import { describe, expect, it } from "bun:test"; import crypto from "node:crypto"; import { PassThrough, Readable } from "node:stream"; import util from "node:util"; it("crypto.randomBytes should return a Buffer", () => { expect(crypto.randomBytes(1) instanceof Buffer).toBe(true); expect(Buffer.isBuffer(crypto.randomBytes(1))).toBe(true); }); it("crypto.randomInt should return a number", () => { const result = crypto.randomInt(0, 10); expect(typeof result).toBe("number"); expect(result).toBeGreaterThanOrEqual(0); expect(result).toBeLessThanOrEqual(10); }); it("crypto.randomInt with no arguments", () => { expect(() => crypto.randomInt()).toThrow(TypeError); }); it("crypto.randomInt with one argument", () => { const result = crypto.randomInt(100); expect(typeof result).toBe("number"); expect(result).toBeGreaterThanOrEqual(0); expect(result).toBeLessThanOrEqual(100); }); it("crypto.randomInt with a callback", async () => { const result = await util.promisify(crypto.randomInt)(0, 10); expect(typeof result).toBe("number"); expect(result).toBeGreaterThanOrEqual(0); expect(result).toBeLessThanOrEqual(10); }); // https://github.com/oven-sh/bun/issues/1839 describe("createHash", () => { const nodeValues = { "RSA-MD5": { "value": "b10a8db164e0754105b7a99be72e3fe5", "input": "Hello World", }, "RSA-RIPEMD160": { "value": "a830d7beb04eb7549ce990fb7dc962e499a27230", "input": "Hello World", }, "RSA-SHA1": { "value": "0a4d55a8d778e5022fab701977c5d840bbc486d0", "input": "Hello World", }, "RSA-SHA1-2": { "value": "0a4d55a8d778e5022fab701977c5d840bbc486d0", "input": "Hello World", }, "RSA-SHA224": { "value": "c4890faffdb0105d991a461e668e276685401b02eab1ef4372795047", "input": "Hello World", }, "RSA-SHA256": { "value": "a591a6d40bf420404a011733cfb7b190d62c65bf0bcda32b57b277d9ad9f146e", "input": "Hello World", }, "RSA-SHA3-224": { "value": "8e800079a0b311788bf29353f400eff969b650a3597c91efd9aa5b38", "input": "Hello World", }, "RSA-SHA3-256": { "value": "e167f68d6563d75bb25f3aa49c29ef612d41352dc00606de7cbd630bb2665f51", "input": "Hello World", }, "RSA-SHA3-384": { "value": "a78ec2851e991638ce505d4a44efa606dd4056d3ab274ec6fdbac00cde16478263ef7213bad5a7db7044f58d637afdeb", "input": "Hello World", }, "RSA-SHA3-512": { "value": "3d58a719c6866b0214f96b0a67b37e51a91e233ce0be126a08f35fdf4c043c6126f40139bfbc338d44eb2a03de9f7bb8eff0ac260b3629811e389a5fbee8a894", "input": "Hello World", }, "RSA-SHA384": { "value": "99514329186b2f6ae4a1329e7ee6c610a729636335174ac6b740f9028396fcc803d0e93863a7c3d90f86beee782f4f3f", "input": "Hello World", }, "RSA-SHA512": { "value": "2c74fd17edafd80e8447b0d46741ee243b7eb74dd2149a0ab1b9246fb30382f27e853d8585719e0e67cbda0daa8f51671064615d645ae27acb15bfb1447f459b", "input": "Hello World", }, "RSA-SHA512/224": { "value": "feca41095c80a571ae782f96bcef9ab81bdf0182509a6844f32c4c17", "input": "Hello World", }, "RSA-SHA512/256": { "value": "ff20018851481c25bfc2e5d0c1e1fa57dac2a237a1a96192f99a10da47aa5442", "input": "Hello World", }, "RSA-SM3": { "value": "77015816143ee627f4fa410b6dad2bdb9fcbdf1e061a452a686b8711a484c5d7", "input": "Hello World", }, "blake2b512": { "value": "4386a08a265111c9896f56456e2cb61a64239115c4784cf438e36cc851221972da3fb0115f73cd02486254001f878ab1fd126aac69844ef1c1ca152379d0a9bd", "input": "Hello World", }, "blake2s256": { "value": "7706af019148849e516f95ba630307a2018bb7bf03803eca5ed7ed2c3c013513", "input": "Hello World", }, "id-rsassa-pkcs1-v1_5-with-sha3-224": { "value": "8e800079a0b311788bf29353f400eff969b650a3597c91efd9aa5b38", "input": "Hello