/// <summary> /// Generate an RSA key pair according to keySize_. /// </summary> /// /// <param name="privateKeyBlob"></param> /// <param name="publicKeyBlob"></param> private void generateKeyPair(Blob[] privateKeyBlob, Blob[] publicKeyBlob) { RsaKeyParams paras = new RsaKeyParams(keySize_); DecryptKey privateKey; try { privateKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(paras); } catch (Exception ex) { // We don't expect this error. throw new Exception("Error in RsaAlgorithm.generateKey: " + ex.Message); } privateKeyBlob[0] = privateKey.getKeyBits(); EncryptKey publicKey; try { publicKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.deriveEncryptKey(privateKeyBlob[0]); } catch (InvalidKeySpecException ex_0) { // We don't expect this error. throw new Exception("Error in RsaAlgorithm.deriveEncryptKey: " + ex_0.Message); } catch (DerDecodingException ex_1) { // We don't expect this error. throw new Exception("Error in RsaAlgorithm.deriveEncryptKey: " + ex_1.Message); } publicKeyBlob[0] = publicKey.getKeyBits(); }
/// <summary> /// Generate a new random decrypt key for RSA based on the given params. /// </summary> /// /// <param name="params">The key params with the key size (in bits).</param> /// <returns>The new decrypt key (PKCS8-encoded private key).</returns> public static DecryptKey generateKey(RsaKeyParams paras) { KeyPairGenerator generator = System.KeyPairGenerator.getInstance("RSA"); generator.initialize(paras.getKeySize()); KeyPair pair = generator.generateKeyPair(); return(new DecryptKey(new Blob(pair.getPrivate().getEncoded(), false))); }
/// <summary> /// Generate an RSA key pair according to keySize_. /// </summary> /// /// <param name="privateKeyBlob"></param> /// <param name="publicKeyBlob"></param> private void generateKeyPair(Blob[] privateKeyBlob, Blob[] publicKeyBlob) { RsaKeyParams paras = new RsaKeyParams(keySize_); DecryptKey privateKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(paras); privateKeyBlob[0] = privateKey.getKeyBits(); EncryptKey publicKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.deriveEncryptKey(privateKeyBlob[0]); publicKeyBlob[0] = publicKey.getKeyBits(); }
static internal void generateRsaKeys(Blob[] encryptionKeyBlob, Blob[] decryptionKeyBlob) { RsaKeyParams paras = new RsaKeyParams(); DecryptKey decryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(paras); decryptionKeyBlob[0] = decryptKey.getKeyBits(); EncryptKey encryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm .deriveEncryptKey(decryptionKeyBlob[0]); encryptionKeyBlob[0] = encryptKey.getKeyBits(); }
public void testContentAsymmetricEncryptSmall() { /* foreach */ foreach (TestEncryptor.AsymmetricEncryptInput input in encryptorRsaTestInputs) { Blob rawContent = new Blob(toBuffer(new int[] { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x63, 0x6f, 0x6e, 0x74, 0x65, 0x6e, 0x74, 0x73 }), false); Data data = new Data(); RsaKeyParams rsaParams = new RsaKeyParams(1024); Name keyName = new Name("test"); DecryptKey decryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(rsaParams); EncryptKey encryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.deriveEncryptKey(decryptKey .getKeyBits()); Blob eKey = encryptKey.getKeyBits(); Blob dKey = decryptKey.getKeyBits(); EncryptParams encryptParams = new EncryptParams(input.type()); net.named_data.jndn.encrypt.algo.Encryptor.encryptData(data, rawContent, keyName, eKey, encryptParams); Assert.AssertEquals(input.testName(), new Name("/FOR").append(keyName), data.getName()); EncryptedContent