xref: /aosp_15_r20/external/libsrtp2/crypto/hash/hmac.c (revision 90e502c7aef8d77d0622bb67d75435c6190cfc1a)
1*90e502c7SAndroid Build Coastguard Worker /*
2*90e502c7SAndroid Build Coastguard Worker  * hmac.c
3*90e502c7SAndroid Build Coastguard Worker  *
4*90e502c7SAndroid Build Coastguard Worker  * implementation of hmac srtp_auth_type_t
5*90e502c7SAndroid Build Coastguard Worker  *
6*90e502c7SAndroid Build Coastguard Worker  * David A. McGrew
7*90e502c7SAndroid Build Coastguard Worker  * Cisco Systems, Inc.
8*90e502c7SAndroid Build Coastguard Worker  */
9*90e502c7SAndroid Build Coastguard Worker /*
10*90e502c7SAndroid Build Coastguard Worker  *
11*90e502c7SAndroid Build Coastguard Worker  * Copyright(c) 2001-2017 Cisco Systems, Inc.
12*90e502c7SAndroid Build Coastguard Worker  * All rights reserved.
13*90e502c7SAndroid Build Coastguard Worker  *
14*90e502c7SAndroid Build Coastguard Worker  * Redistribution and use in source and binary forms, with or without
15*90e502c7SAndroid Build Coastguard Worker  * modification, are permitted provided that the following conditions
16*90e502c7SAndroid Build Coastguard Worker  * are met:
17*90e502c7SAndroid Build Coastguard Worker  *
18*90e502c7SAndroid Build Coastguard Worker  *   Redistributions of source code must retain the above copyright
19*90e502c7SAndroid Build Coastguard Worker  *   notice, this list of conditions and the following disclaimer.
20*90e502c7SAndroid Build Coastguard Worker  *
21*90e502c7SAndroid Build Coastguard Worker  *   Redistributions in binary form must reproduce the above
22*90e502c7SAndroid Build Coastguard Worker  *   copyright notice, this list of conditions and the following
23*90e502c7SAndroid Build Coastguard Worker  *   disclaimer in the documentation and/or other materials provided
24*90e502c7SAndroid Build Coastguard Worker  *   with the distribution.
25*90e502c7SAndroid Build Coastguard Worker  *
26*90e502c7SAndroid Build Coastguard Worker  *   Neither the name of the Cisco Systems, Inc. nor the names of its
27*90e502c7SAndroid Build Coastguard Worker  *   contributors may be used to endorse or promote products derived
28*90e502c7SAndroid Build Coastguard Worker  *   from this software without specific prior written permission.
29*90e502c7SAndroid Build Coastguard Worker  *
30*90e502c7SAndroid Build Coastguard Worker  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
31*90e502c7SAndroid Build Coastguard Worker  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
32*90e502c7SAndroid Build Coastguard Worker  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
33*90e502c7SAndroid Build Coastguard Worker  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
34*90e502c7SAndroid Build Coastguard Worker  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
35*90e502c7SAndroid Build Coastguard Worker  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
36*90e502c7SAndroid Build Coastguard Worker  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
37*90e502c7SAndroid Build Coastguard Worker  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
38*90e502c7SAndroid Build Coastguard Worker  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
39*90e502c7SAndroid Build Coastguard Worker  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
40*90e502c7SAndroid Build Coastguard Worker  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
41*90e502c7SAndroid Build Coastguard Worker  * OF THE POSSIBILITY OF SUCH DAMAGE.
42*90e502c7SAndroid Build Coastguard Worker  *
43*90e502c7SAndroid Build Coastguard Worker  */
44*90e502c7SAndroid Build Coastguard Worker 
45*90e502c7SAndroid Build Coastguard Worker #ifdef HAVE_CONFIG_H
46*90e502c7SAndroid Build Coastguard Worker #include <config.h>
47*90e502c7SAndroid Build Coastguard Worker #endif
48*90e502c7SAndroid Build Coastguard Worker 
49*90e502c7SAndroid Build Coastguard Worker #include "hmac.h"
50*90e502c7SAndroid Build Coastguard Worker #include "alloc.h"
51*90e502c7SAndroid Build Coastguard Worker #include "cipher_types.h"
52*90e502c7SAndroid Build Coastguard Worker 
53*90e502c7SAndroid Build Coastguard Worker /* the debug module for authentiation */
54*90e502c7SAndroid Build Coastguard Worker 
55*90e502c7SAndroid Build Coastguard Worker srtp_debug_module_t srtp_mod_hmac = {
56*90e502c7SAndroid Build Coastguard Worker     0,           /* debugging is off by default */
57*90e502c7SAndroid Build Coastguard Worker     "hmac sha-1" /* printable name for module   */
58*90e502c7SAndroid Build Coastguard Worker };
59*90e502c7SAndroid Build Coastguard Worker 
srtp_hmac_alloc(srtp_auth_t ** a,int key_len,int out_len)60*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_alloc(srtp_auth_t **a,
61*90e502c7SAndroid Build Coastguard Worker                                          int key_len,
62*90e502c7SAndroid Build Coastguard Worker                                          int out_len)
63*90e502c7SAndroid Build Coastguard Worker {
64*90e502c7SAndroid Build Coastguard Worker     extern const srtp_auth_type_t srtp_hmac;
65*90e502c7SAndroid Build Coastguard Worker     uint8_t *pointer;
66*90e502c7SAndroid Build Coastguard Worker 
67*90e502c7SAndroid Build Coastguard Worker     debug_print(srtp_mod_hmac, "allocating auth func with key length %d",
68*90e502c7SAndroid Build Coastguard Worker                 key_len);
69*90e502c7SAndroid Build Coastguard Worker     debug_print(srtp_mod_hmac, "                          tag length %d",
70*90e502c7SAndroid Build Coastguard Worker                 out_len);
71*90e502c7SAndroid Build Coastguard Worker 
72*90e502c7SAndroid Build Coastguard Worker     /*
73*90e502c7SAndroid Build Coastguard Worker      * check key length - note that we don't support keys larger
74*90e502c7SAndroid Build Coastguard Worker      * than 20 bytes yet
75*90e502c7SAndroid Build Coastguard Worker      */
76*90e502c7SAndroid Build Coastguard Worker     if (key_len > 20) {
77*90e502c7SAndroid Build Coastguard Worker         return srtp_err_status_bad_param;
78*90e502c7SAndroid Build Coastguard Worker     }
79*90e502c7SAndroid Build Coastguard Worker 
80*90e502c7SAndroid Build Coastguard Worker     /* check output length - should be less than 20 bytes */
81*90e502c7SAndroid Build Coastguard Worker     if (out_len > 20) {
82*90e502c7SAndroid Build Coastguard Worker         return srtp_err_status_bad_param;
83*90e502c7SAndroid Build Coastguard Worker     }
84*90e502c7SAndroid Build Coastguard Worker 
85*90e502c7SAndroid Build Coastguard Worker     /* allocate memory for auth and srtp_hmac_ctx_t structures */
86*90e502c7SAndroid Build Coastguard Worker     pointer = (uint8_t *)srtp_crypto_alloc(sizeof(srtp_hmac_ctx_t) +
87*90e502c7SAndroid Build Coastguard Worker                                            sizeof(srtp_auth_t));
88*90e502c7SAndroid Build Coastguard Worker     if (pointer == NULL) {
89*90e502c7SAndroid Build Coastguard Worker         return srtp_err_status_alloc_fail;
90*90e502c7SAndroid Build Coastguard Worker     }
91*90e502c7SAndroid Build Coastguard Worker 
92*90e502c7SAndroid Build Coastguard Worker     /* set pointers */
93*90e502c7SAndroid Build Coastguard Worker     *a = (srtp_auth_t *)pointer;
94*90e502c7SAndroid Build Coastguard Worker     (*a)->type = &srtp_hmac;
95*90e502c7SAndroid Build Coastguard Worker     (*a)->state = pointer + sizeof(srtp_auth_t);
96*90e502c7SAndroid Build Coastguard Worker     (*a)->out_len = out_len;
97*90e502c7SAndroid Build Coastguard Worker     (*a)->key_len = key_len;
98*90e502c7SAndroid Build Coastguard Worker     (*a)->prefix_len = 0;
99*90e502c7SAndroid Build Coastguard Worker 
100*90e502c7SAndroid Build Coastguard Worker     return srtp_err_status_ok;
101*90e502c7SAndroid Build Coastguard Worker }
102*90e502c7SAndroid Build Coastguard Worker 
srtp_hmac_dealloc(srtp_auth_t * a)103*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_dealloc(srtp_auth_t *a)
104*90e502c7SAndroid Build Coastguard Worker {
105*90e502c7SAndroid Build Coastguard Worker     /* zeroize entire state*/
106*90e502c7SAndroid Build Coastguard Worker     octet_string_set_to_zero(a, sizeof(srtp_hmac_ctx_t) + sizeof(srtp_auth_t));
107*90e502c7SAndroid Build Coastguard Worker 
108*90e502c7SAndroid Build Coastguard Worker     /* free memory */
109*90e502c7SAndroid Build Coastguard Worker     srtp_crypto_free(a);
110*90e502c7SAndroid Build Coastguard Worker 
111*90e502c7SAndroid Build Coastguard Worker     return srtp_err_status_ok;
112*90e502c7SAndroid Build Coastguard Worker }
113*90e502c7SAndroid Build Coastguard Worker 
srtp_hmac_init(void * statev,const uint8_t * key,int key_len)114*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_init(void *statev,
115*90e502c7SAndroid Build Coastguard Worker                                         const uint8_t *key,
116*90e502c7SAndroid Build Coastguard Worker                                         int key_len)
117*90e502c7SAndroid Build Coastguard Worker {
118*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_ctx_t *state = (srtp_hmac_ctx_t *)statev;
119*90e502c7SAndroid Build Coastguard Worker     int i;
120*90e502c7SAndroid Build Coastguard Worker     uint8_t ipad[64];
121*90e502c7SAndroid Build Coastguard Worker 
122*90e502c7SAndroid Build Coastguard Worker     /*
123*90e502c7SAndroid Build Coastguard Worker      * check key length - note that we don't support keys larger
124*90e502c7SAndroid Build Coastguard Worker      * than 20 bytes yet
125*90e502c7SAndroid Build Coastguard Worker      */
126*90e502c7SAndroid Build Coastguard Worker     if (key_len > 20) {
127*90e502c7SAndroid Build Coastguard Worker         return srtp_err_status_bad_param;
128*90e502c7SAndroid Build Coastguard Worker     }
129*90e502c7SAndroid Build Coastguard Worker 
130*90e502c7SAndroid Build Coastguard Worker     /*
131*90e502c7SAndroid Build Coastguard Worker      * set values of ipad and opad by exoring the key into the
132*90e502c7SAndroid Build Coastguard Worker      * appropriate constant values
133*90e502c7SAndroid Build Coastguard Worker      */
134*90e502c7SAndroid Build Coastguard Worker     for (i = 0; i < key_len; i++) {
135*90e502c7SAndroid Build Coastguard Worker         ipad[i] = key[i] ^ 0x36;
136*90e502c7SAndroid Build Coastguard Worker         state->opad[i] = key[i] ^ 0x5c;
137*90e502c7SAndroid Build Coastguard Worker     }
138*90e502c7SAndroid Build Coastguard Worker     /* set the rest of ipad, opad to constant values */
139*90e502c7SAndroid Build Coastguard Worker     for (; i < 64; i++) {
140*90e502c7SAndroid Build Coastguard Worker         ipad[i] = 0x36;
141*90e502c7SAndroid Build Coastguard Worker         ((uint8_t *)state->opad)[i] = 0x5c;
142*90e502c7SAndroid Build Coastguard Worker     }
