123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112 |
- #include "epid/common-testhelper/epid_gtest-testhelper.h"
- #include "gtest/gtest.h"
- extern "C" {
- #include "epid/verifier/1.1/api.h"
- }
- #include "epid/common-testhelper/1.1/verifier_wrapper-testhelper.h"
- #include "epid/common-testhelper/errors-testhelper.h"
- #include "epid/verifier/1.1/unittests/verifier-testhelper.h"
- namespace {
- TEST_F(Epid11VerifierTest, VerifyBasicSigFailsGivenNullPtr) {
- Epid11VerifierCtxObj verifier(this->kPubKeyStr);
- auto const& sig =
- (Epid11Signature const*)this->kSigGrpXMember0Sha256RandbaseMsg0.data();
- const Epid11BasicSignature basic_sig = sig->sigma0;
- auto& msg = this->kMsg0;
- EXPECT_EQ(kEpidBadArgErr,
- Epid11VerifyBasicSig(nullptr, &basic_sig, msg.data(), msg.size()));
- EXPECT_EQ(kEpidBadArgErr,
- Epid11VerifyBasicSig(verifier, nullptr, msg.data(), msg.size()));
- EXPECT_EQ(kEpidBadArgErr,
- Epid11VerifyBasicSig(verifier, &basic_sig, nullptr, msg.size()));
- }
- TEST_F(Epid11VerifierTest,
- VerifyBasicSigCanVerifyValidSignatureWithSHA256AsDefault) {
- Epid11VerifierCtxObj verifier(this->kPubKeyStr);
- auto const& sig =
- (Epid11Signature const*)this->kSigGrpXMember0Sha256RandbaseMsg0.data();
- const Epid11BasicSignature basic_sig = sig->sigma0;
- auto& msg = this->kMsg0;
- EXPECT_EQ(kEpidNoErr,
- Epid11VerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
- }
- TEST_F(Epid11VerifierTest,
- VerifyBasicSigDetectsInvalidSignatureGivenMatchingMessage) {
- Epid11VerifierCtxObj verifier(this->kPubKeyStr);
- auto const& sig =
- (Epid11Signature const*)this->kSigGrpXMember0Sha256RandbaseMsg0.data();
- const Epid11BasicSignature basic_sig = sig->sigma0;
- auto& msg = this->kMsg0;
- Epid11BasicSignature corrupted_basic_sig = basic_sig;
- corrupted_basic_sig.B.x.data.data[0]++;
- EXPECT_NE(kEpidNoErr, Epid11VerifyBasicSig(verifier, &corrupted_basic_sig,
- msg.data(), msg.size()));
- }
- TEST_F(Epid11VerifierTest,
- VerifyBasicSigDetectsInvalidSignatureGivenMessageMismatch) {
- Epid11VerifierCtxObj verifier(this->kPubKeyStr);
- auto const& sig =
- (Epid11Signature const*)this->kSigGrpXMember0Sha256RandbaseMsg0.data();
- const Epid11BasicSignature basic_sig = sig->sigma0;
- auto msg = this->kMsg0;
- msg[0]++;
- EXPECT_EQ(kEpidSigInvalid,
- Epid11VerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
- }
- TEST_F(Epid11VerifierTest, VerifyBasicSigCanVerifyWithBasename) {
- Epid11VerifierCtxObj verifier(this->kPubKeyStr);
- auto const& sig =
- (Epid11Signature const*)this->kSigGrpXMember0Sha256Bsn0Msg0.data();
- const Epid11BasicSignature basic_sig = sig->sigma0;
- auto& msg = this->kMsg0;
- auto& basename = this->kBsn0;
- THROW_ON_EPIDERR(
- Epid11VerifierSetBasename(verifier, basename.data(), basename.size()));
- EXPECT_EQ(kEpidNoErr,
- Epid11VerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
- }
- TEST_F(Epid11VerifierTest,
- VerifyBasicSigCanVerifyMsgContainingAllPossibleBytes) {
- Epid11VerifierCtxObj verifier(kPubKeyStrForMsg0_255);
- auto const& sig = (Epid11Signature const*)this
- ->kSigGrp01Member0Sha256kBsn0Data_0_255.data();
- const Epid11BasicSignature basic_sig = sig->sigma0;
- auto& msg = this->kData_0_255;
- EXPECT_EQ(kEpidNoErr,
- Epid11VerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
- }
- }
|