mirror of
https://github.com/jedisct1/minisign.git
synced 2025-04-05 03:47:45 +03:00
refactor: Move business logic away from cli logic
* This allows static linkage of minisign into C applications without dragging along the main() + cli * More cleanup is needed, but this splits the business logic into seperate files vs a bunch of static functions.
This commit is contained in:
parent
709fed6b73
commit
d238b7db77
4 changed files with 306 additions and 253 deletions
|
@ -46,7 +46,8 @@ add_executable(minisign
|
||||||
src/base64.c
|
src/base64.c
|
||||||
src/get_line.c
|
src/get_line.c
|
||||||
src/helpers.c
|
src/helpers.c
|
||||||
src/minisign.c)
|
src/minisign.c
|
||||||
|
src/cli.c)
|
||||||
|
|
||||||
find_package(PkgConfig REQUIRED)
|
find_package(PkgConfig REQUIRED)
|
||||||
pkg_check_modules(LIBSODIUM libsodium)
|
pkg_check_modules(LIBSODIUM libsodium)
|
||||||
|
|
234
src/cli.c
Normal file
234
src/cli.c
Normal file
|
@ -0,0 +1,234 @@
|
||||||
|
|
||||||
|
#include <assert.h>
|
||||||
|
#include <stdint.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
|
||||||
|
#include "get_line.h"
|
||||||
|
#include "helpers.h"
|
||||||
|
#include "minisign.h"
|
||||||
|
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
static const char *getopt_options = "CGSVRHhc:flm:oP:p:qQs:t:vWx:";
|
||||||
|
#else
|
||||||
|
static const char *getopt_options = "VhHm:oP:p:qQvx:";
|
||||||
|
#endif
|
||||||
|
|
||||||
|
static void usage(void) __attribute__((noreturn));
|
||||||
|
|
||||||
|
static void
|
||||||
|
usage(void)
|
||||||
|
{
|
||||||
|
puts(
|
||||||
|
"Usage:\n"
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
"minisign -G [-f] [-p pubkey_file] [-s seckey_file] [-W]\n"
|
||||||
|
"minisign -R [-s seckey_file] [-p pubkey_file]\n"
|
||||||
|
"minisign -C [-s seckey_file] [-W]\n"
|
||||||
|
"minisign -S [-l] [-x sig_file] [-s seckey_file] [-c untrusted_comment]\n"
|
||||||
|
" [-t trusted_comment] -m file [file ...]\n"
|
||||||
|
#endif
|
||||||
|
"minisign -V [-H] [-x sig_file] [-p pubkey_file | -P pubkey] [-o] [-q] -m file\n"
|
||||||
|
"\n"
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
"-G generate a new key pair\n"
|
||||||
|
"-R recreate a public key file from a secret key file\n"
|
||||||
|
"-C change/remove the password of the secret key\n"
|
||||||
|
"-S sign files\n"
|
||||||
|
#endif
|
||||||
|
"-V verify that a signature is valid for a given file\n"
|
||||||
|
"-H require input to be prehashed\n"
|
||||||
|
"-l sign using the legacy format\n"
|
||||||
|
"-m <file> file to sign/verify\n"
|
||||||
|
"-o combined with -V, output the file content after verification\n"
|
||||||
|
"-p <pubkey_file> public key file (default: ./minisign.pub)\n"
|
||||||
|
"-P <pubkey> public key, as a base64 string\n"
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
"-s <seckey_file> secret key file (default: ~/.minisign/minisign.key)\n"
|
||||||
|
"-W do not encrypt/decrypt the secret key with a password\n"
|
||||||
|
#endif
|
||||||
|
"-x <sigfile> signature file (default: <file>.minisig)\n"
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
"-c <comment> add a one-line untrusted comment\n"
|
||||||
|
"-t <comment> add a one-line trusted comment\n"
|
||||||
|
#endif
|
||||||
|
"-q quiet mode, suppress output\n"
|
||||||
|
"-Q pretty quiet mode, only print the trusted comment\n"
|
||||||
|
"-f force. Combined with -G, overwrite a previous key pair\n"
|
||||||
|
"-v display version number\n");
|
||||||
|
exit(2);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
int
|
||||||
|
main(int argc, char **argv)
|
||||||
|
{
|
||||||
|
const char *pk_file = NULL;
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
char *sk_file = sig_default_skfile();
|
||||||
|
#endif
|
||||||
|
const char *sig_file = NULL;
|
||||||
|
const char *message_file = NULL;
|
||||||
|
const char *comment = NULL;
|
||||||
|
const char *pubkey_s = NULL;
|
||||||
|
const char *trusted_comment = NULL;
|
||||||
|
unsigned char opt_seen[16] = { 0 };
|
||||||
|
int opt_flag;
|
||||||
|
int quiet = 0;
|
||||||
|
int output = 0;
|
||||||
|
int force = 0;
|
||||||
|
int allow_legacy = 1;
|
||||||
|
int sign_legacy = 0;
|
||||||
|
int unencrypted_key = 0;
|
||||||
|
Action action = ACTION_NONE;
|
||||||
|
|
||||||
|
while ((opt_flag = getopt(argc, argv, getopt_options)) != -1) {
|
||||||
|
switch (opt_flag) {
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
case 'G':
|
||||||
|
if (action != ACTION_NONE && action != ACTION_GENERATE) {
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
action = ACTION_GENERATE;
|
||||||
|
break;
|
||||||
|
case 'S':
|
||||||
|
if (action != ACTION_NONE && action != ACTION_SIGN) {
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
action = ACTION_SIGN;
|
||||||
|
break;
|
||||||
|
case 'C':
|
||||||
|
if (action != ACTION_NONE && action != ACTION_UPDATE_PASSWORD) {
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
action = ACTION_UPDATE_PASSWORD;
|
||||||
|
break;
|
||||||
|
case 'R':
|
||||||
|
if (action != ACTION_NONE && action != ACTION_RECREATE_PK) {
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
action = ACTION_RECREATE_PK;
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
case 'V':
|
||||||
|
if (action != ACTION_NONE && action != ACTION_VERIFY) {
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
action = ACTION_VERIFY;
|
||||||
|
break;
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
case 'c':
|
||||||
|
comment = optarg;
|
||||||
|
break;
|
||||||
|
case 'f':
|
||||||
|
force = 1;
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
case 'h':
|
||||||
|
usage();
|
||||||
|
case 'H':
|
||||||
|
allow_legacy = 0;
|
||||||
|
break;
|
||||||
|
case 'l':
|
||||||
|
sign_legacy = 1;
|
||||||
|
break;
|
||||||
|
case 'm':
|
||||||
|
message_file = optarg;
|
||||||
|
break;
|
||||||
|
case 'o':
|
||||||
|
output = 1;
|
||||||
|
break;
|
||||||
|
case 'p':
|
||||||
|
pk_file = optarg;
|
||||||
|
break;
|
||||||
|
case 'P':
|
||||||
|
pubkey_s = optarg;
|
||||||
|
break;
|
||||||
|
case 'q':
|
||||||
|
quiet = 1;
|
||||||
|
break;
|
||||||
|
case 'Q':
|
||||||
|
quiet = 2;
|
||||||
|
break;
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
case 's':
|
||||||
|
free(sk_file);
|
||||||
|
sk_file = xstrdup(optarg);
|
||||||
|
break;
|
||||||
|
case 't':
|
||||||
|
trusted_comment = optarg;
|
||||||
|
break;
|
||||||
|
case 'W':
|
||||||
|
unencrypted_key = 1;
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
case 'x':
|
||||||
|
sig_file = optarg;
|
||||||
|
break;
|
||||||
|
case 'v':
|
||||||
|
puts(VERSION_STRING);
|
||||||
|
return 0;
|
||||||
|
case '?':
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
if (opt_flag > 0 && opt_flag <= (int) sizeof opt_seen / 8) {
|
||||||
|
if ((opt_seen[opt_flag / 8] & (1U << (opt_flag & 7))) != 0) {
|
||||||
|
fprintf(stderr, "Duplicate option: -- %c\n\n", opt_flag);
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
opt_seen[opt_flag / 8] |= 1U << (opt_flag & 7);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (sodium_init() != 0) {
|
||||||
|
fprintf(stderr, "Unable to initialize the Sodium library\n");
|
||||||
|
return 2;
|
||||||
|
}
|
||||||
|
switch (action) {
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
case ACTION_GENERATE:
|
||||||
|
if (comment == NULL || *comment == 0) {
|
||||||
|
comment = SECRETKEY_DEFAULT_COMMENT;
|
||||||
|
}
|
||||||
|
if (pk_file == NULL) {
|
||||||
|
pk_file = SIG_DEFAULT_PKFILE;
|
||||||
|
}
|
||||||
|
return generate(pk_file, sk_file, comment, force, unencrypted_key) != 0;
|
||||||
|
case ACTION_SIGN:
|
||||||
|
if (message_file == NULL) {
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
if (sig_file == NULL || *sig_file == 0) {
|
||||||
|
sig_file = append_sig_suffix(message_file);
|
||||||
|
}
|
||||||
|
if (comment == NULL || *comment == 0) {
|
||||||
|
comment = DEFAULT_COMMENT;
|
||||||
|
}
|
||||||
|
return sign_all(
|
||||||
|
seckey_load(sk_file, NULL),
|
||||||
|
((pk_file != NULL || pubkey_s != NULL) ? pubkey_load(pk_file, pubkey_s) : NULL),
|
||||||
|
message_file, (const char **) &argv[optind], argc - optind, sig_file, comment,
|
||||||
|
trusted_comment, sign_legacy) != 0;
|
||||||
|
case ACTION_RECREATE_PK:
|
||||||
|
if (pk_file == NULL) {
|
||||||
|
pk_file = SIG_DEFAULT_PKFILE;
|
||||||
|
}
|
||||||
|
return recreate_pk(pk_file, sk_file, force) != 0;
|
||||||
|
case ACTION_UPDATE_PASSWORD:
|
||||||
|
return update_password(sk_file, unencrypted_key) != 0;
|
||||||
|
#endif
|
||||||
|
case ACTION_VERIFY:
|
||||||
|
if (message_file == NULL) {
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
if (sig_file == NULL || *sig_file == 0) {
|
||||||
|
sig_file = append_sig_suffix(message_file);
|
||||||
|
}
|
||||||
|
if (pk_file == NULL && pubkey_s == NULL) {
|
||||||
|
pk_file = SIG_DEFAULT_PKFILE;
|
||||||
|
}
|
||||||
|
return verify(pubkey_load(pk_file, pubkey_s), message_file, sig_file, quiet, output,
|
||||||
|
allow_legacy);
|
||||||
|
default:
|
||||||
|
usage();
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
275
src/minisign.c
275
src/minisign.c
|
@ -10,65 +10,14 @@
|
||||||
#include <time.h>
|
#include <time.h>
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
|
|
||||||
#include <sodium.h>
|
|
||||||
|
|
||||||
#include "base64.h"
|
#include "base64.h"
|
||||||
#include "get_line.h"
|
#include "get_line.h"
|
||||||
#include "helpers.h"
|
#include "helpers.h"
|
||||||
|
|
||||||
#include "minisign.h"
|
#include "minisign.h"
|
||||||
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
static const char *getopt_options = "CGSVRHhc:flm:oP:p:qQs:t:vWx:";
|
|
||||||
#else
|
|
||||||
static const char *getopt_options = "VhHm:oP:p:qQvx:";
|
|
||||||
#endif
|
|
||||||
|
|
||||||
static void usage(void) __attribute__((noreturn));
|
unsigned char *
|
||||||
|
|
||||||
static void
|
|
||||||
usage(void)
|
|
||||||
{
|
|
||||||
puts(
|
|
||||||
"Usage:\n"
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
"minisign -G [-f] [-p pubkey_file] [-s seckey_file] [-W]\n"
|
|
||||||
"minisign -R [-s seckey_file] [-p pubkey_file]\n"
|
|
||||||
"minisign -C [-s seckey_file] [-W]\n"
|
|
||||||
"minisign -S [-l] [-x sig_file] [-s seckey_file] [-c untrusted_comment]\n"
|
|
||||||
" [-t trusted_comment] -m file [file ...]\n"
|
|
||||||
#endif
|
|
||||||
"minisign -V [-H] [-x sig_file] [-p pubkey_file | -P pubkey] [-o] [-q] -m file\n"
|
|
||||||
"\n"
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
"-G generate a new key pair\n"
|
|
||||||
"-R recreate a public key file from a secret key file\n"
|
|
||||||
"-C change/remove the password of the secret key\n"
|
|
||||||
"-S sign files\n"
|
|
||||||
#endif
|
|
||||||
"-V verify that a signature is valid for a given file\n"
|
|
||||||
"-H require input to be prehashed\n"
|
|
||||||
"-l sign using the legacy format\n"
|
|
||||||
"-m <file> file to sign/verify\n"
|
|
||||||
"-o combined with -V, output the file content after verification\n"
|
|
||||||
"-p <pubkey_file> public key file (default: ./minisign.pub)\n"
|
|
||||||
"-P <pubkey> public key, as a base64 string\n"
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
"-s <seckey_file> secret key file (default: ~/.minisign/minisign.key)\n"
|
|
||||||
"-W do not encrypt/decrypt the secret key with a password\n"
|
|
||||||
#endif
|
|
||||||
"-x <sigfile> signature file (default: <file>.minisig)\n"
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
"-c <comment> add a one-line untrusted comment\n"
|
|
||||||
"-t <comment> add a one-line trusted comment\n"
|
|
||||||
#endif
|
|
||||||
"-q quiet mode, suppress output\n"
