blob: b265c0eee49739f3893c1f35d9fdd48a7628a345 [file] [log] [blame]
// Copyright 2024 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
#include "tink/experimental/pqcrypto/signature/slh_dsa_parameters.h"
#include "gmock/gmock.h"
#include "gtest/gtest.h"
#include "absl/status/status.h"
#include "tink/util/statusor.h"
#include "tink/util/test_matchers.h"
namespace crypto {
namespace tink {
namespace {
using ::crypto::tink::test::IsOk;
using ::crypto::tink::test::StatusIs;
using ::testing::Eq;
using ::testing::IsTrue;
using ::testing::TestWithParam;
using ::testing::Values;
struct VariantTestCase {
SlhDsaParameters::Variant variant;
bool has_id_requirement;
};
using SlhDsaParametersTest = TestWithParam<VariantTestCase>;
INSTANTIATE_TEST_SUITE_P(
SlhDsaParametersTestSuite, SlhDsaParametersTest,
Values(VariantTestCase{SlhDsaParameters::Variant::kTink,
/*has_id_requirement=*/true},
VariantTestCase{SlhDsaParameters::Variant::kNoPrefix,
/*has_id_requirement=*/false}));
TEST_P(SlhDsaParametersTest, CreateSlhDsa128Sha2SmallSignatureWorks) {
VariantTestCase test_case = GetParam();
util::StatusOr<SlhDsaParameters> parameters = SlhDsaParameters::Create(
SlhDsaParameters::HashType::kSha2, /*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature, test_case.variant);
ASSERT_THAT(parameters, IsOk());
EXPECT_THAT(parameters->GetHashType(), Eq(SlhDsaParameters::HashType::kSha2));
EXPECT_THAT(parameters->GetPrivateKeySizeInBytes(), Eq(64));
EXPECT_THAT(parameters->GetSignatureType(),
Eq(SlhDsaParameters::SignatureType::kSmallSignature));
EXPECT_THAT(parameters->GetVariant(), Eq(test_case.variant));
EXPECT_THAT(parameters->HasIdRequirement(), Eq(test_case.has_id_requirement));
}
TEST(SlhDsaParametersTest, CreateWithInvalidVariantFails) {
EXPECT_THAT(
SlhDsaParameters::Create(
SlhDsaParameters::HashType::kSha2, /*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::
kDoNotUseInsteadUseDefaultWhenWritingSwitchStatements)
.status(),
StatusIs(absl::StatusCode::kInvalidArgument));
}
TEST(SlhDsaParametersTest, CreateWithInvalidHashTypeFails) {
EXPECT_THAT(SlhDsaParameters::Create(
SlhDsaParameters::HashType::
kDoNotUseInsteadUseDefaultWhenWritingSwitchStatements,
/*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::kTink)
.status(),
StatusIs(absl::StatusCode::kInvalidArgument));
}
TEST(SlhDsaParametersTest, CreateWithUnsupportedHashTypeFails) {
EXPECT_THAT(
SlhDsaParameters::Create(SlhDsaParameters::HashType::kShake,
/*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::kTink)
.status(),
StatusIs(absl::StatusCode::kInvalidArgument));
}
TEST(SlhDsaParametersTest, CreateWithInvalidSignatureTypeFails) {
EXPECT_THAT(SlhDsaParameters::Create(
SlhDsaParameters::HashType::kSha2,
/*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::
kDoNotUseInsteadUseDefaultWhenWritingSwitchStatements,
SlhDsaParameters::Variant::kTink)
.status(),
StatusIs(absl::StatusCode::kInvalidArgument));
}
TEST(SlhDsaParametersTest, CreateWithUnsupportedSignatureTypeFails) {
EXPECT_THAT(
SlhDsaParameters::Create(SlhDsaParameters::HashType::kSha2,
/*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kFastSigning,
SlhDsaParameters::Variant::kTink)
.status(),
StatusIs(absl::StatusCode::kInvalidArgument));
