/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. * Use of this source code is governed by a BSD-style license that can be * found in the LICENSE file. * * Utility functions for file and key handling. */ #include #include #include #include #include #include #include #include "cryptolib.h" #include "file_keys.h" #include "host_common.h" #include "signature_digest.h" uint8_t* BufferFromFile(const char* input_file, uint64_t* len) { int fd; struct stat stat_fd; uint8_t* buf = NULL; if ((fd = open(input_file, O_RDONLY)) == -1) { VBDEBUG(("Couldn't open file %s\n", input_file)); return NULL; } if (-1 == fstat(fd, &stat_fd)) { VBDEBUG(("Couldn't stat file %s\n", input_file)); return NULL; } *len = stat_fd.st_size; buf = (uint8_t*)malloc(*len); if (!buf) { VbExError("Couldn't allocate %ld bytes for file %s\n", *len, input_file); return NULL; } if (*len != read(fd, buf, *len)) { VBDEBUG(("Couldn't read file %s into a buffer\n", input_file)); return NULL; } close(fd); return buf; } RSAPublicKey* RSAPublicKeyFromFile(const char* input_file) { uint64_t len; RSAPublicKey* key = NULL; uint8_t* buf = BufferFromFile(input_file, &len); if (buf) key = RSAPublicKeyFromBuf(buf, len); free(buf); return key; } uint8_t* DigestFile(char* input_file, int sig_algorithm) { int input_fd, len; uint8_t data[SHA1_BLOCK_SIZE]; uint8_t* digest = NULL; DigestContext ctx; if( (input_fd = open(input_file, O_RDONLY)) == -1 ) { VBDEBUG(("Couldn't open %s\n", input_file)); return NULL; } DigestInit(&ctx, sig_algorithm); while ( (len = read(input_fd, data, SHA1_BLOCK_SIZE)) == SHA1_BLOCK_SIZE) DigestUpdate(&ctx, data, len); if (len != -1) DigestUpdate(&ctx, data, len); digest = DigestFinal(&ctx); close(input_fd); return digest; }