tools: Combine all security tools into one; Add Export/Import/Delete/Unlock/AddACL command
There might be some bugs in the tools combined, but the purpose of this commit is to combine the tools rather than fixing bugs.
Change-Id: I2924067d666eacfc278ebd07e7e178c54a2f7362
diff --git a/tools/ndnsec-sig-verify.hpp b/tools/ndnsec-sig-verify.hpp
new file mode 100644
index 0000000..fdb6f03
--- /dev/null
+++ b/tools/ndnsec-sig-verify.hpp
@@ -0,0 +1,112 @@
+/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil -*- */
+/*
+ * Copyright (c) 2013, Regents of the University of California
+ * BSD license, See the LICENSE file for more information
+ * Author: Yingdi Yu <yingdi@cs.ucla.edu>
+ */
+
+#ifndef NDNSEC_SIG_VERIFY_HPP
+#define NDNSEC_SIG_VERIFY_HPP
+
+#include "ndnsec-util.hpp"
+
+// using namespace ndn;
+// namespace po = boost::program_options;
+
+// shared_ptr<IdentityCertificate>
+// getCertificate(const std::string& certString)
+// {
+// std::string decoded;
+// CryptoPP::StringSource ss2(reinterpret_cast<const unsigned char *>(certString.c_str()), certString.size(), true,
+// new CryptoPP::Base64Decoder(new CryptoPP::StringSink(decoded)));
+
+// Data data;
+// data.wireDecode(Block(make_shared<Buffer>(decoded.begin(), decoded.end())));
+
+// shared_ptr<IdentityCertificate> identityCertificate = make_shared<IdentityCertificate>(boost::cref(data));
+
+// return identityCertificate;
+// }
+
+// bool
+// verifySignature(shared_ptr<IdentityCertificate> certificate, bool isDataPacket)
+// {
+// throw std::runtime_error("Not supported yet");
+// // if(isDataPacket)
+// // {
+// // std::string decoded;
+// // CryptoPP::FileSource ss2(cin, true,
+// // new CryptoPP::Base64Decoder(new CryptoPP::StringSink(decoded)));
+
+// // Data data;
+// // data.wireDecode(ptr_lib::make_shared<Buffer>(decoded.c_str(), decoded.size()));
+// // return PolicyManager::verifySignature(data, certificate->getPublicKeyInfo());
+// // }
+// // else
+// // {
+// // // The first two bytes indicates the boundary of the of the signed data and signature.
+// // // for example, if the size of the signed data is 300, then the boundary should be 300, so the first two bytes should be: 0x01 0x2C
+// // ptr_lib::shared_ptr<Blob> input = ptr_lib::shared_ptr<Blob>(new Blob ((istreambuf_iterator<char>(cin)), istreambuf_iterator<char>()));
+// // size_t size = input->at(0);
+// // size = ((size << 8) + input->at(1));
+
+// // Blob signedBlob(input->buf()+2, size);
+// // Blob signature(input->buf()+2+size, input->size()-2-size);
+
+// // return PolicyManager::verifySignature(signedBlob, signature, certificate->getPublicKeyInfo());
+// // }
+// }
+
+int
+ndnsec_sig_verify(int argc, char** argv)
+{
+ std::cerr << "Not supported yet" << std::endl;
+ return 1;
+ // bool isDataPacket = false;
+ // std::string certString;
+
+ // po::options_description desc("General Usage\n ndn-sig-verify [-h] [-d] certificate\nGeneral options");
+ // desc.add_options()
+ // ("help,h", "produce help message")
+ // ("data,d", "if specified, input from stdin will be treated as a Data packet, otherwise binary data")
+ // ("certificate,c", po::value<std::string>(&certString), "the certificate bits")
+ // ;
+
+ // po::positional_options_description p;
+ // p.add("certificate", 1);
+
+ // po::variables_map vm;
+ // try
+ // {
+ // po::store(po::command_line_parser(argc, argv).options(desc).positional(p).run(), vm);
+ // po::notify(vm);
+ // }
+ // catch( const std::exception& e)
+ // {
+ // std::cerr << e.what() << std::endl;
+ // std::cerr << desc << std::endl;
+ // return 1;
+ // }
+
+ // if (vm.count("help") || vm.count("certificate")==0)
+ // {
+ // std::cerr << desc << std::endl;
+ // return 1;
+ // }
+ // if (vm.count("data"))
+ // isDataPacket = true;
+
+ // try
+ // {
+ // shared_ptr<IdentityCertificate> certificate = getCertificate(certString);
+ // bool res = verifySignature(certificate, isDataPacket);
+ // return (res ? 0 : 1);
+ // }
+ // catch(const std::exception &e)
+ // {
+ // std::cerr << "ERROR: " << e.what() << std::endl;
+ // return 1;
+ // }
+}
+
+#endif //NDNSEC_SIG_VERIFY_HPP