blob: 2702282240675ccb09631555eaff7ec1b38c5c38 [file] [log] [blame]
/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
/*
* Copyright (c) 2013-2018 Regents of the University of California.
*
* This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
*
* ndn-cxx library is free software: you can redistribute it and/or modify it under the
* terms of the GNU Lesser General Public License as published by the Free Software
* Foundation, either version 3 of the License, or (at your option) any later version.
*
* ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
* PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
*
* You should have received copies of the GNU General Public License and GNU Lesser
* General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
* <http://www.gnu.org/licenses/>.
*
* See AUTHORS.md for complete list of ndn-cxx authors and contributors.
*/
#include "ndn-cxx/signature-info.hpp"
#include "tests/boost-test.hpp"
#include <boost/lexical_cast.hpp>
namespace ndn {
namespace tests {
BOOST_AUTO_TEST_SUITE(TestSignatureInfo)
const uint8_t sigInfoRsa[] = {
0x16, 0x1b, // SignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
};
BOOST_AUTO_TEST_CASE(Constructor)
{
SignatureInfo info;
BOOST_CHECK_EQUAL(info.getSignatureType(), -1);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), false);
BOOST_CHECK_THROW(info.getKeyLocator(), SignatureInfo::Error);
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info), "Invalid SignatureInfo");
SignatureInfo sha256Info(tlv::DigestSha256);
BOOST_CHECK_EQUAL(sha256Info.getSignatureType(), tlv::DigestSha256);
BOOST_CHECK_EQUAL(sha256Info.hasKeyLocator(), false);
BOOST_CHECK_THROW(sha256Info.getKeyLocator(), SignatureInfo::Error);
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(sha256Info), "DigestSha256");
KeyLocator keyLocator("/test/key/locator");
SignatureInfo sha256RsaInfo(tlv::SignatureSha256WithRsa, keyLocator);
BOOST_CHECK_EQUAL(sha256RsaInfo.getSignatureType(), tlv::SignatureSha256WithRsa);
BOOST_CHECK_EQUAL(sha256RsaInfo.hasKeyLocator(), true);
BOOST_CHECK_NO_THROW(sha256RsaInfo.getKeyLocator());
BOOST_CHECK_EQUAL(sha256RsaInfo.getKeyLocator().getName(), Name("/test/key/locator"));
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(sha256RsaInfo), "SignatureSha256WithRsa Name=/test/key/locator");
const Block& encoded = sha256RsaInfo.wireEncode();
Block sigInfoBlock(sigInfoRsa, sizeof(sigInfoRsa));
BOOST_CHECK_EQUAL_COLLECTIONS(sigInfoBlock.wire(),
sigInfoBlock.wire() + sigInfoBlock.size(),
encoded.wire(),
encoded.wire() + encoded.size());
sha256RsaInfo = SignatureInfo(sigInfoBlock);
BOOST_CHECK_EQUAL(sha256RsaInfo.getSignatureType(), tlv::SignatureSha256WithRsa);
BOOST_CHECK_EQUAL(sha256RsaInfo.hasKeyLocator(), true);
BOOST_CHECK_NO_THROW(sha256RsaInfo.getKeyLocator());
BOOST_CHECK_EQUAL(sha256RsaInfo.getKeyLocator().getName(), Name("/test/key/locator"));
}
BOOST_AUTO_TEST_CASE(ConstructorError)
{
const uint8_t error1[] = {
0x15, 0x1b, // Wrong SignatureInfo (0x16, 0x1b)
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
};
Block errorBlock1(error1, sizeof(error1));
BOOST_CHECK_THROW(SignatureInfo info(errorBlock1), tlv::Error);
const uint8_t error2[] = {
0x16, 0x01, // SignatureInfo
0x01 // Wrong SignatureInfo value
};
Block errorBlock2(error2, sizeof(error2));
BOOST_CHECK_THROW(SignatureInfo info(errorBlock2), tlv::Error);
const uint8_t error3[] = {
0x16, 0x01, // SignatureInfo
0x1a, 0x01, // Wrong SignatureType (0x1b, 0x1b)
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
};
Block errorBlock3(error3, sizeof(error3));
BOOST_CHECK_THROW(SignatureInfo info(errorBlock3), tlv::Error);
const uint8_t error4[] = {
0x16, 0x00 // Empty SignatureInfo
};
Block errorBlock4(error4, sizeof(error4));
BOOST_CHECK_THROW(SignatureInfo info(errorBlock4), tlv::Error);
}
BOOST_AUTO_TEST_CASE(SetterGetter)
{
SignatureInfo info;
BOOST_CHECK_EQUAL(info.getSignatureType(), -1);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), false);
