package org.onap.sdc.security;

import org.apache.commons.codec.binary.Base64;
import org.apache.commons.lang.RandomStringUtils;
import org.junit.Test;

import java.util.Random;

import static org.apache.commons.codec.binary.Base64.encodeBase64String;
import static org.junit.Assert.*;

public class CipherUtilTest {

    private static final String KEY = "AGLDdG4D04BKm2IxIWEr8o==";
    private static final String DATA = "data";

    @Test
    public void encryptDecryptPKC() throws CipherUtilException {
        String generatedKey = RandomStringUtils.randomAlphabetic(16);
        String base64Key = Base64.encodeBase64String(generatedKey.getBytes());
        String encrypted = CipherUtil.encryptPKC(DATA, base64Key);
        assertNotEquals(DATA, encrypted);
        String decrypted = CipherUtil.decryptPKC(encrypted, base64Key);
        assertEquals(decrypted, DATA);
    }

    @Test
    public void encryptInvalidKey() {
        try {
            CipherUtil.encryptPKC(DATA, "invalidKey");
            fail();
        } catch (CipherUtilException ex) {
            assertTrue(ex.getMessage().contains("Invalid AES key length"));
        }
    }

    @Test
    public void decryptInvalidKey() {
        try {
            CipherUtil.decryptPKC(DATA, "invalidKey");
            fail();
        } catch (CipherUtilException ex) {
            assertTrue(ex.getMessage().contains("length"));
        }
    }

    @Test
   public void decryptInvalidData() {
        try {
            CipherUtil.decryptPKC(DATA, KEY);
          fail();
       } catch (CipherUtilException ex) {
          assertTrue(ex.getMessage().contains("Wrong IV length"));
        }
    }
}