1 | #ifndef __CREDDY_HH__ |
---|
2 | #define __CREDDY_HH__ |
---|
3 | |
---|
4 | #include <cstdio> |
---|
5 | #include <stdexcept> |
---|
6 | |
---|
7 | namespace Creddy { |
---|
8 | extern "C" { |
---|
9 | #include <creddy.h> |
---|
10 | } |
---|
11 | |
---|
12 | class ID { |
---|
13 | public: |
---|
14 | ID() : m_id(NULL) { } // do not use: required by swig |
---|
15 | |
---|
16 | // load an ID from a file |
---|
17 | ID(char *filename) : m_id(NULL) { |
---|
18 | m_id = creddy_id_from_file(filename); |
---|
19 | if (m_id == NULL) |
---|
20 | throw std::invalid_argument("Could not load ID cert"); |
---|
21 | } |
---|
22 | |
---|
23 | // generate an ID with a given CN and validity |
---|
24 | ID(char *cn, int validity) : m_id(NULL) { |
---|
25 | int ret = creddy_id_generate(&m_id, cn, validity); |
---|
26 | if (ret == CREDDY_GENERATE_INVALID_CN) |
---|
27 | throw std::invalid_argument("CN must be alphanumeric and start with a letter"); |
---|
28 | if (ret == CREDDY_GENERATE_INVALID_VALIDITY) |
---|
29 | throw std::invalid_argument("Validity must be > 0 days"); |
---|
30 | } |
---|
31 | |
---|
32 | ID(const ID &id) { m_id = creddy_id_dup(id.m_id); } |
---|
33 | |
---|
34 | ~ID() { creddy_id_free(m_id); } |
---|
35 | |
---|
36 | // load private key from a file |
---|
37 | void load_privkey(char *filename) { |
---|
38 | int ret = creddy_id_load_privkey(m_id, filename); |
---|
39 | if (!ret) |
---|
40 | throw std::invalid_argument("Could not load private key"); |
---|
41 | } |
---|
42 | |
---|
43 | char *keyid() { return creddy_id_keyid(m_id); } |
---|
44 | char *cert_filename() { return creddy_id_cert_filename(m_id); } |
---|
45 | void write_cert(std::FILE *out) { creddy_id_write_cert(m_id, out); } |
---|
46 | char *privkey_filename() { return creddy_id_privkey_filename(m_id); } |
---|
47 | |
---|
48 | // write the private ket |
---|
49 | // throws a std::logic_error if no private key is loaded |
---|
50 | void write_privkey(std::FILE *out) { |
---|
51 | int ret = creddy_id_write_privkey(m_id, out); |
---|
52 | if (!ret) throw new std::logic_error("No private key loaded"); |
---|
53 | } |
---|
54 | |
---|
55 | abac_chunk_t cert_chunk() { return creddy_id_cert_chunk(m_id); } |
---|
56 | |
---|
57 | friend class Attribute; |
---|
58 | |
---|
59 | private: |
---|
60 | creddy_id_t *m_id; |
---|
61 | }; |
---|
62 | |
---|
63 | class Attribute { |
---|
64 | public: |
---|
65 | Attribute() : m_attr(NULL) { } // do not use: required by swig |
---|
66 | |
---|
67 | // create a cert |
---|
68 | Attribute(ID &issuer, char *role, int validity) : m_attr(NULL) { |
---|
69 | int ret = creddy_attribute_create(&m_attr, issuer.m_id, role, validity); |
---|
70 | if (ret == CREDDY_ATTRIBUTE_ISSUER_NOKEY) |
---|
71 | throw std::invalid_argument("Issuer has no private key"); |
---|
72 | if (ret == CREDDY_ATTRIBUTE_INVALID_ROLE) |
---|
73 | throw std::invalid_argument("Role name must be alphanumeric"); |
---|
74 | if (ret == CREDDY_ATTRIBUTE_INVALID_VALIDITY) |
---|
75 | throw std::invalid_argument("Validity must be > 0 days"); |
---|
76 | } |
---|
77 | |
---|
78 | ~Attribute() { creddy_attribute_free(m_attr); } |
---|
79 | |
---|
80 | // these return false if there's a bad keyid or role name |
---|
81 | // they'll throw a std::logic_error if the cert's been baked |
---|
82 | bool principal(char *keyid) { |
---|
83 | if (baked()) throw std::logic_error("Cert is already baked"); |
---|
84 | return creddy_attribute_principal(m_attr, keyid); |
---|
85 | } |
---|
86 | bool role(char *keyid, char *role) { |
---|
87 | if (baked()) throw std::logic_error("Cert is already baked"); |
---|
88 | return creddy_attribute_role(m_attr, keyid, role); |
---|
89 | } |
---|
90 | bool linking_role(char *keyid, char *role, char *linked) { |
---|
91 | if (baked()) throw std::logic_error("Cert is already baked"); |
---|
92 | return creddy_attribute_linking_role(m_attr, keyid, role, linked); |
---|
93 | } |
---|
94 | |
---|
95 | // returns false if there are no subjects or libstrongswan fails |
---|
96 | // throws a std::logic_error if the cert's already been baked |
---|
97 | bool bake() { |
---|
98 | if (baked()) throw std::logic_error("Cert is already baked"); |
---|
99 | return creddy_attribute_bake(m_attr); |
---|
100 | } |
---|
101 | |
---|
102 | // returns true iff the cert's been baked |
---|
103 | bool baked() { return creddy_attribute_baked(m_attr); } |
---|
104 | |
---|
105 | // throws a std::logic_error if the cert isn't baked |
---|
106 | void write(std::FILE *out) { |
---|
107 | int ret = creddy_attribute_write(m_attr, out); |
---|
108 | if (!ret) throw std::logic_error("Cert is not baked"); |
---|
109 | } |
---|
110 | |
---|
111 | // throws a std::logic_error if the cert isn't baked |
---|
112 | abac_chunk_t cert_chunk() { |
---|
113 | abac_chunk_t ret; |
---|
114 | if (!baked()) throw new std::logic_error("Cert is not baked"); |
---|
115 | creddy_attribute_cert_chunk(m_attr, &ret); |
---|
116 | return ret; |
---|
117 | } |
---|
118 | |
---|
119 | private: |
---|
120 | creddy_attribute_t *m_attr; |
---|
121 | }; |
---|
122 | } |
---|
123 | |
---|
124 | #endif /* __CREDDY_HH__ */ |
---|