blob: da236355e6639477d27abf61fa368275fa03fb5b [file] [log] [blame]
/**
* @license
* Copyright 2020 Google LLC
* SPDX-License-Identifier: Apache-2.0
*/
import {AeadKeyTemplates} from '../aead/aead_key_templates';
import {PbEciesAeadHkdfKeyFormat, PbEllipticCurveType, PbHashType, PbOutputPrefixType, PbPointFormat} from '../internal/proto';
import {assertMessageEquals} from '../testing/internal/test_utils';
import {EciesAeadHkdfPrivateKeyManager} from './ecies_aead_hkdf_private_key_manager';
import {HybridKeyTemplates} from './hybrid_key_templates';
describe('hybrid key templates test', function() {
it('ecies p256 hkdf hmac sha256 aes128 gcm', function() {
// Expects function to create a key with following parameters.
const expectedCurve = PbEllipticCurveType.NIST_P256;
const expectedHkdfHashFunction = PbHashType.SHA256;
const expectedAeadTemplate = AeadKeyTemplates.aes128Gcm();
const expectedPointFormat = PbPointFormat.UNCOMPRESSED;
const expectedOutputPrefix = PbOutputPrefixType.TINK;
// Expected type URL is the one supported by EciesAeadHkdfPrivateKeyManager.
const manager = new EciesAeadHkdfPrivateKeyManager();
const expectedTypeUrl = manager.getKeyType();
const keyTemplate = HybridKeyTemplates.eciesP256HkdfHmacSha256Aes128Gcm();
expect(keyTemplate.getTypeUrl()).toBe(expectedTypeUrl);
expect(keyTemplate.getOutputPrefixType()).toBe(expectedOutputPrefix);
// Test values in key format.
const keyFormat =
PbEciesAeadHkdfKeyFormat.deserializeBinary(keyTemplate.getValue_asU8());
const params = keyFormat.getParams();
expect(params!.getEcPointFormat()).toBe(expectedPointFormat);
// Test KEM params.
const kemParams = params!.getKemParams();
expect(kemParams!.getCurveType()).toBe(expectedCurve);
expect(kemParams!.getHkdfHashType()).toBe(expectedHkdfHashFunction);
// Test DEM params.
const demParams = params!.getDemParams();
assertMessageEquals(demParams!.getAeadDem()!, expectedAeadTemplate);
// Test that the template works with EciesAeadHkdfPrivateKeyManager.
manager.getKeyFactory().newKey(keyTemplate.getValue_asU8());
});
it('ecies p256 hkdf hmac sha256 aes128 ctr hmac sha256', function() {
// Expects function to create a key with following parameters.
const expectedCurve = PbEllipticCurveType.NIST_P256;
const expectedHkdfHashFunction = PbHashType.SHA256;
const expectedAeadTemplate = AeadKeyTemplates.aes128CtrHmacSha256();
const expectedPointFormat = PbPointFormat.UNCOMPRESSED;
const expectedOutputPrefix = PbOutputPrefixType.TINK;
// Expected type URL is the one supported by EciesAeadHkdfPrivateKeyManager.
const manager = new EciesAeadHkdfPrivateKeyManager();
const expectedTypeUrl = manager.getKeyType();
const keyTemplate =
HybridKeyTemplates.eciesP256HkdfHmacSha256Aes128CtrHmacSha256();
expect(keyTemplate.getTypeUrl()).toBe(expectedTypeUrl);
expect(keyTemplate.getOutputPrefixType()).toBe(expectedOutputPrefix);
// Test values in key format.
const keyFormat =
PbEciesAeadHkdfKeyFormat.deserializeBinary(keyTemplate.getValue_asU8());
const params = keyFormat.getParams();
expect(params!.getEcPointFormat()).toBe(expectedPointFormat);
// Test KEM params.
const kemParams = params!.getKemParams();
expect(kemParams!.getCurveType()).toBe(expectedCurve);
expect(kemParams!.getHkdfHashType()).toBe(expectedHkdfHashFunction);
// Test DEM params.
const demParams = params!.getDemParams();
assertMessageEquals(demParams!.getAeadDem()!, expectedAeadTemplate);
// Test that the template works with EciesAeadHkdfPrivateKeyManager.
manager.getKeyFactory().newKey(keyTemplate.getValue_asU8());
});
});