source: libabac/abac.h @ bec30b5

abac0-leakabac0-meimei-idtvf-new-xml
Last change on this file since bec30b5 was bec30b5, checked in by Mei <mei@…>, 11 years ago

1) change abac_context_load_directory to check on every regular files

and try to extract id id/privkey and then attribute in turn.

2) move id_certs to be context based instead of shared globally

  • Property mode set to 100644
File size: 9.2 KB
Line 
1#ifndef __ABAC_H__
2#define __ABAC_H__
3
4#include <time.h>  // for struct tm
5#include <stdio.h> // for FILE
6
7typedef struct _abac_context_t abac_context_t;
8typedef struct _abac_credential_t abac_credential_t;
9typedef struct _abac_id_cert_t abac_id_cert_t;
10typedef struct _abac_role_t abac_role_t;
11
12typedef struct _abac_id_t abac_id_t;
13typedef struct _abac_attribute_t abac_attribute_t;
14
15typedef struct _abac_list_t ABAC_LIST_T;
16
17typedef struct _abac_chunk_t {
18    unsigned char *ptr;
19    int len;
20} abac_chunk_t;
21
22/*
23 * ABAC functions, operating on an ABAC context.
24 */
25abac_context_t *abac_context_new(void);
26abac_context_t *abac_context_dup(abac_context_t *ctx);
27void abac_context_free(abac_context_t *ctx);
28
29/* see the bottom of the file for possible return codes */
30int abac_context_load_id_file(abac_context_t *ctx, char *filename);
31int abac_context_load_id_chunk(abac_context_t *ctx, abac_chunk_t cert);
32int abac_context_load_attribute_file(abac_context_t *ctx, char *filename);
33int abac_context_load_attribute_chunk(abac_context_t *ctx, abac_chunk_t cert);
34
35/* load an entire directory full of certs */
36void abac_context_load_directory(abac_context_t *ctx, char *path);
37
38/* abac query, returns a NULL-terminated array of credentials on success, NULL on fail */
39abac_credential_t **abac_context_query(abac_context_t *ctx, char *role, char *principal, int *success);
40
41/* get all the credentials from the context, returns a NULL-terminated array of credentials */
42abac_credential_t **abac_context_credentials(abac_context_t *ctx);
43
44/* use this to free the results of either of the previous two functions */
45void abac_context_credentials_free(abac_credential_t **credentials);
46
47/*
48 * Operations on credentials
49 */
50abac_role_t *abac_credential_head(abac_credential_t *cred);
51abac_role_t *abac_credential_tail(abac_credential_t *cred);
52abac_chunk_t abac_credential_attribute_cert(abac_credential_t *cred);
53abac_chunk_t abac_credential_issuer_cert(abac_credential_t *cred);
54
55abac_credential_t *abac_credential_dup(abac_credential_t *cred);
56void abac_credential_free(abac_credential_t *cred);
57
58/*
59 * Operations on roles.
60 */
61abac_role_t *abac_role_principal_new(char *principal);
62abac_role_t *abac_role_role_new(char *principal, char *abac_role_name);
63abac_role_t *abac_role_linking_new(char *principal, char *linked_role, char *abac_role_name);
64
65void abac_role_free(abac_role_t *role);
66
67abac_role_t *abac_role_from_string(char *string);
68abac_role_t *abac_role_dup(abac_role_t *role);
69
70int abac_role_is_principal(abac_role_t *role);
71int abac_role_is_role(abac_role_t *role);
72int abac_role_is_linking(abac_role_t *role);
73int abac_role_is_intersection(abac_role_t *role);
74
75char *abac_role_string(abac_role_t *role);
76char *abac_role_linked_role(abac_role_t *role);
77char *abac_role_role_name(abac_role_t *role);
78char *abac_role_principal(abac_role_t *role);
79
80char *abac_role_attr_key(abac_role_t *head_role, abac_role_t *tail_role);
81
82/*
83 * Operations on ID
84 */
85// create an ID from an X.509 certificate
86abac_id_t *abac_id_from_file(char *);
87
88// create an ID from a X.509 certificate PEM chunk
89abac_id_t *abac_id_from_chunk(abac_chunk_t chunk);
90
91// load an X.509 private key from a file
92int abac_id_privkey_from_file(abac_id_t *id, char *filename);
93
94// load an X.509 private key from a chunk
95int abac_id_privkey_from_chunk(abac_id_t *id, abac_chunk_t chunk);
96
97// generate an ID
98// returns one of ABAC_SUCCESS or ABAC_GENERATE_* (see top)
99int abac_id_generate(abac_id_t **ret, char *cn, long validity);
100
101// generate an ID using supplied private key
102// returns one of ABAC_SUCCESS or ABAC_GENERATE_* (see top)
103int abac_id_generate_with_key(abac_id_t **ret, char *cn, long validity, char *keyfile);
104
105// get the SHA1 keyid, pointer is valid for the lifetime of the object
106char *abac_id_keyid(abac_id_t *id);
107
108// get the name of the issuer
109// caller must free the returned string
110char *abac_id_issuer(abac_id_t *id);
111
112// get the DN of the subject
113// caller must free the returned string
114char *abac_id_subject(abac_id_t *id);
115
116// check if the cert is still valid
117int abac_id_still_valid(abac_id_t *id);
118
119// check if the principal cert's keyid is specified
120int abac_id_has_keyid(abac_id_t *id, char *);
121
122// check if the cert is has a private key
123int abac_id_has_privkey(abac_id_t *id);
124
125// get the validity period of the cert
126int abac_id_validity(abac_id_t *id, struct tm *not_before, struct tm *not_after);
127
128// default filename for the cert: ${CN}_ID.pem
129// caller must free the returned string
130char *abac_id_cert_filename(abac_id_t *id);
131
132// write the cert fo an open file pointer
133int abac_id_write_cert(abac_id_t *id, FILE *out);
