@@ -2373,25 +2373,27 @@ srtp_err_status_t srtp_validate_encrypted_extensions_headers_gcm(void)
23732373 0xab , 0xab , 0xab , 0xab , 0xab , 0xab , 0xab , 0xab ,
23742374 0xab , 0xab , 0xab , 0xab , 0xab , 0xab , 0xab , 0xab
23752375 };
2376- uint8_t srtp_plaintext [64 ] = {
2376+ uint8_t srtp_plaintext [72 ] = {
23772377 0x90 , 0x0f , 0x12 , 0x34 , 0xde , 0xca , 0xfb , 0xad ,
23782378 0xca , 0xfe , 0xba , 0xbe , 0xBE , 0xDE , 0x00 , 0x06 ,
23792379 0x17 , 0x41 , 0x42 , 0x73 , 0xA4 , 0x75 , 0x26 , 0x27 ,
23802380 0x48 , 0x22 , 0x00 , 0x00 , 0xC8 , 0x30 , 0x8E , 0x46 ,
23812381 0x55 , 0x99 , 0x63 , 0x86 , 0xB3 , 0x95 , 0xFB , 0x00 ,
23822382 0xab , 0xab , 0xab , 0xab , 0xab , 0xab , 0xab , 0xab ,
23832383 0xab , 0xab , 0xab , 0xab , 0xab , 0xab , 0xab , 0xab ,
2384+ 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
23842385 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00
23852386 };
2386- uint8_t srtp_ciphertext [64 ] = {
2387+ uint8_t srtp_ciphertext [72 ] = {
23872388 0x90 , 0x0f , 0x12 , 0x34 , 0xde , 0xca , 0xfb , 0xad ,
23882389 0xca , 0xfe , 0xba , 0xbe , 0xBE , 0xDE , 0x00 , 0x06 ,
23892390 0x17 , 0x12 , 0xe0 , 0x20 , 0x5b , 0xfa , 0x94 , 0x9b ,
23902391 0x1C , 0x22 , 0x00 , 0x00 , 0xC8 , 0x30 , 0xbb , 0x46 ,
23912392 0x73 , 0x27 , 0x78 , 0xd9 , 0x92 , 0x9a , 0xab , 0x00 ,
23922393 0x0e , 0xca , 0x0c , 0xf9 , 0x5e , 0xe9 , 0x55 , 0xb2 ,
23932394 0x6c , 0xd3 , 0xd2 , 0x88 , 0xb4 , 0x9f , 0x6c , 0xa9 ,
2394- 0xf4 , 0xb1 , 0xb7 , 0x59 , 0x71 , 0x9e , 0xb5 , 0xbc
2395+ 0xf4 , 0xb1 , 0xb7 , 0x59 , 0x71 , 0x9e , 0xb5 , 0xbc ,
2396+ 0x11 , 0x3b , 0x9f , 0xf1 , 0xd4 , 0x0c , 0xd2 , 0x5a
23952397 };
23962398 // clang-format on
23972399
@@ -2406,8 +2408,8 @@ srtp_err_status_t srtp_validate_encrypted_extensions_headers_gcm(void)
24062408 * policy and with the SSRC value 0xcafebabe
24072409 */
24082410 memset (& policy , 0 , sizeof (policy ));
2409- srtp_crypto_policy_set_aes_gcm_128_8_auth (& policy .rtp );
2410- srtp_crypto_policy_set_aes_gcm_128_8_auth (& policy .rtcp );
2411+ srtp_crypto_policy_set_aes_gcm_128_16_auth (& policy .rtp );
2412+ srtp_crypto_policy_set_aes_gcm_128_16_auth (& policy .rtcp );
24112413 policy .ssrc .type = ssrc_specific ;
24122414 policy .ssrc .value = 0xcafebabe ;
24132415 policy .key = test_key_ext_headers ;
@@ -2429,9 +2431,9 @@ srtp_err_status_t srtp_validate_encrypted_extensions_headers_gcm(void)
24292431 if (status || (len != sizeof (srtp_plaintext )))
24302432 return srtp_err_status_fail ;
24312433
2432- debug_print (mod_driver , "ciphertext:\n %s" ,
2434+ debug_print (mod_driver , " ? ciphertext:\n %s" ,
24332435 srtp_octet_string_hex_string (srtp_plaintext , len ));
2434- debug_print (mod_driver , "ciphertext reference:\n %s" ,
2436+ debug_print (mod_driver , " ? ciphertext reference:\n %s" ,
24352437 srtp_octet_string_hex_string (srtp_ciphertext , len ));
24362438
24372439 if (srtp_octet_string_is_eq (srtp_plaintext , srtp_ciphertext , len ))
@@ -2723,8 +2725,8 @@ srtp_err_status_t srtp_test_empty_payload_gcm(void)
27232725 * policy and with the SSRC value 0xcafebabe
27242726 */
27252727 memset (& policy , 0 , sizeof (policy ));
2726- srtp_crypto_policy_set_aes_gcm_128_8_auth (& policy .rtp );
2727- srtp_crypto_policy_set_aes_gcm_128_8_auth (& policy .rtcp );
2728+ srtp_crypto_policy_set_aes_gcm_128_16_auth (& policy .rtp );
2729+ srtp_crypto_policy_set_aes_gcm_128_16_auth (& policy .rtcp );
27282730 policy .ssrc .type = ssrc_specific ;
27292731 policy .ssrc .value = 0xcafebabe ;
27302732 policy .key = test_key ;
@@ -2745,7 +2747,7 @@ srtp_err_status_t srtp_test_empty_payload_gcm(void)
27452747 status = srtp_protect (srtp_snd , mesg , & len );
27462748 if (status ) {
27472749 return status ;
2748- } else if (len != 12 + 8 ) {
2750+ } else if (len != 12 + 16 ) {
27492751 return srtp_err_status_fail ;
27502752 }
27512753
0 commit comments