Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/crypto/krb5/src/plugins/preauth/spake/t_vectors.c
34907 views
1
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
2
/* plugins/preauth/spake/t_vectors.c - SPAKE test vector verification */
3
/*
4
* Copyright (C) 2015 by the Massachusetts Institute of Technology.
5
* All rights reserved.
6
*
7
* Redistribution and use in source and binary forms, with or without
8
* modification, are permitted provided that the following conditions
9
* are met:
10
*
11
* * Redistributions of source code must retain the above copyright
12
* notice, this list of conditions and the following disclaimer.
13
*
14
* * Redistributions in binary form must reproduce the above copyright
15
* notice, this list of conditions and the following disclaimer in
16
* the documentation and/or other materials provided with the
17
* distribution.
18
*
19
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
22
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
23
* COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
24
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
30
* OF THE POSSIBILITY OF SUCH DAMAGE.
31
*/
32
33
#include "k5-int.h"
34
#include "k5-hex.h"
35
#include "groups.h"
36
#include "iana.h"
37
#include "util.h"
38
#include <ctype.h>
39
40
struct test {
41
krb5_enctype enctype;
42
int32_t group;
43
const char *ikey;
44
const char *w;
45
const char *x;
46
const char *y;
47
const char *T;
48
const char *S;
49
const char *K;
50
const char *support;
51
const char *challenge;
52
const char *thash;
53
const char *body;
54
const char *K0;
55
const char *K1;
56
const char *K2;
57
const char *K3;
58
} tests[] = {
59
{ ENCTYPE_DES3_CBC_SHA1, SPAKE_GROUP_EDWARDS25519,
60
/* initial key, w, x, y, T, S, K */
61
"850BB51358548CD05E86768C313E3BFEF7511937DCF72C3E",
62
"686D84730CB8679AE95416C6567C6A63F2C9CEF124F7A3371AE81E11CAD42A37",
63
"201012D07BFD48DDFA33C4AAC4FB1E229FB0D043CFE65EBFB14399091C71A723",
64
"500B294797B8B042ACA1BEDC0F5931A4F52C537B3608B2D05CC8A2372F439F25",
65
"18F511E750C97B592ACD30DB7D9E5FCA660389102E6BF610C1BFBED4616C8362",
66
"5D10705E0D1E43D5DBF30240CCFBDE4A0230C70D4C79147AB0B317EDAD2F8AE7",
67
"25BDE0D875F0FEB5755F45BA5E857889D916ECF7476F116AA31DC3E037EC4292",
68
/* support, challenge, thash, body */
69
"A0093007A0053003020101",
70
"A1363034A003020101A122042018F511E750C97B592ACD30DB7D9E5FCA660389"
71
"102E6BF610C1BFBED4616C8362A20930073005A003020101",
72
"EAAA08807D0616026FF51C849EFBF35BA0CE3C5300E7D486DA46351B13D4605B",
73
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
74
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
75
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
76
"303130313030303030305AA703020100A8053003020110",
77
/* K'[0], K'[1], K'[2], K'[3] */
78
"BAF12FAE7CD958CBF1A29BFBC71F89CE49E03E295D89DAFD",
79
"64F73DD9C41908206BCEC1F719026B574F9D13463D7A2520",
80
"0454520B086B152C455829E6BAEFF78A61DFE9E3D04A895D",
