[31b67d5] | 1 | package net.deterlab.abac; |
---|
| 2 | |
---|
[7ef13e3] | 3 | import java.io.*; |
---|
[281158a] | 4 | import java.math.*; |
---|
[7ef13e3] | 5 | |
---|
| 6 | import java.util.*; |
---|
| 7 | import java.security.*; |
---|
| 8 | import java.security.cert.*; |
---|
| 9 | |
---|
[e36ea1d] | 10 | import javax.security.auth.x500.*; |
---|
[90f939f] | 11 | |
---|
| 12 | import org.bouncycastle.asn1.*; |
---|
[e9360e2] | 13 | import org.bouncycastle.asn1.x509.*; |
---|
[90f939f] | 14 | import org.bouncycastle.x509.*; |
---|
[e36ea1d] | 15 | import org.bouncycastle.x509.util.*; |
---|
| 16 | import org.bouncycastle.openssl.*; |
---|
| 17 | |
---|
| 18 | /** |
---|
| 19 | * An ABAC credential, with or without an underlying certificate that |
---|
[3797bbe] | 20 | * represents it. These are edges in proof graphs and can be constructed from |
---|
[e36ea1d] | 21 | * their constituent Roles. |
---|
| 22 | * @author <a href="http://abac.deterlab.net">ISI ABAC team</a> |
---|
[a1a9a47] | 23 | * @version 1.5 |
---|
[e36ea1d] | 24 | */ |
---|
[7b33c9b] | 25 | public abstract class Credential implements Comparable { |
---|
[675770e] | 26 | /** Default validity period (in seconds) */ |
---|
| 27 | static public long defaultValidity = 3600L * 24L * 365L; |
---|
[e36ea1d] | 28 | /** The role at the head */ |
---|
| 29 | protected Role m_head |
---|
| 30 | /** The role at the tail */; |
---|
[d69593c] | 31 | protected Role m_tail; |
---|
[e36ea1d] | 32 | /** The identity that issued the certificate */ |
---|
[d69593c] | 33 | protected Identity id; |
---|
[7f614c1] | 34 | /** The expiration time of the credential */ |
---|
| 35 | protected Date m_expiration; |
---|
[d31242c] | 36 | /** |
---|
| 37 | * Suggested file suffix to save this format credential under. Subclasses |
---|
| 38 | should override it. |
---|
| 39 | */ |
---|
| 40 | protected String suffix; |
---|
| 41 | /** Default file suffix. */ |
---|
| 42 | private static final String defSuffix = ".cred"; |
---|
[0595372] | 43 | |
---|
[9394f1f] | 44 | /** |
---|
[e36ea1d] | 45 | * Create an empty Credential. |
---|
[9394f1f] | 46 | */ |
---|
[a7f73b5] | 47 | Credential() { |
---|
[9394f1f] | 48 | m_head = m_tail = null; |
---|
[0595372] | 49 | id = null; |
---|
[7f614c1] | 50 | m_expiration = null; |
---|
[d31242c] | 51 | suffix = defSuffix; |
---|
[9394f1f] | 52 | } |
---|
[31b67d5] | 53 | /** |
---|
[e36ea1d] | 54 | * Create a credential from a head and tail role. This credential has no |
---|
| 55 | * underlying certificate, and cannot be exported or used in real proofs. |
---|
| 56 | * make_cert can create a certificate for a credential initialized this |
---|
| 57 | * way. |
---|
| 58 | * @param head the Role at the head of the credential |
---|
| 59 | * @param tail the Role at the tail of the credential |
---|
[31b67d5] | 60 | */ |
---|
[a7f73b5] | 61 | Credential(Role head, Role tail) { |
---|
[31b67d5] | 62 | m_head = head; |
---|
| 63 | m_tail = tail; |
---|
[0595372] | 64 | id = null; |
---|
[7f614c1] | 65 | m_expiration = null; |
---|
[d31242c] | 66 | suffix = defSuffix; |
---|
[31b67d5] | 67 | } |
---|
| 68 | |
---|
[7ef13e3] | 69 | /** |
---|
[e36ea1d] | 70 | * Create a credential from an attribute cert in a file. Throws an |
---|
| 71 | * exception if the cert file can't be opened or if there's a format |
---|
| 72 | * problem with the cert. Note that catching |
