MYCryptoTest.m
author snej@snej.local
Sat Apr 04 20:42:03 2009 -0700 (2009-04-04)
changeset 0 0a6527af039b
child 1 60e4cbbb5128
permissions -rw-r--r--
Initial checkin. Passes tests on Mac and in iPhone simulator.
     1 //
     2 //  MYCryptoTest.m
     3 //  MYCrypto-iPhone
     4 //
     5 //  Created by Jens Alfke on 4/1/09.
     6 //  Copyright 2009 Jens Alfke. All rights reserved.
     7 //
     8 
     9 #import "MYKeyPair.h"
    10 #import "MYKeychain.h"
    11 #import "MYDigest.h"
    12 #import "MYCrypto_Private.h"
    13 
    14 
    15 #if DEBUG
    16 
    17 #pragma mark -
    18 #pragma mark KEYCHAIN:
    19 
    20 
    21 TestCase(MYKeychain) {
    22     MYKeychain *kc = [MYKeychain defaultKeychain];
    23     Log(@"Default keychain = %@", kc);
    24     CAssert(kc);
    25 #if !USE_IPHONE_API
    26     CAssert(kc.path);
    27 #endif
    28     
    29     kc = [MYKeychain allKeychains];
    30     Log(@"All-keychains = %@", kc);
    31     CAssert(kc);
    32     CAssertEq(kc.path,nil);
    33 }
    34 
    35 
    36 TestCase(EnumerateKeys) {
    37     RequireTestCase(MYKeychain);
    38     NSEnumerator *e = [[MYKeychain allKeychains] enumeratePublicKeys];
    39     Log(@"Public Key Enumerator = %@", e);
    40     CAssert(e);
    41     for (MYPublicKey *key in e) {
    42         Log(@"Found %@ -- name=%@", key, key.name);
    43     }
    44     
    45     e = [[MYKeychain allKeychains] enumerateKeyPairs];
    46     Log(@"Key-Pair Enumerator = %@", e);
    47     CAssert(e);
    48     for (MYKeyPair *key in e) {
    49         Log(@"Found %@ -- name=%@", key, key.name);
    50     }
    51     
    52     e = [[MYKeychain allKeychains] enumerateSymmetricKeys];
    53     Log(@"Symmetric Key Enumerator = %@", e);
    54     CAssert(e);
    55     for (MYSymmetricKey *key in e) {
    56         Log(@"Found %@ -- name=%@", key, key.name);
    57     }
    58 }
    59 
    60 
    61 TestCase(EnumerateCerts) {
    62     RequireTestCase(MYKeychain);
    63     NSEnumerator *e = [[MYKeychain allKeychains] enumerateCertificates];
    64     Log(@"Enumerator = %@", e);
    65     CAssert(e);
    66     for (MYCertificate *cert in e) {
    67         //Log(@"Found %@ -- name=%@, email=%@", cert, cert.commonName, cert.emailAddresses);
    68     }
    69 }
    70 
    71 
    72 #pragma mark -
    73 #pragma mark SYMMETRIC KEYS:
    74 
    75 
    76 TestCase(MYSymmetricKey) {
    77     #define kNTests 11
    78     static const CCAlgorithm kTestAlgorithms[kNTests] = {
    79         kCCAlgorithmAES128, kCCAlgorithmAES128, kCCAlgorithmAES128,
    80         kCCAlgorithmDES, kCCAlgorithm3DES,
    81         kCCAlgorithmCAST, kCCAlgorithmCAST, kCCAlgorithmCAST,
    82         kCCAlgorithmRC4, kCCAlgorithmRC4, kCCAlgorithmRC4};
    83     
    84     static const unsigned kTestBitSizes[kNTests] = {
    85         128, 192, 256,
    86         64, 3*64,
    87         40, 80, 128,
    88         32, 200, 512*8};
    89 
    90     for (int i=0; i<kNTests; i++) {
    91         NSAutoreleasePool *pool = [NSAutoreleasePool new];
    92         Log(@"Test #%2i: algorithm = %3u-bit #%i", i+1, kTestBitSizes[i], (int)kTestAlgorithms[i]);
    93         // Generate key:
    94         MYSymmetricKey *key = [MYSymmetricKey generateSymmetricKeyOfSize: kTestBitSizes[i]
    95                                                                algorithm: kTestAlgorithms[i]];
    96         CAssert(key);
    97 #if !TARGET_OS_IPHONE
    98         CAssert(key.cssmKey != NULL);
    99 #endif
   100         Log(@"Key data = %@", key.keyData);
   101         CAssertEq(key.keyData.length, kTestBitSizes[i]/8);
   102 
   103         // Encrypt a small amount of text:
   104         NSData *cleartext = [@"This is a test. This is only a test." dataUsingEncoding: NSUTF8StringEncoding];
   105         NSData *encrypted = [key encryptData: cleartext];
   106         Log(@"Encrypted = %u bytes: %@", encrypted.length, encrypted);
   107         CAssert(encrypted.length >= cleartext.length);
   108         NSData *decrypted = [key decryptData: encrypted];
   109         CAssertEqual(decrypted, cleartext);
   110         
   111         // Encrypt large binary data:
   112         cleartext = [NSData dataWithContentsOfFile: @"/Library/Desktop Pictures/Nature/Zen Garden.jpg"];
   113         CAssert(cleartext);
   114         encrypted = [key encryptData: cleartext];
   115         Log(@"Encrypted = %u bytes", encrypted.length);
   116         CAssert(encrypted.length >= cleartext.length);
   117         decrypted = [key decryptData: encrypted];
   118         CAssertEqual(decrypted, cleartext);
   119         
   120         [pool drain];
   121     }
   122 }
   123 
   124 
   125 #pragma mark -
   126 #pragma mark KEY-PAIRS:
   127 
   128 
   129 TestCase(KeyPair) {
   130     RequireTestCase(MYKeychain);
   131     
   132     Log(@"Generating key pair...");
   133     MYKeyPair *pair = [[MYKeychain defaultKeychain] generateRSAKeyPairOfSize: 512];
   134     CAssert(pair);
   135     CAssert(pair.keyRef);
   136     CAssert(pair.privateKeyRef);
   137     Log(@"...created pair.");
   138     
   139     @try{
   140         [pair setName: @"Test KeyPair Label"];
   141         CAssertEqual(pair.name, @"Test KeyPair Label");
   142 #if !TARGET_OS_IPHONE
   143         [pair setComment: @"This key-pair was generated automatically by a test case."];
   144         CAssertEqual(pair.comment, @"This key-pair was generated automatically by a test case.");
   145 #endif
   146         [pair setAlias: @"TestCase@mooseyard.com"];
   147         CAssertEqual(pair.alias, @"TestCase@mooseyard.com");
   148         
   149         NSData *pubKeyData = pair.keyData;
   150         Log(@"Public key = %@ (%u bytes)",pubKeyData,pubKeyData.length);
   151         CAssert(pubKeyData);
   152         
   153         MYSHA1Digest *pubKeyDigest = pair.publicKeyDigest;
   154         Log(@"Public key digest = %@",pubKeyDigest);
   155         
   156         Log(@"SHA1 of pub key = %@", pubKeyData.my_SHA1Digest.asData);
   157         
   158         NSData *data = [@"This is a test. This is only a test!" dataUsingEncoding: NSUTF8StringEncoding];
   159         NSData *sig = [pair signData: data];
   160         Log(@"Signature = %@ (%u bytes)",sig,sig.length);
   161         CAssert(sig);
   162         CAssert( [pair verifySignature: sig ofData: data] );
   163         
   164         // Test creating a standalone public key:
   165         MYPublicKey *pub = [[MYPublicKey alloc] initWithKeyRef: pair.keyRef];
   166         CAssert( [pub verifySignature: sig ofData: data] );
   167         Log(@"Verified signature.");
   168 
   169         // Test creating a public key from data:
   170         Log(@"Reconstituting public key from data...");
   171         pub = [[MYPublicKey alloc] initWithKeyData: pubKeyData];
   172         CAssert(pub);
   173         CAssertEqual(pub.keyData, pubKeyData);
   174         CAssertEqual(pub.publicKeyDigest, pubKeyDigest);
   175         CAssert( [pub verifySignature: sig ofData: data] );
   176         Log(@"Verified signature from reconstituted key.");
   177                 
   178         // Now let's encrypt...
