7 releases (breaking)

0.7.0 Dec 5, 2020
0.6.0 May 10, 2020
0.5.0 Feb 29, 2020
0.4.0 Aug 30, 2019
0.1.0 Jun 4, 2019

#289 in Multimedia

MIT/Apache

40KB
772 lines

srtp

https://docs.rs/srtp/


lib.rs:

Bindings to libsrtp2

This crate provides a safe interface to the libsrtp2 library.

DTLS-SRTP using OpenSSL

#
#
use openssl::pkey::PKey;
use openssl::ssl::{Ssl, SslAcceptor, SslMethod};
use openssl::x509::X509;

openssl::init();

let mut ctx = SslAcceptor::mozilla_modern(SslMethod::dtls())?;
ctx.set_tlsext_use_srtp(srtp::openssl::SRTP_PROFILE_NAMES)?;
let pkey = PKey::private_key_from_pem(pkey)?;
let cert = X509::from_pem(cert)?;
ctx.set_private_key(&*pkey)?;
ctx.set_certificate(&*cert)?;
ctx.check_private_key()?;
let ctx = ctx.build().into_context();

let mut ssl = Ssl::new(&ctx)?;
ssl.set_mtu(1200)?;
let stream = if is_server {
    ssl.accept(stream)?
} else {
    ssl.connect(stream)?
};

let (mut inbound, mut outbound) =
    srtp::openssl::session_pair(stream.ssl(), Default::default())?;

let mut pkt = b"not a valid SRTP packet".to_vec();
if let Err(err) = inbound.unprotect(&mut pkt) {
    println!("Failed to unprotect inbound SRTP packet: {}", err);
}

let mut pkt = b"not a valid RTP packet".to_vec();
if let Err(err) = outbound.protect(&mut pkt) {
    println!("Failed to protect outbound RTP packet: {}", err);
}

Standalone usage

Create a Session to decrypt every incoming SRTP packets.

let key = &[0u8; 30][..]; // DO NOT USE IT ON PRODUCTION
let mut packet = b"not a valid SRTP packet".to_vec();

let mut session = srtp::Session::with_inbound_template(srtp::StreamPolicy {
    key,
    rtp: srtp::CryptoPolicy::aes_cm_128_hmac_sha1_80(),
    rtcp: srtp::CryptoPolicy::aes_cm_128_hmac_sha1_80(),
    ..Default::default()
}).unwrap();

match session.unprotect(&mut packet) {
    Ok(()) => println!("SRTP packet unprotected"),
    Err(err) => println!("Error unprotecting SRTP packet: {}", err),
};

Dependencies

~1.5–4.5MB
~96K SLoC