World", }, "id-rsassa-pkcs1-v1_5-with-sha3-256": { "value": "e167f68d6563d75bb25f3aa49c29ef612d41352dc00606de7cbd630bb2665f51", "input": "Hello World", }, "id-rsassa-pkcs1-v1_5-with-sha3-384": { "value": "a78ec2851e991638ce505d4a44efa606dd4056d3ab274ec6fdbac00cde16478263ef7213bad5a7db7044f58d637afdeb", "input": "Hello World", }, "id-rsassa-pkcs1-v1_5-with-sha3-512": { "value": "3d58a719c6866b0214f96b0a67b37e51a91e233ce0be126a08f35fdf4c043c6126f40139bfbc338d44eb2a03de9f7bb8eff0ac260b3629811e389a5fbee8a894", "input": "Hello World", }, "md5": { "value": "b10a8db164e0754105b7a99be72e3fe5", "input": "Hello World", }, "md5-sha1": { "value": "b10a8db164e0754105b7a99be72e3fe50a4d55a8d778e5022fab701977c5d840bbc486d0", "input": "Hello World", }, "md5WithRSAEncryption": { "value": "b10a8db164e0754105b7a99be72e3fe5", "input": "Hello World", }, "ripemd": { "value": "a830d7beb04eb7549ce990fb7dc962e499a27230", "input": "Hello World", }, "ripemd160": { "value": "a830d7beb04eb7549ce990fb7dc962e499a27230", "input": "Hello World", }, "ripemd160WithRSA": { "value": "a830d7beb04eb7549ce990fb7dc962e499a27230", "input": "Hello World", }, "rmd160": { "value": "a830d7beb04eb7549ce990fb7dc962e499a27230", "input": "Hello World", }, "sha1": { "value": "0a4d55a8d778e5022fab701977c5d840bbc486d0", "input": "Hello World", }, "sha1WithRSAEncryption": { "value": "0a4d55a8d778e5022fab701977c5d840bbc486d0", "input": "Hello World", }, "sha224": { "value": "c4890faffdb0105d991a461e668e276685401b02eab1ef4372795047", "input": "Hello World", }, "sha224WithRSAEncryption": { "value": "c4890faffdb0105d991a461e668e276685401b02eab1ef4372795047", "input": "Hello World", }, "sha256": { "value": "a591a6d40bf420404a011733cfb7b190d62c65bf0bcda32b57b277d9ad9f146e", "input": "Hello World", }, "sha256WithRSAEncryption": { "value": "a591a6d40bf420404a011733cfb7b190d62c65bf0bcda32b57b277d9ad9f146e", "input": "Hello World", }, "sha3-224": { "value": "8e800079a0b311788bf29353f400eff969b650a3597c91efd9aa5b38", "input": "Hello World", }, "sha3-256": { "value": "e167f68d6563d75bb25f3aa49c29ef612d41352dc00606de7cbd630bb2665f51", "input": "Hello World", }, "sha3-384": { "value": "a78ec2851e991638ce505d4a44efa606dd4056d3ab274ec6fdbac00cde16478263ef7213bad5a7db7044f58d637afdeb", "input": "Hello World", }, "sha3-512": { "value": "3d58a719c6866b0214f96b0a67b37e51a91e233ce0be126a08f35fdf4c043c6126f40139bfbc338d44eb2a03de9f7bb8eff0ac260b3629811e389a5fbee8a894", "input": "Hello World", }, "sha384": { "value": "99514329186b2f6ae4a1329e7ee6c610a729636335174ac6b740f9028396fcc803d0e93863a7c3d90f86beee782f4f3f", "input": "Hello World", }, "sha384WithRSAEncryption": { "value": "99514329186b2f6ae4a1329e7ee6c610a729636335174ac6b740f9028396fcc803d0e93863a7c3d90f86beee782f4f3f", "input": "Hello World", }, "sha512": { "value": "2c74fd17edafd80e8447b0d46741ee243b7eb74dd2149a0ab1b9246fb30382f27e853d8585719e0e67cbda0daa8f51671064615d645ae27acb15bfb1447f459b", "input": "Hello World", }, "sha512-224": { "value": "feca41095c80a571ae782f96bcef9ab81bdf0182509a6844f32c4c17", "input": "Hello World", }, "sha512-224WithRSAEncryption": { "value": "feca41095c80a571ae782f96bcef9ab81bdf0182509a6844f32c4c17", "input": "Hello World", }, "sha512-256": { "value": "ff20018851481c25bfc2e5d0c1e1fa57dac2a237a1a96192f99a10da47aa5442", "input": "Hello World", }, "sha512-256WithRSAEncryption": { "value": "ff20018851481c25bfc2e5d0c1e1fa57dac2a237a1a96192f99a10da47aa5442", "input": "Hello