1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53
|
// SPDX-FileCopyrightText: 2023 The Pion community <https://pion.ly>
// SPDX-License-Identifier: MIT
package dtls
import (
"testing"
"time"
"github.com/pion/dtls/v3/pkg/protocol"
"github.com/pion/dtls/v3/pkg/protocol/extension"
"github.com/pion/dtls/v3/pkg/protocol/handshake"
"github.com/stretchr/testify/assert"
)
func TestHandshakeMessage(t *testing.T) {
rawHandshakeMessage := []byte{
0x01, 0x00, 0x00, 0x29, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x29, 0xfe, 0xfd, 0xb6,
0x2f, 0xce, 0x5c, 0x42, 0x54, 0xff, 0x86, 0xe1, 0x24, 0x41, 0x91, 0x42, 0x62, 0x15, 0xad,
0x16, 0xc9, 0x15, 0x8d, 0x95, 0x71, 0x8a, 0xbb, 0x22, 0xd7, 0x47, 0xec, 0xd8, 0x3d, 0xdc,
0x4b, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
}
parsedHandshake := &handshake.Handshake{
Header: handshake.Header{
Length: 0x29,
FragmentLength: 0x29,
Type: handshake.TypeClientHello,
},
Message: &handshake.MessageClientHello{
Version: protocol.Version{Major: 0xFE, Minor: 0xFD},
Random: handshake.Random{
GMTUnixTime: time.Unix(3056586332, 0),
RandomBytes: [28]byte{
0x42, 0x54, 0xff, 0x86, 0xe1, 0x24, 0x41, 0x91, 0x42, 0x62, 0x15, 0xad, 0x16, 0xc9,
0x15, 0x8d, 0x95, 0x71, 0x8a, 0xbb, 0x22, 0xd7, 0x47, 0xec, 0xd8, 0x3d, 0xdc, 0x4b,
},
},
SessionID: []byte{},
Cookie: []byte{},
CipherSuiteIDs: []uint16{},
CompressionMethods: []*protocol.CompressionMethod{},
Extensions: []extension.Extension{},
},
}
h := &handshake.Handshake{}
assert.NoError(t, h.Unmarshal(rawHandshakeMessage))
assert.Equal(t, parsedHandshake, h, "handshakeMessageClientHello unmarshal")
raw, err := h.Marshal()
assert.NoError(t, err)
assert.Equal(t, rawHandshakeMessage, raw, "handshakeMessageClientHello marshal")
}
|