// Copyright 2020 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // //////////////////////////////////////////////////////////////////////////////// package streamingaead_test import ( "bytes" "io" "testing" "github.com/google/tink/go/keyset" "github.com/google/tink/go/streamingaead" tinkpb "github.com/google/tink/go/proto/tink_go_proto" ) func TestKeyTemplates(t *testing.T) { var testCases = []struct { name string template *tinkpb.KeyTemplate }{ { name: "AES128_GCM_HKDF_4KB", template: streamingaead.AES128GCMHKDF4KBKeyTemplate(), }, { name: "AES128_GCM_HKDF_1MB", template: streamingaead.AES128GCMHKDF1MBKeyTemplate(), }, { name: "AES256_GCM_HKDF_4KB", template: streamingaead.AES256GCMHKDF4KBKeyTemplate(), }, { name: "AES256_GCM_HKDF_1MB", template: streamingaead.AES256GCMHKDF1MBKeyTemplate(), }, { name: "AES128_CTR_HMAC_SHA256_4KB", template: streamingaead.AES128CTRHMACSHA256Segment4KBKeyTemplate(), }, { name: "AES128_CTR_HMAC_SHA256_1MB", template: streamingaead.AES128CTRHMACSHA256Segment1MBKeyTemplate(), }, { name: "AES256_CTR_HMAC_SHA256_4KB", template: streamingaead.AES256CTRHMACSHA256Segment4KBKeyTemplate(), }, { name: "AES256_CTR_HMAC_SHA256_1MB", template: streamingaead.AES256CTRHMACSHA256Segment1MBKeyTemplate(), }, } for _, tc := range testCases { t.Run(tc.name, func(t *testing.T) { handle, err := keyset.NewHandle(tc.template) if err != nil { t.Fatalf("keyset.NewHandle(template) failed: %v", err) } primitive, err := streamingaead.New(handle) if err != nil { t.Fatalf("aead.New(handle) failed: %v", err) } plaintext := []byte("some data to encrypt") aad := []byte("extra data to authenticate") buf := &bytes.Buffer{} w, err := primitive.NewEncryptingWriter(buf, aad) if err != nil { t.Fatalf("primitive.NewEncryptingWriter(buf, aad) failed: %v", err) } if _, err := w.Write(plaintext); err != nil { t.Fatalf("w.Write(plaintext) failed: %v", err) } if err := w.Close(); err != nil { t.Fatalf("w.Close() failed: %v", err) } r, err := primitive.NewDecryptingReader(buf, aad) if err != nil { t.Fatalf("primitive.NewDecryptingReader(buf, aad) failed: %v", err) } decrypted, err := io.ReadAll(r) if err != nil { t.Fatalf("io.ReadAll(r) failed: %v", err) } if !bytes.Equal(decrypted, plaintext) { t.Errorf("decrypted data doesn't match plaintext, got: %q, want: ''", decrypted) } }) } }