| // Copyright 2017 Google Inc. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| //////////////////////////////////////////////////////////////////////////////// |
| |
| package com.google.crypto.tink.hybrid; |
| |
| import static com.google.common.truth.Truth.assertThat; |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.fail; |
| |
| import com.google.crypto.tink.Registry; |
| import com.google.crypto.tink.TestUtil; |
| import com.google.crypto.tink.proto.RegistryConfig; |
| import java.security.GeneralSecurityException; |
| import org.junit.FixMethodOrder; |
| import org.junit.Test; |
| import org.junit.runner.RunWith; |
| import org.junit.runners.JUnit4; |
| import org.junit.runners.MethodSorters; |
| |
| /** |
| * Tests for HybridConfig. Using FixedMethodOrder to ensure that aaaTestInitialization runs first, |
| * as it tests execution of a static block within HybridConfig-class. |
| */ |
| @RunWith(JUnit4.class) |
| @FixMethodOrder(MethodSorters.NAME_ASCENDING) |
| public class HybridConfigTest { |
| |
| // This test must run first. |
| @Test |
| public void aaaTestInitialization() throws Exception { |
| try { |
| Registry.getCatalogue("tinkmac"); |
| fail("Expected GeneralSecurityException"); |
| } catch (GeneralSecurityException e) { |
| assertThat(e.toString()).contains("no catalogue found"); |
| assertThat(e.toString()).contains("MacConfig.register()"); |
| } |
| try { |
| Registry.getCatalogue("tinkhybridencrypt"); |
| fail("Expected GeneralSecurityException"); |
| } catch (GeneralSecurityException e) { |
| assertThat(e.toString()).contains("no catalogue found"); |
| assertThat(e.toString()).contains("HybridConfig.register()"); |
| } |
| try { |
| Registry.getCatalogue("tinkhybriddecrypt"); |
| fail("Expected GeneralSecurityException"); |
| } catch (GeneralSecurityException e) { |
| assertThat(e.toString()).contains("no catalogue found"); |
| assertThat(e.toString()).contains("HybridConfig.register()"); |
| } |
| |
| String typeUrl = "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey"; |
| try { |
| Registry.getKeyManager(typeUrl); |
| fail("Expected GeneralSecurityException"); |
| } catch (GeneralSecurityException e) { |
| assertThat(e.toString()).contains("No key manager found"); |
| } |
| |
| // Initialize the config. |
| HybridConfig.register(); |
| |
| // Now the catalogues should be present. |
| Registry.getCatalogue("tinkmac"); |
| Registry.getCatalogue("tinkhybriddecrypt"); |
| Registry.getCatalogue("tinkhybridencrypt"); |
| |
| Registry.getKeyManager(typeUrl); |
| |
| // Running init() manually again should succeed. |
| HybridConfig.register(); |
| } |
| |
| @Test |
| public void testConfigContents1_0_0() throws Exception { |
| RegistryConfig config = HybridConfig.TINK_1_0_0; |
| assertEquals(9, config.getEntryCount()); |
| assertEquals("TINK_HYBRID_1_0_0", config.getConfigName()); |
| |
| TestUtil.verifyConfigEntry( |
| config.getEntry(0), |
| "TinkMac", |
| "Mac", |
| "type.googleapis.com/google.crypto.tink.HmacKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(1), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesCtrHmacAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(2), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesEaxKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(3), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesGcmKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(4), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.ChaCha20Poly1305Key", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(5), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.KmsAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(6), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.KmsEnvelopeAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(7), |
| "TinkHybridDecrypt", |
| "HybridDecrypt", |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(8), |
| "TinkHybridEncrypt", |
| "HybridEncrypt", |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey", |
| true, |
| 0); |
| } |
| |
| @Test |
| public void testConfigContents1_1_0() throws Exception { |
| RegistryConfig config = HybridConfig.TINK_1_1_0; |
| assertEquals(9, config.getEntryCount()); |
| assertEquals("TINK_HYBRID_1_1_0", config.getConfigName()); |
| |
| TestUtil.verifyConfigEntry( |
| config.getEntry(0), |
| "TinkMac", |
| "Mac", |
| "type.googleapis.com/google.crypto.tink.HmacKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(1), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesCtrHmacAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(2), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesEaxKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(3), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesGcmKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(4), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.ChaCha20Poly1305Key", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(5), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.KmsAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(6), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.KmsEnvelopeAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(7), |
| "TinkHybridDecrypt", |
| "HybridDecrypt", |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(8), |
| "TinkHybridEncrypt", |
| "HybridEncrypt", |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey", |
| true, |
| 0); |
| } |
| |
| @Test |
| public void testConfigContents_LATEST() throws Exception { |
| RegistryConfig config = HybridConfig.LATEST; |
| assertEquals(10, config.getEntryCount()); |
| assertEquals("TINK_HYBRID", config.getConfigName()); |
| |
| TestUtil.verifyConfigEntry( |
| config.getEntry(0), |
| "TinkMac", |
| "Mac", |
| "type.googleapis.com/google.crypto.tink.HmacKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(1), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesCtrHmacAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(2), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesEaxKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(3), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.AesGcmKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(4), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.ChaCha20Poly1305Key", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(5), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.KmsAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(6), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.KmsEnvelopeAeadKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(7), |
| "TinkAead", |
| "Aead", |
| "type.googleapis.com/google.crypto.tink.XChaCha20Poly1305Key", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(8), |
| "TinkHybridDecrypt", |
| "HybridDecrypt", |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey", |
| true, |
| 0); |
| TestUtil.verifyConfigEntry( |
| config.getEntry(9), |
| "TinkHybridEncrypt", |
| "HybridEncrypt", |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey", |
| true, |
| 0); |
| } |
| } |