aboutsummaryrefslogtreecommitdiff
path: root/src/lib.rs
blob: c2858ba5b155ab902a71c73ffafc239eeba6e2cd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
#![forbid(unsafe_code)]
#![cfg_attr(test, deny(warnings))]

extern crate curve25519_dalek;
extern crate hex;
extern crate hkdf;
extern crate num_bigint;
extern crate rand;
extern crate sha2;

mod spake2;
pub use spake2::*;

#[cfg(test)]
mod tests {
    use spake2::{Ed25519Group, ErrorType, Identity, Password, SPAKE2, SPAKEErr};

    #[test]
    fn test_basic() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(
            &Password::new(b"password"),
            &Identity::new(b"idA"),
            &Identity::new(b"idB"),
        );
        let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b(
            &Password::new(b"password"),
            &Identity::new(b"idA"),
            &Identity::new(b"idB"),
        );
        let key1 = s1.finish(msg2.as_slice()).unwrap();
        let key2 = s2.finish(msg1.as_slice()).unwrap();
        assert_eq!(key1, key2);
    }

    #[test]
    fn test_mismatch() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(
            &Password::new(b"password"),
            &Identity::new(b"idA"),
            &Identity::new(b"idB"),
        );
        let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b(
            &Password::new(b"password2"),
            &Identity::new(b"idA"),
            &Identity::new(b"idB"),
        );
        let key1 = s1.finish(msg2.as_slice()).unwrap();
        let key2 = s2.finish(msg1.as_slice()).unwrap();
        assert_ne!(key1, key2);
    }

    #[test]
    fn test_reflected_message() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(
            &Password::new(b"password"),
            &Identity::new(b"idA"),
            &Identity::new(b"idB"),
        );
        let r = s1.finish(msg1.as_slice());
        assert_eq!(
            r.unwrap_err(),
            SPAKEErr {
                kind: ErrorType::BadSide,
            }
        );
    }

    #[test]
    fn test_bad_length() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(
            &Password::new(b"password"),
            &Identity::new(b"idA"),
            &Identity::new(b"idB"),
        );
        let mut msg2 = Vec::<u8>::with_capacity(msg1.len() + 1);
        msg2.resize(msg1.len() + 1, 0u8);
        let r = s1.finish(&msg2);
        assert_eq!(
            r.unwrap_err(),
            SPAKEErr {
                kind: ErrorType::WrongLength,
            }
        );
    }

    #[test]
    fn test_basic_symmetric() {
        let (s1, msg1) = SPAKE2::<Ed25519Group>::start_symmetric(
            &Password::new(b"password"),
            &Identity::new(b"idS"),
        );
        let (s2, msg2) = SPAKE2::<Ed25519Group>::start_symmetric(
            &Password::new(b"password"),
            &Identity::new(b"idS"),
        );
        let key1 = s1.finish(msg2.as_slice()).unwrap();
        let key2 = s2.finish(msg1.as_slice()).unwrap();
        assert_eq!(key1, key2);
    }

    #[test]
    fn it_works() {}

    #[test]
    #[should_panic(expected = "nope")]
    fn it_panics() {
        assert!(false, "nope");
    }
}