81
"4A92260B25E3EF94C125D5C24C3E5BCED5B37976E67F25C4",
82
},
83
84
{ ENCTYPE_ARCFOUR_HMAC, SPAKE_GROUP_EDWARDS25519,
85
/* initial key, w, x, y, T, S, K */
86
"8846F7EAEE8FB117AD06BDD830B7586C",
87
"7C86659D29CF2B2EA93BFE79C3CEFB8850E82215B3EA6FCD896561D48048F49C",
88
"C8A62E7B626F44CAD807B2D695450697E020D230A738C5CD5691CC781DCE8754",
89
"18FE7C1512708C7FD06DB270361F04593775BC634CEAF45347E5C11C38AAE017",
90
"7DB465F1C08C64983A19F560BCE966FE5306C4B447F70A5BCA14612A92DA1D63",
91
"38F8D4568090148EBC9FD17C241B4CC2769505A7CA6F3F7104417B72B5B5CF54",
92
"03E75EDD2CD7E7677642DD68736E91700953AC55DC650E3C2A1B3B4ACDB800F8",
93
/* support, challenge, thash, body */
94
"A0093007A0053003020101",
95
"A1363034A003020101A12204207DB465F1C08C64983A19F560BCE966FE5306C4"
96
"B447F70A5BCA14612A92DA1D63A20930073005A003020101",
97
"F4B208458017DE6EF7F6A307D47D87DB6C2AF1D291B726860F68BC08BFEF440A",
98
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
99
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
100
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
101
"303130313030303030305AA703020100A8053003020117",
102
/* K'[0], K'[1], K'[2], K'[3] */
103
"770B720C82384CBB693E85411EEDECBA",
104
"621DEEC88E2865837C4D3462BB50A1D5",
105
"1CC8F6333B9FA3B42662FD9914FBD5BB",
106
"EDB4032B7FC3806D5211A534DCBC390C",
107
},
108
109
{ ENCTYPE_AES128_CTS_HMAC_SHA1_96, SPAKE_GROUP_EDWARDS25519,
110
/* initial key, w, x, y, T, S, K */
111
"FCA822951813FB252154C883F5EE1CF4",
112
"0D591B197B667E083C2F5F98AC891D3C9F99E710E464E62F1FB7C9B67936F3EB",
113
"50BE049A5A570FA1459FB9F666E6FD80602E4E87790A0E567F12438A2C96C138",
114
"B877AFE8612B406D96BE85BD9F19D423E95BE96C0E1E0B5824127195C3ED5917",
115
"9E9311D985C1355E022D7C3C694AD8D6F7AD6D647B68A90B0FE46992818002DA",
116
"FBE08F7F96CD5D4139E7C9ECCB95E79B8ACE41E270A60198C007DF18525B628E",
117
"C2F7F99997C585E6B686CEB62DB42F17CC70932DEF3BB4CF009E36F22EA5473D",
118
/* support, challenge, thash, body */
119
"A0093007A0053003020101",
120
"A1363034A003020101A12204209E9311D985C1355E022D7C3C694AD8D6F7AD6D"
121
"647B68A90B0FE46992818002DAA20930073005A003020101",
122
"951285F107C87F0169B9C918A1F51F60CB1A75B9F8BB799A99F53D03ADD94B5F",
123
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
124
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
125
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
126
"303130313030303030305AA703020100A8053003020111",
127
/* K'[0], K'[1], K'[2], K'[3] */
128
"548022D58A7C47EAE8C49DCCF6BAA407",
129
"B2C9BA0E13FC8AB3A9D96B51B601CF4A",
130
"69F0EE5FDB6C237E7FCD38D9F87DF1BD",
131
"78F91E2240B5EE528A5CC8D7CBEBFBA5",
132
},
133
{ ENCTYPE_AES256_CTS_HMAC_SHA1_96, SPAKE_GROUP_EDWARDS25519,
134
/* initial key, w, x, y, T, S, K */
135
"01B897121D933AB44B47EB5494DB15E50EB74530DBDAE9B634D65020FF5D88C1",
136
"E902341590A1B4BB4D606A1C643CCCB3F2108F1B6AA97B381012B9400C9E3F4E",
137
"88C6C0A4F0241EF217C9788F02C32D00B72E4310748CD8FB5F94717607E6417D",
138
"88B859DF58EF5C69BACDFE681C582754EAAB09A74DC29CFF50B328613C232F55",
139
"6F301AACAE1220E91BE42868C163C5009AEEA1E9D9E28AFCFC339CDA5E7105B5",
140
"9E2CC32908FC46273279EC75354B4AEAFA70C3D99A4D507175ED70D80B255DDA",
141
"CF57F58F6E60169D2ECC8F20BB923A8E4C16E5BC95B9E64B5DC870DA7026321B",
142
/* support, challenge, thash, body */
143
"A0093007A0053003020101",
144
"A1363034A003020101A12204206F301AACAE1220E91BE42868C163C5009AEEA1"
145
"E9D9E28AFCFC339CDA5E7105B5A20930073005A003020101",
146
"1C605649D4658B58CBE79A5FAF227ACC16C355C58B7DADE022F90C158FE5ED8E",
147
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
148
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
149
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
150
"303130313030303030305AA703020100A8053003020112",
151
/* K'[0], K'[1], K'[2], K'[3] */
152
"A9BFA71C95C575756F922871524B65288B3F695573CCC0633E87449568210C23",
153
"1865A9EE1EF0640EC28AC007391CAC624C42639C714767A974E99AA10003015F",
154
"E57781513FEFDB978E374E156B0DA0C1A08148F5EB26B8E157AC3C077E28BF49",
155
"008E6487293C3CC9FABBBCDD8B392D6DCB88222317FD7FE52D12FBC44FA047F1",
156
},
157
158
#ifdef SPAKE_OPENSSL
159
{ ENCTYPE_AES256_CTS_HMAC_SHA1_96, SPAKE_GROUP_P256,
160
/* initial key, w, x, y, T, S, K */
161
"01B897121D933AB44B47EB5494DB15E50EB74530DBDAE9B634D65020FF5D88C1",
162
"EB2984AF18703F94DD5288B8596CD36988D0D4E83BFB2B44DE14D0E95E2090BD",
163
"935DDD725129FB7C6288E1A5CC45782198A6416D1775336D71EACD0549A3E80E",
164
"E07405EB215663ABC1F254B8ADC0DA7A16FEBAA011AF923D79FDEF7C42930B33",
165
"024F62078CEB53840D02612195494D0D0D88DE21FEEB81187C71CBF3D01E71788D",
166
"021D07DC31266FC7CFD904CE2632111A169B7EC730E5F74A7E79700F86638E13C8",
167
"0268489D7A9983F2FDE69C6E6A1307E9D252259264F5F2DFC32F58CCA19671E79B",
168
/* support, challenge, thash, body */
169
"A0093007A0053003020102",
170
"A1373035A003020102A1230421024F62078CEB53840D02612195494D0D0D88DE"
171
"21FEEB81187C71CBF3D01E71788DA20930073005A003020101",
172
"20AD3C1A9A90FC037D1963A1C4BFB15AB4484D7B6CF07B12D24984F14652DE60",
173
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
174
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
175
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
176
"303130313030303030305AA703020100A8053003020112",
177
/* K'[0], K'[1], K'[2], K'[3] */
178
"7D3B906F7BE49932DB22CD3463F032D06C9C078BE4B1D076D201FC6E61EF531E",
179
"17D74E36F8993841FBB7FEB12FA4F011243D3AE4D2ACE55B39379294BBC4DB2C",
180
"D192C9044081A2AA6A97A6C69E2724E8E5671C2C9CE073DD439CDBAF96D7DAB0",
181
"41E5BAD6B67F12C53CE0E2720DD6A9887F877BF9463C2D5209C74C36F8D776B7",
182
},
183
184
{ ENCTYPE_AES256_CTS_HMAC_SHA1_96, SPAKE_GROUP_P384,
185
/* initial key, w, x, y, T, S, K */
186
"01B897121D933AB44B47EB5494DB15E50EB74530DBDAE9B634D65020FF5D88C1",
187
"0304CFC55151C6BBE889653DB96DBFE0BA4ACAFC024C1E8840CB3A486F6D80C1"
188
"6E1B8974016AA4B7FA43042A9B3825B1",
189
"F323CA74D344749096FD35D0ADF20806E521460637176E84D977E9933C49D76F"
