webkit  2cdf99a9e3038c7e01b3c37e8ad903ecbe5eecf1
https://github.com/WebKit/webkit
ekt.h
Go to the documentation of this file.
1 /*
2  * ekt.h
3  *
4  * interface to Encrypted Key Transport for SRTP
5  *
6  * David McGrew
7  * Cisco Systems, Inc.
8  */
9 /*
10  *
11  * Copyright (c) 2001-2005 Cisco Systems, Inc.
12  * All rights reserved.
13  *
14  * Redistribution and use in source and binary forms, with or without
15  * modification, are permitted provided that the following conditions
16  * are met:
17  *
18  * Redistributions of source code must retain the above copyright
19  * notice, this list of conditions and the following disclaimer.
20  *
21  * Redistributions in binary form must reproduce the above
22  * copyright notice, this list of conditions and the following
23  * disclaimer in the documentation and/or other materials provided
24  * with the distribution.
25  *
26  * Neither the name of the Cisco Systems, Inc. nor the names of its
27  * contributors may be used to endorse or promote products derived
28  * from this software without specific prior written permission.
29  *
30  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
31  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
32  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
33  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
34  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
35  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
36  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
37  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
38  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
39  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
40  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
41  * OF THE POSSIBILITY OF SUCH DAMAGE.
42  *
43  */
44 
45 
46 
47 /*
48  * EKT implementation strategy
49  *
50  * use stream_template approach
51  *
52  * in srtp_unprotect, when a new stream appears, check if template has
53  * EKT defined, and if it does, then apply EKT processing
54  *
55  * question: will we want to allow key-sharing templates in addition
56  * to EKT templates? could define a new ssrc_type_t that's associated
57  * with an EKT, e.g. ssrc_any_ekt.
58  *
59  *
60  */
61 
62 #ifndef EKT_H
63 #define EKT_H
64 
65 #include "srtp_priv.h"
66 
67 #ifdef __cplusplus
68 extern "C" {
69 #endif
70 
71 #define SRTP_EKT_CIPHER_DEFAULT 1
72 #define SRTP_EKT_CIPHER_AES_128_ECB 1
73 #define SRTP_EKT_CIPHER_AES_192_KEY_WRAP 2
74 #define SRTP_EKT_CIPHER_AES_256_KEY_WRAP 3
75 
77 
78 
80 
81 /*
82  * an srtp_policy_t structure can contain a pointer to an
83  * srtp_ekt_policy_t structure
84  *
85  * this structure holds all of the high level EKT information, and it
86  * is passed into libsrtp to indicate what policy should be in effect
87  */
88 
89 typedef struct srtp_ekt_policy_ctx_t {
90  srtp_ekt_spi_t spi; /* security parameter index */
95 
96 
97 /*
98  * an srtp_ekt_data_t structure holds the data corresponding to an ekt key,
99  * spi, and so on
100  */
101 
102 typedef struct srtp_ekt_data_t {
103  srtp_ekt_spi_t spi;
107  struct ekt_data_t *next_ekt_data;
109 
110 /*
111  * an srtp_stream_ctx_t can contain an srtp_ekt_stream_ctx_t
112  *
113  * an srtp_ekt_stream_ctx_t structure holds all of the EKT information for
114  * a specific SRTP stream
115  */
116 
117 typedef struct srtp_ekt_stream_ctx_t {
119  uint16_t isn; /* initial sequence number */
120  uint8_t encrypted_master_key[SRTP_MAX_KEY_LEN];
122 
123 
124 
126 
128 
130 
131 
132 
133 srtp_err_status_t srtp_stream_init_from_ekt(srtp_stream_t stream, const void *srtcp_hdr, unsigned pkt_octet_len);
134 
135 
136 void srtp_ekt_write_data(srtp_ekt_stream_t ekt, uint8_t *base_tag, unsigned base_tag_len, int *packet_len, srtp_xtd_seq_num_t pkt_index);
137 
138 /*
139  * We handle EKT by performing some additional steps before
140  * authentication (copying the auth tag into a temporary location,
141  * zeroizing the "base tag" field in the packet)
142  *
143  * With EKT, the tag_len parameter is actually the base tag
144  * length
145  */
146 srtp_err_status_t srtp_ekt_tag_verification_preproces(uint8_t *pkt_tag, uint8_t *pkt_tag_copy, unsigned tag_len);
147 
148 srtp_err_status_t srtp_ekt_tag_verification_postproces(uint8_t *pkt_tag, uint8_t *pkt_tag_copy, unsigned tag_len);
149 
150 
151 /*
152  * @brief EKT pre-processing for srtcp tag generation
153  *
154  * This function does the pre-processing of the SRTCP authentication
155  * tag format. When EKT is used, it consists of writing the Encrypted
156  * Master Key, the SRTP ROC, the Initial Sequence Number, and SPI
157  * fields. The Base Authentication Tag field is set to the all-zero
158  * value
159  *
160  * When EKT is not used, this function is a no-op.