|
|
||||||
"-Q pretty quiet mode, only print the trusted comment\n"
|
|
||||||
"-f force. Combined with -G, overwrite a previous key pair\n"
|
|
||||||
"-v display version number\n");
|
|
||||||
exit(2);
|
|
||||||
}
|
|
||||||
|
|
||||||
static unsigned char *
|
|
||||||
message_load_hashed(size_t *message_len, const char *message_file)
|
message_load_hashed(size_t *message_len, const char *message_file)
|
||||||
{
|
{
|
||||||
crypto_generichash_state hs;
|
crypto_generichash_state hs;
|
||||||
|
@ -95,7 +44,7 @@ message_load_hashed(size_t *message_len, const char *message_file)
|
||||||
return message;
|
return message;
|
||||||
}
|
}
|
||||||
|
|
||||||
static unsigned char *
|
unsigned char *
|
||||||
message_load(size_t *message_len, const char *message_file, int hashed)
|
message_load(size_t *message_len, const char *message_file, int hashed)
|
||||||
{
|
{
|
||||||
FILE *fp;
|
FILE *fp;
|
||||||
|
@ -123,7 +72,7 @@ message_load(size_t *message_len, const char *message_file, int hashed)
|
||||||
return message;
|
return message;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
int
|
||||||
output_file(const char *message_file)
|
output_file(const char *message_file)
|
||||||
{
|
{
|
||||||
unsigned char buf[65536U];
|
unsigned char buf[65536U];
|
||||||
|
@ -146,7 +95,7 @@ output_file(const char *message_file)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static SigStruct *
|
SigStruct *
|
||||||
sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES], int *hashed,
|
sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES], int *hashed,
|
||||||
char trusted_comment[TRUSTEDCOMMENTMAXBYTES], size_t trusted_comment_maxlen)
|
char trusted_comment[TRUSTEDCOMMENTMAXBYTES], size_t trusted_comment_maxlen)
|
||||||
{
|
{
|
||||||
|
@ -229,7 +178,7 @@ sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES], int
|
||||||
return sig_struct;
|
return sig_struct;
|
||||||
}
|
}
|
||||||
|
|
||||||
static PubkeyStruct *
|
PubkeyStruct *
|
||||||
pubkey_load_string(const char *pubkey_s)
|
pubkey_load_string(const char *pubkey_s)
|
||||||
{
|
{
|
||||||
PubkeyStruct *pubkey_struct;
|
PubkeyStruct *pubkey_struct;
|
||||||
|
@ -247,7 +196,7 @@ pubkey_load_string(const char *pubkey_s)
|
||||||
return pubkey_struct;
|
return pubkey_struct;
|
||||||
}
|
}
|
||||||
|
|
||||||
static PubkeyStruct *
|
PubkeyStruct *
|
||||||
pubkey_load_file(const char *pk_file)
|
pubkey_load_file(const char *pk_file)
|
||||||
{
|
{
|
||||||
char pk_comment[COMMENTMAXBYTES];
|
char pk_comment[COMMENTMAXBYTES];
|
||||||
|
@ -275,7 +224,7 @@ pubkey_load_file(const char *pk_file)
|
||||||
return pubkey_struct;
|
return pubkey_struct;
|
||||||
}
|
}
|
||||||
|
|
||||||
static PubkeyStruct *
|
PubkeyStruct *
|
||||||
pubkey_load(const char *pk_file, const char *pubkey_s)
|
pubkey_load(const char *pk_file, const char *pubkey_s)
|
||||||
{
|
{
|
||||||
if (pk_file != NULL && pubkey_s != NULL) {
|
if (pk_file != NULL && pubkey_s != NULL) {
|
||||||
|
@ -289,7 +238,7 @@ pubkey_load(const char *pk_file, const char *pubkey_s)
|
||||||
exit_msg("A public key is required");
|
exit_msg("A public key is required");
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
void
|
||||||
seckey_compute_chk(unsigned char chk[crypto_generichash_BYTES], const SeckeyStruct *seckey_struct)
|
seckey_compute_chk(unsigned char chk[crypto_generichash_BYTES], const SeckeyStruct *seckey_struct)
|
||||||
{
|
{
|
||||||
crypto_generichash_state hs;
|
crypto_generichash_state hs;
|
||||||
|
@ -303,7 +252,7 @@ seckey_compute_chk(unsigned char chk[crypto_generichash_BYTES], const SeckeyStru
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
static void
|
void
|
||||||
decrypt_key(SeckeyStruct *const seckey_struct, unsigned char chk[crypto_generichash_BYTES])
|
decrypt_key(SeckeyStruct *const seckey_struct, unsigned char chk[crypto_generichash_BYTES])
|
||||||
{
|
{
|
||||||
char *pwd = xsodium_malloc(PASSWORDMAXBYTES);
|
char *pwd = xsodium_malloc(PASSWORDMAXBYTES);
|
||||||
|
@ -333,7 +282,7 @@ decrypt_key(SeckeyStruct *const seckey_struct, unsigned char chk[crypto_generich
|
||||||
sodium_memzero(chk, crypto_generichash_BYTES);
|
sodium_memzero(chk, crypto_generichash_BYTES);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
void
|
||||||
encrypt_key(SeckeyStruct *const seckey_struct)
|
encrypt_key(SeckeyStruct *const seckey_struct)
|
||||||
{
|
{
|
||||||
char *pwd = xsodium_malloc(PASSWORDMAXBYTES);
|
char *pwd = xsodium_malloc(PASSWORDMAXBYTES);
|
||||||
|
@ -383,7 +332,7 @@ encrypt_key(SeckeyStruct *const seckey_struct)
|
||||||
puts("done\n");
|
puts("done\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
static SeckeyStruct *
|
SeckeyStruct *
|
||||||
seckey_load(const char *sk_file, char *const sk_comment_line)
|
seckey_load(const char *sk_file, char *const sk_comment_line)
|
||||||
{
|
{
|
||||||
char sk_comment_line_buf[COMMENTMAXBYTES];
|
char sk_comment_line_buf[COMMENTMAXBYTES];
|
||||||
|
@ -433,7 +382,7 @@ seckey_load(const char *sk_file, char *const sk_comment_line)
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
static int
|
int
|
||||||
verify(PubkeyStruct *pubkey_struct, const char *message_file, const char *sig_file, int quiet,
|
verify(PubkeyStruct *pubkey_struct, const char *message_file, const char *sig_file, int quiet,
|
||||||
int output, int allow_legacy)
|
int output, int allow_legacy)
|
||||||
{
|
{
|
||||||
|
@ -506,7 +455,7 @@ verify(PubkeyStruct *pubkey_struct, const char *message_file, const char *sig_fi
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static char *
|
char *
|
||||||
append_sig_suffix(const char *message_file)
|
append_sig_suffix(const char *message_file)
|
||||||
{
|
{
|
||||||
char *sig_file;
|
char *sig_file;
|
||||||
|
@ -520,7 +469,7 @@ append_sig_suffix(const char *message_file)
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
static char *
|
char *
|
||||||
default_trusted_comment(const char *message_file, int hashed)
|
default_trusted_comment(const char *message_file, int hashed)
|
||||||
{
|
{
|
||||||
char *ret;
|
char *ret;
|
||||||
|
@ -534,7 +483,7 @@ default_trusted_comment(const char *message_file, int hashed)
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
void
|
||||||
sign(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
|
sign(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
|
||||||
const char *sig_file, const char *comment, const char *trusted_comment, int legacy)
|
const char *sig_file, const char *comment, const char *trusted_comment, int legacy)
|
||||||
{
|
{
|
||||||
|
@ -603,7 +552,7 @@ sign(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *messa
|
||||||
free(tmp_trusted_comment);
|
free(tmp_trusted_comment);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
int
|
||||||
sign_all(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
|
sign_all(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
|
||||||
const char *additional_files[], int additional_count, const char *sig_file,
|
const char *additional_files[], int additional_count, const char *sig_file,
|
||||||
const char *comment, const char *trusted_comment, int legacy)
|
const char *comment, const char *trusted_comment, int legacy)
|
||||||
|
@ -624,7 +573,7 @@ sign_all(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *m
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
void
|
||||||
abort_on_existing_key_file(const char *file)
|
abort_on_existing_key_file(const char *file)
|
||||||
{
|
{
|
||||||
FILE *fp;
|
FILE *fp;
|
||||||
|
@ -645,7 +594,7 @@ abort_on_existing_key_file(const char *file)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
void
|
||||||
abort_on_existing_key_files(const char *pk_file, const char *sk_file, int force)
