main
1# frozen_string_literal: true
2
3RSpec.describe Xml::Kit::Encryption do
4 describe '#to_xml' do
5 [
6 ::Xml::Kit::Crypto::RsaCipher::ALGORITHM,
7 ::Xml::Kit::Crypto::OaepCipher::ALGORITHM,
8 ].each do |asymmetric_algorithm|
9 [
10 "#{::Xml::Kit::Namespaces::XMLENC}tripledes-cbc",
11 "#{::Xml::Kit::Namespaces::XMLENC}aes128-cbc",
12 "#{::Xml::Kit::Namespaces::XMLENC}aes192-cbc",
13 "#{::Xml::Kit::Namespaces::XMLENC}aes256-cbc",
14 ].each do |symmetric_algorithm|
15 describe symmetric_algorithm do
16 subject do
17 described_class.new(xml, public_key, symmetric_algorithm: symmetric_algorithm, asymmetric_algorithm: asymmetric_algorithm)
18 end
19
20 let(:key_pair) { Xml::Kit::KeyPair.generate(use: :encryption, algorithm: symmetric_algorithm) }
21 let(:decryptor) { Xml::Kit::Decryption.new(private_keys: [key_pair.private_key]) }
22 let(:public_key) { key_pair.public_key }
23 let(:xml) do
24 xml = ::Builder::XmlMarkup.new
25 xml.HellWorld do
26 xml.Now Time.now.iso8601
27 end
28 xml.target!
29 end
30
31 specify { expect(decryptor.decrypt_xml(subject.to_xml)).to eql(xml) }
32 end
33 end
34 end
35
36 describe 'custom ciphers' do
37 subject { described_class.new(xml, public_key, symmetric_algorithm: symmetric_cipher, asymmetric_algorithm: asymmetric_cipher) }
38
39 let(:symmetric_cipher) { instance_double(Xml::Kit::Crypto::SymmetricCipher, key: 'symmetric_key', encrypt: 'CIPHERTEXT', algorithm: 'symmetric_cipher') }
40 let(:asymmetric_cipher) { instance_double(Xml::Kit::Crypto::RsaCipher, encrypt: 'asymmetric CIPHERTEXT', algorithm: 'asymmetric_cipher') }
41 let(:key_pair) { Xml::Kit::KeyPair.generate(use: :encryption) }
42 let(:public_key) { key_pair.public_key }
43 let(:xml) do
44 xml = ::Builder::XmlMarkup.new
45 xml.HellWorld do
46 xml.Now Time.now.iso8601
47 end
48 xml.target!
49 end
50 let(:result) { Hash.from_xml(subject.to_xml) }
51
52 specify { expect(result['EncryptedData']).to be_present }
53 specify { expect(result['EncryptedData']['EncryptionMethod']['Algorithm']).to eql('symmetric_cipher') }
54 specify { expect(result['EncryptedData']['KeyInfo']).to be_present }
55 specify { expect(result['EncryptedData']['KeyInfo']['EncryptedKey']['EncryptionMethod']['Algorithm']).to eql('asymmetric_cipher') }
56 specify { expect(result['EncryptedData']['KeyInfo']['EncryptedKey']['CipherData']['CipherValue']).to eql(Base64.strict_encode64('asymmetric CIPHERTEXT')) }
57 specify { expect(result['EncryptedData']['CipherData']['CipherValue']).to eql(Base64.strict_encode64('CIPHERTEXT')) }
58 end
59 end
60end