---|
| 73 | * java.security.GeneralSecurityException catches most of the exceptions |
---|
| 74 | * this throws. |
---|
| 75 | * @param filename a String containing the filename to read |
---|
| 76 | * @param ids a Collection of Identities to use in validating the cert |
---|
[44896b5] | 77 | * @throws CertInvalidException if the stream is unparsable |
---|
| 78 | * @throws MissingIssuerException if none of the Identities can validate the |
---|
[e36ea1d] | 79 | * certificate |
---|
[44896b5] | 80 | * @throws BadSignatureException if the signature check fails |
---|
[7ef13e3] | 81 | */ |
---|
[4d5f56d] | 82 | Credential(String filename, Collection<Identity> ids) |
---|
[44896b5] | 83 | throws ABACException { this(); } |
---|
[7ef13e3] | 84 | |
---|
| 85 | /** |
---|
[e36ea1d] | 86 | * Create a credential from an attribute cert in a file. Throws an |
---|
| 87 | * exception if the cert file can't be opened or if there's a format |
---|
| 88 | * problem with the cert. Note that catching |
---|
| 89 | * java.security.GeneralSecurityException catches most of the exceptions |
---|
| 90 | * this throws. |
---|
| 91 | * @param file the File to read |
---|
| 92 | * @param ids a Collection of Identities to use in validating the cert |
---|
[44896b5] | 93 | * @throws CertInvalidException if the stream is unparsable |
---|
| 94 | * @throws MissingIssuerException if none of the Identities can validate the |
---|
[e36ea1d] | 95 | * certificate |
---|
[44896b5] | 96 | * @throws BadSignatureException if the signature check fails |
---|
[7ef13e3] | 97 | */ |
---|
[4d5f56d] | 98 | Credential(File file, Collection<Identity> ids) |
---|
[d31242c] | 99 | throws ABACException { this(); } |
---|
[1a7e6d3] | 100 | |
---|
| 101 | /** |
---|
[e36ea1d] | 102 | * Create a credential from an InputStream. Throws an exception if the |
---|
| 103 | * stream can't be parsed or if there's a format problem with the cert. |
---|
| 104 | * Note that catching java.security.GeneralSecurityException catches most |
---|
| 105 | * of the exceptions this throws. |
---|
| 106 | * @param s the InputStream to read |
---|
| 107 | * @param ids a Collection of Identities to use in validating the cert |
---|
[44896b5] | 108 | * @throws CertInvalidException if the stream is unparsable |
---|
| 109 | * @throws MissingIssuerException if none of the Identities can validate the |
---|
[e36ea1d] | 110 | * certificate |
---|
[44896b5] | 111 | * @throws BadSignatureException if the signature check fails |
---|
[1a7e6d3] | 112 | */ |
---|
[4d5f56d] | 113 | Credential(InputStream s, Collection<Identity> ids) |
---|
[d31242c] | 114 | throws ABACException { this(); } |
---|
[7ef13e3] | 115 | |
---|
[e9360e2] | 116 | /** |
---|
[675770e] | 117 | * Create a certificate from this credential issued by the given identity, |
---|
| 118 | * valid for the given time. |
---|
| 119 | * @param i the Identity that will issue the certificate |
---|
| 120 | * @param validity a long holding the number of seconds that the credential |
---|
| 121 | * is valid for. |
---|
| 122 | * @throws ABACException for Credential-specific errors |
---|
| 123 | * @throws MissingIssuerException the identity is invalid |
---|
| 124 | * @throws BadSignatureException if the signature creation fails |
---|
| 125 | */ |
---|
| 126 | public abstract void make_cert(Identity i, long validity) |
