123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354 |
- /*
- Copyright © 2021-2022 Ettore Di Giacinto <[email protected]>
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package crypto_test
- import (
- . "github.com/mudler/edgevpn/pkg/utils"
- . "github.com/onsi/ginkgo/v2"
- . "github.com/onsi/gomega"
- . "github.com/mudler/edgevpn/pkg/crypto"
- )
- var _ = Describe("Crypto utilities", func() {
- Context("AESSealer", func() {
- It("Encode/decode", func() {
- key := RandStringRunes(32)
- message := "foo"
- s := &AESSealer{}
- encoded, err := s.Seal(message, key)
- Expect(err).ToNot(HaveOccurred())
- Expect(encoded).ToNot(Equal(key))
- Expect(len(encoded)).To(Equal(62))
- // Encode again
- encoded2, err := s.Seal(message, key)
- Expect(err).ToNot(HaveOccurred())
- // should differ
- Expect(encoded2).ToNot(Equal(encoded))
- // Decrypt and check
- decoded, err := s.Unseal(encoded, key)
- Expect(err).ToNot(HaveOccurred())
- Expect(decoded).To(Equal(message))
- decoded, err = s.Unseal(encoded2, key)
- Expect(err).ToNot(HaveOccurred())
- Expect(decoded).To(Equal(message))
- })
- })
- })
|