c',
dependencies: [gst_dep],
c_args : gst_plugins_good_args,
include_directories : [configinc],
install: false)
examples = [
'test-client-managed-mikey',
'test-onvif',
]
foreach example : examples
executable(example, '@0@.c'.format(example),
dependencies: [gst_dep],
c_args : gst_plugins_good_args,
include_directories : [configinc],
install: false)
endforeach

View file

@ -0,0 +1,773 @@
#include <gst/gst.h>
#include <stdio.h>
GST_DEBUG_CATEGORY_STATIC (srtp_client_debug);
#define GST_CAT_DEFAULT srtp_client_debug
#define ERROR_STR_NULL(err) \
((err) != NULL ? ((err)->message != NULL ? (err->message) : "(NULL)") \
: "(NULL)")
#define MAKE_AND_ADD(var, pipe, name, out_label, elem_name) \
G_STMT_START { \
if (G_UNLIKELY(!(var = (gst_element_factory_make(name, elem_name))))) { \
GST_ERROR("Could not create element %s", name); \
goto out_label; \
} \
if (G_UNLIKELY(!gst_bin_add(GST_BIN_CAST(pipe), var))) { \
GST_ERROR("Could not add element %s", name); \
goto out_label; \
} \
} \
G_STMT_END
static GMainLoop *loop = NULL;
static GstElement *pipeline = NULL;
static GstElement *rtspsrc = NULL;
static GList *streams = NULL;
typedef struct
{
GMutex lock;
guint key_size;
guint32 mki;
GstCaps *key_caps;
GstCaps *rekey_caps;
} KeyParam;
static KeyParam *
key_param_new (guint key_size, guint32 mki)
{
KeyParam *key_param = NULL;
guint8 *data, *mki_data;
guint data_size = GST_ROUND_UP_4 (key_size);
GstBuffer *srtp_key, *mki_buf;
guint i;
key_param = g_malloc0 (sizeof (KeyParam));
g_mutex_init (&key_param->lock);
key_param->key_size = data_size;
key_param->mki = mki;
data = g_malloc (data_size);
for (i = 0; i < data_size; i += 4) {
GST_WRITE_UINT32_BE (data + i, g_random_int ());
}
srtp_key = gst_buffer_new_wrapped (data, key_size);
mki_data = g_malloc (sizeof (guint32));
GST_WRITE_UINT32_BE (mki_data, mki);
mki_buf = gst_buffer_new_wrapped (mki_data, sizeof (guint32));
/* parameters for MIKEY SETUP and srtpdec */
key_param->key_caps =
gst_caps_new_static_str_simple ("application/x-srtp", "srtp-key",
GST_TYPE_BUFFER, srtp_key, "srtp-cipher", G_TYPE_STRING, "aes-128-icm",
"srtp-auth", G_TYPE_STRING, "hmac-sha1-80", "mki", GST_TYPE_BUFFER,
mki_buf, "srtcp-cipher", G_TYPE_STRING, "aes-128-icm", "srtcp-auth",
G_TYPE_STRING, "hmac-sha1-80", NULL);
/* parameters for re-keying */
key_param->rekey_caps =
gst_caps_new_static_str_simple ("application/x-srtp", "srtp-key",
GST_TYPE_BUFFER, srtp_key, "mki", GST_TYPE_BUFFER, mki_buf, NULL);
gst_buffer_unref (mki_buf);
gst_buffer_unref (srtp_key);
return key_param;
}
static void
key_param_free (KeyParam * key_param)
{
g_mutex_lock (&key_param->lock);
gst_caps_unref (key_param->rekey_caps);
gst_caps_unref (key_param->key_caps);
g_mutex_unlock (&key_param->lock);
g_free (key_param);
}
static GstCaps *
key_param_get_srtp_param (KeyParam * key_param)
{
GstCaps *caps;
g_mutex_lock (&key_param->lock);
caps = gst_caps_ref (key_param->key_caps);
g_mutex_unlock (&key_param->lock);
return caps;
}
static GstCaps *
key_param_get_rekey_mikey (KeyParam * key_param)
{
GstCaps *caps;
g_mutex_lock (&key_param->lock);
caps = gst_caps_ref (key_param->rekey_caps);
g_mutex_unlock (&key_param->lock);
return caps;
}
static void
key_param_inc_mki (KeyParam * key_param)
{
GstBuffer *mki_buf;
guint8 *mki_data = g_malloc (sizeof (guint32));
g_mutex_lock (&key_param->lock);
key_param->mki += 1;
GST_INFO ("Incrementing mki to: %u", key_param->mki);
GST_WRITE_UINT32_BE (mki_data, key_param->mki);
mki_buf = gst_buffer_new_wrapped (mki_data, sizeof (guint32));
key_param->key_caps = gst_caps_make_writable (key_param->key_caps);
gst_caps_set_simple_static_str (key_param->key_caps, "mki", GST_TYPE_BUFFER,
mki_buf, NULL);
key_param->rekey_caps = gst_caps_make_writable (key_param->rekey_caps);
gst_caps_set_simple_static_str (key_param->rekey_caps, "mki", GST_TYPE_BUFFER,
mki_buf, NULL);
g_mutex_unlock (&key_param->lock);
gst_buffer_unref (mki_buf);
}
/* Called when a key is required:
*
* * When configuring srtpenc for RTCP.
