David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 1 | /* |
| 2 | * ekt.h |
| 3 | * |
| 4 | * interface to Encrypted Key Transport for SRTP |
| 5 | * |
| 6 | * David McGrew |
| 7 | * Cisco Systems, Inc. |
| 8 | */ |
| 9 | /* |
| 10 | * |
| 11 | * Copyright (c) 2001-2005 Cisco Systems, Inc. |
| 12 | * All rights reserved. |
| 13 | * |
| 14 | * Redistribution and use in source and binary forms, with or without |
| 15 | * modification, are permitted provided that the following conditions |
| 16 | * are met: |
| 17 | * |
| 18 | * Redistributions of source code must retain the above copyright |
| 19 | * notice, this list of conditions and the following disclaimer. |
| 20 | * |
| 21 | * Redistributions in binary form must reproduce the above |
| 22 | * copyright notice, this list of conditions and the following |
| 23 | * disclaimer in the documentation and/or other materials provided |
| 24 | * with the distribution. |
| 25 | * |
| 26 | * Neither the name of the Cisco Systems, Inc. nor the names of its |
| 27 | * contributors may be used to endorse or promote products derived |
| 28 | * from this software without specific prior written permission. |
| 29 | * |
| 30 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| 31 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| 32 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS |
| 33 | * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE |
| 34 | * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, |
| 35 | * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
| 36 | * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR |
| 37 | * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 38 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| 39 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 40 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 41 | * OF THE POSSIBILITY OF SUCH DAMAGE. |
| 42 | * |
| 43 | */ |
| 44 | |
| 45 | |
| 46 | |
| 47 | /* |
| 48 | * EKT implementation strategy |
| 49 | * |
| 50 | * use stream_template approach |
| 51 | * |
| 52 | * in srtp_unprotect, when a new stream appears, check if template has |
| 53 | * EKT defined, and if it does, then apply EKT processing |
| 54 | * |
| 55 | * question: will we want to allow key-sharing templates in addition |
| 56 | * to EKT templates? could define a new ssrc_type_t that's associated |
| 57 | * with an EKT, e.g. ssrc_any_ekt. |
| 58 | * |
| 59 | * |
| 60 | */ |
| 61 | |
| 62 | #ifndef EKT_H |
| 63 | #define EKT_H |
| 64 | |
| 65 | #ifdef __cplusplus |
| 66 | extern "C" { |
| 67 | #endif |
| 68 | |
| 69 | #include "srtp_priv.h" |
| 70 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 71 | #define SRTP_EKT_CIPHER_DEFAULT 1 |
| 72 | #define SRTP_EKT_CIPHER_AES_128_ECB 1 |
| 73 | #define SRTP_EKT_CIPHER_AES_192_KEY_WRAP 2 |
| 74 | #define SRTP_EKT_CIPHER_AES_256_KEY_WRAP 3 |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 75 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 76 | typedef uint16_t srtp_ekt_spi_t; |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 77 | |
| 78 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 79 | unsigned srtp_ekt_octets_after_base_tag(srtp_ekt_stream_t ekt); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 80 | |
| 81 | /* |
| 82 | * an srtp_policy_t structure can contain a pointer to an |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 83 | * srtp_ekt_policy_t structure |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 84 | * |
| 85 | * this structure holds all of the high level EKT information, and it |
| 86 | * is passed into libsrtp to indicate what policy should be in effect |
| 87 | */ |
| 88 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 89 | typedef struct srtp_ekt_policy_ctx_t { |
| 90 | srtp_ekt_spi_t spi; /* security parameter index */ |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 91 | uint8_t ekt_cipher_type; |
| 92 | uint8_t *ekt_key; |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 93 | struct srtp_ekt_policy_ctx_t *next_ekt_policy; |
| 94 | } srtp_ekt_policy_ctx_t; |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 95 | |
| 96 | |
| 97 | /* |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 98 | * an srtp_ekt_data_t structure holds the data corresponding to an ekt key, |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 99 | * spi, and so on |
| 100 | */ |
| 101 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 102 | typedef struct srtp_ekt_data_t { |
