| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| //////////////////////////////////////////////////////////////////////////////// |
| |
| goog.module('tink.subtle.EciesAeadHkdfHybridEncryptTest'); |
| goog.setTestOnly('tink.subtle.EciesAeadHkdfHybridEncryptTest'); |
| |
| const AeadConfig = goog.require('tink.aead.AeadConfig'); |
| const AeadKeyTemplates = goog.require('tink.aead.AeadKeyTemplates'); |
| const EciesAeadHkdfHybridEncrypt = goog.require('tink.subtle.EciesAeadHkdfHybridEncrypt'); |
| const EllipticCurves = goog.require('tink.subtle.EllipticCurves'); |
| const Random = goog.require('tink.subtle.Random'); |
| const Registry = goog.require('tink.Registry'); |
| const RegistryEciesAeadHkdfDemHelper = goog.require('tink.hybrid.RegistryEciesAeadHkdfDemHelper'); |
| |
| describe('ecies aead hkdf hybrid encrypt test', function() { |
| beforeEach(function() { |
| AeadConfig.register(); |
| // Use a generous promise timeout for running continuously. |
| jasmine.DEFAULT_TIMEOUT_INTERVAL = 1000 * 1000; // 1000s |
| }); |
| |
| afterEach(function() { |
| Registry.reset(); |
| // Reset the timeout. |
| jasmine.DEFAULT_TIMEOUT_INTERVAL = 1000; // 1s |
| }); |
| |
| it('new instance, should work', async function() { |
| const keyPair = await EllipticCurves.generateKeyPair('ECDH', 'P-256'); |
| const publicKey = await EllipticCurves.exportCryptoKey(keyPair.publicKey); |
| const hkdfHash = 'SHA-256'; |
| const pointFormat = EllipticCurves.PointFormatType.UNCOMPRESSED; |
| const demHelper = new RegistryEciesAeadHkdfDemHelper( |
| AeadKeyTemplates.aes128CtrHmacSha256()); |
| |
| await EciesAeadHkdfHybridEncrypt.newInstance( |
| publicKey, hkdfHash, pointFormat, demHelper); |
| }); |
| |
| it('encrypt, different arguments', async function() { |
| const hkdfSalt = new Uint8Array(0); |
| const pointFormat = EllipticCurves.PointFormatType.UNCOMPRESSED; |
| const demHelper = new RegistryEciesAeadHkdfDemHelper( |
| AeadKeyTemplates.aes256CtrHmacSha256()); |
| const hmacAlgorithms = ['SHA-1', 'SHA-256', 'SHA-512']; |
| |
| // Test the encryption for different HMAC algorithms and different types of |
| // curves. |
| for (let hkdfHash of hmacAlgorithms) { |
| for (let curve of Object.keys(EllipticCurves.CurveType)) { |
| const curveName = |
| EllipticCurves.curveToString(EllipticCurves.CurveType[curve]); |
| const keyPair = await EllipticCurves.generateKeyPair('ECDH', curveName); |
| const publicKey = |
| await EllipticCurves.exportCryptoKey(keyPair.publicKey); |
| |
| const hybridEncrypt = await EciesAeadHkdfHybridEncrypt.newInstance( |
| publicKey, hkdfHash, pointFormat, demHelper, hkdfSalt); |
| |
| const plaintext = Random.randBytes(15); |
| const ciphertext = await hybridEncrypt.encrypt(plaintext); |
| |
| expect(ciphertext).not.toEqual(plaintext); |
| } |
| } |
| }); |
| }); |