source: examples/example_scripts/python/abac_e_attr.py @ 658e7ef

mei_rt2mei_rt2_fix_1
Last change on this file since 658e7ef was bea18ef, checked in by Mei <mei@…>, 12 years ago

1) add more tiny prover tests in examples/example_scripts
2) reverted the changes to ABAC_VERSION in libabac's abac_util.c

  • Property mode set to 100755
File size: 2.7 KB
RevLine 
[ba6027a]1#!/usr/bin/env python
2
[bea18ef]3"""
[ba6027a]4   abac_e_attr.py
5
[bea18ef]6   To demonstrate how to use ABAC's api in python with principal credential that uses
[ba6027a]7   encrypted private key
8
9   call:   attr_e_abac Soda_ID.pem Soda_private.pem Soda_attr.der pfile Cream_ID.pem
10
11   pre-conditions: generate Soda_ID.pem and Soda_private.pem with
12           creddy --generate --cn Soda
13                   generate Chocolate_ID.pem and Chocolate_private.pem with
14           creddy --generate --cn Cream
15                   generate passphrase file
16                   generate a private key using openssl
17
18   This program will generate an attribute rule, write it out to an external
19           file and also load it into the context (prolog db)
20           [keyid:Soda].delicious <- [Keyid:Chocolate]
21
22   Then, a query is made against the context to see if it is populated correctly.
23
24   Note: Cream's principal is loaded without it private key. It does not
25         need to because it is not being used to generate attribute credential
26
[bea18ef]27"""
[ba6027a]28
29
30
31
32from sys import argv, exit
33from ABAC import Context
34from ABAC import ID, Attribute, Role
35
36debug=0
37
38## initial context
39ctxt = Context()
40
41if len(argv) != 6:
42    print "Usage: abac_attr.py <cert.pem> <key.pem> <attr.der> <pfile> <c_cert.pem>"
43    exit(1)
44
45# load the ID and its key
46id = None
47try:
48    id = ID(argv[1])
49    id.id_load_encrypted_privkey_file(argv[2], argv[4])
50    cream_id = ID(argv[5])
51except Exception, e:
52    print "Problem loading ID cert: %s" % e
53    exit(1)
54
55if debug :
56    print "before the load"
57    id.print_key_chunk()
58
59# load the id into the context
60ctxt.load_id_encrypted_chunks(id.id_cert_chunk(), id.id_privkey_chunk(), argv[4])
61# another way to load the id into the context
62ctxt.load_id(cream_id)
63
64if debug :
65    print "after the load"
66    print "old,"
67    id.print_key_chunk()
68
69nid=ctxt.lookup_principal(id.id_keyid())
70if debug :
71    print "new,"
72    nid.print_key_chunk()
73
74out = ctxt.context_principals()
75print "\n...final principal set..."
76for x in out[1]:
77    print "%s " % x.string()
78
79
80# create an attribute cert
81head= Role(id.id_keyid(),"delicious")
82tail= Role(cream_id.id_keyid())
83
84attr = Attribute(head, 1800)
85attr.attribute_add_tail(tail)
86attr.attribute_bake()
87
88# load attribute cert into the context
89ctxt.load_attribute_chunk(attr.cert_chunk())
90
91# another way to load the attribute cert into the context,
92# ctxt.load_attribute(attr)
93
94# yet another way to load the attribute cert into the context,
95attr.attribute_write_cert(argv[3])
96# ctxt.load_attribute_file(argv[3])
97
98# what is in prolog db
99# ctxt.dump_yap_db()
100
101# run a proof
102role = Role(id.id_keyid(),"delicious")
103p=Role(cream_id.id_keyid())
104
105out = ctxt.query(role, p)
106for c in out[1]:
107    print "%s <- %s" % (c.head_string(), c.tail_string())
108
Note: See TracBrowser for help on using the repository browser.