| # Copyright 2021 Google LLC |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS-IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| # [START digital-signature-example] |
| |
| """A utility for signing and verifying files using digital signatures. |
| |
| It loads cleartext keys from disk - this is not recommended! |
| """ |
| |
| import binascii |
| |
| from absl import app |
| from absl import flags |
| from absl import logging |
| import tink |
| from tink import cleartext_keyset_handle |
| from tink import signature |
| |
| |
| FLAGS = flags.FLAGS |
| |
| flags.DEFINE_enum('mode', None, ['sign', 'verify'], |
| 'The operation to perform.') |
| flags.DEFINE_string('keyset_path', None, |
| 'Path to the keyset used for the signature operation.') |
| flags.DEFINE_string('data_path', None, |
| 'Path to the file with the input data.') |
| flags.DEFINE_string('signature_path', None, |
| 'Path to the signature file.') |
| |
| |
| def main(argv): |
| del argv # Unused. |
| |
| # Initialise Tink |
| signature.register() |
| |
| # Read the keyset into a keyset_handle |
| with open(FLAGS.keyset_path, 'rt') as keyset_file: |
| try: |
| text = keyset_file.read() |
| keyset_handle = cleartext_keyset_handle.read(tink.JsonKeysetReader(text)) |
| except tink.TinkError as e: |
| logging.exception('Error reading key: %s', e) |
| return 1 |
| |
| with open(FLAGS.data_path, 'rb') as data_file: |
| data = data_file.read() |
| |
| if FLAGS.mode == 'sign': |
| # Get the primitive |
| try: |
| cipher = keyset_handle.primitive(signature.PublicKeySign) |
| except tink.TinkError as e: |
| logging.exception('Error creating primitive: %s', e) |
| return 1 |
| |
| # Sign data |
| sig = cipher.sign(data) |
| with open(FLAGS.signature_path, 'wb') as signature_file: |
| signature_file.write(binascii.hexlify(sig)) |
| return 0 |
| |
| # Get the primitive |
| try: |
| cipher = keyset_handle.primitive(signature.PublicKeyVerify) |
| except tink.TinkError as e: |
| logging.exception('Error creating primitive: %s', e) |
| return 1 |
| |
| # Verify data |
| with open(FLAGS.signature_path, 'rb') as signature_file: |
| try: |
| expected_signature = binascii.unhexlify(signature_file.read().strip()) |
| except binascii.Error as e: |
| logging.exception('Error reading expected code: %s', e) |
| return 1 |
| try: |
| cipher.verify(expected_signature, data) |
| logging.info('Signature verification succeeded.') |
| return 0 |
| except binascii.Error as e: |
| logging.exception('Error reading expected signature: %s', e) |
| except tink.TinkError as e: |
| logging.info('Signature verification failed.') |
| return 1 |
| |
| |
| if __name__ == '__main__': |
| flags.mark_flags_as_required([ |
| 'mode', 'keyset_path', 'data_path', 'signature_path']) |
| app.run(main) |
| |
| # [END digital-signature-example] |