security: Add new v2::KeyChain

Change-Id: I5fdf51ecd96b50db2a7cbf730c6e8b1d9fbe09e9
Refs: #2926
diff --git a/tests/unit-tests/security/v2/validator.hpp b/tests/unit-tests/security/v2/validator.hpp
new file mode 100644
index 0000000..960796c
--- /dev/null
+++ b/tests/unit-tests/security/v2/validator.hpp
@@ -0,0 +1,102 @@
+/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
+/**
+ * Copyright (c) 2013-2017 Regents of the University of California.
+ *
+ * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
+ *
+ * ndn-cxx library is free software: you can redistribute it and/or modify it under the
+ * terms of the GNU Lesser General Public License as published by the Free Software
+ * Foundation, either version 3 of the License, or (at your option) any later version.
+ *
+ * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
+ * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
+ * PARTICULAR PURPOSE.  See the GNU Lesser General Public License for more details.
+ *
+ * You should have received copies of the GNU General Public License and GNU Lesser
+ * General Public License along with ndn-cxx, e.g., in COPYING.md file.  If not, see
+ * <http://www.gnu.org/licenses/>.
+ *
+ * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
+ */
+
+#include "security/transform.hpp"
+#include "encoding/buffer-stream.hpp"
+
+namespace ndn {
+namespace security {
+namespace v2 {
+
+// TODO: Remove after the new validator is merged
+class Validator
+{
+public:
+  static bool
+  verifySignature(const uint8_t* data, size_t dataLen,
+                  const uint8_t* sig, size_t sigLen,
+                  const Buffer& key)
+  {
+    using namespace transform;
+
+    PublicKey pKey;
+    bool result = false;
+    pKey.loadPkcs8(key.buf(), key.size());
+    bufferSource(data, dataLen) >> verifierFilter(DigestAlgorithm::SHA256, pKey, sig, sigLen) >> boolSink(result);
+
+    return result;
+  }
+
+  static bool
+  verifySignature(const Data& data, const Buffer& key)
+  {
+    return verifySignature(data.wireEncode().value(), data.wireEncode().value_size() - data.getSignature().getValue().size(),
+                           data.getSignature().getValue().value(), data.getSignature().getValue().value_size(),
+                           key);
+  }
+
+  static bool
+  verifySignature(const Interest& interest, const Buffer& key)
+  {
+    const Name& interestName = interest.getName();
+    const Block& nameBlock = interestName.wireEncode();
+    const Block& sigValue = interestName[-1].blockFromValue();
+
+    return verifySignature(nameBlock.value(), nameBlock.value_size() - interestName[-1].size(),
+                           sigValue.value(), sigValue.value_size(),
+                           key);
+  }
+
+  static bool
+  verifySha256Digest(const uint8_t* data, size_t dataLen,
+                     const uint8_t* sig, size_t sigLen)
+  {
+    using namespace transform;
+
+    OBufferStream os;
+    bufferSource(data, dataLen) >> digestFilter(DigestAlgorithm::SHA256) >> streamSink(os);
+    ConstBufferPtr digest = os.buf();
+
+    return std::equal(digest->begin(), digest->end(), sig);
+  }
+
+  static bool
+  verifySha256Digest(const Data& data)
+  {
+    return verifySha256Digest(data.wireEncode().value(), data.wireEncode().value_size() - data.getSignature().getValue().size(),
+                              data.getSignature().getValue().value(), data.getSignature().getValue().value_size());
+  }
+
+  static bool
+  verifySha256Digest(const Interest& interest)
+  {
+    const Name& interestName = interest.getName();
+    const Block& nameBlock = interestName.wireEncode();
+    const Block& sigValue = interestName[-1].blockFromValue();
+
+    return verifySha256Digest(nameBlock.value(), nameBlock.value_size() - interestName[-1].size(),
+                              sigValue.value(), sigValue.value_size());
+  }
+};
+
+} // namespace v2
+} // namespace security
+} // namespace ndn