World", }, "sha512WithRSAEncryption": { "value": "2c74fd17edafd80e8447b0d46741ee243b7eb74dd2149a0ab1b9246fb30382f27e853d8585719e0e67cbda0daa8f51671064615d645ae27acb15bfb1447f459b", "input": "Hello World", }, "shake128": { "value": "1227c5f882f9c57bf2e3e48d2c87eb20", "input": "Hello World", }, "shake256": { "value": "840d1ce81a4327840b54cb1d419907fd1f62359bad33656e058653d2e4172a43", "input": "Hello World", }, "sm3": { "value": "77015816143ee627f4fa410b6dad2bdb9fcbdf1e061a452a686b8711a484c5d7", "input": "Hello World", }, "sm3WithRSAEncryption": { "value": "77015816143ee627f4fa410b6dad2bdb9fcbdf1e061a452a686b8711a484c5d7", "input": "Hello World", }, "ssl3-md5": { "value": "b10a8db164e0754105b7a99be72e3fe5", "input": "Hello World", }, "ssl3-sha1": { "value": "0a4d55a8d778e5022fab701977c5d840bbc486d0", "input": "Hello World", }, }; const unsupported = [ "id-rsassa-pkcs1-v1_5-with-sha3-224", "id-rsassa-pkcs1-v1_5-with-sha3-256", "id-rsassa-pkcs1-v1_5-with-sha3-384", "id-rsassa-pkcs1-v1_5-with-sha3-512", "md5withrsaencryption", "ripemd", "ripemd160withrsa", "rsa-md5", "rsa-ripemd160", "rsa-sha1-2", "rsa-sha3-224", "rsa-sha3-256", "rsa-sha3-384", "rsa-sha3-512", "rsa-sha512/224", "rsa-sha512/256", "rsa-sm3", "sha1withrsaencryption", "sha224withrsaencryption", "sha256withrsaencryption", "sha384withrsaencryption", "sha512withrsaencryption", "sha512-224withrsaencryption", "sha512-256withrsaencryption", "sm3", "sm3withrsaencryption", "ssl3-md5", "ssl3-sha1", ]; for (const name_ in nodeValues) { const name = name_.toLowerCase(); const is_unsupported = unsupported.includes(name); const v = nodeValues[name] || nodeValues[name_]; it(`${name} - "Hello World"`, () => { if (is_unsupported) { expect(() => { const hash = crypto.createHash(name); hash.update("Hello World"); expect(hash.digest("hex")).toBe(v.value); }).toThrow(Error(`Digest method not supported`)); } else { const hash = crypto.createHash(name); hash.update("Hello World"); // testing copy to be sure boringssl workarounds for blake2b256/512, // ripemd160, sha3-, and shake128/256 are working. const copy = hash.copy(); expect(hash.digest("hex")).toBe(v.value); expect(copy.digest("hex")).toBe(v.value); expect(() => { hash.copy(); }).toThrow(Error(`Digest already called`)); expect(() => { copy.copy(); }).toThrow(Error(`Digest already called`)); } }); it(`${name} - "Hello World" -> binary`, () => { if (is_unsupported) { expect(() => { const hash = crypto.createHash(name); hash.update("Hello World"); expect(hash.digest()).toEqual(Buffer.from(v.value, "hex")); }).toThrow(Error(`Digest method not supported`)); } else { const hash = crypto.createHash(name); hash.update("Hello World"); expect(hash.digest()).toEqual(Buffer.from(v.value, "hex")); } }); } it("update & digest", () => { const hash = crypto.createHash("sha256"); hash.update("some data to hash"); expect(hash.digest("hex")).toBe("6a2da20943931e9834fc12cfe5bb47bbd9ae43489a30726962b576f4e3993e50"); }); it("returns Buffer", () => { const hash = crypto.createHash("sha256"); hash.update("some data to hash"); expect(Buffer.isBuffer(hash.digest())).toBeTrue(); }); const otherEncodings = { ucs2: [ 11626, 2466, 37699, 38942, 64564, 53010, 48101, 47943, 44761, 18499, 12442, 26994, 46434, 62582, 39395, 20542, ], latin1: [ 106, 45, 162, 9, 67, 147, 30, 152, 52, 252, 18, 207, 229, 187, 71, 187, 217, 174, 67, 72, 154, 48, 114, 105, 98, 181, 118, 244, 227, 153, 62, 80, ], binary: [ 106, 45, 162, 9, 67, 147, 30, 152, 