-
Notifications
You must be signed in to change notification settings - Fork 14
/
Copy pathDecryptManifest.dfy
192 lines (175 loc) · 7.04 KB
/
DecryptManifest.dfy
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
// Copyright Amazon.com Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
include "JsonConfig.dfy"
include "WriteManifest.dfy"
include "../../../../DynamoDbEncryption/dafny/DynamoDbItemEncryptor/src/Index.dfy"
module {:options "-functionSyntax:4"} DecryptManifest {
import opened Wrappers
import opened StandardLibrary
import opened StandardLibrary.UInt
import opened JSON.Values
import opened WriteManifest
import Time
import JSON.API
import JSON.Errors
import DdbItemJson
import StandardLibrary.String
import FileIO
import opened JSONHelpers
import JsonConfig
import ENC = AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes
import KeyVectors
import OsLang
method OnePositiveTest(name : string, config : JSON, encrypted : JSON, plaintext : JSON, keys : KeyVectors.KeyVectorsClient)
returns (output : Result<bool, string>)
requires keys.ValidState()
modifies keys.Modifies
ensures keys.ValidState()
{
var enc :- JsonConfig.GetRecord(encrypted);
var plain :- JsonConfig.GetRecord(plaintext);
var encryptor :- JsonConfig.GetItemEncryptor(name, config, keys);
var decrypted :- expect encryptor.DecryptItem(
ENC.DecryptItemInput(
encryptedItem:=enc.item
)
);
expect DdbItemJson.NormalizeItem(decrypted.plaintextItem) == DdbItemJson.NormalizeItem(plain.item);
return Success(true);
}
method OneNegativeTest(name : string, config : JSON, encrypted : JSON, keys: KeyVectors.KeyVectorsClient)
returns (output : Result<bool, string>)
requires keys.ValidState()
modifies keys.Modifies
ensures keys.ValidState()
{
var enc :- JsonConfig.GetRecord(encrypted);
var encryptor :- JsonConfig.GetItemEncryptor(name, config, keys);
var decrypted := encryptor.DecryptItem(
ENC.DecryptItemInput(
encryptedItem:=enc.item
)
);
if decrypted.Success? {
return Failure("Failed to fail to decrypt " + name);
}
return Success(true);
}
method OneTest(name : string, value : JSON, keys: KeyVectors.KeyVectorsClient)
returns (output : Result<bool, string>)
requires keys.ValidState()
modifies keys.Modifies
ensures keys.ValidState()
{
:- Need(value.Object?, "Test must be an object");
var types : Option<string> := None;
var description : Option<string> := None;
var config : Option<JSON> := None;
var encrypted : Option<JSON> := None;
var plaintext : Option<JSON> := None;
for i := 0 to |value.obj| {
var obj := value.obj[i];
match obj.0 {
case "type" =>
:- Need(obj.1.String?, "Value of 'type' must be a string.");
types := Some(obj.1.str);
case "description" =>
:- Need(obj.1.String?, "Value of 'description' must be a string.");
description := Some(obj.1.str);
case "config" =>
:- Need(obj.1.Object?, "Value of 'config' must be an object.");
config := Some(obj.1);
case "encrypted" =>
:- Need(obj.1.Object?, "Value of 'record' must be an object.");
encrypted := Some(obj.1);
case "plaintext" =>
:- Need(obj.1.Object?, "Value of 'record' must be an object.");
plaintext := Some(obj.1);
case _ => return Failure("Unknown test member : " + obj.0 + " in " + name);
}
}
:- Need(types.Some?, "Test requires a 'type' member.");
:- Need(description.Some?, "Test requires a 'description' member.");
:- Need(config.Some?, "Test requires a 'config' member.");
:- Need(encrypted.Some?, "Test requires a 'encrypted' member.");
if types.value == "positive-decrypt" {
:- Need(plaintext.Some?, "positive-decrypt Test requires a 'plaintext' member.");
output := OnePositiveTest(name, config.value, encrypted.value, plaintext.value, keys);
} else if types.value == "negative-decrypt" {
output := OneNegativeTest(name, config.value, encrypted.value, keys);
} else {
return Failure("Invalid encrypt type : '" + types.value + "'.");
}
}
function LogFileName() : string
{
if OsLang.GetOsShort() == "Windows" && OsLang.GetLanguageShort() == "Dotnet" then
"..\\..\\PerfLog.txt"
else
"../../PerfLog.txt"
}
method Decrypt(inFile : string, keyVectors: KeyVectors.KeyVectorsClient)
returns (output : Result<bool, string>)
requires keyVectors.ValidState()
modifies keyVectors.Modifies
ensures keyVectors.ValidState()
{
var timeStamp :- expect Time.GetCurrentTimeStamp();
print timeStamp + " Decrypt : ", inFile, "\n";
var configBytes :- expect FileIO.ReadBytesFromFile(inFile);
timeStamp :- expect Time.GetCurrentTimeStamp();
print timeStamp + " File Read.\n";
var json :- expect API.Deserialize(configBytes);
timeStamp :- expect Time.GetCurrentTimeStamp();
print timeStamp + " JSON Parsed.\n";
:- Need(json.Object?, "Decrypt file must contain a JSON object.");
var keys : Option<string> := None;
var client : Option<seq<(string, JSON)>> := None;
var manifest : Option<seq<(string, JSON)>> := None;
var tests : Option<seq<(string, JSON)>> := None;
for i := 0 to |json.obj| {
var obj := json.obj[i];
match obj.0 {
case "keys" =>
:- Need(obj.1.String?, "Value of 'keys' must be a string.");
keys := Some(obj.1.str);
case "client" =>
:- Need(obj.1.Object?, "Value of 'client' must be an Object.");
client := Some(obj.1.obj);
case "manifest" =>
:- Need(obj.1.Object?, "Value of 'manifest' must be an object.");
manifest := Some(obj.1.obj);
case "tests" =>
:- Need(obj.1.Object?, "Value of 'tests' must be an object.");
tests := Some(obj.1.obj);
case _ => return Failure("Unknown top level encrypt tag : " + obj.0);
}
}
:- Need(keys.Some?, "Decrypt manifest requires a 'keys' member.");
:- Need(client.Some?, "Decrypt manifest requires a 'client' member.");
:- Need(manifest.Some?, "Decrypt manifest requires a 'manifest' member.");
:- Need(tests.Some?, "Decrypt manifest requires a 'tests' member.");
for i := 0 to |manifest.value| {
var obj := manifest.value[i];
match obj.0 {
case "type" =>
:- Need(obj.1.String?, "Value of 'type' must be a string.");
:- Need(obj.1.str == DECRYPT_TYPE, "Value of 'type' must be '" + DECRYPT_TYPE + "'.");
case "version" =>
:- Need(obj.1.String?, "Value of 'version' must be a string.");
:- Need(obj.1.str == "1", "Value of 'version' must be '1'");
case _ => return Failure("Unknown manifest member : " + obj.0);
}
}
var time := Time.GetAbsoluteTime();
for i := 0 to |tests.value| {
var obj := tests.value[i];
:- Need(obj.1.Object?, "Value of test '" + obj.0 + "' must be an Object.");
var _ :- OneTest(obj.0, obj.1, keyVectors);
}
Time.PrintTimeSinceLong(time, "DB-ESDK-TV-Decrypt-" + inFile, Some(LogFileName()));
timeStamp :- expect Time.GetCurrentTimeStamp();
print timeStamp + " Tests Complete.\n";
return Success(true);
}
}