1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90
|
ECDSA Util
==========
Requirements
------------
* libuecc: http://git.universe-factory.net/libuecc
Building
--------
mkdir build
cd build
cmake ..
make
Binaries will be in `build/src`.
Utilities
---------
### ecdsakeygen
#### Generate a new private key
The secret is written to stdout.
% ecdsakeygen -s > secret
% cat secret
68b12c0eaf88bf17fbcdf560780136b9cc4be352fb8aa7148215fbd65887db7b
#### Calculate public key given a private key
The secret should be supplied on stdin. The public key will be written to
stdout.
% ecdsakeygen -p < secret
1f63ef7450760af9062ff697995eb536eef25a555822087fa4cfd9a82d9faa79
### ecdsasign
If you have followed the previous examples you should have a file called
`secret` containing the private key. Using a secret you can sign a file like
this:
% ecdsasign somefile < secret
da967af925168d8eb113bc79a60717b444d24c0dab449a90b1360dc849d1150fc6fe5e6656966d2fc88e67d81108deb13836ed66308cf897dd1b8815f6422802
### ecdsaverify
`ecdsaverify` is quite powerful utility for verification of signatures. You can
verify a simple signature like this:
% ecdsaverify -s da967...802 -p 1f63ef7450760af9062ff697995eb536eef25a555822087fa4cfd9a82d9faa79 somefile
% echo $?
0
Usually, there is no output except the return code. A return code of 0 denotes
a correct signature. If the signature is invalid, 1 is returned.
#### n-of-m verification
Multiple signatures and public keys may be supplied to facilitate n-of-m
verifications:
% ecdsaverify -s signature1 -s signature2 ... -p pubkey1 -p pubkey2 ... somefile
In this mode it is checked whether any supplied public key can be used to
verify any supplied signature. This can be used in cases where multiple
parties (each with their own private key) are allowed to sign a file. This is
called 1-of-m verification.
This can further be expanded into n-of-m verification using the `-n` switch:
% ecdsaverify -s sig1 -s sig2 -s sig3 -p pub1 -p pub2 -p pub3 -p pub4 -n 2
In this case at least two pairs of public key and signature must match.
Signature Format
----------------
concat $ map tohexstring [r, s]
Release precedure
-----------------
- [ ] update debian/changelog
- [ ] create debian package
- [ ] update AUR package
|