All Projects → jedisct1 → rsign2

jedisct1 / rsign2

Licence: MIT license
A command-line tool to sign files and verify signatures in pure Rust.

Programming Languages

rust
11053 projects

Projects that are alternatives of or similar to rsign2

rust-minisign
A pure Rust implementation of the Minisign signature tool.
Stars: ✭ 76 (-25.49%)
Mutual labels:  ed25519, signatures, minisign
Kryptor
A simple, modern, and secure encryption and signing tool that aims to be a better version of age and Minisign.
Stars: ✭ 267 (+161.76%)
Mutual labels:  ed25519, signatures
salty
25519 for Cortex-M4 microcontrollers
Stars: ✭ 50 (-50.98%)
Mutual labels:  ed25519, signatures
yara-parser
Tools for parsing rulesets using the exact grammar as YARA. Written in Go.
Stars: ✭ 69 (-32.35%)
Mutual labels:  signatures
ed25519
Dart port of ed25519 from Go Cryptography ed25519
Stars: ✭ 18 (-82.35%)
Mutual labels:  ed25519
nativescript-drawingpad
📝 NativeScript plugin to provide a way to capture any drawing (signatures are a common use case) from the device
Stars: ✭ 89 (-12.75%)
Mutual labels:  signatures
zig-eddsa-key-blinding
A Zig implementation of EdDSA signatures with blind keys.
Stars: ✭ 15 (-85.29%)
Mutual labels:  ed25519
iroha-ed25519
RFC8032 compatible Ed25519 implementation with pluggable hash (sha2-512, sha3-512)
Stars: ✭ 28 (-72.55%)
Mutual labels:  ed25519
signdocs
Full-stack clone of DocuSign
Stars: ✭ 58 (-43.14%)
Mutual labels:  signatures
ed25519-hd-key
🔐 Key Derivation for ed25519
Stars: ✭ 54 (-47.06%)
Mutual labels:  ed25519
cryptouri.rs
Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding
Stars: ✭ 33 (-67.65%)
Mutual labels:  signatures
libeddsa
cryptographic library for ed25519 and curve25519
Stars: ✭ 20 (-80.39%)
Mutual labels:  ed25519
httpsig
Golang implementation of the HTTP Signatures RFC draft, with SSH support!
Stars: ✭ 58 (-43.14%)
Mutual labels:  signatures
noble-ed25519
Fastest JS implementation of ed25519, x25519 & ristretto255. Independently audited, high-security, 0-dependency EDDSA signatures and ECDH key agreement
Stars: ✭ 220 (+115.69%)
Mutual labels:  ed25519
vegawallet
Command-line tool to manage your Vega Protocol wallet, a protocol for creating and trading derivatives on a fully decentralised network.
Stars: ✭ 64 (-37.25%)
Mutual labels:  ed25519
detection
Detection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (-31.37%)
Mutual labels:  signatures
yubihsm-rs
Pure Rust client for YubiHSM2 devices
Stars: ✭ 70 (-31.37%)
Mutual labels:  ed25519
rawr-x3dh
TypeScript Implementation of X3DH
Stars: ✭ 51 (-50%)
Mutual labels:  ed25519
AutomatedOutlookSignature
PowerShell script to automate the creation of Outlook signatures using Active Directory attributes.
Stars: ✭ 36 (-64.71%)
Mutual labels:  signatures
sig
Validate Method Arguments & Results in Ruby
Stars: ✭ 54 (-47.06%)
Mutual labels:  signatures

rsign2

A Rust implementation of Minisign.

All signatures produced by rsign can be verified with minisign including trusted comments.

And minisign is able to sign files with keys generated by rsign2.

In Rust, signatures can also be verified with the minisign-verify crate.

rsign2 is a maintained fork of rsign, originally written by Daniel Rangel.

Main differences with rsign:

  • rsign2 is written in pure Rust.
  • rsign2 has way less dependencies.
  • rsign2 includes bug fixes and improvements.
  • rsign2 tries to be usable as a library, not just as a command-line tool.
  • rsign2 supports WebAssembly.

API documentation

rsign2 is only a command-line interface. It relies on the Minisign crate, that can be embedded in any application:

API documentation on docs.rs

Usage

rsign generate

Generates a new key pair. The public key is printed in the screen and stored in rsign.pub by default. The secret key will be written at ~/.rsign/rsign.key. You can change the default paths with -p and -s respectively.

rsign sign myfile.txt

Sign myfile.txt with your secret key. You can add a signed trusted comment with:

rsign sign myfile.txt -t "my trusted comment"

If you are signing files larger than 1Gb you must use -H to first hash the file and sign the hash after that:

rsign sign mylargefile.bin -H

And to verify the signature with a given public key you can use:

rsign verify myfile.txt -p rsign.pub

Or if you have saved the signature file with a custom name other than myfile.txt.minisig and want to use a public key string you can use:

rsign verify myfile.txt -P [PUBLIC KEY STRING] -x mysignature.file

You can find more information using the help subcommand as in:

rsign help [SUBCOMMAND]

USAGE:
    rsign [SUBCOMMAND]

FLAGS:
    -h, --help       Prints help information
    -V, --version    Prints version information

SUBCOMMANDS:
    generate    Generate public and private keys
    help        Prints this message or the help of the given subcommand(s)
    sign        Sign a file with a given private key
    verify      Verify a signed file with a given public key
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].