| // Copyright 2017 Google Inc. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| //////////////////////////////////////////////////////////////////////////////// |
| |
| #include "tink/hybrid/hybrid_config.h" |
| |
| #include "tink/catalogue.h" |
| #include "tink/config.h" |
| #include "tink/registry.h" |
| #include "tink/util/status.h" |
| #include "gtest/gtest.h" |
| |
| |
| namespace crypto { |
| namespace tink { |
| namespace { |
| |
| class DummyHybridDecryptCatalogue : public Catalogue<HybridDecrypt> { |
| public: |
| DummyHybridDecryptCatalogue() {} |
| |
| crypto::tink::util::StatusOr<std::unique_ptr<KeyManager<HybridDecrypt>>> |
| GetKeyManager(const std::string& type_url, |
| const std::string& primitive_name, |
| uint32_t min_version) const override { |
| return util::Status::UNKNOWN; |
| } |
| }; |
| |
| |
| class HybridConfigTest : public ::testing::Test { |
| protected: |
| void SetUp() override { |
| Registry::Reset(); |
| } |
| }; |
| |
| TEST_F(HybridConfigTest, testBasic) { |
| std::string decrypt_key_type = |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey"; |
| std::string encrypt_key_type = |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey"; |
| std::string aes_ctr_hmac_aead_key_type = |
| "type.googleapis.com/google.crypto.tink.AesCtrHmacAeadKey"; |
| std::string aes_eax_key_type = |
| "type.googleapis.com/google.crypto.tink.AesEaxKey"; |
| std::string aes_gcm_key_type = |
| "type.googleapis.com/google.crypto.tink.AesGcmKey"; |
| std::string hmac_key_type = |
| "type.googleapis.com/google.crypto.tink.HmacKey"; |
| auto& config = HybridConfig::Latest(); |
| |
| EXPECT_EQ(6, HybridConfig::Latest().entry_size()); |
| |
| EXPECT_EQ("TinkMac", config.entry(0).catalogue_name()); |
| EXPECT_EQ("Mac", config.entry(0).primitive_name()); |
| EXPECT_EQ(hmac_key_type, config.entry(0).type_url()); |
| EXPECT_EQ(true, config.entry(0).new_key_allowed()); |
| EXPECT_EQ(0, config.entry(0).key_manager_version()); |
| |
| EXPECT_EQ("TinkAead", config.entry(1).catalogue_name()); |
| EXPECT_EQ("Aead", config.entry(1).primitive_name()); |
| EXPECT_EQ(aes_ctr_hmac_aead_key_type, config.entry(1).type_url()); |
| EXPECT_EQ(true, config.entry(1).new_key_allowed()); |
| EXPECT_EQ(0, config.entry(1).key_manager_version()); |
| |
| EXPECT_EQ("TinkAead", config.entry(2).catalogue_name()); |
| EXPECT_EQ("Aead", config.entry(2).primitive_name()); |
| EXPECT_EQ(aes_gcm_key_type, config.entry(2).type_url()); |
| EXPECT_EQ(true, config.entry(2).new_key_allowed()); |
| EXPECT_EQ(0, config.entry(2).key_manager_version()); |
| |
| EXPECT_EQ("TinkAead", config.entry(3).catalogue_name()); |
| EXPECT_EQ("Aead", config.entry(3).primitive_name()); |
| EXPECT_EQ(aes_eax_key_type, config.entry(3).type_url()); |
| EXPECT_EQ(true, config.entry(3).new_key_allowed()); |
| EXPECT_EQ(0, config.entry(3).key_manager_version()); |
| |
| EXPECT_EQ("TinkHybridDecrypt", config.entry(4).catalogue_name()); |
| EXPECT_EQ("HybridDecrypt", config.entry(4).primitive_name()); |
| EXPECT_EQ(decrypt_key_type, config.entry(4).type_url()); |
| EXPECT_EQ(true, config.entry(4).new_key_allowed()); |
| EXPECT_EQ(0, config.entry(4).key_manager_version()); |
| |
| EXPECT_EQ("TinkHybridEncrypt", config.entry(5).catalogue_name()); |
| EXPECT_EQ("HybridEncrypt", config.entry(5).primitive_name()); |
| EXPECT_EQ(encrypt_key_type, config.entry(5).type_url()); |
| EXPECT_EQ(true, config.entry(5).new_key_allowed()); |
| EXPECT_EQ(0, config.entry(5).key_manager_version()); |
| |
| // No key manager before registration. |
| auto decrypt_manager_result = |
| Registry::get_key_manager<HybridDecrypt>(decrypt_key_type); |
| EXPECT_FALSE(decrypt_manager_result.ok()); |
| EXPECT_EQ(util::error::NOT_FOUND, |
| decrypt_manager_result.status().error_code()); |
| |
| auto encrypt_manager_result = |
| Registry::get_key_manager<HybridEncrypt>(encrypt_key_type); |
| EXPECT_FALSE(encrypt_manager_result.ok()); |
| EXPECT_EQ(util::error::NOT_FOUND, |
| encrypt_manager_result.status().error_code()); |
| |
| // Registration of standard key types works. |
| auto status = HybridConfig::Register(); |
| EXPECT_TRUE(status.ok()) << status; |
| decrypt_manager_result = |
| Registry::get_key_manager<HybridDecrypt>(decrypt_key_type); |
| EXPECT_TRUE(decrypt_manager_result.ok()) << decrypt_manager_result.status(); |
| EXPECT_TRUE(decrypt_manager_result.ValueOrDie() |
| ->DoesSupport(decrypt_key_type)); |
| encrypt_manager_result = |
| Registry::get_key_manager<HybridEncrypt>(encrypt_key_type); |
| EXPECT_TRUE(encrypt_manager_result.ok()) << encrypt_manager_result.status(); |
| EXPECT_TRUE(encrypt_manager_result.ValueOrDie() |
| ->DoesSupport(encrypt_key_type)); |
| } |
| |
| TEST_F(HybridConfigTest, testRegister) { |
| std::string key_type = |
| "type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey"; |
| |
| // Try on empty registry. |
| auto status = Config::Register(HybridConfig::Latest()); |
| EXPECT_FALSE(status.ok()); |
| EXPECT_EQ(util::error::NOT_FOUND, status.error_code()); |
| auto manager_result = Registry::get_key_manager<HybridEncrypt>(key_type); |
| EXPECT_FALSE(manager_result.ok()); |
| |
| // Register and try again. |
| status = HybridConfig::Register(); |
| EXPECT_TRUE(status.ok()) << status; |
| manager_result = Registry::get_key_manager<HybridEncrypt>(key_type); |
| EXPECT_TRUE(manager_result.ok()) << manager_result.status(); |
| |
| // Try Register() again, should succeed (idempotence). |
| status = HybridConfig::Register(); |
| EXPECT_TRUE(status.ok()) << status; |
| |
| // Reset the registry, and try overriding a catalogue with a different one. |
| Registry::Reset(); |
| status = Registry::AddCatalogue("TinkHybridDecrypt", |
| new DummyHybridDecryptCatalogue()); |
| EXPECT_TRUE(status.ok()) << status; |
| status = HybridConfig::Register(); |
| EXPECT_FALSE(status.ok()); |
| EXPECT_EQ(util::error::ALREADY_EXISTS, status.error_code()); |
| } |
| |
| } // namespace |
| } // namespace tink |
| } // namespace crypto |
| |
| |
| int main(int ac, char* av[]) { |
| testing::InitGoogleTest(&ac, av); |
| return RUN_ALL_TESTS(); |
| } |