kms/crate/cli/src/tests/symmetric/encrypt_decrypt.rs
Manuthor 5a826b465d
feat: upgrade Covercrypt to v15 (#382)
* feat: upgrade Covercrypt to v15

* fix: update MSK after USK creation

* test: fix bulk tests

* test: fix test_rekey_prune

* test: fix not exportable sensitive cc keys

* fix: support pyo3

* fix: locate tests - revert changes

* fix: cargo deny

* fix: rename Policy by AccessStructure

* fix: rename Policy by AccessStructure

* test: re-enable cli attributes handling

* test: re-enable clippy on cli

* chore: remove pyo3 support

* chore: upgrade crypto_core to v10.0.1

* chore: upgrade cover_crypt to last commit

* fix: PR review

* fix: Review of the Covercrypt integration (#385)

* wip

* wip: review rekey and master keypair creation

* remove the policy from the attributes

* fix typo

* fix `clippy` lints

* fix formatting

* ci: use rust toolchain version from arg

* fix: clippy lints for new toolchain

* fix: clippy lints for new toolchain

---------

Co-authored-by: Manuthor <manu.coste@gmail.com>

* fix: create single function to retrieve id from clap args

* docs: review doc and remove dead code (#388)

* review doc and remove dead code

* fix build

* fix clippy lints

* fix fmt

---------

Co-authored-by: phochard <pauline.hochard@cosmian.com>
Co-authored-by: Théophile BRÉZOT <theophile.brezot@cosmian.com>
2025-03-21 18:23:59 +01:00

