|
|
@ -39,16 +39,22 @@ int main(int argc, char **argv) { |
|
|
printf("Could not import key file. Importing from %s was not successful",verifier_ipk_file); |
|
|
printf("Could not import key file. Importing from %s was not successful",verifier_ipk_file); |
|
|
return 1; |
|
|
return 1; |
|
|
} |
|
|
} |
|
|
|
|
|
printf("verifier_setup: loaded keys from disk\n"); |
|
|
verifier.state = GOTISSUER; |
|
|
verifier.state = GOTISSUER; |
|
|
break; |
|
|
break; |
|
|
case 3: |
|
|
case 3: |
|
|
if( 0 == strncasecmp("--public", argv[1], 6) || 0 == strncasecmp("-p", argv[1], 2)) { |
|
|
if( 0 == strncasecmp("--public", argv[1], 6) || 0 == strncasecmp("-p", argv[1], 2)) { |
|
|
verifier.state = ON; |
|
|
verifier.state = ON; |
|
|
remote_ip = argv[2]; |
|
|
remote_ip = argv[2]; |
|
|
ret = client_connect(&verifier_getissuer, remote_ip, VERIFIERPORT); |
|
|
ret = client_connect(&verifier_getissuer, remote_ip, ISSUERPORT); |
|
|
if (0 >= ret || GOTISSUER != verifier.state) { |
|
|
if (0 >= ret || GOTISSUER != verifier.state) { |
|
|
printf("connection to issuer failed\n"); |
|
|
printf("connection to issuer failed\n"); |
|
|
} |
|
|
} |
|
|
|
|
|
if(0 != ecdaa_issuer_public_key_FP256BN_serialize_file(verifier_ipk_file, &verifier.ipk)) { |
|
|
|
|
|
printf("issuer_setup: Error saving key-pair to disk\n"); |
|
|
|
|
|
return -1; |
|
|
|
|
|
} |
|
|
|
|
|
printf("verifier_setup: wrote new issuer's public key to %s\n", verifier_ipk_file); |
|
|
} else { |
|
|
} else { |
|
|
printf("arguments invalid\n"); |
|
|
printf("arguments invalid\n"); |
|
|
} |
|
|
} |
|
|
|