| 103 | srtp_ekt_spi_t spi; |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 104 | uint8_t ekt_cipher_type; |
jfigus | 5a2b2d0 | 2014-11-19 14:34:20 -0500 | [diff] [blame] | 105 | srtp_aes_expanded_key_t ekt_enc_key; |
| 106 | srtp_aes_expanded_key_t ekt_dec_key; |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 107 | struct ekt_data_t *next_ekt_data; |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 108 | } srtp_ekt_data_t; |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 109 | |
| 110 | /* |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 111 | * an srtp_stream_ctx_t can contain an srtp_ekt_stream_ctx_t |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 112 | * |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 113 | * an srtp_ekt_stream_ctx_t structure holds all of the EKT information for |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 114 | * a specific SRTP stream |
| 115 | */ |
| 116 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 117 | typedef struct srtp_ekt_stream_ctx_t { |
| 118 | srtp_ekt_data_t *data; |
| 119 | uint16_t isn; /* initial sequence number */ |
| 120 | uint8_t encrypted_master_key[SRTP_MAX_KEY_LEN]; |
| 121 | } srtp_ekt_stream_ctx_t; |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 122 | |
| 123 | |
| 124 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 125 | srtp_err_status_t srtp_ekt_alloc(srtp_ekt_stream_t *stream_data, srtp_ekt_policy_t policy); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 126 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 127 | srtp_err_status_t srtp_ekt_stream_init(srtp_ekt_stream_t e, srtp_ekt_spi_t spi, void *ekt_key, unsigned ekt_cipher_type); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 128 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 129 | srtp_err_status_t srtp_ekt_stream_init_from_policy(srtp_ekt_stream_t e, srtp_ekt_policy_t p); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 130 | |
| 131 | |
| 132 | |
jfigus | 857009c | 2014-11-05 11:17:43 -0500 | [diff] [blame] | 133 | srtp_err_status_t srtp_stream_init_from_ekt(srtp_stream_t stream, const void *srtcp_hdr, unsigned pkt_octet_len); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 134 | |
| 135 | |
jfigus | de8deb3 | 2014-11-25 12:58:11 -0500 | [diff] [blame] | 136 | void srtp_ekt_write_data(srtp_ekt_stream_t ekt, uint8_t *base_tag, unsigned base_tag_len, int *packet_len, srtp_xtd_seq_num_t pkt_index); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 137 | |
| 138 | /* |
| 139 | * We handle EKT by performing some additional steps before |
| 140 | * authentication (copying the auth tag into a temporary location, |
| 141 | * zeroizing the "base tag" field in the packet) |
| 142 | * |
| 143 | * With EKT, the tag_len parameter is actually the base tag |
| 144 | * length |
| 145 | */ |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 146 | srtp_err_status_t srtp_ekt_tag_verification_preproces(uint8_t *pkt_tag, uint8_t *pkt_tag_copy, unsigned tag_len); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 147 | |
jfigus | c5887e7 | 2014-11-06 09:46:18 -0500 | [diff] [blame] | 148 | srtp_err_status_t srtp_ekt_tag_verification_postproces(uint8_t *pkt_tag, uint8_t *pkt_tag_copy, unsigned tag_len); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 149 | |
| 150 | |
| 151 | /* |
| 152 | * @brief EKT pre-processing for srtcp tag generation |
| 153 | * |
| 154 | * This function does the pre-processing of the SRTCP authentication |
| 155 | * tag format. When EKT is used, it consists of writing the Encrypted |
| 156 | * Master Key, the SRTP ROC, the Initial Sequence Number, and SPI |
| 157 | * fields. The Base Authentication Tag field is set to the all-zero |
| 158 | * value |
| 159 | * |
| 160 | * When EKT is not used, this function is a no-op. |
| 161 | * |
| 162 | */ |
jfigus | 857009c | 2014-11-05 11:17:43 -0500 | [diff] [blame] | 163 | srtp_err_status_t srtp_stream_srtcp_auth_tag_generation_preprocess(const srtp_stream_t *s, uint8_t *pkt_tag, unsigned pkt_octet_len); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 164 | |
| 165 | /* it's not clear that a tag_generation_postprocess function is needed */ |
jfigus | 857009c | 2014-11-05 11:17:43 -0500 | [diff] [blame] | 166 | srtp_err_status_t srtcp_auth_tag_generation_postprocess(void); |
David McGrew | 79870d6 | 2007-06-15 18:17:39 +0000 | [diff] [blame] | 167 | |
| 168 | |
| 169 | #ifdef __cplusplus |
| 170 | } |
| 171 | #endif |
| 172 | |
| 173 | #endif /* EKT_H */ |