1 // Copyright 2022 Google LLC
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 // http://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14 //
15 ////////////////////////////////////////////////////////////////////////////////
16
17 #include "tink/internal/key_serializer.h"
18
19 #include <memory>
20 #include <string_view>
21
22 #include "gmock/gmock.h"
23 #include "gtest/gtest.h"
24 #include "absl/memory/memory.h"
25 #include "absl/status/status.h"
26 #include "tink/insecure_secret_key_access.h"
27 #include "tink/internal/serialization.h"
28 #include "tink/internal/serialization_test_util.h"
29 #include "tink/internal/serializer_index.h"
30 #include "tink/key.h"
31 #include "tink/secret_key_access_token.h"
32 #include "tink/util/statusor.h"
33 #include "tink/util/test_matchers.h"
34
35 namespace crypto {
36 namespace tink {
37 namespace internal {
38 namespace {
39
40 using ::crypto::tink::test::IsOk;
41 using ::crypto::tink::test::StatusIs;
42 using ::testing::Eq;
43
TEST(KeySerializerTest,Create)44 TEST(KeySerializerTest, Create) {
45 std::unique_ptr<KeySerializer> serializer =
46 absl::make_unique<KeySerializerImpl<NoIdKey, NoIdSerialization>>(
47 SerializeNoIdKey);
48
49 EXPECT_THAT(serializer->Index(),
50 Eq(SerializerIndex::Create<NoIdKey, NoIdSerialization>()));
51 }
52
TEST(KeySerializerTest,SerializeKey)53 TEST(KeySerializerTest, SerializeKey) {
54 std::unique_ptr<KeySerializer> serializer =
55 absl::make_unique<KeySerializerImpl<NoIdKey, NoIdSerialization>>(
56 SerializeNoIdKey);
57
58 NoIdKey key;
59 util::StatusOr<std::unique_ptr<Serialization>> serialization =
60 serializer->SerializeKey(key, InsecureSecretKeyAccess::Get());
61 ASSERT_THAT(serialization, IsOk());
62 EXPECT_THAT((*serialization)->ObjectIdentifier(), Eq(kNoIdTypeUrl));
63 }
64
TEST(KeySerializerTest,SerializePublicKeyNoAccessToken)65 TEST(KeySerializerTest, SerializePublicKeyNoAccessToken) {
66 std::unique_ptr<KeySerializer> serializer =
67 absl::make_unique<KeySerializerImpl<NoIdKey, NoIdSerialization>>(
68 SerializeNoIdKey);
69
70 NoIdKey public_key;
71 util::StatusOr<std::unique_ptr<Serialization>> serialization =
72 serializer->SerializeKey(public_key, absl::nullopt);
73 ASSERT_THAT(serialization, IsOk());
74 EXPECT_THAT((*serialization)->ObjectIdentifier(), Eq(kNoIdTypeUrl));
75 }
76
TEST(KeySerializerTest,SerializeKeyWithInvalidKeyType)77 TEST(KeySerializerTest, SerializeKeyWithInvalidKeyType) {
78 std::unique_ptr<KeySerializer> serializer =
79 absl::make_unique<KeySerializerImpl<NoIdKey, NoIdSerialization>>(
80 SerializeNoIdKey);
81
82 IdKey key(/*id=*/123);
83 util::StatusOr<std::unique_ptr<Serialization>> serialization =
84 serializer->SerializeKey(key, InsecureSecretKeyAccess::Get());
85 ASSERT_THAT(serialization.status(),
86 StatusIs(absl::StatusCode::kInvalidArgument));
87 }
88
89 } // namespace
90 } // namespace internal
91 } // namespace tink
92 } // namespace crypto
93