Skip to content

Conversation

@pabuhler
Copy link
Owner

@pabuhler pabuhler commented Dec 6, 2024

No description provided.

@pabuhler pabuhler force-pushed the ci-test-run branch 6 times, most recently from 8a950c8 to 1d4672d Compare December 17, 2024 13:22
Move cryptex code to separate functions so it can be reused.
Due to support for non in-place io it is not always possible to modify the
input buffer in the way the cryptex draft expected therefore use multiple
encrypt / decrypt calls when io is not in-place. The gcm ciphers do not
currently support multiple operations so non in-place io with csrc's is not
supported.
@pabuhler pabuhler force-pushed the ci-test-run branch 2 times, most recently from 7ed0ea9 to 276c7e0 Compare December 17, 2024 14:39
pabuhler and others added 6 commits March 10, 2025 09:04
Currently, it is silently assumed that we always have master key provided,
even when the policy says we don't use encryption and authentication. This
results in streams with such policy to fail.

Fix that by properly calculating the expected master key length by taking
in account authentication type too. Correctly set expected key length for
null crypto policy to 0. Do not assume we have HMAC if the policy is set to
not have.

Add a test case for null/null policy while at it.

Signed-off-by: Ivaylo Dimitrov <[email protected]>
Properly support null crypto and null auth scenario
Add ability to trigger manually
Add  a new option CRYPTO_LIBRARY that replaces all the
ENABLE_XXXX options.
This makes it a little simpler and removes the possibility of configuring multiple backends.
The name CRYPTO_LIBRARY is the same value currently used
in the meson build.

cisco#697
@pabuhler pabuhler force-pushed the ci-test-run branch 4 times, most recently from 6aaafb2 to e73c0fb Compare August 10, 2025 11:26
Add a new option --with-crypto-library that replaces all
the --enabled-xxxx options.
This makes it a little simpler and removes the possibility of configuring multiple backends.

cisco#697
Change crypto config, use one option with a list of values
@pabuhler pabuhler force-pushed the ci-test-run branch 3 times, most recently from 2305984 to 091df84 Compare August 15, 2025 04:45
It is better to use an external and well proven crypto library
as the default backend. The internal code should only be
there as a fall back. This will also mean that GCM will be
available by default.

cisco#579
Change to use OpenSSL as default crypto library
The test vectors are generated based on RFC 6188
section 7.4 . It demonstrates that the kdf for
AES 192 is currently broken. It mistakenly uses the
kdf in AES 256 mode as described in cisco#763.
Set the kdf key length to be the determined input key length.
This will set it correctly for AES ICM 128/192/256.
In the case of AES GCM 128 & 256 it needs to be increased
by 2 to match the corresponding AES ICM cipher.

fixes cisco#763
libz & libdl are not direct dependencies of libsrtp, but my be required by the crypto library at runtime.
Remove the dependency check form configure and rely on pkg_config to pull them in if needed.

cisco#631
Do not explicitly check for runtime dependencies when building
@pabuhler pabuhler force-pushed the ci-test-run branch 2 times, most recently from 6c932e8 to fc71582 Compare October 9, 2025 18:08
This does a release build and install on all platforms.
Does both static and shared builds.

Useful to verify what a release looks like.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants