• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * This file is part of FFmpeg.
3  *
4  * FFmpeg is free software; you can redistribute it and/or
5  * modify it under the terms of the GNU Lesser General Public
6  * License as published by the Free Software Foundation; either
7  * version 2.1 of the License, or (at your option) any later version.
8  *
9  * FFmpeg is distributed in the hope that it will be useful,
10  * but WITHOUT ANY WARRANTY; without even the implied warranty of
11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
12  * Lesser General Public License for more details.
13  *
14  * You should have received a copy of the GNU Lesser General Public
15  * License along with FFmpeg; if not, write to the Free Software
16  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
17  */
18 
19 #include "libavformat/avformat.h"
20 #include "libavformat/rtmpdh.c"
21 
22 #include <stdio.h>
23 
test_random_shared_secret(void)24 static int test_random_shared_secret(void)
25 {
26     FF_DH *peer1 = NULL, *peer2 = NULL;
27     int ret;
28     uint8_t pubkey1[128], pubkey2[128];
29     uint8_t sharedkey1[128], sharedkey2[128];
30 
31     peer1 = ff_dh_init(1024);
32     peer2 = ff_dh_init(1024);
33     if (!peer1 || !peer2) {
34         ret = AVERROR(ENOMEM);
35         goto fail;
36     }
37     if ((ret = ff_dh_generate_public_key(peer1)) < 0)
38         goto fail;
39     if ((ret = ff_dh_generate_public_key(peer2)) < 0)
40         goto fail;
41     if ((ret = ff_dh_write_public_key(peer1, pubkey1, sizeof(pubkey1))) < 0)
42         goto fail;
43     if ((ret = ff_dh_write_public_key(peer2, pubkey2, sizeof(pubkey2))) < 0)
44         goto fail;
45     if ((ret = ff_dh_compute_shared_secret_key(peer1, pubkey2, sizeof(pubkey2),
46                                                sharedkey1, sizeof(sharedkey1))) < 0)
47         goto fail;
48     if ((ret = ff_dh_compute_shared_secret_key(peer2, pubkey1, sizeof(pubkey1),
49                                                sharedkey2, sizeof(sharedkey2))) < 0)
50         goto fail;
51     if (memcmp(sharedkey1, sharedkey2, sizeof(sharedkey1))) {
52         printf("Mismatched generated shared key\n");
53         ret = AVERROR_INVALIDDATA;
54     } else {
55         printf("Generated shared key ok\n");
56     }
57 fail:
58     ff_dh_free(peer1);
59     ff_dh_free(peer2);
60     return ret;
61 }
62 
63 static const char *private_key =
64     "976C18FCADC255B456564F74F3EEDA59D28AF6B744D743F2357BFD2404797EF896EF1A"
65     "7C1CBEAAA3AB60AF3192D189CFF3F991C9CBBFD78119FCA2181384B94011943B6D6F28"
66     "9E1B708E2D1A0C7771169293F03DA27E561F15F16F0AC9BC858C77A80FA98FD088A232"
67     "19D08BE6F165DE0B02034B18705829FAD0ACB26A5B75EF";
68 static const char *public_key =
69     "F272ECF8362257C5D2C3CC2229CF9C0A03225BC109B1DBC76A68C394F256ACA3EF5F64"
70     "FC270C26382BF315C19E97A76104A716FC998A651E8610A3AE6CF65D8FAE5D3F32EEA0"
71     "0B32CB9609B494116A825D7142D17B88E3D20EDD98743DE29CF37A23A9F6A58B960591"
72     "3157D5965FCB46DDA73A1F08DD897BAE88DFE6FC937CBA";
73 static const uint8_t public_key_bin[] = {
74     0xf2, 0x72, 0xec, 0xf8, 0x36, 0x22, 0x57, 0xc5, 0xd2, 0xc3, 0xcc, 0x22,
75     0x29, 0xcf, 0x9c, 0x0a, 0x03, 0x22, 0x5b, 0xc1, 0x09, 0xb1, 0xdb, 0xc7,
76     0x6a, 0x68, 0xc3, 0x94, 0xf2, 0x56, 0xac, 0xa3, 0xef, 0x5f, 0x64, 0xfc,
77     0x27, 0x0c, 0x26, 0x38, 0x2b, 0xf3, 0x15, 0xc1, 0x9e, 0x97, 0xa7, 0x61,
78     0x04, 0xa7, 0x16, 0xfc, 0x99, 0x8a, 0x65, 0x1e, 0x86, 0x10, 0xa3, 0xae,
79     0x6c, 0xf6, 0x5d, 0x8f, 0xae, 0x5d, 0x3f, 0x32, 0xee, 0xa0, 0x0b, 0x32,
80     0xcb, 0x96, 0x09, 0xb4, 0x94, 0x11, 0x6a, 0x82, 0x5d, 0x71, 0x42, 0xd1,
