1*e7b1675dSTing-Kang Chang // Copyright 2022 Google LLC 2*e7b1675dSTing-Kang Chang // 3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License"); 4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License. 5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang // 7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang // 9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software 10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS, 11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and 13*e7b1675dSTing-Kang Chang // limitations under the License. 14*e7b1675dSTing-Kang Chang // 15*e7b1675dSTing-Kang Chang /////////////////////////////////////////////////////////////////////////////// 16*e7b1675dSTing-Kang Chang #ifndef TINK_EXAMPLES_WALKTHROUGH_TEST_UTIL_H_ 17*e7b1675dSTing-Kang Chang #define TINK_EXAMPLES_WALKTHROUGH_TEST_UTIL_H_ 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Chang #include <memory> 20*e7b1675dSTing-Kang Chang #include <string> 21*e7b1675dSTing-Kang Chang #include <utility> 22*e7b1675dSTing-Kang Chang 23*e7b1675dSTing-Kang Chang #include "absl/strings/string_view.h" 24*e7b1675dSTing-Kang Chang #include "tink/aead.h" 25*e7b1675dSTing-Kang Chang #include "tink/kms_client.h" 26*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h" 27*e7b1675dSTing-Kang Chang 28*e7b1675dSTing-Kang Chang namespace tink_walkthrough { 29*e7b1675dSTing-Kang Chang 30*e7b1675dSTing-Kang Chang // A fake KmsClient that for every key URI always returns an aead from 31*e7b1675dSTing-Kang Chang // kSerializedMasterKeyKeyset. 32*e7b1675dSTing-Kang Chang class FakeKmsClient : public crypto::tink::KmsClient { 33*e7b1675dSTing-Kang Chang public: FakeKmsClient(absl::string_view serialized_master_key_keyset)34*e7b1675dSTing-Kang Chang explicit FakeKmsClient(absl::string_view serialized_master_key_keyset) 35*e7b1675dSTing-Kang Chang : serialized_master_key_keyset_(serialized_master_key_keyset) {} 36*e7b1675dSTing-Kang Chang 37*e7b1675dSTing-Kang Chang bool DoesSupport(absl::string_view key_uri) const override; 38*e7b1675dSTing-Kang Chang 39*e7b1675dSTing-Kang Chang crypto::tink::util::StatusOr<std::unique_ptr<crypto::tink::Aead>> GetAead( 40*e7b1675dSTing-Kang Chang absl::string_view key_uri) const override; 41*e7b1675dSTing-Kang Chang 42*e7b1675dSTing-Kang Chang private: 43*e7b1675dSTing-Kang Chang std::string serialized_master_key_keyset_; 44*e7b1675dSTing-Kang Chang }; 45*e7b1675dSTing-Kang Chang 46*e7b1675dSTing-Kang Chang // A fake KmsClient that always fails to return an AEAD. 47*e7b1675dSTing-Kang Chang class AlwaysFailingFakeKmsClient : public crypto::tink::KmsClient { 48*e7b1675dSTing-Kang Chang public: 49*e7b1675dSTing-Kang Chang bool DoesSupport(absl::string_view key_uri) const override; 50*e7b1675dSTing-Kang Chang 51*e7b1675dSTing-Kang Chang crypto::tink::util::StatusOr<std::unique_ptr<crypto::tink::Aead>> GetAead( 52*e7b1675dSTing-Kang Chang absl::string_view key_uri) const override; 53*e7b1675dSTing-Kang Chang }; 54*e7b1675dSTing-Kang Chang 55*e7b1675dSTing-Kang Chang } // namespace tink_walkthrough 56*e7b1675dSTing-Kang Chang 57*e7b1675dSTing-Kang Chang #endif // TINK_EXAMPLES_WALKTHROUGH_TEST_UTIL_H_ 58