1322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah * Use of this source code is governed by a BSD-style license that can be
3322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah * found in the LICENSE file.
4322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah */
5322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
6322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah/* Routines for verifying a file's signature. Useful in testing the core
7322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah * RSA verification implementation.
8322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah */
9322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
10322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <fcntl.h>
11322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <stdio.h>
12322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <stdlib.h>
13322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <string.h>
14322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <sys/stat.h>
15322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <sys/types.h>
16322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <unistd.h>
17322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
185411c7a9f03f91bf2c1cd1cf852db9d4585a05c9Gaurav Shah#include "cryptolib.h"
19431b98886ed80b46e404d7288362f8dcdfa9ace3Gaurav Shah#include "file_keys.h"
20322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include "verify_data.h"
21322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
2208df9b88a36b7a351305a06b2849c5fcdac54135Gaurav Shah/* ANSI Color coding sequences. */
2308df9b88a36b7a351305a06b2849c5fcdac54135Gaurav Shah#define COL_GREEN "\e[1;32m"
24fc70d72aaab4d558e39ec43832375267603bfd93Gaurav Shah#define COL_RED "\e[0;31m"
2508df9b88a36b7a351305a06b2849c5fcdac54135Gaurav Shah#define COL_STOP "\e[m"
2608df9b88a36b7a351305a06b2849c5fcdac54135Gaurav Shah
27e178fd9e34e613955310d77199235a1fa90b9885Gaurav Shahuint8_t* read_signature(char* input_file, int len) {
28322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  int i, sigfd;
29e178fd9e34e613955310d77199235a1fa90b9885Gaurav Shah  uint8_t* signature = NULL;
30322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  if ((sigfd = open(input_file, O_RDONLY)) == -1) {
31322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    fprintf(stderr, "Couldn't open signature file\n");
32322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    return NULL;
33322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  }
34322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
35322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  /* Read the signature into a buffer*/
36322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  signature = (uint8_t*) malloc(len);
37322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  if (!signature)
38322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    return NULL;
39322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
40322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  if( (i = read(sigfd, signature, len)) != len ) {
41322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    fprintf(stderr, "Wrong signature length - Expected = %d, Received = %d\n",
42322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah            len, i);
43322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    close(sigfd);
44322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    return NULL;
45322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  }
46322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
47322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  close(sigfd);
48322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  return signature;
49322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah}
50322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
51322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shahint main(int argc, char* argv[]) {
52322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  int i, algorithm, sig_len;
536f555397b1b59404e7b4d78aed884acf26d5e50fGaurav Shah  int return_code = 1;  /* Default to error. */
54e178fd9e34e613955310d77199235a1fa90b9885Gaurav Shah  uint8_t* digest = NULL;
55e178fd9e34e613955310d77199235a1fa90b9885Gaurav Shah  uint8_t* signature = NULL;
56322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  RSAPublicKey* key = NULL;
57322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
58322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  if (argc!=5) {
59322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    fprintf(stderr, "Usage: %s <algorithm> <key file> <signature file>"
60322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah            " <input file>\n\n", argv[0]);
61322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    fprintf(stderr, "where <algorithm> depends on the signature algorithm"
62322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah            " used:\n");
63322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    for(i = 0; i<kNumAlgorithms; i++)
64322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah      fprintf(stderr, "\t%d for %s\n", i, algo_strings[i]);
65322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    return -1;
66322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  }
67322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
68322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  algorithm = atoi(argv[1]);
69322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  if (algorithm >= kNumAlgorithms) {
70322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    fprintf(stderr, "Invalid Algorithm!\n");
71322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah    return 0;
72322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  }
73322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  /* Length of the RSA Signature/RSA Key */
74f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah  sig_len = siglen_map[algorithm];
75f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah  if ((key = RSAPublicKeyFromFile(argv[2])) &&
76f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah      (signature = read_signature(argv[3], sig_len)) &&
77f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah      (digest = DigestFile(argv[4], algorithm))) {
78f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah    if (RSAVerify(key, signature, sig_len, algorithm, digest)) {
79f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah      return_code = 0;
80f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah      fprintf(stderr, "Signature Verification "
81f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah              COL_GREEN "SUCCEEDED" COL_STOP "\n");
82f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah    } else {
83f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah      fprintf(stderr, "Signature Verification "
84f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah              COL_RED "FAILED" COL_STOP "\n");
85f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah    }
866f555397b1b59404e7b4d78aed884acf26d5e50fGaurav Shah  }
87f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah  else
88f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah    return_code = -1;
89322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
90322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  free(key);
91322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  free(signature);
92322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah  free(digest);
93322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah
946f555397b1b59404e7b4d78aed884acf26d5e50fGaurav Shah  return return_code;
95322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah}
96