1*635a8641SAndroid Build Coastguard Worker // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2*635a8641SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*635a8641SAndroid Build Coastguard Worker // found in the LICENSE file.
4*635a8641SAndroid Build Coastguard Worker
5*635a8641SAndroid Build Coastguard Worker #include "crypto/p224_spake.h"
6*635a8641SAndroid Build Coastguard Worker
7*635a8641SAndroid Build Coastguard Worker #include <stddef.h>
8*635a8641SAndroid Build Coastguard Worker #include <stdint.h>
9*635a8641SAndroid Build Coastguard Worker
10*635a8641SAndroid Build Coastguard Worker #include <string>
11*635a8641SAndroid Build Coastguard Worker
12*635a8641SAndroid Build Coastguard Worker #include "base/logging.h"
13*635a8641SAndroid Build Coastguard Worker #include "base/strings/string_number_conversions.h"
14*635a8641SAndroid Build Coastguard Worker #include "testing/gtest/include/gtest/gtest.h"
15*635a8641SAndroid Build Coastguard Worker
16*635a8641SAndroid Build Coastguard Worker namespace crypto {
17*635a8641SAndroid Build Coastguard Worker
18*635a8641SAndroid Build Coastguard Worker namespace {
19*635a8641SAndroid Build Coastguard Worker
HexEncodeString(const std::string & binary_data)20*635a8641SAndroid Build Coastguard Worker std::string HexEncodeString(const std::string& binary_data) {
21*635a8641SAndroid Build Coastguard Worker return base::HexEncode(binary_data.c_str(), binary_data.size());
22*635a8641SAndroid Build Coastguard Worker }
23*635a8641SAndroid Build Coastguard Worker
RunExchange(P224EncryptedKeyExchange * client,P224EncryptedKeyExchange * server,bool is_password_same)24*635a8641SAndroid Build Coastguard Worker bool RunExchange(P224EncryptedKeyExchange* client,
25*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange* server,
26*635a8641SAndroid Build Coastguard Worker bool is_password_same) {
27*635a8641SAndroid Build Coastguard Worker for (;;) {
28*635a8641SAndroid Build Coastguard Worker std::string client_message, server_message;
29*635a8641SAndroid Build Coastguard Worker client_message = client->GetNextMessage();
30*635a8641SAndroid Build Coastguard Worker server_message = server->GetNextMessage();
31*635a8641SAndroid Build Coastguard Worker
32*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange::Result client_result, server_result;
33*635a8641SAndroid Build Coastguard Worker client_result = client->ProcessMessage(server_message);
34*635a8641SAndroid Build Coastguard Worker server_result = server->ProcessMessage(client_message);
35*635a8641SAndroid Build Coastguard Worker
36*635a8641SAndroid Build Coastguard Worker // Check that we never hit the case where only one succeeds.
37*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(client_result == P224EncryptedKeyExchange::kResultSuccess,
38*635a8641SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultSuccess);
39*635a8641SAndroid Build Coastguard Worker
40*635a8641SAndroid Build Coastguard Worker if (client_result == P224EncryptedKeyExchange::kResultFailed ||
41*635a8641SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultFailed) {
42*635a8641SAndroid Build Coastguard Worker return false;
43*635a8641SAndroid Build Coastguard Worker }
44*635a8641SAndroid Build Coastguard Worker
45*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(is_password_same,
46*635a8641SAndroid Build Coastguard Worker client->GetUnverifiedKey() == server->GetUnverifiedKey());
47*635a8641SAndroid Build Coastguard Worker
48*635a8641SAndroid Build Coastguard Worker if (client_result == P224EncryptedKeyExchange::kResultSuccess &&
49*635a8641SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultSuccess) {
50*635a8641SAndroid Build Coastguard Worker return true;
51*635a8641SAndroid Build Coastguard Worker }
52*635a8641SAndroid Build Coastguard Worker
53*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, client_result);
54*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(P224EncryptedKeyExchange::kResultPending, server_result);
55*635a8641SAndroid Build Coastguard Worker }
56*635a8641SAndroid Build Coastguard Worker }
57*635a8641SAndroid Build Coastguard Worker
58*635a8641SAndroid Build Coastguard Worker const char kPassword[] = "foo";
59*635a8641SAndroid Build Coastguard Worker
60*635a8641SAndroid Build Coastguard Worker } // namespace
61*635a8641SAndroid Build Coastguard Worker
TEST(MutualAuth,CorrectAuth)62*635a8641SAndroid Build Coastguard Worker TEST(MutualAuth, CorrectAuth) {
63*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange client(
64*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeClient, kPassword);
65*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange server(
66*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeServer, kPassword);
67*635a8641SAndroid Build Coastguard Worker
68*635a8641SAndroid Build Coastguard Worker EXPECT_TRUE(RunExchange(&client, &server, true));
