* The build process runs Doxygen only if it's installed (i.e. on the shell search path).
* Added instructions to the README on setting up a named Source Tree for MYUtilities.
* Changed the RSA key size in MYCryptoTest to 2048 and made it a named constant.
5 // Created by Jens Alfke on 4/1/09.
6 // Copyright 2009 Jens Alfke. All rights reserved.
9 #import "MYPublicKey.h"
10 #import "MYPrivateKey.h"
11 #import "MYKeychain.h"
13 #import "MYIdentity.h"
14 #import "MYCrypto+Cocoa.h"
15 #import "MYCrypto_Private.h"
21 #define kTestCaseRSAKeySize 2048
24 #pragma mark KEYCHAIN:
27 TestCase(MYKeychain) {
28 MYKeychain *kc = [MYKeychain defaultKeychain];
29 Log(@"Default keychain = %@", kc);
31 #if !MYCRYPTO_USE_IPHONE_API
35 kc = [MYKeychain allKeychains];
36 Log(@"All-keychains = %@", kc);
38 #if !MYCRYPTO_USE_IPHONE_API
39 CAssertEq(kc.path,nil);
44 TestCase(EnumerateKeys) {
45 RequireTestCase(MYKeychain);
46 NSEnumerator *e = [[MYKeychain allKeychains] enumeratePublicKeys];
47 Log(@"Public Key Enumerator = %@", e);
49 for (MYPublicKey *key in e) {
50 Log(@"Found %@ -- name=%@", key, key.name);
53 e = [[MYKeychain allKeychains] enumeratePrivateKeys];
54 Log(@"Key-Pair Enumerator = %@", e);
56 for (MYPrivateKey *key in e) {
57 Log(@"Found %@ -- name=%@", key, key.name);
60 e = [[MYKeychain allKeychains] enumerateSymmetricKeys];
61 Log(@"Symmetric Key Enumerator = %@", e);
63 for (MYSymmetricKey *key in e) {
64 Log(@"Found %@ -- name=%@", key, key.name);
69 TestCase(EnumerateCerts) {
70 RequireTestCase(MYKeychain);
71 NSEnumerator *e = [[MYKeychain allKeychains] enumerateCertificates];
72 Log(@"Enumerator = %@", e);
74 for (MYCertificate *cert in e) {
75 //Log(@"Found %@ -- name=%@, email=%@", cert, cert.commonName, cert.emailAddresses);
79 TestCase(EnumerateIdentities) {
80 RequireTestCase(MYKeychain);
81 NSEnumerator *e = [[MYKeychain allKeychains] enumerateIdentities];
82 Log(@"Enumerator = %@", e);
84 for (MYIdentity *ident in e) {
85 Log(@"Found %@\n\tcommonName=%@\n\temails=(%@)\n\tkey=%@",
86 ident, ident.commonName,
90 [ident.emailAddresses componentsJoinedByString: @", "],
98 #pragma mark SYMMETRIC KEYS:
101 static void testSymmetricKey( CCAlgorithm algorithm, unsigned sizeInBits ) {
102 NSAutoreleasePool *pool = [NSAutoreleasePool new];
103 Log(@"--- Testing %3u-bit #%i", sizeInBits, (int)algorithm);
105 MYSymmetricKey *key = [MYSymmetricKey generateSymmetricKeyOfSize: sizeInBits
106 algorithm: algorithm];
107 Log(@"Created %@", key);
109 CAssertEq(key.algorithm, algorithm);
110 CAssertEq(key.keySizeInBits, sizeInBits);
111 #if !TARGET_OS_IPHONE
112 CAssert(key.cssmKey != NULL);
115 NSData *keyData = key.keyData;
116 Log(@"Key data = %@", keyData);
117 CAssertEq(keyData.length, sizeInBits/8);
119 // Encrypt a small amount of text:
120 NSData *cleartext = [@"This is a test. This is only a test." dataUsingEncoding: NSUTF8StringEncoding];
121 NSData *encrypted = [key encryptData: cleartext];
122 Log(@"Encrypted = %u bytes: %@", encrypted.length, encrypted);
123 CAssert(encrypted.length >= cleartext.length);
124 NSData *decrypted = [key decryptData: encrypted];
125 CAssertEqual(decrypted, cleartext);
127 // Encrypt large binary data:
128 cleartext = [NSData dataWithContentsOfFile: @"/Library/Desktop Pictures/Nature/Zen Garden.jpg"];
130 encrypted = [key encryptData: cleartext];
131 Log(@"Encrypted = %u bytes", encrypted.length);
132 CAssert(encrypted.length >= cleartext.length);
133 decrypted = [key decryptData: encrypted];
134 CAssertEqual(decrypted, cleartext);
136 #if !TARGET_OS_IPHONE
137 // Try reconstituting the key from its data:
138 NSData *exported = [key exportKeyInFormat: kSecFormatWrappedPKCS8 withPEM: NO];
139 Log(@"Exported key: %@", exported);
140 // CAssert(exported);
141 //FIX: Exporting symmetric keys isn't working. Temporarily making this optional.