134
135// default filename for the private key: ${CN}_key.pem
136// caller must free the return value
137char *abac_id_privkey_filename(abac_id_t *id);
138
139// write the private key to a file
140// it is recommended that you open this file mode 0600
141// returns false if there's no private key loaded
142int abac_id_write_privkey(abac_id_t *id, FILE *out);
143
144// get a chunk representing the cert
145// you must free the ptr of the chunk when done
146abac_chunk_t abac_id_cert_chunk(abac_id_t *id);
147
148// get a chunk representing the private key of the id
149abac_chunk_t abac_id_privkey_chunk(abac_id_t *id);
150
151// dup an ID (increases its refcount)
152abac_id_t *abac_id_dup(abac_id_t *id);
153
154// destroy the id
155// decreases refcount and destroys when it hits 0
156void abac_id_free(abac_id_t *id);
157
158/*
159 * Operations on Attribute
160 */
161//
162// Here's the skinny:
163//  Attribute cert objects don't contain an actual cert until they're baked.
164//  First you construct the object using abac_attribute_create, then you add
165//  subjects to it using abac_attribute_{principal,role,linking_role}.
166//  Finally you bake it. Once you've done that, you can keep it as XML chunk
167//  or write it to a file.
168//
169
170// create an attribute cert
171// validity is in days
172// returns one of CREDDY_SUCCESS or CREDDY_ATTRIBUTE_* (see top)
173int abac_attribute_create(abac_attribute_t **attr, abac_id_t *issuer, char *role, long validity);
174
175// add a head string to the cert
176void abac_attribute_set_head(abac_attribute_t *attr, char *string);
177
178// return the head string of the attribute
179char *abac_attribute_get_head(abac_attribute_t *);
180
181// add a tail role string to the cert
182void abac_attribute_set_tail(abac_attribute_t *attr, char *string);
183
184// return the tail string of the attribute
185char *abac_attribute_get_tail(abac_attribute_t *);
186
187// add a principal subject to the cert
188int abac_attribute_principal(abac_attribute_t *attr, char *keyid);
189
190// add a role subject
191int abac_attribute_role(abac_attribute_t *attr, char *keyid, char *role);
192
193// add a linking role subject
194int abac_attribute_linking_role(abac_attribute_t *attr, char *keyid, char *role, char *linked);
195
196// create the attribute cert once all the subjects have been added
197// can return 0 if there are no subjects or there's a problem building the cert
198int abac_attribute_bake(abac_attribute_t *attr);
199
200// returns true iff the cert's been baked
201int abac_attribute_baked(abac_attribute_t *attr);
202
203// write the cert to a file. returns 0 if the cert hasn't been baked
204int abac_attribute_write(abac_attribute_t *attr, FILE *out);
205int abac_attribute_write_file(abac_attribute_t *attr, const char *fname);
206
207// get chunked cert
208// returns 0 if the cert isn't baked
209abac_chunk_t abac_attribute_cert_chunk(abac_attribute_t *);
210
211// destroy the cert
212void abac_attribute_free(abac_attribute_t *);
213
214// load a list of attr cert from file (aborts on fail)
215ABAC_LIST_T *abac_attribute_certs_from_file(ABAC_LIST_T *,char *);
216
217// load a list of attr cert from chunk (aborts on fail)
218ABAC_LIST_T *abac_attribute_certs_from_chunk(ABAC_LIST_T *,abac_chunk_t);
219
220        // get the attribute role string
221char *abac_attribute_role_string(abac_attribute_t *attr);
222
223// get the issuer id of an attribute
224abac_id_t *abac_attribute_issuer_id(abac_attribute_t *ptr);
225
226// get the validity period of the attribute cert
227int abac_attribute_validity(abac_attribute_t *attr, struct tm *not_before, struct tm *not_after);
228
229// return the principal from an attribute's role string
230// callee must free the space
231char *abac_attribute_get_principal(abac_attribute_t *attr);
232
233// check if the attribute cert is still valid
234int abac_attribute_still_valid(abac_attribute_t *attr);
235
236/*
237 * Return code for libabac
238 */
239#define ABAC_RC_SUCCESS                0
240#define ABAC_RC_FAILURE                1
241
242/*
243 * Error codes for loading certificates.
244 */
245#define ABAC_CERT_SUCCESS           0   // certificate loaded, all is well
246#define ABAC_CERT_INVALID           -1  // invalid format; also file not found
247#define ABAC_CERT_BAD_SIG           -2  // invalid signature
248#define ABAC_CERT_MISSING_ISSUER    -3  // missing ID cert that issued the attribute cert
249#define ABAC_CERT_BAD_PRINCIPAL     -4  // Principal of attribute cert issuer has mismatch keyid
250#define ABAC_CERT_INVALID_ISSUER    -5  // Issuer of attribute cert is invalid
251#define ABAC_CERT_SIGNER_NOKEY      -6  // Signer of attribute cert is missing private key
252
253/*
254 * Error codes for IDs and Attributes
255 */
256#define ABAC_SUCCESS                          0
257#define ABAC_FAILURE                          1 /* catch all */
258#define ABAC_GENERATE_INVALID_CN             -1
259#define ABAC_GENERATE_INVALID_VALIDITY       -2
260#define ABAC_ATTRIBUTE_ISSUER_NOKEY          -3
261#define ABAC_ATTRIBUTE_INVALID_ROLE          -4
262#define ABAC_ATTRIBUTE_INVALID_VALIDITY      -5
263#define ABAC_ATTRIBUTE_INVALID_ISSUER        -6
264
265
266
267#endif /* __ABAC_H__ */
Note: See TracBrowser for help on using the repository browser.