Commit 3ef6d22e authored by Martin Storsjö's avatar Martin Storsjö

srtp: cosmetics: Use fewer lines for the test vectors

Signed-off-by: 's avatarMartin Storsjö <martin@martin.st>
parent b4bb1d49
...@@ -330,9 +330,7 @@ static const char *aes128_80_key = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmn"; ...@@ -330,9 +330,7 @@ static const char *aes128_80_key = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmn";
static const uint8_t rtp_aes128_80[] = { static const uint8_t rtp_aes128_80[] = {
// RTP header // RTP header
0x80, 0xe0, 0x12, 0x34, 0x80, 0xe0, 0x12, 0x34, 0x12, 0x34, 0x56, 0x78, 0x12, 0x34, 0x56, 0x78,
0x12, 0x34, 0x56, 0x78,
0x12, 0x34, 0x56, 0x78,
// encrypted payload // encrypted payload
0x62, 0x69, 0x76, 0xca, 0xc5, 0x62, 0x69, 0x76, 0xca, 0xc5,
// HMAC // HMAC
...@@ -341,15 +339,10 @@ static const uint8_t rtp_aes128_80[] = { ...@@ -341,15 +339,10 @@ static const uint8_t rtp_aes128_80[] = {
static const uint8_t rtcp_aes128_80[] = { static const uint8_t rtcp_aes128_80[] = {
// RTCP header // RTCP header
0x81, 0xc9, 0x00, 0x07, 0x81, 0xc9, 0x00, 0x07, 0x12, 0x34, 0x56, 0x78,
0x12, 0x34, 0x56, 0x78,
// encrypted payload // encrypted payload
0x8a, 0xac, 0xdc, 0xa5, 0x8a, 0xac, 0xdc, 0xa5, 0x4c, 0xf6, 0x78, 0xa6, 0x62, 0x8f, 0x24, 0xda,
0x4c, 0xf6, 0x78, 0xa6, 0x6c, 0x09, 0x3f, 0xa9, 0x28, 0x7a, 0xb5, 0x7f, 0x1f, 0x0f, 0xc9, 0x35,
0x62, 0x8f, 0x24, 0xda,
0x6c, 0x09, 0x3f, 0xa9,
0x28, 0x7a, 0xb5, 0x7f,
0x1f, 0x0f, 0xc9, 0x35,
// RTCP index // RTCP index
0x80, 0x00, 0x00, 0x03, 0x80, 0x00, 0x00, 0x03,
// HMAC // HMAC
...@@ -360,9 +353,7 @@ static const char *aes128_32_key = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmn"; ...@@ -360,9 +353,7 @@ static const char *aes128_32_key = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmn";
static const uint8_t rtp_aes128_32[] = { static const uint8_t rtp_aes128_32[] = {
// RTP header // RTP header
0x80, 0xe0, 0x12, 0x34, 0x80, 0xe0, 0x12, 0x34, 0x12, 0x34, 0x56, 0x78, 0x12, 0x34, 0x56, 0x78,
0x12, 0x34, 0x56, 0x78,
0x12, 0x34, 0x56, 0x78,
// encrypted payload // encrypted payload
0x62, 0x69, 0x76, 0xca, 0xc5, 0x62, 0x69, 0x76, 0xca, 0xc5,
// HMAC // HMAC
...@@ -371,15 +362,10 @@ static const uint8_t rtp_aes128_32[] = { ...@@ -371,15 +362,10 @@ static const uint8_t rtp_aes128_32[] = {
static const uint8_t rtcp_aes128_32[] = { static const uint8_t rtcp_aes128_32[] = {
// RTCP header // RTCP header
0x81, 0xc9, 0x00, 0x07, 0x81, 0xc9, 0x00, 0x07, 0x12, 0x34, 0x56, 0x78,
0x12, 0x34, 0x56, 0x78,
// encrypted payload // encrypted payload
0x35, 0xe9, 0xb5, 0xff, 0x35, 0xe9, 0xb5, 0xff, 0x0d, 0xd1, 0xde, 0x70, 0x74, 0x10, 0xaa, 0x1b,
0x0d, 0xd1, 0xde, 0x70, 0xb2, 0x8d, 0xf0, 0x20, 0x02, 0x99, 0x6b, 0x1b, 0x0b, 0xd0, 0x47, 0x34,
0x74, 0x10, 0xaa, 0x1b,
0xb2, 0x8d, 0xf0, 0x20,
0x02, 0x99, 0x6b, 0x1b,
0x0b, 0xd0, 0x47, 0x34,
// RTCP index // RTCP index
0x80, 0x00, 0x00, 0x04, 0x80, 0x00, 0x00, 0x04,
// HMAC // HMAC
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment