webrtc/pc/externalhmac.cc
Mirko Bonadei 675513b96a Stop using LOG macros in favor of RTC_ prefixed macros.
This CL has been generated with the following script:

for m in PLOG \
  LOG_TAG \
  LOG_GLEM \
  LOG_GLE_EX \
  LOG_GLE \
  LAST_SYSTEM_ERROR \
  LOG_ERRNO_EX \
  LOG_ERRNO \
  LOG_ERR_EX \
  LOG_ERR \
  LOG_V \
  LOG_F \
  LOG_T_F \
  LOG_E \
  LOG_T \
  LOG_CHECK_LEVEL_V \
  LOG_CHECK_LEVEL \
  LOG
do
  git grep -l $m | xargs sed -i "s,\b$m\b,RTC_$m,g"
done
git checkout rtc_base/logging.h
git cl format

Bug: webrtc:8452
Change-Id: I1a53ef3e0a5ef6e244e62b2e012b864914784600
Reviewed-on: https://webrtc-review.googlesource.com/21325
Reviewed-by: Niels Moller <nisse@webrtc.org>
Reviewed-by: Karl Wiberg <kwiberg@webrtc.org>
Commit-Queue: Mirko Bonadei <mbonadei@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#20617}
2017-11-09 11:56:32 +00:00

149 lines
5 KiB
C++

/*
* Copyright 2014 The WebRTC project authors. All Rights Reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include "pc/externalhmac.h"
#include <stdlib.h> // For malloc/free.
#include "rtc_base/logging.h"
#include "third_party/libsrtp/crypto/include/crypto_kernel.h"
#include "third_party/libsrtp/include/srtp.h"
// Begin test case 0 */
static const uint8_t kExternalHmacTestCase0Key[20] = {
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
0x0b, 0x0b, 0x0b, 0x0b
};
static const uint8_t kExternalHmacTestCase0Data[8] = {
0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 // "Hi There"
};
static const uint8_t kExternalHmacFakeTag[10] = {
0xba, 0xdd, 0xba, 0xdd, 0xba, 0xdd, 0xba, 0xdd, 0xba, 0xdd
};
static const srtp_auth_test_case_t kExternalHmacTestCase0 = {
20, // Octets in key
const_cast<uint8_t*>(kExternalHmacTestCase0Key), // Key
8, // Octets in data
const_cast<uint8_t*>(kExternalHmacTestCase0Data), // Data
10, // Octets in tag
const_cast<uint8_t*>(kExternalHmacFakeTag), // Tag
NULL // Pointer to next
// testcase
};
static const char kExternalHmacDescription[] =
"external hmac sha-1 authentication";
// srtp_auth_type_t external_hmac is the hmac metaobject
static const srtp_auth_type_t external_hmac = {
external_hmac_alloc,
external_hmac_dealloc,
(srtp_auth_init_func) external_hmac_init,
(srtp_auth_compute_func) external_hmac_compute,
(srtp_auth_update_func) external_hmac_update,
(srtp_auth_start_func) external_hmac_start,
const_cast<char*>(kExternalHmacDescription),
const_cast<srtp_auth_test_case_t*>(&kExternalHmacTestCase0),
EXTERNAL_HMAC_SHA1
};
srtp_err_status_t external_hmac_alloc(srtp_auth_t** a,
int key_len,
int out_len) {
uint8_t* pointer;
// Check key length - note that we don't support keys larger
// than 20 bytes yet
if (key_len > 20)
return srtp_err_status_bad_param;
// Check output length - should be less than 20 bytes/
if (out_len > 20)
return srtp_err_status_bad_param;
// Allocate memory for auth and hmac_ctx_t structures.
pointer = new uint8_t[(sizeof(ExternalHmacContext) + sizeof(srtp_auth_t))];
if (pointer == NULL)
return srtp_err_status_alloc_fail;
// Set pointers
*a = reinterpret_cast<srtp_auth_t*>(pointer);
// |external_hmac| is const and libsrtp expects |type| to be non-const.
// const conversion is required. |external_hmac| is constant because we don't
// want to increase global count in Chrome.
(*a)->type = const_cast<srtp_auth_type_t*>(&external_hmac);
(*a)->state = pointer + sizeof(srtp_auth_t);
(*a)->out_len = out_len;
(*a)->key_len = key_len;
(*a)->prefix_len = 0;
return srtp_err_status_ok;
}
srtp_err_status_t external_hmac_dealloc(srtp_auth_t* a) {
// Zeroize entire state
memset(reinterpret_cast<uint8_t*>(a), 0,
sizeof(ExternalHmacContext) + sizeof(srtp_auth_t));
// Free memory
delete[] a;
return srtp_err_status_ok;
}
srtp_err_status_t external_hmac_init(ExternalHmacContext* state,
const uint8_t* key,
int key_len) {
if (key_len > HMAC_KEY_LENGTH)
return srtp_err_status_bad_param;
memset(state->key, 0, key_len);
memcpy(state->key, key, key_len);
state->key_length = key_len;
return srtp_err_status_ok;
}
srtp_err_status_t external_hmac_start(ExternalHmacContext* state) {
return srtp_err_status_ok;
}
srtp_err_status_t external_hmac_update(ExternalHmacContext* state,
const uint8_t* message,
int msg_octets) {
return srtp_err_status_ok;
}
srtp_err_status_t external_hmac_compute(ExternalHmacContext* state,
const void* message,
int msg_octets,
int tag_len,
uint8_t* result) {
memcpy(result, kExternalHmacFakeTag, tag_len);
return srtp_err_status_ok;
}
srtp_err_status_t external_crypto_init() {
// |external_hmac| is const. const_cast is required as libsrtp expects
// non-const.
srtp_err_status_t status = srtp_replace_auth_type(
const_cast<srtp_auth_type_t*>(&external_hmac), EXTERNAL_HMAC_SHA1);
if (status) {
RTC_LOG(LS_ERROR) << "Error in replacing default auth module, error: "
<< status;
return srtp_err_status_fail;
}
return srtp_err_status_ok;
}