Signed-off-by: Jacob Trimble <modmaker@google.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
		
			
				
	
	
		
			177 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			177 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * This file is part of FFmpeg.
 | |
|  *
 | |
|  * FFmpeg is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of the GNU Lesser General Public
 | |
|  * License as published by the Free Software Foundation; either
 | |
|  * version 2.1 of the License, or (at your option) any later version.
 | |
|  *
 | |
|  * FFmpeg is distributed in the hope that it will be useful,
 | |
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | |
|  * Lesser General Public License for more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU Lesser General Public
 | |
|  * License along with FFmpeg; if not, write to the Free Software
 | |
|  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
 | |
|  */
 | |
| 
 | |
| #include "libavutil/encryption_info.h"
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <string.h>
 | |
| 
 | |
| #include "libavutil/avassert.h"
 | |
| 
 | |
| static const AVSubsampleEncryptionInfo test_subsamples[] = {{1, 2}, {3, 4}, {5, 6}, {7, 8}};
 | |
| static const size_t test_subsample_count = sizeof(test_subsamples) / sizeof(test_subsamples[0]);
 | |
| static const uint8_t test_iv[] = {0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18};
 | |
| static const uint8_t test_key_id[] = {0x21, 0x22, 0x23, 0x24};
 | |
| static const uint8_t test_key_id_2[] = {0x31, 0x32, 0x33, 0x34};
 | |
| static const uint8_t test_system_id[] = {0x41, 0x42, 0x43};
 | |
| static const uint8_t test_data[] = {0x51, 0x52};
 | |
| 
 | |
| static int compare_encryption_info(const AVEncryptionInfo *a, const AVEncryptionInfo *b) {
 | |
|     if (!a || !b || a->scheme != b->scheme || a->crypt_byte_block != b->crypt_byte_block ||
 | |
|         a->skip_byte_block != b->skip_byte_block || a->key_id_size != b->key_id_size ||
 | |
|         a->iv_size != b->iv_size || a->subsample_count != b->subsample_count)
 | |
|         return 1;
 | |
| 
 | |
|     if (memcmp(a->key_id, b->key_id, a->key_id_size) != 0 ||
 | |
|         memcmp(a->iv, b->iv, a->iv_size) != 0 ||
 | |
|         memcmp(a->subsamples, b->subsamples, a->subsample_count * sizeof(a->subsamples[0])))
 | |
|         return 1;
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int compare_encryption_init_info(const AVEncryptionInitInfo *a, const AVEncryptionInitInfo *b) {
 | |
|     if (!a || !b || a->system_id_size != b->system_id_size ||
 | |
|         a->num_key_ids != b->num_key_ids || a->key_id_size != b->key_id_size ||
 | |
|         a->data_size != b->data_size)
 | |
|         return 1;
 | |
| 
 | |
|     if (memcmp(a->system_id, b->system_id, a->system_id_size) != 0 ||
 | |
|         memcmp(a->data, b->data, a->data_size) != 0)
 | |
|         return 1;
 | |
| 
 | |
|     for (uint32_t i = 0; i < a->num_key_ids; i++) {
 | |
|         if (memcmp(a->key_ids[i], b->key_ids[i], a->key_id_size) != 0)
 | |
|             return 1;
 | |
|     }
 | |
| 
 | |
|     if (a->next || b->next) {
 | |
|         if (!a->next || !b->next)
 | |
|             return 1;
 | |
|         if (compare_encryption_init_info(a->next, b->next) != 0)
 | |
|             return 1;
 | |
|     }
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void run_encryption_info_test(void)
 | |
| {
 | |
|     AVEncryptionInfo *info, *copy;
 | |
|     uint8_t *side_data;
 | |
|     size_t side_data_size;
 | |
| 
 | |
|     info = av_encryption_info_alloc(test_subsample_count, sizeof(test_key_id), sizeof(test_iv));
 | |
|     av_assert0(info);
 | |
|     av_assert0(info->key_id);
 | |
|     av_assert0(info->key_id_size == sizeof(test_key_id));
 | |
|     av_assert0(info->iv);
