docs: spec of SafeBag format

This spec defines the TLV-based format of SafeBag, replacing the
previous SecureBag which uses DER-based encoding.

Change-Id: I001153bd3f4246a0f84656167b00c6387b2fea07
Refs: #3048
diff --git a/docs/tutorials/certificate-format.rst b/docs/tutorials/certificate-format.rst
deleted file mode 100644
index 0bb059f..0000000
--- a/docs/tutorials/certificate-format.rst
+++ /dev/null
@@ -1,221 +0,0 @@
-NDN Certificate Format Version 2.0
-==================================
-
-.. contents::
-
-Since signature verification is a common operation in NDN applications, it is
-important to define a common certificate format to standardize the public key
-authentication procedure.  As every NDN data packet is signed, a data packet
-that carries a public key as content is conceptually a certificate.  However,
-the specification of a data packet is not sufficient to be the specification of
-a common certificate format, as it requires additional components.  For example,
-a certificate may follow a specific naming convention and may need to include
-validity period, revocation information, etc.  This specification defines
-naming and components of the NDN certificates and is complementary to NDN packet
-specification.
-
-::
-
-                              Overview of NDN certificate format
-                                 +--------------------------+
-                                 |           Name           |
-                                 +--------------------------+
-                                 |         MetaInfo         |
-                                 |+------------------------+|
-                                 || ContentType:  KEY(2)   ||
-                                 |+------------------------+|
-                                 +--------------------------+
-                                 |          Content         |
-                                 |+------------------------+|
-                                 ||       Public Key       ||
-                                 |+------------------------+|
-                                 +--------------------------+
-                                 |       SignatureInfo      |
-                                 |+------------------------+|
-                                 || SignatureType:  ...    ||
-                                 || KeyLocator:     ...    ||
-                                 || ValidityPeriod: ...    ||
-                                 || ...                    ||
-                                 |+------------------------+|
-                                 +--------------------------+
-                                 |       SignatureValue     |
-                                 +--------------------------+
-
-
-Name
-----
-
-The name of a certificate consists of four parts as shown below:
-
-::
-
-    /<PrincipalName>/[KeyId]/KEY/[Version]
-
-A certificate name starts with the name to which a public key is bound.  The
-second part is a single name component, called KeyId, which should uniquely
-identify the key under the principal namespace.  The value of KeyId is up to
-the owner of the principal namespace (e.g., SHA-256 digest of the public key,
-timestamp, or numerical identifier).  A special name component ``KEY`` is
-appended after KeyId, which indicates that the data is a certificate.  The last
-component is version number.  For example,
-
-::
-
-    /edu/ucla/cs/yingdi/%03%CD...%F1/KEY/%FD%d2...%8E
-    \_________________/\___________/    \___________/
-      Principal Name      Key ID           Version
-
-
-MetaInfo
---------
-
-The ``ContentType`` of certificate is set to ``KEY`` (2).
-
-The ``FreshnessPeriod`` of certificate must be explicitly specified.  The
-recommended value is 1 hour (3,600,000 milliseconds).
-
-Content
--------
-
-By default, the content of a certificate is the public key encoded in
-`X509PublicKey <https://tools.ietf.org/html/rfc5280#section-4.1.2.7>`__ format.
-
-SignatureInfo
--------------
-
-Besides, ``SignatureType`` and ``KeyLocator``, the ``SignatureInfo`` field of a
-certificate include more optional fields.
-
-::
-
-    SignatureInfo ::= SIGNATURE-INFO-TYPE TLV-LENGTH
-                        SignatureType
-                        KeyLocator
-                        ValidityPeriod?
-                        ... (SignatureInfo Extension TLVs)
-
-One optional field is ``ValidityPeriod``, which contains two sub TLV fields:
-``NotBefore`` and ``NotAfter``, which are two UTC timestamps in ISO 8601 compact
-format (``yyyymmddTHHMMSS``, e.g., "20020131T235959").  NotBefore indicates
-when the certificate takes effect while NotAfter indicates when the certificate
-expires.
-
-.. note::
-    Using ISO style string is the convention of specifying validity period of
-    certificate, which has been adopted by many certificate systems, such as
-    X.509, PGP, and DNSSEC.
-
-::
-
-    ValidityPeriod ::= VALIDITY-PERIOD-TYPE TLV-LENGTH
-                         NotBefore
-                         NotAfter
-
-    NotBefore ::= NOT-BEFORE-TYPE TLV-LENGTH
-                    BYTE{15}
-
-    NotAfter ::= NOT-AFTER-TYPE TLV-LENGTH
-                   BYTE{15}
-
-For each TLV, the TLV-TYPE codes are assigned as below:
-
-+---------------------------------------------+-------------------+----------------+
