blob: 02a3fad058da1085ba387c76a2f72f32a1d35fd8 [file] [log] [blame]
Alexander Afanasyev60a7b622014-12-20 17:04:07 -08001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2/**
3 * Copyright (c) 2011-2015 Regents of the University of California.
Alexander Afanasyev34e13f32014-12-14 15:13:28 -08004 *
Alexander Afanasyev60a7b622014-12-20 17:04:07 -08005 * This file is part of ndnSIM. See AUTHORS for complete list of ndnSIM authors and
6 * contributors.
Alexander Afanasyev34e13f32014-12-14 15:13:28 -08007 *
Alexander Afanasyev60a7b622014-12-20 17:04:07 -08008 * ndnSIM is free software: you can redistribute it and/or modify it under the terms
9 * of the GNU General Public License as published by the Free Software Foundation,
10 * either version 3 of the License, or (at your option) any later version.
Alexander Afanasyev34e13f32014-12-14 15:13:28 -080011 *
Alexander Afanasyev60a7b622014-12-20 17:04:07 -080012 * ndnSIM is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
13 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
14 * PURPOSE. See the GNU General Public License for more details.
Alexander Afanasyev34e13f32014-12-14 15:13:28 -080015 *
Alexander Afanasyev60a7b622014-12-20 17:04:07 -080016 * You should have received a copy of the GNU General Public License along with
17 * ndnSIM, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
18 **/
Alexander Afanasyev34e13f32014-12-14 15:13:28 -080019
20#include "dummy-keychain.hpp"
21
22#include <ndn-cxx/util/io.hpp>
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070023#include <ndn-cxx/security/transform/public-key.hpp>
Alexander Afanasyev34e13f32014-12-14 15:13:28 -080024#include <boost/iostreams/device/array.hpp>
Spyridon Mastorakisb0b22412016-12-07 14:33:46 -080025#include <boost/iostreams/stream.hpp>
Alexander Afanasyev34e13f32014-12-14 15:13:28 -080026
27namespace ndn {
28namespace security {
29
30static const uint8_t DUMMY_CERT[] =
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070031 "Bv0CqQclCAVkdW1teQgDS0VZCAgtnChyuKo7YAgCTkEICf0AAAFe3zzGfBQJGAEC"
32 "GQQANu6AFf0BJjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOJSa1j6"
33 "JAzobrmtlUdJi38EWQZOigLykf9psImvIu7pa29Q3apBXENcV1E9687FmfY85Ec3"
34 "/onMtN7WG/wiuKiu/9eOr5WslD3VGDgxhesx80ygP0GNsN8FzsMl0lRKduXx3wG4"
35 "MCT8CX7uA4n4JbHY+0QaKUEEMRCiXcRAtF+yKfr+GaVeSemg+i/LR+6CSgpOyH0K"
36 "ogH9nlNhBn1Hxyc8X+B/nEu6P6NNEKkSnhT1jAbWtT1eL3BPGK/HNY19w9k2Ln6/"
37 "OYlhaHfB4m0oR/ePcUguQBwTgYS+40YQYUPivBsSQv3X2/7+gGLhIzA4YppwOooK"
38 "RGhbmL8zF2evmJ8CAwEAARZHGwEBHBgHFggFZHVtbXkIA0tFWQgILZwocriqO2D9"
39 "AP0m/QD+DzIwMTcxMDAyVDIyMzczNv0A/w8yMDE4MTAwMlQyMjM3MzUX/QEAMBUV"
40 "O51BEQwxp646i7IuHkuc1C/LISnOP2+wBFF2Ea1ht9MKjKkyJdmB1/GAOiR3njKd"
41 "UgRjBlownL11EwYDxkPY39RR05TmhF6PkpP81Ro/Vzv7rtSi/dxFIZXCiyuKPRUx"
42 "E0pZelPWVs3zMfqQ+8rWG89Kqs1vM0dglLBzlX9Lbim71TyLmaJaMmmBKv8+eQ22"
43 "CN71sRZOovl1kKcTHpOm61nD3C1n9GRflFtaMAXE/XU4zMJVzBv6XwQl6PCIc9H2"
44 "vjLa28ruVjhMGxqCGhziTC2eR56SUixrnEcbOKT0R+8+0AFnZIjdYglOZPcVwTVB"
45 "G6OxECJOuSoREcd1Ww==;";
Alexander Afanasyev34e13f32014-12-14 15:13:28 -080046
47static const uint8_t DUMMY_SIGNATURE[] =
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070048 {0x17, 0xfd, 0x01, 0x00, 0x93, 0x15, 0x09, 0x49, 0x79, 0x9e, 0xb7, 0x9c, 0xd3, 0xc1, 0xbf, 0x61,
