aboutsummaryrefslogtreecommitdiffstats
path: root/examples/vrfy.sig
blob: 84bcfccfe4a9dddadd8680d0e2ba53c3f4a3d203 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
#!/usr/local/lua52/bin/lua
--
-- Example public-key signature verification.
--

local keytype = ...

local openssl = require"openssl"
local pkey = require"openssl.pkey"
local digest = require"openssl.digest"

-- generate a public/private key pair
local function genkey(type)
	type = string.upper(type or (not openssl.NO_EC and "EC") or "RSA")

	if type == "RSA" then
		return pkey.new{ type = "RSA", bits = 1024 }
	elseif type == "DSA" then
		return pkey.new{ type = "DSA", bits = 1024 }
	else
		return pkey.new{ type = "EC", curve = "prime192v1" }
	end
end

local key = genkey(keytype)
local hash = key:getDefaultDigestName()

-- digest our message using an appropriate digest ("ecdsa-with-SHA1" for EC;
-- "dss1" for DSA; and "sha1", "sha256", etc for RSA).
local data = digest.new(hash)
data:update(... or "hello world")

-- generate a signature for our data
local sig = key:sign(data)

-- to prove verification works, instantiate a new object holding just
-- the public key
local pub = pkey.new(key:toPEM"public")

-- a utility routine to output our signature
local function tohex(b)
	local x = ""
	for i = 1, #b do
		x = x .. string.format("%.2x", string.byte(b, i))
	end
	return x
end

print("verified", pub:verify(sig, data))
print("key-type", pub:type())
print("hash-type", hash)
print("signature", tohex(sig))