//* Licensed Materials - Property of *
//* IBM *
//* Alexandra Instituttet A/S *
//* *
//* eu.abc4trust.pabce.1.34 *
//* *
//* (C) Copyright IBM Corp. 2014. All Rights Reserved. *
//* (C) Copyright Alexandra Instituttet A/S, Denmark. 2014. All *
//* Rights Reserved. *
//* US Government Users Restricted Rights - Use, duplication or *
//* disclosure restricted by GSA ADP Schedule Contract with IBM Corp. *
//* *
//* This file is licensed under the Apache License, Version 2.0 (the *
//* "License"); you may not use this file except in compliance with *
//* the License. You may obtain a copy of the License at: *
//* http://www.apache.org/licenses/LICENSE-2.0 *
//* Unless required by applicable law or agreed to in writing, *
//* software distributed under the License is distributed on an *
//* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY *
//* KIND, either express or implied. See the License for the *
//* specific language governing permissions and limitations *
//* under the License. *
//*/**/****************************************************************
package eu.abc4trust.abce.pertubationtests.section3;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import java.io.IOException;
import java.io.InputStream;
import java.net.URI;
import java.util.HashMap;
import java.util.LinkedList;
import java.util.List;
import java.util.Map;
import java.util.Random;
import java.util.logging.FileHandler;
import java.util.logging.Handler;
import java.util.logging.Logger;
import org.junit.Assert;
import org.junit.Before;
import org.junit.BeforeClass;
import org.junit.Test;
import com.google.inject.Guice;
import com.google.inject.Injector;
import eu.abc4trust.abce.external.issuer.IssuerAbcEngine;
import eu.abc4trust.abce.external.user.UserAbcEngine;
import eu.abc4trust.abce.external.verifier.VerifierAbcEngine;
import eu.abc4trust.abce.testharness.IntegrationModuleFactory;
import eu.abc4trust.abce.testharness.PolicySelector;
import eu.abc4trust.cryptoEngine.util.SystemParametersUtil;
import eu.abc4trust.guice.ProductionModuleFactory.CryptoEngine;
import eu.abc4trust.keyManager.KeyManager;
import eu.abc4trust.returnTypes.IssuMsgOrCredDesc;
import eu.abc4trust.revocationProxy.revauth.RevocationProxyAuthority;
import eu.abc4trust.util.CryptoUriUtil;
import eu.abc4trust.xml.Attribute;
import eu.abc4trust.xml.AttributeDescription;
import eu.abc4trust.xml.CredentialSpecification;
import eu.abc4trust.xml.IssuanceMessageAndBoolean;
import eu.abc4trust.xml.IssuancePolicy;
import eu.abc4trust.xml.IssuerParameters;
import eu.abc4trust.xml.ObjectFactory;
import eu.abc4trust.xml.PresentationPolicyAlternatives;
import eu.abc4trust.xml.PresentationToken;
import eu.abc4trust.xml.PresentationTokenDescription;
import eu.abc4trust.xml.SystemParameters;
import eu.abc4trust.xml.util.XmlUtils;
/**
* Pertubation tests 3.1.3,
*/
public class Test13 {
private static final String CREDENTIAL_SPECIFICATION_ID_CARD = "/eu/abc4trust/sampleXml/credspecs/credentialSpecificationSimpleIdentitycard.xml";
private static final String ISSUANCE_POLICY_ID_CARD = "/eu/abc4trust/sampleXml/issuance/issuancePolicySimpleIdentitycard.xml";
private static final String PRESENTATION_POLICY_ID_CARD = "/eu/abc4trust/sampleXml/presentationPolicies/presentationPolicySimpleIdentitycard.xml";
private static final String USERNAME = "defaultUser";
private static final Logger logger = java.util.logging.Logger.getLogger("Section 3.1.3 log");
private ObjectFactory of = new ObjectFactory();
private URI uid = null;
private URI revParsUid = null;
private URI hash = null;
private URI algorithmId = null;
private URI inspectoruid = null;
private Injector userInjector = null;
private Injector issuerInjector = null;
private Injector verifierInjector = null;
private RevocationProxyAuthority revocationProxyAuthority = null;
private IssuerAbcEngine issuerEngine = null;
private UserAbcEngine userEngine = null;
private SystemParameters syspars = null;
private CredentialSpecification idcardCredSpec = null;
private IssuerParameters issuerParameters = null;
private Random random =null;
@BeforeClass
public static void setupLogger() throws SecurityException, IOException {
Handler fh = new FileHandler("Section-3.1.3.log");
logger.addHandler(fh);
}
@Before
public void setup() throws Exception {