* * When preparing the KeyMgmt parameter for the SETUP request.
* * When srtpdec needs a key to decrypt an incoming packet.
* * After 'remove-key', which we call when re-keying.
*/
static GstCaps *
request_key (G_GNUC_UNUSED GstElement * src,
G_GNUC_UNUSED guint stream, gpointer user_data)
{
GstCaps *caps;
KeyParam *key_param = (KeyParam *) user_data;
caps = key_param_get_srtp_param (key_param);
GST_DEBUG ("Got key: %" GST_PTR_FORMAT, caps);
return caps;
}
typedef struct
{
KeyParam *key_param;
GList *streams_to_rekey;
} RekeyData;
static RekeyData *
rekey_data_new (KeyParam * key_param, GList * streams_to_renew)
{
RekeyData *this = g_malloc0 (sizeof (RekeyData));
this->key_param = key_param;
this->streams_to_rekey = streams_to_renew;
return this;
}
static void
rekey_data_free (RekeyData * data)
{
g_list_free (data->streams_to_rekey);
/* key_param lifetime is handled elsewhere */
g_free (data);
}
static void on_rekey_reply (GstPromise * promise, gpointer user_data);
static gboolean
rekey_next_stream (gpointer user_data)
{
RekeyData *data = (RekeyData *) user_data;
GList *first;
guint stream_id;
GstCaps *mikey;
GstPromise *promise;
gboolean res;
first = g_list_first (data->streams_to_rekey);
if (!first) {
GST_DEBUG ("No more streams to re-key");
rekey_data_free (data);
goto out;
}
stream_id = GPOINTER_TO_UINT (first->data);
GST_INFO ("Re-keying stream with id %u", stream_id);
promise = gst_promise_new_with_change_func (on_rekey_reply, data, NULL);
mikey = key_param_get_rekey_mikey (data->key_param);
g_signal_emit_by_name (rtspsrc, "set-mikey-parameter", stream_id, mikey,
promise, &res);
if (!res) {
GST_ERROR ("Failed to emit set-mikey-parameter for stream with id %u",
stream_id);
rekey_data_free (data);
gst_promise_unref (promise);
}
out:
/* next stream will be processed when the promise is complete */
return G_SOURCE_REMOVE;
}
static void
on_rekey_reply (GstPromise * promise, gpointer user_data)
{
RekeyData *data = (RekeyData *) user_data;
GList *first;
guint stream_id;
const GstStructure *reply;
gint result, code;
gboolean res;
first = g_list_first (data->streams_to_rekey);
if (!first) {
GST_WARNING ("on_rekey_reply called but there are no more streams");
goto unrecoverable_err;
}
stream_id = GPOINTER_TO_UINT (first->data);
if (gst_promise_wait (promise) != GST_PROMISE_RESULT_REPLIED) {
GST_WARNING ("set-mikey-parameter interrupted or expired");
/* will try again */
goto next;
}
/* First stream was either processed or there was an unrecoverable error */
data->streams_to_rekey =
g_list_remove (data->streams_to_rekey, GUINT_TO_POINTER (stream_id));
reply = gst_promise_get_reply (promise);
GST_DEBUG ("renew-mikey replied %" GST_PTR_FORMAT, reply);
if (!gst_structure_get_int (reply, "rtsp-result", &result) || result != 0) {
GST_ERROR ("Failed to send MIKEY parameter to server: %" GST_PTR_FORMAT,
reply);
goto unrecoverable_err;
}
if (!gst_structure_get_int (reply, "rtsp-code", &code) || code != 200) {
GST_ERROR ("Setting MIKEY failed for stream with id %u. Reply from server: "
"%" GST_PTR_FORMAT, stream_id, reply);
goto next;
}