52, 252, 18, 207, 229, 187, 71, 187, 217, 174, 67, 72, 154, 48, 114, 105, 98, 181, 118, 244, 227, 153, 62, 80, ], base64: [ 97, 105, 50, 105, 67, 85, 79, 84, 72, 112, 103, 48, 47, 66, 76, 80, 53, 98, 116, 72, 117, 57, 109, 117, 81, 48, 105, 97, 77, 72, 74, 112, 89, 114, 86, 50, 57, 79, 79, 90, 80, 108, 65, 61, ], base64url: [ 97, 105, 50, 105, 67, 85, 79, 84, 72, 112, 103, 48, 95, 66, 76, 80, 53, 98, 116, 72, 117, 57, 109, 117, 81, 48, 105, 97, 77, 72, 74, 112, 89, 114, 86, 50, 57, 79, 79, 90, 80, 108, 65, ], hex: [ 54, 97, 50, 100, 97, 50, 48, 57, 52, 51, 57, 51, 49, 101, 57, 56, 51, 52, 102, 99, 49, 50, 99, 102, 101, 53, 98, 98, 52, 55, 98, 98, 100, 57, 97, 101, 52, 51, 52, 56, 57, 97, 51, 48, 55, 50, 54, 57, 54, 50, 98, 53, 55, 54, 102, 52, 101, 51, 57, 57, 51, 101, 53, 48, ], ascii: [ 106, 45, 34, 9, 67, 19, 30, 24, 52, 124, 18, 79, 101, 59, 71, 59, 89, 46, 67, 72, 26, 48, 114, 105, 98, 53, 118, 116, 99, 25, 62, 80, ], utf8: [ 106, 45, 65533, 9, 67, 65533, 30, 65533, 52, 65533, 18, 65533, 65533, 71, 65533, 1646, 67, 72, 65533, 48, 114, 105, 98, 65533, 118, 65533, 65533, 62, 80, ], }; for (let encoding in otherEncodings) { it("digest " + encoding, () => { const hash = crypto.createHash("sha256"); hash.update("some data to hash"); expect( hash .digest(encoding) .split("") .map(a => a.charCodeAt(0)), ).toEqual(otherEncodings[encoding]); }); } it("stream (sync)", () => { const hash = crypto.createHash("sha256"); hash.write("some data to hash"); hash.end(); expect(hash.read().toString("hex")).toBe("6a2da20943931e9834fc12cfe5bb47bbd9ae43489a30726962b576f4e3993e50"); }); it("stream (async)", done => { const hash = crypto.createHash("sha256"); hash.on("readable", () => { const data = hash.read(); if (data) { expect(data.toString("hex")).toBe("6a2da20943931e9834fc12cfe5bb47bbd9ae43489a30726962b576f4e3993e50"); done(); } }); hash.write("some data to hash"); hash.end(); }); it("stream multiple chunks", done => { const hash = crypto.createHash("sha256"); hash.write("some data to hash"); hash.on("readable", () => { const data = hash.read(); if (data) { expect(data.toString("hex")).toBe("43cc4cdc6bd7799b13da2d7c94bba96f3768bf7c4eba7038e0c393e4474fc9e5"); done(); } }); hash.write("some data to hash"); hash.write("some data to hash"); hash.end(); }); it("stream with pipe", done => { const hash = crypto.createHash("sha256"); const s = new PassThrough(); hash.on("readable", () => { const data = hash.read(); if (data) { expect(data.toString("hex")).toBe("0e1076315962f2e639ba2eea46223a813dafea530425613948c4b21635abd8fc"); done(); } }); s.write("Hello world"); s.pipe(hash); s.write("Bun!"); s.end(); }); it("repeated calls doesnt segfault", () => { function fn() { crypto.createHash("sha1").update(Math.random().toString(), "ascii").digest("base64"); } for (let i = 0; i < 10; i++) fn(); }); it("multiple calls to digest throws exception", () => { const hash = crypto.createHash("sha256"); hash.update("hello world"); expect(hash.digest("hex")).toBe("b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9"); expect(() => hash.digest("hex")).toThrow(); }); it("copy is the same", () => { const hash = crypto.createHash("sha256"); hash.update("hello"); const copy = hash.copy(); expect(copy.digest("hex")).toBe(hash.digest("hex")); }); it("copy is not linked", () => { const hash = crypto.createHash("sha256"); hash.update("hello"); const copy = hash.copy(); hash.update("world"); expect(copy.digest("hex")).not.toBe(hash.digest("hex")); }); it("copy