| Index: crypto/curve25519_unittest.cc
|
| ===================================================================
|
| --- crypto/curve25519_unittest.cc (revision 0)
|
| +++ crypto/curve25519_unittest.cc (revision 0)
|
| @@ -0,0 +1,77 @@
|
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "crypto/curve25519.h"
|
| +
|
| +#include <string>
|
| +
|
| +#include "crypto/random.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +namespace crypto {
|
| +
|
| +// Test that the basic shared key exchange identity holds: that both parties end
|
| +// up with the same shared key. This test starts with a fixed private key for
|
| +// two parties: alice and bob. Runs ScalarBaseMult and ScalarMult to compute
|
| +// public key and shared key for alice and bob. It asserts that alice and bob
|
| +// have the same shared key.
|
| +//
|
| +// It feeds the answers from ScalarBaseMult to modify the private key of alice
|
| +// and bob and then performs the shared key identity test again.
|
| +//
|
| +// It repeats this test 5 times (running it for thousands of iterations takes
|
| +// long time, thus turned it down to 5 times).
|
| +TEST(Curve25519, SharedKeyIdentity) {
|
| + uint8 alice_private_key[curve25519::kScalarBytes] = {3};
|
| + uint8 bob_private_key[curve25519::kScalarBytes] = {5};
|
| +
|
| + for (size_t i = 0; i < 5; i++) {
|
| + SCOPED_TRACE(i);
|
| + // Get a private key for two users - alice and bob.
|
| + curve25519::ConvertToPrivateKey(alice_private_key);
|
| + curve25519::ConvertToPrivateKey(bob_private_key);
|
| +
|
| + // Get public key for alice and bob.
|
| + uint8 alice_public_key[curve25519::kBytes];
|
| + curve25519::ScalarBaseMult(alice_private_key, alice_public_key);
|
| +
|
| + uint8 bob_public_key[curve25519::kBytes];
|
| + curve25519::ScalarBaseMult(bob_private_key, bob_public_key);
|
| +
|
| + // Get the shared key for alice, by using alice's private key and bob's
|
| + // public key.
|
| + uint8 alice_shared_key[curve25519::kBytes];
|
| + curve25519::ScalarMult(alice_private_key, bob_public_key, alice_shared_key);
|
| + std::string alice_shared;
|
| + alice_shared.assign(reinterpret_cast<char*>(alice_shared_key),
|
| + sizeof(alice_shared_key));
|
| +
|
| + // Get the shared key for bob, by using bob's private key and alice's public
|
| + // key.
|
| + uint8 bob_shared_key[curve25519::kBytes];
|
| + curve25519::ScalarMult(bob_private_key, alice_public_key, bob_shared_key);
|
| + std::string bob_shared;
|
| + bob_shared.assign(reinterpret_cast<char*>(bob_shared_key),
|
| + sizeof(bob_shared_key));
|
| +
|
| + // Computed shared key of alice and bob should be the same.
|
| + ASSERT_EQ(alice_shared, bob_shared);
|
| +
|
| + // Changed alice's private key with the answer from bob's public key
|
| + // computed by ScalarBaseMult.
|
| + for (size_t j = 0; j < curve25519::kScalarBytes; ++j) {
|
| + SCOPED_TRACE(j);
|
| + alice_private_key[j] ^= bob_public_key[j];
|
| + }
|
| +
|
| + // Changed bob's private key with the answer from alice's public key
|
| + // computed by ScalarBaseMult.
|
| + for (size_t j = 0; j < curve25519::kScalarBytes; ++j) {
|
| + SCOPED_TRACE(j);
|
| + bob_private_key[j] ^= alice_public_key[j];
|
| + }
|
| + }
|
| +}
|
| +
|
| +} // namespace crypto
|
|
|