g_signal_emit_by_name (rtspsrc, "remove-key", stream_id, &res);
if (!res) {
GST_ERROR ("Failed to remove key from client for stream with id %u",
stream_id);
goto next;
}
GST_DEBUG ("Re-keying complete for stream with id %u", stream_id);
next:
if (data->streams_to_rekey)
g_idle_add (rekey_next_stream, data);
gst_promise_unref (promise);
return;
unrecoverable_err:
rekey_data_free (data);
gst_promise_unref (promise);
}
static gboolean
rekey_all (gpointer user_data)
{
KeyParam *key_param = (KeyParam *) user_data;
RekeyData *data;
if (!rtspsrc) {
GST_DEBUG ("Skipping rekey_all because rtspsrc is not ready yet");
goto out;
}
key_param_inc_mki (key_param);
/* rtspsrc can only process one SET_PARAMETER at once.
* We will chain SET_PARAMETER then remove-key for each stream.
*/
data = rekey_data_new (key_param, g_list_copy (streams));
rekey_next_stream (data);
out:
return G_SOURCE_CONTINUE;
}
static void
on_soft_limit (GstElement * rtspsrc, guint stream_id, gpointer user_data)
{
GST_INFO ("Reached soft-limit for stream with id %u", stream_id);
/* this is where we should re-new the key
* in this test, we wait for hard-limit though to show both signals.
*/
}
static void
on_hard_limit (GstElement * rtspsrc, guint stream_id, gpointer user_data)
{
KeyParam *key_param = (KeyParam *) user_data;
GList *list = NULL;
RekeyData *data;
GST_INFO ("Reached hard-limit for stream with id %u", stream_id);
key_param_inc_mki (key_param);
list = g_list_append (list, GUINT_TO_POINTER (stream_id));
data = rekey_data_new (key_param, list);
g_idle_add (rekey_next_stream, data);
}
static gboolean
setup_h264_pipeline (GstElement * element, GstPad * pad, GstPad ** decode_pad)
{
gboolean ret = FALSE;
GstObject *parent = NULL;
GstElement *depay = NULL;
GstElement *decode = NULL;
GstPad *sinkpad = NULL;
parent = gst_object_get_parent (GST_OBJECT (element));
MAKE_AND_ADD (depay, parent, "rtph264depay", out, NULL);
MAKE_AND_ADD (decode, parent, "avdec_h264", out, NULL);
if (!gst_element_link (depay, decode)) {
GST_ERROR ("failed linking h264 elements");
goto out;
}
sinkpad = gst_element_get_static_pad (depay, "sink");
if (gst_pad_link (pad, sinkpad) != GST_PAD_LINK_OK) {
GST_ERROR ("failed linking video depayloader");
goto out;
}
(void) gst_element_sync_state_with_parent (decode);
(void) gst_element_sync_state_with_parent (depay);
*decode_pad = gst_element_get_static_pad (decode, "src");
ret = TRUE;
out:
g_clear_object (&sinkpad);
gst_object_unref (parent);
return ret;
}
static gboolean
setup_h265_pipeline (GstElement * element, GstPad * pad, GstPad ** decode_pad)
{
gboolean ret = FALSE;
GstObject *parent = NULL;
GstElement *depay = NULL;
GstElement *decode = NULL;
GstPad *sinkpad = NULL;
parent = gst_object_get_parent (GST_OBJECT (element));
MAKE_AND_ADD (depay, parent, "rtph265depay", out, NULL);
MAKE_AND_ADD (decode, parent, "avdec_h265", out, NULL);
if (!gst_element_link (depay, decode)) {
GST_ERROR ("failed linking h265 elements");
goto out;
}
sinkpad = gst_element_get_static_pad (depay, "sink");
if (gst_pad_link (pad, sinkpad) != GST_PAD_LINK_OK) {
GST_ERROR ("failed linking video depayloader");
goto out;
}
(void) gst_element_sync_state_with_parent (decode);
(void) gst_element_sync_state_with_parent (depay);
*decode_pad = gst_element_get_static_pad (decode, "src");
ret = TRUE;
out:
g_clear_object (&sinkpad);
gst_object_unref (parent);
return ret;
}
static void
setup_video_sink (GstElement * element, GstPad * pad, GstStructure * st)
{
GstObject *parent = NULL;
GstElement *scale = NULL;
GstElement *convert = NULL;
GstElement *queue = NULL;
GstElement *sink = NULL;
GstPad *decode_pad = NULL;
GstPad *sinkpad = NULL;
const gchar *encoding;
encoding = gst_structure_get_string (st, "encoding-name");
if (g_str_equal (encoding, "H264")) {
if (!setup_h264_pipeline (element, pad, &decode_pad)) {
GST_WARNING ("skipping H264 stream");
goto out;
}
} else if (g_str_equal (encoding, "H265")) {
if (!setup_h265_pipeline (element, pad, &decode_pad)) {
GST_WARNING ("skipping H265 stream");
goto out;
}
} else {
/* TODO: add more formats */
GST_FIXME ("unhandled encoding: %s", encoding);
goto out;
}
parent = gst_object_get_parent (GST_OBJECT (element));
MAKE_AND_ADD (scale, parent, "videoscale", out, NULL);
MAKE_AND_ADD (convert, parent, "videoconvert", out, NULL);
MAKE_AND_ADD (queue, parent, "queue", out, NULL);
g_object_set (queue, "max-size-buffers", 1, "max-size-bytes", 0,
"max-size-time", 0, NULL);
MAKE_AND_ADD (sink, parent, "autovideosink", out, NULL);
if (!gst_element_link_many (scale, convert, queue, sink, NULL)) {
GST_ERROR ("failed linking video elements");
goto out;
}
sinkpad = gst_element_get_static_pad (scale, "sink");
if (gst_pad_link (decode_pad, sinkpad) != GST_PAD_LINK_OK) {
GST_ERROR ("failed linking video pipeline");
goto out;
}
(void) gst_element_sync_state_with_parent (sink);
(void) gst_element_sync_state_with_parent (queue);
(void) gst_element_sync_state_with_parent (convert);
(void) gst_element_sync_state_with_parent (scale);
out:
g_clear_object (&decode_pad);
g_clear_object (&sinkpad);
gst_object_unref (parent);
}
static gboolean
setup_aac_pipeline (GstElement * element, GstPad * pad, GstPad ** decode_pad)
{
gboolean ret = FALSE;
GstObject *parent = NULL;
GstElement *depay = NULL;
GstElement *decode = NULL;
GstPad *sinkpad = NULL;
parent = gst_object_get_parent (GST_OBJECT (element));
MAKE_AND_ADD (depay, parent, "rtpmp4gdepay", out, NULL);
MAKE_AND_ADD (decode, parent, "avdec_aac", out, NULL);
if (!gst_element_link (depay, decode)) {
GST_ERROR ("failed linking audio elements");
goto out;
}
sinkpad = gst_element_get_static_pad (depay, "sink");
if (gst_pad_link (pad, sinkpad) != GST_PAD_LINK_OK) {
GST_ERROR ("linking sink failed");
goto out;
}
(void) gst_element_sync_state_with_parent (decode);
(void) gst_element_sync_state_with_parent (depay);
*decode_pad = gst_element_get_static_pad (decode, "src");
ret = TRUE;
out:
g_clear_object (&sinkpad);
gst_object_unref (parent);
return ret;
}
static void
setup_audio_sink (GstElement * element, GstPad * pad, GstStructure * st)
{
GstObject *parent = NULL;
GstElement *convert = NULL;
GstElement *queue = NULL;
GstElement *sink = NULL;
GstPad *decode_pad = NULL;
GstPad *sinkpad = NULL;
