aboutsummaryrefslogtreecommitdiff
path: root/src/lib.rs
blob: 7a7bdbd9df40f6ab1c19ad42ecb317b938de15b5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81

extern crate rand;
extern crate curve25519_dalek;
extern crate sha2;
extern crate hkdf;
extern crate num_bigint;

//extern crate hex;

mod spake2;
pub use spake2::*;

#[cfg(test)]
extern crate hex;

#[cfg(test)]
mod tests {
    use spake2::{SPAKE2, SPAKEErr, Ed25519Group, ErrorType};

    #[test]
    fn test_basic() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(b"password",
                                                         b"idA", b"idB");
        let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b(b"password",
                                                         b"idA", b"idB");
        let key1 = s1.finish(msg2.as_slice()).unwrap();
        let key2 = s2.finish(msg1.as_slice()).unwrap();
        assert_eq!(key1, key2);
    }

    #[test]
    fn test_mismatch() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(b"password",
                                                         b"idA", b"idB");
        let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b(b"password2",
                                                         b"idA", b"idB");
        let key1 = s1.finish(msg2.as_slice()).unwrap();
        let key2 = s2.finish(msg1.as_slice()).unwrap();
        assert_ne!(key1, key2);
    }

    #[test]
    fn test_reflected_message() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(b"password",
                                                         b"idA", b"idB");
        let r = s1.finish(msg1.as_slice());
        assert_eq!(r.unwrap_err(), SPAKEErr{kind: ErrorType::BadSide});
    }

    #[test]
    fn test_bad_length() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(b"password",
                                                      b"idA", b"idB");
        let mut msg2 = Vec::<u8>::with_capacity(msg1.len()+1);
        msg2.resize(msg1.len()+1, 0u8);
        let r = s1.finish(&msg2);
        assert_eq!(r.unwrap_err(), SPAKEErr{kind: ErrorType::WrongLength});
    }

    #[test]
    fn test_basic_symmetric() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_symmetric(b"password",
                                                                 b"idS");
        let (s2, msg2) = SPAKE2::<Ed25519Group>::start_symmetric(b"password",
                                                                 b"idS");
        let key1 = s1.finish(msg2.as_slice()).unwrap();
        let key2 = s2.finish(msg1.as_slice()).unwrap();
        assert_eq!(key1, key2);
    }


    #[test]
    fn it_works() {
    }

    #[test]
    #[should_panic(expected = "nope")]
    fn it_panics() {
        assert!(false, "nope");
    }
}