package main
import (
- "crypto/subtle"
+ "bytes"
"flag"
"fmt"
"log"
if *egdPath != "" {
govpn.EGDInit(*egdPath)
}
+ key, err := govpn.KeyRead(*keyPath)
+ if err != nil {
+ log.Fatalln("Unable to read the key", err)
+ }
if *verifier == "" {
id := new([govpn.IDSize]byte)
if _, err := govpn.Rand.Read(id[:]); err != nil {
}
pid := govpn.PeerId(*id)
v := govpn.VerifierNew(*mOpt, *tOpt, *pOpt, &pid)
- v.PasswordApply(govpn.StringFromFile(*keyPath))
+ v.PasswordApply(key)
fmt.Println(v.LongForm())
fmt.Println(v.ShortForm())
return
log.Fatalln("Verifier does not contain public key")
}
pub := *v.Pub
- v.PasswordApply(govpn.StringFromFile(*keyPath))
- fmt.Println(subtle.ConstantTimeCompare(v.Pub[:], pub[:]) == 1)
+ v.PasswordApply(key)
+ fmt.Println(bytes.Equal(v.Pub[:], pub[:]))
}