| OLD | NEW |
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 */ | 4 */ |
| 5 | 5 |
| 6 #include "signature_digest.h" | 6 #include "signature_digest.h" |
| 7 #define OPENSSL_NO_SHA | 7 #define OPENSSL_NO_SHA |
| 8 #include <openssl/engine.h> | 8 #include <openssl/engine.h> |
| 9 #include <openssl/pem.h> | 9 #include <openssl/pem.h> |
| 10 #include <openssl/rsa.h> | 10 #include <openssl/rsa.h> |
| 11 | 11 |
| 12 #include <stdio.h> | 12 #include <stdio.h> |
| 13 #include <stdlib.h> | 13 #include <stdlib.h> |
| 14 #include <unistd.h> | 14 #include <unistd.h> |
| 15 | 15 |
| 16 #include "cryptolib.h" | 16 #include "cryptolib.h" |
| 17 #include "utility.h" | 17 #include "utility.h" |
| 18 | 18 |
| 19 uint8_t* PrependDigestInfo(int algorithm, uint8_t* digest) { | 19 uint8_t* PrependDigestInfo(unsigned int algorithm, uint8_t* digest) { |
| 20 const int digest_size = hash_size_map[algorithm]; | 20 const int digest_size = hash_size_map[algorithm]; |
| 21 const int digestinfo_size = digestinfo_size_map[algorithm]; | 21 const int digestinfo_size = digestinfo_size_map[algorithm]; |
| 22 const uint8_t* digestinfo = hash_digestinfo_map[algorithm]; | 22 const uint8_t* digestinfo = hash_digestinfo_map[algorithm]; |
| 23 uint8_t* p = Malloc(digestinfo_size + digest_size); | 23 uint8_t* p = Malloc(digestinfo_size + digest_size); |
| 24 Memcpy(p, digestinfo, digestinfo_size); | 24 Memcpy(p, digestinfo, digestinfo_size); |
| 25 Memcpy(p + digestinfo_size, digest, digest_size); | 25 Memcpy(p + digestinfo_size, digest, digest_size); |
| 26 return p; | 26 return p; |
| 27 } | 27 } |
| 28 | 28 |
| 29 uint8_t* SignatureDigest(const uint8_t* buf, uint64_t len, int algorithm) { | 29 uint8_t* SignatureDigest(const uint8_t* buf, uint64_t len, |
| 30 unsigned int algorithm) { |
| 30 uint8_t* info_digest = NULL; | 31 uint8_t* info_digest = NULL; |
| 31 uint8_t* digest = NULL; | 32 uint8_t* digest = NULL; |
| 32 | 33 |
| 33 if (algorithm >= kNumAlgorithms) { | 34 if (algorithm >= kNumAlgorithms) { |
| 34 VBDEBUG(("SignatureDigest() called with invalid algorithm!\n")); | 35 VBDEBUG(("SignatureDigest() called with invalid algorithm!\n")); |
| 35 } else if ((digest = DigestBuf(buf, len, algorithm))) { | 36 } else if ((digest = DigestBuf(buf, len, algorithm))) { |
| 36 info_digest = PrependDigestInfo(algorithm, digest); | 37 info_digest = PrependDigestInfo(algorithm, digest); |
| 37 } | 38 } |
| 38 Free(digest); | 39 Free(digest); |
| 39 return info_digest; | 40 return info_digest; |
| 40 } | 41 } |
| 41 | 42 |
| 42 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file, | 43 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file, |
| 43 int algorithm) { | 44 unsigned int algorithm) { |
| 44 FILE* key_fp = NULL; | 45 FILE* key_fp = NULL; |
| 45 RSA* key = NULL; | 46 RSA* key = NULL; |
| 46 uint8_t* signature = NULL; | 47 uint8_t* signature = NULL; |
| 47 uint8_t* signature_digest = SignatureDigest(buf, len, algorithm); | 48 uint8_t* signature_digest = SignatureDigest(buf, len, algorithm); |
| 48 int signature_digest_len = (hash_size_map[algorithm] + | 49 int signature_digest_len = (hash_size_map[algorithm] + |
| 49 digestinfo_size_map[algorithm]); | 50 digestinfo_size_map[algorithm]); |
| 50 key_fp = fopen(key_file, "r"); | 51 key_fp = fopen(key_file, "r"); |
| 51 if (!key_fp) { | 52 if (!key_fp) { |
| 52 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file)); | 53 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file)); |
| 53 Free(signature_digest); | 54 Free(signature_digest); |
| (...skipping 11 matching lines...) Expand all Loading... |
| 65 key, /* Key to use. */ | 66 key, /* Key to use. */ |
| 66 RSA_PKCS1_PADDING)) /* Padding to use. */ | 67 RSA_PKCS1_PADDING)) /* Padding to use. */ |
| 67 VBDEBUG(("SignatureBuf(): RSA_private_encrypt() failed.\n")); | 68 VBDEBUG(("SignatureBuf(): RSA_private_encrypt() failed.\n")); |
| 68 } | 69 } |
| 69 fclose(key_fp); | 70 fclose(key_fp); |
| 70 if (key) | 71 if (key) |
| 71 RSA_free(key); | 72 RSA_free(key); |
| 72 Free(signature_digest); | 73 Free(signature_digest); |
| 73 return signature; | 74 return signature; |
| 74 } | 75 } |
| OLD | NEW |