|
|
@ -222,8 +222,8 @@ VOID TEST(ProtocolHandshakeTest, OpensslSha256)
|
|
|
|
char digest[__SRS_OpensslHashSize];
|
|
|
|
char digest[__SRS_OpensslHashSize];
|
|
|
|
ASSERT_EQ(ERROR_SUCCESS,
|
|
|
|
ASSERT_EQ(ERROR_SUCCESS,
|
|
|
|
openssl_HMACsha256(
|
|
|
|
openssl_HMACsha256(
|
|
|
|
random_bytes, sizeof(random_bytes),
|
|
|
|
|
|
|
|
SrsGenuineFPKey, 30,
|
|
|
|
SrsGenuineFPKey, 30,
|
|
|
|
|
|
|
|
random_bytes, sizeof(random_bytes),
|
|
|
|
digest
|
|
|
|
digest
|
|
|
|
)
|
|
|
|
)
|
|
|
|
);
|
|
|
|
);
|
|
|
@ -238,30 +238,11 @@ VOID TEST(ProtocolHandshakeTest, OpensslSha256)
|
|
|
|
// verify the dh key
|
|
|
|
// verify the dh key
|
|
|
|
VOID TEST(ProtocolHandshakeTest, DHKey)
|
|
|
|
VOID TEST(ProtocolHandshakeTest, DHKey)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
char pri_key[] = {
|
|
|
|
|
|
|
|
(char)0x6e, (char)0x65, (char)0x69, (char)0x2d, (char)0x69, (char)0x2d, (char)0x69, (char)0x73,
|
|
|
|
|
|
|
|
(char)0x6e, (char)0x69, (char)0x73, (char)0x6c, (char)0x65, (char)0x72, (char)0x69, (char)0x72,
|
|
|
|
|
|
|
|
(char)0x76, (char)0x65, (char)0x72, (char)0x69, (char)0x77, (char)0x74, (char)0x2e, (char)0x6e,
|
|
|
|
|
|
|
|
(char)0x72, (char)0x76, (char)0x72, (char)0x65, (char)0x72, (char)0x70, (char)0x72, (char)0x69,
|
|
|
|
|
|
|
|
(char)0x69, (char)0x70, (char)0x72, (char)0x73, (char)0x6e, (char)0x65, (char)0x72, (char)0x72,
|
|
|
|
|
|
|
|
(char)0x6e, (char)0x2d, (char)0x65, (char)0x74, (char)0x72, (char)0x6c, (char)0x69, (char)0x74,
|
|
|
|
|
|
|
|
(char)0x69, (char)0x65, (char)0x40, (char)0x69, (char)0x69, (char)0x76, (char)0x77, (char)0x2d,
|
|
|
|
|
|
|
|
(char)0x73, (char)0x65, (char)0x72, (char)0x72, (char)0x76, (char)0x73, (char)0x72, (char)0x2e,
|
|
|
|
|
|
|
|
(char)0x2d, (char)0x76, (char)0x65, (char)0x31, (char)0x65, (char)0x6d, (char)0x6d, (char)0x73,
|
|
|
|
|
|
|
|
(char)0x69, (char)0x73, (char)0x74, (char)0x2e, (char)0x74, (char)0x72, (char)0x65, (char)0x65,
|
|
|
|
|
|
|
|
(char)0x72, (char)0x65, (char)0x2d, (char)0x74, (char)0x69, (char)0x31, (char)0x65, (char)0x2d,
|
|
|
|
|
|
|
|
(char)0x6f, (char)0x77, (char)0x2e, (char)0x76, (char)0x77, (char)0x2d, (char)0x77, (char)0x72,
|
|
|
|
|
|
|
|
(char)0x65, (char)0x65, (char)0x31, (char)0x74, (char)0x73, (char)0x70, (char)0x74, (char)0x6e,
|
|
|
|
|
|
|
|
(char)0x72, (char)0x6e, (char)0x73, (char)0x6d, (char)0x2e, (char)0x69, (char)0x72, (char)0x2d,
|
|
|
|
|
|
|
|
(char)0x65, (char)0x69, (char)0x77, (char)0x69, (char)0x76, (char)0x72, (char)0x77, (char)0x72,
|
|
|
|
|
|
|
|
(char)0x32, (char)0x6e, (char)0x65, (char)0x6c, (char)0x2e, (char)0x2d, (char)0x6e, (char)0x69
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
char pub_key1[128];
|
|
|
|
char pub_key1[128];
|
|
|
|
openssl_generate_key(pri_key, pub_key1, 128);
|
|
|
|
openssl_generate_key(pub_key1, 128);
|
|
|
|
|
|
|
|
|
|
|
|
char pub_key2[128];
|
|
|
|
char pub_key2[128];
|
|
|
|
openssl_generate_key(pri_key, pub_key2, 128);
|
|
|
|
openssl_generate_key(pub_key2, 128);
|
|
|
|
|
|
|
|
|
|
|
|
EXPECT_FALSE(srs_bytes_equals(pub_key1, pub_key2, 128));
|
|
|
|
EXPECT_FALSE(srs_bytes_equals(pub_key1, pub_key2, 128));
|
|
|
|
}
|
|
|
|
}
|
|
|
|