| Index: crypto/test/cipher_driver.c
|
| diff --git a/srtp/crypto/test/cipher_driver.c b/crypto/test/cipher_driver.c
|
| similarity index 70%
|
| rename from srtp/crypto/test/cipher_driver.c
|
| rename to crypto/test/cipher_driver.c
|
| index 9c9c2203a1976494e0cb667307e171fcd553a71b..c8b3f055e9de8c3f9d167b535e675625c239e20f 100644
|
| --- a/srtp/crypto/test/cipher_driver.c
|
| +++ b/crypto/test/cipher_driver.c
|
| @@ -58,15 +58,14 @@
|
| #else
|
| #include "aes_icm.h"
|
| #endif
|
| -#include "null_cipher.h"
|
|
|
| #define PRINT_DEBUG 0
|
|
|
| void
|
| -cipher_driver_test_throughput(cipher_t *c);
|
| +cipher_driver_test_throughput(srtp_cipher_t *c);
|
|
|
| -err_status_t
|
| -cipher_driver_self_test(cipher_type_t *ct);
|
| +srtp_err_status_t
|
| +cipher_driver_self_test(srtp_cipher_type_t *ct);
|
|
|
|
|
| /*
|
| @@ -75,30 +74,30 @@ cipher_driver_self_test(cipher_type_t *ct);
|
| * calls
|
| */
|
|
|
| -err_status_t
|
| -cipher_driver_test_buffering(cipher_t *c);
|
| +srtp_err_status_t
|
| +cipher_driver_test_buffering(srtp_cipher_t *c);
|
|
|
|
|
| /*
|
| * functions for testing cipher cache thrash
|
| */
|
| -err_status_t
|
| -cipher_driver_test_array_throughput(cipher_type_t *ct,
|
| +srtp_err_status_t
|
| +cipher_driver_test_array_throughput(srtp_cipher_type_t *ct,
|
| int klen, int num_cipher);
|
|
|
| void
|
| -cipher_array_test_throughput(cipher_t *ca[], int num_cipher);
|
| +cipher_array_test_throughput(srtp_cipher_t *ca[], int num_cipher);
|
|
|
| uint64_t
|
| -cipher_array_bits_per_second(cipher_t *cipher_array[], int num_cipher,
|
| +cipher_array_bits_per_second(srtp_cipher_t *cipher_array[], int num_cipher,
|
| unsigned octets_in_buffer, int num_trials);
|
|
|
| -err_status_t
|
| -cipher_array_delete(cipher_t *cipher_array[], int num_cipher);
|
| +srtp_err_status_t
|
| +cipher_array_delete(srtp_cipher_t *cipher_array[], int num_cipher);
|
|
|
| -err_status_t
|
| -cipher_array_alloc_init(cipher_t ***cipher_array, int num_ciphers,
|
| - cipher_type_t *ctype, int klen);
|
| +srtp_err_status_t
|
| +cipher_array_alloc_init(srtp_cipher_t ***cipher_array, int num_ciphers,
|
| + srtp_cipher_type_t *ctype, int klen);
|
|
|
| void
|
| usage(char *prog_name) {
|
| @@ -107,7 +106,7 @@ usage(char *prog_name) {
|
| }
|
|
|
| void
|
| -check_status(err_status_t s) {
|
| +check_status(srtp_err_status_t s) {
|
| if (s) {
|
| printf("error (code %d)\n", s);
|
| exit(s);
|
| @@ -116,28 +115,24 @@ check_status(err_status_t s) {
|
| }
|
|
|
| /*
|
| - * null_cipher, aes_icm, and aes_cbc are the cipher meta-objects
|
| + * null_cipher and srtp_aes_icm are the cipher meta-objects
|
| * defined in the files in crypto/cipher subdirectory. these are
|
| * declared external so that we can use these cipher types here
|
| */
|
|
|
| -extern cipher_type_t null_cipher;
|
| -extern cipher_type_t aes_icm;
|
| -#ifndef OPENSSL
|
| -extern cipher_type_t aes_cbc;
|
| -#else
|
| -#ifndef SRTP_NO_AES192
|
| -extern cipher_type_t aes_icm_192;
|
| -#endif
|
| -extern cipher_type_t aes_icm_256;
|
| -extern cipher_type_t aes_gcm_128_openssl;
|
| -extern cipher_type_t aes_gcm_256_openssl;
|
| +extern srtp_cipher_type_t srtp_null_cipher;
|
| +extern srtp_cipher_type_t srtp_aes_icm;
|
| +#ifdef OPENSSL
|
| +extern srtp_cipher_type_t srtp_aes_icm_192;
|
| +extern srtp_cipher_type_t srtp_aes_icm_256;
|
| +extern srtp_cipher_type_t srtp_aes_gcm_128_openssl;
|
| +extern srtp_cipher_type_t srtp_aes_gcm_256_openssl;
|
| #endif
|
|
|
| int
|
| main(int argc, char *argv[]) {
|
| - cipher_t *c = NULL;
|
| - err_status_t status;
|
| + srtp_cipher_t *c = NULL;
|
| + srtp_err_status_t status;
|
| unsigned char test_key[48] = {
|
| 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
| 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
|
| @@ -170,7 +165,7 @@ main(int argc, char *argv[]) {
|
| usage(argv[0]);
|
| }
|
| }
|
| -
|
| +
|
| printf("cipher test driver\n"
|
| "David A. McGrew\n"
|
| "Cisco Systems, Inc.\n");
|
| @@ -184,58 +179,47 @@ main(int argc, char *argv[]) {
|
| int num_cipher;
|
|
|
| for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8)
|
| - cipher_driver_test_array_throughput(&null_cipher, 0, num_cipher);
|
| + cipher_driver_test_array_throughput(&srtp_null_cipher, 0, num_cipher);
|
|
|
| for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8)
|
| - cipher_driver_test_array_throughput(&aes_icm, 30, num_cipher);
|
| + cipher_driver_test_array_throughput(&srtp_aes_icm, 30, num_cipher);
|
|
|
| #ifndef OPENSSL
|
| for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8)
|
| - cipher_driver_test_array_throughput(&aes_icm, 46, num_cipher);
|
| -
|
| - for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8)
|
| - cipher_driver_test_array_throughput(&aes_cbc, 16, num_cipher);
|
| -
|
| - for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8)
|
| - cipher_driver_test_array_throughput(&aes_cbc, 32, num_cipher);
|
| + cipher_driver_test_array_throughput(&srtp_aes_icm, 46, num_cipher);
|
| #else
|
| -#ifndef SRTP_NO_AES192
|
| for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8)
|
| - cipher_driver_test_array_throughput(&aes_icm_192, 38, num_cipher);
|
| -#endif
|
| + cipher_driver_test_array_throughput(&srtp_aes_icm_192, 38, num_cipher);
|
| +
|
| for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8)
|
| - cipher_driver_test_array_throughput(&aes_icm_256, 46, num_cipher);
|
| + cipher_driver_test_array_throughput(&srtp_aes_icm_256, 46, num_cipher);
|
|
|
| for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8) {
|
| - cipher_driver_test_array_throughput(&aes_gcm_128_openssl, AES_128_GCM_KEYSIZE_WSALT, num_cipher);
|
| + cipher_driver_test_array_throughput(&srtp_aes_gcm_128_openssl, SRTP_AES_128_GCM_KEYSIZE_WSALT, num_cipher);
|
| }
|
|
|
| for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8) {
|
| - cipher_driver_test_array_throughput(&aes_gcm_256_openssl, AES_256_GCM_KEYSIZE_WSALT, num_cipher);
|
| + cipher_driver_test_array_throughput(&srtp_aes_gcm_256_openssl, SRTP_AES_256_GCM_KEYSIZE_WSALT, num_cipher);
|
| }
|
| #endif
|
| }
|
|
|
| if (do_validation) {
|
| - cipher_driver_self_test(&null_cipher);
|
| - cipher_driver_self_test(&aes_icm);
|
| -#ifndef OPENSSL
|
| - cipher_driver_self_test(&aes_cbc);
|
| -#else
|
| -#ifndef SRTP_NO_AES192
|
| - cipher_driver_self_test(&aes_icm_192);
|
| -#endif
|
| - cipher_driver_self_test(&aes_icm_256);
|
| - cipher_driver_self_test(&aes_gcm_128_openssl);
|
| - cipher_driver_self_test(&aes_gcm_256_openssl);
|
| + cipher_driver_self_test(&srtp_null_cipher);
|
| + cipher_driver_self_test(&srtp_aes_icm);
|
| +#ifdef OPENSSL
|
| + cipher_driver_self_test(&srtp_aes_icm_192);
|
| + cipher_driver_self_test(&srtp_aes_icm_256);
|
| + cipher_driver_self_test(&srtp_aes_gcm_128_openssl);
|
| + cipher_driver_self_test(&srtp_aes_gcm_256_openssl);
|
| #endif
|
| }
|
|
|
| - /* do timing and/or buffer_test on null_cipher */
|
| - status = cipher_type_alloc(&null_cipher, &c, 0, 0);
|
| + /* do timing and/or buffer_test on srtp_null_cipher */
|
| + status = srtp_cipher_type_alloc(&srtp_null_cipher, &c, 0, 0);
|
| check_status(status);
|
|
|
| - status = cipher_init(c, NULL);
|
| + status = srtp_cipher_init(c, NULL);
|
| check_status(status);
|
|
|
| if (do_timing_test)
|
| @@ -244,18 +228,18 @@ main(int argc, char *argv[]) {
|
| status = cipher_driver_test_buffering(c);
|
| check_status(status);
|
| }
|
| - status = cipher_dealloc(c);
|
| + status = srtp_cipher_dealloc(c);
|
| check_status(status);
|
|
|
|
|
| /* run the throughput test on the aes_icm cipher (128-bit key) */
|
| - status = cipher_type_alloc(&aes_icm, &c, 30, 0);
|
| + status = srtp_cipher_type_alloc(&srtp_aes_icm, &c, 30, 0);
|
| if (status) {
|
| fprintf(stderr, "error: can't allocate cipher\n");
|
| exit(status);
|
| }
|
|
|
| - status = cipher_init(c, test_key);
|
| + status = srtp_cipher_init(c, test_key);
|
| check_status(status);
|
|
|
| if (do_timing_test)
|
| @@ -266,21 +250,21 @@ main(int argc, char *argv[]) {
|
| check_status(status);
|
| }
|
|
|
| - status = cipher_dealloc(c);
|
| + status = srtp_cipher_dealloc(c);
|
| check_status(status);
|
|
|
| /* repeat the tests with 256-bit keys */
|
| #ifndef OPENSSL
|
| - status = cipher_type_alloc(&aes_icm, &c, 46, 0);
|
| + status = srtp_cipher_type_alloc(&srtp_aes_icm, &c, 46, 0);
|
| #else
|
| - status = cipher_type_alloc(&aes_icm_256, &c, 46, 0);
|
| + status = srtp_cipher_type_alloc(&srtp_aes_icm_256, &c, 46, 0);
|
| #endif
|
| if (status) {
|
| fprintf(stderr, "error: can't allocate cipher\n");
|
| exit(status);
|
| }
|
|
|
| - status = cipher_init(c, test_key);
|
| + status = srtp_cipher_init(c, test_key);
|
| check_status(status);
|
|
|
| if (do_timing_test)
|
| @@ -291,17 +275,17 @@ main(int argc, char *argv[]) {
|
| check_status(status);
|
| }
|
|
|
| - status = cipher_dealloc(c);
|
| + status = srtp_cipher_dealloc(c);
|
| check_status(status);
|
|
|
| #ifdef OPENSSL
|
| /* run the throughput test on the aes_gcm_128_openssl cipher */
|
| - status = cipher_type_alloc(&aes_gcm_128_openssl, &c, AES_128_GCM_KEYSIZE_WSALT, 8);
|
| + status = srtp_cipher_type_alloc(&srtp_aes_gcm_128_openssl, &c, SRTP_AES_128_GCM_KEYSIZE_WSALT, 8);
|
| if (status) {
|
| fprintf(stderr, "error: can't allocate GCM 128 cipher\n");
|
| exit(status);
|
| }
|
| - status = cipher_init(c, test_key);
|
| + status = srtp_cipher_init(c, test_key);
|
| check_status(status);
|
| if (do_timing_test) {
|
| cipher_driver_test_throughput(c);
|
| @@ -311,16 +295,16 @@ main(int argc, char *argv[]) {
|
| status = cipher_driver_test_buffering(c);
|
| check_status(status);
|
| }
|
| - status = cipher_dealloc(c);
|
| + status = srtp_cipher_dealloc(c);
|
| check_status(status);
|
|
|
| /* run the throughput test on the aes_gcm_256_openssl cipher */
|
| - status = cipher_type_alloc(&aes_gcm_256_openssl, &c, AES_256_GCM_KEYSIZE_WSALT, 16);
|
| + status = srtp_cipher_type_alloc(&srtp_aes_gcm_256_openssl, &c, SRTP_AES_256_GCM_KEYSIZE_WSALT, 16);
|
| if (status) {
|
| fprintf(stderr, "error: can't allocate GCM 256 cipher\n");
|
| exit(status);
|
| }
|
| - status = cipher_init(c, test_key);
|
| + status = srtp_cipher_init(c, test_key);
|
| check_status(status);
|
| if (do_timing_test) {
|
| cipher_driver_test_throughput(c);
|
| @@ -330,7 +314,7 @@ main(int argc, char *argv[]) {
|
| status = cipher_driver_test_buffering(c);
|
| check_status(status);
|
| }
|
| - status = cipher_dealloc(c);
