From 2a2d352c39382ae1e5767c73cd2ce19f12929453 Mon Sep 17 00:00:00 2001 From: Fist0urs Date: Wed, 13 Mar 2019 22:22:54 +0100 Subject: [PATCH] m19700 test cases: remove debug strings --- tools/test_modules/m19700.pm | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/tools/test_modules/m19700.pm b/tools/test_modules/m19700.pm index 2036b3fbb..2510d14c3 100644 --- a/tools/test_modules/m19700.pm +++ b/tools/test_modules/m19700.pm @@ -59,8 +59,6 @@ sub module_generate_hash my $b_seed = $pbkdf2->PBKDF2 ($mysalt, $word); - printf "seed: %s\n", byte2hex($b_seed); - # we can precompute this my $b_kerberos_nfolded = hex2byte('6b65726265726f737b9b5b2b93132b93'); @@ -68,14 +66,11 @@ sub module_generate_hash # 'key_bytes' will be the AES key used to generate 'ki' (for final hmac-sha1) # and 'ke' (AES key to decrypt/encrypt the ticket) - my $cbc = Crypt::Mode::CBC->new ('AES', 0); - + my $cbc = Crypt::Mode::CBC->new ('AES', 0); my $b_key_bytes = $cbc->encrypt ($b_kerberos_nfolded, $b_seed, $b_iv); $b_key_bytes = $b_key_bytes . $cbc->encrypt ($b_key_bytes, $b_seed, $b_iv); - printf "key_bytes: %s\n", byte2hex($b_key_bytes); - # precomputed stuff my $b_nfolded1 = hex2byte('62dc6e371a63a80958ac562b15404ac5'); my $b_nfolded2 = hex2byte('b5b0582c14b6500aad56ab55aa80556a'); @@ -88,9 +83,6 @@ sub module_generate_hash $b_ke = $b_ke . $cbc->encrypt ($b_ke, $b_key_bytes, $b_iv); - printf "ki: %s\n", byte2hex($b_ki); - printf "ke: %s\n", byte2hex($b_ke); - my $cleartext_ticket = '6381b03081ada00703050050a00000a11b3019a003020117a1'. '12041058e0d77776e8b8e03991f2966939222aa2171b154d594b5242544553542e434f4e5'. '44f534f2e434f4da3133011a003020102a10a30081b067472616e6365a40b3009a0030201'.