BOOST_CHECK_THROW(info.getKeyLocator(), SignatureInfo::Error);
info.setSignatureType(tlv::SignatureSha256WithRsa);
BOOST_CHECK_EQUAL(info.getSignatureType(), tlv::SignatureSha256WithRsa);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), false);
KeyLocator keyLocator("/test/key/locator");
info.setKeyLocator(keyLocator);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), true);
BOOST_CHECK_NO_THROW(info.getKeyLocator());
BOOST_CHECK_EQUAL(info.getKeyLocator().getName(), Name("/test/key/locator"));
const Block& encoded = info.wireEncode();
Block sigInfoBlock(sigInfoRsa, sizeof(sigInfoRsa));
BOOST_CHECK_EQUAL_COLLECTIONS(sigInfoBlock.wire(),
sigInfoBlock.wire() + sigInfoBlock.size(),
encoded.wire(),
encoded.wire() + encoded.size());
info.unsetKeyLocator();
BOOST_CHECK_EQUAL(info.hasKeyLocator(), false);
BOOST_CHECK_THROW(info.getKeyLocator(), SignatureInfo::Error);
}
BOOST_AUTO_TEST_CASE(ValidityPeriodExtension)
{
const uint8_t sigInfo[] = {
0x16, 0x45, // SignatureInfo
0x1b, 0x01, // SignatureType
0x01, // Sha256WithRsa
0x1c, 0x16, // KeyLocator
0x07, 0x14, // Name
0x08, 0x04,
0x74, 0x65, 0x73, 0x74,
0x08, 0x03,
0x6b, 0x65, 0x79,
0x08, 0x07,
0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72,
0xfd, 0x00, 0xfd, 0x26, // ValidityPeriod
0xfd, 0x00, 0xfe, 0x0f, // NotBefore
0x31, 0x39, 0x37, 0x30, 0x30, 0x31, 0x30, 0x31, // 19700101T000000
0x54, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30,
0xfd, 0x00, 0xff, 0x0f, // NotAfter
0x31, 0x39, 0x37, 0x30, 0x30, 0x31, 0x30, 0x32, // 19700102T000000
0x54, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30
};
time::system_clock::TimePoint notBefore = time::getUnixEpoch();
time::system_clock::TimePoint notAfter = notBefore + 1_day;
security::ValidityPeriod vp1(notBefore, notAfter);
// encode
SignatureInfo info;
info.setSignatureType(tlv::SignatureSha256WithRsa);
info.setKeyLocator(KeyLocator("/test/key/locator"));
info.setValidityPeriod(vp1);
BOOST_CHECK_EQUAL(info.getValidityPeriod(), vp1);
const Block& encoded = info.wireEncode();
BOOST_CHECK_EQUAL_COLLECTIONS(sigInfo, sigInfo + sizeof(sigInfo),
encoded.wire(), encoded.wire() + encoded.size());
// decode
Block block(sigInfo, sizeof(sigInfo));
SignatureInfo info2;
info2.wireDecode(block);
BOOST_CHECK_EQUAL(info2.getValidityPeriod(), vp1);
const security::ValidityPeriod& validityPeriod = info2.getValidityPeriod();
BOOST_CHECK(validityPeriod.getPeriod() == std::make_pair(notBefore, notAfter));
}
BOOST_AUTO_TEST_CASE(OtherTlvs)
{
SignatureInfo info;
BOOST_CHECK_EQUAL(info.getSignatureType(), -1);
BOOST_CHECK_EQUAL(info.hasKeyLocator(), false);
BOOST_CHECK_THROW(info.getKeyLocator(), SignatureInfo::Error);
const uint8_t tlv1[] = {
0x81, // T
0x01, // L
0x01, // V
};
Block block1(tlv1, sizeof(tlv1));
info.appendTypeSpecificTlv(block1);
BOOST_CHECK_THROW(info.getTypeSpecificTlv(0x82), SignatureInfo::Error);
BOOST_REQUIRE_NO_THROW(info.getTypeSpecificTlv(0x81));
}
BOOST_AUTO_TEST_CASE(OtherTlvsEncoding) // Bug #3914
{
SignatureInfo info1(tlv::SignatureSha256WithRsa);
info1.appendTypeSpecificTlv(makeStringBlock(101, "First"));
info1.appendTypeSpecificTlv(makeStringBlock(102, "Second"));
info1.appendTypeSpecificTlv(makeStringBlock(103, "Third"));
BOOST_CHECK_EQUAL(boost::lexical_cast<std::string>(info1), "SignatureSha256WithRsa { 101 102 103 }");
SignatureInfo info2;
info2.wireDecode(info1.wireEncode());
BOOST_CHECK_EQUAL(info1, info2);
const uint8_t infoBytes[] = {
0x16, 0x19, // SignatureInfo
0x1b, 0x01, 0x01, // SignatureType=1
0x65, 0x05, 0x46, 0x69, 0x72, 0x73, 0x74, // 101 "First"
0x66, 0x06, 0x53, 0x65, 0x63, 0x6f, 0x6e, 0x64, // 102 "Second"
0x67, 0x05, 0x54, 0x68, 0x69, 0x72, 0x64 // 103 "Third"
};
SignatureInfo info3(Block(infoBytes, sizeof(infoBytes)));
BOOST_CHECK_EQUAL(info3, info1);
BOOST_CHECK_EQUAL_COLLECTIONS(infoBytes, infoBytes + sizeof(infoBytes),
info1.wireEncode().begin(), info1.wireEncode().end());
}
BOOST_AUTO_TEST_SUITE_END() // TestSignatureInfo
} // namespace tests
} // namespace ndn