/* Copyright (C) 2019, 2020, 2021, 2022, 2023 Monomax Software Pty Ltd * * This file is part of Dnote. * * Dnote is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * Dnote is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with Dnote. If not, see . */ package crypt import ( "crypto/aes" "crypto/cipher" "encoding/base64" "fmt" "testing" "github.com/dnote/dnote/pkg/assert" "github.com/pkg/errors" ) func TestAesGcmEncrypt(t *testing.T) { testCases := []struct { key []byte plaintext []byte }{ { key: []byte("AES256Key-32Characters1234567890"), plaintext: []byte("foo bar baz quz"), }, { key: []byte("AES256Key-32Charactersabcdefghij"), plaintext: []byte("1234 foo 5678 bar 7890 baz"), }, } for _, tc := range testCases { t.Run(fmt.Sprintf("key %s plaintext %s", tc.key, tc.plaintext), func(t *testing.T) { // encrypt dataB64, err := AesGcmEncrypt(tc.key, tc.plaintext) if err != nil { t.Fatal(errors.Wrap(err, "performing encryption")) } // test that data can be decrypted data, err := base64.StdEncoding.DecodeString(dataB64) if err != nil { t.Fatal(errors.Wrap(err, "decoding data from base64")) } nonce, ciphertext := data[:12], data[12:] fmt.Println(string(data)) block, err := aes.NewCipher([]byte(tc.key)) if err != nil { t.Fatal(errors.Wrap(err, "initializing aes")) } aesgcm, err := cipher.NewGCM(block) if err != nil { t.Fatal(errors.Wrap(err, "initializing gcm")) } plaintext, err := aesgcm.Open(nil, nonce, ciphertext, nil) if err != nil { t.Fatal(errors.Wrap(err, "decode")) } assert.DeepEqual(t, plaintext, tc.plaintext, "plaintext mismatch") }) } } func TestAesGcmDecrypt(t *testing.T) { testCases := []struct { key []byte ciphertextB64 string expectedPlaintext string }{ { key: []byte("AES256Key-32Characters1234567890"), ciphertextB64: "M2ov9hWMQ52v1S/zigwX3bJt4cVCV02uiRm/grKqN/rZxNkJrD7vK4Ii0g==", expectedPlaintext: "foo bar baz quz", }, { key: []byte("AES256Key-32Characters1234567890"), ciphertextB64: "M4csFKUIUbD1FBEzLgHjscoKgN0lhMGJ0n2nKWiCkE/qSKlRP7kS", expectedPlaintext: "foo\n1\nbar\n2", }, { key: []byte("AES256Key-32Characters1234567890"), ciphertextB64: "pe/fnw73MR1clmVIlRSJ5gDwBdnPly/DF7DsR5dJVz4dHZlv0b10WzvJEGOCHZEr+Q==", expectedPlaintext: "föo\nbār\nbåz & qūz", }, } for _, tc := range testCases { t.Run(fmt.Sprintf("key %s ciphertext %s", tc.key, tc.ciphertextB64), func(t *testing.T) { plaintext, err := AesGcmDecrypt(tc.key, tc.ciphertextB64) if err != nil { t.Fatal(errors.Wrap(err, "performing decryption")) } assert.DeepEqual(t, plaintext, []byte(tc.expectedPlaintext), "plaintext mismatch") }) } }