|
abort_on_existing_key_files(const char *pk_file, const char *sk_file, int force)
|
||||||
{
|
{
|
||||||
if (force == 0) {
|
if (force == 0) {
|
||||||
|
@ -654,7 +603,7 @@ abort_on_existing_key_files(const char *pk_file, const char *sk_file, int force)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
void
|
||||||
write_pk_file(const char *pk_file, const PubkeyStruct *pubkey_struct)
|
write_pk_file(const char *pk_file, const PubkeyStruct *pubkey_struct)
|
||||||
{
|
{
|
||||||
FILE *fp;
|
FILE *fp;
|
||||||
|
@ -668,7 +617,7 @@ write_pk_file(const char *pk_file, const PubkeyStruct *pubkey_struct)
|
||||||
xfclose(fp);
|
xfclose(fp);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
int
|
||||||
generate(const char *pk_file, const char *sk_file, const char *comment, int force,
|
generate(const char *pk_file, const char *sk_file, const char *comment, int force,
|
||||||
int unencrypted_key)
|
int unencrypted_key)
|
||||||
{
|
{
|
||||||
|
@ -715,7 +664,7 @@ generate(const char *pk_file, const char *sk_file, const char *comment, int forc
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
int
|
||||||
recreate_pk(const char *pk_file, const char *sk_file, int force)
|
recreate_pk(const char *pk_file, const char *sk_file, int force)
|
||||||
{
|
{
|
||||||
SeckeyStruct *seckey_struct;
|
SeckeyStruct *seckey_struct;
|
||||||
|
@ -742,7 +691,7 @@ recreate_pk(const char *pk_file, const char *sk_file, int force)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
int
|
||||||
update_password(const char *sk_file, int unencrypted_key)
|
update_password(const char *sk_file, int unencrypted_key)
|
||||||
{
|
{
|
||||||
SeckeyStruct *seckey_struct;
|
SeckeyStruct *seckey_struct;
|
||||||
|
@ -782,7 +731,7 @@ update_password(const char *sk_file, int unencrypted_key)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef VERIFY_ONLY
|
#ifndef VERIFY_ONLY
|
||||||
static char *
|
char *
|
||||||
sig_config_dir(void)
|
sig_config_dir(void)
|
||||||
{
|
{
|
||||||
const char *config_dir_env;
|
const char *config_dir_env;
|
||||||
|
@ -802,7 +751,7 @@ sig_config_dir(void)
|
||||||
return config_dir;
|
return config_dir;
|
||||||
}
|
}
|
||||||
|
|
||||||
static char *
|
char *
|
||||||
sig_default_skfile(void)
|
sig_default_skfile(void)
|
||||||
{
|
{
|
||||||
char *config_dir;
|
char *config_dir;
|
||||||
|
@ -821,177 +770,3 @@ sig_default_skfile(void)
|
||||||
return skfile;
|
return skfile;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
int
|
|
||||||
main(int argc, char **argv)
|
|
||||||
{
|
|
||||||
const char *pk_file = NULL;
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
char *sk_file = sig_default_skfile();
|
|
||||||
#endif
|
|
||||||
const char *sig_file = NULL;
|
|
||||||
const char *message_file = NULL;
|
|
||||||
const char *comment = NULL;
|
|
||||||
const char *pubkey_s = NULL;
|
|
||||||
const char *trusted_comment = NULL;
|
|
||||||
unsigned char opt_seen[16] = { 0 };
|
|
||||||
int opt_flag;
|
|
||||||
int quiet = 0;
|
|
||||||
int output = 0;
|
|
||||||
int force = 0;
|
|
||||||
int allow_legacy = 1;
|
|
||||||
int sign_legacy = 0;
|
|
||||||
int unencrypted_key = 0;
|
|
||||||
Action action = ACTION_NONE;
|
|
||||||
|
|
||||||
while ((opt_flag = getopt(argc, argv, getopt_options)) != -1) {
|
|
||||||
switch (opt_flag) {
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
case 'G':
|
|
||||||
if (action != ACTION_NONE && action != ACTION_GENERATE) {
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
action = ACTION_GENERATE;
|
|
||||||
break;
|
|
||||||
case 'S':
|
|
||||||
if (action != ACTION_NONE && action != ACTION_SIGN) {
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
action = ACTION_SIGN;
|
|
||||||
break;
|
|
||||||
case 'C':
|
|
||||||
if (action != ACTION_NONE && action != ACTION_UPDATE_PASSWORD) {
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