143*90e502c7SAndroid Build Coastguard Worker 
144*90e502c7SAndroid Build Coastguard Worker     debug_print(srtp_mod_hmac, "ipad: %s",
145*90e502c7SAndroid Build Coastguard Worker                 srtp_octet_string_hex_string(ipad, 64));
146*90e502c7SAndroid Build Coastguard Worker 
147*90e502c7SAndroid Build Coastguard Worker     /* initialize sha1 context */
148*90e502c7SAndroid Build Coastguard Worker     srtp_sha1_init(&state->init_ctx);
149*90e502c7SAndroid Build Coastguard Worker 
150*90e502c7SAndroid Build Coastguard Worker     /* hash ipad ^ key */
151*90e502c7SAndroid Build Coastguard Worker     srtp_sha1_update(&state->init_ctx, ipad, 64);
152*90e502c7SAndroid Build Coastguard Worker     memcpy(&state->ctx, &state->init_ctx, sizeof(srtp_sha1_ctx_t));
153*90e502c7SAndroid Build Coastguard Worker 
154*90e502c7SAndroid Build Coastguard Worker     return srtp_err_status_ok;
155*90e502c7SAndroid Build Coastguard Worker }
156*90e502c7SAndroid Build Coastguard Worker 
srtp_hmac_start(void * statev)157*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_start(void *statev)
158*90e502c7SAndroid Build Coastguard Worker {
159*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_ctx_t *state = (srtp_hmac_ctx_t *)statev;
160*90e502c7SAndroid Build Coastguard Worker 
161*90e502c7SAndroid Build Coastguard Worker     memcpy(&state->ctx, &state->init_ctx, sizeof(srtp_sha1_ctx_t));
162*90e502c7SAndroid Build Coastguard Worker 
163*90e502c7SAndroid Build Coastguard Worker     return srtp_err_status_ok;
164*90e502c7SAndroid Build Coastguard Worker }
165*90e502c7SAndroid Build Coastguard Worker 
srtp_hmac_update(void * statev,const uint8_t * message,int msg_octets)166*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_update(void *statev,
167*90e502c7SAndroid Build Coastguard Worker                                           const uint8_t *message,
168*90e502c7SAndroid Build Coastguard Worker                                           int msg_octets)
169*90e502c7SAndroid Build Coastguard Worker {
170*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_ctx_t *state = (srtp_hmac_ctx_t *)statev;
171*90e502c7SAndroid Build Coastguard Worker 
172*90e502c7SAndroid Build Coastguard Worker     debug_print(srtp_mod_hmac, "input: %s",
173*90e502c7SAndroid Build Coastguard Worker                 srtp_octet_string_hex_string(message, msg_octets));
174*90e502c7SAndroid Build Coastguard Worker 
175*90e502c7SAndroid Build Coastguard Worker     /* hash message into sha1 context */
176*90e502c7SAndroid Build Coastguard Worker     srtp_sha1_update(&state->ctx, message, msg_octets);
177*90e502c7SAndroid Build Coastguard Worker 
178*90e502c7SAndroid Build Coastguard Worker     return srtp_err_status_ok;
179*90e502c7SAndroid Build Coastguard Worker }
180*90e502c7SAndroid Build Coastguard Worker 
srtp_hmac_compute(void * statev,const uint8_t * message,int msg_octets,int tag_len,uint8_t * result)181*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_compute(void *statev,
182*90e502c7SAndroid Build Coastguard Worker                                            const uint8_t *message,
183*90e502c7SAndroid Build Coastguard Worker                                            int msg_octets,
184*90e502c7SAndroid Build Coastguard Worker                                            int tag_len,
185*90e502c7SAndroid Build Coastguard Worker                                            uint8_t *result)
186*90e502c7SAndroid Build Coastguard Worker {
187*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_ctx_t *state = (srtp_hmac_ctx_t *)statev;
188*90e502c7SAndroid Build Coastguard Worker     uint32_t hash_value[5];
189*90e502c7SAndroid Build Coastguard Worker     uint32_t H[5];
190*90e502c7SAndroid Build Coastguard Worker     int i;
191*90e502c7SAndroid Build Coastguard Worker 
192*90e502c7SAndroid Build Coastguard Worker     /* check tag length, return error if we can't provide the value expected */
193*90e502c7SAndroid Build Coastguard Worker     if (tag_len > 20) {
194*90e502c7SAndroid Build Coastguard Worker         return srtp_err_status_bad_param;
195*90e502c7SAndroid Build Coastguard Worker     }
196*90e502c7SAndroid Build Coastguard Worker 
197*90e502c7SAndroid Build Coastguard Worker     /* hash message, copy output into H */
198*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_update(state, message, msg_octets);
199*90e502c7SAndroid Build Coastguard Worker     srtp_sha1_final(&state->ctx, H);
200*90e502c7SAndroid Build Coastguard Worker 
201*90e502c7SAndroid Build Coastguard Worker     /*
202*90e502c7SAndroid Build Coastguard Worker      * note that we don't need to debug_print() the input, since the
203*90e502c7SAndroid Build Coastguard Worker      * function hmac_update() already did that for us
204*90e502c7SAndroid Build Coastguard Worker      */
205*90e502c7SAndroid Build Coastguard Worker     debug_print(srtp_mod_hmac, "intermediate state: %s",
206*90e502c7SAndroid Build Coastguard Worker                 srtp_octet_string_hex_string((uint8_t *)H, 20));
207*90e502c7SAndroid Build Coastguard Worker 
208*90e502c7SAndroid Build Coastguard Worker     /* re-initialize hash context */
209*90e502c7SAndroid Build Coastguard Worker     srtp_sha1_init(&state->ctx);
210*90e502c7SAndroid Build Coastguard Worker 
211*90e502c7SAndroid Build Coastguard Worker     /* hash opad ^ key  */
212*90e502c7SAndroid Build Coastguard Worker     srtp_sha1_update(&state->ctx, (uint8_t *)state->opad, 64);
213*90e502c7SAndroid Build Coastguard Worker 
214*90e502c7SAndroid Build Coastguard Worker     /* hash the result of the inner hash */
215*90e502c7SAndroid Build Coastguard Worker     srtp_sha1_update(&state->ctx, (uint8_t *)H, 20);
216*90e502c7SAndroid Build Coastguard Worker 
217*90e502c7SAndroid Build Coastguard Worker     /* the result is returned in the array hash_value[] */
218*90e502c7SAndroid Build Coastguard Worker     srtp_sha1_final(&state->ctx, hash_value);
219*90e502c7SAndroid Build Coastguard Worker 
220*90e502c7SAndroid Build Coastguard Worker     /* copy hash_value to *result */
221*90e502c7SAndroid Build Coastguard Worker     for (i = 0; i < tag_len; i++) {
222*90e502c7SAndroid Build Coastguard Worker         result[i] = ((uint8_t *)hash_value)[i];
223*90e502c7SAndroid Build Coastguard Worker     }
224*90e502c7SAndroid Build Coastguard Worker 
225*90e502c7SAndroid Build Coastguard Worker     debug_print(srtp_mod_hmac, "output: %s",
226*90e502c7SAndroid Build Coastguard Worker                 srtp_octet_string_hex_string((uint8_t *)hash_value, tag_len));
227*90e502c7SAndroid Build Coastguard Worker 
228*90e502c7SAndroid Build Coastguard Worker     return srtp_err_status_ok;
229*90e502c7SAndroid Build Coastguard Worker }
230*90e502c7SAndroid Build Coastguard Worker 
231*90e502c7SAndroid Build Coastguard Worker /* begin test case 0 */
232*90e502c7SAndroid Build Coastguard Worker /* clang-format off */
233*90e502c7SAndroid Build Coastguard Worker static const uint8_t srtp_hmac_test_case_0_key[20] = {
234*90e502c7SAndroid Build Coastguard Worker     0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
235*90e502c7SAndroid Build Coastguard Worker     0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
236*90e502c7SAndroid Build Coastguard Worker     0x0b, 0x0b, 0x0b, 0x0b
237*90e502c7SAndroid Build Coastguard Worker };
238*90e502c7SAndroid Build Coastguard Worker /* clang-format on */
239*90e502c7SAndroid Build Coastguard Worker 
240*90e502c7SAndroid Build Coastguard Worker /* clang-format off */
241*90e502c7SAndroid Build Coastguard Worker static const uint8_t srtp_hmac_test_case_0_data[8] = {
242*90e502c7SAndroid Build Coastguard Worker     0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 /* "Hi There" */
243*90e502c7SAndroid Build Coastguard Worker };
244*90e502c7SAndroid Build Coastguard Worker /* clang-format on */
245*90e502c7SAndroid Build Coastguard Worker 
246*90e502c7SAndroid Build Coastguard Worker /* clang-format off */
247*90e502c7SAndroid Build Coastguard Worker static const uint8_t srtp_hmac_test_case_0_tag[20] = {
248*90e502c7SAndroid Build Coastguard Worker     0xb6, 0x17, 0x31, 0x86, 0x55, 0x05, 0x72, 0x64,
249*90e502c7SAndroid Build Coastguard Worker     0xe2, 0x8b, 0xc0, 0xb6, 0xfb, 0x37, 0x8c, 0x8e,
250*90e502c7SAndroid Build Coastguard Worker     0xf1, 0x46, 0xbe, 0x00
251*90e502c7SAndroid Build Coastguard Worker };
252*90e502c7SAndroid Build Coastguard Worker /* clang-format on */
253*90e502c7SAndroid Build Coastguard Worker 
254*90e502c7SAndroid Build Coastguard Worker static const srtp_auth_test_case_t srtp_hmac_test_case_0 = {
255*90e502c7SAndroid Build Coastguard Worker     20,                         /* octets in key            */
256*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_test_case_0_key,  /* key                      */
257*90e502c7SAndroid Build Coastguard Worker     8,                          /* octets in data           */
258*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_test_case_0_data, /* data                     */
259*90e502c7SAndroid Build Coastguard Worker     20,                         /* octets in tag            */
260*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_test_case_0_tag,  /* tag                      */
261*90e502c7SAndroid Build Coastguard Worker     NULL                        /* pointer to next testcase */
262*90e502c7SAndroid Build Coastguard Worker };
263*90e502c7SAndroid Build Coastguard Worker 
264*90e502c7SAndroid Build Coastguard Worker /* end test case 0 */
265*90e502c7SAndroid Build Coastguard Worker 
266*90e502c7SAndroid Build Coastguard Worker static const char srtp_hmac_description[] =
267*90e502c7SAndroid Build Coastguard Worker     "hmac sha-1 authentication function";
268*90e502c7SAndroid Build Coastguard Worker 
269*90e502c7SAndroid Build Coastguard Worker /*
270*90e502c7SAndroid Build Coastguard Worker  * srtp_auth_type_t hmac is the hmac metaobject
271*90e502c7SAndroid Build Coastguard Worker  */
272*90e502c7SAndroid Build Coastguard Worker 
273*90e502c7SAndroid Build Coastguard Worker const srtp_auth_type_t srtp_hmac = {
274*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_alloc,        /* */
275*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_dealloc,      /* */
276*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_init,         /* */
277*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_compute,      /* */
278*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_update,       /* */
279*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_start,        /* */
280*90e502c7SAndroid Build Coastguard Worker     srtp_hmac_description,  /* */
281*90e502c7SAndroid Build Coastguard Worker     &srtp_hmac_test_case_0, /* */
282*90e502c7SAndroid Build Coastguard Worker     SRTP_HMAC_SHA1          /* */
283*90e502c7SAndroid Build Coastguard Worker };
284