69*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(client.GetKey(), server.GetKey());
70*635a8641SAndroid Build Coastguard Worker }
71*635a8641SAndroid Build Coastguard Worker
TEST(MutualAuth,IncorrectPassword)72*635a8641SAndroid Build Coastguard Worker TEST(MutualAuth, IncorrectPassword) {
73*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange client(
74*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeClient,
75*635a8641SAndroid Build Coastguard Worker kPassword);
76*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange server(
77*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeServer,
78*635a8641SAndroid Build Coastguard Worker "wrongpassword");
79*635a8641SAndroid Build Coastguard Worker
80*635a8641SAndroid Build Coastguard Worker EXPECT_FALSE(RunExchange(&client, &server, false));
81*635a8641SAndroid Build Coastguard Worker }
82*635a8641SAndroid Build Coastguard Worker
TEST(MutualAuth,ExpectedValues)83*635a8641SAndroid Build Coastguard Worker TEST(MutualAuth, ExpectedValues) {
84*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange client(P224EncryptedKeyExchange::kPeerTypeClient,
85*635a8641SAndroid Build Coastguard Worker kPassword);
86*635a8641SAndroid Build Coastguard Worker client.SetXForTesting("Client x");
87*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange server(P224EncryptedKeyExchange::kPeerTypeServer,
88*635a8641SAndroid Build Coastguard Worker kPassword);
89*635a8641SAndroid Build Coastguard Worker server.SetXForTesting("Server x");
90*635a8641SAndroid Build Coastguard Worker
91*635a8641SAndroid Build Coastguard Worker std::string client_message = client.GetNextMessage();
92*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(
93*635a8641SAndroid Build Coastguard Worker "3508EF7DECC8AB9F9C439FBB0154288BBECC0A82E8448F4CF29554EB"
94*635a8641SAndroid Build Coastguard Worker "BE9D486686226255EAD1D077C635B1A41F46AC91D7F7F32CED9EC3E0",
95*635a8641SAndroid Build Coastguard Worker HexEncodeString(client_message));
96*635a8641SAndroid Build Coastguard Worker
97*635a8641SAndroid Build Coastguard Worker std::string server_message = server.GetNextMessage();
98*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(
99*635a8641SAndroid Build Coastguard Worker "A3088C18B75D2C2B107105661AEC85424777475EB29F1DDFB8C14AFB"
100*635a8641SAndroid Build Coastguard Worker "F1603D0DF38413A00F420ACF2059E7997C935F5A957A193D09A2B584",
101*635a8641SAndroid Build Coastguard Worker HexEncodeString(server_message));
102*635a8641SAndroid Build Coastguard Worker
103*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(P224EncryptedKeyExchange::kResultPending,
104*635a8641SAndroid Build Coastguard Worker client.ProcessMessage(server_message));
105*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(P224EncryptedKeyExchange::kResultPending,
106*635a8641SAndroid Build Coastguard Worker server.ProcessMessage(client_message));
107*635a8641SAndroid Build Coastguard Worker
108*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(client.GetUnverifiedKey(), server.GetUnverifiedKey());
109*635a8641SAndroid Build Coastguard Worker // Must stay the same. External implementations should be able to pair with.
110*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(
111*635a8641SAndroid Build Coastguard Worker "CE7CCFC435CDA4F01EC8826788B1F8B82EF7D550A34696B371096E64"
112*635a8641SAndroid Build Coastguard Worker "C487D4FE193F7D1A6FF6820BC7F807796BA3889E8F999BBDEFC32FFA",
113*635a8641SAndroid Build Coastguard Worker HexEncodeString(server.GetUnverifiedKey()));
114*635a8641SAndroid Build Coastguard Worker
115*635a8641SAndroid Build Coastguard Worker EXPECT_TRUE(RunExchange(&client, &server, true));
116*635a8641SAndroid Build Coastguard Worker EXPECT_EQ(client.GetKey(), server.GetKey());
117*635a8641SAndroid Build Coastguard Worker }
118*635a8641SAndroid Build Coastguard Worker
TEST(MutualAuth,Fuzz)119*635a8641SAndroid Build Coastguard Worker TEST(MutualAuth, Fuzz) {
120*635a8641SAndroid Build Coastguard Worker static const unsigned kIterations = 40;
121*635a8641SAndroid Build Coastguard Worker
122*635a8641SAndroid Build Coastguard Worker for (unsigned i = 0; i < kIterations; i++) {
123*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange client(
124*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeClient, kPassword);
125*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange server(
126*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange::kPeerTypeServer, kPassword);
127*635a8641SAndroid Build Coastguard Worker
128*635a8641SAndroid Build Coastguard Worker // We'll only be testing small values of i, but we don't want that to bias
129*635a8641SAndroid Build Coastguard Worker // the test coverage. So we disperse the value of i by multiplying by the
130*635a8641SAndroid Build Coastguard Worker // FNV, 32-bit prime, producing a simplistic PRNG.
131*635a8641SAndroid Build Coastguard Worker const uint32_t rand = i * 16777619;
132*635a8641SAndroid Build Coastguard Worker
133*635a8641SAndroid Build Coastguard Worker for (unsigned round = 0;; round++) {
134*635a8641SAndroid Build Coastguard Worker std::string client_message, server_message;
135*635a8641SAndroid Build Coastguard Worker client_message = client.GetNextMessage();
136*635a8641SAndroid Build Coastguard Worker server_message = server.GetNextMessage();
137*635a8641SAndroid Build Coastguard Worker
138*635a8641SAndroid Build Coastguard Worker if ((rand & 1) == round) {
139*635a8641SAndroid Build Coastguard Worker const bool server_or_client = rand & 2;
140*635a8641SAndroid Build Coastguard Worker std::string* m = server_or_client ? &server_message : &client_message;
141*635a8641SAndroid Build Coastguard Worker if (rand & 4) {
142*635a8641SAndroid Build Coastguard Worker // Truncate
143*635a8641SAndroid Build Coastguard Worker *m = m->substr(0, (i >> 3) % m->size());
144*635a8641SAndroid Build Coastguard Worker } else {
145*635a8641SAndroid Build Coastguard Worker // Corrupt
146*635a8641SAndroid Build Coastguard Worker const size_t bits = m->size() * 8;
147*635a8641SAndroid Build Coastguard Worker const size_t bit_to_corrupt = (rand >> 3) % bits;
148*635a8641SAndroid Build Coastguard Worker const_cast<char*>(m->data())[bit_to_corrupt / 8] ^=
149*635a8641SAndroid Build Coastguard Worker 1 << (bit_to_corrupt % 8);
150*635a8641SAndroid Build Coastguard Worker }
151*635a8641SAndroid Build Coastguard Worker }
152*635a8641SAndroid Build Coastguard Worker
153*635a8641SAndroid Build Coastguard Worker P224EncryptedKeyExchange::Result client_result, server_result;
154*635a8641SAndroid Build Coastguard Worker client_result = client.ProcessMessage(server_message);
155*635a8641SAndroid Build Coastguard Worker server_result = server.ProcessMessage(client_message);
156*635a8641SAndroid Build Coastguard Worker
157*635a8641SAndroid Build Coastguard Worker // If we have corrupted anything, we expect the authentication to fail,
158*635a8641SAndroid Build Coastguard Worker // although one side can succeed if we happen to corrupt the second round
159*635a8641SAndroid Build Coastguard Worker // message to the other.
160*635a8641SAndroid Build Coastguard Worker ASSERT_FALSE(
161*635a8641SAndroid Build Coastguard Worker client_result == P224EncryptedKeyExchange::kResultSuccess &&
162*635a8641SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultSuccess);
163*635a8641SAndroid Build Coastguard Worker
164*635a8641SAndroid Build Coastguard Worker if (client_result == P224EncryptedKeyExchange::kResultFailed ||
165*635a8641SAndroid Build Coastguard Worker server_result == P224EncryptedKeyExchange::kResultFailed) {
166*635a8641SAndroid Build Coastguard Worker break;
167*635a8641SAndroid Build Coastguard Worker }
168*635a8641SAndroid Build Coastguard Worker
169*635a8641SAndroid Build Coastguard Worker ASSERT_EQ(P224EncryptedKeyExchange::kResultPending,
170*635a8641SAndroid Build Coastguard Worker client_result);
171*635a8641SAndroid Build Coastguard Worker ASSERT_EQ(P224EncryptedKeyExchange::kResultPending,
172*635a8641SAndroid Build Coastguard Worker server_result);
173*635a8641SAndroid Build Coastguard Worker }
174*635a8641SAndroid Build Coastguard Worker }
175*635a8641SAndroid Build Coastguard Worker }
176*635a8641SAndroid Build Coastguard Worker
177*635a8641SAndroid Build Coastguard Worker } // namespace crypto
178