-| TLV-TYPE                                    | Assigned code     | Assigned code  |
-|                                             | (decimal)         | (hexadecimal)  |
-+=============================================+===================+================+
-| ValidityPeriod                              | 253               | 0xFD           |
-+---------------------------------------------+-------------------+----------------+
-| NotBefore                                   | 254               | 0xFE           |
-+---------------------------------------------+-------------------+----------------+
-| NotAfter                                    | 255               | 0xFF           |
-+---------------------------------------------+-------------------+----------------+
-
-.. note::
-    TLV-TYPE code that falls into [253, 65536) is encoded in
-    `3-byte <http://named-data.net/doc/ndn-tlv/tlv.html#variable-size-encoding-for-type-t-and-length-l>`__
-
-Extensions
-~~~~~~~~~~
-
-A certificate may optionally carry some extensions in SignatureInfo.  An extension
-could be either critical or non-critical depends on the TLV-TYPE code convention.  An
-critical extension implies that if a validator cannot recognize or cannot parse the
-extension, the validator must reject the certificate.  An non-critical extension
-implies that if a validator cannot recognize or cannot parse the extension, the
-validator may ignore the extension.
-
-The TLV-TYPE code range [256, 512) is reserved for extensions.  The last bit of a
-TLV-TYPE code indicates whether the extension is critical or not: ``1`` for critical
-while ``0`` for non-critical.  If an extension could be either critical or
-non-critical, the extension should be allocated with two TLV-TYPE codes which only
-differ at the last bit.  For example, TLV-TYPE codes 256 and 257 are allocated to the
-``StatusChecking`` extension, 256 for critical StatusChecking while 257 for
-non-critical StatusChecking.
-
-
-Proposed Extensions
--------------------
-
-We list the proposed extensions here:
-
-+---------------------------------------------+-------------------+----------------+
-| TLV-TYPE                                    | Assigned code     | Assigned code  |
-|                                             | (decimal)         | (hexadecimal)  |
-+=============================================+===================+================+
-| StatusChecking (Non-critical)               | 256               | 0x0100         |
-+---------------------------------------------+-------------------+----------------+
-| StatusChecking (Critical)                   | 257               | 0x0101         |
-+---------------------------------------------+-------------------+----------------+
-| AdditionalDescription (Non-critical)        | 258               | 0x0102         |
-+---------------------------------------------+-------------------+----------------+
-| MultipleSignature (Critical)                | 259               | 0x0103         |
-+---------------------------------------------+-------------------+----------------+
-
-.. note::
-    TLV-TYPE code that falls into [253, 65536) is encoded in
-    `3-byte <http://named-data.net/doc/ndn-tlv/tlv.html#variable-size-encoding-for-type-t-and-length-l>`__
-
-Status Checking
-~~~~~~~~~~~~~~~
-
-TBD
-
-Multiple Signature
-~~~~~~~~~~~~~~~~~~
-
-TBD
-
-AdditionalDescription
-~~~~~~~~~~~~~~~~~~~~~
-
-``AdditionalDescription`` is a non-critical extension that provides additional
-information about the certificate.  The information is expressed as a set of
-key-value pairs.  Both key and value are UTF-8 strings, e.g.,
-``("Organization", "UCLA")``. The issuer of a certificate can specify arbitrary
-key-value pair to provide additional description about the certificate.
-
-::
-
-    AdditionalDescription ::= ADDITIONAL-DESCRIPTION-TYPE TLV-LENGTH
-                                DescriptionEntry+
-
-    DescriptionEntry ::= DESCRIPTION-ENTRY-TYPE TLV-LENGTH
-                           DescriptionKey
-                           DescriptionValue
-
-    DescriptionKey ::= DESCRIPTION-KEY-TYPE TLV-LENGTH
-                         BYTE+
-
-    DescriptionValue ::= DESCRIPTION-VALUE-TYPE TLV-LENGTH
-                           BYTE+
-
-+---------------------------------------------+-------------------+----------------+
-| TLV-TYPE                                    | Assigned code     | Assigned code  |
-|                                             | (decimal)         | (hexadecimal)  |
-+=============================================+===================+================+
-| DescriptionEntry                            | 512               | 0x0200         |
-+---------------------------------------------+-------------------+----------------+
-| DescriptionKey                              | 513               | 0x0201         |
-+---------------------------------------------+-------------------+----------------+
-| DescriptionValue                            | 514               | 0x0202         |
-+---------------------------------------------+-------------------+----------------+
diff --git a/docs/tutorials/security-library.rst b/docs/tutorials/security-library.rst
index 30d3de0..8ee8d40 100644
--- a/docs/tutorials/security-library.rst
+++ b/docs/tutorials/security-library.rst
@@ -251,7 +251,7 @@
 %%%%%%%%%%%%%%%%%
 
 The process of signing Interests according to the :doc:`Signed Interest specification
-<signed-interest>` is exactly the same as the process of signing Data packets:
+<../specs/signed-interest>` is exactly the same as the process of signing Data packets:
 
 .. code-block:: cpp
 
diff --git a/docs/tutorials/signed-interest.rst b/docs/tutorials/signed-interest.rst
deleted file mode 100644
index 093797a..0000000
--- a/docs/tutorials/signed-interest.rst
+++ /dev/null
@@ -1,129 +0,0 @@
-Signed Interest
-===============
-
-**Signed Interest** is a mechanism to issue an authenticated interest.
-
-The signature of a signed Interest packet is embedded into the last component of the Interest
-name. The signature covers a continuous block starting from the first name component TLV to the
-penultimate name component TLV:
-
-::
-
-    +-------------+----------+-----------------------------------------------------------------------------------+
-    |  Interest   | Interest | +------+--------+--------------------------------------------------+ +----------+ |
-    | Type (0x01) |  length  | | Name |  Name  | +---------+--   --+---------+---------+---------+| | Other    | |
-    |             |          | | Type | Length | |Component|  ...  |Component|Component|Component|| | TLVs ... | |
-    |             |          | |      |        | |  TLV 1  |       | TLV n-2 | TLV n-1 |  TLV n  || | in       | |
-    |             |          | |      |        | +---------+--   --+---------+---------+---------+| | Interest | |
-    |             |          | +------+--------+--------------------------------------------------+ +----------+ |
-    +-------------+----------+-----------------------------------------------------------------------------------+
-
-                                                 \                                    /\        /
-                                                  ----------------  ------------------  ---  ---
-                                                                  \/                       \/
-                                                       Signed portion of Interest       Signature
-
-More specifically, the SignedInterest is defined to have four additional components:
-
--  ``<timestamp>``
--  ``<nonce>``
--  ``<SignatureInfo>``
--  ``<SignatureValue>``
-
-For example, for ``/signed/interest/name`` name, CommandInterest will be defined as:
-
-::
-
-     /signed/interest/name/<timestamp>/<random-value>/<SignatureInfo>/<SignatureValue>
-
-                          \                                                         /
-                           -----------------------------  --------------------------
-                                                        \/
-                                  Additional components of Signed Interest
-
-Signed Interest specific Name components
-----------------------------------------
-
-Timestamp component (n-3 *th*)
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-The value of the n-3 *th* component is the interest's timestamp (in terms of millisecond offset
-from UTC 1970-01-01 00:00:00) encoded as
-`nonNegativeInteger <http://named-data.net/doc/ndn-tlv/tlv.html#non-negative-integer-encoding>`__.
-The timestamp may be used to protect against replay attack.
-
-Nonce component (n-2 *th*)
-~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-The value of the n-2 *th* component is random value (encoded as
-`nonNegativeInteger <http://named-data.net/doc/ndn-tlv/tlv.html#non-negative-integer-encoding>`__)
-that adds additional assurances that the interest will be unique.
-
-SignatureInfo component (n-1 *th*)
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-The value of the n-1 *th* component is actually a
-`SignatureInfo <http://named-data.net/doc/ndn-tlv/signature.html>`__ TLV.
-
-::
-
-    +---------+---------+-------------------+
-    |Component|Component| +---------------+ |
-    |   Type  |  Length | | SignatureInfo | |
-    |         |         | |      TLV      | |
-    |         |         | +---------------+ |
-    +---------+---------+-------------------+
-
-    |                                       |
-    |<---------The n-1 th Component-------->|
-
-SignatureValue component (n *th*)
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-The value of the n *th* component is actually a
-`SignatureValue <http://named-data.net/doc/ndn-tlv/signature.html>`__ TLV.
-
-::
-
-    +---------+---------+--------------------+
-    |Component|Component| +----------------+ |
-    |   Type  |  Length | | SignatureValue | |
-    |         |         | |      TLV       | |
-    |         |         | +----------------+ |
-    +---------+---------+--------------------+
-
-    |                                        |
-    |<----------The n th Component---------->|
-
-Signed Interest processing
---------------------------
-
-On receiving an Interest, the producer, according to the Interest name prefix, should be able
-to tell whether the Interest is required to be signed. If the received Interest is supposed to
-be signed, it will be treated as invalid in the following three cases:
-
--  one of the four components above (Timestamp, Nonce, SignatureValue, and SignatureInfo) is
-   missing or cannot be parsed correctly;
--  the key is not trusted for signing the Interest;
--  the signature cannot be verified with the public key pointed by the
-   `KeyLocator <http://named-data.net/doc/ndn-tlv/signature.html#keylocator>`__ in
-   SignatureInfo.
-
-Recipients of a signed interest may further check the timestamp and the uniqueness of the
-signed interest (e.g., when the signed interest carries a command). In this case, a signed
-interest may be treated as invalid if :
-
--  a valid signed Interest whose timestamp is **equal or later** than the timestamp of the
-   received one has been received before.
-
-Note that in order to detect this situation, the recipient needs to maintain a *latest
-timestamp* state for each trusted public key (**Since public key cryptography is used, sharing
-private keys is not recommended. If private key sharing is inevitable, it is the key owner's
-responsibility to keep clock synchronized**). For each trusted public key, the state is
-initialized as the timestamp of the first valid Interest signed by the key. Since then, the
-state will be updated every time when the recipient receives a valid signed Interest.
-
-Note that for the first Interest, the state is not available. To handle this special situation,
-the recipient should check the Interest's timestamp against a grace interval (e.g., 120
-seconds) [current\_timestamp - interval/2, current\_timestamp + interval/2]. The first interest
-is invalid if its timestamp is outside of the interval.