3 use spake2::{Ed25519Group, ErrorType, Identity, Password, SPAKEErr, SPAKE2};
7 let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(
8 &Password::new(b"password"),
9 &Identity::new(b"idA"),
10 &Identity::new(b"idB"),
12 let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b(
13 &Password::new(b"password"),
14 &Identity::new(b"idA"),
15 &Identity::new(b"idB"),
17 let key1 = s1.finish(msg2.as_slice()).unwrap();
18 let key2 = s2.finish(msg1.as_slice()).unwrap();
19 assert_eq!(key1, key2);
24 let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(
25 &Password::new(b"password"),
26 &Identity::new(b"idA"),
27 &Identity::new(b"idB"),
29 let (s2, msg2) = SPAKE2::<Ed25519Group>::start_b(
30 &Password::new(b"password2"),
31 &Identity::new(b"idA"),
32 &Identity::new(b"idB"),
34 let key1 = s1.finish(msg2.as_slice()).unwrap();
35 let key2 = s2.finish(msg1.as_slice()).unwrap();
36 assert_ne!(key1, key2);
40 fn test_reflected_message() {
41 let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(
42 &Password::new(b"password"),
43 &Identity::new(b"idA"),
44 &Identity::new(b"idB"),
46 let r = s1.finish(msg1.as_slice());
50 kind: ErrorType::BadSide,
56 fn test_bad_length() {
57 let (s1, msg1) = SPAKE2::<Ed25519Group>::start_a(
58 &Password::new(b"password"),
59 &Identity::new(b"idA"),
60 &Identity::new(b"idB"),
62 let mut msg2 = Vec::<u8>::with_capacity(msg1.len() + 1);
63 msg2.resize(msg1.len() + 1, 0u8);
64 let r = s1.finish(&msg2);
68 kind: ErrorType::WrongLength,
74 fn test_basic_symmetric() {
75 let (s1, msg1) = SPAKE2::<Ed25519Group>::start_symmetric(
76 &Password::new(b"password"),
77 &Identity::new(b"idS"),
79 let (s2, msg2) = SPAKE2::<Ed25519Group>::start_symmetric(
80 &Password::new(b"password"),
81 &Identity::new(b"idS"),
83 let key1 = s1.finish(msg2.as_slice()).unwrap();
84 let key2 = s2.finish(msg1.as_slice()).unwrap();
85 assert_eq!(key1, key2);