1 | C++ API |
---|
2 | |
---|
3 | (see bottom for notes on C, Perl, and Python.) |
---|
4 | |
---|
5 | ABAC::abac_chunk_t |
---|
6 | unsigned char *data |
---|
7 | int len |
---|
8 | |
---|
9 | structure, represents a blob of memory |
---|
10 | used to load/return DER-encoded X509 certificates |
---|
11 | |
---|
12 | ABAC::Context |
---|
13 | Context() |
---|
14 | default constructor, takes no argument |
---|
15 | Context(const Context &ctx) |
---|
16 | copy constructor, used for cloning the context |
---|
17 | |
---|
18 | int load_id_chunk(abac_chunk_t chunk) |
---|
19 | int load_id_file(char *filename) |
---|
20 | load an identity certificate, returns: |
---|
21 | ABAC_CERT_SUCCESS successfully loaded |
---|
22 | ABAC_CERT_INVALID invalid certificate (or file not found) |
---|
23 | ABAC_CERT_BAD_SIG invalid signature |
---|
24 | |
---|
25 | int load_attribute_chunk(abac_chunk_t chunk) |
---|
26 | int load_attribute_file(char *filename) |
---|
27 | load an attribute certificate, returns the same values as above |
---|
28 | * additionally can return ABAC_CERT_MISSING_ISSUER if the issuer |
---|
29 | certificate has not been loaded |
---|
30 | |
---|
31 | void load_directory(char *path) |
---|
32 | load a directory full of certificates: |
---|
33 | first: ${path}/*_ID.{der,pem} as identity certificates |
---|
34 | then: ${path}/*_attr.der as attribute certificates |
---|
35 | |
---|
36 | std::vector<Credential> query(char *role, char *principal, bool &success) |
---|
37 | run the query: |
---|
38 | role <-?- principal |
---|
39 | returns true/false in success |
---|
40 | returns a proof upon success, partial proof on failure |
---|
41 | |
---|
42 | std::vector<Credential> credentials() |
---|
43 | returns a vector of all the credentials loaded in the context |
---|
44 | |
---|
45 | ABAC::Credential |
---|
46 | This is never instantiated directly. These will only ever be |
---|
47 | returned as a result of calls to Context::query or |
---|
48 | Context::credentials. |
---|
49 | |
---|
50 | Role &head() |
---|
51 | Role &tail() |
---|
52 | returns the head or tail of the credential |
---|
53 | see below for Role object |
---|
54 | |
---|
55 | abac_chunk_t attribute_cert() |
---|
56 | returns the DER-encoded attribute certificate, suitable for |
---|
57 | transmission over the network or storage in a file |
---|
58 | |
---|
59 | abac_chunk_t issuer_cert() |
---|
60 | returns the DER-encoded issuer certificate, again suitable for |
---|
61 | network transmission or file storage |
---|
62 | |
---|
63 | ABAC::Role |
---|
64 | Role(const Role &role) |
---|
65 | copy constructor, clones the role |
---|
66 | |
---|
67 | char *string() |
---|
68 | returns a string representation of the role |
---|
69 | |
---|
70 | the following are rarely used outside the library: |
---|
71 | |
---|
72 | Role(char *role_name) |
---|
73 | instantiate a role from a string |
---|
74 | |
---|
75 | bool is_principal() |
---|
76 | bool is_role() |
---|
77 | bool is_linking() |
---|
78 | indicates the type of role encoded |
---|
79 | |
---|
80 | char *principal() |
---|
81 | returns the principal part of any role |
---|
82 | char *role_name() |
---|
83 | returns the role name of any role (the part after the last dot) |
---|
84 | char *linked_role() |
---|
85 | returns the linked role of a linking role |
---|
86 | i.e., A.r1.r2, linked_role() returns A.r1 |
---|
87 | |
---|
88 | ABAC::ID |
---|
89 | ID(char *filename) |
---|
90 | load an ID cert from a file |
---|
91 | Will throw an exception if the cert cannot be loaded |
---|
92 | |
---|
93 | ID(char *cn, int validity) |
---|
94 | generates a new ID with the supplied CN and validity period |
---|
95 | - CN must be alphanumeric and begin with a letter |
---|
96 | - validity must be at least one second |
---|
97 | Will throw an exception if either of the above is violated |
---|
98 | |
---|
99 | void load_privkey(char *filename) |
---|
100 | loads the private key associated with the cert |
---|
101 | will throw an exception if the key cannot be loaded |
---|
102 | |
---|
103 | char *keyid() |
---|
104 | returns the SHA1 keyid of the cert |
---|
105 | |
---|
106 | char *cert_filename() |
---|
107 | returns a suggested filename for the generated ID cert, namely: |
---|
108 | ${CN}_id.pem |
---|
109 | |
---|
110 | char *privkey_filename() |
---|
111 | returns a suggested filename for the private key of the ID cert: |
---|
112 | ${CN}_key.pem |
---|
113 | |
---|
114 | void write_cert(FILE *out) |
---|
115 | writes a PEM-encoded cert to the file handle |
---|
116 | |
---|
117 | void write_cert(string& out) |
---|
118 | writes a PEM-encoded cert to a file named out |
---|
119 | |
---|
120 | void write_cert(char *out) |
---|
121 | writes a PEM-encoded cert to a file named out |
---|
122 | |
---|
123 | void write_privkey(FILE *out) |
---|
124 | writes a PEM-encoded private key to the file handle |
---|
125 | throws an exception if no private key is loaded |
---|
126 | |
---|
127 | void write_privkey(string& out) |
---|
128 | writes a PEM-encoded private key to a file named out |
---|
129 | throws an exception if no private key is loaded |
---|
130 | |
---|
131 | void write_privkey(char *out) |
---|
132 | writes a PEM-encoded private key a file named out |
---|
133 | throws an exception if no private key is loaded |
---|
134 | |
---|
135 | abac_chunk_t cert_chunk() |
---|
136 | returns a DER-encoded binary representation of the X.509 ID cert |
---|
137 | associated with this ID. |
---|
138 | can be passed to libabac's Context::load_id_chunk() |
---|
139 | |
---|
140 | In languages where swig is confused by overloading, the write_* functions |
---|
141 | are replaced with (for example) write_cert(FILE *) and |
---|
142 | write_cert_name(char*) to remove the ambiguity. perl and python |
---|
143 | use these names, and perl uses only the write_cert_name() forms. |
---|
144 | |
---|
145 | ABAC::Attribute |
---|
146 | |
---|
147 | N.B., The way you use this class is by instantiating the object, adding |
---|
148 | subjects to it, and then baking it. Only once it's baked can you access the |
---|
149 | X.509 cert. Once it's been baked you can no longer add subjects to it. |
---|
150 | |
---|
151 | Attribute(ID &issuer, char *role, int validity) |
---|
152 | Create an object to be signed by the given issuer with the given role |
---|
153 | and validity period |
---|
154 | An exception will be thrown if: |
---|
155 | - the issuer has no private key |
---|
156 | - the role name is invalid (must be alphanumeric) |
---|
157 | - the validity period is invalid (must be >= 1 second) |
---|
158 | |
---|
159 | (The following three methods will throw an exception if the certificate has |
---|
160 | been baked. They return false if there's an invalid principal or role name.) |
---|
161 | |
---|
162 | bool principal(char *keyid) |
---|
163 | Add a principal subject |
---|
164 | |
---|
165 | bool role(char *keyid, char *role) |
---|
166 | Add a role subject |
---|
167 | |
---|
168 | bool linking_role(char *keyid, char *role, char *linked) |
---|
169 | Add a linking role subject |
---|
170 | |
---|
171 | bool bake() |
---|
172 | Generate the cert. Call this after you've added subjects to your cert. |
---|
173 | This returns false if there are no subjects |
---|
174 | This will throw an exception if the cert's already been baked. |
---|
175 | |
---|
176 | bool baked() |
---|
177 | Returns true iff the cert has been baked. |
---|
178 | |
---|
179 | void write(FILE *out) |
---|
180 | Write the DER-encoded X.509 attribute cert to the open file handle |
---|
181 | Throws an exception if the cert isn't baked |
---|
182 | |
---|
183 | void write(string& out) |
---|
184 | Write the DER-encoded X.509 attribute cert to a file named out |
---|
185 | Throws an exception if the cert isn't baked |
---|
186 | |
---|
187 | void write(char *out) |
---|
188 | Write the DER-encoded X.509 attribute cert to a file named out |
---|
189 | Throws an exception if the cert isn't baked |
---|
190 | |
---|
191 | abac_chunk_t cert_chunk() |
---|
192 | returns a DER-encoded binary representation of the X.509 attribute |
---|
193 | cert associated with this cert |
---|
194 | Throws an exception if the cert isn't baked |
---|
195 | the chunk can be passed to libabac's Context::load_attribute_chunk() |
---|
196 | |
---|
197 | C API |
---|
198 | |
---|
199 | The C API is nearly identical to the C++ API. Due to lack of namespaces, |
---|
200 | all function names are preceeded by abac_. Furthermore, the parameter |
---|
201 | representing the object must be passed explicitly. |
---|
202 | |
---|
203 | Example: |
---|
204 | |
---|
205 | C++: ctx.load_attribute_file("test_attr.der"); |
---|
206 | C: abac_context_load_attribute_file(ctx, "test_attr.der"); |
---|
207 | |
---|
208 | C++: id.load_privkey("test_key.pem"); |
---|
209 | C: ret = abac_id_load_privkey(id, "test_key.pem"); |
---|
210 | |
---|
211 | Instead of copy constructors, the C API uses _dup. Therefore, to copy a |
---|
212 | role use abac_role_dup(role_t *), to copy a context use |
---|
213 | abac_context_dup(context_t *), and to copy a credential use |
---|
214 | abac_credential_dup(abac_credential_t *). |
---|
215 | |
---|
216 | abac_context_query() and abac_context_credentials() return |
---|
217 | NULL-terminated arrays of Credential objects (abac_credential_t * in C). |
---|
218 | When you are done with them, you must free the whole array at once using |
---|
219 | abac_context_credentials_free(). |
---|
220 | |
---|
221 | PERL AND PYTHON API |
---|
222 | |
---|
223 | The Perl and Python APIs are even more similar to the C++ API. The main |
---|
224 | changes are the use of native types instead of C/C++ types. |
---|
225 | |
---|
226 | - native strings instead of char * |
---|
227 | |
---|
228 | Perl: |
---|
229 | - arrayref instead of vector |
---|
230 | - string instead of chunk_t |
---|
231 | - Context::query returns a list of two elements: |
---|
232 | my ($success, $credentials) = $ctx->query($role, $principal); |
---|
233 | $success is a boolean |
---|
234 | $credentials is an arrayref of Credential objects |
---|
235 | |
---|
236 | Python: |
---|
237 | - tuple instead of vector |
---|
238 | - bytearray instead of chunk_t (>= 2.6) |
---|
239 | - string instead of chunk_t (< 2.6) |
---|
240 | - Context::query returns a tuple with two elements: |
---|
241 | (success, credentials) = ctx.query(role, principal) |
---|
242 | success is a boolean |
---|
243 | credentials is a tuple of Credential objects |
---|