blob: dfcd19ab049ad71dae7d6d7c662e0d54d55a3dc4 [file] [log] [blame]
Yingdi Yucbe72b02015-11-25 17:35:37 -08001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Davide Pesavento5d0b0102017-10-07 13:43:16 -04002/*
Davide Pesavento78ca8ae2022-05-01 01:37:05 -04003 * Copyright (c) 2013-2022 Regents of the University of California.
Yingdi Yucbe72b02015-11-25 17:35:37 -08004 *
5 * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
6 *
7 * ndn-cxx library is free software: you can redistribute it and/or modify it under the
8 * terms of the GNU Lesser General Public License as published by the Free Software
9 * Foundation, either version 3 of the License, or (at your option) any later version.
10 *
11 * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License and GNU Lesser
16 * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
17 * <http://www.gnu.org/licenses/>.
18 *
19 * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
20 */
21
Junxiao Shi24c5a002018-12-12 04:47:15 +000022#include "ndn-cxx/security/pib/impl/key-impl.hpp"
Davide Pesavento4fb35d82019-10-31 19:33:10 -040023#include "ndn-cxx/security/pib/impl/pib-memory.hpp"
Davide Pesavento7e780642018-11-24 15:51:34 -050024#include "ndn-cxx/security/pib/pib.hpp"
Yingdi Yucbe72b02015-11-25 17:35:37 -080025
Davide Pesavento7e780642018-11-24 15:51:34 -050026#include "tests/boost-test.hpp"
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050027#include "tests/key-chain-fixture.hpp"
Davide Pesavento7e780642018-11-24 15:51:34 -050028#include "tests/unit/security/pib/pib-data-fixture.hpp"
Yingdi Yucbe72b02015-11-25 17:35:37 -080029
30namespace ndn {
31namespace security {
32namespace pib {
33namespace detail {
34namespace tests {
35
36BOOST_AUTO_TEST_SUITE(Security)
37BOOST_AUTO_TEST_SUITE(Pib)
Davide Pesavento5d0b0102017-10-07 13:43:16 -040038BOOST_FIXTURE_TEST_SUITE(TestKeyImpl, security::tests::PibDataFixture)
Yingdi Yucbe72b02015-11-25 17:35:37 -080039
Davide Pesavento78ca8ae2022-05-01 01:37:05 -040040using pib::Pib;
Yingdi Yucbe72b02015-11-25 17:35:37 -080041
42BOOST_AUTO_TEST_CASE(Basic)
43{
44 auto pibImpl = make_shared<pib::PibMemory>();
Davide Pesavento765abc92021-12-27 00:44:04 -050045 KeyImpl key11(id1Key1Name, id1Key1, pibImpl);
Yingdi Yucbe72b02015-11-25 17:35:37 -080046
47 BOOST_CHECK_EQUAL(key11.getName(), id1Key1Name);
48 BOOST_CHECK_EQUAL(key11.getIdentity(), id1);
49 BOOST_CHECK_EQUAL(key11.getKeyType(), KeyType::EC);
Davide Pesavento78ca8ae2022-05-01 01:37:05 -040050 BOOST_TEST(key11.getPublicKey() == id1Key1, boost::test_tools::per_element());
Yingdi Yucbe72b02015-11-25 17:35:37 -080051
52 KeyImpl key11Bak(id1Key1Name, pibImpl);
53 BOOST_CHECK_EQUAL(key11Bak.getName(), id1Key1Name);
54 BOOST_CHECK_EQUAL(key11Bak.getIdentity(), id1);
55 BOOST_CHECK_EQUAL(key11Bak.getKeyType(), KeyType::EC);
Davide Pesavento78ca8ae2022-05-01 01:37:05 -040056 BOOST_TEST(key11Bak.getPublicKey() == id1Key1, boost::test_tools::per_element());
Yingdi Yucbe72b02015-11-25 17:35:37 -080057}
58
Davide Pesavento78ca8ae2022-05-01 01:37:05 -040059BOOST_AUTO_TEST_CASE(CertificateOperations)
Yingdi Yucbe72b02015-11-25 17:35:37 -080060{
61 auto pibImpl = make_shared<pib::PibMemory>();
Davide Pesavento765abc92021-12-27 00:44:04 -050062 KeyImpl key11(id1Key1Name, id1Key1, pibImpl);
Yingdi Yucbe72b02015-11-25 17:35:37 -080063 BOOST_CHECK_NO_THROW(KeyImpl(id1Key1Name, pibImpl));
64
65 // key does not have any certificate
66 BOOST_CHECK_EQUAL(key11.getCertificates().size(), 0);
67
68 // get non-existing certificate, throw Pib::Error
