1*6777b538SAndroid Build Coastguard Worker // Copyright 2011 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker
5*6777b538SAndroid Build Coastguard Worker #include "crypto/p224_spake.h"
6*6777b538SAndroid Build Coastguard Worker
7*6777b538SAndroid Build Coastguard Worker #include <stddef.h>
8*6777b538SAndroid Build Coastguard Worker #include <stdint.h>
9*6777b538SAndroid Build Coastguard Worker
10*6777b538SAndroid Build Coastguard Worker #include <string>
11*6777b538SAndroid Build Coastguard Worker
12*6777b538SAndroid Build Coastguard Worker #include "base/strings/string_number_conversions.h"
13*6777b538SAndroid Build Coastguard Worker #include "testing/gtest/include/gtest/gtest.h"
14*6777b538SAndroid Build Coastguard Worker
15*6777b538SAndroid Build Coastguard Worker namespace crypto {
16*6777b538SAndroid Build Coastguard Worker
17*6777b538SAndroid Build Coastguard Worker namespace {
18*6777b538SAndroid Build Coastguard Worker
RunExchange(P224EncryptedKeyExchange * client,P224EncryptedKeyExchange * server,bool is_password_same)19*6777b538SAndroid Build Coastguard Worker bool RunExchange(P224EncryptedKeyExchange* client,
20*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange* server,
21*6777b538SAndroid Build Coastguard Worker bool is_password_same) {
22*6777b538SAndroid Build Coastguard Worker for (;;) {
23*6777b538SAndroid Build Coastguard Worker std::string client_message, server_message;
24*6777b538SAndroid Build Coastguard Worker client_message = client->GetNextMessage();
25*6777b538SAndroid Build Coastguard Worker server_message = server->GetNextMessage();
26*6777b538SAndroid Build Coastguard Worker
27*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange::Result client_result, server_result;
28*6777b538SAndroid Build Coastguard Worker client_result = client->ProcessMessage(server_message);
29*6777b538SAndroid Build Coastguard Worker server_result = server->ProcessMessage(client_message);
30*6777b538SAndroid Build Coastguard Worker
31*6777b538SAndroid Build Coastguard Worker // Check that we never hit the case where only one succeeds.
32*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(client_result == P224EncryptedKeyExchange::kResultSuccess,
33*6777b538SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultSuccess);
34*6777b538SAndroid Build Coastguard Worker
35*6777b538SAndroid Build Coastguard Worker if (client_result == P224EncryptedKeyExchange::kResultFailed ||
36*6777b538SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultFailed) {
37*6777b538SAndroid Build Coastguard Worker return false;
38*6777b538SAndroid Build Coastguard Worker }
39*6777b538SAndroid Build Coastguard Worker
40*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(is_password_same,
41*6777b538SAndroid Build Coastguard Worker client->GetUnverifiedKey() == server->GetUnverifiedKey());
42*6777b538SAndroid Build Coastguard Worker
43*6777b538SAndroid Build Coastguard Worker if (client_result == P224EncryptedKeyExchange::kResultSuccess &&
44*6777b538SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultSuccess) {
45*6777b538SAndroid Build Coastguard Worker return true;
46*6777b538SAndroid Build Coastguard Worker }
47*6777b538SAndroid Build Coastguard Worker
48*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, client_result);
49*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, server_result);
50*6777b538SAndroid Build Coastguard Worker }
51*6777b538SAndroid Build Coastguard Worker }
52*6777b538SAndroid Build Coastguard Worker
53*6777b538SAndroid Build Coastguard Worker const char kPassword[] = "foo";
54*6777b538SAndroid Build Coastguard Worker
55*6777b538SAndroid Build Coastguard Worker } // namespace
56*6777b538SAndroid Build Coastguard Worker
TEST(MutualAuth,CorrectAuth)57*6777b538SAndroid Build Coastguard Worker TEST(MutualAuth, CorrectAuth) {
58*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange client(
59*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeClient, kPassword);
60*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange server(
61*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeServer, kPassword);
62*6777b538SAndroid Build Coastguard Worker
63*6777b538SAndroid Build Coastguard Worker EXPECT_TRUE(RunExchange(&client, &server, true));
64*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(client.GetKey(), server.GetKey());
65*6777b538SAndroid Build Coastguard Worker }
66*6777b538SAndroid Build Coastguard Worker
TEST(MutualAuth,IncorrectPassword)67*6777b538SAndroid Build Coastguard Worker TEST(MutualAuth, IncorrectPassword) {
