Add tests for hybrid package in Java.

The HPKE templates using NIST Curves do not yet work. I also added test that show this.

PiperOrigin-RevId: 477916143
Change-Id: I92c4e60598dc5efb65e00d94c1114af3351b86a8
diff --git a/src/test/java/com/google/crypto/tink/hybrid/BUILD.bazel b/src/test/java/com/google/crypto/tink/hybrid/BUILD.bazel
index 50bff20..21310cd 100644
--- a/src/test/java/com/google/crypto/tink/hybrid/BUILD.bazel
+++ b/src/test/java/com/google/crypto/tink/hybrid/BUILD.bazel
@@ -252,23 +252,21 @@
 )
 
 java_test(
-    name = "HybridEncryptIntegrationTest",
+    name = "HybridTest",
     size = "small",
-    srcs = ["HybridEncryptIntegrationTest.java"],
+    srcs = ["HybridTest.java"],
     deps = [
-        "//proto:common_java_proto",
-        "//proto:ecies_aead_hkdf_java_proto",
-        "//proto:tink_java_proto",
+        "//src/main/java/com/google/crypto/tink:cleartext_keyset_handle",
+        "//src/main/java/com/google/crypto/tink:deterministic_aead",
         "//src/main/java/com/google/crypto/tink:hybrid_decrypt",
         "//src/main/java/com/google/crypto/tink:hybrid_encrypt",
+        "//src/main/java/com/google/crypto/tink:json_keyset_reader",
         "//src/main/java/com/google/crypto/tink:key_templates",
         "//src/main/java/com/google/crypto/tink:registry_cluster",
-        "//src/main/java/com/google/crypto/tink/aead:aead_key_templates",
-        "//src/main/java/com/google/crypto/tink/hybrid:ecies_aead_hkdf_private_key_manager",
-        "//src/main/java/com/google/crypto/tink/hybrid:ecies_aead_hkdf_public_key_manager",
+        "//src/main/java/com/google/crypto/tink/daead:deterministic_aead_config",
         "//src/main/java/com/google/crypto/tink/hybrid:hybrid_config",
-        "//src/main/java/com/google/crypto/tink/subtle:random",
         "//src/main/java/com/google/crypto/tink/testing:test_util",
+        "@maven//:com_google_truth_truth",
         "@maven//:junit_junit",
     ],
 )
diff --git a/src/test/java/com/google/crypto/tink/hybrid/HybridEncryptIntegrationTest.java b/src/test/java/com/google/crypto/tink/hybrid/HybridEncryptIntegrationTest.java
deleted file mode 100644
index 6e40e00..0000000
--- a/src/test/java/com/google/crypto/tink/hybrid/HybridEncryptIntegrationTest.java
+++ /dev/null
@@ -1,156 +0,0 @@
-// Copyright 2017 Google Inc.
-//
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-//      http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License.
-//
-////////////////////////////////////////////////////////////////////////////////
-
-package com.google.crypto.tink.hybrid;
-
-import static java.nio.charset.StandardCharsets.UTF_8;
-import static org.junit.Assert.assertArrayEquals;
-import static org.junit.Assert.assertThrows;
-
-import com.google.crypto.tink.HybridDecrypt;
-import com.google.crypto.tink.HybridEncrypt;
-import com.google.crypto.tink.KeyTemplates;
-import com.google.crypto.tink.KeysetHandle;
-import com.google.crypto.tink.KeysetManager;
-import com.google.crypto.tink.aead.AeadKeyTemplates;
-import com.google.crypto.tink.proto.EcPointFormat;
-import com.google.crypto.tink.proto.EciesAeadHkdfPrivateKey;
-import com.google.crypto.tink.proto.EllipticCurveType;
-import com.google.crypto.tink.proto.HashType;
-import com.google.crypto.tink.proto.KeyData;
-import com.google.crypto.tink.proto.KeyStatusType;
-import com.google.crypto.tink.proto.KeyTemplate;
-import com.google.crypto.tink.proto.Keyset.Key;
-import com.google.crypto.tink.proto.OutputPrefixType;
-import com.google.crypto.tink.subtle.Random;
