Skip to content

badboy/signify-rs

main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Signify - Ed25519 signature tool

crates.io docs.rs docs License: MIT Build Status

Create cryptographic signatures for files and verify them. This is based on signify, the OpenBSD tool to sign and verify signatures on files. It is based on the Ed25519 public-key signature system by Bernstein et al.

signify-rs is fully compatible with the original implementation. It can verify signatures generated by OpenBSD signify and signs data in a format that it can verify as well.

You can read more about the ideas and concepts behind signify in Securing OpenBSD From Us To You.

Installation

cargo install signify

Usage

The CLI is designed to be compatible with the reference implementation and accepts the same command line flags as it.

Create a key pair:

signify -G -p pubkey -s seckey

Sign a file using the secret key:

signify -S -s seckey -m README.md

Verify the signature:

signify -V -p pubkey -m README.md

To see how to use libsignify, check out the examples/ directory or the documentation.

Testing

There are basic unit tests, but many more are needed for good coverage 😞.

However, we ensure that a full cycle of generating a keypair, then signing & verifying works. To run them, use the following commands:

./tests/full-cycle.sh

For correctness, we compare interoperability with the OpenBSD signify:

./tests/compare.sh

The complete test suite can be conveniently ran with make test.

License

MIT. See LICENSE.