diff options
author | Vitaly Buka <vitalybuka@chromium.org> | 2014-12-09 23:54:15 -0800 |
---|---|---|
committer | Vitaly Buka <vitalybuka@chromium.org> | 2014-12-10 07:55:48 +0000 |
commit | bd85b5694eac20c787820edb1e70915e90283a43 (patch) | |
tree | 5d3fad905ec66a2a049cb7a31f190f2e318cf5d9 /crypto/p224_spake_unittest.cc | |
parent | ef3b866e783a1b5f1adf8f812b6ab240a146c300 (diff) | |
download | chromium_src-bd85b5694eac20c787820edb1e70915e90283a43.zip chromium_src-bd85b5694eac20c787820edb1e70915e90283a43.tar.gz chromium_src-bd85b5694eac20c787820edb1e70915e90283a43.tar.bz2 |
Added unittest to make sure future changes in P224EncryptedKeyExchange don't change output.
External implementations already expect this values.
BUG=438470
R=agl@chromium.org, gene@chromium.org
Review URL: https://codereview.chromium.org/789743002
Cr-Commit-Position: refs/heads/master@{#307654}
Diffstat (limited to 'crypto/p224_spake_unittest.cc')
-rw-r--r-- | crypto/p224_spake_unittest.cc | 44 |
1 files changed, 43 insertions, 1 deletions
diff --git a/crypto/p224_spake_unittest.cc b/crypto/p224_spake_unittest.cc index 6651c8d..6dd8e88 100644 --- a/crypto/p224_spake_unittest.cc +++ b/crypto/p224_spake_unittest.cc @@ -2,16 +2,22 @@ // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. +#include "crypto/p224_spake.h" + #include <string> -#include <crypto/p224_spake.h> #include "base/logging.h" +#include "base/strings/string_number_conversions.h" #include "testing/gtest/include/gtest/gtest.h" namespace crypto { namespace { +std::string HexEncodeString(const std::string& binary_data) { + return base::HexEncode(binary_data.c_str(), binary_data.size()); +} + bool RunExchange(P224EncryptedKeyExchange* client, P224EncryptedKeyExchange* server, bool is_password_same) { @@ -71,6 +77,42 @@ TEST(MutualAuth, IncorrectPassword) { EXPECT_FALSE(RunExchange(&client, &server, false)); } +TEST(MutualAuth, ExpectedValues) { + P224EncryptedKeyExchange client(P224EncryptedKeyExchange::kPeerTypeClient, + kPassword); + client.SetXForTesting("Client x"); + P224EncryptedKeyExchange server(P224EncryptedKeyExchange::kPeerTypeServer, + kPassword); + server.SetXForTesting("Server x"); + + std::string client_message = client.GetMessage(); + EXPECT_EQ( + "3508EF7DECC8AB9F9C439FBB0154288BBECC0A82E8448F4CF29554EB" + "BE9D486686226255EAD1D077C635B1A41F46AC91D7F7F32CED9EC3E0", + HexEncodeString(client_message)); + + std::string server_message = server.GetMessage(); + EXPECT_EQ( + "A3088C18B75D2C2B107105661AEC85424777475EB29F1DDFB8C14AFB" + "F1603D0DF38413A00F420ACF2059E7997C935F5A957A193D09A2B584", + HexEncodeString(server_message)); + + EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, + client.ProcessMessage(server_message)); + EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, + server.ProcessMessage(client_message)); + + EXPECT_EQ(client.GetUnverifiedKey(), server.GetUnverifiedKey()); + // Must stay the same. External implementations should be able to pair with. + EXPECT_EQ( + "CE7CCFC435CDA4F01EC8826788B1F8B82EF7D550A34696B371096E64" + "C487D4FE193F7D1A6FF6820BC7F807796BA3889E8F999BBDEFC32FFA", + HexEncodeString(server.GetUnverifiedKey())); + + EXPECT_TRUE(RunExchange(&client, &server, true)); + EXPECT_EQ(client.GetKey(), server.GetKey()); +} + TEST(MutualAuth, Fuzz) { static const unsigned kIterations = 40; |