1*e7b1675dSTing-Kang Chang // Copyright 2020 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang #include "aead_impl.h"
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Chang #include <string>
20*e7b1675dSTing-Kang Chang
21*e7b1675dSTing-Kang Chang #include "gmock/gmock.h"
22*e7b1675dSTing-Kang Chang #include "gtest/gtest.h"
23*e7b1675dSTing-Kang Chang #include "tink/aead/aead_config.h"
24*e7b1675dSTing-Kang Chang #include "tink/aead/aead_key_templates.h"
25*e7b1675dSTing-Kang Chang #include "tink/binary_keyset_writer.h"
26*e7b1675dSTing-Kang Chang #include "tink/cleartext_keyset_handle.h"
27*e7b1675dSTing-Kang Chang #include "proto/testing_api.grpc.pb.h"
28*e7b1675dSTing-Kang Chang
29*e7b1675dSTing-Kang Chang namespace crypto {
30*e7b1675dSTing-Kang Chang namespace tink {
31*e7b1675dSTing-Kang Chang namespace {
32*e7b1675dSTing-Kang Chang
33*e7b1675dSTing-Kang Chang using ::crypto::tink::AeadKeyTemplates;
34*e7b1675dSTing-Kang Chang using ::crypto::tink::BinaryKeysetWriter;
35*e7b1675dSTing-Kang Chang using ::crypto::tink::CleartextKeysetHandle;
36*e7b1675dSTing-Kang Chang
37*e7b1675dSTing-Kang Chang using ::testing::Eq;
38*e7b1675dSTing-Kang Chang using ::testing::IsEmpty;
39*e7b1675dSTing-Kang Chang using ::tink_testing_api::AeadDecryptRequest;
40*e7b1675dSTing-Kang Chang using ::tink_testing_api::AeadEncryptRequest;
41*e7b1675dSTing-Kang Chang using ::tink_testing_api::AeadEncryptResponse;
42*e7b1675dSTing-Kang Chang using ::tink_testing_api::AeadDecryptResponse;
43*e7b1675dSTing-Kang Chang
44*e7b1675dSTing-Kang Chang using crypto::tink::KeysetHandle;
45*e7b1675dSTing-Kang Chang using google::crypto::tink::KeyTemplate;
46*e7b1675dSTing-Kang Chang using tink_testing_api::CreationRequest;
47*e7b1675dSTing-Kang Chang using tink_testing_api::CreationResponse;
48*e7b1675dSTing-Kang Chang
ValidKeyset()49*e7b1675dSTing-Kang Chang std::string ValidKeyset() {
50*e7b1675dSTing-Kang Chang const KeyTemplate& key_template = AeadKeyTemplates::Aes128Eax();
51*e7b1675dSTing-Kang Chang auto handle_result = KeysetHandle::GenerateNew(key_template);
52*e7b1675dSTing-Kang Chang EXPECT_TRUE(handle_result.ok());
53*e7b1675dSTing-Kang Chang std::stringbuf keyset;
54*e7b1675dSTing-Kang Chang auto writer_result =
55*e7b1675dSTing-Kang Chang BinaryKeysetWriter::New(absl::make_unique<std::ostream>(&keyset));
56*e7b1675dSTing-Kang Chang EXPECT_TRUE(writer_result.ok());
57*e7b1675dSTing-Kang Chang
58*e7b1675dSTing-Kang Chang auto status = CleartextKeysetHandle::Write(writer_result.value().get(),
59*e7b1675dSTing-Kang Chang *handle_result.value());
60*e7b1675dSTing-Kang Chang EXPECT_TRUE(status.ok());
61*e7b1675dSTing-Kang Chang return keyset.str();
62*e7b1675dSTing-Kang Chang }
63*e7b1675dSTing-Kang Chang
64*e7b1675dSTing-Kang Chang class AeadImplTest : public ::testing::Test {
65*e7b1675dSTing-Kang Chang protected:
SetUpTestSuite()66*e7b1675dSTing-Kang Chang static void SetUpTestSuite() { ASSERT_TRUE(AeadConfig::Register().ok()); }
67*e7b1675dSTing-Kang Chang };
68*e7b1675dSTing-Kang Chang
TEST_F(AeadImplTest,CreateAeadSuccess)69*e7b1675dSTing-Kang Chang TEST_F(AeadImplTest, CreateAeadSuccess) {
70*e7b1675dSTing-Kang Chang tink_testing_api::AeadImpl aead;
71*e7b1675dSTing-Kang Chang std::string keyset = ValidKeyset();
72*e7b1675dSTing-Kang Chang CreationRequest request;
73*e7b1675dSTing-Kang Chang request.mutable_annotated_keyset()->set_serialized_keyset(keyset);
74*e7b1675dSTing-Kang Chang CreationResponse response;
75*e7b1675dSTing-Kang Chang
76*e7b1675dSTing-Kang Chang EXPECT_TRUE(aead.Create(nullptr, &request, &response).ok());
77*e7b1675dSTing-Kang Chang EXPECT_THAT(response.err(), IsEmpty());
78*e7b1675dSTing-Kang Chang }
79*e7b1675dSTing-Kang Chang
TEST_F(AeadImplTest,CreateAeadFails)80*e7b1675dSTing-Kang Chang TEST_F(AeadImplTest, CreateAeadFails) {
