BOOST_FIXTURE_TEST_CASE(Exemption, CommandInterestFixture) { KeyChain keyChain; Name identity("/TestCommandInterest/AnyKey"); Name certName; BOOST_REQUIRE_NO_THROW(certName = keyChain.createIdentity(identity)); CommandInterestGenerator generator; CommandInterestValidator validator; validator.addInterestBypassRule("^<TestCommandInterest><Exemption>"); //Test a legitimate command shared_ptr<Interest> commandInterest1 = make_shared<Interest>("/TestCommandInterest/Exemption/Command1"); generator.generateWithIdentity(*commandInterest1, identity); validator.validate(*commandInterest1, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, true); BOOST_CHECK_NO_THROW(keyChain.deleteIdentity(identity)); }
int ndnsec_delete(int argc, char** argv) { using namespace ndn; namespace po = boost::program_options; bool isDeleteKey = false; bool isDeleteCert = false; std::string name; po::options_description description("General Usage\n" "ndnsec delete [-h] [-k|c] name\n" "General options"); description.add_options() ("help,h", "produce help message") ("delete-key,k", "(Optional) delete a key if specified.") ("delete-key2,K", "(Optional) delete a key if specified.") ("delete-cert,c", "(Optional) delete a certificate if specified.") ("delete-cert2,C", "(Optional) delete a certificate if specified.") ("name,n", po::value<std::string>(&name), "By default, it refers to an identity." "If -k is specified, it refers to a key." "If -c is specified, it refers to a certificate."); ; po::positional_options_description p; p.add("name", 1); po::variables_map vm; try { po::store(po::command_line_parser(argc, argv).options(description).positional(p).run(), vm); po::notify(vm); } catch (const std::exception& e) { std::cerr << "ERROR: " << e.what() << std::endl; std::cerr << description << std::endl; return 2; } if (vm.count("help") != 0) { std::cerr << description << std::endl;; return 0; } if (vm.count("name") == 0) { std::cerr << "ERROR: name must be specified" << std::endl; std::cerr << description << std::endl; return 2; } if (vm.count("delete-cert") != 0 || vm.count("delete-cert2") != 0) isDeleteCert = true; else if (vm.count("delete-key") != 0 || vm.count("delete-key2") != 0) isDeleteKey = true; KeyChain keyChain; try { if (isDeleteCert) { if (!keyChain.doesCertificateExist(name)) { std::cerr << "ERROR: Certificate does not exist: " << name << std::endl; return 1; } keyChain.deleteCertificate(name); std::cerr << "OK: Delete certificate: " << name << std::endl; } else if (isDeleteKey) { if (!keyChain.doesPublicKeyExist(name) && !keyChain.doesKeyExistInTpm(name, KEY_CLASS_PRIVATE)) { std::cerr << "ERROR: Key does not exist: " << name << std::endl; return 1; } keyChain.deleteKey(name); std::cerr << "OK: Delete key: " << name << std::endl; } else { if (!keyChain.doesIdentityExist(name)) { std::cerr << "ERROR: Identity does not exist: " << name << std::endl; return 1; } keyChain.deleteIdentity(name); std::cerr << "OK: Delete identity: " << name << std::endl; } } catch (const SecPublicInfo::Error& e) { std::cerr << "ERROR: Cannot delete the item: " << e.what() << std::endl; return 2; } catch (const SecTpm::Error& e) { std::cerr << "ERROR: Cannot delete the item: " << e.what() << std::endl; return 2; } catch (const KeyChain::Error& e) { std::cerr << "ERROR: " << e.what() << std::endl; return 2; } return 0; }
BOOST_FIXTURE_TEST_CASE(CommandInterest, CommandInterestFixture) { KeyChain keyChain; Name identity("/TestCommandInterest/Validation"); identity.appendVersion(); Name certName; BOOST_REQUIRE_NO_THROW(certName = keyChain.createIdentity(identity)); CommandInterestGenerator generator; CommandInterestValidator validator; validator.addInterestRule("^<TestCommandInterest><Validation>", *keyChain.getCertificate(certName)); //Test a legitimate command shared_ptr<Interest> commandInterest1 = make_shared<Interest>("/TestCommandInterest/Validation/Command1"); generator.generateWithIdentity(*commandInterest1, identity); validator.validate(*commandInterest1, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, true); //Test an outdated command reset(); shared_ptr<Interest> commandInterest2 = make_shared<Interest>("/TestCommandInterest/Validation/Command2"); time::milliseconds timestamp = time::toUnixTimestamp(time::system_clock::now()); timestamp -= time::seconds(5); Name commandName = commandInterest2->getName(); commandName .appendNumber(timestamp.count()) .appendNumber(random::generateWord64()); commandInterest2->setName(commandName); keyChain.signByIdentity(*commandInterest2, identity); validator.validate(*commandInterest2, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, false); //Test an unauthorized command Name identity2("/TestCommandInterest/Validation2"); Name certName2; BOOST_REQUIRE_NO_THROW(certName2 = keyChain.createIdentity(identity2)); shared_ptr<Interest> commandInterest3 = make_shared<Interest>("/TestCommandInterest/Validation/Command3"); generator.generateWithIdentity(*commandInterest3, identity2); validator.validate(*commandInterest3, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, false); //Test another unauthorized command shared_ptr<Interest> commandInterest4 = make_shared<Interest>("/TestCommandInterest/Validation2/Command"); generator.generateWithIdentity(*commandInterest4, identity); validator.validate(*commandInterest4, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, false); BOOST_CHECK_NO_THROW(keyChain.deleteIdentity(identity)); BOOST_CHECK_NO_THROW(keyChain.deleteIdentity(identity2)); }
int ndnsec_delete(int argc, char** argv) { using namespace ndn; namespace po = boost::program_options; // bool deleteId = true; bool isDeleteKey = false; bool isDeleteCert = false; std::string name; po::options_description description("General Usage\n ndnsec delete [-h] [-k|c] name\nGeneral options"); description.add_options() ("help,h", "produce help message") ("delete-key,k", "(Optional) delete a key if specified.") ("delete-key2,K", "(Optional) delete a key if specified.") ("delete-cert,c", "(Optional) delete a certificate if specified.") ("delete-cert2,C", "(Optional) delete a certificate if specified.") ("name,n", po::value<std::string>(&name), "By default, it refers to an identity." "If -k is specified, it refers to a key." "If -c is specified, it refers to a certificate."); ; po::positional_options_description p; p.add("name", 1); po::variables_map vm; try { po::store(po::command_line_parser(argc, argv).options(description).positional(p).run(), vm); po::notify(vm); } catch (const std::exception& e) { std::cerr << "ERROR: " << e.what() << std::endl; std::cerr << description << std::endl; return 1; } if (vm.count("help") != 0) { std::cerr << description << std::endl;; return 0; } if (vm.count("name") == 0) { std::cerr << "ERROR: name must be specified" << std::endl; std::cerr << description << std::endl; return 1; } if (vm.count("delete-cert") != 0 || vm.count("delete-cert2") != 0) { isDeleteCert = true; // deleteId = false; } else if (vm.count("delete-key") != 0 || vm.count("delete-key2") != 0) { isDeleteKey = true; // deleteId = false; } KeyChain keyChain; if (isDeleteCert) { keyChain.deleteCertificate(name); } else if (isDeleteKey) { keyChain.deleteKey(name); } else { keyChain.deleteIdentity(name); } return 0; }