1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
extern crate curve25519_dalek;
extern crate hkdf;
extern crate num_bigint;
extern crate rand;
extern crate sha2;
mod spake2;
pub use spake2::*;
#[cfg(test)]
extern crate hex;
#[cfg(test)]
mod tests {
use spake2::{Ed25519Group, ErrorType, SPAKE2, SPAKEErr};
#[test]
fn test_basic() {
let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(b"password", b"idA", b"idB");
let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b(b"password", b"idA", b"idB");
let key1 = s1.finish(msg2.as_slice()).unwrap();
let key2 = s2.finish(msg1.as_slice()).unwrap();
assert_eq!(key1, key2);
}
#[test]
fn test_mismatch() {
let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(b"password", b"idA", b"idB");
let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b(b"password2", b"idA", b"idB");
let key1 = s1.finish(msg2.as_slice()).unwrap();
let key2 = s2.finish(msg1.as_slice()).unwrap();
assert_ne!(key1, key2);
}
#[test]
fn test_reflected_message() {
let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(b"password", b"idA", b"idB");
let r = s1.finish(msg1.as_slice());
assert_eq!(
r.unwrap_err(),
SPAKEErr {
kind: ErrorType::BadSide,
}
);
}
#[test]
fn test_bad_length() {
let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(b"password", b"idA", b"idB");
let mut msg2 = Vec::<u8>::with_capacity(msg1.len() + 1);
msg2.resize(msg1.len() + 1, 0u8);
let r = s1.finish(&msg2);
assert_eq!(
r.unwrap_err(),
SPAKEErr {
kind: ErrorType::WrongLength,
}
);
}
#[test]
fn test_basic_symmetric() {
let (s1, msg1) = SPAKE2::<Ed25519Group>::start_symmetric(b"password", b"idS");
let (s2, msg2) = SPAKE2::<Ed25519Group>::start_symmetric(b"password", b"idS");
let key1 = s1.finish(msg2.as_slice()).unwrap();
let key2 = s2.finish(msg1.as_slice()).unwrap();
assert_eq!(key1, key2);
}
#[test]
fn it_works() {}
#[test]
#[should_panic(expected = "nope")]
fn it_panics() {
assert!(false, "nope");
}
}