467 lines
14 KiB
Rust

use std::{fs, path::PathBuf, process::Command};
use assert_cmd::prelude::*;
use cosmian_kms_client::{read_bytes_from_file, KmsClient, KMS_CLI_CONF_ENV};
use kms_test_server::start_default_test_kms_server;
use strum::IntoEnumIterator;
use tempfile::TempDir;
use super::SUB_COMMAND;
use crate::{
actions::symmetric::{
keys::create_key::{CreateKeyAction, SymmetricAlgorithm},
DataEncryptionAlgorithm, DecryptAction, EncryptAction, KeyEncryptionAlgorithm,
},
error::{result::CliResult, CliError},
tests::{symmetric::create_key::create_symmetric_key, utils::recover_cmd_logs, PROG_NAME},
};
/// Encrypts a file using the given symmetric key and access policy.
pub(crate) fn encrypt(
cli_conf_path: &str,
input_file: &str,
symmetric_key_id: &str,
data_encryption_algorithm: DataEncryptionAlgorithm,
key_encryption_algorithm: Option<KeyEncryptionAlgorithm>,
output_file: Option<&str>,
authentication_data: Option<&str>,
) -> CliResult<()> {
let mut cmd = Command::cargo_bin(PROG_NAME)?;
cmd.env(KMS_CLI_CONF_ENV, cli_conf_path);
let mut args = vec![
"encrypt".to_owned(),
input_file.to_owned(),
"--key-id".to_owned(),
symmetric_key_id.to_owned(),
"-d".to_owned(),
data_encryption_algorithm.to_string(),
];
if let Some(key_encryption_algorithm) = key_encryption_algorithm {
args.push("-e".to_owned());
args.push(key_encryption_algorithm.to_string());
}
if let Some(output_file) = output_file {
args.push("-o".to_owned());
args.push(output_file.to_owned());
}
if let Some(authentication_data) = authentication_data {
args.push("-a".to_owned());
args.push(authentication_data.to_owned());
}
cmd.arg(SUB_COMMAND).args(args);
let output = recover_cmd_logs(&mut cmd);
if output.status.success() {
return Ok(())
}
Err(CliError::Default(
std::str::from_utf8(&output.stderr)?.to_owned(),
))
}
/// Decrypt a file using the given symmetric key
pub(crate) fn decrypt(
cli_conf_path: &str,
input_file: &str,
symmetric_key_id: &str,
data_encryption_algorithm: DataEncryptionAlgorithm,
key_encryption_algorithm: Option<KeyEncryptionAlgorithm>,
output_file: Option<&str>,
authentication_data: Option<&str>,
) -> CliResult<()> {
let mut cmd = Command::cargo_bin(PROG_NAME)?;
cmd.env(KMS_CLI_CONF_ENV, cli_conf_path);
let mut args = vec![
"decrypt".to_owned(),
input_file.to_owned(),
"--key-id".to_owned(),
symmetric_key_id.to_owned(),
"-d".to_owned(),
data_encryption_algorithm.to_string(),
];
if let Some(key_encryption_algorithm) = key_encryption_algorithm {
args.push("-e".to_owned());
args.push(key_encryption_algorithm.to_string());
}
if let Some(output_file) = output_file {
args.push("-o".to_owned());
args.push(output_file.to_owned());
}
if let Some(authentication_data) = authentication_data {
args.push("-a".to_owned());
args.push(authentication_data.to_owned());
}
cmd.arg(SUB_COMMAND).args(args);
let output = recover_cmd_logs(&mut cmd);
if output.status.success() {
return Ok(())
}
Err(CliError::Default(
std::str::from_utf8(&output.stderr)?.to_owned(),
))
}
pub(crate) fn run_encrypt_decrypt_test(
cli_conf_path: &str,
key_id: &str,
data_encryption_algorithm: DataEncryptionAlgorithm,
key_encryption_algorithm: Option<KeyEncryptionAlgorithm>,
encryption_overhead: u64,
) -> CliResult<()> {
// create a temp dir
let tmp_dir = TempDir::new()?;
let tmp_path = tmp_dir.path();
let input_file = PathBuf::from("../../test_data/plain.txt");
let output_file = tmp_path.join("plain.enc");
let recovered_file = tmp_path.join("plain.txt");
fs::remove_file(&output_file).ok();
if output_file.exists() {
return Err(CliError::Default(format!(
"Output file {} could not be removed",
output_file.to_str().unwrap()
)))
}
encrypt(
cli_conf_path,
input_file.to_str().unwrap(),
key_id,
data_encryption_algorithm,
key_encryption_algorithm,
Some(output_file.to_str().unwrap()),
Some(&hex::encode(b"myid")),
)?;
if encryption_overhead != 0 {
assert_eq!(
fs::metadata(output_file.clone())?.len(),
fs::metadata(input_file.clone())?.len() + encryption_overhead
);
}
// the user key should be able to decrypt the file
decrypt(
cli_conf_path,
output_file.to_str().unwrap(),
key_id,
data_encryption_algorithm,
key_encryption_algorithm,
Some(recovered_file.to_str().unwrap()),
Some(&hex::encode(b"myid")),
)?;
if !recovered_file.exists() {
return Err(CliError::Default(format!(
"Recovered file {} does not exist",
recovered_file.to_str().unwrap()
)))
}
let original_content = read_bytes_from_file(&input_file)?;
let recovered_content = read_bytes_from_file(&recovered_file)?;
if original_content != recovered_content {
return Err(CliError::Default(format!(
"Recovered content in file {} does not match the original file content {}",
recovered_file.to_str().unwrap(),
input_file.to_str().unwrap()
)))
}
Ok(())
}
#[tokio::test]
async fn test_aes_gcm_server_side() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let dek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Aes,
number_of_bits: Some(256),
..Default::default()
},
)?;
run_encrypt_decrypt_test(
&ctx.owner_client_conf_path,
&dek,
DataEncryptionAlgorithm::AesGcm,
None,
12 /* nonce */ + 16, /* tag */
)
}
#[tokio::test]
async fn test_aes_xts_server_side() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let dek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Aes,
number_of_bits: Some(512),
..Default::default()
},
)?;
run_encrypt_decrypt_test(
&ctx.owner_client_conf_path,
&dek,
DataEncryptionAlgorithm::AesXts,
None,
16, /* tweak */
)
}
#[cfg(not(feature = "fips"))]
#[tokio::test]
