| OLD | NEW |
| 1 /* | 1 /* |
| 2 * dtls_srtp_driver.c | 2 * dtls_srtp_driver.c |
| 3 * | 3 * |
| 4 * test driver for DTLS-SRTP functions | 4 * test driver for DTLS-SRTP functions |
| 5 * | 5 * |
| 6 * David McGrew | 6 * David McGrew |
| 7 * Cisco Systems, Inc. | 7 * Cisco Systems, Inc. |
| 8 */ | 8 */ |
| 9 /* | 9 /* |
| 10 * | 10 * |
| (...skipping 28 matching lines...) Expand all Loading... |
| 39 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | 39 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 40 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 40 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 41 * OF THE POSSIBILITY OF SUCH DAMAGE. | 41 * OF THE POSSIBILITY OF SUCH DAMAGE. |
| 42 * | 42 * |
| 43 */ | 43 */ |
| 44 | 44 |
| 45 #include <stdio.h> /* for printf() */ | 45 #include <stdio.h> /* for printf() */ |
| 46 #include "getopt_s.h" /* for local getopt() */ | 46 #include "getopt_s.h" /* for local getopt() */ |
| 47 #include "srtp_priv.h" | 47 #include "srtp_priv.h" |
| 48 | 48 |
| 49 err_status_t | 49 srtp_err_status_t |
| 50 test_dtls_srtp(void); | 50 test_dtls_srtp(void); |
| 51 | 51 |
| 52 srtp_hdr_t * | 52 srtp_hdr_t * |
| 53 srtp_create_test_packet(int pkt_octet_len, uint32_t ssrc); | 53 srtp_create_test_packet(int pkt_octet_len, uint32_t ssrc); |
| 54 | 54 |
| 55 void | 55 void |
| 56 usage(char *prog_name) { | 56 usage(char *prog_name) { |
| 57 printf("usage: %s [ -t ][ -c ][ -v ][-d <debug_module> ]* [ -l ]\n" | 57 printf("usage: %s [ -t ][ -c ][ -v ][-d <debug_module> ]* [ -l ]\n" |
| 58 " -d <mod> turn on debugging module <mod>\n" | 58 " -d <mod> turn on debugging module <mod>\n" |
| 59 " -l list debugging modules\n", prog_name); | 59 " -l list debugging modules\n", prog_name); |
| 60 exit(1); | 60 exit(1); |
| 61 } | 61 } |
| 62 | 62 |
| 63 int | 63 int |
| 64 main(int argc, char *argv[]) { | 64 main(int argc, char *argv[]) { |
| 65 unsigned do_list_mods = 0; | 65 unsigned do_list_mods = 0; |
| 66 int q; | 66 int q; |
| 67 err_status_t err; | 67 srtp_err_status_t err; |
| 68 | 68 |
| 69 printf("dtls_srtp_driver\n"); | 69 printf("dtls_srtp_driver\n"); |
| 70 | 70 |
| 71 /* initialize srtp library */ | 71 /* initialize srtp library */ |
| 72 err = srtp_init(); | 72 err = srtp_init(); |
| 73 if (err) { | 73 if (err) { |
| 74 printf("error: srtp init failed with error code %d\n", err); | 74 printf("error: srtp init failed with error code %d\n", err); |
| 75 exit(1); | 75 exit(1); |
| 76 } | 76 } |
| 77 | 77 |
| 78 /* process input arguments */ | 78 /* process input arguments */ |
| 79 while (1) { | 79 while (1) { |
| 80 q = getopt_s(argc, argv, "ld:"); | 80 q = getopt_s(argc, argv, "ld:"); |
| 81 if (q == -1) | 81 if (q == -1) |
| 82 break; | 82 break; |
| 83 switch (q) { | 83 switch (q) { |
| 84 case 'l': | 84 case 'l': |
| 85 do_list_mods = 1; | 85 do_list_mods = 1; |
| 86 break; | 86 break; |
| 87 case 'd': | 87 case 'd': |
| 88 err = crypto_kernel_set_debug_module(optarg_s, 1); | 88 err = srtp_crypto_kernel_set_debug_module(optarg_s, 1); |
| 89 if (err) { | 89 if (err) { |
| 90 printf("error: set debug module (%s) failed\n", optarg_s); | 90 printf("error: set debug module (%s) failed\n", optarg_s); |
| 91 exit(1); | 91 exit(1); |
| 92 } | 92 } |
| 93 break; | 93 break; |
| 94 default: | 94 default: |
| 95 usage(argv[0]); | 95 usage(argv[0]); |
| 96 } | 96 } |
| 97 } | 97 } |
| 98 | 98 |
| 99 if (do_list_mods) { | 99 if (do_list_mods) { |
| 100 err = crypto_kernel_list_debug_modules(); | 100 err = srtp_crypto_kernel_list_debug_modules(); |
| 101 if (err) { | 101 if (err) { |
| 102 printf("error: list of debug modules failed\n"); | 102 printf("error: list of debug modules failed\n"); |
| 103 exit(1); | 103 exit(1); |
| 104 } | 104 } |
| 105 } | 105 } |
| 106 | 106 |
| 107 printf("testing dtls_srtp..."); | 107 printf("testing dtls_srtp..."); |
| 108 err = test_dtls_srtp(); | 108 err = test_dtls_srtp(); |