161  *
162  */
164 
165 /* it's not clear that a tag_generation_postprocess function is needed */
167 
168 
169 #ifdef __cplusplus
170 }
171 #endif
172 
173 #endif /* EKT_H */
srtp_ekt_spi_t spi
Definition: ekt.h:103
srtp_ekt_data_t * data
Definition: ekt.h:118
struct srtp_ekt_stream_ctx_t srtp_ekt_stream_ctx_t
EGLStreamKHR stream
Definition: eglext.h:340
DOMString p
Definition: WebCryptoAPI.idl:116
void srtp_ekt_write_data(srtp_ekt_stream_t ekt, uint8_t *base_tag, unsigned base_tag_len, int *packet_len, srtp_xtd_seq_num_t pkt_index)
Definition: ekt.c:191
srtp_err_status_t srtp_ekt_stream_init(srtp_ekt_stream_t e, srtp_ekt_spi_t spi, void *ekt_key, unsigned ekt_cipher_type)
uint16_t srtp_ekt_spi_t
Definition: ekt.h:76
srtp_err_status_t srtp_stream_init_from_ekt(srtp_stream_t stream, const void *srtcp_hdr, unsigned pkt_octet_len)
Definition: ekt.c:157
uint16_t isn
Definition: ekt.h:119
struct ekt_data_t * next_ekt_data
Definition: ekt.h:107
Definition: ekt.h:89
struct srtp_ekt_data_t srtp_ekt_data_t
srtp_ekt_spi_t spi
Definition: ekt.h:90
srtp_aes_expanded_key_t ekt_dec_key
Definition: ekt.h:106
Definition: ekt.h:117
uint8_t ekt_cipher_type
Definition: ekt.h:104
uint64_t srtp_xtd_seq_num_t
Definition: rdbx.h:78
unsigned char uint8_t
Definition: ptypes.h:89
unsigned short uint16_t
Definition: ptypes.h:97
struct srtp_ekt_policy_ctx_t * next_ekt_policy
Definition: ekt.h:93
srtp_err_status_t srtp_ekt_stream_init_from_policy(srtp_ekt_stream_t e, srtp_ekt_policy_t p)
Definition: ekt.c:134
srtp_err_status_t srtcp_auth_tag_generation_postprocess(void)
Definition: srtp_priv.h:108
struct A s
srtp_err_status_t srtp_ekt_tag_verification_postproces(uint8_t *pkt_tag, uint8_t *pkt_tag_copy, unsigned tag_len)
srtp_err_status_t srtp_stream_srtcp_auth_tag_generation_preprocess(const srtp_stream_t *s, uint8_t *pkt_tag, unsigned pkt_octet_len)
srtp_aes_expanded_key_t ekt_enc_key
Definition: ekt.h:105
DOMString e
Definition: WebCryptoAPI.idl:115
srtp_err_status_t
Definition: srtp.h:245
srtp_err_status_t srtp_ekt_tag_verification_preproces(uint8_t *pkt_tag, uint8_t *pkt_tag_copy, unsigned tag_len)
struct srtp_ekt_policy_ctx_t srtp_ekt_policy_ctx_t
uint8_t * ekt_key
Definition: ekt.h:92
Definition: ekt.h:102
srtp_err_status_t srtp_ekt_alloc(srtp_ekt_stream_t *stream_data, srtp_ekt_policy_t policy)
Definition: ekt.c:117
Definition: aes.h:58
unsigned srtp_ekt_octets_after_base_tag(srtp_ekt_stream_t ekt)
Definition: ekt.c:74
#define SRTP_MAX_KEY_LEN
Definition: srtp.h:73
uint8_t ekt_cipher_type
Definition: ekt.h:91