mirror of
https://github.com/fluencelabs/js-libp2p-crypto
synced 2025-03-15 14:21:07 +00:00
Due to the design of `AES-CTR` in the webcrypto spec, there is no streaming mode provided. This results in the counter not being reused between subsequent calls to `encrypt` or `decrypt`. As both the node.js and the go implementation rely on this webcrypto had to be replaced.
116 lines
3.0 KiB
JavaScript
116 lines
3.0 KiB
JavaScript
/* eslint max-nested-callbacks: ["error", 8] */
|
|
/* eslint-env mocha */
|
|
'use strict'
|
|
|
|
const expect = require('chai').expect
|
|
const series = require('async/series')
|
|
|
|
const crypto = require('../src')
|
|
const fixtures = require('./fixtures/aes')
|
|
const goFixtures = require('./fixtures/go-aes')
|
|
|
|
const bytes = {
|
|
16: 'AES-128',
|
|
32: 'AES-256'
|
|
}
|
|
|
|
describe('AES-CTR', () => {
|
|
Object.keys(bytes).forEach((byte) => {
|
|
it(`${bytes[byte]} - encrypt and decrypt`, (done) => {
|
|
const key = new Buffer(parseInt(byte, 10))
|
|
key.fill(5)
|
|
|
|
const iv = new Buffer(16)
|
|
iv.fill(1)
|
|
|
|
crypto.aes.create(key, iv, (err, cipher) => {
|
|
expect(err).to.not.exist
|
|
|
|
series([
|
|
encryptAndDecrypt(cipher),
|
|
encryptAndDecrypt(cipher),
|
|
encryptAndDecrypt(cipher),
|
|
encryptAndDecrypt(cipher),
|
|
encryptAndDecrypt(cipher)
|
|
], done)
|
|
})
|
|
})
|
|
})
|
|
Object.keys(bytes).forEach((byte) => {
|
|
it(`${bytes[byte]} - fixed - encrypt and decrypt`, (done) => {
|
|
const key = new Buffer(parseInt(byte, 10))
|
|
key.fill(5)
|
|
|
|
const iv = new Buffer(16)
|
|
iv.fill(1)
|
|
|
|
crypto.aes.create(key, iv, (err, cipher) => {
|
|
expect(err).to.not.exist
|
|
|
|
series(fixtures[byte].inputs.map((rawIn, i) => (cb) => {
|
|
const input = new Buffer(rawIn)
|
|
const output = new Buffer(fixtures[byte].outputs[i])
|
|
cipher.encrypt(input, (err, res) => {
|
|
expect(err).to.not.exist
|
|
expect(res).to.have.length(output.length)
|
|
expect(res).to.be.eql(output)
|
|
cipher.decrypt(res, (err, res) => {
|
|
expect(err).to.not.exist
|
|
expect(res).to.be.eql(input)
|
|
cb()
|
|
})
|
|
})
|
|
}), done)
|
|
})
|
|
})
|
|
})
|
|
|
|
Object.keys(bytes).forEach((byte) => {
|
|
if (!goFixtures[byte]) {
|
|
return
|
|
}
|
|
|
|
it(`${bytes[byte]} - go interop - encrypt and decrypt`, (done) => {
|
|
const key = new Buffer(parseInt(byte, 10))
|
|
key.fill(5)
|
|
|
|
const iv = new Buffer(16)
|
|
iv.fill(1)
|
|
|
|
crypto.aes.create(key, iv, (err, cipher) => {
|
|
expect(err).to.not.exist
|
|
|
|
series(goFixtures[byte].inputs.map((rawIn, i) => (cb) => {
|
|
const input = new Buffer(rawIn)
|
|
const output = new Buffer(goFixtures[byte].outputs[i])
|
|
cipher.encrypt(input, (err, res) => {
|
|
expect(err).to.not.exist
|
|
expect(res).to.have.length(output.length)
|
|
expect(res).to.be.eql(output)
|
|
cipher.decrypt(res, (err, res) => {
|
|
expect(err).to.not.exist
|
|
expect(res).to.be.eql(input)
|
|
cb()
|
|
})
|
|
})
|
|
}), done)
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
function encryptAndDecrypt (cipher) {
|
|
const data = new Buffer(100)
|
|
data.fill(Math.ceil(Math.random() * 100))
|
|
return (cb) => {
|
|
cipher.encrypt(data, (err, res) => {
|
|
expect(err).to.not.exist
|
|
cipher.decrypt(res, (err, res) => {
|
|
expect(err).to.not.exist
|
|
expect(res).to.be.eql(data)
|
|
cb()
|
|
})
|
|
})
|
|
}
|
|
}
|