blob: fdb6f03ce869864771e51133ea8887a06bee9fd3 [file] [log] [blame]
/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil -*- */
/*
* Copyright (c) 2013, Regents of the University of California
* BSD license, See the LICENSE file for more information
* Author: Yingdi Yu <yingdi@cs.ucla.edu>
*/
#ifndef NDNSEC_SIG_VERIFY_HPP
#define NDNSEC_SIG_VERIFY_HPP
#include "ndnsec-util.hpp"
// using namespace ndn;
// namespace po = boost::program_options;
// shared_ptr<IdentityCertificate>
// getCertificate(const std::string& certString)
// {
// std::string decoded;
// CryptoPP::StringSource ss2(reinterpret_cast<const unsigned char *>(certString.c_str()), certString.size(), true,
// new CryptoPP::Base64Decoder(new CryptoPP::StringSink(decoded)));
// Data data;
// data.wireDecode(Block(make_shared<Buffer>(decoded.begin(), decoded.end())));
// shared_ptr<IdentityCertificate> identityCertificate = make_shared<IdentityCertificate>(boost::cref(data));
// return identityCertificate;
// }
// bool
// verifySignature(shared_ptr<IdentityCertificate> certificate, bool isDataPacket)
// {
// throw std::runtime_error("Not supported yet");
// // if(isDataPacket)
// // {
// // std::string decoded;
// // CryptoPP::FileSource ss2(cin, true,
// // new CryptoPP::Base64Decoder(new CryptoPP::StringSink(decoded)));
// // Data data;
// // data.wireDecode(ptr_lib::make_shared<Buffer>(decoded.c_str(), decoded.size()));
// // return PolicyManager::verifySignature(data, certificate->getPublicKeyInfo());
// // }
// // else
// // {
// // // The first two bytes indicates the boundary of the of the signed data and signature.
// // // for example, if the size of the signed data is 300, then the boundary should be 300, so the first two bytes should be: 0x01 0x2C
// // ptr_lib::shared_ptr<Blob> input = ptr_lib::shared_ptr<Blob>(new Blob ((istreambuf_iterator<char>(cin)), istreambuf_iterator<char>()));
// // size_t size = input->at(0);
// // size = ((size << 8) + input->at(1));
// // Blob signedBlob(input->buf()+2, size);
// // Blob signature(input->buf()+2+size, input->size()-2-size);
// // return PolicyManager::verifySignature(signedBlob, signature, certificate->getPublicKeyInfo());
// // }
// }
int
ndnsec_sig_verify(int argc, char** argv)
{
std::cerr << "Not supported yet" << std::endl;
return 1;
// bool isDataPacket = false;
// std::string certString;
// po::options_description desc("General Usage\n ndn-sig-verify [-h] [-d] certificate\nGeneral options");
// desc.add_options()
// ("help,h", "produce help message")
// ("data,d", "if specified, input from stdin will be treated as a Data packet, otherwise binary data")
// ("certificate,c", po::value<std::string>(&certString), "the certificate bits")
// ;
// po::positional_options_description p;
// p.add("certificate", 1);
// po::variables_map vm;
// try
// {
// po::store(po::command_line_parser(argc, argv).options(desc).positional(p).run(), vm);
// po::notify(vm);
// }
// catch( const std::exception& e)
// {
// std::cerr << e.what() << std::endl;
// std::cerr << desc << std::endl;
// return 1;
// }
// if (vm.count("help") || vm.count("certificate")==0)
// {
// std::cerr << desc << std::endl;
// return 1;
// }
// if (vm.count("data"))
// isDataPacket = true;
// try
// {
// shared_ptr<IdentityCertificate> certificate = getCertificate(certString);
// bool res = verifySignature(certificate, isDataPacket);
// return (res ? 0 : 1);
// }
// catch(const std::exception &e)
// {
// std::cerr << "ERROR: " << e.what() << std::endl;
// return 1;
// }
}
#endif //NDNSEC_SIG_VERIFY_HPP