const gchar *encoding, *mode;
encoding = gst_structure_get_string (st, "encoding-name");
mode = gst_structure_get_string (st, "mode");
if (g_str_equal (encoding, "MPEG4-GENERIC") && g_str_has_prefix (mode, "AAC")) {
if (!setup_aac_pipeline (element, pad, &decode_pad)) {
GST_WARNING ("skipping aac stream");
goto out;
}
} else {
GST_FIXME ("unhandled: encoding %s / mode: %s", encoding, mode);
goto out;
}
parent = gst_object_get_parent (GST_OBJECT (element));
MAKE_AND_ADD (convert, parent, "audioconvert", out, NULL);
MAKE_AND_ADD (queue, parent, "queue", out, NULL);
g_object_set (queue, "max-size-buffers", 1, "max-size-bytes", 0,
"max-size-time", 0, NULL);
MAKE_AND_ADD (sink, parent, "autoaudiosink", out, NULL);
if (!gst_element_link_many (convert, queue, sink, NULL)) {
GST_ERROR ("failed linking audio elements");
goto out;
}
sinkpad = gst_element_get_static_pad (convert, "sink");
if (gst_pad_link (decode_pad, sinkpad) != GST_PAD_LINK_OK) {
GST_ERROR ("failed linking audio pipeline");
goto out;
}
(void) gst_element_sync_state_with_parent (sink);
(void) gst_element_sync_state_with_parent (queue);
(void) gst_element_sync_state_with_parent (convert);
out:
g_clear_object (&decode_pad);
g_clear_object (&sinkpad);
gst_object_unref (parent);
}
static void
pad_added (GstElement * element, GstPad * pad, G_GNUC_UNUSED gpointer user_data)
{
GstCaps *caps;
GstStructure *st;
const gchar *name;
const gchar *media;
caps = gst_pad_get_current_caps (pad);
GST_DEBUG ("new pad %" GST_PTR_FORMAT " with caps %" GST_PTR_FORMAT, pad,
caps);
st = gst_caps_get_structure (caps, 0);
name = gst_structure_get_name (st);
if (!g_str_equal (name, "application/x-rtp")) {
GST_ERROR ("caps not understood");
gst_caps_unref (caps);
return;
}
media = gst_structure_get_string (st, "media");
if (media == NULL) {
GST_ERROR ("no media in caps");
gst_caps_unref (caps);
return;
}
if (g_str_equal (media, "video")) {
setup_video_sink (element, pad, st);
} else if (g_str_equal (media, "audio")) {
setup_audio_sink (element, pad, st);
} else {
GST_WARNING ("media not understood");
}
gst_caps_unref (caps);
}
static gboolean
select_stream (G_GNUC_UNUSED GstElement * rtspsrc,
guint stream_id, GstCaps * caps, G_GNUC_UNUSED gpointer user_data)
{
GST_INFO ("Selecting stream with id: %u, %" GST_PTR_FORMAT, stream_id, caps);
streams = g_list_append (streams, GUINT_TO_POINTER (stream_id));
return TRUE;
}
static gboolean
build_pipeline (const gchar * location, KeyParam * key_param)
{
GstElement *src = NULL;
gboolean ret = FALSE;
GST_DEBUG ("building pipeline for: %s", location);
pipeline = gst_pipeline_new ("srtp pipeline");
MAKE_AND_ADD (src, pipeline, "rtspsrc", out, NULL);
rtspsrc = gst_object_ref (src);
g_object_set (src, "location", location, "tls-validation-flags", 0x20,
"client-managed-mikey", TRUE, NULL);
g_signal_connect (src, "pad-added", G_CALLBACK (pad_added), NULL);
if (key_param == NULL) {
GST_WARNING ("no key available");
ret = TRUE;
goto out;
}
g_signal_connect (src, "select-stream", G_CALLBACK (select_stream), NULL);
g_signal_connect (src, "request-rtp-key", G_CALLBACK (request_key),
key_param);
g_signal_connect (src, "request-rtcp-key", G_CALLBACK (request_key),
key_param);
g_signal_connect (src, "soft-limit", G_CALLBACK (on_soft_limit), NULL);
g_signal_connect (src, "hard-limit", G_CALLBACK (on_hard_limit), key_param);
ret = TRUE;
out:
if (!ret) {
gst_object_unref (pipeline);
pipeline = NULL;
}
return ret;
}
static gboolean
bus_message (G_GNUC_UNUSED GstBus * bus, GstMessage * message,
G_GNUC_UNUSED gpointer user_data)
{
GST_TRACE ("got %" GST_PTR_FORMAT, message);
switch (GST_MESSAGE_TYPE (message)) {
case GST_MESSAGE_ERROR:{
GError *err = NULL;
gchar *name, *debug = NULL;
gst_message_parse_error (message, &err, &debug);
name = gst_object_get_path_string (message->src);
GST_ERROR ("ERROR from %s: %s", name, err->message);
if (debug != NULL) {
GST_ERROR ("debug; %s", debug);
}
g_error_free (err);
g_free (debug);
g_free (name);
}
/* fall through */
case GST_MESSAGE_EOS:
GST_DEBUG ("stopping the main loop");
g_main_loop_quit (loop);
break;
default:
break;
}
return TRUE;
}
gint
main (gint argc, gchar ** argv)
{
gint res = EXIT_FAILURE;
GstBus *bus = NULL;
KeyParam *key_param = NULL;
gchar *location = NULL;
guint32 key_len, mki, rekey_int = 0;
if (argc != 5) {
g_printerr
("Usage:\n\ttest-client-managed-mikey KEY_LEN MKI REKEY_INT LOCATION\n"
"\n\tWhere:\n" "\t\tKEY_LEN : len of the key (e.g. 30)\n"
"\t\tMKI : Master Key Index (e.g. 1200)\n"
"\t\tREKEY_INT: re-keying interval in seconds (e.g. 10). 0 to disable\n"
"\t\tLOCATION : rtsps://user:pass@host:port/resource (e.g. port "
"322)\n");
goto out;
}
if (!sscanf (argv[1], "%u", &key_len)) {
g_printerr ("Expected an integer for KEY_LEN, got: %s", argv[1]);
goto out;
}
if (!sscanf (argv[2], "%u", &mki)) {
g_printerr ("Expected an integer for MKI, got: %s", argv[2]);
goto out;
}
if (!sscanf (argv[3], "%u", &rekey_int)) {
g_printerr ("Expected an integer for REKEY_INT, got: %s", argv[3]);
goto out;
}
location = argv[4];
gst_init (&argc, &argv);
GST_DEBUG_CATEGORY_INIT (srtp_client_debug, "test-client-managed-mikey", 0,
"test-client-managed-mikey debug");
loop = g_main_loop_new (NULL, TRUE);
key_param = key_param_new (key_len, mki);
if (!build_pipeline (location, key_param)) {
GST_ERROR ("Pipeline could not be built");
goto out;
}
bus = gst_element_get_bus (pipeline);
if (bus == NULL) {
GST_ERROR ("Could not get the pipeline bus");
goto out;
}
(void) gst_bus_add_watch (bus, bus_message, NULL);
if (gst_element_set_state (pipeline, GST_STATE_PLAYING) ==
GST_STATE_CHANGE_FAILURE) {
GST_ERROR ("Could not set the pipeline in playing state");
goto out;
}
if (rekey_int) {
/* Automatically renew MKI */
g_timeout_add_seconds (rekey_int, rekey_all, key_param);
} else {
GST_INFO ("Not using re-keying interval. Will wait for hard-limit");
}
g_main_loop_run (loop);
gst_element_set_state (pipeline, GST_STATE_NULL);
gst_bus_remove_watch (bus);
res = EXIT_SUCCESS;
out:
g_clear_pointer (&key_param, key_param_free);
g_clear_pointer (&streams, g_list_free);
g_clear_object (&rtspsrc);
g_clear_object (&bus);
g_clear_object (&pipeline);
g_clear_pointer (&loop, g_main_loop_unref);
return res;
}