uid = URI.create("http://my.country/identitycard/issuancekey_v1.0");
revParsUid = URI.create("urn:revocation:uid");
inspectoruid = URI.create("http://thebestbank.com/inspector/pub_key_v1");
hash = URI.create("urn:abc4trust:1.0:hashalgorithm:sha-256");
algorithmId = CryptoUriUtil.getIdemixMechanism();
random = new Random();
userInjector = Guice.createInjector(IntegrationModuleFactory.newModule(
// new Random(1987), uproveUtils.getUserServicePort()));//, revocationProxyAuthority));
new Random(1987)));//, revocationProxyAuthority));
issuerInjector = Guice
.createInjector(IntegrationModuleFactory.newModule(new Random(1231),
// IssuerCryptoEngine.IDEMIX, uproveUtils.getIssuerServicePort()));//, revocationProxyAuthority));
CryptoEngine.IDEMIX));//, revocationProxyAuthority));
verifierInjector = Guice
.createInjector(IntegrationModuleFactory.newModule(new Random(1231)));//, revocationProxyAuthority));
userEngine = userInjector
.getInstance(UserAbcEngine.class);
issuerEngine = issuerInjector
.getInstance(IssuerAbcEngine.class);
syspars = SystemParametersUtil.getDefaultSystemParameters_1024();
issuerInjector.getInstance(KeyManager.class).storeSystemParameters(syspars);
userInjector.getInstance(KeyManager.class).storeSystemParameters(syspars);
verifierInjector.getInstance(KeyManager.class).storeSystemParameters(syspars);
// inspectorInjector.getInstance(KeyManager.class).storeSystemParameters(syspars);
idcardCredSpec = (CredentialSpecification) XmlUtils
.getObjectFromXML(
this.getClass().getResourceAsStream(
CREDENTIAL_SPECIFICATION_ID_CARD), true);
userInjector.getInstance(KeyManager.class).storeCredentialSpecification(
idcardCredSpec.getSpecificationUID(), idcardCredSpec);
verifierInjector.getInstance(KeyManager.class).storeCredentialSpecification(
idcardCredSpec.getSpecificationUID(), idcardCredSpec);
issuerInjector.getInstance(KeyManager.class).storeCredentialSpecification(
idcardCredSpec.getSpecificationUID(), idcardCredSpec);
// inspectorInjector.getInstance(KeyManager.class).storeCredentialSpecification(
// idcardCredSpec.getSpecificationUID(), idcardCredSpec);
try{
this.issuerParameters = issuerEngine.setupIssuerParameters(idcardCredSpec, syspars, uid, hash, algorithmId, revParsUid, null);
}catch(Exception e){
logger.info("Failed to create IssuerParameters");
}
}
@Test
public void runTestRandomContext() throws Exception{
try{
logger.info("Running test where carryoverattributes gets removed from users reply to issuer");
IssuancePolicy idcardIssuancePolicy = (IssuancePolicy) XmlUtils
.getObjectFromXML(
this.getClass().getResourceAsStream(
ISSUANCE_POLICY_ID_CARD), true);
URI context = URI.create("this:is:not:the:real:context");
logger.info("Trying to issue credential");
runTest(idcardIssuancePolicy, context);
presentIDCard("GOOD LASTNAME");
}catch(Exception e){
logger.info(e.getMessage());
Assert.fail(e.getMessage());
}
}
private URI runTest(IssuancePolicy idcardIssuancePolicy, URI context) throws Exception{
KeyManager userKeyManager = userInjector.getInstance(KeyManager.class);
KeyManager issuerKeyManager = issuerInjector.getInstance(KeyManager.class);
KeyManager verifierKeyManager = verifierInjector.getInstance(KeyManager.class);
URI idcardIssuancePolicyUid = idcardIssuancePolicy.getCredentialTemplate().getIssuerParametersUID();
userKeyManager.storeIssuerParameters(idcardIssuancePolicyUid,
issuerParameters);
issuerKeyManager.storeIssuerParameters(idcardIssuancePolicyUid,
issuerParameters);
verifierKeyManager.storeIssuerParameters(idcardIssuancePolicyUid,
issuerParameters);
try{
Map<String, Object> att = new HashMap<String, Object>();
if(context != null){
att.put("FirstName", "BADNAME");
att.put("LastName", "BADLASTNAME");
}else {
att.put("FirstName", "GOOD NAME");
att.put("LastName", "GOOD LASTNAME");
}
att.put("Birthday", "1990-02-06Z");
//
List<Attribute> issuerAtts = this.populateIssuerAttributes(
att, idcardCredSpec);
IssuanceMessageAndBoolean issuerIm = issuerEngine.initIssuanceProtocol(
idcardIssuancePolicy, issuerAtts);
assertFalse(issuerIm.isLastMessage());
System.out.println("im1: \n"+XmlUtils.toXml(of.createIssuanceMessage(issuerIm.getIssuanceMessage())));
if(context == null){
logger.info("First issuance stopped after receiving policy context: "+issuerIm.getIssuanceMessage().getContext());
return issuerIm.getIssuanceMessage().getContext();
}
// Reply from user.
