blob: 80fc58a3b17c03b9cc7bc491d4f9c3edd284be67 [file] [log] [blame]
Alexander Afanasyev7e721412017-01-11 13:36:08 -08001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Davide Pesavento74daf742018-11-23 18:14:13 -05002/*
Davide Pesavento47ce2ee2023-05-09 01:33:33 -04003 * Copyright (c) 2013-2023 Regents of the University of California.
Alexander Afanasyev7e721412017-01-11 13:36:08 -08004 *
5 * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
6 *
7 * ndn-cxx library is free software: you can redistribute it and/or modify it under the
8 * terms of the GNU Lesser General Public License as published by the Free Software
9 * Foundation, either version 3 of the License, or (at your option) any later version.
10 *
11 * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License and GNU Lesser
16 * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
17 * <http://www.gnu.org/licenses/>.
18 *
19 * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
20 */
21
Alexander Afanasyev09236c22020-06-03 13:42:38 -040022#include "ndn-cxx/security/validation-policy-simple-hierarchy.hpp"
Alexander Afanasyev7e721412017-01-11 13:36:08 -080023
Davide Pesavento7e780642018-11-24 15:51:34 -050024#include "tests/boost-test.hpp"
Alexander Afanasyev09236c22020-06-03 13:42:38 -040025#include "tests/unit/security/validator-fixture.hpp"
Alexander Afanasyev7e721412017-01-11 13:36:08 -080026
27#include <boost/mpl/vector.hpp>
28
Davide Pesavento47ce2ee2023-05-09 01:33:33 -040029namespace ndn::tests {
Alexander Afanasyev7e721412017-01-11 13:36:08 -080030
Alexander Afanasyev7e721412017-01-11 13:36:08 -080031BOOST_AUTO_TEST_SUITE(Security)
Alexander Afanasyev7e721412017-01-11 13:36:08 -080032BOOST_FIXTURE_TEST_SUITE(TestValidationPolicySimpleHierarchy,
Davide Pesavento47ce2ee2023-05-09 01:33:33 -040033 HierarchicalValidatorFixture<security::ValidationPolicySimpleHierarchy>)
Alexander Afanasyev7e721412017-01-11 13:36:08 -080034
Davide Pesavento1a4a7bf2020-12-04 22:30:46 -050035using Packets = boost::mpl::vector<InterestV03Pkt, DataPkt>;
Alexander Afanasyev7e721412017-01-11 13:36:08 -080036
37BOOST_AUTO_TEST_CASE_TEMPLATE(Validate, Packet, Packets)
38{
Davide Pesavento1a4a7bf2020-12-04 22:30:46 -050039 const Name name = "/Security/ValidatorFixture/Sub1/Sub2/Packet";
Eric Newberryb74bbda2020-06-18 19:33:58 -070040
Davide Pesavento1a4a7bf2020-12-04 22:30:46 -050041 auto packet = Packet::makePacket(name);
Alexander Afanasyev7e721412017-01-11 13:36:08 -080042 VALIDATE_FAILURE(packet, "Unsigned");
Davide Pesavento637ea3b2022-09-10 00:11:34 -040043 BOOST_TEST((lastError.getCode() == ValidationError::MALFORMED_SIGNATURE || // Interest
Davide Pesavento2acce252022-09-08 22:03:03 -040044 lastError.getCode() == ValidationError::INVALID_KEY_LOCATOR)); // Data
Alexander Afanasyev7e721412017-01-11 13:36:08 -080045
Davide Pesavento1a4a7bf2020-12-04 22:30:46 -050046 packet = Packet::makePacket(name);
Alexander Afanasyev7e721412017-01-11 13:36:08 -080047 m_keyChain.sign(packet, signingWithSha256());
