blob: d5382173b166dd197a28154406e8e7ffb5104284 [file] [log] [blame]
/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
/*
* Copyright (c) 2013-2023 Regents of the University of California.
*
* This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
*
* ndn-cxx library is free software: you can redistribute it and/or modify it under the
* terms of the GNU Lesser General Public License as published by the Free Software
* Foundation, either version 3 of the License, or (at your option) any later version.
*
* ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
* PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
*
* You should have received copies of the GNU General Public License and GNU Lesser
* General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
* <http://www.gnu.org/licenses/>.
*
* See AUTHORS.md for complete list of ndn-cxx authors and contributors.
*/
#include "ndn-cxx/signature-info.hpp"
#include "tests/boost-test.hpp"
#include <boost/lexical_cast.hpp>
namespace ndn {
namespace tests {
BOOST_CONCEPT_ASSERT((boost::EqualityComparable<SignatureInfo>));
BOOST_CONCEPT_ASSERT((WireEncodable<SignatureInfo>));
BOOST_CONCEPT_ASSERT((WireEncodableWithEncodingBuffer<SignatureInfo>));
BOOST_CONCEPT_ASSERT((WireDecodable<SignatureInfo>));
static_assert(std::is_convertible_v<SignatureInfo::Error*, tlv::Error*>,
"SignatureInfo::Error must inherit from tlv::Error");
BOOST_AUTO_TEST_SUITE(TestSignatureInfo)
BOOST_AUTO_TEST_CASE(Constructor)
{
SignatureInfo info;
BOOST_CHECK_EQUAL(info.getSignatureType(), -1);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), false);
BOOST_CHECK_THROW(info.getKeyLocator(), SignatureInfo::Error);
BOOST_CHECK_THROW(info.getValidityPeriod(), SignatureInfo::Error);
BOOST_CHECK(!info.getNonce());
BOOST_CHECK(!info.getTime());
BOOST_CHECK(!info.getSeqNum());
SignatureInfo sha256Info(tlv::DigestSha256);
BOOST_CHECK_EQUAL(sha256Info.getSignatureType(), tlv::DigestSha256);
BOOST_CHECK_THROW(sha256Info.getKeyLocator(), SignatureInfo::Error);
BOOST_CHECK(!info.getNonce());
BOOST_CHECK(!info.getTime());
BOOST_CHECK(!info.getSeqNum());
KeyLocator keyLocator("/test/key/locator");
SignatureInfo sha256RsaInfo(tlv::SignatureSha256WithRsa, keyLocator);
BOOST_CHECK_EQUAL(sha256RsaInfo.getSignatureType(), tlv::SignatureSha256WithRsa);
BOOST_CHECK_EQUAL(sha256RsaInfo.hasKeyLocator(), true);
BOOST_CHECK_EQUAL(sha256RsaInfo.getKeyLocator().getName(), Name("/test/key/locator"));
BOOST_CHECK_THROW(sha256RsaInfo.getValidityPeriod(), SignatureInfo::Error);
BOOST_CHECK(!info.getNonce());
BOOST_CHECK(!info.getTime());
BOOST_CHECK(!info.getSeqNum());
}
BOOST_AUTO_TEST_CASE(SignatureType)
{
SignatureInfo info;
BOOST_CHECK_EQUAL(info.getSignatureType(), -1);
BOOST_CHECK_THROW(info.wireEncode(), SignatureInfo::Error);
info.setSignatureType(tlv::SignatureSha256WithEcdsa);
BOOST_CHECK_EQUAL(info.getSignatureType(), tlv::SignatureSha256WithEcdsa);
BOOST_CHECK_EQUAL(info.hasWire(), false);
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setSignatureType(tlv::SignatureSha256WithEcdsa);
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setSignatureType(static_cast<tlv::SignatureTypeValue>(1234));
BOOST_CHECK_EQUAL(info.getSignatureType(), 1234);
BOOST_CHECK_EQUAL(info.hasWire(), false);
}
// We must name this test case differently to avoid naming conflicts
BOOST_AUTO_TEST_CASE(KeyLocatorField)
{
SignatureInfo info(tlv::SignatureSha256WithEcdsa);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), false);
BOOST_CHECK_THROW(info.getKeyLocator(), SignatureInfo::Error);
info.setKeyLocator(Name("/test/key/locator"));
BOOST_CHECK_EQUAL(info.hasKeyLocator(), true);
BOOST_CHECK_EQUAL(info.getKeyLocator().getName(), "/test/key/locator");
BOOST_CHECK_EQUAL(info.hasWire(), false);
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setKeyLocator(Name("/test/key/locator"));
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setKeyLocator(Name("/another/key/locator"));
BOOST_CHECK_EQUAL(info.hasWire(), false);
