Index: test/rtpw.c |
diff --git a/srtp/test/rtpw.c b/test/rtpw.c |
similarity index 90% |
rename from srtp/test/rtpw.c |
rename to test/rtpw.c |
index b4d27726ba10bfd9147742c9e2a70177f658b6b9..763bdeea77961755d30a1162934060f1089e8286 100644 |
--- a/srtp/test/rtpw.c |
+++ b/test/rtpw.c |
@@ -55,7 +55,6 @@ |
#include <config.h> |
#endif |
-#include "datatypes.h" |
#include "getopt_s.h" /* for local getopt() */ |
#include <stdio.h> /* for printf, fprintf */ |
@@ -88,7 +87,7 @@ |
#include "srtp.h" |
#include "rtp.h" |
-#include "crypto_kernel.h" |
+#include "util.h" |
#ifdef RTPW_USE_WINSOCK2 |
# define DICT_FILE "words.txt" |
@@ -157,7 +156,7 @@ main (int argc, char *argv[]) { |
struct sockaddr_in local; |
#endif |
program_type prog_type = unknown; |
- sec_serv_t sec_servs = sec_serv_none; |
+ srtp_sec_serv_t sec_servs = sec_serv_none; |
unsigned char ttl = 5; |
int c; |
int key_size = 128; |
@@ -170,7 +169,7 @@ main (int argc, char *argv[]) { |
unsigned short port = 0; |
rtp_sender_t snd; |
srtp_policy_t policy; |
- err_status_t status; |
+ srtp_err_status_t status; |
int len; |
int expected_len; |
int do_list_mods = 0; |
@@ -186,6 +185,8 @@ main (int argc, char *argv[]) { |
} |
#endif |
+ memset(&policy, 0x0, sizeof(srtp_policy_t)); |
+ |
printf("Using %s [0x%x]\n", srtp_get_version_string(), srtp_get_version()); |
if (setup_signal_handler(argv[0]) != 0) { |
@@ -241,7 +242,7 @@ main (int argc, char *argv[]) { |
prog_type = sender; |
break; |
case 'd': |
- status = crypto_kernel_set_debug_module(optarg_s, 1); |
+ status = srtp_set_debug_module(optarg_s, 1); |
if (status) { |
printf("error: set debug module (%s) failed\n", optarg_s); |
exit(1); |
@@ -257,7 +258,7 @@ main (int argc, char *argv[]) { |
if (prog_type == unknown) { |
if (do_list_mods) { |
- status = crypto_kernel_list_debug_modules(); |
+ status = srtp_list_debug_modules(); |
if (status) { |
printf("error: list of debug modules failed\n"); |
exit(1); |
@@ -356,7 +357,6 @@ main (int argc, char *argv[]) { |
printf("\n"); |
/* set up the srtp policy and master key */ |
- memset(&policy, 0, sizeof(policy)); |
if (sec_servs) { |
/* |
* create policy structure, using the default mechanisms but |
@@ -369,12 +369,12 @@ main (int argc, char *argv[]) { |
#ifdef OPENSSL |
switch (key_size) { |
case 128: |
- crypto_policy_set_aes_gcm_128_8_auth(&policy.rtp); |
- crypto_policy_set_aes_gcm_128_8_auth(&policy.rtcp); |
+ srtp_crypto_policy_set_aes_gcm_128_8_auth(&policy.rtp); |
+ srtp_crypto_policy_set_aes_gcm_128_8_auth(&policy.rtcp); |
break; |
case 256: |
- crypto_policy_set_aes_gcm_256_8_auth(&policy.rtp); |
- crypto_policy_set_aes_gcm_256_8_auth(&policy.rtcp); |
+ srtp_crypto_policy_set_aes_gcm_256_8_auth(&policy.rtp); |
+ srtp_crypto_policy_set_aes_gcm_256_8_auth(&policy.rtcp); |
break; |
} |
#else |
@@ -384,12 +384,12 @@ main (int argc, char *argv[]) { |
} else { |
switch (key_size) { |
case 128: |
- crypto_policy_set_rtp_default(&policy.rtp); |
- crypto_policy_set_rtcp_default(&policy.rtcp); |
+ srtp_crypto_policy_set_rtp_default(&policy.rtp); |
+ srtp_crypto_policy_set_rtcp_default(&policy.rtcp); |
break; |
case 256: |
- crypto_policy_set_aes_cm_256_hmac_sha1_80(&policy.rtp); |
- crypto_policy_set_rtcp_default(&policy.rtcp); |
+ srtp_crypto_policy_set_aes_cm_256_hmac_sha1_80(&policy.rtp); |
+ srtp_crypto_policy_set_rtcp_default(&policy.rtcp); |
break; |
} |
} |
@@ -401,12 +401,12 @@ main (int argc, char *argv[]) { |
} else { |
switch (key_size) { |
case 128: |
- crypto_policy_set_aes_cm_128_null_auth(&policy.rtp); |
- crypto_policy_set_rtcp_default(&policy.rtcp); |
+ srtp_crypto_policy_set_aes_cm_128_null_auth(&policy.rtp); |
+ srtp_crypto_policy_set_rtcp_default(&policy.rtcp); |
break; |
case 256: |
- crypto_policy_set_aes_cm_256_null_auth(&policy.rtp); |
- crypto_policy_set_rtcp_default(&policy.rtcp); |
+ srtp_crypto_policy_set_aes_cm_256_null_auth(&policy.rtp); |
+ srtp_crypto_policy_set_rtcp_default(&policy.rtcp); |
break; |
} |
} |
@@ -416,12 +416,12 @@ main (int argc, char *argv[]) { |
#ifdef OPENSSL |
switch (key_size) { |
case 128: |
- crypto_policy_set_aes_gcm_128_8_only_auth(&policy.rtp); |
- crypto_policy_set_aes_gcm_128_8_only_auth(&policy.rtcp); |
+ srtp_crypto_policy_set_aes_gcm_128_8_only_auth(&policy.rtp); |
+ srtp_crypto_policy_set_aes_gcm_128_8_only_auth(&policy.rtcp); |
break; |
case 256: |
- crypto_policy_set_aes_gcm_256_8_only_auth(&policy.rtp); |
- crypto_policy_set_aes_gcm_256_8_only_auth(&policy.rtcp); |
+ srtp_crypto_policy_set_aes_gcm_256_8_only_auth(&policy.rtp); |
+ srtp_crypto_policy_set_aes_gcm_256_8_only_auth(&policy.rtcp); |
break; |
} |
#else |
@@ -429,8 +429,8 @@ main (int argc, char *argv[]) { |
return 0; |
#endif |
} else { |
- crypto_policy_set_null_cipher_hmac_sha1_80(&policy.rtp); |
- crypto_policy_set_rtcp_default(&policy.rtcp); |
+ srtp_crypto_policy_set_null_cipher_hmac_sha1_80(&policy.rtp); |
+ srtp_crypto_policy_set_rtcp_default(&policy.rtcp); |
} |
break; |
default: |
@@ -495,21 +495,11 @@ main (int argc, char *argv[]) { |
* the effect of this policy is to turn off SRTP, so that this |
* application is now a vanilla-flavored RTP application. |
*/ |
+ srtp_crypto_policy_set_null_cipher_hmac_null(&policy.rtp); |
+ srtp_crypto_policy_set_null_cipher_hmac_null(&policy.rtcp); |
policy.key = (uint8_t *)key; |
policy.ssrc.type = ssrc_specific; |
policy.ssrc.value = ssrc; |
- policy.rtp.cipher_type = NULL_CIPHER; |
- policy.rtp.cipher_key_len = 0; |
- policy.rtp.auth_type = NULL_AUTH; |
- policy.rtp.auth_key_len = 0; |
- policy.rtp.auth_tag_len = 0; |
- policy.rtp.sec_serv = sec_serv_none; |
- policy.rtcp.cipher_type = NULL_CIPHER; |
- policy.rtcp.cipher_key_len = 0; |
- policy.rtcp.auth_type = NULL_AUTH; |
- policy.rtcp.auth_key_len = 0; |
- policy.rtcp.auth_tag_len = 0; |
- policy.rtcp.sec_serv = sec_serv_none; |
policy.window_size = 0; |
policy.allow_repeat_tx = 0; |
policy.ekt = NULL; |