summaryrefslogtreecommitdiffstats
path: root/openecomp-be/backend/openecomp-sdc-security-util/src/test/CipherUtilTest.java
blob: 753902fcf8df7ab7fc3975db9bcdbed0d5f62f0e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
package org.onap.sdc.security;

import org.apache.commons.codec.binary.Base64;
import org.apache.commons.lang.RandomStringUtils;
import org.junit.Test;

import java.util.Random;

import static org.apache.commons.codec.binary.Base64.encodeBase64String;
import static org.junit.Assert.*;

public class CipherUtilTest {

    private static final String KEY = "AGLDdG4D04BKm2IxIWEr8o==";
    private static final String DATA = "data";

    @Test
    public void encryptDecryptPKC() throws CipherUtilException {
        String generatedKey = RandomStringUtils.randomAlphabetic(16);
        String base64Key = Base64.encodeBase64String(generatedKey.getBytes());
        String encrypted = CipherUtil.encryptPKC(DATA, base64Key);
        assertNotEquals(DATA, encrypted);
        String decrypted = CipherUtil.decryptPKC(encrypted, base64Key);
        assertEquals(decrypted, DATA);
    }

    @Test
    public void encryptInvalidKey() {
        try {
            CipherUtil.encryptPKC(DATA, "invalidKey");
            fail();
        } catch (CipherUtilException ex) {
            assertTrue(ex.getMessage().contains("Invalid AES key length"));
        }
    }

    @Test
    public void decryptInvalidKey() {
        try {
            CipherUtil.decryptPKC(DATA, "invalidKey");
            fail();
        } catch (CipherUtilException ex) {
            assertTrue(ex.getMessage().contains("length"));
        }
    }

    @Test
   public void decryptInvalidData() {
        try {
            CipherUtil.decryptPKC(DATA, KEY);
          fail();
       } catch (CipherUtilException ex) {
          assertTrue(ex.getMessage().contains("Wrong IV length"));
        }
    }
}