IssuMsgOrCredDesc userIm = this.userEngine.issuanceProtocolStepFirstChoice(USERNAME, issuerIm
.getIssuanceMessage());
if(context!=null){
logger.info("Second issuance modifying issuance message to another context");
userIm.im.setContext(context);
}
while (!issuerIm.isLastMessage()) {
assertNotNull(userIm.im);
issuerIm = issuerEngine.issuanceProtocolStep(userIm.im);
assertNotNull(issuerIm.getIssuanceMessage());
userIm = userEngine.issuanceProtocolStepFirstChoice(USERNAME, issuerIm
.getIssuanceMessage());
boolean userLastMessage = (userIm.cd != null);
assertTrue(issuerIm.isLastMessage() == userLastMessage);
}
assertNull(userIm.im);
assertNotNull(userIm.cd);
logger.info("Managed to issue a credential");
}catch (Exception e){
e.printStackTrace();
logger.info("Failed to issue credential : "+e.getMessage());
Assert.fail(e.toString());
}
return null;
}
private PresentationToken presentIDCard(String lastname) throws Exception{
UserAbcEngine userEngine = userInjector
.getInstance(UserAbcEngine.class);
VerifierAbcEngine verifierEngine = verifierInjector
.getInstance(VerifierAbcEngine.class);
InputStream resourceAsStream = this.getClass().getResourceAsStream(
PRESENTATION_POLICY_ID_CARD);
PresentationPolicyAlternatives presentationPolicyAlternatives = (PresentationPolicyAlternatives) XmlUtils
.getObjectFromXML(
resourceAsStream, true);
logger.info("Trying to log in using stolen name");
//
PresentationToken pt = null;
try{
pt = userEngine.createPresentationTokenFirstChoice(USERNAME, presentationPolicyAlternatives);
if(pt == null){
logger.info("Failed to create presentation token");
}
assertNotNull(pt);
logger.info("Successfully created a presentation token");
}catch(Exception e){
logger.info("Failed to create presentation token : "+e.toString()+": "+e.getMessage());
Assert.fail(e.toString());
}
try{
PresentationTokenDescription ptd = verifierEngine.verifyTokenAgainstPolicy(presentationPolicyAlternatives, pt, false);
if(ptd == null){
logger.info("Failed to verify presentation token");
}
assertNotNull(ptd);
logger.info("Succesfully verified presentation token");
}catch(Exception e){
logger.info("Failed to verify presentation token : "+e.toString()+": "+e.getMessage());
Assert.fail(e.toString());
}
return pt;
}
public List<Attribute> populateIssuerAttributes(
Map<String, Object> issuerAttsMap,
CredentialSpecification credentialSpecification) throws Exception {
List<Attribute> issuerAtts = new LinkedList<Attribute>();
ObjectFactory of = new ObjectFactory();
for (AttributeDescription attdesc : credentialSpecification
.getAttributeDescriptions().getAttributeDescription()) {
Attribute att = of.createAttribute();
att.setAttributeUID(URI.create("" + this.random.nextLong()));
URI type = attdesc.getType();
AttributeDescription attd = of.createAttributeDescription();
attd.setDataType(attdesc.getDataType());
attd.setEncoding(attdesc.getEncoding());
attd.setType(type);
att.setAttributeDescription(attd);
Object value = issuerAttsMap.get(type.toString());
if (value != null) {
issuerAtts.add(att);
att.setAttributeValue(value);
}
}
return issuerAtts;
}
}