mirror of
https://github.com/jedisct1/minisign.git
synced 2025-04-04 11:27:42 +03:00
Add -P to specify the public key on the command-line
This commit is contained in:
parent
eea7fad920
commit
9d96b1c12a
2 changed files with 89 additions and 60 deletions
51
README.md
51
README.md
|
@ -18,12 +18,12 @@ Compilation:
|
||||||
$ cmake ..
|
$ cmake ..
|
||||||
$ make
|
$ make
|
||||||
# make install
|
# make install
|
||||||
|
|
||||||
Creating a key pair
|
Creating a key pair
|
||||||
-------------------
|
-------------------
|
||||||
|
|
||||||
$ minisign -G
|
$ minisign -G
|
||||||
|
|
||||||
The public key is put into the `minisign.pub` file, and the secret key
|
The public key is put into the `minisign.pub` file, and the secret key
|
||||||
into the `minisign.key` file.
|
into the `minisign.key` file.
|
||||||
|
|
||||||
|
@ -31,42 +31,47 @@ Signing a file
|
||||||
--------------
|
--------------
|
||||||
|
|
||||||
$ minisign -S -m myfile.txt
|
$ minisign -S -m myfile.txt
|
||||||
|
|
||||||
Or to include a comment in the signature, that will be verified and
|
Or to include a comment in the signature, that will be verified and
|
||||||
displayed when verifying the file:
|
displayed when verifying the file:
|
||||||
|
|
||||||
$ minisign -S -m myfile.txt -t 'This comment will be signed as well'
|
$ minisign -S -m myfile.txt -t 'This comment will be signed as well'
|
||||||
|
|
||||||
The signature is put into `myfile.txt.minisig`.
|
The signature is put into `myfile.txt.minisig`.
|
||||||
|
|
||||||
Verifying a file
|
Verifying a file
|
||||||
----------------
|
----------------
|
||||||
|
|
||||||
$ minisign -V -m myfile.txt
|
$ minisign -V -P RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3 -m myfile.txt
|
||||||
|
or
|
||||||
|
$ minisign -V -p signature.pub -m myfile.txt
|
||||||
|
|
||||||
This requires the signature `myfile.txt.minisig` to be present in the same
|
This requires the signature `myfile.txt.minisig` to be present in the same
|
||||||
directory.
|
directory.
|
||||||
|
The public key can either reside in a file (`./minisign.pub` by
|
||||||
|
default) or can be directly specified on the command line.
|
||||||
|
|
||||||
Usage
|
Usage
|
||||||
-----
|
-----
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
$ minisign -G -p pubkey -s seckey
|
$ minisign -G [-p pubkey] [-s seckey]
|
||||||
$ minisign -S -s seckey -m file [-x sigfile] [-c untrusted_comment] [-t trusted_comment]
|
$ minisign -S [-x sigfile] [-s seckey] [-c untrusted_comment] [-t trusted_comment] -m file
|
||||||
$ minisign -V -p pubkey -m file [-x sigfile] [-q]
|
$ minisign -V [-x sigfile] [-p pubkeyfile | -P pubkey] [-q] -m file
|
||||||
|
|
||||||
-G generate a new key pair
|
-G generate a new key pair
|
||||||
-S sign a file
|
-S sign a file
|
||||||
-V verify that a signature is valid for a given file
|
-V verify that a signature is valid for a given file
|
||||||
-m <file> file to sign/verify
|
-m <file> file to sign/verify
|
||||||
-p <pubkey> public key file (default: ./minisign.pub)
|
-p <pubkeyfile> public key file (default: ./minisign.pub)
|
||||||
-s <seckey> secret key file (default: ./minisign.key)
|
-P <pubkey> public key, as a base64 string
|
||||||
-x <sigfile> signature file (default: <file>.minisig)
|
-s <seckey> secret key file (default: ./minisign.key)
|
||||||
-c <comment> add a one-line untrusted comment
|
-x <sigfile> signature file (default: <file>.minisig)
|
||||||
-t <comment> add a one-line trusted comment
|