49 0x89, 0xd5, 0xd9, 0xca, 0xf2, 0xb0, 0x14, 0xae, 0x72, 0x7c, 0x1f, 0x8f, 0xf5, 0xb1, 0x70, 0xd6,
50 0x9b, 0x8f, 0xf8, 0xd7, 0x2d, 0xbc, 0x92, 0x6f, 0x7d, 0x77, 0x96, 0x46, 0xea, 0xd4, 0x7d, 0x90,
51 0xbc, 0x7a, 0xeb, 0xe2, 0x03, 0x93, 0xb1, 0xd2, 0x62, 0xec, 0x9d, 0xff, 0x9c, 0x9c, 0x2a, 0x14,
52 0x7d, 0x23, 0xca, 0x29, 0x3d, 0x15, 0x1a, 0x40, 0x42, 0x2c, 0x59, 0x33, 0x8a, 0xf7, 0xc0, 0x6b,
53 0xc4, 0x9c, 0xf3, 0xc4, 0x99, 0xa4, 0x1a, 0x60, 0xf5, 0x28, 0x7d, 0x4c, 0xef, 0x43, 0x7d, 0xbd,
54 0x7d, 0x00, 0x51, 0xee, 0x41, 0xf5, 0x25, 0x80, 0xce, 0xe6, 0x64, 0x4f, 0x75, 0x54, 0xf3, 0xb2,
55 0x99, 0x9a, 0x0f, 0x93, 0x9a, 0x28, 0x1d, 0xfe, 0x12, 0x8a, 0xe0, 0xc1, 0x02, 0xeb, 0xa4, 0x35,
56 0x52, 0x88, 0xac, 0x44, 0x1a, 0x44, 0x82, 0x97, 0x4f, 0x5f, 0xa8, 0xd8, 0x9f, 0x67, 0x38, 0xa8,
57 0x64, 0xb6, 0x62, 0x99, 0xbd, 0x96, 0x3c, 0xf5, 0x86, 0x09, 0x5c, 0x97, 0x6b, 0x8f, 0xae, 0xe0,
58 0x60, 0xe7, 0x23, 0x98, 0x6a, 0xee, 0xc1, 0xb0, 0x14, 0xbe, 0x46, 0x2c, 0xfb, 0xa7, 0x27, 0x73,
59 0xe4, 0xf3, 0x26, 0x33, 0xba, 0x99, 0xd4, 0x01, 0x38, 0xa8, 0xf2, 0x9e, 0x87, 0xe0, 0x71, 0x0b,
60 0x25, 0x44, 0x07, 0x35, 0x88, 0xab, 0x67, 0x27, 0x56, 0x0e, 0xb5, 0xb5, 0xe8, 0x27, 0xb4, 0x49,
61 0xdc, 0xb8, 0x48, 0x31, 0xff, 0x99, 0x48, 0xab, 0x11, 0xb4, 0xa0, 0xdf, 0x8a, 0x6d, 0xff, 0x43,
62 0x69, 0x32, 0xa7, 0xbc, 0x63, 0x9d, 0x0f, 0xe0, 0x95, 0x34, 0x36, 0x25, 0x4b, 0x3e, 0x36, 0xbd,
63 0x81, 0x91, 0x0b, 0x91, 0x9f, 0x3a, 0x04, 0xa2, 0x44, 0x28, 0x19, 0xa1, 0x38, 0x21, 0x4f, 0x25,
64 0x59, 0x8a, 0x48, 0xc2};
Alexander Afanasyev34e13f32014-12-14 15:13:28 -080065
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070066const std::string DummyPib::SCHEME = "pib-dummy";
Alexander Afanasyevdf26b5a2015-01-15 23:30:56 -080067const std::string DummyTpm::SCHEME = "tpm-dummy";
68
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070069NDN_CXX_V2_KEYCHAIN_REGISTER_PIB_BACKEND(DummyPib);
70NDN_CXX_V2_KEYCHAIN_REGISTER_TPM_BACKEND(DummyTpm);
Alexander Afanasyevdf26b5a2015-01-15 23:30:56 -080071
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070072DummyPib::DummyPib(const std::string& locator)
Alexander Afanasyev34e13f32014-12-14 15:13:28 -080073{
74}
75
76void
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070077DummyPib::setTpmLocator(const std::string& tpmLocator)
Alexander Afanasyevdf26b5a2015-01-15 23:30:56 -080078{
79 m_tpmLocator = tpmLocator;
80}
81
82std::string
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070083DummyPib::getTpmLocator() const
Alexander Afanasyevdf26b5a2015-01-15 23:30:56 -080084{
85 return m_tpmLocator;
86}
87
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070088bool
89DummyPib::hasIdentity(const Name& identityName) const
Alexander Afanasyevdf26b5a2015-01-15 23:30:56 -080090{
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070091 return true;
Alexander Afanasyevdf26b5a2015-01-15 23:30:56 -080092}
93
Spyridon Mastorakis17be0582017-09-27 20:32:39 -070094void
95DummyPib::addIdentity(const Name& identityName)
96{
97}
98
99void
100DummyPib::removeIdentity(const Name& identity)
101{
102}
103
104void
105DummyPib::clearIdentities()
106{
107}
108
109std::set<Name>
110DummyPib::getIdentities() const
111{
112 std::set<Name> identities;
113 identities.insert("/dummy");
