1*90e502c7SAndroid Build Coastguard Worker /*
2*90e502c7SAndroid Build Coastguard Worker * hmac.c
3*90e502c7SAndroid Build Coastguard Worker *
4*90e502c7SAndroid Build Coastguard Worker * implementation of hmac srtp_auth_type_t
5*90e502c7SAndroid Build Coastguard Worker *
6*90e502c7SAndroid Build Coastguard Worker * David A. McGrew
7*90e502c7SAndroid Build Coastguard Worker * Cisco Systems, Inc.
8*90e502c7SAndroid Build Coastguard Worker */
9*90e502c7SAndroid Build Coastguard Worker /*
10*90e502c7SAndroid Build Coastguard Worker *
11*90e502c7SAndroid Build Coastguard Worker * Copyright(c) 2001-2017 Cisco Systems, Inc.
12*90e502c7SAndroid Build Coastguard Worker * All rights reserved.
13*90e502c7SAndroid Build Coastguard Worker *
14*90e502c7SAndroid Build Coastguard Worker * Redistribution and use in source and binary forms, with or without
15*90e502c7SAndroid Build Coastguard Worker * modification, are permitted provided that the following conditions
16*90e502c7SAndroid Build Coastguard Worker * are met:
17*90e502c7SAndroid Build Coastguard Worker *
18*90e502c7SAndroid Build Coastguard Worker * Redistributions of source code must retain the above copyright
19*90e502c7SAndroid Build Coastguard Worker * notice, this list of conditions and the following disclaimer.
20*90e502c7SAndroid Build Coastguard Worker *
21*90e502c7SAndroid Build Coastguard Worker * Redistributions in binary form must reproduce the above
22*90e502c7SAndroid Build Coastguard Worker * copyright notice, this list of conditions and the following
23*90e502c7SAndroid Build Coastguard Worker * disclaimer in the documentation and/or other materials provided
24*90e502c7SAndroid Build Coastguard Worker * with the distribution.
25*90e502c7SAndroid Build Coastguard Worker *
26*90e502c7SAndroid Build Coastguard Worker * Neither the name of the Cisco Systems, Inc. nor the names of its
27*90e502c7SAndroid Build Coastguard Worker * contributors may be used to endorse or promote products derived
28*90e502c7SAndroid Build Coastguard Worker * from this software without specific prior written permission.
29*90e502c7SAndroid Build Coastguard Worker *
30*90e502c7SAndroid Build Coastguard Worker * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
31*90e502c7SAndroid Build Coastguard Worker * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
32*90e502c7SAndroid Build Coastguard Worker * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
33*90e502c7SAndroid Build Coastguard Worker * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
34*90e502c7SAndroid Build Coastguard Worker * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
35*90e502c7SAndroid Build Coastguard Worker * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
36*90e502c7SAndroid Build Coastguard Worker * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
37*90e502c7SAndroid Build Coastguard Worker * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
38*90e502c7SAndroid Build Coastguard Worker * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
39*90e502c7SAndroid Build Coastguard Worker * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
40*90e502c7SAndroid Build Coastguard Worker * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
41*90e502c7SAndroid Build Coastguard Worker * OF THE POSSIBILITY OF SUCH DAMAGE.
42*90e502c7SAndroid Build Coastguard Worker *
43*90e502c7SAndroid Build Coastguard Worker */
44*90e502c7SAndroid Build Coastguard Worker
45*90e502c7SAndroid Build Coastguard Worker #ifdef HAVE_CONFIG_H
46*90e502c7SAndroid Build Coastguard Worker #include <config.h>
47*90e502c7SAndroid Build Coastguard Worker #endif
48*90e502c7SAndroid Build Coastguard Worker
49*90e502c7SAndroid Build Coastguard Worker #include "hmac.h"
50*90e502c7SAndroid Build Coastguard Worker #include "alloc.h"
51*90e502c7SAndroid Build Coastguard Worker #include "cipher_types.h"
52*90e502c7SAndroid Build Coastguard Worker
53*90e502c7SAndroid Build Coastguard Worker /* the debug module for authentiation */
54*90e502c7SAndroid Build Coastguard Worker
55*90e502c7SAndroid Build Coastguard Worker srtp_debug_module_t srtp_mod_hmac = {
56*90e502c7SAndroid Build Coastguard Worker 0, /* debugging is off by default */
57*90e502c7SAndroid Build Coastguard Worker "hmac sha-1" /* printable name for module */
58*90e502c7SAndroid Build Coastguard Worker };
59*90e502c7SAndroid Build Coastguard Worker
srtp_hmac_alloc(srtp_auth_t ** a,int key_len,int out_len)60*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_alloc(srtp_auth_t **a,
61*90e502c7SAndroid Build Coastguard Worker int key_len,
62*90e502c7SAndroid Build Coastguard Worker int out_len)
63*90e502c7SAndroid Build Coastguard Worker {
64*90e502c7SAndroid Build Coastguard Worker extern const srtp_auth_type_t srtp_hmac;
65*90e502c7SAndroid Build Coastguard Worker uint8_t *pointer;
66*90e502c7SAndroid Build Coastguard Worker
67*90e502c7SAndroid Build Coastguard Worker debug_print(srtp_mod_hmac, "allocating auth func with key length %d",
68*90e502c7SAndroid Build Coastguard Worker key_len);
69*90e502c7SAndroid Build Coastguard Worker debug_print(srtp_mod_hmac, " tag length %d",
70*90e502c7SAndroid Build Coastguard Worker out_len);
71*90e502c7SAndroid Build Coastguard Worker
72*90e502c7SAndroid Build Coastguard Worker /*
73*90e502c7SAndroid Build Coastguard Worker * check key length - note that we don't support keys larger
74*90e502c7SAndroid Build Coastguard Worker * than 20 bytes yet
75*90e502c7SAndroid Build Coastguard Worker */
76*90e502c7SAndroid Build Coastguard Worker if (key_len > 20) {
77*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_bad_param;
78*90e502c7SAndroid Build Coastguard Worker }
79*90e502c7SAndroid Build Coastguard Worker
80*90e502c7SAndroid Build Coastguard Worker /* check output length - should be less than 20 bytes */
81*90e502c7SAndroid Build Coastguard Worker if (out_len > 20) {
82*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_bad_param;
83*90e502c7SAndroid Build Coastguard Worker }
84*90e502c7SAndroid Build Coastguard Worker
85*90e502c7SAndroid Build Coastguard Worker /* allocate memory for auth and srtp_hmac_ctx_t structures */
86*90e502c7SAndroid Build Coastguard Worker pointer = (uint8_t *)srtp_crypto_alloc(sizeof(srtp_hmac_ctx_t) +
87*90e502c7SAndroid Build Coastguard Worker sizeof(srtp_auth_t));
88*90e502c7SAndroid Build Coastguard Worker if (pointer == NULL) {
89*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_alloc_fail;
90*90e502c7SAndroid Build Coastguard Worker }
91*90e502c7SAndroid Build Coastguard Worker
92*90e502c7SAndroid Build Coastguard Worker /* set pointers */
93*90e502c7SAndroid Build Coastguard Worker *a = (srtp_auth_t *)pointer;
94*90e502c7SAndroid Build Coastguard Worker (*a)->type = &srtp_hmac;
95*90e502c7SAndroid Build Coastguard Worker (*a)->state = pointer + sizeof(srtp_auth_t);
96*90e502c7SAndroid Build Coastguard Worker (*a)->out_len = out_len;
97*90e502c7SAndroid Build Coastguard Worker (*a)->key_len = key_len;
98*90e502c7SAndroid Build Coastguard Worker (*a)->prefix_len = 0;
99*90e502c7SAndroid Build Coastguard Worker
100*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_ok;
101*90e502c7SAndroid Build Coastguard Worker }
102*90e502c7SAndroid Build Coastguard Worker
srtp_hmac_dealloc(srtp_auth_t * a)103*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_dealloc(srtp_auth_t *a)
104*90e502c7SAndroid Build Coastguard Worker {
105*90e502c7SAndroid Build Coastguard Worker /* zeroize entire state*/
106*90e502c7SAndroid Build Coastguard Worker octet_string_set_to_zero(a, sizeof(srtp_hmac_ctx_t) + sizeof(srtp_auth_t));
107*90e502c7SAndroid Build Coastguard Worker
108*90e502c7SAndroid Build Coastguard Worker /* free memory */
109*90e502c7SAndroid Build Coastguard Worker srtp_crypto_free(a);
110*90e502c7SAndroid Build Coastguard Worker
111*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_ok;
112*90e502c7SAndroid Build Coastguard Worker }
113*90e502c7SAndroid Build Coastguard Worker
srtp_hmac_init(void * statev,const uint8_t * key,int key_len)114*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_init(void *statev,
115*90e502c7SAndroid Build Coastguard Worker const uint8_t *key,
116*90e502c7SAndroid Build Coastguard Worker int key_len)
117*90e502c7SAndroid Build Coastguard Worker {
118*90e502c7SAndroid Build Coastguard Worker srtp_hmac_ctx_t *state = (srtp_hmac_ctx_t *)statev;
119*90e502c7SAndroid Build Coastguard Worker int i;
120*90e502c7SAndroid Build Coastguard Worker uint8_t ipad[64];
121*90e502c7SAndroid Build Coastguard Worker
122*90e502c7SAndroid Build Coastguard Worker /*
123*90e502c7SAndroid Build Coastguard Worker * check key length - note that we don't support keys larger
124*90e502c7SAndroid Build Coastguard Worker * than 20 bytes yet
125*90e502c7SAndroid Build Coastguard Worker */
126*90e502c7SAndroid Build Coastguard Worker if (key_len > 20) {
127*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_bad_param;
128*90e502c7SAndroid Build Coastguard Worker }
129*90e502c7SAndroid Build Coastguard Worker
130*90e502c7SAndroid Build Coastguard Worker /*
131*90e502c7SAndroid Build Coastguard Worker * set values of ipad and opad by exoring the key into the
132*90e502c7SAndroid Build Coastguard Worker * appropriate constant values
133*90e502c7SAndroid Build Coastguard Worker */
134*90e502c7SAndroid Build Coastguard Worker for (i = 0; i < key_len; i++) {
135*90e502c7SAndroid Build Coastguard Worker ipad[i] = key[i] ^ 0x36;
136*90e502c7SAndroid Build Coastguard Worker state->opad[i] = key[i] ^ 0x5c;
137*90e502c7SAndroid Build Coastguard Worker }
138*90e502c7SAndroid Build Coastguard Worker /* set the rest of ipad, opad to constant values */
139*90e502c7SAndroid Build Coastguard Worker for (; i < 64; i++) {
140*90e502c7SAndroid Build Coastguard Worker ipad[i] = 0x36;
141*90e502c7SAndroid Build Coastguard Worker ((uint8_t *)state->opad)[i] = 0x5c;
142*90e502c7SAndroid Build Coastguard Worker }