Justin Labryaef53b62021-03-10 06:07:27 +000048 VALIDATE_FAILURE(packet, "Should not be accepted, name not prefix of /localhost/identity/digest-sha256");
Davide Pesavento2acce252022-09-08 22:03:03 -040049 BOOST_TEST(lastError.getCode() == ValidationError::POLICY_ERROR);
Justin Labryaef53b62021-03-10 06:07:27 +000050
51 packet = Packet::makePacket("/localhost/identity/digest-sha256/foobar");
52 m_keyChain.sign(packet, signingWithSha256());
53 VALIDATE_SUCCESS(packet, "Should be accepted, as name is prefix of /localhost/identity/digest-sha256");
Alexander Afanasyev7e721412017-01-11 13:36:08 -080054
Davide Pesavento1a4a7bf2020-12-04 22:30:46 -050055 packet = Packet::makePacket(name);
Alexander Afanasyev7e721412017-01-11 13:36:08 -080056 m_keyChain.sign(packet, signingByIdentity(identity));
57 VALIDATE_SUCCESS(packet, "Should get accepted, as signed by the anchor");
58
Davide Pesavento1a4a7bf2020-12-04 22:30:46 -050059 packet = Packet::makePacket(name);
Alexander Afanasyev7e721412017-01-11 13:36:08 -080060 m_keyChain.sign(packet, signingByIdentity(subIdentity));
61 VALIDATE_SUCCESS(packet, "Should get accepted, as signed by the policy-compliant cert");
62
Davide Pesavento1a4a7bf2020-12-04 22:30:46 -050063 packet = Packet::makePacket(name);
Alexander Afanasyev7e721412017-01-11 13:36:08 -080064 m_keyChain.sign(packet, signingByIdentity(otherIdentity));
65 VALIDATE_FAILURE(packet, "Should fail, as signed by the policy-violating cert");
Davide Pesavento2acce252022-09-08 22:03:03 -040066 BOOST_TEST(lastError.getCode() == ValidationError::POLICY_ERROR);
Alexander Afanasyev7e721412017-01-11 13:36:08 -080067
Davide Pesavento1a4a7bf2020-12-04 22:30:46 -050068 packet = Packet::makePacket(name);
Alexander Afanasyev7e721412017-01-11 13:36:08 -080069 m_keyChain.sign(packet, signingByIdentity(subSelfSignedIdentity));
70 VALIDATE_FAILURE(packet, "Should fail, because subSelfSignedIdentity is not a trust anchor");
Davide Pesavento2acce252022-09-08 22:03:03 -040071 BOOST_TEST(lastError.getCode() == ValidationError::LOOP_DETECTED);
Alexander Afanasyev7e721412017-01-11 13:36:08 -080072
73 // TODO add checks with malformed packets
74}
75
Davide Pesavento2acce252022-09-08 22:03:03 -040076BOOST_AUTO_TEST_CASE(CertNameInKeyLocator)
Alexander Afanasyev8afba422020-06-11 17:56:21 -040077{
Davide Pesavento258d51a2022-02-27 21:26:28 -050078// auto cert = identity.getDefaultKey().getDefaultCertificate().wireEncode();
79// std::cerr << "Certificate idCert{\"" << toHex(cert) << "\"_block};" << std::endl;
Alexander Afanasyev8afba422020-06-11 17:56:21 -040080
Davide Pesavento258d51a2022-02-27 21:26:28 -050081// cert = subIdentity.getDefaultKey().getDefaultCertificate().wireEncode();
82// std::cerr << "Certificate subIdCert{\"" << toHex(cert) << "\"_block};" << std::endl;
Alexander Afanasyev8afba422020-06-11 17:56:21 -040083
Davide Pesavento258d51a2022-02-27 21:26:28 -050084// Data pkt("/Security/ValidatorFixture/Sub1/Sub2/Packet");
85// m_keyChain.sign(pkt, signingByIdentity(subIdentity));
86// std::cerr << "Data packet{\"" << toHex(pkt.wireEncode()) << "\"_block};" << std::endl;
