package org.onap.sdc.security; import org.apache.commons.codec.binary.Base64; import org.apache.commons.lang.RandomStringUtils; import org.junit.Test; import java.util.Random; import static org.apache.commons.codec.binary.Base64.encodeBase64String; import static org.junit.Assert.*; public class CipherUtilTest { private static final String KEY = "AGLDdG4D04BKm2IxIWEr8o=="; private static final String DATA = "data"; @Test public void encryptDecryptPKC() throws CipherUtilException { String generatedKey = RandomStringUtils.randomAlphabetic(16); String base64Key = Base64.encodeBase64String(generatedKey.getBytes()); String encrypted = CipherUtil.encryptPKC(DATA, base64Key); assertNotEquals(DATA, encrypted); String decrypted = CipherUtil.decryptPKC(encrypted, base64Key); assertEquals(decrypted, DATA); } @Test public void encryptInvalidKey() { try { CipherUtil.encryptPKC(DATA, "invalidKey"); fail(); } catch (CipherUtilException ex) { assertTrue(ex.getMessage().contains("Invalid AES key length")); } } @Test public void decryptInvalidKey() { try { CipherUtil.decryptPKC(DATA, "invalidKey"); fail(); } catch (CipherUtilException ex) { assertTrue(ex.getMessage().contains("length")); } } @Test public void decryptInvalidData() { try { CipherUtil.decryptPKC(DATA, KEY); fail(); } catch (CipherUtilException ex) { assertTrue(ex.getMessage().contains("Wrong IV length")); } } }