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setKeyLocator(std::nullopt);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), false);
BOOST_CHECK_THROW(info.getKeyLocator(), SignatureInfo::Error);
BOOST_CHECK_EQUAL(info.hasWire(), false);
}
BOOST_AUTO_TEST_CASE(SignatureNonce)
{
SignatureInfo info(tlv::SignatureSha256WithEcdsa);
BOOST_CHECK(!info.getNonce());
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
std::vector<uint8_t> nonce{0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08};
info.setNonce(nonce);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(info.getNonce() == nonce);
info.wireEncode();
info.setNonce(nonce);
BOOST_CHECK_EQUAL(info.hasWire(), true);
nonce[2] = 0xFF;
info.setNonce(nonce);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(info.getNonce() == nonce);
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setNonce(std::nullopt);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(!info.getNonce());
}
BOOST_AUTO_TEST_CASE(SignatureTime)
{
SignatureInfo info(tlv::SignatureSha256WithEcdsa);
BOOST_CHECK(!info.getTime());
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
time::system_clock::time_point timePoint(1590169108480_ms);
info.setTime(timePoint);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(info.getTime() == timePoint);
info.wireEncode();
info.setTime(timePoint);
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setTime(timePoint + 2_s);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(info.getTime() == timePoint + 2_s);
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setTime(std::nullopt);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(!info.getTime());
}
BOOST_AUTO_TEST_CASE(SignatureSeqNum)
{
SignatureInfo info(tlv::SignatureSha256WithEcdsa);
BOOST_CHECK(!info.getSeqNum());
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setSeqNum(256);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(info.getSeqNum() == 256UL);
info.wireEncode();
info.setSeqNum(256);
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setSeqNum(512);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(info.getSeqNum() == 512UL);
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.setSeqNum(std::nullopt);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(!info.getSeqNum());
}
const uint8_t sigInfoDataRsa[] = {
0x16, 0x1b, // SignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72,
};
const uint8_t sigInfoInterestRsa[] = {
0x2c, 0x33, // InterestSignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72,
0x26, 0x08, // SignatureNonce
0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
0x28, 0x08, // SignatureTime
0x00, 0x00, 0x01, 0x72, 0x3d, 0x77, 0x00, 0x00,
0x2a, 0x02, // SignatureSeqNum
0x10, 0x20,
};
const uint8_t sigInfoDataEcdsa[] = {
0x16, 0x1b, // SignatureInfo
0x1b, 0x01, // SignatureType
0x03, // Sha256WithEcdsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72,
};
BOOST_AUTO_TEST_CASE(EncodeDecode)
{
const KeyLocator keyLocator("/test/key/locator");
// RSA
SignatureInfo info(tlv::SignatureSha256WithRsa, keyLocator);
// Encode as (Data)SignatureInfo
auto encodedData = info.wireEncode(SignatureInfo::Type::Data);
BOOST_CHECK_EQUAL_COLLECTIONS(sigInfoDataRsa, sigInfoDataRsa + sizeof(sigInfoDataRsa),
encodedData.begin(), encodedData.end());
// Decode as (Data)SignatureInfo
info = SignatureInfo(Block(sigInfoDataRsa), SignatureInfo::Type::Data);
BOOST_CHECK_EQUAL(info.getSignatureType(), tlv::SignatureSha256WithRsa);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), true);
BOOST_CHECK_EQUAL(info.getKeyLocator().getName(), Name("/test/key/locator"));
BOOST_CHECK(!info.getNonce());
BOOST_CHECK(!info.getTime());
BOOST_CHECK(!info.getSeqNum());
// Encode as InterestSignatureInfo
const std::vector<uint8_t> nonce{0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08};
info.setNonce(nonce);
const time::system_clock::time_point timePoint(1590169108480_ms);
info.setTime(timePoint);
info.setSeqNum(0x1020);
auto encodedInterest = info.wireEncode(SignatureInfo::Type::Interest);
BOOST_CHECK_EQUAL_COLLECTIONS(sigInfoInterestRsa, sigInfoInterestRsa + sizeof(sigInfoInterestRsa),