144 MYSymmetricKey *key2 = [[MYSymmetricKey alloc] initWithKeyData: exported algorithm: algorithm];
145 Log(@"Reconstituted as %@", key2);
146 CAssertEqual(key2,key);
147 decrypted = [key2 decryptData: encrypted];
148 CAssertEqual(decrypted, cleartext);
150 Warn(@"Unable to export key in PKCS8");
156 TestCase(MYSymmetricKey) {
158 static const CCAlgorithm kTestAlgorithms[kNTests] = {
159 kCCAlgorithmAES128, kCCAlgorithmAES128, kCCAlgorithmAES128,
160 kCCAlgorithmDES, kCCAlgorithm3DES,
161 kCCAlgorithmCAST, kCCAlgorithmCAST, kCCAlgorithmCAST,
162 kCCAlgorithmRC4, kCCAlgorithmRC4, kCCAlgorithmRC4};
164 static const unsigned kTestBitSizes[kNTests] = {
170 for (int i=0; i<kNTests; i++)
171 testSymmetricKey(kTestAlgorithms[i], kTestBitSizes[i]);
176 #pragma mark KEY-PAIRS:
179 static void TestUseKeyPair(MYPrivateKey *pair) {
180 Log(@"---- TestUseKeyPair { %@ , %@ }.", pair, pair.publicKey);
182 CAssert(pair.keyRef);
183 MYPublicKey *publicKey = pair.publicKey;
184 CAssert(publicKey.keyRef);
186 NSData *pubKeyData = publicKey.keyData;
187 Log(@"Public key = %@ (%u bytes)",pubKeyData,pubKeyData.length);
190 MYSHA1Digest *pubKeyDigest = publicKey.publicKeyDigest;
191 Log(@"Public key digest = %@",pubKeyDigest);
192 CAssertEqual(pair.publicKeyDigest, pubKeyDigest);
194 Log(@"SHA1 of pub key = %@", pubKeyData.my_SHA1Digest.asData);
197 NSData *data = [@"This is a test. This is only a test!" dataUsingEncoding: NSUTF8StringEncoding];
198 NSData *sig = [pair signData: data];
199 Log(@"Signature = %@ (%u bytes)",sig,sig.length);
201 CAssert( [publicKey verifySignature: sig ofData: data] );
203 // Now let's encrypt...
204 NSData *crypted = [publicKey encryptData: data];
205 Log(@"Encrypted = %@ (%u bytes)",crypted,crypted.length);
207 CAssertEqual([pair decryptData: crypted], data);
208 Log(@"Verified decryption.");
210 // Test creating a standalone public key:
211 MYPublicKey *pub = [[MYPublicKey alloc] initWithKeyRef: publicKey.keyRef];
212 CAssert( [pub verifySignature: sig ofData: data] );
213 Log(@"Verified signature.");
215 // Test creating a public key from data:
216 Log(@"Reconstituting public key from data...");
217 pub = [[MYPublicKey alloc] initWithKeyData: pubKeyData];
219 CAssertEqual(pub.keyData, pubKeyData);
220 CAssertEqual(pub.publicKeyDigest, pubKeyDigest);
221 CAssert( [pub verifySignature: sig ofData: data] );
222 Log(@"Verified signature from reconstituted key.");
226 TestCase(MYGenerateKeyPair) {
227 RequireTestCase(MYKeychain);
229 Log(@"Generating key pair...");
230 MYPrivateKey *pair = [[MYKeychain defaultKeychain] generateRSAKeyPairOfSize: kTestCaseRSAKeySize];
231 MYPublicKey *publicKey = pair.publicKey;
232 Log(@"...created { %@ , %@ }.", pair, publicKey);
235 TestUseKeyPair(pair);
237 [pair setName: @"Test KeyPair Label"];
238 CAssertEqual(pair.name, @"Test KeyPair Label");
239 CAssertEqual(publicKey.name, @"Test KeyPair Label");
240 #if !TARGET_OS_IPHONE
241 [pair setComment: @"This key-pair was generated automatically by a test case."];
242 CAssertEqual(pair.comment, @"This key-pair was generated automatically by a test case.");
243 CAssertEqual(publicKey.comment, @"This key-pair was generated automatically by a test case.");
245 [pair setAlias: @"TestCase@mooseyard.com"];
246 CAssertEqual(pair.alias, @"TestCase@mooseyard.com");
247 CAssertEqual(publicKey.alias, @"TestCase@mooseyard.com");
249 CAssert([pair removeFromKeychain]);
250 Log(@"Removed key-pair.");
255 if ([pair removeFromKeychain])