}
TEST(SlhDsaParametersTest, CreateWithInvalidKeySizeFails) {
EXPECT_THAT(
SlhDsaParameters::Create(SlhDsaParameters::HashType::kSha2,
/*private_key_size_in_bytes=*/31,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::kTink)
.status(),
StatusIs(absl::StatusCode::kInvalidArgument));
}
TEST(SlhDsaParametersTest, CreateWithUnsupportedKeySizeFails) {
EXPECT_THAT(
SlhDsaParameters::Create(SlhDsaParameters::HashType::kSha2,
/*private_key_size_in_bytes=*/128,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::kNoPrefix)
.status(),
StatusIs(absl::StatusCode::kInvalidArgument));
}
TEST(SlhDsaParametersTest, CopyConstructor) {
util::StatusOr<SlhDsaParameters> parameters =
SlhDsaParameters::Create(SlhDsaParameters::HashType::kSha2,
/*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::kTink);
ASSERT_THAT(parameters, IsOk());
SlhDsaParameters copy(*parameters);
EXPECT_THAT(copy.GetHashType(), Eq(SlhDsaParameters::HashType::kSha2));
EXPECT_THAT(copy.GetPrivateKeySizeInBytes(), Eq(64));
EXPECT_THAT(copy.GetSignatureType(),
Eq(SlhDsaParameters::SignatureType::kSmallSignature));
EXPECT_THAT(copy.GetVariant(), Eq(SlhDsaParameters::Variant::kTink));
EXPECT_THAT(copy.HasIdRequirement(), IsTrue());
}
TEST(SlhDsaParametersTest, CopyAssignment) {
util::StatusOr<SlhDsaParameters> parameters =
SlhDsaParameters::Create(SlhDsaParameters::HashType::kSha2,
/*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::kTink);
ASSERT_THAT(parameters, IsOk());
SlhDsaParameters copy = *parameters;
EXPECT_THAT(copy.GetHashType(), Eq(SlhDsaParameters::HashType::kSha2));
EXPECT_THAT(copy.GetPrivateKeySizeInBytes(), Eq(64));
EXPECT_THAT(copy.GetSignatureType(),
Eq(SlhDsaParameters::SignatureType::kSmallSignature));
EXPECT_THAT(copy.GetVariant(), Eq(SlhDsaParameters::Variant::kTink));
EXPECT_THAT(copy.HasIdRequirement(), IsTrue());
}
TEST_P(SlhDsaParametersTest, ParametersEquals) {
VariantTestCase test_case = GetParam();
util::StatusOr<SlhDsaParameters> parameters = SlhDsaParameters::Create(
SlhDsaParameters::HashType::kSha2, /*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature, test_case.variant);
ASSERT_THAT(parameters, IsOk());
util::StatusOr<SlhDsaParameters> other_parameters = SlhDsaParameters::Create(
SlhDsaParameters::HashType::kSha2, /*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature, test_case.variant);
ASSERT_THAT(other_parameters, IsOk());
EXPECT_TRUE(*parameters == *other_parameters);
EXPECT_TRUE(*other_parameters == *parameters);
EXPECT_FALSE(*parameters != *other_parameters);
EXPECT_FALSE(*other_parameters != *parameters);
}
TEST(SlhDsaParametersTest, DifferentVariantNotEqual) {
util::StatusOr<SlhDsaParameters> parameters = SlhDsaParameters::Create(
SlhDsaParameters::HashType::kSha2, /*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::kNoPrefix);
util::StatusOr<SlhDsaParameters> other_parameters =
SlhDsaParameters::Create(SlhDsaParameters::HashType::kSha2,
/*private_key_size_in_bytes=*/64,
SlhDsaParameters::SignatureType::kSmallSignature,
SlhDsaParameters::Variant::kTink);
EXPECT_TRUE(*parameters != *other_parameters);
EXPECT_FALSE(*parameters == *other_parameters);
}
} // namespace
} // namespace tink
} // namespace crypto