extractContent = new EncryptedContent(); extractContent.wireDecode(data.getContent()); Assert.AssertEquals(input.testName(), keyName, extractContent .getKeyLocator().getKeyName()); Assert.AssertEquals(input.testName(), 0, extractContent.getInitialVector() .size()); Assert.AssertEquals(input.testName(), input.type(), extractContent.getAlgorithmType()); Blob recovered = extractContent.getPayload(); Blob decrypted = net.named_data.jndn.encrypt.algo.RsaAlgorithm.decrypt(dKey, recovered, encryptParams); Assert.AssertTrue(input.testName(), rawContent.equals(decrypted)); } }
internal void createEncryptionKey(Name eKeyName, Name timeMarker) { RsaKeyParams paras = new RsaKeyParams(); eKeyName = new Name(eKeyName); eKeyName.append(timeMarker); Blob dKeyBlob = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(paras).getKeyBits(); Blob eKeyBlob = net.named_data.jndn.encrypt.algo.RsaAlgorithm.deriveEncryptKey(dKeyBlob).getKeyBits(); ILOG.J2CsMapping.Collections.Collections.Put(decryptionKeys, eKeyName, dKeyBlob); Data keyData = new Data(eKeyName); keyData.setContent(eKeyBlob); keyChain.sign(keyData, certificateName); ILOG.J2CsMapping.Collections.Collections.Put(encryptionKeys, eKeyName, keyData); }
/// <summary> /// Generate a new random decrypt key for RSA based on the given params. /// </summary> /// /// <param name="params">The key params with the key size (in bits).</param> /// <returns>The new decrypt key (PKCS8-encoded private key).</returns> public static DecryptKey generateKey(RsaKeyParams paras) { TpmPrivateKey privateKey; try { privateKey = net.named_data.jndn.security.tpm.TpmPrivateKey.generatePrivateKey(paras); } catch (ArgumentException ex) { throw new SecurityException( "generateKey: Error in generatePrivateKey: " + ex); } catch (TpmPrivateKey.Error ex_0) { throw new SecurityException( "generateKey: Error in generatePrivateKey: " + ex_0); } try { return(new DecryptKey(privateKey.toPkcs8())); } catch (TpmPrivateKey.Error ex_1) { throw new SecurityException("generateKey: Error in toPkcs8: " + ex_1); } }
public void setUp() { // Don't show INFO log messages. ILOG.J2CsMapping.Util.Logging.Logger.getLogger("").setLevel(ILOG.J2CsMapping.Util.Logging.Level.WARNING); FileInfo policyConfigDirectory = net.named_data.jndn.tests.integration_tests.IntegrationTestsCommon .getPolicyConfigDirectory(); databaseFilePath = new FileInfo(System.IO.Path.Combine(policyConfigDirectory.FullName, "test.db")); databaseFilePath.delete(); groupName = new Name("/Prefix/READ"); contentName = new Name("/Prefix/SAMPLE/Content"); cKeyName = new Name("/Prefix/SAMPLE/Content/C-KEY/1"); eKeyName = new Name("/Prefix/READ/E-KEY/1/2"); dKeyName = new Name("/Prefix/READ/D-KEY/1/2"); uKeyName = new Name("/U/Key"); uName = new Name("/U"); // Generate the E-KEY and D-KEY. RsaKeyParams // Generate the E-KEY and D-KEY. paras = new RsaKeyParams(); fixtureDKeyBlob = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(paras).getKeyBits(); fixtureEKeyBlob = net.named_data.jndn.encrypt.algo.RsaAlgorithm.deriveEncryptKey(fixtureDKeyBlob) .getKeyBits(); // Generate the user key. fixtureUDKeyBlob = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(paras).getKeyBits(); fixtureUEKeyBlob = net.named_data.jndn.encrypt.algo.RsaAlgorithm.deriveEncryptKey(fixtureUDKeyBlob) .getKeyBits(); // Load the C-KEY. fixtureCKeyBlob = new Blob(AES_KEY, false); // Set up the key chain. MemoryIdentityStorage identityStorage = new MemoryIdentityStorage(); MemoryPrivateKeyStorage