@@ -78,14 +78,14 @@ describe('encrypt structural testing', () => {
78
78
const suiteId = AlgorithmSuiteIdentifier . ALG_AES128_GCM_IV12_TAG16
79
79
80
80
const plaintext = 'asdf'
81
- const { ciphertext , messageHeader } = await encrypt ( keyRing , plaintext , { suiteId } )
81
+ const { result , messageHeader } = await encrypt ( keyRing , plaintext , { suiteId } )
82
82
83
83
expect ( messageHeader . suiteId ) . to . equal ( suiteId )
84
84
expect ( messageHeader . encryptionContext ) . to . deep . equal ( { } )
85
85
expect ( messageHeader . encryptedDataKeys ) . lengthOf ( 1 )
86
86
expect ( messageHeader . encryptedDataKeys [ 0 ] ) . to . deep . equal ( edk )
87
87
88
- const messageInfo = deserializeMessageHeader ( ciphertext )
88
+ const messageInfo = deserializeMessageHeader ( result )
89
89
if ( ! messageInfo ) throw new Error ( 'I should never see this error' )
90
90
91
91
expect ( messageHeader ) . to . deep . equal ( messageInfo . messageHeader )
@@ -95,7 +95,7 @@ describe('encrypt structural testing', () => {
95
95
const encryptionContext = { simple : 'context' }
96
96
97
97
const plaintext = Buffer . from ( 'asdf' )
98
- const { ciphertext , messageHeader } = await encrypt ( keyRing , plaintext , { encryptionContext } )
98
+ const { result , messageHeader } = await encrypt ( keyRing , plaintext , { encryptionContext } )
99
99
100
100
/* The default algorithm suite will add a signature key to the context.
101
101
* So I only check that the passed context elements exist.
@@ -104,7 +104,7 @@ describe('encrypt structural testing', () => {
104
104
expect ( messageHeader . encryptedDataKeys ) . lengthOf ( 1 )
105
105
expect ( messageHeader . encryptedDataKeys [ 0 ] ) . to . deep . equal ( edk )
106
106
107
- const messageInfo = deserializeMessageHeader ( ciphertext )
107
+ const messageInfo = deserializeMessageHeader ( result )
108
108
if ( ! messageInfo ) throw new Error ( 'I should never see this error' )
109
109
110
110
expect ( messageHeader ) . to . deep . equal ( messageInfo . messageHeader )
@@ -120,7 +120,7 @@ describe('encrypt structural testing', () => {
120
120
next ( null , 'asdf' )
121
121
} )
122
122
123
- const { ciphertext , messageHeader } = await encrypt ( keyRing , plaintext , { encryptionContext } )
123
+ const { result , messageHeader } = await encrypt ( keyRing , plaintext , { encryptionContext } )
124
124
125
125
/* The default algorithm suite will add a signature key to the context.
126
126
* So I only check that the passed context elements exist.
@@ -129,7 +129,7 @@ describe('encrypt structural testing', () => {
129
129
expect ( messageHeader . encryptedDataKeys ) . lengthOf ( 1 )
130
130
expect ( messageHeader . encryptedDataKeys [ 0 ] ) . to . deep . equal ( edk )
131
131
132
- const messageInfo = deserializeMessageHeader ( ciphertext )
132
+ const messageInfo = deserializeMessageHeader ( result )
133
133
if ( ! messageInfo ) throw new Error ( 'I should never see this error' )
134
134
135
135
expect ( messageHeader ) . to . deep . equal ( messageInfo . messageHeader )
@@ -172,7 +172,7 @@ describe('encrypt structural testing', () => {
172
172
173
173
if ( ! messageHeader ) throw new Error ( 'I should never see this error' )
174
174
175
- const ciphertext = Buffer . concat ( buffer )
175
+ const result = Buffer . concat ( buffer )
176
176
177
177
/* The default algorithm suite will add a signature key to the context.
178
178
* So I only check that the passed context elements exist.
@@ -181,7 +181,7 @@ describe('encrypt structural testing', () => {
181
181
expect ( messageHeader . encryptedDataKeys ) . lengthOf ( 1 )
182
182
expect ( messageHeader . encryptedDataKeys [ 0 ] ) . to . deep . equal ( edk )
183
183
184
- const messageInfo = deserializeMessageHeader ( ciphertext )
184
+ const messageInfo = deserializeMessageHeader ( result )
185
185
if ( ! messageInfo ) throw new Error ( 'I should never see this error' )
186
186
187
187
expect ( messageHeader ) . to . deep . equal ( messageInfo . messageHeader )
@@ -195,9 +195,9 @@ describe('encrypt structural testing', () => {
195
195
it ( 'can fully parse a framed message' , async ( ) => {
196
196
const plaintext = 'asdf'
197
197
const frameLength = 1
198
- const { ciphertext } = await encrypt ( keyRing , plaintext , { frameLength } )
198
+ const { result } = await encrypt ( keyRing , plaintext , { frameLength } )
199
199
200
- const headerInfo = deserializeMessageHeader ( ciphertext )
200
+ const headerInfo = deserializeMessageHeader ( result )
201
201
if ( ! headerInfo ) throw new Error ( 'this should never happen' )
202
202
203
203
const tagLength = headerInfo . algorithmSuite . tagLength / 8
@@ -206,7 +206,7 @@ describe('encrypt structural testing', () => {
206
206
let bodyHeader : any
207
207
// for every frame...
208
208
for ( ; i < 5 ; i ++ ) {
209
- bodyHeader = decodeBodyHeader ( ciphertext , headerInfo , readPos )
209
+ bodyHeader = decodeBodyHeader ( result , headerInfo , readPos )
210
210
if ( ! bodyHeader ) throw new Error ( 'this should never happen' )
211
211
readPos = bodyHeader . readPos + bodyHeader . contentLength + tagLength
212
212
}
@@ -216,7 +216,7 @@ describe('encrypt structural testing', () => {
216
216
217
217
// This implicitly tests that I have consumed all the data,
218
218
// because otherwise the footer section will be too large
219
- const footerSection = ciphertext . slice ( readPos )
219
+ const footerSection = result . slice ( readPos )
220
220
// This will throw if it does not deserialize correctly
221
221
deserializeSignature ( footerSection )
222
222
} )
0 commit comments