| // Copyright 2018 Google LLC |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package signature_test |
| |
| import ( |
| "fmt" |
| "testing" |
| |
| "github.com/google/tink/go/keyset" |
| "github.com/google/tink/go/signature" |
| tinkpb "github.com/google/tink/go/proto/tink_go_proto" |
| ) |
| |
| func TestKeyTemplates(t *testing.T) { |
| var testCases = []struct { |
| name string |
| template *tinkpb.KeyTemplate |
| }{ |
| {name: "ECDSA_P256", |
| template: signature.ECDSAP256KeyTemplate()}, |
| {name: "ECDSA_P384_SHA384", |
| template: signature.ECDSAP384SHA384KeyTemplate()}, |
| {name: "ECDSA_P384_SHA512", |
| template: signature.ECDSAP384SHA512KeyTemplate()}, |
| {name: "ECDSA_P521", |
| template: signature.ECDSAP521KeyTemplate()}, |
| {name: "ECDSA_P256_RAW", |
| template: signature.ECDSAP256RawKeyTemplate()}, |
| {name: "ECDSA_P256_NO_PREFIX", |
| template: signature.ECDSAP256KeyWithoutPrefixTemplate()}, |
| {name: "ECDSA_P384_NO_PREFIX", |
| template: signature.ECDSAP384KeyWithoutPrefixTemplate()}, |
| {name: "ECDSA_P384_SHA384_NO_PREFIX", |
| template: signature.ECDSAP384SHA384KeyWithoutPrefixTemplate()}, |
| {name: "ECDSA_P521_NO_PREFIX", |
| template: signature.ECDSAP521KeyWithoutPrefixTemplate()}, |
| {name: "RSA_SSA_PKCS1_3072_SHA256_F4", |
| template: signature.RSA_SSA_PKCS1_3072_SHA256_F4_Key_Template()}, |
| {name: "RSA_SSA_PKCS1_3072_SHA256_F4_RAW", |
| template: signature.RSA_SSA_PKCS1_3072_SHA256_F4_RAW_Key_Template()}, |
| {name: "RSA_SSA_PKCS1_4096_SHA512_F4", |
| template: signature.RSA_SSA_PKCS1_4096_SHA512_F4_Key_Template()}, |
| {name: "RSA_SSA_PKCS1_4096_SHA512_F4_RAW", |
| template: signature.RSA_SSA_PKCS1_4096_SHA512_F4_RAW_Key_Template()}, |
| {name: "RSA_SSA_PSS_3072_SHA256_32_F4", |
| template: signature.RSA_SSA_PSS_3072_SHA256_32_F4_Key_Template()}, |
| {name: "RSA_SSA_PSS_3072_SHA256_32_F4_RAW", |
| template: signature.RSA_SSA_PSS_3072_SHA256_32_F4_Raw_Key_Template()}, |
| {name: "RSA_SSA_PSS_4096_SHA512_64_F4", |
| template: signature.RSA_SSA_PSS_4096_SHA512_64_F4_Key_Template()}, |
| {name: "RSA_SSA_PSS_4096_SHA512_64_F4_RAW", |
| template: signature.RSA_SSA_PSS_4096_SHA512_64_F4_Raw_Key_Template()}, |
| } |
| for _, tc := range testCases { |
| t.Run(tc.name, func(t *testing.T) { |
| if err := testSignVerify(tc.template); err != nil { |
| t.Error(err) |
| } |
| }) |
| } |
| } |
| |
| func testSignVerify(template *tinkpb.KeyTemplate) error { |
| privateHandle, err := keyset.NewHandle(template) |
| if err != nil { |
| return fmt.Errorf("keyset.NewHandle(tc.template) failed: %s", err) |
| } |
| signer, err := signature.NewSigner(privateHandle) |
| if err != nil { |
| return fmt.Errorf("signature.NewSigner(privateHandle) failed: %s", err) |
| } |
| publicHandle, err := privateHandle.Public() |
| if err != nil { |
| return fmt.Errorf("privateHandle.Public() failed: %s", err) |
| } |
| verifier, err := signature.NewVerifier(publicHandle) |
| if err != nil { |
| return fmt.Errorf("signature.NewVerifier(publicHandle) failed: %s", err) |
| } |
| |
| var testInputs = []struct { |
| message1 []byte |
| message2 []byte |
| }{ |
| { |
| message1: []byte("this data needs to be signed"), |
| message2: []byte("this data needs to be signed"), |
| }, { |
| message1: []byte(""), |
| message2: []byte(""), |
| }, { |
| message1: []byte(""), |
| message2: nil, |
| }, { |
| message1: nil, |
| message2: []byte(""), |
| }, { |
| message1: nil, |
| message2: nil, |
| }, |
| } |
| for _, ti := range testInputs { |
| sig, err := signer.Sign(ti.message1) |
| if err != nil { |
| return fmt.Errorf("signer.Sign(ti.message1) failed: %s", err) |
| } |
| if err := verifier.Verify(sig, ti.message2); err != nil { |
| return fmt.Errorf("verifier.Verify(sig, ti.message2) failed: %s", err) |
| } |
| } |
| return nil |
| } |