mirror of
https://github.com/jedisct1/minisign.git
synced 2025-04-04 19:37:48 +03:00
Support prehashing
This commit is contained in:
parent
ee148f9007
commit
6e1023d207
2 changed files with 57 additions and 11 deletions
|
@ -19,7 +19,7 @@
|
||||||
#include "minisign.h"
|
#include "minisign.h"
|
||||||
|
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
static const char *getopt_options = "GSVhc:m:oP:p:qQs:t:vx:";
|
static const char *getopt_options = "GSVHhc:m:oP:p:qQs:t:vx:";
|
||||||
#else
|
#else
|
||||||
static const char *getopt_options = "Vhm:oP:p:qQvx:";
|
static const char *getopt_options = "Vhm:oP:p:qQvx:";
|
||||||
#endif
|
#endif
|
||||||
|
@ -32,7 +32,7 @@ usage(void)
|
||||||
puts("Usage:\n"
|
puts("Usage:\n"
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
"minisign -G [-p pubkey] [-s seckey]\n"
|
"minisign -G [-p pubkey] [-s seckey]\n"
|
||||||
"minisign -S [-x sigfile] [-s seckey] [-c untrusted_comment] [-t trusted_comment] -m file\n"
|
"minisign -S [-H] [-x sigfile] [-s seckey] [-c untrusted_comment] [-t trusted_comment] -m file\n"
|
||||||
#endif
|
#endif
|
||||||
"minisign -V [-x sigfile] [-p pubkeyfile | -P pubkey] [-o] [-q] -m file\n"
|
"minisign -V [-x sigfile] [-p pubkeyfile | -P pubkey] [-o] [-q] -m file\n"
|
||||||
"\n"
|
"\n"
|
||||||
|
@ -43,6 +43,7 @@ usage(void)
|
||||||
"-V verify that a signature is valid for a given file\n"
|
"-V verify that a signature is valid for a given file\n"
|
||||||
"-m <file> file to sign/verify\n"
|
"-m <file> file to sign/verify\n"
|
||||||
"-o combined with -V, output the file content after verification\n"
|
"-o combined with -V, output the file content after verification\n"
|
||||||
|
"-H combined with -S, pre-hash in order to sign large files\n"
|
||||||
"-p <pubkeyfile> public key file (default: ./minisign.pub)\n"
|
"-p <pubkeyfile> public key file (default: ./minisign.pub)\n"
|
||||||
"-P <pubkey> public key, as a base64 string\n"
|
"-P <pubkey> public key, as a base64 string\n"
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
|
@ -61,12 +62,42 @@ usage(void)
|
||||||
}
|
}
|
||||||
|
|
||||||
static unsigned char *
|
static unsigned char *
|
||||||
message_load(size_t *message_len, const char *message_file)
|
message_load_hashed(size_t *message_len, const char *message_file)
|
||||||
|
{
|
||||||
|
crypto_generichash_state hs;
|
||||||
|
unsigned char buf[4096U];
|
||||||
|
unsigned char *message;
|
||||||
|
FILE *fp;
|
||||||
|
size_t n;
|
||||||
|
|
||||||
|
if ((fp = fopen(message_file, "rb")) == NULL) {
|
||||||
|
exit_err(message_file);
|
||||||
|
}
|
||||||
|
crypto_generichash_init(&hs, NULL, 0U, crypto_generichash_BYTES_MAX);
|
||||||
|
while ((n = fread(buf, 1U, sizeof buf, fp)) > 0U) {
|
||||||
|
crypto_generichash_update(&hs, buf, n);
|
||||||
|
}
|
||||||
|
if (!feof(fp)) {
|
||||||
|
exit_err(message_file);
|
||||||
|
}
|
||||||
|
xfclose(fp);
|
||||||
|
message = xmalloc(crypto_generichash_BYTES_MAX);
|
||||||
|
crypto_generichash_final(&hs, message, crypto_generichash_BYTES_MAX);
|
||||||
|
*message_len = crypto_generichash_BYTES_MAX;
|
||||||
|
|
||||||
|
return message;
|
||||||
|
}
|
||||||
|
|
||||||
|
static unsigned char *
|
||||||
|
message_load(size_t *message_len, const char *message_file, int hashed)
|
||||||
{
|
{
|
||||||
FILE *fp;
|
FILE *fp;
|
||||||
unsigned char *message;
|
unsigned char *message;
|
||||||
off_t message_len_;
|
off_t message_len_;
|
||||||
|
|
||||||
|
if (hashed != 0) {
|
||||||
|
return message_load_hashed(message_len, message_file);
|
||||||
|
}
|
||||||
if ((fp = fopen(message_file, "rb")) == NULL ||
|
if ((fp = fopen(message_file, "rb")) == NULL ||
|
||||||
fseeko(fp, 0, SEEK_END) != 0 ||
|
fseeko(fp, 0, SEEK_END) != 0 ||
|
||||||
(message_len_ = ftello(fp)) == (off_t) -1) {
|
(message_len_ = ftello(fp)) == (off_t) -1) {
|
||||||
|
@ -114,7 +145,7 @@ output_file(const char *message_file)
|
||||||
|
|
||||||
static SigStruct *
|
static SigStruct *
|
||||||
sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES],
|
sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES],
|
||||||
char trusted_comment[TRUSTEDCOMMENTMAXBYTES],
|
int *hashed, char trusted_comment[TRUSTEDCOMMENTMAXBYTES],
|
||||||
size_t trusted_comment_maxlen)
|
size_t trusted_comment_maxlen)
|
||||||
{
|
{
|
||||||
char comment[COMMENTMAXBYTES];
|
char comment[COMMENTMAXBYTES];
|
||||||
|
@ -171,7 +202,12 @@ sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES],
|
||||||
exit_msg("base64 conversion failed");
|
exit_msg("base64 conversion failed");
|
||||||
}
|
}
|
||||||
free(sig_s);
|
free(sig_s);
|
||||||
if (memcmp(sig_struct->sig_alg, SIGALG, sizeof sig_struct->sig_alg) != 0) {
|
if (memcmp(sig_struct->sig_alg, SIGALG, sizeof sig_struct->sig_alg) == 0) {
|
||||||
|
*hashed = 0;
|
||||||
|
} else if (memcmp(sig_struct->sig_alg, SIGALG_HASHED,
|
||||||
|
sizeof sig_struct->sig_alg) == 0) {
|
||||||
|
*hashed = 1;
|
||||||
|
} else {
|
||||||
exit_msg("Unsupported signature algorithm");
|
exit_msg("Unsupported signature algorithm");
|
||||||
}
|
}
|
||||||
if (b64_to_bin(global_sig, global_sig_s, crypto_sign_BYTES,
|
if (b64_to_bin(global_sig, global_sig_s, crypto_sign_BYTES,
|
||||||
|
@ -346,13 +382,14 @@ verify(PubkeyStruct *pubkey_struct, const char *message_file,
|
||||||
unsigned char *message;
|
unsigned char *message;
|
||||||
size_t message_len;
|
size_t message_len;
|
||||||
size_t trusted_comment_len;
|
size_t trusted_comment_len;
|
||||||
|
int hashed;
|
||||||
|
|
||||||
if (output != 0) {
|
if (output != 0) {
|
||||||
info_fp = stderr;
|
info_fp = stderr;
|
||||||
}
|
}
|
||||||
message = message_load(&message_len, message_file);
|
sig_struct = sig_load(sig_file, global_sig, &hashed,
|
||||||
sig_struct = sig_load(sig_file, global_sig,
|
|
||||||
trusted_comment, sizeof trusted_comment);
|
trusted_comment, sizeof trusted_comment);
|
||||||
|
message = message_load(&message_len, message_file, hashed);
|
||||||
if (memcmp(sig_struct->keynum, pubkey_struct->keynum_pk.keynum,
|
if (memcmp(sig_struct->keynum, pubkey_struct->keynum_pk.keynum,
|
||||||
sizeof sig_struct->keynum) != 0) {
|
sizeof sig_struct->keynum) != 0) {
|
||||||
fprintf(stderr, "Signature key id in %s is %" PRIX64 "\n"
|
fprintf(stderr, "Signature key id in %s is %" PRIX64 "\n"
|
||||||
|
@ -402,7 +439,7 @@ verify(PubkeyStruct *pubkey_struct, const char *message_file,
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
static int
|
static int
|
||||||
sign(const char *sk_file, const char *message_file, const char *sig_file,
|
sign(const char *sk_file, const char *message_file, const char *sig_file,
|
||||||
const char *comment, const char *trusted_comment)
|
const char *comment, const char *trusted_comment, int hashed)
|
||||||
{
|
{
|
||||||
unsigned char global_sig[crypto_sign_BYTES];
|
unsigned char global_sig[crypto_sign_BYTES];
|
||||||
SigStruct sig_struct;
|
SigStruct sig_struct;
|
||||||
|
@ -415,8 +452,12 @@ sign(const char *sk_file, const char *message_file, const char *sig_file,
|
||||||
size_t message_len;
|
size_t message_len;
|
||||||
|
|
||||||
seckey_struct = seckey_load(sk_file);
|
seckey_struct = seckey_load(sk_file);
|
||||||
message = message_load(&message_len, message_file);
|
message = message_load(&message_len, message_file, hashed);
|
||||||
memcpy(sig_struct.sig_alg, SIGALG, sizeof sig_struct.sig_alg);
|
if (hashed != 0) {
|
||||||
|
memcpy(sig_struct.sig_alg, SIGALG_HASHED, sizeof sig_struct.sig_alg);
|
||||||
|
} else {
|
||||||
|
memcpy(sig_struct.sig_alg, SIGALG, sizeof sig_struct.sig_alg);
|
||||||
|
}
|
||||||
memcpy(sig_struct.keynum, seckey_struct->keynum_sk.keynum,
|
memcpy(sig_struct.keynum, seckey_struct->keynum_sk.keynum,
|
||||||
sizeof sig_struct.keynum);
|
sizeof sig_struct.keynum);
|
||||||
crypto_sign_detached(sig_struct.sig, NULL, message, message_len,
|
crypto_sign_detached(sig_struct.sig, NULL, message, message_len,
|
||||||
|
@ -582,6 +623,7 @@ main(int argc, char **argv)
|
||||||
const char *pubkey_s = NULL;
|
const char *pubkey_s = NULL;
|
||||||
const char *trusted_comment = NULL;
|
const char *trusted_comment = NULL;
|
||||||
int opt_flag;
|
int opt_flag;
|
||||||
|
int hashed = 0;
|
||||||
int quiet = 0;
|
int quiet = 0;
|
||||||
int output = 0;
|
int output = 0;
|
||||||
Action action = ACTION_NONE;
|
Action action = ACTION_NONE;
|
||||||
|
@ -611,6 +653,9 @@ main(int argc, char **argv)
|
||||||
break;
|
break;
|
||||||
case 'h':
|
case 'h':
|
||||||
usage();
|
usage();
|
||||||
|
case 'H':
|
||||||
|
hashed = 1;
|
||||||
|
break;
|
||||||
case 'm':
|
case 'm':
|
||||||
message_file = optarg;
|
message_file = optarg;
|
||||||
break;
|
break;
|
||||||
|
@ -671,7 +716,7 @@ main(int argc, char **argv)
|
||||||
trusted_comment = default_trusted_comment(message_file);
|
trusted_comment = default_trusted_comment(message_file);
|
||||||
}
|
}
|
||||||
return sign(sk_file, message_file, sig_file, comment,
|
return sign(sk_file, message_file, sig_file, comment,
|
||||||
trusted_comment) != 0;
|
trusted_comment, hashed) != 0;
|
||||||
#endif
|
#endif
|
||||||
case ACTION_VERIFY:
|
case ACTION_VERIFY:
|
||||||
if (message_file == NULL) {
|
if (message_file == NULL) {
|
||||||
|
|
|
@ -7,6 +7,7 @@
|
||||||
#define PASSWORDMAXBYTES 1024
|
#define PASSWORDMAXBYTES 1024
|
||||||
#define TRUSTEDCOMMENTMAXBYTES 8192
|
#define TRUSTEDCOMMENTMAXBYTES 8192
|
||||||
#define SIGALG "Ed"
|
#define SIGALG "Ed"
|
||||||
|
#define SIGALG_HASHED "ED"
|
||||||
#define KDFALG "Sc"
|
#define KDFALG "Sc"
|
||||||
#define CHKALG "B2"
|
#define CHKALG "B2"
|
||||||
#define COMMENT_PREFIX "untrusted comment: "
|
#define COMMENT_PREFIX "untrusted comment: "
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue