blob: e3980a9f65c1c509daf10dd9b6f05cd4806a29e8 [file] [log] [blame]
Jeff Thompson25b4e612013-10-10 16:03:24 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil -*- */
Jeff Thompson47c93cf2013-08-09 00:38:48 -07002/**
Jeff Thompson7687dc02013-09-13 11:54:07 -07003 * Copyright (C) 2013 Regents of the University of California.
4 * @author: Jeff Thompson <jefft0@remap.ucla.edu>
Jeff Thompson47c93cf2013-08-09 00:38:48 -07005 * See COPYING for copyright and distribution information.
6 */
7
Jeff Thompson7a67cb62013-08-26 11:43:18 -07008#include "../c/util/crypto.h"
9#include "../c/encoding/binary-xml-data.h"
10#include "../encoding/binary-xml-encoder.hpp"
Jeff Thompson25b4e612013-10-10 16:03:24 -070011#include <ndn-cpp/sha256-with-rsa-signature.hpp>
Jeff Thompson9296f0c2013-09-23 18:10:27 -070012#include "../util/logging.hpp"
Jeff Thompson25b4e612013-10-10 16:03:24 -070013#include <ndn-cpp/security/security-exception.hpp>
14#include <ndn-cpp/security/policy/policy-manager.hpp>
Jeff Thompsonf309aa62013-10-31 17:03:54 -070015#include "policy/validation-request.hpp"
Jeff Thompson25b4e612013-10-10 16:03:24 -070016#include <ndn-cpp/security/key-chain.hpp>
Jeff Thompson47c93cf2013-08-09 00:38:48 -070017
18using namespace std;
Jeff Thompsond4144fe2013-09-18 15:59:57 -070019using namespace ndn::ptr_lib;
Jeff Thompson2381da82013-11-06 14:34:09 -080020using namespace ndn::func_lib;
Jeff Thompson9bdeb6d2013-11-06 14:30:07 -080021#if NDN_CPP_HAVE_STD_FUNCTION
Jeff Thompson09324ed2013-11-06 14:40:35 -080022// In the std library, the placeholders are in a different namespace than boost.
23using namespace ndn::func_lib::placeholders;
Jeff Thompson9bdeb6d2013-11-06 14:30:07 -080024#endif
Jeff Thompson47c93cf2013-08-09 00:38:48 -070025
26namespace ndn {
27
Jeff Thompson29ce3102013-09-27 11:47:48 -070028KeyChain::KeyChain(const shared_ptr<IdentityManager>& identityManager, const shared_ptr<PolicyManager>& policyManager)
29: identityManager_(identityManager), policyManager_(policyManager), face_(0), maxSteps_(100)
Jeff Thompson9296f0c2013-09-23 18:10:27 -070030{
31}
32
Jeff Thompson2ce8f492013-09-17 18:01:25 -070033void
Jeff Thompson29ce3102013-09-27 11:47:48 -070034KeyChain::sign(Data& data, const Name& certificateName, WireFormat& wireFormat)
Jeff Thompson2ce8f492013-09-17 18:01:25 -070035{
Jeff Thompson29ce3102013-09-27 11:47:48 -070036 identityManager_->signByCertificate(data, certificateName, wireFormat);
37}
38
Jeff Thompsonc01e1782013-10-21 14:08:42 -070039shared_ptr<Signature>
40KeyChain::sign(const uint8_t* buffer, size_t bufferLength, const Name& certificateName)
41{
42 return identityManager_->signByCertificate(buffer, bufferLength, certificateName);
43}
44
Jeff Thompson29ce3102013-09-27 11:47:48 -070045void
46KeyChain::signByIdentity(Data& data, const Name& identityName, WireFormat& wireFormat)
47{
48 Name signingCertificateName;
Jeff Thompson9296f0c2013-09-23 18:10:27 -070049
Jeff Thompson29ce3102013-09-27 11:47:48 -070050 if (identityName.getComponentCount() == 0) {
51 Name inferredIdentity = policyManager_->inferSigningIdentity(data.getName());
52 if (inferredIdentity.getComponentCount() == 0)
53 signingCertificateName = identityManager_->getDefaultCertificateName();
54 else
55 signingCertificateName = identityManager_->getDefaultCertificateNameForIdentity(inferredIdentity);
Jeff Thompson2ce8f492013-09-17 18:01:25 -070056 }
Jeff Thompson9296f0c2013-09-23 18:10:27 -070057 else
Jeff Thompson29ce3102013-09-27 11:47:48 -070058 signingCertificateName = identityManager_->getDefaultCertificateNameForIdentity(identityName);
59
60 if (signingCertificateName.getComponentCount() == 0)
61 throw SecurityException("No qualified certificate name found!");
62
63 if (!policyManager_->checkSigningPolicy(data.getName(), signingCertificateName))
Jeff Thompson9296f0c2013-09-23 18:10:27 -070064 throw SecurityException("Signing Cert name does not comply with signing policy");
Jeff Thompson29ce3102013-09-27 11:47:48 -070065
Jeff Thompson56e62652013-10-31 16:13:25 -070066 identityManager_->signByCertificate(data, signingCertificateName, wireFormat);
Jeff Thompson2ce8f492013-09-17 18:01:25 -070067}
68
Jeff Thompsone9ffe792013-10-22 10:58:48 -070069shared_ptr<Signature>
70KeyChain::signByIdentity(const uint8_t* buffer, size_t bufferLength, const Name& identityName)
71{
72 Name signingCertificateName = identityManager_->getDefaultCertificateNameForIdentity(identityName);
Jeff Thompsonc01e1782013-10-21 14:08:42 -070073
Jeff Thompsone9ffe792013-10-22 10:58:48 -070074 if (signingCertificateName.size() == 0)
75 throw SecurityException("No qualified certificate name found!");
Jeff Thompsonc01e1782013-10-21 14:08:42 -070076
Jeff Thompsone9ffe792013-10-22 10:58:48 -070077 return identityManager_->signByCertificate(buffer, bufferLength, signingCertificateName);
78}
Jeff Thompsonc01e1782013-10-21 14:08:42 -070079
Jeff Thompson2ce8f492013-09-17 18:01:25 -070080void
Jeff Thompson7c5d2312013-09-25 16:07:15 -070081KeyChain::verifyData
82 (const shared_ptr<Data>& data, const OnVerified& onVerified, const OnVerifyFailed& onVerifyFailed, int stepCount)
Jeff Thompson2ce8f492013-09-17 18:01:25 -070083{
Jeff Thompson2ce8f492013-09-17 18:01:25 -070084 _LOG_TRACE("Enter Verify");
Jeff Thompson2ce8f492013-09-17 18:01:25 -070085
Jeff Thompsonf309aa62013-10-31 17:03:54 -070086 if (policyManager_->requireVerify(*data)) {
87 shared_ptr<ValidationRequest> nextStep = policyManager_->checkVerificationPolicy
88 (data, stepCount, onVerified, onVerifyFailed);
Jeff Thompsoncda349e2013-11-05 17:37:39 -080089 if (nextStep)
90 face_->expressInterest
91 (*nextStep->interest_,
92 bind(&KeyChain::onCertificateData, this, _1, _2, nextStep),
93 bind(&KeyChain::onCertificateInterestTimeout, this, _1, nextStep->retry_, onVerifyFailed, data, nextStep));
Jeff Thompsonf309aa62013-10-31 17:03:54 -070094 }
95 else if (policyManager_->skipVerifyAndTrust(*data))
Jeff Thompson2ce8f492013-09-17 18:01:25 -070096 onVerified(data);
97 else
Jeff Thompson29ce3102013-09-27 11:47:48 -070098 onVerifyFailed(data);
Jeff Thompson1e90d8c2013-08-12 16:09:25 -070099}
100
Jeff Thompsoncda349e2013-11-05 17:37:39 -0800101void
102KeyChain::onCertificateData(const shared_ptr<const Interest> &interest, const shared_ptr<Data> &data, shared_ptr<ValidationRequest> nextStep)
103{
104 // Try to verify the certificate (data) according to the parameters in nextStep.
105 verifyData(data, nextStep->onVerified_, nextStep->onVerifyFailed_, nextStep->stepCount_);
106}
107
108void
109KeyChain::onCertificateInterestTimeout
110 (const shared_ptr<const Interest> &interest, int retry, const OnVerifyFailed& onVerifyFailed, const shared_ptr<Data> &data,
111 shared_ptr<ValidationRequest> nextStep)
112{
113 if (retry > 0)
114 // Issue the same expressInterest as in verifyData except decrement retry.
115 face_->expressInterest
116 (*interest,
117 bind(&KeyChain::onCertificateData, this, _1, _2, nextStep),
118 bind(&KeyChain::onCertificateInterestTimeout, this, _1, retry - 1, onVerifyFailed, data, nextStep));
119 else
120 onVerifyFailed(data);
121}
122
Jeff Thompson47c93cf2013-08-09 00:38:48 -0700123}