diff options
author | Tony Arcieri <bascule@gmail.com> | 2021-12-20 18:46:23 -0700 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-12-20 18:46:23 -0700 |
commit | 689dc0ab6af950b027b4bab96f73c427d2c42d6e (patch) | |
tree | 83f9792448b9017322724f6145a11ce34a18d608 /spake2/tests/mod.rs | |
parent | e38144177199721c3bf3f5e2cde403c2ce29c67e (diff) | |
download | PAKEs-689dc0ab6af950b027b4bab96f73c427d2c42d6e.tar.xz |
2021 edition bump + doc improvements; MSRV 1.56 (#80)
- Bumps both `spake2` and `srp` to Rust 2021 edition
- Uses the new `doc = include_str!(...)` attribute to include README.md
files in the rustdoc
- Improves the README.md files, adding an initial one for `srp`
- clippy fixes for Rust 1.56
Diffstat (limited to 'spake2/tests/mod.rs')
-rw-r--r-- | spake2/tests/mod.rs | 84 |
1 files changed, 0 insertions, 84 deletions
diff --git a/spake2/tests/mod.rs b/spake2/tests/mod.rs deleted file mode 100644 index 07ba946..0000000 --- a/spake2/tests/mod.rs +++ /dev/null @@ -1,84 +0,0 @@ -use spake2::{Ed25519Group, ErrorType, Identity, Password, SPAKEErr, SPAKE2}; - -#[test] -fn test_basic() { - let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a( - &Password::new(b"password"), - &Identity::new(b"idA"), - &Identity::new(b"idB"), - ); - let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b( - &Password::new(b"password"), - &Identity::new(b"idA"), - &Identity::new(b"idB"), - ); - let key1 = s1.finish(msg2.as_slice()).unwrap(); - let key2 = s2.finish(msg1.as_slice()).unwrap(); - assert_eq!(key1, key2); -} - -#[test] -fn test_mismatch() { - let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a( - &Password::new(b"password"), - &Identity::new(b"idA"), - &Identity::new(b"idB"), - ); - let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b( - &Password::new(b"password2"), - &Identity::new(b"idA"), - &Identity::new(b"idB"), - ); - let key1 = s1.finish(msg2.as_slice()).unwrap(); - let key2 = s2.finish(msg1.as_slice()).unwrap(); - assert_ne!(key1, key2); -} - -#[test] -fn test_reflected_message() { - let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a( - &Password::new(b"password"), - &Identity::new(b"idA"), - &Identity::new(b"idB"), - ); - let r = s1.finish(msg1.as_slice()); - assert_eq!( - r.unwrap_err(), - SPAKEErr { - kind: ErrorType::BadSide, - } - ); -} - -#[test] -fn test_bad_length() { - let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a( - &Password::new(b"password"), - &Identity::new(b"idA"), - &Identity::new(b"idB"), - ); - let mut msg2 = Vec::<u8>::with_capacity(msg1.len() + 1); - msg2.resize(msg1.len() + 1, 0u8); - let r = s1.finish(&msg2); - assert_eq!( - r.unwrap_err(), - SPAKEErr { - kind: ErrorType::WrongLength, - } - ); -} - -#[test] -fn test_basic_symmetric() { - let (s1, msg1) = SPAKE2::<Ed25519Group>::start_symmetric( - &Password::new(b"password"), - &Identity::new(b"idS"), - ); - let (s2, msg2) = SPAKE2::<Ed25519Group>::start_symmetric( - &Password::new(b"password"), - &Identity::new(b"idS"), - ); - let key1 = s1.finish(msg2.as_slice()).unwrap(); - let key2 = s2.finish(msg1.as_slice()).unwrap(); - assert_eq!(key1, key2); -} |