Merge pull request #325 from OpenKMIP/feat/add-signature-verify-payloads

Add payloads for the SignatureVerify operation
This commit is contained in:
Peter Hamilton 2017-08-21 16:53:21 -04:00 committed by GitHub
commit df74c854b7
6 changed files with 2253 additions and 6 deletions

View File

@ -32,6 +32,7 @@ from kmip.core.messages.payloads import rekey_key_pair
from kmip.core.messages.payloads import register
from kmip.core.messages.payloads import revoke
from kmip.core.messages.payloads import sign
from kmip.core.messages.payloads import signature_verify
from kmip.core.messages.payloads import mac
@ -90,3 +91,6 @@ class RequestPayloadFactory(PayloadFactory):
def _create_sign_payload(self):
return sign.SignRequestPayload()
def _create_signature_verify_payload(self):
return signature_verify.SignatureVerifyRequestPayload()

View File

@ -33,6 +33,7 @@ from kmip.core.messages.payloads import register
from kmip.core.messages.payloads import revoke
from kmip.core.messages.payloads import mac
from kmip.core.messages.payloads import sign
from kmip.core.messages.payloads import signature_verify
class ResponsePayloadFactory(PayloadFactory):
@ -90,3 +91,6 @@ class ResponsePayloadFactory(PayloadFactory):
def _create_sign_payload(self):
return sign.SignResponsePayload()
def _create_signature_verify_payload(self):
return signature_verify.SignatureVerifyResponsePayload()

View File

@ -0,0 +1,650 @@
# Copyright (c) 2017 The Johns Hopkins University/Applied Physics Laboratory
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import six
from kmip.core import attributes
from kmip.core import enums
from kmip.core import primitives
from kmip.core import utils
class SignatureVerifyRequestPayload(primitives.Struct):
"""
A request payload for the SignatureVerify operation.
Attributes:
unique_identifier: The unique ID of the key to use for signature
verification.
cryptographic_parameters: A collection of settings relevant for the
signature verification process.
data: The data that was signed.
digested_data: The digested data to be verified.
signature_data: The signature to be verified.
correlation_value: An identifier for an existing, incomplete operation
this payload hooks into.
init_indicator: A boolean indicating whether or not the payload is the
first in a series for a multi-payload operation.
final_indicator: A boolean indicating whether or not the payload is
the last in a series for a multi-payload operation.
"""
def __init__(self,
unique_identifier=None,
cryptographic_parameters=None,
data=None,
digested_data=None,
signature_data=None,
correlation_value=None,
init_indicator=None,
final_indicator=None):
"""
Construct a SignatureVerify request payload struct.
Args:
unique_identifier (string): The ID of the managed object (e.g.,
a public key) to be used for signature verification. Optional,
defaults to None.
cryptographic_parameters (CryptographicParameters): A
CryptographicParameters struct containing the settings for
the signature verification operation. Optional, defaults to
None.
data (bytes): The bytes representing the original data that was
signed. Optional, defaults to None.
digested_data (bytes): The bytes representing the digested data to
be verified with the signature. Optional, defaults to None.
signature_data (bytes): The bytes representing the signature to be
verified. Optional, defaults to None.
correlation_value (bytes): The bytes representing a correlation
value, allowing the linking together of individual payloads
for a single overarching operation. Optional, defaults to None.
init_indicator (boolean): A boolean value indicating whether or not
the payload is the first in a series for a multi-payload
operation. Optional, defaults to None.
final_indicator (boolean): A boolean value indicating whether or
not the payload is the last in a series for a multi-payload
operation. Optional, defaults to None.
"""
super(SignatureVerifyRequestPayload, self).__init__(
enums.Tags.REQUEST_PAYLOAD
)
self._unique_identifier = None
self._cryptographic_parameters = None
self._data = None
self._digested_data = None
self._signature_data = None
self._correlation_value = None
self._init_indicator = None
self._final_indicator = None
self.unique_identifier = unique_identifier
self.cryptographic_parameters = cryptographic_parameters
self.data = data
self.digested_data = digested_data
self.signature_data = signature_data
self.correlation_value = correlation_value
self.init_indicator = init_indicator
self.final_indicator = final_indicator
@property
def unique_identifier(self):
if self._unique_identifier:
return self._unique_identifier.value
else:
return None
@unique_identifier.setter
def unique_identifier(self, value):
if value is None:
self._unique_identifier = None
elif isinstance(value, six.string_types):
self._unique_identifier = primitives.TextString(
value=value,
tag=enums.Tags.UNIQUE_IDENTIFIER
)
else:
raise TypeError("Unique identifier must be a string.")
@property
def cryptographic_parameters(self):
return self._cryptographic_parameters
@cryptographic_parameters.setter
def cryptographic_parameters(self, value):
if value is None:
self._cryptographic_parameters = None
elif isinstance(value, attributes.CryptographicParameters):
self._cryptographic_parameters = value
else:
raise TypeError(
"Cryptographic parameters must be a CryptographicParameters "
"struct."
)
@property
def data(self):
if self._data:
return self._data.value
else:
return None
@data.setter
def data(self, value):
if value is None:
self._data = None
elif isinstance(value, six.binary_type):
self._data = primitives.ByteString(
value=value,
tag=enums.Tags.DATA
)
else:
raise TypeError("Data must be bytes.")
@property
def digested_data(self):
if self._digested_data:
return self._digested_data.value
else:
return None
@digested_data.setter
def digested_data(self, value):
if value is None:
self._digested_data = None
elif isinstance(value, six.binary_type):
self._digested_data = primitives.ByteString(
value=value,
tag=enums.Tags.DIGESTED_DATA
)
else:
raise TypeError("Digested data must be bytes.")
@property
def signature_data(self):
if self._signature_data:
return self._signature_data.value
else:
return None
@signature_data.setter
def signature_data(self, value):
if value is None:
self._signature_data = None
elif isinstance(value, six.binary_type):
self._signature_data = primitives.ByteString(
value=value,
tag=enums.Tags.SIGNATURE_DATA
)
else:
raise TypeError("Signature data must be bytes.")
@property
def correlation_value(self):
if self._correlation_value:
return self._correlation_value.value
else:
return None
@correlation_value.setter
def correlation_value(self, value):
if value is None:
self._correlation_value = None
elif isinstance(value, six.binary_type):
self._correlation_value = primitives.ByteString(
value=value,
tag=enums.Tags.CORRELATION_VALUE
)
else:
raise TypeError("Correlation value must be bytes.")
@property
def init_indicator(self):
if self._init_indicator:
return self._init_indicator.value
else:
return None
@init_indicator.setter
def init_indicator(self, value):
if value is None:
self._init_indicator = None
elif isinstance(value, bool):
self._init_indicator = primitives.Boolean(
value=value,
tag=enums.Tags.INIT_INDICATOR
)
else:
raise TypeError("Init indicator must be a boolean.")
@property
def final_indicator(self):
if self._final_indicator:
return self._final_indicator.value
else:
return None
@final_indicator.setter
def final_indicator(self, value):
if value is None:
self._final_indicator = None
elif isinstance(value, bool):
self._final_indicator = primitives.Boolean(
value=value,
tag=enums.Tags.FINAL_INDICATOR
)
else:
raise TypeError("Final indicator must be a boolean.")
def read(self, input_stream):
"""
Read the data encoding the SignatureVerify request payload and decode
it into its constituent parts.
Args:
input_stream (stream): A data stream containing encoded object
data, supporting a read method; usually a BytearrayStream
object.
Raises:
ValueError: Raised if the data attribute is missing from the
encoded payload.
"""
super(SignatureVerifyRequestPayload, self).read(input_stream)
local_stream = utils.BytearrayStream(input_stream.read(self.length))
if self.is_tag_next(enums.Tags.UNIQUE_IDENTIFIER, local_stream):
self._unique_identifier = primitives.TextString(
tag=enums.Tags.UNIQUE_IDENTIFIER
)
self._unique_identifier.read(local_stream)
if self.is_tag_next(enums.Tags.CRYPTOGRAPHIC_PARAMETERS, local_stream):
self._cryptographic_parameters = \
attributes.CryptographicParameters()
self._cryptographic_parameters.read(local_stream)
if self.is_tag_next(enums.Tags.DATA, local_stream):
self._data = primitives.ByteString(tag=enums.Tags.DATA)
self._data.read(local_stream)
if self.is_tag_next(enums.Tags.DIGESTED_DATA, local_stream):
self._digested_data = primitives.ByteString(
tag=enums.Tags.DIGESTED_DATA
)
self._digested_data.read(local_stream)
if self.is_tag_next(enums.Tags.SIGNATURE_DATA, local_stream):
self._signature_data = primitives.ByteString(
tag=enums.Tags.SIGNATURE_DATA
)
self._signature_data.read(local_stream)
if self.is_tag_next(enums.Tags.CORRELATION_VALUE, local_stream):
self._correlation_value = primitives.ByteString(
tag=enums.Tags.CORRELATION_VALUE
)
self._correlation_value.read(local_stream)
if self.is_tag_next(enums.Tags.INIT_INDICATOR, local_stream):
self._init_indicator = primitives.Boolean(
tag=enums.Tags.INIT_INDICATOR
)
self._init_indicator.read(local_stream)
if self.is_tag_next(enums.Tags.FINAL_INDICATOR, local_stream):
self._final_indicator = primitives.Boolean(
tag=enums.Tags.FINAL_INDICATOR
)
self._final_indicator.read(local_stream)
self.is_oversized(local_stream)
def write(self, output_stream):
"""
Write the data encoding the SignatureVerify request payload to a
stream.
Args:
output_stream (stream): A data stream in which to encode object
data, supporting a write method; usually a BytearrayStream
object.
Raises:
ValueError: Raised if the data attribute is not defined.
"""
local_stream = utils.BytearrayStream()
if self._unique_identifier:
self._unique_identifier.write(local_stream)
if self._cryptographic_parameters:
self._cryptographic_parameters.write(local_stream)
if self._data:
self._data.write(local_stream)
if self._digested_data:
self._digested_data.write(local_stream)
if self._signature_data:
self._signature_data.write(local_stream)
if self._correlation_value:
self._correlation_value.write(local_stream)
if self._init_indicator:
self._init_indicator.write(local_stream)
if self._final_indicator:
self._final_indicator.write(local_stream)
self.length = local_stream.length()
super(SignatureVerifyRequestPayload, self).write(output_stream)
output_stream.write(local_stream.buffer)
def __eq__(self, other):
if isinstance(other, SignatureVerifyRequestPayload):
if self.unique_identifier != other.unique_identifier:
return False
elif self.cryptographic_parameters != \
other.cryptographic_parameters:
return False
elif self.data != other.data:
return False
elif self.digested_data != other.digested_data:
return False
elif self.signature_data != other.signature_data:
return False
elif self.correlation_value != other.correlation_value:
return False
elif self.init_indicator != other.init_indicator:
return False
elif self.final_indicator != other.final_indicator:
return False
else:
return True
else:
return NotImplemented
def __ne__(self, other):
if isinstance(other, SignatureVerifyRequestPayload):
return not (self == other)
else:
return NotImplemented
def __repr__(self):
args = ", ".join([
"unique_identifier='{0}'".format(self.unique_identifier),
"cryptographic_parameters={0}".format(
repr(self.cryptographic_parameters)
),
"data={0}".format(self.data),
"digested_data={0}".format(self.digested_data),
"signature_data={0}".format(self.signature_data),
"correlation_value={0}".format(self.correlation_value),
"init_indicator={0}".format(self.init_indicator),
"final_indicator={0}".format(self.final_indicator)
])
return "SignatureVerifyRequestPayload({0})".format(args)
def __str__(self):
return str({
'unique_identifier': self.unique_identifier,
'cryptographic_parameters': self.cryptographic_parameters,
'data': self.data,
'digested_data': self.digested_data,
'signature_data': self.signature_data,
'correlation_value': self.correlation_value,
'init_indicator': self.init_indicator,
'final_indicator': self.final_indicator
})
class SignatureVerifyResponsePayload(primitives.Struct):
"""
A response payload for the SignatureVerify operation.
Attributes:
unique_identifier: The unique ID of the key used for signature
verification.
validity_indicator: The validity of the verified signature.
data: Recovered data produced by the signature verification process.
correlation_value: An identifier for an existing, incomplete operation
this payload is a part of.
"""
def __init__(self,
unique_identifier=None,
validity_indicator=None,
data=None,
correlation_value=None):
"""
Construct a SignatureVerify response payload struct.
Args:
unique_identifier (string): The ID of the managed object (e.g.,
a public key) used for signature verification. Optional,
defaults to None. Required for read/write.
