1 | #!/usr/bin/env python |
---|
2 | |
---|
3 | /** |
---|
4 | abac_e_attr.py |
---|
5 | |
---|
6 | To demonstrate how to use ABAC's api in C with principal credential that uses |
---|
7 | encrypted private key |
---|
8 | |
---|
9 | call: attr_e_abac Soda_ID.pem Soda_private.pem Soda_attr.der pfile Cream_ID.pem |
---|
10 | |
---|
11 | pre-conditions: generate Soda_ID.pem and Soda_private.pem with |
---|
12 | creddy --generate --cn Soda |
---|
13 | generate Chocolate_ID.pem and Chocolate_private.pem with |
---|
14 | creddy --generate --cn Cream |
---|
15 | generate passphrase file |
---|
16 | generate a private key using openssl |
---|
17 | |
---|
18 | This program will generate an attribute rule, write it out to an external |
---|
19 | file and also load it into the context (prolog db) |
---|
20 | [keyid:Soda].delicious <- [Keyid:Chocolate] |
---|
21 | |
---|
22 | Then, a query is made against the context to see if it is populated correctly. |
---|
23 | |
---|
24 | Note: Cream's principal is loaded without it private key. It does not |
---|
25 | need to because it is not being used to generate attribute credential |
---|
26 | |
---|
27 | **/ |
---|
28 | |
---|
29 | |
---|
30 | |
---|
31 | |
---|
32 | from sys import argv, exit |
---|
33 | from ABAC import Context |
---|
34 | from ABAC import ID, Attribute, Role |
---|
35 | |
---|
36 | debug=0 |
---|
37 | |
---|
38 | ## initial context |
---|
39 | ctxt = Context() |
---|
40 | |
---|
41 | if len(argv) != 6: |
---|
42 | print "Usage: abac_attr.py <cert.pem> <key.pem> <attr.der> <pfile> <c_cert.pem>" |
---|
43 | exit(1) |
---|
44 | |
---|
45 | # load the ID and its key |
---|
46 | id = None |
---|
47 | try: |
---|
48 | id = ID(argv[1]) |
---|
49 | id.id_load_encrypted_privkey_file(argv[2], argv[4]) |
---|
50 | cream_id = ID(argv[5]) |
---|
51 | except Exception, e: |
---|
52 | print "Problem loading ID cert: %s" % e |
---|
53 | exit(1) |
---|
54 | |
---|
55 | if debug : |
---|
56 | print "before the load" |
---|
57 | id.print_key_chunk() |
---|
58 | |
---|
59 | # load the id into the context |
---|
60 | ctxt.load_id_encrypted_chunks(id.id_cert_chunk(), id.id_privkey_chunk(), argv[4]) |
---|
61 | # another way to load the id into the context |
---|
62 | ctxt.load_id(cream_id) |
---|
63 | |
---|
64 | if debug : |
---|
65 | print "after the load" |
---|
66 | print "old," |
---|
67 | id.print_key_chunk() |
---|
68 | |
---|
69 | nid=ctxt.lookup_principal(id.id_keyid()) |
---|
70 | if debug : |
---|
71 | print "new," |
---|
72 | nid.print_key_chunk() |
---|
73 | |
---|
74 | out = ctxt.context_principals() |
---|
75 | print "\n...final principal set..." |
---|
76 | for x in out[1]: |
---|
77 | print "%s " % x.string() |
---|
78 | |
---|
79 | |
---|
80 | # create an attribute cert |
---|
81 | head= Role(id.id_keyid(),"delicious") |
---|
82 | tail= Role(cream_id.id_keyid()) |
---|
83 | |
---|
84 | attr = Attribute(head, 1800) |
---|
85 | attr.attribute_add_tail(tail) |
---|
86 | attr.attribute_bake() |
---|
87 | |
---|
88 | # load attribute cert into the context |
---|
89 | ctxt.load_attribute_chunk(attr.cert_chunk()) |
---|
90 | |
---|
91 | # another way to load the attribute cert into the context, |
---|
92 | # ctxt.load_attribute(attr) |
---|
93 | |
---|
94 | # yet another way to load the attribute cert into the context, |
---|
95 | attr.attribute_write_cert(argv[3]) |
---|
96 | # ctxt.load_attribute_file(argv[3]) |
---|
97 | |
---|
98 | # what is in prolog db |
---|
99 | # ctxt.dump_yap_db() |
---|
100 | |
---|
101 | # run a proof |
---|
102 | role = Role(id.id_keyid(),"delicious") |
---|
103 | p=Role(cream_id.id_keyid()) |
---|
104 | |
---|
105 | out = ctxt.query(role, p) |
---|
106 | for c in out[1]: |
---|
107 | print "%s <- %s" % (c.head_string(), c.tail_string()) |
---|
108 | |
---|