ws_server_test.go 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364
  1. package router
  2. import (
  3. "encoding/hex"
  4. "fmt"
  5. "reflect"
  6. "testing"
  7. "gogs.daxia.dev/huanan/pkg.daxia.dev/encrypt"
  8. "nn.daxia.dev/model"
  9. )
  10. func Test_parseMsg(t *testing.T) {
  11. type args struct {
  12. message []byte
  13. aesKey []byte
  14. }
  15. tests := []struct {
  16. name string
  17. args args
  18. want *BaseReq
  19. wantErr bool
  20. }{
  21. {
  22. name: "d1",
  23. args: args{
  24. message: []byte("QkkxrEKXU85pltI9L89KUPjtUFgGV0ay3kVNWrjlCKdYdKI4ekx7HcyIvZ/Bzwd6gPpZiZbyuwkJUI2dUX8ok1+/yqiX9Ch09KkzsZf4I+Y="),
  25. aesKey: model.AESKey,
  26. },
  27. want: &BaseReq{
  28. Type: "connect",
  29. },
  30. wantErr: false,
  31. },
  32. }
  33. for _, tt := range tests {
  34. t.Run(tt.name, func(t *testing.T) {
  35. got, err := parseMsg(tt.args.message, tt.args.aesKey)
  36. if (err != nil) != tt.wantErr {
  37. t.Errorf("parseMsg() error = %v, wantErr %v", err, tt.wantErr)
  38. return
  39. }
  40. if !reflect.DeepEqual(got, tt.want) {
  41. t.Errorf("parseMsg() = %v, want %v", got, tt.want)
  42. }
  43. })
  44. }
  45. }
  46. func TestX(t *testing.T) {
  47. hexStr := "516b6b7872454b58553835706c7449394c38394b55444855424462304575794b48692b72554f50396c66705a78312f7749732b526e7866645a2b6858326e524d596d70437a4b507951682b514d333867506a5a4f45333448544d33324c34534341387a4b6369334f796d553646484977486f644462736459716c2b4a52672b35"
  48. decBody, err := hex.DecodeString(hexStr)
  49. if err != nil {
  50. t.Fatal(err)
  51. }
  52. decBody, err = encrypt.AesDecrypt(decBody, model.AESKey)
  53. if err != nil {
  54. t.Fatal(err)
  55. }
  56. decBodyStr := string(decBody)
  57. fmt.Println(decBodyStr)
  58. }