updates the same", () => { const hash = crypto.createHash("sha256"); hash.update("hello"); const copy = hash.copy(); hash.update("world"); copy.update("world"); expect(copy.digest("hex")).toBe(hash.digest("hex")); }); it("uses the Transform options object", () => { const hasher = crypto.createHash("sha256", { defaultEncoding: "binary" }); hasher.on("readable", () => { const data = hasher.read(); if (data) { expect(data.toString("hex")).toBe("4d4d75d742863ab9656f3d5f76dff8589c3922e95a24ea6812157ffe4aaa3b6b"); } }); const stream = Readable.from("ï"); stream.pipe(hasher); }); }); describe("Hash", () => { it("should have correct method names", () => { const hash = crypto.createHash("sha256"); expect(hash.update.name).toBe("update"); expect(hash.digest.name).toBe("digest"); expect(hash.copy.name).toBe("copy"); }); }); it("crypto.createHmac", () => { const result = crypto.createHmac("sha256", "key").update("message").digest("base64"); expect(result).toBe("bp7ym3X//Ft6uuUn1Y/a2y/kLnIZARl2kXNDBl9Y7Uo="); }); it("web crypto", async () => { let bytes = new Uint8Array(32); crypto.getRandomValues(bytes); await crypto.subtle.digest("SHA-256", bytes); }); // https://github.com/oven-sh/bun/issues/2110 it("hash regression #2110", () => { var s = "6fbf7e2948e0c2f29eaacac1733546a4af5ca482"; expect(crypto.createHash("sha1").update(s, "binary").digest("hex")).toBe("e7c8b3c6f114c523d07ee355c534ee9bef3c044b"); }); // https://github.com/oven-sh/bun/issues/3680 it("createDecipheriv should validate iv and password", () => { const key = Buffer.alloc(16); expect(() => crypto.createDecipheriv("aes-128-ecb", key, undefined).setAutoPadding(false)).toThrow(); expect(() => crypto.createDecipheriv("aes-128-ecb", key).setAutoPadding(false)).toThrow(); expect(() => crypto.createDecipheriv("aes-128-ecb", key, null).setAutoPadding(false)).not.toThrow(); expect(() => crypto.createDecipheriv("aes-128-ecb", Buffer.from("Random", "utf8"), null).setAutoPadding(false), ).toThrow(); expect(() => crypto.createDecipheriv("aes-128-ecb", key, Buffer.alloc(0)).setAutoPadding(false)).not.toThrow(); expect(() => crypto.createDecipheriv("aes-128-cbc", key, undefined).setAutoPadding(false)).toThrow(); expect(() => crypto.createDecipheriv("aes-128-cbc", key, null).setAutoPadding(false)).toThrow(); expect(() => crypto.createDecipheriv("aes-128-cbc", key).setAutoPadding(false)).toThrow(); expect(() => crypto.createDecipheriv("aes-128-cbc", key, Buffer.alloc(16)).setAutoPadding(false)).not.toThrow(); }); it("Cipheriv.update throws expected error for invalid data", () => { const key = crypto.randomBytes(32); const iv = crypto.randomBytes(16); const cipher = crypto.createCipheriv("aes-256-gcm", key, iv); expect(() => { cipher.update(["c", "d"]); }).toThrow( 'The "data" argument must be of type string or an instance of Buffer, TypedArray, or DataView. Received an instance of Array', ); }); it("verifyOneShot should not accept strings for signatures", () => { const data = Buffer.alloc(1); expect(() => { crypto.verify(null, data, "test", "oops"); }).toThrow( "The \"signature\" argument must be an instance of Buffer, TypedArray, or DataView. Received type string ('oops')", ); }); it("x25519", () => { // Generate Alice's keys const alice = crypto.generateKeyPairSync("x25519", { publicKeyEncoding: { type: "spki", format: "der", }, privateKeyEncoding: { type: "pkcs8", format: "der", }, }); // Generate Bob's keys const bob = crypto.generateKeyPairSync("x25519", { publicKeyEncoding: { type: "spki", format: "der", }, privateKeyEncoding: { type: "pkcs8", format: "der", }, }); // Convert keys to KeyObjects before DH computation const alicePrivateKey = crypto.createPrivateKey({ key: alice.privateKey, format: "der", type: "pkcs8", }); const bobPublicKey = crypto.createPublicKey({ key: bob.publicKey, format: "der", type: "spki", }); const bobPrivateKey = crypto.createPrivateKey({ key: bob.privateKey, format: "der", type: "pkcs8", }); const alicePublicKey = crypto.createPublicKey({ key: alice.publicKey, format: "der", type: "spki", }); // Compute shared secrets using KeyObjects const aliceSecret = crypto.diffieHellman({ privateKey: alicePrivateKey, publicKey: bobPublicKey, }); const bobSecret = crypto.diffieHellman({ privateKey: bobPrivateKey, publicKey: alicePublicKey, }); // Verify both parties computed the same secret expect(aliceSecret).toEqual(bobSecret); expect(aliceSecret.length).toBe(32); // Verify valid key generation expect(() => { crypto.generateKeyPairSync("x25519", { publicKeyEncoding: { type: "spki", format: "der", }, privateKeyEncoding: { type: "pkcs8", format: "der", }, }); }).not.toThrow(); // Test invalid keys - need to create proper KeyObjects even for invalid cases expect(() => { crypto.diffieHellman({ privateKey: crypto.createPrivateKey({ key: Buffer.from("invalid"), format: "der", type: "pkcs8", }), publicKey: bobPublicKey, }); }).toThrow(); expect(() => { crypto.diffieHellman({ privateKey: bobPrivateKey, publicKey: crypto.createPublicKey({ key: Buffer.from("invalid"), format: "der", type: "spki", }), }); }).toThrow(); }); it("encoding should not throw in null, undefined or in valid encodings in createHmac #18700", () => { for (let encoding of [undefined, null, "utf8", "utf-8", "ascii", "binary", "hex", "base64", "base64url"]) { const hmac = crypto.createHmac("sha256", "a secret", { encoding }); hmac.update("some data to hash"); expect(hmac.digest("hex")?.length).toBe(64); } }); it("verifyError should not be on the prototype of DiffieHellman and DiffieHellmanGroup", () => { const dh = crypto.createDiffieHellman(512); expect("verifyError" in crypto.DiffieHellman.prototype).toBeFalse(); expect("verifyError" in dh).toBeTrue(); expect(dh.verifyError).toBe(0); const dhg = crypto.createDiffieHellmanGroup("modp5"); expect("verifyError" in crypto.DiffieHellmanGroup.prototype).toBeFalse(); expect("verifyError" in dhg).toBeTrue(); // boringssl seems to set DH_NOT_SUITABLE_GENERATOR for both // DH_GENERATOR_2 and DH_GENERATOR_5 if not using // DH_generate_parameters_ex expect(dhg.verifyError).toBe(8); }); it("cipher.setAAD should not throw if encoding or plaintextLength is undefined #18700", () => { const key = crypto.randomBytes(32); const iv = crypto.randomBytes(16); expect(() => { const cipher = crypto.createCipheriv("aes-256-gcm", key, iv); cipher.setAAD("0123456789abcdef0123456789abcdef", { encoding: undefined, }); }).not.toThrow(); expect(() => { const cipher = crypto.createCipheriv("aes-256-gcm", key, iv); cipher.setAAD("0123456789abcdef0123456789abcdef", { plaintextLength: undefined, }); }).not.toThrow(); }); it("generatePrime(Sync) should return an ArrayBuffer", async () => { const prime = crypto.generatePrimeSync(512); expect(prime).toBeInstanceOf(ArrayBuffer); const { promise, resolve } = Promise.withResolvers(); crypto.generatePrime(512, (err, prime) => { expect(err).toBeUndefined(); expect(prime).toBeInstanceOf(ArrayBuffer); resolve(); }); await promise; });