diff options
Diffstat (limited to 'srp/tests/mod.rs')
-rw-r--r-- | srp/tests/mod.rs | 61 |
1 files changed, 61 insertions, 0 deletions
diff --git a/srp/tests/mod.rs b/srp/tests/mod.rs new file mode 100644 index 0000000..4389f82 --- /dev/null +++ b/srp/tests/mod.rs @@ -0,0 +1,61 @@ +extern crate num; +extern crate sha2; +extern crate rand; +extern crate srp; + +use sha2::Sha256; +use rand::Rng; + +use srp::groups::G_2048; +use srp::client::{SrpClient, srp_private_key }; +use srp::server::{SrpServer, UserRecord}; + +fn auth_test(reg_pwd: &[u8], auth_pwd: &[u8]) { + let mut rng = rand::os::OsRng::new().unwrap(); + let username = b"alice"; + + // Client instance creation + let a = rng.gen_iter::<u8>().take(64).collect::<Vec<u8>>(); + let client = SrpClient::<Sha256>::new(&a, &G_2048); + + // Registration + let salt: [u8; 16] = rng.gen(); + let reg_priv_key = srp_private_key::<Sha256>(username, reg_pwd, &salt); + let verif = client.get_password_verifier(®_priv_key); + + // User sends handshake + let a_pub = client.get_a_pub(); + + // Server retrieve user record from db and processes handshake + let user = UserRecord { username, salt: &salt, verifier: &verif }; + let b = rng.gen_iter::<u8>().take(64).collect::<Vec<u8>>(); + let server = SrpServer::<Sha256>::new(&user, &a_pub, &b, &G_2048) + .unwrap(); + let (salt, b_pub) = (&user.salt, server.get_b_pub()); + + // Client processes handshake reply + let auth_priv_key = srp_private_key::<Sha256>(username, auth_pwd, salt); + let client2 = client.process_reply(&auth_priv_key, &b_pub).unwrap(); + let proof = client2.get_proof(); + + // Server processes verification data + println!("Client verification"); + let proof2 = server.verify(&proof).unwrap(); + let server_key = server.get_key(); + + // Client verifies server + println!("Server verification"); + let user_key = client2.verify_server(&proof2).unwrap(); + assert_eq!(server_key, user_key, "server and client keys are not equal"); +} + +#[test] +fn good_password() { + auth_test(b"password", b"password"); +} + +#[test] +#[should_panic] +fn bad_password() { + auth_test(b"password", b"paSsword"); +} |