-c <comment> add a one-line untrusted comment
|
||||||
-q quiet mode, suppress output
|
-t <comment> add a one-line trusted comment
|
||||||
-v display version number
|
-q quiet mode, suppress output
|
||||||
|
-v display version number
|
||||||
|
|
||||||
Trusted comments
|
Trusted comments
|
||||||
----------------
|
----------------
|
||||||
|
@ -102,7 +107,7 @@ Signature format
|
||||||
base64(<signature_algorithm> || <key_id> || <signature>)
|
base64(<signature_algorithm> || <key_id> || <signature>)
|
||||||
trusted_comment: <arbitrary text>
|
trusted_comment: <arbitrary text>
|
||||||
base64(<global_signature>)
|
base64(<global_signature>)
|
||||||
|
|
||||||
* `signature_algorithm`: `Ed`
|
* `signature_algorithm`: `Ed`
|
||||||
* `key_id`: 8 random bytes, matching the public key
|
* `key_id`: 8 random bytes, matching the public key
|
||||||
* `signature`: `ed25519(<file data>)`
|
* `signature`: `ed25519(<file data>)`
|
||||||
|
@ -113,7 +118,7 @@ Public key format
|
||||||
|
|
||||||
untrusted comment: <arbitrary text>
|
untrusted comment: <arbitrary text>
|
||||||
base64(<signature_algorithm> || <key_id> || <public_key>)
|
base64(<signature_algorithm> || <key_id> || <public_key>)
|
||||||
|
|
||||||
* `signature_algorithm`: `Ed`
|
* `signature_algorithm`: `Ed`
|
||||||
* `key_id`: 8 random bytes
|
* `key_id`: 8 random bytes
|
||||||
* `public_key`: Ed25519 public key
|
* `public_key`: Ed25519 public key
|
||||||
|
|
|
@ -19,9 +19,9 @@
|
||||||
#include "minisign.h"
|
#include "minisign.h"
|
||||||
|
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
static const char *getopt_options = "GSVhc:m:p:qs:t:vx:";
|
static const char *getopt_options = "GSVhc:m:P:p:qs:t:vx:";
|
||||||
#else
|
#else
|
||||||
static const char *getopt_options = "Vhm:p:qvx:";
|
static const char *getopt_options = "Vhm:P:p:qvx:";
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
static void usage(void) __attribute__((noreturn));
|
static void usage(void) __attribute__((noreturn));
|
||||||
|
@ -30,29 +30,30 @@ static void
|
||||||
usage(void)
|
usage(void)
|
||||||
{
|
{
|
||||||
puts("Usage:\n"
|
puts("Usage:\n"
|
||||||
"minisign -G -p pubkey -s seckey [-c untrusted_comment]\n"
|
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
"minisign -S -s seckey -m file [-x sigfile] [-c untrusted_comment] [-t trusted_comment]\n"
|
"minisign -G [-p pubkey] [-s seckey]\n"
|
||||||
"minisign -V -p pubkey -m file [-x sigfile] [-q]\n"
|
"minisign -S [-x sigfile] [-s seckey] [-c untrusted_comment] [-t trusted_comment] -m file\n"
|
||||||
#endif
|
#endif
|
||||||
|
"minisign -V [-x sigfile] [-p pubkeyfile | -P pubkey] [-q] -m file\n"
|
||||||
"\n"
|
"\n"
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
"-G generate a new key pair\n"
|
"-G generate a new key pair\n"
|
||||||
"-S sign a file\n"
|
"-S sign a file\n"
|
||||||
#endif
|
#endif
|
||||||
"-V verify that a signature is valid for a given file\n"
|
"-V verify that a signature is valid for a given file\n"
|
||||||
"-m <file> file to sign/verify\n"
|
"-m <file> file to sign/verify\n"
|
||||||
"-p <pubkey> public key file (default: ./minisign.pub)\n"
|
"-p <pubkeyfile> public key file (default: ./minisign.pub)\n"
|
||||||
|
"-P <pubkey> public key, as a base64 string\n"
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
"-s <seckey> secret key file (default: ./minisign.key)\n"
|
"-s <seckey> secret key file (default: ./minisign.key)\n"
|
||||||
#endif
|
#endif
|
||||||
"-x <sigfile> signature file (default: <file>.minisig)\n"
|
"-x <sigfile> signature file (default: <file>.minisig)\n"
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
"-c <comment> add a one-line untrusted comment\n"
|
"-c <comment> add a one-line untrusted comment\n"
|
||||||
"-t <comment> add a one-line trusted comment\n"
|
"-t <comment> add a one-line trusted comment\n"
|
||||||
#endif
|
#endif
|
||||||
"-q quiet mode, suppress output\n"
|
"-q quiet mode, suppress output\n"
|
||||||
"-v display version number\n"
|
"-v display version number\n"
|
||||||
);
|
);
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
|
@ -159,14 +160,33 @@ sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES],
|
||||||
}
|
}
|
||||||
|
|
||||||
static PubkeyStruct *
|
static PubkeyStruct *
|
||||||
pubkey_load(const char *pk_file)
|
pubkey_load_string(const char *pubkey_s)
|
||||||
|
{
|
||||||
|
PubkeyStruct *pubkey_struct;
|
||||||
|
size_t pubkey_struct_len;
|
||||||
|
|
||||||
|
pubkey_struct = xmalloc(sizeof *pubkey_struct);
|
||||||
|
if (b64_to_bin((unsigned char *) (void *) pubkey_struct, pubkey_s,
|
||||||
|
sizeof *pubkey_struct, strlen(pubkey_s),
|
||||||
|
&pubkey_struct_len) == NULL ||
|
||||||
|
pubkey_struct_len != sizeof *pubkey_struct) {
|
||||||
|
exit_msg("base64 conversion failed");
|
||||||
|
}
|
||||||
|
if (memcmp(pubkey_struct->sig_alg, SIGALG,
|
||||||
|
sizeof pubkey_struct->sig_alg) != 0) {
|
||||||
|
exit_msg("Unsupported signature algorithm");
|
||||||
|
}
|
||||||
|
return pubkey_struct;
|
||||||
|
}
|
||||||
|
|
||||||
|
static PubkeyStruct *
|
||||||
|
pubkey_load_file(const char *pk_file)
|
||||||
{
|
{
|
||||||
char pk_comment[COMMENTMAXBYTES];
|
char pk_comment[COMMENTMAXBYTES];
|
||||||
PubkeyStruct *pubkey_struct;
|
PubkeyStruct *pubkey_struct;
|
||||||
FILE *fp;
|
FILE *fp;
|
||||||
char *pubkey_s;
|
char *pubkey_s = NULL;
|
||||||
size_t pubkey_s_size;
|
size_t pubkey_s_size;
|
||||||
size_t pubkey_struct_len;
|
|
||||||
|
|
||||||
if ((fp = fopen(pk_file, "r")) == NULL) {
|
if ((fp = fopen(pk_file, "r")) == NULL) {
|
||||||
exit_err(pk_file);
|
exit_err(pk_file);
|
||||||
|
@ -181,21 +201,22 @@ pubkey_load(const char *pk_file)
|
||||||
}
|
}
|
||||||
trim(pubkey_s);
|
trim(pubkey_s);
|
||||||
xfclose(fp);
|
xfclose(fp);
|
||||||
pubkey_struct = xmalloc(sizeof *pubkey_struct);
|
pubkey_struct = pubkey_load_string(pubkey_s);
|
||||||
if (b64_to_bin((unsigned char *) (void *) pubkey_struct, pubkey_s,
|
|
||||||
sizeof *pubkey_struct, strlen(pubkey_s),
|
|
||||||
&pubkey_struct_len) == NULL ||
|
|
||||||
pubkey_struct_len != sizeof *pubkey_struct) {
|
|
||||||
exit_msg("base64 conversion failed");
|
|
||||||
}
|
|
||||||
free(pubkey_s);
|
free(pubkey_s);
|
||||||
if (memcmp(pubkey_struct->sig_alg, SIGALG,
|
|
||||||
sizeof pubkey_struct->sig_alg) != 0) {
|
|
||||||
exit_msg("Unsupported signature algorithm");
|
|
||||||
}
|
|
||||||
return pubkey_struct;
|
return pubkey_struct;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static PubkeyStruct *
|
||||||
|
pubkey_load(const char *pk_file, const char *pubkey_s)
|
||||||
|
{
|
||||||
|
if (pubkey_s != NULL) {
|
||||||
|
return pubkey_load_string(pubkey_s);
|
||||||
|
} else {
|
||||||
|
return pubkey_load_file(pk_file);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
seckey_chk(unsigned char chk[crypto_generichash_BYTES],
|
seckey_chk(unsigned char chk[crypto_generichash_BYTES],
|
||||||
const SeckeyStruct *seckey_struct)
|
const SeckeyStruct *seckey_struct)
|
||||||
|
@ -289,28 +310,26 @@ seckey_load(const char *sk_file)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
static int
|
static int
|
||||||
verify(const char *pk_file, const char *message_file, const char *sig_file,
|
verify(PubkeyStruct *pubkey_struct, const char *message_file,
|
||||||
int quiet)
|
const char *sig_file, int quiet)
|
||||||
{
|
{
|
||||||
char trusted_comment[TRUSTEDCOMMENTMAXBYTES];
|
char trusted_comment[TRUSTEDCOMMENTMAXBYTES];
|
||||||
unsigned char global_sig[crypto_sign_BYTES];
|
unsigned char global_sig[crypto_sign_BYTES];
|
||||||
unsigned char *sig_and_trusted_comment;
|
unsigned char *sig_and_trusted_comment;
|
||||||
SigStruct *sig_struct;
|
SigStruct *sig_struct;
|
||||||
PubkeyStruct *pubkey_struct;
|
|
||||||
unsigned char *message;
|
unsigned char *message;
|
||||||
size_t message_len;
|
size_t message_len;
|
||||||
size_t trusted_comment_len;
|
size_t trusted_comment_len;
|
||||||
|
|
||||||
pubkey_struct = pubkey_load(pk_file);
|
|
||||||
message = message_load(&message_len, message_file);
|
message = message_load(&message_len, message_file);
|
||||||
sig_struct = sig_load(sig_file, global_sig,
|
sig_struct = sig_load(sig_file, global_sig,
|
||||||
trusted_comment, sizeof trusted_comment);
|
trusted_comment, sizeof trusted_comment);
|
||||||
if (memcmp(sig_struct->keynum, pubkey_struct->keynum_pk.keynum,
|
if (memcmp(sig_struct->keynum, pubkey_struct->keynum_pk.keynum,
|
||||||
sizeof sig_struct->keynum) != 0) {
|
sizeof sig_struct->keynum) != 0) {
|
||||||
fprintf(stderr, "Signature key id in %s is %" PRIX64 "\n"
|
fprintf(stderr, "Signature key id in %s is %" PRIX64 "\n"
|
||||||
"but the key id in %s is %" PRIX64 "\n",
|
"but the key id in the public key is %" PRIX64 "\n",
|
||||||
sig_file, le64_load(sig_struct->keynum),
|
sig_file, le64_load(sig_struct->keynum),
|
||||||
pk_file, le64_load(pubkey_struct->keynum_pk.keynum));
|
le64_load(pubkey_struct->keynum_pk.keynum));
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
if (crypto_sign_verify_detached(sig_struct->sig, message, message_len,
|
if (crypto_sign_verify_detached(sig_struct->sig, message, message_len,
|
||||||
|
@ -517,6 +536,7 @@ main(int argc, char **argv)
|
||||||
const char *sig_file = NULL;
|
const char *sig_file = NULL;
|
||||||
const char *message_file = NULL;
|
const char *message_file = NULL;
|
||||||
const char *comment = NULL;
|
const char *comment = NULL;
|
||||||
|
const char *pubkey_s = NULL;
|
||||||
const char *trusted_comment = NULL;
|
const char *trusted_comment = NULL;
|
||||||
int opt_flag;
|
int opt_flag;
|
||||||
int quiet = 0;
|
int quiet = 0;
|
||||||
|
@ -553,6 +573,9 @@ main(int argc, char **argv)
|
||||||
case 'p':
|
case 'p':
|
||||||
pk_file = optarg;
|
pk_file = optarg;
|
||||||
break;
|
break;
|
||||||
|
case 'P':
|
||||||
|
pubkey_s = optarg;
|
||||||
|
break;
|
||||||
case 'q':
|
case 'q':
|
||||||
quiet = 1;
|
quiet = 1;
|
||||||
break;
|
break;
|
||||||
|
@ -601,7 +624,8 @@ main(int argc, char **argv)
|
||||||
if (sig_file == NULL || *sig_file == 0) {
|
if (sig_file == NULL || *sig_file == 0) {
|
||||||
sig_file = append_sig_suffix(message_file);
|
sig_file = append_sig_suffix(message_file);
|
||||||
}
|
}
|
||||||
return verify(pk_file, message_file, sig_file, quiet) != 0;
|
return verify(pubkey_load(pk_file, pubkey_s), message_file,
|
||||||
|
sig_file, quiet) != 0;
|
||||||
default:
|
default:
|
||||||
usage();
|
usage();
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue