blob: 187496c7cd2a9e1689fda9a6a609c7fd669e83d8 [file] [log] [blame]
henrike@webrtc.orga7b98182014-02-21 15:51:431/*
kjellander65c7f672016-02-12 08:05:012 * Copyright 2014 The WebRTC project authors. All Rights Reserved.
henrike@webrtc.orga7b98182014-02-21 15:51:433 *
kjellander65c7f672016-02-12 08:05:014 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
henrike@webrtc.orga7b98182014-02-21 15:51:439 */
10
Mirko Bonadei92ea95e2017-09-15 04:47:3111#ifndef PC_EXTERNALHMAC_H_
12#define PC_EXTERNALHMAC_H_
henrike@webrtc.orga7b98182014-02-21 15:51:4313
14// External libsrtp HMAC auth module which implements methods defined in
15// auth_type_t.
16// The default auth module will be replaced only when the ENABLE_EXTERNAL_AUTH
17// flag is enabled. This allows us to access to authentication keys,
18// as the default auth implementation doesn't provide access and avoids
19// hashing each packet twice.
20
21// How will libsrtp select this module?
22// Libsrtp defines authentication function types identified by an unsigned
mattdr8cab52d2016-10-10 22:33:3723// integer, e.g. SRTP_HMAC_SHA1 is 3. Using authentication ids, the
24// application can plug any desired authentication modules into libsrtp.
henrike@webrtc.orga7b98182014-02-21 15:51:4325// libsrtp also provides a mechanism to select different auth functions for
26// individual streams. This can be done by setting the right value in
27// the auth_type of srtp_policy_t. The application must first register auth
28// functions and the corresponding authentication id using
29// crypto_kernel_replace_auth_type function.
henrike@webrtc.orga7b98182014-02-21 15:51:4330
pbosc7c26a02017-01-02 16:42:3231#include <stdint.h>
32
mattdr51f29192016-09-28 21:08:4633#include "third_party/libsrtp/crypto/include/auth.h"
henrike@webrtc.orga7b98182014-02-21 15:51:4334
mattdr8cab52d2016-10-10 22:33:3735#define EXTERNAL_HMAC_SHA1 SRTP_HMAC_SHA1 + 1
henrike@webrtc.orga7b98182014-02-21 15:51:4336#define HMAC_KEY_LENGTH 20
37
38// The HMAC context structure used to store authentication keys.
39// The pointer to the key will be allocated in the external_hmac_init function.
40// This pointer is owned by srtp_t in a template context.
41typedef struct {
Peter Boström0c4e06b2015-10-07 10:23:2142 uint8_t key[HMAC_KEY_LENGTH];
henrike@webrtc.orga7b98182014-02-21 15:51:4343 int key_length;
pbos@webrtc.orga9cf0792014-12-18 09:12:2144} ExternalHmacContext;
henrike@webrtc.orga7b98182014-02-21 15:51:4345
mattdr8cab52d2016-10-10 22:33:3746srtp_err_status_t external_hmac_alloc(srtp_auth_t** a,
47 int key_len,
48 int out_len);
henrike@webrtc.orga7b98182014-02-21 15:51:4349
mattdr8cab52d2016-10-10 22:33:3750srtp_err_status_t external_hmac_dealloc(srtp_auth_t* a);
henrike@webrtc.orga7b98182014-02-21 15:51:4351
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:2252srtp_err_status_t external_hmac_init(void* state,
mattdr8cab52d2016-10-10 22:33:3753 const uint8_t* key,
54 int key_len);
henrike@webrtc.orga7b98182014-02-21 15:51:4355
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:2256srtp_err_status_t external_hmac_start(void* state);
henrike@webrtc.orga7b98182014-02-21 15:51:4357
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:2258srtp_err_status_t external_hmac_update(void* state,
mattdr8cab52d2016-10-10 22:33:3759 const uint8_t* message,
60 int msg_octets);
henrike@webrtc.orga7b98182014-02-21 15:51:4361
Vlad Tsyrkleviche8e8ad82017-12-07 02:38:2262srtp_err_status_t external_hmac_compute(void* state,
63 const uint8_t* message,
mattdr8cab52d2016-10-10 22:33:3764 int msg_octets,
65 int tag_len,
66 uint8_t* result);
henrike@webrtc.orga7b98182014-02-21 15:51:4367
mattdr8cab52d2016-10-10 22:33:3768srtp_err_status_t external_crypto_init();
henrike@webrtc.orga7b98182014-02-21 15:51:4369
Mirko Bonadei92ea95e2017-09-15 04:47:3170#endif // PC_EXTERNALHMAC_H_