Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1)

Side by Side Diff: src/platform/vboot_reference/utils/kernel_image.c

Issue 858008: VBoot Reference: Fix many memory leaks. (Closed)
Patch Set: Created 10 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be 2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file. 3 * found in the LICENSE file.
4 * 4 *
5 * Functions for generating and manipulating a verified boot kernel image. 5 * Functions for generating and manipulating a verified boot kernel image.
6 */ 6 */
7 7
8 #include "kernel_image.h" 8 #include "kernel_image.h"
9 9
10 #include <fcntl.h> 10 #include <fcntl.h>
(...skipping 482 matching lines...) Expand 10 before | Expand all | Expand 10 after
493 FIELD_LEN(kernel_key_version)); 493 FIELD_LEN(kernel_key_version));
494 kernel_sign_key = RSAPublicKeyFromBuf(kernel_sign_key_ptr, 494 kernel_sign_key = RSAPublicKeyFromBuf(kernel_sign_key_ptr,
495 kernel_sign_key_len); 495 kernel_sign_key_len);
496 kernel_signature_len = siglen_map[kernel_sign_algorithm]; 496 kernel_signature_len = siglen_map[kernel_sign_algorithm];
497 kernel_key_signature_len = siglen_map[firmware_sign_algorithm]; 497 kernel_key_signature_len = siglen_map[firmware_sign_algorithm];
498 498
499 /* Only continue if config verification succeeds. */ 499 /* Only continue if config verification succeeds. */
500 config_ptr = (header_ptr + header_len + kernel_key_signature_len); 500 config_ptr = (header_ptr + header_len + kernel_key_signature_len);
501 if ((error_code = VerifyKernelConfig(kernel_sign_key, config_ptr, 501 if ((error_code = VerifyKernelConfig(kernel_sign_key, config_ptr,
502 kernel_sign_algorithm, 502 kernel_sign_algorithm,
503 &kernel_len))) 503 &kernel_len))) {
504 RSAPublicKeyFree(kernel_sign_key);
504 return error_code; /* AKA jump to recovery. */ 505 return error_code; /* AKA jump to recovery. */
506 }
505 /* Only continue if kernel data verification succeeds. */ 507 /* Only continue if kernel data verification succeeds. */
506 kernel_ptr = (config_ptr + 508 kernel_ptr = (config_ptr +
507 FIELD_LEN(kernel_version) + 509 FIELD_LEN(kernel_version) +
508 FIELD_LEN(options.version) + 510 FIELD_LEN(options.version) +
509 FIELD_LEN(options.kernel_len) + 511 FIELD_LEN(options.kernel_len) +
510 FIELD_LEN(options.kernel_entry_addr) + 512 FIELD_LEN(options.kernel_entry_addr) +
511 FIELD_LEN(options.kernel_load_addr) + 513 FIELD_LEN(options.kernel_load_addr) +
512 kernel_signature_len); 514 kernel_signature_len);
513 515
514 if ((error_code = VerifyKernelData(kernel_sign_key, kernel_ptr, kernel_len, 516 if ((error_code = VerifyKernelData(kernel_sign_key, kernel_ptr, kernel_len,
515 kernel_sign_algorithm))) 517 kernel_sign_algorithm))) {
518 RSAPublicKeyFree(kernel_sign_key);
516 return error_code; /* AKA jump to recovery. */ 519 return error_code; /* AKA jump to recovery. */
520 }
521 RSAPublicKeyFree(kernel_sign_key);
517 return 0; /* Success! */ 522 return 0; /* Success! */
518 } 523 }
519 524
520 int VerifyKernelImage(const RSAPublicKey* firmware_key, 525 int VerifyKernelImage(const RSAPublicKey* firmware_key,
521 const KernelImage* image, 526 const KernelImage* image,
522 const int dev_mode) { 527 const int dev_mode) {
523 RSAPublicKey* kernel_sign_key; 528 RSAPublicKey* kernel_sign_key = NULL;
524 uint8_t* header_digest = NULL; 529 uint8_t* header_digest = NULL;
525 uint8_t* config_digest = NULL; 530 uint8_t* config_digest = NULL;
526 uint8_t* kernel_digest = NULL; 531 uint8_t* kernel_digest = NULL;
527 int kernel_sign_key_size; 532 int kernel_sign_key_size;
528 int kernel_signature_size; 533 int kernel_signature_size;
529 int error_code = 0; 534 int error_code = 0;
530 DigestContext ctx; 535 DigestContext ctx;
531 536
532 if (!image) 537 if (!image)
533 return VERIFY_KERNEL_INVALID_IMAGE; 538 return VERIFY_KERNEL_INVALID_IMAGE;
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after
603 image->options.kernel_len, 608 image->options.kernel_len,
604 image->kernel_sign_algorithm); 609 image->kernel_sign_algorithm);
605 if (!RSAVerify(kernel_sign_key, image->kernel_signature, 610 if (!RSAVerify(kernel_sign_key, image->kernel_signature,
606 kernel_signature_size, image->kernel_sign_algorithm, 611 kernel_signature_size, image->kernel_sign_algorithm,
607 kernel_digest)) { 612 kernel_digest)) {
608 error_code = VERIFY_KERNEL_SIGNATURE_FAILED; 613 error_code = VERIFY_KERNEL_SIGNATURE_FAILED;