-import com.google.crypto.tink.testing.TestUtil;
-import java.security.GeneralSecurityException;
-import org.junit.BeforeClass;
-import org.junit.Test;
-import org.junit.runner.RunWith;
-import org.junit.runners.JUnit4;
-
-/** Tests which run the everything for the Hybrid primitives. */
-@RunWith(JUnit4.class)
-public class HybridEncryptIntegrationTest {
-  @BeforeClass
-  public static void setUp() throws Exception {
-    HybridConfig.register();
-  }
-
-  @Test
-  public void testBasicEncryption() throws Exception {
-    EllipticCurveType curve = EllipticCurveType.NIST_P384;
-    HashType hashType = HashType.SHA256;
-    EcPointFormat primaryPointFormat = EcPointFormat.UNCOMPRESSED;
-    EcPointFormat rawPointFormat = EcPointFormat.COMPRESSED;
-    KeyTemplate primaryDemKeyTemplate = AeadKeyTemplates.AES128_CTR_HMAC_SHA256;
-
-    KeyTemplate rawDemKeyTemplate = AeadKeyTemplates.AES128_CTR_HMAC_SHA256;
-    byte[] primarySalt = "some salt".getBytes(UTF_8);
-    byte[] rawSalt = "other salt".getBytes(UTF_8);
-
-    EciesAeadHkdfPrivateKey primaryPrivProto =
-        TestUtil.generateEciesAeadHkdfPrivKey(
-            curve, hashType, primaryPointFormat, primaryDemKeyTemplate, primarySalt);
-
-    Key primaryPriv =
-        TestUtil.createKey(
-            TestUtil.createKeyData(
-                primaryPrivProto,
-                new EciesAeadHkdfPrivateKeyManager().getKeyType(),
-                KeyData.KeyMaterialType.ASYMMETRIC_PRIVATE),
-            8,
-            KeyStatusType.ENABLED,
-            OutputPrefixType.RAW);
-    Key primaryPub =
-        TestUtil.createKey(
-            TestUtil.createKeyData(
-                primaryPrivProto.getPublicKey(),
-                new EciesAeadHkdfPublicKeyManager().getKeyType(),
-                KeyData.KeyMaterialType.ASYMMETRIC_PUBLIC),
-            42,
-            KeyStatusType.ENABLED,
-            OutputPrefixType.RAW);
-
-    EciesAeadHkdfPrivateKey rawPrivProto =
-        TestUtil.generateEciesAeadHkdfPrivKey(
-            curve, hashType, rawPointFormat, rawDemKeyTemplate, rawSalt);
-
-    Key rawPriv =
-        TestUtil.createKey(
-            TestUtil.createKeyData(
-                rawPrivProto,
-                new EciesAeadHkdfPrivateKeyManager().getKeyType(),
-                KeyData.KeyMaterialType.ASYMMETRIC_PRIVATE),
-            11,
-            KeyStatusType.ENABLED,
-            OutputPrefixType.RAW);
-    Key rawPub =
-        TestUtil.createKey(
-            TestUtil.createKeyData(
-                rawPrivProto.getPublicKey(),
-                new EciesAeadHkdfPublicKeyManager().getKeyType(),
-                KeyData.KeyMaterialType.ASYMMETRIC_PUBLIC),
-            43,
-            KeyStatusType.ENABLED,
-            OutputPrefixType.RAW);
-    KeysetHandle keysetHandlePub =
-        TestUtil.createKeysetHandle(TestUtil.createKeyset(primaryPub, rawPub));
-    KeysetHandle keysetHandlePriv =
-        TestUtil.createKeysetHandle(TestUtil.createKeyset(primaryPriv, rawPriv));
-    HybridEncrypt hybridEncrypt = keysetHandlePub.getPrimitive(HybridEncrypt.class);
-    HybridDecrypt hybridDecrypt = keysetHandlePriv.getPrimitive(HybridDecrypt.class);
-    byte[] plaintext = Random.randBytes(20);
-    byte[] contextInfo = Random.randBytes(20);
-    byte[] ciphertext = hybridEncrypt.encrypt(plaintext, contextInfo);
-    assertArrayEquals(plaintext, hybridDecrypt.decrypt(ciphertext, contextInfo));
-  }
-
-  @Test
-  public void testEncryptDecryptWithoutPrimary() throws Exception {
-    // Generate a Keyset with a single private key.
