xref: /aosp_15_r20/external/tink/cc/internal/key_serializer_test.cc (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1 // Copyright 2022 Google LLC
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 //      http://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14 //
15 ////////////////////////////////////////////////////////////////////////////////
16 
17 #include "tink/internal/key_serializer.h"
18 
19 #include <memory>
20 #include <string_view>
21 
22 #include "gmock/gmock.h"
23 #include "gtest/gtest.h"
24 #include "absl/memory/memory.h"
25 #include "absl/status/status.h"
26 #include "tink/insecure_secret_key_access.h"
27 #include "tink/internal/serialization.h"
28 #include "tink/internal/serialization_test_util.h"
29 #include "tink/internal/serializer_index.h"
30 #include "tink/key.h"
31 #include "tink/secret_key_access_token.h"
32 #include "tink/util/statusor.h"
33 #include "tink/util/test_matchers.h"
34 
35 namespace crypto {
36 namespace tink {
37 namespace internal {
38 namespace {
39 
40 using ::crypto::tink::test::IsOk;
41 using ::crypto::tink::test::StatusIs;
42 using ::testing::Eq;
43 
TEST(KeySerializerTest,Create)44 TEST(KeySerializerTest, Create) {
45   std::unique_ptr<KeySerializer> serializer =
46       absl::make_unique<KeySerializerImpl<NoIdKey, NoIdSerialization>>(
47           SerializeNoIdKey);
48 
49   EXPECT_THAT(serializer->Index(),
50               Eq(SerializerIndex::Create<NoIdKey, NoIdSerialization>()));
51 }
52 
TEST(KeySerializerTest,SerializeKey)53 TEST(KeySerializerTest, SerializeKey) {
54   std::unique_ptr<KeySerializer> serializer =
55       absl::make_unique<KeySerializerImpl<NoIdKey, NoIdSerialization>>(
56           SerializeNoIdKey);
57 
58   NoIdKey key;
59   util::StatusOr<std::unique_ptr<Serialization>> serialization =
60       serializer->SerializeKey(key, InsecureSecretKeyAccess::Get());
61   ASSERT_THAT(serialization, IsOk());
62   EXPECT_THAT((*serialization)->ObjectIdentifier(), Eq(kNoIdTypeUrl));
63 }
64 
TEST(KeySerializerTest,SerializePublicKeyNoAccessToken)65 TEST(KeySerializerTest, SerializePublicKeyNoAccessToken) {
66   std::unique_ptr<KeySerializer> serializer =
67       absl::make_unique<KeySerializerImpl<NoIdKey, NoIdSerialization>>(
68           SerializeNoIdKey);
69 
70   NoIdKey public_key;
71   util::StatusOr<std::unique_ptr<Serialization>> serialization =
72       serializer->SerializeKey(public_key, absl::nullopt);
73   ASSERT_THAT(serialization, IsOk());
74   EXPECT_THAT((*serialization)->ObjectIdentifier(), Eq(kNoIdTypeUrl));
75 }
76 
TEST(KeySerializerTest,SerializeKeyWithInvalidKeyType)77 TEST(KeySerializerTest, SerializeKeyWithInvalidKeyType) {
78   std::unique_ptr<KeySerializer> serializer =
79       absl::make_unique<KeySerializerImpl<NoIdKey, NoIdSerialization>>(
80           SerializeNoIdKey);
81 
82   IdKey key(/*id=*/123);
83   util::StatusOr<std::unique_ptr<Serialization>> serialization =
84       serializer->SerializeKey(key, InsecureSecretKeyAccess::Get());
85   ASSERT_THAT(serialization.status(),
86               StatusIs(absl::StatusCode::kInvalidArgument));
87 }
88 
89 }  // namespace
90 }  // namespace internal
91 }  // namespace tink
92 }  // namespace crypto
93