190
"CFC6E62585940927468FF53D864A7A50",
191
"5B7C709ACB175A5AFB82860DEABCA8D0B341FACDFF0AC0F1A425799AA905D750"
192
"7E1EA9C573581A81467437419466E472",
193
"02A1524603EF14F184696F854229D3397507A66C63F841BA748451056BE07879"
194
"AC298912387B1C5CDFF6381C264701BE57",
195
"020D5ADFDB92BC377041CF5837412574C5D13E0F4739208A4F0C859A0A302BC6"
196
"A533440A245B9D97A0D34AF5016A20053D",
197
"0264AA8C61DA9600DFB0BEB5E46550D63740E4EF29E73F1A30D543EB43C25499"
198
"037AD16538586552761B093CF0E37C703A",
199
/* support, challenge, thash, body */
200
"A0093007A0053003020103",
201
"A1473045A003020103A133043102A1524603EF14F184696F854229D3397507A6"
202
"6C63F841BA748451056BE07879AC298912387B1C5CDFF6381C264701BE57A209"
203
"30073005A003020101",
204
"5AC0D99EF9E5A73998797FE64F074673E3952DEC4C7D1AACCE8B75F64D2B0276"
205
"A901CB8539B4E8ED69E4DB0CE805B47B",
206
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
207
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
208
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
209
"303130313030303030305AA703020100A8053003020112",
210
/* K'[0], K'[1], K'[2], K'[3] */
211
"B917D37C16DD1D8567FBE379F64E1EE36CA3FD127AA4E60F97E4AFA3D9E56D91",
212
"93D40079DAB229B9C79366829F4E7E7282E6A4B943AC7BAC69922D516673F49A",
213
"BFC4F16F12F683E71589F9A888E232875EF293AC9793DB6C919567CD7B94BCD4",
214
"3630E2B5B99938E7506733141E8EC344166F6407E5FC2EF107C156E764D1BC20",
215
},
216
217
{ ENCTYPE_AES256_CTS_HMAC_SHA1_96, SPAKE_GROUP_P521,
218
/* initial key, w, x, y, T, S, K */
219
"01B897121D933AB44B47EB5494DB15E50EB74530DBDAE9B634D65020FF5D88C1",
220
"DE3A095A2B2386EFF3EB15B735398DA1CAF95BC8425665D82370AFF58B0471F3"
221
"4A57BCCDDF1EBF0A2965B58A93EE5B45E85D1A5435D1C8C83662999722D54283"
222
"1F9A",
223
"017C38701A14B490B6081DFC83524562BE7FBB42E0B20426465E3E37952D30BC"
224
"AB0ED857010255D44936A1515607964A870C7C879B741D878F9F9CDF5A865306"
225
"F3F5",
226
"003E2E2950656FA231E959ACDD984D125E7FA59CEC98126CBC8F3888447911EB"
227
"CD49428A1C22D5FDB76A19FBEB1D9EDFA3DA6CF55B158B53031D05D51433ADE9"
228
"B2B4",
229
"02017D3DE19A3EC53D0174905665EF37947D142535102CD9809C0DFBD0DFE007"
230
"353D54CF406CE2A59950F2BB540DF6FBE75F8BBBEF811C9BA06CC275ADBD9675"
231
"6696EC",
232
"02004D142D87477841F6BA053C8F651F3395AD264B7405CA5911FB9A55ABD454"
233
"FEF658A5F9ED97D1EFAC68764E9092FA15B9E0050880D78E95FD03ABF5931791"
234
"6822B5",
235
"03007C303F62F09282CC849490805BD4457A6793A832CBEB55DF427DB6A31E99"
236
"B055D5DC99756D24D47B70AD8B6015B0FB8742A718462ED423B90FA3FE631AC1"
237
"3FA916",
238
/* support, challenge, thash, body */
239
"A0093007A0053003020104",
240
"A1593057A003020104A145044302017D3DE19A3EC53D0174905665EF37947D14"
241
"2535102CD9809C0DFBD0DFE007353D54CF406CE2A59950F2BB540DF6FBE75F8B"
242
"BBEF811C9BA06CC275ADBD96756696ECA20930073005A003020101",
243
"8D6A89AE4D80CC4E47B6F4E48EA3E57919CC69598D0D3DC7C8BD49B6F1DB1409"
244
"CA0312944CD964E213ABA98537041102237CFF5B331E5347A0673869B412302E",
