MYCryptoTest.m
author snej@snej.local
Sat Apr 04 22:56:13 2009 -0700 (2009-04-04)
changeset 1 60e4cbbb5128
parent 0 0a6527af039b
child 2 8982b8fada63
permissions -rw-r--r--
Code cleanup, more header comments.
     1 //
     2 //  MYCryptoTest.m
     3 //  MYCrypto-iPhone
     4 //
     5 //  Created by Jens Alfke on 4/1/09.
     6 //  Copyright 2009 Jens Alfke. All rights reserved.
     7 //
     8 
     9 #import "MYKeyPair.h"
    10 #import "MYKeychain.h"
    11 #import "MYDigest.h"
    12 #import "MYCrypto_Private.h"
    13 
    14 
    15 #if DEBUG
    16 
    17 #pragma mark -
    18 #pragma mark KEYCHAIN:
    19 
    20 
    21 TestCase(MYKeychain) {
    22     MYKeychain *kc = [MYKeychain defaultKeychain];
    23     Log(@"Default keychain = %@", kc);
    24     CAssert(kc);
    25 #if !USE_IPHONE_API
    26     CAssert(kc.path);
    27 #endif
    28     
    29     kc = [MYKeychain allKeychains];
    30     Log(@"All-keychains = %@", kc);
    31     CAssert(kc);
    32 #if !USE_IPHONE_API
    33     CAssertEq(kc.path,nil);
    34 #endif
    35 }
    36 
    37 
    38 TestCase(EnumerateKeys) {
    39     RequireTestCase(MYKeychain);
    40     NSEnumerator *e = [[MYKeychain allKeychains] enumeratePublicKeys];
    41     Log(@"Public Key Enumerator = %@", e);
    42     CAssert(e);
    43     for (MYPublicKey *key in e) {
    44         Log(@"Found %@ -- name=%@", key, key.name);
    45     }
    46     
    47     e = [[MYKeychain allKeychains] enumerateKeyPairs];
    48     Log(@"Key-Pair Enumerator = %@", e);
    49     CAssert(e);
    50     for (MYKeyPair *key in e) {
    51         Log(@"Found %@ -- name=%@", key, key.name);
    52     }
    53     
    54     e = [[MYKeychain allKeychains] enumerateSymmetricKeys];
    55     Log(@"Symmetric Key Enumerator = %@", e);
    56     CAssert(e);
    57     for (MYSymmetricKey *key in e) {
    58         Log(@"Found %@ -- name=%@", key, key.name);
    59     }
    60 }
    61 
    62 
    63 TestCase(EnumerateCerts) {
    64     RequireTestCase(MYKeychain);
    65     NSEnumerator *e = [[MYKeychain allKeychains] enumerateCertificates];
    66     Log(@"Enumerator = %@", e);
    67     CAssert(e);
    68     for (MYCertificate *cert in e) {
    69         //Log(@"Found %@ -- name=%@, email=%@", cert, cert.commonName, cert.emailAddresses);
    70     }
    71 }
    72 
    73 
    74 #pragma mark -
    75 #pragma mark SYMMETRIC KEYS:
    76 
    77 
    78 TestCase(MYSymmetricKey) {
    79     #define kNTests 11
    80     static const CCAlgorithm kTestAlgorithms[kNTests] = {
    81         kCCAlgorithmAES128, kCCAlgorithmAES128, kCCAlgorithmAES128,
    82         kCCAlgorithmDES, kCCAlgorithm3DES,
    83         kCCAlgorithmCAST, kCCAlgorithmCAST, kCCAlgorithmCAST,
    84         kCCAlgorithmRC4, kCCAlgorithmRC4, kCCAlgorithmRC4};
    85     
    86     static const unsigned kTestBitSizes[kNTests] = {
    87         128, 192, 256,
    88         64, 3*64,
    89         40, 80, 128,
    90         32, 200, 512*8};
    91 
    92     for (int i=0; i<kNTests; i++) {
    93         NSAutoreleasePool *pool = [NSAutoreleasePool new];
    94         Log(@"Test #%2i: algorithm = %3u-bit #%i", i+1, kTestBitSizes[i], (int)kTestAlgorithms[i]);
    95         // Generate key:
    96         MYSymmetricKey *key = [MYSymmetricKey generateSymmetricKeyOfSize: kTestBitSizes[i]
    97                                                                algorithm: kTestAlgorithms[i]];
    98         CAssert(key);
    99 #if !TARGET_OS_IPHONE
   100         CAssert(key.cssmKey != NULL);
   101 #endif
   102         Log(@"Key data = %@", key.keyData);
   103         CAssertEq(key.keyData.length, kTestBitSizes[i]/8);
   104 
   105         // Encrypt a small amount of text:
   106         NSData *cleartext = [@"This is a test. This is only a test." dataUsingEncoding: NSUTF8StringEncoding];
   107         NSData *encrypted = [key encryptData: cleartext];
   108         Log(@"Encrypted = %u bytes: %@", encrypted.length, encrypted);
   109         CAssert(encrypted.length >= cleartext.length);
   110         NSData *decrypted = [key decryptData: encrypted];
   111         CAssertEqual(decrypted, cleartext);
   112         
   113         // Encrypt large binary data:
   114         cleartext = [NSData dataWithContentsOfFile: @"/Library/Desktop Pictures/Nature/Zen Garden.jpg"];
   115         CAssert(cleartext);
   116         encrypted = [key encryptData: cleartext];
   117         Log(@"Encrypted = %u bytes", encrypted.length);
   118         CAssert(encrypted.length >= cleartext.length);
   119         decrypted = [key decryptData: encrypted];
   120         CAssertEqual(decrypted, cleartext);
   121         
   122         [pool drain];
   123     }
   124 }
   125 
   126 
   127 #pragma mark -
   128 #pragma mark KEY-PAIRS:
   129 
   130 
   131 TestCase(KeyPair) {
   132     RequireTestCase(MYKeychain);
   133     
   134     Log(@"Generating key pair...");
   135     MYKeyPair *pair = [[MYKeychain defaultKeychain] generateRSAKeyPairOfSize: 512];
   136     CAssert(pair);
   137     CAssert(pair.keyRef);
   138     CAssert(pair.privateKeyRef);
   139     Log(@"...created pair.");
   140     
   141     @try{
   142         [pair setName: @"Test KeyPair Label"];
   143         CAssertEqual(pair.name, @"Test KeyPair Label");
   144 #if !TARGET_OS_IPHONE
   145         [pair setComment: @"This key-pair was generated automatically by a test case."];
   146         CAssertEqual(pair.comment, @"This key-pair was generated automatically by a test case.");
   147 #endif
   148         [pair setAlias: @"TestCase@mooseyard.com"];
   149         CAssertEqual(pair.alias, @"TestCase@mooseyard.com");
   150         
   151         NSData *pubKeyData = pair.keyData;
   152         Log(@"Public key = %@ (%u bytes)",pubKeyData,pubKeyData.length);
   153         CAssert(pubKeyData);
   154         
   155         MYSHA1Digest *pubKeyDigest = pair.publicKeyDigest;
   156         Log(@"Public key digest = %@",pubKeyDigest);
   157         
   158         Log(@"SHA1 of pub key = %@", pubKeyData.my_SHA1Digest.asData);
   159         
   160         NSData *data = [@"This is a test. This is only a test!" dataUsingEncoding: NSUTF8StringEncoding];
   161         NSData *sig = [pair signData: data];
   162         Log(@"Signature = %@ (%u bytes)",sig,sig.length);
   163         CAssert(sig);
   164         CAssert( [pair verifySignature: sig ofData: data] );
   165         
   166         // Test creating a standalone public key:
   167         MYPublicKey *pub = [[MYPublicKey alloc] initWithKeyRef: pair.keyRef];
   168         CAssert( [pub verifySignature: sig ofData: data] );
   169         Log(@"Verified signature.");
   170 
   171         // Test creating a public key from data:
   172         Log(@"Reconstituting public key from data...");
   173         pub = [[MYPublicKey alloc] initWithKeyData: pubKeyData];
   174         CAssert(pub);
   175         CAssertEqual(pub.keyData, pubKeyData);
   176         CAssertEqual(pub.publicKeyDigest, pubKeyDigest);
   177         CAssert( [pub verifySignature: sig ofData: data] );
   178         Log(@"Verified signature from reconstituted key.");
   179                 
   180         // Now let's encrypt...