 | |
|     av_assert0(info->iv_size == sizeof(test_iv));
 | |
|     av_assert0(info->subsamples);
 | |
|     av_assert0(info->subsample_count == test_subsample_count);
 | |
| 
 | |
|     info->scheme = 1234;
 | |
|     info->crypt_byte_block = 333;
 | |
|     info->skip_byte_block = 444;
 | |
|     memcpy(info->key_id, test_key_id, sizeof(test_key_id));
 | |
|     memcpy(info->iv, test_iv, sizeof(test_iv));
 | |
|     memcpy(info->subsamples, test_subsamples, sizeof(test_subsamples));
 | |
| 
 | |
|     copy = av_encryption_info_clone(info);
 | |
|     av_assert0(copy);
 | |
|     av_assert0(copy != info);
 | |
|     av_assert0(compare_encryption_info(info, copy) == 0);
 | |
|     av_encryption_info_free(copy);
 | |
| 
 | |
|     side_data = av_encryption_info_add_side_data(info, &side_data_size);
 | |
|     av_assert0(side_data);
 | |
|     av_assert0(side_data_size > 0);
 | |
| 
 | |
|     copy = av_encryption_info_get_side_data(side_data, side_data_size);
 | |
|     av_assert0(copy);
 | |
|     av_assert0(copy != info);
 | |
|     av_assert0(compare_encryption_info(info, copy) == 0);
 | |
|     av_encryption_info_free(copy);
 | |
|     av_free(side_data);
 | |
| 
 | |
|     av_encryption_info_free(info);
 | |
| }
 | |
| 
 | |
| static AVEncryptionInitInfo *create_init_info(void)
 | |
| {
 | |
|     AVEncryptionInitInfo *info;
 | |
| 
 | |
|     info = av_encryption_init_info_alloc(sizeof(test_system_id), 2, sizeof(test_key_id), sizeof(test_data));
 | |
|     av_assert0(info);
 | |
|     av_assert0(info->system_id);
 | |
|     av_assert0(info->system_id_size == sizeof(test_system_id));
 | |
|     av_assert0(info->key_ids);
 | |
|     av_assert0(info->num_key_ids == 2);
 | |
|     av_assert0(info->key_id_size == sizeof(test_key_id));
 | |
|     av_assert0(info->key_ids[0]);
 | |
|     av_assert0(info->key_ids[1]);
 | |
|     av_assert0(info->data);
 | |
|     av_assert0(info->data_size == sizeof(test_data));
 | |
|     av_assert0(!info->next);
 | |
| 
 | |
|     memcpy(info->system_id, test_system_id, sizeof(test_system_id));
 | |
|     memcpy(info->key_ids[0], test_key_id, sizeof(test_key_id));
 | |
|     memcpy(info->key_ids[1], test_key_id_2, sizeof(test_key_id_2));
 | |
|     memcpy(info->data, test_data, sizeof(test_data));
 | |
| 
 | |
|     return info;
 | |
| }
 | |
| 
 | |
| static void run_encryption_init_info_test(void)
 | |
| {
 | |
|     AVEncryptionInitInfo *info, *copy;
 | |
|     uint8_t *side_data;
 | |
|     size_t side_data_size;
 | |
| 
 | |
|     info = create_init_info();
 | |
| 
 | |
|     side_data = av_encryption_init_info_add_side_data(info, &side_data_size);
 | |
|     av_assert0(side_data);
 | |
|     av_assert0(side_data_size > 0);
 | |
|     copy = av_encryption_init_info_get_side_data(side_data, side_data_size);
 | |
|     av_assert0(copy);
 | |
|     av_assert0(compare_encryption_init_info(info, copy) == 0);
 | |
|     av_encryption_init_info_free(copy);
 | |
|     av_free(side_data);
 | |
| 
 | |
|     // Make the first init info different from the second to test the correct order.
 | |
|     memset(info->system_id, 0, info->system_id_size);
 | |
|     info->next = create_init_info();
 | |
|     side_data = av_encryption_init_info_add_side_data(info, &side_data_size);
 | |
|     av_assert0(side_data);
 | |
|     copy = av_encryption_init_info_get_side_data(side_data, side_data_size);
 | |
|     av_assert0(copy);
 | |
|     av_assert0(compare_encryption_init_info(info, copy) == 0);
 | |
|     av_encryption_init_info_free(copy);
 | |
|     av_free(side_data);
 | |
| 
 | |
|     av_encryption_init_info_free(info);
 | |
| }
 | |
| 
 | |
| int main(int argc, char **argv)
 | |
| {
 | |
|     run_encryption_info_test();
 | |
|     run_encryption_init_info_test();
 | |
|     return 0;
 | |
| }
 |