12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160 |
- /*############################################################################
- # Copyright 2016-2017 Intel Corporation
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- ############################################################################*/
- /*!
- * \file
- * \brief Sign unit tests.
- */
- #include <vector>
- #include "epid/common-testhelper/epid_gtest-testhelper.h"
- #include "gtest/gtest.h"
- extern "C" {
- #include "epid/member/api.h"
- #include "epid/member/src/context.h"
- #include "epid/verifier/api.h"
- }
- #include "epid/common-testhelper/errors-testhelper.h"
- #include "epid/common-testhelper/prng-testhelper.h"
- #include "epid/common-testhelper/verifier_wrapper-testhelper.h"
- #include "epid/member/unittests/member-testhelper.h"
- namespace {
- /// Count of elements in array
- #define COUNT_OF(A) (sizeof(A) / sizeof((A)[0]))
- /////////////////////////////////////////////////////////////////////////
- // Simple error cases
- TEST_F(EpidMemberTest, SignFailsGivenNullParameters) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- SigRl srl = {{{0}}, {{0}}, {{0}}, {{{{0}, {0}}, {{0}, {0}}}}};
- srl.gid = this->kGroupPublicKey.gid;
- std::vector<uint8_t> sig(EpidGetSigSize(&srl));
- THROW_ON_EPIDERR(
- EpidMemberSetSigRl(member, &srl, sizeof(srl) - sizeof(srl.bk)));
- EXPECT_EQ(kEpidBadArgErr,
- EpidSign(nullptr, msg.data(), msg.size(), bsn.data(), bsn.size(),
- (EpidSignature*)sig.data(), sig.size()));
- EXPECT_EQ(kEpidBadArgErr, EpidSign(member, msg.data(), msg.size(), bsn.data(),
- bsn.size(), nullptr, sig.size()));
- EXPECT_EQ(kEpidBadArgErr,
- EpidSign(member, nullptr, msg.size(), bsn.data(), bsn.size(),
- (EpidSignature*)sig.data(), sig.size()));
- EXPECT_EQ(kEpidBadArgErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, bsn.size(),
- (EpidSignature*)sig.data(), sig.size()));
- }
- TEST_F(EpidMemberTest, SignFailsGivenWrongSigLen) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- SigRl srl = {{{0}}, {{0}}, {{0}}, {{{{0}, {0}}, {{0}, {0}}}}};
- srl.gid = this->kGroupPublicKey.gid;
- THROW_ON_EPIDERR(
- EpidMemberSetSigRl(member, &srl, sizeof(srl) - sizeof(srl.bk)));
- // signature buffer one byte less than needed
- std::vector<uint8_t> sig_small(EpidGetSigSize(&srl) - 1);
- EXPECT_EQ(kEpidBadArgErr,
- EpidSign(member, msg.data(), msg.size(), bsn.data(), bsn.size(),
- (EpidSignature*)sig_small.data(), sig_small.size()));
- // signature buffer is one byte - a less than allowed for EpidSignature
- std::vector<uint8_t> sig_one(1);
- EXPECT_EQ(kEpidBadArgErr,
- EpidSign(member, msg.data(), msg.size(), bsn.data(), bsn.size(),
- (EpidSignature*)sig_one.data(), sig_one.size()));
- }
- TEST_F(EpidMemberTest, SignFailsGivenUnregisteredBasename) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- auto& bsn1 = this->kBsn1;
- SigRl srl = {{{0}}, {{0}}, {{0}}, {{{{0}, {0}}, {{0}, {0}}}}};
- srl.gid = this->kGroupPublicKey.gid;
- std::vector<uint8_t> sig(EpidGetSigSize(&srl));
- THROW_ON_EPIDERR(
- EpidMemberSetSigRl(member, &srl, sizeof(srl) - sizeof(srl.bk)));
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- EXPECT_EQ(kEpidBadArgErr,
- EpidSign(member, msg.data(), msg.size(), bsn1.data(), bsn1.size(),
- (EpidSignature*)sig.data(), sig.size()));
- }
- TEST_F(EpidMemberTest, SignsFailsIfNotProvisioned) {
- Prng my_prng;
- MemberCtxObj member(&Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidOutOfSequenceError,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- }
- /////////////////////////////////////////////////////////////////////////
- // Anonymity
- TEST_F(EpidMemberTest, SignaturesOfSameMessageAreDifferent) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig1(EpidGetSigSize(nullptr));
- std::vector<uint8_t> sig2(EpidGetSigSize(nullptr));
- // without signature based revocation list
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), nullptr, 0,
- (EpidSignature*)sig1.data(), sig1.size()));
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), nullptr, 0,
- (EpidSignature*)sig2.data(), sig2.size()));
- EXPECT_TRUE(sig1.size() == sig2.size() &&
- 0 != memcmp(sig1.data(), sig2.data(), sig1.size()));
- // with signature based revocation list
- uint8_t sig_rl_data_n2_one[] = {
- // gid
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x01,
- // version
- 0x00, 0x00, 0x00, 0x00,
- // n2
- 0x0, 0x00, 0x00, 0x01,
- // one bk
- 0x9c, 0xa5, 0xe5, 0xae, 0x5f, 0xae, 0x51, 0x59, 0x33, 0x35, 0x27, 0xd,
- 0x8, 0xb1, 0xbe, 0x5d, 0x69, 0x50, 0x84, 0xc5, 0xfe, 0xe2, 0x87, 0xea,
- 0x2e, 0xef, 0xfa, 0xee, 0x67, 0xf2, 0xd8, 0x28, 0x56, 0x43, 0xc6, 0x94,
- 0x67, 0xa6, 0x72, 0xf6, 0x41, 0x15, 0x4, 0x58, 0x42, 0x16, 0x88, 0x57,
- 0x9d, 0xc7, 0x71, 0xd1, 0xc, 0x84, 0x13, 0xa, 0x90, 0x23, 0x18, 0x8, 0xad,
- 0x7d, 0xfe, 0xf5, 0xc8, 0xae, 0xfc, 0x51, 0x40, 0xa7, 0xd1, 0x28, 0xc2,
- 0x89, 0xb2, 0x6b, 0x4e, 0xb4, 0xc1, 0x55, 0x87, 0x98, 0xbd, 0x72, 0xf9,
- 0xcf, 0xd, 0x40, 0x15, 0xee, 0x32, 0xc, 0xf3, 0x56, 0xc5, 0xc, 0x61, 0x9d,
- 0x4f, 0x7a, 0xb5, 0x2b, 0x16, 0xa9, 0xa3, 0x97, 0x38, 0xe2, 0xdd, 0x3a,
- 0x33, 0xad, 0xf6, 0x7b, 0x68, 0x8b, 0x68, 0xcf, 0xa3, 0xd3, 0x98, 0x37,
- 0xce, 0xec, 0xd1, 0xa8, 0xc, 0x8b};
- SigRl* srl1 = reinterpret_cast<SigRl*>(sig_rl_data_n2_one);
- size_t srl1_size = sizeof(sig_rl_data_n2_one);
- std::vector<uint8_t> sig3(EpidGetSigSize(srl1));
- std::vector<uint8_t> sig4(EpidGetSigSize(srl1));
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl1, srl1_size));
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), nullptr, 0,
- (EpidSignature*)sig3.data(), sig3.size()));
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), nullptr, 0,
- (EpidSignature*)sig4.data(), sig4.size()));
- EXPECT_TRUE(sig3.size() == sig4.size() &&
- 0 != memcmp(sig3.data(), sig4.data(), sig3.size()));
- }
- TEST_F(EpidMemberTest, SignaturesOfSameMessageWithSameBasenameAreDifferent) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- std::vector<uint8_t> sig1(EpidGetSigSize(nullptr));
- std::vector<uint8_t> sig2(EpidGetSigSize(nullptr));
- // without signature based revocation list
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), bsn.data(), bsn.size(),
- (EpidSignature*)sig1.data(), sig1.size()));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), bsn.data(), bsn.size(),
- (EpidSignature*)sig2.data(), sig2.size()));
- EXPECT_TRUE(sig1.size() == sig2.size() &&
- 0 != memcmp(sig1.data(), sig2.data(), sig1.size()));
- // with signature based revocation list
- uint8_t sig_rl_data_n2_one[] = {
- // gid
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x01,
- // version
- 0x00, 0x00, 0x00, 0x00,
- // n2
- 0x0, 0x00, 0x00, 0x01,
- // one bk
- 0x9c, 0xa5, 0xe5, 0xae, 0x5f, 0xae, 0x51, 0x59, 0x33, 0x35, 0x27, 0xd,
- 0x8, 0xb1, 0xbe, 0x5d, 0x69, 0x50, 0x84, 0xc5, 0xfe, 0xe2, 0x87, 0xea,
- 0x2e, 0xef, 0xfa, 0xee, 0x67, 0xf2, 0xd8, 0x28, 0x56, 0x43, 0xc6, 0x94,
- 0x67, 0xa6, 0x72, 0xf6, 0x41, 0x15, 0x4, 0x58, 0x42, 0x16, 0x88, 0x57,
- 0x9d, 0xc7, 0x71, 0xd1, 0xc, 0x84, 0x13, 0xa, 0x90, 0x23, 0x18, 0x8, 0xad,
- 0x7d, 0xfe, 0xf5, 0xc8, 0xae, 0xfc, 0x51, 0x40, 0xa7, 0xd1, 0x28, 0xc2,
- 0x89, 0xb2, 0x6b, 0x4e, 0xb4, 0xc1, 0x55, 0x87, 0x98, 0xbd, 0x72, 0xf9,
- 0xcf, 0xd, 0x40, 0x15, 0xee, 0x32, 0xc, 0xf3, 0x56, 0xc5, 0xc, 0x61, 0x9d,
- 0x4f, 0x7a, 0xb5, 0x2b, 0x16, 0xa9, 0xa3, 0x97, 0x38, 0xe2, 0xdd, 0x3a,
- 0x33, 0xad, 0xf6, 0x7b, 0x68, 0x8b, 0x68, 0xcf, 0xa3, 0xd3, 0x98, 0x37,
- 0xce, 0xec, 0xd1, 0xa8, 0xc, 0x8b};
- SigRl* srl1 = reinterpret_cast<SigRl*>(sig_rl_data_n2_one);
- size_t srl1_size = sizeof(sig_rl_data_n2_one);
- std::vector<uint8_t> sig3(EpidGetSigSize(srl1));
- std::vector<uint8_t> sig4(EpidGetSigSize(srl1));
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl1, srl1_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), bsn.data(), bsn.size(),
- (EpidSignature*)sig3.data(), sig3.size()));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), bsn.data(), bsn.size(),
- (EpidSignature*)sig4.data(), sig4.size()));
- EXPECT_TRUE(sig3.size() == sig4.size() &&
- 0 != memcmp(sig3.data(), sig4.data(), sig3.size()));
- }
- /////////////////////////////////////////////////////////////////////////
- // Variable basename
- TEST_F(EpidMemberTest, SignsMessageUsingRandomBaseNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageUsingRandomBaseWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageUsingBasenameNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), bsn.data(),
- bsn.size(), sig, sig_len));
- // verify basic signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetBasename(ctx, bsn.data(), bsn.size()));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageUsingBasenameWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), bsn.data(),
- bsn.size(), sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetBasename(ctx, bsn.data(), bsn.size()));
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsUsingRandomBaseWithRegisteredBasenamesNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsUsingRandomBaseWithRegisteredBasenamesWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsUsingRandomBaseWithoutRegisteredBasenamesNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest,
- SignsUsingRandomBaseWithoutRegisteredBasenamesWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- #ifndef TPM_TSS
- TEST_F(EpidMemberTest, SignsMessageUsingHugeBasenameNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGrpXKey, this->kGrpXMember0PrivKey,
- &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> bsn(1024 * 1024); // exactly 1 MB
- uint8_t c = 0;
- for (size_t i = 0; i < bsn.size(); ++i) {
- bsn[i] = c++;
- }
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), bsn.data(),
- bsn.size(), sig, sig_len));
- // verify basic signature
- VerifierCtxObj ctx(this->kGrpXKey);
- THROW_ON_EPIDERR(EpidVerifierSetBasename(ctx, bsn.data(), bsn.size()));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageUsingHugeBasenameWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGrpXKey, this->kGrpXMember0PrivKey,
- &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> bsn(1024 * 1024); // exactly 1 MB
- uint8_t c = 0;
- for (size_t i = 0; i < bsn.size(); ++i) {
- bsn[i] = c++;
- }
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- SigRl const* srl = reinterpret_cast<SigRl const*>(this->kGrpXSigRl.data());
- size_t srl_size = this->kGrpXSigRl.size() * sizeof(this->kGrpXSigRl[0]);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), bsn.data(),
- bsn.size(), sig, sig_len));
- VerifierCtxObj ctx(this->kGrpXKey);
- THROW_ON_EPIDERR(EpidVerifierSetBasename(ctx, bsn.data(), bsn.size()));
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- }
- TEST_F(EpidMemberTest, SignsMsgUsingBsnContainingAllPossibleBytesNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kData_0_255;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), msg.size(), bsn.data(),
- bsn.size(), sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetBasename(ctx, bsn.data(), bsn.size()));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- #endif
- /////////////////////////////////////////////////////////////////////////
- // Variable sigRL
- TEST_F(EpidMemberTest, SignsMessageGivenNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- size_t sig_len = EpidGetSigSize(nullptr);