privateKeyStorage = new MemoryPrivateKeyStorage(); keyChain = new KeyChain(new IdentityManager(identityStorage, privateKeyStorage), new NoVerifyPolicyManager()); // Initialize the storage. Name keyName = new Name("/testname/DSK-123"); certificateName = keyName.getSubName(0, keyName.size() - 1) .append("KEY").append(keyName.get(-1)).append("ID-CERT") .append("0"); try { identityStorage.addKey(keyName, net.named_data.jndn.security.KeyType.RSA, new Blob( DEFAULT_RSA_PUBLIC_KEY_DER, false)); privateKeyStorage.setKeyPairForKeyName(keyName, net.named_data.jndn.security.KeyType.RSA, DEFAULT_RSA_PUBLIC_KEY_DER, DEFAULT_RSA_PRIVATE_KEY_DER); } catch (net.named_data.jndn.security.SecurityException ex) { // We don't expect this to happen. ILOG.J2CsMapping.Util.Logging.Logger.getLogger(typeof(TestGroupConsumer).FullName).log( ILOG.J2CsMapping.Util.Logging.Level.SEVERE, null, ex); } net.named_data.jndn.encrypt.Consumer.setFriendAccess(this); }
public void testContentAsymmetricEncryptLarge() { /* foreach */ foreach (TestEncryptor.AsymmetricEncryptInput input in encryptorRsaTestInputs) { Blob largeContent = new Blob(toBuffer(new int[] { 0x73, 0x5a, 0xbd, 0x47, 0x0c, 0xfe, 0xf8, 0x7d, 0x2e, 0x17, 0xaa, 0x11, 0x6f, 0x23, 0xc5, 0x10, 0x23, 0x36, 0x88, 0xc4, 0x2a, 0x0f, 0x9a, 0x72, 0x54, 0x31, 0xa8, 0xb3, 0x51, 0x18, 0x9f, 0x0e, 0x1b, 0x93, 0x62, 0xd9, 0xc4, 0xf5, 0xf4, 0x3d, 0x61, 0x9a, 0xca, 0x05, 0x65, 0x6b, 0xc6, 0x41, 0xf9, 0xd5, 0x1c, 0x67, 0xc1, 0xd0, 0xd5, 0x6f, 0x7b, 0x70, 0xb8, 0x8f, 0xdb, 0x19, 0x68, 0x7c, 0xe0, 0x2d, 0x04, 0x49, 0xa9, 0xa2, 0x77, 0x4e, 0xfc, 0x60, 0x0d, 0x7c, 0x1b, 0x93, 0x6c, 0xd2, 0x61, 0xc4, 0x6b, 0x01, 0xe9, 0x12, 0x28, 0x6d, 0xf5, 0x78, 0xe9, 0x99, 0x0b, 0x9c, 0x4f, 0x90, 0x34, 0x3e, 0x06, 0x92, 0x57, 0xe3, 0x7a, 0x8f, 0x13, 0xc7, 0xf3, 0xfe, 0xf0, 0xe2, 0x59, 0x48, 0x15, 0xb9, 0xdb, 0x77, 0x07, 0x1d, 0x6d, 0xb5, 0x65, 0x17, 0xdf, 0x76, 0x6f, 0xb5, 0x43, 0xde, 0x71, 0xac, 0xf1, 0x22, 0xbf, 0xb2, 0xe5, 0xd9, 0x22, 0xf1, 0x67, 0x76, 0x71, 0x0c, 0xff, 0x99, 0x7b, 0x94, 0x9b, 0x24, 0x20, 0x80, 0xe3, 0xcc, 0x06, 0x4a, 0xed, 0xdf, 0xec, 0x50, 0xd5, 0x87, 0x3d, 0xa0, 0x7d, 0x9c, 0xe5, 0x13, 0x10, 0x98, 0x14, 0xc3, 0x90, 0x10, 0xd9, 0x25, 0x9a, 0x59, 0xe9, 0x37, 0x26, 0xfd, 0x87, 0xd7, 0xf4, 0xf9, 0x11, 0x91, 0xad, 0x5c, 0x00, 0x95, 0xf5, 0x2b, 0x37, 0xf7, 0x4e, 0xb4, 0x4b, 0x42, 0x7c, 0xb3, 0xad, 0xd6, 0x33, 0x5f, 0x0b, 0x84, 0x57, 0x7f, 0xa7, 0x07, 0x73, 0x37, 0x4b, 0xab, 0x2e, 0xfb, 0xfe, 0x1e, 0xcb, 0xb6, 0x4a, 0xc1, 0x21, 0x5f, 0xec, 0x92, 0xb7, 0xac, 0x97, 0x75, 0x20, 0xc9, 0xd8, 0x9e, 0x93, 0xd5, 0x12, 0x7a, 0x64, 0xb9, 0x4c, 0xed, 0x49, 0x87, 0x44, 0x5b, 0x4f, 0x90, 0x34, 0x3e, 0x06, 0x92, 0x57, 0xe3, 0x7a, 0x8f, 0x13, 0xc7, 0xf3, 0xfe, 0xf0, 0xe2, 0x59, 0x48, 0x15, 0xb9, 0xdb, 0x77, 0x07, 0x1d, 0x6d, 0xb5, 0x65, 0x17, 0xdf, 0x76, 0x6f, 0xb5, 0x43, 0xde, 0x71, 0xac, 0xf1, 0x22, 0xbf, 0xb2, 0xe5, 0xd9 }), false); Data data = new Data(); RsaKeyParams rsaParams = new RsaKeyParams(1024); Name keyName = new Name("test"); DecryptKey decryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(rsaParams); EncryptKey encryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.deriveEncryptKey(decryptKey .getKeyBits()); Blob eKey = encryptKey.getKeyBits(); Blob dKey = decryptKey.getKeyBits(); EncryptParams encryptParams = new EncryptParams(input.type()); net.named_data.jndn.encrypt.algo.Encryptor.encryptData(data, largeContent, keyName, eKey, encryptParams); Assert.AssertEquals(input.testName(), new Name("/FOR").append(keyName), data.getName()); Blob largeDataContent = data.getContent(); // largeDataContent is a sequence of the two EncryptedContent. EncryptedContent encryptedNonce = new EncryptedContent(); encryptedNonce.wireDecode(largeDataContent); Assert.AssertEquals(input.testName(), keyName, encryptedNonce .getKeyLocator().getKeyName()); Assert.AssertEquals(input.testName(), 0, encryptedNonce.getInitialVector() .size()); Assert.AssertEquals(input.testName(), input.type(), encryptedNonce.getAlgorithmType()); // Use the size of encryptedNonce to find the start of encryptedPayload. ByteBuffer payloadContent = largeDataContent.buf().duplicate(); payloadContent.position(encryptedNonce.wireEncode().size()); EncryptedContent encryptedPayload = new EncryptedContent(); encryptedPayload.wireDecode(payloadContent); Name nonceKeyName = new Name(keyName); nonceKeyName.append("nonce"); Assert.AssertEquals(input.testName(), nonceKeyName, encryptedPayload .getKeyLocator().getKeyName()); Assert.AssertEquals(input.testName(), 16, encryptedPayload .getInitialVector().size()); Assert.AssertEquals(input.testName(), net.named_data.jndn.encrypt.algo.EncryptAlgorithmType.AesCbc, encryptedPayload.getAlgorithmType()); Assert.AssertTrue(input.testName(), encryptedNonce.wireEncode().size() + encryptedPayload.wireEncode().size() == largeDataContent .size()); Blob blobNonce = encryptedNonce.getPayload(); Blob nonce = net.named_data.jndn.encrypt.algo.RsaAlgorithm.decrypt(dKey, blobNonce, encryptParams); encryptParams.setAlgorithmType(net.named_data.jndn.encrypt.algo.EncryptAlgorithmType.AesCbc); encryptParams.setInitialVector(encryptedPayload.getInitialVector()); Blob bufferPayload = encryptedPayload.getPayload(); Blob largePayload = net.named_data.jndn.encrypt.algo.AesAlgorithm.decrypt(nonce, bufferPayload, encryptParams); Assert.AssertTrue(input.testName(), largeContent.equals(largePayload)); } }
public void setUp() { // Don't show INFO log messages. ILOG.J2CsMapping.Util.Logging.Logger.getLogger("").setLevel(ILOG.J2CsMapping.Util.Logging.Level.WARNING); FileInfo policyConfigDirectory = net.named_data.jndn.tests.integration_tests.IntegrationTestsCommon .getPolicyConfigDirectory(); dKeyDatabaseFilePath = new FileInfo(System.IO.Path.Combine(policyConfigDirectory.FullName, "manager-d-key-test.db")); dKeyDatabaseFilePath.delete(); eKeyDatabaseFilePath = new FileInfo(System.IO.Path.Combine(policyConfigDirectory.FullName, "manager-e-key-test.db")); eKeyDatabaseFilePath.delete(); intervalDatabaseFilePath = new FileInfo(System.IO.Path.Combine(policyConfigDirectory.FullName, "manager-interval-test.db")); intervalDatabaseFilePath.delete(); groupKeyDatabaseFilePath = new FileInfo(System.IO.Path.Combine(policyConfigDirectory.FullName, "manager-group-key-test.db")); groupKeyDatabaseFilePath.delete(); RsaKeyParams paras = new RsaKeyParams(); DecryptKey memberDecryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(paras); decryptKeyBlob = memberDecryptKey.getKeyBits(); EncryptKey memberEncryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm .deriveEncryptKey(decryptKeyBlob); encryptKeyBlob = memberEncryptKey.getKeyBits(); // Generate the certificate. certificate.setName(new Name("/ndn/memberA/KEY/ksk-123/ID-CERT/123")); PublicKey contentPublicKey = new PublicKey(encryptKeyBlob); certificate.setPublicKeyInfo(contentPublicKey); certificate.setNotBefore(0); certificate.setNotAfter(0); certificate.encode(); Blob signatureInfoBlob = new Blob(SIG_INFO, false); Blob signatureValueBlob = new Blob(SIG_VALUE, false); Signature