|
| 1 | +/* |
| 2 | + * Copyright 2019 Amazon.com, Inc. or its affiliates. All Rights Reserved. |
| 3 | + * |
| 4 | + * Licensed under the Apache License, Version 2.0 (the "License"). You may not use |
| 5 | + * this file except in compliance with the License. A copy of the License is |
| 6 | + * located at |
| 7 | + * |
| 8 | + * http://aws.amazon.com/apache2.0/ |
| 9 | + * |
| 10 | + * or in the "license" file accompanying this file. This file is distributed on an |
| 11 | + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or |
| 12 | + * implied. See the License for the specific language governing permissions and |
| 13 | + * limitations under the License. |
| 14 | + */ |
| 15 | + |
| 16 | +/* eslint-env mocha */ |
| 17 | + |
| 18 | +import * as chai from 'chai' |
| 19 | +import chaiAsPromised from 'chai-as-promised' |
| 20 | +import 'mocha' |
| 21 | +import { |
| 22 | + RawRsaKeyringNode |
| 23 | +} from '../src/index' |
| 24 | +import { |
| 25 | + KeyringNode, |
| 26 | + NodeEncryptionMaterial, |
| 27 | + NodeAlgorithmSuite, |
| 28 | + AlgorithmSuiteIdentifier, |
| 29 | + EncryptedDataKey, // eslint-disable-line no-unused-vars |
| 30 | + NodeDecryptionMaterial |
| 31 | +} from '@aws-crypto/material-management-node' |
| 32 | + |
| 33 | +chai.use(chaiAsPromised) |
| 34 | +const { expect } = chai |
| 35 | + |
| 36 | +/* RSA Keys to test. |
| 37 | + * These keys are *Public*! |
| 38 | + * *DO NOT USE* |
| 39 | + * |
| 40 | + * to recrate |
| 41 | +crypto.generateKeyPair('rsa', { |
| 42 | + modulusLength: 4096, |
| 43 | + publicKeyEncoding: { |
| 44 | + type: 'spki', |
| 45 | + format: 'pem' |
| 46 | + }, |
| 47 | + privateKeyEncoding: { |
| 48 | + type: 'pkcs8', |
| 49 | + format: 'pem' |
| 50 | + } |
| 51 | +}, (e, p, v) => { |
| 52 | + public = p |
| 53 | + private = v |
| 54 | +}) |
| 55 | + */ |
| 56 | +const publicPem = '-----BEGIN PUBLIC KEY-----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\nMqsi59G6k0Ik3PjcwZ0gmv8CAwEAAQ==\n-----END PUBLIC KEY-----\n' |
| 57 | +const privatePem = '-----BEGIN PRIVATE KEY-----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\nnUwWh19LU+597M0VXIKm2/H3v4up\n-----END PRIVATE KEY-----\n' |
| 58 | + |
| 59 | +describe('RawRsaKeyringWebCrypto::constructor', () => { |
| 60 | + const keyName = 'keyName' |
| 61 | + const keyNamespace = 'keyNamespace' |
| 62 | + |
| 63 | + it('constructor decorates', async () => { |
| 64 | + const test = new RawRsaKeyringNode({ |
| 65 | + rsaKey: { |
| 66 | + privateKey: privatePem, |
| 67 | + publicKey: publicPem |
| 68 | + }, |
| 69 | + keyName, |
| 70 | + keyNamespace |
| 71 | + }) |
| 72 | + |
| 73 | + expect(test.keyName).to.equal(keyName) |
| 74 | + expect(test.keyNamespace).to.equal(keyNamespace) |
| 75 | + expect(test._wrapKey).to.be.a('function') |
| 76 | + expect(test._unwrapKey).to.be.a('function') |
| 77 | + expect(test).to.be.instanceOf(KeyringNode) |
| 78 | + }) |
| 79 | + |
| 80 | + it('can construct with only public key', () => { |
| 81 | + const testPublicOnly = new RawRsaKeyringNode({ |
| 82 | + rsaKey: { |
| 83 | + publicKey: publicPem |
| 84 | + }, |
| 85 | + keyName, |
| 86 | + keyNamespace |
| 87 | + }) |
| 88 | + expect(testPublicOnly).to.be.instanceOf(RawRsaKeyringNode) |
| 89 | + }) |
| 90 | + |
| 91 | + it('can construct with only private key', () => { |
| 92 | + const testPrivateOnly = new RawRsaKeyringNode({ |
| 93 | + rsaKey: { |
| 94 | + privateKey: privatePem |
| 95 | + }, |
| 96 | + keyName, |
| 97 | + keyNamespace |
| 98 | + }) |
| 99 | + expect(testPrivateOnly).to.be.instanceOf(RawRsaKeyringNode) |
| 100 | + }) |
| 101 | + |
| 102 | + it('Precondition: RsaKeyringNode needs either a public or a private key to operate.', () => { |
| 103 | + expect(() => new RawRsaKeyringNode({ |
| 104 | + keyName, |
| 105 | + keyNamespace, |
| 106 | + rsaKey: {} |
| 107 | + })).to.throw() |
| 108 | + }) |
| 109 | + |
| 110 | + it('Precondition: RsaKeyringNode needs identifying information for encrypt and decrypt.', () => { |
| 111 | + // @ts-ignore Typescript is trying to save us. |
| 112 | + expect(() => new RawRsaKeyringNode({ |
| 113 | + rsaKey: { privateKey: privatePem, publicKey: publicPem } |
| 114 | + })).to.throw() |
| 115 | + // @ts-ignore Typescript is trying to save us. |
| 116 | + expect(() => new RawRsaKeyringNode({ |
| 117 | + rsaKey: { privateKey: privatePem, publicKey: publicPem }, |
| 118 | + keyNamespace |
| 119 | + })).to.throw() |
| 120 | + // @ts-ignore Typescript is trying to save us. |
| 121 | + expect(() => new RawRsaKeyringNode({ |
| 122 | + rsaKey: { privateKey: privatePem, publicKey: publicPem }, |
| 123 | + keyName |
| 124 | + })).to.throw() |
| 125 | + }) |
| 126 | +}) |
| 127 | + |
| 128 | +describe('RawRsaKeyringWebCrypto encrypt/decrypt', () => { |
| 129 | + const keyNamespace = 'keyNamespace' |
| 130 | + const keyName = 'keyName' |
| 131 | + const keyring = new RawRsaKeyringNode({ |
| 132 | + rsaKey: { privateKey: privatePem, publicKey: publicPem }, |
| 133 | + keyName, |
| 134 | + keyNamespace |
| 135 | + }) |
| 136 | + let encryptedDataKey: EncryptedDataKey |
| 137 | + |
| 138 | + it('can encrypt and create unencrypted data key', async () => { |
| 139 | + const suite = new NodeAlgorithmSuite(AlgorithmSuiteIdentifier.ALG_AES256_GCM_IV12_TAG16_HKDF_SHA256) |
| 140 | + const material = new NodeEncryptionMaterial(suite) |
| 141 | + const test = await keyring.onEncrypt(material) |
| 142 | + expect(test.hasValidKey()).to.equal(true) |
| 143 | + const udk = test.getUnencryptedDataKey() |
| 144 | + expect(udk).to.have.lengthOf(suite.keyLengthBytes) |
| 145 | + expect(test.encryptedDataKeys).to.have.lengthOf(1) |
| 146 | + const [edk] = test.encryptedDataKeys |
| 147 | + expect(edk.providerId).to.equal(keyNamespace) |
| 148 | + encryptedDataKey = edk |
| 149 | + }) |
| 150 | + |
| 151 | + it('can decrypt an EncryptedDataKey', async () => { |
| 152 | + const suite = new NodeAlgorithmSuite(AlgorithmSuiteIdentifier.ALG_AES256_GCM_IV12_TAG16_HKDF_SHA256) |
| 153 | + const material = new NodeDecryptionMaterial(suite) |
| 154 | + const test = await keyring.onDecrypt(material, [encryptedDataKey]) |
| 155 | + expect(test.hasValidKey()).to.equal(true) |
| 156 | + }) |
| 157 | + |
| 158 | + it('Precondition: Public key must be defined to support encrypt.', async () => { |
| 159 | + const keyring = new RawRsaKeyringNode({ |
| 160 | + rsaKey: { privateKey: privatePem }, |
| 161 | + keyName, |
| 162 | + keyNamespace |
| 163 | + }) |
| 164 | + |
| 165 | + const suite = new NodeAlgorithmSuite(AlgorithmSuiteIdentifier.ALG_AES256_GCM_IV12_TAG16_HKDF_SHA256) |
| 166 | + const material = new NodeEncryptionMaterial(suite) |
| 167 | + expect(keyring.onEncrypt(material)).to.rejectedWith(Error) |
| 168 | + }) |
| 169 | + |
| 170 | + it('Precondition: Private key must be defined to support decrypt.', async () => { |
| 171 | + const keyring = new RawRsaKeyringNode({ |
| 172 | + rsaKey: { publicKey: publicPem }, |
| 173 | + keyName, |
| 174 | + keyNamespace |
| 175 | + }) |
| 176 | + |
| 177 | + const suite = new NodeAlgorithmSuite(AlgorithmSuiteIdentifier.ALG_AES256_GCM_IV12_TAG16_HKDF_SHA256) |
| 178 | + const material = new NodeDecryptionMaterial(suite) |
| 179 | + await keyring.onDecrypt(material, [encryptedDataKey]) |
| 180 | + expect(keyring.onDecrypt(material, [encryptedDataKey])).to.rejectedWith(Error) |
| 181 | + }) |
| 182 | +}) |
0 commit comments