VectorTestHelpers.swift 3.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. //
  2. // VectorTestHelpers.swift
  3. //
  4. // Copyright © 2015 Rob Napier. All rights reserved.
  5. //
  6. // Permission is hereby granted, free of charge, to any person obtaining a
  7. // copy of this software and associated documentation files (the "Software"),
  8. // to deal in the Software without restriction, including without limitation
  9. // the rights to use, copy, modify, merge, publish, distribute, sublicense,
  10. // and/or sell copies of the Software, and to permit persons to whom the
  11. // Software is furnished to do so, subject to the following conditions:
  12. //
  13. // The above copyright notice and this permission notice shall be included in
  14. // all copies or substantial portions of the Software.
  15. //
  16. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  17. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  18. // FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
  19. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  20. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
  21. // FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
  22. // DEALINGS IN THE SOFTWARE.
  23. //
  24. import XCTest
  25. @testable import RNCryptor
  26. func verifyVector(vector: [String:String], key:String, equals actual:NSData, name:String) {
  27. let version = vector["version"]!
  28. let title = vector["title"]!
  29. XCTAssertEqual(actual, vector[key]!.dataFromHexEncoding!, "Failed \(name) test (v\(version)): \(title)")
  30. }
  31. func _verifyKDF(vector: [String:String], name:String) {
  32. let key = V3.keyForPassword(vector["password"]!,
  33. salt:vector["salt_hex"]!.dataFromHexEncoding!)
  34. verifyVector(vector, key:"key_hex", equals:key, name: name)
  35. }
  36. func verify_v3_kdf(vector: [String:String]) {
  37. _verifyKDF(vector, name:"kdf")
  38. }
  39. func _verifyPassword(vector: [String:String]) {
  40. if Int(vector["version"]!) == Int(V3.formatVersion) {
  41. let encryptor = RNCryptor.EncryptorV3(password: vector["password"]!,
  42. encryptionSalt: vector["enc_salt_hex"]!.dataFromHexEncoding!,
  43. hmacSalt: vector["hmac_salt_hex"]!.dataFromHexEncoding!,
  44. iv: vector["iv_hex"]!.dataFromHexEncoding!)
  45. let ciphertext = encryptor.encryptData(vector["plaintext_hex"]!.dataFromHexEncoding!)
  46. verifyVector(vector, key:"ciphertext_hex", equals:ciphertext, name:"password encrypt")
  47. }
  48. do {
  49. let plaintext = try RNCryptor.decryptData(vector["ciphertext_hex"]!.dataFromHexEncoding!, password: vector["password"]!)
  50. verifyVector(vector, key:"plaintext_hex", equals:plaintext, name:"password decrypt")
  51. } catch {
  52. XCTFail("\(error)")
  53. }
  54. }
  55. func verify_v3_password(vector: [String: String]) {
  56. _verifyPassword(vector)
  57. }
  58. func verify_v3_key(vector: [String: String]) {
  59. if Int(vector["version"]!) == Int(V3.formatVersion) {
  60. let encryptor = RNCryptor.EncryptorV3(
  61. encryptionKey: vector["enc_key_hex"]!.dataFromHexEncoding!,
  62. hmacKey: vector["hmac_key_hex"]!.dataFromHexEncoding!,
  63. iv: vector["iv_hex"]!.dataFromHexEncoding!)
  64. let ciphertext = encryptor.encryptData(vector["plaintext_hex"]!.dataFromHexEncoding!)
  65. verifyVector(vector, key:"ciphertext_hex", equals:ciphertext, name:"key encrypt")
  66. }
  67. let decryptor = RNCryptor.DecryptorV3(
  68. encryptionKey: vector["enc_key_hex"]!.dataFromHexEncoding!,
  69. hmacKey: vector["hmac_key_hex"]!.dataFromHexEncoding!)
  70. do {
  71. let plaintext = try decryptor.decryptData(vector["ciphertext_hex"]!.dataFromHexEncoding!)
  72. verifyVector(vector, key:"plaintext_hex", equals:plaintext, name:"key decrypt")
  73. } catch {
  74. XCTFail("\(error)")
  75. }
  76. }