blob: d4383f1f4c4c9c2235a6b54d9daa26ce132ca931 [file] [log] [blame]
henrike@webrtc.orga7b98182014-02-21 15:51:43 +00001/*
kjellander65c7f672016-02-12 00:05:01 -08002 * Copyright 2014 The WebRTC project authors. All Rights Reserved.
henrike@webrtc.orga7b98182014-02-21 15:51:43 +00003 *
kjellander65c7f672016-02-12 00:05:01 -08004 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
henrike@webrtc.orga7b98182014-02-21 15:51:43 +00009 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "pc/externalhmac.h"
henrike@webrtc.org2d213e42014-03-06 18:51:21 +000012
13#include <stdlib.h> // For malloc/free.
14
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020015#include "rtc_base/logging.h"
Joachim Bauch5b32f232018-03-07 20:02:26 +010016#include "rtc_base/zero_memory.h"
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000017
mattdr0d8ade52016-10-25 09:47:26 -070018#include "third_party/libsrtp/crypto/include/crypto_kernel.h"
19#include "third_party/libsrtp/include/srtp.h"
mattdr51f29192016-09-28 14:08:46 -070020
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000021// Begin test case 0 */
henrike@webrtc.org8b610112014-03-18 21:39:10 +000022static const uint8_t kExternalHmacTestCase0Key[20] = {
Yves Gerey665174f2018-06-19 15:03:05 +020023 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
24 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b};
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000025
henrike@webrtc.org8b610112014-03-18 21:39:10 +000026static const uint8_t kExternalHmacTestCase0Data[8] = {
Yves Gerey665174f2018-06-19 15:03:05 +020027 0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 // "Hi There"
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000028};
29
Yves Gerey665174f2018-06-19 15:03:05 +020030static const uint8_t kExternalHmacFakeTag[10] = {0xba, 0xdd, 0xba, 0xdd, 0xba,
31 0xdd, 0xba, 0xdd, 0xba, 0xdd};
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000032
mattdr8cab52d2016-10-10 15:33:37 -070033static const srtp_auth_test_case_t kExternalHmacTestCase0 = {
Yves Gerey665174f2018-06-19 15:03:05 +020034 20, // Octets in key
35 const_cast<uint8_t*>(kExternalHmacTestCase0Key), // Key
36 8, // Octets in data
37 const_cast<uint8_t*>(kExternalHmacTestCase0Data), // Data
38 10, // Octets in tag
39 const_cast<uint8_t*>(kExternalHmacFakeTag), // Tag
40 NULL // Pointer to next
41 // testcase
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000042};
43
henrike@webrtc.org8b610112014-03-18 21:39:10 +000044static const char kExternalHmacDescription[] =
45 "external hmac sha-1 authentication";
46
mattdr8cab52d2016-10-10 15:33:37 -070047// srtp_auth_type_t external_hmac is the hmac metaobject
henrike@webrtc.org8b610112014-03-18 21:39:10 +000048
Yves Gerey665174f2018-06-19 15:03:05 +020049static const srtp_auth_type_t external_hmac = {
50 external_hmac_alloc,
51 external_hmac_dealloc,
52 external_hmac_init,
53 external_hmac_compute,
54 external_hmac_update,
55 external_hmac_start,
56 const_cast<char*>(kExternalHmacDescription),
57 const_cast<srtp_auth_test_case_t*>(&kExternalHmacTestCase0),
58 EXTERNAL_HMAC_SHA1};
henrike@webrtc.org8b610112014-03-18 21:39:10 +000059
mattdr8cab52d2016-10-10 15:33:37 -070060srtp_err_status_t external_hmac_alloc(srtp_auth_t** a,
61 int key_len,
62 int out_len) {
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000063 uint8_t* pointer;
64
65 // Check key length - note that we don't support keys larger
66 // than 20 bytes yet
67 if (key_len > 20)
mattdr8cab52d2016-10-10 15:33:37 -070068 return srtp_err_status_bad_param;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000069
70 // Check output length - should be less than 20 bytes/
71 if (out_len > 20)
mattdr8cab52d2016-10-10 15:33:37 -070072 return srtp_err_status_bad_param;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000073
74 // Allocate memory for auth and hmac_ctx_t structures.
mattdr8cab52d2016-10-10 15:33:37 -070075 pointer = new uint8_t[(sizeof(ExternalHmacContext) + sizeof(srtp_auth_t))];
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000076 if (pointer == NULL)
mattdr8cab52d2016-10-10 15:33:37 -070077 return srtp_err_status_alloc_fail;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000078
79 // Set pointers
Steve Anton36b29d12017-10-30 09:57:42 -070080 *a = reinterpret_cast<srtp_auth_t*>(pointer);
henrike@webrtc.org8b610112014-03-18 21:39:10 +000081 // |external_hmac| is const and libsrtp expects |type| to be non-const.
