From 47e9a2299befdb65f2f7a601565561053f89d1b0 Mon Sep 17 00:00:00 2001 From: olszomal Date: Wed, 4 Mar 2020 13:31:54 +0100 Subject: [PATCH 01/35] attach-signature tests --- tests/recipes/06_test_sha256sum | 6 -- tests/recipes/31_extract_signature | 12 +-- tests/recipes/32_attach_signature | 15 ++-- tests/recipes/33_attach_signed | 69 +++++++++++++++++ tests/recipes/34_attach_nest | 74 +++++++++++++++++++ ...3_remove_signature => 35_remove_signature} | 30 ++++---- ...{35_varia_sha256sum => 36_varia_sha256sum} | 10 +-- ...d_signature_blob => 39_add_signature_blob} | 24 +++--- tests/test_library | 7 +- 9 files changed, 188 insertions(+), 59 deletions(-) create mode 100644 tests/recipes/33_attach_signed create mode 100644 tests/recipes/34_attach_nest rename tests/recipes/{33_remove_signature => 35_remove_signature} (56%) rename tests/recipes/{35_varia_sha256sum => 36_varia_sha256sum} (82%) rename tests/recipes/{36_add_signature_blob => 39_add_signature_blob} (66%) diff --git a/tests/recipes/06_test_sha256sum b/tests/recipes/06_test_sha256sum index ad79ad5..a06460d 100644 --- a/tests/recipes/06_test_sha256sum +++ b/tests/recipes/06_test_sha256sum @@ -13,8 +13,6 @@ if test -s "test.exe" res=1 cat "sha256sum_exe.log" >> "results.log" printf "Non-unique SHA256 message digests found\n" >> "results.log" - else - rm -f test_0[1-5]*[1-3]*.exe fi rm -f "sha256sum_exe.log" else @@ -28,8 +26,6 @@ if test -s "test.ex_" res=1 cat "sha256sum_ex_.log" >> "results.log" printf "Non-unique SHA256 message digests found\n" >> "results.log" - else - rm -f test_0[1-5]*[1-3]*.ex_ fi rm -f "sha256sum_ex_.log" else @@ -43,8 +39,6 @@ if test -s "sample.msi" res=1 cat "sha256sum_msi.log" >> "results.log" printf "Non-unique SHA256 message digests found\n" >> "results.log" - else - rm -f test_0[1-5]*[1-3]*.msi fi rm -f "sha256sum_msi.log" else diff --git a/tests/recipes/31_extract_signature b/tests/recipes/31_extract_signature index a8544cd..7611591 100644 --- a/tests/recipes/31_extract_signature +++ b/tests/recipes/31_extract_signature @@ -9,14 +9,14 @@ test_name="311. Extract the signature from the PE file" printf "\n%s\n" "$test_name" if test -s "test.exe" then - ../../osslsigncode sign -h sha256 \ + ../../osslsigncode sign -h sha512 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ -in "test.exe" -out "test_311.exe" && \ ../../osslsigncode extract-signature -pem \ -in "test_311.exe" -out "sign_pe.pem" verify_signature "$?" "311" "exe" "success" "@2019-09-01 12:00:00" \ - "sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN" + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" @@ -27,14 +27,14 @@ test_name="312. Extract the signature from the CAB file" printf "\n%s\n" "$test_name" if [ -s "test.ex_" ] then - ../../osslsigncode sign -h sha256 \ + ../../osslsigncode sign -h sha512 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ -in "test.ex_" -out "test_312.ex_" && \ ../../osslsigncode extract-signature -pem \ -in "test_312.ex_" -out "sign_cab.pem" verify_signature "$?" "312" "ex_" "success" "@2019-09-01 12:00:00" \ - "sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN" + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" @@ -45,14 +45,14 @@ test_name="313. Extract the signature from the MSI file" printf "\n%s\n" "$test_name" if test -s "sample.msi" then - ../../osslsigncode sign -h sha256 \ + ../../osslsigncode sign -h sha512 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ -in "sample.msi" -out "test_313.msi" && \ ../../osslsigncode extract-signature -pem \ -in "test_313.msi" -out "sign_msi.pem" verify_signature "$?" "313" "msi" "success" "@2019-09-01 12:00:00" \ - "sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN" + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" diff --git a/tests/recipes/32_attach_signature b/tests/recipes/32_attach_signature index c3dd5d4..d610748 100644 --- a/tests/recipes/32_attach_signature +++ b/tests/recipes/32_attach_signature @@ -9,12 +9,13 @@ test_name="321. Attach the signature to the PE file" printf "\n%s\n" "$test_name" if test -s "test.exe" then - ../../osslsigncode attach-signature -sigin "sign_pe.pem" \ + ../../osslsigncode attach-signature \ + -sigin "sign_pe.pem" \ -CAfile "${script_path}/../certs/CACert.pem" \ -CRLfile "${script_path}/../certs/CACertCRL.pem" \ -in "test.exe" -out "test_321.exe" verify_signature "$?" "321" "exe" "success" "@2019-09-01 12:00:00" \ - "sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN" + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" @@ -25,12 +26,13 @@ test_name="322. Attach the signature to the CAB file" printf "\n%s\n" "$test_name" if [ -s "test.ex_" ] then - ../../osslsigncode attach-signature -sigin "sign_cab.pem" \ + ../../osslsigncode attach-signature \ + -sigin "sign_cab.pem" \ -CAfile "${script_path}/../certs/CACert.pem" \ -CRLfile "${script_path}/../certs/CACertCRL.pem" \ -in "test.ex_" -out "test_322.ex_" verify_signature "$?" "322" "ex_" "success" "@2019-09-01 12:00:00" \ - "sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN" + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" @@ -41,12 +43,13 @@ test_name="323. Attach the signature to the MSI file" printf "\n%s\n" "$test_name" if test -s "sample.msi" then - ../../osslsigncode attach-signature -sigin "sign_msi.pem" \ + ../../osslsigncode attach-signature \ + -sigin "sign_msi.pem" \ -CAfile "${script_path}/../certs/CACert.pem" \ -CRLfile "${script_path}/../certs/CACertCRL.pem" \ -in "sample.msi" -out "test_323.msi" verify_signature "$?" "323" "msi" "success" "@2019-09-01 12:00:00" \ - "sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN" + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" diff --git a/tests/recipes/33_attach_signed b/tests/recipes/33_attach_signed new file mode 100644 index 0000000..4f62ee2 --- /dev/null +++ b/tests/recipes/33_attach_signed @@ -0,0 +1,69 @@ +#!/bin/sh +# Attach the signature to the signed PE/CAB/MSI file. + +. $(dirname $0)/../test_library +script_path=$(pwd) + +# PE file +test_name="331. Attach the signature to the signed PE file" +printf "\n%s\n" "$test_name" +if test -s "test.exe" + then + ../../osslsigncode sign -h sha256 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "test.exe" -out "test_331_signed.exe" + ../../osslsigncode attach-signature \ + -sigin "sign_pe.pem" \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "test_331_signed.exe" -out "test_331.exe" + verify_signature "$?" "331" "exe" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +# CAB file +test_name="332. Attach the signature to the signed CAB file" +printf "\n%s\n" "$test_name" +if [ -s "test.ex_" ] + then + ../../osslsigncode sign -h sha256 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "test.ex_" -out "test_332_signed.ex_" + ../../osslsigncode attach-signature \ + -sigin "sign_cab.pem" \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "test_332_signed.ex_" -out "test_332.ex_" + verify_signature "$?" "332" "ex_" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +# MSI file +test_name="333. Attach the signature to the signed MSI file" +printf "\n%s\n" "$test_name" +if test -s "sample.msi" + then + ../../osslsigncode sign -h sha256 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "sample.msi" -out "test_333_signed.msi" + ../../osslsigncode attach-signature -sigin "sign_msi.pem" \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "test_333_signed.msi" -out "test_333.msi" + verify_signature "$?" "333" "msi" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +exit 0 diff --git a/tests/recipes/34_attach_nest b/tests/recipes/34_attach_nest new file mode 100644 index 0000000..90c7bc7 --- /dev/null +++ b/tests/recipes/34_attach_nest @@ -0,0 +1,74 @@ +#!/bin/sh +# Attach the signature to the signed PE/CAB/MSI file with the "nest" flag +# in order to attach the new signature instead of replacing the first one. + +. $(dirname $0)/../test_library +script_path=$(pwd) + +# PE file +test_name="341. Attach the signature to the signed PE file with the nest flag" +printf "\n%s\n" "$test_name" +if test -s "test.exe" + then + ../../osslsigncode sign -h sha256 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "test.exe" -out "test_341_signed.exe" + ../../osslsigncode attach-signature \ + -sigin "sign_pe.pem" \ + -nest \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "test_341_signed.exe" -out "test_341.exe" + verify_signature "$?" "341" "exe" "success" "@2019-09-01 12:00:00" \ + "UNUSED_PATTERN" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +# CAB file +test_name="342. Attach the signature to the signed CAB file with the nest flag" +printf "\n%s\n" "$test_name" +if test -s "test.ex_" + then + ../../osslsigncode sign -h sha256 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "test.ex_" -out "test_342_signed.ex_" + ../../osslsigncode attach-signature \ + -sigin "sign_cab.pem" \ + -nest \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "test_342_signed.ex_" -out "test_342.ex_" + verify_signature "$?" "342" "ex_" "success" "@2019-09-01 12:00:00" \ + "UNUSED_PATTERN" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +# MSI file +test_name="343. Attach the signature to the signed MSI file with the nest flag" +printf "\n%s\n" "$test_name" +if test -s "sample.msi" + then + ../../osslsigncode sign -h sha256 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "sample.msi" -out "test_343_signed.msi" + ../../osslsigncode attach-signature \ + -sigin "sign_msi.pem" \ + -nest \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "test_343_signed.msi" -out "test_343.msi" + verify_signature "$?" "343" "msi" "success" "@2019-09-01 12:00:00" \ + "UNUSED_PATTERN" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +exit 0 diff --git a/tests/recipes/33_remove_signature b/tests/recipes/35_remove_signature similarity index 56% rename from tests/recipes/33_remove_signature rename to tests/recipes/35_remove_signature index d27e02b..c31cccc 100644 --- a/tests/recipes/33_remove_signature +++ b/tests/recipes/35_remove_signature @@ -5,54 +5,54 @@ script_path=$(pwd) # PE file -test_name="331. Remove the signature from the PE file" +test_name="351. Remove the signature from the PE file" printf "\n%s\n" "$test_name" if test -s "test.exe" then ../../osslsigncode sign -h sha256 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "test.exe" -out "test_331_signed.exe" && \ + -in "test.exe" -out "test_351_signed.exe" && \ ../../osslsigncode remove-signature \ - -in "test_331_signed.exe" -out "test_331.exe" - verify_signature "$?" "331" "exe" "fail" "@2019-09-01 12:00:00" \ - "sha256sum" "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" + -in "test_351_signed.exe" -out "test_351.exe" + verify_signature "$?" "351" "exe" "fail" "@2019-09-01 12:00:00" \ + "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" fi # CAB file -test_name="332. Remove the signature from the CAB file" +test_name="352. Remove the signature from the CAB file" printf "\n%s\n" "$test_name" if [ -s "test.ex_" ] then ../../osslsigncode sign -h sha256 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "test.ex_" -out "test_332_signed.ex_" && \ + -in "test.ex_" -out "test_352_signed.ex_" && \ ../../osslsigncode remove-signature \ - -in "test_332_signed.ex_" -out "test_332.ex_" - verify_signature "$?" "332" "ex_" "fail" "@2019-09-01 12:00:00" \ - "sha256sum" "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" + -in "test_352_signed.ex_" -out "test_352.ex_" + verify_signature "$?" "352" "ex_" "fail" "@2019-09-01 12:00:00" \ + "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" fi # MSI file -test_name="333. Remove the signature from the MSI file" +test_name="353. Remove the signature from the MSI file" printf "\n%s\n" "$test_name" if test -s "sample.msi" then ../../osslsigncode sign -h sha256 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "sample.msi" -out "test_333_signed.msi" && \ + -in "sample.msi" -out "test_353_signed.msi" && \ ../../osslsigncode remove-signature \ - -in "test_333_signed.msi" -out "test_333.msi" - verify_signature "$?" "333" "msi" "fail" "@2019-09-01 12:00:00" \ - "sha256sum" "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" + -in "test_353_signed.msi" -out "test_353.msi" + verify_signature "$?" "353" "msi" "fail" "@2019-09-01 12:00:00" \ + "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" diff --git a/tests/recipes/35_varia_sha256sum b/tests/recipes/36_varia_sha256sum similarity index 82% rename from tests/recipes/35_varia_sha256sum rename to tests/recipes/36_varia_sha256sum index 0c0d40b..89a4f6c 100644 --- a/tests/recipes/35_varia_sha256sum +++ b/tests/recipes/36_varia_sha256sum @@ -1,11 +1,11 @@ #!/bin/sh -# Checking SHA256 message digests for 31x-34x tests. +# Checking SHA256 message digests for 31x-33x tests. . $(dirname $0)/../test_library res=0 res=0 skip=0 -test_name="351. Checking SHA256 message digests for 31x-34x tests" +test_name="361. Checking SHA256 message digests for 31x-33x tests" printf "\n%s\n" "$test_name" if test -s "test.exe" then @@ -14,8 +14,6 @@ if test -s "test.exe" res=1 cat "sha256sum_exe.log" >> "results.log" printf "Non-unique SHA256 message digests found\n" >> "results.log" - else - rm -f test_3[1-4]*[1-2]*.exe fi rm -f "sha256sum_exe.log" else @@ -29,8 +27,6 @@ if test -s "test.ex_" res=1 cat "sha256sum_ex_.log" >> "results.log" printf "Non-unique SHA256 message digests found\n" >> "results.log" - else - rm -f test_3[1-4]*[1-2]*.ex_ fi rm -f "sha256sum_ex_.log" else @@ -44,8 +40,6 @@ if test -s "sample.msi" res=1 cat "sha256sum_msi.log" >> "results.log" printf "Non-unique SHA256 message digests found\n" >> "results.log" - else - rm -f test_3[1-4]*[1-2]*.msi fi rm -f "sha256sum_msi.log" else diff --git a/tests/recipes/36_add_signature_blob b/tests/recipes/39_add_signature_blob similarity index 66% rename from tests/recipes/36_add_signature_blob rename to tests/recipes/39_add_signature_blob index 2907b6e..5e05385 100644 --- a/tests/recipes/36_add_signature_blob +++ b/tests/recipes/39_add_signature_blob @@ -5,18 +5,18 @@ script_path=$(pwd) # PE file -test_name="361. Add an unauthenticated blob to the PE file" +test_name="391. Add an unauthenticated blob to the PE file" printf "\n%s\n" "$test_name" if test -s "test.exe" then ../../osslsigncode sign -h sha256 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "test.exe" -out "test_361_signed.exe" + -in "test.exe" -out "test_391_signed.exe" ../../osslsigncode add \ -addUnauthenticatedBlob \ - -in "test_361_signed.exe" -out "test_361.exe" - verify_signature "$?" "361" "exe" "success" "@2019-09-01 12:00:00" \ + -in "test_391_signed.exe" -out "test_391.exe" + verify_signature "$?" "391" "exe" "success" "@2019-09-01 12:00:00" \ "UNUSED_PATTERN" "ASCII" "BEGIN_BLOB" "MODIFY" test_result "$?" "$test_name" else @@ -24,18 +24,18 @@ if test -s "test.exe" fi # CAB file -test_name="362. Add an unauthenticated blob to the CAB file" +test_name="392. Add an unauthenticated blob to the CAB file" printf "\n%s\n" "$test_name" if test -s "test.ex_" then ../../osslsigncode sign -h sha256 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "test.ex_" -out "test_362_signed.ex_" + -in "test.ex_" -out "test_392_signed.ex_" ../../osslsigncode add \ -addUnauthenticatedBlob \ - -in "test_362_signed.ex_" -out "test_362.ex_" - verify_signature "$?" "362" "ex_" "success" "@2019-09-01 12:00:00" \ + -in "test_392_signed.ex_" -out "test_392.ex_" + verify_signature "$?" "392" "ex_" "success" "@2019-09-01 12:00:00" \ "UNUSED_PATTERN" "ASCII" "BEGIN_BLOB" "MODIFY" test_result "$?" "$test_name" else @@ -43,18 +43,18 @@ if test -s "test.ex_" fi # MSI file -test_name="363. Add an unauthenticated blob to the MSI file" +test_name="393. Add an unauthenticated blob to the MSI file" printf "\n%s\n" "$test_name" if test -s "sample.msi" then ../../osslsigncode sign -h sha256 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "sample.msi" -out "test_363_signed.msi" + -in "sample.msi" -out "test_393_signed.msi" ../../osslsigncode add \ -addUnauthenticatedBlob \ - -in "test_363_signed.msi" -out "test_363.msi" - verify_signature "$?" "363" "msi" "success" "@2019-09-01 12:00:00" \ + -in "test_393_signed.msi" -out "test_393.msi" + verify_signature "$?" "393" "msi" "success" "@2019-09-01 12:00:00" \ "UNUSED_PATTERN" "ASCII" "BEGIN_BLOB" "MODIFY" test_result "$?" "$test_name" else diff --git a/tests/test_library b/tests/test_library index 699fc69..96aea84 100755 --- a/tests/test_library +++ b/tests/test_library @@ -113,12 +113,7 @@ verify_signature() { fi if test "$6" = "sha256sum" then - if test -s "test_$2_signed.$3" - then - sha256sum "test_$2_signed.$3" 2>> "sha256sum_$3.log" 1>&2 - else - sha256sum "test_$2.$3" 2>> "sha256sum_$3.log" 1>&2 - fi + sha256sum "test_$2.$3" 2>> "sha256sum_$3.log" 1>&2 fi if test "$4" = "success" -a "$result" -eq 0 then From 889679e08099964daf6d389ad41df59a99533984 Mon Sep 17 00:00:00 2001 From: olszomal Date: Wed, 4 Mar 2020 14:34:51 +0100 Subject: [PATCH 02/35] attach_sigfile() --- osslsigncode.c | 84 +++++++++++++++++++++++++++++--------------------- 1 file changed, 49 insertions(+), 35 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 1c655c2..7b3fffc 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -2894,7 +2894,7 @@ static int extract_pe_file(char *indata, size_t sigpos, size_t siglen, BIO *outd return ret; } -static void sign_pe_file(char *indata, size_t i , int pe32plus, size_t *fileend, BIO *hash, BIO *outdata) +static void modify_pe_header(char *indata, size_t i , int pe32plus, size_t *fileend, BIO *hash, BIO *outdata) { int len = 0; static char buf[64*1024]; @@ -2919,7 +2919,6 @@ static void sign_pe_file(char *indata, size_t i , int pe32plus, size_t *fileend, } } - /* * CAB file support * https://www.file-recovery.com/cab-signature-format.htm @@ -3357,12 +3356,12 @@ static void modify_cab_header(char *indata, size_t fileend, BIO *hash, BIO *outd * u2 cbCFHeader: 36-37 * u1 cbCFFolder: 38 * u1 cbCFData: 39 - * u22 abReserve: 40-43 + * u16 abReserve: 40-55 * - Additional data offset: 44-47 * - Additional data size: 48-51 */ BIO_write(outdata, indata+34, 22); - /* u24 abReserve: 52-59 */ + /* u4 abReserve: 56-59 */ BIO_write(hash, indata+56, 4); i = 60; @@ -3420,7 +3419,6 @@ static void add_cab_header(char *indata, size_t fileend, BIO *hash, BIO *outdata buf[4+10] = flags | FLAG_RESERVE_PRESENT; /* u2 setID must be the same for all cabinets in a set: 32-33 */ memcpy(buf+16, indata+32, 2); - BIO_write(hash, buf+4, 14); /* u2 iCabinet - number of this cabinet file in a set: 34-35 */ BIO_write(outdata, indata+34, 2); @@ -3583,6 +3581,47 @@ static char *get_cafile(void) return cafile; } +static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) +{ + PKCS7 *sig = NULL; + size_t sigfilesize; + char *insigdata; + BIO *sigbio; + const char pemhdr[] = "-----BEGIN PKCS7-----"; + + sigfilesize = get_file_size(sigfile); + if (!sigfilesize){ + fprintf(stderr, "Failed to open file: %s\n", sigfile); + return NULL; /* FAILED */ + } + insigdata = map_file(sigfile, sigfilesize); + if (insigdata == NULL) { + fprintf(stderr, "Failed to open file: %s\n", sigfile); + return NULL; /* FAILED */ + } + + if (sigfilesize >= sizeof(pemhdr) && !memcmp(insigdata, pemhdr, sizeof(pemhdr)-1)) { + sigbio = BIO_new_mem_buf(insigdata, sigfilesize); + sig = PEM_read_bio_PKCS7(sigbio, NULL, NULL, NULL); + BIO_free_all(sigbio); + } else { + if (type == FILE_TYPE_PE) { + sig = extract_existing_pe_pkcs7(insigdata, 0, sigfilesize); + } else if (type == FILE_TYPE_CAB) { + sig = extract_existing_cab_pkcs7(insigdata, 0, sigfilesize); + } else if (type == FILE_TYPE_MSI) { +#ifdef WITH_GSF + const unsigned char *p = (unsigned char*)insigdata; + sig = d2i_PKCS7(NULL, &p, sigfilesize); +#else + fprintf(stderr, "libgsf is not available, msi support is disabled\n"); + return NULL; /* FAILED */ +#endif + } + } + return sig; /* OK */ +} + int main(int argc, char **argv) { BIO *btmp, *sigbio, *hash, *outdata; PKCS12 *p12; @@ -3597,7 +3636,7 @@ int main(int argc, char **argv) { const char *argv0 = argv[0]; static char buf[64*1024]; - char *xcertfile, *certfile, *keyfile, *pvkfile, *pkcs12file, *infile, *outfile, *sigfile, *desc, *url, *indata, *insigdata, *outdataverify; + char *xcertfile, *certfile, *keyfile, *pvkfile, *pkcs12file, *infile, *outfile, *sigfile, *desc, *url, *indata, *outdataverify; char *p11engine, *p11module; char *pass = NULL, *readpass = NULL; int output_pkcs7 = 0; @@ -3620,7 +3659,7 @@ int main(int argc, char **argv) { u_char *p = NULL; int ret = 0, i, len = 0, jp = -1, pe32plus = 0, comm = 0, pagehash = 0; size_t peheader = 0, padlen = 0; - size_t filesize, fileend, sigfilesize, outdatasize; + size_t filesize, fileend, outdatasize; file_type_t type; cmd_type_t cmd = CMD_SIGN; char *failarg = NULL; @@ -4303,41 +4342,16 @@ int main(int argc, char **argv) { fileend = sigpos; } - sign_pe_file(indata, peheader + 88, pe32plus, &fileend, hash, outdata); + modify_pe_header(indata, peheader + 88, pe32plus, &fileend, hash, outdata); } if (cmd == CMD_ADD) goto add_only; if (cmd == CMD_ATTACH) { - const char pemhdr[] = "-----BEGIN PKCS7-----"; - sigfilesize = get_file_size(sigfile); - if (!sigfilesize) - goto err_cleanup; - insigdata = map_file(sigfile, sigfilesize); - if (insigdata == NULL) - DO_EXIT_1("Failed to open file: %s\n", infile); - - if (sigfilesize >= sizeof(pemhdr) && !memcmp(insigdata, pemhdr, sizeof(pemhdr)-1)) { - sigbio = BIO_new_mem_buf(insigdata, sigfilesize); - sig = PEM_read_bio_PKCS7(sigbio, NULL, NULL, NULL); - BIO_free_all(sigbio); - } else { - if (type == FILE_TYPE_PE) { - sig = extract_existing_pe_pkcs7(insigdata, 0, sigfilesize); - } else if (type == FILE_TYPE_CAB) { - sig = extract_existing_cab_pkcs7(insigdata, 0, sigfilesize); - } else if (type == FILE_TYPE_MSI) { -#ifdef WITH_GSF - const unsigned char *p = (unsigned char*)insigdata; - sig = d2i_PKCS7(NULL, &p, sigfilesize); -#else - DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", infile); -#endif - } - } + sig = attach_sigfile(sigfile, type); if (!sig) - DO_EXIT_0("No valid signature found\n"); + DO_EXIT_0("Unable to extract valid signature\n"); goto add_only; } From 7cd0e9d58173188a0cadeba6d3f6c29bbd5e6cf8 Mon Sep 17 00:00:00 2001 From: olszomal Date: Wed, 4 Mar 2020 15:35:48 +0100 Subject: [PATCH 03/35] add jp/purpose/desc/url attribute functions --- osslsigncode.c | 143 ++++++++++++++++++++++++++++--------------------- 1 file changed, 82 insertions(+), 61 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 7b3fffc..a7834d9 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -3446,6 +3446,83 @@ static void add_cab_header(char *indata, size_t fileend, BIO *hash, BIO *outdata BIO_write(hash, indata+i, fileend-i); } +static void add_jp_attribute(PKCS7_SIGNER_INFO *si, int jp) +{ + ASN1_STRING *astr; + int len; + const u_char *attrs = NULL; + static const u_char java_attrs_low[] = { + 0x30, 0x06, 0x03, 0x02, 0x00, 0x01, 0x30, 0x00 + }; + + switch (jp) { + case 0: + attrs = java_attrs_low; + len = sizeof(java_attrs_low); + break; + case 1: + /* XXX */ + case 2: + /* XXX */ + default: + break; + } + + if (attrs) { + astr = ASN1_STRING_new(); + ASN1_STRING_set(astr, attrs, len); + PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_MS_JAVA_SOMETHING), + V_ASN1_SEQUENCE, astr); + } +} + +static void add_purpose_attribute(PKCS7_SIGNER_INFO *si, int comm) +{ + ASN1_STRING *astr; + static u_char purpose_ind[] = { + 0x30, 0x0c, + 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x02, 0x01, 0x15 + }; + static u_char purpose_comm[] = { + 