forked from matrix-org/matrix-ios-sdk
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathMXAes256KeyBackupTests.m
101 lines (79 loc) · 3.08 KB
/
MXAes256KeyBackupTests.m
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
/*
Copyright 2022 The Matrix.org Foundation C.I.C
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
#import "MXBaseKeyBackupTests.h"
#import "MXAes256BackupAuthData.h"
#import "MXAes256KeyBackupAlgorithm.h"
// Do not bother with retain cycles warnings in tests
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Warc-retain-cycles"
@interface MXAes256KeyBackupTests : MXBaseKeyBackupTests
@end
@implementation MXAes256KeyBackupTests
- (void)setUp
{
MXSDKOptions.sharedInstance.enableSymmetricBackup = YES;
}
- (void)tearDown
{
MXSDKOptions.sharedInstance.enableSymmetricBackup = NO;
}
- (NSString *)algorithm
{
return kMXCryptoAes256KeyBackupAlgorithm;
}
- (BOOL)isUntrusted
{
return MXAes256KeyBackupAlgorithm.isUntrusted;
}
- (MXKeyBackupVersion*)fakeKeyBackupVersion
{
return [MXKeyBackupVersion modelFromJSON:@{
@"algorithm": self.algorithm,
@"auth_data": @{
@"iv": @"abcdefg",
@"mac": @"bvnzmzxbnm",
@"signatures": @{
@"something": @{
@"ed25519:something": @"hijklmnop"
}
}
}
}];
}
/**
Check that `[MXKeyBackup prepareKeyBackupVersion` returns valid data
*/
- (void)testPrepareKeyBackupVersion
{
[matrixSDKTestsE2EData doE2ETestWithAliceAndBobInARoomWithCryptedMessages:self cryptedBob:YES readyToTest:^(MXSession *aliceSession, MXSession *bobSession, NSString *roomId, XCTestExpectation *expectation) {
XCTAssertNotNil(aliceSession.crypto.backup);
XCTAssertFalse(aliceSession.crypto.backup.enabled);
// Check that `[MXKeyBackup prepareKeyBackupVersion` returns valid data
[aliceSession.crypto.backup prepareKeyBackupVersionWithPassword:nil algorithm:self.algorithm success:^(MXMegolmBackupCreationInfo * _Nonnull keyBackupCreationInfo) {
XCTAssertNotNil(keyBackupCreationInfo);
XCTAssertEqualObjects(keyBackupCreationInfo.algorithm, kMXCryptoAes256KeyBackupAlgorithm);
XCTAssertTrue([keyBackupCreationInfo.authData isKindOfClass:MXAes256BackupAuthData.class]);
MXAes256BackupAuthData *authData = (MXAes256BackupAuthData*) keyBackupCreationInfo.authData;
XCTAssertNotNil(authData.iv);
XCTAssertNotNil(authData.mac);
XCTAssertNotNil(authData.signatures);
XCTAssertNotNil(keyBackupCreationInfo.recoveryKey);
[expectation fulfill];
} failure:^(NSError * _Nonnull error) {
XCTFail(@"The request should not fail - NSError: %@", error);
[expectation fulfill];
}];
}];
}
@end
#pragma clang diagnostic pop