formatting
This commit is contained in:
		| @@ -20,7 +20,7 @@ test ('encryption 128', (t) => { | ||||
|   const enc = crypto.encrypt_aes ( | ||||
|     'foo', | ||||
|     'bar', | ||||
|     crypto.encryption_mode_cbc_128, | ||||
|     crypto.encryption_mode_cbc_128 | ||||
|   ); | ||||
|   t.is (typeof enc, 'string'); | ||||
| }); | ||||
| @@ -29,12 +29,12 @@ test ('decryption 128', (t) => { | ||||
|   const enc = crypto.encrypt_aes ( | ||||
|     'foo', | ||||
|     'bar', | ||||
|     crypto.encryption_mode_cbc_128, | ||||
|     crypto.encryption_mode_cbc_128 | ||||
|   ); | ||||
|   const dec = crypto.decrypt_aes ( | ||||
|     enc, | ||||
|     'bar', | ||||
|     crypto.encryption_mode_cbc_128, | ||||
|     crypto.encryption_mode_cbc_128 | ||||
|   ); | ||||
|   t.is (dec, 'foo'); | ||||
| }); | ||||
|   | ||||
| @@ -26,10 +26,10 @@ test ('random_hex should refuse lenght smaller 1', (t) => { | ||||
|   const error = t.throws ( | ||||
|     () => (crypto.random_hex (0)) | ||||
|   ); | ||||
|   t.is(error.message, 'invalid length'); | ||||
|   t.is (error.message, 'invalid length'); | ||||
| }); | ||||
|  | ||||
| test ('random_hex should always return correct length', (t)=>{ | ||||
| test ('random_hex should always return correct length', (t) => { | ||||
|   for (let i = 1; i < 32; i++) { | ||||
|     const hex = crypto.random_hex (i); | ||||
|     t.is (hex.length, i); | ||||
| @@ -50,10 +50,10 @@ test ('random_string should refuse lenght smaller 1', (t) => { | ||||
|   const error = t.throws ( | ||||
|     () => (crypto.random_string (0)) | ||||
|   ); | ||||
|   t.is(error.message, 'invalid length'); | ||||
|   t.is (error.message, 'invalid length'); | ||||
| }); | ||||
|  | ||||
| test ('random_string should always return correct length', (t)=>{ | ||||
| test ('random_string should always return correct length', (t) => { | ||||
|   for (let i = 1; i < 32; i++) { | ||||
|     const str = crypto.random_string (i); | ||||
|     t.is (str.length, i); | ||||
|   | ||||
							
								
								
									
										136
									
								
								test/index.js.save
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										136
									
								
								test/index.js.save
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,136 @@ | ||||
| /* | ||||
|  * Copyright (C) Sapphirecode - All Rights Reserved | ||||
|  * Created by Timo Hocker <timo@scode.ovh>, March 2020 | ||||
|  */ | ||||
|  | ||||
| /* eslint-disable no-magic-numbers */ | ||||
| // @ts-nocheck | ||||
| 'use strict'; | ||||
|  | ||||
| const test = require ('ava'); | ||||
| const crypto = require ('../index'); | ||||
|  | ||||
| test ('random_hex', (t) => { | ||||
|   const hex = crypto.random_hex (16); | ||||
|   t.is (hex.length, 16); | ||||
|   t.regex (hex, /^[0-9a-f]+$/iu); | ||||
| }); | ||||
|  | ||||
| test ('random_hex with default length', (t) => { | ||||
|   const hex = crypto.random_hex (); | ||||
|   t.is (hex.length, 8); | ||||
|   t.regex (hex, /^[0-9a-f]+$/iu); | ||||
| }); | ||||
|  | ||||
| test ('random_hex should refuse lenght smaller 1', (t) => { | ||||
|   const error = t.throws ( | ||||
|     () => (crypto.random_hex (0)) | ||||
|   ); | ||||
|   t.is(error.message, 'invalid length'); | ||||
| }); | ||||
|  | ||||
| test ('random_hex should always return correct length', (t)=>{ | ||||
|   for (let i = 1; i < 32; i++) { | ||||
|     const hex = crypto.random_hex (i); | ||||
|     t.is (hex.length, i); | ||||
|   } | ||||
| }); | ||||
|  | ||||
| test ('random_string', (t) => { | ||||
|   const str = crypto.random_string (16); | ||||
|   t.is (str.length, 16); | ||||
| }); | ||||
|  | ||||
| test ('random_string with default length', (t) => { | ||||
|   const str = crypto.random_string (); | ||||
|   t.is (str.length, 8); | ||||
| }); | ||||
|  | ||||
| test ('random_string should refuse lenght smaller 1', (t) => { | ||||
|   const error = t.throws ( | ||||
|     () => (crypto.random_string (0)) | ||||
|   ); | ||||
|   t.is(error.message, 'invalid length'); | ||||
| }); | ||||
|  | ||||
| test ('random_string should always return correct length', (t)=>{ | ||||
|   for (let i = 1; i < 32; i++) { | ||||
|     const str = crypto.random_string (i); | ||||
|     t.is (str.length, i); | ||||
|   } | ||||
| }); | ||||
|  | ||||
|  | ||||
| test ('hash_sha512', (t) => { | ||||
|   const hash = crypto.hash_sha512 ('a', 'b'); | ||||
|   t.is ( | ||||
|     hash, | ||||
|     // eslint-disable-next-line max-len | ||||
|     '2d408a0717ec188158278a796c689044361dc6fdde28d6f04973b80896e1823975cdbf12eb63f9e0591328ee235d80e9b5bf1aa6a44f4617ff3caf6400eb172d' | ||||
|   ); | ||||
| }); | ||||
|  | ||||
| test ('checksum', (t) => { | ||||
|   const hash = crypto.checksum ('foo'); | ||||
|   t.is ( | ||||
|     hash, | ||||
|     // eslint-disable-next-line max-len | ||||
|     '2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7ae' | ||||
|   ); | ||||
| }); | ||||
|  | ||||
| test ('create_salt', (t) => { | ||||
|   const salt = crypto.create_salt (); | ||||
|   t.is (salt.length, 64); | ||||
|   t.regex (salt, /^[0-9a-f]+$/iu); | ||||
| }); | ||||
|  | ||||
| test ('sign_object', (t) => { | ||||
|   const obj = { foo: 'bar' }; | ||||
|   t.notThrows (() => { | ||||
|     const str = crypto.sign_object (obj, 'baz'); | ||||
|     t.is (typeof str, 'string'); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| test ('decode_signed', (t) => { | ||||
|   const obj = { foo: 'bar' }; | ||||
|   const str = crypto.sign_object (obj, 'baz'); | ||||
|   const dec = crypto.decode_signed (str); | ||||
|   t.deepEqual (obj, dec); | ||||
| }); | ||||
|  | ||||
|  | ||||
| test ('reject tampered signatures', (t) => { | ||||
|   const obj = { foo: 'bar' }; | ||||
|   const str = crypto.sign_object (obj, 'baz'); | ||||
|   const dec = crypto.verify_signature (str, 'foo'); | ||||
|   t.is (dec, null); | ||||
| }); | ||||
|  | ||||
| test ('reject old signatures', async (t) => { | ||||
|   const obj = { foo: 'bar' }; | ||||
|   const str = crypto.sign_object (obj, 'baz'); | ||||
|   await new Promise ((res) => { | ||||
|     setTimeout (res, 10); | ||||
|   }); | ||||
|   const dec = crypto.verify_signature (str, 'baz', 1); | ||||
|   t.is (dec, null); | ||||
| }); | ||||
|  | ||||
| test ('do not reject valid signatures', async (t) => { | ||||
|   const obj = { foo: 'bar' }; | ||||
|   const str = crypto.sign_object (obj, 'baz'); | ||||
|   await new Promise ((res) => { | ||||
|     setTimeout (res, 10); | ||||
|   }); | ||||
|   const dec = crypto.verify_signature (str, 'baz', 100); | ||||
|   t.deepEqual (obj, dec); | ||||
| }); | ||||
|  | ||||
| test ('decode problematic token', (t) => { | ||||
|   // eslint-disable-next-line max-len | ||||
|   const str = 'eyJpYXQiOjE1ODE0NDAwMTIyODgsIm9iaiI6eyJpZCI6MX19.24ZOsWrnfkNe%2FbM0r7DaVJMqE2bfn2aAM%2BZSzWeSf31OCTlXXNWD34RBL2X5v3UliYQ4IIsLNBFbaW9texPHug%3D%3D'; | ||||
|   const obj = crypto.decode_signed (str); | ||||
|   t.deepEqual (obj, { id: 1 }); | ||||
| }); | ||||
		Reference in New Issue
	
	Block a user