[58ba801] | 1 | C++ API |
---|
| 2 | |
---|
| 3 | (see bottom for notes on C, Perl, and Python.) |
---|
[fe5682f] | 4 | |
---|
| 5 | ABAC::abac_chunk_t |
---|
| 6 | unsigned char *data |
---|
| 7 | int len |
---|
| 8 | |
---|
| 9 | structure, represents a blob of memory |
---|
| 10 | used to load/return DER-encoded X509 certificates |
---|
| 11 | |
---|
| 12 | ABAC::Context |
---|
| 13 | Context() |
---|
| 14 | default constructor, takes no argument |
---|
| 15 | Context(const Context &ctx) |
---|
| 16 | copy constructor, used for cloning the context |
---|
| 17 | |
---|
| 18 | int load_id_chunk(abac_chunk_t chunk) |
---|
| 19 | int load_id_file(char *filename) |
---|
| 20 | load an identity certificate, returns: |
---|
| 21 | ABAC_CERT_SUCCESS successfully loaded |
---|
| 22 | ABAC_CERT_INVALID invalid certificate (or file not found) |
---|
| 23 | ABAC_CERT_BAD_SIG invalid signature |
---|
| 24 | |
---|
| 25 | int load_attribute_chunk(abac_chunk_t chunk) |
---|
| 26 | int load_attribute_file(char *filename) |
---|
| 27 | load an attribute certificate, returns the same values as above |
---|
| 28 | * additionally can return ABAC_CERT_MISSING_ISSUER if the issuer |
---|
| 29 | certificate has not been loaded |
---|
| 30 | |
---|
| 31 | void load_directory(char *path) |
---|
| 32 | load a directory full of certificates: |
---|
[af15528] | 33 | first: ${path}/*_ID.{der,pem} as identity certificates |
---|
[fe5682f] | 34 | then: ${path}/*_attr.der as attribute certificates |
---|
| 35 | |
---|
| 36 | std::vector<Credential> query(char *role, char *principal, bool &success) |
---|
| 37 | run the query: |
---|
| 38 | role <-?- principal |
---|
| 39 | returns true/false in success |
---|
| 40 | returns a proof upon success, partial proof on failure |
---|
| 41 | |
---|
| 42 | std::vector<Credential> credentials() |
---|
| 43 | returns a vector of all the credentials loaded in the context |
---|
| 44 | |
---|
| 45 | ABAC::Credential |
---|
| 46 | This is never instantiated directly. These will only ever be |
---|
| 47 | returned as a result of calls to Context::query or |
---|
| 48 | Context::credentials. |
---|
| 49 | |
---|
| 50 | Role &head() |
---|
| 51 | Role &tail() |
---|
| 52 | returns the head or tail of the credential |
---|
| 53 | see below for Role object |
---|
| 54 | |
---|
| 55 | abac_chunk_t attribute_cert() |
---|
| 56 | returns the DER-encoded attribute certificate, suitable for |
---|
| 57 | transmission over the network or storage in a file |
---|
| 58 | |
---|
| 59 | abac_chunk_t issuer_cert() |
---|
| 60 | returns the DER-encoded issuer certificate, again suitable for |
---|
| 61 | network transmission or file storage |
---|
| 62 | |
---|
| 63 | ABAC::Role |
---|
| 64 | Role(const Role &role) |
---|
| 65 | copy constructor, clones the role |
---|
| 66 | |
---|
| 67 | char *string() |
---|
| 68 | returns a string representation of the role |
---|
| 69 | |
---|
| 70 | the following are rarely used outside the library: |
---|
| 71 | |
---|
| 72 | Role(char *role_name) |
---|
| 73 | instantiate a role from a string |
---|
| 74 | |
---|
| 75 | bool is_principal() |
---|
| 76 | bool is_role() |
---|
| 77 | bool is_linking() |
---|
| 78 | indicates the type of role encoded |
---|
| 79 | |
---|
| 80 | char *principal() |
---|
| 81 | returns the principal part of any role |
---|
| 82 | char *role_name() |
---|
| 83 | returns the role name of any role (the part after the last dot) |
---|
| 84 | char *linked_role() |
---|
| 85 | returns the linked role of a linking role |
---|
| 86 | i.e., A.r1.r2, linked_role() returns A.r1 |
---|
| 87 | |
---|
[461541a] | 88 | ABAC::ID |
---|
| 89 | ID(char *filename) |
---|
| 90 | load an ID cert from a file |
