Source release 19.4.0
This commit is contained in:
@@ -5,8 +5,6 @@
|
||||
|
||||
#include "oemcrypto_cast_test.h"
|
||||
|
||||
#include "oemcrypto_usage_table_test.h"
|
||||
|
||||
using ::testing::Range;
|
||||
|
||||
namespace wvoec {
|
||||
@@ -260,18 +258,8 @@ class OEMCryptoCastReceiverTest : public OEMCryptoLoadsCertificateAlternates {
|
||||
ASSERT_NO_FATAL_FAILURE(s.open());
|
||||
ASSERT_NO_FATAL_FAILURE(s.LoadWrappedRsaDrmKey(wrapped_drm_key_));
|
||||
|
||||
// The application will compute the SHA-1 Hash of the message, so this
|
||||
// test must do that also.
|
||||
uint8_t hash[SHA_DIGEST_LENGTH];
|
||||
if (!SHA1(message.data(), message.size(), hash)) {
|
||||
dump_boringssl_error();
|
||||
FAIL() << "boringssl error creating SHA1 hash.";
|
||||
}
|
||||
|
||||
// The application will prepend the digest info to the hash.
|
||||
// SHA-1 digest info prefix = 0x30 0x21 0x30 ...
|
||||
vector<uint8_t> digest = wvutil::a2b_hex("3021300906052b0e03021a05000414");
|
||||
digest.insert(digest.end(), hash, hash + SHA_DIGEST_LENGTH);
|
||||
vector<uint8_t> digest;
|
||||
ASSERT_NO_FATAL_FAILURE(PrepareCastDigestedMessage(message, digest));
|
||||
|
||||
// OEMCrypto will apply the padding, and encrypt to generate the
|
||||
// signature.
|
||||
@@ -1019,5 +1007,6 @@ TEST_P(OEMCryptoSessionTestLoadCasKeysWithHDCP, CasOnlyLoadCasKeysAPI17) {
|
||||
}
|
||||
INSTANTIATE_TEST_SUITE_P(TestHDCP, OEMCryptoSessionTestLoadCasKeysWithHDCP,
|
||||
Range(1, 6));
|
||||
|
||||
/// @}
|
||||
} // namespace wvoec
|
||||
|
||||
Reference in New Issue
Block a user