Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
V
vlc
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Redmine
Redmine
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Operations
Operations
Metrics
Environments
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
videolan
vlc
Commits
dc884574
Commit
dc884574
authored
May 17, 2007
by
Rémi Denis-Courmont
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add real SRTP unit test (85% coverage let alone SRTCP)
parent
2a0e2bd2
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
177 additions
and
4 deletions
+177
-4
libs/srtp/Makefile.am
libs/srtp/Makefile.am
+4
-4
libs/srtp/test-recv.c
libs/srtp/test-recv.c
+173
-0
No files found.
libs/srtp/Makefile.am
View file @
dc884574
...
...
@@ -27,17 +27,17 @@ noinst_HEADERS = srtp.h
EXTRA_PROGRAMS
=
srtp
if
HAVE_LIBGCRYPT
noinst_LTLIBRARIES
=
libvlc_srtp.la
check_PROGRAMS
=
test-aes
TESTS
=
test-aes
check_PROGRAMS
=
test-aes
test-recv
TESTS
=
$(check_PROGRAMS)
endif
libvlc_srtp_la_SOURCES
=
srtp.c
test_aes_SOURCES
=
test-aes.c
srtp_SOURCES
=
recv.c
srtp_LDADD
=
libvlc_srtp.la
test_recv_LDADD
=
libvlc_srtp.la
lcov-run
:
rm
-f
*
.gcda lcov
rm
-
R
f
*
.gcda lcov
$(MAKE)
$(AM_MAKEFLAGS)
check
lcov-pre.out
:
...
...
libs/srtp/test-recv.c
0 → 100644
View file @
dc884574
/*
* Secure RTP with libgcrypt
* Copyright (C) 2007 Rémi Denis-Courmont <rdenis # simphalempin , com>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*/
#ifdef HAVE_CONFIG_H
# include <config.h>
#endif
#include <stdint.h>
#include <stddef.h>
#include "srtp.h"
#include <stdio.h>
#include <string.h>
#include <errno.h>
#undef NDEBUG
#include <assert.h>
int
main
(
void
)
{
static
const
uint8_t
key
[
16
]
=
"
\x12\x34\x56\x78\x9A\xBC\xDE\xF0
"
"
\x12\x34\x56\x78\x9A\xBC\xDE\xF0
"
;
static
const
uint8_t
salt
[
14
]
=
"
\x12\x34\x56\x78\x90
"
"
\x12\x34\x56\x78\x90
"
"
\x12\x34\x56\x78
"
;
int
val
;
srtp_session_t
*
sd
,
*
se
;
/* Too big tag length */
se
=
srtp_create
(
SRTP_ENCR_AES_CM
,
SRTP_AUTH_HMAC_SHA1
,
21
,
SRTP_PRF_AES_CM
,
0
);
assert
(
se
==
NULL
);
/* Too short tag length */
se
=
srtp_create
(
SRTP_ENCR_AES_CM
,
SRTP_AUTH_HMAC_SHA1
,
3
,
SRTP_PRF_AES_CM
,
SRTP_RCC_MODE1
);
assert
(
se
==
NULL
);
/* Initializes encryption and decryption contexts */
se
=
srtp_create
(
SRTP_ENCR_AES_CM
,
SRTP_AUTH_HMAC_SHA1
,
20
,
SRTP_PRF_AES_CM
,
SRTP_RCC_MODE1
);
assert
(
se
!=
NULL
);
sd
=
srtp_create
(
SRTP_ENCR_AES_CM
,
SRTP_AUTH_HMAC_SHA1
,
20
,
SRTP_PRF_AES_CM
,
SRTP_RCC_MODE1
);
assert
(
sd
!=
NULL
);
srtp_setrcc_rate
(
se
,
1
);
srtp_setrcc_rate
(
sd
,
1
);
val
=
srtp_setkey
(
se
,
key
,
16
,
salt
,
14
);
assert
(
val
==
0
);
val
=
srtp_setkey
(
sd
,
key
,
16
,
salt
,
14
);
assert
(
val
==
0
);
uint8_t
buf
[
1500
],
buf2
[
1500
];
size_t
len
;
/* Invalid SRTP packet */
len
=
12
;
memset
(
buf
,
0
,
len
);
val
=
srtp_send
(
se
,
buf
,
&
len
,
sizeof
(
buf
));
assert
(
val
==
EINVAL
);
len
=
32
;
memset
(
buf
,
0
,
len
);
srtp_recv
(
sd
,
buf
,
&
len
);
assert
(
val
==
EINVAL
);
/* Too short packet */
len
=
11
;
buf
[
0
]
=
0x80
;
val
=
srtp_send
(
se
,
buf
,
&
len
,
sizeof
(
buf
));
assert
(
val
==
EINVAL
);
len
=
11
;
val
=
srtp_recv
(
sd
,
buf
,
&
len
);
assert
(
val
==
EINVAL
);
/* Too short when taking tag into account */
len
=
31
;
val
=
srtp_recv
(
sd
,
buf
,
&
len
);
assert
(
val
==
EINVAL
);
/* Too short when taking RTP extensions into account */
len
=
15
;
buf
[
0
]
=
0x90
;
val
=
srtp_send
(
se
,
buf
,
&
len
,
sizeof
(
buf
));
assert
(
val
==
EINVAL
);
len
=
16
;
buf
[
0
]
=
0x90
;
buf
[
15
]
=
1
;
val
=
srtp_send
(
se
,
buf
,
&
len
,
sizeof
(
buf
));
assert
(
val
==
EINVAL
);
/* Too small buffer (seq=1) */
len
=
20
;
memset
(
buf
,
0
,
len
);
buf
[
0
]
=
0x80
;
buf
[
3
]
=
1
;
val
=
srtp_send
(
se
,
buf
,
&
len
,
39
);
assert
(
val
==
ENOSPC
);
assert
(
len
==
40
);
len
=
31
;
val
=
srtp_recv
(
sd
,
buf
,
&
len
);
assert
(
val
==
EINVAL
);
/* OK (seq=3) */
buf
[
0
]
=
0x80
;
buf
[
3
]
=
3
;
for
(
unsigned
i
=
0
;
i
<
256
;
i
++
)
buf
[
i
+
12
]
=
i
;
len
=
0x10c
;
val
=
srtp_send
(
se
,
buf
,
&
len
,
0x120
);
assert
(
val
==
0
);
assert
(
len
==
0x120
);
memcpy
(
buf2
,
buf
,
len
);
val
=
srtp_recv
(
sd
,
buf2
,
&
len
);
assert
(
val
==
0
);
assert
(
len
==
0x10c
);
assert
(
!
memcmp
(
buf2
,
"
\x80\x00\x00\x03
"
"
\x00\x00\x00\x00
"
"
\x00\x00\x00\x00
"
,
12
));
for
(
unsigned
i
=
0
;
i
<
256
;
i
++
)
assert
(
buf2
[
i
+
12
]
==
i
);
// test actual decryption
/* Replay attack (seq=3) */
len
=
0x120
;
val
=
srtp_recv
(
sd
,
buf
,
&
len
);
assert
(
val
==
EACCES
);
assert
(
len
==
0x10c
);
/* OK but late (seq=2) */
buf
[
0
]
=
0x80
;
buf
[
3
]
=
2
;
val
=
srtp_send
(
se
,
buf
,
&
len
,
0x120
);
assert
(
val
==
0
);
assert
(
len
==
0x120
);
memcpy
(
buf2
,
buf
,
len
);
val
=
srtp_recv
(
sd
,
buf2
,
&
len
);
assert
(
val
==
0
);
assert
(
len
==
0x10c
);
/* Late replay attack (seq=3) */
len
=
0x120
;
val
=
srtp_recv
(
sd
,
buf
,
&
len
);
assert
(
val
==
EACCES
);
assert
(
len
==
0x10c
);
srtp_destroy
(
se
);
srtp_destroy
(
sd
);
return
0
;
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment