1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
|
# frozen_string_literal: true
RSpec.describe Xml::Kit::Encryption do
describe '#to_xml' do
[
::Xml::Kit::Crypto::RsaCipher::ALGORITHM,
::Xml::Kit::Crypto::OaepCipher::ALGORITHM,
].each do |asymmetric_algorithm|
[
"#{::Xml::Kit::Namespaces::XMLENC}tripledes-cbc",
"#{::Xml::Kit::Namespaces::XMLENC}aes128-cbc",
"#{::Xml::Kit::Namespaces::XMLENC}aes192-cbc",
"#{::Xml::Kit::Namespaces::XMLENC}aes256-cbc",
].each do |symmetric_algorithm|
describe symmetric_algorithm do
subject do
described_class.new(xml, public_key, symmetric_algorithm: symmetric_algorithm, asymmetric_algorithm: asymmetric_algorithm)
end
let(:key_pair) { Xml::Kit::KeyPair.generate(use: :encryption, algorithm: symmetric_algorithm) }
let(:decryptor) { Xml::Kit::Decryption.new(private_keys: [key_pair.private_key]) }
let(:public_key) { key_pair.public_key }
let(:xml) do
xml = ::Builder::XmlMarkup.new
xml.HellWorld do
xml.Now Time.now.iso8601
end
xml.target!
end
specify { expect(decryptor.decrypt_xml(subject.to_xml)).to eql(xml) }
end
end
end
describe 'custom ciphers' do
subject { described_class.new(xml, public_key, symmetric_algorithm: symmetric_cipher, asymmetric_algorithm: asymmetric_cipher) }
let(:symmetric_cipher) { instance_double(Xml::Kit::Crypto::SymmetricCipher, key: 'symmetric_key', encrypt: 'CIPHERTEXT', algorithm: 'symmetric_cipher') }
let(:asymmetric_cipher) { instance_double(Xml::Kit::Crypto::RsaCipher, encrypt: 'asymmetric CIPHERTEXT', algorithm: 'asymmetric_cipher') }
let(:key_pair) { Xml::Kit::KeyPair.generate(use: :encryption) }
let(:public_key) { key_pair.public_key }
let(:xml) do
xml = ::Builder::XmlMarkup.new
xml.HellWorld do
xml.Now Time.now.iso8601
end
xml.target!
end
let(:result) { Hash.from_xml(subject.to_xml) }
specify { expect(result['EncryptedData']).to be_present }
specify { expect(result['EncryptedData']['EncryptionMethod']['Algorithm']).to eql('symmetric_cipher') }
specify { expect(result['EncryptedData']['KeyInfo']).to be_present }
specify { expect(result['EncryptedData']['KeyInfo']['EncryptedKey']['EncryptionMethod']['Algorithm']).to eql('asymmetric_cipher') }
specify { expect(result['EncryptedData']['KeyInfo']['EncryptedKey']['CipherData']['CipherValue']).to eql(Base64.strict_encode64('asymmetric CIPHERTEXT')) }
specify { expect(result['EncryptedData']['CipherData']['CipherValue']).to eql(Base64.strict_encode64('CIPHERTEXT')) }
end
end
end
|