Skip to content

Commit 982c378

Browse files
authored
Added SRPClient.calculateServerProof (#12)
* Added SRPClient.calculateServerProof * Update github action
1 parent f5c7fb5 commit 982c378

File tree

3 files changed

+35
-16
lines changed

3 files changed

+35
-16
lines changed

.github/workflows/swift.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ jobs:
1515
macOS:
1616
runs-on: macOS-latest
1717
steps:
18-
- uses: actions/checkout@v1
18+
- uses: actions/checkout@v4
1919
with:
2020
fetch-depth: 1
2121
- name: Build
@@ -27,12 +27,12 @@ jobs:
2727
runs-on: ubuntu-latest
2828
strategy:
2929
matrix:
30-
image: ['swift:5.7', 'swift:5.8', 'swift:5.9']
30+
image: ['swift:5.9', 'swift:5.10', 'swift:6.0']
3131
container:
3232
image: ${{ matrix.image }}
3333
steps:
3434
- name: Checkout
35-
uses: actions/checkout@v1
35+
uses: actions/checkout@v4
3636
with:
3737
fetch-depth: 1
3838
- name: Test

Sources/SRP/client.swift

+25-8
Original file line numberDiff line numberDiff line change
@@ -93,22 +93,39 @@ public struct SRPClient<H: HashFunction> {
9393
return SRP<H>.calculateClientProof(configuration: configuration, username: username, salt: salt, clientPublicKey: clientPublicKey, serverPublicKey: serverPublicKey, hashSharedSecret: hashSharedSecret)
9494
}
9595

96-
/// If the server returns that the client verification code was valiid it will also return a server verification code that the client can use to verify the server is correct
96+
/// If the server returns that the client verification code was valid it will also return a server
97+
/// verification code that the client can use to verify the server is correct. This is the calculation
98+
/// to verify it is correct
9799
///
98100
/// - Parameters:
99-
/// - code: Verification code returned by server
100-
/// - state: Authentication state
101-
/// - Throws: `requiresVerificationKey`, `invalidServerCode`
102-
public func verifyServerProof(serverProof: [UInt8], clientProof: [UInt8], clientKeys: SRPKeyPair, sharedSecret: SRPKey) throws {
101+
/// - clientPublicKey: Client public key
102+
/// - clientProof: Client proof
103+
/// - sharedSecret: Shared secret
104+
public func calculateServerProof(clientPublicKey: SRPKey, clientProof: [UInt8], sharedSecret: SRPKey) -> [UInt8] {
103105
let hashSharedSecret = [UInt8](H.hash(data: sharedSecret.bytes))
104106
// get out version of server proof
105-
let HAMK = SRP<H>.calculateServerVerification(clientPublicKey: clientKeys.public, clientProof: clientProof, sharedSecret: hashSharedSecret)
107+
return SRP<H>.calculateServerVerification(clientPublicKey: clientPublicKey, clientProof: clientProof, sharedSecret: hashSharedSecret)
108+
}
109+
110+
/// If the server returns that the client verification code was valid it will also return a server
111+
/// verification code that the client can use to verify the server is correct
112+
///
113+
/// - Parameters:
114+
/// - clientProof: Server proof
115+
/// - clientProof: Client proof
116+
/// - clientKeys: Client keys
117+
/// - sharedSecret: Shared secret
118+
/// - Throws: `requiresVerificationKey`, `invalidServerCode`
119+
public func verifyServerProof(serverProof: [UInt8], clientProof: [UInt8], clientKeys: SRPKeyPair, sharedSecret: SRPKey) throws {
120+
// get our version of server proof
121+
let HAMK = calculateServerProof(clientPublicKey: clientKeys.public, clientProof: clientProof, sharedSecret: sharedSecret)
106122
// is it the same
107123
guard serverProof == HAMK else { throw SRPClientError.invalidServerCode }
108124
}
109125

110-
/// Generate salt and password verifier from username and password. When creating your user instead of passing your password to the server, you
111-
/// pass the salt and password verifier values. In this way the server never knows your password so can never leak it.
126+
/// Generate salt and password verifier from username and password. When creating your user instead of
127+
/// passing your password to the server, you pass the salt and password verifier values. In this way the
128+
/// server never knows your password so can never leak it.
112129
///
113130
/// - Parameters:
114131
/// - username: username

Sources/SRP/server.swift

+7-5
Original file line numberDiff line numberDiff line change
@@ -66,10 +66,10 @@ public struct SRPServer<H: HashFunction> {
6666
/// verify proof that client has shared secret and return a server verification proof. If verification fails a `invalidClientCode` error is thrown
6767
///
6868
/// - Parameters:
69-
/// - code: verification code sent by user
70-
/// - username: username
71-
/// - salt: salt stored with user
72-
/// - state: authentication state.
69+
/// - proof: Client proof
70+
/// - clientPublicKey: Client public key
71+
/// - serverPublicKey: Server public key
72+
/// - sharedSecret: Shared secret
7373
/// - Throws: invalidClientCode
7474
/// - Returns: The server verification code
7575
public func verifySimpleClientProof(proof: [UInt8], clientPublicKey: SRPKey, serverPublicKey: SRPKey, sharedSecret: SRPKey) throws -> [UInt8] {
@@ -88,7 +88,9 @@ public struct SRPServer<H: HashFunction> {
8888
/// - code: verification code sent by user
8989
/// - username: username
9090
/// - salt: salt stored with user
91-
/// - state: authentication state.
91+
/// - clientPublicKey: Client public key
92+
/// - serverPublicKey: Server public key
93+
/// - sharedSecret: Shared secret
9294
/// - Throws: invalidClientCode
9395
/// - Returns: The server verification code
9496
public func verifyClientProof(proof: [UInt8], username: String, salt: [UInt8], clientPublicKey: SRPKey, serverPublicKey: SRPKey, sharedSecret: SRPKey) throws -> [UInt8] {

0 commit comments

Comments
 (0)