blob: 27b5d0e5ab9eefbc1e01b86adf7aee272e91305f [file] [log] [blame]
henrike@webrtc.orga7b98182014-02-21 15:51:431/*
kjellander65c7f672016-02-12 08:05:012 * Copyright 2014 The WebRTC project authors. All Rights Reserved.
henrike@webrtc.orga7b98182014-02-21 15:51:433 *
kjellander65c7f672016-02-12 08:05:014 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
henrike@webrtc.orga7b98182014-02-21 15:51:439 */
10
Steve Anton10542f22019-01-11 17:11:0011#include "pc/external_hmac.h"
henrike@webrtc.org2d213e42014-03-06 18:51:2112
13#include <stdlib.h> // For malloc/free.
Yves Gerey3e707812018-11-28 15:47:4914#include <string.h>
henrike@webrtc.org2d213e42014-03-06 18:51:2115
Mirko Bonadei92ea95e2017-09-15 04:47:3116#include "rtc_base/logging.h"
Joachim Bauch5b32f232018-03-07 19:02:2617#include "rtc_base/zero_memory.h"
mattdr0d8ade52016-10-25 16:47:2618#include "third_party/libsrtp/include/srtp.h"
mattdr51f29192016-09-28 21:08:4619
henrike@webrtc.orga7b98182014-02-21 15:51:4320// Begin test case 0 */
henrike@webrtc.org8b610112014-03-18 21:39:1021static const uint8_t kExternalHmacTestCase0Key[20] = {
Yves Gerey665174f2018-06-19 13:03:0522 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
23 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b};
henrike@webrtc.orga7b98182014-02-21 15:51:4324
henrike@webrtc.org8b610112014-03-18 21:39:1025static const uint8_t kExternalHmacTestCase0Data[8] = {
Yves Gerey665174f2018-06-19 13:03:0526 0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 // "Hi There"
henrike@webrtc.orga7b98182014-02-21 15:51:4327};
28
Yves Gerey665174f2018-06-19 13:03:0529static const uint8_t kExternalHmacFakeTag[10] = {0xba, 0xdd, 0xba, 0xdd, 0xba,
30 0xdd, 0xba, 0xdd, 0xba, 0xdd};
henrike@webrtc.orga7b98182014-02-21 15:51:4331
mattdr8cab52d2016-10-10 22:33:3732static const srtp_auth_test_case_t kExternalHmacTestCase0 = {
Yves Gerey665174f2018-06-19 13:03:0533 20, // Octets in key
34 const_cast<uint8_t*>(kExternalHmacTestCase0Key), // Key
35 8, // Octets in data
36 const_cast<uint8_t*>(kExternalHmacTestCase0Data), // Data
37 10, // Octets in tag
38 const_cast<uint8_t*>(kExternalHmacFakeTag), // Tag
39 NULL // Pointer to next
40 // testcase
henrike@webrtc.orga7b98182014-02-21 15:51:4341};
42
henrike@webrtc.org8b610112014-03-18 21:39:1043static const char kExternalHmacDescription[] =
44 "external hmac sha-1 authentication";
45
mattdr8cab52d2016-10-10 22:33:3746// srtp_auth_type_t external_hmac is the hmac metaobject
henrike@webrtc.org8b610112014-03-18 21:39:1047
Yves Gerey665174f2018-06-19 13:03:0548static const srtp_auth_type_t external_hmac = {
49 external_hmac_alloc,
50 external_hmac_dealloc,
51 external_hmac_init,
52 external_hmac_compute,
53 external_hmac_update,
54 external_hmac_start,
55 const_cast<char*>(kExternalHmacDescription),
56 const_cast<srtp_auth_test_case_t*>(&kExternalHmacTestCase0),
57 EXTERNAL_HMAC_SHA1};
henrike@webrtc.org8b610112014-03-18 21:39:1058
mattdr8cab52d2016-10-10 22:33:3759srtp_err_status_t external_hmac_alloc(srtp_auth_t** a,
60 int key_len,
61 int out_len) {
henrike@webrtc.orga7b98182014-02-21 15:51:4362 uint8_t* pointer;
63
64 // Check key length - note that we don't support keys larger
65 // than 20 bytes yet
66 if (key_len > 20)
mattdr8cab52d2016-10-10 22:33:3767 return srtp_err_status_bad_param;
henrike@webrtc.orga7b98182014-02-21 15:51:4368
69 // Check output length - should be less than 20 bytes/
70 if (out_len > 20)
mattdr8cab52d2016-10-10 22:33:3771 return srtp_err_status_bad_param;
henrike@webrtc.orga7b98182014-02-21 15:51:4372
73 // Allocate memory for auth and hmac_ctx_t structures.
