blob: 9d4526f467bcb2faad9cef039b9ce92b13e7fb70 [file] [log] [blame]
# Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Cross-language tests for Hybrid Encryption."""
from typing import Iterable, Tuple
from absl.testing import absltest
from absl.testing import parameterized
import tink
from tink import aead
from tink import daead
from tink import hybrid
from tink.proto import common_pb2
from tink.proto import tink_pb2
from tink.testing import keyset_builder
from util import testing_servers
from util import utilities
SUPPORTED_LANGUAGES = testing_servers.SUPPORTED_LANGUAGES_BY_PRIMITIVE['hybrid']
def setUpModule():
hybrid.register()
testing_servers.start('hybrid')
def tearDownModule():
testing_servers.stop()
# maps from key_template_name to (key_template, supported_langs)
_ADDITIONAL_KEY_TEMPLATES = {
'ECIES_P256_HKDF_HMAC_SHA256_AES256_SIV':
(hybrid.hybrid_key_templates.create_ecies_aead_hkdf_key_template(
curve_type=common_pb2.NIST_P256,
ec_point_format=common_pb2.COMPRESSED,
hash_type=common_pb2.SHA256,
dem_key_template=daead.deterministic_aead_key_templates.AES256_SIV),
['cc', 'java', 'go', 'python']),
'ECIES_P256_HKDF_HMAC_SHA256_XCHACHA20_POLY1305':
(hybrid.hybrid_key_templates.create_ecies_aead_hkdf_key_template(
curve_type=common_pb2.NIST_P256,
ec_point_format=common_pb2.UNCOMPRESSED,
hash_type=common_pb2.SHA256,
dem_key_template=aead.aead_key_templates.XCHACHA20_POLY1305),
# Java and Go do not support XCHACHA20_POLY1305 for hybrid encryption.
['cc', 'python']),
# equal to HybridKeyTemplates::EciesX25519HkdfHmacSha256Aes128Gcm
'ECIES_X25519_HKDF_HMAC_SHA256_AES128_GCM':
(hybrid.hybrid_key_templates.create_ecies_aead_hkdf_key_template(
curve_type=common_pb2.CURVE25519,
ec_point_format=common_pb2.COMPRESSED,
hash_type=common_pb2.SHA256,
dem_key_template=aead.aead_key_templates.AES128_GCM),
# Java and Go do not support CURVE25519 for hybrid encryption.
['cc', 'python']),
# equal to HybridKeyTemplates::EciesX25519HkdfHmacSha256Aes128CtrHmacSha256
'ECIES_X25519_HKDF_HMAC_SHA256_AES128_CTR_HMAC_SHA256':
(hybrid.hybrid_key_templates.create_ecies_aead_hkdf_key_template(
curve_type=common_pb2.CURVE25519,
ec_point_format=common_pb2.COMPRESSED,
hash_type=common_pb2.SHA256,
dem_key_template=aead.aead_key_templates.AES128_CTR_HMAC_SHA256),
# Java and Go do not support CURVE25519 for hybrid encryption.
['cc', 'python']),
# equal to HybridKeyTemplates::EciesX25519HkdfHmacSha256XChaCha20Poly1305
'ECIES_X25519_HKDF_HMAC_SHA256_XCHACHA20_POLY1305':
(hybrid.hybrid_key_templates.create_ecies_aead_hkdf_key_template(
curve_type=common_pb2.CURVE25519,
ec_point_format=common_pb2.COMPRESSED,
hash_type=common_pb2.SHA256,
dem_key_template=aead.aead_key_templates.XCHACHA20_POLY1305),
# Java and Go neither support CURVE25519 nor XCHACHA20_POLY130 for
# Hybrid Encryption.
['cc', 'python']),
# equal to HybridKeyTemplates::EciesX25519HkdfHmacSha256DeterministicAesSiv
'ECIES_X25519_HKDF_HMAC_SHA256_AES256_SIV':
(hybrid.hybrid_key_templates.create_ecies_aead_hkdf_key_template(
curve_type=common_pb2.CURVE25519,
ec_point_format=common_pb2.COMPRESSED,
hash_type=common_pb2.SHA256,
dem_key_template=daead.deterministic_aead_key_templates.AES256_SIV),
# Java and Go do not support CURVE25519 for Hybrid Encryption.
['cc', 'python']),
}
class HybridEncryptionTest(parameterized.TestCase):
@parameterized.parameters([
*utilities.tinkey_template_names_for(hybrid.HybridDecrypt),
*_ADDITIONAL_KEY_TEMPLATES.keys()
])
def test_encrypt_decrypt(self, key_template_name):
if key_template_name in _ADDITIONAL_KEY_TEMPLATES:
key_template, supported_langs = _ADDITIONAL_KEY_TEMPLATES[
key_template_name]
else:
key_template = utilities.KEY_TEMPLATE[key_template_name]
supported_langs = (
utilities.SUPPORTED_LANGUAGES_BY_TEMPLATE_NAME[key_template_name])
self.assertNotEmpty(supported_langs)
# Take the first supported language to generate the private keyset.
private_keyset = testing_servers.new_keyset(supported_langs[0],
key_template)
supported_decs = [
testing_servers.remote_primitive(lang, private_keyset,
hybrid.HybridDecrypt)
for lang in supported_langs
]
public_keyset = testing_servers.public_keyset(supported_langs[0],
private_keyset)
supported_encs = {
lang: testing_servers.remote_primitive(lang, public_keyset,
hybrid.HybridEncrypt)
for lang in supported_langs
}
for lang, hybrid_encrypt in supported_encs.items():
plaintext = (
b'This is some plaintext message to be encrypted using key_template '
b'%s in %s.' %
(key_template_name.encode('utf8'), lang.encode('utf8')))
context_info = (b'Some context info for %s using %s for encryption.' %
(key_template_name.encode('utf8'), lang.encode('utf8')))
ciphertext = hybrid_encrypt.encrypt(plaintext, context_info)
for dec in supported_decs:
output = dec.decrypt(ciphertext, context_info)
self.assertEqual(output, plaintext)
