sogo/Tests/Unit/TestNSString+Crypto.m
Nicolas Höft 4c27826fb5 feat(core): Support ARGON2I/ARGON2ID password hashes
Requires libsodium ≥ 1.0.9 to be present at compile time.

Thus, the following distributions will have support for at least
ARGON2i:

* rhel ≥ 7 (with EPEL enabled)
* Debian ≥ 9 (stretch)
* Ubuntu ≥ Bionic (18.04)

Fixes #4895
2020-07-01 11:20:31 +02:00

145 lines
5.3 KiB
Objective-C

/* TestNSString+Crypto.m - this file is part of SOGo
*
* Copyright (C) 2011, 2012 Jeroen Dekkers
* Copyright (C) 2020 Nicolas Höft
*
* Author: Jeroen Dekkers <jeroen@dekkers.ch>
*
* This file is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2, or (at your option)
* any later version.
*
* This file is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; see the file COPYING. If not, write to
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
* Boston, MA 02111-1307, USA.
*/
#import "SOGo/NSString+Crypto.h"
#import "SOGoTest.h"
@interface TestNSData_plus_Crypto : SOGoTest
@end
@implementation TestNSData_plus_Crypto
- (void) test_dataCrypto
{
const char *inStrings[] = { "SOGoSOGoSOGoSOGo", "éléphant", "", NULL };
const char **inString;
NSString *MD5Strings[] = { @"d3e8072c49511f099d254cc740c7e12a", @"bc6a1535589d6c3cf7999ac37018c11e", @"886ae9b58817fb8a63902feefcd18812" };
NSString *SHA1Strings[] = { @"b7d891e0f3b42898fa66627b5cfa3d80501bae46", @"99a02f8802f8ea7e3ad91c4cc4d3ef5a7257c88f", @"32b89f3a9e6078db554cdd39f8571c09de7e8b21" };
NSString **MD5String;
NSString **SHA1String;
NSString *result, *error;
inString = inStrings;
MD5String = MD5Strings;
SHA1String = SHA1Strings;
while (*inString)
{
result = [[NSString stringWithUTF8String: *inString] asMD5String];
error = [NSString stringWithFormat:
@"string '%s' wrong MD5: '%@' (expected '%@')",
*inString, result, *MD5String];
testWithMessage([result isEqualToString: *MD5String], error);
result = [[NSString stringWithUTF8String: *inString] asSHA1String];
error = [NSString stringWithFormat:
@"string '%s' wrong SHA1: '%@' (expected '%@')",
*inString, result, *SHA1String];
testWithMessage([result isEqualToString: *SHA1String], error);
inString++;
MD5String++;
SHA1String++;
}
}
- (void) test_blowfish
{
NSString *error;
// well-known comparison
NSString *blf_key = @"123456";
NSString *blf_hash = @"{BLF-CRYPT}$2a$05$tLVuFQTgdwrZmixu.QMxoedUAUEeIFIBv89Ur5mQ6F1vBL8Vw1mXO";
error = [NSString stringWithFormat:
@"string '%@' wrong BLF-CRYPT: '%@'",
blf_key, blf_hash];
testWithMessage([blf_key isEqualToCrypted:blf_hash withDefaultScheme: @"CRYPT" keyPath: nil], error);
// generate a new blowfish-crypt key
NSString *blf_prefix = @"$2y$05$";
NSString *blf_result = [blf_key asCryptedPassUsingScheme: @"blf-crypt" keyPath: nil];
error = [NSString stringWithFormat:
@"returned hash '%@' has incorrect BLF-CRYPT prefix: '%@'",
blf_result, blf_prefix];
testWithMessage([blf_result hasPrefix: blf_prefix], error);
test([blf_key isEqualToCrypted:blf_result withDefaultScheme: @"BLF-CRYPT" keyPath: nil]);
}
- (void) test_pbkdf2
{
NSString *error;
// well-known comparison
NSString *pbkdf2_key = @"123456";
NSString *pbkdf2_hash = @"{PBKDF2}$1$xbhnwhLxltdS9L5M$5001$f1699047a6132383490817d6e58a5284f13339f0";
NSString *pkbf2_prefix;
NSString *pkbf2_result;
error = [NSString stringWithFormat:
@"string '%@' wrong PBKDF2: '%@'",
pbkdf2_key, pbkdf2_hash];
testWithMessage([pbkdf2_key isEqualToCrypted:pbkdf2_hash withDefaultScheme: @"CRYPT" keyPath: nil], error);
// generate a new pbkdf2-crypt key
pkbf2_prefix = @"$1$";
pkbf2_result = [pbkdf2_key asCryptedPassUsingScheme: @"PBKDF2" keyPath: nil];
error = [NSString stringWithFormat:
@"returned hash '%@' has incorrect PBKDF2 prefix: '%@'",
pkbf2_result, pkbf2_prefix];
testWithMessage([pkbf2_result hasPrefix: pkbf2_prefix], error);
test([pbkdf2_key isEqualToCrypted:pkbf2_result withDefaultScheme: @"PBKDF2" keyPath: nil]);
}
#ifdef HAVE_SODIUM
- (void) test_argon2
{
NSString *error;
// well-known comparison
NSString *cleartext = @"123456";
NSString *hash = @"{ARGON2I}$argon2i$v=19$m=32768,t=4,p=1$HWg68rEbwmY6yrdByJ7U1g$z1c06BysT+51u1RXGtYIknTpA9jAHUfw1dAqPgTiQJ8";
NSString *prefix;
NSString *crypted_hash;
error = [NSString stringWithFormat:
@"string '%@' wrong ARGON2ID: '%@'",
cleartext, hash];
testWithMessage([cleartext isEqualToCrypted:hash withDefaultScheme: @"CRYPT" keyPath: nil], error);
// generate a new argon2id key
prefix = @"$argon2id$";
crypted_hash = [cleartext asCryptedPassUsingScheme: @"ARGON2ID" keyPath: nil];
fprintf(stdout, "hash = %s\n", [crypted_hash UTF8String]);
error = [NSString stringWithFormat:
@"returned hash '%@' has incorrect ARGON2ID prefix: '%@'",
crypted_hash, prefix];
testWithMessage([crypted_hash hasPrefix: prefix], error);
test([cleartext isEqualToCrypted:crypted_hash withDefaultScheme: @"ARGON2ID" keyPath: nil]);
}
#endif /* HAVE_SODUM */
@end