- std::vector<uint8_t> newsig(sig_len);
- EpidSignature* sig = (EpidSignature*)newsig.data();
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageGivenNoSigRlUsingIKGFData) {
- GroupPubKey grp_public_key = *reinterpret_cast<const GroupPubKey*>(
- this->kGroupPublicKeyDataIkgf.data());
- PrivKey mbr_private_key =
- *reinterpret_cast<const PrivKey*>(this->kMemberPrivateKeyDataIkgf.data());
- Prng my_prng;
- auto& msg = this->kMsg0;
- size_t sig_len = EpidGetSigSize(nullptr);
- std::vector<uint8_t> newsig(sig_len);
- // using ikgf keys
- MemberCtxObj member(grp_public_key, mbr_private_key, &Prng::Generate,
- &my_prng);
- EpidSignature* sig = (EpidSignature*)newsig.data();
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(grp_public_key);
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageGivenSigRlWithNoEntries) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- uint8_t sig_rl_data_n2_zero[] = {
- // gid
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x01,
- // version
- 0x00, 0x00, 0x00, 0x00,
- // n2
- 0x0, 0x00, 0x00, 0x00,
- // not bk's
- };
- SigRl const* srl = reinterpret_cast<SigRl const*>(sig_rl_data_n2_zero);
- size_t srl_size = sizeof(sig_rl_data_n2_zero);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageGivenSigRlWithNoEntriesUsingIkgfData) {
- GroupPubKey grp_public_key = *reinterpret_cast<const GroupPubKey*>(
- this->kGroupPublicKeyDataIkgf.data());
- PrivKey mbr_private_key =
- *reinterpret_cast<const PrivKey*>(this->kMemberPrivateKeyDataIkgf.data());
- Prng my_prng;
- auto& msg = this->kMsg0;
- // using ikgf keys
- MemberCtxObj member_ikgf(grp_public_key, mbr_private_key, &Prng::Generate,
- &my_prng);
- uint8_t sig_rl_data_n2_one_gid0[] = {
- #include "epid/common-testhelper/testdata/ikgf/groupa/sigrl_empty.inc"
- };
- SigRl* srl_ikgf = reinterpret_cast<SigRl*>(sig_rl_data_n2_one_gid0);
- size_t srl_size = sizeof(sig_rl_data_n2_one_gid0);
- std::vector<uint8_t> sig_data_ikgf(EpidGetSigSize(srl_ikgf));
- EpidSignature* sig_ikgf =
- reinterpret_cast<EpidSignature*>(sig_data_ikgf.data());
- size_t sig_len = sig_data_ikgf.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member_ikgf, srl_ikgf, srl_size));
- EXPECT_EQ(kEpidNoErr, EpidSign(member_ikgf, msg.data(), msg.size(), nullptr,
- 0, sig_ikgf, sig_len));
- VerifierCtxObj ctx_ikgf(grp_public_key);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx_ikgf, srl_ikgf, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx_ikgf, sig_ikgf, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageGivenSigRlWithEntries) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- uint8_t sig_rl_data_n2_one[] = {
- // gid
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x01,
- // version
- 0x00, 0x00, 0x00, 0x00,
- // n2
- 0x0, 0x00, 0x00, 0x02,
- // one bk
- 0x9c, 0xa5, 0xe5, 0xae, 0x5f, 0xae, 0x51, 0x59, 0x33, 0x35, 0x27, 0xd,
- 0x8, 0xb1, 0xbe, 0x5d, 0x69, 0x50, 0x84, 0xc5, 0xfe, 0xe2, 0x87, 0xea,
- 0x2e, 0xef, 0xfa, 0xee, 0x67, 0xf2, 0xd8, 0x28, 0x56, 0x43, 0xc6, 0x94,
- 0x67, 0xa6, 0x72, 0xf6, 0x41, 0x15, 0x4, 0x58, 0x42, 0x16, 0x88, 0x57,
- 0x9d, 0xc7, 0x71, 0xd1, 0xc, 0x84, 0x13, 0xa, 0x90, 0x23, 0x18, 0x8, 0xad,
- 0x7d, 0xfe, 0xf5, 0xc8, 0xae, 0xfc, 0x51, 0x40, 0xa7, 0xd1, 0x28, 0xc2,
- 0x89, 0xb2, 0x6b, 0x4e, 0xb4, 0xc1, 0x55, 0x87, 0x98, 0xbd, 0x72, 0xf9,
- 0xcf, 0xd, 0x40, 0x15, 0xee, 0x32, 0xc, 0xf3, 0x56, 0xc5, 0xc, 0x61, 0x9d,
- 0x4f, 0x7a, 0xb5, 0x2b, 0x16, 0xa9, 0xa3, 0x97, 0x38, 0xe2, 0xdd, 0x3a,
- 0x33, 0xad, 0xf6, 0x7b, 0x68, 0x8b, 0x68, 0xcf, 0xa3, 0xd3, 0x98, 0x37,
- 0xce, 0xec, 0xd1, 0xa8, 0xc, 0x8b,
- 0x71, 0x8a, 0xb5, 0x1, 0x7f, 0x7c, 0x92, 0x9a, 0xa2, 0xc9, 0x81, 0x10,
- 0xfe, 0xbf, 0xc, 0x53, 0xa4, 0x43, 0xaf, 0x31, 0x74, 0x12, 0x25, 0x60,
- 0x3e, 0xc0, 0x21, 0xe6, 0x63, 0x9a, 0xd2, 0x67, 0x2d, 0xb5, 0xd5, 0x82,
- 0xc4, 0x49, 0x29, 0x51, 0x42, 0x8f, 0xe0, 0xe, 0xd1, 0x73, 0x27, 0xf5,
- 0x77, 0x16, 0x4, 0x40, 0x8a, 0x0, 0xe, 0x3a, 0x5d, 0x37, 0x42, 0xd3, 0x8,
- 0x40, 0xbd, 0x69, 0xf7, 0x5f, 0x74, 0x21, 0x50, 0xf4, 0xce, 0xfe, 0xd9,
- 0xdd, 0x97, 0x6c, 0xa8, 0xa5, 0x60, 0x6b, 0xf8, 0x1b, 0xba, 0x2, 0xb2,
- 0xca, 0x5, 0x44, 0x9b, 0xb1, 0x5e, 0x3a, 0xa4, 0x35, 0x7a, 0x51, 0xfa,
- 0xcf, 0xa4, 0x4, 0xe9, 0xf3, 0xbf, 0x38, 0xd4, 0x24, 0x9, 0x52, 0xf3,
- 0x58, 0x3d, 0x9d, 0x4b, 0xb3, 0x37, 0x4b, 0xec, 0x87, 0xe1, 0x64, 0x60,
- 0x3c, 0xb6, 0xf7, 0x7b, 0xff, 0x40, 0x11};
- SigRl* srl = reinterpret_cast<SigRl*>(sig_rl_data_n2_one);
- size_t srl_size = sizeof(sig_rl_data_n2_one);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageGivenSigRlWithEntriesUsingIKGFData) {
- GroupPubKey grp_public_key = *reinterpret_cast<const GroupPubKey*>(
- this->kGroupPublicKeyDataIkgf.data());
- PrivKey mbr_private_key =
- *reinterpret_cast<const PrivKey*>(this->kMemberPrivateKeyDataIkgf.data());
- Prng my_prng;
- auto& msg = this->kMsg0;
- // using ikgf keys
- MemberCtxObj member_ikgf(grp_public_key, mbr_private_key, &Prng::Generate,
- &my_prng);
- uint8_t sig_rl_data_n2_one_gid0[] = {
- // gid
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00,
- // version
- 0x00, 0x00, 0x00, 0x00,
- // n2
- 0x0, 0x00, 0x00, 0x02,
- // one bk
- 0x9c, 0xa5, 0xe5, 0xae, 0x5f, 0xae, 0x51, 0x59, 0x33, 0x35, 0x27, 0xd,
- 0x8, 0xb1, 0xbe, 0x5d, 0x69, 0x50, 0x84, 0xc5, 0xfe, 0xe2, 0x87, 0xea,
- 0x2e, 0xef, 0xfa, 0xee, 0x67, 0xf2, 0xd8, 0x28, 0x56, 0x43, 0xc6, 0x94,
- 0x67, 0xa6, 0x72, 0xf6, 0x41, 0x15, 0x4, 0x58, 0x42, 0x16, 0x88, 0x57,
- 0x9d, 0xc7, 0x71, 0xd1, 0xc, 0x84, 0x13, 0xa, 0x90, 0x23, 0x18, 0x8, 0xad,
- 0x7d, 0xfe, 0xf5, 0xc8, 0xae, 0xfc, 0x51, 0x40, 0xa7, 0xd1, 0x28, 0xc2,
- 0x89, 0xb2, 0x6b, 0x4e, 0xb4, 0xc1, 0x55, 0x87, 0x98, 0xbd, 0x72, 0xf9,
- 0xcf, 0xd, 0x40, 0x15, 0xee, 0x32, 0xc, 0xf3, 0x56, 0xc5, 0xc, 0x61, 0x9d,
- 0x4f, 0x7a, 0xb5, 0x2b, 0x16, 0xa9, 0xa3, 0x97, 0x38, 0xe2, 0xdd, 0x3a,
- 0x33, 0xad, 0xf6, 0x7b, 0x68, 0x8b, 0x68, 0xcf, 0xa3, 0xd3, 0x98, 0x37,
- 0xce, 0xec, 0xd1, 0xa8, 0xc, 0x8b,
- 0x71, 0x8a, 0xb5, 0x1, 0x7f, 0x7c, 0x92, 0x9a, 0xa2, 0xc9, 0x81, 0x10,
- 0xfe, 0xbf, 0xc, 0x53, 0xa4, 0x43, 0xaf, 0x31, 0x74, 0x12, 0x25, 0x60,
- 0x3e, 0xc0, 0x21, 0xe6, 0x63, 0x9a, 0xd2, 0x67, 0x2d, 0xb5, 0xd5, 0x82,
- 0xc4, 0x49, 0x29, 0x51, 0x42, 0x8f, 0xe0, 0xe, 0xd1, 0x73, 0x27, 0xf5,
- 0x77, 0x16, 0x4, 0x40, 0x8a, 0x0, 0xe, 0x3a, 0x5d, 0x37, 0x42, 0xd3, 0x8,
- 0x40, 0xbd, 0x69, 0xf7, 0x5f, 0x74, 0x21, 0x50, 0xf4, 0xce, 0xfe, 0xd9,
- 0xdd, 0x97, 0x6c, 0xa8, 0xa5, 0x60, 0x6b, 0xf8, 0x1b, 0xba, 0x2, 0xb2,
- 0xca, 0x5, 0x44, 0x9b, 0xb1, 0x5e, 0x3a, 0xa4, 0x35, 0x7a, 0x51, 0xfa,
- 0xcf, 0xa4, 0x4, 0xe9, 0xf3, 0xbf, 0x38, 0xd4, 0x24, 0x9, 0x52, 0xf3,
- 0x58, 0x3d, 0x9d, 0x4b, 0xb3, 0x37, 0x4b, 0xec, 0x87, 0xe1, 0x64, 0x60,
- 0x3c, 0xb6, 0xf7, 0x7b, 0xff, 0x40, 0x11};
- SigRl* srl_ikgf = reinterpret_cast<SigRl*>(sig_rl_data_n2_one_gid0);
- size_t srl_size = sizeof(sig_rl_data_n2_one_gid0);
- std::vector<uint8_t> sig_data_ikgf(EpidGetSigSize(srl_ikgf));
- EpidSignature* sig_ikgf =
- reinterpret_cast<EpidSignature*>(sig_data_ikgf.data());
- size_t sig_len = sig_data_ikgf.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member_ikgf, srl_ikgf, srl_size));
- EXPECT_EQ(kEpidNoErr, EpidSign(member_ikgf, msg.data(), msg.size(), nullptr,
- 0, sig_ikgf, sig_len));
- VerifierCtxObj ctx_ikgf(grp_public_key);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx_ikgf, srl_ikgf, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx_ikgf, sig_ikgf, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignMessageReportsIfMemberRevoked) {
- // note: a complete sig + nr proof should still be returned!!
- auto& pub_key = this->kGrpXKey;
- auto& priv_key = this->kGrpXMember0PrivKey;
- auto& msg = this->kMsg0;
- Prng my_prng;
- MemberCtxObj member(pub_key, priv_key, &Prng::Generate, &my_prng);
- const std::vector<uint8_t> kGrpXSigRlMember0Sha512Rndbase0Msg0MiddleEntry = {
- #include "epid/common-testhelper/testdata/grp_x/sigrl_member0_sig_sha512_rndbase_msg0_revoked_middle_entry.inc"
- };
- auto srl = reinterpret_cast<SigRl const*>(
- kGrpXSigRlMember0Sha512Rndbase0Msg0MiddleEntry.data());
- size_t srl_size = kGrpXSigRlMember0Sha512Rndbase0Msg0MiddleEntry.size();
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidSigRevokedInSigRl,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(pub_key);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigRevokedInSigRl,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignMessageReportsIfMemberRevokedUsingIKGFData) {
- // note: a complete sig + nr proof should still be returned!!
- GroupPubKey grp_public_key = *reinterpret_cast<const GroupPubKey*>(
- this->kGroupPublicKeyDataIkgf.data());
- const PrivKey member_private_key_revoked_by_sig = {
- #include "epid/common-testhelper/testdata/ikgf/groupa/sigrevokedmember0/mprivkey.inc"
- };
- Prng my_prng;
- MemberCtxObj member(grp_public_key, member_private_key_revoked_by_sig,
- &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- const std::vector<uint8_t> sig_Rl = {
- #include "epid/common-testhelper/testdata/ikgf/groupa/sigrl.inc"
- };
- auto srl = reinterpret_cast<SigRl const*>(sig_Rl.data());
- size_t srl_size = sig_Rl.size();
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidSigRevokedInSigRl,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(grp_public_key);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigRevokedInSigRl,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- /////////////////////////////////////////////////////////////////////////
- // Revoked member by sigRL for TPM case
- TEST_F(EpidMemberTest,
- PROTECTED_SignMessageByCedentialReportsIfMemberRevoked_EPS0) {
- // note: a complete sig + nr proof should still be returned!!