validity_indicator (ValidityIndicator): A ValidityIndicator
enumeration that specifies the validity of the signature.
Optional, defaults to None. Required for read/write.
data (bytes): The bytes representing any data recovered during the
signature verification process. Optional, defaults to None.
correlation_value (bytes): The bytes representing a correlation
value, allowing the linking together of individual payloads
for a single overarching operation. Optional, defaults to None.
"""
super(SignatureVerifyResponsePayload, self).__init__(
enums.Tags.RESPONSE_PAYLOAD
)
self._unique_identifier = None
self._validity_indicator = None
self._data = None
self._correlation_value = None
self.unique_identifier = unique_identifier
self.validity_indicator = validity_indicator
self.data = data
self.correlation_value = correlation_value
@property
def unique_identifier(self):
if self._unique_identifier:
return self._unique_identifier.value
else:
return None
@unique_identifier.setter
def unique_identifier(self, value):
if value is None:
self._unique_identifier = None
elif isinstance(value, six.string_types):
self._unique_identifier = primitives.TextString(
value=value,
tag=enums.Tags.UNIQUE_IDENTIFIER
)
else:
raise TypeError("Unique identifier must be a string.")
@property
def validity_indicator(self):
if self._validity_indicator:
return self._validity_indicator.value
else:
return None
@validity_indicator.setter
def validity_indicator(self, value):
if value is None:
self._validity_indicator = None
elif isinstance(value, enums.ValidityIndicator):
self._validity_indicator = primitives.Enumeration(
enums.ValidityIndicator,
value=value,
tag=enums.Tags.VALIDITY_INDICATOR
)
else:
raise TypeError(
"Validity indicator must be a ValidityIndicator enumeration."
)
@property
def data(self):
if self._data:
return self._data.value
else:
return None
@data.setter
def data(self, value):
if value is None:
self._data = None
elif isinstance(value, six.binary_type):
self._data = primitives.ByteString(
value=value,
tag=enums.Tags.DATA
)
else:
raise TypeError("Data must be bytes.")
@property
def correlation_value(self):
if self._correlation_value:
return self._correlation_value.value
else:
return None
@correlation_value.setter
def correlation_value(self, value):
if value is None:
self._correlation_value = None
elif isinstance(value, six.binary_type):
self._correlation_value = primitives.ByteString(
value=value,
tag=enums.Tags.CORRELATION_VALUE
)
else:
raise TypeError("Correlation value must be bytes.")
def read(self, input_stream):
"""
Read the data encoding the SignatureVerify response payload and decode
it into its constituent parts.
Args:
input_stream (stream): A data stream containing encoded object
data, supporting a read method; usually a BytearrayStream
object.
Raises:
ValueError: Raised if the data attribute is missing from the
encoded payload.
"""
super(SignatureVerifyResponsePayload, self).read(input_stream)
local_stream = utils.BytearrayStream(input_stream.read(self.length))
if self.is_tag_next(enums.Tags.UNIQUE_IDENTIFIER, local_stream):
self._unique_identifier = primitives.TextString(
tag=enums.Tags.UNIQUE_IDENTIFIER
)
self._unique_identifier.read(local_stream)
else:
raise ValueError(
"Parsed payload encoding is missing the unique identifier "
"field."
)
if self.is_tag_next(enums.Tags.VALIDITY_INDICATOR, local_stream):
self._validity_indicator = primitives.Enumeration(
enums.ValidityIndicator,
tag=enums.Tags.VALIDITY_INDICATOR
)
self._validity_indicator.read(local_stream)
else:
raise ValueError(
"Parsed payload encoding is missing the validity indicator "
"field."
)
if self.is_tag_next(enums.Tags.DATA, local_stream):
self._data = primitives.ByteString(tag=enums.Tags.DATA)
self._data.read(local_stream)
if self.is_tag_next(enums.Tags.CORRELATION_VALUE, local_stream):
self._correlation_value = primitives.ByteString(
tag=enums.Tags.CORRELATION_VALUE
)
self._correlation_value.read(local_stream)
self.is_oversized(local_stream)
def write(self, output_stream):
"""
Write the data encoding the SignatureVerify response payload to a
stream.
Args:
output_stream (stream): A data stream in which to encode object
data, supporting a write method; usually a BytearrayStream
object.
Raises:
ValueError: Raised if the data attribute is not defined.
"""
local_stream = utils.BytearrayStream()
if self._unique_identifier:
self._unique_identifier.write(local_stream)
else:
raise ValueError(
"Payload is missing the unique identifier field."
)
if self._validity_indicator:
self._validity_indicator.write(local_stream)
else:
raise ValueError(
"Payload is missing the validity indicator field."
)
if self._data:
self._data.write(local_stream)
if self._correlation_value:
self._correlation_value.write(local_stream)
self.length = local_stream.length()
super(SignatureVerifyResponsePayload, self).write(output_stream)
output_stream.write(local_stream.buffer)
def __eq__(self, other):
if isinstance(other, SignatureVerifyResponsePayload):
if self.unique_identifier != other.unique_identifier:
return False
elif self.validity_indicator != other.validity_indicator:
return False
elif self.data != other.data:
return False
elif self.correlation_value != other.correlation_value:
return False
else:
return True
else:
return NotImplemented
def __ne__(self, other):
if isinstance(other, SignatureVerifyResponsePayload):
return not (self == other)
else:
return NotImplemented
def __repr__(self):
args = ", ".join([
"unique_identifier='{0}'".format(self.unique_identifier),
"validity_indicator={0}".format(self.validity_indicator),
"data={0}".format(self.data),
"correlation_value={0}".format(self.correlation_value)
])
return "SignatureVerifyResponsePayload({0})".format(args)
def __str__(self):
return str({
'unique_identifier': self.unique_identifier,
'validity_indicator': self.validity_indicator,
'data': self.data,
'correlation_value': self.correlation_value
})

View File

@ -35,6 +35,7 @@ from kmip.core.messages.payloads import rekey_key_pair
from kmip.core.messages.payloads import register
from kmip.core.messages.payloads import revoke
from kmip.core.messages.payloads import sign
from kmip.core.messages.payloads import signature_verify
from kmip.core.messages.payloads import mac
@ -222,9 +223,10 @@ class TestRequestPayloadFactory(testtools.TestCase):
self._test_payload_type(payload, sign.SignRequestPayload)
def test_create_signature_verify_payload(self):
self._test_not_implemented(
self.factory.create,
enums.Operation.SIGNATURE_VERIFY
payload = self.factory.create(enums.Operation.SIGNATURE_VERIFY)
self._test_payload_type(
payload,
signature_verify.SignatureVerifyRequestPayload
)
def test_create_mac_payload(self):

View File

@ -35,6 +35,7 @@ from kmip.core.messages.payloads import rekey_key_pair
from kmip.core.messages.payloads import register
from kmip.core.messages.payloads import revoke
from kmip.core.messages.payloads import sign
from kmip.core.messages.payloads import signature_verify
from kmip.core.messages.payloads import mac
@ -220,9 +221,10 @@ class TestResponsePayloadFactory(testtools.TestCase):
self._test_payload_type(payload, sign.SignResponsePayload)
def test_create_signature_verify_payload(self):
self._test_not_implemented(
self.factory.create,
enums.Operation.SIGNATURE_VERIFY
payload = self.factory.create(enums.Operation.SIGNATURE_VERIFY)
self._test_payload_type(
payload,
signature_verify.SignatureVerifyResponsePayload
)
def test_create_mac_payload(self):

File diff suppressed because it is too large Load Diff