1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144
|
/* TestNSString+Crypto.m - this file is part of SOGo
*
* Copyright (C) 2011, 2012 Jeroen Dekkers
* Copyright (C) 2020 Nicolas Höft
*
* Author: Jeroen Dekkers <jeroen@dekkers.ch>
*
* This file is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2, or (at your option)
* any later version.
*
* This file is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; see the file COPYING. If not, write to
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
* Boston, MA 02111-1307, USA.
*/
#import "SOGo/NSString+Crypto.h"
#import "SOGoTest.h"
@interface TestNSData_plus_Crypto : SOGoTest
@end
@implementation TestNSData_plus_Crypto
- (void) test_dataCrypto
{
const char *inStrings[] = { "SOGoSOGoSOGoSOGo", "éléphant", "2š", NULL };
const char **inString;
NSString *MD5Strings[] = { @"d3e8072c49511f099d254cc740c7e12a", @"bc6a1535589d6c3cf7999ac37018c11e", @"886ae9b58817fb8a63902feefcd18812" };
NSString *SHA1Strings[] = { @"b7d891e0f3b42898fa66627b5cfa3d80501bae46", @"99a02f8802f8ea7e3ad91c4cc4d3ef5a7257c88f", @"32b89f3a9e6078db554cdd39f8571c09de7e8b21" };
NSString **MD5String;
NSString **SHA1String;
NSString *result, *error;
inString = inStrings;
MD5String = MD5Strings;
SHA1String = SHA1Strings;
while (*inString)
{
result = [[NSString stringWithUTF8String: *inString] asMD5String];
error = [NSString stringWithFormat:
@"string '%s' wrong MD5: '%@' (expected '%@')",
*inString, result, *MD5String];
testWithMessage([result isEqualToString: *MD5String], error);
result = [[NSString stringWithUTF8String: *inString] asSHA1String];
error = [NSString stringWithFormat:
@"string '%s' wrong SHA1: '%@' (expected '%@')",
*inString, result, *SHA1String];
testWithMessage([result isEqualToString: *SHA1String], error);
inString++;
MD5String++;
SHA1String++;
}
}
- (void) test_blowfish
{
NSString *error;
// well-known comparison
NSString *blf_key = @"123456";
NSString *blf_hash = @"{BLF-CRYPT}$2a$05$tLVuFQTgdwrZmixu.QMxoedUAUEeIFIBv89Ur5mQ6F1vBL8Vw1mXO";
error = [NSString stringWithFormat:
@"string '%@' wrong BLF-CRYPT: '%@'",
blf_key, blf_hash];
testWithMessage([blf_key isEqualToCrypted:blf_hash withDefaultScheme: @"CRYPT" keyPath: nil], error);
// generate a new blowfish-crypt key
NSString *blf_prefix = @"$2y$05$";
NSString *blf_result = [blf_key asCryptedPassUsingScheme: @"blf-crypt" keyPath: nil];
error = [NSString stringWithFormat:
@"returned hash '%@' has incorrect BLF-CRYPT prefix: '%@'",
blf_result, blf_prefix];
testWithMessage([blf_result hasPrefix: blf_prefix], error);
test([blf_key isEqualToCrypted:blf_result withDefaultScheme: @"BLF-CRYPT" keyPath: nil]);
}
- (void) test_pbkdf2
{
NSString *error;
// well-known comparison
NSString *pbkdf2_key = @"123456";
NSString *pbkdf2_hash = @"{PBKDF2}$1$xbhnwhLxltdS9L5M$5001$f1699047a6132383490817d6e58a5284f13339f0";
NSString *pkbf2_prefix;
NSString *pkbf2_result;
error = [NSString stringWithFormat:
@"string '%@' wrong PBKDF2: '%@'",
pbkdf2_key, pbkdf2_hash];
testWithMessage([pbkdf2_key isEqualToCrypted:pbkdf2_hash withDefaultScheme: @"CRYPT" keyPath: nil], error);
// generate a new pbkdf2-crypt key
pkbf2_prefix = @"$1$";
pkbf2_result = [pbkdf2_key asCryptedPassUsingScheme: @"PBKDF2" keyPath: nil];
error = [NSString stringWithFormat:
@"returned hash '%@' has incorrect PBKDF2 prefix: '%@'",
pkbf2_result, pkbf2_prefix];
testWithMessage([pkbf2_result hasPrefix: pkbf2_prefix], error);
test([pbkdf2_key isEqualToCrypted:pkbf2_result withDefaultScheme: @"PBKDF2" keyPath: nil]);
}
#ifdef HAVE_SODIUM
- (void) test_argon2
{
NSString *error;
// well-known comparison
NSString *cleartext = @"123456";
NSString *hash = @"{ARGON2I}$argon2i$v=19$m=32768,t=4,p=1$HWg68rEbwmY6yrdByJ7U1g$z1c06BysT+51u1RXGtYIknTpA9jAHUfw1dAqPgTiQJ8";
NSString *prefix;
NSString *crypted_hash;
error = [NSString stringWithFormat:
@"string '%@' wrong ARGON2ID: '%@'",
cleartext, hash];
testWithMessage([cleartext isEqualToCrypted:hash withDefaultScheme: @"CRYPT" keyPath: nil], error);
// generate a new argon2id key
prefix = @"$argon2id$";
crypted_hash = [cleartext asCryptedPassUsingScheme: @"ARGON2ID" keyPath: nil];
fprintf(stdout, "hash = %s\n", [crypted_hash UTF8String]);
error = [NSString stringWithFormat:
@"returned hash '%@' has incorrect ARGON2ID prefix: '%@'",
crypted_hash, prefix];
testWithMessage([crypted_hash hasPrefix: prefix], error);
test([cleartext isEqualToCrypted:crypted_hash withDefaultScheme: @"ARGON2ID" keyPath: nil]);
}
#endif /* HAVE_SODUM */
@end
|