68*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange client(
69*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeClient,
70*6777b538SAndroid Build Coastguard Worker kPassword);
71*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange server(
72*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeServer,
73*6777b538SAndroid Build Coastguard Worker "wrongpassword");
74*6777b538SAndroid Build Coastguard Worker
75*6777b538SAndroid Build Coastguard Worker EXPECT_FALSE(RunExchange(&client, &server, false));
76*6777b538SAndroid Build Coastguard Worker }
77*6777b538SAndroid Build Coastguard Worker
TEST(MutualAuth,ExpectedValues)78*6777b538SAndroid Build Coastguard Worker TEST(MutualAuth, ExpectedValues) {
79*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange client(P224EncryptedKeyExchange::kPeerTypeClient,
80*6777b538SAndroid Build Coastguard Worker kPassword);
81*6777b538SAndroid Build Coastguard Worker client.SetXForTesting("Client x");
82*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange server(P224EncryptedKeyExchange::kPeerTypeServer,
83*6777b538SAndroid Build Coastguard Worker kPassword);
84*6777b538SAndroid Build Coastguard Worker server.SetXForTesting("Server x");
85*6777b538SAndroid Build Coastguard Worker
86*6777b538SAndroid Build Coastguard Worker std::string client_message = client.GetNextMessage();
87*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(
88*6777b538SAndroid Build Coastguard Worker "3508EF7DECC8AB9F9C439FBB0154288BBECC0A82E8448F4CF29554EB"
89*6777b538SAndroid Build Coastguard Worker "BE9D486686226255EAD1D077C635B1A41F46AC91D7F7F32CED9EC3E0",
90*6777b538SAndroid Build Coastguard Worker base::HexEncode(client_message));
91*6777b538SAndroid Build Coastguard Worker
92*6777b538SAndroid Build Coastguard Worker std::string server_message = server.GetNextMessage();
93*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(
94*6777b538SAndroid Build Coastguard Worker "A3088C18B75D2C2B107105661AEC85424777475EB29F1DDFB8C14AFB"
95*6777b538SAndroid Build Coastguard Worker "F1603D0DF38413A00F420ACF2059E7997C935F5A957A193D09A2B584",
96*6777b538SAndroid Build Coastguard Worker base::HexEncode(server_message));
97*6777b538SAndroid Build Coastguard Worker
98*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(P224EncryptedKeyExchange::kResultPending,
99*6777b538SAndroid Build Coastguard Worker client.ProcessMessage(server_message));
100*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(P224EncryptedKeyExchange::kResultPending,
101*6777b538SAndroid Build Coastguard Worker server.ProcessMessage(client_message));
102*6777b538SAndroid Build Coastguard Worker
103*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(client.GetUnverifiedKey(), server.GetUnverifiedKey());
104*6777b538SAndroid Build Coastguard Worker // Must stay the same. External implementations should be able to pair with.
105*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(
106*6777b538SAndroid Build Coastguard Worker "CE7CCFC435CDA4F01EC8826788B1F8B82EF7D550A34696B371096E64"
107*6777b538SAndroid Build Coastguard Worker "C487D4FE193F7D1A6FF6820BC7F807796BA3889E8F999BBDEFC32FFA",
108*6777b538SAndroid Build Coastguard Worker base::HexEncode(server.GetUnverifiedKey()));
109*6777b538SAndroid Build Coastguard Worker
110*6777b538SAndroid Build Coastguard Worker EXPECT_TRUE(RunExchange(&client, &server, true));
111*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(client.GetKey(), server.GetKey());
112*6777b538SAndroid Build Coastguard Worker }
113*6777b538SAndroid Build Coastguard Worker
TEST(MutualAuth,Fuzz)114*6777b538SAndroid Build Coastguard Worker TEST(MutualAuth, Fuzz) {
115*6777b538SAndroid Build Coastguard Worker static const unsigned kIterations = 40;
116*6777b538SAndroid Build Coastguard Worker
117*6777b538SAndroid Build Coastguard Worker for (unsigned i = 0; i < kIterations; i++) {
118*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange client(
119*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeClient, kPassword);
120*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange server(
121*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeServer, kPassword);
122*6777b538SAndroid Build Coastguard Worker
123*6777b538SAndroid Build Coastguard Worker // We'll only be testing small values of i, but we don't want that to bias
124*6777b538SAndroid Build Coastguard Worker // the test coverage. So we disperse the value of i by multiplying by the
125*6777b538SAndroid Build Coastguard Worker // FNV, 32-bit prime, producing a simplistic PRNG.