81*e7b1675dSTing-Kang Chang tink_testing_api::AeadImpl aead;
82*e7b1675dSTing-Kang Chang CreationRequest request;
83*e7b1675dSTing-Kang Chang request.mutable_annotated_keyset()->set_serialized_keyset("bad keyset");
84*e7b1675dSTing-Kang Chang CreationResponse response;
85*e7b1675dSTing-Kang Chang
86*e7b1675dSTing-Kang Chang EXPECT_TRUE(aead.Create(nullptr, &request, &response).ok());
87*e7b1675dSTing-Kang Chang EXPECT_THAT(response.err(), Not(IsEmpty()));
88*e7b1675dSTing-Kang Chang }
89*e7b1675dSTing-Kang Chang
TEST_F(AeadImplTest,EncryptDecryptSuccess)90*e7b1675dSTing-Kang Chang TEST_F(AeadImplTest, EncryptDecryptSuccess) {
91*e7b1675dSTing-Kang Chang tink_testing_api::AeadImpl aead;
92*e7b1675dSTing-Kang Chang std::string keyset = ValidKeyset();
93*e7b1675dSTing-Kang Chang AeadEncryptRequest enc_request;
94*e7b1675dSTing-Kang Chang enc_request.mutable_annotated_keyset()->set_serialized_keyset(keyset);
95*e7b1675dSTing-Kang Chang enc_request.set_plaintext("Plain text");
96*e7b1675dSTing-Kang Chang enc_request.set_associated_data("ad");
97*e7b1675dSTing-Kang Chang AeadEncryptResponse enc_response;
98*e7b1675dSTing-Kang Chang
99*e7b1675dSTing-Kang Chang EXPECT_TRUE(aead.Encrypt(nullptr, &enc_request, &enc_response).ok());
100*e7b1675dSTing-Kang Chang EXPECT_THAT(enc_response.err(), IsEmpty());
101*e7b1675dSTing-Kang Chang
102*e7b1675dSTing-Kang Chang AeadDecryptRequest dec_request;
103*e7b1675dSTing-Kang Chang dec_request.mutable_annotated_keyset()->set_serialized_keyset(keyset);
104*e7b1675dSTing-Kang Chang dec_request.set_ciphertext(enc_response.ciphertext());
105*e7b1675dSTing-Kang Chang dec_request.set_associated_data("ad");
106*e7b1675dSTing-Kang Chang AeadDecryptResponse dec_response;
107*e7b1675dSTing-Kang Chang
108*e7b1675dSTing-Kang Chang EXPECT_TRUE(aead.Decrypt(nullptr, &dec_request, &dec_response).ok());
109*e7b1675dSTing-Kang Chang EXPECT_THAT(dec_response.err(), IsEmpty());
110*e7b1675dSTing-Kang Chang EXPECT_THAT(dec_response.plaintext(), Eq("Plain text"));
111*e7b1675dSTing-Kang Chang }
112*e7b1675dSTing-Kang Chang
TEST_F(AeadImplTest,EncryptBadKeysetFail)113*e7b1675dSTing-Kang Chang TEST_F(AeadImplTest, EncryptBadKeysetFail) {
114*e7b1675dSTing-Kang Chang tink_testing_api::AeadImpl aead;
115*e7b1675dSTing-Kang Chang AeadEncryptRequest enc_request;
116*e7b1675dSTing-Kang Chang enc_request.mutable_annotated_keyset()->set_serialized_keyset("bad keyset");
117*e7b1675dSTing-Kang Chang enc_request.set_plaintext("Plain text");
118*e7b1675dSTing-Kang Chang enc_request.set_associated_data("ad");
119*e7b1675dSTing-Kang Chang AeadEncryptResponse enc_response;
120*e7b1675dSTing-Kang Chang
121*e7b1675dSTing-Kang Chang EXPECT_FALSE(aead.Encrypt(nullptr, &enc_request, &enc_response).ok());
122*e7b1675dSTing-Kang Chang }
123*e7b1675dSTing-Kang Chang
TEST_F(AeadImplTest,DecryptBadCiphertextFail)124*e7b1675dSTing-Kang Chang TEST_F(AeadImplTest, DecryptBadCiphertextFail) {
125*e7b1675dSTing-Kang Chang tink_testing_api::AeadImpl aead;
126*e7b1675dSTing-Kang Chang std::string keyset = ValidKeyset();
127*e7b1675dSTing-Kang Chang AeadDecryptRequest dec_request;
128*e7b1675dSTing-Kang Chang dec_request.mutable_annotated_keyset()->set_serialized_keyset(keyset);
129*e7b1675dSTing-Kang Chang dec_request.set_ciphertext("bad ciphertext");
130*e7b1675dSTing-Kang Chang dec_request.set_associated_data("ad");
131*e7b1675dSTing-Kang Chang AeadDecryptResponse dec_response;
132*e7b1675dSTing-Kang Chang
133*e7b1675dSTing-Kang Chang EXPECT_TRUE(aead.Decrypt(nullptr, &dec_request, &dec_response).ok());
134*e7b1675dSTing-Kang Chang EXPECT_THAT(dec_response.err(), Not(IsEmpty()));
135*e7b1675dSTing-Kang Chang }
136*e7b1675dSTing-Kang Chang
137*e7b1675dSTing-Kang Chang } // namespace
138*e7b1675dSTing-Kang Chang } // namespace tink
139*e7b1675dSTing-Kang Chang } // namespace crypto
140