mirror of
https://github.com/jedisct1/minisign.git
synced 2025-04-04 19:37:48 +03:00
Add the ability to change the password encrypting a secret key
This commit is contained in:
parent
e74428c464
commit
165b9105cd
4 changed files with 81 additions and 18 deletions
|
@ -1,7 +1,7 @@
|
|||
.\" generated with Ronn/v0.7.3
|
||||
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
||||
.
|
||||
.TH "MINISIGN" "1" "October 2021" "" ""
|
||||
.TH "MINISIGN" "1" "December 2021" "" ""
|
||||
.
|
||||
.SH "NAME"
|
||||
\fBminisign\fR \- A dead simple tool to sign files and verify signatures\.
|
||||
|
@ -16,6 +16,9 @@
|
|||
\fBminisign\fR \-V [\-x sigfile] [\-p pubkeyfile | \-P pubkey] [\-o] [\-q] \-m file
|
||||
.
|
||||
.P
|
||||
\fBminisign\fR \-C [\-s seckey]
|
||||
.
|
||||
.P
|
||||
\fBminisign\fR \-R \-s seckey \-p pubkeyfile
|
||||
.
|
||||
.SH "DESCRIPTION"
|
||||
|
@ -88,6 +91,10 @@ Requires the input to be prehashed
|
|||
Pretty quiet mode, only print the trusted comment
|
||||
.
|
||||
.TP
|
||||
\fB\-C\fR
|
||||
Change the password of an existing secret key
|
||||
.
|
||||
.TP
|
||||
\fB\-R\fR
|
||||
Recreate a public key file from a secret key file
|
||||
.
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
<!---
|
||||
This man page can be generated using ronn - http://rtomayko.github.com/ronn/
|
||||
This man page can be generated using ronn - http://rtomayko.github.io/ronn/
|
||||
-->
|
||||
minisign(1) -- A dead simple tool to sign files and verify signatures.
|
||||
======================================================================
|
||||
|
@ -12,6 +12,8 @@ minisign(1) -- A dead simple tool to sign files and verify signatures.
|
|||
|
||||
`minisign` -V [-x sigfile] [-p pubkeyfile | -P pubkey] [-o] [-q] -m file
|
||||
|
||||
`minisign` -C [-s seckey]
|
||||
|
||||
`minisign` -R -s seckey -p pubkeyfile
|
||||
|
||||
## DESCRIPTION
|
||||
|
@ -54,6 +56,8 @@ These options control the actions of `minisign`.
|
|||
Requires the input to be prehashed
|
||||
* `-Q`:
|
||||
Pretty quiet mode, only print the trusted comment
|
||||
* `-C`:
|
||||
Change the password of an existing secret key
|
||||
* `-R`:
|
||||
Recreate a public key file from a secret key file
|
||||
* `-f`:
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
#include "minisign.h"
|
||||
|
||||
#ifndef VERIFY_ONLY
|
||||
static const char *getopt_options = "GSVRHhc:flm:oP:p:qQs:t:vx:";
|
||||
static const char *getopt_options = "GSCVRHhc:flm:oP:p:qQs:t:vx:";
|
||||
#else
|
||||
static const char *getopt_options = "VhHm:oP:p:qQvx:";
|
||||
#endif
|
||||
|
@ -37,6 +37,7 @@ usage(void)
|
|||
#endif
|
||||
"minisign -V [-H] [-x sigfile] [-p pubkeyfile | -P pubkey] [-o] [-q] -m file\n"
|
||||
#ifndef VERIFY_ONLY
|
||||
"minisign -C [-s seckey]\n"
|
||||
"minisign -R -s seckey -p pubkeyfile\n"
|
||||
#endif
|
||||
"\n"
|
||||
|
@ -64,6 +65,7 @@ usage(void)
|
|||
"-q quiet mode, suppress output\n"
|
||||
"-Q pretty quiet mode, only print the trusted comment\n"
|
||||
#ifndef VERIFY_ONLY
|
||||
"-C change the password of an existing secret key\n"
|
||||
"-R recreate a public key file from a secret key file\n"
|
||||
#endif
|
||||
"-f force. Combined with -G, overwrite a previous key pair\n"
|
||||
|
@ -604,28 +606,15 @@ write_pk_file(const char *pk_file, const PubkeyStruct *pubkey_struct)
|
|||
xfclose(fp);
|
||||
}
|
||||
|
||||
static int
|
||||
generate(const char *pk_file, const char *sk_file, const char *comment, int force)
|
||||
static void
|
||||
crypt_sk(SeckeyStruct* seckey_struct)
|
||||
{
|
||||
char * pwd = xsodium_malloc(PASSWORDMAXBYTES);
|
||||
char * pwd2 = xsodium_malloc(PASSWORDMAXBYTES);
|
||||
SeckeyStruct * seckey_struct = xsodium_malloc(sizeof(SeckeyStruct));
|
||||
PubkeyStruct * pubkey_struct = xsodium_malloc(sizeof(PubkeyStruct));
|
||||
unsigned char *stream;
|
||||
FILE * fp;
|
||||
unsigned long kdf_memlimit;
|
||||
unsigned long kdf_opslimit;
|
||||
|
||||
abort_on_existing_key_files(pk_file, sk_file, force);
|
||||
randombytes_buf(seckey_struct->keynum_sk.keynum, sizeof seckey_struct->keynum_sk.keynum);
|
||||
crypto_sign_keypair(pubkey_struct->keynum_pk.pk, seckey_struct->keynum_sk.sk);
|
||||
