blob: c98eaabb13c4a04755dbf417a97dee44ba56f26c [file] [log] [blame]
// Copyright 2017 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
package com.google.crypto.tink.hybrid;
import static com.google.common.truth.Truth.assertThat;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.fail;
import com.google.crypto.tink.Registry;
import com.google.crypto.tink.TestUtil;
import com.google.crypto.tink.proto.RegistryConfig;
import java.security.GeneralSecurityException;
import org.junit.FixMethodOrder;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.JUnit4;
import org.junit.runners.MethodSorters;
/**
* Tests for HybridConfig. Using FixedMethodOrder to ensure that aaaTestInitialization runs first,
* as it tests execution of a static block within HybridConfig-class.
*/
@RunWith(JUnit4.class)
@FixMethodOrder(MethodSorters.NAME_ASCENDING)
public class HybridConfigTest {
// This test must run first.
@Test
public void aaaTestInitialization() throws Exception {
try {
Registry.getCatalogue("tinkmac");
fail("Expected GeneralSecurityException");
} catch (GeneralSecurityException e) {
assertThat(e.toString()).contains("no catalogue found");
assertThat(e.toString()).contains("MacConfig.register()");
}
try {
Registry.getCatalogue("tinkhybridencrypt");
fail("Expected GeneralSecurityException");
} catch (GeneralSecurityException e) {
assertThat(e.toString()).contains("no catalogue found");
assertThat(e.toString()).contains("HybridConfig.register()");
}
try {
Registry.getCatalogue("tinkhybriddecrypt");
fail("Expected GeneralSecurityException");
} catch (GeneralSecurityException e) {
assertThat(e.toString()).contains("no catalogue found");
assertThat(e.toString()).contains("HybridConfig.register()");
}
String typeUrl = "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey";
try {
Registry.getKeyManager(typeUrl);
fail("Expected GeneralSecurityException");
} catch (GeneralSecurityException e) {
assertThat(e.toString()).contains("No key manager found");
}
// Initialize the config.
HybridConfig.register();
// Now the catalogues should be present.
Registry.getCatalogue("tinkmac");
Registry.getCatalogue("tinkhybriddecrypt");
Registry.getCatalogue("tinkhybridencrypt");
Registry.getKeyManager(typeUrl);
// Running init() manually again should succeed.
HybridConfig.register();
}
@Test
public void testConfigContents1_0_0() throws Exception {
RegistryConfig config = HybridConfig.TINK_1_0_0;
assertEquals(9, config.getEntryCount());
assertEquals("TINK_HYBRID_1_0_0", config.getConfigName());
TestUtil.verifyConfigEntry(
config.getEntry(0),
"TinkMac",
"Mac",
"type.googleapis.com/google.crypto.tink.HmacKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(1),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesCtrHmacAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(2),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesEaxKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(3),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesGcmKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(4),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.ChaCha20Poly1305Key",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(5),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.KmsAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(6),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.KmsEnvelopeAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(7),
"TinkHybridDecrypt",
"HybridDecrypt",
"type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(8),
"TinkHybridEncrypt",
"HybridEncrypt",
"type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey",
true,
0);
}
@Test
public void testConfigContents1_1_0() throws Exception {
RegistryConfig config = HybridConfig.TINK_1_1_0;
assertEquals(9, config.getEntryCount());
assertEquals("TINK_HYBRID_1_1_0", config.getConfigName());
TestUtil.verifyConfigEntry(
config.getEntry(0),
"TinkMac",
"Mac",
"type.googleapis.com/google.crypto.tink.HmacKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(1),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesCtrHmacAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(2),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesEaxKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(3),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesGcmKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(4),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.ChaCha20Poly1305Key",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(5),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.KmsAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(6),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.KmsEnvelopeAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(7),
"TinkHybridDecrypt",
"HybridDecrypt",
"type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(8),
"TinkHybridEncrypt",
"HybridEncrypt",
"type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey",
true,
0);
}
@Test
public void testConfigContents_LATEST() throws Exception {
RegistryConfig config = HybridConfig.LATEST;
assertEquals(10, config.getEntryCount());
assertEquals("TINK_HYBRID", config.getConfigName());
TestUtil.verifyConfigEntry(
config.getEntry(0),
"TinkMac",
"Mac",
"type.googleapis.com/google.crypto.tink.HmacKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(1),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesCtrHmacAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(2),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesEaxKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(3),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.AesGcmKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(4),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.ChaCha20Poly1305Key",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(5),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.KmsAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(6),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.KmsEnvelopeAeadKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(7),
"TinkAead",
"Aead",
"type.googleapis.com/google.crypto.tink.XChaCha20Poly1305Key",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(8),
"TinkHybridDecrypt",
"HybridDecrypt",
"type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey",
true,
0);
TestUtil.verifyConfigEntry(
config.getEntry(9),
"TinkHybridEncrypt",
"HybridEncrypt",
"type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey",
true,
0);
}
}