forked from swiftlang/swift
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathCryptoTokenKitTests.swift
91 lines (78 loc) · 3.33 KB
/
CryptoTokenKitTests.swift
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
// RUN: %target-typecheck-verify-swift
// REQUIRES: objc_interop
// UNSUPPORTED: OS=watchos
// UNSUPPORTED: OS=tvos
// UNSUPPORTED: OS=ios
import CryptoTokenKit
import Security
if #available(OSX 10.12, *) {
struct TKSmartCardTest {
func t1(manager: TKSmartCardSlotManager, name: String) {
manager.getSlot(withName: name) { (slot: TKSmartCardSlot?) in
let _: TKSmartCardSlot.State = slot!.state
}
}
let p1 = TKSmartCardPINFormat.Charset.numeric
let p2 = TKSmartCardPINFormat.Encoding.ascii
let p3 = TKSmartCardPINFormat.Encoding.bcd
let p4 = TKSmartCardPINFormat.Justification.left
let p5 = TKSmartCardUserInteractionForPINOperation.Completion.key
let p6 = TKSmartCardUserInteractionForSecurePINChange.Confirmation.current
let p7 = TKSmartCardProtocol.t0
let p8 = TKSmartCardProtocol.t1
let p9 = TKSmartCardProtocol.t15
let p10 = TKSmartCardATR.InterfaceGroup()
func t2(card: TKSmartCard) throws {
card.isSensitive = card.isValid
card.transmit(Data()) { (response: Data?, error: Error?) in
}
card.userInteractionForSecurePINVerification(TKSmartCardPINFormat(),
apdu: Data(), pinByteOffset: 0)
card.userInteractionForSecurePINChange(TKSmartCardPINFormat(),
apdu: Data(), currentPINByteOffset: 0, newPINByteOffset: 0)
card.send(ins: 0xa4, p1: 0x04, p2: 0x00, data:Data(), le: 0) {
(response: Data?, sw: UInt16, error: Error?) in
}
card.send(ins: 0xa4, p1: 0x04, p2: 0x00, le: 0) {
(response: Data?, sw: UInt16, error: Error?) in
}
card.send(ins: 0xa4, p1: 0x04, p2: 0x00, data:Data()) {
(response: Data?, sw: UInt16, error: Error?) in
}
card.send(ins: 0xa4, p1: 0x04, p2: 0x00) {
(response: Data?, sw: UInt16, error: Error?) in
}
let _: Int = try card.withSession() {
let (_, _): (UInt16, Data) = try card.send(ins: 0xa4, p1: 0x04,
p2: 0x00, data: Data(), le: 0)
let (_, _): (UInt16, Data) = try card.send(ins: 0xa4, p1: 0x04,
p2: 0x00, le: 0)
let (_, _): (UInt16, Data) = try card.send(ins: 0xa4, p1: 0x04,
p2: 0x00, data: Data())
let (_, _): (UInt16, Data) = try card.send(ins: 0xa4, p1: 0x04,
p2: 0x00)
return 1
}
}
}
struct TKTokenTest {
func f1(session: TKTokenSession, sessionDelegate: TKTokenSessionDelegate,
algorithm: TKTokenKeyAlgorithm,
parameters: TKTokenKeyExchangeParameters) throws {
let _: Bool = sessionDelegate.tokenSession!(session, supports: .none,
keyObjectID: "", algorithm: algorithm)
let _: Data = try sessionDelegate.tokenSession!(session, sign: Data(),
keyObjectID: "", algorithm: algorithm)
let _: Data = try sessionDelegate.tokenSession!(session, decrypt: Data(),
keyObjectID: "", algorithm: algorithm)
let _: Data = try sessionDelegate.tokenSession!(session,
performKeyExchange: Data(), keyObjectID: "", algorithm: algorithm,
parameters: parameters)
let _: Bool = algorithm.isAlgorithm(.rsaSignatureDigestPKCS1v15SHA1)
let _: Bool = algorithm.supportsAlgorithm(.rsaSignatureDigestPKCS1v15SHA1)
}
func f2(token: TKToken, delegate: TKTokenDelegate) throws {
let _: TKTokenSession = try delegate.createSession(token)
}
}
}