---|
| 127 | throws ABACException; |
---|
| 128 | /** |
---|
| 129 | * Create a certificate from this credential issued by the given identity, |
---|
| 130 | * valid for the default interval. |
---|
[e36ea1d] | 131 | * @param i the Identity that will issue the certificate |
---|
[44896b5] | 132 | * @throws ABACException for Credential-specific errors |
---|
| 133 | * @throws MissingIssuerException the identity is invalid |
---|
| 134 | * @throws BadSignatureException if the signature creation fails |
---|
[e9360e2] | 135 | */ |
---|
[7b33c9b] | 136 | public abstract void make_cert(Identity i) |
---|
[44896b5] | 137 | throws ABACException; |
---|
[90f939f] | 138 | |
---|
[cfcdcb4b] | 139 | /** |
---|
[a7f73b5] | 140 | * Return true if 2 credentials represent the same ABAC. Two credentials |
---|
| 141 | * are the same if their roles are the same. |
---|
[e36ea1d] | 142 | * @param o an Object to compare |
---|
| 143 | * @return true if the Credentials have the Roles |
---|
[cfcdcb4b] | 144 | */ |
---|
| 145 | public boolean equals(Object o) { |
---|
| 146 | if ( o instanceof Credential ) { |
---|
| 147 | Credential c = (Credential) o; |
---|
| 148 | |
---|
| 149 | if (m_head == null || m_tail == null ) return false; |
---|
| 150 | else return (m_head.equals(c.head()) && m_tail.equals(c.tail())); |
---|
| 151 | } |
---|
| 152 | else return false; |
---|
| 153 | } |
---|
| 154 | |
---|
[0100d7b] | 155 | /** |
---|
| 156 | * Return a hash code for the Credential - the hashes of its roles. |
---|
| 157 | * @return an int, the hashCode |
---|
| 158 | */ |
---|
| 159 | public int hashCode() { |
---|
| 160 | if ( m_head == null || m_tail == null) return super.hashCode(); |
---|
| 161 | |
---|
| 162 | return m_head.hashCode() + m_tail.hashCode(); |
---|
| 163 | } |
---|
| 164 | |
---|
[e36ea1d] | 165 | /** |
---|
[a7f73b5] | 166 | * Compare 2 credentials for sorting. They are ordered by their Roles, |
---|
| 167 | * head then tail. |
---|
[e36ea1d] | 168 | * @param o an Object to compare |
---|
| 169 | * @return -1 if this Credential is before, 0 if they are the same, and 1 |
---|
| 170 | * if this Credential is after the given object. |
---|
| 171 | */ |
---|
[88e139a] | 172 | public int compareTo(Object o) { |
---|
| 173 | if (o instanceof Credential) { |
---|
| 174 | Credential c = (Credential) o; |
---|
| 175 | |
---|
| 176 | if (head().equals(c.head())) return tail().compareTo(c.tail()); |
---|
| 177 | else return head().compareTo(c.head()); |
---|
| 178 | } |
---|
| 179 | else return 1; |
---|
| 180 | } |
---|
| 181 | |
---|
| 182 | |
---|
[31b67d5] | 183 | /** |
---|
| 184 | * Get the head role from the credential. |
---|
[e36ea1d] | 185 | * @return the Role in the head |
---|
[31b67d5] | 186 | */ |
---|
[0595372] | 187 | public Role head() { return m_head; } |
---|
[31b67d5] | 188 | |
---|
| 189 | /** |
---|
| 190 | * Get the tail role from the credential |
---|
[e36ea1d] | 191 | * @return the Role in the tail |
---|
[31b67d5] | 192 | */ |
---|
[0595372] | 193 | public Role tail() { return m_tail; } |
---|
[31b67d5] | 194 | |
---|
[7f614c1] | 195 | /** |
---|
| 196 | * Get the expiration Date of the credential. |
---|
[461edba] | 197 | * @return the expiration as a Date |
---|
[7f614c1] | 198 | */ |
---|
| 199 | public Date expiration() { return m_expiration; } |
---|
| 200 | |
---|
[31b67d5] | 201 | /** |