action = ACTION_UPDATE_PASSWORD;
|
|
||||||
break;
|
|
||||||
case 'R':
|
|
||||||
if (action != ACTION_NONE && action != ACTION_RECREATE_PK) {
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
action = ACTION_RECREATE_PK;
|
|
||||||
break;
|
|
||||||
#endif
|
|
||||||
case 'V':
|
|
||||||
if (action != ACTION_NONE && action != ACTION_VERIFY) {
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
action = ACTION_VERIFY;
|
|
||||||
break;
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
case 'c':
|
|
||||||
comment = optarg;
|
|
||||||
break;
|
|
||||||
case 'f':
|
|
||||||
force = 1;
|
|
||||||
break;
|
|
||||||
#endif
|
|
||||||
case 'h':
|
|
||||||
usage();
|
|
||||||
case 'H':
|
|
||||||
allow_legacy = 0;
|
|
||||||
break;
|
|
||||||
case 'l':
|
|
||||||
sign_legacy = 1;
|
|
||||||
break;
|
|
||||||
case 'm':
|
|
||||||
message_file = optarg;
|
|
||||||
break;
|
|
||||||
case 'o':
|
|
||||||
output = 1;
|
|
||||||
break;
|
|
||||||
case 'p':
|
|
||||||
pk_file = optarg;
|
|
||||||
break;
|
|
||||||
case 'P':
|
|
||||||
pubkey_s = optarg;
|
|
||||||
break;
|
|
||||||
case 'q':
|
|
||||||
quiet = 1;
|
|
||||||
break;
|
|
||||||
case 'Q':
|
|
||||||
quiet = 2;
|
|
||||||
break;
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
case 's':
|
|
||||||
free(sk_file);
|
|
||||||
sk_file = xstrdup(optarg);
|
|
||||||
break;
|
|
||||||
case 't':
|
|
||||||
trusted_comment = optarg;
|
|
||||||
break;
|
|
||||||
case 'W':
|
|
||||||
unencrypted_key = 1;
|
|
||||||
break;
|
|
||||||
#endif
|
|
||||||
case 'x':
|
|
||||||
sig_file = optarg;
|
|
||||||
break;
|
|
||||||
case 'v':
|
|
||||||
puts(VERSION_STRING);
|
|
||||||
return 0;
|
|
||||||
case '?':
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
if (opt_flag > 0 && opt_flag <= (int) sizeof opt_seen / 8) {
|
|
||||||
if ((opt_seen[opt_flag / 8] & (1U << (opt_flag & 7))) != 0) {
|
|
||||||
fprintf(stderr, "Duplicate option: -- %c\n\n", opt_flag);
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
opt_seen[opt_flag / 8] |= 1U << (opt_flag & 7);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (sodium_init() != 0) {
|
|
||||||
fprintf(stderr, "Unable to initialize the Sodium library\n");
|
|
||||||
return 2;
|
|
||||||
}
|
|
||||||
switch (action) {
|
|
||||||
#ifndef VERIFY_ONLY
|
|
||||||
case ACTION_GENERATE:
|
|
||||||
if (comment == NULL || *comment == 0) {
|
|
||||||
comment = SECRETKEY_DEFAULT_COMMENT;
|
|
||||||
}
|
|
||||||
if (pk_file == NULL) {
|
|
||||||
pk_file = SIG_DEFAULT_PKFILE;
|
|
||||||
}
|
|
||||||
return generate(pk_file, sk_file, comment, force, unencrypted_key) != 0;
|
|
||||||
case ACTION_SIGN:
|
|
||||||
if (message_file == NULL) {
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
if (sig_file == NULL || *sig_file == 0) {
|
|
||||||
sig_file = append_sig_suffix(message_file);
|
|
||||||
}
|
|
||||||
if (comment == NULL || *comment == 0) {
|
|
||||||
comment = DEFAULT_COMMENT;
|
|
||||||
}
|
|
||||||
return sign_all(
|
|
||||||
seckey_load(sk_file, NULL),
|
|
||||||
((pk_file != NULL || pubkey_s != NULL) ? pubkey_load(pk_file, pubkey_s) : NULL),
|
|
||||||
message_file, (const char **) &argv[optind], argc - optind, sig_file, comment,
|
|
||||||
trusted_comment, sign_legacy) != 0;
|
|
||||||
case ACTION_RECREATE_PK:
|
|
||||||
if (pk_file == NULL) {
|
|
||||||
pk_file = SIG_DEFAULT_PKFILE;
|
|
||||||
}
|
|
||||||
return recreate_pk(pk_file, sk_file, force) != 0;
|
|
||||||
case ACTION_UPDATE_PASSWORD:
|
|
||||||
return update_password(sk_file, unencrypted_key) != 0;
|
|
||||||
#endif
|
|
||||||
case ACTION_VERIFY:
|
|
||||||
if (message_file == NULL) {
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
if (sig_file == NULL || *sig_file == 0) {
|
|
||||||
sig_file = append_sig_suffix(message_file);
|
|
||||||
}
|
|
||||||
if (pk_file == NULL && pubkey_s == NULL) {
|
|
||||||
pk_file = SIG_DEFAULT_PKFILE;
