Security CBOR conversion
[platform/upstream/iotivity.git] / resource / csdk / security / unittest / credentialresource.cpp
1 //******************************************************************
2 //
3 // Copyright 2015 Intel Mobile Communications GmbH All Rights Reserved.
4 //
5 //-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
6 //
7 // Licensed under the Apache License, Version 2.0 (the "License");
8 // you may not use this file except in compliance with the License.
9 // You may obtain a copy of the License at
10 //
11 // http://www.apache.org/licenses/LICENSE-2.0
12 //
13 // Unless required by applicable law or agreed to in writing, software
14 // distributed under the License is distributed on an "AS IS" BASIS,
15 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 // See the License for the specific language governing permissions and
17 // limitations under the License.
18 //
19 //-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
20
21 #include "gtest/gtest.h"
22 #include "logger.h"
23 #include "ocpayload.h"
24 #include "ocstack.h"
25 #include "oic_malloc.h"
26 #include "oic_string.h"
27 #include "resourcemanager.h"
28 #include "credresource.h"
29 #include "securevirtualresourcetypes.h"
30 #include "srmtestcommon.h"
31 #include "srmutility.h"
32 #include "psinterface.h"
33 #include "security_internals.h"
34
35 #define TAG "SRM-CRED-UT"
36
37 OicSecCred_t * getCredList()
38 {
39     size_t sz = 0;
40     OicSecCred_t *cred = (OicSecCred_t *)OICCalloc(1, sizeof(*cred));
41     VERIFY_NON_NULL(TAG, cred, ERROR);
42     cred->credId = 1234;
43     OICStrcpy((char *)cred->subject.id, sizeof(cred->subject.id), "subject1");
44
45 #if 0
46     cred->roleIdsLen = 2;
47     cred->roleIds = (OicSecRole_t *)OICCalloc(cred->roleIdsLen, sizeof(OicSecRole_t));
48     VERIFY_NON_NULL(TAG, cred->roleIds, ERROR);
49     OICStrcpy((char *)cred->roleIds[0].id, sizeof(cred->roleIds[0].id), "role11");
50     OICStrcpy((char *)cred->roleIds[1].id, sizeof(cred->roleIds[1].id), "role12");
51
52 #endif
53
54     cred->credType = SYMMETRIC_PAIR_WISE_KEY;
55     cred->privateData.data = (uint8_t *)OICCalloc(1, strlen("My private Key11") + 1);
56     VERIFY_NON_NULL(TAG, cred->privateData.data, ERROR);
57     OICStrcpy((char *)cred->privateData.data, strlen("My private Key11")+1,"My private Key11");
58     cred->ownersLen = 1;
59     cred->owners = (OicUuid_t *)OICCalloc(cred->ownersLen, sizeof(*cred->owners));
60     VERIFY_NON_NULL(TAG, cred->owners, ERROR);
61     OICStrcpy((char *)cred->owners[0].id, sizeof(cred->owners[0].id), "ownersId11");
62     cred->next = (OicSecCred_t*)OICCalloc(1, sizeof(*cred->next));
63     VERIFY_NON_NULL(TAG, cred->next, ERROR);
64     cred->next->credId = 5678;
65     OICStrcpy((char *)cred->next->subject.id, sizeof(cred->next->subject.id), "subject2");
66 #if 0
67     cred->next->roleIdsLen = 0;
68 #endif
69     cred->next->credType = SYMMETRIC_PAIR_WISE_KEY;
70     sz = strlen("My private Key21") + 1;
71     cred->next->privateData.data = (uint8_t *)OICCalloc(1, sz);
72     VERIFY_NON_NULL(TAG, cred->next->privateData.data, ERROR);
73     OICStrcpy((char *)cred->next->privateData.data, sz, "My private Key21");
74 #if 0
75     sz = strlen("My Public Key123") + 1
76     cred->next->publicData.data = (char *)OICCalloc(1, sz);
77     VERIFY_NON_NULL(TAG, cred->next->publicData.data, ERROR);