-    KeysetManager manager =
-        KeysetManager.withEmptyKeyset()
-            .add(KeyTemplates.get("ECIES_P256_HKDF_HMAC_SHA256_AES128_GCM"));
-
-    // Generate a keyset handle. This handle does not have a primary key set.
-    KeysetHandle handleWithoutPrimary = manager.getKeysetHandle();
-
-    // Now set the primary key, and generate another keyset handle with the same key.
-    manager.setPrimary(handleWithoutPrimary.getKeysetInfo().getKeyInfo(0).getKeyId());
-    KeysetHandle handleWithPrimary = manager.getKeysetHandle();
-
-    // Use handleWithPrimary, it should work fine.
-    HybridEncrypt hybridEncrypt =
-        handleWithPrimary.getPublicKeysetHandle().getPrimitive(HybridEncrypt.class);
-    HybridDecrypt hybridDecrypt = handleWithPrimary.getPrimitive(HybridDecrypt.class);
-    byte[] plaintext = "plaintext".getBytes(UTF_8);
-    byte[] contextInfo = "contextInfo".getBytes(UTF_8);
-    byte[] ciphertext = hybridEncrypt.encrypt(plaintext, contextInfo);
-    assertArrayEquals(plaintext, hybridDecrypt.decrypt(ciphertext, contextInfo));
-
-    // Use hybridEncryptWithoutPrimary, it should not work.
-    HybridEncrypt hybridEncryptWithoutPrimary =
-        handleWithoutPrimary.getPublicKeysetHandle().getPrimitive(HybridEncrypt.class);
-    assertThrows(
-        GeneralSecurityException.class,
-        () -> hybridEncryptWithoutPrimary.encrypt(plaintext, contextInfo));
-    assertThrows(
-        GeneralSecurityException.class,
-        () -> handleWithoutPrimary.getPrimitive(HybridDecrypt.class));
-  }
-}
diff --git a/src/test/java/com/google/crypto/tink/hybrid/HybridTest.java b/src/test/java/com/google/crypto/tink/hybrid/HybridTest.java
new file mode 100644
index 0000000..95e53f3
--- /dev/null
+++ b/src/test/java/com/google/crypto/tink/hybrid/HybridTest.java
@@ -0,0 +1,316 @@
+// Copyright 2022 Google LLC
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+//      http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+//
+////////////////////////////////////////////////////////////////////////////////
+
+package com.google.crypto.tink.hybrid;
+
+import static com.google.common.truth.Truth.assertThat;
+import static java.nio.charset.StandardCharsets.UTF_8;
+import static org.junit.Assert.assertThrows;
+
+import com.google.crypto.tink.CleartextKeysetHandle;
+import com.google.crypto.tink.DeterministicAead;
+import com.google.crypto.tink.HybridDecrypt;
+import com.google.crypto.tink.HybridEncrypt;
+import com.google.crypto.tink.JsonKeysetReader;
+import com.google.crypto.tink.KeyTemplates;
+import com.google.crypto.tink.KeysetHandle;
+import com.google.crypto.tink.daead.DeterministicAeadConfig;
+import com.google.crypto.tink.testing.TestUtil;
+import java.security.GeneralSecurityException;
+import org.junit.BeforeClass;
+import org.junit.experimental.theories.DataPoints;
+import org.junit.experimental.theories.FromDataPoints;
+import org.junit.experimental.theories.Theories;
+import org.junit.experimental.theories.Theory;
+import org.junit.runner.RunWith;
+
+/** Unit tests for the Hybrid package. Uses only the public API. */
+@RunWith(Theories.class)
+public final class HybridTest {
+
+  @BeforeClass
+  public static void setUp() throws Exception {
+    HybridConfig.register();
+    DeterministicAeadConfig.register(); // Needed for getPrimitiveFromNonSignatureKeyset_throws.