---|
| 91 | Will throw an exception if the cert cannot be loaded |
---|
| 92 | |
---|
| 93 | ID(char *cn, int validity) |
---|
| 94 | generates a new ID with the supplied CN and validity period |
---|
| 95 | - CN must be alphanumeric and begin with a letter |
---|
| 96 | - validity must be at least one second |
---|
| 97 | Will throw an exception if either of the above is violated |
---|
| 98 | |
---|
| 99 | void load_privkey(char *filename) |
---|
| 100 | loads the private key associated with the cert |
---|
| 101 | will throw an exception if the key cannot be loaded |
---|
| 102 | |
---|
| 103 | char *keyid() |
---|
| 104 | returns the SHA1 keyid of the cert |
---|
| 105 | |
---|
| 106 | char *cert_filename() |
---|
| 107 | returns a suggested filename for the generated ID cert, namely: |
---|
| 108 | ${CN}_id.pem |
---|
| 109 | |
---|
| 110 | char *privkey_filename() |
---|
| 111 | returns a suggested filename for the private key of the ID cert: |
---|
| 112 | ${CN}_key.pem |
---|
| 113 | |
---|
| 114 | void write_cert(FILE *out) |
---|
| 115 | writes a PEM-encoded cert to the file handle |
---|
| 116 | |
---|
| 117 | void write_cert(string& out) |
---|
| 118 | writes a PEM-encoded cert to a file named out |
---|
| 119 | |
---|
| 120 | void write_cert(char *out) |
---|
| 121 | writes a PEM-encoded cert to a file named out |
---|
| 122 | |
---|
| 123 | void write_privkey(FILE *out) |
---|
| 124 | writes a PEM-encoded private key to the file handle |
---|
| 125 | throws an exception if no private key is loaded |
---|
| 126 | |
---|
| 127 | void write_privkey(string& out) |
---|
| 128 | writes a PEM-encoded private key to a file named out |
---|
| 129 | throws an exception if no private key is loaded |
---|
| 130 | |
---|
| 131 | void write_privkey(char *out) |
---|
| 132 | writes a PEM-encoded private key a file named out |
---|
| 133 | throws an exception if no private key is loaded |
---|
| 134 | |
---|
| 135 | abac_chunk_t cert_chunk() |
---|
| 136 | returns a DER-encoded binary representation of the X.509 ID cert |
---|
| 137 | associated with this ID. |
---|
| 138 | can be passed to libabac's Context::load_id_chunk() |
---|
| 139 | |
---|
| 140 | In languages where swig is confused by overloading, the write_* functions |
---|
| 141 | are replaced with (for example) write_cert(FILE *) and |
---|
| 142 | write_cert_name(char*) to remove the ambiguity. perl and python |
---|
| 143 | use these names, and perl uses only the write_cert_name() forms. |
---|
| 144 | |
---|
| 145 | ABAC::Attribute |
---|
| 146 | |
---|
| 147 | N.B., The way you use this class is by instantiating the object, adding |
---|
| 148 | subjects to it, and then baking it. Only once it's baked can you access the |
---|
| 149 | X.509 cert. Once it's been baked you can no longer add subjects to it. |
---|
| 150 | |
---|
| 151 | Attribute(ID &issuer, char *role, int validity) |
---|
| 152 | Create an object to be signed by the given issuer with the given role |
---|
| 153 | and validity period |
---|
| 154 | An exception will be thrown if: |
---|
| 155 | - the issuer has no private key |
---|
| 156 | - the role name is invalid (must be alphanumeric) |
---|
| 157 | - the validity period is invalid (must be >= 1 second) |
---|
| 158 | |
---|
| 159 | (The following three methods will throw an exception if the certificate has |
---|
| 160 | been baked. They return false if there's an invalid principal or role name.) |
---|
| 161 | |
---|
| 162 | bool principal(char *keyid) |
---|
| 163 | Add a principal subject |
---|
| 164 | |
---|
| 165 | bool role(char *keyid, char *role) |
---|
| 166 | Add a role subject |
---|
| 167 | |
---|
| 168 | bool linking_role(char *keyid, char *role, char *linked) |