78     OICStrcpy(cred->next->publicData.data, sz,"My Public Key123");
79 #endif
80     cred->next->ownersLen = 2;
81     cred->next->owners = (OicUuid_t *)OICCalloc(cred->next->ownersLen, sizeof(*cred->next->owners));
82     VERIFY_NON_NULL(TAG, cred->next->owners, ERROR);
83     OICStrcpy((char *)cred->next->owners[0].id, sizeof(cred->next->owners[0].id), "ownersId21");
84     OICStrcpy((char *)cred->next->owners[1].id, sizeof(cred->next->owners[1].id), "ownersId22");
85
86     return cred;
87
88 exit:
89     if(cred)
90     {
91         DeleteCredList(cred);
92         cred = NULL;
93     }
94     return cred;
95 }
96
97 static void printCred(const OicSecCred_t * cred)
98 {
99     EXPECT_TRUE(NULL != cred);
100
101     const OicSecCred_t *credTmp1 = NULL;
102     for (credTmp1 = cred; credTmp1; credTmp1 = credTmp1->next)
103     {
104         OIC_LOG_V(INFO, TAG, "\ncred->credId = %d", credTmp1->credId);
105         OIC_LOG_V(INFO, TAG, "cred->subject.id = %s", credTmp1->subject.id);
106         OIC_LOG_V(INFO, TAG, "cred->credType = %d", credTmp1->credType);
107         if(credTmp1->privateData.data)
108         {
109             OIC_LOG_V(INFO, TAG, "cred->privateData.data = %s", credTmp1->privateData.data);
110         }
111 #ifdef __WITH_X509__
112         if(credTmp1->publicData.data)
113         {
114            OIC_LOG_V(INFO, TAG, "cred->publicData.data = %s", credTmp1->publicData.data);
115         }
116 #endif /* __WITH_X509__ */
117         OIC_LOG_V(INFO, TAG, "cred->ownersLen = %zu", credTmp1->ownersLen);
118         for(size_t i = 0; i < cred->ownersLen; i++)
119         {
120             OIC_LOG_V(INFO, TAG, "cred->owners[%zu].id = %s", i, credTmp1->owners[i].id);
121         }
122     }
123 }
124
125  //InitCredResource Tests
126 TEST(CredResourceTest, InitCredResource)
127 {
128     EXPECT_EQ(OC_STACK_INVALID_PARAM, InitCredResource());
129 }
130
131 //DeInitCredResource Tests
132 TEST(CredResourceTest, DeInitCredResource)
133 {
134     EXPECT_EQ(OC_STACK_INVALID_PARAM, DeInitCredResource());
135 }
136
137 //CreateCredResource Tests
138 TEST(CredResourceTest, CreateCredResource)
139 {
140     EXPECT_EQ(OC_STACK_INVALID_PARAM, CreateCredResource());
141 }
142
143  //CredEntityHandler Tests
144 TEST(CredResourceTest, CredEntityHandlerWithDummyRequest)
145 {
146     OCEntityHandlerRequest req = OCEntityHandlerRequest();
147     EXPECT_EQ(OC_EH_ERROR,
148             CredEntityHandler(OCEntityHandlerFlag::OC_REQUEST_FLAG, &req, NULL));
149 }
150
151 TEST(CredResourceTest, CredEntityHandlerWithNULLRequest)
152 {
153     EXPECT_EQ(OC_EH_ERROR,
154             CredEntityHandler(OCEntityHandlerFlag::OC_REQUEST_FLAG, NULL, NULL));
155 }
156
157 TEST(CredResourceTest, CredEntityHandlerInvalidFlag)
158 {
159     OCEntityHandlerRequest req = OCEntityHandlerRequest();
160     EXPECT_EQ(OC_EH_ERROR,
161             CredEntityHandler(OCEntityHandlerFlag::OC_OBSERVE_FLAG, &req, NULL));
162 }
163
164 //Cred DELETE request
165 TEST(CredResourceTest, CredEntityHandlerDeleteTest)
166 {
167     OCEntityHandlerRequest ehReq =  OCEntityHandlerRequest();
168     static OCPersistentStorage ps =  OCPersistentStorage();
169     const OicSecCred_t* subjectCred1 = NULL;
170     const OicSecCred_t* subjectCred2 = NULL;
171     OCEntityHandlerResult ehRet = OC_EH_ERROR;
172     char query[] = "sub=c3ViamVjdDE="; //base64 Encoding of subject1
173
174     SetPersistentHandler(&ps, true);
175
176     OicSecCred_t *cred = getCredList();
177     ASSERT_TRUE(NULL != cred);
178
179     uint8_t *payload = NULL;
180     size_t size = 0;
181     EXPECT_EQ(OC_STACK_OK, CredToCBORPayload(cred, &payload, &size));
182     if (!payload)
183     {
184         DeleteCredList(cred);
185     }
186     ASSERT_TRUE(NULL != payload);
187
188     // Create Entity Handler POST request payload
189     ehReq.method = OC_REST_POST;
190     ehReq.payload = (OCPayload *)OCSecurityPayloadCBORCreate(payload, size);
191     if (!ehReq.payload)
192     {
193         OICFree(payload);
194         DeleteCredList(cred);
195     }
196     ASSERT_TRUE( NULL != ehReq.payload);
197     EXPECT_EQ(OC_EH_ERROR, CredEntityHandler(OC_REQUEST_FLAG, &ehReq, NULL));
198
199     // Verify if SRM contains Credential for the subject
200     subjectCred1 = GetCredResourceData(&cred->subject);
201     EXPECT_TRUE(NULL != subjectCred1);
202
203    // Create Entity Handler DELETE request
204    ehReq.method = OC_REST_DELETE;
205    ehReq.query = (char *)OICCalloc(1, strlen(query)+1);
206    if (!ehReq.query)
207    {
208        OICFree(payload);
209        DeleteCredList(cred);
210    }
211    ASSERT_TRUE(NULL != ehReq.query);
212    OICStrcpy(ehReq.query, strlen(query)+1, query);
213
214    ehRet = CredEntityHandler(OC_REQUEST_FLAG, &ehReq, NULL);
215    EXPECT_EQ(OC_EH_ERROR, ehRet);
216
217    // Verify if SRM has deleted ACE for the subject
218    subjectCred2 = GetCredResourceData(&cred->subject);
219    EXPECT_TRUE(NULL == subjectCred2);
220
221    // Perform cleanup
222    OICFree(ehReq.query);
223    OICFree(payload);
224    DeInitCredResource();
225    DeleteCredList(cred);
226    OCPayloadDestroy((OCPayload *)ehReq.payload);
227 }
228
229 TEST(CredResourceTest, CredToCBORPayloadNULL)
230 {
231     OicSecCred_t *cred = getCredList();
232     EXPECT_EQ(OC_STACK_INVALID_PARAM, CredToCBORPayload(NULL, NULL, 0));
233     size_t size = 0;
234     uint8_t *cborPayload = (uint8_t *) OICCalloc(1, 10);
235     if (!cborPayload)
236     {
237         DeleteCredList(cred);
238     }
239     ASSERT_TRUE(NULL != cborPayload);
240     EXPECT_EQ(OC_STACK_INVALID_PARAM, CredToCBORPayload(cred, &cborPayload, &size));
241     OICFree(cborPayload);
242     cborPayload = NULL;
243     EXPECT_EQ(OC_STACK_INVALID_PARAM, CredToCBORPayload(NULL, &cborPayload, &size));
244     EXPECT_EQ(OC_STACK_INVALID_PARAM, CredToCBORPayload(cred, &cborPayload, 0));
245     EXPECT_EQ(OC_STACK_INVALID_PARAM, CredToCBORPayload(cred, NULL, &size));
246     DeleteCredList(cred);
247 }
248
249 TEST(CredResourceTest, CredToCBORPayloadVALID)
250 {
251     uint8_t* payload = NULL;
252     size_t size = 0;
253     OicSecCred_t *cred = getCredList();
254
255     EXPECT_EQ(OC_STACK_OK, CredToCBORPayload(cred, &payload, &size));
256     if (!payload)
257     {
258         DeleteCredList(cred);
259     }
260     ASSERT_TRUE(NULL != payload);
261
262     DeleteCredList(cred);
263     OICFree(payload);
264 }
265
266 TEST(CredResourceTest, CBORPayloadToCredVALID)
267 {
268     OicSecCred_t *cred1 = getCredList();
269
270     uint8_t *payload = NULL;
271     size_t size = 0;
272     EXPECT_EQ(OC_STACK_OK, CredToCBORPayload(cred1, &payload, &size));
273     DeleteCredList(cred1);
274     ASSERT_TRUE(NULL != payload);
275
276     OicSecCred_t *cred2 = NULL;
277     EXPECT_EQ(OC_STACK_OK, CBORPayloadToCred(payload, size, &cred2));
278     OICFree(payload);
279     ASSERT_TRUE(cred2 != NULL);
280     DeleteCredList(cred2);
281 }
282
283 TEST(CredResourceTest, CBORPayloadToCredNULL)
284 {
285     OicSecCred_t *cred = NULL;
286     EXPECT_EQ(OC_STACK_INVALID_PARAM, CBORPayloadToCred(NULL, 0, NULL));
287     uint8_t *cborPayload = (uint8_t *) OICCalloc(1, 10);
288     ASSERT_TRUE(NULL != cborPayload);
289     EXPECT_EQ(OC_STACK_INVALID_PARAM, CBORPayloadToCred(NULL, 0, &cred));
290     EXPECT_EQ(OC_STACK_INVALID_PARAM, CBORPayloadToCred(cborPayload, 0, NULL));
291     cred = getCredList();
292     EXPECT_EQ(OC_STACK_INVALID_PARAM, CBORPayloadToCred(cborPayload, 0, &cred));
293     DeleteCredList(cred);
294     OICFree(cborPayload);
295 }
296
297 //GetCredResourceData Test
298 TEST(CredResourceTest, GetCredResourceDataNULLSubject)
299 {
300     EXPECT_EQ(NULL, GetCredResourceData(NULL));
301 }
302
303 TEST(CredResourceTest, GenerateCredentialValidInput)
304 {
305     OicUuid_t owners[1];
306     OICStrcpy((char *)owners[0].id, strlen("ownersId21"), "ownersId21");
307
308     OicUuid_t subject = {{0}};
309     OICStrcpy((char *)subject.id, strlen("subject11"), "subject11");
310
311     uint8_t privateKey[] = "My private Key11";
312     OicSecKey_t key = {privateKey, sizeof(privateKey)};
313
314     OicSecCred_t * cred  = NULL;
315
316     cred = GenerateCredential(&subject, SYMMETRIC_PAIR_WISE_KEY, NULL,
317                               &key, 1, owners);
318     printCred(cred);
319
320     ASSERT_TRUE(NULL != cred);
321     DeleteCredList(cred);
322 }
323
324 TEST(CredResourceTest, GenerateAndAddCredentialValidInput)
325 {
326     OicUuid_t owners[1];
327     OICStrcpy((char *)owners[0].id, sizeof(owners[0].id), "ownersId11");
328
329     OicUuid_t subject = {{0}};
330     OICStrcpy((char *)subject.id, sizeof(subject.id), "subject11");
331
332     uint8_t privateKey[] = "My private Key11";
333     OicSecKey_t key = {privateKey, sizeof(privateKey)};
334
335     OicSecCred_t *cred1  = NULL;
336     OicSecCred_t *headCred = NULL;
337
338     cred1 = GenerateCredential(&subject, SYMMETRIC_PAIR_WISE_KEY, NULL,
339                                &key, 1, owners);
340
341     EXPECT_EQ(OC_STACK_OK, AddCredential(cred1));
342     headCred = cred1;
343
344     OICStrcpy((char *)owners[0].id, sizeof(owners[0].id), "ownersId22");
345     OICStrcpy((char *)subject.id, sizeof(subject.id), "subject22");
346     cred1 = GenerateCredential(&subject, SYMMETRIC_PAIR_WISE_KEY, NULL,
347                                &key, 1, owners);
348     EXPECT_EQ(OC_STACK_OK, AddCredential(cred1));
349
350     OICStrcpy((char *)owners[0].id, sizeof(owners[0].id), "ownersId33");
351     OICStrcpy((char *)subject.id, sizeof(subject.id), "subject33");
352     cred1 = GenerateCredential(&subject, SYMMETRIC_PAIR_WISE_KEY, NULL,
353                                &key, 1, owners);
354     EXPECT_EQ(OC_STACK_OK, AddCredential(cred1));
355
356     const OicSecCred_t* credList = GetCredResourceData(&headCred->subject);
357
358     printCred(credList);
359
360     DeleteCredList(headCred);
361 }
362
363 #if 0
364 TEST(CredGetResourceDataTest, GetCredResourceDataValidSubject)
365 {
366     OicSecCred_t* cred = getCredList();
367     EXPECT_TRUE(NULL != GetCredResourceData(cred->subject));
368 }
369 #endif