81     0x7b, 0x88, 0xe3, 0xd2, 0x0e, 0xdd, 0x98, 0x74, 0x3d, 0xe2, 0x9c, 0xf3,
82     0x7a, 0x23, 0xa9, 0xf6, 0xa5, 0x8b, 0x96, 0x05, 0x91, 0x31, 0x57, 0xd5,
83     0x96, 0x5f, 0xcb, 0x46, 0xdd, 0xa7, 0x3a, 0x1f, 0x08, 0xdd, 0x89, 0x7b,
84     0xae, 0x88, 0xdf, 0xe6, 0xfc, 0x93, 0x7c, 0xba
85 };
86 static const uint8_t peer_public_key[] = {
87     0x58, 0x66, 0x05, 0x49, 0x94, 0x23, 0x2b, 0x66, 0x52, 0x13, 0xff, 0x46,
88     0xf2, 0xb3, 0x79, 0xa9, 0xee, 0xae, 0x1a, 0x13, 0xf0, 0x71, 0x52, 0xfb,
89     0x93, 0x4e, 0xee, 0x97, 0x05, 0x73, 0x50, 0x7d, 0xaf, 0x02, 0x07, 0x72,
90     0xac, 0xdc, 0xa3, 0x95, 0x78, 0xee, 0x9a, 0x19, 0x71, 0x7e, 0x99, 0x9f,
91     0x2a, 0xd4, 0xb3, 0xe2, 0x0c, 0x1d, 0x1a, 0x78, 0x4c, 0xde, 0xf1, 0xad,
92     0xb4, 0x60, 0xa8, 0x51, 0xac, 0x71, 0xec, 0x86, 0x70, 0xa2, 0x63, 0x36,
93     0x92, 0x7c, 0xe3, 0x87, 0xee, 0xe4, 0xf1, 0x62, 0x24, 0x74, 0xb4, 0x04,
94     0xfa, 0x5c, 0xdf, 0xba, 0xfa, 0xa3, 0xc2, 0xbb, 0x62, 0x27, 0xd0, 0xf4,
95     0xe4, 0x43, 0xda, 0x8a, 0x88, 0x69, 0x60, 0xe2, 0xdb, 0x75, 0x2a, 0x98,
96     0x9d, 0xb5, 0x50, 0xe3, 0x99, 0xda, 0xe0, 0xa6, 0x14, 0xc9, 0x80, 0x12,
97     0xf9, 0x3c, 0xac, 0x06, 0x02, 0x7a, 0xde, 0x74
98 };
99 static const uint8_t shared_secret[] = {
100     0xb2, 0xeb, 0xcb, 0x71, 0xf3, 0x61, 0xfb, 0x5b, 0x4e, 0x5c, 0x4c, 0xcf,
101     0x5c, 0x08, 0x5f, 0x96, 0x26, 0x77, 0x1d, 0x31, 0xf1, 0xe1, 0xf7, 0x4b,
102     0x92, 0xac, 0x82, 0x2a, 0x88, 0xc7, 0x83, 0xe1, 0xc7, 0xf3, 0xd3, 0x1a,
103     0x7d, 0xc8, 0x31, 0xe3, 0x97, 0xe4, 0xec, 0x31, 0x0e, 0x8f, 0x73, 0x1a,
104     0xe4, 0xf6, 0xd8, 0xc8, 0x94, 0xff, 0xa0, 0x03, 0x84, 0x03, 0x0f, 0xa5,
105     0x30, 0x5d, 0x67, 0xe0, 0x7a, 0x3b, 0x5f, 0xed, 0x4c, 0xf5, 0xbc, 0x18,
106     0xea, 0xd4, 0x77, 0xa9, 0x07, 0xb3, 0x54, 0x0b, 0x02, 0xd9, 0xc6, 0xb8,
107     0x66, 0x5e, 0xec, 0xa4, 0xcd, 0x47, 0xed, 0xc9, 0x38, 0xc6, 0x91, 0x08,
108     0xf3, 0x85, 0x9b, 0x69, 0x16, 0x78, 0x0d, 0xb7, 0x74, 0x51, 0xaa, 0x5b,
109     0x4d, 0x74, 0xe4, 0x29, 0x2e, 0x9e, 0x8e, 0xf7, 0xe5, 0x42, 0x83, 0xb0,
110     0x65, 0xb0, 0xce, 0xc6, 0xb2, 0x8f, 0x5b, 0xb0
111 };
112 
test_ref_data(void)113 static int test_ref_data(void)
114 {
115     FF_DH *dh;
116     int ret = AVERROR(ENOMEM);
117     uint8_t pubkey_test[128];
118     uint8_t sharedkey_test[128];
119 
120     dh = ff_dh_init(1024);
121     if (!dh)
122         goto fail;
123     bn_hex2bn(dh->priv_key, private_key, ret);
124     if (!ret)
125         goto fail;
126     bn_hex2bn(dh->pub_key, public_key, ret);
127     if (!ret)
128         goto fail;
129     if ((ret = ff_dh_write_public_key(dh, pubkey_test, sizeof(pubkey_test))) < 0)
130         goto fail;
131     if (memcmp(pubkey_test, public_key_bin, sizeof(pubkey_test))) {
132         printf("Mismatched generated public key\n");
133         ret = AVERROR_INVALIDDATA;
134         goto fail;
135     } else {
136         printf("Generated public key ok\n");
137     }
138     if ((ret = ff_dh_compute_shared_secret_key(dh, peer_public_key, sizeof(peer_public_key),
139                                                sharedkey_test, sizeof(sharedkey_test))) < 0)
140         goto fail;
141     if (memcmp(shared_secret, sharedkey_test, sizeof(sharedkey_test))) {
142         printf("Mismatched generated shared key\n");
143         ret = AVERROR_INVALIDDATA;
144     } else {
145         printf("Generated shared key ok\n");
146     }
147 fail:
148     ff_dh_free(dh);
149     return ret;
150 }
151 
main(void)152 int main(void)
153 {
154     avformat_network_init();
155     if (test_random_shared_secret() < 0)
156         return 1;
157     if (test_ref_data() < 0)
158         return 1;
159     return 0;
160 }
161