1*e7b1675dSTing-Kang Chang // Copyright 2022 Google LLC 2*e7b1675dSTing-Kang Chang // 3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License"); 4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License. 5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang // 7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang // 9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software 10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS, 11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and 13*e7b1675dSTing-Kang Chang // limitations under the License. 14*e7b1675dSTing-Kang Chang // 15*e7b1675dSTing-Kang Chang /////////////////////////////////////////////////////////////////////////////// 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Chang #include "walkthrough/test_util.h" 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Chang #include <memory> 20*e7b1675dSTing-Kang Chang 21*e7b1675dSTing-Kang Chang #include "absl/strings/match.h" 22*e7b1675dSTing-Kang Chang #include "walkthrough/load_cleartext_keyset.h" 23*e7b1675dSTing-Kang Chang #include "tink/keyset_handle.h" 24*e7b1675dSTing-Kang Chang 25*e7b1675dSTing-Kang Chang namespace tink_walkthrough { 26*e7b1675dSTing-Kang Chang 27*e7b1675dSTing-Kang Chang using ::crypto::tink::Aead; 28*e7b1675dSTing-Kang Chang using ::crypto::tink::KeysetHandle; 29*e7b1675dSTing-Kang Chang using ::crypto::tink::util::Status; 30*e7b1675dSTing-Kang Chang using ::crypto::tink::util::StatusOr; 31*e7b1675dSTing-Kang Chang DoesSupport(absl::string_view key_uri) const32*e7b1675dSTing-Kang Changbool FakeKmsClient::DoesSupport(absl::string_view key_uri) const { 33*e7b1675dSTing-Kang Chang return absl::StartsWith(key_uri, "fake://"); 34*e7b1675dSTing-Kang Chang } 35*e7b1675dSTing-Kang Chang GetAead(absl::string_view key_uri) const36*e7b1675dSTing-Kang ChangStatusOr<std::unique_ptr<Aead>> FakeKmsClient::GetAead( 37*e7b1675dSTing-Kang Chang absl::string_view key_uri) const { 38*e7b1675dSTing-Kang Chang StatusOr<std::unique_ptr<KeysetHandle>> master_key_keyset = 39*e7b1675dSTing-Kang Chang LoadKeyset(serialized_master_key_keyset_); 40*e7b1675dSTing-Kang Chang if (!master_key_keyset.ok()) return master_key_keyset.status(); 41*e7b1675dSTing-Kang Chang return (*master_key_keyset)->GetPrimitive<Aead>(); 42*e7b1675dSTing-Kang Chang } 43*e7b1675dSTing-Kang Chang DoesSupport(absl::string_view key_uri) const44*e7b1675dSTing-Kang Changbool AlwaysFailingFakeKmsClient::DoesSupport(absl::string_view key_uri) const { 45*e7b1675dSTing-Kang Chang return absl::StartsWith(key_uri, "failing://"); 46*e7b1675dSTing-Kang Chang } 47*e7b1675dSTing-Kang Chang GetAead(absl::string_view key_uri) const48*e7b1675dSTing-Kang ChangStatusOr<std::unique_ptr<Aead>> AlwaysFailingFakeKmsClient::GetAead( 49*e7b1675dSTing-Kang Chang absl::string_view key_uri) const { 50*e7b1675dSTing-Kang Chang return Status(absl::StatusCode::kUnimplemented, "Unimplemented"); 51*e7b1675dSTing-Kang Chang } 52*e7b1675dSTing-Kang Chang 53*e7b1675dSTing-Kang Chang } // namespace tink_walkthrough 54