diff options
author | juerg <juerg@google.com> | 2023-03-28 03:30:31 -0700 |
---|---|---|
committer | Copybara-Service <copybara-worker@google.com> | 2023-03-28 03:31:35 -0700 |
commit | ba66646448633ac3cc251dce760b4146cee23ff3 (patch) | |
tree | 7dce0ffc6585d966b2ad97f6d080e1b318d98ba8 /tools | |
parent | 728f2b7ebb7750f7ce2655f2c561118cdf251366 (diff) | |
download | tink-ba66646448633ac3cc251dce760b4146cee23ff3.tar.gz |
Remove unused aead_cli.py.
PiperOrigin-RevId: 519978933
Diffstat (limited to 'tools')
-rw-r--r-- | tools/testing/python/BUILD.bazel | 23 | ||||
-rw-r--r-- | tools/testing/python/aead_cli.py | 145 |
2 files changed, 0 insertions, 168 deletions
diff --git a/tools/testing/python/BUILD.bazel b/tools/testing/python/BUILD.bazel deleted file mode 100644 index ec5aa9350..000000000 --- a/tools/testing/python/BUILD.bazel +++ /dev/null @@ -1,23 +0,0 @@ -load("@rules_python//python:defs.bzl", "py_binary") -load("@pip_deps//:requirements.bzl", "requirement") - -package(default_visibility = ["//visibility:public"]) - -licenses(["notice"]) - -py_binary( - name = "aead_cli_python", - testonly = 1, - srcs = ["aead_cli.py"], - main = "aead_cli.py", - python_version = "PY3", - srcs_version = "PY3", - deps = [ - requirement("absl-py"), - "@tink_py//tink:cleartext_keyset_handle", - "@tink_py//tink:tink_python", - "@tink_py//tink/aead", - "@tink_py//tink/integration/awskms", - "@tink_py//tink/integration/gcpkms", - ], -) diff --git a/tools/testing/python/aead_cli.py b/tools/testing/python/aead_cli.py deleted file mode 100644 index 2eb8c76ae..000000000 --- a/tools/testing/python/aead_cli.py +++ /dev/null @@ -1,145 +0,0 @@ -# Copyright 2019 Google Inc. All Rights Reserved. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS-IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -"""A command-line utility for testing AEAD-primitives. - -It requires 5 arguments: - keyset-file: name of the file with the keyset to be used for encryption - operation: the actual AEAD-operation, i.e. "encrypt" or "decrypt" - input-file: name of the file with input (plaintext for encryption, or - or ciphertext for decryption) - associated-data-file: name of the file containing associated data - output-file: name of the file for the resulting output -""" - -from __future__ import absolute_import -from __future__ import division -from __future__ import print_function - -import os -# Special imports -from absl import app -from absl import flags -from absl import logging -import tink - -from tink import aead -from tink import cleartext_keyset_handle -from tink.integration import awskms -from tink.integration import gcpkms - - -FLAGS = flags.FLAGS -AWS_CREDENTIAL_PATH = os.path.join(os.environ['TEST_SRCDIR'], - 'tools/testdata/aws/credentials.ini') -AWS_KEY_URI = 'aws-kms://arn:aws:kms:us-east-2:235739564943:key/3ee50705-5a82-4f5b-9753-05c4f473922f' -GCP_CREDENTIAL_PATH = os.path.join(os.environ['TEST_SRCDIR'], - 'tools/testdata/gcp/credential.json') -GCP_KEY_URI = 'gcp-kms://projects/tink-test-infrastructure/locations/global/keyRings/unit-and-integration-testing/cryptoKeys/aead-key' - - -def read_keyset(keyset_filename): - """Load a keyset from a file. - - Args: - keyset_filename: A path to a keyset file - - Returns: - A KeysetHandle of the file's keyset - Raises: - TinkError: if the file is not valid - IOError: if the file does not exist - """ - with open(keyset_filename, 'rb') as keyset_file: - text = keyset_file.read() - keyset = cleartext_keyset_handle.read(tink.BinaryKeysetReader(text)) - return keyset - - -def main(argv): - if len(argv) != 6: - raise app.UsageError( - 'Expected 5 arguments, got %d.\n' - 'Usage: %s keyset-file operation input-file associated-data-file' % - (len(argv) - 1, argv[0])) - - keyset_filename = argv[1] - operation = argv[2] - input_filename = argv[3] - associated_data_filename = argv[4] - output_filename = argv[5] - - logging.info( - 'Using keyset from file %s to AEAD-%s file %s with associated data ' - 'from file %s.\nThe resulting output will be written to file %s', - keyset_filename, operation, input_filename, associated_data_filename, - output_filename) - - # Initialise Tink - try: - aead.register() - except tink.TinkError as e: - logging.error('Error initialising Tink: %s', e) - return 1 - - # Initialize KMS clients - awskms.AwsKmsClient.register_client(AWS_KEY_URI, AWS_CREDENTIAL_PATH) - gcpkms.GcpKmsClient.register_client(GCP_KEY_URI, GCP_CREDENTIAL_PATH) - - # Read the keyset into keyset_handle - try: - keyset_handle = read_keyset(keyset_filename) - except tink.TinkError as e: - logging.error('Error reading key: %s', e) - return 1 - - # Get the primitive - try: - cipher = keyset_handle.primitive(aead.Aead) - except tink.TinkError as e: - logging.error('Error creating primitive: %s', e) - return 1 - - # Read the input files - with open(input_filename, 'rb') as input_file: - input_data = input_file.read() - with open(associated_data_filename, 'rb') as associated_data_file: - aad = associated_data_file.read() - - # Compute the output - if operation.lower() == 'encrypt': - try: - output_data = cipher.encrypt(input_data, aad) - except tink.TinkError as e: - logging.error('Error encrypting the input: %s', e) - return 1 - elif operation.lower() == 'decrypt': - try: - output_data = cipher.decrypt(input_data, aad) - except tink.TinkError as e: - logging.error('Error decrypting the input: %s', e) - return 1 - else: - logging.error( - 'Did not recognise operation %s.\n' - 'Expected either "encrypt" or "decrypt"', operation) - return 1 - - with open(output_filename, 'wb') as output_file: - output_file.write(output_data) - - logging.info('All done.') - - -if __name__ == '__main__': - app.run(main) |