|
|
@ -10,18 +10,42 @@ typedef enum issuer_state { |
|
|
typedef struct issuer { |
|
|
typedef struct issuer { |
|
|
struct ecdaa_issuer_public_key_FP256BN ipk; |
|
|
struct ecdaa_issuer_public_key_FP256BN ipk; |
|
|
struct ecdaa_issuer_secret_key_FP256BN isk; |
|
|
struct ecdaa_issuer_secret_key_FP256BN isk; |
|
|
|
|
|
uint8_t nonce[NONCE_SIZE]; |
|
|
|
|
|
struct ecdaa_member_public_key_FP256BN mpk; |
|
|
issuerstate_e state; |
|
|
issuerstate_e state; |
|
|
|
|
|
struct ecdaa_credential_FP256BN cred; |
|
|
|
|
|
struct ecdaa_credential_FP256BN_signature cred_sig; |
|
|
} issuer_t; |
|
|
} issuer_t; |
|
|
|
|
|
|
|
|
issuer_t issuer; |
|
|
issuer_t issuer; |
|
|
|
|
|
|
|
|
|
|
|
int issuer_setup(char *buffer); |
|
|
|
|
|
int issuer_joinstart(char *buffer); |
|
|
|
|
|
int issuer_joinproceed(char *buffer); |
|
|
|
|
|
int issuer_publish(char *buffer); |
|
|
|
|
|
|
|
|
int main() { |
|
|
int main() { |
|
|
int err = 0; |
|
|
int err = 0; |
|
|
|
|
|
|
|
|
if (2 != server_start(&process_issuer, ISSUERPORT)) { |
|
|
//if (2 != server_start(&process_issuer, ISSUERPORT)) {
|
|
|
printf("server failed\n"); |
|
|
// printf("server failed\n");
|
|
|
} |
|
|
//}
|
|
|
|
|
|
uint8_t buffer[1024]; |
|
|
|
|
|
uint8_t *current = buffer; |
|
|
|
|
|
char send[1024]; |
|
|
|
|
|
bzero(buffer, 1024); |
|
|
|
|
|
bzero(send,1024); |
|
|
|
|
|
|
|
|
|
|
|
struct ecdaa_issuer_public_key_FP256BN key; |
|
|
|
|
|
|
|
|
|
|
|
ecdaa_issuer_key_pair_FP256BN_generate(&issuer.ipk, &issuer.isk, ecdaa_rand); |
|
|
|
|
|
ecdaa_issuer_public_key_FP256BN_serialize(current, &issuer.ipk); |
|
|
|
|
|
ecdaa_bintohex((char*)current, ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH, send); |
|
|
|
|
|
printf("%s\n", send); |
|
|
|
|
|
bzero(current, 1024); |
|
|
|
|
|
ecdaa_hextobin(send, (char*)current, ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH); |
|
|
|
|
|
int ret = ecdaa_issuer_public_key_FP256BN_deserialize(&key, current); |
|
|
|
|
|
printf("%i\n",ret); |
|
|
return 0; |
|
|
return 0; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
@ -55,10 +79,9 @@ int process_issuer(char *buffer) { |
|
|
} else if (0 == strncasecmp("SETUP", buffer, 5)) { |
|
|
} else if (0 == strncasecmp("SETUP", buffer, 5)) { |
|
|
switch (issuer.state) { |
|
|
switch (issuer.state) { |
|
|
case ON: |
|
|
case ON: |
|
|
printf("setup()\n"); |
|
|
if(0 == issuer_setup(buffer)) { |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
|
|
|
strncpy(buffer, "SETUPDONE\n", 10); |
|
|
|
|
|
issuer.state = READY; |
|
|
issuer.state = READY; |
|
|
|
|
|
} |
|
|
break; |
|
|
break; |
|
|
default: |
|
|
default: |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
@ -68,10 +91,9 @@ int process_issuer(char *buffer) { |
|
|
} else if (0 == strncasecmp("JOIN", buffer, 4)) { |
|
|
} else if (0 == strncasecmp("JOIN", buffer, 4)) { |
|
|
switch (issuer.state) { |
|
|
switch (issuer.state) { |
|
|
case READY: |
|
|
case READY: |
|
|
printf("join()\n"); |
|
|
if(0 == issuer_joinstart(buffer)) { |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
|
|
|
strncpy(buffer, "JOINSTART\n", 10); |
|
|
|
|
|
issuer.state = JOINSTART; |
|
|
issuer.state = JOINSTART; |
|
|
|
|
|
} |
|
|
break; |
|
|
break; |
|
|
default: |
|
|
default: |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
@ -81,10 +103,9 @@ int process_issuer(char *buffer) { |
|
|
} else if (0 == strncasecmp("APPEND", buffer, 6)) { |
|
|
} else if (0 == strncasecmp("APPEND", buffer, 6)) { |
|
|
switch (issuer.state) { |
|
|
switch (issuer.state) { |
|
|
case JOINSTART: |
|
|
case JOINSTART: |
|
|
printf("append()\n"); |
|
|
if(0 == issuer_joinproceed(buffer)) { |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
|
|
|
strncpy(buffer, "JOINPROCEED\n", 12); |
|
|
|
|
|
issuer.state = READY; |
|
|
issuer.state = READY; |
|
|
|
|
|
} |
|
|
break; |
|
|
break; |
|
|
default: |
|
|
default: |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
@ -94,9 +115,7 @@ int process_issuer(char *buffer) { |
|
|
} else if (0 == strncasecmp("PUBLISH", buffer, 7)) { |
|
|
} else if (0 == strncasecmp("PUBLISH", buffer, 7)) { |
|
|
switch (issuer.state) { |
|
|
switch (issuer.state) { |
|
|
case READY: |
|
|
case READY: |
|
|
printf("publish()\n"); |
|
|
issuer_publish(buffer); |
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
|
|
|
strncpy(buffer, "PUBLISH\n", 8); |
|
|
|
|
|
issuer.state = READY; |
|
|
issuer.state = READY; |
|
|
break; |
|
|
break; |
|
|
default: |
|
|
default: |
|
|
@ -123,3 +142,82 @@ int process_issuer(char *buffer) { |
|
|
printf("< ISSUER: %s", buffer); |
|
|
printf("< ISSUER: %s", buffer); |
|
|
return ret; |
|
|
return ret; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// "JOIN" > "JOINSTART <issuer.nonce>"
|
|
|
|
|
|
int issuer_joinstart(char *buffer) { |
|
|
|
|
|
getrandom(issuer.nonce, NONCE_SIZE, GRND_RANDOM); |
|
|
|
|
|
char* current; |
|
|
|
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
|
|
|
strncpy(buffer, "JOINSTART ", 10); |
|
|
|
|
|
current = &buffer[10]; |
|
|
|
|
|
ecdaa_bintohex(issuer.nonce, NONCE_SIZE, buffer); |
|
|
|
|
|
buffer[2 * NONCE_SIZE + 10] = '\n'; |
|
|
|
|
|
return 0; |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// "APPEND <member.mpk>" > "JOINPROCEED <member.cred><member.cred_sig>"
|
|
|
|
|
|
int issuer_joinproceed(char *buffer) { |
|
|
|
|
|
char *current = &buffer[7]; |
|
|
|
|
|
uint8_t binbuf[MAX_BUFSIZE]; |
|
|
|
|
|
bzero(binbuf, MAX_BUFSIZE); |
|
|
|
|
|
|
|
|
|
|
|
ecdaa_hextobin(current, binbuf, ECDAA_MEMBER_PUBLIC_KEY_FP256BN_LENGTH); |
|
|
|
|
|
int ret = ecdaa_member_public_key_FP256BN_deserialize(&issuer.mpk, binbuf, issuer.nonce, NONCE_SIZE); |
|
|
|
|
|
if(-1 == ret) { |
|
|
|
|
|
printf("issuer_joinproceed: member public key is malformed!"); |
|
|
|
|
|
return -1; |
|
|
|
|
|
} else if (-2 == ret) { |
|
|
|
|
|
printf("issuer_joinproceed: signature of member public key is invalid"); |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
if (0 != ecdaa_credential_FP256BN_generate(&issuer.cred, &issuer.cred_sig, &issuer.isk, &issuer.mpk, ecdaa_rand)) { |
|
|
|
|
|
printf("issuer_joinproceed: error generating credential\n"); |
|
|
|
|
|
return -1; |
|
|
|
|
|
} |
|
|
|
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
|
|
|
strncpy(buffer, "JOINPROCEED ", 12); |
|
|
|
|
|
|
|
|
|
|
|
current = &buffer[12]; |
|
|
|
|
|
ecdaa_credential_FP256BN_serialize(binbuf, &issuer.cred); |
|
|
|
|
|
bzero(binbuf, MAX_BUFSIZE); |
|
|
|
|
|
ecdaa_bintohex(binbuf, ECDAA_CREDENTIAL_FP256BN_LENGTH, current); |
|
|
|
|
|
|
|
|
|
|
|
current = &buffer[12 + 2 * ECDAA_CREDENTIAL_FP256BN_LENGTH]; |
|
|
|
|
|
ecdaa_credential_FP256BN_signature_serialize(binbuf, &issuer.cred_sig); |
|
|
|
|
|
bzero(binbuf, MAX_BUFSIZE); |
|
|
|
|
|
ecdaa_bintohex(binbuf, ECDAA_CREDENTIAL_FP256BN_SIGNATURE_LENGTH, current); |
|
|
|
|
|
|
|
|
|
|
|
buffer[2 * ECDAA_CREDENTIAL_FP256BN_LENGTH + 2 * ECDAA_CREDENTIAL_FP256BN_SIGNATURE_LENGTH + 12] = '\n'; |
|
|
|
|
|
return 0; |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// "SETUP > SETUPDONE"
|
|
|
|
|
|
int issuer_setup(char *buffer) { |
|
|
|
|
|
printf("setup()\n"); |
|
|
|
|
|
if (0 != ecdaa_issuer_key_pair_FP256BN_generate(&issuer.ipk, &issuer.isk, ecdaa_rand)) { |
|
|
|
|
|
printf("issuer_setup: Error generating issuer key-pair\n"); |
|
|
|
|
|
return -1; |
|
|
|
|
|
} |
|
|
|
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
|
|
|
strncpy(buffer, "SETUPDONE\n", 10); |
|
|
|
|
|
return 0; |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// "PUBLISH" > "PUBLISH <issuer.ipk>"
|
|
|
|
|
|
int issuer_publish(char *buffer) { |
|
|
|
|
|
printf("publish()\n"); |
|
|
|
|
|
char *current; |
|
|
|
|
|
uint8_t binbuf[MAX_BUFSIZE]; |
|
|
|
|
|
bzero(buffer, MAX_BUFSIZE); |
|
|
|
|
|
|
|
|
|
|
|
strncpy(buffer, "PUBLISH ", 8); |
|
|
|
|
|
|
|
|
|
|
|
current = &buffer[8]; |
|
|
|
|
|
bzero(binbuf, MAX_BUFSIZE); |
|
|
|
|
|
ecdaa_issuer_public_key_FP256BN_serialize(binbuf, &issuer.ipk); |
|
|
|
|
|
ecdaa_bintohex(binbuf, ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH, current); |
|
|
|
|
|
|
|
|
|
|
|
buffer[2 * ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH + 8] = '\n'; |
|
|
|
|
|
|
|
|
|
|
|
return 0; |
|
|
|
|
|
} |
|
|
|