OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <string> | 5 #include <string> |
6 #include <crypto/p224_spake.h> | 6 #include <crypto/p224_spake.h> |
7 | 7 |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "testing/gtest/include/gtest/gtest.h" | 9 #include "testing/gtest/include/gtest/gtest.h" |
10 | 10 |
11 namespace crypto { | 11 namespace crypto { |
12 | 12 |
13 namespace { | 13 namespace { |
14 | 14 |
15 bool RunExchange(P224EncryptedKeyExchange* client, | 15 bool RunExchange(P224EncryptedKeyExchange* client, |
16 P224EncryptedKeyExchange* server) { | 16 P224EncryptedKeyExchange* server, |
| 17 bool is_password_same) { |
17 for (;;) { | 18 for (;;) { |
18 std::string client_message, server_message; | 19 std::string client_message, server_message; |
19 client_message = client->GetMessage(); | 20 client_message = client->GetMessage(); |
20 server_message = server->GetMessage(); | 21 server_message = server->GetMessage(); |
21 | 22 |
22 P224EncryptedKeyExchange::Result client_result, server_result; | 23 P224EncryptedKeyExchange::Result client_result, server_result; |
23 client_result = client->ProcessMessage(server_message); | 24 client_result = client->ProcessMessage(server_message); |
24 server_result = server->ProcessMessage(client_message); | 25 server_result = server->ProcessMessage(client_message); |
25 | 26 |
26 // Check that we never hit the case where only one succeeds. | 27 // Check that we never hit the case where only one succeeds. |
27 if ((client_result == P224EncryptedKeyExchange::kResultSuccess) ^ | 28 EXPECT_EQ(client_result == P224EncryptedKeyExchange::kResultSuccess, |
28 (server_result == P224EncryptedKeyExchange::kResultSuccess)) { | 29 server_result == P224EncryptedKeyExchange::kResultSuccess); |
29 CHECK(false) << "Parties differ on whether authentication was successful"; | |
30 } | |
31 | 30 |
32 if (client_result == P224EncryptedKeyExchange::kResultFailed || | 31 if (client_result == P224EncryptedKeyExchange::kResultFailed || |
33 server_result == P224EncryptedKeyExchange::kResultFailed) { | 32 server_result == P224EncryptedKeyExchange::kResultFailed) { |
34 return false; | 33 return false; |
35 } | 34 } |
36 | 35 |
| 36 EXPECT_EQ(is_password_same, |
| 37 client->GetUnverifiedKey() == server->GetUnverifiedKey()); |
| 38 |
37 if (client_result == P224EncryptedKeyExchange::kResultSuccess && | 39 if (client_result == P224EncryptedKeyExchange::kResultSuccess && |
38 server_result == P224EncryptedKeyExchange::kResultSuccess) { | 40 server_result == P224EncryptedKeyExchange::kResultSuccess) { |
39 return true; | 41 return true; |
40 } | 42 } |
41 | 43 |
42 CHECK_EQ(P224EncryptedKeyExchange::kResultPending, client_result); | 44 EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, client_result); |
43 CHECK_EQ(P224EncryptedKeyExchange::kResultPending, server_result); | 45 EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, server_result); |
44 } | 46 } |
45 } | 47 } |
46 | 48 |
47 const char kPassword[] = "foo"; | 49 const char kPassword[] = "foo"; |
48 | 50 |
49 } // namespace | 51 } // namespace |
50 | 52 |
51 TEST(MutualAuth, CorrectAuth) { | 53 TEST(MutualAuth, CorrectAuth) { |
52 P224EncryptedKeyExchange client( | 54 P224EncryptedKeyExchange client( |
53 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); | 55 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); |
54 P224EncryptedKeyExchange server( | 56 P224EncryptedKeyExchange server( |
55 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); | 57 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); |
56 | 58 |
57 EXPECT_TRUE(RunExchange(&client, &server)); | 59 EXPECT_TRUE(RunExchange(&client, &server, true)); |
58 EXPECT_EQ(client.GetKey(), server.GetKey()); | 60 EXPECT_EQ(client.GetKey(), server.GetKey()); |
59 } | 61 } |
60 | 62 |
61 TEST(MutualAuth, IncorrectPassword) { | 63 TEST(MutualAuth, IncorrectPassword) { |
62 P224EncryptedKeyExchange client( | 64 P224EncryptedKeyExchange client( |
63 P224EncryptedKeyExchange::kPeerTypeClient, | 65 P224EncryptedKeyExchange::kPeerTypeClient, |
64 kPassword); | 66 kPassword); |
65 P224EncryptedKeyExchange server( | 67 P224EncryptedKeyExchange server( |
66 P224EncryptedKeyExchange::kPeerTypeServer, | 68 P224EncryptedKeyExchange::kPeerTypeServer, |
67 "wrongpassword"); | 69 "wrongpassword"); |
68 | 70 |
69 EXPECT_FALSE(RunExchange(&client, &server)); | 71 EXPECT_FALSE(RunExchange(&client, &server, false)); |
70 } | 72 } |
71 | 73 |
72 TEST(MutualAuth, Fuzz) { | 74 TEST(MutualAuth, Fuzz) { |
73 static const unsigned kIterations = 40; | 75 static const unsigned kIterations = 40; |
74 | 76 |
75 for (unsigned i = 0; i < kIterations; i++) { | 77 for (unsigned i = 0; i < kIterations; i++) { |
76 P224EncryptedKeyExchange client( | 78 P224EncryptedKeyExchange client( |
77 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); | 79 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); |
78 P224EncryptedKeyExchange server( | 80 P224EncryptedKeyExchange server( |
79 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); | 81 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); |
(...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
121 | 123 |
122 ASSERT_EQ(P224EncryptedKeyExchange::kResultPending, | 124 ASSERT_EQ(P224EncryptedKeyExchange::kResultPending, |
123 client_result); | 125 client_result); |
124 ASSERT_EQ(P224EncryptedKeyExchange::kResultPending, | 126 ASSERT_EQ(P224EncryptedKeyExchange::kResultPending, |
125 server_result); | 127 server_result); |
126 } | 128 } |
127 } | 129 } |
128 } | 130 } |
129 | 131 |
130 } // namespace crypto | 132 } // namespace crypto |
OLD | NEW |