memcpy(seckey_struct->sig_alg, SIGALG, sizeof seckey_struct->sig_alg);
|
||||
memcpy(seckey_struct->kdf_alg, KDFALG, sizeof seckey_struct->kdf_alg);
|
||||
memcpy(seckey_struct->chk_alg, CHKALG, sizeof seckey_struct->chk_alg);
|
||||
memcpy(pubkey_struct->keynum_pk.keynum, seckey_struct->keynum_sk.keynum,
|
||||
sizeof pubkey_struct->keynum_pk.keynum);
|
||||
memcpy(pubkey_struct->sig_alg, SIGALG, sizeof pubkey_struct->sig_alg);
|
||||
|
||||
puts("Please enter a password to protect the secret key.\n");
|
||||
if (get_password(pwd, PASSWORDMAXBYTES, "Password: ") != 0 ||
|
||||
get_password(pwd2, PASSWORDMAXBYTES, "Password (one more time): ") != 0) {
|
||||
|
@ -665,6 +654,26 @@ generate(const char *pk_file, const char *sk_file, const char *comment, int forc
|
|||
sizeof seckey_struct->keynum_sk);
|
||||
sodium_free(stream);
|
||||
puts("done\n");
|
||||
}
|
||||
|
||||
static int
|
||||
generate(const char *pk_file, const char *sk_file, const char *comment, int force)
|
||||
{
|
||||
SeckeyStruct * seckey_struct = xsodium_malloc(sizeof(SeckeyStruct));
|
||||
PubkeyStruct * pubkey_struct = xsodium_malloc(sizeof(PubkeyStruct));
|
||||
FILE * fp;
|
||||
|
||||
abort_on_existing_key_files(pk_file, sk_file, force);
|
||||
randombytes_buf(seckey_struct->keynum_sk.keynum, sizeof seckey_struct->keynum_sk.keynum);
|
||||
crypto_sign_keypair(pubkey_struct->keynum_pk.pk, seckey_struct->keynum_sk.sk);
|
||||
memcpy(seckey_struct->sig_alg, SIGALG, sizeof seckey_struct->sig_alg);
|
||||
memcpy(seckey_struct->kdf_alg, KDFALG, sizeof seckey_struct->kdf_alg);
|
||||
memcpy(seckey_struct->chk_alg, CHKALG, sizeof seckey_struct->chk_alg);
|
||||
memcpy(pubkey_struct->keynum_pk.keynum, seckey_struct->keynum_sk.keynum,
|
||||
sizeof pubkey_struct->keynum_pk.keynum);
|
||||
memcpy(pubkey_struct->sig_alg, SIGALG, sizeof pubkey_struct->sig_alg);
|
||||
|
||||
crypt_sk(seckey_struct);
|
||||
|
||||
abort_on_existing_key_files(pk_file, sk_file, force);
|
||||
if (basedir_create_useronly(sk_file) != 0) {
|
||||
|
@ -691,6 +700,40 @@ generate(const char *pk_file, const char *sk_file, const char *comment, int forc
|
|||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
change_pw(const char *sk_file)
|
||||
{
|
||||
char sk_comment[COMMENTMAXBYTES];
|
||||
SeckeyStruct * seckey_struct;
|
||||
FILE * fp;
|
||||
|
||||
if ((fp = fopen(sk_file, "r")) == NULL) {
|
||||
exit_err(sk_file);
|
||||
}
|
||||
|
||||
if (fgets(sk_comment, (int) sizeof sk_comment, fp) == NULL) {
|
||||
exit_msg("Error while loading the secret key file");
|
||||
}
|
||||
|
||||
xfclose(fp);
|
||||
|
||||
if ((seckey_struct = seckey_load(sk_file)) == NULL) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
crypt_sk(seckey_struct);
|
||||
|
||||
if ((fp = fopen_create_useronly(sk_file)) == NULL) {
|
||||
exit_err(sk_file);
|
||||
}
|
||||
xfprintf(fp, "%s", sk_comment);
|
||||
xfput_b64(fp, (unsigned char *) (void *) seckey_struct, sizeof *seckey_struct);
|
||||
xfclose(fp);
|
||||
sodium_free(seckey_struct);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
recreate_pk(const char *pk_file, const char *sk_file, int force)
|
||||
{
|
||||
|
@ -797,6 +840,12 @@ main(int argc, char **argv)
|
|||
}
|
||||
action = ACTION_SIGN;
|
||||
break;
|
||||
case 'C':
|
||||
if (action != ACTION_NONE && action != ACTION_CHANGE_PW) {
|
||||
usage();
|
||||
}
|
||||
action = ACTION_CHANGE_PW;
|
||||
break;
|
||||
case 'R':
|
||||
if (action != ACTION_NONE && action != ACTION_RECREATE_PK) {
|
||||
usage();
|
||||
|
@ -899,6 +948,8 @@ main(int argc, char **argv)
|
|||
((pk_file != NULL || pubkey_s != NULL) ? pubkey_load(pk_file, pubkey_s) : NULL),
|
||||
message_file, (const char **) &argv[optind], argc - optind, sig_file, comment,
|
||||
trusted_comment, sign_legacy) != 0;
|
||||
case ACTION_CHANGE_PW:
|
||||
return change_pw(sk_file) != 0;
|
||||
case ACTION_RECREATE_PK:
|
||||
if (pk_file == NULL) {
|
||||
pk_file = SIG_DEFAULT_PKFILE;
|
||||
|
|
|
@ -58,6 +58,7 @@ typedef enum Action_ {
|
|||
ACTION_GENERATE,
|
||||
ACTION_SIGN,
|
||||
ACTION_VERIFY,
|
||||
ACTION_CHANGE_PW,
|
||||
ACTION_RECREATE_PK
|
||||
} Action;
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue