|
22 | 22 |
|
23 | 23 | #import "Specta.h"
|
24 | 24 | #import "A0SimpleKeychain.h"
|
| 25 | +#import "A0SimpleKeychain+KeyPair.h" |
25 | 26 |
|
| 27 | +#define kPublicKeyTag @"public" |
| 28 | +#define kPrivateKeyTag @"private" |
26 | 29 |
|
27 | 30 | SpecBegin(A0SimpleKeychain)
|
28 | 31 |
|
|
206 | 209 | expect([keychain dataForKey:key]).notTo.beNil();
|
207 | 210 | });
|
208 | 211 | });
|
| 212 | + |
| 213 | + describe(@"generate key pair", ^{ |
| 214 | + |
| 215 | + beforeEach(^{ |
| 216 | + keychain = [A0SimpleKeychain keychain]; |
| 217 | + }); |
| 218 | + |
| 219 | + afterEach(^{ |
| 220 | + [keychain deleteRSAKeyWithTag:kPublicKeyTag]; |
| 221 | + [keychain deleteRSAKeyWithTag:kPrivateKeyTag]; |
| 222 | + }); |
| 223 | + |
| 224 | + it(@"should generate a key pair", ^{ |
| 225 | + [keychain generateRSAKeyPairWithLength:A0SimpleKeychainRSAKeySize1024Bits |
| 226 | + publicKeyTag:kPublicKeyTag |
| 227 | + privateKeyTag:kPrivateKeyTag]; |
| 228 | + expect([keychain dataForRSAKeyWithTag:kPublicKeyTag]).notTo.beNil(); |
| 229 | + expect([keychain dataForRSAKeyWithTag:kPrivateKeyTag]).notTo.beNil(); |
| 230 | + }); |
| 231 | + |
| 232 | + sharedExamplesFor(@"failed RSA key generation", ^(NSDictionary *data) { |
| 233 | + |
| 234 | + it(@"should fail with NSAssert", ^{ |
| 235 | + expect(^{ |
| 236 | + [keychain generateRSAKeyPairWithLength:A0SimpleKeychainRSAKeySize1024Bits |
| 237 | + publicKeyTag:data[@"publicTag"] |
| 238 | + privateKeyTag:data[@"privateTag"]]; |
| 239 | + }).to.raise(NSInternalInconsistencyException); |
| 240 | + }); |
| 241 | + |
| 242 | + }); |
| 243 | + |
| 244 | + itShouldBehaveLike(@"failed RSA key generation", @{ |
| 245 | + @"publicTag": kPublicKeyTag, |
| 246 | + }); |
| 247 | + |
| 248 | + itShouldBehaveLike(@"failed RSA key generation", @{ |
| 249 | + @"privateTag": kPrivateKeyTag, |
| 250 | + }); |
| 251 | + |
| 252 | + itShouldBehaveLike(@"failed RSA key generation", @{}); |
| 253 | + }); |
| 254 | + |
| 255 | + describe(@"obtain RSA key as NSData", ^{ |
| 256 | + |
| 257 | + beforeEach(^{ |
| 258 | + keychain = [A0SimpleKeychain keychain]; |
| 259 | + [keychain generateRSAKeyPairWithLength:A0SimpleKeychainRSAKeySize1024Bits |
| 260 | + publicKeyTag:kPublicKeyTag |
| 261 | + privateKeyTag:kPrivateKeyTag]; |
| 262 | + }); |
| 263 | + |
| 264 | + afterEach(^{ |
| 265 | + [keychain deleteRSAKeyWithTag:kPublicKeyTag]; |
| 266 | + [keychain deleteRSAKeyWithTag:kPrivateKeyTag]; |
| 267 | + }); |
| 268 | + |
| 269 | + it(@"should obtain keys", ^{ |
| 270 | + expect([keychain dataForRSAKeyWithTag:kPublicKeyTag]).notTo.beNil(); |
| 271 | + expect([keychain dataForRSAKeyWithTag:kPrivateKeyTag]).notTo.beNil(); |
| 272 | + }); |
| 273 | + }); |
| 274 | + |
| 275 | + describe(@"check if RSA key exists", ^{ |
| 276 | + |
| 277 | + beforeEach(^{ |
| 278 | + keychain = [A0SimpleKeychain keychain]; |
| 279 | + [keychain generateRSAKeyPairWithLength:A0SimpleKeychainRSAKeySize1024Bits |
| 280 | + publicKeyTag:kPublicKeyTag |
| 281 | + privateKeyTag:kPrivateKeyTag]; |
| 282 | + }); |
| 283 | + |
| 284 | + afterEach(^{ |
| 285 | + [keychain deleteRSAKeyWithTag:kPublicKeyTag]; |
| 286 | + [keychain deleteRSAKeyWithTag:kPrivateKeyTag]; |
| 287 | + }); |
| 288 | + |
| 289 | + it(@"should check if the key exists", ^{ |
| 290 | + expect([keychain hasRSAKeyWithTag:kPublicKeyTag]).to.beTruthy(); |
| 291 | + expect([keychain hasRSAKeyWithTag:kPrivateKeyTag]).to.beTruthy(); |
| 292 | + }); |
| 293 | + |
| 294 | + it(@"should return NO for nonexisting key", ^{ |
| 295 | + expect([keychain hasRSAKeyWithTag:@"NONEXISTENT"]).to.beFalsy(); |
| 296 | + }); |
| 297 | + }); |
| 298 | + |
| 299 | + |
209 | 300 | });
|
210 | 301 |
|
211 | 302 | SpecEnd
|
0 commit comments