From: Olivier CrĂȘte Date: Thu, 18 Oct 2018 18:49:50 +0000 (-0400) Subject: srtp: Add unit tests for MKI support X-Git-Tag: 1.19.3~507^2~3824 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=f401f4ca32638f5e88999937e01652538e9cdb66;p=platform%2Fupstream%2Fgstreamer.git srtp: Add unit tests for MKI support Both as a srtpenc ! srtpdec pipeline and as a test that uses fake packets for multiple mixed MKIs. https://bugzilla.gnome.org/show_bug.cgi?id=797305 --- diff --git a/tests/check/elements/srtp.c b/tests/check/elements/srtp.c index a4d8b4d..56536ce 100644 --- a/tests/check/elements/srtp.c +++ b/tests/check/elements/srtp.c @@ -207,6 +207,140 @@ GST_START_TEST (test_roc) GST_END_TEST; +#ifdef HAVE_SRTP2 + +GST_START_TEST (test_simple_mki) +{ + GstElement *pipeline; + GstElement *dec; + GstPad *pad; + GstBus *bus; + GstMessage *msg; + GstCaps *caps1, *caps2; + + pipeline = + gst_parse_launch + ("audiotestsrc num-buffers=50 ! alawenc ! rtppcmapay ! application/x-rtp, payload=(int)8, ssrc=(uint)1356955624 ! srtpenc name=enc key=012345678901234567890123456789012345678901234567890123456789 mki=1234 ! srtpdec name=dec ! rtppcmadepay ! alawdec ! fakesink", + NULL); + + fail_unless (gst_element_set_state (pipeline, + GST_STATE_PLAYING) != GST_STATE_CHANGE_FAILURE); + + bus = gst_pipeline_get_bus (GST_PIPELINE (pipeline)); + + msg = + gst_bus_timed_pop_filtered (bus, GST_CLOCK_TIME_NONE, + GST_MESSAGE_ERROR | GST_MESSAGE_EOS); + fail_unless (GST_MESSAGE_TYPE (msg) == GST_MESSAGE_EOS); + gst_message_unref (msg); + + gst_object_unref (bus); + + dec = gst_bin_get_by_name (GST_BIN (pipeline), "dec"); + fail_unless (dec); + pad = gst_element_get_static_pad (dec, "rtp_sink"); + fail_unless (pad); + g_object_get (pad, "caps", &caps1, NULL); + fail_unless (caps1); + caps2 = + gst_caps_from_string + ("application/x-srtp, srtp-key=(buffer)012345678901234567890123456789012345678901234567890123456789, mki=(buffer)1234"); + fail_unless (gst_caps_can_intersect (caps1, caps2)); + gst_caps_unref (caps1); + gst_caps_unref (caps2); + gst_object_unref (pad); + gst_object_unref (dec); + + gst_element_set_state (pipeline, GST_STATE_NULL); + gst_object_unref (pipeline); +} + +GST_END_TEST; + +GST_START_TEST (test_srtpdec_multiple_mki) +{ + static const char CAPS_RTP[] = + "application/x-rtp, media=(string)audio, clock-rate=(int)8000, encoding-name=(string)PCMA, payload=(int)8, ssrc=(uint)2648728855"; + static const char CAPS_SRTP[] = + "application/x-srtp, media=(string)audio, clock-rate=(int)8000, encoding-name=(string)PCMA, payload=(int)8, ssrc=(uint)2648728855, srtp-key=(buffer)012345678901234567890123456789012345678901234567890123456789, mki=(buffer)01, srtp-cipher=(string)aes-128-icm, srtp-auth=(string)hmac-sha1-80, srtcp-cipher=(string)aes-128-icm, srtcp-auth=(string)hmac-sha1-80, srtp-key2=(buffer)678901234567890123456789012345678901234567890123456780123456, mki2=(buffer)02"; + + unsigned char DECRYPTED_1_PKT[] = { + 0x80, 0x88, 0x13, 0xe1, 0x87, 0x76, 0xda, 0x98, 0x9d, 0xe0, 0x65, 0x17, + 0xb4, 0xa5, 0xa3, 