// Copyright 2018 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // //////////////////////////////////////////////////////////////////////////////// package signature_test import ( "testing" "google.golang.org/protobuf/proto" "github.com/google/tink/go/core/registry" "github.com/google/tink/go/testutil" commonpb "github.com/google/tink/go/proto/common_go_proto" ) func TestECDSAVerifyGetPrimitiveBasic(t *testing.T) { testParams := genValidECDSAParams() km, err := registry.GetKeyManager(testutil.ECDSAVerifierTypeURL) if err != nil { t.Errorf("cannot obtain ECDSAVerifier key manager: %s", err) } for i := 0; i < len(testParams); i++ { serializedKey, _ := proto.Marshal(testutil.NewRandomECDSAPublicKey(testParams[i].hashType, testParams[i].curve)) _, err := km.Primitive(serializedKey) if err != nil { t.Errorf("unexpect error in test case %d: %s ", i, err) } } } func TestECDSAVerifyWithInvalidPublicKeyFailsCreatingPrimitive(t *testing.T) { km, err := registry.GetKeyManager(testutil.ECDSAVerifierTypeURL) if err != nil { t.Errorf("cannot obtain ECDSAVerifier key manager: %s", err) } pubKey := testutil.NewRandomECDSAPublicKey(commonpb.HashType_SHA256, commonpb.EllipticCurveType_NIST_P256) pubKey.X = []byte{0, 32, 0} pubKey.Y = []byte{0, 32, 0} serializedPubKey, err := proto.Marshal(pubKey) if err != nil { t.Errorf("proto.Marhsal() err = %v, want nil", err) } if _, err := km.Primitive(serializedPubKey); err == nil { t.Errorf("km.Primitive() err = nil, want error") } } func TestECDSAVerifyGetPrimitiveWithInvalidInput(t *testing.T) { testParams := genInvalidECDSAParams() km, err := registry.GetKeyManager(testutil.ECDSAVerifierTypeURL) if err != nil { t.Errorf("cannot obtain ECDSAVerifier key manager: %s", err) } for i := 0; i < len(testParams); i++ { serializedKey, _ := proto.Marshal(testutil.NewRandomECDSAPublicKey(testParams[i].hashType, testParams[i].curve)) if _, err := km.Primitive(serializedKey); err == nil { t.Errorf("expect an error in test case %d", i) } } for _, tc := range genUnkownECDSAParams() { k := testutil.NewRandomECDSAPublicKey(commonpb.HashType_SHA256, commonpb.EllipticCurveType_NIST_P256) k.GetParams().Curve = tc.curve k.GetParams().HashType = tc.hashType serializedKey, _ := proto.Marshal(k) if _, err := km.Primitive(serializedKey); err == nil { t.Errorf("expect an error in test case with params: (curve = %q, hash = %q)", tc.curve, tc.hashType) } } // invalid version key := testutil.NewRandomECDSAPublicKey(commonpb.HashType_SHA256, commonpb.EllipticCurveType_NIST_P256) key.Version = testutil.ECDSAVerifierKeyVersion + 1 serializedKey, _ := proto.Marshal(key) if _, err := km.Primitive(serializedKey); err == nil { t.Errorf("expect an error when version is invalid") } // nil input if _, err := km.Primitive(nil); err == nil { t.Errorf("expect an error when input is nil") } if _, err := km.Primitive([]byte{}); err == nil { t.Errorf("expect an error when input is empty slice") } }