define(['js/crypto/crypto', 'cryptoLib/util', 'test/test-data'], function(Crypto, util, testData) { 'use strict'; module("Crypto Api"); var cryptoTest = { user: 'crypto_test@example.com', password: 'Password', keySize: 128, ivSize: 128, rsaKeySize: 1024 }; var crypto; asyncTest("Init without keypair", 4, function() { crypto = new Crypto(); // init dependencies ok(crypto, 'Crypto'); // test without passing keys crypto.init({ emailAddress: cryptoTest.user, password: cryptoTest.password, keySize: cryptoTest.keySize, rsaKeySize: cryptoTest.rsaKeySize }, function(err, generatedKeypair) { ok(!err && generatedKeypair, 'Init crypto without keypair input'); var pk = generatedKeypair.publicKey; ok(pk._id && pk.userId, 'Key ID: ' + pk._id); ok(pk.publicKey.indexOf('-----BEGIN PUBLIC KEY-----') === 0, pk.publicKey); cryptoTest.generatedKeypair = generatedKeypair; start(); }); }); asyncTest("Init with keypair", 1, function() { // test with passing keypair crypto.init({ emailAddress: cryptoTest.user, password: cryptoTest.password, keySize: cryptoTest.keySize, rsaKeySize: cryptoTest.rsaKeySize, storedKeypair: cryptoTest.generatedKeypair }, function(err, generatedKeypair) { ok(!err && !generatedKeypair, 'Init crypto with keypair input'); start(); }); }); asyncTest("PBKDF2 (Async/Worker)", 2, function() { crypto.deriveKey(cryptoTest.password, cryptoTest.keySize, function(err, key) { ok(!err); equal(util.base642Str(key).length * 8, cryptoTest.keySize, 'Keysize ' + cryptoTest.keySize); start(); }); }); asyncTest("AES/HMAC encrypt batch (Async/Worker)", 2, function() { // generate test data cryptoTest.symlist = testData.getEmailCollection(10); crypto.symEncryptList(cryptoTest.symlist, function(err, result) { ok(!err && result.key && result.list && result.list[0].hmac, 'Encrypt list for user'); equal(result.list.length, cryptoTest.symlist.length, 'Length of list'); cryptoTest.symEncryptedList = result.list; cryptoTest.symKey = result.key; start(); }); }); asyncTest("AES/HMAC decrypt batch (Async/Worker)", 3, function() { var keys = []; for (var i = 0; i < cryptoTest.symEncryptedList.length; i++) { keys.push(cryptoTest.symKey); } crypto.symDecryptList(cryptoTest.symEncryptedList, keys, function(err, decryptedList) { ok(!err && decryptedList, 'Decrypt list'); equal(decryptedList.length, cryptoTest.symlist.length, 'Length of list'); deepEqual(decryptedList, cryptoTest.symlist, 'Decrypted list is correct'); start(); }); }); asyncTest("AES/RSA encrypt batch for User (Async/Worker)", 2, function() { // generate test data cryptoTest.list = testData.getEmailCollection(10); var receiverPubkeys = [cryptoTest.generatedKeypair.publicKey]; crypto.encryptListForUser(cryptoTest.list, receiverPubkeys, function(err, encryptedList) { ok(!err && encryptedList, 'Encrypt list for user'); equal(encryptedList.length, cryptoTest.list.length, 'Length of list'); cryptoTest.encryptedList = encryptedList; start(); }); }); asyncTest("AES/RSA decrypt batch for User (Async/Worker)", 3, function() { var senderPubkeys = [cryptoTest.generatedKeypair.publicKey]; crypto.decryptListForUser(cryptoTest.encryptedList, senderPubkeys, function(err, decryptedList) { ok(!err && decryptedList, 'Decrypt list'); equal(decryptedList.length, cryptoTest.list.length, 'Length of list'); deepEqual(decryptedList, cryptoTest.list, 'Decrypted list is correct'); start(); }); }); });