| Index: test/dtls_srtp_driver.c
|
| diff --git a/srtp/test/dtls_srtp_driver.c b/test/dtls_srtp_driver.c
|
| similarity index 88%
|
| rename from srtp/test/dtls_srtp_driver.c
|
| rename to test/dtls_srtp_driver.c
|
| index 24de11717de58cf550630acad90604db6a4431cc..cc2a002d93b9aacdd4822f99f795b86aed2f7aa3 100644
|
| --- a/srtp/test/dtls_srtp_driver.c
|
| +++ b/test/dtls_srtp_driver.c
|
| @@ -46,7 +46,7 @@
|
| #include "getopt_s.h" /* for local getopt() */
|
| #include "srtp_priv.h"
|
|
|
| -err_status_t
|
| +srtp_err_status_t
|
| test_dtls_srtp(void);
|
|
|
| srtp_hdr_t *
|
| @@ -64,7 +64,7 @@ int
|
| main(int argc, char *argv[]) {
|
| unsigned do_list_mods = 0;
|
| int q;
|
| - err_status_t err;
|
| + srtp_err_status_t err;
|
|
|
| printf("dtls_srtp_driver\n");
|
|
|
| @@ -85,7 +85,7 @@ main(int argc, char *argv[]) {
|
| do_list_mods = 1;
|
| break;
|
| case 'd':
|
| - err = crypto_kernel_set_debug_module(optarg_s, 1);
|
| + err = srtp_crypto_kernel_set_debug_module(optarg_s, 1);
|
| if (err) {
|
| printf("error: set debug module (%s) failed\n", optarg_s);
|
| exit(1);
|
| @@ -97,7 +97,7 @@ main(int argc, char *argv[]) {
|
| }
|
|
|
| if (do_list_mods) {
|
| - err = crypto_kernel_list_debug_modules();
|
| + err = srtp_crypto_kernel_list_debug_modules();
|
| if (err) {
|
| printf("error: list of debug modules failed\n");
|
| exit(1);
|
| @@ -123,7 +123,7 @@ main(int argc, char *argv[]) {
|
| }
|
|
|
|
|
| -err_status_t
|
| +srtp_err_status_t
|
| test_dtls_srtp(void) {
|
| srtp_hdr_t *test_packet;
|
| int test_packet_len = 80;
|
| @@ -133,7 +133,9 @@ test_dtls_srtp(void) {
|
| uint8_t salt[SRTP_MAX_KEY_LEN];
|
| unsigned int key_len, salt_len;
|
| srtp_profile_t profile;
|
| - err_status_t err;
|
| + srtp_err_status_t err;
|
| +
|
| + memset(&policy, 0x0, sizeof(srtp_policy_t));
|
|
|
| /* create a 'null' SRTP session */
|
| err = srtp_create(&s, NULL);
|
| @@ -142,53 +144,52 @@ test_dtls_srtp(void) {
|
|
|
| /*
|
| * verify that packet-processing functions behave properly - we
|
| - * expect that these functions will return err_status_no_ctx
|
| + * expect that these functions will return srtp_err_status_no_ctx
|
| */
|
| test_packet = srtp_create_test_packet(80, 0xa5a5a5a5);
|
| if (test_packet == NULL)
|
| - return err_status_alloc_fail;
|
| + return srtp_err_status_alloc_fail;
|
| err = srtp_protect(s, test_packet, &test_packet_len);
|
| - if (err != err_status_no_ctx) {
|
| + if (err != srtp_err_status_no_ctx) {
|
| printf("wrong return value from srtp_protect() (got code %d)\n",
|
| err);
|
| - return err_status_fail;
|
| + return srtp_err_status_fail;
|
| }
|
| err = srtp_unprotect(s, test_packet, &test_packet_len);
|
| - if (err != err_status_no_ctx) {
|
| + if (err != srtp_err_status_no_ctx) {
|
| printf("wrong return value from srtp_unprotect() (got code %d)\n",
|
| err);
|
| - return err_status_fail;
|
| + return srtp_err_status_fail;
|
| }
|
| err = srtp_protect_rtcp(s, test_packet, &test_packet_len);
|
| - if (err != err_status_no_ctx) {
|
| + if (err != srtp_err_status_no_ctx) {
|
| printf("wrong return value from srtp_protect_rtcp() (got code %d)\n",
|
| err);
|
| - return err_status_fail;
|
| + return srtp_err_status_fail;
|
| }
|
| err = srtp_unprotect_rtcp(s, test_packet, &test_packet_len);
|
| - if (err != err_status_no_ctx) {
|
| + if (err != srtp_err_status_no_ctx) {
|
| printf("wrong return value from srtp_unprotect_rtcp() (got code %d)\n",
|
| err);
|
| - return err_status_fail;
|
| + return srtp_err_status_fail;
|
| }
|
|
|
|
|
| /*
|
| * set keys to known values for testing
|
| */
|
| - memset(&policy, 0, sizeof(policy));
|
| profile = srtp_profile_aes128_cm_sha1_80;
|
| key_len = srtp_profile_get_master_key_length(profile);
|
| salt_len = srtp_profile_get_master_salt_length(profile);
|
| memset(key, 0xff, key_len);
|
| memset(salt, 0xee, salt_len);
|
| - append_salt_to_key(key, key_len, salt, salt_len);
|
| + srtp_append_salt_to_key(key, key_len, salt, salt_len);
|
| policy.key = key;
|
|
|
| /* initialize SRTP policy from profile */
|
| - err = crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile);
|
| + err = srtp_crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile);
|
| if (err) return err;
|
| - err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
|
| + err = srtp_crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
|
| if (err) return err;
|
| policy.ssrc.type = ssrc_any_inbound;
|
| policy.ekt = NULL;
|
| @@ -206,7 +207,7 @@ test_dtls_srtp(void) {
|
|
|
| free(test_packet);
|
|
|
| - return err_status_ok;
|
| + return srtp_err_status_ok;
|
| }
|
|
|
|
|
|
|