# If the implementations work fine for keysets with single keys, then key
# rotation should work if the primitive wrapper is implemented correctly.
# These wrappers do not depend on the key type, so it should be fine to always
# test with the same key type. But since the wrapper needs to treat keys
# with output prefix RAW differently, we also include such a template for that.
KEY_ROTATION_TEMPLATES = [
hybrid.hybrid_key_templates.ECIES_P256_HKDF_HMAC_SHA256_AES128_GCM,
keyset_builder.raw_template(
hybrid.hybrid_key_templates.ECIES_P256_HKDF_HMAC_SHA256_AES128_GCM)
]
def key_rotation_test_cases(
) -> Iterable[Tuple[str, str, tink_pb2.KeyTemplate, tink_pb2.KeyTemplate]]:
for enc_lang in SUPPORTED_LANGUAGES:
for dec_lang in SUPPORTED_LANGUAGES:
for old_key_tmpl in KEY_ROTATION_TEMPLATES:
for new_key_tmpl in KEY_ROTATION_TEMPLATES:
yield (enc_lang, dec_lang, old_key_tmpl, new_key_tmpl)
class HybridEncryptionKeyRotationTest(parameterized.TestCase):
@parameterized.parameters(key_rotation_test_cases())
def test_key_rotation(self, enc_lang, dec_lang, old_key_tmpl, new_key_tmpl):
# Do a key rotation from an old key generated from old_key_tmpl to a new
# key generated from new_key_tmpl. Encryption and decryption are done
# in languages enc_lang and dec_lang.
builder = keyset_builder.new_keyset_builder()
older_key_id = builder.add_new_key(old_key_tmpl)
builder.set_primary_key(older_key_id)
dec1 = testing_servers.remote_primitive(enc_lang, builder.keyset(),
hybrid.HybridDecrypt)
enc1 = testing_servers.remote_primitive(dec_lang, builder.public_keyset(),
hybrid.HybridEncrypt)
newer_key_id = builder.add_new_key(new_key_tmpl)
dec2 = testing_servers.remote_primitive(enc_lang, builder.keyset(),
hybrid.HybridDecrypt)
enc2 = testing_servers.remote_primitive(dec_lang, builder.public_keyset(),
hybrid.HybridEncrypt)
builder.set_primary_key(newer_key_id)
dec3 = testing_servers.remote_primitive(enc_lang, builder.keyset(),
hybrid.HybridDecrypt)
enc3 = testing_servers.remote_primitive(dec_lang, builder.public_keyset(),
hybrid.HybridEncrypt)
builder.disable_key(older_key_id)
dec4 = testing_servers.remote_primitive(enc_lang, builder.keyset(),
hybrid.HybridDecrypt)
enc4 = testing_servers.remote_primitive(dec_lang, builder.public_keyset(),
hybrid.HybridEncrypt)
self.assertNotEqual(older_key_id, newer_key_id)
# p1 encrypts with the older key. So p1, p2 and p3 can decrypt it,
# but not p4.
ciphertext1 = enc1.encrypt(b'plaintext', b'context')
self.assertEqual(dec1.decrypt(ciphertext1, b'context'), b'plaintext')
self.assertEqual(dec2.decrypt(ciphertext1, b'context'), b'plaintext')
self.assertEqual(dec3.decrypt(ciphertext1, b'context'), b'plaintext')
with self.assertRaises(tink.TinkError):
_ = dec4.decrypt(ciphertext1, b'context')
# p2 encrypts with the older key. So p1, p2 and p3 can decrypt it,
# but not p4.
ciphertext2 = enc2.encrypt(b'plaintext', b'context')
self.assertEqual(dec1.decrypt(ciphertext2, b'context'), b'plaintext')
self.assertEqual(dec2.decrypt(ciphertext2, b'context'), b'plaintext')
self.assertEqual(dec3.decrypt(ciphertext2, b'context'), b'plaintext')
with self.assertRaises(tink.TinkError):
_ = dec4.decrypt(ciphertext2, b'context')
# p3 encrypts with the newer key. So p2, p3 and p4 can decrypt it,
# but not p1.
ciphertext3 = enc3.encrypt(b'plaintext', b'context')
with self.assertRaises(tink.TinkError):
_ = dec1.decrypt(ciphertext3, b'context')
self.assertEqual(dec2.decrypt(ciphertext3, b'context'), b'plaintext')
self.assertEqual(dec3.decrypt(ciphertext3, b'context'), b'plaintext')
self.assertEqual(dec4.decrypt(ciphertext3, b'context'), b'plaintext')
# p4 encrypts with the newer key. So p2, p3 and p4 can decrypt it,
# but not p1.
ciphertext4 = enc4.encrypt(b'plaintext', b'context')
with self.assertRaises(tink.TinkError):
_ = dec1.decrypt(ciphertext4, b'context')
self.assertEqual(dec2.decrypt(ciphertext4, b'context'), b'plaintext')
self.assertEqual(dec3.decrypt(ciphertext4, b'context'), b'plaintext')
self.assertEqual(dec4.decrypt(ciphertext4, b'context'), b'plaintext')
if __name__ == '__main__':
absltest.main()