blob: e1220c479c11bbbb438ba644a45b2521d9cdd137 [file] [log] [blame]
[email protected]d9a262d2011-11-22 01:29:371// Copyright (c) 2011 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Vitaly Bukabd85b562014-12-10 07:54:155#include "crypto/p224_spake.h"
6
avidd373b8b2015-12-21 21:34:437#include <stddef.h>
8#include <stdint.h>
9
[email protected]c9c251d2014-07-22 00:09:2510#include <string>
[email protected]d9a262d2011-11-22 01:29:3711
Vitaly Bukabd85b562014-12-10 07:54:1512#include "base/strings/string_number_conversions.h"
[email protected]d9a262d2011-11-22 01:29:3713#include "testing/gtest/include/gtest/gtest.h"
14
[email protected]3c6cf57f2012-11-03 00:48:1715namespace crypto {
16
17namespace {
[email protected]d9a262d2011-11-22 01:29:3718
Vitaly Bukabd85b562014-12-10 07:54:1519std::string HexEncodeString(const std::string& binary_data) {
20 return base::HexEncode(binary_data.c_str(), binary_data.size());
21}
22
[email protected]d9a262d2011-11-22 01:29:3723bool RunExchange(P224EncryptedKeyExchange* client,
Vitaly Bukafb2ccf62014-12-04 17:15:2024 P224EncryptedKeyExchange* server,
25 bool is_password_same) {
[email protected]d9a262d2011-11-22 01:29:3726 for (;;) {
27 std::string client_message, server_message;
vitalybukad1203602015-01-29 20:49:4928 client_message = client->GetNextMessage();
29 server_message = server->GetNextMessage();
[email protected]d9a262d2011-11-22 01:29:3730
31 P224EncryptedKeyExchange::Result client_result, server_result;
32 client_result = client->ProcessMessage(server_message);
33 server_result = server->ProcessMessage(client_message);
34
35 // Check that we never hit the case where only one succeeds.
Vitaly Bukafb2ccf62014-12-04 17:15:2036 EXPECT_EQ(client_result == P224EncryptedKeyExchange::kResultSuccess,
37 server_result == P224EncryptedKeyExchange::kResultSuccess);
[email protected]d9a262d2011-11-22 01:29:3738
39 if (client_result == P224EncryptedKeyExchange::kResultFailed ||
40 server_result == P224EncryptedKeyExchange::kResultFailed) {
41 return false;
42 }
43
Vitaly Bukafb2ccf62014-12-04 17:15:2044 EXPECT_EQ(is_password_same,
45 client->GetUnverifiedKey() == server->GetUnverifiedKey());
46
[email protected]d9a262d2011-11-22 01:29:3747 if (client_result == P224EncryptedKeyExchange::kResultSuccess &&
48 server_result == P224EncryptedKeyExchange::kResultSuccess) {
49 return true;
50 }
51
Vitaly Bukafb2ccf62014-12-04 17:15:2052 EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, client_result);
53 EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, server_result);
[email protected]d9a262d2011-11-22 01:29:3754 }
55}
56
[email protected]3c6cf57f2012-11-03 00:48:1757const char kPassword[] = "foo";
58
59} // namespace
[email protected]d9a262d2011-11-22 01:29:3760
61TEST(MutualAuth, CorrectAuth) {
62 P224EncryptedKeyExchange client(
[email protected]78df46a2011-12-13 07:00:1963 P224EncryptedKeyExchange::kPeerTypeClient, kPassword);
[email protected]d9a262d2011-11-22 01:29:3764 P224EncryptedKeyExchange server(
[email protected]78df46a2011-12-13 07:00:1965 P224EncryptedKeyExchange::kPeerTypeServer, kPassword);
[email protected]d9a262d2011-11-22 01:29:3766
Vitaly Bukafb2ccf62014-12-04 17:15:2067 EXPECT_TRUE(RunExchange(&client, &server, true));
[email protected]78df46a2011-12-13 07:00:1968 EXPECT_EQ(client.GetKey(), server.GetKey());
[email protected]d9a262d2011-11-22 01:29:3769}
70
71TEST(MutualAuth, IncorrectPassword) {
72 P224EncryptedKeyExchange client(
73 P224EncryptedKeyExchange::kPeerTypeClient,
[email protected]78df46a2011-12-13 07:00:1974 kPassword);
[email protected]d9a262d2011-11-22 01:29:3775 P224EncryptedKeyExchange server(
76 P224EncryptedKeyExchange::kPeerTypeServer,
[email protected]78df46a2011-12-13 07:00:1977 "wrongpassword");
[email protected]d9a262d2011-11-22 01:29:3778
Vitaly Bukafb2ccf62014-12-04 17:15:2079 EXPECT_FALSE(RunExchange(&client, &server, false));
[email protected]d9a262d2011-11-22 01:29:3780}
81
Vitaly Bukabd85b562014-12-10 07:54:1582TEST(MutualAuth, ExpectedValues) {