126*6777b538SAndroid Build Coastguard Worker const uint32_t rand = i * 16777619;
127*6777b538SAndroid Build Coastguard Worker
128*6777b538SAndroid Build Coastguard Worker for (unsigned round = 0;; round++) {
129*6777b538SAndroid Build Coastguard Worker std::string client_message, server_message;
130*6777b538SAndroid Build Coastguard Worker client_message = client.GetNextMessage();
131*6777b538SAndroid Build Coastguard Worker server_message = server.GetNextMessage();
132*6777b538SAndroid Build Coastguard Worker
133*6777b538SAndroid Build Coastguard Worker if ((rand & 1) == round) {
134*6777b538SAndroid Build Coastguard Worker const bool server_or_client = rand & 2;
135*6777b538SAndroid Build Coastguard Worker std::string* m = server_or_client ? &server_message : &client_message;
136*6777b538SAndroid Build Coastguard Worker if (rand & 4) {
137*6777b538SAndroid Build Coastguard Worker // Truncate
138*6777b538SAndroid Build Coastguard Worker *m = m->substr(0, (i >> 3) % m->size());
139*6777b538SAndroid Build Coastguard Worker } else {
140*6777b538SAndroid Build Coastguard Worker // Corrupt
141*6777b538SAndroid Build Coastguard Worker const size_t bits = m->size() * 8;
142*6777b538SAndroid Build Coastguard Worker const size_t bit_to_corrupt = (rand >> 3) % bits;
143*6777b538SAndroid Build Coastguard Worker const_cast<char*>(m->data())[bit_to_corrupt / 8] ^=
144*6777b538SAndroid Build Coastguard Worker 1 << (bit_to_corrupt % 8);
145*6777b538SAndroid Build Coastguard Worker }
146*6777b538SAndroid Build Coastguard Worker }
147*6777b538SAndroid Build Coastguard Worker
148*6777b538SAndroid Build Coastguard Worker P224EncryptedKeyExchange::Result client_result, server_result;
149*6777b538SAndroid Build Coastguard Worker client_result = client.ProcessMessage(server_message);
150*6777b538SAndroid Build Coastguard Worker server_result = server.ProcessMessage(client_message);
151*6777b538SAndroid Build Coastguard Worker
152*6777b538SAndroid Build Coastguard Worker // If we have corrupted anything, we expect the authentication to fail,
153*6777b538SAndroid Build Coastguard Worker // although one side can succeed if we happen to corrupt the second round
154*6777b538SAndroid Build Coastguard Worker // message to the other.
155*6777b538SAndroid Build Coastguard Worker ASSERT_FALSE(
156*6777b538SAndroid Build Coastguard Worker client_result == P224EncryptedKeyExchange::kResultSuccess &&
157*6777b538SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultSuccess);
158*6777b538SAndroid Build Coastguard Worker
159*6777b538SAndroid Build Coastguard Worker if (client_result == P224EncryptedKeyExchange::kResultFailed ||
160*6777b538SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultFailed) {
161*6777b538SAndroid Build Coastguard Worker break;
162*6777b538SAndroid Build Coastguard Worker }
163*6777b538SAndroid Build Coastguard Worker
164*6777b538SAndroid Build Coastguard Worker ASSERT_EQ(P224EncryptedKeyExchange::kResultPending,
165*6777b538SAndroid Build Coastguard Worker client_result);
166*6777b538SAndroid Build Coastguard Worker ASSERT_EQ(P224EncryptedKeyExchange::kResultPending,
167*6777b538SAndroid Build Coastguard Worker server_result);
168*6777b538SAndroid Build Coastguard Worker }
169*6777b538SAndroid Build Coastguard Worker }
170*6777b538SAndroid Build Coastguard Worker }
171*6777b538SAndroid Build Coastguard Worker
172*6777b538SAndroid Build Coastguard Worker } // namespace crypto
173