- auto& pub_key = this->kEps0GroupPublicKey;
- auto credential = *(MembershipCredential const*)&this->kEps0MemberPrivateKey;
- const std::vector<uint8_t> msg = {'t', 'e', 's', 't', '2'};
- Prng my_prng;
- MemberCtxObj member(pub_key, credential, &Prng::Generate, &my_prng);
- const std::vector<uint8_t> kEps0SigRlMember0Sha256Rndbase0Msg0FirstEntry = {
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01,
- 0x39, 0x97, 0x09, 0x11, 0x30, 0xb0, 0x2a, 0x29, 0xa7, 0x9b, 0xf1, 0xef,
- 0xe9, 0xe5, 0xc7, 0x03, 0x17, 0xe6, 0x4f, 0x6f, 0x49, 0x4d, 0xeb, 0x0f,
- 0xfd, 0x1c, 0x3f, 0xce, 0xcc, 0xc8, 0x40, 0x6b, 0x23, 0xd3, 0xec, 0x78,
- 0x78, 0x15, 0x4a, 0x34, 0x0f, 0xd1, 0xd3, 0xfa, 0xd2, 0xb2, 0x5a, 0xc9,
- 0xec, 0xa2, 0x41, 0xe1, 0x46, 0x6d, 0xed, 0xb3, 0x4a, 0xa6, 0xdf, 0xb6,
- 0xc2, 0x11, 0x49, 0x0d, 0x8b, 0xc4, 0xdc, 0xe0, 0x3f, 0x86, 0x59, 0xb6,
- 0x47, 0x0e, 0x72, 0xd9, 0x04, 0x91, 0x06, 0x8d, 0xe7, 0xb0, 0x4e, 0x40,
- 0x4a, 0x72, 0xe2, 0x99, 0xcc, 0xf2, 0x93, 0x1f, 0xcb, 0x32, 0x2e, 0xa3,
- 0x62, 0xf5, 0x35, 0x51, 0x8b, 0x8e, 0xc8, 0xf4, 0x1e, 0xbe, 0xc9, 0xf4,
- 0xa9, 0xc4, 0x63, 0xd3, 0x86, 0x5d, 0xf6, 0x44, 0x36, 0x5c, 0x44, 0x11,
- 0xb4, 0xa3, 0x85, 0xd5, 0x9e, 0xaf, 0x56, 0x83};
- auto srl = reinterpret_cast<SigRl const*>(
- kEps0SigRlMember0Sha256Rndbase0Msg0FirstEntry.data());
- size_t srl_size = kEps0SigRlMember0Sha256Rndbase0Msg0FirstEntry.size();
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidSigRevokedInSigRl,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- VerifierCtxObj ctx(pub_key);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigRevokedInSigRl,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- /////////////////////////////////////////////////////////////////////////
- // Variable hash alg
- TEST_F(EpidMemberTest, SignsMessageUsingSha256HashAlg) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey, kSha256,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetHashAlg(ctx, kSha256));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageUsingSha384HashAlg) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey, kSha384,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetHashAlg(ctx, kSha384));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageUsingSha512HashAlg) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey, kSha512,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetHashAlg(ctx, kSha512));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageUsingSha512256HashAlg) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- kSha512_256, this->kMemberPrecomp, &Prng::Generate,
- &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetHashAlg(ctx, kSha512_256));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- /////////////////////////////////////////////////////////////////////////
- // Variable hash alg for TPM data
- TEST_F(EpidMemberTest,
- PROTECTED_SignsMessageByCredentialUsingSha256HashAlg_EPS0) {
- Prng my_prng;
- MemberCtxObj member(
- this->kEps0GroupPublicKey,
- *(MembershipCredential const*)&this->kEps0MemberPrivateKey,
- &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(this->kEps0GroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetHashAlg(ctx, kSha256));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest,
- DISABLED_PROTECTED_SignsMessageByCredentialUsingSha384HashAlg_EPS0) {
- Prng my_prng;
- MemberCtxObj member(
- this->kEps0GroupPublicKey,
- *(MembershipCredential const*)&this->kEps0MemberPrivateKey,
- &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetHashAlg(member, kSha384));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(this->kEps0GroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetHashAlg(ctx, kSha384));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest,
- DISABLED_PROTECTED_SignsMessageByCredentialUsingSha512HashAlg_EPS0) {
- Prng my_prng;
- MemberCtxObj member(
- this->kEps0GroupPublicKey,
- *(MembershipCredential const*)&this->kEps0MemberPrivateKey,
- &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetHashAlg(member, kSha512));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify signature
- VerifierCtxObj ctx(this->kEps0GroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetHashAlg(ctx, kSha512));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- /////////////////////////////////////////////////////////////////////////
- // Variable precomputed signatures
- TEST_F(EpidMemberTest, SignConsumesPrecomputedSignaturesNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- THROW_ON_EPIDERR(EpidAddPreSigs(member, 3));
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- EXPECT_EQ((size_t)2, EpidGetNumPreSigs(member));
- }
- TEST_F(EpidMemberTest, SignConsumesPrecomputedSignaturesWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- THROW_ON_EPIDERR(EpidAddPreSigs(member, 3));
- auto& msg = this->kMsg0;
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- EXPECT_EQ((size_t)2, EpidGetNumPreSigs(member));
- }
- TEST_F(EpidMemberTest, SignsMessageWithPrecomputedSignaturesNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- THROW_ON_EPIDERR(EpidAddPreSigs(member, 1));
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify basic signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageWithPrecomputedSignaturesWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- THROW_ON_EPIDERR(EpidAddPreSigs(member, 1));
- auto& msg = this->kMsg0;