83 P224EncryptedKeyExchange client(P224EncryptedKeyExchange::kPeerTypeClient,
84 kPassword);
85 client.SetXForTesting("Client x");
86 P224EncryptedKeyExchange server(P224EncryptedKeyExchange::kPeerTypeServer,
87 kPassword);
88 server.SetXForTesting("Server x");
89
vitalybukad1203602015-01-29 20:49:4990 std::string client_message = client.GetNextMessage();
Vitaly Bukabd85b562014-12-10 07:54:1591 EXPECT_EQ(
92 "3508EF7DECC8AB9F9C439FBB0154288BBECC0A82E8448F4CF29554EB"
93 "BE9D486686226255EAD1D077C635B1A41F46AC91D7F7F32CED9EC3E0",
94 HexEncodeString(client_message));
95
vitalybukad1203602015-01-29 20:49:4996 std::string server_message = server.GetNextMessage();
Vitaly Bukabd85b562014-12-10 07:54:1597 EXPECT_EQ(
98 "A3088C18B75D2C2B107105661AEC85424777475EB29F1DDFB8C14AFB"
99 "F1603D0DF38413A00F420ACF2059E7997C935F5A957A193D09A2B584",
100 HexEncodeString(server_message));
101
102 EXPECT_EQ(P224EncryptedKeyExchange::kResultPending,
103 client.ProcessMessage(server_message));
104 EXPECT_EQ(P224EncryptedKeyExchange::kResultPending,
105 server.ProcessMessage(client_message));
106
107 EXPECT_EQ(client.GetUnverifiedKey(), server.GetUnverifiedKey());
108 // Must stay the same. External implementations should be able to pair with.
109 EXPECT_EQ(
110 "CE7CCFC435CDA4F01EC8826788B1F8B82EF7D550A34696B371096E64"
111 "C487D4FE193F7D1A6FF6820BC7F807796BA3889E8F999BBDEFC32FFA",
112 HexEncodeString(server.GetUnverifiedKey()));
113
114 EXPECT_TRUE(RunExchange(&client, &server, true));
115 EXPECT_EQ(client.GetKey(), server.GetKey());
116}
117
[email protected]d9a262d2011-11-22 01:29:37118TEST(MutualAuth, Fuzz) {
119 static const unsigned kIterations = 40;
120
121 for (unsigned i = 0; i < kIterations; i++) {
122 P224EncryptedKeyExchange client(
[email protected]78df46a2011-12-13 07:00:19123 P224EncryptedKeyExchange::kPeerTypeClient, kPassword);
[email protected]d9a262d2011-11-22 01:29:37124 P224EncryptedKeyExchange server(
[email protected]78df46a2011-12-13 07:00:19125 P224EncryptedKeyExchange::kPeerTypeServer, kPassword);
[email protected]d9a262d2011-11-22 01:29:37126
127 // We'll only be testing small values of i, but we don't want that to bias
128 // the test coverage. So we disperse the value of i by multiplying by the
mgiuca6c27f6662016-12-05 01:42:03129 // FNV, 32-bit prime, producing a simplistic PRNG.
avidd373b8b2015-12-21 21:34:43130 const uint32_t rand = i * 16777619;
[email protected]d9a262d2011-11-22 01:29:37131
132 for (unsigned round = 0;; round++) {
133 std::string client_message, server_message;
vitalybukad1203602015-01-29 20:49:49134 client_message = client.GetNextMessage();
135 server_message = server.GetNextMessage();
[email protected]d9a262d2011-11-22 01:29:37136
137 if ((rand & 1) == round) {
138 const bool server_or_client = rand & 2;
139 std::string* m = server_or_client ? &server_message : &client_message;
140 if (rand & 4) {
141 // Truncate
142 *m = m->substr(0, (i >> 3) % m->size());
143 } else {
144 // Corrupt
145 const size_t bits = m->size() * 8;
146 const size_t bit_to_corrupt = (rand >> 3) % bits;
147 const_cast<char*>(m->data())[bit_to_corrupt / 8] ^=
148 1 << (bit_to_corrupt % 8);
149 }
150 }
151
152 P224EncryptedKeyExchange::Result client_result, server_result;
153 client_result = client.ProcessMessage(server_message);
154 server_result = server.ProcessMessage(client_message);
155
156 // If we have corrupted anything, we expect the authentication to fail,
157 // although one side can succeed if we happen to corrupt the second round
158 // message to the other.
159 ASSERT_FALSE(
160 client_result == P224EncryptedKeyExchange::kResultSuccess &&
161 server_result == P224EncryptedKeyExchange::kResultSuccess);
162
163 if (client_result == P224EncryptedKeyExchange::kResultFailed ||
164 server_result == P224EncryptedKeyExchange::kResultFailed) {
165 break;
166 }
167
168 ASSERT_EQ(P224EncryptedKeyExchange::kResultPending,
169 client_result);
170 ASSERT_EQ(P224EncryptedKeyExchange::kResultPending,
171 server_result);
172 }
173 }
174}
[email protected]3c6cf57f2012-11-03 00:48:17175
176} // namespace crypto