|
@@ -167,9 +167,9 @@ class BlowfishTests: XCTestCase {
|
|
|
}
|
|
|
|
|
|
func testCBCZeroPadding() {
|
|
|
- let key = Array<UInt8>.init(hex: "0123456789ABCDEFF0E1D2C3B4A59687")
|
|
|
- let iv = Array<UInt8>.init(hex: "FEDCBA9876543210")
|
|
|
- let input = Array<UInt8>.init(hex: "37363534333231204E6F77206973207468652074696D6520666F722000")
|
|
|
+ let key = Array<UInt8>(hex: "0123456789ABCDEFF0E1D2C3B4A59687")
|
|
|
+ let iv = Array<UInt8>(hex: "FEDCBA9876543210")
|
|
|
+ let input = Array<UInt8>(hex: "37363534333231204E6F77206973207468652074696D6520666F722000")
|
|
|
XCTAssertEqual(try Blowfish(key: key, blockMode: .CBC(iv: iv), padding: .zeroPadding).encrypt(input), Array<UInt8>(hex: "6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC"))
|
|
|
}
|
|
|
|
|
@@ -192,8 +192,10 @@ class BlowfishTests: XCTestCase {
|
|
|
func testDecryptCFB415() {
|
|
|
do {
|
|
|
let plaintext = Array("secret12".utf8)
|
|
|
- let encrypted = try Blowfish(key: Array("passwordpassword".utf8), blockMode: .CFB(iv: Array("12345678".utf8)), padding: .noPadding).encrypt(plaintext)
|
|
|
- let decrypted = try Blowfish(key: Array("passwordpassword".utf8), blockMode: .CFB(iv: Array("12345678".utf8)), padding: .noPadding).decrypt(encrypted)
|
|
|
+ let key = Array("passwordpassword".utf8)
|
|
|
+ let iv = Array("12345678".utf8)
|
|
|
+ let encrypted = try Blowfish(key: key, blockMode: .CFB(iv: iv), padding: .noPadding).encrypt(plaintext)
|
|
|
+ let decrypted = try Blowfish(key: key, blockMode: .CFB(iv: iv), padding: .noPadding).decrypt(encrypted)
|
|
|
XCTAssertEqual(plaintext, decrypted)
|
|
|
} catch {
|
|
|
XCTFail(error.localizedDescription)
|