609 goto verify_failure; 614 goto verify_failure;
610 } 615 }
611 616
612 verify_failure: 617 verify_failure:
618 RSAPublicKeyFree(kernel_sign_key);
613 Free(kernel_digest); 619 Free(kernel_digest);
614 Free(config_digest); 620 Free(config_digest);
615 Free(header_digest); 621 Free(header_digest);
616 return error_code; 622 return error_code;
617 } 623 }
618 624
619 const char* VerifyKernelErrorString(int error) { 625 const char* VerifyKernelErrorString(int error) {
620 return kVerifyKernelErrors[error]; 626 return kVerifyKernelErrors[error];
621 } 627 }
622 628
623 int AddKernelKeySignature(KernelImage* image, const char* firmware_key_file) { 629 int AddKernelKeySignature(KernelImage* image, const char* firmware_key_file) {
624 uint8_t* header_blob = NULL; 630 uint8_t* header_blob = NULL;
625 uint8_t* signature; 631 uint8_t* signature = NULL;
626 int signature_len = siglen_map[image->firmware_sign_algorithm]; 632 int signature_len = siglen_map[image->firmware_sign_algorithm];
627 if (!image || !firmware_key_file) 633 if (!image || !firmware_key_file)
628 return 0; 634 return 0;
629 header_blob = GetKernelHeaderBlob(image); 635 header_blob = GetKernelHeaderBlob(image);
630 if (!header_blob) 636 if (!header_blob)
631 return 0; 637 return 0;
632 if (!(signature = SignatureBuf(header_blob, 638 if (!(signature = SignatureBuf(header_blob,
633 GetKernelHeaderLen(image), 639 GetKernelHeaderLen(image),
634 firmware_key_file, 640 firmware_key_file,
635 image->firmware_sign_algorithm))) { 641 image->firmware_sign_algorithm))) {
636 Free(header_blob); 642 Free(header_blob);
637 return 0; 643 return 0;
638 } 644 }
639 image->kernel_key_signature = Malloc(signature_len); 645 image->kernel_key_signature = Malloc(signature_len);
640 Memcpy(image->kernel_key_signature, signature, signature_len); 646 Memcpy(image->kernel_key_signature, signature, signature_len);
641 Free(signature); 647 Free(signature);
642 Free(header_blob); 648 Free(header_blob);
643 return 1; 649 return 1;
644 } 650 }
645 651
646 int AddKernelSignature(KernelImage* image, 652 int AddKernelSignature(KernelImage* image,
647 const char* kernel_signing_key_file) { 653 const char* kernel_signing_key_file) {
648 uint8_t* config_blob; 654 uint8_t* config_blob = NULL;
649 uint8_t* config_signature; 655 uint8_t* config_signature = NULL;
650 uint8_t* kernel_signature; 656 uint8_t* kernel_signature = NULL;
651 int signature_len = siglen_map[image->kernel_sign_algorithm]; 657 int signature_len = siglen_map[image->kernel_sign_algorithm];
652 658
653 config_blob = GetKernelConfigBlob(image); 659 config_blob = GetKernelConfigBlob(image);
654 if (!(config_signature = SignatureBuf(config_blob, 660 if (!(config_signature = SignatureBuf(config_blob,
655 GetKernelConfigLen(image), 661 GetKernelConfigLen(image),
656 kernel_signing_key_file, 662 kernel_signing_key_file,
657 image->kernel_sign_algorithm))) { 663 image->kernel_sign_algorithm))) {
658 fprintf(stderr, "Could not compute signature on the kernel config.\n"); 664 fprintf(stderr, "Could not compute signature on the kernel config.\n");
659 Free(config_blob); 665 Free(config_blob);
660 return 0; 666 return 0;
661 } 667 }
668 Free(config_blob);
662 669
663 image->config_signature = (uint8_t*) Malloc(signature_len); 670 image->config_signature = (uint8_t*) Malloc(signature_len);
664 Memcpy(image->config_signature, config_signature, signature_len); 671 Memcpy(image->config_signature, config_signature, signature_len);
665 Free(config_signature); 672 Free(config_signature);
666 673
667 if (!(kernel_signature = SignatureBuf(image->kernel_data, 674 if (!(kernel_signature = SignatureBuf(image->kernel_data,
668 image->options.kernel_len, 675 image->options.kernel_len,
669 kernel_signing_key_file, 676 kernel_signing_key_file,
670 image->kernel_sign_algorithm))) { 677 image->kernel_sign_algorithm))) {
671 fprintf(stderr, "Could not compute signature on the kernel.\n"); 678 fprintf(stderr, "Could not compute signature on the kernel.\n");
672 return 0; 679 return 0;
673 } 680 }
674 image->kernel_signature = (uint8_t*) Malloc(signature_len); 681 image->kernel_signature = (uint8_t*) Malloc(signature_len);
675 Memcpy(image->kernel_signature, kernel_signature, signature_len); 682 Memcpy(image->kernel_signature, kernel_signature, signature_len);
676 Free(kernel_signature); 683 Free(kernel_signature);
677 return 1; 684 return 1;
678 } 685 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698