blob: 6f91cf37e27312fbe36e99ebe035e1d9d6f82506 [file] [log] [blame] [edit]
/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "2common.h"
#include "2sha.h"
#include "2sysincludes.h"
#include "host_common.h"
#include "host_signature21.h"
#include "signature_digest.h"
static void usage(char* argv[]) {
fprintf(stderr,
"Usage: %s <alg_id> <digest_file>\n"
"\n"
"Generate a padded hash suitable for generating PKCS#1.5 "
"signatures.\n",
basename(argv[0]));
}
int main(int argc, char* argv[])
{
int algorithm = -1;
int error_code = -1;
uint8_t* digest = NULL;
uint8_t* padded_digest = NULL;
uint32_t len;
if (argc != 3) {
usage(argv);
goto cleanup;
}
algorithm = atoi(argv[1]);
if (algorithm < 0 || algorithm >= VB2_ALG_COUNT) {
fprintf(stderr, "Invalid Algorithm!\n");
goto cleanup;
}
enum vb2_hash_algorithm hash_alg = vb2_crypto_to_hash(algorithm);
uint32_t digest_size = vb2_digest_size(hash_alg);
uint32_t digestinfo_size = 0;
const uint8_t* digestinfo = NULL;
if (VB2_SUCCESS != vb2_digest_info(hash_alg, &digestinfo,
&digestinfo_size)) {
fprintf(stderr, "SignatureBuf(): Couldn't get digest info\n");
goto cleanup;
}
uint32_t padded_digest_len = digest_size + digestinfo_size;
if (VB2_SUCCESS != vb2_read_file(argv[2], &digest, &len)) {
fprintf(stderr, "Could not read file: %s\n", argv[2]);
goto cleanup;
}
padded_digest = PrependDigestInfo(hash_alg, digest);
if(padded_digest &&
fwrite(padded_digest, padded_digest_len, 1, stdout) == 1)
error_code = 0;
cleanup:
free(padded_digest);
free(digest);
return error_code;
}