xref: /aosp_15_r20/external/tink/java_src/examples/encryptedkeyset/EncryptedKeysetExample.java (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang /**
2*e7b1675dSTing-Kang Chang  * Copyright 2021 Google LLC
3*e7b1675dSTing-Kang Chang  *
4*e7b1675dSTing-Kang Chang  * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
5*e7b1675dSTing-Kang Chang  * in compliance with the License. You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang  *
7*e7b1675dSTing-Kang Chang  * http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang  *
9*e7b1675dSTing-Kang Chang  * Unless required by applicable law or agreed to in writing, software distributed under the License
10*e7b1675dSTing-Kang Chang  * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
11*e7b1675dSTing-Kang Chang  * or implied. See the License for the specific language governing permissions and limitations under
12*e7b1675dSTing-Kang Chang  * the License.
13*e7b1675dSTing-Kang Chang  */
14*e7b1675dSTing-Kang Chang // [START encrypted-keyset-example]
15*e7b1675dSTing-Kang Chang package encryptedkeyset;
16*e7b1675dSTing-Kang Chang 
17*e7b1675dSTing-Kang Chang import static java.nio.charset.StandardCharsets.UTF_8;
18*e7b1675dSTing-Kang Chang 
19*e7b1675dSTing-Kang Chang import com.google.crypto.tink.Aead;
20*e7b1675dSTing-Kang Chang import com.google.crypto.tink.KeysetHandle;
21*e7b1675dSTing-Kang Chang import com.google.crypto.tink.TinkJsonProtoKeysetFormat;
22*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.AeadConfig;
23*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.KmsAeadKeyManager;
24*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.PredefinedAeadParameters;
25*e7b1675dSTing-Kang Chang import com.google.crypto.tink.integration.gcpkms.GcpKmsClient;
26*e7b1675dSTing-Kang Chang import java.nio.file.Files;
27*e7b1675dSTing-Kang Chang import java.nio.file.Path;
28*e7b1675dSTing-Kang Chang import java.nio.file.Paths;
29*e7b1675dSTing-Kang Chang import java.util.Optional;
30*e7b1675dSTing-Kang Chang 
31*e7b1675dSTing-Kang Chang /**
32*e7b1675dSTing-Kang Chang  * A command-line utility for working with encrypted keysets.
33*e7b1675dSTing-Kang Chang  *
34*e7b1675dSTing-Kang Chang  * <p>It requires the following arguments:
35*e7b1675dSTing-Kang Chang  *
36*e7b1675dSTing-Kang Chang  * <ul>
37*e7b1675dSTing-Kang Chang  *   <li>mode: Can be "generate", "encrypt" or "decrypt". If mode is "generate", it will generate a
38*e7b1675dSTing-Kang Chang  *       keyset, encrypt it and store it in the key-file argument. If mode is "encrypt" or
39*e7b1675dSTing-Kang Chang  *       "decrypt", it will read and decrypt an keyset from the key-file argument, and use it to
40*e7b1675dSTing-Kang Chang  *       encrypt or decrypt the input-file argument.
41*e7b1675dSTing-Kang Chang  *   <li>kek-uri: Use this Cloud KMS' key as the key-encrypting-key for envelope encryption.
42*e7b1675dSTing-Kang Chang  *   <li>gcp-credential-file: Use this JSON credential file to connect to Cloud KMS.
43*e7b1675dSTing-Kang Chang  *   <li>input-file: If mode is "encrypt" or "decrypt", read the input from this file.
44*e7b1675dSTing-Kang Chang  *   <li>output-file: If mode is "encrypt" or "decrypt", write the result to this file.
45*e7b1675dSTing-Kang Chang  */
46*e7b1675dSTing-Kang Chang public final class EncryptedKeysetExample {
47*e7b1675dSTing-Kang Chang   private static final String MODE_ENCRYPT = "encrypt";
48*e7b1675dSTing-Kang Chang   private static final String MODE_DECRYPT = "decrypt";
49*e7b1675dSTing-Kang Chang   private static final String MODE_GENERATE = "generate";
50*e7b1675dSTing-Kang Chang   private static final byte[] EMPTY_ASSOCIATED_DATA = new byte[0];
51*e7b1675dSTing-Kang Chang 
main(String[] args)52*e7b1675dSTing-Kang Chang   public static void main(String[] args) throws Exception {
53*e7b1675dSTing-Kang Chang     if (args.length != 4 && args.length != 6) {
54*e7b1675dSTing-Kang Chang       System.err.printf("Expected 4 or 6 parameters, got %d\n", args.length);
55*e7b1675dSTing-Kang Chang       System.err.println(
56*e7b1675dSTing-Kang Chang           "Usage: java EncryptedKeysetExample generate/encrypt/decrypt key-file kek-uri"
57*e7b1675dSTing-Kang Chang               + " gcp-credential-file input-file output-file");
58*e7b1675dSTing-Kang Chang       System.exit(1);
59*e7b1675dSTing-Kang Chang     }
60*e7b1675dSTing-Kang Chang     String mode = args[0];
61*e7b1675dSTing-Kang Chang     if (!MODE_ENCRYPT.equals(mode) && !MODE_DECRYPT.equals(mode) && !MODE_GENERATE.equals(mode)) {
62*e7b1675dSTing-Kang Chang       System.err.print("The first argument should be either encrypt, decrypt or generate");
63*e7b1675dSTing-Kang Chang       System.exit(1);
64*e7b1675dSTing-Kang Chang     }
65*e7b1675dSTing-Kang Chang     Path keyFile = Paths.get(args[1]);
66*e7b1675dSTing-Kang Chang     String kekUri = args[2];
67*e7b1675dSTing-Kang Chang     String gcpCredentialFilename = args[3];
68*e7b1675dSTing-Kang Chang 
69*e7b1675dSTing-Kang Chang     // Initialise Tink: register all AEAD key types with the Tink runtime
70*e7b1675dSTing-Kang Chang     AeadConfig.register();
71*e7b1675dSTing-Kang Chang 
72*e7b1675dSTing-Kang Chang     // Read the GCP credentials and set up client
73*e7b1675dSTing-Kang Chang     GcpKmsClient.register(Optional.of(kekUri), Optional.of(gcpCredentialFilename));
74*e7b1675dSTing-Kang Chang 
75*e7b1675dSTing-Kang Chang     // From the key-encryption key (KEK) URI, create a remote AEAD primitive for encrypting Tink
76*e7b1675dSTing-Kang Chang     // keysets.