|
|
||||||
}
|
|
||||||
return verify(pubkey_load(pk_file, pubkey_s), message_file, sig_file, quiet, output,
|
|
||||||
allow_legacy);
|
|
||||||
default:
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,7 +1,8 @@
|
||||||
|
|
||||||
#ifndef MINISIGN_H
|
#ifndef MINISIGN_H
|
||||||
#define MINISIGN_H 1
|
#define MINISIGN_H 1
|
||||||
|
|
||||||
|
#include <sodium.h>
|
||||||
|
|
||||||
#define COMMENTMAXBYTES 1024
|
#define COMMENTMAXBYTES 1024
|
||||||
#define KEYNUMBYTES 8
|
#define KEYNUMBYTES 8
|
||||||
#define PASSWORDMAXBYTES 1024
|
#define PASSWORDMAXBYTES 1024
|
||||||
|
@ -22,6 +23,7 @@
|
||||||
#define SIG_SUFFIX ".minisig"
|
#define SIG_SUFFIX ".minisig"
|
||||||
#define VERSION_STRING "minisign 0.11"
|
#define VERSION_STRING "minisign 0.11"
|
||||||
|
|
||||||
|
|
||||||
typedef struct KeynumSK_ {
|
typedef struct KeynumSK_ {
|
||||||
unsigned char keynum[KEYNUMBYTES];
|
unsigned char keynum[KEYNUMBYTES];
|
||||||
unsigned char sk[crypto_sign_SECRETKEYBYTES];
|
unsigned char sk[crypto_sign_SECRETKEYBYTES];
|
||||||
|
@ -63,4 +65,45 @@ typedef enum Action_ {
|
||||||
ACTION_UPDATE_PASSWORD
|
ACTION_UPDATE_PASSWORD
|
||||||
} Action;
|
} Action;
|
||||||
|
|
||||||
#endif
|
unsigned char * message_load_hashed(size_t *message_len, const char *message_file);
|
||||||
|
unsigned char * message_load(size_t *message_len, const char *message_file, int hashed);
|
||||||
|
|
||||||
|
int output_file(const char *message_file);
|
||||||
|
SigStruct * sig_load(const char *sig_file, unsigned char global_sig[crypto_sign_BYTES],
|
||||||
|
int *hashed, char trusted_comment[TRUSTEDCOMMENTMAXBYTES], size_t trusted_comment_maxlen);
|
||||||
|
|
||||||
|
PubkeyStruct * pubkey_load_string(const char *pubkey_s);
|
||||||
|
PubkeyStruct * pubkey_load_file(const char *pk_file);
|
||||||
|
PubkeyStruct * pubkey_load(const char *pk_file, const char *pubkey_s);
|
||||||
|
|
||||||
|
void seckey_compute_chk(unsigned char chk[crypto_generichash_BYTES], const SeckeyStruct *seckey_struct);
|
||||||
|
|
||||||
|
int verify(PubkeyStruct *pubkey_struct, const char *message_file, const char *sig_file, int quiet,
|
||||||
|
int output, int allow_legacy);
|
||||||
|
char * append_sig_suffix(const char *message_file);
|
||||||
|
char * default_trusted_comment(const char *message_file, int hashed);
|
||||||
|
|
||||||
|
#ifndef VERIFY_ONLY
|
||||||
|
void sign(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
|
||||||
|
const char *sig_file, const char *comment, const char *trusted_comment, int legacy);
|
||||||
|
int sign_all(SeckeyStruct *seckey_struct, PubkeyStruct *pubkey_struct, const char *message_file,
|
||||||
|
const char *additional_files[], int additional_count, const char *sig_file,
|
||||||
|
const char *comment, const char *trusted_comment, int legacy);
|
||||||
|
|
||||||
|
void abort_on_existing_key_file(const char *file);
|
||||||
|
void abort_on_existing_key_files(const char *pk_file, const char *sk_file, int force);
|
||||||
|
|
||||||
|
void write_pk_file(const char *pk_file, const PubkeyStruct *pubkey_struct);
|
||||||
|
int generate(const char *pk_file, const char *sk_file, const char *comment, int force,
|
||||||
|
int unencrypted_key);
|
||||||
|
int recreate_pk(const char *pk_file, const char *sk_file, int force);
|
||||||
|
int update_password(const char *sk_file, int unencrypted_key);
|
||||||
|
|
||||||
|
void decrypt_key(SeckeyStruct *const seckey_struct, unsigned char chk[crypto_generichash_BYTES]);
|
||||||
|
void encrypt_key(SeckeyStruct *const seckey_struct);
|
||||||
|
SeckeyStruct * seckey_load(const char *sk_file, char *const sk_comment_line);
|
||||||
|
char * sig_config_dir(void);
|
||||||
|
char * sig_default_skfile(void);
|
||||||
|
#endif /* !VERIFY_ONLY */
|
||||||
|
|
||||||
|
#endif /* MINISIGN_H */
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue