| # Copyright 2020 Google LLC |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| """Tests for tink.python.tink.prf.prf_set_key_manager.""" |
| |
| from absl.testing import absltest |
| from absl.testing import parameterized |
| from tink.proto import common_pb2 |
| from tink.proto import hmac_prf_pb2 |
| from tink.proto import tink_pb2 |
| import tink |
| from tink import core |
| from tink import prf |
| |
| |
| def setUpModule(): |
| prf.register() |
| |
| |
| class PrfKeyManagerTest(parameterized.TestCase): |
| |
| def test_new_key_data_success(self): |
| key_template = prf.prf_key_templates._create_hmac_key_template( |
| key_size=32, hash_type=common_pb2.SHA256) |
| key_manager = core.Registry.key_manager(key_template.type_url) |
| key_data = key_manager.new_key_data(key_template) |
| self.assertEqual(key_data.type_url, key_template.type_url) |
| self.assertEqual(key_data.key_material_type, tink_pb2.KeyData.SYMMETRIC) |
| key = hmac_prf_pb2.HmacPrfKey.FromString(key_data.value) |
| self.assertEqual(key.version, 0) |
| self.assertEqual(key.params.hash, common_pb2.SHA256) |
| self.assertLen(key.key_value, 32) |
| |
| def test_invalid_params_throw_exception(self): |
| template = prf.prf_key_templates._create_hmac_key_template( |
| key_size=7, hash_type=common_pb2.SHA256) |
| with self.assertRaises(tink.TinkError): |
| tink.new_keyset_handle(template) |
| |
| @parameterized.parameters([ |
| prf.prf_key_templates.AES_CMAC, prf.prf_key_templates.HMAC_SHA256, |
| prf.prf_key_templates.HMAC_SHA512, prf.prf_key_templates.HKDF_SHA256 |
| ]) |
| def test_compute_success(self, template): |
| keyset_handle = tink.new_keyset_handle(template) |
| primitive = keyset_handle.primitive(prf.PrfSet) |
| output = primitive.primary().compute(b'input_data', output_length=15) |
| self.assertLen(output, 15) |
| self.assertEqual( |
| primitive.primary().compute(b'input_data', output_length=15), output) |
| self.assertNotEqual( |
| primitive.primary().compute(b'some_other_data', output_length=15), |
| output) |
| prfs = primitive.all() |
| self.assertLen(prfs, 1) |
| self.assertEqual( |
| prfs[primitive.primary_id()].compute(b'input_data', output_length=15), |
| output) |
| |
| @parameterized.parameters([ |
| prf.prf_key_templates.AES_CMAC, prf.prf_key_templates.HMAC_SHA256, |
| prf.prf_key_templates.HMAC_SHA512, prf.prf_key_templates.HKDF_SHA256 |
| ]) |
| def test_output_too_long_raises_error(self, template): |
| keyset_handle = tink.new_keyset_handle(template) |
| primitive = keyset_handle.primitive(prf.PrfSet) |
| with self.assertRaises(tink.TinkError): |
| primitive.primary().compute(b'input_data', output_length=1234567) |
| prfs = primitive.all() |
| self.assertLen(prfs, 1) |
| p = prfs[primitive.primary_id()] |
| with self.assertRaises(tink.TinkError): |
| p.compute(b'input_data', output_length=1234567) |
| |
| if __name__ == '__main__': |
| absltest.main() |