winlin

fix utest build failed, sync with src changed.

@@ -31,7 +31,7 @@ CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. @@ -31,7 +31,7 @@ CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
31 // current release version 31 // current release version
32 #define VERSION_MAJOR "0" 32 #define VERSION_MAJOR "0"
33 #define VERSION_MINOR "9" 33 #define VERSION_MINOR "9"
34 -#define VERSION_REVISION "193" 34 +#define VERSION_REVISION "194"
35 #define RTMP_SIG_SRS_VERSION VERSION_MAJOR"."VERSION_MINOR"."VERSION_REVISION 35 #define RTMP_SIG_SRS_VERSION VERSION_MAJOR"."VERSION_MINOR"."VERSION_REVISION
36 // server info. 36 // server info.
37 #define RTMP_SIG_SRS_KEY "SRS" 37 #define RTMP_SIG_SRS_KEY "SRS"
@@ -114,8 +114,8 @@ namespace _srs_internal @@ -114,8 +114,8 @@ namespace _srs_internal
114 #define __SRS_OpensslHashSize 512 114 #define __SRS_OpensslHashSize 512
115 extern u_int8_t SrsGenuineFMSKey[]; 115 extern u_int8_t SrsGenuineFMSKey[];
116 extern u_int8_t SrsGenuineFPKey[]; 116 extern u_int8_t SrsGenuineFPKey[];
117 - int openssl_HMACsha256(const void* data, int data_size, const void* key, int key_size, void* digest);  
118 - int openssl_generate_key(char* _private_key, char* _public_key, int32_t size); 117 + int openssl_HMACsha256(const void* key, int key_size, const void* data, int data_size, void* digest);
  118 + int openssl_generate_key(char* public_key, int32_t size);
119 119
120 // calc the offset of key, 120 // calc the offset of key,
121 // the key->offset cannot be used as the offset of key. 121 // the key->offset cannot be used as the offset of key.
@@ -222,8 +222,8 @@ VOID TEST(ProtocolHandshakeTest, OpensslSha256) @@ -222,8 +222,8 @@ VOID TEST(ProtocolHandshakeTest, OpensslSha256)
222 char digest[__SRS_OpensslHashSize]; 222 char digest[__SRS_OpensslHashSize];
223 ASSERT_EQ(ERROR_SUCCESS, 223 ASSERT_EQ(ERROR_SUCCESS,
224 openssl_HMACsha256( 224 openssl_HMACsha256(
225 - random_bytes, sizeof(random_bytes),  
226 SrsGenuineFPKey, 30, 225 SrsGenuineFPKey, 30,
  226 + random_bytes, sizeof(random_bytes),
227 digest 227 digest
228 ) 228 )
229 ); 229 );
@@ -238,30 +238,11 @@ VOID TEST(ProtocolHandshakeTest, OpensslSha256) @@ -238,30 +238,11 @@ VOID TEST(ProtocolHandshakeTest, OpensslSha256)
238 // verify the dh key 238 // verify the dh key
239 VOID TEST(ProtocolHandshakeTest, DHKey) 239 VOID TEST(ProtocolHandshakeTest, DHKey)
240 { 240 {
241 - char pri_key[] = {  
242 - (char)0x6e, (char)0x65, (char)0x69, (char)0x2d, (char)0x69, (char)0x2d, (char)0x69, (char)0x73,  
243 - (char)0x6e, (char)0x69, (char)0x73, (char)0x6c, (char)0x65, (char)0x72, (char)0x69, (char)0x72,  
244 - (char)0x76, (char)0x65, (char)0x72, (char)0x69, (char)0x77, (char)0x74, (char)0x2e, (char)0x6e,  
245 - (char)0x72, (char)0x76, (char)0x72, (char)0x65, (char)0x72, (char)0x70, (char)0x72, (char)0x69,  
246 - (char)0x69, (char)0x70, (char)0x72, (char)0x73, (char)0x6e, (char)0x65, (char)0x72, (char)0x72,  
247 - (char)0x6e, (char)0x2d, (char)0x65, (char)0x74, (char)0x72, (char)0x6c, (char)0x69, (char)0x74,  
248 - (char)0x69, (char)0x65, (char)0x40, (char)0x69, (char)0x69, (char)0x76, (char)0x77, (char)0x2d,  
249 - (char)0x73, (char)0x65, (char)0x72, (char)0x72, (char)0x76, (char)0x73, (char)0x72, (char)0x2e,  
250 - (char)0x2d, (char)0x76, (char)0x65, (char)0x31, (char)0x65, (char)0x6d, (char)0x6d, (char)0x73,  
251 - (char)0x69, (char)0x73, (char)0x74, (char)0x2e, (char)0x74, (char)0x72, (char)0x65, (char)0x65,  
252 - (char)0x72, (char)0x65, (char)0x2d, (char)0x74, (char)0x69, (char)0x31, (char)0x65, (char)0x2d,  
253 - (char)0x6f, (char)0x77, (char)0x2e, (char)0x76, (char)0x77, (char)0x2d, (char)0x77, (char)0x72,  
254 - (char)0x65, (char)0x65, (char)0x31, (char)0x74, (char)0x73, (char)0x70, (char)0x74, (char)0x6e,  
255 - (char)0x72, (char)0x6e, (char)0x73, (char)0x6d, (char)0x2e, (char)0x69, (char)0x72, (char)0x2d,  
256 - (char)0x65, (char)0x69, (char)0x77, (char)0x69, (char)0x76, (char)0x72, (char)0x77, (char)0x72,  
257 - (char)0x32, (char)0x6e, (char)0x65, (char)0x6c, (char)0x2e, (char)0x2d, (char)0x6e, (char)0x69  
258 - };  
259 -  
260 char pub_key1[128]; 241 char pub_key1[128];
261 - openssl_generate_key(pri_key, pub_key1, 128); 242 + openssl_generate_key(pub_key1, 128);
262 243
263 char pub_key2[128]; 244 char pub_key2[128];
264 - openssl_generate_key(pri_key, pub_key2, 128); 245 + openssl_generate_key(pub_key2, 128);
265 246
266 EXPECT_FALSE(srs_bytes_equals(pub_key1, pub_key2, 128)); 247 EXPECT_FALSE(srs_bytes_equals(pub_key1, pub_key2, 128));
267 } 248 }