123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116 |
- /*############################################################################
- # Copyright 2016 Intel Corporation
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- ############################################################################*/
- /*!
- * \file
- * \brief CheckPrivRlEntry unit tests.
- */
- #include "gtest/gtest.h"
- extern "C" {
- #include "epid/verifier/api.h"
- }
- #include "epid/verifier/unittests/verifier-testhelper.h"
- #include "epid/common-testhelper/verifier_wrapper-testhelper.h"
- #include "epid/common-testhelper/errors-testhelper.h"
- namespace {
- TEST_F(EpidVerifierTest, CheckPrivRlEntryFailsGivenNullPtr) {
- // check ctx, sig, f for NULL
- auto& pub_key = this->kGrpXKey;
- auto& priv_rl = this->kGrpXPrivRl;
- auto& sig = this->kSigGrpXMember0Sha256Bsn0Msg0;
- VerifierCtxObj verifier(pub_key);
- FpElemStr fp_str = ((PrivRl const*)priv_rl.data())->f[0];
- BasicSignature basic_signature = ((EpidSignature const*)sig.data())->sigma0;
- EXPECT_EQ(kEpidBadArgErr,
- EpidCheckPrivRlEntry(nullptr, &basic_signature, &fp_str));
- EXPECT_EQ(kEpidBadArgErr, EpidCheckPrivRlEntry(verifier, nullptr, &fp_str));
- EXPECT_EQ(kEpidBadArgErr,
- EpidCheckPrivRlEntry(verifier, &basic_signature, nullptr));
- }
- TEST_F(EpidVerifierTest, CheckPrivRlEntryFailsGivenRevokedPrivKey) {
- // test a revoked priv key
- // check ctx, sig, f for NULL
- auto& pub_key = this->kGrpXKey;
- auto& priv_rl = this->kGrpXPrivRl;
- // signed using revoked key
- auto& sig = this->kSigGrpXRevokedPrivKey000Sha256Bsn0Msg0;
- VerifierCtxObj verifier(pub_key);
- FpElemStr fp_str = ((PrivRl const*)priv_rl.data())->f[0];
- BasicSignature basic_signature = ((EpidSignature const*)sig.data())->sigma0;
- EXPECT_EQ(kEpidSigRevokedInPrivRl,
- EpidCheckPrivRlEntry(verifier, &basic_signature, &fp_str));
- }
- TEST_F(EpidVerifierTest,
- CheckPrivRlEntryFailsGivenRevokedPrivKeyUsingIkgfData) {
- // test a revoked priv key
- // check ctx, sig, f for NULL
- auto& pub_key = this->kPubKeyIkgfStr;
- auto& priv_rl = this->kPrivRlIkgf;
- // signed using revoked key
- auto& sig = this->kSigRevokedPrivKeySha256Bsn0Msg0Ikgf;
- VerifierCtxObj verifier(pub_key);
- FpElemStr fp_str = ((PrivRl const*)priv_rl.data())->f[2];
- BasicSignature basic_signature = ((EpidSignature const*)sig.data())->sigma0;
- EXPECT_EQ(kEpidSigRevokedInPrivRl,
- EpidCheckPrivRlEntry(verifier, &basic_signature, &fp_str));
- }
- TEST_F(EpidVerifierTest, CheckPrivRlEntrySucceedsGivenUnRevokedPrivKey) {
- // test a non revoked priv key
- auto& pub_key = this->kGrpXKey;
- auto& priv_rl = this->kGrpXPrivRl;
- // signed using un revoked key
- auto& sig = this->kSigGrpXMember0Sha256Bsn0Msg0;
- VerifierCtxObj verifier(pub_key);
- FpElemStr fp_str = ((PrivRl const*)priv_rl.data())->f[0];
- BasicSignature basic_signature = ((EpidSignature const*)sig.data())->sigma0;
- EXPECT_EQ(kEpidNoErr,
- EpidCheckPrivRlEntry(verifier, &basic_signature, &fp_str));
- }
- TEST_F(EpidVerifierTest,
- CheckPrivRlEntrySucceedsGivenUnRevokedPrivKeyUsingIkgfData) {
- // test a non revoked priv key
- auto& pub_key = this->kPubKeyIkgfStr;
- auto& priv_rl = this->kPrivRlIkgf;
- // signed using un revoked key
- auto& sig = this->kSigMember0Sha256Bsn0Msg0Ikgf;
- VerifierCtxObj verifier(pub_key);
- FpElemStr fp_str = ((PrivRl const*)priv_rl.data())->f[0];
- BasicSignature basic_signature = ((EpidSignature const*)sig.data())->sigma0;
- EXPECT_EQ(kEpidNoErr,
- EpidCheckPrivRlEntry(verifier, &basic_signature, &fp_str));
- }
- } // namespace
|