Alexander Afanasyev8afba422020-06-11 17:56:21 -040087
88 // These are hard-coded with a key locator that is the exact name of the certificate
89 Certificate idCert{"06FD014C073C08085365637572697479081056616C696461746F724669787475726508034B455"
90 "9080816971C408D162A0A080473656C660809FD000001499D598CA0140918010219040036EE80155B30593013060"
91 "72A8648CE3D020106082A8648CE3D03010703420004F795BB9A7D51ECC4491605D49ADFCB46598D8260F872F0F15"
92 "15FA4EA7259F2A27C25B5ADAFA8D548C5FA0FBB88AB7769E986057FCAB52C7AF17A7964C47DF57B165C1B01031C2"
93 "D072B08085365637572697479081056616C696461746F724669787475726508034B4559080816971C408D162A0AF"
94 "D00FD26FD00FE0F313937303031303154303030303030FD00FF0F323033343131303654303533353332174630440"
95 "2200E9C538FE7285B006476C86F1CCCEC4398C939D1F6CE2E4F3537EB145252EE1502201A1C50E647CAF90CAA76A"
96 "065452D1D560E5BB7122A7553002E7DFBCA80FCB422"_block};
97 Certificate subIdCert{"06FD0188074408085365637572697479081056616C696461746F7246697874757265080453"
98 "75623108034B45590808D76A31B01E14092B0806706172656E740809FD000001499D598CA0140918010219040036"
99 "EE80155B3059301306072A8648CE3D020106082A8648CE3D0301070342000441783BEDE80DEF6F2910D78E1BD0AD"
100 "7EF033A62F510A7578D1FC8F7601AC2B7709B27BBF225423A865964FA523B9746169FDB03C68B2FAC8D75DA0C755"
101 "8122AF16901B01031C3E073C08085365637572697479081056616C696461746F724669787475726508034B455908"
102 "0816971C408D162A0A080473656C660809FD000001499D598CA0FD00FD26FD00FE0F323031343131313154303533"
103 "353332FD00FF0F323033343131303654303533353332FD01021FFD02001BFD02010474797065FD02020F7375622D"
104 "636572746966696361746517463044022013CEFBF0E15EA6C85B26C56B550316A8A0F6F45510CCBDA4188E7732EF"
105 "1E81B6022026BDC1B6F32BE163F20E379B86EF686F5B8B2B57B6494DE89D5D503C8E3C6125"_block};
106 Data packet{"06CD073008085365637572697479081056616C696461746F724669787475726508045375623108045375"
107 "623208065061636B657414001500164B1B01031C46074408085365637572697479081056616C696461746F724669"
108 "787475726508045375623108034B45590808D76A31B01E14092B0806706172656E740809FD000001499D598CA017"
109 "483046022100BDD3E0EF2385658825EB73E87A02D1A16AA8ACE50840C1B91782836164AACA3B0221008007B3EBA9"
110 "B7638BD204766B08AF6E4221CDB88156CC7DA13CD916610D6D3AED"_block};
111
Davide Pesavento2acce252022-09-08 22:03:03 -0400112 BOOST_REQUIRE_EQUAL(packet.getKeyLocator().value().getName(),
113 "/Security/ValidatorFixture/Sub1/KEY/%D7j1%B0%1E%14%09%2B/parent/%FD%00%00%01I%9DY%8C%A0");
114
Alexander Afanasyev8afba422020-06-11 17:56:21 -0400115 this->cache.insert(idCert);
116 this->cache.insert(subIdCert);
117 this->validator.loadAnchor("", std::move(idCert));
118
Alexander Afanasyev8afba422020-06-11 17:56:21 -0400119 VALIDATE_SUCCESS(packet, "Should get accepted, as signed by the policy-compliant cert");
120}
121
122BOOST_AUTO_TEST_SUITE_END() // TestValidationPolicySimpleHierarchy
Alexander Afanasyev7e721412017-01-11 13:36:08 -0800123BOOST_AUTO_TEST_SUITE_END() // Security
124
Davide Pesavento47ce2ee2023-05-09 01:33:33 -0400125} // namespace ndn::tests