refactor: Move business logic away from cli logic

* This allows static linkage of minisign into C applications
  without dragging along the main() + cli
* More cleanup is needed, but this splits the business logic
  into seperate files vs a bunch of static functions.
This commit is contained in:
Alexander von Gluck IV 2023-05-01 15:08:03 -05:00
parent 709fed6b73
commit d238b7db77
4 changed files with 306 additions and 253 deletions

View file

@ -46,7 +46,8 @@ add_executable(minisign
src/base64.c
src/get_line.c
src/helpers.c
src/minisign.c)
src/minisign.c
src/cli.c)
find_package(PkgConfig REQUIRED)
pkg_check_modules(LIBSODIUM libsodium)

234
src/cli.c Normal file
View file

@ -0,0 +1,234 @@
#include <assert.h>
#include <stdint.h>
#include <unistd.h>
#include "get_line.h"
#include "helpers.h"
#include "minisign.h"
#ifndef VERIFY_ONLY
static const char *getopt_options = "CGSVRHhc:flm:oP:p:qQs:t:vWx:";
#else
static const char *getopt_options = "VhHm:oP:p:qQvx:";
#endif
static void usage(void) __attribute__((noreturn));
static void
usage(void)
{
puts(
"Usage:\n"
#ifndef VERIFY_ONLY
"minisign -G [-f] [-p pubkey_file] [-s seckey_file] [-W]\n"
"minisign -R [-s seckey_file] [-p pubkey_file]\n"
"minisign -C [-s seckey_file] [-W]\n"
"minisign -S [-l] [-x sig_file] [-s seckey_file] [-c untrusted_comment]\n"
" [-t trusted_comment] -m file [file ...]\n"
#endif
"minisign -V [-H] [-x sig_file] [-p pubkey_file | -P pubkey] [-o] [-q] -m file\n"
"\n"
#ifndef VERIFY_ONLY
"-G generate a new key pair\n"
"-R recreate a public key file from a secret key file\n"
"-C change/remove the password of the secret key\n"
"-S sign files\n"
#endif
"-V verify that a signature is valid for a given file\n"
"-H require input to be prehashed\n"
"-l sign using the legacy format\n"
"-m <file> file to sign/verify\n"
"-o combined with -V, output the file content after verification\n"
"-p <pubkey_file> public key file (default: ./minisign.pub)\n"
"-P <pubkey> public key, as a base64 string\n"
#ifndef VERIFY_ONLY
"-s <seckey_file> secret key file (default: ~/.minisign/minisign.key)\n"
"-W do not encrypt/decrypt the secret key with a password\n"
#endif
"-x <sigfile> signature file (default: <file>.minisig)\n"
#ifndef VERIFY_ONLY
"-c <comment> add a one-line untrusted comment\n"
"-t <comment> add a one-line trusted comment\n"
#endif
"-q quiet mode, suppress output\n"
"-Q pretty quiet mode, only print the trusted comment\n"
"-f force. Combined with -G, overwrite a previous key pair\n"
"-v display version number\n");
exit(2);
}
int
main(int argc, char **argv)
{
const char *pk_file = NULL;
#ifndef VERIFY_ONLY
char *sk_file = sig_default_skfile();
#endif
const char *sig_file = NULL;
const char *message_file = NULL;
const char *comment = NULL;
const char *pubkey_s = NULL;
const char *trusted_comment = NULL;
unsigned char opt_seen[16] = { 0 };
int opt_flag;
int quiet = 0;
int output = 0;
int force = 0;
int allow_legacy = 1;
int sign_legacy = 0;
int unencrypted_key = 0;
Action action = ACTION_NONE;
while ((opt_flag = getopt(argc, argv, getopt_options)) != -1) {
switch (opt_flag) {
#ifndef VERIFY_ONLY
case 'G':
if (action != ACTION_NONE && action != ACTION_GENERATE) {
usage();
}
action = ACTION_GENERATE;
break;
case 'S':
if (action != ACTION_NONE && action != ACTION_SIGN) {
usage();
}
action = ACTION_SIGN;
break;
case 'C':
if (action != ACTION_NONE && action != ACTION_UPDATE_PASSWORD) {
usage();
}
action = ACTION_UPDATE_PASSWORD;
break;
case 'R':
if (action != ACTION_NONE && action != ACTION_RECREATE_PK) {
usage();
}
action = ACTION_RECREATE_PK;
break;
#endif
case 'V':
if (action != ACTION_NONE && action != ACTION_VERIFY) {
usage();
}
action = ACTION_VERIFY;
break;
#ifndef VERIFY_ONLY
case 'c':
comment = optarg;
break;
case 'f':
force = 1;
break;
#endif
case 'h':
usage();
case 'H':
allow_legacy = 0;
break;
case 'l':
sign_legacy = 1;
break;
case 'm':
message_file = optarg;
break;
case 'o':
output = 1;
break;
case 'p':
pk_file = optarg;
break;
case 'P':
pubkey_s = optarg;
break;
case 'q':
quiet = 1;
break;
case 'Q':
quiet = 2;
break;
#ifndef VERIFY_ONLY
case 's':
free(sk_file);
sk_file = xstrdup(optarg);
break;
case 't':
trusted_comment = optarg;
break;
case 'W':
unencrypted_key = 1;
break;
#endif
case 'x':
sig_file = optarg;
break;
case 'v':
puts(VERSION_STRING);
return 0;
case '?':
usage();
}
if (opt_flag > 0 && opt_flag <= (int) sizeof opt_seen / 8) {
if ((opt_seen[opt_flag / 8] & (1U << (opt_flag & 7))) != 0) {
fprintf(stderr, "Duplicate option: -- %c\n\n", opt_flag);
usage();
}
opt_seen[opt_flag / 8] |= 1U << (opt_flag & 7);
}
}
if (sodium_init() != 0) {
fprintf(stderr, "Unable to initialize the Sodium library\n");
return 2;
}
switch (action) {
#ifndef VERIFY_ONLY
case ACTION_GENERATE:
if (comment == NULL || *comment == 0) {
comment = SECRETKEY_DEFAULT_COMMENT;
}
if (pk_file == NULL) {
pk_file = SIG_DEFAULT_PKFILE;
}
return generate(pk_file, sk_file, comment, force, unencrypted_key) != 0;
case ACTION_SIGN:
if (message_file == NULL) {
usage();
}
if (sig_file == NULL || *sig_file == 0) {
sig_file = append_sig_suffix(message_file);
}
if (comment == NULL || *comment == 0) {
comment = DEFAULT_COMMENT;
}
return sign_all(
seckey_load(sk_file, NULL),
((pk_file != NULL || pubkey_s != NULL) ? pubkey_load(pk_file, pubkey_s) : NULL),
message_file, (const char **) &argv[optind], argc - optind, sig_file, comment,
trusted_comment, sign_legacy) != 0;
case ACTION_RECREATE_PK:
if (pk_file == NULL) {
pk_file = SIG_DEFAULT_PKFILE;
}
return recreate_pk(pk_file, sk_file, force) != 0;
case ACTION_UPDATE_PASSWORD:
return update_password(sk_file, unencrypted_key) != 0;
#endif
case ACTION_VERIFY:
if (message_file == NULL) {
usage();
}
if (sig_file == NULL || *sig_file == 0) {
sig_file = append_sig_suffix(message_file);
}
if (pk_file == NULL && pubkey_s == NULL) {
pk_file = SIG_DEFAULT_PKFILE;
}
return verify(pubkey_load(pk_file, pubkey_s), message_file, sig_file, quiet, output,
allow_legacy);
default:
usage();
}
return 0;
}

View file

@ -10,65 +10,14 @@
#include <time.h>
#include <unistd.h>
#include <sodium.h>
#include "base64.h"
#include "get_line.h"
#include "helpers.h"
#include "minisign.h"
#ifndef VERIFY_ONLY
static const char *getopt_options = "CGSVRHhc:flm:oP:p:qQs:t:vWx:";
#else
static const char *getopt_options = "VhHm:oP:p:qQvx:";
#endif
static void usage(void) __attribute__((noreturn));
static void
usage(void)
{
puts(
"Usage:\n"
#ifndef VERIFY_ONLY
"minisign -G [-f] [-p pubkey_file] [-s seckey_file] [-W]\n"
"minisign -R [-s seckey_file] [-p pubkey_file]\n"
"minisign -C [-s seckey_file] [-W]\n"
"minisign -S [-l] [-x sig_file] [-s seckey_file] [-c untrusted_comment]\n"
" [-t trusted_comment] -m file [file ...]\n"
#endif
"minisign -V [-H] [-x sig_file] [-p pubkey_file | -P pubkey] [-o] [-q] -m file\n"
"\n"
#ifndef VERIFY_ONLY
"-G generate a new key pair\n"
"-R recreate a public key file from a secret key file\n"
"-C change/remove the password of the secret key\n"
"-S sign files\n"
#endif
"-V verify that a signature is valid for a given file\n"
"-H require input to be prehashed\n"
"-l sign using the legacy format\n"
"-m <file> file to sign/verify\n"
"-o combined with -V, output the file content after verification\n"
"-p <pubkey_file> public key file (default: ./minisign.pub)\n"
"-P <pubkey> public key, as a base64 string\n"
#ifndef VERIFY_ONLY
"-s <seckey_file> secret key file (default: ~/.minisign/minisign.key)\n"
"-W do not encrypt/decrypt the secret key with a password\n"
#endif
"-x <sigfile> signature file (default: <file>.minisig)\n"
#ifndef VERIFY_ONLY
"-c <comment> add a one-line untrusted comment\n"
"-t <comment> add a one-line trusted comment\n"
#endif
"-q quiet mode, suppress output\n"
"-Q pretty quiet mode, only print the trusted comment\n"
"-f force. Combined with -G, overwrite a previous key pair\n"
"-v display version number\n");
exit(2);
}
static unsigned char *
unsigned char *
message_load_hashed(size_t *message_len, const char *message_file)
{
crypto_generichash_state hs;
@ -95,7 +44,7 @@ message_load_hashed(size_t *message_len, const char *message_file)
return message;
}
static unsigned char *
unsigned char *
message_load(size_t *message_len, const char *message_file, int hashed)
{
FILE *fp;
@ -123,7 +72,7 @@ message_load(size_t *message_len, const char *message_file, int hashed)
return message;
}
static int
int
output_file(const char *message_file)
{
unsigned char buf[65536U];
@ -146,7 +95,7 @@ output_file(const char *message_file)
return 0;
}
static SigStruct *
SigStruct *
sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES], int *hashed,
char trusted_comment[TRUSTEDCOMMENTMAXBYTES], size_t trusted_comment_maxlen)
{
@ -229,7 +178,7 @@ sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES], int
return sig_struct;
}
static PubkeyStruct *
PubkeyStruct *
pubkey_load_string(const char *pubkey_s)
{
PubkeyStruct *pubkey_struct;
@ -247,7 +196,7 @@ pubkey_load_string(const char *pubkey_s)
return pubkey_struct;
}
static PubkeyStruct *
PubkeyStruct *
pubkey_load_file(const char *pk_file)
{
char pk_comment[COMMENTMAXBYTES];
@ -275,7 +224,7 @@ pubkey_load_file(const char *pk_file)
return pubkey_struct;
}
static PubkeyStruct *
PubkeyStruct *
pubkey_load(const char *pk_file, const char *pubkey_s)
{
if (pk_file != NULL && pubkey_s != NULL) {
@ -289,7 +238,7 @@ pubkey_load(const char *pk_file, const char *pubkey_s)
exit_msg("A public key is required");
}
static void
void
seckey_compute_chk(unsigned char chk[crypto_generichash_BYTES], const SeckeyStruct *seckey_struct)
{
crypto_generichash_state hs;
@ -303,7 +252,7 @@ seckey_compute_chk(unsigned char chk[crypto_generichash_BYTES], const SeckeyStru
}
#ifndef VERIFY_ONLY
static void
void
decrypt_key(SeckeyStruct *const seckey_struct, unsigned char chk[crypto_generichash_BYTES])
{
char *pwd = xsodium_malloc(PASSWORDMAXBYTES);
@ -333,7 +282,7 @@ decrypt_key(SeckeyStruct *const seckey_struct, unsigned char chk[crypto_generich
sodium_memzero(chk, crypto_generichash_BYTES);
}
static void
void
encrypt_key(SeckeyStruct *const seckey_struct)
{
char *pwd = xsodium_malloc(PASSWORDMAXBYTES);
@ -383,7 +332,7 @@ encrypt_key(SeckeyStruct *const seckey_struct)
puts("done\n");
}
static SeckeyStruct *
SeckeyStruct *
seckey_load(const char *sk_file, char *const sk_comment_line)
{
char sk_comment_line_buf[COMMENTMAXBYTES];
@ -433,7 +382,7 @@ seckey_load(const char *sk_file, char *const sk_comment_line)
}
#endif
static int
int
verify(PubkeyStruct *pubkey_struct, const char *message_file, const char *sig_file, int quiet,
int output, int allow_legacy)
{
@ -506,7 +455,7 @@ verify(PubkeyStruct *pubkey_struct, const char *message_file, const char *sig_fi
return 0;
}
static char *
char *
append_sig_suffix(const char *message_file)
{
char *sig_file;
@ -520,7 +469,7 @@ append_sig_suffix(const char *message_file)
}
#ifndef VERIFY_ONLY
static char *
char *
default_trusted_comment(const char *message_file, int hashed)
{
char *ret;
@ -534,7 +483,7 @@ default_trusted_comment(const char *message_file, int hashed)
return ret;
}
static void
void
sign(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
const char *sig_file, const char *comment, const char *trusted_comment, int legacy)
{
@ -603,7 +552,7 @@ sign(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *messa
free(tmp_trusted_comment);
}
static int
int
sign_all(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
const char *additional_files[], int additional_count, const char *sig_file,
const char *comment, const char *trusted_comment, int legacy)
@ -624,7 +573,7 @@ sign_all(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *m
return 0;
}
static void
void
abort_on_existing_key_file(const char *file)
{
FILE *fp;
@ -645,7 +594,7 @@ abort_on_existing_key_file(const char *file)
}
}
static void
void
abort_on_existing_key_files(const char *pk_file, const char *sk_file, int force)
{
if (force == 0) {
@ -654,7 +603,7 @@ abort_on_existing_key_files(const char *pk_file, const char *sk_file, int force)
}
}
static void
void
write_pk_file(const char *pk_file, const PubkeyStruct *pubkey_struct)
{
FILE *fp;
@ -668,7 +617,7 @@ write_pk_file(const char *pk_file, const PubkeyStruct *pubkey_struct)
xfclose(fp);
}
static int
int
generate(const char *pk_file, const char *sk_file, const char *comment, int force,
int unencrypted_key)
{
@ -715,7 +664,7 @@ generate(const char *pk_file, const char *sk_file, const char *comment, int forc
return 0;
}
static int
int
recreate_pk(const char *pk_file, const char *sk_file, int force)
{
SeckeyStruct *seckey_struct;
@ -742,7 +691,7 @@ recreate_pk(const char *pk_file, const char *sk_file, int force)
return 0;
}
static int
int
update_password(const char *sk_file, int unencrypted_key)
{
SeckeyStruct *seckey_struct;
