CertificateOfOwnership.hpp 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2019 ZeroTier, Inc. https://www.zerotier.com/
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * You can be released from the requirements of the license by purchasing
  21. * a commercial license. Buying such a license is mandatory as soon as you
  22. * develop commercial closed-source software that incorporates or links
  23. * directly against ZeroTier software without disclosing the source code
  24. * of your own application.
  25. */
  26. #ifndef ZT_CERTIFICATEOFOWNERSHIP_HPP
  27. #define ZT_CERTIFICATEOFOWNERSHIP_HPP
  28. #include <stdint.h>
  29. #include <stdio.h>
  30. #include <stdlib.h>
  31. #include <string.h>
  32. #include "Constants.hpp"
  33. #include "Credential.hpp"
  34. #include "C25519.hpp"
  35. #include "Address.hpp"
  36. #include "Identity.hpp"
  37. #include "Buffer.hpp"
  38. #include "InetAddress.hpp"
  39. #include "MAC.hpp"
  40. // Max things per CertificateOfOwnership
  41. #define ZT_CERTIFICATEOFOWNERSHIP_MAX_THINGS 16
  42. // Maximum size of a thing's value field in bytes
  43. #define ZT_CERTIFICATEOFOWNERSHIP_MAX_THING_VALUE_SIZE 16
  44. namespace ZeroTier {
  45. class RuntimeEnvironment;
  46. /**
  47. * Certificate indicating ownership of a network identifier
  48. */
  49. class CertificateOfOwnership : public Credential
  50. {
  51. public:
  52. static inline Credential::Type credentialType() { return Credential::CREDENTIAL_TYPE_COO; }
  53. enum Thing
  54. {
  55. THING_NULL = 0,
  56. THING_MAC_ADDRESS = 1,
  57. THING_IPV4_ADDRESS = 2,
  58. THING_IPV6_ADDRESS = 3
  59. };
  60. CertificateOfOwnership() :
  61. _networkId(0),
  62. _ts(0),
  63. _flags(0),
  64. _id(0),
  65. _thingCount(0)
  66. {
  67. memset(_thingTypes,0,sizeof(_thingTypes));
  68. memset(_thingValues,0,sizeof(_thingValues));
  69. memset(_signature.data,0,sizeof(_signature.data));
  70. }
  71. CertificateOfOwnership(const uint64_t nwid,const int64_t ts,const Address &issuedTo,const uint32_t id) :
  72. _networkId(nwid),
  73. _ts(ts),
  74. _flags(0),
  75. _id(id),
  76. _thingCount(0),
  77. _issuedTo(issuedTo)
  78. {
  79. memset(_thingTypes,0,sizeof(_thingTypes));
  80. memset(_thingValues,0,sizeof(_thingValues));
  81. memset(_signature.data,0,sizeof(_signature.data));
  82. }
  83. inline uint64_t networkId() const { return _networkId; }
  84. inline int64_t timestamp() const { return _ts; }
  85. inline uint32_t id() const { return _id; }
  86. inline unsigned int thingCount() const { return (unsigned int)_thingCount; }
  87. inline Thing thingType(const unsigned int i) const { return (Thing)_thingTypes[i]; }
  88. inline const uint8_t *thingValue(const unsigned int i) const { return _thingValues[i]; }
  89. inline const Address &issuedTo() const { return _issuedTo; }
  90. inline bool owns(const InetAddress &ip) const
  91. {
  92. if (ip.ss_family == AF_INET)
  93. return this->_owns(THING_IPV4_ADDRESS,&(reinterpret_cast<const struct sockaddr_in *>(&ip)->sin_addr.s_addr),4);
  94. if (ip.ss_family == AF_INET6)
  95. return this->_owns(THING_IPV6_ADDRESS,reinterpret_cast<const struct sockaddr_in6 *>(&ip)->sin6_addr.s6_addr,16);
  96. return false;
  97. }
  98. inline bool owns(const MAC &mac) const
  99. {
  100. uint8_t tmp[6];
  101. mac.copyTo(tmp,6);
  102. return this->_owns(THING_MAC_ADDRESS,tmp,6);
  103. }
  104. inline void addThing(const InetAddress &ip)
  105. {
  106. if (_thingCount >= ZT_CERTIFICATEOFOWNERSHIP_MAX_THINGS) return;
  107. if (ip.ss_family == AF_INET) {
  108. _thingTypes[_thingCount] = THING_IPV4_ADDRESS;
  109. memcpy(_thingValues[_thingCount],&(reinterpret_cast<const struct sockaddr_in *>(&ip)->sin_addr.s_addr),4);
  110. ++_thingCount;
  111. } else if (ip.ss_family == AF_INET6) {
  112. _thingTypes[_thingCount] = THING_IPV6_ADDRESS;
  113. memcpy(_thingValues[_thingCount],reinterpret_cast<const struct sockaddr_in6 *>(&ip)->sin6_addr.s6_addr,16);
  114. ++_thingCount;
  115. }
  116. }
  117. inline void addThing(const MAC &mac)
  118. {
  119. if (_thingCount >= ZT_CERTIFICATEOFOWNERSHIP_MAX_THINGS) return;
  120. _thingTypes[_thingCount] = THING_MAC_ADDRESS;
  121. mac.copyTo(_thingValues[_thingCount],6);
  122. ++_thingCount;
  123. }
  124. /**
  125. * @param signer Signing identity, must have private key
  126. * @return True if signature was successful
  127. */
  128. inline bool sign(const Identity &signer)
  129. {
  130. if (signer.hasPrivate()) {
  131. Buffer<sizeof(CertificateOfOwnership) + 64> tmp;
  132. _signedBy = signer.address();
  133. this->serialize(tmp,true);
  134. _signature = signer.sign(tmp.data(),tmp.size());
  135. return true;
  136. }
  137. return false;
  138. }
  139. /**
  140. * @param RR Runtime environment to allow identity lookup for signedBy
  141. * @param tPtr Thread pointer to be handed through to any callbacks called as a result of this call
  142. * @return 0 == OK, 1 == waiting for WHOIS, -1 == BAD signature
  143. */
  144. int verify(const RuntimeEnvironment *RR,void *tPtr) const;
  145. template<unsigned int C>
  146. inline void serialize(Buffer<C> &b,const bool forSign = false) const
  147. {
  148. if (forSign) b.append((uint64_t)0x7f7f7f7f7f7f7f7fULL);
  149. b.append(_networkId);
  150. b.append(_ts);
  151. b.append(_flags);
  152. b.append(_id);
  153. b.append((uint16_t)_thingCount);
  154. for(unsigned int i=0,j=_thingCount;i<j;++i) {
  155. b.append((uint8_t)_thingTypes[i]);
  156. b.append(_thingValues[i],ZT_CERTIFICATEOFOWNERSHIP_MAX_THING_VALUE_SIZE);
  157. }
  158. _issuedTo.appendTo(b);
  159. _signedBy.appendTo(b);
  160. if (!forSign) {
  161. b.append((uint8_t)1); // 1 == Ed25519
  162. b.append((uint16_t)ZT_C25519_SIGNATURE_LEN); // length of signature
  163. b.append(_signature.data,ZT_C25519_SIGNATURE_LEN);
  164. }
  165. b.append((uint16_t)0); // length of additional fields, currently 0
  166. if (forSign) b.append((uint64_t)0x7f7f7f7f7f7f7f7fULL);
  167. }
  168. template<unsigned int C>
  169. inline unsigned int deserialize(const Buffer<C> &b,unsigned int startAt = 0)
  170. {
  171. unsigned int p = startAt;
  172. *this = CertificateOfOwnership();
  173. _networkId = b.template at<uint64_t>(p); p += 8;
  174. _ts = b.template at<uint64_t>(p); p += 8;
  175. _flags = b.template at<uint64_t>(p); p += 8;
  176. _id = b.template at<uint32_t>(p); p += 4;
  177. _thingCount = b.template at<uint16_t>(p); p += 2;
  178. for(unsigned int i=0,j=_thingCount;i<j;++i) {
  179. if (i < ZT_CERTIFICATEOFOWNERSHIP_MAX_THINGS) {
  180. _thingTypes[i] = (uint8_t)b[p++];
  181. memcpy(_thingValues[i],b.field(p,ZT_CERTIFICATEOFOWNERSHIP_MAX_THING_VALUE_SIZE),ZT_CERTIFICATEOFOWNERSHIP_MAX_THING_VALUE_SIZE);
  182. p += ZT_CERTIFICATEOFOWNERSHIP_MAX_THING_VALUE_SIZE;
  183. }
  184. }
  185. _issuedTo.setTo(b.field(p,ZT_ADDRESS_LENGTH),ZT_ADDRESS_LENGTH); p += ZT_ADDRESS_LENGTH;
  186. _signedBy.setTo(b.field(p,ZT_ADDRESS_LENGTH),ZT_ADDRESS_LENGTH); p += ZT_ADDRESS_LENGTH;
  187. if (b[p++] == 1) {
  188. if (b.template at<uint16_t>(p) != ZT_C25519_SIGNATURE_LEN)
  189. throw ZT_EXCEPTION_INVALID_SERIALIZED_DATA_INVALID_CRYPTOGRAPHIC_TOKEN;
  190. p += 2;
  191. memcpy(_signature.data,b.field(p,ZT_C25519_SIGNATURE_LEN),ZT_C25519_SIGNATURE_LEN); p += ZT_C25519_SIGNATURE_LEN;
  192. } else {
  193. p += 2 + b.template at<uint16_t>(p);
  194. }
  195. p += 2 + b.template at<uint16_t>(p);
  196. if (p > b.size())
  197. throw ZT_EXCEPTION_INVALID_SERIALIZED_DATA_OVERFLOW;
  198. return (p - startAt);
  199. }
  200. // Provides natural sort order by ID
  201. inline bool operator<(const CertificateOfOwnership &coo) const { return (_id < coo._id); }
  202. inline bool operator==(const CertificateOfOwnership &coo) const { return (memcmp(this,&coo,sizeof(CertificateOfOwnership)) == 0); }
  203. inline bool operator!=(const CertificateOfOwnership &coo) const { return (memcmp(this,&coo,sizeof(CertificateOfOwnership)) != 0); }
  204. private:
  205. bool _owns(const Thing &t,const void *v,unsigned int l) const;
  206. uint64_t _networkId;
  207. int64_t _ts;
  208. uint64_t _flags;
  209. uint32_t _id;
  210. uint16_t _thingCount;
  211. uint8_t _thingTypes[ZT_CERTIFICATEOFOWNERSHIP_MAX_THINGS];
  212. uint8_t _thingValues[ZT_CERTIFICATEOFOWNERSHIP_MAX_THINGS][ZT_CERTIFICATEOFOWNERSHIP_MAX_THING_VALUE_SIZE];
  213. Address _issuedTo;
  214. Address _signedBy;
  215. C25519::Signature _signature;
  216. };
  217. } // namespace ZeroTier
  218. #endif