0xac, 0xac, 0xa3, 0xa5, 0xb7, 0xfc, 0x0a + }; + unsigned int DECRYPTED_1_PKT_LEN = 22; + unsigned char DECRYPTED_2_PKT[] = { + 0x80, 0x08, 0x13, 0xe2, 0x87, 0x76, 0xda, 0xa2, 0x9d, 0xe0, 0x65, 0x17, + 0x3a, 0x20, 0x2d, 0x2c, 0x23, 0x24, 0x31, 0x6c, 0x89, 0xbb + }; + unsigned int DECRYPTED_2_PKT_LEN = 22; + unsigned char DECRYPTED_3_PKT[] = { + 0x80, 0x08, 0x13, 0xe3, 0x87, 0x76, 0xda, 0xac, 0x9d, 0xe0, 0x65, 0x17, + 0xa0, 0xad, 0xac, 0xa2, 0xa7, 0xb0, 0x96, 0x0c, 0x39, 0x21 + }; + unsigned int DECRYPTED_3_PKT_LEN = 22; + unsigned char MKI_1_01_PKT[] = { + 0x80, 0x88, 0x13, 0xe1, 0x87, 0x76, 0xda, 0x98, 0x9d, 0xe0, 0x65, 0x17, + 0xd7, 0x16, 0xac, 0x3e, 0x60, 0x08, 0x04, 0xd6, 0xfb, 0x0e, 0x01, 0x77, + 0x93, 0x20, 0x3f, 0x45, 0x2c, 0xb3, 0x74, 0xd1, 0x20 + }; + unsigned int MKI_1_01_PKT_LEN = 33; + unsigned char MKI_2_02_PKT[] = { + 0x80, 0x08, 0x13, 0xe2, 0x87, 0x76, 0xda, 0xa2, 0x9d, 0xe0, 0x65, 0x17, + 0xc4, 0x69, 0x8c, 0xb3, 0xf8, 0x64, 0x66, 0x78, 0x7f, 0x1d, 0x02, 0x8f, + 0x50, 0x57, 0xff, 0xa4, 0x80, 0xe6, 0x68, 0x74, 0x21 + }; + unsigned int MKI_2_02_PKT_LEN = 33; + unsigned char MKI_3_01_PKT[] = { + 0x80, 0x08, 0x13, 0xe3, 0x87, 0x76, 0xda, 0xac, 0x9d, 0xe0, 0x65, 0x17, + 0xa6, 0xdf, 0x77, 0x4c, 0xb0, 0xe9, 0x3c, 0x1a, 0x54, 0x6f, 0x01, 0x9d, + 0xc3, 0x4b, 0x1d, 0x29, 0x67, 0xa0, 0x4d, 0xde, 0xec + }; + unsigned int MKI_3_01_PKT_LEN = 33; + + + GstHarness *h = + gst_harness_new_with_padnames ("srtpdec", "rtp_sink", "rtp_src"); + GstBuffer *buf; + + gst_harness_set_caps_str (h, CAPS_SRTP, CAPS_RTP); + + buf = gst_harness_push_and_pull (h, + gst_buffer_new_wrapped_full (GST_MEMORY_FLAG_READONLY, + (char *) MKI_1_01_PKT, MKI_1_01_PKT_LEN, 0, MKI_1_01_PKT_LEN, NULL, + NULL)); + fail_unless (buf); + fail_unless_equals_int (gst_buffer_get_size (buf), DECRYPTED_1_PKT_LEN); + fail_unless (!gst_buffer_memcmp (buf, 0, DECRYPTED_1_PKT, + DECRYPTED_1_PKT_LEN)); + gst_buffer_unref (buf); + + buf = gst_harness_push_and_pull (h, + gst_buffer_new_wrapped_full (GST_MEMORY_FLAG_READONLY, + (char *) MKI_2_02_PKT, MKI_2_02_PKT_LEN, 0, MKI_2_02_PKT_LEN, NULL, + NULL)); + fail_unless_equals_int (gst_buffer_get_size (buf), DECRYPTED_2_PKT_LEN); + fail_unless (!gst_buffer_memcmp (buf, 0, DECRYPTED_2_PKT, + DECRYPTED_2_PKT_LEN)); + gst_buffer_unref (buf); + + buf = gst_harness_push_and_pull (h, + gst_buffer_new_wrapped_full (GST_MEMORY_FLAG_READONLY, + (char *) MKI_3_01_PKT, MKI_3_01_PKT_LEN, 0, MKI_3_01_PKT_LEN, NULL, + NULL)); + fail_unless_equals_int (gst_buffer_get_size (buf), DECRYPTED_3_PKT_LEN); + fail_unless (!gst_buffer_memcmp (buf, 0, DECRYPTED_3_PKT, + DECRYPTED_3_PKT_LEN)); + gst_buffer_unref (buf); + + gst_harness_teardown (h); +} + +GST_END_TEST; + + +#endif + static Suite * srtp_suite (void) { @@ -218,6 +352,10 @@ srtp_suite (void) tcase_add_test (tc_chain, test_create_and_unref); tcase_add_test (tc_chain, test_play); tcase_add_test (tc_chain, test_roc); +#ifdef HAVE_SRTP2 + tcase_add_test (tc_chain, test_simple_mki); + tcase_add_test (tc_chain, test_srtpdec_multiple_mki); +#endif return s; }