summaryrefslogtreecommitdiffstats
path: root/crypto/p224_spake_unittest.cc
diff options
context:
space:
mode:
authorVitaly Buka <vitalybuka@chromium.org>2014-12-09 23:54:15 -0800
committerVitaly Buka <vitalybuka@chromium.org>2014-12-10 07:55:48 +0000
commitbd85b5694eac20c787820edb1e70915e90283a43 (patch)
tree5d3fad905ec66a2a049cb7a31f190f2e318cf5d9 /crypto/p224_spake_unittest.cc
parentef3b866e783a1b5f1adf8f812b6ab240a146c300 (diff)
downloadchromium_src-bd85b5694eac20c787820edb1e70915e90283a43.zip
chromium_src-bd85b5694eac20c787820edb1e70915e90283a43.tar.gz
chromium_src-bd85b5694eac20c787820edb1e70915e90283a43.tar.bz2
Added unittest to make sure future changes in P224EncryptedKeyExchange don't change output.
External implementations already expect this values. BUG=438470 R=agl@chromium.org, gene@chromium.org Review URL: https://codereview.chromium.org/789743002 Cr-Commit-Position: refs/heads/master@{#307654}
Diffstat (limited to 'crypto/p224_spake_unittest.cc')
-rw-r--r--crypto/p224_spake_unittest.cc44
1 files changed, 43 insertions, 1 deletions
diff --git a/crypto/p224_spake_unittest.cc b/crypto/p224_spake_unittest.cc
index 6651c8d..6dd8e88 100644
--- a/crypto/p224_spake_unittest.cc
+++ b/crypto/p224_spake_unittest.cc
@@ -2,16 +2,22 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
+#include "crypto/p224_spake.h"
+
#include <string>
-#include <crypto/p224_spake.h>
#include "base/logging.h"
+#include "base/strings/string_number_conversions.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace crypto {
namespace {
+std::string HexEncodeString(const std::string& binary_data) {
+ return base::HexEncode(binary_data.c_str(), binary_data.size());
+}
+
bool RunExchange(P224EncryptedKeyExchange* client,
P224EncryptedKeyExchange* server,
bool is_password_same) {
@@ -71,6 +77,42 @@ TEST(MutualAuth, IncorrectPassword) {
EXPECT_FALSE(RunExchange(&client, &server, false));
}
+TEST(MutualAuth, ExpectedValues) {
+ P224EncryptedKeyExchange client(P224EncryptedKeyExchange::kPeerTypeClient,
+ kPassword);
+ client.SetXForTesting("Client x");
+ P224EncryptedKeyExchange server(P224EncryptedKeyExchange::kPeerTypeServer,
+ kPassword);
+ server.SetXForTesting("Server x");
+
+ std::string client_message = client.GetMessage();
+ EXPECT_EQ(
+ "3508EF7DECC8AB9F9C439FBB0154288BBECC0A82E8448F4CF29554EB"
+ "BE9D486686226255EAD1D077C635B1A41F46AC91D7F7F32CED9EC3E0",
+ HexEncodeString(client_message));
+
+ std::string server_message = server.GetMessage();
+ EXPECT_EQ(
+ "A3088C18B75D2C2B107105661AEC85424777475EB29F1DDFB8C14AFB"
+ "F1603D0DF38413A00F420ACF2059E7997C935F5A957A193D09A2B584",
+ HexEncodeString(server_message));
+
+ EXPECT_EQ(P224EncryptedKeyExchange::kResultPending,
+ client.ProcessMessage(server_message));
+ EXPECT_EQ(P224EncryptedKeyExchange::kResultPending,
+ server.ProcessMessage(client_message));
+
+ EXPECT_EQ(client.GetUnverifiedKey(), server.GetUnverifiedKey());
+ // Must stay the same. External implementations should be able to pair with.
+ EXPECT_EQ(
+ "CE7CCFC435CDA4F01EC8826788B1F8B82EF7D550A34696B371096E64"
+ "C487D4FE193F7D1A6FF6820BC7F807796BA3889E8F999BBDEFC32FFA",
+ HexEncodeString(server.GetUnverifiedKey()));
+
+ EXPECT_TRUE(RunExchange(&client, &server, true));
+ EXPECT_EQ(client.GetKey(), server.GetKey());
+}
+
TEST(MutualAuth, Fuzz) {
static const unsigned kIterations = 40;