blob: 22b324a67f33079f0ee60daebeac2a5d9273e3bb [file] [log] [blame]
Yingdi Yuebfa4cb2014-06-17 15:28:53 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2/**
Spyridon Mastorakis429634f2015-02-19 17:35:33 -08003 * Copyright (c) 2013-2015 Regents of the University of California.
Yingdi Yuebfa4cb2014-06-17 15:28:53 -07004 *
5 * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
6 *
7 * ndn-cxx library is free software: you can redistribute it and/or modify it under the
8 * terms of the GNU Lesser General Public License as published by the Free Software
9 * Foundation, either version 3 of the License, or (at your option) any later version.
10 *
11 * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License and GNU Lesser
16 * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
17 * <http://www.gnu.org/licenses/>.
18 *
19 * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
20 */
21
22#include "security/signature-sha256-with-ecdsa.hpp"
Yingdi Yu6ab67812014-11-27 15:00:34 -080023#include "security/key-chain.hpp"
24#include "security/validator.hpp"
25#include "util/scheduler.hpp"
26#include "identity-management-fixture.hpp"
27#include "../unit-test-time-fixture.hpp"
Yingdi Yuebfa4cb2014-06-17 15:28:53 -070028#include "boost-test.hpp"
29
30namespace ndn {
Yingdi Yu6ab67812014-11-27 15:00:34 -080031namespace tests {
Yingdi Yuebfa4cb2014-06-17 15:28:53 -070032
Yingdi Yu6ab67812014-11-27 15:00:34 -080033class SignatureSha256EcdsaTimeFixture : public UnitTestTimeFixture
34 , public security::IdentityManagementFixture
35{
36public:
37 SignatureSha256EcdsaTimeFixture()
38 : scheduler(io)
39 {
40 }
41
42public:
43 Scheduler scheduler;
44};
45
Spyridon Mastorakis429634f2015-02-19 17:35:33 -080046BOOST_FIXTURE_TEST_SUITE(SecuritySignatureSha256WithEcdsa, SignatureSha256EcdsaTimeFixture)
Yingdi Yuebfa4cb2014-06-17 15:28:53 -070047
48const uint8_t sigInfo[] = {
490x16, 0x1b, // SignatureInfo
50 0x1b, 0x01, // SignatureType
51 0x03,
52 0x1c, 0x16, // KeyLocator
53 0x07, 0x14, // Name
54 0x08, 0x04,
55 0x74, 0x65, 0x73, 0x74,
56 0x08, 0x03,
57 0x6b, 0x65, 0x79,
58 0x08, 0x07,
59 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
60};
61
62const uint8_t sigValue[] = {
630x17, 0x40, // SignatureValue
64 0x2f, 0xd6, 0xf1, 0x6e, 0x80, 0x6f, 0x10, 0xbe, 0xb1, 0x6f, 0x3e, 0x31, 0xec,
65 0xe3, 0xb9, 0xea, 0x83, 0x30, 0x40, 0x03, 0xfc, 0xa0, 0x13, 0xd9, 0xb3, 0xc6,
66 0x25, 0x16, 0x2d, 0xa6, 0x58, 0x41, 0x69, 0x62, 0x56, 0xd8, 0xb3, 0x6a, 0x38,
67 0x76, 0x56, 0xea, 0x61, 0xb2, 0x32, 0x70, 0x1c, 0xb6, 0x4d, 0x10, 0x1d, 0xdc,
68 0x92, 0x8e, 0x52, 0xa5, 0x8a, 0x1d, 0xd9, 0x96, 0x5e, 0xc0, 0x62, 0x0b
69};
70
71
72BOOST_AUTO_TEST_CASE(Decoding)
73{
74 Block sigInfoBlock(sigInfo, sizeof(sigInfo));
75 Block sigValueBlock(sigValue, sizeof(sigValue));
76
77 Signature sig(sigInfoBlock, sigValueBlock);
Yingdi Yu4a557052014-07-09 16:40:37 -070078 BOOST_CHECK_NO_THROW(SignatureSha256WithEcdsa(sig));
79 BOOST_CHECK_NO_THROW(sig.getKeyLocator());
Yingdi Yuebfa4cb2014-06-17 15:28:53 -070080}
81
82BOOST_AUTO_TEST_CASE(Encoding)
83{
Yingdi Yuebfa4cb2014-06-17 15:28:53 -070084 Name name("/test/key/locator");
85 KeyLocator keyLocator(name);
86
Yingdi Yu4a557052014-07-09 16:40:37 -070087 SignatureSha256WithEcdsa sig(keyLocator);
88
89 BOOST_CHECK_NO_THROW(sig.getKeyLocator());
Yingdi Yuebfa4cb2014-06-17 15:28:53 -070090
91 const Block& encodeSigInfoBlock = sig.getInfo();
92
93 Block sigInfoBlock(sigInfo, sizeof(sigInfo));
94
95 BOOST_CHECK_EQUAL_COLLECTIONS(sigInfoBlock.wire(),
96 sigInfoBlock.wire() + sigInfoBlock.size(),
97 encodeSigInfoBlock.wire(),
98 encodeSigInfoBlock.wire() + encodeSigInfoBlock.size());
Alexander Afanasyev1c6976d2014-07-13 11:40:50 -070099
100 sig.setKeyLocator(Name("/test/another/key/locator"));
101
102 const Block& encodeSigInfoBlock2 = sig.getInfo();
103 BOOST_CHECK(sigInfoBlock != encodeSigInfoBlock2);
Yingdi Yuebfa4cb2014-06-17 15:28:53 -0700104}
105
Yingdi Yu6ab67812014-11-27 15:00:34 -0800106BOOST_AUTO_TEST_CASE(DataSignature)
107{
108 Name identityName("/SecurityTestSignatureSha256WithEcdsa/DataSignature");
109 BOOST_REQUIRE(addIdentity(identityName, EcdsaKeyParams()));
110 shared_ptr<PublicKey> publicKey;
111 BOOST_REQUIRE_NO_THROW(publicKey = m_keyChain.getPublicKeyFromTpm(
112 m_keyChain.getDefaultKeyNameForIdentity(identityName)));
113
114 Data testData("/SecurityTestSignatureSha256WithEcdsa/DataSignature/Data1");
115 char content[5] = "1234";
116 testData.setContent(reinterpret_cast<uint8_t*>(content), 5);
117 BOOST_CHECK_NO_THROW(m_keyChain.signByIdentity(testData, identityName));
118 Block dataBlock(testData.wireEncode().wire(), testData.wireEncode().size());
119
120 Data testData2;
121 testData2.wireDecode(dataBlock);
122 BOOST_CHECK(Validator::verifySignature(testData2, *publicKey));
123}
124
125
126BOOST_AUTO_TEST_CASE(InterestSignature)
127{
128 Name identityName("/SecurityTestSignatureSha256WithEcdsa/InterestSignature");
129 BOOST_REQUIRE(addIdentity(identityName, EcdsaKeyParams()));
130 shared_ptr<PublicKey> publicKey;
131 BOOST_REQUIRE_NO_THROW(publicKey = m_keyChain.getPublicKeyFromTpm(
132 m_keyChain.getDefaultKeyNameForIdentity(identityName)));
133
134
135 Interest interest("/SecurityTestSignatureSha256WithEcdsa/InterestSignature/Interest1");
136 Interest interest11("/SecurityTestSignatureSha256WithEcdsa/InterestSignature/Interest1");
137
138 scheduler.scheduleEvent(time::milliseconds(100), [&] {
139 BOOST_CHECK_NO_THROW(m_keyChain.signByIdentity(interest, identityName));
140 });
141
142 advanceClocks(time::milliseconds(100));
143 scheduler.scheduleEvent(time::milliseconds(100), [&] {
144 BOOST_CHECK_NO_THROW(m_keyChain.signByIdentity(interest11, identityName));
145 });
146
147 advanceClocks(time::milliseconds(100));
148
149 time::system_clock::TimePoint timestamp1 =
150 time::fromUnixTimestamp(
151 time::milliseconds(interest.getName().get(signed_interest::POS_TIMESTAMP).toNumber()));
152
153 time::system_clock::TimePoint timestamp2 =
154 time::fromUnixTimestamp(
155 time::milliseconds(interest11.getName().get(signed_interest::POS_TIMESTAMP).toNumber()));
156
157 BOOST_CHECK_EQUAL(time::milliseconds(100), (timestamp2 - timestamp1));
158
159 uint64_t nonce1 = interest.getName().get(signed_interest::POS_RANDOM_VAL).toNumber();
160 uint64_t nonce2 = interest11.getName().get(signed_interest::POS_RANDOM_VAL).toNumber();
161 BOOST_WARN_NE(nonce1, nonce2);
162
163 Block interestBlock(interest.wireEncode().wire(), interest.wireEncode().size());
164
165 Interest interest2;
166 interest2.wireDecode(interestBlock);
167 BOOST_CHECK(Validator::verifySignature(interest2, *publicKey));
168}
169
Yingdi Yuebfa4cb2014-06-17 15:28:53 -0700170BOOST_AUTO_TEST_SUITE_END()
171
Yingdi Yu6ab67812014-11-27 15:00:34 -0800172} // namespace tests
Yingdi Yuebfa4cb2014-06-17 15:28:53 -0700173} // namespace ndn