---|
| 169 | Add a linking role subject |
---|
| 170 | |
---|
| 171 | bool bake() |
---|
| 172 | Generate the cert. Call this after you've added subjects to your cert. |
---|
| 173 | This returns false if there are no subjects |
---|
| 174 | This will throw an exception if the cert's already been baked. |
---|
| 175 | |
---|
| 176 | bool baked() |
---|
| 177 | Returns true iff the cert has been baked. |
---|
| 178 | |
---|
| 179 | void write(FILE *out) |
---|
| 180 | Write the DER-encoded X.509 attribute cert to the open file handle |
---|
| 181 | Throws an exception if the cert isn't baked |
---|
| 182 | |
---|
| 183 | void write(string& out) |
---|
| 184 | Write the DER-encoded X.509 attribute cert to a file named out |
---|
| 185 | Throws an exception if the cert isn't baked |
---|
| 186 | |
---|
| 187 | void write(char *out) |
---|
| 188 | Write the DER-encoded X.509 attribute cert to a file named out |
---|
| 189 | Throws an exception if the cert isn't baked |
---|
| 190 | |
---|
| 191 | abac_chunk_t cert_chunk() |
---|
| 192 | returns a DER-encoded binary representation of the X.509 attribute |
---|
| 193 | cert associated with this cert |
---|
| 194 | Throws an exception if the cert isn't baked |
---|
| 195 | the chunk can be passed to libabac's Context::load_attribute_chunk() |
---|
| 196 | |
---|
[58ba801] | 197 | C API |
---|
[fe5682f] | 198 | |
---|
| 199 | The C API is nearly identical to the C++ API. Due to lack of namespaces, |
---|
| 200 | all function names are preceeded by abac_. Furthermore, the parameter |
---|
| 201 | representing the object must be passed explicitly. |
---|
| 202 | |
---|
| 203 | Example: |
---|
| 204 | |
---|
[58ba801] | 205 | C++: ctx.load_attribute_file("test_attr.der"); |
---|
| 206 | C: abac_context_load_attribute_file(ctx, "test_attr.der"); |
---|
| 207 | |
---|
[461541a] | 208 | C++: id.load_privkey("test_key.pem"); |
---|
| 209 | C: ret = abac_id_load_privkey(id, "test_key.pem"); |
---|
| 210 | |
---|
[58ba801] | 211 | Instead of copy constructors, the C API uses _dup. Therefore, to copy a |
---|
| 212 | role use abac_role_dup(role_t *), to copy a context use |
---|
| 213 | abac_context_dup(context_t *), and to copy a credential use |
---|
| 214 | abac_credential_dup(abac_credential_t *). |
---|
| 215 | |
---|
| 216 | abac_context_query() and abac_context_credentials() return |
---|
| 217 | NULL-terminated arrays of Credential objects (abac_credential_t * in C). |
---|
| 218 | When you are done with them, you must free the whole array at once using |
---|
| 219 | abac_context_credentials_free(). |
---|
| 220 | |
---|
| 221 | PERL AND PYTHON API |
---|
[fe5682f] | 222 | |
---|
| 223 | The Perl and Python APIs are even more similar to the C++ API. The main |
---|
| 224 | changes are the use of native types instead of C/C++ types. |
---|
| 225 | |
---|
| 226 | - native strings instead of char * |
---|
| 227 | |
---|
| 228 | Perl: |
---|
| 229 | - arrayref instead of vector |
---|
| 230 | - string instead of chunk_t |
---|
| 231 | - Context::query returns a list of two elements: |
---|
| 232 | my ($success, $credentials) = $ctx->query($role, $principal); |
---|
| 233 | $success is a boolean |
---|
| 234 | $credentials is an arrayref of Credential objects |
---|
| 235 | |
---|
| 236 | Python: |
---|
| 237 | - tuple instead of vector |
---|
| 238 | - bytearray instead of chunk_t (>= 2.6) |
---|
| 239 | - string instead of chunk_t (< 2.6) |
---|
| 240 | - Context::query returns a tuple with two elements: |
---|
| 241 | (success, credentials) = ctx.query(role, principal) |
---|
| 242 | success is a boolean |
---|
| 243 | credentials is a tuple of Credential objects |
---|