@ -782,7 +731,7 @@ update_password(const char *sk_file, int unencrypted_key)
#endif
#ifndef VERIFY_ONLY
static char *
char *
sig_config_dir(void)
{
const char *config_dir_env;
@ -802,7 +751,7 @@ sig_config_dir(void)
return config_dir;
}
static char *
char *
sig_default_skfile(void)
{
char *config_dir;
@ -821,177 +770,3 @@ sig_default_skfile(void)
return skfile;
}
#endif
int
main(int argc, char **argv)
{
const char *pk_file = NULL;
#ifndef VERIFY_ONLY
char *sk_file = sig_default_skfile();
#endif
const char *sig_file = NULL;
const char *message_file = NULL;
const char *comment = NULL;
const char *pubkey_s = NULL;
const char *trusted_comment = NULL;
unsigned char opt_seen[16] = { 0 };
int opt_flag;
int quiet = 0;
int output = 0;
int force = 0;
int allow_legacy = 1;
int sign_legacy = 0;
int unencrypted_key = 0;
Action action = ACTION_NONE;
while ((opt_flag = getopt(argc, argv, getopt_options)) != -1) {
switch (opt_flag) {
#ifndef VERIFY_ONLY
case 'G':
if (action != ACTION_NONE && action != ACTION_GENERATE) {
usage();
}
action = ACTION_GENERATE;
break;
case 'S':
if (action != ACTION_NONE && action != ACTION_SIGN) {
usage();
}
action = ACTION_SIGN;
break;
case 'C':
if (action != ACTION_NONE && action != ACTION_UPDATE_PASSWORD) {
usage();
}
action = ACTION_UPDATE_PASSWORD;
break;
case 'R':
if (action != ACTION_NONE && action != ACTION_RECREATE_PK) {
usage();
}
action = ACTION_RECREATE_PK;
break;
#endif
case 'V':
if (action != ACTION_NONE && action != ACTION_VERIFY) {
usage();
}
action = ACTION_VERIFY;
break;
#ifndef VERIFY_ONLY
case 'c':
comment = optarg;
break;
case 'f':
force = 1;
break;
#endif
case 'h':
usage();
case 'H':
allow_legacy = 0;
break;
case 'l':
sign_legacy = 1;
break;
case 'm':
message_file = optarg;
break;
case 'o':
output = 1;
break;
case 'p':
pk_file = optarg;
break;
case 'P':
pubkey_s = optarg;
break;
case 'q':
quiet = 1;
break;
case 'Q':
quiet = 2;
break;
#ifndef VERIFY_ONLY
case 's':
free(sk_file);
sk_file = xstrdup(optarg);
break;
case 't':
trusted_comment = optarg;
break;
case 'W':
unencrypted_key = 1;
break;
#endif
case 'x':
sig_file = optarg;
break;
case 'v':
puts(VERSION_STRING);
return 0;
case '?':
usage();
}
if (opt_flag > 0 && opt_flag <= (int) sizeof opt_seen / 8) {
if ((opt_seen[opt_flag / 8] & (1U << (opt_flag & 7))) != 0) {
fprintf(stderr, "Duplicate option: -- %c\n\n", opt_flag);
usage();
}
opt_seen[opt_flag / 8] |= 1U << (opt_flag & 7);
}
}
if (sodium_init() != 0) {
fprintf(stderr, "Unable to initialize the Sodium library\n");
return 2;
}
switch (action) {
#ifndef VERIFY_ONLY
case ACTION_GENERATE:
if (comment == NULL || *comment == 0) {
comment = SECRETKEY_DEFAULT_COMMENT;
}
if (pk_file == NULL) {
pk_file = SIG_DEFAULT_PKFILE;
}
return generate(pk_file, sk_file, comment, force, unencrypted_key) != 0;
case ACTION_SIGN:
if (message_file == NULL) {
usage();
}
if (sig_file == NULL || *sig_file == 0) {
sig_file = append_sig_suffix(message_file);
}
if (comment == NULL || *comment == 0) {
comment = DEFAULT_COMMENT;
}
return sign_all(
seckey_load(sk_file, NULL),
((pk_file != NULL || pubkey_s != NULL) ? pubkey_load(pk_file, pubkey_s) : NULL),
message_file, (const char **) &argv[optind], argc - optind, sig_file, comment,
trusted_comment, sign_legacy) != 0;
case ACTION_RECREATE_PK:
if (pk_file == NULL) {
pk_file = SIG_DEFAULT_PKFILE;
}
return recreate_pk(pk_file, sk_file, force) != 0;
case ACTION_UPDATE_PASSWORD:
return update_password(sk_file, unencrypted_key) != 0;
#endif
case ACTION_VERIFY:
if (message_file == NULL) {
usage();
}
if (sig_file == NULL || *sig_file == 0) {
sig_file = append_sig_suffix(message_file);
}
if (pk_file == NULL && pubkey_s == NULL) {
pk_file = SIG_DEFAULT_PKFILE;
}
return verify(pubkey_load(pk_file, pubkey_s), message_file, sig_file, quiet, output,
allow_legacy);
default:
usage();
}
return 0;
}

View file

@ -1,7 +1,8 @@
#ifndef MINISIGN_H
#define MINISIGN_H 1
#include <sodium.h>
#define COMMENTMAXBYTES 1024
#define KEYNUMBYTES 8
#define PASSWORDMAXBYTES 1024
@ -22,6 +23,7 @@
#define SIG_SUFFIX ".minisig"
#define VERSION_STRING "minisign 0.11"
typedef struct KeynumSK_ {
unsigned char keynum[KEYNUMBYTES];
unsigned char sk[crypto_sign_SECRETKEYBYTES];
@ -63,4 +65,45 @@ typedef enum Action_ {
ACTION_UPDATE_PASSWORD
} Action;
#endif
unsigned char * message_load_hashed(size_t *message_len, const char *message_file);
unsigned char * message_load(size_t *message_len, const char *message_file, int hashed);
int output_file(const char *message_file);
SigStruct * sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES],
int *hashed, char trusted_comment[TRUSTEDCOMMENTMAXBYTES], size_t trusted_comment_maxlen);
PubkeyStruct * pubkey_load_string(const char *pubkey_s);
PubkeyStruct * pubkey_load_file(const char *pk_file);
PubkeyStruct * pubkey_load(const char *pk_file, const char *pubkey_s);
void seckey_compute_chk(unsigned char chk[crypto_generichash_BYTES], const SeckeyStruct *seckey_struct);
int verify(PubkeyStruct *pubkey_struct, const char *message_file, const char *sig_file, int quiet,
int output, int allow_legacy);
char * append_sig_suffix(const char *message_file);
char * default_trusted_comment(const char *message_file, int hashed);
#ifndef VERIFY_ONLY
void sign(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
const char *sig_file, const char *comment, const char *trusted_comment, int legacy);
int sign_all(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
const char *additional_files[], int additional_count, const char *sig_file,
const char *comment, const char *trusted_comment, int legacy);
void abort_on_existing_key_file(const char *file);
void abort_on_existing_key_files(const char *pk_file, const char *sk_file, int force);
void write_pk_file(const char *pk_file, const PubkeyStruct *pubkey_struct);
int generate(const char *pk_file, const char *sk_file, const char *comment, int force,
int unencrypted_key);
int recreate_pk(const char *pk_file, const char *sk_file, int force);
int update_password(const char *sk_file, int unencrypted_key);
void decrypt_key(SeckeyStruct *const seckey_struct, unsigned char chk[crypto_generichash_BYTES]);
void encrypt_key(SeckeyStruct *const seckey_struct);
SeckeyStruct * seckey_load(const char *sk_file, char *const sk_comment_line);
char * sig_config_dir(void);
char * sig_default_skfile(void);
#endif /* !VERIFY_ONLY */
#endif /* MINISIGN_H */