blob: 424a8e8369b1191af9b1806a39f99458ddf9ea59 [file] [log] [blame]
Jeff Thompson25b4e612013-10-10 16:03:24 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil -*- */
Jeff Thompson47c93cf2013-08-09 00:38:48 -07002/**
Jeff Thompson7687dc02013-09-13 11:54:07 -07003 * Copyright (C) 2013 Regents of the University of California.
4 * @author: Jeff Thompson <jefft0@remap.ucla.edu>
Jeff Thompson47c93cf2013-08-09 00:38:48 -07005 * See COPYING for copyright and distribution information.
6 */
7
Jeff Thompson7a67cb62013-08-26 11:43:18 -07008#include "../c/util/crypto.h"
9#include "../c/encoding/binary-xml-data.h"
10#include "../encoding/binary-xml-encoder.hpp"
Jeff Thompson25b4e612013-10-10 16:03:24 -070011#include <ndn-cpp/sha256-with-rsa-signature.hpp>
Jeff Thompson9296f0c2013-09-23 18:10:27 -070012#include "../util/logging.hpp"
Jeff Thompson25b4e612013-10-10 16:03:24 -070013#include <ndn-cpp/security/security-exception.hpp>
14#include <ndn-cpp/security/policy/policy-manager.hpp>
Jeff Thompsonf309aa62013-10-31 17:03:54 -070015#include "policy/validation-request.hpp"
Jeff Thompson25b4e612013-10-10 16:03:24 -070016#include <ndn-cpp/security/key-chain.hpp>
Jeff Thompson47c93cf2013-08-09 00:38:48 -070017
18using namespace std;
Jeff Thompsond4144fe2013-09-18 15:59:57 -070019using namespace ndn::ptr_lib;
Jeff Thompson47c93cf2013-08-09 00:38:48 -070020
21namespace ndn {
22
Jeff Thompson29ce3102013-09-27 11:47:48 -070023KeyChain::KeyChain(const shared_ptr<IdentityManager>& identityManager, const shared_ptr<PolicyManager>& policyManager)
24: identityManager_(identityManager), policyManager_(policyManager), face_(0), maxSteps_(100)
Jeff Thompson9296f0c2013-09-23 18:10:27 -070025{
26}
27
Jeff Thompson2ce8f492013-09-17 18:01:25 -070028void
Jeff Thompson29ce3102013-09-27 11:47:48 -070029KeyChain::sign(Data& data, const Name& certificateName, WireFormat& wireFormat)
Jeff Thompson2ce8f492013-09-17 18:01:25 -070030{
Jeff Thompson29ce3102013-09-27 11:47:48 -070031 identityManager_->signByCertificate(data, certificateName, wireFormat);
32}
33
Jeff Thompsonc01e1782013-10-21 14:08:42 -070034shared_ptr<Signature>
35KeyChain::sign(const uint8_t* buffer, size_t bufferLength, const Name& certificateName)
36{
37 return identityManager_->signByCertificate(buffer, bufferLength, certificateName);
38}
39
Jeff Thompson29ce3102013-09-27 11:47:48 -070040void
41KeyChain::signByIdentity(Data& data, const Name& identityName, WireFormat& wireFormat)
42{
43 Name signingCertificateName;
Jeff Thompson9296f0c2013-09-23 18:10:27 -070044
Jeff Thompson29ce3102013-09-27 11:47:48 -070045 if (identityName.getComponentCount() == 0) {
46 Name inferredIdentity = policyManager_->inferSigningIdentity(data.getName());
47 if (inferredIdentity.getComponentCount() == 0)
48 signingCertificateName = identityManager_->getDefaultCertificateName();
49 else
50 signingCertificateName = identityManager_->getDefaultCertificateNameForIdentity(inferredIdentity);
Jeff Thompson2ce8f492013-09-17 18:01:25 -070051 }
Jeff Thompson9296f0c2013-09-23 18:10:27 -070052 else
Jeff Thompson29ce3102013-09-27 11:47:48 -070053 signingCertificateName = identityManager_->getDefaultCertificateNameForIdentity(identityName);
54
55 if (signingCertificateName.getComponentCount() == 0)
56 throw SecurityException("No qualified certificate name found!");
57
