/* Copyright 2011 The ChromiumOS Authors * Use of this source code is governed by a BSD-style license that can be * found in the LICENSE file. */ #include #include #include #include "2common.h" #include "2sha.h" #include "2sysincludes.h" #include "host_common.h" #include "host_signature21.h" #include "signature_digest.h" static void usage(char* argv[]) { fprintf(stderr, "Usage: %s \n" "\n" "Generate a padded hash suitable for generating PKCS#1.5 " "signatures.\n", basename(argv[0])); } int main(int argc, char* argv[]) { int algorithm = -1; int error_code = -1; uint8_t* digest = NULL; uint8_t* padded_digest = NULL; uint32_t len; if (argc != 3) { usage(argv); goto cleanup; } algorithm = atoi(argv[1]); if (algorithm < 0 || algorithm >= VB2_ALG_COUNT) { fprintf(stderr, "Invalid Algorithm!\n"); goto cleanup; } enum vb2_hash_algorithm hash_alg = vb2_crypto_to_hash(algorithm); uint32_t digest_size = vb2_digest_size(hash_alg); uint32_t digestinfo_size = 0; const uint8_t* digestinfo = NULL; if (VB2_SUCCESS != vb2_digest_info(hash_alg, &digestinfo, &digestinfo_size)) { fprintf(stderr, "SignatureBuf(): Couldn't get digest info\n"); goto cleanup; } uint32_t padded_digest_len = digest_size + digestinfo_size; if (VB2_SUCCESS != vb2_read_file(argv[2], &digest, &len)) { fprintf(stderr, "Could not read file: %s\n", argv[2]); goto cleanup; } padded_digest = PrependDigestInfo(hash_alg, digest); if (padded_digest && fwrite(padded_digest, padded_digest_len, 1, stdout) == 1) error_code = 0; cleanup: free(padded_digest); free(digest); return error_code; }