| 109 if (err) { | 109 if (err) { |
| 110 printf("\nerror (code %d)\n", err); | 110 printf("\nerror (code %d)\n", err); |
| 111 exit(1); | 111 exit(1); |
| 112 } | 112 } |
| 113 printf("passed\n"); | 113 printf("passed\n"); |
| 114 | 114 |
| 115 /* shut down srtp library */ | 115 /* shut down srtp library */ |
| 116 err = srtp_shutdown(); | 116 err = srtp_shutdown(); |
| 117 if (err) { | 117 if (err) { |
| 118 printf("error: srtp shutdown failed with error code %d\n", err); | 118 printf("error: srtp shutdown failed with error code %d\n", err); |
| 119 exit(1); | 119 exit(1); |
| 120 } | 120 } |
| 121 | 121 |
| 122 return 0; | 122 return 0; |
| 123 } | 123 } |
| 124 | 124 |
| 125 | 125 |
| 126 err_status_t | 126 srtp_err_status_t |
| 127 test_dtls_srtp(void) { | 127 test_dtls_srtp(void) { |
| 128 srtp_hdr_t *test_packet; | 128 srtp_hdr_t *test_packet; |
| 129 int test_packet_len = 80; | 129 int test_packet_len = 80; |
| 130 srtp_t s; | 130 srtp_t s; |
| 131 srtp_policy_t policy; | 131 srtp_policy_t policy; |
| 132 uint8_t key[SRTP_MAX_KEY_LEN]; | 132 uint8_t key[SRTP_MAX_KEY_LEN]; |
| 133 uint8_t salt[SRTP_MAX_KEY_LEN]; | 133 uint8_t salt[SRTP_MAX_KEY_LEN]; |
| 134 unsigned int key_len, salt_len; | 134 unsigned int key_len, salt_len; |
| 135 srtp_profile_t profile; | 135 srtp_profile_t profile; |
| 136 err_status_t err; | 136 srtp_err_status_t err; |
| 137 |
| 138 memset(&policy, 0x0, sizeof(srtp_policy_t)); |
| 137 | 139 |
| 138 /* create a 'null' SRTP session */ | 140 /* create a 'null' SRTP session */ |
| 139 err = srtp_create(&s, NULL); | 141 err = srtp_create(&s, NULL); |
| 140 if (err) | 142 if (err) |
| 141 return err; | 143 return err; |
| 142 | 144 |
| 143 /* | 145 /* |
| 144 * verify that packet-processing functions behave properly - we | 146 * verify that packet-processing functions behave properly - we |
| 145 * expect that these functions will return err_status_no_ctx | 147 * expect that these functions will return srtp_err_status_no_ctx |
| 146 */ | 148 */ |
| 147 test_packet = srtp_create_test_packet(80, 0xa5a5a5a5); | 149 test_packet = srtp_create_test_packet(80, 0xa5a5a5a5); |
| 148 if (test_packet == NULL) | 150 if (test_packet == NULL) |
| 149 return err_status_alloc_fail; | 151 return srtp_err_status_alloc_fail; |
| 150 err = srtp_protect(s, test_packet, &test_packet_len); | 152 err = srtp_protect(s, test_packet, &test_packet_len); |
| 151 if (err != err_status_no_ctx) { | 153 if (err != srtp_err_status_no_ctx) { |
| 152 printf("wrong return value from srtp_protect() (got code %d)\n", | 154 printf("wrong return value from srtp_protect() (got code %d)\n", |
| 153 err); | 155 err); |
| 154 return err_status_fail; | 156 return srtp_err_status_fail; |
| 155 } | 157 } |
| 156 err = srtp_unprotect(s, test_packet, &test_packet_len); | 158 err = srtp_unprotect(s, test_packet, &test_packet_len); |
| 157 if (err != err_status_no_ctx) { | 159 if (err != srtp_err_status_no_ctx) { |
| 158 printf("wrong return value from srtp_unprotect() (got code %d)\n", | 160 printf("wrong return value from srtp_unprotect() (got code %d)\n", |
| 159 err); | 161 err); |
| 160 return err_status_fail; | 162 return srtp_err_status_fail; |
| 161 } | 163 } |
| 162 err = srtp_protect_rtcp(s, test_packet, &test_packet_len); | 164 err = srtp_protect_rtcp(s, test_packet, &test_packet_len); |
| 163 if (err != err_status_no_ctx) { | 165 if (err != srtp_err_status_no_ctx) { |
| 164 printf("wrong return value from srtp_protect_rtcp() (got code %d)\n", | 166 printf("wrong return value from srtp_protect_rtcp() (got code %d)\n", |
| 165 err); | 167 err); |
| 166 return err_status_fail; | 168 return srtp_err_status_fail; |
| 167 } | 169 } |
| 168 err = srtp_unprotect_rtcp(s, test_packet, &test_packet_len); | 170 err = srtp_unprotect_rtcp(s, test_packet, &test_packet_len); |
| 169 if (err != err_status_no_ctx) { | 171 if (err != srtp_err_status_no_ctx) { |
