You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
211 lines
6.5 KiB
211 lines
6.5 KiB
#include "verifier.h"
|
|
|
|
typedef enum verifierstate {
|
|
ON,
|
|
ASKISSUER,
|
|
GOTISSUER,
|
|
ASKMEMBER,
|
|
GOTMEMBER,
|
|
ASKATTEST,
|
|
} verifierstate_e;
|
|
|
|
typedef struct verifier {
|
|
struct ecdaa_issuer_public_key_FP256BN ipk;
|
|
struct ecdaa_member_public_key_FP256BN mpk;
|
|
struct ecdaa_revocations_FP256BN revocations;
|
|
verifierstate_e state;
|
|
} verifier_t;
|
|
|
|
verifier_t verifier;
|
|
|
|
int verifier_getissuer(char *buffer);
|
|
|
|
int verifier_getmember(char *buffer);
|
|
int verifier_attestmember(char *buffer);
|
|
int verifier_checklink(char *buffer);
|
|
|
|
int main() {
|
|
verifier.revocations.sk_list = NULL;
|
|
verifier.revocations.bsn_list = NULL;
|
|
|
|
if (2 != server_start(&process_verifier, VERIFIERPORT)) {
|
|
printf("server failed\n");
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int process_verifier(char *buffer) {
|
|
int ret = 0;
|
|
|
|
printf("> VERIFIER: %s\n", buffer);
|
|
|
|
if (0 == strncasecmp("VERIFY", buffer, 6)) {
|
|
switch (verifier.state) {
|
|
case GOTMEMBER:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "OK\n", 3);
|
|
break;
|
|
default:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
}
|
|
} else if (0 == strncasecmp("LINk", buffer, 4)) {
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
verifier_checklink(buffer);
|
|
} else if (0 == strncasecmp("GETPUBLISHED", buffer, 12)) {
|
|
printf("link()\n");
|
|
verifier.state = ON;
|
|
ret = client_connect(&verifier_getissuer, ISSUERIP, ISSUERPORT);
|
|
if (0 >= ret || GOTISSUER != verifier.state) {
|
|
printf("process_verifier: issuer connection failed\n");
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
} else {
|
|
ret = client_connect(&verifier_getmember, MEMBERIP, MEMBERPORT);
|
|
if (0 >= ret || GOTMEMBER != verifier.state) {
|
|
printf("process_verifier: issuer connection failed\n");
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
} else {
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "OK\n", 3);
|
|
}
|
|
ret = 0;
|
|
}
|
|
} else if (0 == strncasecmp("EXIT", buffer, 4)) {
|
|
printf("exit()\n");
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "OK\n", 3);
|
|
ret = 1;
|
|
} else if (0 == strncasecmp("SHUTDOWN", buffer, 8)) {
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "OK\n", 3);
|
|
ret = 2;
|
|
} else {
|
|
printf("error()\n");
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ERR\n", 4);
|
|
ret = 0;
|
|
}
|
|
|
|
printf("< VERIFIER: %s\n", buffer);
|
|
return ret;
|
|
}
|
|
|
|
int verifier_getissuer(char *buffer) {
|
|
int ret = 0;
|
|
|
|
switch (verifier.state) {
|
|
case ON:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "PUBLISH\n", 8);
|
|
verifier.state = ASKISSUER;
|
|
break;
|
|
case ASKISSUER:
|
|
if (0 == strncasecmp("PUBLISH", buffer, 7)) {
|
|
printf("ISSUER > VERIFIER: %s", buffer);
|
|
uint8_t binbuf[MAX_BUFSIZE];
|
|
char *current = &buffer[8];
|
|
ecdaa_hextobin(current, binbuf, ECDAA_ISSUER_PUBLIC_KEY_FP256BN_LENGTH);
|
|
ret = ecdaa_issuer_public_key_FP256BN_deserialize(&verifier.ipk, binbuf);
|
|
if (-1 == ret) {
|
|
printf("verifier_getpublic: member public key is malformed!\n");
|
|
ret = -1;
|
|
} else if (-2 == ret) {
|
|
printf("verifier_getpublic: signature of member public key is invalid\n");
|
|
ret = -1;
|
|
} else {
|
|
verifier.state = GOTISSUER;
|
|
ret = 1;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
ret = -1;
|
|
}
|
|
if (0 == ret) {
|
|
printf("ISSUER < VERIFIER: %s", buffer);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
int verifier_getmember(char *buffer) {
|
|
int ret = 0;
|
|
|
|
switch (verifier.state) {
|
|
case GOTISSUER:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "PUBLISH\n", 8);
|
|
verifier.state = ASKMEMBER;
|
|
break;
|
|
case ASKMEMBER:
|
|
if (0 == strncasecmp("PUBLISH", buffer, 7)) {
|
|
printf("MEMBER > VERIFIER: %s", buffer);
|
|
uint8_t binbuf[MAX_BUFSIZE];
|
|
char *current = &buffer[8];
|
|
ecdaa_hextobin(current, binbuf, ECDAA_MEMBER_PUBLIC_KEY_FP256BN_LENGTH);
|
|
ret = ecdaa_member_public_key_FP256BN_deserialize_no_check(&verifier.mpk, binbuf);
|
|
if (-1 == ret) {
|
|
printf("verifier_getmember: member public key is malformed!\n");
|
|
ret = -1;
|
|
} else if (-2 == ret) {
|
|
printf("verifier_getmember: signature of member public key is invalid\n");
|
|
ret = -1;
|
|
} else {
|
|
verifier.state = GOTMEMBER;
|
|
ret = 1;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
ret = -1;
|
|
}
|
|
if (0 == ret) {
|
|
printf("MEMBER < VERIFIER: %s", buffer);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
//"ATTEST" > "OK"
|
|
int verifier_attestmember(char *buffer) {
|
|
int ret = 0;
|
|
|
|
switch (verifier.state) {
|
|
case GOTMEMBER:
|
|
bzero(buffer, MAX_BUFSIZE);
|
|
strncpy(buffer, "ATTEST\n", 8);
|
|
verifier.state = ASKATTEST;
|
|
break;
|
|
case ASKATTEST:
|
|
if (0 == strncasecmp("ATTEST", buffer, 7)) {
|
|
printf("MEMBER > VERIFIER: %s", buffer);
|
|
uint8_t binbuf[MAX_BUFSIZE];
|
|
char *current = &buffer[8];
|
|
ecdaa_hextobin(current, binbuf, ECDAA_MEMBER_PUBLIC_KEY_FP256BN_LENGTH);
|
|
ret = ecdaa_member_public_key_FP256BN_deserialize_no_check(&verifier.mpk, binbuf);
|
|
if (-1 == ret) {
|
|
printf("verifier_attestmember: member public key is malformed!\n");
|
|
ret = -1;
|
|
} else if (-2 == ret) {
|
|
printf("verifier_attestmember: signature of member public key is invalid\n");
|
|
ret = -1;
|
|
} else {
|
|
verifier.state = GOTMEMBER;
|
|
ret = 1;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
ret = -1;
|
|
}
|
|
if (0 == ret) {
|
|
printf("MEMBER < VERIFIER: %s", buffer);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
//"LINK" > "NOT IMPLEMENTED"
|
|
int verifier_checklink(char *buffer) {
|
|
strncat(buffer, "NOT_IMPLEMENTED\n", 16);
|
|
return 0;
|
|
}
|
|
|