diff --git a/Sources/CTunnelKitCore/ZeroingData.m b/Sources/CTunnelKitCore/ZeroingData.m index 4b53ee57..e8076ab3 100644 --- a/Sources/CTunnelKitCore/ZeroingData.m +++ b/Sources/CTunnelKitCore/ZeroingData.m @@ -55,6 +55,7 @@ - (instancetype)initWithCount:(NSInteger)count if ((self = [super init])) { _count = count; _bytes = allocate_safely(count); + bzero(_bytes, _count); } return self; } diff --git a/Tests/TunnelKitOpenVPNTests/CryptoAEADTests.swift b/Tests/TunnelKitOpenVPNTests/CryptoAEADTests.swift new file mode 100644 index 00000000..2b1f955e --- /dev/null +++ b/Tests/TunnelKitOpenVPNTests/CryptoAEADTests.swift @@ -0,0 +1,75 @@ +// +// CryptoAEADTests.swift +// TunnelKitOpenVPNTests +// +// Created by Davide De Rosa on 12/12/23. +// Copyright (c) 2023 Davide De Rosa. All rights reserved. +// +// https://github.com/passepartoutvpn +// +// This file is part of TunnelKit. +// +// TunnelKit is free software: you can redistribute it and/or modify +// it under the terms of the GNU General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// TunnelKit is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU General Public License for more details. +// +// You should have received a copy of the GNU General Public License +// along with TunnelKit. If not, see . +// + +import XCTest +@testable import TunnelKitCore +@testable import TunnelKitOpenVPNCore +import CTunnelKitCore +import CTunnelKitOpenVPNProtocol + +class CryptoAEADTests: XCTestCase { + private let cipherKey = ZeroingData(count: 32) + + private let hmacKey = ZeroingData(count: 32) + + private let plainData = Data(hex: "00112233ffddaa") + + func test_givenData_whenEncrypt_thenDecrypts() { + let encryptedData: Data + var flags = cryptoFlags + + let sut1 = CryptoAEAD(cipherName: "aes-256-gcm") + sut1.configureEncryption(withCipherKey: cipherKey, hmacKey: hmacKey) + do { + encryptedData = try sut1.encryptData(plainData, flags: &flags) + } catch { + XCTFail("Cannot encrypt: \(error)") + return + } + + let sut2 = CryptoAEAD(cipherName: "aes-256-gcm") + sut2.configureDecryption(withCipherKey: cipherKey, hmacKey: hmacKey) + do { + let returnedData = try sut2.decryptData(encryptedData, flags: &flags) + XCTAssertEqual(returnedData, plainData) + } catch { + XCTFail("Cannot decrypt: \(error)") + } + } + + private var cryptoFlags: CryptoFlags { + let packetId: [UInt8] = [0x56, 0x34, 0x12, 0x00] + let ad: [UInt8] = [0x00, 0x12, 0x34, 0x56] + return packetId.withUnsafeBufferPointer { iv in + ad.withUnsafeBufferPointer { ad in + CryptoFlags(iv: iv.baseAddress, + ivLength: packetId.count, + ad: ad.baseAddress, + adLength: ad.count, + forTesting: true) + } + } + } +} diff --git a/Tests/TunnelKitOpenVPNTests/CryptoCBCTests.swift b/Tests/TunnelKitOpenVPNTests/CryptoCBCTests.swift new file mode 100644 index 00000000..4d7d26b6 --- /dev/null +++ b/Tests/TunnelKitOpenVPNTests/CryptoCBCTests.swift @@ -0,0 +1,117 @@ +// +// CryptoCBCTests.swift +// TunnelKitOpenVPNTests +// +// Created by Davide De Rosa on 12/12/23. +// Copyright (c) 2023 Davide De Rosa. All rights reserved. +// +// https://github.com/passepartoutvpn +// +// This file is part of TunnelKit. +// +// TunnelKit is free software: you can redistribute it and/or modify +// it under the terms of the GNU General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// TunnelKit is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU General Public License for more details. +// +// You should have received a copy of the GNU General Public License +// along with TunnelKit. If not, see . +// + +import XCTest +@testable import TunnelKitCore +@testable import TunnelKitOpenVPNCore +import CTunnelKitCore +import CTunnelKitOpenVPNProtocol + +class CryptoCBCTests: XCTestCase { + private let cipherKey = ZeroingData(count: 32) + + private let hmacKey = ZeroingData(count: 32) + + private let plainData = Data(hex: "00112233ffddaa") + + private let plainHMACData = Data(hex: "8dd324c81ca32f52e4aa1aa35139deba799a68460e80b0e5ac8bceb043edf6e500112233ffddaa") + + private let encryptedHMACData = Data(hex: "fea3fe87ee68eb21c697e62d3c29f7bea2f5b457d9a7fa66291322fc9c2fe6f700000000000000000000000000000000ebe197e706c3c5dcad026f4e3af1048b") + + func test_givenDecrypted_whenEncryptWithoutCipher_thenEncodesWithHMAC() { + let sut = CryptoCBC(cipherName: nil, digestName: "sha256") + sut.configureEncryption(withCipherKey: nil, hmacKey: hmacKey) + + var flags = cryptoFlags + do { + let returnedData = try sut.encryptData(plainData, flags: &flags) + XCTAssertEqual(returnedData, plainHMACData) + } catch { + XCTFail("Cannot encrypt: \(error)") + } + } + + func test_givenDecrypted_whenEncryptWithCipher_thenEncryptsWithHMAC() { + let sut = CryptoCBC(cipherName: "aes-128-cbc", digestName: "sha256") + sut.configureEncryption(withCipherKey: cipherKey, hmacKey: hmacKey) + + var flags = cryptoFlags + do { + let returnedData = try sut.encryptData(plainData, flags: &flags) + XCTAssertEqual(returnedData, encryptedHMACData) + } catch { + XCTFail("Cannot encrypt: \(error)") + } + } + + func test_givenEncodedWithHMAC_thenDecodes() { + let sut = CryptoCBC(cipherName: nil, digestName: "sha256") + sut.configureDecryption(withCipherKey: nil, hmacKey: hmacKey) + + var flags = cryptoFlags + do { + let returnedData = try sut.decryptData(plainHMACData, flags: &flags) + XCTAssertEqual(returnedData, plainData) + } catch { + XCTFail("Cannot decrypt: \(error)") + } + } + + func test_givenEncryptedWithHMAC_thenDecrypts() { + let sut = CryptoCBC(cipherName: "aes-128-cbc", digestName: "sha256") + sut.configureDecryption(withCipherKey: cipherKey, hmacKey: hmacKey) + + var flags = cryptoFlags + do { + let returnedData = try sut.decryptData(encryptedHMACData, flags: &flags) + XCTAssertEqual(returnedData, plainData) + } catch { + XCTFail("Cannot decrypt: \(error)") + } + } + + func test_givenHMAC_thenVerifies() { + let sut = CryptoCBC(cipherName: nil, digestName: "sha256") + sut.configureDecryption(withCipherKey: nil, hmacKey: hmacKey) + + var flags = cryptoFlags + XCTAssertNoThrow(try sut.verifyData(plainHMACData, flags: &flags)) + XCTAssertNoThrow(try sut.verifyData(encryptedHMACData, flags: &flags)) + } + + private var cryptoFlags: CryptoFlags { + let packetId: [UInt8] = [0x56, 0x34, 0x12, 0x00] + let ad: [UInt8] = [0x00, 0x12, 0x34, 0x56] + return packetId.withUnsafeBufferPointer { iv in + ad.withUnsafeBufferPointer { ad in + CryptoFlags(iv: iv.baseAddress, + ivLength: packetId.count, + ad: ad.baseAddress, + adLength: ad.count, + forTesting: true) + } + } + } +} diff --git a/Tests/TunnelKitOpenVPNTests/CryptoCTRTests.swift b/Tests/TunnelKitOpenVPNTests/CryptoCTRTests.swift new file mode 100644 index 00000000..def3bcd2 --- /dev/null +++ b/Tests/TunnelKitOpenVPNTests/CryptoCTRTests.swift @@ -0,0 +1,75 @@ +// +// CryptoCTRTests.swift +// TunnelKitOpenVPNTests +// +// Created by Davide De Rosa on 12/12/23. +// Copyright (c) 2023 Davide De Rosa. All rights reserved. +// +// https://github.com/passepartoutvpn +// +// This file is part of TunnelKit. +// +// TunnelKit is free software: you can redistribute it and/or modify +// it under the terms of the GNU General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// TunnelKit is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU General Public License for more details. +// +// You should have received a copy of the GNU General Public License +// along with TunnelKit. If not, see . +// + +import XCTest +@testable import TunnelKitCore +@testable import TunnelKitOpenVPNCore +import CTunnelKitCore +import CTunnelKitOpenVPNProtocol + +class CryptoCTRTests: XCTestCase { + private let cipherKey = ZeroingData(count: 32) + + private let hmacKey = ZeroingData(count: 32) + + private let plainData = Data(hex: "00112233ffddaa") + + func test_givenData_whenEncrypt_thenDecrypts() { + let encryptedData: Data + var flags = cryptoFlags + + let sut1 = CryptoCTR(cipherName: "aes-128-ctr", digestName: "sha256") + sut1.configureEncryption(withCipherKey: cipherKey, hmacKey: hmacKey) + do { + encryptedData = try sut1.encryptData(plainData, flags: &flags) + } catch { + XCTFail("Cannot encrypt: \(error)") + return + } + + let sut2 = CryptoCTR(cipherName: "aes-128-ctr", digestName: "sha256") + sut2.configureDecryption(withCipherKey: cipherKey, hmacKey: hmacKey) + do { + let returnedData = try sut2.decryptData(encryptedData, flags: &flags) + XCTAssertEqual(returnedData, plainData) + } catch { + XCTFail("Cannot decrypt: \(error)") + } + } + + private var cryptoFlags: CryptoFlags { + let packetId: [UInt8] = [0x56, 0x34, 0x12, 0x00] + let ad: [UInt8] = [0x00, 0x12, 0x34, 0x56] + return packetId.withUnsafeBufferPointer { iv in + ad.withUnsafeBufferPointer { ad in + CryptoFlags(iv: iv.baseAddress, + ivLength: packetId.count, + ad: ad.baseAddress, + adLength: ad.count, + forTesting: true) + } + } + } +}