+  }
+
+  @DataPoints("templates")
+  public static final String[] TEMPLATES =
+      new String[] {
+        "ECIES_P256_HKDF_HMAC_SHA256_AES128_GCM",
+        "ECIES_P256_HKDF_HMAC_SHA256_AES128_GCM_RAW",
+        "ECIES_P256_COMPRESSED_HKDF_HMAC_SHA256_AES128_GCM",
+        "ECIES_P256_COMPRESSED_HKDF_HMAC_SHA256_AES128_GCM_RAW",
+        "ECIES_P256_HKDF_HMAC_SHA256_AES128_CTR_HMAC_SHA256",
+        "ECIES_P256_HKDF_HMAC_SHA256_AES128_CTR_HMAC_SHA256_RAW",
+        "ECIES_P256_COMPRESSED_HKDF_HMAC_SHA256_AES128_CTR_HMAC_SHA256",
+        "ECIES_P256_COMPRESSED_HKDF_HMAC_SHA256_AES128_CTR_HMAC_SHA256_RAW",
+        "DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_128_GCM",
+        "DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_128_GCM_RAW",
+        "DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_256_GCM",
+        "DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_256_GCM_RAW",
+        "DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_CHACHA20_POLY1305",
+        "DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_CHACHA20_POLY1305_RAW",
+        "DHKEM_P256_HKDF_SHA256_HKDF_SHA256_AES_128_GCM",
+        "DHKEM_P256_HKDF_SHA256_HKDF_SHA256_AES_128_GCM_RAW",
+        "DHKEM_P256_HKDF_SHA256_HKDF_SHA256_AES_256_GCM",
+        "DHKEM_P256_HKDF_SHA256_HKDF_SHA256_AES_256_GCM_RAW",
+        "DHKEM_P384_HKDF_SHA384_HKDF_SHA384_AES_128_GCM",
+        "DHKEM_P384_HKDF_SHA384_HKDF_SHA384_AES_128_GCM_RAW",
+        "DHKEM_P384_HKDF_SHA384_HKDF_SHA384_AES_256_GCM",
+        "DHKEM_P384_HKDF_SHA384_HKDF_SHA384_AES_256_GCM_RAW",
+        "DHKEM_P521_HKDF_SHA512_HKDF_SHA512_AES_128_GCM",
+        "DHKEM_P521_HKDF_SHA512_HKDF_SHA512_AES_128_GCM_RAW",
+        "DHKEM_P521_HKDF_SHA512_HKDF_SHA512_AES_256_GCM",
+        "DHKEM_P521_HKDF_SHA512_HKDF_SHA512_AES_256_GCM_RAW"
+      };
+
+  @Theory
+  public void createEncryptDecrypt(@FromDataPoints("templates") String templateName)
+      throws Exception {
+    if (TestUtil.isTsan()) {
+      // KeysetHandle.generateNew is too slow in Tsan.
+      return;
+    }
+    KeysetHandle privateHandle = KeysetHandle.generateNew(KeyTemplates.get(templateName));
+    KeysetHandle publicHandle = privateHandle.getPublicKeysetHandle();
+
+    HybridEncrypt encrypter = publicHandle.getPrimitive(HybridEncrypt.class);
+    HybridDecrypt decrypter = privateHandle.getPrimitive(HybridDecrypt.class);
+
+    byte[] plaintext = "plaintext".getBytes(UTF_8);
+    byte[] contextInfo = "contextInfo".getBytes(UTF_8);
+    byte[] ciphertext = encrypter.encrypt(plaintext, contextInfo);
+    assertThat(decrypter.decrypt(ciphertext, contextInfo)).isEqualTo(plaintext);
+
+    KeysetHandle otherPrivateHandle = KeysetHandle.generateNew(KeyTemplates.get(templateName));
+    HybridDecrypt otherDecrypter = otherPrivateHandle.getPrimitive(HybridDecrypt.class);
+    assertThrows(
+        GeneralSecurityException.class, () -> otherDecrypter.decrypt(ciphertext, contextInfo));
+
+    byte[] invalid = "invalid".getBytes(UTF_8);
+    byte[] empty = "".getBytes(UTF_8);
+    assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(ciphertext, invalid));
+    assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(invalid, contextInfo));
+    assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(empty, contextInfo));
+    assertThat(decrypter.decrypt(encrypter.encrypt(empty, contextInfo), contextInfo))
+        .isEqualTo(empty);
+    assertThat(decrypter.decrypt(encrypter.encrypt(plaintext, empty), empty)).isEqualTo(plaintext);
+  }
+
+  // Keyset with one private key for HybridDecrypt, serialized in Tink's JSON format.
+  private static final String JSON_PRIVATE_KEYSET = ""
+      + "{"
+      + "  \"primaryKeyId\": 1885000158,"
+      + "  \"key\": ["
+      + "    {"
+      + "      \"keyData\": {"
+      + "        \"typeUrl\": \"type.googleapis.com/google.crypto.tink.HpkePrivateKey\","
+      + "        \"value\": \"GiBXM1jmpJqe7HUTTkQxRwEld3bvIPTBhqGcI09ki9H0mRIqGiCwWh0y63G"
+      + "fObeWuYZcuLIiFz+15ElOFL7rhf9rbWxdBBIGGAEQAQgB\","
+      + "        \"keyMaterialType\": \"ASYMMETRIC_PRIVATE\""
+      + "      },"
+      + "      \"status\": \"ENABLED\","
+      + "      \"keyId\": 1885000158,"
+      + "      \"outputPrefixType\": \"TINK\""
+      + "    }"
+      + "  ]"
+      + "}";
+
+  // Keyset with the corresponding public key for HybridEncrypt, serialized in Tink's JSON format.
+  private static final String JSON_PUBLIC_KEYSET = ""
+      + "{"
+      + "  \"primaryKeyId\": 1885000158,"
+      + "  \"key\": ["
+      + "    {"
+      + "      \"keyData\": {"
+      + "        \"typeUrl\": \"type.googleapis.com/google.crypto.tink.HpkePublicKey\","
+      + "        \"value\": \"GiCwWh0y63GfObeWuYZcuLIiFz+15ElOFL7rhf9rbWxdBBIGGAEQAQgB\","
+      + "        \"keyMaterialType\": \"ASYMMETRIC_PUBLIC\""
+      + "      },"
+      + "      \"status\": \"ENABLED\","
+      + "      \"keyId\": 1885000158,"
+      + "      \"outputPrefixType\": \"TINK\""
+      + "    }"
+      + "  ]"
+      + "}";
+
+  @Theory
+  public void readKeysetEncryptDecrypt_success()
+      throws Exception {
+    KeysetHandle privateHandle =
+        CleartextKeysetHandle.read(JsonKeysetReader.withString(JSON_PRIVATE_KEYSET));
+    KeysetHandle publicHandle =
+        CleartextKeysetHandle.read(JsonKeysetReader.withString(JSON_PUBLIC_KEYSET));
+
+    HybridEncrypt encrypter = publicHandle.getPrimitive(HybridEncrypt.class);
+    HybridDecrypt decrypter = privateHandle.getPrimitive(HybridDecrypt.class);
+
+    byte[] plaintext = "plaintext".getBytes(UTF_8);
+    byte[] contextInfo = "contextInfo".getBytes(UTF_8);
+    byte[] ciphertext = encrypter.encrypt(plaintext, contextInfo);
+    assertThat(decrypter.decrypt(ciphertext, contextInfo)).isEqualTo(plaintext);
+  }
+
+  // Keyset with multiple keys. The first key is the same as in JSON_PRIVATE_KEYSET. The second
+  // key is the primary key and will be used for signing.
