@@ -40,8 +40,10 @@ public void clientRole_simulated() throws DecoderException {
40
40
"e14648731067823471832c9f3dc9e48275f1041b0332f5447cad007341a5e3c3" +
41
41
// deriveSecret()
42
42
"fc55f787a26b3f5619c891a3cd34907b" +
43
- // random 8 bytes for jpake3 nonce
44
- "e734344901549417" ));
43
+ // generateNonce() server
44
+ "e734344901549417" +
45
+ // generateNonce() client
46
+ "998c182c9d70a375" ));
45
47
// EcJpake cli = new EcJpake(EcJpake.Role.CLIENT, "passw0rd".getBytes(), rand);
46
48
// byte[] cliRound1 = cli.getRound1();
47
49
// assertArrayEquals(cliRound1, Hex.decodeHex("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"));
@@ -105,16 +107,15 @@ public void clientRole_simulated() throws DecoderException {
105
107
byte [] secret = Hex .decodeHex ("e734344901549417f6243f8e4a712f87ae9409476f8d022c347ff690249683aa" );
106
108
assertHexEquals (secret , b .derivedSecret );
107
109
108
- byte [] nonce = new byte [8 ];
109
- rand .nextBytes (nonce );
110
+ byte [] nonce = b .generateNonce ();
110
111
assertHexEquals (nonce , Hex .decodeHex ("e734344901549417" ));
111
112
Jpake3SessionKeyResponse res3 = new Jpake3SessionKeyResponse (0 , nonce , Jpake3SessionKeyResponse .RESERVED );
112
113
113
114
b .processResponse (res3 );
114
115
assertHexEquals (nonce , b .serverNonce3 );
115
116
116
117
Jpake4KeyConfirmationRequest req4 = (Jpake4KeyConfirmationRequest ) b .nextRequest ();
117
- assertHexEquals (req4 .getNonce (), b . serverNonce3 );
118
+ assertHexEquals (req4 .getNonce (), Hex . decodeHex ( "998c182c9d70a375" ) );
118
119
assertHexEquals (req4 .getHashDigest (), b .derivedSecret );
119
120
120
121
Jpake4KeyConfirmationResponse res4 = new Jpake4KeyConfirmationResponse (0 , req4 .getNonce (), Jpake4KeyConfirmationResponse .RESERVED , req4 .getHashDigest ());
0 commit comments