xref: /aosp_15_r20/external/tink/cc/experimental/pqcrypto/signature/signature_config_test.cc (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1 // Copyright 2021 Google LLC
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 //     http://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14 //
15 ///////////////////////////////////////////////////////////////////////////////
16 
17 #include "tink/experimental/pqcrypto/signature/signature_config.h"
18 
19 #include "gmock/gmock.h"
20 #include "gtest/gtest.h"
21 #include "absl/status/status.h"
22 #include "tink/experimental/pqcrypto/signature/dilithium_sign_key_manager.h"
23 #include "tink/experimental/pqcrypto/signature/dilithium_verify_key_manager.h"
24 #include "tink/experimental/pqcrypto/signature/falcon_sign_key_manager.h"
25 #include "tink/experimental/pqcrypto/signature/falcon_verify_key_manager.h"
26 #include "tink/experimental/pqcrypto/signature/sphincs_sign_key_manager.h"
27 #include "tink/experimental/pqcrypto/signature/sphincs_verify_key_manager.h"
28 #include "tink/internal/fips_utils.h"
29 #include "tink/public_key_sign.h"
30 #include "tink/public_key_verify.h"
31 #include "tink/registry.h"
32 #include "tink/util/status.h"
33 #include "tink/util/test_matchers.h"
34 
35 namespace crypto {
36 namespace tink {
37 namespace {
38 
39 using ::crypto::tink::test::IsOk;
40 using ::crypto::tink::test::StatusIs;
41 
42 class PcqSignatureConfigTest : public ::testing::Test {
43  protected:
SetUp()44   void SetUp() override { Registry::Reset(); }
45 };
46 
TEST_F(PcqSignatureConfigTest,CheckDilithium)47 TEST_F(PcqSignatureConfigTest, CheckDilithium) {
48   if (internal::IsFipsModeEnabled() && !internal::IsFipsEnabledInSsl()) {
49     GTEST_SKIP() << "Not supported if FIPS-mode is used";
50   }
51 
52   EXPECT_THAT(Registry::get_key_manager<PublicKeySign>(
53                   DilithiumSignKeyManager().get_key_type())
54                   .status(),
55               StatusIs(absl::StatusCode::kNotFound));
56   EXPECT_THAT(Registry::get_key_manager<PublicKeyVerify>(
57                   DilithiumVerifyKeyManager().get_key_type())
58                   .status(),
59               StatusIs(absl::StatusCode::kNotFound));
60   EXPECT_THAT(PqSignatureConfigRegister(), IsOk());
61   EXPECT_THAT(Registry::get_key_manager<PublicKeySign>(
62                   DilithiumSignKeyManager().get_key_type())
63                   .status(),
64               IsOk());
65   EXPECT_THAT(Registry::get_key_manager<PublicKeyVerify>(
66                   DilithiumVerifyKeyManager().get_key_type())
67                   .status(),
68               IsOk());
69 }
70 
TEST_F(PcqSignatureConfigTest,CheckSphincs)71 TEST_F(PcqSignatureConfigTest, CheckSphincs) {
72   if (internal::IsFipsModeEnabled() && !internal::IsFipsEnabledInSsl()) {
73     GTEST_SKIP() << "Not supported if FIPS-mode is used";
74   }
75 
76   EXPECT_THAT(Registry::get_key_manager<PublicKeySign>(
77                   SphincsSignKeyManager().get_key_type())
78                   .status(),
79               StatusIs(absl::StatusCode::kNotFound));
80   EXPECT_THAT(Registry::get_key_manager<PublicKeyVerify>(
81                   SphincsVerifyKeyManager().get_key_type())
82                   .status(),
83               StatusIs(absl::StatusCode::kNotFound));
84   EXPECT_THAT(PqSignatureConfigRegister(), IsOk());
85   EXPECT_THAT(Registry::get_key_manager<PublicKeySign>(
86                   SphincsSignKeyManager().get_key_type())
87                   .status(),
88               IsOk());
89   EXPECT_THAT(Registry::get_key_manager<PublicKeyVerify>(
90                   SphincsVerifyKeyManager().get_key_type())
91                   .status(),
92               IsOk());
93 }
94 
TEST_F(PcqSignatureConfigTest,CheckFalcon)95 TEST_F(PcqSignatureConfigTest, CheckFalcon) {
96   if (internal::IsFipsModeEnabled() && !internal::IsFipsEnabledInSsl()) {
97     GTEST_SKIP() << "Not supported if FIPS-mode is used";
98   }
99 
100   EXPECT_THAT(Registry::get_key_manager<PublicKeySign>(
101                   FalconSignKeyManager().get_key_type())
102                   .status(),
103               StatusIs(absl::StatusCode::kNotFound));
104   EXPECT_THAT(Registry::get_key_manager<PublicKeyVerify>(
105                   FalconVerifyKeyManager().get_key_type())
106                   .status(),
107               StatusIs(absl::StatusCode::kNotFound));
108   EXPECT_THAT(PqSignatureConfigRegister(), IsOk());
109   EXPECT_THAT(Registry::get_key_manager<PublicKeySign>(
110                   FalconSignKeyManager().get_key_type())
111                   .status(),
112               IsOk());
113   EXPECT_THAT(Registry::get_key_manager<PublicKeyVerify>(
114                   FalconVerifyKeyManager().get_key_type())
115                   .status(),
116               IsOk());
117 }
118 
119 }  // namespace
120 }  // namespace tink
121 }  // namespace crypto
122