blob: 7eca0c6c6590e06acf61d0eb62f7509180ad73a7 [file] [log] [blame]
/**********
This library is free software; you can redistribute it and/or modify it under
the terms of the GNU Lesser General Public License as published by the
Free Software Foundation; either version 3 of the License, or (at your
option) any later version. (See <http://www.gnu.org/copyleft/lesser.html>.)
This library is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for
more details.
You should have received a copy of the GNU Lesser General Public License
along with this library; if not, write to the Free Software Foundation, Inc.,
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
**********/
// "liveMedia"
// Copyright (c) 1996-2020 Live Networks, Inc. All rights reserved.
// A data structure that implements a MIKEY message (RFC 3830)
// C++ header
#ifndef _MIKEY_HH
#define _MIKEY_HH
#ifndef _NET_COMMON_H
#include "NetCommon.h"
#endif
#ifndef _BOOLEAN_HH
#include "Boolean.hh"
#endif
class MIKEYState {
public:
MIKEYState(); // initialize with default parameters
virtual ~MIKEYState();
static MIKEYState* createNew(u_int8_t* messageToParse, unsigned messageSize);
// (Attempts to) parse a binary MIKEY message, returning a new "MIKEYState" if successful
// (or NULL if unsuccessful).
// ("messageToParse" is assumed to have been dynamically allocated;
// this function will delete[] it.)
u_int8_t* generateMessage(unsigned& messageSize) const;
// Returns a binary message representing the current MIKEY state, of size "messageSize" bytes.
// This array is dynamically allocated by this routine, and must be delete[]d by the caller.
// Accessors for the encryption/authentication parameters:
Boolean encryptSRTP() const { return fEncryptSRTP; }
Boolean encryptSRTCP() const { return fEncryptSRTCP; }
u_int8_t const* keyData() const { return fKeyData; }
u_int32_t MKI() const { return fMKI; }
Boolean useAuthentication() const { return fUseAuthentication; }
private:
MIKEYState(u_int8_t const* messageToParse, unsigned messageSize, Boolean& parsedOK);
// called only by "createNew()"
void addNewPayload(class MIKEYPayload* newPayload);
Boolean parseHDRPayload(u_int8_t const*& ptr, u_int8_t const* endPtr, u_int8_t& nextPayloadType);
Boolean parseNonHDRPayload(u_int8_t const*& ptr, u_int8_t const* endPtr, u_int8_t& nextPayloadType);
private:
// Encryption/authentication parameters, either set by default
// (if the first (parameterless) constructor is used), or set by parsing an input message
// (if the second constructor is used):
Boolean fEncryptSRTP;
Boolean fEncryptSRTCP;
u_int8_t fKeyData[16+14]; // encryption key + salt
u_int32_t fMKI; // used only if encryption is used. (We assume a MKI length of 4.)
Boolean fUseAuthentication;
// Our internal binary representation of the MIKEY payloads:
class MIKEYPayload* fHeaderPayload;
class MIKEYPayload* fTailPayload;
unsigned fTotalPayloadByteCount;
};
#endif