|
6 | 6 |
|
7 | 7 | #include <glog/logging.h>
|
8 | 8 | #include <openssl/pem.h>
|
| 9 | +#include <openssl/evp.h> |
9 | 10 |
|
10 | 11 | #include "update_engine/delta_diff_generator.h"
|
11 | 12 | #include "update_engine/delta_metadata.h"
|
@@ -292,27 +293,44 @@ bool PayloadSigner::GetRawHashFromSignature(
|
292 | 293 | }
|
293 | 294 |
|
294 | 295 | char dummy_password[] = { ' ', 0 }; // Ensure no password is read from stdin.
|
295 |
| - RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, NULL, NULL, dummy_password); |
| 296 | + EVP_PKEY* pkey = PEM_read_PUBKEY(fpubkey, NULL, NULL, dummy_password); |
296 | 297 | fclose(fpubkey);
|
297 |
| - TEST_AND_RETURN_FALSE(rsa != NULL); |
298 |
| - unsigned int keysize = RSA_size(rsa); |
| 298 | + TEST_AND_RETURN_FALSE(pkey != NULL); |
| 299 | + size_t keysize = EVP_PKEY_get_size(pkey); |
299 | 300 | if (sig_data.size() > 2 * keysize) {
|
300 | 301 | LOG(ERROR) << "Signature size is too big for public key size.";
|
301 |
| - RSA_free(rsa); |
| 302 | + EVP_PKEY_free(pkey); |
302 | 303 | return false;
|
303 | 304 | }
|
304 | 305 |
|
305 |
| - // Decrypts the signature. |
306 | 306 | vector<char> hash_data(keysize);
|
307 |
| - int decrypt_size = RSA_public_decrypt( |
308 |
| - sig_data.size(), |
309 |
| - reinterpret_cast<const unsigned char*>(sig_data.data()), |
| 307 | + |
| 308 | + // Decrypts the signature. |
| 309 | + EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new(pkey, NULL); |
| 310 | + if (!ctx |
| 311 | + || EVP_PKEY_verify_recover_init(ctx) <= 0 |
| 312 | + || EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_NO_PADDING) <= 0 |
| 313 | + || EVP_PKEY_CTX_set_signature_md(ctx, EVP_sha256()) <= 0) { |
| 314 | + LOG(ERROR) << "Couldn't initialise EVP_PKEY_CTX"; |
| 315 | + EVP_PKEY_free(pkey); |
| 316 | + return false; |
| 317 | + } |
| 318 | + |
| 319 | + size_t decrypt_size = keysize; |
| 320 | + |
| 321 | + if (EVP_PKEY_verify_recover(ctx, |
310 | 322 | reinterpret_cast<unsigned char*>(hash_data.data()),
|
311 |
| - rsa, |
312 |
| - RSA_NO_PADDING); |
313 |
| - RSA_free(rsa); |
| 323 | + &decrypt_size, |
| 324 | + reinterpret_cast<const unsigned char*>(sig_data.data()), |
| 325 | + sig_data.size()) <= 0 ) { |
| 326 | + decrypt_size = 0; |
| 327 | + } |
| 328 | + |
| 329 | + EVP_PKEY_CTX_free(ctx); |
| 330 | + EVP_PKEY_free(pkey); |
| 331 | + |
314 | 332 | TEST_AND_RETURN_FALSE(decrypt_size > 0 &&
|
315 |
| - decrypt_size <= static_cast<int>(hash_data.size())); |
| 333 | + (ssize_t) decrypt_size <= static_cast<int>(hash_data.size())); |
316 | 334 | hash_data.resize(decrypt_size);
|
317 | 335 | out_hash_data->swap(hash_data);
|
318 | 336 | return true;
|
|
0 commit comments