|
| + status = srtp_cipher_dealloc(c);
|
| check_status(status);
|
| #endif
|
|
|
| @@ -338,7 +322,7 @@ main(int argc, char *argv[]) {
|
| }
|
|
|
| void
|
| -cipher_driver_test_throughput(cipher_t *c) {
|
| +cipher_driver_test_throughput(srtp_cipher_t *c) {
|
| int i;
|
| int min_enc_len = 32;
|
| int max_enc_len = 2048; /* should be a power of two */
|
| @@ -348,23 +332,23 @@ cipher_driver_test_throughput(cipher_t *c) {
|
| fflush(stdout);
|
| for (i=min_enc_len; i <= max_enc_len; i = i * 2)
|
| printf("msg len: %d\tgigabits per second: %f\n",
|
| - i, cipher_bits_per_second(c, i, num_trials) / 1e9);
|
| + i, srtp_cipher_bits_per_second(c, i, num_trials) / 1e9);
|
|
|
| }
|
|
|
| -err_status_t
|
| -cipher_driver_self_test(cipher_type_t *ct) {
|
| - err_status_t status;
|
| +srtp_err_status_t
|
| +cipher_driver_self_test(srtp_cipher_type_t *ct) {
|
| + srtp_err_status_t status;
|
|
|
| printf("running cipher self-test for %s...", ct->description);
|
| - status = cipher_type_self_test(ct);
|
| + status = srtp_cipher_type_self_test(ct);
|
| if (status) {
|
| printf("failed with error code %d\n", status);
|
| exit(status);
|
| }
|
| printf("passed\n");
|
|
|
| - return err_status_ok;
|
| + return srtp_err_status_ok;
|
| }
|
|
|
| /*
|
| @@ -374,8 +358,8 @@ cipher_driver_self_test(cipher_type_t *ct) {
|
| */
|
|
|
| #define INITIAL_BUFLEN 1024
|
| -err_status_t
|
| -cipher_driver_test_buffering(cipher_t *c) {
|
| +srtp_err_status_t
|
| +cipher_driver_test_buffering(srtp_cipher_t *c) {
|
| int i, j, num_trials = 1000;
|
| unsigned len, buflen = INITIAL_BUFLEN;
|
| uint8_t buffer0[INITIAL_BUFLEN], buffer1[INITIAL_BUFLEN], *current, *end;
|
| @@ -383,7 +367,7 @@ cipher_driver_test_buffering(cipher_t *c) {
|
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x12, 0x34
|
| };
|
| - err_status_t status;
|
| + srtp_err_status_t status;
|
|
|
| printf("testing output buffering for cipher %s...",
|
| c->type->description);
|
| @@ -396,17 +380,17 @@ cipher_driver_test_buffering(cipher_t *c) {
|
| }
|
|
|
| /* initialize cipher */
|
| - status = cipher_set_iv(c, idx, direction_encrypt);
|
| + status = srtp_cipher_set_iv(c, (uint8_t*)idx, srtp_direction_encrypt);
|
| if (status)
|
| return status;
|
|
|
| /* generate 'reference' value by encrypting all at once */
|
| - status = cipher_encrypt(c, buffer0, &buflen);
|
| + status = srtp_cipher_encrypt(c, buffer0, &buflen);
|
| if (status)
|
| return status;
|
|
|
| /* re-initialize cipher */
|
| - status = cipher_set_iv(c, idx, direction_encrypt);
|
| + status = srtp_cipher_set_iv(c, (uint8_t*)idx, srtp_direction_encrypt);
|
| if (status)
|
| return status;
|
|
|
| @@ -422,7 +406,7 @@ cipher_driver_test_buffering(cipher_t *c) {
|
| if (current + len > end)
|
| len = end - current;
|
|
|
| - status = cipher_encrypt(c, current, &len);
|
| + status = srtp_cipher_encrypt(c, current, &len);
|
| if (status)
|
| return status;
|
|
|
| @@ -442,14 +426,14 @@ cipher_driver_test_buffering(cipher_t *c) {
|
| printf("computed: %s\n", octet_string_hex_string(buffer1, buflen));
|
| printf("expected: %s\n", octet_string_hex_string(buffer0, buflen));
|
| #endif
|
| - return err_status_algo_fail;
|
| + return srtp_err_status_algo_fail;
|
| }
|
| }
|
| }
|
|
|
| printf("passed\n");
|
|
|
| - return err_status_ok;
|
| + return srtp_err_status_ok;
|
| }
|
|
|
|
|
| @@ -458,40 +442,40 @@ cipher_driver_test_buffering(cipher_t *c) {
|
| * cache thrash on cipher throughput.