+  private static final String JSON_PRIVATE_KEYSET_WITH_MULTIPLE_KEYS =
+      ""
+          + "{"
+          + "  \"primaryKeyId\": 405658073,"
+          + "  \"key\": ["
+          + "    {"
+          + "      \"keyData\": {"
+          + "        \"typeUrl\": \"type.googleapis.com/google.crypto.tink.HpkePrivateKey\","
+          + "        \"value\": \"GiBXM1jmpJqe7HUTTkQxRwEld3bvIPTBhqGcI09ki9H0mRIqGiCwWh0y63G"
+          + "fObeWuYZcuLIiFz+15ElOFL7rhf9rbWxdBBIGGAEQAQgB\","
+          + "        \"keyMaterialType\": \"ASYMMETRIC_PRIVATE\""
+          + "      },"
+          + "      \"status\": \"ENABLED\","
+          + "      \"keyId\": 1885000158,"
+          + "      \"outputPrefixType\": \"TINK\""
+          + "    },"
+          + "    {"
+          + "      \"keyData\": {"
+          + "        \"typeUrl\":"
+          + "\"type.googleapis.com/google.crypto.tink.EciesAeadHkdfPrivateKey\","
+          + "        \"value\": \"GiAGLU3EgraobyU/aOJalcfR2jUUwK/ubd5mTYHIzLHBnBKiASIgJDF8fcN"
+          + "yDS6BcgYpeVPkJ2/ZBG+Mum30OId4D4CzDuQaIP9J2qo487Shr+MxMIkE3VvMro1r4Z+VFoTP3QWVTpz"
+          + "iElwYARJSElAYARISEggQIAoEEBAIAwoGEBAKAggQCjh0eXBlLmdvb2dsZWFwaXMuY29tL2dvb2dsZS5"
+          + "jcnlwdG8udGluay5BZXNDdHJIbWFjQWVhZEtleQoEEAMIAg==\","
+          + "        \"keyMaterialType\": \"ASYMMETRIC_PRIVATE\""
+          + "      },"
+          + "      \"status\": \"ENABLED\","
+          + "      \"keyId\": 405658073,"
+          + "      \"outputPrefixType\": \"RAW\""
+          + "    },"
+          + "    {"
+          + "      \"keyData\": {"
+          + "        \"typeUrl\": \"type.googleapis.com/google.crypto.tink.HpkePrivateKey\","
+          + "        \"value\": \"GiAnd0VLE8exo149gJ49nkifg03YQLNnRMKfna0AdfYjnBIqGiABOUjRp8F"
+          + "QgppUbZlHCkxRgxGc3jYiChCkm+pf9BL3YhIGGAIQAQgB\","
+          + "        \"keyMaterialType\": \"ASYMMETRIC_PRIVATE\""
+          + "      },"
+          + "      \"status\": \"ENABLED\","
+          + "      \"keyId\": 2085058073,"
+          + "      \"outputPrefixType\": \"LEGACY\""
+          + "    }"
+          + "  ]"
+          + "}";
+
+  // Keyset with the public keys of the keys from JSON_PRIVATE_KEYSET_WITH_MULTIPLE_KEYS.
+  private static final String JSON_PUBLIC_KEYSET_WITH_MULTIPLE_KEYS =
+      ""
+          + "{"
+          + "  \"primaryKeyId\": 405658073,"
+          + "  \"key\": ["
+          + "    {"
+          + "      \"keyData\": {"
+          + "        \"typeUrl\": \"type.googleapis.com/google.crypto.tink.HpkePublicKey\","
+          + "        \"value\": \"GiCwWh0y63GfObeWuYZcuLIiFz+15ElOFL7rhf9rbWxdBBIGGAEQAQgB\","
+          + "        \"keyMaterialType\": \"ASYMMETRIC_PUBLIC\""
+          + "      },"
+          + "      \"status\": \"ENABLED\","
+          + "      \"keyId\": 1885000158,"
+          + "      \"outputPrefixType\": \"TINK\""
+          + "    },"
+          + "    {"
+          + "      \"keyData\": {"
+          + "        \"typeUrl\":"
+          + "\"type.googleapis.com/google.crypto.tink.EciesAeadHkdfPublicKey\","
+          + "        \"value\": \"IiAkMXx9w3INLoFyBil5U+Qnb9kEb4y6bfQ4h3gPgLMO5Bog/0naqjjztKG"
+          + "v4zEwiQTdW8yujWvhn5UWhM/dBZVOnOISXBgBElISUBgBEhISCBAgCgQQEAgDCgYQEAoCCBAKOHR5cGU"
+          + "uZ29vZ2xlYXBpcy5jb20vZ29vZ2xlLmNyeXB0by50aW5rLkFlc0N0ckhtYWNBZWFkS2V5CgQQAwgC\","
+          + "        \"keyMaterialType\": \"ASYMMETRIC_PUBLIC\""
+          + "      },"
+          + "      \"status\": \"ENABLED\","