245
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
246
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
247
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
248
"303130313030303030305AA703020100A8053003020112",
249
/* K'[0], K'[1], K'[2], K'[3] */
250
"1EB3D10BEE8FAB483ADCD3EB38F3EBF1F4FEB8DB96ECC035F563CF2E1115D276",
251
"482B92781CE57F49176E4C94153CC622FE247A7DBE931D1478315F856F085890",
252
"A2C215126DD3DF280AAB5A27E1E0FB7E594192CBFF8D6D8E1B6F1818D9BB8FAC",
253
"CC06603DE984324013A01F888DE6D43B410A4DA2DEA53509F30E433C352FB668",
254
},
255
#endif /* SPAKE_OPENSSL */
256
257
/* Successful optimistic challenge (no support message in transcript) */
258
{ ENCTYPE_AES256_CTS_HMAC_SHA1_96, SPAKE_GROUP_EDWARDS25519,
259
/* initial key, w, x, y, T, S, K */
260
"01B897121D933AB44B47EB5494DB15E50EB74530DBDAE9B634D65020FF5D88C1",
261
"E902341590A1B4BB4D606A1C643CCCB3F2108F1B6AA97B381012B9400C9E3F4E",
262
"70937207344CAFBC53C8A55070E399C584CBAFCE00B836980DD4E7E74FAD2A64",
263
"785D6801A2490DF028903AC6449B105F2FF0DB895B252953CDC2076649526103",
264
"83523B35F1565006CBFC4F159885467C2FB9BC6FE23D36CB1DA43D199F1A3118",
265
"2A8F70F46CEE9030700037B77F22CEC7970DCC238E3E066D9D726BAF183992C6",
266
"D3C5E4266AA6D1B2873A97CE8AF91C7E4D7A7AC456ACCED7908D34C561AD8FA6",
267
/* support, challenge, thash, body */
268
NULL,
269
"A1363034A003020101A122042083523B35F1565006CBFC4F159885467C2FB9BC"
270
"6FE23D36CB1DA43D199F1A3118A20930073005A003020101",
271
"26F07F9F8965307434D11EA855461D41E0CBABCC0A1BAB48ECEE0C6C1A4292B7",
272
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
273
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
274
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
275
"303130313030303030305AA703020100A8053003020112",
276
/* K'[0], K'[1], K'[2], K'[3] */
277
"4569EC08B5DE5C3CC19D941725913ACE8D74524B521A341DC746ACD5C3784D92",
278
"0D96CE1A4AC0F2E280A0CFC31742B06461D83D04AE45433DB2D80478DD882A4C",
279
"58018C19315A1BA5D5BB9813B58029F0AEC18A6F9CA59E0847DE1C60BC25945C",
280
"ED7E9BFFD68C54D86FB19CD3C03F317F88A71AD9A5E94C28581D93FC4EC72B6A",
281
},
282
283
#ifdef SPAKE_OPENSSL
284
/* Rejected optimistic challenge (no support message in transcript),
285
* falling back from edwards25519 to P-521 */
286
{ ENCTYPE_AES256_CTS_HMAC_SHA1_96, SPAKE_GROUP_P521,
287
/* initial key, w, x, y, T, S, K */
288
"01B897121D933AB44B47EB5494DB15E50EB74530DBDAE9B634D65020FF5D88C1",
289
"DE3A095A2B2386EFF3EB15B735398DA1CAF95BC8425665D82370AFF58B0471F3"
290
"4A57BCCDDF1EBF0A2965B58A93EE5B45E85D1A5435D1C8C83662999722D54283"
291
"1F9A",
292
"01687B59051BF40048D7C31D5A973D792FA12284B7A447E7F5938B5885CA0BB2"
293
"C3F0BD30291A55FEA08E143E2E04BDD7D19B753C7C99032F06CAB0D9C2AA8F83"
294
"7EF7",
295
"01DED675EBF74FE30C9A53710F577E9CF84F09F6048FE245A4600004884CC167"
296
"733F9A9E43108FB83BABE8754CD37CBD7025E28BC9FF870F084C7244F536285E"
297
"25B4",
298
