public void Should_not_return_original_text_when_decrypting_with_different_keys() { var inputText = "this is some text"; var encText = provider.Encrypt(inputText); var result = new AesEncryptionProvider(new PassphraseKeyGenerator("Wrong", new byte[] { 1, 2, 3, 4, 5, 6, 7, 8 })).Decrypt(encText); result.ShouldNotEqual(inputText); }
public CookieBasedSessionsFixture() { this.fakeEncryptionProvider = A.Fake<IEncryptionProvider>(); this.fakeHmacProvider = A.Fake<IHmacProvider>(); this.fakeObjectSerializer = new FakeObjectSerializer(); this.cookieStore = new CookieBasedSessions(this.fakeEncryptionProvider, this.fakeHmacProvider, this.fakeObjectSerializer); this.aesEncryptionProvider = new AesEncryptionProvider(new PassphraseKeyGenerator("password", new byte[] { 1, 2, 3, 4, 5, 6, 7, 8 }, 1000)); this.defaultHmacProvider = new DefaultHmacProvider(new PassphraseKeyGenerator("anotherpassword", new byte[] { 1, 2, 3, 4, 5, 6, 7, 8 }, 1000)); this.defaultObjectSerializer = new DefaultObjectSerializer(); }
public AesEncryptionProviderFixture() { this.provider = new AesEncryptionProvider(new PassphraseKeyGenerator("Passphrase", new byte[] { 1, 2, 3, 4, 5, 6, 7, 8 })); }