256 Log(@"Removed key-pair from keychain.");
258 Warn(@"Unable to remove test key-pair from keychain");
264 TestCase(MYUseIdentity) {
265 MYIdentity *me = nil;//[MYIdentity preferredIdentityForName: @"MYCryptoTest"];
267 NSArray *idents = [[[MYKeychain allKeychains] enumerateIdentities] allObjects];
268 SFChooseIdentityPanel *panel = [SFChooseIdentityPanel sharedChooseIdentityPanel];
269 [panel setAlternateButtonTitle: @"Cancel"];
270 if ([panel my_runModalForIdentities: idents
271 message: @"Choose an identity for the MYEncoder test case:"]
273 [NSException raise: NSGenericException format: @"User canceled"];
275 me = [panel my_identity];
276 [me makePreferredIdentityForName: @"MYCryptoTest"];
278 CAssert(me,@"No default identity has been set up in the Keychain");
279 TestUseKeyPair(me.privateKey);
284 #pragma mark KEYPAIR EXPORT:
287 static void testKeyPairExportWithPrompt(BOOL withPrompt) {
288 MYKeychain *keychain = [MYKeychain allKeychains];
289 Log(@"Generating key pair...");
290 MYPrivateKey *pair = [keychain generateRSAKeyPairOfSize: kTestCaseRSAKeySize];
292 CAssert(pair.keyRef);
293 CAssert(pair.publicKey.keyRef);
294 Log(@"...created pair.");
297 NSData *pubKeyData = pair.publicKey.keyData;
298 CAssert(pubKeyData.length >= kTestCaseRSAKeySize/8);
299 [pair setName: @"Test KeyPair Label"];
300 CAssertEqual(pair.name, @"Test KeyPair Label");
301 #if !TARGET_OS_IPHONE
302 [pair setComment: @"This key-pair was generated automatically by a test case."];
303 CAssertEqual(pair.comment, @"This key-pair was generated automatically by a test case.");
305 [pair setAlias: @"TestCase@mooseyard.com"];
306 CAssertEqual(pair.alias, @"TestCase@mooseyard.com");
308 #if !TARGET_OS_IPHONE
309 Log(@"Exporting key-pair...");
310 NSString *passphrase = @"passphrase";
313 privKeyData = [pair exportKey];
315 privKeyData = [pair _exportKeyInFormat: kSecFormatWrappedOpenSSL
317 passphrase: passphrase];
318 Log(@"Exported data = %@ (%u bytes)", privKeyData,privKeyData.length);
319 CAssert(privKeyData);
320 [privKeyData writeToFile: @"ExportedPrivKey" atomically: YES];
324 Log(@"Looking up public key of pair in keychain...");
325 MYSHA1Digest *digest = pair.publicKeyDigest;
326 MYPublicKey *foundKey = [keychain publicKeyWithDigest: digest];
327 CAssertEqual(foundKey, pair.publicKey);
328 CAssert([keychain.enumeratePublicKeys.allObjects containsObject: pair.publicKey]);
329 MYPrivateKey *foundPair = [keychain privateKeyWithDigest: digest];
330 CAssertEqual(foundPair, pair);
331 CAssert([keychain.enumeratePrivateKeys.allObjects containsObject: pair]);
333 Log(@"Removing key-pair from keychain...");
334 CAssert([pair removeFromKeychain]);
336 CAssert([keychain publicKeyWithDigest: digest] == nil);
338 #if !TARGET_OS_IPHONE
339 Log(@"Importing key-pair...");
341 pair = [keychain importPublicKey: pubKeyData
342 privateKey: privKeyData];
344 pair = [[[MYPrivateKey alloc] _initWithKeyData: privKeyData
345 publicKeyData: pubKeyData
346 forKeychain: keychain.keychainRefOrDefault
347 passphrase: passphrase]
351 CAssertEqual(pair.publicKey.keyData, pubKeyData);
355 if ([pair removeFromKeychain])
356 Log(@"Removed key-pair from keychain.");
358 Warn(@"Unable to remove test key-pair from keychain");
363 TestCase(KeyPairExport) {
364 RequireTestCase(MYKeychain);
365 RequireTestCase(MYPrivateKey);
366 testKeyPairExportWithPrompt(NO);
369 TestCase(KeyPairExportWithUI) {
370 RequireTestCase(KeyPairExport);
371 testKeyPairExportWithPrompt(YES);