   179         NSData *crypted = [pub encryptData: data];
   180         Log(@"Encrypted = %@ (%u bytes)",crypted,crypted.length);
   181         CAssert(crypted);
   182         
   183         CAssertEqual([pair decryptData: crypted], data);
   184         Log(@"Verified decryption.");
   185         
   186         CAssert([pair removeFromKeychain]);
   187         Log(@"Removed key-pair.");
   188         pair = nil;
   189         
   190     }@finally {
   191         if (pair) {
   192             if ([pair removeFromKeychain])
   193                 Log(@"Removed key-pair from keychain.");
   194             else
   195                 Warn(@"Unable to remove test key-pair from keychain");
   196         }
   197     }
   198 }
   199 
   200 
   201 
   202 #pragma mark -
   203 #pragma mark KEYPAIR EXPORT:
   204 
   205 
   206 static void testKeyPairExportWithPrompt(BOOL withPrompt) {
   207     MYKeychain *keychain = [MYKeychain allKeychains];
   208     Log(@"Generating key pair...");
   209     MYKeyPair *pair = [keychain generateRSAKeyPairOfSize: 512];
   210     CAssert(pair);
   211     CAssert(pair.keyRef);
   212     CAssert(pair.privateKeyRef);
   213     Log(@"...created pair.");
   214     
   215     @try{
   216         NSData *pubKeyData = pair.keyData;
   217         CAssert(pubKeyData.length >= 512/8);
   218         [pair setName: @"Test KeyPair Label"];
   219         CAssertEqual(pair.name, @"Test KeyPair Label");
   220 #if !TARGET_OS_IPHONE
   221         [pair setComment: @"This key-pair was generated automatically by a test case."];
   222         CAssertEqual(pair.comment, @"This key-pair was generated automatically by a test case.");
   223 #endif
   224         [pair setAlias: @"TestCase@mooseyard.com"];
   225         CAssertEqual(pair.alias, @"TestCase@mooseyard.com");
   226         
   227 #if !TARGET_OS_IPHONE
   228         Log(@"Exporting key-pair...");
   229         NSString *passphrase = @"passphrase";
   230         NSData *privKeyData;
   231         if (withPrompt)
   232             privKeyData = [pair exportPrivateKey];
   233         else
   234             privKeyData = [pair _exportPrivateKeyInFormat: kSecFormatWrappedOpenSSL
   235                                                   withPEM: YES
   236                                                passphrase: passphrase];
   237         Log(@"Exported data = %@ (%u bytes)", privKeyData,privKeyData.length);
   238         CAssert(privKeyData);
   239         [privKeyData writeToFile: @"ExportedPrivKey" atomically: YES];
   240 #endif
   241         
   242         // Check key lookup:
   243         Log(@"Looking up public key of pair in keychain...");
   244         MYSHA1Digest *digest = pair.publicKeyDigest;
   245         MYPublicKey *foundKey = [keychain publicKeyWithDigest: digest];
   246         CAssertEqual(foundKey, pair.asPublicKey);
   247         CAssert([keychain.enumeratePublicKeys.allObjects containsObject: pair.asPublicKey]);
   248         MYKeyPair *foundPair = [keychain keyPairWithDigest: digest];
   249         CAssertEqual(foundPair, pair);
   250         CAssert([keychain.enumerateKeyPairs.allObjects containsObject: pair]);
   251         
   252         Log(@"Removing key-pair from keychain...");
   253         CAssert([pair removeFromKeychain]);
   254         pair = nil;
   255         CAssert([keychain publicKeyWithDigest: digest] == nil);
   256         
   257 #if !TARGET_OS_IPHONE
   258         Log(@"Importing key-pair...");
   259         if (withPrompt) {
   260             pair = [keychain importPublicKey: pubKeyData 
   261                                   privateKey: privKeyData];
   262         } else {
   263             pair = [[[MYKeyPair alloc] _initWithPublicKeyData: pubKeyData
   264                                                privateKeyData: privKeyData
   265                                                   forKeychain: keychain.keychainRefOrDefault
   266                                                    passphrase: passphrase]
   267                     autorelease];
   268         }
   269         CAssert(pair);
   270         CAssertEqual(pair.keyData, pubKeyData);
   271 #endif
   272     }@finally {
   273         if (pair) {
   274             if ([pair removeFromKeychain])
   275                 Log(@"Removed key-pair from keychain.");
   276             else
   277                 Warn(@"Unable to remove test key-pair from keychain");
   278         }
   279     }
   280 }
   281 
   282 TestCase(KeyPairExport) {
   283     RequireTestCase(MYKeychain);
   284     RequireTestCase(KeyPair);
   285     testKeyPairExportWithPrompt(NO);
   286 }
   287 
   288 TestCase(KeyPairExportWithUI) {
   289     RequireTestCase(KeyPairExport);
   290     testKeyPairExportWithPrompt(YES);
   291 }
   292 
   293 
   294 #endif DEBUG
   295