|
| *
|
| * cipher_array_alloc_init(ctype, array, num_ciphers) creates an array
|
| - * of cipher_t of type ctype
|
| + * of srtp_cipher_t of type ctype
|
| */
|
|
|
| -err_status_t
|
| -cipher_array_alloc_init(cipher_t ***ca, int num_ciphers,
|
| - cipher_type_t *ctype, int klen) {
|
| +srtp_err_status_t
|
| +cipher_array_alloc_init(srtp_cipher_t ***ca, int num_ciphers,
|
| + srtp_cipher_type_t *ctype, int klen) {
|
| int i, j;
|
| - err_status_t status;
|
| + srtp_err_status_t status;
|
| uint8_t *key;
|
| - cipher_t **cipher_array;
|
| + srtp_cipher_t **cipher_array;
|
| /* pad klen allocation, to handle aes_icm reading 16 bytes for the
|
| 14-byte salt */
|
| int klen_pad = ((klen + 15) >> 4) << 4;
|
|
|
| /* allocate array of pointers to ciphers */
|
| - cipher_array = (cipher_t **) malloc(sizeof(cipher_t *) * num_ciphers);
|
| + cipher_array = (srtp_cipher_t **) malloc(sizeof(srtp_cipher_t *) * num_ciphers);
|
| if (cipher_array == NULL)
|
| - return err_status_alloc_fail;
|
| + return srtp_err_status_alloc_fail;
|
|
|
| /* set ca to location of cipher_array */
|
| *ca = cipher_array;
|
|
|
| /* allocate key */
|
| - key = crypto_alloc(klen_pad);
|
| + key = srtp_crypto_alloc(klen_pad);
|
| if (key == NULL) {
|
| free(cipher_array);
|
| - return err_status_alloc_fail;
|
| + return srtp_err_status_alloc_fail;
|
| }
|
|
|
| /* allocate and initialize an array of ciphers */
|
| for (i=0; i < num_ciphers; i++) {
|
|
|
| /* allocate cipher */
|
| - status = cipher_type_alloc(ctype, cipher_array, klen, 16);
|
| + status = srtp_cipher_type_alloc(ctype, cipher_array, klen, 16);
|
| if (status)
|
| return status;
|
|
|
| @@ -500,7 +484,7 @@ cipher_array_alloc_init(cipher_t ***ca, int num_ciphers,
|
| key[j] = (uint8_t) rand();
|
| for (; j < klen_pad; j++)
|
| key[j] = 0;
|
| - status = cipher_init(*cipher_array, key);
|
| + status = srtp_cipher_init(*cipher_array, key);
|
| if (status)
|
| return status;
|
|
|
| @@ -512,22 +496,22 @@ cipher_array_alloc_init(cipher_t ***ca, int num_ciphers,
|
| cipher_array++;
|
| }
|
|
|
| - crypto_free(key);
|
| + srtp_crypto_free(key);
|
|
|
| - return err_status_ok;
|
| + return srtp_err_status_ok;
|
| }
|
|
|
| -err_status_t
|
| -cipher_array_delete(cipher_t *cipher_array[], int num_cipher) {
|
| +srtp_err_status_t
|
| +cipher_array_delete(srtp_cipher_t *cipher_array[], int num_cipher) {
|
| int i;
|
|
|
| for (i=0; i < num_cipher; i++) {
|
| - cipher_dealloc(cipher_array[i]);
|
| + srtp_cipher_dealloc(cipher_array[i]);
|
| }
|
|
|
| free(cipher_array);
|
|
|
| - return err_status_ok;
|
| + return srtp_err_status_ok;
|
| }
|
|
|
|
|
| @@ -544,7 +528,7 @@ cipher_array_delete(cipher_t *cipher_array[], int num_cipher) {
|
| */
|
|
|
| uint64_t
|
| -cipher_array_bits_per_second(cipher_t *cipher_array[], int num_cipher,
|
| +cipher_array_bits_per_second(srtp_cipher_t *cipher_array[], int num_cipher,
|
| unsigned octets_in_buffer, int num_trials) {
|
| int i;
|
| v128_t nonce;
|
| @@ -553,7 +537,7 @@ cipher_array_bits_per_second(cipher_t *cipher_array[], int num_cipher,
|
| int cipher_index = rand() % num_cipher;
|
|
|
| /* Over-alloc, for NIST CBC padding */
|
| - enc_buf = crypto_alloc(octets_in_buffer+17);
|
| + enc_buf = srtp_crypto_alloc(octets_in_buffer+17);
|
| if (enc_buf == NULL)
|
| return 0; /* indicate bad parameters by returning null */
|
| memset(enc_buf, 0, octets_in_buffer);
|
| @@ -562,13 +546,13 @@ cipher_array_bits_per_second(cipher_t *cipher_array[], int num_cipher,
|
| v128_set_to_zero(&nonce);
|
| timer = clock();
|
| for(i=0; i < num_trials; i++, nonce.v32[3] = i) {
|
| - /* length parameter to cipher_encrypt is in/out -- out is total, padded
|
| + /* length parameter to srtp_cipher_encrypt is in/out -- out is total, padded
|
| * length -- so reset it each time. */
|
| unsigned octets_to_encrypt = octets_in_buffer;
|
|
|
| /* encrypt buffer with cipher */
|
| - cipher_set_iv(cipher_array[cipher_index], &nonce, direction_encrypt);
|
| - cipher_encrypt(cipher_array[cipher_index], enc_buf, &octets_to_encrypt);
|
| + srtp_cipher_set_iv(cipher_array[cipher_index], (uint8_t*)&nonce, srtp_direction_encrypt);
|
| + srtp_cipher_encrypt(cipher_array[cipher_index], enc_buf, &octets_to_encrypt);
|
|
|
| /* choose a cipher at random from the array*/
|
| cipher_index = (*((uint32_t *)enc_buf)) % num_cipher;
|
| @@ -586,7 +570,7 @@ cipher_array_bits_per_second(cipher_t *cipher_array[], int num_cipher,
|
| }
|
|
|
| void
|
| -cipher_array_test_throughput(cipher_t *ca[], int num_cipher) {
|
| +cipher_array_test_throughput(srtp_cipher_t *ca[], int num_cipher) {
|
| int i;
|
| int min_enc_len = 16;
|
| int max_enc_len = 2048; /* should be a power of two */
|
| @@ -601,11 +585,11 @@ cipher_array_test_throughput(cipher_t *ca[], int num_cipher) {
|
|
|
| }
|
|
|
| -err_status_t
|
| -cipher_driver_test_array_throughput(cipher_type_t *ct,
|
| +srtp_err_status_t
|
| +cipher_driver_test_array_throughput(srtp_cipher_type_t *ct,
|
| int klen, int num_cipher) {
|
| - cipher_t **ca = NULL;
|
| - err_status_t status;
|
| + srtp_cipher_t **ca = NULL;
|
| + srtp_err_status_t status;
|
|
|
| status = cipher_array_alloc_init(&ca, num_cipher, ct, klen);
|
| if (status) {
|
| @@ -618,5 +602,5 @@ cipher_driver_test_array_throughput(cipher_type_t *ct,
|
|
|
| cipher_array_delete(ca, num_cipher);
|
|
|
| - return err_status_ok;
|
| + return srtp_err_status_ok;
|
| }
|
|
|