VaKeR CYBER ARMY
Logo of a company Server : Apache/2.4.41 (Ubuntu)
System : Linux absol.cf 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.33
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Directory :  /usr/local/lib/node_modules/mediasoup/worker/deps/libsrtp/srtp/crypto/test/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/local/lib/node_modules/mediasoup/worker/deps/libsrtp/srtp/crypto/test/stat_driver.c
/*
 * stat-driver.c
 *
 * test driver for the stat_test functions
 *
 * David A. McGrew
 * Cisco Systems, Inc.
 */

/*
 *
 * Copyright (c) 2001-2017, Cisco Systems, Inc.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 *
 *   Redistributions of source code must retain the above copyright
 *   notice, this list of conditions and the following disclaimer.
 *
 *   Redistributions in binary form must reproduce the above
 *   copyright notice, this list of conditions and the following
 *   disclaimer in the documentation and/or other materials provided
 *   with the distribution.
 *
 *   Neither the name of the Cisco Systems, Inc. nor the names of its
 *   contributors may be used to endorse or promote products derived
 *   from this software without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 *
 */

#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

#include <stdio.h> /* for printf() */

#include "err.h"
#include "stat.h"
#include "srtp.h"

#include "cipher.h"
#include "cipher_priv.h"

void err_check(srtp_err_status_t s)
{
    if (s) {
        printf("error (code %d)\n", s);
        exit(1);
    }
}

int main(int argc, char *argv[])
{
    uint8_t buffer[2532];
    unsigned int buf_len = 2500;
    int i, j;
    extern srtp_cipher_type_t srtp_aes_icm_128;
    extern srtp_cipher_type_t srtp_aes_icm_256;
#ifdef GCM
    extern srtp_cipher_type_t srtp_aes_gcm_128;
    extern srtp_cipher_type_t srtp_aes_gcm_256;
#endif
    srtp_cipher_t *c;
    /* clang-format off */
    uint8_t key[46] = {
        0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
        0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
        0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
        0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
        0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
        0x00, 0x01, 0x02, 0x03, 0x04, 0x05
    };
    /* clang-format on */
    v128_t nonce;
    int num_trials = 500;
    int num_fail;

    printf("statistical tests driver\n");

    v128_set_to_zero(&nonce);
    for (i = 0; i < 2500; i++)
        buffer[i] = 0;

    /* run tests */
    printf("running stat_tests on all-null buffer, expecting failure\n");
    printf("monobit %d\n", stat_test_monobit(buffer));
    printf("poker   %d\n", stat_test_poker(buffer));
    printf("runs    %d\n", stat_test_runs(buffer));

    srtp_cipher_rand_for_tests(buffer, 2500);
    printf("running stat_tests on rand(), expecting success\n");
    printf("monobit %d\n", stat_test_monobit(buffer));
    printf("poker   %d\n", stat_test_poker(buffer));
    printf("runs    %d\n", stat_test_runs(buffer));

    printf("running stat_tests on AES-128-ICM, expecting success\n");
    /* set buffer to cipher output */
    for (i = 0; i < 2500; i++)
        buffer[i] = 0;
    err_check(srtp_cipher_type_alloc(&srtp_aes_icm_128, &c,
                                     SRTP_AES_ICM_128_KEY_LEN_WSALT, 0));
    err_check(srtp_cipher_init(c, key));
    err_check(srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
    err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
    /* run tests on cipher outout */
    printf("monobit %d\n", stat_test_monobit(buffer));
    printf("poker   %d\n", stat_test_poker(buffer));
    printf("runs    %d\n", stat_test_runs(buffer));

    printf("runs test (please be patient): ");
    fflush(stdout);
    num_fail = 0;
    v128_set_to_zero(&nonce);
    for (j = 0; j < num_trials; j++) {
        for (i = 0; i < 2500; i++)
            buffer[i] = 0;
        nonce.v32[3] = i;
        err_check(
            srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
        err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
        if (stat_test_runs(buffer)) {
            num_fail++;
        }
    }

