/* * libZRTP SDK library, implements the ZRTP secure VoIP protocol. * Copyright (c) 2006-2009 Philip R. Zimmermann. All rights reserved. * Contact: http://philzimmermann.com * For licensing and other legal details, see the file zrtp_legal.c. * * Viktor Krykun <v.krikun at zfoneproject.com> */ #include <setjmp.h> #include <stdio.h> #include "zrtp.h" #include "cmockery/cmockery.h" zrtp_global_t *zrtp; extern zrtp_dk_ctx *zrtp_dk_init(zrtp_cipher_t *cipher, zrtp_stringn_t *key, zrtp_stringn_t *salt); extern zrtp_status_t zrtp_derive_key(zrtp_dk_ctx *ctx, zrtp_srtp_prf_label label, zrtp_stringn_t *result_key); extern void zrtp_dk_deinit(zrtp_dk_ctx *ctx); static uint8_t dk_master_key[16] = { 0xE1, 0xF9, 0x7A, 0x0D, 0x3E, 0x01, 0x8B, 0xE0, 0xD6, 0x4F, 0xA3, 0x2C, 0x06, 0xDE, 0x41, 0x39 }; static uint8_t dk_master_salt[14] = { 0x0E, 0xC6, 0x75, 0xAD, 0x49, 0x8A, 0xFE, 0xEB, 0xB6, 0x96, 0x0B, 0x3A, 0xAB, 0xE6 }; static uint8_t dk_cipher_key[16] = { 0xC6, 0x1E, 0x7A, 0x93, 0x74, 0x4F, 0x39, 0xEE, 0x10, 0x73, 0x4A, 0xFE, 0x3F, 0xF7, 0xA0, 0x87 }; static uint8_t dk_cipher_salt[14] = { 0x30, 0xCB, 0xBC, 0x08, 0x86, 0x3D, 0x8C, 0x85, 0xD4, 0x9D, 0xB3, 0x4A, 0x9A, 0xE1 }; static uint8_t dk_auth_key[94] = { 0xCE, 0xBE, 0x32, 0x1F, 0x6F, 0xF7, 0x71, 0x6B, 0x6F, 0xD4, 0xAB, 0x49, 0xAF, 0x25, 0x6A, 0x15, 0x6D, 0x38, 0xBA, 0xA4, 0x8F, 0x0A, 0x0A, 0xCF, 0x3C, 0x34, 0xE2, 0x35, 0x9E, 0x6C, 0xDB, 0xCE, 0xE0, 0x49, 0x64, 0x6C, 0x43, 0xD9, 0x32, 0x7A, 0xD1, 0x75, 0x57, 0x8E, 0xF7, 0x22, 0x70, 0x98, 0x63, 0x71, 0xC1, 0x0C, 0x9A, 0x36, 0x9A, 0xC2, 0xF9, 0x4A, 0x8C, 0x5F, 0xBC, 0xDD, 0xDC, 0x25, 0x6D, 0x6E, 0x91, 0x9A, 0x48, 0xB6, 0x10, 0xEF, 0x17, 0xC2, 0x04, 0x1E, 0x47, 0x40, 0x35, 0x76, 0x6B, 0x68, 0x64, 0x2C, 0x59, 0xBB, 0xFC, 0x2F, 0x34, 0xDB, 0x60, 0xDB, 0xDF, 0xB2 }; void setup() { zrtp_status_t s; zrtp_config_t zrtp_config; zrtp_config_defaults(&zrtp_config); s = zrtp_init(&zrtp_config, &zrtp); assert_int_equal(s, zrtp_status_ok); } void teardown() { zrtp_down(zrtp); } zrtp_status_t hex_cmp(uint8_t *a, uint8_t *b, uint32_t len) { uint32_t i; zrtp_status_t res = zrtp_status_ok; for (i = 0; i<len; i++) { if (a[i] != b[i]) { res = zrtp_status_fail; break; } } return res; } static void dk_test() { zrtp_status_t res; zrtp_string16_t master_key, master_salt, cipher_key, cipher_salt; zrtp_string128_t auth_key; zrtp_dk_ctx *ctx; zrtp_cipher_t *cipher = zrtp_comp_find(ZRTP_CC_CIPHER, ZRTP_CIPHER_AES128, zrtp); assert_non_null(cipher); master_key.length = master_key.max_length = 16; zrtp_memcpy(master_key.buffer, dk_master_key, 16); master_salt.length = 14; master_salt.max_length = 16; zrtp_memcpy(master_salt.buffer, dk_master_salt, 14); ctx = zrtp_dk_init(cipher, (zrtp_stringn_t*)&master_key, (zrtp_stringn_t*)&master_salt); assert_non_null(ctx); cipher_key.length = 16; cipher_key.max_length = 16; zrtp_derive_key(ctx, label_rtp_encryption, (zrtp_stringn_t*)&cipher_key); res = hex_cmp((uint8_t*)cipher_key.buffer, dk_cipher_key, cipher_key.length); assert_int_equal(res, zrtp_status_ok); cipher_salt.length = 14; cipher_salt.max_length = 16; zrtp_derive_key(ctx, label_rtp_salt, (zrtp_stringn_t*)&cipher_salt); res = hex_cmp((uint8_t*)cipher_salt.buffer, dk_cipher_salt, cipher_salt.length); assert_int_equal(res, zrtp_status_ok); auth_key.length = 94; auth_key.max_length = 128; zrtp_derive_key(ctx, label_rtp_msg_auth, (zrtp_stringn_t*)&auth_key); res = hex_cmp((uint8_t*)auth_key.buffer, dk_auth_key, auth_key.length); assert_int_equal(res, zrtp_status_ok); zrtp_dk_deinit(ctx); } int main(void) { const UnitTest tests[] = { unit_test_setup_teardown(dk_test, setup, teardown), }; return run_tests(tests); }