mirror of https://github.com/oxen-io/session-ios
				
				
				
			
			You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			207 lines
		
	
	
		
			7.5 KiB
		
	
	
	
		
			Objective-C
		
	
			
		
		
	
	
			207 lines
		
	
	
		
			7.5 KiB
		
	
	
	
		
			Objective-C
		
	
| //
 | |
| //  Copyright (c) 2017 Open Whisper Systems. All rights reserved.
 | |
| //
 | |
| 
 | |
| #import <XCTest/XCTest.h>
 | |
| #import "Cryptography.h"
 | |
| #import "NSData+Base64.h"
 | |
| 
 | |
| NS_ASSUME_NONNULL_BEGIN
 | |
| 
 | |
| @interface Cryptography (TestingPrivateMethods)
 | |
| 
 | |
| + (nullable NSData *)decryptAESGCMWithInitializationVector:(NSData *)initializationVector
 | |
|                                                 ciphertext:(NSData *)ciphertext
 | |
|                                                    authTag:(NSData *)authTagFromEncrypt
 | |
|                                                        key:(OWSAES256Key *)key;
 | |
| 
 | |
| @end
 | |
| 
 | |
| @interface CryptographyTests : XCTestCase
 | |
| 
 | |
| @end
 | |
| 
 | |
| @interface Cryptography (Test)
 | |
| + (NSData *)truncatedSHA256HMAC:(NSData *)dataToHMAC withHMACKey:(NSData *)HMACKey truncation:(int)bytes;
 | |
| + (NSData *)encryptCBCMode:(NSData *)dataToEncrypt
 | |
|                    withKey:(NSData *)key
 | |
|                     withIV:(NSData *)iv
 | |
|                withVersion:(NSData *)version
 | |
|                withHMACKey:(NSData *)hmacKey
 | |
|               withHMACType:(TSMACType)hmacType
 | |
|               computedHMAC:(NSData **)hmac;
 | |
| 
 | |
| + (NSData *)decryptCBCMode:(NSData *)dataToDecrypt
 | |
|                        key:(NSData *)key
 | |
|                         IV:(NSData *)iv
 | |
|                    version:(NSData *)version
 | |
|                    HMACKey:(NSData *)hmacKey
 | |
|                   HMACType:(TSMACType)hmacType
 | |
|               matchingHMAC:(NSData *)hmac;
 | |
| @end
 | |
| 
 | |
| @implementation CryptographyTests
 | |
| 
 | |
| - (void)testEncryptAttachmentData
 | |
| {
 | |
| 
 | |
|     NSString *plainText = @"SGF3YWlpIGlzIEF3ZXNvbWUh";
 | |
|     NSData *plainTextData = [NSData dataFromBase64String:plainText];
 | |
| 
 | |
|     // Sanity
 | |
|     XCTAssertNotNil(plainTextData);
 | |
| 
 | |
|     NSData *generatedKey;
 | |
|     NSData *generatedDigest;
 | |
| 
 | |
|     NSData *cipherText =
 | |
|         [Cryptography encryptAttachmentData:plainTextData outKey:&generatedKey outDigest:&generatedDigest];
 | |
| 
 | |
|     NSData *decryptedData = [Cryptography decryptAttachment:cipherText withKey:generatedKey digest:generatedDigest];
 | |
| 
 | |
|     XCTAssertEqualObjects(plainTextData, decryptedData);
 | |
| }
 | |
| 
 | |
| - (void)testDecryptAttachmentWithBadKey
 | |
| {
 | |
|     NSString *plainText = @"SGF3YWlpIGlzIEF3ZXNvbWUh";
 | |
|     NSData *plainTextData = [NSData dataFromBase64String:plainText];
 | |
| 
 | |
|     // Sanity
 | |
|     XCTAssertNotNil(plainTextData);
 | |
| 
 | |
|     NSData *generatedKey;
 | |
|     NSData *generatedDigest;
 | |
| 
 | |
|     NSData *cipherText =
 | |
|         [Cryptography encryptAttachmentData:plainTextData outKey:&generatedKey outDigest:&generatedDigest];
 | |
| 
 | |
|     NSData *badKey = [Cryptography generateRandomBytes:64];
 | |
| 
 | |
|     NSData *decryptedData = [Cryptography decryptAttachment:cipherText withKey:badKey digest:generatedDigest];
 | |
| 
 | |
|     XCTAssertNil(decryptedData);
 | |
| }
 | |
| 
 | |
| - (void)testDecryptAttachmentWithBadDigest
 | |
| {
 | |
|     NSString *plainText = @"SGF3YWlpIGlzIEF3ZXNvbWUh";
 | |
|     NSData *plainTextData = [NSData dataFromBase64String:plainText];
 | |
| 
 | |
|     // Sanity
 | |
|     XCTAssertNotNil(plainTextData);
 | |
| 
 | |
|     NSData *generatedKey;
 | |
|     NSData *generatedDigest;
 | |
| 
 | |
|     NSData *cipherText =
 | |
|         [Cryptography encryptAttachmentData:plainTextData outKey:&generatedKey outDigest:&generatedDigest];
 | |
| 
 | |
|     NSData *badDigest = [Cryptography generateRandomBytes:32];
 | |
| 
 | |
|     NSData *decryptedData = [Cryptography decryptAttachment:cipherText withKey:generatedKey digest:badDigest];
 | |
| 
 | |
|     XCTAssertNil(decryptedData);
 | |
| }
 | |
| 
 | |
| - (void)testComputeSHA256Digest
 | |
| {
 | |
|     NSString *plainText = @"SGF3YWlpIGlzIEF3ZXNvbWUh";
 | |
|     NSData *plainTextData = [NSData dataFromBase64String:plainText];
 | |
|     NSData *digest = [Cryptography computeSHA256Digest:plainTextData];
 | |
| 
 | |
|     const uint8_t expectedBytes[] = {
 | |
|         0xba, 0x5f, 0xf1, 0x26,
 | |
|         0x82, 0xbb, 0xb2, 0x51,
 | |
|         0x8b, 0xe6, 0x06, 0x48,
 | |
|         0xc5, 0x53, 0xd0, 0xa2,
 | |
|         0xbf, 0x71, 0xf1, 0xec,
 | |
|         0xb4, 0xdb, 0x02, 0x12,
 | |
|         0x5f, 0x80, 0xea, 0x34,
 | |
|         0xc9, 0x8d, 0xee, 0x1f
 | |
|     };
 | |
| 
 | |
|     NSData *expectedDigest = [NSData dataWithBytes:expectedBytes length:32];
 | |
|     XCTAssertEqualObjects(expectedDigest, digest);
 | |
| 
 | |
|     NSData *expectedTruncatedDigest = [NSData dataWithBytes:expectedBytes length:10];
 | |
|     NSData *truncatedDigest = [Cryptography computeSHA256Digest:plainTextData truncatedToBytes:10];
 | |
|     XCTAssertEqualObjects(expectedTruncatedDigest, truncatedDigest);
 | |
| }
 | |
| 
 | |
| - (void)testGCMRoundTrip
 | |
| {
 | |
|     NSData *plainTextData = [@"Super🔥secret🔥test🔥data🏁🏁" dataUsingEncoding:NSUTF8StringEncoding];
 | |
|     // Sanity Check
 | |
|     XCTAssertEqual(39, plainTextData.length);
 | |
| 
 | |
|     OWSAES256Key *key = [OWSAES256Key new];
 | |
|     NSData *_Nullable encryptedData = [Cryptography encryptAESGCMWithData:plainTextData key:key];
 | |
| 
 | |
|     const NSUInteger ivLength = 12;
 | |
|     const NSUInteger tagLength = 16;
 | |
|     
 | |
|     XCTAssertEqual(ivLength + plainTextData.length + tagLength, encryptedData.length);
 | |
| 
 | |
|     NSData *_Nullable decryptedData = [Cryptography decryptAESGCMWithData:encryptedData key:key];
 | |
|     XCTAssert(decryptedData != nil);
 | |
|     XCTAssertEqual(39, decryptedData.length);
 | |
|     XCTAssertEqualObjects(plainTextData, decryptedData);
 | |
|     XCTAssertEqualObjects(@"Super🔥secret🔥test🔥data🏁🏁", [[NSString alloc] initWithData:decryptedData encoding:NSUTF8StringEncoding]);
 | |
| }
 | |
| 
 | |
| - (void)testGCMWithBadTag
 | |
| {
 | |
|     NSData *plainTextData = [@"Super🔥secret🔥test🔥data🏁🏁" dataUsingEncoding:NSUTF8StringEncoding];
 | |
|     // Sanity Check
 | |
|     XCTAssertEqual(39, plainTextData.length);
 | |
| 
 | |
|     OWSAES256Key *key = [OWSAES256Key new];
 | |
|     NSData *_Nullable encryptedData = [Cryptography encryptAESGCMWithData:plainTextData key:key];
 | |
| 
 | |
|     const NSUInteger ivLength = 12;
 | |
|     const NSUInteger tagLength = 16;
 | |
| 
 | |
|     XCTAssertEqual(ivLength + plainTextData.length + tagLength, encryptedData.length);
 | |
| 
 | |
|     // Logic to slice up encryptedData copied from `[Cryptography decryptAESGCMWithData:key:]`
 | |
| 
 | |
|     // encryptedData layout: initializationVector || cipherText || authTag
 | |
|     NSUInteger cipherTextLength = encryptedData.length - ivLength - tagLength;
 | |
| 
 | |
|     NSData *initializationVector = [encryptedData subdataWithRange:NSMakeRange(0, ivLength)];
 | |
|     NSData *cipherText = [encryptedData subdataWithRange:NSMakeRange(ivLength, cipherTextLength)];
 | |
|     NSData *authTag = [encryptedData subdataWithRange:NSMakeRange(ivLength + cipherTextLength, tagLength)];
 | |
| 
 | |
|     NSData *_Nullable decryptedData = [Cryptography decryptAESGCMWithInitializationVector:initializationVector
 | |
|                                                                                ciphertext:cipherText
 | |
|                                                                                   authTag:authTag
 | |
|                                                                                       key:key];
 | |
| 
 | |
|     // Before we corrupt the tag, make sure we can decrypt the text as a sanity check to ensure we divided up the
 | |
|     // encryptedData correctly.
 | |
|     XCTAssert(decryptedData != nil);
 | |
|     XCTAssertEqualObjects(
 | |
|         @"Super🔥secret🔥test🔥data🏁🏁", [[NSString alloc] initWithData:decryptedData encoding:NSUTF8StringEncoding]);
 | |
| 
 | |
|     // Now that we know it decrypts, try again with a bogus authTag
 | |
|     NSMutableData *bogusAuthTag = [authTag mutableCopy];
 | |
| 
 | |
|     // Corrupt one byte in the bogusAuthTag
 | |
|     uint8_t flippedByte;
 | |
|     [bogusAuthTag getBytes:&flippedByte length:1];
 | |
|     flippedByte = flippedByte ^ 0xff;
 | |
|     [bogusAuthTag replaceBytesInRange:NSMakeRange(0, 1) withBytes:&flippedByte];
 | |
| 
 | |
|     decryptedData = [Cryptography decryptAESGCMWithInitializationVector:initializationVector
 | |
|                                                              ciphertext:cipherText
 | |
|                                                                 authTag:bogusAuthTag
 | |
|                                                                     key:key];
 | |
| 
 | |
|     XCTAssertNil(decryptedData, @"Should have failed to decrypt");
 | |
| }
 | |
| 
 | |
| @end
 | |
| 
 | |
| NS_ASSUME_NONNULL_END
 |