From ec0664f767fb0829adefae40649e48cc14f35dbd Mon Sep 17 00:00:00 2001 From: kilavvy <140459108+kilavvy@users.noreply.github.com> Date: Mon, 24 Feb 2025 20:59:13 +0100 Subject: [PATCH] Update RSATests.swift Signed-off-by: kilavvy <140459108+kilavvy@users.noreply.github.com> --- Tests/CryptoSwiftTests/RSATests.swift | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/Tests/CryptoSwiftTests/RSATests.swift b/Tests/CryptoSwiftTests/RSATests.swift index ba7ac314..6b0b57f3 100644 --- a/Tests/CryptoSwiftTests/RSATests.swift +++ b/Tests/CryptoSwiftTests/RSATests.swift @@ -459,12 +459,12 @@ final class RSATests: XCTestCase { } else { // Ensure the signature is valid for the test fixtures rawMessage XCTAssertTrue(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes, for: message.key.bytes, variant: variant), "Signature<\(test.key)>::Verification Failed") - // Ensure a modifed message results in a false / invalid signature verification + // Ensure a modified message results in a false / invalid signature verification XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes, for: message.key.bytes + [0x00], variant: variant), "Signature<\(test.key)>::Verified a signature for an incorrect message `\(message.key)`") if !message.key.bytes.isEmpty { XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes, for: message.key.bytes.dropLast(), variant: variant), "Signature<\(test.key)>::Verified a signature for an incorrect message `\(message.key)`") } - // Ensure a modifed signature results in a false / invalid signature verification (we replace the last element with a 1 in case the signature is all 0's) + // Ensure a modified signature results in a false / invalid signature verification (we replace the last element with a 1 in case the signature is all 0's) XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes.shuffled().dropLast() + [0x01], for: message.key.bytes, variant: variant), "Signature<\(test.key)>::Verified a False signature for message `\(message.key)`") // Ensure an invalid signature results in an error being thrown XCTAssertThrowsError(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes.dropLast(), for: message.key.bytes, variant: variant), "Signature<\(test.key)>::Verified a False signature for message `\(message.key)`") @@ -557,12 +557,12 @@ final class RSATests: XCTestCase { // Ensure the signature is valid for the test fixtures rawMessage XCTAssertTrue(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes, for: message.key.bytes, variant: variant), "Signature<\(test.key)>::Verification Failed") - // Ensure a modifed message results in a false / invalid signature verification + // Ensure a modified message results in a false / invalid signature verification XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes, for: message.key.bytes + [0x00], variant: variant), "Signature<\(test.key)>::Verified a signature for an incorrect message `\(message.key)`") if !message.key.bytes.isEmpty { XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes, for: message.key.bytes.dropLast(), variant: variant), "Signature<\(test.key)>::Verified a signature for an incorrect message `\(message.key)`") } - // Ensure a modifed signature results in a false / invalid signature verification (we replace the last element with a 1 in case the signature is all 0's) + // Ensure a modified signature results in a false / invalid signature verification (we replace the last element with a 1 in case the signature is all 0's) XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes.shuffled().dropLast() + [0x01], for: message.key.bytes, variant: variant), "Signature<\(test.key)>::Verified a False signature for message `\(message.key)`") // Ensure an invalid signature results in an error being thrown XCTAssertThrowsError(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes.dropLast(), for: message.key.bytes, variant: variant), "Signature<\(test.key)>::Verified a False signature for message `\(message.key)`")