0x30, 0x0c, + 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x02, 0x01, 0x16 + }; + + astr = ASN1_STRING_new(); + if (comm) { + ASN1_STRING_set(astr, purpose_comm, sizeof(purpose_comm)); + } else { + ASN1_STRING_set(astr, purpose_ind, sizeof(purpose_ind)); + } + PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_STATEMENT_TYPE_OBJID), + V_ASN1_SEQUENCE, astr); +} + +static int add_opus_attribute(PKCS7_SIGNER_INFO *si, char *desc, char *url) +{ + SpcSpOpusInfo *opus; + ASN1_STRING *astr; + int len; + u_char *p = NULL; + + opus = createOpus(desc, url); + if ((len = i2d_SpcSpOpusInfo(opus, NULL)) <= 0 || (p = OPENSSL_malloc(len)) == NULL) { + SpcSpOpusInfo_free(opus); + return 0; /* FAILED */ + } + i2d_SpcSpOpusInfo(opus, &p); + p -= len; + astr = ASN1_STRING_new(); + ASN1_STRING_set(astr, p, len); + OPENSSL_free(p); + + PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_SP_OPUS_INFO_OBJID), + V_ASN1_SEQUENCE, astr); + + SpcSpOpusInfo_free(opus); + + return 1; /* OK */ +} static STACK_OF(X509) *PEM_read_certs_with_pass(BIO *bin, char *certpass) { @@ -3630,7 +3707,6 @@ int main(int argc, char **argv) { STACK_OF(X509) *certs = NULL, *xcerts = NULL; EVP_PKEY *pkey = NULL; PKCS7_SIGNER_INFO *si; - ASN1_STRING *astr; const EVP_MD *md; time_t signing_time = (time_t)-1; @@ -3665,16 +3741,6 @@ int main(int argc, char **argv) { char *failarg = NULL; size_t header_size = 0, sigpos = 0, siglen = 0; - static u_char purpose_ind[] = { - 0x30, 0x0c, - 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x02, 0x01, 0x15 - }; - - static u_char purpose_comm[] = { - 0x30, 0x0c, - 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x02, 0x01, 0x16 - }; - static u_char msi_signature[] = { 0xd0, 0xcf, 0x11, 0xe0, 0xa1, 0xb1, 0x1a, 0xe1 }; @@ -4379,58 +4445,13 @@ int main(int argc, char **argv) { PKCS7_add_signed_attribute(si, NID_pkcs9_contentType, V_ASN1_OBJECT, OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1)); - if (type == FILE_TYPE_CAB && jp >= 0) { - const u_char *attrs = NULL; - static const u_char java_attrs_low[] = { - 0x30, 0x06, 0x03, 0x02, 0x00, 0x01, 0x30, 0x00 - }; + if (type == FILE_TYPE_CAB && jp >= 0) + add_jp_attribute(si, jp); - switch (jp) { - case 0: - attrs = java_attrs_low; - len = sizeof(java_attrs_low); - break; - case 1: - /* XXX */ - case 2: - /* XXX */ - default: - break; - } + add_purpose_attribute(si, comm); - if (attrs) { - astr = ASN1_STRING_new(); - ASN1_STRING_set(astr, attrs, len); - PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_MS_JAVA_SOMETHING), - V_ASN1_SEQUENCE, astr); - } - } - - astr = ASN1_STRING_new(); - if (comm) { - ASN1_STRING_set(astr, purpose_comm, sizeof(purpose_comm)); - } else { - ASN1_STRING_set(astr, purpose_ind, sizeof(purpose_ind)); - } - PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_STATEMENT_TYPE_OBJID), - V_ASN1_SEQUENCE, astr); - - if (desc || url) { - SpcSpOpusInfo *opus = createOpus(desc, url); - if ((len = i2d_SpcSpOpusInfo(opus, NULL)) <= 0 || - (p = OPENSSL_malloc(len)) == NULL) - DO_EXIT_0("Couldn't allocate memory for opus info\n"); - i2d_SpcSpOpusInfo(opus, &p); - p -= len; - astr = ASN1_STRING_new(); - ASN1_STRING_set(astr, p, len); - OPENSSL_free(p); - - PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_SP_OPUS_INFO_OBJID), - V_ASN1_SEQUENCE, astr); - - SpcSpOpusInfo_free(opus); - } + if ((desc || url) && !add_opus_attribute(si, desc, url)) + DO_EXIT_0("Couldn't allocate memory for opus info\n"); PKCS7_content_new(sig, NID_pkcs7_data); From 787933ef5369aa47aa35116cb2835fcd0eaba87f Mon Sep 17 00:00:00 2001 From: olszomal Date: Tue, 10 Mar 2020 13:26:20 +0100 Subject: [PATCH 04/35] verify_pe_header() --- osslsigncode.c | 305 +++++++++++++++++++++++++++---------------------- 1 file changed, 170 insertions(+), 135 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index a7834d9..29bba43 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -185,6 +185,17 @@ typedef unsigned char u_char; */ #define FLAG_RESERVE_PRESENT 0x0004 +typedef struct { + size_t peheader; + int pe32plus; + unsigned short magic; + unsigned int pe_checksum; + size_t nrvas; + size_t sigpos; + size_t siglen; + size_t fileend; +} PE_HEADER; + /* ASN.1 definitions (more or less from official MS Authenticode docs) */ @@ -1429,7 +1440,7 @@ static void get_indirect_data_blob(u_char **blob, int *len, const EVP_MD *md, SpcIndirectDataContent_free(idc); } -static unsigned int calc_pe_checksum(BIO *bio, size_t peheader) +static unsigned int calc_pe_checksum(BIO *bio, PE_HEADER *header) { unsigned int checkSum = 0; unsigned short val; @@ -1445,7 +1456,7 @@ static unsigned int calc_pe_checksum(BIO *bio, size_t peheader) int i; for (i = 0; i < nread / 2; i++) { val = buf[i]; - if (size == peheader + 88 || size == peheader + 90) + if (size == header->peheader + 88 || size == header->peheader + 90) val = 0; checkSum += val; checkSum = 0xffff & (checkSum + (checkSum >> 0x10)); @@ -1461,13 +1472,13 @@ static unsigned int calc_pe_checksum(BIO *bio, size_t peheader) return checkSum; } -static void recalc_pe_checksum(BIO *bio, size_t peheader) +static void recalc_pe_checksum(BIO *bio, PE_HEADER *header) { - unsigned int checkSum = calc_pe_checksum(bio, peheader); + unsigned int checkSum = calc_pe_checksum(bio, header); char buf[4]; - /* write back checksum. */ - (void)BIO_seek(bio, peheader + 88); + /* write back checksum */ + (void)BIO_seek(bio, header->peheader + 88); PUT_UINT32_LE(checkSum, buf); BIO_write(bio, buf, 4); } @@ -1740,7 +1751,7 @@ static PKCS7 *find_countersignature(PKCS7_SIGNED *p7_signed, const unsigned char if (!PKCS7_set_content(p7, content)) { PKCS7_free(p7); PKCS7_free(content); - return NULL; /* FAILED */ + return NULL; /* FAILED */ } *timestamp_time = print_timestamp(countersignature); @@ -2645,8 +2656,7 @@ out: /* * PE file support */ -static void calc_pe_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, - size_t peheader, int pe32plus, size_t fileend) +static void calc_pe_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, PE_HEADER *header) { static unsigned char bfb[16*1024*1024]; EVP_MD_CTX *mdctx; @@ -2657,16 +2667,16 @@ static void calc_pe_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, memset(mdbuf, 0, EVP_MAX_MD_SIZE); (void)BIO_seek(bio, 0); - BIO_read(bio, bfb, peheader + 88); - EVP_DigestUpdate(mdctx, bfb, peheader + 88); + BIO_read(bio, bfb, header->peheader + 88); + EVP_DigestUpdate(mdctx, bfb, header->peheader + 88); BIO_read(bio, bfb, 4); - BIO_read(bio, bfb, 60+pe32plus*16); - EVP_DigestUpdate(mdctx, bfb, 60+pe32plus*16); + BIO_read(bio, bfb, 60 + header->pe32plus * 16); + EVP_DigestUpdate(mdctx, bfb, 60 + header->pe32plus * 16); BIO_read(bio, bfb, 8); - size_t n = peheader + 88 + 4 + 60+pe32plus*16 + 8; - while (n < fileend) { - size_t want = fileend - n; + size_t n = header->peheader + 88 + 4 + 60 + header->pe32plus * 16 + 8; + while (n < header->sigpos) { + size_t want = header->sigpos - n; if (want > sizeof(bfb)) want = sizeof(bfb); int l = BIO_read(bio, bfb, want); @@ -2734,8 +2744,7 @@ static void extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, SpcAttributeTypeAndOptionalValue_free(obj); } -static int verify_pe_pkcs7(PKCS7 *p7, char *indata, size_t peheader, - int pe32plus, size_t sigpos, size_t siglen, +static int verify_pe_pkcs7(PKCS7 *p7, char *indata, PE_HEADER *header, char *leafhash, int allownest, char *cafile, char *crlfile, char *untrusted) { int ret = 0; @@ -2776,8 +2785,8 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, size_t peheader, tohex(mdbuf, hexbuf, EVP_MD_size(md)); printf("Current message digest : %s\n", hexbuf); - bio = BIO_new_mem_buf(indata, sigpos + siglen); - calc_pe_digest(bio, md, cmdbuf, peheader, pe32plus, sigpos); + bio = BIO_new_mem_buf(indata, header->sigpos + header->siglen); + calc_pe_digest(bio, md, cmdbuf, header); BIO_free(bio); tohex(cmdbuf, hexbuf, EVP_MD_size(md)); int mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); @@ -2789,7 +2798,7 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, size_t peheader, tohex(ph, hexbuf, (phlen < 32) ? phlen : 32); printf("Page hash : %s ...\n", hexbuf); size_t cphlen = 0; - unsigned char *cph = calc_page_hash(indata, peheader, pe32plus, sigpos, phtype, &cphlen); + unsigned char *cph = calc_page_hash(indata, header->peheader, header->pe32plus, header->sigpos, phtype, &phlen); tohex(cph, hexbuf, (cphlen < 32) ? cphlen : 32); printf("Calculated page hash : %s ...%s\n\n", hexbuf, ((phlen != cphlen) || memcmp(ph, cph, phlen)) ? " MISMATCH!!!":""); @@ -2803,7 +2812,7 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, size_t peheader, int has_sig = 0; PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig); if (p7nest) { - int nest_ret = verify_pe_pkcs7(p7nest, indata, peheader, pe32plus, sigpos, siglen, leafhash, 0, cafile, crlfile, untrusted); + int nest_ret = verify_pe_pkcs7(p7nest, indata, header, leafhash, 0, cafile, crlfile, untrusted); if (ret == 0) ret = nest_ret; PKCS7_free(p7nest); @@ -2820,18 +2829,17 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, size_t peheader, * extract_existing_pe_pkcs7 retrieves a decoded PKCS7 struct * corresponding to the existing signature of the PE file. */ -static PKCS7 *extract_existing_pe_pkcs7(char *indata, - size_t sigpos, size_t siglen) +static PKCS7 *extract_existing_pe_pkcs7(char *indata, PE_HEADER *header) { size_t pos = 0; PKCS7 *p7 = NULL; - while (pos < siglen) { - size_t l = GET_UINT32_LE(indata + sigpos + pos); - unsigned short certrev = GET_UINT16_LE(indata + sigpos + pos + 4); - unsigned short certtype = GET_UINT16_LE(indata + sigpos + pos + 6); + while (pos < header->siglen) { + size_t l = GET_UINT32_LE(indata + header->sigpos + pos); + unsigned short certrev = GET_UINT16_LE(indata + header->sigpos + pos + 4); + unsigned short certtype = GET_UINT16_LE(indata + header->sigpos + pos + 6); if (certrev == WIN_CERT_REVISION_2 && certtype == WIN_CERT_TYPE_PKCS_SIGNED_DATA) { - const unsigned char *blob = (unsigned char*)indata + sigpos + pos + 8; + const unsigned char *blob = (unsigned char*)indata + header->sigpos + pos + 8; p7 = d2i_PKCS7(NULL, &blob, l - 8); } if (l%8) @@ -2841,81 +2849,128 @@ static PKCS7 *extract_existing_pe_pkcs7(char *indata, return p7; } - -static int verify_pe_file(char *indata, size_t peheader, int pe32plus, - size_t sigpos, size_t siglen, char *leafhash, char *cafile, char *crlfile, char *untrusted) +static int verify_pe_file(char *indata, PE_HEADER *header, + char *leafhash, char *cafile, char *crlfile, char *untrusted) { int ret = 0; - unsigned int pe_checksum = GET_UINT32_LE(indata + peheader + 88); - printf("Current PE checksum : %08X\n", pe_checksum); - BIO *bio = BIO_new_mem_buf(indata, sigpos + siglen); - unsigned int real_pe_checksum = calc_pe_checksum(bio, peheader); + if (header->siglen == 0) + header->siglen = header->fileend; + + printf("Current PE checksum : %08X\n", header->pe_checksum); + BIO *bio = BIO_new_mem_buf(indata, header->sigpos + header->siglen); + unsigned int real_pe_checksum = calc_pe_checksum(bio, header); BIO_free(bio); - if (pe_checksum && pe_checksum != real_pe_checksum) + if (header->pe_checksum && header->pe_checksum != real_pe_checksum) ret = 1; printf("Calculated PE checksum: %08X%s\n\n", real_pe_checksum, ret ? " MISMATCH!!!!" : ""); - if (siglen == 0) { + if (header->sigpos == 0) { printf("No signature found\n\n"); - ret = 1; - return ret; + return 1; } - PKCS7 *p7 = extract_existing_pe_pkcs7(indata, sigpos, siglen); - if (p7 == NULL) { + PKCS7 *p7 = extract_existing_pe_pkcs7(indata, header); + if (!p7) { printf("Failed to extract PKCS7 data\n\n"); return -1; } - ret = verify_pe_pkcs7(p7, indata, peheader, pe32plus, sigpos, siglen, leafhash, 1, cafile, crlfile, untrusted); + ret = verify_pe_pkcs7(p7, indata, header, leafhash, 1, cafile, crlfile, untrusted); PKCS7_free(p7); return ret; } -static int extract_pe_file(char *indata, size_t sigpos, size_t siglen, BIO *outdata, int output_pkcs7) +static int extract_pe_file(char *indata, PE_HEADER *header, BIO *outdata, int output_pkcs7) { int ret = 0; PKCS7 *sig; (void)BIO_reset(outdata); if (output_pkcs7) { - sig = extract_existing_pe_pkcs7(indata, sigpos, siglen); + sig = extract_existing_pe_pkcs7(indata, header); if (!sig) { fprintf(stderr, "Unable to extract existing signature\n"); return 1; /* FAILED */ } ret = !PEM_write_bio_PKCS7(outdata, sig); } else { - ret = !BIO_write(outdata, indata + sigpos, siglen); + ret = !BIO_write(outdata, indata + header->sigpos, header->siglen); } return ret; } -static void modify_pe_header(char *indata, size_t i , int pe32plus, size_t *fileend, BIO *hash, BIO *outdata) +static int verify_pe_header(char *indata, char *infile, size_t filesize, PE_HEADER *header) { - int len = 0; + int ret = 1; + + if (filesize < 64) { + printf("Corrupt DOS file - too short: %s\n", infile); + ret = 0; /* FAILED */ + } + header->peheader = GET_UINT32_LE(indata+60); + if (filesize < header->peheader + 160) { + printf("Corrupt DOS file - too short: %s\n", infile); + ret = 0; /* FAILED */ + } + if (memcmp(indata + header->peheader, "PE\0\0", 4)) { + printf("Unrecognized DOS file type: %s\n", infile); + ret = 0; /* FAILED */ + } + header->magic = GET_UINT16_LE(indata + header->peheader + 24); + if (header->magic == 0x20b) { + header->pe32plus = 1; + } else if (header->magic == 0x10b) { + header->pe32plus = 0; + } else { + printf("Corrupt PE file - found unknown magic %04X: %s\n", header->magic, infile); + ret = 0; /* FAILED */ + } + header->pe_checksum = GET_UINT32_LE(indata + header->peheader + 88); + header->nrvas = GET_UINT32_LE(indata + header->peheader + 116 + header->pe32plus * 16); + if (header->nrvas < 5) { + printf("Can not handle PE files without certificate table resource: %s\n", infile); + ret = 0; /* FAILED */ + } + header->sigpos = GET_UINT32_LE(indata + header->peheader + 152 + header->pe32plus * 16); + header->siglen = GET_UINT32_LE(indata + header->peheader + 152 + header->pe32plus * 16 + 4); + + /* Since fix for MS Bulletin MS12-024 we can really assume + that signature should be last part of file */ + if (header->sigpos > 0 && header->sigpos < filesize && header->sigpos + header->siglen != filesize) { + printf("Corrupt PE file - current signature not at end of file: %s\n", infile); + ret = 0; /* FAILED */ + } + header->fileend = filesize; + + return ret; +} + +static void modify_pe_header(char *indata, PE_HEADER *header, BIO *hash, BIO *outdata) +{ + int len = 0, i; static char buf[64*1024]; + i = header->peheader + 88; BIO_write(hash, indata, i); memset(buf, 0, 4); BIO_write(outdata, buf, 4); /* zero out checksum */ i += 4; - BIO_write(hash, indata + i, 60+pe32plus*16); - i += 60+pe32plus*16; + BIO_write(hash, indata + i, 60 + header->pe32plus * 16); + i += 60 + header->pe32plus * 16; memset(buf, 0, 8); BIO_write(outdata, buf, 8); /* zero out sigtable offset + pos */ i += 8; - BIO_write(hash, indata + i, *fileend - i); + BIO_write(hash, indata + i, header->fileend - i); /* pad (with 0's) pe file to 8 byte boundary */ - len = 8 - *fileend % 8; + len = 8 - header->fileend % 8; if (len > 0 && len != 8) { memset(buf, 0, len); BIO_write(hash, buf, len); - *fileend += len; + header->fileend += len; } } @@ -2930,7 +2985,7 @@ static int verify_cab_header(char *indata, char *infile, cmd_type_t cmd, int ret = 1; size_t reserved, flags = 0; - if (filesize < 44) { + if (filesize < 44) { printf("Corrupt cab file - too short: %s\n", infile); ret = 0; /* FAILED */ } @@ -3192,7 +3247,7 @@ static int verify_cab_file(char *indata, size_t header_size, size_t sigpos, size return 1; /* FAILED */ } p7 = extract_existing_cab_pkcs7(indata, sigpos, siglen); - if (p7 == NULL) { + if (!p7) { printf("Failed to extract PKCS7 data\n\n"); return -1; /* FAILED */ } @@ -3663,16 +3718,17 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) PKCS7 *sig = NULL; size_t sigfilesize; char *insigdata; + PE_HEADER sigheader; BIO *sigbio; const char pemhdr[] = "-----BEGIN PKCS7-----"; sigfilesize = get_file_size(sigfile); - if (!sigfilesize){ + if (!sigfilesize) { fprintf(stderr, "Failed to open file: %s\n", sigfile); return NULL; /* FAILED */ } insigdata = map_file(sigfile, sigfilesize); - if (insigdata == NULL) { + if (!insigdata) { fprintf(stderr, "Failed to open file: %s\n", sigfile); return NULL; /* FAILED */ } @@ -3683,9 +3739,19 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) BIO_free_all(sigbio); } else { if (type == FILE_TYPE_PE) { - sig = extract_existing_pe_pkcs7(insigdata, 0, sigfilesize); + if (!verify_pe_header(insigdata, sigfile, sigfilesize, &sigheader)) + return NULL; /* FAILED */ + sig = extract_existing_pe_pkcs7(insigdata, &sigheader); + if (!sig) { + fprintf(stderr, "Failed to extract PKCS7 data: %s\n", sigfile); + return NULL; /* FAILED */ + } } else if (type == FILE_TYPE_CAB) { sig = extract_existing_cab_pkcs7(insigdata, 0, sigfilesize); + if (!sig) { + fprintf(stderr, "Failed to extract PKCS7 data: %s\n", sigfile); + return NULL; /* FAILED */ + } } else if (type == FILE_TYPE_MSI) { #ifdef WITH_GSF const unsigned char *p = (unsigned char*)insigdata; @@ -3733,8 +3799,9 @@ int main(int argc, char **argv) { int nturl = 0, ntsurl = 0; int addBlob = 0; u_char *p = NULL; - int ret = 0, i, len = 0, jp = -1, pe32plus = 0, comm = 0, pagehash = 0; - size_t peheader = 0, padlen = 0; + int ret = 0, i, len = 0, jp = -1, comm = 0, pagehash = 0; + PE_HEADER header; + size_t padlen = 0; size_t filesize, fileend, outdatasize; file_type_t type; cmd_type_t cmd = CMD_SIGN; @@ -4166,13 +4233,15 @@ int main(int argc, char **argv) { goto err_cleanup; } else if (type == FILE_TYPE_PE) { - if (filesize < 64) - DO_EXIT_1("Corrupt DOS file - too short: %s\n", infile); - peheader = GET_UINT32_LE(indata+60); - if (filesize < peheader + 160) - DO_EXIT_1("Corrupt PE file - too short: %s\n", infile); - if (memcmp(indata+peheader, "PE\0\0", 4)) - DO_EXIT_1("Unrecognized DOS file type: %s\n", infile); + if (jp >= 0) + fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); +#ifdef WITH_GSF + if (add_msi_dse == 1) + fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); +#endif + if (!verify_pe_header(indata, infile, filesize, &header)) + goto err_cleanup; + } else if (type == FILE_TYPE_MSI) { if (pagehash == 1) fprintf(stderr, "Warning: -ph option is only valid for PE files\n"); @@ -4313,14 +4382,12 @@ int main(int argc, char **argv) { #endif } - if (type == FILE_TYPE_CAB || type == FILE_TYPE_PE) { - if (cmd != CMD_VERIFY) { - /* Create outdata file */ - outdata = BIO_new_file(outfile, "w+bx"); - if (outdata == NULL) - DO_EXIT_1("Failed to create file: %s\n", outfile); - BIO_push(hash, outdata); - } + if ((type == FILE_TYPE_CAB || type == FILE_TYPE_PE) && (cmd != CMD_VERIFY)) { + /* Create outdata file */ + outdata = BIO_new_file(outfile, "w+bx"); + if (outdata == NULL) + DO_EXIT_1("Failed to create file: %s\n", outfile); + BIO_push(hash, outdata); } if (type == FILE_TYPE_CAB) { @@ -4350,65 +4417,28 @@ int main(int argc, char **argv) { add_cab_header(indata, fileend, hash, outdata); } else if (type == FILE_TYPE_PE) { - size_t sigpos, siglen; - unsigned int nrvas; - unsigned short magic; - - if (jp >= 0) - fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); -#ifdef WITH_GSF - if (add_msi_dse == 1) - fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); -#endif - magic = GET_UINT16_LE(indata + peheader + 24); - if (magic == 0x20b) { - pe32plus = 1; - } else if (magic == 0x10b) { - pe32plus = 0; - } else { - DO_EXIT_2("Corrupt PE file - found unknown magic %x: %s\n", magic, infile); - } - - nrvas = GET_UINT32_LE(indata + peheader + 116 + pe32plus*16); - if (nrvas < 5) - DO_EXIT_1("Can not handle PE files without certificate table resource: %s\n", infile); - - sigpos = GET_UINT32_LE(indata + peheader + 152 + pe32plus*16); - siglen = GET_UINT32_LE(indata + peheader + 152 + pe32plus*16 + 4); - - /* Since fix for MS Bulletin MS12-024 we can really assume - that signature should be last part of file */ - if (sigpos > 0 && sigpos < filesize && sigpos + siglen != filesize) - DO_EXIT_1("Corrupt PE file - current signature not at end of file: %s\n", infile); - - if ((cmd == CMD_REMOVE || cmd == CMD_EXTRACT) && sigpos == 0) + if ((cmd == CMD_REMOVE || cmd == CMD_EXTRACT) && header.sigpos == 0) DO_EXIT_1("PE file does not have any signature: %s\n", infile); - if (cmd == CMD_EXTRACT) { - ret = extract_pe_file(indata, sigpos ? sigpos : fileend, siglen, outdata, output_pkcs7); + ret = extract_pe_file(indata, &header, outdata, output_pkcs7); goto skip_signing; } - if ((cmd == CMD_SIGN && nest) || (cmd == CMD_ATTACH && nest) || cmd == CMD_ADD) { - cursig = extract_existing_pe_pkcs7(indata, sigpos ? sigpos : fileend, siglen); - if (cursig == NULL) { + cursig = extract_existing_pe_pkcs7(indata, &header); + if (!cursig) DO_EXIT_0("Unable to extract existing signature\n"); - } - if (cmd == CMD_ADD) { + if (cmd == CMD_ADD) sig = cursig; - } } - if (cmd == CMD_VERIFY) { - ret = verify_pe_file(indata, peheader, pe32plus, sigpos ? sigpos : fileend, siglen, leafhash, cafile, crlfile, untrusted); + ret = verify_pe_file(indata, &header, leafhash, cafile, crlfile, untrusted); goto skip_signing; } - if (sigpos > 0) { + if (header.sigpos > 0) { /* Strip current signature */ - fileend = sigpos; + header.fileend = header.sigpos; } - - modify_pe_header(indata, peheader + 88, pe32plus, &fileend, hash, outdata); + modify_pe_header(indata, &header, hash, outdata); } if (cmd == CMD_ADD) @@ -4484,7 +4514,10 @@ int main(int argc, char **argv) { p7x = NULL; } - get_indirect_data_blob(&p, &len, md, type, pagehash, indata, peheader, pe32plus, fileend); + if (type == FILE_TYPE_PE) + get_indirect_data_blob(&p, &len, md, type, pagehash, indata, header.peheader, header.pe32plus, header.fileend); + else + get_indirect_data_blob(&p, &len, md, type, pagehash, indata, 0, 0, fileend); len -= EVP_MD_size(md); memcpy(buf, p, len); OPENSSL_free(p); @@ -4510,7 +4543,11 @@ int main(int argc, char **argv) { td7->d.other->type = V_ASN1_SEQUENCE; td7->d.other->value.sequence = ASN1_STRING_new(); ASN1_STRING_set(td7->d.other->value.sequence, buf, len+mdlen); - PKCS7_set_content(sig, td7); + if (!PKCS7_set_content(sig, td7)) { + PKCS7_free(td7); + DO_EXIT_0("Signing failed(PKCS7_set_content)\n"); + } + add_only: @@ -4594,14 +4631,14 @@ skip_signing: if (type == FILE_TYPE_PE) { if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { /* Update signature position and size */ - (void)BIO_seek(outdata, peheader+152+pe32plus*16); - PUT_UINT32_LE(fileend, buf); /* Previous file end = signature table start */ + (void)BIO_seek(outdata, header.peheader + 152 + header.pe32plus * 16); + PUT_UINT32_LE(header.fileend, buf); /* Previous file end = signature table start */ BIO_write(outdata, buf, 4); PUT_UINT32_LE(len+8+padlen, buf); BIO_write(outdata, buf, 4); } if (cmd == CMD_SIGN || cmd == CMD_REMOVE || cmd == CMD_ADD || cmd == CMD_ATTACH) - recalc_pe_checksum(outdata, peheader); + recalc_pe_checksum(outdata, &header); } else if (type == FILE_TYPE_CAB && (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH)) { /* * Update additional data size. @@ -4624,12 +4661,11 @@ skip_signing: outdataverify = map_file(outfile, outdatasize); if (!outdataverify) DO_EXIT_0("Error verifying result\n"); - int sigpos = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16); - int siglen = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16 + 4); - ret = verify_pe_file(outdataverify, peheader, pe32plus, sigpos, siglen, leafhash, cafile, crlfile, untrusted); - if (ret) { + if (!verify_pe_header(outdataverify, outfile, outdatasize, &header)) + goto err_cleanup; + ret = verify_pe_file(outdataverify, &header, leafhash, cafile, crlfile, untrusted); + if (ret) DO_EXIT_0("Signature mismatch\n"); - } } else if (type == FILE_TYPE_CAB) { outdatasize = get_file_size(outfile); if (!outdatasize) @@ -4640,9 +4676,8 @@ skip_signing: if (!verify_cab_header(outdataverify, outfile, cmd, outdatasize, &header_size, &sigpos, &siglen)) goto err_cleanup; ret = verify_cab_file(outdataverify, header_size, sigpos, siglen, leafhash, cafile, crlfile, untrusted); - if (ret) { + if (ret) DO_EXIT_0("Signature mismatch\n"); - } } else if (type == FILE_TYPE_MSI) { #ifdef WITH_GSF GsfInput *src; @@ -4655,9 +4690,8 @@ skip_signing: g_object_unref(src); ret = msi_verify_file(ole, leafhash, cafile, crlfile, untrusted); g_object_unref(ole); - if (ret) { + if (ret) DO_EXIT_0("Signature mismatch\n"); - } #else DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", infile); #endif @@ -4668,6 +4702,7 @@ skip_signing: } else { printf(ret ? "Failed\n" : "Succeeded\n"); } + OPENSSL_free(cafile); OPENSSL_free(untrusted); if (crlfile) From ccde20f8e29eea408358ca4c4968d4439491c84f Mon Sep 17 00:00:00 2001 From: olszomal Date: Wed, 11 Mar 2020 09:25:27 +0100 Subject: [PATCH 05/35] FILE_HEADER struct for CAB header support --- osslsigncode.c | 213 +++++++++++++++++++++++++------------------------ 1 file changed, 108 insertions(+), 105 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 29bba43..11f2c14 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -186,7 +186,7 @@ typedef unsigned char u_char; #define FLAG_RESERVE_PRESENT 0x0004 typedef struct { - size_t peheader; + size_t header_size; int pe32plus; unsigned short magic; unsigned int pe_checksum; @@ -194,7 +194,8 @@ typedef struct { size_t sigpos; size_t siglen; size_t fileend; -} PE_HEADER; + size_t flags; +} FILE_HEADER; /* ASN.1 definitions (more or less from official MS Authenticode docs) @@ -1238,12 +1239,12 @@ static const unsigned char classid_page_hash[] = { 0xAE, 0x05, 0xA2, 0x17, 0xDA, 0x8E, 0x60, 0xD6 }; -static unsigned char *calc_page_hash(char *indata, size_t peheader, +static unsigned char *calc_page_hash(char *indata, size_t header_size, int pe32plus, size_t sigpos, int phtype, size_t *rphlen) { - unsigned short nsections = GET_UINT16_LE(indata + peheader + 6); - size_t pagesize = GET_UINT32_LE(indata + peheader + 56); - size_t hdrsize = GET_UINT32_LE(indata + peheader + 84); + unsigned short nsections = GET_UINT16_LE(indata + header_size + 6); + size_t pagesize = GET_UINT32_LE(indata + header_size + 56); + size_t hdrsize = GET_UINT32_LE(indata + header_size + 84); const EVP_MD *md = EVP_get_digestbynid(phtype); int pphlen = 4 + EVP_MD_size(md); int phlen = pphlen * (3 + nsections + sigpos / pagesize); @@ -1253,15 +1254,15 @@ static unsigned char *calc_page_hash(char *indata, size_t peheader, mdctx = EVP_MD_CTX_new(); EVP_DigestInit(mdctx, md); - EVP_DigestUpdate(mdctx, indata, peheader + 88); - EVP_DigestUpdate(mdctx, indata + peheader + 92, 60 + pe32plus*16); - EVP_DigestUpdate(mdctx, indata + peheader + 160 + pe32plus*16, hdrsize - (peheader + 160 + pe32plus*16)); + EVP_DigestUpdate(mdctx, indata, header_size + 88); + EVP_DigestUpdate(mdctx, indata + header_size + 92, 60 + pe32plus*16); + EVP_DigestUpdate(mdctx, indata + header_size + 160 + pe32plus*16, hdrsize - (header_size + 160 + pe32plus*16)); EVP_DigestUpdate(mdctx, zeroes, pagesize - hdrsize); memset(res, 0, 4); EVP_DigestFinal(mdctx, res + 4, NULL); - unsigned short sizeofopthdr = GET_UINT16_LE(indata + peheader + 20); - char *sections = indata + peheader + 24 + sizeofopthdr; + unsigned short sizeofopthdr = GET_UINT16_LE(indata + header_size + 20); + char *sections = indata + header_size + 24 + sizeofopthdr; int i, pi = 1; size_t lastpos = 0; for (i=0; i EVP_MD_size(EVP_sha1())) phtype = NID_sha256; - pid->file = get_page_hash_link(phtype, indata, peheader, pe32plus, sigpos); + pid->file = get_page_hash_link(phtype, indata, header_size, pe32plus, sigpos); } else { pid->file = get_obsolete_link(); } @@ -1440,7 +1441,7 @@ static void get_indirect_data_blob(u_char **blob, int *len, const EVP_MD *md, SpcIndirectDataContent_free(idc); } -static unsigned int calc_pe_checksum(BIO *bio, PE_HEADER *header) +static unsigned int calc_pe_checksum(BIO *bio, FILE_HEADER *header) { unsigned int checkSum = 0; unsigned short val; @@ -1456,7 +1457,7 @@ static unsigned int calc_pe_checksum(BIO *bio, PE_HEADER *header) int i; for (i = 0; i < nread / 2; i++) { val = buf[i]; - if (size == header->peheader + 88 || size == header->peheader + 90) + if (size == header->header_size + 88 || size == header->header_size + 90) val = 0; checkSum += val; checkSum = 0xffff & (checkSum + (checkSum >> 0x10)); @@ -1472,13 +1473,13 @@ static unsigned int calc_pe_checksum(BIO *bio, PE_HEADER *header) return checkSum; } -static void recalc_pe_checksum(BIO *bio, PE_HEADER *header) +static void recalc_pe_checksum(BIO *bio, FILE_HEADER *header) { unsigned int checkSum = calc_pe_checksum(bio, header); char buf[4]; /* write back checksum */ - (void)BIO_seek(bio, header->peheader + 88); + (void)BIO_seek(bio, header->header_size + 88); PUT_UINT32_LE(checkSum, buf); BIO_write(bio, buf, 4); } @@ -2656,7 +2657,7 @@ out: /* * PE file support */ -static void calc_pe_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, PE_HEADER *header) +static void calc_pe_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, FILE_HEADER *header) { static unsigned char bfb[16*1024*1024]; EVP_MD_CTX *mdctx; @@ -2667,14 +2668,14 @@ static void calc_pe_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, PE_ memset(mdbuf, 0, EVP_MAX_MD_SIZE); (void)BIO_seek(bio, 0); - BIO_read(bio, bfb, header->peheader + 88); - EVP_DigestUpdate(mdctx, bfb, header->peheader + 88); + BIO_read(bio, bfb, header->header_size + 88); + EVP_DigestUpdate(mdctx, bfb, header->header_size + 88); BIO_read(bio, bfb, 4); BIO_read(bio, bfb, 60 + header->pe32plus * 16); EVP_DigestUpdate(mdctx, bfb, 60 + header->pe32plus * 16); BIO_read(bio, bfb, 8); - size_t n = header->peheader + 88 + 4 + 60 + header->pe32plus * 16 + 8; + size_t n = header->header_size + 88 + 4 + 60 + header->pe32plus * 16 + 8; while (n < header->sigpos) { size_t want = header->sigpos - n; if (want > sizeof(bfb)) @@ -2744,7 +2745,7 @@ static void extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, SpcAttributeTypeAndOptionalValue_free(obj); } -static int verify_pe_pkcs7(PKCS7 *p7, char *indata, PE_HEADER *header, +static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, char *leafhash, int allownest, char *cafile, char *crlfile, char *untrusted) { int ret = 0; @@ -2798,7 +2799,7 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, PE_HEADER *header, tohex(ph, hexbuf, (phlen < 32) ? phlen : 32); printf("Page hash : %s ...\n", hexbuf); size_t cphlen = 0; - unsigned char *cph = calc_page_hash(indata, header->peheader, header->pe32plus, header->sigpos, phtype, &phlen); + unsigned char *cph = calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &phlen); tohex(cph, hexbuf, (cphlen < 32) ? cphlen : 32); printf("Calculated page hash : %s ...%s\n\n", hexbuf, ((phlen != cphlen) || memcmp(ph, cph, phlen)) ? " MISMATCH!!!":""); @@ -2829,7 +2830,7 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, PE_HEADER *header, * extract_existing_pe_pkcs7 retrieves a decoded PKCS7 struct * corresponding to the existing signature of the PE file. */ -static PKCS7 *extract_existing_pe_pkcs7(char *indata, PE_HEADER *header) +static PKCS7 *extract_existing_pe_pkcs7(char *indata, FILE_HEADER *header) { size_t pos = 0; PKCS7 *p7 = NULL; @@ -2849,7 +2850,7 @@ static PKCS7 *extract_existing_pe_pkcs7(char *indata, PE_HEADER *header) return p7; } -static int verify_pe_file(char *indata, PE_HEADER *header, +static int verify_pe_file(char *indata, FILE_HEADER *header, char *leafhash, char *cafile, char *crlfile, char *untrusted) { int ret = 0; @@ -2882,7 +2883,7 @@ static int verify_pe_file(char *indata, PE_HEADER *header, return ret; } -static int extract_pe_file(char *indata, PE_HEADER *header, BIO *outdata, int output_pkcs7) +static int extract_pe_file(char *indata, FILE_HEADER *header, BIO *outdata, int output_pkcs7) { int ret = 0; PKCS7 *sig; @@ -2902,7 +2903,7 @@ static int extract_pe_file(char *indata, PE_HEADER *header, BIO *outdata, int ou return ret; } -static int verify_pe_header(char *indata, char *infile, size_t filesize, PE_HEADER *header) +static int verify_pe_header(char *indata, char *infile, size_t filesize, FILE_HEADER *header) { int ret = 1; @@ -2910,16 +2911,16 @@ static int verify_pe_header(char *indata, char *infile, size_t filesize, PE_HEAD printf("Corrupt DOS file - too short: %s\n", infile); ret = 0; /* FAILED */ } - header->peheader = GET_UINT32_LE(indata+60); - if (filesize < header->peheader + 160) { + header->header_size = GET_UINT32_LE(indata+60); + if (filesize < header->header_size + 160) { printf("Corrupt DOS file - too short: %s\n", infile); ret = 0; /* FAILED */ } - if (memcmp(indata + header->peheader, "PE\0\0", 4)) { + if (memcmp(indata + header->header_size, "PE\0\0", 4)) { printf("Unrecognized DOS file type: %s\n", infile); ret = 0; /* FAILED */ } - header->magic = GET_UINT16_LE(indata + header->peheader + 24); + header->magic = GET_UINT16_LE(indata + header->header_size + 24); if (header->magic == 0x20b) { header->pe32plus = 1; } else if (header->magic == 0x10b) { @@ -2928,14 +2929,14 @@ static int verify_pe_header(char *indata, char *infile, size_t filesize, PE_HEAD printf("Corrupt PE file - found unknown magic %04X: %s\n", header->magic, infile); ret = 0; /* FAILED */ } - header->pe_checksum = GET_UINT32_LE(indata + header->peheader + 88); - header->nrvas = GET_UINT32_LE(indata + header->peheader + 116 + header->pe32plus * 16); + header->pe_checksum = GET_UINT32_LE(indata + header->header_size + 88); + header->nrvas = GET_UINT32_LE(indata + header->header_size + 116 + header->pe32plus * 16); if (header->nrvas < 5) { printf("Can not handle PE files without certificate table resource: %s\n", infile); ret = 0; /* FAILED */ } - header->sigpos = GET_UINT32_LE(indata + header->peheader + 152 + header->pe32plus * 16); - header->siglen = GET_UINT32_LE(indata + header->peheader + 152 + header->pe32plus * 16 + 4); + header->sigpos = GET_UINT32_LE(indata + header->header_size + 152 + header->pe32plus * 16); + header->siglen = GET_UINT32_LE(indata + header->header_size + 152 + header->pe32plus * 16 + 4); /* Since fix for MS Bulletin MS12-024 we can really assume that signature should be last part of file */ @@ -2948,12 +2949,12 @@ static int verify_pe_header(char *indata, char *infile, size_t filesize, PE_HEAD return ret; } -static void modify_pe_header(char *indata, PE_HEADER *header, BIO *hash, BIO *outdata) +static void modify_pe_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) { int len = 0, i; static char buf[64*1024]; - i = header->peheader + 88; + i = header->header_size + 88; BIO_write(hash, indata, i); memset(buf, 0, 4); BIO_write(outdata, buf, 4); /* zero out checksum */ @@ -2979,11 +2980,10 @@ static void modify_pe_header(char *indata, PE_HEADER *header, BIO *hash, BIO *ou * https://www.file-recovery.com/cab-signature-format.htm */ -static int verify_cab_header(char *indata, char *infile, cmd_type_t cmd, - size_t filesize, size_t *header_size, size_t *sigpos, size_t *siglen) +static int verify_cab_header(char *indata, char *infile, size_t filesize, FILE_HEADER *header) { int ret = 1; - size_t reserved, flags = 0; + size_t reserved; if (filesize < 44) { printf("Corrupt cab file - too short: %s\n", infile); @@ -2995,28 +2995,22 @@ static int verify_cab_header(char *indata, char *infile, cmd_type_t cmd, ret = 0; /* FAILED */ } /* flags specify bit-mapped values that indicate the presence of optional data */ - flags = GET_UINT16_LE(indata + 30); + header->flags = GET_UINT16_LE(indata + 30); #if 1 - if (flags & FLAG_PREV_CABINET) { - /* FLAG_NEXT_CABINET works */ - printf("Multivolume cabinet file is unsupported: flags 0x%04lX\n", flags); - ret = 0; /* FAILED */ - } -#endif - if (!(flags & FLAG_RESERVE_PRESENT) && - (cmd == CMD_REMOVE || cmd == CMD_EXTRACT)) { - printf("CAB file does not have any signature: %s\n", infile); + if (header->flags & FLAG_PREV_CABINET) { + /* FLAG_NEXT_CABINET works */ + printf("Multivolume cabinet file is unsupported: flags 0x%04lX\n", header->flags); ret = 0; /* FAILED */ } - - if (flags & FLAG_RESERVE_PRESENT) { +#endif + if (header->flags & FLAG_RESERVE_PRESENT) { /* * Additional headers is located at offset 36 (cbCFHeader, cbCFFolder, cbCFData); * size of header (4 bytes, little-endian order) must be 20 (checkpoint). */ - *header_size = GET_UINT32_LE(indata + 36); - if (*header_size != 20) { - printf("Additional header size: 0x%08lX\n", *header_size); + header->header_size = GET_UINT32_LE(indata + 36); + if (header->header_size != 20) { + printf("Additional header size: 0x%08lX\n", header->header_size); ret = 0; /* FAILED */ } reserved = GET_UINT32_LE(indata + 40); @@ -3033,14 +3027,17 @@ static int verify_cab_header(char *indata, char *infile, cmd_type_t cmd, * If there are additional headers, size of the CAB archive file is calcualted * as additional data offset plus additional data size. */ - *sigpos = GET_UINT32_LE(indata + 44); - *siglen = GET_UINT32_LE(indata + 48); - if (*sigpos < filesize && *sigpos + *siglen != filesize) { - printf("Additional data offset:\t%lu bytes\nAdditional data size:\t%lu bytes\n", *sigpos, *siglen); + header->sigpos = GET_UINT32_LE(indata + 44); + header->siglen = GET_UINT32_LE(indata + 48); + if (header->sigpos < filesize && header->sigpos + header->siglen != filesize) { + printf("Additional data offset:\t%lu bytes\nAdditional data size:\t%lu bytes\n", + header->sigpos, header->siglen); printf("File size:\t\t%lu bytes\n", filesize); ret = 0; /* FAILED */ } } + header->fileend = filesize; + return ret; } @@ -3157,7 +3154,7 @@ static int calc_cab_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, siz return 0; /* OK */ } -static int verify_cab_pkcs7(PKCS7 *p7, char *indata, size_t sigpos, char *leafhash, +static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, char *leafhash, int allownest, char *cafile, char *crlfile, char *untrusted) { int ret = 0; @@ -3196,8 +3193,8 @@ static int verify_cab_pkcs7(PKCS7 *p7, char *indata, size_t sigpos, char *leafha tohex(mdbuf, hexbuf, EVP_MD_size(md)); printf("Current message digest : %s\n", hexbuf); - bio = BIO_new_mem_buf(indata, sigpos); - ret |= calc_cab_digest(bio, md, cmdbuf, sigpos); + bio = BIO_new_mem_buf(indata, header->sigpos); + ret |= calc_cab_digest(bio, md, cmdbuf, header->sigpos); BIO_free(bio); tohex(cmdbuf, hexbuf, EVP_MD_size(md)); @@ -3212,7 +3209,7 @@ static int verify_cab_pkcs7(PKCS7 *p7, char *indata, size_t sigpos, char *leafha int has_sig = 0; PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig); if (p7nest) { - int nest_ret = verify_cab_pkcs7(p7nest, indata, sigpos, leafhash, 0, cafile, crlfile, untrusted); + int nest_ret = verify_cab_pkcs7(p7nest, indata, header, leafhash, 0, cafile, crlfile, untrusted); if (ret == 0) ret = nest_ret; PKCS7_free(p7nest); @@ -3225,54 +3222,54 @@ static int verify_cab_pkcs7(PKCS7 *p7, char *indata, size_t sigpos, char *leafha return ret; } -static PKCS7 *extract_existing_cab_pkcs7(char *indata, size_t sigpos, size_t siglen) +static PKCS7 *extract_existing_cab_pkcs7(char *indata, FILE_HEADER *header) { PKCS7 *p7 = NULL; const unsigned char *blob; - blob = (unsigned char*)indata + sigpos; - p7 = d2i_PKCS7(NULL, &blob, siglen); + blob = (unsigned char*)indata + header->sigpos; + p7 = d2i_PKCS7(NULL, &blob, header->siglen); return p7; } -static int verify_cab_file(char *indata, size_t header_size, size_t sigpos, size_t siglen, +static int verify_cab_file(char *indata, FILE_HEADER *header, char *leafhash, char *cafile, char *crlfile, char *untrusted) { PKCS7 *p7; int ret = 0; - if (header_size != 20) { + if (header->header_size != 20) { printf("No signature found\n\n"); return 1; /* FAILED */ } - p7 = extract_existing_cab_pkcs7(indata, sigpos, siglen); + p7 = extract_existing_cab_pkcs7(indata, header); if (!p7) { printf("Failed to extract PKCS7 data\n\n"); return -1; /* FAILED */ } - ret |= verify_cab_pkcs7(p7, indata, sigpos, leafhash, 1, cafile, crlfile, untrusted); + ret |= verify_cab_pkcs7(p7, indata, header, leafhash, 1, cafile, crlfile, untrusted); PKCS7_free(p7); return ret; } -static int extract_cab_file(char *indata, size_t sigpos, size_t siglen, BIO *outdata, int output_pkcs7) +static int extract_cab_file(char *indata, FILE_HEADER *header, BIO *outdata, int output_pkcs7) { int ret = 0; PKCS7 *sig; (void)BIO_reset(outdata); if (output_pkcs7) { - sig = extract_existing_cab_pkcs7(indata, sigpos, siglen); + sig = extract_existing_cab_pkcs7(indata, header); if (!sig) { fprintf(stderr, "Unable to extract existing signature\n"); return 1; /* FAILED */ } ret = !PEM_write_bio_PKCS7(outdata, sig); } else { - ret = !BIO_write(outdata, indata + sigpos, siglen); + ret = !BIO_write(outdata, indata + header->sigpos, header->siglen); } return ret; @@ -3319,7 +3316,7 @@ static void write_optional_names(size_t flags, char *indata, BIO *outdata, int * *len = i; } -static void remove_cab_file(char *indata, size_t siglen, size_t filesize, BIO *outdata) +static void remove_cab_file(char *indata, FILE_HEADER *header, size_t filesize, BIO *outdata) { int i; unsigned short nfolders; @@ -3375,10 +3372,10 @@ static void remove_cab_file(char *indata, size_t siglen, size_t filesize, BIO *o nfolders--; } /* Write what's left - the compressed data bytes */ - BIO_write(outdata, indata+i, filesize-siglen-i); + BIO_write(outdata, indata + i, filesize - header->siglen - i); } -static void modify_cab_header(char *indata, size_t fileend, BIO *hash, BIO *outdata) +static void modify_cab_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) { int i; unsigned short nfolders; @@ -3427,15 +3424,15 @@ static void modify_cab_header(char *indata, size_t fileend, BIO *hash, BIO *outd */ nfolders = GET_UINT16_LE(indata + 26); while (nfolders) { - BIO_write(hash, indata+i, 8); - i+=8; + BIO_write(hash, indata + i, 8); + i += 8; nfolders--; } /* Write what's left - the compressed data bytes */ - BIO_write(hash, indata+i, fileend-i); + BIO_write(hash, indata + i, header->sigpos - i); } -static void add_cab_header(char *indata, size_t fileend, BIO *hash, BIO *outdata) +static void add_cab_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) { int i; unsigned short nfolders; @@ -3489,16 +3486,16 @@ static void add_cab_header(char *indata, size_t fileend, BIO *hash, BIO *outdata */ nfolders = GET_UINT16_LE(indata + 26); while (nfolders) { - tmp = GET_UINT32_LE(indata+i); + tmp = GET_UINT32_LE(indata + i); tmp += 24; PUT_UINT32_LE(tmp, buf); BIO_write(hash, buf, 4); - BIO_write(hash, indata+i+4, 4); - i+=8; + BIO_write(hash, indata + i + 4, 4); + i += 8; nfolders--; } /* Write what's left - the compressed data bytes */ - BIO_write(hash, indata+i, fileend-i); + BIO_write(hash, indata + i, header->fileend - i); } static void add_jp_attribute(PKCS7_SIGNER_INFO *si, int jp) @@ -3718,7 +3715,7 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) PKCS7 *sig = NULL; size_t sigfilesize; char *insigdata; - PE_HEADER sigheader; + FILE_HEADER header; BIO *sigbio; const char pemhdr[] = "-----BEGIN PKCS7-----"; @@ -3739,15 +3736,17 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) BIO_free_all(sigbio); } else { if (type == FILE_TYPE_PE) { - if (!verify_pe_header(insigdata, sigfile, sigfilesize, &sigheader)) + if (!verify_pe_header(insigdata, sigfile, sigfilesize, &header)) return NULL; /* FAILED */ - sig = extract_existing_pe_pkcs7(insigdata, &sigheader); + sig = extract_existing_pe_pkcs7(insigdata, &header); if (!sig) { fprintf(stderr, "Failed to extract PKCS7 data: %s\n", sigfile); return NULL; /* FAILED */ } } else if (type == FILE_TYPE_CAB) { - sig = extract_existing_cab_pkcs7(insigdata, 0, sigfilesize); + if (!verify_cab_header(insigdata, sigfile, sigfilesize, &header)) + return NULL; /* FAILED */ + sig = extract_existing_cab_pkcs7(insigdata, &header); if (!sig) { fprintf(stderr, "Failed to extract PKCS7 data: %s\n", sigfile); return NULL; /* FAILED */ @@ -3800,13 +3799,12 @@ int main(int argc, char **argv) { int addBlob = 0; u_char *p = NULL; int ret = 0, i, len = 0, jp = -1, comm = 0, pagehash = 0; - PE_HEADER header; + FILE_HEADER header; size_t padlen = 0; size_t filesize, fileend, outdatasize; file_type_t type; cmd_type_t cmd = CMD_SIGN; char *failarg = NULL; - size_t header_size = 0, sigpos = 0, siglen = 0; static u_char msi_signature[] = { 0xd0, 0xcf, 0x11, 0xe0, 0xa1, 0xb1, 0x1a, 0xe1 @@ -4229,7 +4227,7 @@ int main(int argc, char **argv) { if (add_msi_dse == 1) fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); #endif - if (!verify_cab_header(indata, infile, cmd, filesize, &header_size, &sigpos, &siglen)) + if (!verify_cab_header(indata, infile, filesize, &header)) goto err_cleanup; } else if (type == FILE_TYPE_PE) { @@ -4391,30 +4389,34 @@ int main(int argc, char **argv) { } if (type == FILE_TYPE_CAB) { + if (!(header.flags & FLAG_RESERVE_PRESENT) && + (cmd == CMD_REMOVE || cmd == CMD_EXTRACT)) { + DO_EXIT_1("CAB file does not have any signature: %s\n", infile); + } if (cmd == CMD_EXTRACT) { - ret = extract_cab_file(indata, sigpos, siglen, outdata, output_pkcs7); + ret = extract_cab_file(indata, &header, outdata, output_pkcs7); goto skip_signing; } if (cmd == CMD_REMOVE) { - remove_cab_file(indata, siglen, filesize, outdata); + remove_cab_file(indata, &header, filesize, outdata); goto skip_signing; } if (cmd == CMD_VERIFY) { - ret = verify_cab_file(indata, header_size, sigpos, siglen, leafhash, cafile, crlfile, untrusted); + ret = verify_cab_file(indata, &header, leafhash, cafile, crlfile, untrusted); goto skip_signing; } if ((cmd == CMD_SIGN && nest) || (cmd == CMD_ATTACH && nest) || cmd == CMD_ADD) { - cursig = extract_existing_cab_pkcs7(indata, sigpos, siglen); + cursig = extract_existing_cab_pkcs7(indata, &header); if (!cursig) DO_EXIT_0("Unable to extract existing signature\n"); if (cmd == CMD_ADD) sig = cursig; } - if (header_size == 20) + if (header.header_size == 20) /* Strip current signature and modify header */ - modify_cab_header(indata, sigpos, hash, outdata); + modify_cab_header(indata, &header, hash, outdata); else - add_cab_header(indata, fileend, hash, outdata); + add_cab_header(indata, &header, hash, outdata); } else if (type == FILE_TYPE_PE) { if ((cmd == CMD_REMOVE || cmd == CMD_EXTRACT) && header.sigpos == 0) @@ -4514,8 +4516,9 @@ int main(int argc, char **argv) { p7x = NULL; } - if (type == FILE_TYPE_PE) - get_indirect_data_blob(&p, &len, md, type, pagehash, indata, header.peheader, header.pe32plus, header.fileend); + if (type == FILE_TYPE_PE || type == FILE_TYPE_CAB) + get_indirect_data_blob(&p, &len, md, type, pagehash, indata, + header.header_size, header.pe32plus, header.fileend); else get_indirect_data_blob(&p, &len, md, type, pagehash, indata, 0, 0, fileend); len -= EVP_MD_size(md); @@ -4631,7 +4634,7 @@ skip_signing: if (type == FILE_TYPE_PE) { if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { /* Update signature position and size */ - (void)BIO_seek(outdata, header.peheader + 152 + header.pe32plus * 16); + (void)BIO_seek(outdata, header.header_size + 152 + header.pe32plus * 16); PUT_UINT32_LE(header.fileend, buf); /* Previous file end = signature table start */ BIO_write(outdata, buf, 4); PUT_UINT32_LE(len+8+padlen, buf); @@ -4673,9 +4676,9 @@ skip_signing: outdataverify = map_file(outfile, outdatasize); if (!outdataverify) DO_EXIT_0("Error verifying result\n"); - if (!verify_cab_header(outdataverify, outfile, cmd, outdatasize, &header_size, &sigpos, &siglen)) + if (!verify_cab_header(outdataverify, outfile, outdatasize, &header)) goto err_cleanup; - ret = verify_cab_file(outdataverify, header_size, sigpos, siglen, leafhash, cafile, crlfile, untrusted); + ret = verify_cab_file(outdataverify, &header, leafhash, cafile, crlfile, untrusted); if (ret) DO_EXIT_0("Signature mismatch\n"); } else if (type == FILE_TYPE_MSI) { From f0050d60339e6ab11c659464aba76adf4a806a8a Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 12 Mar 2020 13:35:30 +0100 Subject: [PATCH 06/35] MSI Digital Signatures support --- osslsigncode.c | 285 ++++++++++++++++++++++++++++--------------------- 1 file changed, 166 insertions(+), 119 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 11f2c14..1deb1e6 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -2652,8 +2652,147 @@ out: return p7; } +static int msi_extract_file(GsfInfile *ole, char *outfile, int output_pkcs7) +{ + int ret = 0; + BIO *outdata; + PKCS7 *sig; + + if (output_pkcs7) { + sig = msi_extract_signature_to_pkcs7(ole); + if (!sig) { + fprintf(stderr, "Unable to extract existing signature\n"); + return 1; /* FAILED */ + } + outdata = BIO_new_file(outfile, "w+bx"); + if (outdata == NULL) { + fprintf(stderr, "Unable to create %s\n", outfile); + return 1; /* FAILED */ + } + ret = !PEM_write_bio_PKCS7(outdata, sig); + BIO_free_all(outdata); + } else { + ret = msi_extract_signature_to_file(ole, outfile); + } + + return ret; +} + +/* + * Perform a sanity check for the MsiDigitalSignatureEx section. + * If the file we're attempting to sign has an MsiDigitalSignatureEx + * section, we can't add a nested signature of a different MD type + * without breaking the initial signature. + */ +static int msi_check_MsiDigitalSignatureEx(GsfInfile *ole, const EVP_MD *md) +{ + unsigned long dselen = 0; + int mdlen, has_dse = 0; + + if (msi_extract_dse(ole, NULL, &dselen, &has_dse) != 0 && has_dse) { + fprintf(stderr, "Unable to extract MsiDigitalSigantureEx section\n\n"); + return 0; /* FAILED */ + } + if (has_dse) { + mdlen = EVP_MD_size(md); + if (dselen != (unsigned long)mdlen) { + fprintf(stderr,"Unable to add nested signature with a different MD type (-h parameter) " + "than what exists in the MSI file already.\nThis is due to the presence of " + "MsiDigitalSigantureEx (-add-msi-dse parameter).\n\n"); + return 0; /* FAILED */ + } + } + + return 1; /* OK */ +} + +/* + * MsiDigitalSignatureEx is an enhanced signature type that + * can be used when signing MSI files. In addition to + * file content, it also hashes some file metadata, specifically + * file names, file sizes, creation times and modification times. + * + * The file content hashing part stays the same, so the + * msi_handle_dir() function can be used across both variants. + * + * When an MsiDigitalSigntaureEx section is present in an MSI file, + * the meaning of the DigitalSignature section changes: Instead + * of being merely a file content hash (as what is output by the + * msi_handle_dir() function), it is now hashes both content + * and metadata. + * + * Here is how it works: + * + * First, a "pre-hash" is calculated. This is the "metadata" hash. + * It iterates over the files in the MSI in the same order as the + * file content hashing method would - but it only processes the + * metadata. + * + * Once the pre-hash is calculated, a new hash is created for + * calculating the hash of the file content. The output of the + * pre-hash is added as the first element of the file content hash. + * + * After the pre-hash is written, what follows is the "regular" + * stream of data that would normally be written when performing + * file content hashing. + * + * The output of this hash, which combines both metadata and file + * content, is what will be output in signed form to the + * DigitalSignature section when in 'MsiDigitalSignatureEx' mode. + * + * As mentioned previously, this new mode of operation is signalled + * by the presence of a 'MsiDigitalSignatureEx' section in the MSI + * file. This section must come after the 'DigitalSignature' + * section, and its content must be the output of the pre-hash + * ("metadata") hash. + */ + +static int msi_calc_MsiDigitalSignatureEx(GsfInfile *ole, const EVP_MD *md, + BIO *hash, u_char *p_msiex, int *len_msiex) +{ + BIO *prehash; + + prehash = BIO_new(BIO_f_md()); + BIO_set_md(prehash, md); + BIO_push(prehash, BIO_new(BIO_s_null())); + + if (!msi_prehash(ole, NULL, prehash)) { + fprintf(stderr, "Unable to calculate MSI pre-hash ('metadata') hash\n"); + return 0; /* FAILED */ + } + *len_msiex = BIO_gets(prehash, (char*)p_msiex, EVP_MAX_MD_SIZE); + BIO_write(hash, p_msiex, *len_msiex); + + return 1; /* OK */ +} #endif +static int msi_add_DigitalSignature(GsfOutfile *outole, u_char *p, int len) +{ + GsfOutput *child; + int ret = 1; + + child = gsf_outfile_new_child(outole, "\05DigitalSignature", FALSE); + if (!gsf_output_write(child, len, p)) + ret = 0; + gsf_output_close(child); + + return ret; +} + +static int msi_add_MsiDigitalSignatureEx(GsfOutfile *outole, u_char *p_msiex, int len_msiex) +{ + GsfOutput *child; + int ret = 1; + + child = gsf_outfile_new_child(outole, "\05MsiDigitalSignatureEx", FALSE); + if (!gsf_output_write(child, len_msiex, p_msiex)) + ret = 0; + gsf_output_close(child); + + return ret; +} + /* * PE file support */ @@ -2850,8 +2989,9 @@ static PKCS7 *extract_existing_pe_pkcs7(char *indata, FILE_HEADER *header) return p7; } + static int verify_pe_file(char *indata, FILE_HEADER *header, - char *leafhash, char *cafile, char *crlfile, char *untrusted) + char *leafhash, char *cafile, char *crlfile, char *untrusted) { int ret = 0; @@ -2944,7 +3084,6 @@ static int verify_pe_header(char *indata, char *infile, size_t filesize, FILE_HE printf("Corrupt PE file - current signature not at end of file: %s\n", infile); ret = 0; /* FAILED */ } - header->fileend = filesize; return ret; } @@ -3036,7 +3175,6 @@ static int verify_cab_header(char *indata, char *infile, size_t filesize, FILE_H ret = 0; /* FAILED */ } } - header->fileend = filesize; return ret; } @@ -3730,6 +3868,10 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) return NULL; /* FAILED */ } + /* reset header */ + memset(&header, 0, sizeof(FILE_HEADER)); + header.fileend = sigfilesize; + if (sigfilesize >= sizeof(pemhdr) && !memcmp(insigdata, pemhdr, sizeof(pemhdr)-1)) { sigbio = BIO_new_mem_buf(insigdata, sigfilesize); sig = PEM_read_bio_PKCS7(sigbio, NULL, NULL, NULL); @@ -3801,7 +3943,7 @@ int main(int argc, char **argv) { int ret = 0, i, len = 0, jp = -1, comm = 0, pagehash = 0; FILE_HEADER header; size_t padlen = 0; - size_t filesize, fileend, outdatasize; + size_t filesize, outdatasize; file_type_t type; cmd_type_t cmd = CMD_SIGN; char *failarg = NULL; @@ -4201,7 +4343,9 @@ int main(int argc, char **argv) { if (indata == NULL) DO_EXIT_1("Failed to open file: %s\n", infile); - fileend = filesize; + /* reset header */ + memset(&header, 0, sizeof(FILE_HEADER)); + header.fileend = filesize; if (!memcmp(indata, "MSCF", 4)) { type = FILE_TYPE_CAB; @@ -4250,123 +4394,39 @@ int main(int argc, char **argv) { GsfInput *src; GsfInfile *ole; - BIO_push(hash, BIO_new(BIO_s_null())); - src = gsf_input_stdio_new(infile, NULL); if (!src) DO_EXIT_1("Error opening file %s\n", infile); ole = gsf_infile_msole_new(src, NULL); if (cmd == CMD_EXTRACT) { - if (output_pkcs7) { - sig = msi_extract_signature_to_pkcs7(ole); - if (!sig) - DO_EXIT_0("Unable to extract existing signature\n"); - outdata = BIO_new_file(outfile, "w+bx"); - if (outdata == NULL) - DO_EXIT_1("Unable to create %s\n", outfile); - ret = !PEM_write_bio_PKCS7(outdata, sig); - BIO_free_all(outdata); - } else { - ret = msi_extract_signature_to_file(ole, outfile); - } + ret = msi_extract_file(ole, outfile, output_pkcs7); goto skip_signing; } else if (cmd == CMD_VERIFY) { ret = msi_verify_file(ole, leafhash, cafile, crlfile, untrusted); goto skip_signing; - } else if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { - if (nest || cmd == CMD_ADD) { - /* - * Perform a sanity check for the MsiDigitalSignatureEx section. - * If the file we're attempting to sign has an MsiDigitalSignatureEx - * section, we can't add a nested signature of a different MD type - * without breaking the initial signature. - */ - { - unsigned long dselen = 0; - int has_dse = 0; - if (msi_extract_dse(ole, NULL, &dselen, &has_dse) != 0 && has_dse) { - DO_EXIT_0("Unable to extract MsiDigitalSigantureEx section\n"); - } - if (has_dse) { - int mdlen = EVP_MD_size(md); - if (dselen != (unsigned long)mdlen) { - DO_EXIT_0("Unable to add nested signature with a different MD type (-h parameter) " - "than what exists in the MSI file already. This is due to the presence of " - "MsiDigitalSigantureEx (-add-msi-dse parameter).\n"); - } - } - } - - cursig = msi_extract_signature_to_pkcs7(ole); - if (cursig == NULL) { - DO_EXIT_0("Unable to extract existing signature in -nest mode\n"); - } - if (cmd == CMD_ADD) { - sig = cursig; - } + } else if ((cmd == CMD_SIGN && nest) || (cmd == CMD_ATTACH && nest) || cmd == CMD_ADD) { + if (!msi_check_MsiDigitalSignatureEx(ole, md)) + goto err_cleanup; + cursig = msi_extract_signature_to_pkcs7(ole); + if (cursig == NULL) { + DO_EXIT_0("Unable to extract existing signature in -nest mode\n"); + } + if (cmd == CMD_ADD) { + sig = cursig; } } - sink = gsf_output_stdio_new(outfile, NULL); if (!sink) DO_EXIT_1("Error opening output file %s\n", outfile); outole = gsf_outfile_msole_new(sink); - /* - * MsiDigitalSignatureEx is an enhanced signature type that - * can be used when signing MSI files. In addition to - * file content, it also hashes some file metadata, specifically - * file names, file sizes, creation times and modification times. - * - * The file content hashing part stays the same, so the - * msi_handle_dir() function can be used across both variants. - * - * When an MsiDigitalSigntaureEx section is present in an MSI file, - * the meaning of the DigitalSignature section changes: Instead - * of being merely a file content hash (as what is output by the - * msi_handle_dir() function), it is now hashes both content - * and metadata. - * - * Here is how it works: - * - * First, a "pre-hash" is calculated. This is the "metadata" hash. - * It iterates over the files in the MSI in the same order as the - * file content hashing method would - but it only processes the - * metadata. - * - * Once the pre-hash is calculated, a new hash is created for - * calculating the hash of the file content. The output of the - * pre-hash is added as the first element of the file content hash. - * - * After the pre-hash is written, what follows is the "regular" - * stream of data that would normally be written when performing - * file content hashing. - * - * The output of this hash, which combines both metadata and file - * content, is what will be output in signed form to the - * DigitalSignature section when in 'MsiDigitalSignatureEx' mode. - * - * As mentioned previously, this new mode of operation is signalled - * by the presence of a 'MsiDigitalSignatureEx' section in the MSI - * file. This section must come after the 'DigitalSignature' - * section, and its content must be the output of the pre-hash - * ("metadata") hash. - */ + BIO_push(hash, BIO_new(BIO_s_null())); if (add_msi_dse) { - BIO *prehash = BIO_new(BIO_f_md()); - BIO_set_md(prehash, md); - BIO_push(prehash, BIO_new(BIO_s_null())); - - if (!msi_prehash(ole, NULL, prehash)) - DO_EXIT_0("Unable to calculate MSI pre-hash ('metadata') hash\n"); - p_msiex = malloc(EVP_MAX_MD_SIZE); - len_msiex = BIO_gets(prehash, (char*)p_msiex, EVP_MAX_MD_SIZE); - - BIO_write(hash, p_msiex, len_msiex); + if (!msi_calc_MsiDigitalSignatureEx(ole, md, hash, p_msiex, &len_msiex)) + goto err_cleanup; } - if (!msi_handle_dir(ole, outole, hash)) { DO_EXIT_0("Unable to msi_handle_dir()\n"); } @@ -4516,11 +4576,8 @@ int main(int argc, char **argv) { p7x = NULL; } - if (type == FILE_TYPE_PE || type == FILE_TYPE_CAB) - get_indirect_data_blob(&p, &len, md, type, pagehash, indata, + get_indirect_data_blob(&p, &len, md, type, pagehash, indata, header.header_size, header.pe32plus, header.fileend); - else - get_indirect_data_blob(&p, &len, md, type, pagehash, indata, 0, 0, fileend); len -= EVP_MD_size(md); memcpy(buf, p, len); OPENSSL_free(p); @@ -4597,7 +4654,6 @@ add_only: if (type == FILE_TYPE_PE || type == FILE_TYPE_CAB) { BIO_write(outdata, p, len); - /* pad (with 0's) asn1 blob to 8 byte boundary */ if (padlen > 0) { memset(p, 0, padlen); @@ -4607,19 +4663,10 @@ add_only: } else if (type == FILE_TYPE_MSI) { /* Only output signatures if we're signing. */ if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { - GsfOutput *child = gsf_outfile_new_child(outole, "\05DigitalSignature", FALSE); - if (!gsf_output_write(child, len, p)) + if (!msi_add_DigitalSignature(outole, p, len)) DO_EXIT_1("Failed to write MSI 'DigitalSignature' signature to %s\n", infile); - gsf_output_close(child); - - if (p_msiex != NULL) { - child = gsf_outfile_new_child(outole, "\05MsiDigitalSignatureEx", FALSE); - if (!gsf_output_write(child, len_msiex, p_msiex)) { - DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", infile); - } - gsf_output_close(child); - } - + if (p_msiex != NULL && !msi_add_MsiDigitalSignatureEx(outole, p_msiex, len_msiex)) + DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", infile); gsf_output_close(GSF_OUTPUT(outole)); g_object_unref(sink); } From e7f0577bf3ca436f767927ee20a035593fbea7fe Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 12 Mar 2020 14:13:26 +0100 Subject: [PATCH 07/35] set_signing_bob --- osslsigncode.c | 68 ++++++++++++++++++++++++++++++-------------------- 1 file changed, 41 insertions(+), 27 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 1deb1e6..4046462 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -3714,6 +3714,44 @@ static int add_opus_attribute(PKCS7_SIGNER_INFO *si, char *desc, char *url) return 1; /* OK */ } +static int set_signing_bob(PKCS7 *sig, BIO *hash, char *buf, int len) +{ + unsigned char mdbuf[EVP_MAX_MD_SIZE]; + int mdlen; + size_t seqhdrlen; + BIO *sigbio; + PKCS7 *td7; + + mdlen = BIO_gets(hash, (char*)mdbuf, EVP_MAX_MD_SIZE); + memcpy(buf+len, mdbuf, mdlen); + seqhdrlen = asn1_simple_hdr_len((unsigned char*)buf, len); + + if ((sigbio = PKCS7_dataInit(sig, NULL)) == NULL) + return 0; /* FAILED */ + BIO_write(sigbio, buf+seqhdrlen, len-seqhdrlen+mdlen); + (void)BIO_flush(sigbio); + + if (!PKCS7_dataFinal(sig, sigbio)) + return 0; /* FAILED */ + BIO_free_all(sigbio); + + /* + replace the data part with the MS Authenticode + spcIndirectDataContext blob + */ + td7 = PKCS7_new(); + td7->type = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1); + td7->d.other = ASN1_TYPE_new(); + td7->d.other->type = V_ASN1_SEQUENCE; + td7->d.other->value.sequence = ASN1_STRING_new(); + ASN1_STRING_set(td7->d.other->value.sequence, buf, len+mdlen); + if (!PKCS7_set_content(sig, td7)) { + PKCS7_free(td7); + return 0; /* FAILED */ + } + return 1; /* OK */ +} + static STACK_OF(X509) *PEM_read_certs_with_pass(BIO *bin, char *certpass) { STACK_OF(X509) *certs = sk_X509_new_null(); @@ -3907,7 +3945,7 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) } int main(int argc, char **argv) { - BIO *btmp, *sigbio, *hash, *outdata; + BIO *btmp, *hash, *outdata; PKCS12 *p12; PKCS7 *p7 = NULL, *cursig = NULL, *outsig = NULL, *sig = NULL, *p7x = NULL; X509 *cert = NULL; @@ -4581,33 +4619,9 @@ int main(int argc, char **argv) { len -= EVP_MD_size(md); memcpy(buf, p, len); OPENSSL_free(p); - unsigned char mdbuf[EVP_MAX_MD_SIZE]; - int mdlen = BIO_gets(hash, (char*)mdbuf, EVP_MAX_MD_SIZE); - memcpy(buf+len, mdbuf, mdlen); - size_t seqhdrlen = asn1_simple_hdr_len((unsigned char*)buf, len); - - if ((sigbio = PKCS7_dataInit(sig, NULL)) == NULL) - DO_EXIT_0("Signing failed(PKCS7_dataInit)\n"); - BIO_write(sigbio, buf+seqhdrlen, len-seqhdrlen+mdlen); - (void)BIO_flush(sigbio); - - if (!PKCS7_dataFinal(sig, sigbio)) - DO_EXIT_0("Signing failed(PKCS7_dataFinal)\n"); - BIO_free_all(sigbio); - - /* replace the data part with the MS Authenticode - spcIndirectDataContext blob */ - PKCS7 *td7 = PKCS7_new(); - td7->type = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1); - td7->d.other = ASN1_TYPE_new(); - td7->d.other->type = V_ASN1_SEQUENCE; - td7->d.other->value.sequence = ASN1_STRING_new(); - ASN1_STRING_set(td7->d.other->value.sequence, buf, len+mdlen); - if (!PKCS7_set_content(sig, td7)) { - PKCS7_free(td7); - DO_EXIT_0("Signing failed(PKCS7_set_content)\n"); - } + if (!set_signing_bob(sig, hash, buf, len)) + DO_EXIT_0("Signing failed\n"); add_only: From 29b138a667390776d2e5ecae989429c5bf602624 Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 12 Mar 2020 15:03:36 +0100 Subject: [PATCH 08/35] create_new_signature() --- osslsigncode.c | 136 ++++++++++++++++++++++++++++--------------------- 1 file changed, 78 insertions(+), 58 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 4046462..e4caf19 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -3714,6 +3714,72 @@ static int add_opus_attribute(PKCS7_SIGNER_INFO *si, char *desc, char *url) return 1; /* OK */ } +static int create_new_signature(PKCS7 *sig, STACK_OF(X509) *certs, STACK_OF(X509) *xcerts, + X509 *cert, EVP_PKEY *pkey, const EVP_MD *md, time_t signing_time, + file_type_t type, int jp, int comm, char *desc, char *url) +{ + int i; + PKCS7_SIGNER_INFO *si; + X509 *signcert; + + PKCS7_set_type(sig, NID_pkcs7_signed); + si = NULL; + if (cert != NULL) + si = PKCS7_add_signature(sig, cert, pkey, md); + + for (i=0; si == NULL && i= 0) + add_jp_attribute(si, jp); + + add_purpose_attribute(si, comm); + + if ((desc || url) && !add_opus_attribute(si, desc, url)) { + fprintf(stderr, "Couldn't allocate memory for opus info\n"); + return 0; /* FAILED */ + } + + PKCS7_content_new(sig, NID_pkcs7_data); + + if (cert != NULL) { + PKCS7_add_certificate(sig, cert); + X509_free(cert); + cert = NULL; + } + if (xcerts) { + for(i = sk_X509_num(xcerts)-1; i>=0; i--) + PKCS7_add_certificate(sig, sk_X509_value(xcerts, i)); + } + for (i = sk_X509_num(certs)-1; i>=0; i--) + PKCS7_add_certificate(sig, sk_X509_value(certs, i)); + + if (certs) { + sk_X509_free(certs); + certs = NULL; + } + if (xcerts) { + sk_X509_free(xcerts); + xcerts = NULL; + } + + return 1; /* OK */ +} + static int set_signing_bob(PKCS7 *sig, BIO *hash, char *buf, int len) { unsigned char mdbuf[EVP_MAX_MD_SIZE]; @@ -3726,13 +3792,17 @@ static int set_signing_bob(PKCS7 *sig, BIO *hash, char *buf, int len) memcpy(buf+len, mdbuf, mdlen); seqhdrlen = asn1_simple_hdr_len((unsigned char*)buf, len); - if ((sigbio = PKCS7_dataInit(sig, NULL)) == NULL) + if ((sigbio = PKCS7_dataInit(sig, NULL)) == NULL) { + fprintf(stderr, "PKCS7_dataInit failed\n"); return 0; /* FAILED */ + } BIO_write(sigbio, buf+seqhdrlen, len-seqhdrlen+mdlen); (void)BIO_flush(sigbio); - if (!PKCS7_dataFinal(sig, sigbio)) + if (!PKCS7_dataFinal(sig, sigbio)) { + fprintf(stderr, "PKCS7_dataFinal failed\n"); return 0; /* FAILED */ + } BIO_free_all(sigbio); /* @@ -3747,6 +3817,7 @@ static int set_signing_bob(PKCS7 *sig, BIO *hash, char *buf, int len) ASN1_STRING_set(td7->d.other->value.sequence, buf, len+mdlen); if (!PKCS7_set_content(sig, td7)) { PKCS7_free(td7); + fprintf(stderr, "PKCS7_set_content failed\n"); return 0; /* FAILED */ } return 1; /* OK */ @@ -3951,7 +4022,6 @@ int main(int argc, char **argv) { X509 *cert = NULL; STACK_OF(X509) *certs = NULL, *xcerts = NULL; EVP_PKEY *pkey = NULL; - PKCS7_SIGNER_INFO *si; const EVP_MD *md; time_t signing_time = (time_t)-1; @@ -4361,6 +4431,8 @@ int main(int argc, char **argv) { (xcerts = PEM_read_certs(btmp, "")) == NULL)) DO_EXIT_1("Failed to read cross certificate file: %s\n", xcertfile); BIO_free(btmp); + PKCS7_free(p7x); + p7x = NULL; } if (pass) { @@ -4555,64 +4627,14 @@ int main(int argc, char **argv) { goto skip_signing; sig = PKCS7_new(); - PKCS7_set_type(sig, NID_pkcs7_signed); + if (!create_new_signature(sig, certs, xcerts, cert, pkey, md, signing_time, + type, jp, comm, desc, url)) + DO_EXIT_0("Creating a new signature failed\n"); - si = NULL; - if (cert != NULL) - si = PKCS7_add_signature(sig, cert, pkey, md); - for (i=0; si == NULL && i= 0) - add_jp_attribute(si, jp); - - add_purpose_attribute(si, comm); - - if ((desc || url) && !add_opus_attribute(si, desc, url)) - DO_EXIT_0("Couldn't allocate memory for opus info\n"); - - PKCS7_content_new(sig, NID_pkcs7_data); - - if (cert != NULL) { - PKCS7_add_certificate(sig, cert); - X509_free(cert); - cert = NULL; - } - if (xcerts) { - for(i = sk_X509_num(xcerts)-1; i>=0; i--) - PKCS7_add_certificate(sig, sk_X509_value(xcerts, i)); - } - for(i = sk_X509_num(certs)-1; i>=0; i--) - PKCS7_add_certificate(sig, sk_X509_value(certs, i)); - - if (certs) { - sk_X509_free(certs); - certs = NULL; - } if (p7) { PKCS7_free(p7); p7 = NULL; } - if (xcerts) { - sk_X509_free(xcerts); - xcerts = NULL; - } - if (p7x) { - PKCS7_free(p7x); - p7x = NULL; - } get_indirect_data_blob(&p, &len, md, type, pagehash, indata, header.header_size, header.pe32plus, header.fileend); @@ -4785,8 +4807,6 @@ err_cleanup: sk_X509_free(certs); if (p7) PKCS7_free(p7); - if (p7x) - PKCS7_free(p7x); if (xcerts) sk_X509_free(xcerts); if (cert) From 9e670ea7a0e1b83daa2c1e9e7f8f97c2200de378 Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 12 Mar 2020 15:36:40 +0100 Subject: [PATCH 09/35] read_password --- osslsigncode.c | 48 +++++++++++++++++++++++++++++++----------------- 1 file changed, 31 insertions(+), 17 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index e4caf19..ecc036a 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -3930,6 +3930,35 @@ static char *getpassword(const char *prompt) } #endif +static int read_password(char *readpass, int askpass, char **pass) +{ + char passbuf[4096]; + int passfd, passlen; + + if (readpass) { + passfd = open(readpass, O_RDONLY); + if (passfd < 0) { + fprintf(stderr, "Failed to open password file: %s\n", readpass); + return 0; /* FAILED */ + } + passlen = read(passfd, passbuf, sizeof(passbuf)-1); + close(passfd); + if (passlen <= 0) { + fprintf(stderr, "Failed to read password from file: %s\n", readpass); + return 0; /* FAILED */ + } + passbuf[passlen] = 0x00; + *pass = strdup(passbuf); + memset(passbuf, 0, sizeof(passbuf)); +#ifdef PROVIDE_ASKPASS + } else if (askpass) { + *pass = getpassword("Password: "); +#endif + } + + return 1; /* OK */ +} + static char *get_cafile(void) { const char *sslpart1, *sslpart2; @@ -4313,23 +4342,8 @@ int main(int argc, char **argv) { usage(argv0, "all"); } - if (readpass) { - char passbuf[4096]; - int passfd = open(readpass, O_RDONLY); - if (passfd < 0) - DO_EXIT_1("Failed to open password file: %s\n", readpass); - int passlen = read(passfd, passbuf, sizeof(passbuf)-1); - close(passfd); - if (passlen <= 0) - DO_EXIT_1("Failed to read password from file: %s\n", readpass); - passbuf[passlen] = 0x00; - pass = strdup(passbuf); - memset(passbuf, 0, sizeof(passbuf)); -#ifdef PROVIDE_ASKPASS - } else if (askpass) { - pass = getpassword("Password: "); -#endif - } + if (!read_password(readpass, askpass, &pass)) + goto err_cleanup; if (cmd == CMD_SIGN) { /* Read certificate and key */ From 1281dbccf13c3853f52402835b7b17f2d43b1c48 Mon Sep 17 00:00:00 2001 From: olszomal Date: Fri, 13 Mar 2020 12:19:42 +0100 Subject: [PATCH 10/35] read certificate and key --- osslsigncode.c | 288 ++++++++++++++++++++++++++++--------------------- 1 file changed, 165 insertions(+), 123 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index ecc036a..ba3ec21 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -3959,6 +3959,165 @@ static int read_password(char *readpass, int askpass, char **pass) return 1; /* OK */ } +static char *read_key(char **keyfile, char *p11module) +{ + unsigned char magic[4]; + unsigned char pvkhdr[4] = { 0x1e, 0xf1, 0xb5, 0xb0 }; + char *pvkfile = NULL; + BIO *btmp; + + if (*keyfile && !p11module && (btmp = BIO_new_file(*keyfile, "rb")) != NULL) { + magic[0] = 0x00; + BIO_read(btmp, magic, 4); + if (!memcmp(magic, pvkhdr, 4)) { + pvkfile = *keyfile; + *keyfile = NULL; + } + BIO_free(btmp); + return pvkfile; + } else + return NULL; +} + +static int read_certificate(char *pkcs12file, char *pvkfile, char *certfile, + char *xcertfile, char *keyfile, char *p11module, char *p11engine, + char **pass, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **certs, + STACK_OF(X509) **xcerts) +{ + PKCS12 *p12; + PKCS7 *p7 = NULL, *p7x = NULL; + BIO *btmp; + const int CMD_MANDATORY = 0; + ENGINE *dyn, *pkcs11; + int ret = 1; + + if (pkcs12file != NULL) { + if ((btmp = BIO_new_file(pkcs12file, "rb")) == NULL || + (p12 = d2i_PKCS12_bio(btmp, NULL)) == NULL) { + fprintf(stderr, "Failed to read PKCS#12 file: %s\n", pkcs12file); + ret = 0; /* FAILED */ + } + BIO_free(btmp); + if (!PKCS12_parse(p12, *pass ? *pass : "", pkey, cert, certs)) { + fprintf(stderr, "Failed to parse PKCS#12 file: %s (Wrong password?)