| 170 printf("wrong return value from srtp_unprotect_rtcp() (got code %d)\n", | 172 printf("wrong return value from srtp_unprotect_rtcp() (got code %d)\n", |
| 171 err); | 173 err); |
| 172 return err_status_fail; | 174 return srtp_err_status_fail; |
| 173 } | 175 } |
| 174 | 176 |
| 175 | 177 |
| 176 /* | 178 /* |
| 177 * set keys to known values for testing | 179 * set keys to known values for testing |
| 178 */ | 180 */ |
| 179 memset(&policy, 0, sizeof(policy)); | |
| 180 profile = srtp_profile_aes128_cm_sha1_80; | 181 profile = srtp_profile_aes128_cm_sha1_80; |
| 181 key_len = srtp_profile_get_master_key_length(profile); | 182 key_len = srtp_profile_get_master_key_length(profile); |
| 182 salt_len = srtp_profile_get_master_salt_length(profile); | 183 salt_len = srtp_profile_get_master_salt_length(profile); |
| 183 memset(key, 0xff, key_len); | 184 memset(key, 0xff, key_len); |
| 184 memset(salt, 0xee, salt_len); | 185 memset(salt, 0xee, salt_len); |
| 185 append_salt_to_key(key, key_len, salt, salt_len); | 186 srtp_append_salt_to_key(key, key_len, salt, salt_len); |
| 186 policy.key = key; | 187 policy.key = key; |
| 187 | 188 |
| 188 /* initialize SRTP policy from profile */ | 189 /* initialize SRTP policy from profile */ |
| 189 err = crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile); | 190 err = srtp_crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile); |
| 190 if (err) return err; | 191 if (err) return err; |
| 191 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile); | 192 err = srtp_crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile); |
| 192 if (err) return err; | 193 if (err) return err; |
| 193 policy.ssrc.type = ssrc_any_inbound; | 194 policy.ssrc.type = ssrc_any_inbound; |
| 194 policy.ekt = NULL; | 195 policy.ekt = NULL; |
| 195 policy.window_size = 128; | 196 policy.window_size = 128; |
| 196 policy.allow_repeat_tx = 0; | 197 policy.allow_repeat_tx = 0; |
| 197 policy.next = NULL; | 198 policy.next = NULL; |
| 198 | 199 |
| 199 err = srtp_add_stream(s, &policy); | 200 err = srtp_add_stream(s, &policy); |
| 200 if (err) | 201 if (err) |
| 201 return err; | 202 return err; |
| 202 | 203 |
| 203 err = srtp_dealloc(s); | 204 err = srtp_dealloc(s); |
| 204 if (err) | 205 if (err) |
| 205 return err; | 206 return err; |
| 206 | 207 |
| 207 free(test_packet); | 208 free(test_packet); |
| 208 | 209 |
| 209 return err_status_ok; | 210 return srtp_err_status_ok; |
| 210 } | 211 } |
| 211 | 212 |
| 212 | 213 |
| 213 | 214 |
| 214 /* | 215 /* |
| 215 * srtp_create_test_packet(len, ssrc) returns a pointer to a | 216 * srtp_create_test_packet(len, ssrc) returns a pointer to a |
| 216 * (malloced) example RTP packet whose data field has the length given | 217 * (malloced) example RTP packet whose data field has the length given |
| 217 * by pkt_octet_len and the SSRC value ssrc. The total length of the | 218 * by pkt_octet_len and the SSRC value ssrc. The total length of the |
| 218 * packet is twelve octets longer, since the header is at the | 219 * packet is twelve octets longer, since the header is at the |
| 219 * beginning. There is room at the end of the packet for a trailer, | 220 * beginning. There is room at the end of the packet for a trailer, |
| (...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 253 /* set RTP data to 0xab */ | 254 /* set RTP data to 0xab */ |
| 254 for (i=0; i < pkt_octet_len; i++) | 255 for (i=0; i < pkt_octet_len; i++) |
| 255 *buffer++ = 0xab; | 256 *buffer++ = 0xab; |
| 256 | 257 |
| 257 /* set post-data value to 0xffff to enable overrun checking */ | 258 /* set post-data value to 0xffff to enable overrun checking */ |
| 258 for (i=0; i < SRTP_MAX_TRAILER_LEN+4; i++) | 259 for (i=0; i < SRTP_MAX_TRAILER_LEN+4; i++) |
| 259 *buffer++ = 0xff; | 260 *buffer++ = 0xff; |
| 260 | 261 |
| 261 return hdr; | 262 return hdr; |
| 262 } | 263 } |
| OLD | NEW |