2023-11-29 17:28:35 -08:00
|
|
|
use std::io::BufReader;
|
2023-11-29 16:42:35 -08:00
|
|
|
use std::fs::File;
|
|
|
|
use std::io::prelude::*;
|
|
|
|
|
2023-11-29 16:54:10 -08:00
|
|
|
use rand::rngs::OsRng;
|
|
|
|
use ed25519_dalek::SigningKey;
|
2023-11-29 17:28:35 -08:00
|
|
|
use ed25519_dalek::Signature;
|
|
|
|
use ed25519_dalek::Signer;
|
2023-12-06 20:16:02 -08:00
|
|
|
use ed25519_dalek::Verifier;
|
|
|
|
use ed25519_dalek::VerifyingKey;
|
|
|
|
use ed25519_dalek::{PUBLIC_KEY_LENGTH, SECRET_KEY_LENGTH, SIGNATURE_LENGTH};
|
|
|
|
|
2023-11-29 16:54:10 -08:00
|
|
|
|
2023-11-29 16:42:35 -08:00
|
|
|
fn main() -> std::io::Result<()>{
|
2023-11-29 17:28:35 -08:00
|
|
|
let action = std::env::args().nth(1).expect("no command given");
|
|
|
|
if action == "sign" {
|
|
|
|
let keyfilepath = std::env::args().nth(2).expect("no keyfilepath given");
|
|
|
|
let messagefilepath = std::env::args().nth(3).expect("no message given");
|
2023-12-06 18:37:45 -08:00
|
|
|
let maybe_signature_filepath = std::env::args().nth(4);
|
|
|
|
|
2023-11-29 16:44:13 -08:00
|
|
|
|
2023-11-29 17:28:35 -08:00
|
|
|
let mut keyfile = File::open(&keyfilepath).expect("no file found");
|
2023-12-06 20:16:02 -08:00
|
|
|
let mut keybuffer: [u8; 32] = [0; SECRET_KEY_LENGTH];
|
2023-11-29 17:28:35 -08:00
|
|
|
keyfile.read(&mut keybuffer).expect("buffer overflow");
|
|
|
|
let signing_key: SigningKey = SigningKey::from_bytes(&keybuffer);
|
2023-11-29 16:54:10 -08:00
|
|
|
|
2023-11-29 17:28:35 -08:00
|
|
|
let messagefile= File::open(&messagefilepath).expect("no file found");
|
|
|
|
let mut messagereader = BufReader::new(messagefile);
|
|
|
|
let mut messagebuf = Vec::new();
|
|
|
|
messagereader.read_to_end(&mut messagebuf)?;
|
2023-11-29 17:06:38 -08:00
|
|
|
|
|
|
|
|
2023-11-29 17:28:35 -08:00
|
|
|
|
|
|
|
println!("Using key {keyfilepath}");
|
|
|
|
|
|
|
|
let signature: Signature = signing_key.sign(&messagebuf);
|
2023-12-06 18:37:45 -08:00
|
|
|
if maybe_signature_filepath.is_some() {
|
|
|
|
let filename = maybe_signature_filepath.expect("Not possible");
|
|
|
|
let mut file = File::create(filename.clone())?;
|
|
|
|
println!("Writing signature to {filename}");
|
|
|
|
file.write_all(&signature.to_bytes())?;
|
|
|
|
} else {
|
|
|
|
println!("Signture: {signature}");
|
|
|
|
}
|
2023-12-06 20:16:02 -08:00
|
|
|
} else if action == "validate" {
|
|
|
|
let public_key_filepath = std::env::args().nth(2).expect("no key filepath given");
|
|
|
|
let message_filepath = std::env::args().nth(3).expect("no message filepath given");
|
|
|
|
let signature_filepath = std::env::args().nth(4).expect("no signature filepath given");
|
|
|
|
|
|
|
|
let mut public_keyfile = File::open(&public_key_filepath).expect("no file found");
|
|
|
|
let mut public_keybuffer: [u8; PUBLIC_KEY_LENGTH] = [0; PUBLIC_KEY_LENGTH];
|
|
|
|
public_keyfile.read(&mut public_keybuffer).expect("buffer overflow");
|
|
|
|
let public_key: VerifyingKey = VerifyingKey::from_bytes(&public_keybuffer).expect("Faled to make a key");
|
|
|
|
|
|
|
|
let messagefile= File::open(&message_filepath).expect("no file found");
|
|
|
|
let mut messagereader = BufReader::new(messagefile);
|
|
|
|
let mut messagebuf = Vec::new();
|
|
|
|
messagereader.read_to_end(&mut messagebuf)?;
|
|
|
|
|
|
|
|
let signature_file = File::open(&signature_filepath).expect("no file found");
|
|
|
|
let mut signature_reader = BufReader::new(signature_file);
|
|
|
|
let mut signature_buf: [u8; SIGNATURE_LENGTH] = [0; SIGNATURE_LENGTH];
|
|
|
|
signature_reader.read(&mut signature_buf).expect("buffer overflow");
|
|
|
|
let signature: Signature = Signature::try_from(&signature_buf[..]).expect("not a signature");
|
|
|
|
|
|
|
|
if public_key.verify(&messagebuf, &signature).is_ok() {
|
|
|
|
println!("Yep, that checks out.");
|
|
|
|
} else {
|
|
|
|
println!("Invalid signature.");
|
|
|
|
}
|
2023-11-29 17:28:35 -08:00
|
|
|
} else if action == "create" {
|
2023-12-06 20:16:02 -08:00
|
|
|
let signing_key_filepath = std::env::args().nth(2).expect("no signing key file path given");
|
|
|
|
let verifying_key_filepath = std::env::args().nth(3).expect("no verifying key file path given");
|
|
|
|
|
2023-11-29 17:28:35 -08:00
|
|
|
let mut csprng = OsRng;
|
|
|
|
let signing_key: SigningKey = SigningKey::generate(&mut csprng);
|
|
|
|
|
2023-12-06 20:16:02 -08:00
|
|
|
println!("Writing new private key to {signing_key_filepath}");
|
|
|
|
let mut file = File::create(signing_key_filepath)?;
|
2023-11-29 17:28:35 -08:00
|
|
|
file.write_all(&signing_key.to_bytes())?;
|
2023-12-06 20:16:02 -08:00
|
|
|
|
|
|
|
println!("Writing new public key to {verifying_key_filepath}");
|
|
|
|
let verifying_key: VerifyingKey = signing_key.verifying_key();
|
|
|
|
file = File::create(verifying_key_filepath)?;
|
|
|
|
file.write_all(&verifying_key.to_bytes())?;
|
|
|
|
|
2023-11-29 17:28:35 -08:00
|
|
|
} else {
|
|
|
|
println!("Unrecognized command {action}");
|
|
|
|
}
|
2023-12-06 20:16:02 -08:00
|
|
|
return Ok(());
|
2023-11-10 14:53:20 -08:00
|
|
|
}
|