58 if (!policyManager_->checkSigningPolicy(data.getName(), signingCertificateName))
Jeff Thompson9296f0c2013-09-23 18:10:27 -070059 throw SecurityException("Signing Cert name does not comply with signing policy");
Jeff Thompson29ce3102013-09-27 11:47:48 -070060
Jeff Thompson56e62652013-10-31 16:13:25 -070061 identityManager_->signByCertificate(data, signingCertificateName, wireFormat);
Jeff Thompson2ce8f492013-09-17 18:01:25 -070062}
63
Jeff Thompsone9ffe792013-10-22 10:58:48 -070064shared_ptr<Signature>
65KeyChain::signByIdentity(const uint8_t* buffer, size_t bufferLength, const Name& identityName)
66{
67 Name signingCertificateName = identityManager_->getDefaultCertificateNameForIdentity(identityName);
Jeff Thompsonc01e1782013-10-21 14:08:42 -070068
Jeff Thompsone9ffe792013-10-22 10:58:48 -070069 if (signingCertificateName.size() == 0)
70 throw SecurityException("No qualified certificate name found!");
Jeff Thompsonc01e1782013-10-21 14:08:42 -070071
Jeff Thompsone9ffe792013-10-22 10:58:48 -070072 return identityManager_->signByCertificate(buffer, bufferLength, signingCertificateName);
73}
Jeff Thompsonc01e1782013-10-21 14:08:42 -070074
Jeff Thompson2ce8f492013-09-17 18:01:25 -070075void
Jeff Thompson7c5d2312013-09-25 16:07:15 -070076KeyChain::verifyData
77 (const shared_ptr<Data>& data, const OnVerified& onVerified, const OnVerifyFailed& onVerifyFailed, int stepCount)
Jeff Thompson2ce8f492013-09-17 18:01:25 -070078{
Jeff Thompson2ce8f492013-09-17 18:01:25 -070079 _LOG_TRACE("Enter Verify");
Jeff Thompson2ce8f492013-09-17 18:01:25 -070080
Jeff Thompsonf309aa62013-10-31 17:03:54 -070081 if (policyManager_->requireVerify(*data)) {
82 shared_ptr<ValidationRequest> nextStep = policyManager_->checkVerificationPolicy
83 (data, stepCount, onVerified, onVerifyFailed);
Jeff Thompsoncda349e2013-11-05 17:37:39 -080084 if (nextStep)
85 face_->expressInterest
86 (*nextStep->interest_,
87 bind(&KeyChain::onCertificateData, this, _1, _2, nextStep),
88 bind(&KeyChain::onCertificateInterestTimeout, this, _1, nextStep->retry_, onVerifyFailed, data, nextStep));
Jeff Thompsonf309aa62013-10-31 17:03:54 -070089 }
90 else if (policyManager_->skipVerifyAndTrust(*data))
Jeff Thompson2ce8f492013-09-17 18:01:25 -070091 onVerified(data);
92 else
Jeff Thompson29ce3102013-09-27 11:47:48 -070093 onVerifyFailed(data);
Jeff Thompson1e90d8c2013-08-12 16:09:25 -070094}
95
Jeff Thompsoncda349e2013-11-05 17:37:39 -080096void
97KeyChain::onCertificateData(const shared_ptr<const Interest> &interest, const shared_ptr<Data> &data, shared_ptr<ValidationRequest> nextStep)
98{
99 // Try to verify the certificate (data) according to the parameters in nextStep.
100 verifyData(data, nextStep->onVerified_, nextStep->onVerifyFailed_, nextStep->stepCount_);
101}
102
103void
104KeyChain::onCertificateInterestTimeout
105 (const shared_ptr<const Interest> &interest, int retry, const OnVerifyFailed& onVerifyFailed, const shared_ptr<Data> &data,
106 shared_ptr<ValidationRequest> nextStep)
107{
108 if (retry > 0)
109 // Issue the same expressInterest as in verifyData except decrement retry.
110 face_->expressInterest
111 (*interest,
112 bind(&KeyChain::onCertificateData, this, _1, _2, nextStep),
113 bind(&KeyChain::onCertificateInterestTimeout, this, _1, retry - 1, onVerifyFailed, data, nextStep));
114 else
115 onVerifyFailed(data);
116}
117
Jeff Thompson47c93cf2013-08-09 00:38:48 -0700118}