   181         NSData *crypted = [pub encryptData: data];
   182         Log(@"Encrypted = %@ (%u bytes)",crypted,crypted.length);
   183         CAssert(crypted);
   184         
   185         CAssertEqual([pair decryptData: crypted], data);
   186         Log(@"Verified decryption.");
   187         
   188         CAssert([pair removeFromKeychain]);
   189         Log(@"Removed key-pair.");
   190         pair = nil;
   191         
   192     }@finally {
   193         if (pair) {
   194             if ([pair removeFromKeychain])
   195                 Log(@"Removed key-pair from keychain.");
   196             else
   197                 Warn(@"Unable to remove test key-pair from keychain");
   198         }
   199     }
   200 }
   201 
   202 
   203 
   204 #pragma mark -
   205 #pragma mark KEYPAIR EXPORT:
   206 
   207 
   208 static void testKeyPairExportWithPrompt(BOOL withPrompt) {
   209     MYKeychain *keychain = [MYKeychain allKeychains];
   210     Log(@"Generating key pair...");
   211     MYKeyPair *pair = [keychain generateRSAKeyPairOfSize: 512];
   212     CAssert(pair);
   213     CAssert(pair.keyRef);
   214     CAssert(pair.privateKeyRef);
   215     Log(@"...created pair.");
   216     
   217     @try{
   218         NSData *pubKeyData = pair.keyData;
   219         CAssert(pubKeyData.length >= 512/8);
   220         [pair setName: @"Test KeyPair Label"];
   221         CAssertEqual(pair.name, @"Test KeyPair Label");
   222 #if !TARGET_OS_IPHONE
   223         [pair setComment: @"This key-pair was generated automatically by a test case."];
   224         CAssertEqual(pair.comment, @"This key-pair was generated automatically by a test case.");
   225 #endif
   226         [pair setAlias: @"TestCase@mooseyard.com"];
   227         CAssertEqual(pair.alias, @"TestCase@mooseyard.com");
   228         
   229 #if !TARGET_OS_IPHONE
   230         Log(@"Exporting key-pair...");
   231         NSString *passphrase = @"passphrase";
   232         NSData *privKeyData;
   233         if (withPrompt)
   234             privKeyData = [pair exportPrivateKey];
   235         else
   236             privKeyData = [pair _exportPrivateKeyInFormat: kSecFormatWrappedOpenSSL
   237                                                   withPEM: YES
   238                                                passphrase: passphrase];
   239         Log(@"Exported data = %@ (%u bytes)", privKeyData,privKeyData.length);
   240         CAssert(privKeyData);
   241         [privKeyData writeToFile: @"ExportedPrivKey" atomically: YES];
   242 #endif
   243         
   244         // Check key lookup:
   245         Log(@"Looking up public key of pair in keychain...");
   246         MYSHA1Digest *digest = pair.publicKeyDigest;
   247         MYPublicKey *foundKey = [keychain publicKeyWithDigest: digest];
   248         CAssertEqual(foundKey, pair.asPublicKey);
   249         CAssert([keychain.enumeratePublicKeys.allObjects containsObject: pair.asPublicKey]);
   250         MYKeyPair *foundPair = [keychain keyPairWithDigest: digest];
   251         CAssertEqual(foundPair, pair);
   252         CAssert([keychain.enumerateKeyPairs.allObjects containsObject: pair]);
   253         
   254         Log(@"Removing key-pair from keychain...");
   255         CAssert([pair removeFromKeychain]);
   256         pair = nil;
   257         CAssert([keychain publicKeyWithDigest: digest] == nil);
   258         
   259 #if !TARGET_OS_IPHONE
   260         Log(@"Importing key-pair...");
   261         if (withPrompt) {
   262             pair = [keychain importPublicKey: pubKeyData 
   263                                   privateKey: privKeyData];
   264         } else {
   265             pair = [[[MYKeyPair alloc] _initWithPublicKeyData: pubKeyData
   266                                                privateKeyData: privKeyData
   267                                                   forKeychain: keychain.keychainRefOrDefault
   268                                                    passphrase: passphrase]
   269                     autorelease];
   270         }
   271         CAssert(pair);
   272         CAssertEqual(pair.keyData, pubKeyData);
   273 #endif
   274     }@finally {
   275         if (pair) {
   276             if ([pair removeFromKeychain])
   277                 Log(@"Removed key-pair from keychain.");
   278             else
   279                 Warn(@"Unable to remove test key-pair from keychain");
   280         }
   281     }
   282 }
   283 
   284 TestCase(KeyPairExport) {
   285     RequireTestCase(MYKeychain);
   286     RequireTestCase(KeyPair);
   287     testKeyPairExportWithPrompt(NO);
   288 }
   289 
   290 TestCase(KeyPairExportWithUI) {
   291     RequireTestCase(KeyPairExport);
   292     testKeyPairExportWithPrompt(YES);
   293 }
   294 
   295 
   296 #endif DEBUG
   297