+          + "      \"keyId\": 405658073,"
+          + "      \"outputPrefixType\": \"RAW\""
+          + "    },"
+          + "    {"
+          + "      \"keyData\": {"
+          + "        \"typeUrl\": \"type.googleapis.com/google.crypto.tink.HpkePublicKey\","
+          + "        \"value\": \"GiABOUjRp8FQgppUbZlHCkxRgxGc3jYiChCkm+pf9BL3YhIGGAIQAQgB\","
+          + "        \"keyMaterialType\": \"ASYMMETRIC_PUBLIC\""
+          + "      },"
+          + "      \"status\": \"ENABLED\","
+          + "      \"keyId\": 2085058073,"
+          + "      \"outputPrefixType\": \"LEGACY\""
+          + "    }"
+          + "  ]"
+          + "}";
+
+  @Theory
+  public void multipleKeysReadKeysetWithEncryptDecrypt()
+      throws Exception {
+    KeysetHandle privateHandle =
+        CleartextKeysetHandle.read(
+            JsonKeysetReader.withString(JSON_PRIVATE_KEYSET_WITH_MULTIPLE_KEYS));
+    KeysetHandle publicHandle =
+        CleartextKeysetHandle.read(
+            JsonKeysetReader.withString(JSON_PUBLIC_KEYSET_WITH_MULTIPLE_KEYS));
+
+    HybridEncrypt encrypter = publicHandle.getPrimitive(HybridEncrypt.class);
+    HybridDecrypt decrypter = privateHandle.getPrimitive(HybridDecrypt.class);
+
+    byte[] plaintext = "plaintext".getBytes(UTF_8);
+    byte[] contextInfo = "contextInfo".getBytes(UTF_8);
+    byte[] ciphertext = encrypter.encrypt(plaintext, contextInfo);
+    assertThat(decrypter.decrypt(ciphertext, contextInfo)).isEqualTo(plaintext);
+
+    // Also test that decrypter can decrypt ciphertext of a non-primary key. We use
+    // JSON_PUBLIC_KEYSET to create a ciphertext with the first key.
+    KeysetHandle publicHandle1 =
+        CleartextKeysetHandle.read(JsonKeysetReader.withString(JSON_PUBLIC_KEYSET));
+    HybridEncrypt encrypter1 = publicHandle1.getPrimitive(HybridEncrypt.class);
+    byte[] ciphertext1 = encrypter1.encrypt(plaintext, contextInfo);
+    assertThat(decrypter.decrypt(ciphertext1, contextInfo)).isEqualTo(plaintext);
+  }
+
+  // A keyset with a valid DeterministicAead key. This keyset can't be used with the HybridEncrypt
+  // or HybridDecrypt.
+  private static final String JSON_DAEAD_KEYSET =
+      ""
+          + "{"
+          + "  \"primaryKeyId\": 961932622,"
+          + "  \"key\": ["
+          + "    {"
+          + "      \"keyData\": {"
+          + "        \"typeUrl\": \"type.googleapis.com/google.crypto.tink.AesSivKey\","
+          + "        \"keyMaterialType\": \"SYMMETRIC\","
+          + "        \"value\": \"EkCJ9r5iwc5uxq5ugFyrHXh5dijTa7qalWUgZ8Gf08RxNd545FjtLMYL7ObcaFtCS"
+          + "kvV2+7u6F2DN+kqUjAfkf2W\""
+          + "      },"
+          + "      \"outputPrefixType\": \"TINK\","
+          + "      \"keyId\": 961932622,"
+          + "      \"status\": \"ENABLED\""
+          + "    }"
+          + "  ]"
+          + "}";
+
+  @Theory
+  public void getPrimitiveFromNonSignatureKeyset_throws()
+      throws Exception {
+    KeysetHandle handle =
+        CleartextKeysetHandle.read(
+            JsonKeysetReader.withString(JSON_DAEAD_KEYSET));
+    // Test that the keyset can create a DeterministicAead primitive, but neither HybridEncrypt
+    // nor HybridDecrypt primitives.
+    handle.getPrimitive(DeterministicAead.class);
+    assertThrows(GeneralSecurityException.class, () -> handle.getPrimitive(HybridEncrypt.class));
+    assertThrows(GeneralSecurityException.class, () -> handle.getPrimitive(HybridDecrypt.class));
+  }
+}