114 return identities;
115}
116
117void
118DummyPib::setDefaultIdentity(const Name& identityName)
119{
120}
121
122Name
123DummyPib::getDefaultIdentity() const
124{
125 return "/dummy";
126}
127
128bool
129DummyPib::hasKey(const Name& keyName) const
130{
131 return true;
132}
133
134void
135DummyPib::addKey(const Name& identity, const Name& keyName,
136 const uint8_t* key, size_t keyLen)
137{
138}
139
140void
141DummyPib::removeKey(const Name& keyName)
142{
143}
144
145Buffer
146DummyPib::getKeyBits(const Name& keyName) const
147{
148 typedef boost::iostreams::stream<boost::iostreams::array_source> arrayStream;
149 arrayStream
150 is(reinterpret_cast<const char*>(DUMMY_CERT), sizeof(DUMMY_CERT));
151 auto cert = io::load<v2::Certificate>(is, io::BASE64);
152 return cert->getPublicKey();
153}
154
155std::set<Name>
156DummyPib::getKeysOfIdentity(const Name& identity) const
157{
158 std::set<Name> keys;
159 keys.insert("/dummy/KEY/-%9C%28r%B8%AA%3B%60");
160 return keys;
161}
162
163void
164DummyPib::setDefaultKeyOfIdentity(const Name& identity, const Name& keyName)
165{
166}
167
168Name
169DummyPib::getDefaultKeyOfIdentity(const Name& identity) const
170{
171 return "/dummy/KEY/-%9C%28r%B8%AA%3B%60";
172}
173
174bool
175DummyPib::hasCertificate(const Name& certName) const
176{
177 return true;
178}
179
180void
181DummyPib::addCertificate(const v2::Certificate& certificate)
182{
183}
184
185void
186DummyPib::removeCertificate(const Name& certName)
187{
188}
189
190v2::Certificate
191DummyPib::getCertificate(const Name& certificateName) const
192{
193 static shared_ptr<v2::Certificate> cert = nullptr;
194 if (cert == nullptr) {
195 typedef boost::iostreams::stream<boost::iostreams::array_source> arrayStream;
196 arrayStream
197 is(reinterpret_cast<const char*>(DUMMY_CERT), sizeof(DUMMY_CERT));
198 cert = io::load<v2::Certificate>(is, io::BASE64);
199 }
200
201 return *cert;
202}
203
204std::set<Name>
205DummyPib::getCertificatesOfKey(const Name& keyName) const
206{
207 std::set<Name> certs;
208 certs.insert("/dummy/KEY/-%9C%28r%B8%AA%3B%60/self/%FD%00%00%01%5E%DF%3Bv%01");
209 return certs;
210}
211
212void
213DummyPib::setDefaultCertificateOfKey(const Name& keyName, const Name& certName)
214{
215}
216
217v2::Certificate
218DummyPib::getDefaultCertificateOfKey(const Name& keyName) const
219{
220 static shared_ptr<v2::Certificate> cert = nullptr;
221 if (cert == nullptr) {
222 typedef boost::iostreams::stream<boost::iostreams::array_source> arrayStream;
223 arrayStream
224 is(reinterpret_cast<const char*>(DUMMY_CERT), sizeof(DUMMY_CERT));
225 cert = io::load<v2::Certificate>(is, io::BASE64);
226 }
227
228 return *cert;
229}
230
231std::string
232DummyPib::getScheme()
233{
234 return DummyPib::SCHEME;
235}
236
237//////////////////////////////////////////////////////////////////////////////////////////
238//////////////////////////////////////////////////////////////////////////////////////////
239//////////////////////////////////////////////////////////////////////////////////////////
240//////////////////////////////////////////////////////////////////////////////////////////
241
242namespace tpm {
243
244DummyKeyHandle::DummyKeyHandle(shared_ptr<transform::PrivateKey> key)
245{
246}
247
248ConstBufferPtr
249DummyKeyHandle::doSign(DigestAlgorithm digestAlgorithm, const uint8_t* buf, size_t size) const
250{
251 return make_shared<Buffer>(DUMMY_SIGNATURE, sizeof(DUMMY_SIGNATURE));
252}
253
254ConstBufferPtr
255DummyKeyHandle::doDecrypt(const uint8_t* cipherText, size_t cipherTextLen) const
256{
257 throw Error("Not supported");
258}
259
260ConstBufferPtr
261DummyKeyHandle::doDerivePublicKey() const
262{
263 throw Error("Not supported");
264}
265
266} // namespace tpm
267
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800268//////////////////////////////////////////////////////////////////////////////////////////
269//////////////////////////////////////////////////////////////////////////////////////////
270//////////////////////////////////////////////////////////////////////////////////////////
271//////////////////////////////////////////////////////////////////////////////////////////
272
Alexander Afanasyevdf26b5a2015-01-15 23:30:56 -0800273DummyTpm::DummyTpm(const std::string& locator)
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800274{
275}
276
277bool
Spyridon Mastorakis17be0582017-09-27 20:32:39 -0700278DummyTpm::isTerminalMode() const
279{
280 return false;
281}
282
283void
284DummyTpm::setTerminalMode(bool isTerminal) const
285{
286}
287
288bool
289DummyTpm::isTpmLocked() const
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800290{
291 return false;
292}
293
294bool
Spyridon Mastorakis17be0582017-09-27 20:32:39 -0700295DummyTpm::doHasKey(const Name& keyName) const
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800296{
297 return false;
298}
299
Spyridon Mastorakis17be0582017-09-27 20:32:39 -0700300unique_ptr<tpm::KeyHandle>
301DummyTpm::doGetKeyHandle(const Name& keyName) const
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800302{
Spyridon Mastorakis17be0582017-09-27 20:32:39 -0700303 unique_ptr<tpm::KeyHandle> m_dummyKeyHandle = make_unique<tpm::DummyKeyHandle>(nullptr);
304 return m_dummyKeyHandle;
305}
306
307unique_ptr<tpm::KeyHandle>
308DummyTpm::doCreateKey(const Name& identity, const KeyParams& params)
309{
310 unique_ptr<tpm::KeyHandle> m_dummyKeyHandle = make_unique<tpm::DummyKeyHandle>(nullptr);
311 return m_dummyKeyHandle;
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800312}
313
314void
Spyridon Mastorakis17be0582017-09-27 20:32:39 -0700315DummyTpm::doDeleteKey(const Name& keyName)
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800316{
317 throw Error("Not supported");
318}
319
320ConstBufferPtr
Spyridon Mastorakis17be0582017-09-27 20:32:39 -0700321DummyTpm::doExportKey(const Name& keyName, const char* pw, size_t pwLen)
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800322{
323 throw Error("Not supported");
324}
325
326void
Spyridon Mastorakis17be0582017-09-27 20:32:39 -0700327DummyTpm::doImportKey(const Name& keyName, const uint8_t* pkcs8, size_t pkcs8Len, const char* pw, size_t pwLen)
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800328{
329 throw Error("Not supported");
330}
331
Alexander Afanasyevdf26b5a2015-01-15 23:30:56 -0800332std::string
333DummyTpm::getScheme()
334{
335 return DummyTpm::SCHEME;
336}
337
Alexander Afanasyev34e13f32014-12-14 15:13:28 -0800338} // namespace security
339} // namespace ndn