summaryrefslogtreecommitdiff
path: root/one.cpp
diff options
context:
space:
mode:
authorAdam Ierymenko <adam.ierymenko@gmail.com>2018-04-23 14:11:26 -0700
committerAdam Ierymenko <adam.ierymenko@gmail.com>2018-04-23 14:11:26 -0700
commitf12c0e79c9c9d0a53a2c4e346a5915e0433099fa (patch)
tree811f835a55bdfcea1e299d447ebd8cbbb9a04224 /one.cpp
parent86637cda9ff404d0021a987361e52f8a15ad5744 (diff)
downloadinfinitytier-f12c0e79c9c9d0a53a2c4e346a5915e0433099fa.tar.gz
infinitytier-f12c0e79c9c9d0a53a2c4e346a5915e0433099fa.zip
GitHub issue #723
Diffstat (limited to 'one.cpp')
-rw-r--r--one.cpp17
1 files changed, 14 insertions, 3 deletions
diff --git a/one.cpp b/one.cpp
index 06944494..9ebc83c1 100644
--- a/one.cpp
+++ b/one.cpp
@@ -822,7 +822,7 @@ static int idtool(int argc,char **argv)
char hexbuf[1024];
printf("%s",Utils::hex(signature.data,ZT_C25519_SIGNATURE_LEN,hexbuf));
} else if (!strcmp(argv[1],"verify")) {
- if (argc < 4) {
+ if (argc < 5) {
idtoolPrintHelp(stdout,argv[0]);
return 1;
}
@@ -844,8 +844,19 @@ static int idtool(int argc,char **argv)
if ((signature.length() > ZT_ADDRESS_LENGTH)&&(id.verify(inf.data(),(unsigned int)inf.length(),signature.data(),(unsigned int)signature.length()))) {
printf("%s signature valid" ZT_EOL_S,argv[3]);
} else {
- fprintf(stderr,"%s signature check FAILED" ZT_EOL_S,argv[3]);
- return 1;
+ signature.clear();
+ if (OSUtils::readFile(argv[4],signature)) {
+ signature.assign(buf,Utils::unhex(signature.c_str(),buf,(unsigned int)sizeof(buf)));
+ if ((signature.length() > ZT_ADDRESS_LENGTH)&&(id.verify(inf.data(),(unsigned int)inf.length(),signature.data(),(unsigned int)signature.length()))) {
+ printf("%s signature valid" ZT_EOL_S,argv[3]);
+ } else {
+ fprintf(stderr,"%s signature check FAILED" ZT_EOL_S,argv[3]);
+ return 1;
+ }
+ } else {
+ fprintf(stderr,"%s signature check FAILED" ZT_EOL_S,argv[3]);
+ return 1;
+ }
}
} else if (!strcmp(argv[1],"initmoon")) {
if (argc < 3) {