This repository has been archived by the owner on Sep 29, 2024. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 21
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
FIXME: split encryption/decryption objects.
- Loading branch information
Showing
4 changed files
with
268 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,75 @@ | ||
// | ||
// CryptoAEADTests.swift | ||
// TunnelKitOpenVPNTests | ||
// | ||
// Created by Davide De Rosa on 12/12/23. | ||
// Copyright (c) 2023 Davide De Rosa. All rights reserved. | ||
// | ||
// https://github.com/passepartoutvpn | ||
// | ||
// This file is part of TunnelKit. | ||
// | ||
// TunnelKit is free software: you can redistribute it and/or modify | ||
// it under the terms of the GNU General Public License as published by | ||
// the Free Software Foundation, either version 3 of the License, or | ||
// (at your option) any later version. | ||
// | ||
// TunnelKit is distributed in the hope that it will be useful, | ||
// but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
// GNU General Public License for more details. | ||
// | ||
// You should have received a copy of the GNU General Public License | ||
// along with TunnelKit. If not, see <http://www.gnu.org/licenses/>. | ||
// | ||
|
||
import XCTest | ||
@testable import TunnelKitCore | ||
@testable import TunnelKitOpenVPNCore | ||
import CTunnelKitCore | ||
import CTunnelKitOpenVPNProtocol | ||
|
||
class CryptoAEADTests: XCTestCase { | ||
private let cipherKey = ZeroingData(count: 32) | ||
|
||
private let hmacKey = ZeroingData(count: 32) | ||
|
||
private let plainData = Data(hex: "00112233ffddaa") | ||
|
||
func test_givenData_whenEncrypt_thenDecrypts() { | ||
let encryptedData: Data | ||
var flags = cryptoFlags | ||
|
||
let sut1 = CryptoAEAD(cipherName: "aes-256-gcm") | ||
sut1.configureEncryption(withCipherKey: cipherKey, hmacKey: hmacKey) | ||
do { | ||
encryptedData = try sut1.encryptData(plainData, flags: &flags) | ||
} catch { | ||
XCTFail("Cannot encrypt: \(error)") | ||
return | ||
} | ||
|
||
let sut2 = CryptoAEAD(cipherName: "aes-256-gcm") | ||
sut2.configureDecryption(withCipherKey: cipherKey, hmacKey: hmacKey) | ||
do { | ||
let returnedData = try sut2.decryptData(encryptedData, flags: &flags) | ||
XCTAssertEqual(returnedData, plainData) | ||
} catch { | ||
XCTFail("Cannot decrypt: \(error)") | ||
} | ||
} | ||
|
||
private var cryptoFlags: CryptoFlags { | ||
let packetId: [UInt8] = [0x56, 0x34, 0x12, 0x00] | ||
let ad: [UInt8] = [0x00, 0x12, 0x34, 0x56] | ||
return packetId.withUnsafeBufferPointer { iv in | ||
ad.withUnsafeBufferPointer { ad in | ||
CryptoFlags(iv: iv.baseAddress, | ||
ivLength: packetId.count, | ||
ad: ad.baseAddress, | ||
adLength: ad.count, | ||
forTesting: true) | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,117 @@ | ||
// | ||
// CryptoCBCTests.swift | ||
// TunnelKitOpenVPNTests | ||
// | ||
// Created by Davide De Rosa on 12/12/23. | ||
// Copyright (c) 2023 Davide De Rosa. All rights reserved. | ||
// | ||
// https://github.com/passepartoutvpn | ||
// | ||
// This file is part of TunnelKit. | ||
// | ||
// TunnelKit is free software: you can redistribute it and/or modify | ||
// it under the terms of the GNU General Public License as published by | ||
// the Free Software Foundation, either version 3 of the License, or | ||
// (at your option) any later version. | ||
// | ||
// TunnelKit is distributed in the hope that it will be useful, | ||
// but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
// GNU General Public License for more details. | ||
// | ||
// You should have received a copy of the GNU General Public License | ||
// along with TunnelKit. If not, see <http://www.gnu.org/licenses/>. | ||
// | ||
|
||
import XCTest | ||
@testable import TunnelKitCore | ||
@testable import TunnelKitOpenVPNCore | ||
import CTunnelKitCore | ||
import CTunnelKitOpenVPNProtocol | ||
|
||
class CryptoCBCTests: XCTestCase { | ||
private let cipherKey = ZeroingData(count: 32) | ||
|
||
private let hmacKey = ZeroingData(count: 32) | ||
|
||
private let plainData = Data(hex: "00112233ffddaa") | ||
|
||
private let plainHMACData = Data(hex: "8dd324c81ca32f52e4aa1aa35139deba799a68460e80b0e5ac8bceb043edf6e500112233ffddaa") | ||
|
||
private let encryptedHMACData = Data(hex: "fea3fe87ee68eb21c697e62d3c29f7bea2f5b457d9a7fa66291322fc9c2fe6f700000000000000000000000000000000ebe197e706c3c5dcad026f4e3af1048b") | ||
|
||
func test_givenDecrypted_whenEncryptWithoutCipher_thenEncodesWithHMAC() { | ||
let sut = CryptoCBC(cipherName: nil, digestName: "sha256") | ||
sut.configureEncryption(withCipherKey: nil, hmacKey: hmacKey) | ||
|
||
var flags = cryptoFlags | ||
do { | ||
let returnedData = try sut.encryptData(plainData, flags: &flags) | ||
XCTAssertEqual(returnedData, plainHMACData) | ||
} catch { | ||
XCTFail("Cannot encrypt: \(error)") | ||
} | ||
} | ||
|
||
func test_givenDecrypted_whenEncryptWithCipher_thenEncryptsWithHMAC() { | ||
let sut = CryptoCBC(cipherName: "aes-128-cbc", digestName: "sha256") | ||
sut.configureEncryption(withCipherKey: cipherKey, hmacKey: hmacKey) | ||
|
||
var flags = cryptoFlags | ||
do { | ||
let returnedData = try sut.encryptData(plainData, flags: &flags) | ||
XCTAssertEqual(returnedData, encryptedHMACData) | ||
} catch { | ||
XCTFail("Cannot encrypt: \(error)") | ||
} | ||
} | ||
|
||
func test_givenEncodedWithHMAC_thenDecodes() { | ||
let sut = CryptoCBC(cipherName: nil, digestName: "sha256") | ||
sut.configureDecryption(withCipherKey: nil, hmacKey: hmacKey) | ||
|
||
var flags = cryptoFlags | ||
do { | ||
let returnedData = try sut.decryptData(plainHMACData, flags: &flags) | ||
XCTAssertEqual(returnedData, plainData) | ||
} catch { | ||
XCTFail("Cannot decrypt: \(error)") | ||
} | ||
} | ||
|
||
func test_givenEncryptedWithHMAC_thenDecrypts() { | ||
let sut = CryptoCBC(cipherName: "aes-128-cbc", digestName: "sha256") | ||
sut.configureDecryption(withCipherKey: cipherKey, hmacKey: hmacKey) | ||
|
||
var flags = cryptoFlags | ||
do { | ||
let returnedData = try sut.decryptData(encryptedHMACData, flags: &flags) | ||
XCTAssertEqual(returnedData, plainData) | ||
} catch { | ||
XCTFail("Cannot decrypt: \(error)") | ||
} | ||
} | ||
|
||
func test_givenHMAC_thenVerifies() { | ||
let sut = CryptoCBC(cipherName: nil, digestName: "sha256") | ||
sut.configureDecryption(withCipherKey: nil, hmacKey: hmacKey) | ||
|
||
var flags = cryptoFlags | ||
XCTAssertNoThrow(try sut.verifyData(plainHMACData, flags: &flags)) | ||
XCTAssertNoThrow(try sut.verifyData(encryptedHMACData, flags: &flags)) | ||
} | ||
|
||
private var cryptoFlags: CryptoFlags { | ||
let packetId: [UInt8] = [0x56, 0x34, 0x12, 0x00] | ||
let ad: [UInt8] = [0x00, 0x12, 0x34, 0x56] | ||
return packetId.withUnsafeBufferPointer { iv in | ||
ad.withUnsafeBufferPointer { ad in | ||
CryptoFlags(iv: iv.baseAddress, | ||
ivLength: packetId.count, | ||
ad: ad.baseAddress, | ||
adLength: ad.count, | ||
forTesting: true) | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,75 @@ | ||
// | ||
// CryptoCTRTests.swift | ||
// TunnelKitOpenVPNTests | ||
// | ||
// Created by Davide De Rosa on 12/12/23. | ||
// Copyright (c) 2023 Davide De Rosa. All rights reserved. | ||
// | ||
// https://github.com/passepartoutvpn | ||
// | ||
// This file is part of TunnelKit. | ||
// | ||
// TunnelKit is free software: you can redistribute it and/or modify | ||
// it under the terms of the GNU General Public License as published by | ||
// the Free Software Foundation, either version 3 of the License, or | ||
// (at your option) any later version. | ||
// | ||
// TunnelKit is distributed in the hope that it will be useful, | ||
// but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
// GNU General Public License for more details. | ||
// | ||
// You should have received a copy of the GNU General Public License | ||
// along with TunnelKit. If not, see <http://www.gnu.org/licenses/>. | ||
// | ||
|
||
import XCTest | ||
@testable import TunnelKitCore | ||
@testable import TunnelKitOpenVPNCore | ||
import CTunnelKitCore | ||
import CTunnelKitOpenVPNProtocol | ||
|
||
class CryptoCTRTests: XCTestCase { | ||
private let cipherKey = ZeroingData(count: 32) | ||
|
||
private let hmacKey = ZeroingData(count: 32) | ||
|
||
private let plainData = Data(hex: "00112233ffddaa") | ||
|
||
func test_givenData_whenEncrypt_thenDecrypts() { | ||
let encryptedData: Data | ||
var flags = cryptoFlags | ||
|
||
let sut1 = CryptoCTR(cipherName: "aes-128-ctr", digestName: "sha256") | ||
sut1.configureEncryption(withCipherKey: cipherKey, hmacKey: hmacKey) | ||
do { | ||
encryptedData = try sut1.encryptData(plainData, flags: &flags) | ||
} catch { | ||
XCTFail("Cannot encrypt: \(error)") | ||
return | ||
} | ||
|
||
let sut2 = CryptoCTR(cipherName: "aes-128-ctr", digestName: "sha256") | ||
sut2.configureDecryption(withCipherKey: cipherKey, hmacKey: hmacKey) | ||
do { | ||
let returnedData = try sut2.decryptData(encryptedData, flags: &flags) | ||
XCTAssertEqual(returnedData, plainData) | ||
} catch { | ||
XCTFail("Cannot decrypt: \(error)") | ||
} | ||
} | ||
|
||
private var cryptoFlags: CryptoFlags { | ||
let packetId: [UInt8] = [0x56, 0x34, 0x12, 0x00] | ||
let ad: [UInt8] = [0x00, 0x12, 0x34, 0x56] | ||
return packetId.withUnsafeBufferPointer { iv in | ||
ad.withUnsafeBufferPointer { ad in | ||
CryptoFlags(iv: iv.baseAddress, | ||
ivLength: packetId.count, | ||
ad: ad.baseAddress, | ||
adLength: ad.count, | ||
forTesting: true) | ||
} | ||
} | ||
} | ||
} |