| /** |
| * Copyright (C) 2013 Regents of the University of California. |
| * @author: Yingdi Yu <yingdi0@cs.ucla.edu> |
| * See COPYING for copyright and distribution information. |
| */ |
| |
| #include <boost/test/unit_test.hpp> |
| |
| #include "security/key-chain.hpp" |
| #include "security/validator.hpp" |
| |
| #include "util/command-interest-generator.hpp" |
| #include "util/command-interest-validator.hpp" |
| |
| using namespace std; |
| namespace ndn { |
| |
| BOOST_AUTO_TEST_SUITE(TestSignedInterest) |
| |
| BOOST_AUTO_TEST_CASE (SignedInterest) |
| { |
| KeyChainImpl<SecPublicInfoSqlite3, SecTpmFile> keyChain; |
| |
| Name identityName("/TestSignedInterest/SignVerify"); |
| identityName.appendVersion(); |
| |
| Name certificateName; |
| BOOST_REQUIRE_NO_THROW(certificateName = keyChain.createIdentity(identityName)); |
| |
| Interest interest("/TestSignedInterest/SignVerify/Interest1"); |
| BOOST_CHECK_NO_THROW(keyChain.signByIdentity(interest, identityName)); |
| |
| Block interestBlock(interest.wireEncode().wire(), interest.wireEncode().size()); |
| |
| Interest interest2; |
| interest2.wireDecode(interestBlock); |
| |
| shared_ptr<PublicKey> publicKey; |
| BOOST_REQUIRE_NO_THROW(publicKey = keyChain.getPublicKeyFromTpm(keyChain.getDefaultKeyNameForIdentity(identityName))); |
| bool result = Validator::verifySignature(interest2, *publicKey); |
| |
| BOOST_CHECK_EQUAL(result, true); |
| |
| keyChain.deleteIdentity(identityName); |
| } |
| |
| class CommandInterestFixture |
| { |
| public: |
| CommandInterestFixture() |
| : m_validity(false) |
| {} |
| |
| void |
| validated(const shared_ptr<const Interest>& interest) |
| { m_validity = true; } |
| |
| void |
| validationFailed(const shared_ptr<const Interest>& interest, const string& failureInfo) |
| { |
| m_validity = false; |
| } |
| |
| void |
| reset() |
| { m_validity = false; } |
| |
| bool m_validity; |
| }; |
| |
| BOOST_FIXTURE_TEST_CASE (CommandInterest, CommandInterestFixture) |
| { |
| KeyChain keyChain; |
| Name identity("/TestCommandInterest/Validation"); |
| identity.appendVersion(); |
| |
| Name certName; |
| BOOST_REQUIRE_NO_THROW(certName = keyChain.createIdentity(identity)); |
| |
| CommandInterestGenerator generator; |
| CommandInterestValidator validator; |
| |
| validator.addInterestRule("^<TestCommandInterest><Validation>", *keyChain.getCertificate(certName)); |
| |
| //Test a legitimate command |
| shared_ptr<Interest> commandInterest1 = make_shared<Interest>("/TestCommandInterest/Validation/Command1"); |
| generator.generateWithIdentity(*commandInterest1, identity); |
| validator.validate(*commandInterest1, |
| bind(&CommandInterestFixture::validated, this, _1), |
| bind(&CommandInterestFixture::validationFailed, this, _1, _2)); |
| |
| BOOST_CHECK_EQUAL(m_validity, true); |
| |
| //Test an outdated command |
| reset(); |
| shared_ptr<Interest> commandInterest2 = make_shared<Interest>("/TestCommandInterest/Validation/Command2"); |
| time::milliseconds timestamp = time::toUnixTimestamp(time::system_clock::now()); |
| timestamp -= time::seconds(5); |
| |
| Name commandName = commandInterest2->getName(); |
| commandName |
| .appendNumber(timestamp.count()) |
| .appendNumber(random::generateWord64()); |
| commandInterest2->setName(commandName); |
| |
| keyChain.signByIdentity(*commandInterest2, identity); |
| validator.validate(*commandInterest2, |
| bind(&CommandInterestFixture::validated, this, _1), |
| bind(&CommandInterestFixture::validationFailed, this, _1, _2)); |
| |
| BOOST_CHECK_EQUAL(m_validity, false); |
| |
| //Test an unauthorized command |
| Name identity2("/TestCommandInterest/Validation2"); |
| Name certName2; |
| BOOST_REQUIRE_NO_THROW(certName2 = keyChain.createIdentity(identity2)); |
| |
| shared_ptr<Interest> commandInterest3 = make_shared<Interest>("/TestCommandInterest/Validation/Command3"); |
| generator.generateWithIdentity(*commandInterest3, identity2); |
| validator.validate(*commandInterest3, |
| bind(&CommandInterestFixture::validated, this, _1), |
| bind(&CommandInterestFixture::validationFailed, this, _1, _2)); |
| |
| BOOST_CHECK_EQUAL(m_validity, false); |
| |
| //Test another unauthorized command |
| shared_ptr<Interest> commandInterest4 = make_shared<Interest>("/TestCommandInterest/Validation2/Command"); |
| generator.generateWithIdentity(*commandInterest4, identity); |
| validator.validate(*commandInterest4, |
| bind(&CommandInterestFixture::validated, this, _1), |
| bind(&CommandInterestFixture::validationFailed, this, _1, _2)); |
| |
| BOOST_CHECK_EQUAL(m_validity, false); |
| |
| BOOST_CHECK_NO_THROW(keyChain.deleteIdentity(identity)); |
| BOOST_CHECK_NO_THROW(keyChain.deleteIdentity(identity2)); |
| } |
| |
| |
| BOOST_AUTO_TEST_SUITE_END() |
| |
| } // namespace ndn |