describe("Login with srp var", function() { describe("(Compatibility with py-srp)", function (){ // these need to be the same as in the spec runner: var login = "testuser"; var password = "password"; // a valid auth attempt for the user / password given in the spec runner: var a = 'a5cccf937ea1bf72df5cf8099442552f5664da6780a75436d5a59bc77a8a9993'; var A = 'e67d222244564ccd2e37471f226b999a4e987f3d494c7d80e0d36169efd6c6c6d857a96924c25fc165e5e9b0212a31c30701ec376dc32e36be00bbcd6d2104789d368af984e26fc094374f90ee5746478f14cec45c7e131a3cbce15fe79e98894213dac4e63c3f73f644fe25aa8707bc58859dfd1b36972e4e34169db2622899'; // just for the sake of having a complete set of test vars: var b = '6aa5c88d1877af9907ccefad31083e1102a7121dc04706f681f66c8680fb7f05'; var B = 'd56a80aaafdf9f70598b5d1184f122f326a333fafd37ab76d6f7fba4a9c4ee59545be056335150bd64f04880bc8e76949469379fe9de17cf6f36f3ee11713d05f63050486bc73c545163169999ff01b55c0ca4e90d8856a6e3d3a6ffc70b70d993a5308a37a5c2399874344e083e72b3c9afa083d312dfe9096ea9a65023f135'; var salt = '628365a0'; var K = 'db6ec0bdab81742315861a828323ff492721bdcd114077a4124bc425e4bf328b'; var M = '640e51d5ac5461591c31811221261f0e0eae7c08ce43c85e9556adbd94ed8c26'; var M2 = '49e48f8ac8c4da0e8a7374f73eeedbee2266e123d23fc1be1568523fc9c24b1e'; var V = '4277ddfdd111cc6a4cd27af570172a93ff4dddd9441ad89ecd78b08504812819d85712fbb6d2b487798ea0e19eeb960ce129725286d1c891314c0620abce02ac0a37fac823d0858553aed30ba99622ec9c66cc937016b96e82ef9e3b5d06e1db707293459c0aa8e082b528fd236cda347c45d8b022a9d4f3701c696e0397332a'; var A_, callback; beforeEach(function() { specHelper.setupFakeXHR.apply(this); A_ = srp.session.calculateAndSetA(a) }); afterEach(function() { this.xhr.restore(); }); it("calculates the same A", function(){ expect(A_).toBe(A); }); it("calculates the same verifier", function(){ expect(srp.session.getV(salt).toString(16)).toBe(V); }); it("calculates the same key", function(){ srp.session.calculations(salt, B); expect(srp.session.key()).toBe(K); }); it("authenticates successfully", function(){ srp.loggedIn = sinon.spy(); srp.login(); this.expectRequest('/sessions.json', 'login=' +login+ '&A=' +A, 'POST'); this.respondJSON({salt: salt, B: B}); this.expectRequest('/sessions/'+login+'.json', 'client_auth='+M, 'PUT'); this.respondJSON({M2: M2}); expect(srp.loggedIn).toHaveBeenCalled(); }); it("reports errors during handshake", function(){ srp.error = sinon.spy(); var error = {login: "something went wrong on the server side"}; srp.login(); this.expectRequest('/sessions.json', 'login=' +login+ '&A=' +A, 'POST'); this.respondJSON(error, 422); //this.expectNoMoreRequests(); expect(srp.error).toHaveBeenCalled; var args = srp.error.args[0]; expect(args[0]).toEqual(error); }); it("rejects B = 0", function(){ srp.loggedIn = sinon.spy(); srp.error = sinon.spy(); srp.login(); this.expectRequest('/sessions.json', 'login=' +login+ '&A=' +A, 'POST'); this.respondJSON({salt: salt, B: 0}); // aborting if B=0 expect(this.requests).toEqual([]); expect(srp.error).toHaveBeenCalledWith("Server send random number 0 - could not login."); expect(srp.loggedIn).not.toHaveBeenCalled(); }); }); });