mattdr8cab52d2016-10-10 22:33:3774 pointer = new uint8_t[(sizeof(ExternalHmacContext) + sizeof(srtp_auth_t))];
henrike@webrtc.orga7b98182014-02-21 15:51:4375 if (pointer == NULL)
mattdr8cab52d2016-10-10 22:33:3776 return srtp_err_status_alloc_fail;
henrike@webrtc.orga7b98182014-02-21 15:51:4377
78 // Set pointers
Steve Anton36b29d12017-10-30 16:57:4279 *a = reinterpret_cast<srtp_auth_t*>(pointer);
Artem Titov880fa812021-07-30 20:30:2380 // `external_hmac` is const and libsrtp expects `type` to be non-const.
81 // const conversion is required. `external_hmac` is constant because we don't
henrike@webrtc.org8b610112014-03-18 21:39:1082 // want to increase global count in Chrome.
mattdr8cab52d2016-10-10 22:33:3783 (*a)->type = const_cast<srtp_auth_type_t*>(&external_hmac);
84 (*a)->state = pointer + sizeof(srtp_auth_t);
henrike@webrtc.orga7b98182014-02-21 15:51:4385 (*a)->out_len = out_len;
86 (*a)->key_len = key_len;
87 (*a)->prefix_len = 0;
88
mattdr8cab52d2016-10-10 22:33:3789 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:4390}
91
mattdr8cab52d2016-10-10 22:33:3792srtp_err_status_t external_hmac_dealloc(srtp_auth_t* a) {
Joachim Bauch5b32f232018-03-07 19:02:2693 rtc::ExplicitZeroMemory(a, sizeof(ExternalHmacContext) + sizeof(srtp_auth_t));
henrike@webrtc.orga7b98182014-02-21 15:51:4394
95 // Free memory
henrike@webrtc.org8b610112014-03-18 21:39:1096 delete[] a;
henrike@webrtc.orga7b98182014-02-21 15:51:4397
mattdr8cab52d2016-10-10 22:33:3798 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:4399}
100
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:22101srtp_err_status_t external_hmac_init(void* state,
mattdr8cab52d2016-10-10 22:33:37102 const uint8_t* key,
103 int key_len) {
henrike@webrtc.orga7b98182014-02-21 15:51:43104 if (key_len > HMAC_KEY_LENGTH)
mattdr8cab52d2016-10-10 22:33:37105 return srtp_err_status_bad_param;
henrike@webrtc.orga7b98182014-02-21 15:51:43106
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:22107 ExternalHmacContext* context = static_cast<ExternalHmacContext*>(state);
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:22108 memcpy(context->key, key, key_len);
109 context->key_length = key_len;
mattdr8cab52d2016-10-10 22:33:37110 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43111}
112
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:22113srtp_err_status_t external_hmac_start(void* /*state*/) {
mattdr8cab52d2016-10-10 22:33:37114 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43115}
116
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:22117srtp_err_status_t external_hmac_update(void* /*state*/,
118 const uint8_t* /*message*/,
119 int /*msg_octets*/) {
mattdr8cab52d2016-10-10 22:33:37120 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43121}
122
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:22123srtp_err_status_t external_hmac_compute(void* /*state*/,
124 const uint8_t* /*message*/,
125 int /*msg_octets*/,
126 int tag_len,
127 uint8_t* result) {
henrike@webrtc.org8b610112014-03-18 21:39:10128 memcpy(result, kExternalHmacFakeTag, tag_len);
mattdr8cab52d2016-10-10 22:33:37129 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43130}
131
mattdr8cab52d2016-10-10 22:33:37132srtp_err_status_t external_crypto_init() {
Artem Titov880fa812021-07-30 20:30:23133 // `external_hmac` is const. const_cast is required as libsrtp expects
henrike@webrtc.org8b610112014-03-18 21:39:10134 // non-const.
mattdr8cab52d2016-10-10 22:33:37135 srtp_err_status_t status = srtp_replace_auth_type(
136 const_cast<srtp_auth_type_t*>(&external_hmac), EXTERNAL_HMAC_SHA1);
henrike@webrtc.orga7b98182014-02-21 15:51:43137 if (status) {
Mirko Bonadei675513b2017-11-09 10:09:25138 RTC_LOG(LS_ERROR) << "Error in replacing default auth module, error: "
139 << status;
mattdr8cab52d2016-10-10 22:33:37140 return srtp_err_status_fail;
henrike@webrtc.orga7b98182014-02-21 15:51:43141 }
mattdr8cab52d2016-10-10 22:33:37142 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43143}