143*90e502c7SAndroid Build Coastguard Worker
144*90e502c7SAndroid Build Coastguard Worker debug_print(srtp_mod_hmac, "ipad: %s",
145*90e502c7SAndroid Build Coastguard Worker srtp_octet_string_hex_string(ipad, 64));
146*90e502c7SAndroid Build Coastguard Worker
147*90e502c7SAndroid Build Coastguard Worker /* initialize sha1 context */
148*90e502c7SAndroid Build Coastguard Worker srtp_sha1_init(&state->init_ctx);
149*90e502c7SAndroid Build Coastguard Worker
150*90e502c7SAndroid Build Coastguard Worker /* hash ipad ^ key */
151*90e502c7SAndroid Build Coastguard Worker srtp_sha1_update(&state->init_ctx, ipad, 64);
152*90e502c7SAndroid Build Coastguard Worker memcpy(&state->ctx, &state->init_ctx, sizeof(srtp_sha1_ctx_t));
153*90e502c7SAndroid Build Coastguard Worker
154*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_ok;
155*90e502c7SAndroid Build Coastguard Worker }
156*90e502c7SAndroid Build Coastguard Worker
srtp_hmac_start(void * statev)157*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_start(void *statev)
158*90e502c7SAndroid Build Coastguard Worker {
159*90e502c7SAndroid Build Coastguard Worker srtp_hmac_ctx_t *state = (srtp_hmac_ctx_t *)statev;
160*90e502c7SAndroid Build Coastguard Worker
161*90e502c7SAndroid Build Coastguard Worker memcpy(&state->ctx, &state->init_ctx, sizeof(srtp_sha1_ctx_t));
162*90e502c7SAndroid Build Coastguard Worker
163*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_ok;
164*90e502c7SAndroid Build Coastguard Worker }
165*90e502c7SAndroid Build Coastguard Worker
srtp_hmac_update(void * statev,const uint8_t * message,int msg_octets)166*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_update(void *statev,
167*90e502c7SAndroid Build Coastguard Worker const uint8_t *message,
168*90e502c7SAndroid Build Coastguard Worker int msg_octets)
169*90e502c7SAndroid Build Coastguard Worker {
170*90e502c7SAndroid Build Coastguard Worker srtp_hmac_ctx_t *state = (srtp_hmac_ctx_t *)statev;
171*90e502c7SAndroid Build Coastguard Worker
172*90e502c7SAndroid Build Coastguard Worker debug_print(srtp_mod_hmac, "input: %s",
173*90e502c7SAndroid Build Coastguard Worker srtp_octet_string_hex_string(message, msg_octets));
174*90e502c7SAndroid Build Coastguard Worker
175*90e502c7SAndroid Build Coastguard Worker /* hash message into sha1 context */
176*90e502c7SAndroid Build Coastguard Worker srtp_sha1_update(&state->ctx, message, msg_octets);
177*90e502c7SAndroid Build Coastguard Worker
178*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_ok;
179*90e502c7SAndroid Build Coastguard Worker }
180*90e502c7SAndroid Build Coastguard Worker
srtp_hmac_compute(void * statev,const uint8_t * message,int msg_octets,int tag_len,uint8_t * result)181*90e502c7SAndroid Build Coastguard Worker static srtp_err_status_t srtp_hmac_compute(void *statev,
182*90e502c7SAndroid Build Coastguard Worker const uint8_t *message,
183*90e502c7SAndroid Build Coastguard Worker int msg_octets,
184*90e502c7SAndroid Build Coastguard Worker int tag_len,
185*90e502c7SAndroid Build Coastguard Worker uint8_t *result)
186*90e502c7SAndroid Build Coastguard Worker {
187*90e502c7SAndroid Build Coastguard Worker srtp_hmac_ctx_t *state = (srtp_hmac_ctx_t *)statev;
188*90e502c7SAndroid Build Coastguard Worker uint32_t hash_value[5];
189*90e502c7SAndroid Build Coastguard Worker uint32_t H[5];
190*90e502c7SAndroid Build Coastguard Worker int i;
191*90e502c7SAndroid Build Coastguard Worker
192*90e502c7SAndroid Build Coastguard Worker /* check tag length, return error if we can't provide the value expected */
193*90e502c7SAndroid Build Coastguard Worker if (tag_len > 20) {
194*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_bad_param;
195*90e502c7SAndroid Build Coastguard Worker }
196*90e502c7SAndroid Build Coastguard Worker
197*90e502c7SAndroid Build Coastguard Worker /* hash message, copy output into H */
198*90e502c7SAndroid Build Coastguard Worker srtp_hmac_update(state, message, msg_octets);
199*90e502c7SAndroid Build Coastguard Worker srtp_sha1_final(&state->ctx, H);
200*90e502c7SAndroid Build Coastguard Worker
201*90e502c7SAndroid Build Coastguard Worker /*
202*90e502c7SAndroid Build Coastguard Worker * note that we don't need to debug_print() the input, since the
203*90e502c7SAndroid Build Coastguard Worker * function hmac_update() already did that for us
204*90e502c7SAndroid Build Coastguard Worker */
205*90e502c7SAndroid Build Coastguard Worker debug_print(srtp_mod_hmac, "intermediate state: %s",
206*90e502c7SAndroid Build Coastguard Worker srtp_octet_string_hex_string((uint8_t *)H, 20));
207*90e502c7SAndroid Build Coastguard Worker
208*90e502c7SAndroid Build Coastguard Worker /* re-initialize hash context */
209*90e502c7SAndroid Build Coastguard Worker srtp_sha1_init(&state->ctx);
210*90e502c7SAndroid Build Coastguard Worker
211*90e502c7SAndroid Build Coastguard Worker /* hash opad ^ key */
212*90e502c7SAndroid Build Coastguard Worker srtp_sha1_update(&state->ctx, (uint8_t *)state->opad, 64);
213*90e502c7SAndroid Build Coastguard Worker
214*90e502c7SAndroid Build Coastguard Worker /* hash the result of the inner hash */
215*90e502c7SAndroid Build Coastguard Worker srtp_sha1_update(&state->ctx, (uint8_t *)H, 20);
216*90e502c7SAndroid Build Coastguard Worker
217*90e502c7SAndroid Build Coastguard Worker /* the result is returned in the array hash_value[] */
218*90e502c7SAndroid Build Coastguard Worker srtp_sha1_final(&state->ctx, hash_value);
219*90e502c7SAndroid Build Coastguard Worker
220*90e502c7SAndroid Build Coastguard Worker /* copy hash_value to *result */
221*90e502c7SAndroid Build Coastguard Worker for (i = 0; i < tag_len; i++) {
222*90e502c7SAndroid Build Coastguard Worker result[i] = ((uint8_t *)hash_value)[i];
223*90e502c7SAndroid Build Coastguard Worker }
224*90e502c7SAndroid Build Coastguard Worker
225*90e502c7SAndroid Build Coastguard Worker debug_print(srtp_mod_hmac, "output: %s",
226*90e502c7SAndroid Build Coastguard Worker srtp_octet_string_hex_string((uint8_t *)hash_value, tag_len));
227*90e502c7SAndroid Build Coastguard Worker
228*90e502c7SAndroid Build Coastguard Worker return srtp_err_status_ok;
229*90e502c7SAndroid Build Coastguard Worker }
230*90e502c7SAndroid Build Coastguard Worker
231*90e502c7SAndroid Build Coastguard Worker /* begin test case 0 */
232*90e502c7SAndroid Build Coastguard Worker /* clang-format off */
233*90e502c7SAndroid Build Coastguard Worker static const uint8_t srtp_hmac_test_case_0_key[20] = {
234*90e502c7SAndroid Build Coastguard Worker 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
235*90e502c7SAndroid Build Coastguard Worker 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
236*90e502c7SAndroid Build Coastguard Worker 0x0b, 0x0b, 0x0b, 0x0b
237*90e502c7SAndroid Build Coastguard Worker };
238*90e502c7SAndroid Build Coastguard Worker /* clang-format on */
239*90e502c7SAndroid Build Coastguard Worker
240*90e502c7SAndroid Build Coastguard Worker /* clang-format off */
241*90e502c7SAndroid Build Coastguard Worker static const uint8_t srtp_hmac_test_case_0_data[8] = {
242*90e502c7SAndroid Build Coastguard Worker 0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 /* "Hi There" */
243*90e502c7SAndroid Build Coastguard Worker };
244*90e502c7SAndroid Build Coastguard Worker /* clang-format on */
245*90e502c7SAndroid Build Coastguard Worker
246*90e502c7SAndroid Build Coastguard Worker /* clang-format off */
247*90e502c7SAndroid Build Coastguard Worker static const uint8_t srtp_hmac_test_case_0_tag[20] = {
248*90e502c7SAndroid Build Coastguard Worker 0xb6, 0x17, 0x31, 0x86, 0x55, 0x05, 0x72, 0x64,
249*90e502c7SAndroid Build Coastguard Worker 0xe2, 0x8b, 0xc0, 0xb6, 0xfb, 0x37, 0x8c, 0x8e,
250*90e502c7SAndroid Build Coastguard Worker 0xf1, 0x46, 0xbe, 0x00
251*90e502c7SAndroid Build Coastguard Worker };
252*90e502c7SAndroid Build Coastguard Worker /* clang-format on */
253*90e502c7SAndroid Build Coastguard Worker
254*90e502c7SAndroid Build Coastguard Worker static const srtp_auth_test_case_t srtp_hmac_test_case_0 = {
255*90e502c7SAndroid Build Coastguard Worker 20, /* octets in key */
256*90e502c7SAndroid Build Coastguard Worker srtp_hmac_test_case_0_key, /* key */
257*90e502c7SAndroid Build Coastguard Worker 8, /* octets in data */
258*90e502c7SAndroid Build Coastguard Worker srtp_hmac_test_case_0_data, /* data */
259*90e502c7SAndroid Build Coastguard Worker 20, /* octets in tag */
260*90e502c7SAndroid Build Coastguard Worker srtp_hmac_test_case_0_tag, /* tag */
261*90e502c7SAndroid Build Coastguard Worker NULL /* pointer to next testcase */
262*90e502c7SAndroid Build Coastguard Worker };
263*90e502c7SAndroid Build Coastguard Worker
264*90e502c7SAndroid Build Coastguard Worker /* end test case 0 */
265*90e502c7SAndroid Build Coastguard Worker
266*90e502c7SAndroid Build Coastguard Worker static const char srtp_hmac_description[] =
267*90e502c7SAndroid Build Coastguard Worker "hmac sha-1 authentication function";
268*90e502c7SAndroid Build Coastguard Worker
269*90e502c7SAndroid Build Coastguard Worker /*
270*90e502c7SAndroid Build Coastguard Worker * srtp_auth_type_t hmac is the hmac metaobject
271*90e502c7SAndroid Build Coastguard Worker */
272*90e502c7SAndroid Build Coastguard Worker
273*90e502c7SAndroid Build Coastguard Worker const srtp_auth_type_t srtp_hmac = {
274*90e502c7SAndroid Build Coastguard Worker srtp_hmac_alloc, /* */
275*90e502c7SAndroid Build Coastguard Worker srtp_hmac_dealloc, /* */
276*90e502c7SAndroid Build Coastguard Worker srtp_hmac_init, /* */
277*90e502c7SAndroid Build Coastguard Worker srtp_hmac_compute, /* */
278*90e502c7SAndroid Build Coastguard Worker srtp_hmac_update, /* */
279*90e502c7SAndroid Build Coastguard Worker srtp_hmac_start, /* */
280*90e502c7SAndroid Build Coastguard Worker srtp_hmac_description, /* */
281*90e502c7SAndroid Build Coastguard Worker &srtp_hmac_test_case_0, /* */
282*90e502c7SAndroid Build Coastguard Worker SRTP_HMAC_SHA1 /* */
283*90e502c7SAndroid Build Coastguard Worker };
284