blob: 34f2e5658e37110fc1b7282cfd8788950d29c638 [file] [log] [blame]
# Copyright 2019 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Tests for tink.python.public_key_sign_wrapper."""
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
from absl.testing import absltest
from absl.testing import parameterized
from tink.proto import tink_pb2
from tink.python.core import primitive_set
from tink.python.core import tink_error
from tink.python.signature import public_key_sign
from tink.python.signature import public_key_sign_wrapper
from tink.python.signature import public_key_verify
from tink.python.signature import public_key_verify_wrapper
from tink.python.testing import helper
def new_primitive_key_pair(key_id, output_prefix_type):
fake_key = helper.fake_key(
key_id=key_id,
key_material_type=tink_pb2.KeyData.ASYMMETRIC_PRIVATE,
output_prefix_type=output_prefix_type)
fake_sign = helper.FakePublicKeySign('fakePublicKeySign {}'.format(key_id))
return fake_sign, fake_key,
def to_verify_key_pair(key):
fake_verify = helper.FakePublicKeyVerify('fakePublicKeySign {}'.format(
key.key_id))
return fake_verify, key,
class PublicKeySignWrapperTest(parameterized.TestCase):
@parameterized.named_parameters(('tink', tink_pb2.TINK),
('legacy', tink_pb2.LEGACY))
def test_signature(self, output_prefix_type):
pair0 = new_primitive_key_pair(1234, output_prefix_type)
pair1 = new_primitive_key_pair(5678, output_prefix_type)
pset = primitive_set.new_primitive_set(public_key_sign.PublicKeySign)
pset_verify = primitive_set.new_primitive_set(
public_key_verify.PublicKeyVerify)
pset.add_primitive(*pair0)
pset.set_primary(pset.add_primitive(*pair1))
pset_verify.add_primitive(*to_verify_key_pair(pair0[1]))
entry = pset_verify.add_primitive(*to_verify_key_pair(pair1[1]))
pset_verify.set_primary(entry)
wrapped_pk_sign = public_key_sign_wrapper.PublicKeySignWrapper().wrap(pset)
wrapped_pk_verify = public_key_verify_wrapper.PublicKeyVerifyWrapper().wrap(
pset_verify)
signature = wrapped_pk_sign.sign(b'data')
wrapped_pk_verify.verify(signature, b'data')
with self.assertRaisesRegex(tink_error.TinkError, 'invalid signature'):
wrapped_pk_verify.verify(signature, b'invalid')
if __name__ == '__main__':
absltest.main()