async fn test_aes_gcm_siv_server_side() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let dek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Aes,
number_of_bits: Some(256),
..Default::default()
},
)?;
run_encrypt_decrypt_test(
&ctx.owner_client_conf_path,
&dek,
DataEncryptionAlgorithm::AesGcmSiv,
None,
12 /* nonce */ + 16, /* ag */
)
}
#[cfg(not(feature = "fips"))]
#[tokio::test]
async fn test_chacha20_poly1305_server_side() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let dek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Chacha20,
number_of_bits: Some(256),
..Default::default()
},
)?;
run_encrypt_decrypt_test(
&ctx.owner_client_conf_path,
&dek,
DataEncryptionAlgorithm::Chacha20Poly1305,
None,
12 /* nonce */ + 16, /* ag */
)
}
#[cfg(not(feature = "fips"))]
#[tokio::test]
async fn test_encrypt_decrypt_with_tags() -> CliResult<()> {
// create a temp dir
let tmp_dir = TempDir::new()?;
let tmp_path = tmp_dir.path();
let ctx = start_default_test_kms_server().await;
let key_id = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
tags: vec!["tag_sym".to_owned()],
..Default::default()
},
)?;
let input_file = PathBuf::from("../../test_data/plain.txt");
let output_file = tmp_path.join("plain.enc");
let recovered_file = tmp_path.join("plain.txt");
fs::remove_file(&output_file).ok();
if output_file.exists() {
return Err(CliError::Default(format!(
"Output file {} could not be removed",
output_file.to_str().unwrap()
)))
}
encrypt(
&ctx.owner_client_conf_path,
input_file.to_str().unwrap(),
&key_id,
DataEncryptionAlgorithm::Chacha20Poly1305,
None,
Some(output_file.to_str().unwrap()),
Some(&hex::encode(b"myid")),
)?;
// the user key should be able to decrypt the file
decrypt(
&ctx.owner_client_conf_path,
output_file.to_str().unwrap(),
&key_id,
DataEncryptionAlgorithm::Chacha20Poly1305,
None,
Some(recovered_file.to_str().unwrap()),
Some(&hex::encode(b"myid")),
)?;
if !recovered_file.exists() {
return Err(CliError::Default(format!(
"Recovered file {} does not exist",
recovered_file.to_str().unwrap()
)))
}
let original_content = read_bytes_from_file(&input_file)?;
let recovered_content = read_bytes_from_file(&recovered_file)?;
if original_content != recovered_content {
return Err(CliError::Default(format!(
"Recovered content in file {} does not match the original file content {}",
recovered_file.to_str().unwrap(),
input_file.to_str().unwrap()
)))
}
Ok(())
}
#[tokio::test]
async fn test_aes_gcm_aes_gcm_client_side() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let kek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Aes,
number_of_bits: Some(256),
..Default::default()
},
)?;
run_encrypt_decrypt_test(
&ctx.owner_client_conf_path,
&kek,
DataEncryptionAlgorithm::AesGcm,
Some(KeyEncryptionAlgorithm::AesGcm),
12 + 32 + 16 /* encapsulation size */
+ 1 /* encapsulation len leb128 */
+ 12 /* nonce */ + 16, /* ag */
)
}
#[tokio::test]
async fn test_aes_gcm_aes_xts_client_side() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let kek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Aes,
number_of_bits: Some(256),
..Default::default()
},
)?;
run_encrypt_decrypt_test(
&ctx.owner_client_conf_path,
&kek,
DataEncryptionAlgorithm::AesXts,
Some(KeyEncryptionAlgorithm::AesGcm),
12 + 64 + 16 /* encapsulation size */
+ 1 /* encapsulation len leb128 */
+ 16, /* tweak */
)
}
#[cfg(not(feature = "fips"))]
#[tokio::test]
async fn test_aes_gcm_chacha20_client_side() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let kek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Aes,
number_of_bits: Some(256),
..Default::default()
},
)?;
run_encrypt_decrypt_test(
&ctx.owner_client_conf_path,
&kek,
DataEncryptionAlgorithm::Chacha20Poly1305,
Some(KeyEncryptionAlgorithm::AesGcm),
12 + 32 + 16 /* encapsulation size */
+ 1 /* encapsulation len leb128 */
+ 12 /* nonce */ + 16, /* ag */
)
}
#[tokio::test]
async fn test_rfc5649_aes_gcm_client_side() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let kek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Aes,
number_of_bits: Some(256),
..Default::default()
},
)?;
run_encrypt_decrypt_test(
&ctx.owner_client_conf_path,
&kek,
DataEncryptionAlgorithm::AesGcm,
Some(KeyEncryptionAlgorithm::RFC5649),
8 + 32 /* encapsulation size */
+ 1 /* encapsulation len leb128 */
+ 12 /* nonce */ + 16, /* tag */
)
}
#[tokio::test]
async fn test_client_side_encryption_with_buffer() -> CliResult<()> {
let ctx = start_default_test_kms_server().await;
let kek = create_symmetric_key(
&ctx.owner_client_conf_path,
CreateKeyAction {
algorithm: SymmetricAlgorithm::Aes,
number_of_bits: Some(256),
..Default::default()
},
)?;
let kms_rest_client = KmsClient::new(ctx.owner_client_conf.clone())?;
// Generate an ephemeral key (DEK) and wrap it with the KEK.
let (dek, encapsulation) = EncryptAction::default()
.server_side_kem_encapsulation(
&kms_rest_client,
&kek,
KeyEncryptionAlgorithm::RFC5649,
DataEncryptionAlgorithm::AesGcm,
)
.await?;
for size in [0, 1, 16, 64, 256, 1024, 4096, 16384] {
let plaintext: Vec<u8> = vec![0; size];
for dea in DataEncryptionAlgorithm::iter() {
if dea == DataEncryptionAlgorithm::AesXts {
continue;
}
let ciphertext = EncryptAction::default().client_side_encrypt_with_buffer(
&dek,
&encapsulation,
dea,
None,
&plaintext,
Some(hex::encode(b"my_auth_data").into_bytes()),
)?;
let cleartext = DecryptAction::default()
.client_side_decrypt_with_buffer(
&kms_rest_client,
dea,
&kek,
&ciphertext,
Some(hex::encode(b"my_auth_data").into_bytes()),
)
.await?;
assert_eq!(cleartext, plaintext);
}
}
Ok(())
}