You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
223 lines
6.8 KiB
223 lines
6.8 KiB
#include "issuer.h"
|
|
|
|
typedef enum issuer_state {
|
|
ON,
|
|
JOINSTART,
|
|
JOINPROCEED,
|
|
READY
|
|
} issuerstate_e;
|
|
|
|
typedef struct issuer {
|
|
struct ecdaa_issuer_public_key_FP256BN ipk;
|
|
struct ecdaa_issuer_secret_key_FP256BN isk;
|
|
uint8_t nonce[NONCE_SIZE];
|
|
struct ecdaa_member_public_key_FP256BN mpk;
|
|
issuerstate_e state;
|
|
struct ecdaa_credential_FP256BN cred;
|
|
struct ecdaa_credential_FP256BN_signature cred_sig;
|
|
} issuer_t;
|
|
|
|
issuer_t issuer;
|
|
|
|
int issuer_setup(char *buffer);
|
|
int issuer_joinstart(char *buffer);
|
|
int issuer_joinproceed(char *buffer);
|
|
int issuer_publish(char *buffer);
|
|
|
|
int main() {
|
|
int err = 0;
|
|
|
|
//if (2 != server_start(&process_issuer, ISSUERPORT)) {
|
|
// printf("server failed\n");
|
|
//}
|
|
uint8_t buffer[1024];
|
|
uint8_t *current = buffer;
|
|
char send[1024];
|
|
bzero(buffer, 1024);
|
|
bzero(send,1024);
|
|
|
|
struct ecdaa_issuer_public_key_FP256BN key;
|
|
|
|
ecdaa_issuer_key_pair_FP256BN_generate(&issuer.ipk, &issuer.isk, ecdaa_rand);
|
|
ecdaa_issuer_public_key_FP256BN_serialize(current, &issuer.ipk);
|
|
ecdaa_bintohex((char*)current, ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH, send);
|
|
printf("%s\n", send);
|
|
bzero(current, 1024);
|
|
ecdaa_hextobin(send, (char*)current, ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH);
|
|
int ret = ecdaa_issuer_public_key_FP256BN_deserialize(&key, current);
|
|
printf("%i\n",ret);
|
|
return 0;
|
|
}
|
|
|
|
int process_issuer(char *buffer) {
|
|
ssize_t len = 0;
|
|
int ret = 0;
|
|
|
|
printf("> ISSUER: %s\n", buffer);
|
|
|
|
if (0 == strncasecmp("OK", buffer, 2)) {
|
|
switch (issuer.state) {
|
|
case JOINPROCEED:
|
|
issuer.state = READY;
|
|
break;
|
|
default:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
break;
|
|
}
|
|
} else if (0 == strncasecmp("ERR", buffer, 3)) {
|
|
switch (issuer.state) {
|
|
case JOINPROCEED:
|
|
printf("command failed at client\n");
|
|
issuer.state = READY;
|
|
break;
|
|
default:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
break;
|
|
}
|
|
} else if (0 == strncasecmp("SETUP", buffer, 5)) {
|
|
switch (issuer.state) {
|
|
case ON:
|
|
if(0 == issuer_setup(buffer)) {
|
|
issuer.state = READY;
|
|
}
|
|
break;
|
|
default:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
break;
|
|
}
|
|
} else if (0 == strncasecmp("JOIN", buffer, 4)) {
|
|
switch (issuer.state) {
|
|
case READY:
|
|
if(0 == issuer_joinstart(buffer)) {
|
|
issuer.state = JOINSTART;
|
|
}
|
|
break;
|
|
default:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
break;
|
|
}
|
|
} else if (0 == strncasecmp("APPEND", buffer, 6)) {
|
|
switch (issuer.state) {
|
|
case JOINSTART:
|
|
if(0 == issuer_joinproceed(buffer)) {
|
|
issuer.state = READY;
|
|
}
|
|
break;
|
|
default:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
break;
|
|
}
|
|
} else if (0 == strncasecmp("PUBLISH", buffer, 7)) {
|
|
switch (issuer.state) {
|
|
case READY:
|
|
issuer_publish(buffer);
|
|
issuer.state = READY;
|
|
break;
|
|
default:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
break;
|
|
}
|
|