82 // const conversion is required. |external_hmac| is constant because we don't
83 // want to increase global count in Chrome.
mattdr8cab52d2016-10-10 15:33:37 -070084 (*a)->type = const_cast<srtp_auth_type_t*>(&external_hmac);
85 (*a)->state = pointer + sizeof(srtp_auth_t);
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000086 (*a)->out_len = out_len;
87 (*a)->key_len = key_len;
88 (*a)->prefix_len = 0;
89
mattdr8cab52d2016-10-10 15:33:37 -070090 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000091}
92
mattdr8cab52d2016-10-10 15:33:37 -070093srtp_err_status_t external_hmac_dealloc(srtp_auth_t* a) {
Joachim Bauch5b32f232018-03-07 20:02:26 +010094 rtc::ExplicitZeroMemory(a, sizeof(ExternalHmacContext) + sizeof(srtp_auth_t));
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000095
96 // Free memory
henrike@webrtc.org8b610112014-03-18 21:39:10 +000097 delete[] a;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +000098
mattdr8cab52d2016-10-10 15:33:37 -070099 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000100}
101
Vlad Tsyrkleviche8e8ad82017-12-06 18:38:22 -0800102srtp_err_status_t external_hmac_init(void* state,
mattdr8cab52d2016-10-10 15:33:37 -0700103 const uint8_t* key,
104 int key_len) {
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000105 if (key_len > HMAC_KEY_LENGTH)
mattdr8cab52d2016-10-10 15:33:37 -0700106 return srtp_err_status_bad_param;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000107
Vlad Tsyrkleviche8e8ad82017-12-06 18:38:22 -0800108 ExternalHmacContext* context = static_cast<ExternalHmacContext*>(state);
Vlad Tsyrkleviche8e8ad82017-12-06 18:38:22 -0800109 memcpy(context->key, key, key_len);
110 context->key_length = key_len;
mattdr8cab52d2016-10-10 15:33:37 -0700111 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000112}
113
Vlad Tsyrkleviche8e8ad82017-12-06 18:38:22 -0800114srtp_err_status_t external_hmac_start(void* /*state*/) {
mattdr8cab52d2016-10-10 15:33:37 -0700115 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000116}
117
Vlad Tsyrkleviche8e8ad82017-12-06 18:38:22 -0800118srtp_err_status_t external_hmac_update(void* /*state*/,
119 const uint8_t* /*message*/,
120 int /*msg_octets*/) {
mattdr8cab52d2016-10-10 15:33:37 -0700121 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000122}
123
Vlad Tsyrkleviche8e8ad82017-12-06 18:38:22 -0800124srtp_err_status_t external_hmac_compute(void* /*state*/,
125 const uint8_t* /*message*/,
126 int /*msg_octets*/,
127 int tag_len,
128 uint8_t* result) {
henrike@webrtc.org8b610112014-03-18 21:39:10 +0000129 memcpy(result, kExternalHmacFakeTag, tag_len);
mattdr8cab52d2016-10-10 15:33:37 -0700130 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000131}
132
mattdr8cab52d2016-10-10 15:33:37 -0700133srtp_err_status_t external_crypto_init() {
henrike@webrtc.org8b610112014-03-18 21:39:10 +0000134 // |external_hmac| is const. const_cast is required as libsrtp expects
135 // non-const.
mattdr8cab52d2016-10-10 15:33:37 -0700136 srtp_err_status_t status = srtp_replace_auth_type(
137 const_cast<srtp_auth_type_t*>(&external_hmac), EXTERNAL_HMAC_SHA1);
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000138 if (status) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100139 RTC_LOG(LS_ERROR) << "Error in replacing default auth module, error: "
140 << status;
mattdr8cab52d2016-10-10 15:33:37 -0700141 return srtp_err_status_fail;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000142 }
mattdr8cab52d2016-10-10 15:33:37 -0700143 return srtp_err_status_ok;
henrike@webrtc.orga7b98182014-02-21 15:51:43 +0000144}