signature = net.named_data.jndn.encoding.TlvWireFormat.get().decodeSignatureInfoAndValue( signatureInfoBlob.buf(), signatureValueBlob.buf()); certificate.setSignature(signature); certificate.wireEncode(); // Set up the keyChain. MemoryIdentityStorage identityStorage = new MemoryIdentityStorage(); MemoryPrivateKeyStorage privateKeyStorage = new MemoryPrivateKeyStorage(); keyChain = new KeyChain(new IdentityManager(identityStorage, privateKeyStorage), new NoVerifyPolicyManager()); Name identityName = new Name("TestGroupManager"); keyChain.createIdentityAndCertificate(identityName); keyChain.getIdentityManager().setDefaultIdentity(identityName); net.named_data.jndn.encrypt.GroupManager.setFriendAccess(this); }
public void testDatabaseFunctions() { Blob scheduleBlob = new Blob(SCHEDULE, false); // Create a schedule. Schedule schedule = new Schedule(); try { schedule.wireDecode(scheduleBlob); } catch (EncodingException ex) { // We don't expect this to happen. Assert.Fail("Error decoding Schedule: " + ex.Message); } // Create a member. RsaKeyParams // Create a member. paras = new RsaKeyParams(); DecryptKey decryptKey; EncryptKey encryptKey; try { decryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.generateKey(paras); encryptKey = net.named_data.jndn.encrypt.algo.RsaAlgorithm.deriveEncryptKey(decryptKey.getKeyBits()); } catch (Exception ex_0) { // Don't expect this to happen. Assert.Fail("Error creating test keys: " + ex_0.Message); return; } Blob keyBlob = encryptKey.getKeyBits(); Name name1 = new Name("/ndn/BoyA/ksk-123"); Name name2 = new Name("/ndn/BoyB/ksk-1233"); Name name3 = new Name("/ndn/GirlC/ksk-123"); Name name4 = new Name("/ndn/GirlD/ksk-123"); Name name5 = new Name("/ndn/Hello/ksk-123"); // Add schedules into the database. try { database.addSchedule("work-time", schedule); database.addSchedule("rest-time", schedule); database.addSchedule("play-time", schedule); database.addSchedule("boelter-time", schedule); } catch (Exception ex_1) { Assert.Fail("Unexpected error adding a schedule: " + ex_1.Message); } // Throw an exception when adding a schedule with an existing name. bool gotError = true; try { database.addSchedule("boelter-time", schedule); gotError = false; } catch (GroupManagerDb.Error ex_2) { } if (!gotError) { Assert.Fail("Expected an error adding a duplicate schedule"); } // Add members into the database. try { database.addMember("work-time", name1, keyBlob); database.addMember("rest-time", name2, keyBlob); database.addMember("play-time", name3, keyBlob); database.addMember("play-time", name4, keyBlob); } catch (Exception ex_3) { Assert.Fail("Unexpected error adding a member: " + ex_3.Message); } // Throw an exception when adding a member with a non-existing schedule name. gotError = true; try { database.addMember("false-time", name5, keyBlob); gotError = false; } catch (GroupManagerDb.Error ex_4) { } if (!gotError) { Assert.Fail("Expected an error adding a member with non-existing schedule"); } try { database.addMember("boelter-time", name5, keyBlob); } catch (Exception ex_5) { Assert.Fail("Unexpected error adding a member: " + ex_5.Message); } // Throw an exception when adding a member having an existing identity. gotError = true; try { database.addMember("work-time", name5, keyBlob); gotError = false; } catch (GroupManagerDb.Error ex_6) { } if (!gotError) { Assert.Fail("Expected an error adding a member with an existing identity"); } // Test has functions. Assert.AssertEquals(true, database.hasSchedule("work-time")); Assert.AssertEquals(true, database.hasSchedule("rest-time")); Assert.AssertEquals(true, database.hasSchedule("play-time")); Assert.AssertEquals(false, database.hasSchedule("sleep-time")); Assert.AssertEquals(false, database.hasSchedule("")); Assert.AssertEquals(true, database.hasMember(new Name("/ndn/BoyA"))); Assert.AssertEquals(true, database.hasMember(new Name("/ndn/BoyB"))); Assert.AssertEquals(false, database.hasMember(new Name("/ndn/BoyC"))); // Get a schedule. Schedule scheduleResult = database.getSchedule("work-time"); Assert.AssertTrue(scheduleResult.wireEncode().equals(scheduleBlob)); scheduleResult = database.getSchedule("play-time"); Assert.AssertTrue(scheduleResult.wireEncode().equals(scheduleBlob)); // Throw an exception when when there is no such schedule in the database. gotError = true; try { database.getSchedule("work-time-11"); gotError = false; } catch (GroupManagerDb.Error ex_7) { } if (!gotError) { Assert.Fail("Expected an error getting a non-existing schedule"); } // List all schedule names. IList names = database.listAllScheduleNames(); Assert.AssertTrue(names.Contains("work-time")); Assert.AssertTrue(names.Contains("play-time")); Assert.AssertTrue(names.Contains("rest-time")); Assert.AssertTrue(!names.Contains("sleep-time")); // List members of a schedule. IDictionary memberMap = database.getScheduleMembers("play-time"); Assert.AssertTrue(memberMap.Count != 0); // When there's no such schedule, the return map's size should be 0. Assert.AssertEquals(0, database.getScheduleMembers("sleep-time").Count); // List all members. IList members = database.listAllMembers(); Assert.AssertTrue(members.Contains(new Name("/ndn/GirlC"))); Assert.AssertTrue(members.Contains(new Name("/ndn/GirlD"))); Assert.AssertTrue(members.Contains(new Name("/ndn/BoyA"))); Assert.AssertTrue(members.Contains(new Name("/ndn/BoyB"))); // Rename a schedule. Assert.AssertEquals(true, database.hasSchedule("boelter-time")); database.renameSchedule("boelter-time", "rieber-time"); Assert.AssertEquals(false, database.hasSchedule("boelter-time")); Assert.AssertEquals(true, database.hasSchedule("rieber-time")); Assert.AssertEquals("rieber-time", database.getMemberSchedule(new Name("/ndn/Hello"))); // Update a schedule. Schedule newSchedule = new Schedule(); try { newSchedule.wireDecode(scheduleBlob); } catch (EncodingException ex_8) { // We don't expect this to happen. Assert.Fail("Error decoding Schedule: " + ex_8.Message); } RepetitiveInterval repetitiveInterval = new RepetitiveInterval( net.named_data.jndn.encrypt.Schedule.fromIsoString("20150825T000000"), net.named_data.jndn.encrypt.Schedule.fromIsoString("20150921T000000"), 2, 10, 5, net.named_data.jndn.encrypt.RepetitiveInterval.RepeatUnit.DAY); newSchedule.addWhiteInterval(repetitiveInterval); database.updateSchedule("rieber-time", newSchedule); scheduleResult = database.getSchedule("rieber-time"); Assert.AssertTrue(!scheduleResult.wireEncode().equals(scheduleBlob)); Assert.AssertTrue(scheduleResult.wireEncode().equals(newSchedule.wireEncode())); // Add a new schedule when updating a non-existing schedule. Assert.AssertEquals(false, database.hasSchedule("ralphs-time")); database.updateSchedule("ralphs-time", newSchedule); Assert.AssertEquals(true, database.hasSchedule("ralphs-time")); // Update the schedule of a member. database.updateMemberSchedule(new Name("/ndn/Hello"), "play-time"); Assert.AssertEquals("play-time", database.getMemberSchedule(new Name("/ndn/Hello"))); // Delete a member. Assert.AssertEquals(true, database.hasMember(new Name("/ndn/Hello"))); database.deleteMember(new Name("/ndn/Hello")); Assert.AssertEquals(false, database.hasMember(new Name("/ndn/Hello"))); // Delete a non-existing member. try { database.deleteMember(new Name("/ndn/notExisting")); } catch (Exception ex_9) { Assert.Fail("Unexpected error deleting a non-existing member: " + ex_9.Message); } // Delete a schedule. All the members using this schedule should be deleted. database.deleteSchedule("play-time"); Assert.AssertEquals(false, database.hasSchedule("play-time")); Assert.AssertEquals(false, database.hasMember(new Name("/ndn/GirlC"))); Assert.AssertEquals(false, database.hasMember(new Name("/ndn/GirlD"))); // Delete a non-existing schedule. try { database.deleteSchedule("not-existing-time"); } catch (Exception ex_10) { Assert.Fail("Unexpected error deleting a non-existing schedule: " + ex_10.Message); } }
public RsaKeyTestData() { keyParams = new RsaKeyParams(); privateKeyPkcs1 = "MIIEpAIBAAKCAQEAw0WM1/WhAxyLtEqsiAJgWDZWuzkYpeYVdeeZcqRZzzfRgBQT\n" + "sNozS5t4HnwTZhwwXbH7k3QN0kRTV826Xobws3iigohnM9yTK+KKiayPhIAm/+5H\n" + "GT6SgFJhYhqo1/upWdueojil6RP4/AgavHhopxlAVbk6G9VdVnlQcQ5Zv0OcGi73\n" + "c+EnYD/YgURYGSngUi/Ynsh779p2U69/te9gZwIL5PuE9BiO6I39cL9z7EK1SfZh\n" + "OWvDe/qH7YhD/BHwcWit8FjRww1glwRVTJsA9rH58ynaAix0tcR/nBMRLUX+e3rU\n" + "RHg6UbSjJbdb9qmKM1fTGHKUzL/5pMG6uBU0ywIDAQABAoIBADQkckOIl4IZMUTn\n" + "W8LFv6xOdkJwMKC8G6bsPRFbyY+HvC2TLt7epSvfS+f4AcYWaOPcDu2E49vt2sNr\n" + "cASly8hgwiRRAB3dHH9vcsboiTo8bi2RFvMqvjv9w3tK2yMxVDtmZamzrrnaV3YV\n" + "Q+5nyKo2F/PMDjQ4eUAKDOzjhBuKHsZBTFnA1MFNI+UKj5X4Yp64DFmKlxTX/U2b\n" + "wzVywo5hzx2Uhw51jmoLls4YUvMJXD0wW5ZtYRuPogXvXb/of9ef/20/wU11WFKg\n" + "Xb4gfR8zUXaXS1sXcnVm3+24vIs9dApUwykuoyjOqxWqcHRec2QT2FxVGkFEraze\n" + "CPa4rMECgYEA5Y8CywomIcTgerFGFCeMHJr8nQGqY2V/owFb3k9maczPnC9p4a9R\n" + "c5szLxA9FMYFxurQZMBWSEG2JS1HR2mnjigx8UKjYML/A+rvvjZOMe4M6Sy2ggh4\n" + "SkLZKpWTzjTe07ByM/j5v/SjNZhWAG7sw4/LmPGRQkwJv+KZhGojuOkCgYEA2cOF\n" + "T6cJRv6kvzTz9S0COZOVm+euJh/BXp7oAsAmbNfOpckPMzqHXy8/wpdKl6AAcB57\n" + "OuztlNfV1D7qvbz7JuRlYwQ0cEfBgbZPcz1p18HHDXhwn57ZPb8G33Yh9Omg0HNA\n" + "Imb4LsVuSqxA6NwSj7cpRekgTedrhLFPJ+Ydb5MCgYEAsM3Q7OjILcIg0t6uht9e\n" + "vrlwTsz1mtCV2co2I6crzdj9HeI2vqf1KAElDt6G7PUHhglcr/yjd8uEqmWRPKNX\n" + "ddnnfVZB10jYeP/93pac6z/Zmc3iU4yKeUe7U10ZFf0KkiiYDQd59CpLef/2XScS\n" + "HB0oRofnxRQjfjLc4muNT+ECgYEAlcDk06MOOTly+F8lCc1bA1dgAmgwFd2usDBd\n" + "Y07a3e0HGnGLN3Kfl7C5i0tZq64HvxLnMd2vgLVxQlXGPpdQrC1TH+XLXg+qnlZO\n" + "ivSH7i0/gx75bHvj75eH1XK65V8pDVDEoSPottllAIs21CxLw3N1ObOZWJm2EfmR\n" + "cuHICmsCgYAtFJ1idqMoHxES3mlRpf2JxyQudP3SCm2WpGmqVzhRYInqeatY5sUd\n" + "lPLHm/p77RT7EyxQHTlwn8FJPuM/4ZH1rQd/vB+Y8qAtYJCexDMsbvLW+Js+VOvk\n" + "jweEC0nrcL31j9mF0vz5E6tfRu4hhJ6L4yfWs0gSejskeVB/w8QY4g==\n"; privateKeyPkcs8 = "MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQINwot3btbWkUCAggA\n" + "MBQGCCqGSIb3DQMHBAg6anV8j085cASCBMhUhNxb+sBuPj76dbsHqnuZybQF9q9G\n" + "yvyrhZ5wpuslkEI8Iw5c/d7C721BzOoLLU6ip4bEAfB+0HtO4qWhlFmUAkw+d0km\n" + "6Zw9PbkldNG8zHxTLrm7idz2hixnV5SYY+3MeaMbDWBazjxTKJZHakHodZ03di6S\n" + "+EhLlZGKTWdtGwXvYrdbGGX7psnrq6Gh+oJyKz8swVZYT5c3Ta1q/r7dTBsN20Su\n" + "rZVCWXwqF9JM77RxiilYtlqBm1/jR/6Y6Hsa7V20WfENmUWkPj5nN6/0JSg3Ohs6\n" + "iLI+RN01hBxEhh2BIOg7A5aJrJvw5Y36oTKN6NfN+jKtd/xVX4OTnjJWAu07sxe4\n" + "/gzvjCLTiZV840iuHzjYLhiKU1gcAq0HdVmStJG0KKL//QwoQZWSB+ezqaUrRqM0\n" + "j/yF8yeNljf3d102alCjOlDd+WzntZGkh2qgOEdamDWTLnUV05FsFsgvQxi4/eH8\n" + "aUzaLja8Ejf2DdkrzVtn3rZBqIIduv20tJept6XJdnkVfN4aQn6djgC07/wZawYv\n" + "WO/9XPZVTamBs6/6rm72pPUsnlashJmdWR2GYQQsrGiqAx5pSkiRUK5o5YtYAYFq\n" + "cTEkHOPuLr4xEkkxuJr9WcBn1xzVXTY0jOUdSQsN4n0UC1deS1Vtt0l3ETlclhV1\n" + "WGf6gPb5Y2WSY7Gxn2s5goGVpdEr5WYF6zfUwBsM9U40u5NAuq6q0NrIVoVguGhP\n" + "/GpxQrN8QPWvKtLJUKRtepWK6FLejcwGdDVaKYWF2qiK8bLPW2R1ZWbt18tjfcSV\n" + "LDEFhbNZrQAbQKukVL7g6RNk2ZE2ZQOWcP1VihyX9h+h6iZBJQQJVSUht2P9omKP\n" + "vXchMFGhb6e0VSxbb4Nw7Yq2/tEVwZGXsnKFEzyS2LkP2biqEHbjXtI1hreTxhOt\n" + "zz/zXz/4AMl1MJEf0SpJ7Yaowl5lsSo2qoFJTwV6nK2YI25e80dcNMAWzAXokCDN\n" + "GX4Iio411w9ZWIKrtiHnkDh1+u/ktLrRY/vwVtXIokzIo99UwTWcCtIJYktzmYp1\n" + "L0E8EgurD/lFV4jGHMU0Q0ufxikteGXjAgA56F29xo879HDTn6+EsMvRLFhV7e38\n" + "8ntTLNXa4uSF4pub2oltWEFRewCQaprKgCzG8cVs3fl5yHISYC9bsSLOVkjE2PPR\n" + "avNFBV0W5BorX+A+ujYbfA54/EGTZfYtgt8TgkcAWY9ZVozrx8mQV5Z0CcDcNmHr\n" + "S9IHlwAV1rKImH0l72lEUoObfNsB3ZYstgWPA7LY0Ir1GgSD1ArFJcIn0ZyNaq9/\n" + "UhctA/83oybq/dpKIkgyppuyF1QihC0LiARRdTQypkvtpCrIMYeOm12NIpU14eO4\n" + "AiHAMvZN2r++a6n43x/MFm82rnCXjwTIp6qwF43q2l36Af/acRFxxiQsUk7yr/fy\n" + "rG5ILv3+vJN1/GcAh1uBezvMG50eIPmFkB1t+5unLezwFpyJ9CyfD6Hb3cZ0Ae0y\n" + "nXZKRy1psgDy0jDAtmzyOO0+aT45tlA0nRwG7R3CvgKn33EkcaYT5NZ+47y0LDfW\n" + "73yeM6F0A9SuqWUNp/QFT0/tqgqoG1blsi2tV4V5RBtt80BhDqx4XxW0nCp9MWS4\n" + "/4Q=\n"; privateKeyPkcs8Unencrypted = "MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDDRYzX9aEDHIu0\n" + "SqyIAmBYNla7ORil5hV155lypFnPN9GAFBOw2jNLm3gefBNmHDBdsfuTdA3SRFNX\n" + "zbpehvCzeKKCiGcz3JMr4oqJrI+EgCb/7kcZPpKAUmFiGqjX+6lZ256iOKXpE/j8\n" + "CBq8eGinGUBVuTob1V1WeVBxDlm/Q5waLvdz4SdgP9iBRFgZKeBSL9ieyHvv2nZT\n" + "r3+172BnAgvk+4T0GI7ojf1wv3PsQrVJ9mE5a8N7+oftiEP8EfBxaK3wWNHDDWCX\n" + "BFVMmwD2sfnzKdoCLHS1xH+cExEtRf57etREeDpRtKMlt1v2qYozV9MYcpTMv/mk\n" + "wbq4FTTLAgMBAAECggEANCRyQ4iXghkxROdbwsW/rE52QnAwoLwbpuw9EVvJj4e8\n" + "LZMu3t6lK99L5/gBxhZo49wO7YTj2+3aw2twBKXLyGDCJFEAHd0cf29yxuiJOjxu\n" + "LZEW8yq+O/3De0rbIzFUO2ZlqbOuudpXdhVD7mfIqjYX88wONDh5QAoM7OOEG4oe\n" + "xkFMWcDUwU0j5QqPlfhinrgMWYqXFNf9TZvDNXLCjmHPHZSHDnWOaguWzhhS8wlc\n" + "PTBblm1hG4+iBe9dv+h/15//bT/BTXVYUqBdviB9HzNRdpdLWxdydWbf7bi8iz10\n" + "ClTDKS6jKM6rFapwdF5zZBPYXFUaQUStrN4I9riswQKBgQDljwLLCiYhxOB6sUYU\n" + "J4wcmvydAapjZX+jAVveT2ZpzM+cL2nhr1FzmzMvED0UxgXG6tBkwFZIQbYlLUdH\n" + "aaeOKDHxQqNgwv8D6u++Nk4x7gzpLLaCCHhKQtkqlZPONN7TsHIz+Pm/9KM1mFYA\n" + "buzDj8uY8ZFCTAm/4pmEaiO46QKBgQDZw4VPpwlG/qS/NPP1LQI5k5Wb564mH8Fe\n" + "nugCwCZs186lyQ8zOodfLz/Cl0qXoABwHns67O2U19XUPuq9vPsm5GVjBDRwR8GB\n" + "tk9zPWnXwccNeHCfntk9vwbfdiH06aDQc0AiZvguxW5KrEDo3BKPtylF6SBN52uE\n" + "sU8n5h1vkwKBgQCwzdDs6MgtwiDS3q6G316+uXBOzPWa0JXZyjYjpyvN2P0d4ja+\n" + "p/UoASUO3obs9QeGCVyv/KN3y4SqZZE8o1d12ed9VkHXSNh4//3elpzrP9mZzeJT\n" + "jIp5R7tTXRkV/QqSKJgNB3n0Kkt5//ZdJxIcHShGh+fFFCN+Mtzia41P4QKBgQCV\n" + "wOTTow45OXL4XyUJzVsDV2ACaDAV3a6wMF1jTtrd7QcacYs3cp+XsLmLS1mrrge/\n" + "Eucx3a+AtXFCVcY+l1CsLVMf5cteD6qeVk6K9IfuLT+DHvlse+Pvl4fVcrrlXykN\n" + "UMShI+i22WUAizbULEvDc3U5s5lYmbYR+ZFy4cgKawKBgC0UnWJ2oygfERLeaVGl\n" + "/YnHJC50/dIKbZakaapXOFFgiep5q1jmxR2U8seb+nvtFPsTLFAdOXCfwUk+4z/h\n" + "kfWtB3+8H5jyoC1gkJ7EMyxu8tb4mz5U6+SPB4QLSetwvfWP2YXS/PkTq19G7iGE\n" + "novjJ9azSBJ6OyR5UH/DxBji\n"; publicKeyEncoding = "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw0WM1/WhAxyLtEqsiAJg\n" + "WDZWuzkYpeYVdeeZcqRZzzfRgBQTsNozS5t4HnwTZhwwXbH7k3QN0kRTV826Xobw\n" + "s3iigohnM9yTK+KKiayPhIAm/+5HGT6SgFJhYhqo1/upWdueojil6RP4/AgavHho\n" + "pxlAVbk6G9VdVnlQcQ5Zv0OcGi73c+EnYD/YgURYGSngUi/Ynsh779p2U69/te9g\n" + "ZwIL5PuE9BiO6I39cL9z7EK1SfZhOWvDe/qH7YhD/BHwcWit8FjRww1glwRVTJsA\n" + "9rH58ynaAix0tcR/nBMRLUX+e3rURHg6UbSjJbdb9qmKM1fTGHKUzL/5pMG6uBU0\n" + "ywIDAQAB\n"; }