} else if (0 == strncasecmp("EXIT", buffer, 4)) {
|
|
printf("exit()\n");
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "OK\n", 3);
|
|
ret = 1;
|
|
} else if (0 == strncasecmp("SHUTDOWN", buffer, 8)) {
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "OK\n", 3);
|
|
ret = 2;
|
|
} else {
|
|
printf("error()\n");
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
ret = 0;
|
|
}
|
|
|
|
printf("< ISSUER: %s", buffer);
|
|
return ret;
|
|
}
|
|
|
|
// "JOIN" > "JOINSTART <issuer.nonce>"
|
|
int issuer_joinstart(char *buffer) {
|
|
getrandom(issuer.nonce, NONCE_SIZE, GRND_RANDOM);
|
|
char* current;
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "JOINSTART ", 10);
|
|
current = &buffer[10];
|
|
ecdaa_bintohex(issuer.nonce, NONCE_SIZE, buffer);
|
|
buffer[2 * NONCE_SIZE + 10] = '\n';
|
|
return 0;
|
|
}
|
|
|
|
// "APPEND <member.mpk>" > "JOINPROCEED <member.cred><member.cred_sig>"
|
|
int issuer_joinproceed(char *buffer) {
|
|
char *current = &buffer[7];
|
|
uint8_t binbuf[MAX_BUFSIZE];
|
|
bzero(binbuf, MAX_BUFSIZE);
|
|
|
|
ecdaa_hextobin(current, binbuf, ECDAA_MEMBER_PUBLIC_KEY_FP256BN_LENGTH);
|
|
int ret = ecdaa_member_public_key_FP256BN_deserialize(&issuer.mpk, binbuf, issuer.nonce, NONCE_SIZE);
|
|
if(-1 == ret) {
|
|
printf("issuer_joinproceed: member public key is malformed!");
|
|
return -1;
|
|
} else if (-2 == ret) {
|
|
printf("issuer_joinproceed: signature of member public key is invalid");
|
|
}
|
|
|
|
if (0 != ecdaa_credential_FP256BN_generate(&issuer.cred, &issuer.cred_sig, &issuer.isk, &issuer.mpk, ecdaa_rand)) {
|
|
printf("issuer_joinproceed: error generating credential\n");
|
|
return -1;
|
|
}
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "JOINPROCEED ", 12);
|
|
|
|
current = &buffer[12];
|
|
ecdaa_credential_FP256BN_serialize(binbuf, &issuer.cred);
|
|
bzero(binbuf, MAX_BUFSIZE);
|
|
ecdaa_bintohex(binbuf, ECDAA_CREDENTIAL_FP256BN_LENGTH, current);
|
|
|
|
current = &buffer[12 + 2 * ECDAA_CREDENTIAL_FP256BN_LENGTH];
|
|
ecdaa_credential_FP256BN_signature_serialize(binbuf, &issuer.cred_sig);
|
|
bzero(binbuf, MAX_BUFSIZE);
|
|
ecdaa_bintohex(binbuf, ECDAA_CREDENTIAL_FP256BN_SIGNATURE_LENGTH, current);
|
|
|
|
buffer[2 * ECDAA_CREDENTIAL_FP256BN_LENGTH + 2 * ECDAA_CREDENTIAL_FP256BN_SIGNATURE_LENGTH + 12] = '\n';
|
|
return 0;
|
|
}
|
|
|
|
// "SETUP > SETUPDONE"
|
|
int issuer_setup(char *buffer) {
|
|
printf("setup()\n");
|
|
if (0 != ecdaa_issuer_key_pair_FP256BN_generate(&issuer.ipk, &issuer.isk, ecdaa_rand)) {
|
|
printf("issuer_setup: Error generating issuer key-pair\n");
|
|
return -1;
|
|
}
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "SETUPDONE\n", 10);
|
|
return 0;
|
|
}
|
|
|
|
// "PUBLISH" > "PUBLISH <issuer.ipk>"
|
|
int issuer_publish(char *buffer) {
|
|
printf("publish()\n");
|
|
char *current;
|
|
uint8_t binbuf[MAX_BUFSIZE];
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
|
|
strncpy(buffer, "PUBLISH ", 8);
|
|
|
|
current = &buffer[8];
|
|
bzero(binbuf, MAX_BUFSIZE);
|
|
ecdaa_issuer_public_key_FP256BN_serialize(binbuf, &issuer.ipk);
|
|
ecdaa_bintohex(binbuf, ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH, current);
|
|
|
|
buffer[2 * ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH + 8] = '\n';
|
|
|
|
return 0;
|
|
}
|
|
|