blob: 234c48d3533fc4d97410a9961fe37158d1f34ead [file] [log] [blame]
Yingdi Yu0b60e7a2015-07-16 21:05:11 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2/**
3 * Copyright (c) 2013-2016 Regents of the University of California.
4 *
5 * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
6 *
7 * ndn-cxx library is free software: you can redistribute it and/or modify it under the
8 * terms of the GNU Lesser General Public License as published by the Free Software
9 * Foundation, either version 3 of the License, or (at your option) any later version.
10 *
11 * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License and GNU Lesser
16 * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
17 * <http://www.gnu.org/licenses/>.
18 *
19 * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
20 */
21
22#include "tpm.hpp"
23#include "back-end.hpp"
24#include "../../encoding/buffer-stream.hpp"
25
26namespace ndn {
27namespace security {
28namespace tpm {
29
30Tpm::Tpm(const std::string& scheme, const std::string& location, unique_ptr<BackEnd> backEnd)
31 : m_scheme(scheme)
32 , m_location(location)
33 , m_backEnd(std::move(backEnd))
34{
35}
36
37Tpm::~Tpm() = default;
38
39std::string
40Tpm::getTpmLocator() const
41{
42 return m_scheme + ":" + m_location;
43}
44
45bool
46Tpm::hasKey(const Name& keyName) const
47{
48 return m_backEnd->hasKey(keyName);
49}
50
51Name
52Tpm::createKey(const Name& identityName, const KeyParams& params)
53{
54 switch (params.getKeyType()) {
55 case KeyType::RSA:
56 case KeyType::EC: {
57 unique_ptr<KeyHandle> keyHandle = m_backEnd->createKey(identityName, params);
58 Name keyName = keyHandle->getKeyName();
59 m_keys[keyName] = std::move(keyHandle);
60 return keyName;
61 }
62 default: {
63 BOOST_THROW_EXCEPTION(Error("Fail to create a key pair: Unsupported key type"));
64 }
65 }
66}
67
68void
69Tpm::deleteKey(const Name& keyName)
70{
71 auto it = m_keys.find(keyName);
72 if (it != m_keys.end())
73 m_keys.erase(it);
74
75 m_backEnd->deleteKey(keyName);
76}
77
78ConstBufferPtr
79Tpm::getPublicKey(const Name& keyName) const
80{
81 const KeyHandle* key = findKey(keyName);
82
83 if (key == nullptr)
84 return nullptr;
85 else
86 return key->derivePublicKey();
87}
88
89ConstBufferPtr
90Tpm::sign(const uint8_t* buf, size_t size, const Name& keyName, DigestAlgorithm digestAlgorithm) const
91{
92 const KeyHandle* key = findKey(keyName);
93
94 if (key == nullptr)
95 return nullptr;
96 else
97 return key->sign(digestAlgorithm, buf, size);
98}
99
100ConstBufferPtr
101Tpm::decrypt(const uint8_t* buf, size_t size, const Name& keyName) const
102{
103 const KeyHandle* key = findKey(keyName);
104
105 if (key == nullptr)
106 return nullptr;
107 else
108 return key->decrypt(buf, size);
109}
110
111ConstBufferPtr
112Tpm::exportPrivateKey(const Name& keyName, const char* pw, size_t pwLen)
113{
114 return m_backEnd->exportKey(keyName, pw, pwLen);
115}
116
117bool
118Tpm::importPrivateKey(const Name& keyName, const uint8_t* pkcs8, size_t pkcs8Len, const char* pw, size_t pwLen)
119{
120 try {
121 m_backEnd->importKey(keyName, pkcs8, pkcs8Len, pw, pwLen);
122 }
123 catch (const BackEnd::Error&) {
124 return false;
125 }
126 return true;
127}
128
129const KeyHandle*
130Tpm::findKey(const Name& keyName) const
131{
132 auto it = m_keys.find(keyName);
133
134 if (it != m_keys.end())
135 return it->second.get();
136
137 unique_ptr<KeyHandle> handle = m_backEnd->getKeyHandle(keyName);
138
139 if (handle != nullptr) {
140 KeyHandle* key = handle.get();
141 m_keys[keyName] = std::move(handle);
142 return key;
143 }
144
145 return nullptr;
146}
147
148} // namespace tpm
149} // namespace security
150} // namespace ndn