69 BOOST_CHECK_THROW(key11.getCertificate(id1Key1Cert1.getName()), Pib::Error);
70 // get default certificate, throw Pib::Error
71 BOOST_CHECK_THROW(key11.getDefaultCertificate(), Pib::Error);
72 // set non-existing certificate as default certificate, throw Pib::Error
Davide Pesavento78ca8ae2022-05-01 01:37:05 -040073 BOOST_CHECK_THROW(key11.setDefaultCertificate(id1Key1Cert1.getName()), Pib::Error);
Yingdi Yucbe72b02015-11-25 17:35:37 -080074
75 // add certificate
76 key11.addCertificate(id1Key1Cert1);
Davide Pesavento78ca8ae2022-05-01 01:37:05 -040077 const auto& addedCert = key11.getCertificate(id1Key1Cert1.getName());
78 BOOST_CHECK_EQUAL(addedCert, id1Key1Cert1);
Yingdi Yucbe72b02015-11-25 17:35:37 -080079
80 // new certificate becomes default certificate when there was no default certificate
Yingdi Yucbe72b02015-11-25 17:35:37 -080081 const auto& defaultCert0 = key11.getDefaultCertificate();
Yingdi Yucbe72b02015-11-25 17:35:37 -080082 BOOST_CHECK_EQUAL(defaultCert0, id1Key1Cert1);
83
84 // remove certificate
85 key11.removeCertificate(id1Key1Cert1.getName());
86 BOOST_CHECK_THROW(key11.getCertificate(id1Key1Cert1.getName()), Pib::Error);
87 BOOST_CHECK_THROW(key11.getDefaultCertificate(), Pib::Error);
88
89 // set default certificate directly
90 BOOST_REQUIRE_NO_THROW(key11.setDefaultCertificate(id1Key1Cert1));
Yingdi Yucbe72b02015-11-25 17:35:37 -080091 const auto& defaultCert1 = key11.getDefaultCertificate();
Yingdi Yucbe72b02015-11-25 17:35:37 -080092 BOOST_CHECK_EQUAL(defaultCert1, id1Key1Cert1);
93
94 // add another certificate
95 key11.addCertificate(id1Key1Cert2);
96 BOOST_CHECK_EQUAL(key11.getCertificates().size(), 2);
97
Davide Pesavento78ca8ae2022-05-01 01:37:05 -040098 // set default certificate through name and check return value
99 BOOST_CHECK_EQUAL(key11.setDefaultCertificate(id1Key1Cert2.getName()), id1Key1Cert2);
Yingdi Yucbe72b02015-11-25 17:35:37 -0800100 const auto& defaultCert2 = key11.getDefaultCertificate();
Yingdi Yucbe72b02015-11-25 17:35:37 -0800101 BOOST_CHECK_EQUAL(defaultCert2, id1Key1Cert2);
102
103 // remove certificate
104 key11.removeCertificate(id1Key1Cert1.getName());
105 BOOST_CHECK_THROW(key11.getCertificate(id1Key1Cert1.getName()), Pib::Error);
106 BOOST_CHECK_EQUAL(key11.getCertificates().size(), 1);
107
Davide Pesavento78ca8ae2022-05-01 01:37:05 -0400108 // set removed certificate as default, certificate is implicitly added
Yingdi Yucbe72b02015-11-25 17:35:37 -0800109 BOOST_REQUIRE_NO_THROW(key11.setDefaultCertificate(id1Key1Cert1));
110 const auto& defaultCert3 = key11.getDefaultCertificate();
Yingdi Yucbe72b02015-11-25 17:35:37 -0800111 BOOST_CHECK_EQUAL(defaultCert3, id1Key1Cert1);
112 BOOST_CHECK_EQUAL(key11.getCertificates().size(), 2);
113
114 // remove all certificates
115 key11.removeCertificate(id1Key1Cert1.getName());
116 BOOST_CHECK_THROW(key11.getCertificate(id1Key1Cert1.getName()), Pib::Error);
117 BOOST_CHECK_EQUAL(key11.getCertificates().size(), 1);
118 key11.removeCertificate(id1Key1Cert2.getName());
119 BOOST_CHECK_THROW(key11.getCertificate(id1Key1Cert2.getName()), Pib::Error);
Yingdi Yucbe72b02015-11-25 17:35:37 -0800120 BOOST_CHECK_EQUAL(key11.getCertificates().size(), 0);
Davide Pesavento78ca8ae2022-05-01 01:37:05 -0400121 BOOST_CHECK_THROW(key11.getDefaultCertificate(), Pib::Error);
Yingdi Yucbe72b02015-11-25 17:35:37 -0800122}
123
Alexander Afanasyeva10b2ff2017-01-30 12:44:15 -0800124class OverwriteFixture : public ndn::security::tests::PibDataFixture,
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -0500125 public ndn::tests::KeyChainFixture
Alexander Afanasyeva10b2ff2017-01-30 12:44:15 -0800126{
127};
128
129BOOST_FIXTURE_TEST_CASE(Overwrite, OverwriteFixture)
130{
131 auto pibImpl = make_shared<pib::PibMemory>();
132
133 BOOST_CHECK_THROW(KeyImpl(id1Key1Name, pibImpl), Pib::Error);
Davide Pesavento765abc92021-12-27 00:44:04 -0500134 KeyImpl(id1Key1Name, id1Key1, pibImpl);
Alexander Afanasyeva10b2ff2017-01-30 12:44:15 -0800135 KeyImpl key1(id1Key1Name, pibImpl);
136
Davide Pesavento765abc92021-12-27 00:44:04 -0500137 KeyImpl(id1Key1Name, id1Key2, pibImpl); // overwriting of the key should work
Alexander Afanasyeva10b2ff2017-01-30 12:44:15 -0800138 KeyImpl key2(id1Key1Name, pibImpl);
139
Davide Pesavento765abc92021-12-27 00:44:04 -0500140 Buffer key1buf(key1.getPublicKey().begin(), key1.getPublicKey().end());
141 Buffer key2buf(key2.getPublicKey().begin(), key2.getPublicKey().end());
142 BOOST_CHECK(key1buf != key2buf); // key1 cached the original public key
143 BOOST_CHECK(key2buf == id1Key2);
Alexander Afanasyeva10b2ff2017-01-30 12:44:15 -0800144
145 key1.addCertificate(id1Key1Cert1);
146 BOOST_CHECK_EQUAL(key1.getCertificate(id1Key1Cert1.getName()), id1Key1Cert1);
147
148 auto otherCert = id1Key1Cert1;
149 SignatureInfo info;
Davide Pesavento78ca8ae2022-05-01 01:37:05 -0400150 info.setValidityPeriod(ValidityPeriod::makeRelative(-1_s, 10_s));
Alexander Afanasyeva10b2ff2017-01-30 12:44:15 -0800151 m_keyChain.sign(otherCert, SigningInfo().setSignatureInfo(info));
152
Davide Pesavento78ca8ae2022-05-01 01:37:05 -0400153 BOOST_TEST(otherCert.getName() == id1Key1Cert1.getName());
154 BOOST_TEST(otherCert.getContent() == id1Key1Cert1.getContent());
155 BOOST_TEST(otherCert != id1Key1Cert1);
Alexander Afanasyeva10b2ff2017-01-30 12:44:15 -0800156
157 key1.addCertificate(otherCert);
Davide Pesavento78ca8ae2022-05-01 01:37:05 -0400158 BOOST_TEST(key1.getCertificate(id1Key1Cert1.getName()) == otherCert);
Alexander Afanasyeva10b2ff2017-01-30 12:44:15 -0800159}
160
Yingdi Yucbe72b02015-11-25 17:35:37 -0800161BOOST_AUTO_TEST_CASE(Errors)
162{
163 auto pibImpl = make_shared<pib::PibMemory>();
164
165 BOOST_CHECK_THROW(KeyImpl(id1Key1Name, pibImpl), Pib::Error);
Davide Pesavento765abc92021-12-27 00:44:04 -0500166 KeyImpl key11(id1Key1Name, id1Key1, pibImpl);
Yingdi Yucbe72b02015-11-25 17:35:37 -0800167
168 BOOST_CHECK_THROW(KeyImpl(Name("/wrong"), pibImpl), std::invalid_argument);
Davide Pesavento765abc92021-12-27 00:44:04 -0500169 BOOST_CHECK_THROW(KeyImpl(Name("/wrong"), id1Key1, pibImpl), std::invalid_argument);
Yingdi Yucbe72b02015-11-25 17:35:37 -0800170 Buffer wrongKey;
Davide Pesavento765abc92021-12-27 00:44:04 -0500171 BOOST_CHECK_THROW(KeyImpl(id1Key2Name, wrongKey, pibImpl), std::invalid_argument);
Yingdi Yucbe72b02015-11-25 17:35:37 -0800172
173 key11.addCertificate(id1Key1Cert1);
Yingdi Yucbe72b02015-11-25 17:35:37 -0800174 BOOST_CHECK_THROW(key11.addCertificate(id1Key2Cert1), std::invalid_argument);
175 BOOST_CHECK_THROW(key11.removeCertificate(id1Key2Cert1.getName()), std::invalid_argument);
176 BOOST_CHECK_THROW(key11.getCertificate(id1Key2Cert1.getName()), std::invalid_argument);
177 BOOST_CHECK_THROW(key11.setDefaultCertificate(id1Key2Cert1), std::invalid_argument);
178 BOOST_CHECK_THROW(key11.setDefaultCertificate(id1Key2Cert1.getName()), std::invalid_argument);
179}
180
181BOOST_AUTO_TEST_SUITE_END() // TestKeyImpl
Yingdi Yucbe72b02015-11-25 17:35:37 -0800182BOOST_AUTO_TEST_SUITE_END() // Pib
183BOOST_AUTO_TEST_SUITE_END() // Security
184
185} // namespace tests
186} // namespace detail
187} // namespace pib
188} // namespace security
189} // namespace ndn