SRP test; increase size of N

SHA512 digest was sometimes too big for the 1024-bit N.
Increase N to 1536 bits to ensure no intermittent fails.
This commit is contained in:
Sean Parkinson
2021-09-13 09:18:26 +10:00
parent 4bd87a0c41
commit 33028de0de

View File

@ -17234,10 +17234,10 @@ static int srp_test_digest(SrpType dgstType)
{ {
int r; int r;
byte clientPubKey[128]; /* A */ byte clientPubKey[192]; /* A */
byte serverPubKey[128]; /* B */ byte serverPubKey[192]; /* B */
word32 clientPubKeySz = 128; word32 clientPubKeySz = 192;
word32 serverPubKeySz = 128; word32 serverPubKeySz = 192;
byte username[] = "user"; byte username[] = "user";
word32 usernameSz = 4; word32 usernameSz = 4;
@ -17246,22 +17246,30 @@ static int srp_test_digest(SrpType dgstType)
word32 passwordSz = 8; word32 passwordSz = 8;
WOLFSSL_SMALL_STACK_STATIC const byte N[] = { WOLFSSL_SMALL_STACK_STATIC const byte N[] = {
0xEE, 0xAF, 0x0A, 0xB9, 0xAD, 0xB3, 0x8D, 0xD6, 0xfc, 0x58, 0x7a, 0x8a, 0x70, 0xfb, 0x5a, 0x9a,
0x9C, 0x33, 0xF8, 0x0A, 0xFA, 0x8F, 0xC5, 0xE8, 0x5d, 0x39, 0x48, 0xbf, 0x1c, 0x46, 0xd8, 0x3b,
0x60, 0x72, 0x61, 0x87, 0x75, 0xFF, 0x3C, 0x0B, 0x7a, 0xe9, 0x1f, 0x85, 0x36, 0x18, 0xc4, 0x35,
0x9E, 0xA2, 0x31, 0x4C, 0x9C, 0x25, 0x65, 0x76, 0x3f, 0xf8, 0x8a, 0x8f, 0x8c, 0x10, 0x2e, 0x01,
0xD6, 0x74, 0xDF, 0x74, 0x96, 0xEA, 0x81, 0xD3, 0x58, 0x1d, 0x41, 0xcb, 0xc4, 0x47, 0xa8, 0xaf,
0x38, 0x3B, 0x48, 0x13, 0xD6, 0x92, 0xC6, 0xE0, 0x9a, 0x6f, 0x58, 0x14, 0xa4, 0x68, 0xf0, 0x9c,
0xE0, 0xD5, 0xD8, 0xE2, 0x50, 0xB9, 0x8B, 0xE4, 0xa6, 0xe7, 0xbf, 0x0d, 0xe9, 0x62, 0x0b, 0xd7,
0x8E, 0x49, 0x5C, 0x1D, 0x60, 0x89, 0xDA, 0xD1, 0x26, 0x46, 0x5b, 0x27, 0xcb, 0x4c, 0xf9, 0x7e,
0x5D, 0xC7, 0xD7, 0xB4, 0x61, 0x54, 0xD6, 0xB6, 0x1e, 0x8b, 0xe6, 0xdd, 0x29, 0xb7, 0xb7, 0x15,
0xCE, 0x8E, 0xF4, 0xAD, 0x69, 0xB1, 0x5D, 0x49, 0x2e, 0xcf, 0x23, 0xa6, 0x4b, 0x97, 0x9f, 0x89,
0x82, 0x55, 0x9B, 0x29, 0x7B, 0xCF, 0x18, 0x85, 0xd4, 0x86, 0xc4, 0x90, 0x63, 0x92, 0xf4, 0x30,
0xC5, 0x29, 0xF5, 0x66, 0x66, 0x0E, 0x57, 0xEC, 0x26, 0x69, 0x48, 0x9d, 0x7a, 0x4f, 0xad, 0xb5,
0x68, 0xED, 0xBC, 0x3C, 0x05, 0x72, 0x6C, 0xC0, 0x6a, 0x51, 0xad, 0xeb, 0xf9, 0x90, 0x31, 0x77,
0x2F, 0xD4, 0xCB, 0xF4, 0x97, 0x6E, 0xAA, 0x9A, 0x53, 0x30, 0x2a, 0x85, 0xf7, 0x11, 0x21, 0x0c,
0xFD, 0x51, 0x38, 0xFE, 0x83, 0x76, 0x43, 0x5B, 0xb8, 0x4b, 0x56, 0x03, 0x5e, 0xbb, 0x25, 0x33,
0x9F, 0xC6, 0x1D, 0x2F, 0xC0, 0xEB, 0x06, 0xE3 0x7c, 0xd9, 0x5a, 0xd1, 0x5c, 0xb2, 0xd4, 0x53,
0xc5, 0x16, 0x68, 0xf0, 0xdf, 0x48, 0x55, 0x3e,
0xd4, 0x59, 0x87, 0x64, 0x59, 0xaa, 0x39, 0x01,
0x45, 0x89, 0x9c, 0x72, 0xff, 0xdd, 0x8f, 0x6d,
0xa0, 0x42, 0xbc, 0x6f, 0x6e, 0x62, 0x18, 0x2d,
0x50, 0xe8, 0x18, 0x97, 0x87, 0xfc, 0xef, 0x1f,
0xf5, 0x53, 0x68, 0xe8, 0x49, 0xd1, 0xa2, 0xe8,
0xb9, 0x26, 0x03, 0xba, 0xb5, 0x58, 0x6f, 0x6c,
0x8b, 0x08, 0xa1, 0x7b, 0x6f, 0x42, 0xc9, 0x53
}; };
WOLFSSL_SMALL_STACK_STATIC const byte g[] = { WOLFSSL_SMALL_STACK_STATIC const byte g[] = {
@ -17270,7 +17278,7 @@ static int srp_test_digest(SrpType dgstType)
byte salt[10]; byte salt[10];
byte verifier[128]; byte verifier[192];
word32 v_size = sizeof(verifier); word32 v_size = sizeof(verifier);
word32 clientProofSz = SRP_MAX_DIGEST_SIZE; word32 clientProofSz = SRP_MAX_DIGEST_SIZE;