8 #include <arpa/inet.h> /* ntohl */
13 #include <openssl/objects.h>
14 #include <openssl/bn.h>
15 #include <openssl/rsa.h>
16 #include <openssl/sha.h>
24 #include "keys-gcrypt.c"
27 static void *get_file_ptr(__u8 *db, int dblen, int structlen, __be32 ptr)
31 if (p > dblen - structlen) {
32 fprintf(stderr, "Invalid database file, bad pointer!\n");
36 return (void *)(db + p);
39 static void print_reg_rule(__u8 *db, int dblen, __be32 ruleptr)
41 struct regdb_file_reg_rule *rule;
42 struct regdb_file_freq_range *freq;
43 struct regdb_file_power_rule *power;
46 rule = get_file_ptr(db, dblen, sizeof(*rule), ruleptr);
47 freq = get_file_ptr(db, dblen, sizeof(*freq), rule->freq_range_ptr);
48 power = get_file_ptr(db, dblen, sizeof(*power), rule->power_rule_ptr);
50 printf("\t(%.3f - %.3f @ %.3f), ",
51 ((float)ntohl(freq->start_freq))/1000.0,
52 ((float)ntohl(freq->end_freq))/1000.0,
53 ((float)ntohl(freq->max_bandwidth))/1000.0);
55 printf("(%.3f, %.3f, %.3f)",
56 ((float)ntohl(power->max_antenna_gain)/100.0),
57 ((float)ntohl(power->max_ir)/100.0),
58 ((float)ntohl(power->max_eirp)/100.0));
60 flags = ntohl(rule->flags);
61 if (flags & RRF_NO_OFDM)
63 if (flags & RRF_NO_CCK)
65 if (flags & RRF_NO_INDOOR)
66 printf(", NO-INDOOR");
67 if (flags & RRF_NO_OUTDOOR)
68 printf(", NO-OUTDOOR");
71 if (flags & RRF_PTP_ONLY)
73 if (flags & RRF_PTMP_ONLY)
74 printf(", PTMP-ONLY");
79 int main(int argc, char **argv)
84 struct regdb_file_header *header;
85 struct regdb_file_reg_country *countries;
86 int dblen, siglen, num_countries, i, j;
89 __u8 hash[SHA_DIGEST_LENGTH];
93 gcry_mpi_t mpi_e, mpi_n;
94 gcry_sexp_t rsa, signature, data;
100 fprintf(stderr, "Usage: %s <filename>\n", argv[0]);
104 fd = open(argv[1], O_RDONLY);
106 perror("failed to open db file");
110 if (fstat(fd, &stat)) {
111 perror("failed to fstat db file");
115 dblen = stat.st_size;
117 db = mmap(NULL, dblen, PROT_READ, MAP_PRIVATE, fd, 0);
118 if (db == MAP_FAILED) {
119 perror("failed to mmap db file");
123 header = get_file_ptr(db, dblen, sizeof(*header), 0);
125 if (ntohl(header->magic) != REGDB_MAGIC) {
126 fprintf(stderr, "Invalid database magic\n");
130 if (ntohl(header->version) != REGDB_VERSION) {
131 fprintf(stderr, "Invalid database version\n");
135 siglen = ntohl(header->signature_length);
136 /* adjust dblen so later sanity checks don't run into the signature */
139 if (dblen <= sizeof(*header)) {
140 fprintf(stderr, "Invalid signature length %d\n", siglen);
144 /* verify signature */
148 fprintf(stderr, "Failed to create RSA key\n");
152 if (SHA1(db, dblen, hash) != hash) {
153 fprintf(stderr, "Failed to calculate SHA sum\n");
157 for (i = 0; i < sizeof(keys)/sizeof(keys[0]); i++) {
161 if (RSA_size(rsa) != siglen)
164 ok = RSA_verify(NID_sha1, hash, SHA_DIGEST_LENGTH,
165 db + dblen, siglen, rsa) == 1;
171 fprintf(stderr, "Database signature wrong\n");
179 BN_print_fp(stdout, &keys[0].n);
186 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, db, dblen);
188 if (gcry_sexp_build(&data, NULL, "(data (flags pkcs1) (hash sha1 %b))",
190 fprintf(stderr, "failed to build data expression\n");
194 if (gcry_sexp_build(&signature, NULL, "(sig-val (rsa (s %b)))",
195 siglen, db + dblen)) {
196 fprintf(stderr, "failed to build signature expression\n");
200 for (i = 0; i < sizeof(keys)/sizeof(keys[0]); i++) {
201 if (gcry_mpi_scan(&mpi_e, GCRYMPI_FMT_USG,
202 keys[0].e, keys[0].len_e, NULL) ||
203 gcry_mpi_scan(&mpi_n, GCRYMPI_FMT_USG,
204 keys[0].n, keys[0].len_n, NULL)) {
205 fprintf(stderr, "failed to convert numbers\n");
209 if (gcry_sexp_build(&rsa, NULL,
210 "(public-key (rsa (n %m) (e %m)))",
212 fprintf(stderr, "failed to build rsa key\n");
216 if (!gcry_pk_verify(signature, data, rsa)) {
223 fprintf(stderr, "Database signature wrong\n");
229 num_countries = ntohl(header->reg_country_num);
230 countries = get_file_ptr(db, dblen,
231 sizeof(struct regdb_file_reg_country) * num_countries,
232 header->reg_country_ptr);
234 for (i = 0; i < num_countries; i++) {
235 struct regdb_file_reg_rules_collection *rcoll;
236 struct regdb_file_reg_country *country = countries + i;
239 printf("country %.2s:\n", country->alpha2);
240 rcoll = get_file_ptr(db, dblen, sizeof(*rcoll), country->reg_collection_ptr);
241 num_rules = ntohl(rcoll->reg_rule_num);
242 /* re-get pointer with sanity checking for num_rules */
243 rcoll = get_file_ptr(db, dblen,
244 sizeof(*rcoll) + num_rules * sizeof(__be32),
245 country->reg_collection_ptr);
246 for (j = 0; j < num_rules; j++)
247 print_reg_rule(db, dblen, rcoll->reg_rule_ptrs[j]);