\n", pkcs12file); + ret = 0; /* FAILED */ + } + PKCS12_free(p12); + } else if (pvkfile != NULL) { + if ((btmp = BIO_new_file(certfile, "rb")) == NULL || + ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && + (*certs = PEM_read_certs(btmp, "")) == NULL)) { + fprintf(stderr, "Failed to read certificate file: %s\n", certfile); + ret = 0; /* FAILED */ + } + BIO_free(btmp); + if ((btmp = BIO_new_file(pvkfile, "rb")) == NULL || + ((*pkey = b2i_PVK_bio(btmp, NULL, *pass ? *pass : "")) == NULL && + (BIO_seek(btmp, 0) == 0) && + (*pkey = b2i_PVK_bio(btmp, NULL, NULL)) == NULL)) { + fprintf(stderr, "Failed to read PVK file: %s\n", pvkfile); + ret = 0; /* FAILED */ + } + BIO_free(btmp); + } else if (p11module != NULL) { + if (p11engine != NULL) { + ENGINE_load_dynamic(); + dyn = ENGINE_by_id("dynamic"); + if (!dyn) { + fprintf(stderr, "Failed to load 'dynamic' engine\n"); + ret = 0; /* FAILED */ + } + if (1 != ENGINE_ctrl_cmd_string(dyn, "SO_PATH", p11engine, CMD_MANDATORY)) { + fprintf(stderr, "Failed to set dyn SO_PATH to '%s'\n", p11engine); + ret = 0; /* FAILED */ + } + if (1 != ENGINE_ctrl_cmd_string(dyn, "ID", "pkcs11", CMD_MANDATORY)) { + fprintf(stderr, "Failed to set dyn ID to 'pkcs11'\n"); + ret = 0; /* FAILED */ + } + if (1 != ENGINE_ctrl_cmd(dyn, "LIST_ADD", 1, NULL, NULL, CMD_MANDATORY)) { + fprintf(stderr, "Failed to set dyn LIST_ADD to '1'\n"); + ret = 0; /* FAILED */ + } + if (1 != ENGINE_ctrl_cmd(dyn, "LOAD", 1, NULL, NULL, CMD_MANDATORY)) { + fprintf(stderr, "Failed to set dyn LOAD to '1'\n"); + ret = 0; /* FAILED */ + } + } else + ENGINE_load_builtin_engines(); + pkcs11 = ENGINE_by_id("pkcs11"); + if (!pkcs11) { + fprintf(stderr, "Failed to find and load pkcs11 engine\n"); + ret = 0; /* FAILED */ + } + if (1 != ENGINE_ctrl_cmd_string(pkcs11, "MODULE_PATH", p11module, CMD_MANDATORY)) { + fprintf(stderr, "Failed to set pkcs11 engine MODULE_PATH to '%s'\n", p11module); + ret = 0; /* FAILED */ + } + if (*pass != NULL && + 1 != ENGINE_ctrl_cmd_string(pkcs11, "PIN", *pass, CMD_MANDATORY)) { + fprintf(stderr, "Failed to set pkcs11 PIN\n"); + ret = 0; /* FAILED */ + } + if (1 != ENGINE_init(pkcs11)) { + fprintf(stderr, "Failed to initialized pkcs11 engine\n"); + ret = 0; /* FAILED */ + } + *pkey = ENGINE_load_private_key(pkcs11, keyfile, NULL, NULL); + if (*pkey == NULL) { + fprintf(stderr, "Failed to load private key %s\n", keyfile); + ret = 0; /* FAILED */ + } + if ((btmp = BIO_new_file(certfile, "rb")) == NULL || + ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && + (*certs = PEM_read_certs(btmp, "")) == NULL)) { + fprintf(stderr, "Failed to read certificate file: %s\n", certfile); + ret = 0; /* FAILED */ + } + BIO_free(btmp); + } else { + if ((btmp = BIO_new_file(certfile, "rb")) == NULL || + ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && + (*certs = PEM_read_certs(btmp, "")) == NULL)) { + fprintf(stderr, "Failed to read certificate file: %s\n", certfile); + ret = 0; /* FAILED */ + } + BIO_free(btmp); + if ((btmp = BIO_new_file(keyfile, "rb")) == NULL || + ((*pkey = d2i_PrivateKey_bio(btmp, NULL)) == NULL && + (BIO_seek(btmp, 0) == 0) && + (*pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, *pass ? *pass : "")) == NULL && + (BIO_seek(btmp, 0) == 0) && + (*pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, NULL)) == NULL)) { + fprintf(stderr, "Failed to read private key file: %s (Wrong password?)\n", keyfile); + ret = 0; /* FAILED */ + } + BIO_free(btmp); + } + + if (*certs == NULL && p7 != NULL) + *certs = sk_X509_dup(p7->d.sign->cert); + + if (xcertfile) { + if ((btmp = BIO_new_file(xcertfile, "rb")) == NULL || + ((p7x = d2i_PKCS7_bio(btmp, NULL)) == NULL && + (*xcerts = PEM_read_certs(btmp, "")) == NULL)) { + fprintf(stderr, "Failed to read cross certificate file: %s\n", xcertfile); + ret = 0; /* FAILED */ + } + BIO_free(btmp); + PKCS7_free(p7x); + p7x = NULL; + } + + if (*pass) { + memset(*pass, 0, strlen(*pass)); + *pass = NULL; + } + + return ret; /* OK */ +} + static char *get_cafile(void) { const char *sslpart1, *sslpart2; @@ -4045,9 +4204,8 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) } int main(int argc, char **argv) { - BIO *btmp, *hash, *outdata; - PKCS12 *p12; - PKCS7 *p7 = NULL, *cursig = NULL, *outsig = NULL, *sig = NULL, *p7x = NULL; + BIO *hash, *outdata; + PKCS7 *cursig = NULL, *outsig = NULL, *sig = NULL; X509 *cert = NULL; STACK_OF(X509) *certs = NULL, *xcerts = NULL; EVP_PKEY *pkey = NULL; @@ -4347,117 +4505,12 @@ int main(int argc, char **argv) { if (cmd == CMD_SIGN) { /* Read certificate and key */ - if (keyfile && !p11module && (btmp = BIO_new_file(keyfile, "rb")) != NULL) { - unsigned char magic[4]; - unsigned char pvkhdr[4] = { 0x1e, 0xf1, 0xb5, 0xb0 }; - magic[0] = 0x00; - BIO_read(btmp, magic, 4); - if (!memcmp(magic, pvkhdr, 4)) { - pvkfile = keyfile; - keyfile = NULL; - } - BIO_free(btmp); - } - - if (pkcs12file != NULL) { - if ((btmp = BIO_new_file(pkcs12file, "rb")) == NULL || - (p12 = d2i_PKCS12_bio(btmp, NULL)) == NULL) - DO_EXIT_1("Failed to read PKCS#12 file: %s\n", pkcs12file); - BIO_free(btmp); - if (!PKCS12_parse(p12, pass ? pass : "", &pkey, &cert, &certs)) - DO_EXIT_1("Failed to parse PKCS#12 file: %s (Wrong password?)\n", pkcs12file); - PKCS12_free(p12); - } else if (pvkfile != NULL) { - if ((btmp = BIO_new_file(certfile, "rb")) == NULL || - ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && - (certs = PEM_read_certs(btmp, "")) == NULL)) - DO_EXIT_1("Failed to read certificate file: %s\n", certfile); - BIO_free(btmp); - if ((btmp = BIO_new_file(pvkfile, "rb")) == NULL || - ((pkey = b2i_PVK_bio(btmp, NULL, pass ? pass : "")) == NULL && - (BIO_seek(btmp, 0) == 0) && - (pkey = b2i_PVK_bio(btmp, NULL, NULL)) == NULL)) - DO_EXIT_1("Failed to read PVK file: %s\n", pvkfile); - BIO_free(btmp); - } else if (p11module != NULL) { - const int CMD_MANDATORY = 0; - if (p11engine != NULL) { - ENGINE_load_dynamic(); - ENGINE * dyn = ENGINE_by_id("dynamic"); - if (!dyn) - DO_EXIT_0("Failed to load 'dynamic' engine\n"); - if (1 != ENGINE_ctrl_cmd_string(dyn, "SO_PATH", p11engine, CMD_MANDATORY)) - DO_EXIT_1("Failed to set dyn SO_PATH to '%s'\n", p11engine); - - if (1 != ENGINE_ctrl_cmd_string(dyn, "ID", "pkcs11", CMD_MANDATORY)) - DO_EXIT_0("Failed to set dyn ID to 'pkcs11'\n"); - - if (1 != ENGINE_ctrl_cmd(dyn, "LIST_ADD", 1, NULL, NULL, CMD_MANDATORY)) - DO_EXIT_0("Failed to set dyn LIST_ADD to '1'\n"); - - if (1 != ENGINE_ctrl_cmd(dyn, "LOAD", 1, NULL, NULL, CMD_MANDATORY)) - DO_EXIT_0("Failed to set dyn LOAD to '1'\n"); - } else - ENGINE_load_builtin_engines(); - - ENGINE * pkcs11 = ENGINE_by_id("pkcs11"); - if (!pkcs11) - DO_EXIT_0("Failed to find and load pkcs11 engine\n"); - - if (1 != ENGINE_ctrl_cmd_string(pkcs11, "MODULE_PATH", p11module, CMD_MANDATORY)) - DO_EXIT_1("Failed to set pkcs11 engine MODULE_PATH to '%s'\n", p11module); - - if (pass != NULL) { - if (1 != ENGINE_ctrl_cmd_string(pkcs11, "PIN", pass, CMD_MANDATORY)) - DO_EXIT_0("Failed to set pkcs11 PIN\n"); - } - - if (1 != ENGINE_init(pkcs11)) - DO_EXIT_0("Failed to initialized pkcs11 engine\n"); - - pkey = ENGINE_load_private_key(pkcs11, keyfile, NULL, NULL); - if (pkey == NULL) - DO_EXIT_1("Failed to load private key %s\n", keyfile); - if ((btmp = BIO_new_file(certfile, "rb")) == NULL || - ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && - (certs = PEM_read_certs(btmp, "")) == NULL)) - DO_EXIT_1("Failed to read certificate file: %s\n", certfile); - BIO_free(btmp); - } else { - if ((btmp = BIO_new_file(certfile, "rb")) == NULL || - ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && - (certs = PEM_read_certs(btmp, "")) == NULL)) - DO_EXIT_1("Failed to read certificate file: %s\n", certfile); - BIO_free(btmp); - if ((btmp = BIO_new_file(keyfile, "rb")) == NULL || - ((pkey = d2i_PrivateKey_bio(btmp, NULL)) == NULL && - (BIO_seek(btmp, 0) == 0) && - (pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, pass ? pass : "")) == NULL && - (BIO_seek(btmp, 0) == 0) && - (pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, NULL)) == NULL)) - DO_EXIT_1("Failed to read private key file: %s (Wrong password?)\n", keyfile); - BIO_free(btmp); - } - - if (xcertfile) { - if ((btmp = BIO_new_file(xcertfile, "rb")) == NULL || - ((p7x = d2i_PKCS7_bio(btmp, NULL)) == NULL && - (xcerts = PEM_read_certs(btmp, "")) == NULL)) - DO_EXIT_1("Failed to read cross certificate file: %s\n", xcertfile); - BIO_free(btmp); - PKCS7_free(p7x); - p7x = NULL; - } - - if (pass) { - memset (pass, 0, strlen(pass)); - pass = NULL; - } + pvkfile = read_key(&keyfile, p11module); + if (!read_certificate(pkcs12file, pvkfile, certfile, xcertfile, keyfile, + p11module, p11engine, &pass, &pkey, &cert, &certs, &xcerts)) + goto err_cleanup; } - if (certs == NULL && p7 != NULL) - certs = sk_X509_dup(p7->d.sign->cert); - /* Check if indata is cab or pe */ filesize = get_file_size(infile); if (filesize == 0) @@ -4645,11 +4698,6 @@ int main(int argc, char **argv) { type, jp, comm, desc, url)) DO_EXIT_0("Creating a new signature failed\n"); - if (p7) { - PKCS7_free(p7); - p7 = NULL; - } - get_indirect_data_blob(&p, &len, md, type, pagehash, indata, header.header_size, header.pe32plus, header.fileend); len -= EVP_MD_size(md); @@ -4812,15 +4860,9 @@ skip_signing: return ret; err_cleanup: - if (pass) { - memset (pass, 0, strlen(pass)); - pass = NULL; - } ERR_print_errors_fp(stderr); if (certs) sk_X509_free(certs); - if (p7) - PKCS7_free(p7); if (xcerts) sk_X509_free(xcerts); if (cert) From 5e0f6e17a993770f41df8c1c964b1630b6de3c1c Mon Sep 17 00:00:00 2001 From: olszomal Date: Mon, 16 Mar 2020 10:32:39 +0100 Subject: [PATCH 11/35] GLOBAL_OPTIONS struct --- osslsigncode.c | 532 +++++++++++++++++++++++++------------------------ 1 file changed, 276 insertions(+), 256 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index ba3ec21..d45c7c1 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -185,6 +185,45 @@ typedef unsigned char u_char; */ #define FLAG_RESERVE_PRESENT 0x0004 +typedef struct { + char *infile; + char *outfile; + char *sigfile; + char *certfile; + char *xcertfile; + char *keyfile; + char *pkcs12file; + int output_pkcs7; + char *p11engine; + char *p11module; + int askpass; + char *readpass; + char *pass; + int comm; + int pagehash; + char *desc; + const EVP_MD *md; + char *url; + time_t signing_time; +#ifdef ENABLE_CURL + char *turl[MAX_TS_SERVERS]; + char *tsurl[MAX_TS_SERVERS]; + char *proxy; + int noverifypeer; +#endif + int addBlob; + int nest; + int verbose; +#ifdef WITH_GSF + int add_msi_dse; +#endif + char *cafile; + char *crlfile; + char *untrusted; + char *leafhash; + int jp; +} GLOBAL_OPTIONS; + typedef struct { size_t header_size; int pe32plus; @@ -600,9 +639,6 @@ static int add_unauthenticated_blob(PKCS7 *sig) return 0; } - -static int g_verbose = 0; - #ifdef ENABLE_CURL static int blob_has_nl = 0; @@ -869,23 +905,23 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, return (int)c; } -static int add_timestamp_authenticode(PKCS7 *sig, char **url, int nurls, - char *proxy, int noverifypeer) +static int add_timestamp_authenticode(PKCS7 *sig, int nurls, GLOBAL_OPTIONS *options) { int i; for (i=0; iturl[i], options->proxy, 0, NULL, + options->verbose || nurls == 1, options->noverifypeer); if (!res) return 0; } return -1; } -static int add_timestamp_rfc3161(PKCS7 *sig, char **url, int nurls, - char *proxy, const EVP_MD *md, int noverifypeer) +static int add_timestamp_rfc3161(PKCS7 *sig, int nurls, GLOBAL_OPTIONS *options) { int i; for (i=0; itsurl[i], options->proxy, 1, options->md, + options->verbose || nurls == 1, options->noverifypeer); if (!res) return 0; } return -1; @@ -1775,7 +1811,8 @@ static PKCS7 *find_rfc3161(const unsigned char *data, int length, ASN1_UTCTIME * return p7; /* OK */ } -static int pkcs7_print_attributes(PKCS7_SIGNED *p7_signed, PKCS7 **tmstamp_p7, ASN1_UTCTIME **timestamp_time) +static int pkcs7_print_attributes(PKCS7_SIGNED *p7_signed, PKCS7 **tmstamp_p7, + ASN1_UTCTIME **timestamp_time, int verbose) { PKCS7_SIGNER_INFO *si; STACK_OF(X509_ATTRIBUTE) *unauth_attr; @@ -1826,7 +1863,7 @@ static int pkcs7_print_attributes(PKCS7_SIGNED *p7_signed, PKCS7 **tmstamp_p7, A value = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_UTF8STRING, NULL); if (value == NULL) return 0; /* FAILED */ - if (g_verbose) + if (verbose) printf("Data Blob: %s\n", OPENSSL_buf2hexstr(value->data, value->length)); printf("Data Blob length: %d bytes\n", value->length); } else if (!strcmp(object_txt, SPC_NESTED_SIGNATURE_OBJID)) { @@ -1940,15 +1977,15 @@ static int pkcs7_set_nested_signature(PKCS7 *p7, PKCS7 *p7nest, time_t signing_t return 1; } -static int verify_timestamp(PKCS7 *p7, PKCS7 *tmstamp_p7, char *untrusted) +static int verify_timestamp(PKCS7 *p7, PKCS7 *tmstamp_p7, GLOBAL_OPTIONS *options) { X509_STORE *store = NULL; PKCS7_SIGNER_INFO *si; int ret = 0, verok; - printf("TSA's certificates file: %s\n", untrusted); + printf("TSA's certificates file: %s\n", options->untrusted); store = X509_STORE_new(); - if (!load_file_lookup(store, untrusted, NULL, X509_PURPOSE_TIMESTAMP_SIGN)) { + if (!load_file_lookup(store, options->untrusted, NULL, X509_PURPOSE_TIMESTAMP_SIGN)) { printf("\nUse the \"-untrusted\" option to add the CA cert bundle to verify timestamp server.\n"); ret = 1; /* FAILED */ } @@ -1970,7 +2007,7 @@ static int verify_timestamp(PKCS7 *p7, PKCS7 *tmstamp_p7, char *untrusted) return ret; } -static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, char *cafile, char *crlfile) +static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, GLOBAL_OPTIONS *options) { X509_STORE *store = NULL; int ret = 0, verok; @@ -1980,7 +2017,7 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, char *ca time_t time; store = X509_STORE_new(); - if (!load_file_lookup(store, cafile, crlfile, X509_PURPOSE_CRL_SIGN)) { + if (!load_file_lookup(store, options->cafile, options->crlfile, X509_PURPOSE_CRL_SIGN)) { fprintf(stderr, "Failed to add store lookup file\n"); ret = 1; /* FAILED */ } @@ -2010,33 +2047,33 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, char *ca return ret; } -static int verify_pkcs7(PKCS7 *p7, char *leafhash, char *cafile, char *crlfile, char *untrusted) +static int verify_pkcs7(PKCS7 *p7, GLOBAL_OPTIONS *options) { PKCS7 *tmstamp_p7 = NULL; ASN1_UTCTIME *timestamp_time = NULL; int ret = 0, leafok = 0; - if (!find_signers(p7, leafhash, &leafok)) + if (!find_signers(p7, options->leafhash, &leafok)) printf("Find signers error"); /* FAILED */ if (!print_certs(p7)) printf("Print certs error"); /* FAILED */ - if (!pkcs7_print_attributes(p7->d.sign, &tmstamp_p7, ×tamp_time)) + if (!pkcs7_print_attributes(p7->d.sign, &tmstamp_p7, ×tamp_time, options->verbose)) ret = 1; /* FAILED */ - if (leafhash != NULL) { + if (options->leafhash != NULL) { printf("Leaf hash match: %s\n", leafok ? "ok" : "failed"); if (!leafok) ret = 1; /* FAILED */ } - printf("\nCAfile: %s\n", cafile); - if (crlfile) - printf("CRLfile: %s\n", crlfile); + printf("\nCAfile: %s\n", options->cafile); + if (options->crlfile) + printf("CRLfile: %s\n", options->crlfile); if (tmstamp_p7) - ret |= verify_timestamp(p7, tmstamp_p7, untrusted); + ret |= verify_timestamp(p7, tmstamp_p7, options); else printf("\nFile is not timestamped\n"); if (ret == 1) timestamp_time = NULL; - ret |= verify_authenticode(p7, timestamp_time, cafile, crlfile); + ret |= verify_authenticode(p7, timestamp_time, options); if (tmstamp_p7) { PKCS7_free(tmstamp_p7); @@ -2314,9 +2351,8 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash) * msi_verify_pkcs7 is a helper function for msi_verify_file. * It exists to make it easier to implement verification of nested signatures. */ -static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, - unsigned char *exdata, size_t exlen, char *leafhash, - int allownest, char *cafile, char *crlfile, char *untrusted) +static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, + size_t exlen, int allownest, GLOBAL_OPTIONS *options) { int ret = 0; int mdtype = -1; @@ -2423,13 +2459,13 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, } #endif printf("\n"); - ret |= verify_pkcs7(p7, leafhash, cafile, crlfile, untrusted); + ret |= verify_pkcs7(p7, options); printf("\n"); if (allownest) { int has_sig = 0; PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig); if (p7nest) { - int nest_ret = msi_verify_pkcs7(p7nest, infile, exdata, exlen, leafhash, 0, cafile, crlfile, untrusted); + int nest_ret = msi_verify_pkcs7(p7nest, infile, exdata, exlen, 0, options); if (ret == 0) ret = nest_ret; PKCS7_free(p7nest); @@ -2445,7 +2481,7 @@ out: /* * msi_verify_file checks whether or not the signature of infile is valid. */ -static int msi_verify_file(GsfInfile *infile, char *leafhash, char *cafile, char *crlfile, char *untrusted) +static int msi_verify_file(GsfInfile *infile, GLOBAL_OPTIONS *options) { GsfInput *sig = NULL; GsfInput *exsig = NULL; @@ -2490,7 +2526,7 @@ static int msi_verify_file(GsfInfile *infile, char *leafhash, char *cafile, char const unsigned char *blob = (unsigned char *)indata; p7 = d2i_PKCS7(NULL, &blob, inlen); - ret = msi_verify_pkcs7(p7, infile, exdata, exlen, leafhash, 1, cafile, crlfile, untrusted); + ret = msi_verify_pkcs7(p7, infile, exdata, exlen, 1, options); out: OPENSSL_free(indata); @@ -2652,27 +2688,27 @@ out: return p7; } -static int msi_extract_file(GsfInfile *ole, char *outfile, int output_pkcs7) +static int msi_extract_file(GsfInfile *ole, GLOBAL_OPTIONS *options) { int ret = 0; BIO *outdata; PKCS7 *sig; - if (output_pkcs7) { + if (options->output_pkcs7) { sig = msi_extract_signature_to_pkcs7(ole); if (!sig) { fprintf(stderr, "Unable to extract existing signature\n"); return 1; /* FAILED */ } - outdata = BIO_new_file(outfile, "w+bx"); + outdata = BIO_new_file(options->outfile, "w+bx"); if (outdata == NULL) { - fprintf(stderr, "Unable to create %s\n", outfile); + fprintf(stderr, "Unable to create %s\n", options->outfile); return 1; /* FAILED */ } ret = !PEM_write_bio_PKCS7(outdata, sig); BIO_free_all(outdata); } else { - ret = msi_extract_signature_to_file(ole, outfile); + ret = msi_extract_signature_to_file(ole, options->outfile); } return ret; @@ -2885,7 +2921,7 @@ static void extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, } static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, - char *leafhash, int allownest, char *cafile, char *crlfile, char *untrusted) + int allownest, GLOBAL_OPTIONS *options) { int ret = 0; int mdtype = -1, phtype = -1; @@ -2946,13 +2982,13 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, OPENSSL_free(cph); } - ret |= verify_pkcs7(p7, leafhash, cafile, crlfile, untrusted); + ret |= verify_pkcs7(p7, options); printf("\n"); if (allownest) { int has_sig = 0; PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig); if (p7nest) { - int nest_ret = verify_pe_pkcs7(p7nest, indata, header, leafhash, 0, cafile, crlfile, untrusted); + int nest_ret = verify_pe_pkcs7(p7nest, indata, header, 0, options); if (ret == 0) ret = nest_ret; PKCS7_free(p7nest); @@ -2990,8 +3026,7 @@ static PKCS7 *extract_existing_pe_pkcs7(char *indata, FILE_HEADER *header) return p7; } -static int verify_pe_file(char *indata, FILE_HEADER *header, - char *leafhash, char *cafile, char *crlfile, char *untrusted) +static int verify_pe_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options) { int ret = 0; @@ -3017,7 +3052,7 @@ static int verify_pe_file(char *indata, FILE_HEADER *header, return -1; } - ret = verify_pe_pkcs7(p7, indata, header, leafhash, 1, cafile, crlfile, untrusted); + ret = verify_pe_pkcs7(p7, indata, header, 1, options); PKCS7_free(p7); return ret; @@ -3292,8 +3327,8 @@ static int calc_cab_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, siz return 0; /* OK */ } -static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, char *leafhash, - int allownest, char *cafile, char *crlfile, char *untrusted) +static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, + int allownest, GLOBAL_OPTIONS *options) { int ret = 0; int mdtype = -1, phtype = -1; @@ -3341,13 +3376,13 @@ static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, char * ret = 1; /* FAILED */ printf("Calculated message digest : %s%s\n\n", hexbuf, mdok?"":" MISMATCH!!!"); - ret |= verify_pkcs7(p7, leafhash, cafile, crlfile, untrusted); + ret |= verify_pkcs7(p7, options); printf("\n"); if (allownest) { int has_sig = 0; PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig); if (p7nest) { - int nest_ret = verify_cab_pkcs7(p7nest, indata, header, leafhash, 0, cafile, crlfile, untrusted); + int nest_ret = verify_cab_pkcs7(p7nest, indata, header, 0, options); if (ret == 0) ret = nest_ret; PKCS7_free(p7nest); @@ -3371,8 +3406,7 @@ static PKCS7 *extract_existing_cab_pkcs7(char *indata, FILE_HEADER *header) return p7; } -static int verify_cab_file(char *indata, FILE_HEADER *header, - char *leafhash, char *cafile, char *crlfile, char *untrusted) +static int verify_cab_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options) { PKCS7 *p7; int ret = 0; @@ -3387,7 +3421,7 @@ static int verify_cab_file(char *indata, FILE_HEADER *header, return -1; /* FAILED */ } - ret |= verify_cab_pkcs7(p7, indata, header, leafhash, 1, cafile, crlfile, untrusted); + ret |= verify_cab_pkcs7(p7, indata, header, 1, options); PKCS7_free(p7); return ret; @@ -3715,8 +3749,7 @@ static int add_opus_attribute(PKCS7_SIGNER_INFO *si, char *desc, char *url) } static int create_new_signature(PKCS7 *sig, STACK_OF(X509) *certs, STACK_OF(X509) *xcerts, - X509 *cert, EVP_PKEY *pkey, const EVP_MD *md, time_t signing_time, - file_type_t type, int jp, int comm, char *desc, char *url) + X509 *cert, EVP_PKEY *pkey, file_type_t type, GLOBAL_OPTIONS *options) { int i; PKCS7_SIGNER_INFO *si; @@ -3725,12 +3758,12 @@ static int create_new_signature(PKCS7 *sig, STACK_OF(X509) *certs, STACK_OF(X509 PKCS7_set_type(sig, NID_pkcs7_signed); si = NULL; if (cert != NULL) - si = PKCS7_add_signature(sig, cert, pkey, md); + si = PKCS7_add_signature(sig, cert, pkey, options->md); for (i=0; si == NULL && imd); } EVP_PKEY_free(pkey); pkey = NULL; @@ -3740,16 +3773,17 @@ static int create_new_signature(PKCS7 *sig, STACK_OF(X509) *certs, STACK_OF(X509 return 0; /* FAILED */ } - pkcs7_add_signing_time(si, signing_time); + pkcs7_add_signing_time(si, options->signing_time); PKCS7_add_signed_attribute(si, NID_pkcs9_contentType, V_ASN1_OBJECT, OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1)); - if (type == FILE_TYPE_CAB && jp >= 0) - add_jp_attribute(si, jp); + if (type == FILE_TYPE_CAB && options->jp >= 0) + add_jp_attribute(si, options->jp); - add_purpose_attribute(si, comm); + add_purpose_attribute(si, options->comm); - if ((desc || url) && !add_opus_attribute(si, desc, url)) { + if ((options->desc || options->url) && + !add_opus_attribute(si, options->desc, options->url)) { fprintf(stderr, "Couldn't allocate memory for opus info\n"); return 0; /* FAILED */ } @@ -3930,48 +3964,49 @@ static char *getpassword(const char *prompt) } #endif -static int read_password(char *readpass, int askpass, char **pass) +static int read_password(GLOBAL_OPTIONS *options) { char passbuf[4096]; int passfd, passlen; - if (readpass) { - passfd = open(readpass, O_RDONLY); + if (options->readpass) { + passfd = open(options->readpass, O_RDONLY); if (passfd < 0) { - fprintf(stderr, "Failed to open password file: %s\n", readpass); + fprintf(stderr, "Failed to open password file: %s\n", options->readpass); return 0; /* FAILED */ } passlen = read(passfd, passbuf, sizeof(passbuf)-1); close(passfd); if (passlen <= 0) { - fprintf(stderr, "Failed to read password from file: %s\n", readpass); + fprintf(stderr, "Failed to read password from file: %s\n", options->readpass); return 0; /* FAILED */ } passbuf[passlen] = 0x00; - *pass = strdup(passbuf); + options->pass = strdup(passbuf); memset(passbuf, 0, sizeof(passbuf)); #ifdef PROVIDE_ASKPASS - } else if (askpass) { - *pass = getpassword("Password: "); + } else if (options->askpass) { + options->pass = getpassword("Password: "); #endif } return 1; /* OK */ } -static char *read_key(char **keyfile, char *p11module) +static char *read_key(GLOBAL_OPTIONS *options) { unsigned char magic[4]; unsigned char pvkhdr[4] = { 0x1e, 0xf1, 0xb5, 0xb0 }; char *pvkfile = NULL; BIO *btmp; - if (*keyfile && !p11module && (btmp = BIO_new_file(*keyfile, "rb")) != NULL) { + if (options->keyfile && !options->p11module && + (btmp = BIO_new_file(options->keyfile, "rb")) != NULL) { magic[0] = 0x00; BIO_read(btmp, magic, 4); if (!memcmp(magic, pvkhdr, 4)) { - pvkfile = *keyfile; - *keyfile = NULL; + pvkfile = options->keyfile; + options->keyfile = NULL; } BIO_free(btmp); return pvkfile; @@ -3979,10 +4014,8 @@ static char *read_key(char **keyfile, char *p11module) return NULL; } -static int read_certificate(char *pkcs12file, char *pvkfile, char *certfile, - char *xcertfile, char *keyfile, char *p11module, char *p11engine, - char **pass, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **certs, - STACK_OF(X509) **xcerts) +static int read_certificate(GLOBAL_OPTIONS *options, char *pvkfile, EVP_PKEY **pkey, + X509 **cert, STACK_OF(X509) **certs, STACK_OF(X509) **xcerts) { PKCS12 *p12; PKCS7 *p7 = NULL, *p7x = NULL; @@ -3991,44 +4024,44 @@ static int read_certificate(char *pkcs12file, char *pvkfile, char *certfile, ENGINE *dyn, *pkcs11; int ret = 1; - if (pkcs12file != NULL) { - if ((btmp = BIO_new_file(pkcs12file, "rb")) == NULL || + if (options->pkcs12file != NULL) { + if ((btmp = BIO_new_file(options->pkcs12file, "rb")) == NULL || (p12 = d2i_PKCS12_bio(btmp, NULL)) == NULL) { - fprintf(stderr, "Failed to read PKCS#12 file: %s\n", pkcs12file); + fprintf(stderr, "Failed to read PKCS#12 file: %s\n", options->pkcs12file); ret = 0; /* FAILED */ } BIO_free(btmp); - if (!PKCS12_parse(p12, *pass ? *pass : "", pkey, cert, certs)) { - fprintf(stderr, "Failed to parse PKCS#12 file: %s (Wrong password?)\n", pkcs12file); + if (!PKCS12_parse(p12, options->pass ? options->pass : "", pkey, cert, certs)) { + fprintf(stderr, "Failed to parse PKCS#12 file: %s (Wrong password?)\n", options->pkcs12file); ret = 0; /* FAILED */ } PKCS12_free(p12); } else if (pvkfile != NULL) { - if ((btmp = BIO_new_file(certfile, "rb")) == NULL || + if ((btmp = BIO_new_file(options->certfile, "rb")) == NULL || ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && (*certs = PEM_read_certs(btmp, "")) == NULL)) { - fprintf(stderr, "Failed to read certificate file: %s\n", certfile); + fprintf(stderr, "Failed to read certificate file: %s\n", options->certfile); ret = 0; /* FAILED */ } BIO_free(btmp); if ((btmp = BIO_new_file(pvkfile, "rb")) == NULL || - ((*pkey = b2i_PVK_bio(btmp, NULL, *pass ? *pass : "")) == NULL && + ((*pkey = b2i_PVK_bio(btmp, NULL, options->pass ? options->pass : "")) == NULL && (BIO_seek(btmp, 0) == 0) && (*pkey = b2i_PVK_bio(btmp, NULL, NULL)) == NULL)) { fprintf(stderr, "Failed to read PVK file: %s\n", pvkfile); ret = 0; /* FAILED */ } BIO_free(btmp); - } else if (p11module != NULL) { - if (p11engine != NULL) { + } else if (options->p11module != NULL) { + if (options->p11engine != NULL) { ENGINE_load_dynamic(); dyn = ENGINE_by_id("dynamic"); if (!dyn) { fprintf(stderr, "Failed to load 'dynamic' engine\n"); ret = 0; /* FAILED */ } - if (1 != ENGINE_ctrl_cmd_string(dyn, "SO_PATH", p11engine, CMD_MANDATORY)) { - fprintf(stderr, "Failed to set dyn SO_PATH to '%s'\n", p11engine); + if (1 != ENGINE_ctrl_cmd_string(dyn, "SO_PATH", options->p11engine, CMD_MANDATORY)) { + fprintf(stderr, "Failed to set dyn SO_PATH to '%s'\n", options->p11engine); ret = 0; /* FAILED */ } if (1 != ENGINE_ctrl_cmd_string(dyn, "ID", "pkcs11", CMD_MANDATORY)) { @@ -4050,12 +4083,12 @@ static int read_certificate(char *pkcs12file, char *pvkfile, char *certfile, fprintf(stderr, "Failed to find and load pkcs11 engine\n"); ret = 0; /* FAILED */ } - if (1 != ENGINE_ctrl_cmd_string(pkcs11, "MODULE_PATH", p11module, CMD_MANDATORY)) { - fprintf(stderr, "Failed to set pkcs11 engine MODULE_PATH to '%s'\n", p11module); + if (1 != ENGINE_ctrl_cmd_string(pkcs11, "MODULE_PATH", options->p11module, CMD_MANDATORY)) { + fprintf(stderr, "Failed to set pkcs11 engine MODULE_PATH to '%s'\n", options->p11module); ret = 0; /* FAILED */ } - if (*pass != NULL && - 1 != ENGINE_ctrl_cmd_string(pkcs11, "PIN", *pass, CMD_MANDATORY)) { + if (options->pass != NULL && + 1 != ENGINE_ctrl_cmd_string(pkcs11, "PIN", options->pass, CMD_MANDATORY)) { fprintf(stderr, "Failed to set pkcs11 PIN\n"); ret = 0; /* FAILED */ } @@ -4063,33 +4096,33 @@ static int read_certificate(char *pkcs12file, char *pvkfile, char *certfile, fprintf(stderr, "Failed to initialized pkcs11 engine\n"); ret = 0; /* FAILED */ } - *pkey = ENGINE_load_private_key(pkcs11, keyfile, NULL, NULL); + *pkey = ENGINE_load_private_key(pkcs11, options->keyfile, NULL, NULL); if (*pkey == NULL) { - fprintf(stderr, "Failed to load private key %s\n", keyfile); + fprintf(stderr, "Failed to load private key %s\n", options->keyfile); ret = 0; /* FAILED */ } - if ((btmp = BIO_new_file(certfile, "rb")) == NULL || + if ((btmp = BIO_new_file(options->certfile, "rb")) == NULL || ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && (*certs = PEM_read_certs(btmp, "")) == NULL)) { - fprintf(stderr, "Failed to read certificate file: %s\n", certfile); + fprintf(stderr, "Failed to read certificate file: %s\n", options->certfile); ret = 0; /* FAILED */ } BIO_free(btmp); } else { - if ((btmp = BIO_new_file(certfile, "rb")) == NULL || + if ((btmp = BIO_new_file(options->certfile, "rb")) == NULL || ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && (*certs = PEM_read_certs(btmp, "")) == NULL)) { - fprintf(stderr, "Failed to read certificate file: %s\n", certfile); + fprintf(stderr, "Failed to read certificate file: %s\n", options->certfile); ret = 0; /* FAILED */ } BIO_free(btmp); - if ((btmp = BIO_new_file(keyfile, "rb")) == NULL || + if ((btmp = BIO_new_file(options->keyfile, "rb")) == NULL || ((*pkey = d2i_PrivateKey_bio(btmp, NULL)) == NULL && (BIO_seek(btmp, 0) == 0) && - (*pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, *pass ? *pass : "")) == NULL && + (*pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, options->pass ? options->pass : "")) == NULL && (BIO_seek(btmp, 0) == 0) && (*pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, NULL)) == NULL)) { - fprintf(stderr, "Failed to read private key file: %s (Wrong password?)\n", keyfile); + fprintf(stderr, "Failed to read private key file: %s (Wrong password?)\n", options->keyfile); ret = 0; /* FAILED */ } BIO_free(btmp); @@ -4098,11 +4131,11 @@ static int read_certificate(char *pkcs12file, char *pvkfile, char *certfile, if (*certs == NULL && p7 != NULL) *certs = sk_X509_dup(p7->d.sign->cert); - if (xcertfile) { - if ((btmp = BIO_new_file(xcertfile, "rb")) == NULL || + if (options->xcertfile) { + if ((btmp = BIO_new_file(options->xcertfile, "rb")) == NULL || ((p7x = d2i_PKCS7_bio(btmp, NULL)) == NULL && (*xcerts = PEM_read_certs(btmp, "")) == NULL)) { - fprintf(stderr, "Failed to read cross certificate file: %s\n", xcertfile); + fprintf(stderr, "Failed to read cross certificate file: %s\n", options->xcertfile); ret = 0; /* FAILED */ } BIO_free(btmp); @@ -4110,9 +4143,9 @@ static int read_certificate(char *pkcs12file, char *pvkfile, char *certfile, p7x = NULL; } - if (*pass) { - memset(*pass, 0, strlen(*pass)); - *pass = NULL; + if (options->pass) { + memset(options->pass, 0, strlen(options->pass)); + options->pass = NULL; } return ret; /* OK */ @@ -4203,40 +4236,24 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) return sig; /* OK */ } -int main(int argc, char **argv) { - BIO *hash, *outdata; +int main(int argc, char **argv) +{ + GLOBAL_OPTIONS options; + FILE_HEADER header; + + BIO *hash = NULL; + BIO *outdata = NULL; PKCS7 *cursig = NULL, *outsig = NULL, *sig = NULL; X509 *cert = NULL; STACK_OF(X509) *certs = NULL, *xcerts = NULL; EVP_PKEY *pkey = NULL; - const EVP_MD *md; - time_t signing_time = (time_t)-1; const char *argv0 = argv[0]; static char buf[64*1024]; - char *xcertfile, *certfile, *keyfile, *pvkfile, *pkcs12file, *infile, *outfile, *sigfile, *desc, *url, *indata, *outdataverify; - char *p11engine, *p11module; - char *pass = NULL, *readpass = NULL; - int output_pkcs7 = 0; - int askpass = 0; - - char *cafile = NULL; - char *crlfile = NULL; - char *untrusted = NULL; - char *leafhash = NULL; -#ifdef ENABLE_CURL - char *turl[MAX_TS_SERVERS], *proxy = NULL, *tsurl[MAX_TS_SERVERS]; - int noverifypeer = 0; -#endif - int nest = 0; -#ifdef WITH_GSF - int add_msi_dse = 0; -#endif + char *indata, *outdataverify, *pvkfile = NULL; int nturl = 0, ntsurl = 0; - int addBlob = 0; u_char *p = NULL; - int ret = 0, i, len = 0, jp = -1, comm = 0, pagehash = 0; - FILE_HEADER header; + int ret = 0, i, len = 0; size_t padlen = 0; size_t filesize, outdatasize; file_type_t type; @@ -4254,9 +4271,6 @@ int main(int argc, char **argv) { int len_msiex = 0; #endif - xcertfile = certfile = keyfile = pvkfile = pkcs12file = p11module = p11engine = infile = outfile = sigfile = desc = url = NULL; - hash = outdata = NULL; - /* Set up OpenSSL */ ERR_load_crypto_strings(); OPENSSL_add_all_algorithms_conf(); @@ -4268,7 +4282,11 @@ int main(int argc, char **argv) { !OBJ_create(SPC_NESTED_SIGNATURE_OBJID, NULL, NULL)) DO_EXIT_0("Failed to add objects\n"); - md = EVP_sha1(); + /* reset options */ + memset(&options, 0, sizeof(GLOBAL_OPTIONS)); + options.md = EVP_sha1(); + options.signing_time = (time_t)-1; + options.jp = -1; if (argc > 1) { if (!strcmp(argv[1], "--help")) { @@ -4309,120 +4327,120 @@ int main(int argc, char **argv) { } if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH)) { - cafile = get_cafile(); - untrusted = get_cafile(); + options.cafile = get_cafile(); + options.untrusted = get_cafile(); } for (argc--,argv++; argc >= 1; argc--,argv++) { if (!strcmp(*argv, "-in")) { if (--argc < 1) usage(argv0, "all"); - infile = *(++argv); + options.infile = *(++argv); } else if (!strcmp(*argv, "-out")) { if (--argc < 1) usage(argv0, "all"); - outfile = *(++argv); + options.outfile = *(++argv); } else if (!strcmp(*argv, "-sigin")) { if (--argc < 1) usage(argv0, "all"); - sigfile = *(++argv); + options.sigfile = *(++argv); } else if ((cmd == CMD_SIGN) && (!strcmp(*argv, "-spc") || !strcmp(*argv, "-certs"))) { if (--argc < 1) usage(argv0, "all"); - certfile = *(++argv); + options.certfile = *(++argv); } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-ac")) { if (--argc < 1) usage(argv0, "all"); - xcertfile = *(++argv); + options.xcertfile = *(++argv); } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-key")) { if (--argc < 1) usage(argv0, "all"); - keyfile = *(++argv); + options.keyfile = *(++argv); } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs12")) { if (--argc < 1) usage(argv0, "all"); - pkcs12file = *(++argv); + options.pkcs12file = *(++argv); } else if ((cmd == CMD_EXTRACT) && !strcmp(*argv, "-pem")) { - output_pkcs7 = 1; + options.output_pkcs7 = 1; } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11engine")) { if (--argc < 1) usage(argv0, "all"); - p11engine = *(++argv); + options.p11engine = *(++argv); } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11module")) { if (--argc < 1) usage(argv0, "all"); - p11module = *(++argv); + options.p11module = *(++argv); } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pass")) { - if (askpass || readpass) usage(argv0, "all"); + if (options.askpass || options.readpass) usage(argv0, "all"); if (--argc < 1) usage(argv0, "all"); - pass = strdup(*(++argv)); + options.pass = strdup(*(++argv)); memset(*argv, 0, strlen(*argv)); #ifdef PROVIDE_ASKPASS } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-askpass")) { - if (pass || readpass) usage(argv0, "all"); - askpass = 1; + if (options.pass || options.readpass) usage(argv0, "all"); + options.askpass = 1; #endif } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-readpass")) { - if (askpass || pass) usage(argv0, "all"); + if (options.askpass || options.pass) usage(argv0, "all"); if (--argc < 1) usage(argv0, "all"); - readpass = *(++argv); + options.readpass = *(++argv); } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-comm")) { - comm = 1; + options.comm = 1; } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-ph")) { - pagehash = 1; + options.pagehash = 1; } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-n")) { if (--argc < 1) usage(argv0, "all"); - desc = *(++argv); + options.desc = *(++argv); } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-h")) { if (--argc < 1) usage(argv0, "all"); ++argv; if (!strcmp(*argv, "md5")) { - md = EVP_md5(); + options.md = EVP_md5(); } else if (!strcmp(*argv, "sha1")) { - md = EVP_sha1(); + options.md = EVP_sha1(); } else if (!strcmp(*argv, "sha2") || !strcmp(*argv, "sha256")) { - md = EVP_sha256(); + options.md = EVP_sha256(); } else if (!strcmp(*argv, "sha384")) { - md = EVP_sha384(); + options.md = EVP_sha384(); } else if (!strcmp(*argv, "sha512")) { - md = EVP_sha512(); + options.md = EVP_sha512(); } else { usage(argv0, "all"); } } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-i")) { if (--argc < 1) usage(argv0, "all"); - url = *(++argv); + options.url = *(++argv); } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-st")) { if (--argc < 1) usage(argv0, "all"); - signing_time = (time_t)strtoul(*(++argv), NULL, 10); + options.signing_time = (time_t)strtoul(*(++argv), NULL, 10); #ifdef ENABLE_CURL } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-t")) { if (--argc < 1) usage(argv0, "all"); - turl[nturl++] = *(++argv); + options.turl[nturl++] = *(++argv); } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-ts")) { if (--argc < 1) usage(argv0, "all"); - tsurl[ntsurl++] = *(++argv); + options.tsurl[ntsurl++] = *(++argv); } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-p")) { if (--argc < 1) usage(argv0, "all"); - proxy = *(++argv); + options.proxy = *(++argv); } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-noverifypeer")) { - noverifypeer = 1; + options.noverifypeer = 1; #endif } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-addUnauthenticatedBlob")) { - addBlob = 1; + options.addBlob = 1; } else if ((cmd == CMD_SIGN || cmd == CMD_ATTACH) && !strcmp(*argv, "-nest")) { - nest = 1; + options.nest = 1; } else if ((cmd == CMD_SIGN || cmd == CMD_VERIFY) && !strcmp(*argv, "-verbose")) { - g_verbose = 1; + options.verbose = 1; #ifdef WITH_GSF } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-add-msi-dse")) { - add_msi_dse = 1; + options.add_msi_dse = 1; #endif } else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-CAfile")) { if (--argc < 1) usage(argv0, "all"); - OPENSSL_free(cafile); - cafile = OPENSSL_strdup(*++argv); + OPENSSL_free(options.cafile); + options.cafile = OPENSSL_strdup(*++argv); } else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-CRLfile")) { if (--argc < 1) usage(argv0, "all"); - crlfile = OPENSSL_strdup(*++argv); + options.crlfile = OPENSSL_strdup(*++argv); } else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-untrusted")) { if (--argc < 1) usage(argv0, "all"); - OPENSSL_free(untrusted); - untrusted = OPENSSL_strdup(*++argv); + OPENSSL_free(options.untrusted); + options.untrusted = OPENSSL_strdup(*++argv); } else if ((cmd == CMD_VERIFY) && !strcmp(*argv, "-require-leaf-hash")) { if (--argc < 1) usage(argv0, "all"); - leafhash = (*++argv); + options.leafhash = (*++argv); } else if (!strcmp(*argv, "-v") || !strcmp(*argv, "--version")) { printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n", SSLeay_version(SSLEAY_VERSION), @@ -4463,62 +4481,62 @@ int main(int argc, char **argv) { ap = *(++argv); for (i=0; ap[i]; i++) ap[i] = tolower((int)ap[i]); if (!strcmp(ap, "low")) { - jp = 0; + options.jp = 0; } else if (!strcmp(ap, "medium")) { - jp = 1; + options.jp = 1; } else if (!strcmp(ap, "high")) { - jp = 2; + options.jp = 2; } - if (jp != 0) usage(argv0, "all"); /* XXX */ + if (options.jp != 0) usage(argv0, "all"); /* XXX */ } else { failarg = *argv; break; } } - if (!infile && argc > 0) { - infile = *(argv++); + if (!options.infile && argc > 0) { + options.infile = *(argv++); argc--; } - if (cmd != CMD_VERIFY && (!outfile && argc > 0)) { + if (cmd != CMD_VERIFY && (!options.outfile && argc > 0)) { if (!strcmp(*argv, "-out")) { argv++; argc--; } if (argc > 0) { - outfile = *(argv++); + options.outfile = *(argv++); argc--; } } - if (argc > 0 || (nturl && ntsurl) || !infile || - (cmd != CMD_VERIFY && !outfile) || - (cmd == CMD_SIGN && !((certfile && keyfile) || pkcs12file || p11module))) { + if (argc > 0 || (nturl && ntsurl) || !options.infile || + (cmd != CMD_VERIFY && !options.outfile) || + (cmd == CMD_SIGN && !((options.certfile && options.keyfile) || + options.pkcs12file || options.p11module))) { if (failarg) fprintf(stderr, "Unknown option: %s\n", failarg); usage(argv0, "all"); } - if (!read_password(readpass, askpass, &pass)) + if (!read_password(&options)) goto err_cleanup; if (cmd == CMD_SIGN) { /* Read certificate and key */ - pvkfile = read_key(&keyfile, p11module); - if (!read_certificate(pkcs12file, pvkfile, certfile, xcertfile, keyfile, - p11module, p11engine, &pass, &pkey, &cert, &certs, &xcerts)) + pvkfile = read_key(&options); + if (!read_certificate(&options, pvkfile, &pkey, &cert, &certs, &xcerts)) goto err_cleanup; } /* Check if indata is cab or pe */ - filesize = get_file_size(infile); + filesize = get_file_size(options.infile); if (filesize == 0) goto err_cleanup; - indata = map_file(infile, filesize); + indata = map_file(options.infile, filesize); if (indata == NULL) - DO_EXIT_1("Failed to open file: %s\n", infile); + DO_EXIT_1("Failed to open file: %s\n", options.infile); /* reset header */ memset(&header, 0, sizeof(FILE_HEADER)); @@ -4535,55 +4553,56 @@ int main(int argc, char **argv) { gsf_initialized = 1; #endif } else { - DO_EXIT_1("Unrecognized file type: %s\n", infile); + DO_EXIT_1("Unrecognized file type: %s\n", options.infile); } hash = BIO_new(BIO_f_md()); - BIO_set_md(hash, md); + BIO_set_md(hash, options.md); if (type == FILE_TYPE_CAB) { - if (pagehash == 1) + if (options.pagehash == 1) fprintf(stderr, "Warning: -ph option is only valid for PE files\n"); #ifdef WITH_GSF - if (add_msi_dse == 1) + if (options.add_msi_dse == 1) fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); #endif - if (!verify_cab_header(indata, infile, filesize, &header)) + if (!verify_cab_header(indata, options.infile, filesize, &header)) goto err_cleanup; } else if (type == FILE_TYPE_PE) { - if (jp >= 0) + if (options.jp >= 0) fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); #ifdef WITH_GSF - if (add_msi_dse == 1) + if (options.add_msi_dse == 1) fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); #endif - if (!verify_pe_header(indata, infile, filesize, &header)) + if (!verify_pe_header(indata, options.infile, filesize, &header)) goto err_cleanup; } else if (type == FILE_TYPE_MSI) { - if (pagehash == 1) + if (options.pagehash == 1) fprintf(stderr, "Warning: -ph option is only valid for PE files\n"); - if (jp >= 0) + if (options.jp >= 0) fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); #ifdef WITH_GSF GsfInput *src; GsfInfile *ole; - src = gsf_input_stdio_new(infile, NULL); + src = gsf_input_stdio_new(options.infile, NULL); if (!src) - DO_EXIT_1("Error opening file %s\n", infile); + DO_EXIT_1("Error opening file %s\n", options.infile); ole = gsf_infile_msole_new(src, NULL); if (cmd == CMD_EXTRACT) { - ret = msi_extract_file(ole, outfile, output_pkcs7); + ret = msi_extract_file(ole, &options); goto skip_signing; } else if (cmd == CMD_VERIFY) { - ret = msi_verify_file(ole, leafhash, cafile, crlfile, untrusted); + ret = msi_verify_file(ole, &options); goto skip_signing; - } else if ((cmd == CMD_SIGN && nest) || (cmd == CMD_ATTACH && nest) || cmd == CMD_ADD) { - if (!msi_check_MsiDigitalSignatureEx(ole, md)) + } else if ((cmd == CMD_SIGN && options.nest) || + (cmd == CMD_ATTACH && options.nest) || cmd == CMD_ADD) { + if (!msi_check_MsiDigitalSignatureEx(ole, options.md)) goto err_cleanup; cursig = msi_extract_signature_to_pkcs7(ole); if (cursig == NULL) { @@ -4593,15 +4612,15 @@ int main(int argc, char **argv) { sig = cursig; } } - sink = gsf_output_stdio_new(outfile, NULL); + sink = gsf_output_stdio_new(options.outfile, NULL); if (!sink) - DO_EXIT_1("Error opening output file %s\n", outfile); + DO_EXIT_1("Error opening output file %s\n", options.outfile); outole = gsf_outfile_msole_new(sink); BIO_push(hash, BIO_new(BIO_s_null())); - if (add_msi_dse) { + if (options.add_msi_dse) { p_msiex = malloc(EVP_MAX_MD_SIZE); - if (!msi_calc_MsiDigitalSignatureEx(ole, md, hash, p_msiex, &len_msiex)) + if (!msi_calc_MsiDigitalSignatureEx(ole, options.md, hash, p_msiex, &len_msiex)) goto err_cleanup; } if (!msi_handle_dir(ole, outole, hash)) { @@ -4613,25 +4632,25 @@ int main(int argc, char **argv) { g_object_unref(sink); } #else - DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", infile); + DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", options.infile); #endif } if ((type == FILE_TYPE_CAB || type == FILE_TYPE_PE) && (cmd != CMD_VERIFY)) { /* Create outdata file */ - outdata = BIO_new_file(outfile, "w+bx"); + outdata = BIO_new_file(options.outfile, "w+bx"); if (outdata == NULL) - DO_EXIT_1("Failed to create file: %s\n", outfile); + DO_EXIT_1("Failed to create file: %s\n", options.outfile); BIO_push(hash, outdata); } if (type == FILE_TYPE_CAB) { if (!(header.flags & FLAG_RESERVE_PRESENT) && (cmd == CMD_REMOVE || cmd == CMD_EXTRACT)) { - DO_EXIT_1("CAB file does not have any signature: %s\n", infile); + DO_EXIT_1("CAB file does not have any signature: %s\n", options.infile); } if (cmd == CMD_EXTRACT) { - ret = extract_cab_file(indata, &header, outdata, output_pkcs7); + ret = extract_cab_file(indata, &header, outdata, options.output_pkcs7); goto skip_signing; } if (cmd == CMD_REMOVE) { @@ -4639,10 +4658,11 @@ int main(int argc, char **argv) { goto skip_signing; } if (cmd == CMD_VERIFY) { - ret = verify_cab_file(indata, &header, leafhash, cafile, crlfile, untrusted); + ret = verify_cab_file(indata, &header, &options); goto skip_signing; } - if ((cmd == CMD_SIGN && nest) || (cmd == CMD_ATTACH && nest) || cmd == CMD_ADD) { + if ((cmd == CMD_SIGN && options.nest) || + (cmd == CMD_ATTACH && options.nest) || cmd == CMD_ADD) { cursig = extract_existing_cab_pkcs7(indata, &header); if (!cursig) DO_EXIT_0("Unable to extract existing signature\n"); @@ -4657,12 +4677,13 @@ int main(int argc, char **argv) { } else if (type == FILE_TYPE_PE) { if ((cmd == CMD_REMOVE || cmd == CMD_EXTRACT) && header.sigpos == 0) - DO_EXIT_1("PE file does not have any signature: %s\n", infile); + DO_EXIT_1("PE file does not have any signature: %s\n", options.infile); if (cmd == CMD_EXTRACT) { - ret = extract_pe_file(indata, &header, outdata, output_pkcs7); + ret = extract_pe_file(indata, &header, outdata, options.output_pkcs7); goto skip_signing; } - if ((cmd == CMD_SIGN && nest) || (cmd == CMD_ATTACH && nest) || cmd == CMD_ADD) { + if ((cmd == CMD_SIGN && options.nest) || + (cmd == CMD_ATTACH && options.nest) || cmd == CMD_ADD) { cursig = extract_existing_pe_pkcs7(indata, &header); if (!cursig) DO_EXIT_0("Unable to extract existing signature\n"); @@ -4670,7 +4691,7 @@ int main(int argc, char **argv) { sig = cursig; } if (cmd == CMD_VERIFY) { - ret = verify_pe_file(indata, &header, leafhash, cafile, crlfile, untrusted); + ret = verify_pe_file(indata, &header, &options); goto skip_signing; } if (header.sigpos > 0) { @@ -4684,7 +4705,7 @@ int main(int argc, char **argv) { goto add_only; if (cmd == CMD_ATTACH) { - sig = attach_sigfile(sigfile, type); + sig = attach_sigfile(options.sigfile, type); if (!sig) DO_EXIT_0("Unable to extract valid signature\n"); goto add_only; @@ -4694,13 +4715,12 @@ int main(int argc, char **argv) { goto skip_signing; sig = PKCS7_new(); - if (!create_new_signature(sig, certs, xcerts, cert, pkey, md, signing_time, - type, jp, comm, desc, url)) + if (!create_new_signature(sig, certs, xcerts, cert, pkey, type, &options)) DO_EXIT_0("Creating a new signature failed\n"); - get_indirect_data_blob(&p, &len, md, type, pagehash, indata, + get_indirect_data_blob(&p, &len, options.md, type, options.pagehash, indata, header.header_size, header.pe32plus, header.fileend); - len -= EVP_MD_size(md); + len -= EVP_MD_size(options.md); memcpy(buf, p, len); OPENSSL_free(p); @@ -4711,13 +4731,13 @@ add_only: #ifdef ENABLE_CURL /* add counter-signature/timestamp */ - if (nturl && add_timestamp_authenticode(sig, turl, nturl, proxy, noverifypeer)) + if (nturl && add_timestamp_authenticode(sig, nturl, &options)) DO_EXIT_0("Authenticode timestamping failed\n"); - if (ntsurl && add_timestamp_rfc3161(sig, tsurl, ntsurl, proxy, md, noverifypeer)) + if (ntsurl && add_timestamp_rfc3161(sig, ntsurl, &options)) DO_EXIT_0("RFC 3161 timestamping failed\n"); #endif - if (addBlob && add_unauthenticated_blob(sig)) + if (options.addBlob && add_unauthenticated_blob(sig)) DO_EXIT_0("Adding unauthenticated blob failed\n"); #if 0 @@ -4725,10 +4745,10 @@ add_only: DO_EXIT_0("PKCS7 output failed\n"); #endif - if (nest) { + if (options.nest) { if (cursig == NULL) DO_EXIT_0("Internal error: No 'cursig' was extracted\n") - if (pkcs7_set_nested_signature(cursig, sig, signing_time) == 0) + if (pkcs7_set_nested_signature(cursig, sig, options.signing_time) == 0) DO_EXIT_0("Unable to append the nested signature to the current signature\n"); outsig = cursig; } else { @@ -4762,9 +4782,9 @@ add_only: /* Only output signatures if we're signing. */ if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { if (!msi_add_DigitalSignature(outole, p, len)) - DO_EXIT_1("Failed to write MSI 'DigitalSignature' signature to %s\n", infile); + DO_EXIT_1("Failed to write MSI 'DigitalSignature' signature to %s\n", options.infile); if (p_msiex != NULL && !msi_add_MsiDigitalSignatureEx(outole, p_msiex, len_msiex)) - DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", infile); + DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", options.infile); gsf_output_close(GSF_OUTPUT(outole)); g_object_unref(sink); } @@ -4803,27 +4823,27 @@ skip_signing: if (cmd == CMD_ATTACH) { if (type == FILE_TYPE_PE) { - outdatasize = get_file_size(outfile); + outdatasize = get_file_size(options.outfile); if (!outdatasize) DO_EXIT_0("Error verifying result\n"); - outdataverify = map_file(outfile, outdatasize); + outdataverify = map_file(options.outfile, outdatasize); if (!outdataverify) DO_EXIT_0("Error verifying result\n"); - if (!verify_pe_header(outdataverify, outfile, outdatasize, &header)) + if (!verify_pe_header(outdataverify, options.outfile, outdatasize, &header)) goto err_cleanup; - ret = verify_pe_file(outdataverify, &header, leafhash, cafile, crlfile, untrusted); + ret = verify_pe_file(outdataverify, &header, &options); if (ret) DO_EXIT_0("Signature mismatch\n"); } else if (type == FILE_TYPE_CAB) { - outdatasize = get_file_size(outfile); + outdatasize = get_file_size(options.outfile); if (!outdatasize) DO_EXIT_0("Error verifying result\n"); - outdataverify = map_file(outfile, outdatasize); + outdataverify = map_file(options.outfile, outdatasize); if (!outdataverify) DO_EXIT_0("Error verifying result\n"); - if (!verify_cab_header(outdataverify, outfile, outdatasize, &header)) + if (!verify_cab_header(outdataverify, options.outfile, outdatasize, &header)) goto err_cleanup; - ret = verify_cab_file(outdataverify, &header, leafhash, cafile, crlfile, untrusted); + ret = verify_cab_file(outdataverify, &header, &options); if (ret) DO_EXIT_0("Signature mismatch\n"); } else if (type == FILE_TYPE_MSI) { @@ -4831,30 +4851,30 @@ skip_signing: GsfInput *src; GsfInfile *ole; - src = gsf_input_stdio_new(outfile, NULL); + src = gsf_input_stdio_new(options.outfile, NULL); if (!src) - DO_EXIT_1("Error opening file %s\n", outfile); + DO_EXIT_1("Error opening file %s\n", options.outfile); ole = gsf_infile_msole_new(src, NULL); g_object_unref(src); - ret = msi_verify_file(ole, leafhash, cafile, crlfile, untrusted); + ret = msi_verify_file(ole, &options); g_object_unref(ole); if (ret) DO_EXIT_0("Signature mismatch\n"); #else - DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", infile); + DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", options.infile); #endif } else { - DO_EXIT_1("Unknown input type for file: %s\n", infile); + DO_EXIT_1("Unknown input type for file: %s\n", options.infile); } printf("Signature successfully attached\n"); } else { printf(ret ? "Failed\n" : "Succeeded\n"); } - OPENSSL_free(cafile); - OPENSSL_free(untrusted); - if (crlfile) - OPENSSL_free(crlfile); + OPENSSL_free(options.cafile); + OPENSSL_free(options.untrusted); + if (options.crlfile) + OPENSSL_free(options.crlfile); cleanup_lib_state(); return ret; @@ -4872,7 +4892,7 @@ err_cleanup: if (hash) BIO_free_all(hash); if (outdata) - unlink(outfile); + unlink(options.outfile); fprintf(stderr, "\nFailed\n"); cleanup_lib_state(); return -1; From 6e46f71e6984cfef5b028f94f158a848b6cd28be Mon Sep 17 00:00:00 2001 From: olszomal Date: Mon, 16 Mar 2020 14:20:02 +0100 Subject: [PATCH 12/35] main_configure() --- osslsigncode.c | 486 +++++++++++++++++++++++++------------------------ 1 file changed, 246 insertions(+), 240 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index d45c7c1..7d372a4 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -4236,6 +4236,249 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) return sig; /* OK */ } +static cmd_type_t get_command(char **argv) +{ + if (!strcmp(argv[1], "--help")) { + printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n\n", + SSLeay_version(SSLEAY_VERSION), +#ifdef ENABLE_CURL + curl_version() +#else + "no libcurl available" +#endif + ); + help_for(argv[0], "all"); + } else if (!strcmp(argv[1], "sign")) + return CMD_SIGN; + else if (!strcmp(argv[1], "extract-signature")) + return CMD_EXTRACT; + else if (!strcmp(argv[1], "attach-signature")) + return CMD_ATTACH; + else if (!strcmp(argv[1], "remove-signature")) + return CMD_REMOVE; + else if (!strcmp(argv[1], "verify")) + return CMD_VERIFY; + else if (!strcmp(argv[1], "add")) + return CMD_ADD; + return CMD_SIGN; +} + +static void main_configure(int argc, char **argv, cmd_type_t *cmd, + GLOBAL_OPTIONS *options, int *nturl, int *ntsurl) +{ + int i; + char *failarg = NULL; + const char *argv0; + + argv0 = argv[0]; + if (argc > 1) { + *cmd = get_command(argv); + argv++; + argc--; + } + + /* reset options */ + memset(options, 0, sizeof(GLOBAL_OPTIONS)); + options->md = EVP_sha1(); + options->signing_time = (time_t)-1; + options->jp = -1; + + if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH)) { + options->cafile = get_cafile(); + options->untrusted = get_cafile(); + } + + for (argc--,argv++; argc >= 1; argc--,argv++) { + if (!strcmp(*argv, "-in")) { + if (--argc < 1) usage(argv0, "all"); + options->infile = *(++argv); + } else if (!strcmp(*argv, "-out")) { + if (--argc < 1) usage(argv0, "all"); + options->outfile = *(++argv); + } else if (!strcmp(*argv, "-sigin")) { + if (--argc < 1) usage(argv0, "all"); + options->sigfile = *(++argv); + } else if ((*cmd == CMD_SIGN) && (!strcmp(*argv, "-spc") || !strcmp(*argv, "-certs"))) { + if (--argc < 1) usage(argv0, "all"); + options->certfile = *(++argv); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-ac")) { + if (--argc < 1) usage(argv0, "all"); + options->xcertfile = *(++argv); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-key")) { + if (--argc < 1) usage(argv0, "all"); + options->keyfile = *(++argv); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs12")) { + if (--argc < 1) usage(argv0, "all"); + options->pkcs12file = *(++argv); + } else if ((*cmd == CMD_EXTRACT) && !strcmp(*argv, "-pem")) { + options->output_pkcs7 = 1; + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11engine")) { + if (--argc < 1) usage(argv0, "all"); + options->p11engine = *(++argv); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11module")) { + if (--argc < 1) usage(argv0, "all"); + options->p11module = *(++argv); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pass")) { + if (options->askpass || options->readpass) usage(argv0, "all"); + if (--argc < 1) usage(argv0, "all"); + options->pass = strdup(*(++argv)); + memset(*argv, 0, strlen(*argv)); +#ifdef PROVIDE_ASKPASS + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-askpass")) { + if (options->pass || options->readpass) usage(argv0, "all"); + options->askpass = 1; +#endif + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-readpass")) { + if (options->askpass || options->pass) usage(argv0, "all"); + if (--argc < 1) usage(argv0, "all"); + options->readpass = *(++argv); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-comm")) { + options->comm = 1; + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-ph")) { + options->pagehash = 1; + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-n")) { + if (--argc < 1) usage(argv0, "all"); + options->desc = *(++argv); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-h")) { + if (--argc < 1) usage(argv0, "all"); + ++argv; + if (!strcmp(*argv, "md5")) { + options->md = EVP_md5(); + } else if (!strcmp(*argv, "sha1")) { + options->md = EVP_sha1(); + } else if (!strcmp(*argv, "sha2") || !strcmp(*argv, "sha256")) { + options->md = EVP_sha256(); + } else if (!strcmp(*argv, "sha384")) { + options->md = EVP_sha384(); + } else if (!strcmp(*argv, "sha512")) { + options->md = EVP_sha512(); + } else { + usage(argv0, "all"); + } + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-i")) { + if (--argc < 1) usage(argv0, "all"); + options->url = *(++argv); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-st")) { + if (--argc < 1) usage(argv0, "all"); + options->signing_time = (time_t)strtoul(*(++argv), NULL, 10); +#ifdef ENABLE_CURL + } else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-t")) { + if (--argc < 1) usage(argv0, "all"); + options->turl[*nturl] = *(++argv); + *nturl += 1; + } else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-ts")) { + if (--argc < 1) usage(argv0, "all"); + options->tsurl[*ntsurl] = *(++argv); + *ntsurl += 1; + } else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-p")) { + if (--argc < 1) usage(argv0, "all"); + options->proxy = *(++argv); + } else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-noverifypeer")) { + options->noverifypeer = 1; +#endif + } else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-addUnauthenticatedBlob")) { + options->addBlob = 1; + } else if ((*cmd == CMD_SIGN || *cmd == CMD_ATTACH) && !strcmp(*argv, "-nest")) { + options->nest = 1; + } else if ((*cmd == CMD_SIGN || *cmd == CMD_VERIFY) && !strcmp(*argv, "-verbose")) { + options->verbose = 1; +#ifdef WITH_GSF + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-add-msi-dse")) { + options->add_msi_dse = 1; +#endif + } else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && !strcmp(*argv, "-CAfile")) { + if (--argc < 1) usage(argv0, "all"); + OPENSSL_free(options->cafile); + options->cafile = OPENSSL_strdup(*++argv); + } else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && !strcmp(*argv, "-CRLfile")) { + if (--argc < 1) usage(argv0, "all"); + options->crlfile = OPENSSL_strdup(*++argv); + } else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && !strcmp(*argv, "-untrusted")) { + if (--argc < 1) usage(argv0, "all"); + OPENSSL_free(options->untrusted); + options->untrusted = OPENSSL_strdup(*++argv); + } else if ((*cmd == CMD_VERIFY) && !strcmp(*argv, "-require-leaf-hash")) { + if (--argc < 1) usage(argv0, "all"); + options->leafhash = (*++argv); + } else if (!strcmp(*argv, "-v") || !strcmp(*argv, "--version")) { + printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n", + SSLeay_version(SSLEAY_VERSION), +#ifdef ENABLE_CURL + curl_version() +#else + "no libcurl available" +#endif + ); + printf( +#ifdef WITH_GSF + "\tlibgsf %d.%d.%d\n", + libgsf_major_version, + libgsf_minor_version, + libgsf_micro_version +#else + "\tno libgsf available\n" +#endif + ); + printf("\nPlease send bug-reports to " + PACKAGE_BUGREPORT + "\n"); + } else if ((*cmd == CMD_ADD) && !strcmp(*argv, "--help")) { + help_for(argv0, "add"); + } else if ((*cmd == CMD_ATTACH) && !strcmp(*argv, "--help")) { + help_for(argv0, "attach-signature"); + } else if ((*cmd == CMD_EXTRACT) && !strcmp(*argv, "--help")) { + help_for(argv0, "extract-signature"); + } else if ((*cmd == CMD_REMOVE) && !strcmp(*argv, "--help")) { + help_for(argv0, "remove-signature"); + } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "--help")) { + help_for(argv0, "sign"); + } else if ((*cmd == CMD_VERIFY) && !strcmp(*argv, "--help")) { + help_for(argv0, "verify"); + } else if (!strcmp(*argv, "-jp")) { + char *ap; + if (--argc < 1) usage(argv0, "all"); + ap = *(++argv); + for (i=0; ap[i]; i++) ap[i] = tolower((int)ap[i]); + if (!strcmp(ap, "low")) { + options->jp = 0; + } else if (!strcmp(ap, "medium")) { + options->jp = 1; + } else if (!strcmp(ap, "high")) { + options->jp = 2; + } + if (options->jp != 0) usage(argv0, "all"); /* XXX */ + } else { + failarg = *argv; + break; + } + } + + if (!options->infile && argc > 0) { + options->infile = *(argv++); + argc--; + } + + if (*cmd != CMD_VERIFY && (!options->outfile && argc > 0)) { + if (!strcmp(*argv, "-out")) { + argv++; + argc--; + } + if (argc > 0) { + options->outfile = *(argv++); + argc--; + } + } + + if (argc > 0 || (*nturl && *ntsurl) || !options->infile || + (*cmd != CMD_VERIFY && !options->outfile) || + (*cmd == CMD_SIGN && !((options->certfile && options->keyfile) || + options->pkcs12file || options->p11module))) { + if (failarg) + fprintf(stderr, "Unknown option: %s\n", failarg); + usage(argv0, "all"); + } +} + int main(int argc, char **argv) { GLOBAL_OPTIONS options; @@ -4248,17 +4491,15 @@ int main(int argc, char **argv) STACK_OF(X509) *certs = NULL, *xcerts = NULL; EVP_PKEY *pkey = NULL; - const char *argv0 = argv[0]; static char buf[64*1024]; char *indata, *outdataverify, *pvkfile = NULL; int nturl = 0, ntsurl = 0; u_char *p = NULL; - int ret = 0, i, len = 0; + int ret = 0, len = 0; size_t padlen = 0; size_t filesize, outdatasize; file_type_t type; - cmd_type_t cmd = CMD_SIGN; - char *failarg = NULL; + cmd_type_t cmd; static u_char msi_signature[] = { 0xd0, 0xcf, 0x11, 0xe0, 0xa1, 0xb1, 0x1a, 0xe1 @@ -4282,242 +4523,7 @@ int main(int argc, char **argv) !OBJ_create(SPC_NESTED_SIGNATURE_OBJID, NULL, NULL)) DO_EXIT_0("Failed to add objects\n"); - /* reset options */ - memset(&options, 0, sizeof(GLOBAL_OPTIONS)); - options.md = EVP_sha1(); - options.signing_time = (time_t)-1; - options.jp = -1; - - if (argc > 1) { - if (!strcmp(argv[1], "--help")) { - printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n\n", - SSLeay_version(SSLEAY_VERSION), -#ifdef ENABLE_CURL - curl_version() -#else - "no libcurl available" -#endif - ); - help_for(argv0, "all"); - } else if (!strcmp(argv[1], "sign")) { - cmd = CMD_SIGN; - argv++; - argc--; - } else if (!strcmp(argv[1], "extract-signature")) { - cmd = CMD_EXTRACT; - argv++; - argc--; - } else if (!strcmp(argv[1], "attach-signature")) { - cmd = CMD_ATTACH; - argv++; - argc--; - } else if (!strcmp(argv[1], "remove-signature")) { - cmd = CMD_REMOVE; - argv++; - argc--; - } else if (!strcmp(argv[1], "verify")) { - cmd = CMD_VERIFY; - argv++; - argc--; - } else if (!strcmp(argv[1], "add")) { - cmd = CMD_ADD; - argv++; - argc--; - } - } - - if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH)) { - options.cafile = get_cafile(); - options.untrusted = get_cafile(); - } - - for (argc--,argv++; argc >= 1; argc--,argv++) { - if (!strcmp(*argv, "-in")) { - if (--argc < 1) usage(argv0, "all"); - options.infile = *(++argv); - } else if (!strcmp(*argv, "-out")) { - if (--argc < 1) usage(argv0, "all"); - options.outfile = *(++argv); - } else if (!strcmp(*argv, "-sigin")) { - if (--argc < 1) usage(argv0, "all"); - options.sigfile = *(++argv); - } else if ((cmd == CMD_SIGN) && (!strcmp(*argv, "-spc") || !strcmp(*argv, "-certs"))) { - if (--argc < 1) usage(argv0, "all"); - options.certfile = *(++argv); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-ac")) { - if (--argc < 1) usage(argv0, "all"); - options.xcertfile = *(++argv); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-key")) { - if (--argc < 1) usage(argv0, "all"); - options.keyfile = *(++argv); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs12")) { - if (--argc < 1) usage(argv0, "all"); - options.pkcs12file = *(++argv); - } else if ((cmd == CMD_EXTRACT) && !strcmp(*argv, "-pem")) { - options.output_pkcs7 = 1; - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11engine")) { - if (--argc < 1) usage(argv0, "all"); - options.p11engine = *(++argv); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11module")) { - if (--argc < 1) usage(argv0, "all"); - options.p11module = *(++argv); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pass")) { - if (options.askpass || options.readpass) usage(argv0, "all"); - if (--argc < 1) usage(argv0, "all"); - options.pass = strdup(*(++argv)); - memset(*argv, 0, strlen(*argv)); -#ifdef PROVIDE_ASKPASS - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-askpass")) { - if (options.pass || options.readpass) usage(argv0, "all"); - options.askpass = 1; -#endif - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-readpass")) { - if (options.askpass || options.pass) usage(argv0, "all"); - if (--argc < 1) usage(argv0, "all"); - options.readpass = *(++argv); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-comm")) { - options.comm = 1; - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-ph")) { - options.pagehash = 1; - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-n")) { - if (--argc < 1) usage(argv0, "all"); - options.desc = *(++argv); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-h")) { - if (--argc < 1) usage(argv0, "all"); - ++argv; - if (!strcmp(*argv, "md5")) { - options.md = EVP_md5(); - } else if (!strcmp(*argv, "sha1")) { - options.md = EVP_sha1(); - } else if (!strcmp(*argv, "sha2") || !strcmp(*argv, "sha256")) { - options.md = EVP_sha256(); - } else if (!strcmp(*argv, "sha384")) { - options.md = EVP_sha384(); - } else if (!strcmp(*argv, "sha512")) { - options.md = EVP_sha512(); - } else { - usage(argv0, "all"); - } - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-i")) { - if (--argc < 1) usage(argv0, "all"); - options.url = *(++argv); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-st")) { - if (--argc < 1) usage(argv0, "all"); - options.signing_time = (time_t)strtoul(*(++argv), NULL, 10); -#ifdef ENABLE_CURL - } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-t")) { - if (--argc < 1) usage(argv0, "all"); - options.turl[nturl++] = *(++argv); - } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-ts")) { - if (--argc < 1) usage(argv0, "all"); - options.tsurl[ntsurl++] = *(++argv); - } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-p")) { - if (--argc < 1) usage(argv0, "all"); - options.proxy = *(++argv); - } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-noverifypeer")) { - options.noverifypeer = 1; -#endif - } else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-addUnauthenticatedBlob")) { - options.addBlob = 1; - } else if ((cmd == CMD_SIGN || cmd == CMD_ATTACH) && !strcmp(*argv, "-nest")) { - options.nest = 1; - } else if ((cmd == CMD_SIGN || cmd == CMD_VERIFY) && !strcmp(*argv, "-verbose")) { - options.verbose = 1; -#ifdef WITH_GSF - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-add-msi-dse")) { - options.add_msi_dse = 1; -#endif - } else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-CAfile")) { - if (--argc < 1) usage(argv0, "all"); - OPENSSL_free(options.cafile); - options.cafile = OPENSSL_strdup(*++argv); - } else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-CRLfile")) { - if (--argc < 1) usage(argv0, "all"); - options.crlfile = OPENSSL_strdup(*++argv); - } else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-untrusted")) { - if (--argc < 1) usage(argv0, "all"); - OPENSSL_free(options.untrusted); - options.untrusted = OPENSSL_strdup(*++argv); - } else if ((cmd == CMD_VERIFY) && !strcmp(*argv, "-require-leaf-hash")) { - if (--argc < 1) usage(argv0, "all"); - options.leafhash = (*++argv); - } else if (!strcmp(*argv, "-v") || !strcmp(*argv, "--version")) { - printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n", - SSLeay_version(SSLEAY_VERSION), -#ifdef ENABLE_CURL - curl_version() -#else - "no libcurl available" -#endif - ); - printf( -#ifdef WITH_GSF - "\tlibgsf %d.%d.