tests: Change to updated naming conventions
Change-Id: I9351c669282c3c02fd533237489beeb10fe7d16d
Refs: #2497
diff --git a/tests/unit-tests/security/validator.t.cpp b/tests/unit-tests/security/validator.t.cpp
new file mode 100644
index 0000000..e72171e
--- /dev/null
+++ b/tests/unit-tests/security/validator.t.cpp
@@ -0,0 +1,224 @@
+/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
+/**
+ * Copyright (c) 2013-2015 Regents of the University of California.
+ *
+ * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
+ *
+ * ndn-cxx library is free software: you can redistribute it and/or modify it under the
+ * terms of the GNU Lesser General Public License as published by the Free Software
+ * Foundation, either version 3 of the License, or (at your option) any later version.
+ *
+ * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
+ * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
+ * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
+ *
+ * You should have received copies of the GNU General Public License and GNU Lesser
+ * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
+ * <http://www.gnu.org/licenses/>.
+ *
+ * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
+ */
+
+#include "security/validator-null.hpp"
+#include "security/key-chain.hpp"
+#include "util/time.hpp"
+#include "identity-management-fixture.hpp"
+#include "boost-test.hpp"
+
+namespace ndn {
+namespace tests {
+
+using std::string;
+
+BOOST_FIXTURE_TEST_SUITE(SecurityValidator, security::IdentityManagementFixture)
+
+void
+onValidated(const shared_ptr<const Data>& data)
+{
+ BOOST_CHECK(true);
+}
+
+void
+onValidationFailed(const shared_ptr<const Data>& data, const string& failureInfo)
+{
+ BOOST_CHECK(false);
+}
+
+BOOST_AUTO_TEST_CASE(Null)
+{
+ Name identity("/TestValidator/Null");
+ identity.appendVersion();
+ BOOST_REQUIRE(addIdentity(identity, RsaKeyParams()));
+
+ Name dataName = identity;
+ dataName.append("1");
+ shared_ptr<Data> data = make_shared<Data>(dataName);
+
+ BOOST_CHECK_NO_THROW(m_keyChain.signByIdentity(*data, identity));
+
+ ValidatorNull validator;
+
+ // data must be a shared pointer
+ validator.validate(*data,
+ bind(&onValidated, _1),
+ bind(&onValidationFailed, _1, _2));
+}
+
+const uint8_t ecdsaSigInfo[] = {
+0x16, 0x1b, // SignatureInfo
+ 0x1b, 0x01, // SignatureType
+ 0x03,
+ 0x1c, 0x16, // KeyLocator
+ 0x07, 0x14, // Name
+ 0x08, 0x04,
+ 0x74, 0x65, 0x73, 0x74,
+ 0x08, 0x03,
+ 0x6b, 0x65, 0x79,
+ 0x08, 0x07,
+ 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
+};
+
+const uint8_t ecdsaSigValue[] = {
+0x17, 0x40, // SignatureValue
+ 0x2f, 0xd6, 0xf1, 0x6e, 0x80, 0x6f, 0x10, 0xbe, 0xb1, 0x6f, 0x3e, 0x31, 0xec,
+ 0xe3, 0xb9, 0xea, 0x83, 0x30, 0x40, 0x03, 0xfc, 0xa0, 0x13, 0xd9, 0xb3, 0xc6,
+ 0x25, 0x16, 0x2d, 0xa6, 0x58, 0x41, 0x69, 0x62, 0x56, 0xd8, 0xb3, 0x6a, 0x38,
+ 0x76, 0x56, 0xea, 0x61, 0xb2, 0x32, 0x70, 0x1c, 0xb6, 0x4d, 0x10, 0x1d, 0xdc,
+ 0x92, 0x8e, 0x52, 0xa5, 0x8a, 0x1d, 0xd9, 0x96, 0x5e, 0xc0, 0x62, 0x0b
+};
+
+BOOST_AUTO_TEST_CASE(RsaSignatureVerification)
+{
+ Name identity("/TestValidator/RsaSignatureVerification");
+ BOOST_REQUIRE(addIdentity(identity, RsaKeyParams()));
+ Name keyName = m_keyChain.getDefaultKeyNameForIdentity(identity);
+ shared_ptr<PublicKey> publicKey = m_keyChain.getPublicKey(keyName);
+
+ Name identity2("/TestValidator/RsaSignatureVerification/id2");
+ BOOST_REQUIRE(addIdentity(identity2, RsaKeyParams()));
+ Name keyName2 = m_keyChain.getDefaultKeyNameForIdentity(identity2);
+ shared_ptr<PublicKey> publicKey2 = m_keyChain.getPublicKey(keyName2);
+
+ Data data("/TestData/1");
+ BOOST_CHECK_NO_THROW(m_keyChain.signByIdentity(data, identity));
+ BOOST_CHECK_EQUAL(Validator::verifySignature(data, *publicKey), true);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(data, *publicKey2), false);
+
+ Interest interest("/TestInterest/1");
+ BOOST_CHECK_NO_THROW(m_keyChain.signByIdentity(interest, identity));
+ BOOST_CHECK_EQUAL(Validator::verifySignature(interest, *publicKey), true);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(interest, *publicKey2), false);
+
+ Data wrongData("/TestData/2");
+ Block ecdsaSigInfoBlock(ecdsaSigInfo, sizeof(ecdsaSigInfo));
+ Block ecdsaSigValueBlock(ecdsaSigValue, sizeof(ecdsaSigValue));
+ Signature ecdsaSig(ecdsaSigInfoBlock, ecdsaSigValueBlock);
+ wrongData.setSignature(ecdsaSig);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(wrongData, *publicKey), false);
+}
+
+const uint8_t rsaSigInfo[] = {
+0x16, 0x1b, // SignatureInfo
+ 0x1b, 0x01, // SignatureType
+ 0x01,
+ 0x1c, 0x16, // KeyLocator
+ 0x07, 0x14, // Name
+ 0x08, 0x04,
+ 0x74, 0x65, 0x73, 0x74,
+ 0x08, 0x03,
+ 0x6b, 0x65, 0x79,
+ 0x08, 0x07,
+ 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72
+};
+
+const uint8_t rsaSigValue[] = {
+0x17, 0x80, // SignatureValue
+ 0x2f, 0xd6, 0xf1, 0x6e, 0x80, 0x6f, 0x10, 0xbe, 0xb1, 0x6f, 0x3e, 0x31, 0xec,
+ 0xe3, 0xb9, 0xea, 0x83, 0x30, 0x40, 0x03, 0xfc, 0xa0, 0x13, 0xd9, 0xb3, 0xc6,
+ 0x25, 0x16, 0x2d, 0xa6, 0x58, 0x41, 0x69, 0x62, 0x56, 0xd8, 0xb3, 0x6a, 0x38,
+ 0x76, 0x56, 0xea, 0x61, 0xb2, 0x32, 0x70, 0x1c, 0xb6, 0x4d, 0x10, 0x1d, 0xdc,
+ 0x92, 0x8e, 0x52, 0xa5, 0x8a, 0x1d, 0xd9, 0x96, 0x5e, 0xc0, 0x62, 0x0b, 0xcf,
+ 0x3a, 0x9d, 0x7f, 0xca, 0xbe, 0xa1, 0x41, 0x71, 0x85, 0x7a, 0x8b, 0x5d, 0xa9,
+ 0x64, 0xd6, 0x66, 0xb4, 0xe9, 0x8d, 0x0c, 0x28, 0x43, 0xee, 0xa6, 0x64, 0xe8,
+ 0x55, 0xf6, 0x1c, 0x19, 0x0b, 0xef, 0x99, 0x25, 0x1e, 0xdc, 0x78, 0xb3, 0xa7,
+ 0xaa, 0x0d, 0x14, 0x58, 0x30, 0xe5, 0x37, 0x6a, 0x6d, 0xdb, 0x56, 0xac, 0xa3,
+ 0xfc, 0x90, 0x7a, 0xb8, 0x66, 0x9c, 0x0e, 0xf6, 0xb7, 0x64, 0xd1
+};
+
+
+BOOST_AUTO_TEST_CASE(EcdsaSignatureVerification)
+{
+ Name identity("/TestValidator/EcdsaSignatureVerification");
+ BOOST_REQUIRE(addIdentity(identity, EcdsaKeyParams()));
+ Name keyName = m_keyChain.getDefaultKeyNameForIdentity(identity);
+ shared_ptr<PublicKey> publicKey = m_keyChain.getPublicKey(keyName);
+
+ Name identity2("/TestValidator/EcdsaSignatureVerification/id2");
+ BOOST_REQUIRE(addIdentity(identity2, EcdsaKeyParams()));
+ Name keyName2 = m_keyChain.getDefaultKeyNameForIdentity(identity2);
+ shared_ptr<PublicKey> publicKey2 = m_keyChain.getPublicKey(keyName2);
+
+
+ Data data("/TestData/1");
+ BOOST_CHECK_NO_THROW(m_keyChain.signByIdentity(data, identity));
+ BOOST_CHECK_EQUAL(Validator::verifySignature(data, *publicKey), true);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(data, *publicKey2), false);
+
+ Interest interest("/TestInterest/1");
+ BOOST_CHECK_NO_THROW(m_keyChain.signByIdentity(interest, identity));
+ BOOST_CHECK_EQUAL(Validator::verifySignature(interest, *publicKey), true);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(interest, *publicKey2), false);
+
+ Data wrongData("/TestData/2");
+ Block rsaSigInfoBlock(rsaSigInfo, sizeof(rsaSigInfo));
+ Block rsaSigValueBlock(rsaSigValue, sizeof(rsaSigValue));
+ Signature rsaSig(rsaSigInfoBlock, rsaSigValueBlock);
+ wrongData.setSignature(rsaSig);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(wrongData, *publicKey), false);
+}
+
+BOOST_AUTO_TEST_CASE(EcdsaSignatureVerification2)
+{
+ Name ecdsaIdentity("/SecurityTestValidator/EcdsaSignatureVerification2/ecdsa");
+ BOOST_REQUIRE(addIdentity(ecdsaIdentity, EcdsaKeyParams()));
+ Name ecdsaCertName = m_keyChain.getDefaultCertificateNameForIdentity(ecdsaIdentity);
+ shared_ptr<IdentityCertificate> ecdsaCert = m_keyChain.getCertificate(ecdsaCertName);
+
+ Name rsaIdentity("/SecurityTestValidator/EcdsaSignatureVerification2/rsa");
+ BOOST_REQUIRE(addIdentity(rsaIdentity, RsaKeyParams()));
+ Name rsaCertName = m_keyChain.getDefaultCertificateNameForIdentity(rsaIdentity);
+ shared_ptr<IdentityCertificate> rsaCert = m_keyChain.getCertificate(rsaCertName);
+
+ Name packetName("/Test/Packet/Name");
+
+ shared_ptr<Data> testDataRsa = make_shared<Data>(packetName);
+ m_keyChain.signByIdentity(*testDataRsa, rsaIdentity);
+ shared_ptr<Data> testDataEcdsa = make_shared<Data>(packetName);
+ m_keyChain.signByIdentity(*testDataEcdsa, ecdsaIdentity);
+ shared_ptr<Interest> testInterestRsa = make_shared<Interest>(packetName);
+ m_keyChain.signByIdentity(*testInterestRsa, rsaIdentity);
+ shared_ptr<Interest> testInterestEcdsa = make_shared<Interest>(packetName);
+ m_keyChain.signByIdentity(*testInterestEcdsa, ecdsaIdentity);
+
+ BOOST_CHECK(Validator::verifySignature(*ecdsaCert, ecdsaCert->getPublicKeyInfo()));
+ BOOST_CHECK_EQUAL(Validator::verifySignature(*ecdsaCert, rsaCert->getPublicKeyInfo()), false);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(*rsaCert, ecdsaCert->getPublicKeyInfo()), false);
+ BOOST_CHECK(Validator::verifySignature(*rsaCert, rsaCert->getPublicKeyInfo()));
+
+ BOOST_CHECK(Validator::verifySignature(*testDataEcdsa, ecdsaCert->getPublicKeyInfo()));
+ BOOST_CHECK_EQUAL(Validator::verifySignature(*testDataEcdsa, rsaCert->getPublicKeyInfo()), false);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(*testDataRsa, ecdsaCert->getPublicKeyInfo()), false);
+ BOOST_CHECK(Validator::verifySignature(*testDataRsa, rsaCert->getPublicKeyInfo()));
+
+ BOOST_CHECK(Validator::verifySignature(*testInterestEcdsa, ecdsaCert->getPublicKeyInfo()));
+ BOOST_CHECK_EQUAL(Validator::verifySignature(*testInterestEcdsa, rsaCert->getPublicKeyInfo()),
+ false);
+ BOOST_CHECK_EQUAL(Validator::verifySignature(*testInterestRsa, ecdsaCert->getPublicKeyInfo()),
+ false);
+ BOOST_CHECK(Validator::verifySignature(*testInterestRsa, rsaCert->getPublicKeyInfo()));
+}
+
+BOOST_AUTO_TEST_SUITE_END()
+
+} // namespace tests
+} // namespace ndn