Add -P to specify the public key on the command-line

This commit is contained in:
Frank Denis 2015-06-09 14:04:06 +02:00
parent eea7fad920
commit 9d96b1c12a
2 changed files with 89 additions and 60 deletions

View file

@ -18,12 +18,12 @@ Compilation:
$ cmake .. $ cmake ..
$ make $ make
# make install # make install
Creating a key pair Creating a key pair
------------------- -------------------
$ minisign -G $ minisign -G
The public key is put into the `minisign.pub` file, and the secret key The public key is put into the `minisign.pub` file, and the secret key
into the `minisign.key` file. into the `minisign.key` file.
@ -31,42 +31,47 @@ Signing a file
-------------- --------------
$ minisign -S -m myfile.txt $ minisign -S -m myfile.txt
Or to include a comment in the signature, that will be verified and Or to include a comment in the signature, that will be verified and
displayed when verifying the file: displayed when verifying the file:
$ minisign -S -m myfile.txt -t 'This comment will be signed as well' $ minisign -S -m myfile.txt -t 'This comment will be signed as well'
The signature is put into `myfile.txt.minisig`. The signature is put into `myfile.txt.minisig`.
Verifying a file Verifying a file
---------------- ----------------
$ minisign -V -m myfile.txt $ minisign -V -P RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3 -m myfile.txt
or
$ minisign -V -p signature.pub -m myfile.txt
This requires the signature `myfile.txt.minisig` to be present in the same This requires the signature `myfile.txt.minisig` to be present in the same
directory. directory.
The public key can either reside in a file (`./minisign.pub` by
default) or can be directly specified on the command line.
Usage Usage
----- -----
$ minisign -G -p pubkey -s seckey $ minisign -G [-p pubkey] [-s seckey]
$ minisign -S -s seckey -m file [-x sigfile] [-c untrusted_comment] [-t trusted_comment] $ minisign -S [-x sigfile] [-s seckey] [-c untrusted_comment] [-t trusted_comment] -m file
$ minisign -V -p pubkey -m file [-x sigfile] [-q] $ minisign -V [-x sigfile] [-p pubkeyfile | -P pubkey] [-q] -m file
-G generate a new key pair -G generate a new key pair
-S sign a file -S sign a file
-V verify that a signature is valid for a given file -V verify that a signature is valid for a given file
-m <file> file to sign/verify -m <file> file to sign/verify
-p <pubkey> public key file (default: ./minisign.pub) -p <pubkeyfile> public key file (default: ./minisign.pub)
-s <seckey> secret key file (default: ./minisign.key) -P <pubkey> public key, as a base64 string
-x <sigfile> signature file (default: <file>.minisig) -s <seckey> secret key file (default: ./minisign.key)
-c <comment> add a one-line untrusted comment -x <sigfile> signature file (default: <file>.minisig)
-t <comment> add a one-line trusted comment -c <comment> add a one-line untrusted comment
-q quiet mode, suppress output -t <comment> add a one-line trusted comment
-v display version number -q quiet mode, suppress output
-v display version number
Trusted comments Trusted comments
---------------- ----------------
@ -102,7 +107,7 @@ Signature format
base64(<signature_algorithm> || <key_id> || <signature>) base64(<signature_algorithm> || <key_id> || <signature>)
trusted_comment: <arbitrary text> trusted_comment: <arbitrary text>
base64(<global_signature>) base64(<global_signature>)
* `signature_algorithm`: `Ed` * `signature_algorithm`: `Ed`
* `key_id`: 8 random bytes, matching the public key * `key_id`: 8 random bytes, matching the public key
* `signature`: `ed25519(<file data>)` * `signature`: `ed25519(<file data>)`
@ -113,7 +118,7 @@ Public key format
untrusted comment: <arbitrary text> untrusted comment: <arbitrary text>
base64(<signature_algorithm> || <key_id> || <public_key>) base64(<signature_algorithm> || <key_id> || <public_key>)
* `signature_algorithm`: `Ed` * `signature_algorithm`: `Ed`
* `key_id`: 8 random bytes * `key_id`: 8 random bytes
* `public_key`: Ed25519 public key * `public_key`: Ed25519 public key

View file

@ -19,9 +19,9 @@
#include "minisign.h" #include "minisign.h"
#ifndef VERIFY_ONLY #ifndef VERIFY_ONLY
static const char *getopt_options = "GSVhc:m:p:qs:t:vx:"; static const char *getopt_options = "GSVhc:m:P:p:qs:t:vx:";
#else #else
static const char *getopt_options = "Vhm:p:qvx:"; static const char *getopt_options = "Vhm:P:p:qvx:";
#endif #endif
static void usage(void) __attribute__((noreturn)); static void usage(void) __attribute__((noreturn));
@ -30,29 +30,30 @@ static void
usage(void) usage(void)
{ {
puts("Usage:\n" puts("Usage:\n"
"minisign -G -p pubkey -s seckey [-c untrusted_comment]\n"
#ifndef VERIFY_ONLY #ifndef VERIFY_ONLY
"minisign -S -s seckey -m file [-x sigfile] [-c untrusted_comment] [-t trusted_comment]\n" "minisign -G [-p pubkey] [-s seckey]\n"
"minisign -V -p pubkey -m file [-x sigfile] [-q]\n" "minisign -S [-x sigfile] [-s seckey] [-c untrusted_comment] [-t trusted_comment] -m file\n"
#endif #endif
"minisign -V [-x sigfile] [-p pubkeyfile | -P pubkey] [-q] -m file\n"
"\n" "\n"
#ifndef VERIFY_ONLY #ifndef VERIFY_ONLY
"-G generate a new key pair\n" "-G generate a new key pair\n"
"-S sign a file\n" "-S sign a file\n"
#endif #endif
"-V verify that a signature is valid for a given file\n" "-V verify that a signature is valid for a given file\n"
"-m <file> file to sign/verify\n" "-m <file> file to sign/verify\n"
"-p <pubkey> public key file (default: ./minisign.pub)\n" "-p <pubkeyfile> public key file (default: ./minisign.pub)\n"
"-P <pubkey> public key, as a base64 string\n"
#ifndef VERIFY_ONLY #ifndef VERIFY_ONLY
"-s <seckey> secret key file (default: ./minisign.key)\n" "-s <seckey> secret key file (default: ./minisign.key)\n"
#endif #endif
"-x <sigfile> signature file (default: <file>.minisig)\n" "-x <sigfile> signature file (default: <file>.minisig)\n"
#ifndef VERIFY_ONLY #ifndef VERIFY_ONLY
"-c <comment> add a one-line untrusted comment\n" "-c <comment> add a one-line untrusted comment\n"
"-t <comment> add a one-line trusted comment\n" "-t <comment> add a one-line trusted comment\n"
#endif #endif
"-q quiet mode, suppress output\n" "-q quiet mode, suppress output\n"
"-v display version number\n" "-v display version number\n"
); );
exit(1); exit(1);
} }
@ -159,14 +160,33 @@ sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES],
} }
static PubkeyStruct * static PubkeyStruct *
pubkey_load(const char *pk_file) pubkey_load_string(const char *pubkey_s)
{
PubkeyStruct *pubkey_struct;
size_t pubkey_struct_len;
pubkey_struct = xmalloc(sizeof *pubkey_struct);
if (b64_to_bin((unsigned char *) (void *) pubkey_struct, pubkey_s,
sizeof *pubkey_struct, strlen(pubkey_s),
&pubkey_struct_len) == NULL ||
pubkey_struct_len != sizeof *pubkey_struct) {
exit_msg("base64 conversion failed");
}
if (memcmp(pubkey_struct->sig_alg, SIGALG,
sizeof pubkey_struct->sig_alg) != 0) {
exit_msg("Unsupported signature algorithm");
}
return pubkey_struct;
}
static PubkeyStruct *
pubkey_load_file(const char *pk_file)
{ {
char pk_comment[COMMENTMAXBYTES]; char pk_comment[COMMENTMAXBYTES];
PubkeyStruct *pubkey_struct; PubkeyStruct *pubkey_struct;
FILE *fp; FILE *fp;
char *pubkey_s; char *pubkey_s = NULL;
size_t pubkey_s_size; size_t pubkey_s_size;
size_t pubkey_struct_len;
if ((fp = fopen(pk_file, "r")) == NULL) { if ((fp = fopen(pk_file, "r")) == NULL) {
exit_err(pk_file); exit_err(pk_file);
@ -181,21 +201,22 @@ pubkey_load(const char *pk_file)
} }
trim(pubkey_s); trim(pubkey_s);
xfclose(fp); xfclose(fp);
pubkey_struct = xmalloc(sizeof *pubkey_struct); pubkey_struct = pubkey_load_string(pubkey_s);
if (b64_to_bin((unsigned char *) (void *) pubkey_struct, pubkey_s,
sizeof *pubkey_struct, strlen(pubkey_s),
&pubkey_struct_len) == NULL ||
pubkey_struct_len != sizeof *pubkey_struct) {
exit_msg("base64 conversion failed");
}
free(pubkey_s); free(pubkey_s);
if (memcmp(pubkey_struct->sig_alg, SIGALG,
sizeof pubkey_struct->sig_alg) != 0) {
exit_msg("Unsupported signature algorithm");
}
return pubkey_struct; return pubkey_struct;
} }
static PubkeyStruct *
pubkey_load(const char *pk_file, const char *pubkey_s)
{
if (pubkey_s != NULL) {
return pubkey_load_string(pubkey_s);
} else {
return pubkey_load_file(pk_file);
}
}
static void static void
seckey_chk(unsigned char chk[crypto_generichash_BYTES], seckey_chk(unsigned char chk[crypto_generichash_BYTES],
const SeckeyStruct *seckey_struct) const SeckeyStruct *seckey_struct)
@ -289,28 +310,26 @@ seckey_load(const char *sk_file)
#endif #endif
static int static int
verify(const char *pk_file, const char *message_file, const char *sig_file, verify(PubkeyStruct *pubkey_struct, const char *message_file,
int quiet) const char *sig_file, int quiet)
{ {
char trusted_comment[TRUSTEDCOMMENTMAXBYTES]; char trusted_comment[TRUSTEDCOMMENTMAXBYTES];
unsigned char global_sig[crypto_sign_BYTES]; unsigned char global_sig[crypto_sign_BYTES];
unsigned char *sig_and_trusted_comment; unsigned char *sig_and_trusted_comment;
SigStruct *sig_struct; SigStruct *sig_struct;
PubkeyStruct *pubkey_struct;
unsigned char *message; unsigned char *message;
size_t message_len; size_t message_len;
size_t trusted_comment_len; size_t trusted_comment_len;
pubkey_struct = pubkey_load(pk_file);
message = message_load(&message_len, message_file); message = message_load(&message_len, message_file);
sig_struct = sig_load(sig_file, global_sig, sig_struct = sig_load(sig_file, global_sig,
trusted_comment, sizeof trusted_comment); trusted_comment, sizeof trusted_comment);
if (memcmp(sig_struct->keynum, pubkey_struct->keynum_pk.keynum, if (memcmp(sig_struct->keynum, pubkey_struct->keynum_pk.keynum,
sizeof sig_struct->keynum) != 0) { sizeof sig_struct->keynum) != 0) {
fprintf(stderr, "Signature key id in %s is %" PRIX64 "\n" fprintf(stderr, "Signature key id in %s is %" PRIX64 "\n"
"but the key id in %s is %" PRIX64 "\n", "but the key id in the public key is %" PRIX64 "\n",
sig_file, le64_load(sig_struct->keynum), sig_file, le64_load(sig_struct->keynum),
pk_file, le64_load(pubkey_struct->keynum_pk.keynum)); le64_load(pubkey_struct->keynum_pk.keynum));
exit(1); exit(1);
} }
if (crypto_sign_verify_detached(sig_struct->sig, message, message_len, if (crypto_sign_verify_detached(sig_struct->sig, message, message_len,
@ -517,6 +536,7 @@ main(int argc, char **argv)
const char *sig_file = NULL; const char *sig_file = NULL;
const char *message_file = NULL; const char *message_file = NULL;
const char *comment = NULL; const char *comment = NULL;
const char *pubkey_s = NULL;
const char *trusted_comment = NULL; const char *trusted_comment = NULL;
int opt_flag; int opt_flag;
int quiet = 0; int quiet = 0;
@ -553,6 +573,9 @@ main(int argc, char **argv)
case 'p': case 'p':
pk_file = optarg; pk_file = optarg;
break; break;
case 'P':
pubkey_s = optarg;
break;
case 'q': case 'q':
quiet = 1; quiet = 1;
break; break;
@ -601,7 +624,8 @@ main(int argc, char **argv)
if (sig_file == NULL || *sig_file == 0) { if (sig_file == NULL || *sig_file == 0) {
sig_file = append_sig_suffix(message_file); sig_file = append_sig_suffix(message_file);
} }
return verify(pk_file, message_file, sig_file, quiet) != 0; return verify(pubkey_load(pk_file, pubkey_s), message_file,
sig_file, quiet) != 0;
default: default:
usage(); usage();
} }