SRP test; increase size of N

SHA512 digest was sometimes too big for the 1024-bit N.
Increase N to 1536 bits to ensure no intermittent fails.
This commit is contained in:
Sean Parkinson
2021-09-13 09:18:26 +10:00
parent 4bd87a0c41
commit 33028de0de

View File

@ -17234,10 +17234,10 @@ static int srp_test_digest(SrpType dgstType)
{
int r;
byte clientPubKey[128]; /* A */
byte serverPubKey[128]; /* B */
word32 clientPubKeySz = 128;
word32 serverPubKeySz = 128;
byte clientPubKey[192]; /* A */
byte serverPubKey[192]; /* B */
word32 clientPubKeySz = 192;
word32 serverPubKeySz = 192;
byte username[] = "user";
word32 usernameSz = 4;
@ -17246,22 +17246,30 @@ static int srp_test_digest(SrpType dgstType)
word32 passwordSz = 8;
WOLFSSL_SMALL_STACK_STATIC const byte N[] = {
0xEE, 0xAF, 0x0A, 0xB9, 0xAD, 0xB3, 0x8D, 0xD6,
0x9C, 0x33, 0xF8, 0x0A, 0xFA, 0x8F, 0xC5, 0xE8,
0x60, 0x72, 0x61, 0x87, 0x75, 0xFF, 0x3C, 0x0B,
0x9E, 0xA2, 0x31, 0x4C, 0x9C, 0x25, 0x65, 0x76,
0xD6, 0x74, 0xDF, 0x74, 0x96, 0xEA, 0x81, 0xD3,
0x38, 0x3B, 0x48, 0x13, 0xD6, 0x92, 0xC6, 0xE0,
0xE0, 0xD5, 0xD8, 0xE2, 0x50, 0xB9, 0x8B, 0xE4,
0x8E, 0x49, 0x5C, 0x1D, 0x60, 0x89, 0xDA, 0xD1,
0x5D, 0xC7, 0xD7, 0xB4, 0x61, 0x54, 0xD6, 0xB6,
0xCE, 0x8E, 0xF4, 0xAD, 0x69, 0xB1, 0x5D, 0x49,
0x82, 0x55, 0x9B, 0x29, 0x7B, 0xCF, 0x18, 0x85,
0xC5, 0x29, 0xF5, 0x66, 0x66, 0x0E, 0x57, 0xEC,
0x68, 0xED, 0xBC, 0x3C, 0x05, 0x72, 0x6C, 0xC0,
0x2F, 0xD4, 0xCB, 0xF4, 0x97, 0x6E, 0xAA, 0x9A,
0xFD, 0x51, 0x38, 0xFE, 0x83, 0x76, 0x43, 0x5B,
0x9F, 0xC6, 0x1D, 0x2F, 0xC0, 0xEB, 0x06, 0xE3
0xfc, 0x58, 0x7a, 0x8a, 0x70, 0xfb, 0x5a, 0x9a,
0x5d, 0x39, 0x48, 0xbf, 0x1c, 0x46, 0xd8, 0x3b,
0x7a, 0xe9, 0x1f, 0x85, 0x36, 0x18, 0xc4, 0x35,
0x3f, 0xf8, 0x8a, 0x8f, 0x8c, 0x10, 0x2e, 0x01,
0x58, 0x1d, 0x41, 0xcb, 0xc4, 0x47, 0xa8, 0xaf,
0x9a, 0x6f, 0x58, 0x14, 0xa4, 0x68, 0xf0, 0x9c,
0xa6, 0xe7, 0xbf, 0x0d, 0xe9, 0x62, 0x0b, 0xd7,
0x26, 0x46, 0x5b, 0x27, 0xcb, 0x4c, 0xf9, 0x7e,
0x1e, 0x8b, 0xe6, 0xdd, 0x29, 0xb7, 0xb7, 0x15,
0x2e, 0xcf, 0x23, 0xa6, 0x4b, 0x97, 0x9f, 0x89,
0xd4, 0x86, 0xc4, 0x90, 0x63, 0x92, 0xf4, 0x30,
0x26, 0x69, 0x48, 0x9d, 0x7a, 0x4f, 0xad, 0xb5,
0x6a, 0x51, 0xad, 0xeb, 0xf9, 0x90, 0x31, 0x77,
0x53, 0x30, 0x2a, 0x85, 0xf7, 0x11, 0x21, 0x0c,
0xb8, 0x4b, 0x56, 0x03, 0x5e, 0xbb, 0x25, 0x33,
0x7c, 0xd9, 0x5a, 0xd1, 0x5c, 0xb2, 0xd4, 0x53,
0xc5, 0x16, 0x68, 0xf0, 0xdf, 0x48, 0x55, 0x3e,
0xd4, 0x59, 0x87, 0x64, 0x59, 0xaa, 0x39, 0x01,
0x45, 0x89, 0x9c, 0x72, 0xff, 0xdd, 0x8f, 0x6d,
0xa0, 0x42, 0xbc, 0x6f, 0x6e, 0x62, 0x18, 0x2d,
0x50, 0xe8, 0x18, 0x97, 0x87, 0xfc, 0xef, 0x1f,
0xf5, 0x53, 0x68, 0xe8, 0x49, 0xd1, 0xa2, 0xe8,
0xb9, 0x26, 0x03, 0xba, 0xb5, 0x58, 0x6f, 0x6c,
0x8b, 0x08, 0xa1, 0x7b, 0x6f, 0x42, 0xc9, 0x53
};
WOLFSSL_SMALL_STACK_STATIC const byte g[] = {
@ -17270,7 +17278,7 @@ static int srp_test_digest(SrpType dgstType)
byte salt[10];
byte verifier[128];
byte verifier[192];
word32 v_size = sizeof(verifier);
word32 clientProofSz = SRP_MAX_DIGEST_SIZE;