---|
[a7f73b5] | 202 | * Return an untranslated string form of the credential. The format is head |
---|
| 203 | * <- tail. For example: A.r1 <- B.r2.r3. Principal names are key |
---|
| 204 | * identifiers. |
---|
[e36ea1d] | 205 | * @return the string form |
---|
[31b67d5] | 206 | */ |
---|
| 207 | public String toString() { |
---|
| 208 | return m_head + " <- " + m_tail; |
---|
| 209 | } |
---|
| 210 | |
---|
[e36ea1d] | 211 | /** |
---|
[a7f73b5] | 212 | * Return a translated string form of the credential. The format is head |
---|
| 213 | * <- tail. For example: A.r1 <- B.r2.r3. Principal names are |
---|
| 214 | * shortened to menmonics if the Context knows the identity. |
---|
[e36ea1d] | 215 | * @param c the Context to translate names in |
---|
| 216 | * @return the string form |
---|
| 217 | */ |
---|
[84f0e7a] | 218 | public String simpleString(Context c) { |
---|
| 219 | return m_head.simpleString(c) + " <- " + m_tail.simpleString(c); |
---|
[de63a31] | 220 | } |
---|
| 221 | |
---|
[e36ea1d] | 222 | /** |
---|
[a7f73b5] | 223 | * Output the external representation of the Credential to the OutputStream |
---|
| 224 | * given. Subclasses will overload this for their output format. |
---|
[e36ea1d] | 225 | * @param s the OutputStream on which to write |
---|
| 226 | * @throws IOException if there is an error writing. |
---|
| 227 | */ |
---|
[7b33c9b] | 228 | public abstract void write(OutputStream s) throws IOException; |
---|
[1a7e6d3] | 229 | |
---|
[e36ea1d] | 230 | /** |
---|
[a7f73b5] | 231 | * Output the external representation of the Credential to the filename |
---|
| 232 | * given. Subclasses will overload this for their output format. |
---|
[e36ea1d] | 233 | * @param fn a String containing the output filename |
---|
| 234 | * @throws IOException if there is an error writing. |
---|
| 235 | */ |
---|
[7b33c9b] | 236 | public abstract void write(String fn) |
---|
[461edba] | 237 | throws IOException; |
---|
[1a7e6d3] | 238 | |
---|
[e36ea1d] | 239 | /** |
---|
| 240 | * Return true if this Credential has a certificate associated. A jabac |
---|
| 241 | * extension. |
---|
| 242 | * @return true if this Credential has a certificate associated. |
---|
| 243 | */ |
---|
[7b33c9b] | 244 | public abstract boolean hasCertificate(); |
---|
[5cf72cc] | 245 | |
---|
[e36ea1d] | 246 | /** |
---|
[a7f73b5] | 247 | * Return the Identity that issued the underlying certificate (if any). A |
---|
| 248 | * jabac extension. |
---|
| 249 | * @return the Identity that issued the underlying certificate. |
---|
[e36ea1d] | 250 | */ |
---|
[d69593c] | 251 | public Identity issuer() { return id; } |
---|
[f84d71e] | 252 | |
---|
[d31242c] | 253 | /** |
---|
| 254 | * Return an suggested suffix for output files (most start with a "."). |
---|
| 255 | * @return a String, an optional suffix for output files. |
---|
| 256 | */ |
---|
| 257 | public String getSuffix() { return suffix; } |
---|
| 258 | |
---|
| 259 | /** |
---|
| 260 | * Set the suggested suffix for output files (most start with a "."). |
---|
| 261 | * Available for subclasses to set the value without knowing the member |
---|
| 262 | * name. |
---|
| 263 | * @param suff a String, an optional suffix for output files. |
---|
| 264 | */ |
---|
| 265 | protected void setSuffix(String suff) { suffix = suff; } |
---|
| 266 | |
---|
[31b67d5] | 267 | } |
---|