77*e7b1675dSTing-Kang Chang     KeysetHandle kekHandle = KeysetHandle.generateNew(KmsAeadKeyManager.createKeyTemplate(kekUri));
78*e7b1675dSTing-Kang Chang     Aead kekAead = kekHandle.getPrimitive(Aead.class);
79*e7b1675dSTing-Kang Chang 
80*e7b1675dSTing-Kang Chang     if (MODE_GENERATE.equals(mode)) {
81*e7b1675dSTing-Kang Chang       // [START generate-a-new-keyset]
82*e7b1675dSTing-Kang Chang       KeysetHandle handle = KeysetHandle.generateNew(PredefinedAeadParameters.AES128_GCM);
83*e7b1675dSTing-Kang Chang       // [END generate-a-new-keyset]
84*e7b1675dSTing-Kang Chang 
85*e7b1675dSTing-Kang Chang       // [START encrypt-a-keyset]
86*e7b1675dSTing-Kang Chang       String serializedEncryptedKeyset =
87*e7b1675dSTing-Kang Chang           TinkJsonProtoKeysetFormat.serializeEncryptedKeyset(
88*e7b1675dSTing-Kang Chang               handle, kekAead, EMPTY_ASSOCIATED_DATA);
89*e7b1675dSTing-Kang Chang       Files.write(keyFile, serializedEncryptedKeyset.getBytes(UTF_8));
90*e7b1675dSTing-Kang Chang       // [END encrypt-a-keyset]
91*e7b1675dSTing-Kang Chang       return;
92*e7b1675dSTing-Kang Chang     }
93*e7b1675dSTing-Kang Chang 
94*e7b1675dSTing-Kang Chang     // Use the primitive to encrypt/decrypt files
95*e7b1675dSTing-Kang Chang 
96*e7b1675dSTing-Kang Chang     // Read the encrypted keyset
97*e7b1675dSTing-Kang Chang     KeysetHandle handle =
98*e7b1675dSTing-Kang Chang         TinkJsonProtoKeysetFormat.parseEncryptedKeyset(
99*e7b1675dSTing-Kang Chang             new String(Files.readAllBytes(keyFile), UTF_8), kekAead, EMPTY_ASSOCIATED_DATA);
100*e7b1675dSTing-Kang Chang 
101*e7b1675dSTing-Kang Chang     // Get the primitive
102*e7b1675dSTing-Kang Chang     Aead aead = handle.getPrimitive(Aead.class);
103*e7b1675dSTing-Kang Chang 
104*e7b1675dSTing-Kang Chang     Path inputFile = Paths.get(args[4]);
105*e7b1675dSTing-Kang Chang     Path outputFile = Paths.get(args[5]);
106*e7b1675dSTing-Kang Chang 
107*e7b1675dSTing-Kang Chang     if (MODE_ENCRYPT.equals(mode)) {
108*e7b1675dSTing-Kang Chang       byte[] plaintext = Files.readAllBytes(inputFile);
109*e7b1675dSTing-Kang Chang       byte[] ciphertext = aead.encrypt(plaintext, EMPTY_ASSOCIATED_DATA);
110*e7b1675dSTing-Kang Chang       Files.write(outputFile, ciphertext);
111*e7b1675dSTing-Kang Chang     } else if (MODE_DECRYPT.equals(mode)) {
112*e7b1675dSTing-Kang Chang       byte[] ciphertext = Files.readAllBytes(inputFile);
113*e7b1675dSTing-Kang Chang       byte[] plaintext = aead.decrypt(ciphertext, EMPTY_ASSOCIATED_DATA);
114*e7b1675dSTing-Kang Chang       Files.write(outputFile, plaintext);
115*e7b1675dSTing-Kang Chang     }
116*e7b1675dSTing-Kang Chang   }
117*e7b1675dSTing-Kang Chang 
EncryptedKeysetExample()118*e7b1675dSTing-Kang Chang   private EncryptedKeysetExample() {}
119*e7b1675dSTing-Kang Chang }
120*e7b1675dSTing-Kang Chang // [END encrypted-keyset-example]
121