13 fprint(2, "usage: 9 dsasign [-i id] [-v] key <data\n");
14 threadexitsall("usage");
17 static void doVerify(void);
18 static char *getline(int*);
26 threadmain(int argc, char **argv)
30 uchar digest[SHA1dlen];
34 fmtinstall('[', encodefmt);
35 fmtinstall('H', encodefmt);
61 if((rpc = auth_allocrpc()) == nil){
62 fprint(2, "dsasign: auth_allocrpc: %r\n");
65 key = smprint("proto=dsa role=sign %s", key);
66 if(auth_rpc(rpc, "start", key, strlen(key)) != ARok){
67 fprint(2, "dsasign: auth 'start' failed: %r\n");
76 while((p = getline(&n)) != nil) {
77 if(p[0] == '-' || p[0] == '+')
80 fmtprint(&fmt, "%s\n", p);
82 text = fmtstrflush(&fmt);
83 sha1((uchar*)text, strlen(text), digest, nil);
85 if(auth_rpc(rpc, "write", digest, SHA1dlen) != ARok)
86 sysfatal("auth write in sign failed: %r");
87 if(auth_rpc(rpc, "read", nil, 0) != ARok)
88 sysfatal("auth read in sign failed: %r");
90 print("-%s %.*H\n", id, rpc->narg, rpc->arg);
95 keytomp(Attr *a, char *name)
100 p = _strfindattr(a, name);
102 sysfatal("missing key attribute %s", name);
103 m = strtomp(p, nil, 16, nil);
105 sysfatal("malformed key attribute %s=%s", name, p);
115 uchar digest[SHA1dlen], sig[1024];
123 sysfatal("invalid key");
124 dkey.alpha = keytomp(a, "alpha");
125 dkey.key = keytomp(a, "key");
126 dkey.p = keytomp(a, "p");
127 dkey.q = keytomp(a, "q");
128 if(!probably_prime(dkey.p, 20) && !probably_prime(dkey.q, 20))
129 sysfatal("p or q not prime");
131 while((p = getline(&n)) != nil)
132 if(p[0] == '+' && strcmp(p+1, id) == 0)
134 sysfatal("no message found");
138 while((p = getline(&n)) != nil) {
139 if(n >= 1+nid+1+16 && p[0] == '-' && strncmp(p+1, id, nid) == 0 && p[1+nid] == ' ') {
140 if((nsig = dec16(sig, sizeof sig, p+1+nid+1, n-(1+nid+1))) != 20+20)
141 sysfatal("malformed signture");
146 fmtprint(&fmt, "%s\n", p);
148 sysfatal("did not find end of message");
149 return; // silence clang warning
152 text = fmtstrflush(&fmt);
153 sha1((uchar*)text, strlen(text), digest, nil);
156 sysfatal("malformed signature");
157 dsig.r = betomp(sig, 20, nil);
158 dsig.s = betomp(sig+20, 20, nil);
160 if(dsaverify(&dkey, &dsig, betomp(digest, sizeof digest, nil)) < 0)
161 sysfatal("signature failed to verify: %r");
163 write(1, text, strlen(text));
173 if((p = Brdline(&b, '\n')) == nil)
176 while(n > 0 && (p[n-1] == '\n' || p[n-1] == ' ' || p[n-1] == '\t'))