int ndnsec_cert_dump(int argc, char** argv) { using namespace ndn; namespace po = boost::program_options; std::string name; bool isKeyName = false; bool isIdentityName = false; bool isCertName = true; // bool isFileName = false; bool isPretty = false; bool isStdOut = true; bool isRepoOut = false; std::string repoHost; std::string repoPort; // bool isDnsOut = false; po::options_description description("General Usage\n" " ndnsec cert-dump [-h] [-p] [-d] [-r [-H repo-host] " "[-P repo-port] ] [-i|k|f] name\n" "General options"); description.add_options() ("help,h", "produce help message") ("pretty,p", "display certificate in human readable format") ("identity,i", "treat the name parameter as identity name (e.g., /ndn/edu/ucla/alice") ("key,k", "treat the name parameter as key name " "(e.g., /ndn/edu/ucla/alice/ksk-123456789)") ("file,f", "treat the name parameter as file name with base64 encoded certificate, " "- for stdin") ("repo-output,r", "publish the certificate to the repo-ng") ("repo-host,H", po::value<std::string>(&repoHost)->default_value("localhost"), "the repo host if repo-output is specified") ("repo-port,P", po::value<std::string>(&repoPort)->default_value("7376"), "the repo port if repo-output is specified") // ("dns-output,d", "published the certificate to NDNS") ("name,n", po::value<std::string>(&name), "unless overridden with --identity or --key parameter, the certificate name, " "for example, /ndn/edu/ucla/KEY/cs/alice/ksk-1234567890" "/ID-CERT/%FD%FF%FF%FF%FF%FF%FF%FF") ; po::positional_options_description p; p.add("name", 1); po::variables_map vm; try { po::store(po::command_line_parser(argc, argv).options(description).positional(p).run(), vm); po::notify(vm); } catch (const std::exception& e) { std::cerr << "ERROR: " << e.what() << std::endl; std::cerr << description << std::endl; return 1; } if (vm.count("help") != 0) { std::cerr << description << std::endl; return 0; } if (vm.count("name") == 0) { std::cerr << "identity_name must be specified" << std::endl; std::cerr << description << std::endl; return 1; } if (vm.count("key") != 0) { isCertName = false; isKeyName = true; } else if (vm.count("identity") != 0) { isCertName = false; isIdentityName = true; } else if (vm.count("file") != 0) { isCertName = false; // isFileName = true; } if (vm.count("pretty") != 0) isPretty = true; if (vm.count("repo-output") != 0) { isRepoOut = true; isStdOut = false; } else if (vm.count("dns-output") != 0) { // isDnsOut = true; isStdOut = false; std::cerr << "Error: DNS output is not supported yet!" << std::endl; return 1; } if (isPretty && !isStdOut) { std::cerr << "Error: pretty option can only be specified when other " << "output option is specified" << std::endl; return 1; } shared_ptr<IdentityCertificate> certificate; KeyChain keyChain; if (isIdentityName || isKeyName || isCertName) { if (isIdentityName) { Name certName = keyChain.getDefaultCertificateNameForIdentity(name); certificate = keyChain.getCertificate(certName); } else if (isKeyName) { Name certName = keyChain.getDefaultCertificateNameForKey(name); certificate = keyChain.getCertificate(certName); } else certificate = keyChain.getCertificate(name); if (!static_cast<bool>(certificate)) { std::cerr << "No certificate found!" << std::endl; return 1; } } else { certificate = getIdentityCertificate(name); if (!static_cast<bool>(certificate)) { std::cerr << "No certificate read!" << std::endl; return 1; } } if (isPretty) { std::cout << *certificate << std::endl; } else { if (isStdOut) { io::save(*certificate, std::cout); return 0; } if (isRepoOut) { using namespace boost::asio::ip; tcp::iostream request_stream; request_stream.expires_from_now(boost::posix_time::milliseconds(3000)); request_stream.connect(repoHost, repoPort); if (!request_stream) { std::cerr << "fail to open the stream!" << std::endl; return 1; } request_stream.write(reinterpret_cast<const char*>(certificate->wireEncode().wire()), certificate->wireEncode().size()); return 0; } } return 0; }
BOOST_FIXTURE_TEST_CASE(CommandInterest, CommandInterestFixture) { KeyChain keyChain; Name identity("/TestCommandInterest/Validation"); identity.appendVersion(); Name certName; BOOST_REQUIRE_NO_THROW(certName = keyChain.createIdentity(identity)); CommandInterestGenerator generator; CommandInterestValidator validator; validator.addInterestRule("^<TestCommandInterest><Validation>", *keyChain.getCertificate(certName)); //Test a legitimate command shared_ptr<Interest> commandInterest1 = make_shared<Interest>("/TestCommandInterest/Validation/Command1"); generator.generateWithIdentity(*commandInterest1, identity); validator.validate(*commandInterest1, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, true); //Test an outdated command reset(); shared_ptr<Interest> commandInterest2 = make_shared<Interest>("/TestCommandInterest/Validation/Command2"); time::milliseconds timestamp = time::toUnixTimestamp(time::system_clock::now()); timestamp -= time::seconds(5); Name commandName = commandInterest2->getName(); commandName .appendNumber(timestamp.count()) .appendNumber(random::generateWord64()); commandInterest2->setName(commandName); keyChain.signByIdentity(*commandInterest2, identity); validator.validate(*commandInterest2, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, false); //Test an unauthorized command Name identity2("/TestCommandInterest/Validation2"); Name certName2; BOOST_REQUIRE_NO_THROW(certName2 = keyChain.createIdentity(identity2)); shared_ptr<Interest> commandInterest3 = make_shared<Interest>("/TestCommandInterest/Validation/Command3"); generator.generateWithIdentity(*commandInterest3, identity2); validator.validate(*commandInterest3, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, false); //Test another unauthorized command shared_ptr<Interest> commandInterest4 = make_shared<Interest>("/TestCommandInterest/Validation2/Command"); generator.generateWithIdentity(*commandInterest4, identity); validator.validate(*commandInterest4, bind(&CommandInterestFixture::validated, this, _1), bind(&CommandInterestFixture::validationFailed, this, _1, _2)); BOOST_CHECK_EQUAL(m_validity, false); BOOST_CHECK_NO_THROW(keyChain.deleteIdentity(identity)); BOOST_CHECK_NO_THROW(keyChain.deleteIdentity(identity2)); }