diff options
author | Artyom Pavlov <newpavlov@gmail.com> | 2018-10-17 18:11:24 +0000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2018-10-17 18:11:24 +0000 |
commit | f8a48e10b01db051cd3216f36e688a37c5089093 (patch) | |
tree | 2d44d9fd085ff41961f667bbaa075055a2a854ec /spake2/tests/mod.rs | |
parent | 7f063672fe3c59875c9dfce938b85147f3aef5a5 (diff) | |
download | PAKEs-f8a48e10b01db051cd3216f36e688a37c5089093.tar.xz |
spake2 code reorganization (#6)
Diffstat (limited to 'spake2/tests/mod.rs')
-rw-r--r-- | spake2/tests/mod.rs | 86 |
1 files changed, 86 insertions, 0 deletions
diff --git a/spake2/tests/mod.rs b/spake2/tests/mod.rs new file mode 100644 index 0000000..e85a9b6 --- /dev/null +++ b/spake2/tests/mod.rs @@ -0,0 +1,86 @@ +extern crate spake2; + +use spake2::{Ed25519Group, ErrorType, Identity, Password, SPAKEErr, SPAKE2}; + +#[test] +fn test_basic() { + let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a( + &Password::new(b"password"), + &Identity::new(b"idA"), + &Identity::new(b"idB"), + ); + let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b( + &Password::new(b"password"), + &Identity::new(b"idA"), + &Identity::new(b"idB"), + ); + let key1 = s1.finish(msg2.as_slice()).unwrap(); + let key2 = s2.finish(msg1.as_slice()).unwrap(); + assert_eq!(key1, key2); +} + +#[test] +fn test_mismatch() { + let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a( + &Password::new(b"password"), + &Identity::new(b"idA"), + &Identity::new(b"idB"), + ); + let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b( + &Password::new(b"password2"), + &Identity::new(b"idA"), + &Identity::new(b"idB"), + ); + let key1 = s1.finish(msg2.as_slice()).unwrap(); + let key2 = s2.finish(msg1.as_slice()).unwrap(); + assert_ne!(key1, key2); +} + +#[test] +fn test_reflected_message() { + let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a( + &Password::new(b"password"), + &Identity::new(b"idA"), + &Identity::new(b"idB"), + ); + let r = s1.finish(msg1.as_slice()); + assert_eq!( + r.unwrap_err(), + SPAKEErr { + kind: ErrorType::BadSide, + } + ); +} + +#[test] +fn test_bad_length() { + let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a( + &Password::new(b"password"), + &Identity::new(b"idA"), + &Identity::new(b"idB"), + ); + let mut msg2 = Vec::<u8>::with_capacity(msg1.len() + 1); + msg2.resize(msg1.len() + 1, 0u8); + let r = s1.finish(&msg2); + assert_eq!( + r.unwrap_err(), + SPAKEErr { + kind: ErrorType::WrongLength, + } + ); +} + +#[test] +fn test_basic_symmetric() { + let (s1, msg1) = SPAKE2::<Ed25519Group>::start_symmetric( + &Password::new(b"password"), + &Identity::new(b"idS"), + ); + let (s2, msg2) = SPAKE2::<Ed25519Group>::start_symmetric( + &Password::new(b"password"), + &Identity::new(b"idS"), + ); + let key1 = s1.finish(msg2.as_slice()).unwrap(); + let key2 = s2.finish(msg1.as_slice()).unwrap(); + assert_eq!(key1, key2); +} |