encodedInterest.begin(), encodedInterest.end());
// Decode as InterestSignatureInfo
info = SignatureInfo(Block(sigInfoInterestRsa), SignatureInfo::Type::Interest);
BOOST_CHECK_EQUAL(info.getSignatureType(), tlv::SignatureSha256WithRsa);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), true);
BOOST_CHECK_EQUAL(info.getKeyLocator().getName(), Name("/test/key/locator"));
BOOST_CHECK(info.getNonce() == nonce);
BOOST_CHECK(info.getTime() == timePoint);
BOOST_CHECK(info.getSeqNum() == 0x1020UL);
// ECDSA
info = SignatureInfo(tlv::SignatureSha256WithEcdsa, keyLocator);
// Encode as (Data)SignatureInfo
auto encodedDataEcdsa = info.wireEncode(SignatureInfo::Type::Data);
BOOST_CHECK_EQUAL_COLLECTIONS(sigInfoDataEcdsa, sigInfoDataEcdsa + sizeof(sigInfoDataEcdsa),
encodedDataEcdsa.begin(), encodedDataEcdsa.end());
// Decode as (Data)SignatureInfo
info = SignatureInfo(Block(sigInfoDataEcdsa), SignatureInfo::Type::Data);
BOOST_CHECK_EQUAL(info.getSignatureType(), tlv::SignatureSha256WithEcdsa);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), true);
BOOST_CHECK_EQUAL(info.getKeyLocator().getName(), Name("/test/key/locator"));
BOOST_CHECK(!info.getNonce());
BOOST_CHECK(!info.getTime());
BOOST_CHECK(!info.getSeqNum());
}
BOOST_AUTO_TEST_CASE(DecodeError)
{
const uint8_t error1[] = {
0x15, 0x1b, // Wrong SignatureInfo (0x16, 0x1b)
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
};
Block errorBlock1(error1);
BOOST_CHECK_THROW(SignatureInfo(errorBlock1, SignatureInfo::Type::Data), tlv::Error);
const uint8_t error2[] = {
0x16, 0x05, // SignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x83, 0x00, // Unrecognized critical TLV
};
Block errorBlock2(error2);
BOOST_CHECK_THROW(SignatureInfo(errorBlock2, SignatureInfo::Type::Data), tlv::Error);
const uint8_t error3[] = {
0x16, 0x00 // Empty SignatureInfo
};
Block errorBlock3(error3);
BOOST_CHECK_THROW(SignatureInfo(errorBlock3, SignatureInfo::Type::Data), tlv::Error);
// Encoding is correct for SignatureInfo, but decoder is expecting InterestSignatureInfo
const uint8_t error4[] = {
0x16, 0x1b, // SignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
};
Block errorBlock4(error4);
BOOST_CHECK_THROW(SignatureInfo(errorBlock4, SignatureInfo::Type::Interest), tlv::Error);
// SignatureType and KeyLocator out-of-order
const uint8_t error5[] = {
0x2c, 0x1b, // SignatureInfo
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72,
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
};
Block errorBlock5(error5);
BOOST_CHECK_THROW(SignatureInfo(errorBlock5, SignatureInfo::Type::Interest), tlv::Error);
// Repeated KeyLocator
const uint8_t error6[] = {
0x2c, 0x33, // SignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72,
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
};
Block errorBlock6(error6);
BOOST_CHECK_THROW(SignatureInfo(errorBlock6, SignatureInfo::Type::Interest), tlv::Error);
// Zero-length SignatureNonce
const uint8_t error7[] = {
0x2c, 0x05, // SignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x26, 0x00 // SignatureNonce
};
Block errorBlock7(error7);
BOOST_CHECK_THROW(SignatureInfo(errorBlock7, SignatureInfo::Type::Interest), tlv::Error);
}
BOOST_AUTO_TEST_CASE(ValidityPeriod)
{
const uint8_t sigInfo[] = {
0x16, 0x45, // SignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72,
0xfd, 0x00, 0xfd, 0x26, // ValidityPeriod
0xfd, 0x00, 0xfe, 0x0f, // NotBefore
0x31, 0x39, 0x37, 0x30, 0x30, 0x31, 0x30, 0x31, // 19700101T000000
0x54, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30,
0xfd, 0x00, 0xff, 0x0f, // NotAfter
0x31, 0x39, 0x37, 0x30, 0x30, 0x31, 0x30, 0x32, // 19700102T000000
0x54, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30
};
const auto notBefore = time::getUnixEpoch();
const auto notAfter = notBefore + 1_day;
security::ValidityPeriod vp1(notBefore, notAfter);
SignatureInfo info(tlv::SignatureSha256WithRsa, KeyLocator("/test/key/locator"));
BOOST_CHECK_THROW(info.getValidityPeriod(), SignatureInfo::Error);
info.wireEncode();
info.setValidityPeriod(vp1);
BOOST_CHECK_EQUAL(info.getValidityPeriod(), vp1);
BOOST_CHECK_EQUAL(info.hasWire(), false);
// encode
auto encoded = info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
BOOST_TEST(encoded == sigInfo, boost::test_tools::per_element());
info.setValidityPeriod(vp1);
BOOST_CHECK_EQUAL(info.hasWire(), true);
// decode
Block block(sigInfo);
SignatureInfo info2(block, SignatureInfo::Type::Data);
BOOST_CHECK_EQUAL(info2.getValidityPeriod(), vp1);
BOOST_CHECK_EQUAL(info2.hasWire(), true);
info2.setValidityPeriod(security::ValidityPeriod(notBefore, notBefore + 42_days));
BOOST_CHECK_NE(info2.getValidityPeriod(), vp1);
BOOST_CHECK(info2.getValidityPeriod().getPeriod() == std::pair(notBefore, notBefore + 42_days));
BOOST_CHECK_EQUAL(info2.hasWire(), false);
info2.wireEncode();
BOOST_CHECK_EQUAL(info2.hasWire(), true);
info2.setValidityPeriod(std::nullopt);
BOOST_CHECK_THROW(info2.getValidityPeriod(), SignatureInfo::Error);
BOOST_CHECK_EQUAL(info2.hasWire(), false);
}
BOOST_AUTO_TEST_CASE(CustomTlvs)
{
SignatureInfo info(tlv::SignatureSha256WithEcdsa);
info.addCustomTlv("810101"_block);
BOOST_CHECK(!info.getCustomTlv(0x82));
BOOST_REQUIRE(info.getCustomTlv(0x81));
BOOST_CHECK_EQUAL(info.getCustomTlv(0x81)->type(), 0x81);
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.addCustomTlv("82020202"_block);
BOOST_CHECK_EQUAL(info.hasWire(), false);
info.wireEncode();
BOOST_CHECK_EQUAL(info.hasWire(), true);
info.removeCustomTlv(0x81);
BOOST_CHECK_EQUAL(info.hasWire(), false);
BOOST_CHECK(!info.getCustomTlv(0x81));
}
BOOST_AUTO_TEST_CASE(CustomTlvsEncoding) // Bug #3914
{
SignatureInfo info1(tlv::SignatureSha256WithRsa);
info1.addCustomTlv(makeStringBlock(102, "First"));
info1.addCustomTlv(makeStringBlock(104, "Second"));
info1.addCustomTlv(makeStringBlock(106, "Third"));
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info1),
"SignatureSha256WithRsa { 102 104 106 }");
SignatureInfo info2;
info2.wireDecode(info1.wireEncode(), SignatureInfo::Type::Data);
BOOST_CHECK_EQUAL(info1, info2);
const uint8_t infoBytes[] = {
0x16, 0x19, // SignatureInfo
0x1b, 0x01, 0x01, // SignatureType=1
0x66, 0x05, 0x46, 0x69, 0x72, 0x73, 0x74, // 102 "First"
0x68, 0x06, 0x53, 0x65, 0x63, 0x6f, 0x6e, 0x64, // 104 "Second"
0x6a, 0x05, 0x54, 0x68, 0x69, 0x72, 0x64 // 106 "Third"
};
SignatureInfo info3(Block(infoBytes), SignatureInfo::Type::Data);
BOOST_CHECK_EQUAL(info3, info1);
BOOST_CHECK_EQUAL_COLLECTIONS(infoBytes, infoBytes + sizeof(infoBytes),
info1.wireEncode().begin(), info1.wireEncode().end());
}
BOOST_AUTO_TEST_CASE(OutputStream)
{
SignatureInfo info;
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info), "Invalid SignatureInfo");
info.setSignatureType(tlv::DigestSha256);
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info), "DigestSha256");
info.setSignatureType(tlv::SignatureSha256WithRsa);
info.setKeyLocator(KeyLocator("/test/key/locator"));
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info),
"SignatureSha256WithRsa Name=/test/key/locator");
info.setNonce(std::vector<uint8_t>{0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08});
info.setTime(time::system_clock::time_point(1590169108480_ms));
info.setSeqNum(0x1020);
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info),
"SignatureSha256WithRsa Name=/test/key/locator "
"{ Nonce=0102030405060708 Time=1590169108480 SeqNum=4128 }");
info.setValidityPeriod(security::ValidityPeriod(time::getUnixEpoch(), time::getUnixEpoch() + 31_days));
info.addCustomTlv("82020102"_block);
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info),
"SignatureSha256WithRsa Name=/test/key/locator "
"{ Nonce=0102030405060708 Time=1590169108480 SeqNum=4128 "
"ValidityPeriod=(19700101T000000, 19700201T000000) 130 }");
info.addCustomTlv("84020102"_block);
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info),
"SignatureSha256WithRsa Name=/test/key/locator "
"{ Nonce=0102030405060708 Time=1590169108480 SeqNum=4128 "
"ValidityPeriod=(19700101T000000, 19700201T000000) 130 132 }");
}
BOOST_AUTO_TEST_SUITE_END() // TestSignatureInfo
} // namespace tests
} // namespace ndn