aboutsummaryrefslogtreecommitdiff
path: root/epid/verifier/unittests/verifybasic-test.cc
diff options
context:
space:
mode:
Diffstat (limited to 'epid/verifier/unittests/verifybasic-test.cc')
-rw-r--r--epid/verifier/unittests/verifybasic-test.cc57
1 files changed, 24 insertions, 33 deletions
diff --git a/epid/verifier/unittests/verifybasic-test.cc b/epid/verifier/unittests/verifybasic-test.cc
index eac2542..9f6b3e5 100644
--- a/epid/verifier/unittests/verifybasic-test.cc
+++ b/epid/verifier/unittests/verifybasic-test.cc
@@ -31,6 +31,7 @@ extern "C" {
#include "epid/verifier/unittests/verifier-testhelper.h"
#include "epid/common-testhelper/verifier_wrapper-testhelper.h"
#include "epid/common-testhelper/errors-testhelper.h"
+#include "epid/member/unittests/member-testhelper.h"
namespace {
@@ -41,23 +42,12 @@ TEST_F(EpidVerifierTest, VerifyBasicSigFailsGivenNullPtr) {
const BasicSignature basic_sig = sig->sigma0;
auto& msg = this->kTest1;
- EXPECT_EQ(kEpidBadArgErr, EpidVerifyBasicSig(nullptr, &basic_sig, msg.data(),
- msg.size(), nullptr, 0));
- EXPECT_EQ(kEpidBadArgErr, EpidVerifyBasicSig(verifier, nullptr, msg.data(),
- msg.size(), nullptr, 0));
- EXPECT_EQ(kEpidBadArgErr, EpidVerifyBasicSig(verifier, &basic_sig, nullptr,
- msg.size(), nullptr, 0));
-}
-
-TEST_F(EpidVerifierTest, VerifyBasicSigFailsGivenIncorrectLegth) {
- VerifierCtxObj verifier(this->kGrp01Key);
- auto const& sig = (EpidSignature const*)this
- ->kSigGrp01Member0Sha256RandombaseTest1NoSigRl.data();
- const BasicSignature basic_sig = sig->sigma0;
- auto& msg = this->kTest1;
-
- EXPECT_EQ(kEpidBadArgErr, EpidVerifyBasicSig(verifier, &basic_sig, msg.data(),
- msg.size(), nullptr, 1));
+ EXPECT_EQ(kEpidBadArgErr,
+ EpidVerifyBasicSig(nullptr, &basic_sig, msg.data(), msg.size()));
+ EXPECT_EQ(kEpidBadArgErr,
+ EpidVerifyBasicSig(verifier, nullptr, msg.data(), msg.size()));
+ EXPECT_EQ(kEpidBadArgErr,
+ EpidVerifyBasicSig(verifier, &basic_sig, nullptr, msg.size()));
}
TEST_F(EpidVerifierTest,
@@ -68,8 +58,8 @@ TEST_F(EpidVerifierTest,
const BasicSignature basic_sig = sig->sigma0;
auto& msg = this->kTest1;
- EXPECT_EQ(kEpidNoErr, EpidVerifyBasicSig(verifier, &basic_sig, msg.data(),
- msg.size(), nullptr, 0));
+ EXPECT_EQ(kEpidNoErr,
+ EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
}
TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyValidSignatureWithSHA256) {
@@ -80,8 +70,8 @@ TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyValidSignatureWithSHA256) {
auto& msg = this->kTest1;
THROW_ON_EPIDERR(EpidVerifierSetHashAlg(verifier, kSha256));
- EXPECT_EQ(kEpidNoErr, EpidVerifyBasicSig(verifier, &basic_sig, msg.data(),
- msg.size(), nullptr, 0));
+ EXPECT_EQ(kEpidNoErr,
+ EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
}
TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyValidSignatureWithSHA384) {
@@ -91,8 +81,8 @@ TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyValidSignatureWithSHA384) {
const BasicSignature basic_sig = sig->sigma0;
auto& msg = this->kTest1;
THROW_ON_EPIDERR(EpidVerifierSetHashAlg(verifier, kSha384));
- EXPECT_EQ(kEpidNoErr, EpidVerifyBasicSig(verifier, &basic_sig, msg.data(),
- msg.size(), nullptr, 0));
+ EXPECT_EQ(kEpidNoErr,
+ EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
}
TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyValidSignatureWithSHA512) {
@@ -102,8 +92,8 @@ TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyValidSignatureWithSHA512) {
const BasicSignature basic_sig = sig->sigma0;
auto& msg = this->kTest1;
THROW_ON_EPIDERR(EpidVerifierSetHashAlg(verifier, kSha512));
- EXPECT_EQ(kEpidNoErr, EpidVerifyBasicSig(verifier, &basic_sig, msg.data(),
- msg.size(), nullptr, 0));
+ EXPECT_EQ(kEpidNoErr,
+ EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
}
TEST_F(EpidVerifierTest,
@@ -116,7 +106,7 @@ TEST_F(EpidVerifierTest,
BasicSignature corrupted_basic_sig = basic_sig;
corrupted_basic_sig.B.x.data.data[0]++;
EXPECT_NE(kEpidNoErr, EpidVerifyBasicSig(verifier, &corrupted_basic_sig,
- msg.data(), msg.size(), nullptr, 0));
+ msg.data(), msg.size()));
}
TEST_F(EpidVerifierTest,
@@ -128,8 +118,7 @@ TEST_F(EpidVerifierTest,
auto msg = this->kTest1;
msg[0]++; // change message for signature verification to fail
EXPECT_EQ(kEpidSigInvalid,
- EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size(),
- nullptr, 0));
+ EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
}
TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyWithBasename) {
@@ -140,22 +129,24 @@ TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyWithBasename) {
auto& msg = this->kTest1;
auto& basename = this->kBasename1;
THROW_ON_EPIDERR(EpidVerifierSetHashAlg(verifier, kSha256));
+ THROW_ON_EPIDERR(
+ EpidVerifierSetBasename(verifier, basename.data(), basename.size()));
EXPECT_EQ(kEpidNoErr,
- EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size(),
- basename.data(), basename.size()));
+ EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
}
TEST_F(EpidVerifierTest, VerifyBasicSigCanVerifyWithBasenameUsingIkgfData) {
- VerifierCtxObj verifier(this->pub_key_ikgf_str);
+ VerifierCtxObj verifier(this->kPubKeyIkgfStr);
auto const& sig =
(EpidSignature const*)this->kSigSha256Basename1Test1NoSigRlIkgf.data();
const BasicSignature basic_sig = sig->sigma0;
auto& msg = this->kTest1;
auto& basename = this->kBasename1;
THROW_ON_EPIDERR(EpidVerifierSetHashAlg(verifier, kSha256));
+ THROW_ON_EPIDERR(
+ EpidVerifierSetBasename(verifier, basename.data(), basename.size()));
EXPECT_EQ(kEpidNoErr,
- EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size(),
- basename.data(), basename.size()));
+ EpidVerifyBasicSig(verifier, &basic_sig, msg.data(), msg.size()));
}
} // namespace