forked from apache/incubator-resilientdb
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcertificate_tools_test.cpp
95 lines (84 loc) · 2.54 KB
/
certificate_tools_test.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
#include <fcntl.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include "common/crypto/signature_verifier.h"
using namespace resdb;
CertificateInfo ReadData(const std::string& file_name) {
int fd = open(file_name.c_str(), O_RDONLY, 0666);
if (fd < 0) {
printf("open file %s fail %s\n", file_name.c_str(), strerror(errno));
}
assert(fd >= 0);
std::string res;
int read_len = 0;
char tmp[1024];
while (true) {
read_len = read(fd, tmp, sizeof(tmp));
if (read_len <= 0) {
break;
}
res.append(tmp, read_len);
}
close(fd);
CertificateInfo info;
assert(info.ParseFromString(res));
return info;
}
KeyInfo ReadKey(const std::string& file_name) {
int fd = open(file_name.c_str(), O_RDONLY, 0666);
if (fd < 0) {
printf("open file %s fail %s\n", file_name.c_str(), strerror(errno));
}
assert(fd >= 0);
std::string res;
int read_len = 0;
char tmp[1024];
while (true) {
read_len = read(fd, tmp, sizeof(tmp));
if (read_len <= 0) {
break;
}
res.append(tmp, read_len);
}
close(fd);
KeyInfo key;
assert(key.ParseFromString(res));
return key;
}
int main(int argc, char** argv) {
std::string cert_path, private_key_path;
if (argc < 2) {
printf("<private key path> <cert path>\n");
exit(0);
}
private_key_path = argv[1];
cert_path = argv[2];
// Read the private key.
KeyInfo private_key = ReadKey(private_key_path);
// Read the certificate.
CertificateInfo info = ReadData(cert_path);
// Get certificate using the key from administor.
SignatureVerifier verifier(private_key, info);
auto resp_info = verifier.VerifyKey(info.public_key().public_key_info(),
info.public_key().certificate());
assert(resp_info);
}