Add general tests for basic encryption and decryption with Crypto framework

This commit is contained in:
Danny Moesch 2019-08-22 22:59:07 +02:00 committed by Mingshen Sun
parent 4c3aa4938d
commit e2201ffa52
3 changed files with 104 additions and 0 deletions

View file

@ -51,6 +51,7 @@
30A1D2A821B2D53200E2D1F7 /* PasswordChange.swift in Sources */ = {isa = PBXBuildFile; fileRef = 30A1D2A721B2D53200E2D1F7 /* PasswordChange.swift */; };
30A1D2AA21B32A0100E2D1F7 /* OtpTypeTest.swift in Sources */ = {isa = PBXBuildFile; fileRef = 30A1D2A921B32A0100E2D1F7 /* OtpTypeTest.swift */; };
30A1D2AC21B32C2A00E2D1F7 /* TokenBuilderTest.swift in Sources */ = {isa = PBXBuildFile; fileRef = 30A1D2AB21B32C2A00E2D1F7 /* TokenBuilderTest.swift */; };
30A86F95230F237000F821A4 /* CryptoFrameworkTest.swift in Sources */ = {isa = PBXBuildFile; fileRef = 30A86F94230F237000F821A4 /* CryptoFrameworkTest.swift */; };
30B04860209A5141001013CA /* PasswordTest.swift in Sources */ = {isa = PBXBuildFile; fileRef = 30B0485F209A5141001013CA /* PasswordTest.swift */; };
30BAC8C622E3BAAF00438475 /* TestBase.swift in Sources */ = {isa = PBXBuildFile; fileRef = 30BAC8C422E3BAAF00438475 /* TestBase.swift */; };
30BAC8C722E3BAAF00438475 /* TestPGPKeys.swift in Sources */ = {isa = PBXBuildFile; fileRef = 30BAC8C522E3BAAF00438475 /* TestPGPKeys.swift */; };
@ -262,6 +263,7 @@
30A1D2A721B2D53200E2D1F7 /* PasswordChange.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = PasswordChange.swift; sourceTree = "<group>"; };
30A1D2A921B32A0100E2D1F7 /* OtpTypeTest.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = OtpTypeTest.swift; sourceTree = "<group>"; };
30A1D2AB21B32C2A00E2D1F7 /* TokenBuilderTest.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = TokenBuilderTest.swift; sourceTree = "<group>"; };
30A86F94230F237000F821A4 /* CryptoFrameworkTest.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CryptoFrameworkTest.swift; sourceTree = "<group>"; };
30B0485F209A5141001013CA /* PasswordTest.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = PasswordTest.swift; sourceTree = "<group>"; };
30BAC8C422E3BAAF00438475 /* TestBase.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = TestBase.swift; sourceTree = "<group>"; };
30BAC8C522E3BAAF00438475 /* TestPGPKeys.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = TestPGPKeys.swift; sourceTree = "<group>"; };
@ -463,6 +465,14 @@
path = Extensions;
sourceTree = "<group>";
};
30A86F93230F235800F821A4 /* Crypto */ = {
isa = PBXGroup;
children = (
30A86F94230F237000F821A4 /* CryptoFrameworkTest.swift */,
);
path = Crypto;
sourceTree = "<group>";
};
30B6AABA21F49095006B352D /* Extensions */ = {
isa = PBXGroup;
children = (
@ -585,6 +595,7 @@
A26075861EEC6F34005DB03E /* passKitTests */ = {
isa = PBXGroup;
children = (
30A86F93230F235800F821A4 /* Crypto */,
30BAC8C322E3BA4300438475 /* Testbase */,
30697C5521F63F870064FCAC /* Extensions */,
301F6464216164670071A4CE /* Helpers */,
@ -1303,6 +1314,7 @@
isa = PBXSourcesBuildPhase;
buildActionMask = 2147483647;
files = (
30A86F95230F237000F821A4 /* CryptoFrameworkTest.swift in Sources */,
30A1D2AC21B32C2A00E2D1F7 /* TokenBuilderTest.swift in Sources */,
301F646D216166AA0071A4CE /* AdditionFieldTest.swift in Sources */,
30BAC8CB22E3BB6C00438475 /* DictBasedKeychain.swift in Sources */,

View file

@ -0,0 +1,60 @@
//
// CryptoFrameworkTest.swift
// passKitTests
//
// Created by Danny Moesch on 22.08.19.
// Copyright © 2019 Bob Sun. All rights reserved.
//
import XCTest
@testable import passKit
@testable import Crypto
class CryptoFrameworkTest: XCTestCase {
typealias MessageConverter = (CryptoPGPMessage, NSErrorPointer) -> CryptoPGPMessage?
private let testText = "Hello World!"
func testArmoredEncryptDecrypt() throws {
let plainMessage = CryptoNewPlainMessageFromString(testText)
let messageConverter: MessageConverter = { encryptedMessage, error in
CryptoNewPGPMessageFromArmored(encryptedMessage.getArmored(error), error)
}
try testInternal(plainMessage: plainMessage, messageConverter: messageConverter)
}
func testDataBasedEncryptDecrypt() throws {
let plainMessage = CryptoNewPlainMessage(testText.data(using: .utf8)!.mutable as Data)
let messageConverter: MessageConverter = { encryptedMessage, _ in
CryptoNewPGPMessage(encryptedMessage.getBinary()!.mutable as Data)
}
try testInternal(plainMessage: plainMessage, messageConverter: messageConverter)
}
private func testInternal(plainMessage: CryptoPlainMessage?, messageConverter: MessageConverter) throws {
try [
RSA2048,
//RSA2048_SUB,
ED25519,
//ED25519_SUB,
].forEach { keyTriple in
let pgp = CryptoGetGopenPGP()!
let publicKey = try pgp.buildKeyRingArmored(keyTriple.publicKey)
let privateKey = try pgp.buildKeyRingArmored(keyTriple.privateKey)
var error: NSError?
XCTAssert(publicKey.getFingerprint(&error).hasSuffix(keyTriple.fingerprint))
XCTAssertNil(error)
try privateKey.unlock(withPassphrase: keyTriple.passphrase)
let encryptedMessage = try publicKey.encrypt(plainMessage, privateKey: nil)
let decryptedData = try privateKey.decrypt(messageConverter(encryptedMessage, &error), verifyKey: nil, verifyTime: 0)
XCTAssertNil(error)
XCTAssertEqual(testText, decryptedData.getString())
}
}
}

View file

@ -10,6 +10,38 @@ import XCTest
@testable import passKit
struct PGPKeyTestTriple {
let publicKey: String
let privateKey: String
let fingerprint: String
let passphrase = "passforios"
}
let RSA2048 = PGPKeyTestTriple(
publicKey: PGP_RSA2048_PUBLIC_KEY,
privateKey: PGP_RSA2048_PRIVATE_KEY,
fingerprint: "a1024dae"
)
let RSA2048_SUB = PGPKeyTestTriple(
publicKey: PGP_RSA2048_PUBLIC_KEY,
privateKey: PGP_RSA2048_PRIVATE_SUBKEY,
fingerprint: "a1024dae"
)
let ED25519 = PGPKeyTestTriple(
publicKey: PGP_ED25519_PUBLIC_KEY,
privateKey: PGP_ED25519_PRIVATE_KEY,
fingerprint: "e9444483"
)
let ED25519_SUB = PGPKeyTestTriple(
publicKey: PGP_ED25519_PUBLIC_KEY,
privateKey: PGP_ED25519_PRIVATE_SUBKEY,
fingerprint: "e9444483"
)
func requestPGPKeyPassphrase() -> String {
return "passforios"
}