"02014CB2E5B592ECE5990F0EF30D308C061DE1598BC4272B4A6599BED466FD15"
299
"21693642ABCF4DBE36CE1A2D13967DE45F6C4F8D0FA8E14428BF03FB96EF5F1E"
300
"D3E645",
301
"02016C64995E804416F748FD5FA3AA678CBC7CBB596A4F523132DC8AF7CE84E5"
302
"41F484A2C74808C6B21DCF7775BAEFA6753398425BECC7B838B210AC5DAA0CB0"
303
"B710E2",
304
"0200997F4848AE2E7A98C23D14AC662030743AB37FCCC2A45F1C721114F40BCC"
305
"80FE6EC6ABA49868F8AEA1AA994D50E81B86D3E4D3C1130C8695B68907C673D9"
306
"E5886A",
307
/* support, challenge, thash, body */
308
"A0093007A0053003020104",
309
"A1593057A003020104A145044302014CB2E5B592ECE5990F0EF30D308C061DE1"
310
"598BC4272B4A6599BED466FD1521693642ABCF4DBE36CE1A2D13967DE45F6C4F"
311
"8D0FA8E14428BF03FB96EF5F1ED3E645A20930073005A003020101",
312
"D0EFED5E3E2C39C26034756D92A66FEC3082AD793D0197F3F89AD36026F146A3"
313
"996E548AA3FC49E2E82F8CAC5D132C505AA475B39E7BE79CDED22C26C41AA777",
314
"3075A00703050000000000A1143012A003020101A10B30091B07726165627572"
315
"6EA2101B0E415448454E412E4D49542E454455A3233021A003020102A11A3018"
316
"1B066B72627467741B0E415448454E412E4D49542E454455A511180F31393730"
317
"303130313030303030305AA703020100A8053003020112",
318
/* K'[0], K'[1], K'[2], K'[3] */
319
"631FCC8596E7F40E59045950D72AA0B7BAC2810A07B767050E983841CF3A2D4C",
320
"881464920117074DBC67155A8F3341D1121EF65F78EA0380BFA81A134C1C47B1",
321
"377B72AC3AF2CAAD582D73AE4682FD56B531EE56706200DD6C38C42B8219837A",
322
"35AD8E4D580ED3F0D15AD928329773C081BD19F9A56363F3A5F77C7E66108C26",
323
},
324
#endif /* SPAKE_OPENSSL */
325
};
326
327
static krb5_context ctx;
328
329
static void
330
check(krb5_error_code code)
331
{
332
const char *errmsg;
333
334
if (code) {
335
errmsg = krb5_get_error_message(ctx, code);
336
assert(errmsg != NULL);
337
abort();
338
}
339
}
340
341
static void
342
check_key_equal(const krb5_keyblock *kb1, const krb5_keyblock *kb2)
343
{
344
assert(kb1->enctype == kb2->enctype);
345
assert(kb1->length == kb2->length);
346
assert(memcmp(kb1->contents, kb2->contents, kb1->length) == 0);
347
}
348
349
static krb5_data *
350
decode_data(const char *s)
351
{
352
uint8_t *bytes;
353
size_t len;
354
krb5_data *d;
355
356
if (k5_hex_decode(s, &bytes, &len) != 0)
357
abort();
358
d = malloc(sizeof(*d));
359
assert(d != NULL);
360
*d = make_data(bytes, len);
361
return d;
362
}
363
364
static krb5_keyblock *
365
decode_keyblock(krb5_enctype enctype, const char *s)
366
{
367
uint8_t *bytes;
368
size_t len;
369
krb5_keyblock *kb;
370
371
if (k5_hex_decode(s, &bytes, &len) != 0)
372
abort();
373
kb = malloc(sizeof(*kb));
374
kb->magic = KV5M_KEYBLOCK;
375
kb->enctype = enctype;
376
kb->length = len;
377
kb->contents = bytes;
378
return kb;
379
}
380
381
static void
382
run_test(const struct test *t)
383
{
384
groupstate *gstate;
385
krb5_keyblock *ikey, *K0, *K1, *K2, *K3, *kb;
386
krb5_data *w, *x, *y, *T, *S, *K, *support, *challenge, *thash;
387
krb5_data *body, wbytes, result, hash, empty = empty_data();
388
389
/* Decode hex strings into keyblocks and byte strings. */
390
ikey = decode_keyblock(t->enctype, t->ikey);
391
w = decode_data(t->w);
392
x = decode_data(t->x);
393
y = decode_data(t->y);
394
T = decode_data(t->T);
395
S = decode_data(t->S);
396
K = decode_data(t->K);
397
support = (t->support != NULL) ? decode_data(t->support) : NULL;
398
challenge = decode_data(t->challenge);
399
thash = decode_data(t->thash);
400
body = decode_data(t->body);
401
K0 = decode_keyblock(t->enctype, t->K0);
402
K1 = decode_keyblock(t->enctype, t->K1);
403
K2 = decode_keyblock(t->enctype, t->K2);
404
K3 = decode_keyblock(t->enctype, t->K3);
405
406
check(derive_wbytes(ctx, t->group, ikey, &wbytes));
407
assert(data_eq(*w, wbytes));
408
409
/* Verify KDC-side result computation. */
410
check(group_init_state(ctx, TRUE, &gstate));
411
check(group_result(ctx, gstate, t->group, &wbytes, x, S, &result));
412
assert(data_eq(*K, result));
413
krb5_free_data_contents(ctx, &result);
414
group_free_state(gstate);
415
416
/* Verify client-side result computation. */
417
check(group_init_state(ctx, FALSE, &gstate));
418
check(group_result(ctx, gstate, t->group, &wbytes, y, T, &result));
419
assert(data_eq(*K, result));
420
krb5_free_data_contents(ctx, &result);
421
422
/* Verify transcript hash. */
423
hash = empty_data();
424
check(update_thash(ctx, gstate, t->group, &hash, support, challenge));
425
check(update_thash(ctx, gstate, t->group, &hash, S, &empty));
426
assert(data_eq(*thash, hash));
427
krb5_free_data_contents(ctx, &hash);
428
429
/* Verify derived keys. */
430
check(derive_key(ctx, gstate, t->group, ikey, &wbytes, K, thash, body, 0,
431
&kb));
432
check_key_equal(K0, kb);
433
krb5_free_keyblock(ctx, kb);
434
check(derive_key(ctx, gstate, t->group, ikey, &wbytes, K, thash, body, 1,
435
&kb));
436
check_key_equal(K1, kb);
437
krb5_free_keyblock(ctx, kb);
438
check(derive_key(ctx, gstate, t->group, ikey, &wbytes, K, thash, body, 2,
439
&kb));
440
check_key_equal(K2, kb);
441
krb5_free_keyblock(ctx, kb);
442
check(derive_key(ctx, gstate, t->group, ikey, &wbytes, K, thash, body, 3,
443
&kb));
444
check_key_equal(K3, kb);
445
krb5_free_keyblock(ctx, kb);
446
447
group_free_state(gstate);
448
krb5_free_data_contents(ctx, &wbytes);
449
krb5_free_keyblock(ctx, ikey);
450
krb5_free_data(ctx, w);
451
krb5_free_data(ctx, x);
452
krb5_free_data(ctx, y);
453
krb5_free_data(ctx, T);
454
krb5_free_data(ctx, S);
455
krb5_free_data(ctx, K);
456
krb5_free_data(ctx, support);
457
krb5_free_data(ctx, challenge);
458
krb5_free_data(ctx, thash);
459
krb5_free_data(ctx, body);
460
krb5_free_keyblock(ctx, K0);
461
krb5_free_keyblock(ctx, K1);
462
krb5_free_keyblock(ctx, K2);
463
krb5_free_keyblock(ctx, K3);
464
}
465
466
int
467
main(void)
468
{
469
size_t i;
470
471
check(krb5_init_context(&ctx));
472
for (i = 0; i < sizeof(tests) / sizeof(*tests); i++)
473
run_test(&tests[i]);
474
krb5_free_context(ctx);
475
return 0;
476
}
477
478