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify basic signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageWithoutPrecomputedSignaturesNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- // test sign without precomputed signatures
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify basic signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- TEST_F(EpidMemberTest, SignsMessageWithoutPrecomputedSignaturesWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- // test sign without precomputed signatures
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- // verify basic signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- /////////////////////////////////////////////////////////////////////////
- // Variable messages
- TEST_F(EpidMemberTest, SignsEmptyMessageNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- auto& bsn = this->kBsn0;
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidRegisterBasename(member, bsn.data(), bsn.size()));
- EXPECT_EQ(kEpidNoErr, EpidSign(member, msg.data(), 0, bsn.data(), bsn.size(),
- sig, sig_len));
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetBasename(ctx, bsn.data(), bsn.size()));
- EXPECT_EQ(kEpidSigValid, EpidVerify(ctx, sig, sig_len, msg.data(), 0));
- }
- TEST_F(EpidMemberTest, SignsEmptyMessageWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- auto& msg = this->kMsg0;
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), 0, nullptr, 0, sig, sig_len));
- // verify basic signature
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- EXPECT_EQ(kEpidSigValid, EpidVerify(ctx, sig, sig_len, msg.data(), 0));
- }
- TEST_F(EpidMemberTest, SignsShortMessageNoSigRl) {
- // check: 1, 13, 128, 256, 512, 1021, 1024 bytes
- // 13 and 1021 are primes
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- VerifierCtxObj ctx(this->kGroupPublicKey);
- size_t lengths[] = {1, 13, 128, 256,
- 512, 1021, 1024}; // have desired lengths to loop over
- std::vector<uint8_t> msg(
- lengths[COUNT_OF(lengths) - 1]); // allocate message for max size
- for (size_t n = 0; n < msg.size(); n++) {
- msg[n] = (uint8_t)n;
- }
- for (auto length : lengths) {
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), length, nullptr, 0, sig, sig_len))
- << "EpidSign for message_len: " << length << " failed";
- EXPECT_EQ(kEpidSigValid, EpidVerify(ctx, sig, sig_len, msg.data(), length))
- << "EpidVerify for message_len: " << length << " failed";
- }
- }
- TEST_F(EpidMemberTest, SignsShortMessageWithSigRl) {
- // check: 1, 13, 128, 256, 512, 1021, 1024 bytes
- // 13 and 1021 are primes
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- size_t message_len = 0;
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- size_t lengths[] = {1, 13, 128, 256,
- 512, 1021, 1024}; // have desired lengths to loop over
- std::vector<uint8_t> msg(
- lengths[COUNT_OF(lengths) - 1]); // allocate message for max size
- for (size_t n = 0; n < msg.size(); n++) {
- msg.at(n) = (uint8_t)n;
- }
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- for (auto length : lengths) {
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), length, nullptr, 0, sig, sig_len))
- << "EpidSign for message_len: " << message_len << " failed";
- EXPECT_EQ(kEpidSigValid, EpidVerify(ctx, sig, sig_len, msg.data(), length))
- << "EpidVerify for message_len: " << message_len << " failed";
- }
- }
- TEST_F(EpidMemberTest, SignsLongMessageNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- VerifierCtxObj ctx(this->kGroupPublicKey);
- std::vector<uint8_t> msg(1000000); // allocate message for max size
- for (size_t n = 0; n < msg.size(); n++) {
- msg.at(n) = (uint8_t)n;
- }
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len))
- << "EpidSign for message_len: " << 1000000 << " failed";
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()))
- << "EpidVerify for message_len: " << 1000000 << " failed";
- }
- TEST_F(EpidMemberTest, SignsLongMessageWithSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- SigRl const* srl =
- reinterpret_cast<SigRl const*>(this->kSigRl5EntryData.data());
- size_t srl_size = this->kSigRl5EntryData.size() * sizeof(uint8_t);
- std::vector<uint8_t> sig_data(EpidGetSigSize(srl));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- VerifierCtxObj ctx(this->kGroupPublicKey);
- THROW_ON_EPIDERR(EpidVerifierSetSigRl(ctx, srl, srl_size));
- std::vector<uint8_t> msg(1000000); // allocate message for max size
- for (size_t n = 0; n < msg.size(); n++) {
- msg.at(n) = (uint8_t)n;
- }
- THROW_ON_EPIDERR(EpidMemberSetSigRl(member, srl, srl_size));
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len))
- << "EpidSign for message_len: " << 1000000 << " failed";
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()))
- << "EpidVerify for message_len: " << 1000000 << " failed";
- }
- TEST_F(EpidMemberTest, SignsMsgContainingAllPossibleBytesNoSigRl) {
- Prng my_prng;
- MemberCtxObj member(this->kGroupPublicKey, this->kMemberPrivateKey,
- this->kMemberPrecomp, &Prng::Generate, &my_prng);
- std::vector<uint8_t> sig_data(EpidGetSigSize(nullptr));
- EpidSignature* sig = reinterpret_cast<EpidSignature*>(sig_data.data());
- size_t sig_len = sig_data.size() * sizeof(uint8_t);
- VerifierCtxObj ctx(this->kGroupPublicKey);
- std::vector<uint8_t> msg = this->kData_0_255;
- EXPECT_EQ(kEpidNoErr,
- EpidSign(member, msg.data(), msg.size(), nullptr, 0, sig, sig_len));
- EXPECT_EQ(kEpidSigValid,
- EpidVerify(ctx, sig, sig_len, msg.data(), msg.size()));
- }
- } // namespace
|