    printf("%d failures in %d tests\n", num_fail, num_trials);
    printf("(nota bene: a small fraction of stat_test failures does not \n"
           "indicate that the random source is invalid)\n");

    err_check(srtp_cipher_dealloc(c));

    printf("running stat_tests on AES-256-ICM, expecting success\n");
    /* set buffer to cipher output */
    for (i = 0; i < 2500; i++)
        buffer[i] = 0;
    err_check(srtp_cipher_type_alloc(&srtp_aes_icm_256, &c,
                                     SRTP_AES_ICM_256_KEY_LEN_WSALT, 0));
    err_check(srtp_cipher_init(c, key));
    err_check(srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
    err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
    /* run tests on cipher outout */
    printf("monobit %d\n", stat_test_monobit(buffer));
    printf("poker   %d\n", stat_test_poker(buffer));
    printf("runs    %d\n", stat_test_runs(buffer));

    printf("runs test (please be patient): ");
    fflush(stdout);
    num_fail = 0;
    v128_set_to_zero(&nonce);
    for (j = 0; j < num_trials; j++) {
        for (i = 0; i < 2500; i++)
            buffer[i] = 0;
        nonce.v32[3] = i;
        err_check(
            srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
        err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
        if (stat_test_runs(buffer)) {
            num_fail++;
        }
    }

#ifdef GCM
    {
        printf("running stat_tests on AES-128-GCM, expecting success\n");
        /* set buffer to cipher output */
        for (i = 0; i < 2500; i++) {
            buffer[i] = 0;
        }
        err_check(srtp_cipher_type_alloc(&srtp_aes_gcm_128, &c,
                                         SRTP_AES_GCM_128_KEY_LEN_WSALT, 8));
        err_check(srtp_cipher_init(c, key));
        err_check(
            srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
        err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
        /* run tests on cipher outout */
        printf("monobit %d\n", stat_test_monobit(buffer));
        printf("poker   %d\n", stat_test_poker(buffer));
        printf("runs    %d\n", stat_test_runs(buffer));
        fflush(stdout);
        num_fail = 0;
        v128_set_to_zero(&nonce);
        for (j = 0; j < num_trials; j++) {
            for (i = 0; i < 2500; i++) {
                buffer[i] = 0;
            }
            nonce.v32[3] = i;
            err_check(srtp_cipher_set_iv(c, (uint8_t *)&nonce,
                                         srtp_direction_encrypt));
            err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
            buf_len = 2500;
            if (stat_test_runs(buffer)) {
                num_fail++;
            }
        }

        printf("running stat_tests on AES-256-GCM, expecting success\n");
        /* set buffer to cipher output */
        for (i = 0; i < 2500; i++) {
            buffer[i] = 0;
        }
        err_check(srtp_cipher_type_alloc(&srtp_aes_gcm_256, &c,
                                         SRTP_AES_GCM_256_KEY_LEN_WSALT, 16));
        err_check(srtp_cipher_init(c, key));
        err_check(
            srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
        err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
        /* run tests on cipher outout */
        printf("monobit %d\n", stat_test_monobit(buffer));
        printf("poker   %d\n", stat_test_poker(buffer));
        printf("runs    %d\n", stat_test_runs(buffer));
        fflush(stdout);
        num_fail = 0;
        v128_set_to_zero(&nonce);
        for (j = 0; j < num_trials; j++) {
            for (i = 0; i < 2500; i++) {
                buffer[i] = 0;
            }
            nonce.v32[3] = i;
            err_check(srtp_cipher_set_iv(c, (uint8_t *)&nonce,
                                         srtp_direction_encrypt));
            err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
            buf_len = 2500;
            if (stat_test_runs(buffer)) {
                num_fail++;
            }
        }
    }
#endif

    printf("%d failures in %d tests\n", num_fail, num_trials);
    printf("(nota bene: a small fraction of stat_test failures does not \n"
           "indicate that the random source is invalid)\n");

    err_check(srtp_cipher_dealloc(c));

    return 0;
}

VaKeR 2022