1322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 2322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah * Use of this source code is governed by a BSD-style license that can be 3322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah * found in the LICENSE file. 4322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah */ 5322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 6322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah/* Routines for verifying a file's signature. Useful in testing the core 7322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah * RSA verification implementation. 8322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah */ 9322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 10322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <fcntl.h> 11322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <stdio.h> 12322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <stdlib.h> 13322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <string.h> 14322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <sys/stat.h> 15322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <sys/types.h> 16322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include <unistd.h> 17322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 185411c7a9f03f91bf2c1cd1cf852db9d4585a05c9Gaurav Shah#include "cryptolib.h" 19431b98886ed80b46e404d7288362f8dcdfa9ace3Gaurav Shah#include "file_keys.h" 20322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah#include "verify_data.h" 21322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 2208df9b88a36b7a351305a06b2849c5fcdac54135Gaurav Shah/* ANSI Color coding sequences. */ 2308df9b88a36b7a351305a06b2849c5fcdac54135Gaurav Shah#define COL_GREEN "\e[1;32m" 24fc70d72aaab4d558e39ec43832375267603bfd93Gaurav Shah#define COL_RED "\e[0;31m" 2508df9b88a36b7a351305a06b2849c5fcdac54135Gaurav Shah#define COL_STOP "\e[m" 2608df9b88a36b7a351305a06b2849c5fcdac54135Gaurav Shah 27e178fd9e34e613955310d77199235a1fa90b9885Gaurav Shahuint8_t* read_signature(char* input_file, int len) { 28322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah int i, sigfd; 29e178fd9e34e613955310d77199235a1fa90b9885Gaurav Shah uint8_t* signature = NULL; 30322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah if ((sigfd = open(input_file, O_RDONLY)) == -1) { 31322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah fprintf(stderr, "Couldn't open signature file\n"); 32322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah return NULL; 33322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah } 34322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 35322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah /* Read the signature into a buffer*/ 36322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah signature = (uint8_t*) malloc(len); 37322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah if (!signature) 38322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah return NULL; 39322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 40322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah if( (i = read(sigfd, signature, len)) != len ) { 41322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah fprintf(stderr, "Wrong signature length - Expected = %d, Received = %d\n", 42322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah len, i); 43322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah close(sigfd); 44322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah return NULL; 45322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah } 46322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 47322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah close(sigfd); 48322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah return signature; 49322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah} 50322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 51322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shahint main(int argc, char* argv[]) { 52322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah int i, algorithm, sig_len; 536f555397b1b59404e7b4d78aed884acf26d5e50fGaurav Shah int return_code = 1; /* Default to error. */ 54e178fd9e34e613955310d77199235a1fa90b9885Gaurav Shah uint8_t* digest = NULL; 55e178fd9e34e613955310d77199235a1fa90b9885Gaurav Shah uint8_t* signature = NULL; 56322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah RSAPublicKey* key = NULL; 57322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 58322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah if (argc!=5) { 59322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah fprintf(stderr, "Usage: %s <algorithm> <key file> <signature file>" 60322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah " <input file>\n\n", argv[0]); 61322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah fprintf(stderr, "where <algorithm> depends on the signature algorithm" 62322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah " used:\n"); 63322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah for(i = 0; i<kNumAlgorithms; i++) 64322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah fprintf(stderr, "\t%d for %s\n", i, algo_strings[i]); 65322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah return -1; 66322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah } 67322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 68322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah algorithm = atoi(argv[1]); 69322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah if (algorithm >= kNumAlgorithms) { 70322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah fprintf(stderr, "Invalid Algorithm!\n"); 71322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah return 0; 72322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah } 73322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah /* Length of the RSA Signature/RSA Key */ 74f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah sig_len = siglen_map[algorithm]; 75f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah if ((key = RSAPublicKeyFromFile(argv[2])) && 76f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah (signature = read_signature(argv[3], sig_len)) && 77f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah (digest = DigestFile(argv[4], algorithm))) { 78f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah if (RSAVerify(key, signature, sig_len, algorithm, digest)) { 79f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah return_code = 0; 80f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah fprintf(stderr, "Signature Verification " 81f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah COL_GREEN "SUCCEEDED" COL_STOP "\n"); 82f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah } else { 83f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah fprintf(stderr, "Signature Verification " 84f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah COL_RED "FAILED" COL_STOP "\n"); 85f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah } 866f555397b1b59404e7b4d78aed884acf26d5e50fGaurav Shah } 87f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah else 88f5564fa98c7e37b6644b92993894ebbe56306f4cGaurav Shah return_code = -1; 89322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 90322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah free(key); 91322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah free(signature); 92322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah free(digest); 93322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah 946f555397b1b59404e7b4d78aed884acf26d5e50fGaurav Shah return return_code; 95322536d2f9d30f42218cc9f2ab40574557da8a9Gaurav Shah} 96