blob: 46eccb25d63080cf79615307ab988fa369be8446 [file] [log] [blame]
Zhiyi Zhang0a89b722017-04-28 17:56:01 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2/**
tylerliu182bc532020-09-25 01:54:45 -07003 * Copyright (c) 2017-2020, Regents of the University of California.
Zhiyi Zhang0a89b722017-04-28 17:56:01 -07004 *
5 * This file is part of ndncert, a certificate management system based on NDN.
6 *
7 * ndncert is free software: you can redistribute it and/or modify it under the terms
8 * of the GNU General Public License as published by the Free Software Foundation, either
9 * version 3 of the License, or (at your option) any later version.
10 *
11 * ndncert is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License along with
16 * ndncert, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
17 *
18 * See AUTHORS.md for complete list of ndncert authors and contributors.
19 */
20
Zhiyi Zhang8bd8e5b2020-09-29 17:40:40 -070021#include "challenge-modules/challenge-credential.hpp"
Zhiyi Zhang5d80e1e2020-09-25 11:34:54 -070022#include "test-common.hpp"
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070023#include <ndn-cxx/security/signing-helpers.hpp>
24#include <ndn-cxx/util/io.hpp>
25
26namespace ndn {
27namespace ndncert {
28namespace tests {
29
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070030BOOST_FIXTURE_TEST_SUITE(TestChallengeCredential, IdentityManagementFixture)
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070031
32BOOST_AUTO_TEST_CASE(LoadConfig)
33{
34 ChallengeCredential challenge("./tests/unit-tests/challenge-credential.conf.test");
Zhiyi Zhang70fe2582017-05-19 15:01:03 -070035 BOOST_CHECK_EQUAL(challenge.CHALLENGE_TYPE, "Credential");
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070036
Zhiyi Zhang70fe2582017-05-19 15:01:03 -070037 challenge.parseConfigFile();
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070038 BOOST_CHECK_EQUAL(challenge.m_trustAnchors.size(), 1);
39 auto cert = challenge.m_trustAnchors.front();
40 BOOST_CHECK_EQUAL(cert.getName(),
41 "/ndn/site1/KEY/%11%BC%22%F4c%15%FF%17/self/%FD%00%00%01Y%C8%14%D9%A5");
42}
43
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070044BOOST_AUTO_TEST_CASE(HandleChallengeRequest)
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070045{
46 // create trust anchor
47 ChallengeCredential challenge("./tests/unit-tests/challenge-credential.conf.test");
Zhiyi Zhang70fe2582017-05-19 15:01:03 -070048 auto identity = addIdentity(Name("/trust"));
49 auto key = identity.getDefaultKey();
50 auto trustAnchor = key.getDefaultCertificate();
51 challenge.parseConfigFile();
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070052 challenge.m_trustAnchors.front() = trustAnchor;
53
54 // create certificate request
Zhiyi Zhang70fe2582017-05-19 15:01:03 -070055 auto identityA = addIdentity(Name("/example"));
56 auto keyA = identityA.getDefaultKey();
57 auto certA = key.getDefaultCertificate();
Zhiyi Zhange232a742020-09-29 17:34:17 -070058 RequestState request(Name("/example"), "123", RequestType::NEW, Status::BEFORE_CHALLENGE, certA);
Zhiyi Zhang70fe2582017-05-19 15:01:03 -070059
tylerliu05405f52020-09-29 12:27:23 -070060 // create requester's credential
Zhiyi Zhang70fe2582017-05-19 15:01:03 -070061 auto identityB = addIdentity(Name("/trust/cert"));
62 auto keyB = identityB.getDefaultKey();
tylerliu05405f52020-09-29 12:27:23 -070063 auto credentialName = Name(keyB.getName()).append("Credential").appendVersion();
64 security::v2::Certificate credential;
65 credential.setName(credentialName);
66 credential.setContent(keyB.getPublicKey().data(), keyB.getPublicKey().size());
67 SignatureInfo signatureInfo;
68 signatureInfo.setValidityPeriod(security::ValidityPeriod(system_clock::now(), system_clock::now() + time::minutes(1)));
69 m_keyChain.sign(credential, signingByCertificate(trustAnchor).setSignatureInfo(signatureInfo));
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070070
tylerliu05405f52020-09-29 12:27:23 -070071 // using private key to sign cert request
72 Name idSignatureName = credential.getKeyName();
73 idSignatureName.append("request-id-signature").appendVersion();
74 security::v2::Certificate idSignature;
75 idSignature.setName(idSignatureName);
76 idSignature.setContent(makeStringBlock(tlv::Content, "123"));
77 m_keyChain.sign(idSignature, signingByCertificate(credential));
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070078
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070079 std::stringstream ss;
tylerliu05405f52020-09-29 12:27:23 -070080 io::save<security::v2::Certificate>(idSignature, ss);
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070081 auto checkCert = *(io::load<security::v2::Certificate>(ss));
tylerliu05405f52020-09-29 12:27:23 -070082 BOOST_CHECK_EQUAL(checkCert, idSignature);
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070083 ss.str("");
84 ss.clear();
85
tylerliu05405f52020-09-29 12:27:23 -070086 io::save<security::v2::Certificate>(idSignature, ss);
87 std::string idSignatureStr = ss.str();
Zhiyi Zhang0a89b722017-04-28 17:56:01 -070088 ss.str("");
89 ss.clear();
90
tylerliu05405f52020-09-29 12:27:23 -070091 io::save<security::v2::Certificate>(credential, ss);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070092 std::string credentialStr = ss.str();
Zhiyi Zhang70fe2582017-05-19 15:01:03 -070093 ss.str("");
94 ss.clear();
Zhiyi Zhang70fe2582017-05-19 15:01:03 -070095
Suyong Won44d0cce2020-05-10 04:07:43 -070096 Block params = makeEmptyBlock(tlv_encrypted_payload);
Zhiyi Zhang22998612020-09-25 14:43:23 -070097 params.push_back(makeStringBlock(tlv_selected_challenge, "Credential"));
Zhiyi Zhang46049832020-09-28 17:08:12 -070098 params.push_back(makeStringBlock(tlv_parameter_key, ChallengeCredential::PARAMETER_KEY_CREDENTIAL_CERT));
Suyong Won44d0cce2020-05-10 04:07:43 -070099 params.push_back(makeStringBlock(tlv_parameter_value, credentialStr));
Zhiyi Zhang46049832020-09-28 17:08:12 -0700100 params.push_back(makeStringBlock(tlv_parameter_key, ChallengeCredential::PARAMETER_KEY_PROOF_OF_PRIVATE_KEY));
tylerliu05405f52020-09-29 12:27:23 -0700101 params.push_back(makeStringBlock(tlv_parameter_value, idSignatureStr));
Zhiyi Zhang22998612020-09-25 14:43:23 -0700102 params.encode();
Suyong Won44d0cce2020-05-10 04:07:43 -0700103
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700104 challenge.handleChallengeRequest(params, request);
Zhiyi Zhang48f23782020-09-28 12:11:24 -0700105 BOOST_CHECK(request.m_status == Status::PENDING);
Zhiyi Zhang0a89b722017-04-28 17:56:01 -0700106}
107
108BOOST_AUTO_TEST_SUITE_END()
109
Zhiyi Zhang5d80e1e2020-09-25 11:34:54 -0700110} // namespace tests
111} // namespace ndncert
112} // namespace ndn