%d\n", - libgsf_major_version, - libgsf_minor_version, - libgsf_micro_version -#else - "\tno libgsf available\n" -#endif - ); - printf("\nPlease send bug-reports to " - PACKAGE_BUGREPORT - "\n"); - } else if ((cmd == CMD_ADD) && !strcmp(*argv, "--help")) { - help_for(argv0, "add"); - } else if ((cmd == CMD_ATTACH) && !strcmp(*argv, "--help")) { - help_for(argv0, "attach-signature"); - } else if ((cmd == CMD_EXTRACT) && !strcmp(*argv, "--help")) { - help_for(argv0, "extract-signature"); - } else if ((cmd == CMD_REMOVE) && !strcmp(*argv, "--help")) { - help_for(argv0, "remove-signature"); - } else if ((cmd == CMD_SIGN) && !strcmp(*argv, "--help")) { - help_for(argv0, "sign"); - } else if ((cmd == CMD_VERIFY) && !strcmp(*argv, "--help")) { - help_for(argv0, "verify"); - } else if (!strcmp(*argv, "-jp")) { - char *ap; - if (--argc < 1) usage(argv0, "all"); - ap = *(++argv); - for (i=0; ap[i]; i++) ap[i] = tolower((int)ap[i]); - if (!strcmp(ap, "low")) { - options.jp = 0; - } else if (!strcmp(ap, "medium")) { - options.jp = 1; - } else if (!strcmp(ap, "high")) { - options.jp = 2; - } - if (options.jp != 0) usage(argv0, "all"); /* XXX */ - } else { - failarg = *argv; - break; - } - } - - if (!options.infile && argc > 0) { - options.infile = *(argv++); - argc--; - } - - if (cmd != CMD_VERIFY && (!options.outfile && argc > 0)) { - if (!strcmp(*argv, "-out")) { - argv++; - argc--; - } - if (argc > 0) { - options.outfile = *(argv++); - argc--; - } - } - - if (argc > 0 || (nturl && ntsurl) || !options.infile || - (cmd != CMD_VERIFY && !options.outfile) || - (cmd == CMD_SIGN && !((options.certfile && options.keyfile) || - options.pkcs12file || options.p11module))) { - if (failarg) - fprintf(stderr, "Unknown option: %s\n", failarg); - usage(argv0, "all"); - } + main_configure(argc, argv, &cmd, &options, &nturl, &ntsurl); if (!read_password(&options)) goto err_cleanup; From f93bdc0f9817107b005574b83e1006f27710496e Mon Sep 17 00:00:00 2001 From: olszomal Date: Mon, 16 Mar 2020 14:41:21 +0100 Subject: [PATCH 13/35] nturl/ntsurl GLOBAL_OPTIONS related to turl/tsurl --- osslsigncode.c | 34 ++++++++++++++++------------------ 1 file changed, 16 insertions(+), 18 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 7d372a4..0a76427 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -207,7 +207,9 @@ typedef struct { time_t signing_time; #ifdef ENABLE_CURL char *turl[MAX_TS_SERVERS]; + int nturl; char *tsurl[MAX_TS_SERVERS]; + int ntsurl; char *proxy; int noverifypeer; #endif @@ -804,7 +806,7 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, if (c) { BIO_free_all(bin); if (verbose) - fprintf(stderr, "CURL failure: %s\n", curl_easy_strerror(c)); + fprintf(stderr, "CURL failure: %s %s\n", curl_easy_strerror(c), url); } else { (void)BIO_flush(bin); @@ -905,23 +907,23 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, return (int)c; } -static int add_timestamp_authenticode(PKCS7 *sig, int nurls, GLOBAL_OPTIONS *options) +static int add_timestamp_authenticode(PKCS7 *sig, GLOBAL_OPTIONS *options) { int i; - for (i=0; inturl; i++) { int res = add_timestamp(sig, options->turl[i], options->proxy, 0, NULL, - options->verbose || nurls == 1, options->noverifypeer); + options->verbose || options->nturl == 1, options->noverifypeer); if (!res) return 0; } return -1; } -static int add_timestamp_rfc3161(PKCS7 *sig, int nurls, GLOBAL_OPTIONS *options) +static int add_timestamp_rfc3161(PKCS7 *sig, GLOBAL_OPTIONS *options) { int i; - for (i=0; intsurl; i++) { int res = add_timestamp(sig, options->tsurl[i], options->proxy, 1, options->md, - options->verbose || nurls == 1, options->noverifypeer); + options->verbose || options->ntsurl == 1, options->noverifypeer); if (!res) return 0; } return -1; @@ -4263,8 +4265,7 @@ static cmd_type_t get_command(char **argv) return CMD_SIGN; } -static void main_configure(int argc, char **argv, cmd_type_t *cmd, - GLOBAL_OPTIONS *options, int *nturl, int *ntsurl) +static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTIONS *options) { int i; char *failarg = NULL; @@ -4364,12 +4365,10 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, #ifdef ENABLE_CURL } else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-t")) { if (--argc < 1) usage(argv0, "all"); - options->turl[*nturl] = *(++argv); - *nturl += 1; + options->turl[options->nturl++] = *(++argv); } else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-ts")) { if (--argc < 1) usage(argv0, "all"); - options->tsurl[*ntsurl] = *(++argv); - *ntsurl += 1; + options->tsurl[options->ntsurl++] = *(++argv); } else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-p")) { if (--argc < 1) usage(argv0, "all"); options->proxy = *(++argv); @@ -4469,7 +4468,7 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, } } - if (argc > 0 || (*nturl && *ntsurl) || !options->infile || + if (argc > 0 || (options->nturl && options->ntsurl) || !options->infile || (*cmd != CMD_VERIFY && !options->outfile) || (*cmd == CMD_SIGN && !((options->certfile && options->keyfile) || options->pkcs12file || options->p11module))) { @@ -4493,7 +4492,6 @@ int main(int argc, char **argv) static char buf[64*1024]; char *indata, *outdataverify, *pvkfile = NULL; - int nturl = 0, ntsurl = 0; u_char *p = NULL; int ret = 0, len = 0; size_t padlen = 0; @@ -4523,7 +4521,7 @@ int main(int argc, char **argv) !OBJ_create(SPC_NESTED_SIGNATURE_OBJID, NULL, NULL)) DO_EXIT_0("Failed to add objects\n"); - main_configure(argc, argv, &cmd, &options, &nturl, &ntsurl); + main_configure(argc, argv, &cmd, &options); if (!read_password(&options)) goto err_cleanup; @@ -4737,9 +4735,9 @@ add_only: #ifdef ENABLE_CURL /* add counter-signature/timestamp */ - if (nturl && add_timestamp_authenticode(sig, nturl, &options)) + if (options.nturl && add_timestamp_authenticode(sig, &options)) DO_EXIT_0("Authenticode timestamping failed\n"); - if (ntsurl && add_timestamp_rfc3161(sig, ntsurl, &options)) + if (options.ntsurl && add_timestamp_rfc3161(sig, &options)) DO_EXIT_0("RFC 3161 timestamping failed\n"); #endif From 0f35d25791ed8325be6c133cb1e8a487d12cacae Mon Sep 17 00:00:00 2001 From: olszomal Date: Tue, 17 Mar 2020 11:01:37 +0100 Subject: [PATCH 14/35] CRYPTO_PARAMS struct --- osslsigncode.c | 152 +++++++++++++++++++++++++------------------------ 1 file changed, 78 insertions(+), 74 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 0a76427..cc21f40 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -192,6 +192,7 @@ typedef struct { char *certfile; char *xcertfile; char *keyfile; + char *pvkfile; char *pkcs12file; int output_pkcs7; char *p11engine; @@ -238,6 +239,13 @@ typedef struct { size_t flags; } FILE_HEADER; +typedef struct { + EVP_PKEY *pkey; + X509 *cert; + STACK_OF(X509) *certs; + STACK_OF(X509) *xcerts; +} CRYPTO_PARAMS; + /* ASN.1 definitions (more or less from official MS Authenticode docs) */ @@ -3750,8 +3758,8 @@ static int add_opus_attribute(PKCS7_SIGNER_INFO *si, char *desc, char *url) return 1; /* OK */ } -static int create_new_signature(PKCS7 *sig, STACK_OF(X509) *certs, STACK_OF(X509) *xcerts, - X509 *cert, EVP_PKEY *pkey, file_type_t type, GLOBAL_OPTIONS *options) +static int create_new_signature(PKCS7 *sig, file_type_t type, + GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) { int i; PKCS7_SIGNER_INFO *si; @@ -3759,16 +3767,16 @@ static int create_new_signature(PKCS7 *sig, STACK_OF(X509) *certs, STACK_OF(X509 PKCS7_set_type(sig, NID_pkcs7_signed); si = NULL; - if (cert != NULL) - si = PKCS7_add_signature(sig, cert, pkey, options->md); + if (cparams->cert != NULL) + si = PKCS7_add_signature(sig, cparams->cert, cparams->pkey, options->md); - for (i=0; si == NULL && icerts); i++) { + signcert = sk_X509_value(cparams->certs, i); /* X509_print_fp(stdout, signcert); */ - si = PKCS7_add_signature(sig, signcert, pkey, options->md); + si = PKCS7_add_signature(sig, signcert, cparams->pkey, options->md); } - EVP_PKEY_free(pkey); - pkey = NULL; + EVP_PKEY_free(cparams->pkey); + cparams->pkey = NULL; if (si == NULL) { fprintf(stderr, "PKCS7_add_signature failed\n"); @@ -3792,25 +3800,25 @@ static int create_new_signature(PKCS7 *sig, STACK_OF(X509) *certs, STACK_OF(X509 PKCS7_content_new(sig, NID_pkcs7_data); - if (cert != NULL) { - PKCS7_add_certificate(sig, cert); - X509_free(cert); - cert = NULL; + if (cparams->cert != NULL) { + PKCS7_add_certificate(sig, cparams->cert); + X509_free(cparams->cert); + cparams->cert = NULL; } - if (xcerts) { - for(i = sk_X509_num(xcerts)-1; i>=0; i--) - PKCS7_add_certificate(sig, sk_X509_value(xcerts, i)); + if (cparams->xcerts) { + for(i = sk_X509_num(cparams->xcerts)-1; i>=0; i--) + PKCS7_add_certificate(sig, sk_X509_value(cparams->xcerts, i)); } - for (i = sk_X509_num(certs)-1; i>=0; i--) - PKCS7_add_certificate(sig, sk_X509_value(certs, i)); + for (i = sk_X509_num(cparams->certs)-1; i>=0; i--) + PKCS7_add_certificate(sig, sk_X509_value(cparams->certs, i)); - if (certs) { - sk_X509_free(certs); - certs = NULL; + if (cparams->certs) { + sk_X509_free(cparams->certs); + cparams->certs = NULL; } - if (xcerts) { - sk_X509_free(xcerts); - xcerts = NULL; + if (cparams->xcerts) { + sk_X509_free(cparams->xcerts); + cparams->xcerts = NULL; } return 1; /* OK */ @@ -4016,8 +4024,7 @@ static char *read_key(GLOBAL_OPTIONS *options) return NULL; } -static int read_certificate(GLOBAL_OPTIONS *options, char *pvkfile, EVP_PKEY **pkey, - X509 **cert, STACK_OF(X509) **certs, STACK_OF(X509) **xcerts) +static int read_crypto_params(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) { PKCS12 *p12; PKCS7 *p7 = NULL, *p7x = NULL; @@ -4026,6 +4033,10 @@ static int read_certificate(GLOBAL_OPTIONS *options, char *pvkfile, EVP_PKEY **p ENGINE *dyn, *pkcs11; int ret = 1; + /* reset crypto */ + memset(cparams, 0, sizeof(CRYPTO_PARAMS)); + + options->pvkfile = read_key(options); if (options->pkcs12file != NULL) { if ((btmp = BIO_new_file(options->pkcs12file, "rb")) == NULL || (p12 = d2i_PKCS12_bio(btmp, NULL)) == NULL) { @@ -4033,24 +4044,24 @@ static int read_certificate(GLOBAL_OPTIONS *options, char *pvkfile, EVP_PKEY **p ret = 0; /* FAILED */ } BIO_free(btmp); - if (!PKCS12_parse(p12, options->pass ? options->pass : "", pkey, cert, certs)) { + if (!PKCS12_parse(p12, options->pass ? options->pass : "", &cparams->pkey, &cparams->cert, &cparams->certs)) { fprintf(stderr, "Failed to parse PKCS#12 file: %s (Wrong password?)\n", options->pkcs12file); ret = 0; /* FAILED */ } PKCS12_free(p12); - } else if (pvkfile != NULL) { + } else if (options->pvkfile != NULL) { if ((btmp = BIO_new_file(options->certfile, "rb")) == NULL || ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && - (*certs = PEM_read_certs(btmp, "")) == NULL)) { + (cparams->certs = PEM_read_certs(btmp, "")) == NULL)) { fprintf(stderr, "Failed to read certificate file: %s\n", options->certfile); ret = 0; /* FAILED */ } BIO_free(btmp); - if ((btmp = BIO_new_file(pvkfile, "rb")) == NULL || - ((*pkey = b2i_PVK_bio(btmp, NULL, options->pass ? options->pass : "")) == NULL && + if ((btmp = BIO_new_file(options->pvkfile, "rb")) == NULL || + ((cparams->pkey = b2i_PVK_bio(btmp, NULL, options->pass ? options->pass : "")) == NULL && (BIO_seek(btmp, 0) == 0) && - (*pkey = b2i_PVK_bio(btmp, NULL, NULL)) == NULL)) { - fprintf(stderr, "Failed to read PVK file: %s\n", pvkfile); + (cparams->pkey = b2i_PVK_bio(btmp, NULL, NULL)) == NULL)) { + fprintf(stderr, "Failed to read PVK file: %s\n", options->pvkfile); ret = 0; /* FAILED */ } BIO_free(btmp); @@ -4098,14 +4109,14 @@ static int read_certificate(GLOBAL_OPTIONS *options, char *pvkfile, EVP_PKEY **p fprintf(stderr, "Failed to initialized pkcs11 engine\n"); ret = 0; /* FAILED */ } - *pkey = ENGINE_load_private_key(pkcs11, options->keyfile, NULL, NULL); - if (*pkey == NULL) { + cparams->pkey = ENGINE_load_private_key(pkcs11, options->keyfile, NULL, NULL); + if (cparams->pkey == NULL) { fprintf(stderr, "Failed to load private key %s\n", options->keyfile); ret = 0; /* FAILED */ } if ((btmp = BIO_new_file(options->certfile, "rb")) == NULL || ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && - (*certs = PEM_read_certs(btmp, "")) == NULL)) { + (cparams->certs = PEM_read_certs(btmp, "")) == NULL)) { fprintf(stderr, "Failed to read certificate file: %s\n", options->certfile); ret = 0; /* FAILED */ } @@ -4113,30 +4124,30 @@ static int read_certificate(GLOBAL_OPTIONS *options, char *pvkfile, EVP_PKEY **p } else { if ((btmp = BIO_new_file(options->certfile, "rb")) == NULL || ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && - (*certs = PEM_read_certs(btmp, "")) == NULL)) { + (cparams->certs = PEM_read_certs(btmp, "")) == NULL)) { fprintf(stderr, "Failed to read certificate file: %s\n", options->certfile); ret = 0; /* FAILED */ } BIO_free(btmp); if ((btmp = BIO_new_file(options->keyfile, "rb")) == NULL || - ((*pkey = d2i_PrivateKey_bio(btmp, NULL)) == NULL && + ((cparams->pkey = d2i_PrivateKey_bio(btmp, NULL)) == NULL && (BIO_seek(btmp, 0) == 0) && - (*pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, options->pass ? options->pass : "")) == NULL && + (cparams->pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, options->pass ? options->pass : "")) == NULL && (BIO_seek(btmp, 0) == 0) && - (*pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, NULL)) == NULL)) { + (cparams->pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, NULL)) == NULL)) { fprintf(stderr, "Failed to read private key file: %s (Wrong password?)\n", options->keyfile); ret = 0; /* FAILED */ } BIO_free(btmp); } - if (*certs == NULL && p7 != NULL) - *certs = sk_X509_dup(p7->d.sign->cert); + if (cparams->certs == NULL && p7 != NULL) + cparams->certs = sk_X509_dup(p7->d.sign->cert); if (options->xcertfile) { if ((btmp = BIO_new_file(options->xcertfile, "rb")) == NULL || ((p7x = d2i_PKCS7_bio(btmp, NULL)) == NULL && - (*xcerts = PEM_read_certs(btmp, "")) == NULL)) { + (cparams->xcerts = PEM_read_certs(btmp, "")) == NULL)) { fprintf(stderr, "Failed to read cross certificate file: %s\n", options->xcertfile); ret = 0; /* FAILED */ } @@ -4153,6 +4164,18 @@ static int read_certificate(GLOBAL_OPTIONS *options, char *pvkfile, EVP_PKEY **p return ret; /* OK */ } +static void free_crypto_params(CRYPTO_PARAMS *cparams) +{ + if (cparams->pkey) + EVP_PKEY_free(cparams->pkey); + if (cparams->cert) + X509_free(cparams->cert); + if (cparams->certs) + sk_X509_free(cparams->certs); + if (cparams->xcerts) + sk_X509_free(cparams->xcerts); +} + static char *get_cafile(void) { const char *sslpart1, *sslpart2; @@ -4482,20 +4505,14 @@ int main(int argc, char **argv) { GLOBAL_OPTIONS options; FILE_HEADER header; - - BIO *hash = NULL; - BIO *outdata = NULL; + CRYPTO_PARAMS cparams; + BIO *hash = NULL, *outdata = NULL; PKCS7 *cursig = NULL, *outsig = NULL, *sig = NULL; - X509 *cert = NULL; - STACK_OF(X509) *certs = NULL, *xcerts = NULL; - EVP_PKEY *pkey = NULL; - static char buf[64*1024]; - char *indata, *outdataverify, *pvkfile = NULL; + char *indata, *outdataverify; u_char *p = NULL; int ret = 0, len = 0; - size_t padlen = 0; - size_t filesize, outdatasize; + size_t padlen = 0, filesize, outdatasize; file_type_t type; cmd_type_t cmd; @@ -4521,28 +4538,22 @@ int main(int argc, char **argv) !OBJ_create(SPC_NESTED_SIGNATURE_OBJID, NULL, NULL)) DO_EXIT_0("Failed to add objects\n"); + /* commands and options initialization */ main_configure(argc, argv, &cmd, &options); - if (!read_password(&options)) goto err_cleanup; + /* read key and certificates */ + if (cmd == CMD_SIGN && !read_crypto_params(&options, &cparams)) + goto err_cleanup; - if (cmd == CMD_SIGN) { - /* Read certificate and key */ - pvkfile = read_key(&options); - if (!read_certificate(&options, pvkfile, &pkey, &cert, &certs, &xcerts)) - goto err_cleanup; - } - - /* Check if indata is cab or pe */ + /* check if indata is cab or pe */ filesize = get_file_size(options.infile); if (filesize == 0) goto err_cleanup; - indata = map_file(options.infile, filesize); if (indata == NULL) DO_EXIT_1("Failed to open file: %s\n", options.infile); - - /* reset header */ + /* reset file header */ memset(&header, 0, sizeof(FILE_HEADER)); header.fileend = filesize; @@ -4719,7 +4730,7 @@ int main(int argc, char **argv) goto skip_signing; sig = PKCS7_new(); - if (!create_new_signature(sig, certs, xcerts, cert, pkey, type, &options)) + if (!create_new_signature(sig, type, &options, &cparams)) DO_EXIT_0("Creating a new signature failed\n"); get_indirect_data_blob(&p, &len, options.md, type, options.pagehash, indata, @@ -4885,14 +4896,7 @@ skip_signing: err_cleanup: ERR_print_errors_fp(stderr); - if (certs) - sk_X509_free(certs); - if (xcerts) - sk_X509_free(xcerts); - if (cert) - X509_free(cert); - if (pkey) - EVP_PKEY_free(pkey); + free_crypto_params(&cparams); if (hash) BIO_free_all(hash); if (outdata) From 536cf9670b79ed4e6e9128ff4ba12c58229f4c26 Mon Sep 17 00:00:00 2001 From: olszomal Date: Tue, 17 Mar 2020 11:17:45 +0100 Subject: [PATCH 15/35] get_file_type() --- osslsigncode.c | 42 +++++++++++++++++++++++++----------------- 1 file changed, 25 insertions(+), 17 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index cc21f40..ed34b6f 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -3934,6 +3934,29 @@ static char *map_file(const char *infile, const off_t size) #endif return indata; } +static int get_file_type(char *indata, char *infile, file_type_t *type) +{ + static u_char msi_signature[] = { + 0xd0, 0xcf, 0x11, 0xe0, 0xa1, 0xb1, 0x1a, 0xe1 + }; + + if (!memcmp(indata, "MSCF", 4)) { + *type = FILE_TYPE_CAB; + } else if (!memcmp(indata, "MZ", 2)) { + *type = FILE_TYPE_PE; + } else if (!memcmp(indata, msi_signature, sizeof(msi_signature))) { + *type = FILE_TYPE_MSI; + #ifdef WITH_GSF + gsf_init(); + gsf_initialized = 1; + #endif + } else { + printf("Unrecognized file type: %s\n", infile); + return 0; /* FAILED */ + } + + return 1; /* OK */ +} #ifdef PROVIDE_ASKPASS static char *getpassword(const char *prompt) @@ -4516,10 +4539,6 @@ int main(int argc, char **argv) file_type_t type; cmd_type_t cmd; - static u_char msi_signature[] = { - 0xd0, 0xcf, 0x11, 0xe0, 0xa1, 0xb1, 0x1a, 0xe1 - }; - #ifdef WITH_GSF GsfOutfile *outole = NULL; GsfOutput *sink = NULL; @@ -4557,19 +4576,8 @@ int main(int argc, char **argv) memset(&header, 0, sizeof(FILE_HEADER)); header.fileend = filesize; - if (!memcmp(indata, "MSCF", 4)) { - type = FILE_TYPE_CAB; - } else if (!memcmp(indata, "MZ", 2)) { - type = FILE_TYPE_PE; - } else if (!memcmp(indata, msi_signature, sizeof(msi_signature))) { - type = FILE_TYPE_MSI; -#ifdef WITH_GSF - gsf_init(); - gsf_initialized = 1; -#endif - } else { - DO_EXIT_1("Unrecognized file type: %s\n", options.infile); - } + if (!get_file_type(indata, options.infile, &type)) + goto err_cleanup; hash = BIO_new(BIO_f_md()); BIO_set_md(hash, options.md); From 1715a02cd82257179acd91457689e2b15ce11736 Mon Sep 17 00:00:00 2001 From: olszomal Date: Tue, 24 Mar 2020 13:59:38 +0100 Subject: [PATCH 16/35] get_indirect_data_blob() with options and header structures --- osslsigncode.c | 67 +++++++++++++++++++++++++++----------------------- 1 file changed, 36 insertions(+), 31 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index ed34b6f..29561a7 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -1338,23 +1338,26 @@ static unsigned char *calc_page_hash(char *indata, size_t header_size, return res; } -static SpcLink *get_page_hash_link(int phtype, char *indata, - size_t header_size, int pe32plus, size_t sigpos) +static SpcLink *get_page_hash_link(int phtype, char *indata, FILE_HEADER *header) { - unsigned char *p, *tmp; - size_t l; + unsigned char *ph, *p, *tmp; + size_t l, phlen; + char hexbuf[EVP_MAX_MD_SIZE*2+1]; + ASN1_TYPE *tostr; + SpcAttributeTypeAndOptionalValue *aval; + ASN1_TYPE *taval; + SpcSerializedObject *so; + SpcLink *link; - size_t phlen; - unsigned char *ph = calc_page_hash(indata, header_size, pe32plus, sigpos, phtype, &phlen); + ph = calc_page_hash(indata, header->header_size, header->pe32plus, header->fileend, phtype, &phlen); if (!ph) { fprintf(stderr, "Failed to calculate page hash\n"); exit(-1); } - char hexbuf[EVP_MAX_MD_SIZE*2+1]; tohex(ph, hexbuf, (phlen < 32) ? phlen : 32); printf("Calculated page hash : %s ...\n", hexbuf); - ASN1_TYPE *tostr = ASN1_TYPE_new(); + tostr = ASN1_TYPE_new(); tostr->type = V_ASN1_OCTET_STRING; tostr->value.octet_string = ASN1_OCTET_STRING_new(); ASN1_OCTET_STRING_set(tostr->value.octet_string, ph, phlen); @@ -1368,7 +1371,7 @@ static SpcLink *get_page_hash_link(int phtype, char *indata, ASN1_TYPE_free(tostr); sk_ASN1_TYPE_free(oset); - SpcAttributeTypeAndOptionalValue *aval = SpcAttributeTypeAndOptionalValue_new(); + aval = SpcAttributeTypeAndOptionalValue_new(); aval->type = OBJ_txt2obj((phtype == NID_sha1) ? SPC_PE_IMAGE_PAGE_HASHES_V1 : SPC_PE_IMAGE_PAGE_HASHES_V2, 1); aval->value = ASN1_TYPE_new(); aval->value->type = V_ASN1_SET; @@ -1380,7 +1383,7 @@ static SpcLink *get_page_hash_link(int phtype, char *indata, i2d_SpcAttributeTypeAndOptionalValue(aval, &tmp); SpcAttributeTypeAndOptionalValue_free(aval); - ASN1_TYPE *taval = ASN1_TYPE_new(); + taval = ASN1_TYPE_new(); taval->type = V_ASN1_SEQUENCE; taval->value.sequence = ASN1_STRING_new(); ASN1_STRING_set(taval->value.sequence, p, l); @@ -1394,36 +1397,39 @@ static SpcLink *get_page_hash_link(int phtype, char *indata, ASN1_TYPE_free(taval); sk_ASN1_TYPE_free(aset); - SpcSerializedObject *so = SpcSerializedObject_new(); + so = SpcSerializedObject_new(); ASN1_OCTET_STRING_set(so->classId, classid_page_hash, sizeof(classid_page_hash)); ASN1_OCTET_STRING_set(so->serializedData, p, l); OPENSSL_free(p); - SpcLink *link = SpcLink_new(); + link = SpcLink_new(); link->type = 1; link->value.moniker = so; return link; } -static void get_indirect_data_blob(u_char **blob, int *len, const EVP_MD *md, - file_type_t type, int pagehash, char *indata, size_t header_size, - int pe32plus, size_t sigpos) +static void get_indirect_data_blob(u_char **blob, int *len, GLOBAL_OPTIONS *options, + FILE_HEADER *header, file_type_t type, char *indata) { + u_char *p; + int hashlen, l, phtype; + void *hash; + ASN1_OBJECT *dtype; + SpcIndirectDataContent *idc; + SpcLink *link; + SpcPeImageData *pid; + SpcSipInfo *si; static const unsigned char msistr[] = { 0xf1, 0x10, 0x0c, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x46 }; - u_char *p; - int hashlen, l; - void *hash; - ASN1_OBJECT *dtype; - SpcIndirectDataContent *idc = SpcIndirectDataContent_new(); + idc = SpcIndirectDataContent_new(); idc->data->value = ASN1_TYPE_new(); idc->data->value->type = V_ASN1_SEQUENCE; idc->data->value->value.sequence = ASN1_STRING_new(); if (type == FILE_TYPE_CAB) { - SpcLink *link = get_obsolete_link(); + link = get_obsolete_link(); l = i2d_SpcLink(link, NULL); p = OPENSSL_malloc(l); i2d_SpcLink(link, &p); @@ -1431,13 +1437,13 @@ static void get_indirect_data_blob(u_char **blob, int *len, const EVP_MD *md, dtype = OBJ_txt2obj(SPC_CAB_DATA_OBJID, 1); SpcLink_free(link); } else if (type == FILE_TYPE_PE) { - SpcPeImageData *pid = SpcPeImageData_new(); + pid = SpcPeImageData_new(); ASN1_BIT_STRING_set(pid->flags, (unsigned char*)"0", 0); - if (pagehash) { - int phtype = NID_sha1; - if (EVP_MD_size(md) > EVP_MD_size(EVP_sha1())) + if (options->pagehash) { + phtype = NID_sha1; + if (EVP_MD_size(options->md) > EVP_MD_size(EVP_sha1())) phtype = NID_sha256; - pid->file = get_page_hash_link(phtype, indata, header_size, pe32plus, sigpos); + pid->file = get_page_hash_link(phtype, indata, header); } else { pid->file = get_obsolete_link(); } @@ -1448,7 +1454,7 @@ static void get_indirect_data_blob(u_char **blob, int *len, const EVP_MD *md, dtype = OBJ_txt2obj(SPC_PE_IMAGE_DATA_OBJID, 1); SpcPeImageData_free(pid); } else if (type == FILE_TYPE_MSI) { - SpcSipInfo *si = SpcSipInfo_new(); + si = SpcSipInfo_new(); ASN1_INTEGER_set(si->a, 1); ASN1_INTEGER_set(si->b, 0); ASN1_INTEGER_set(si->c, 0); @@ -1470,11 +1476,11 @@ static void get_indirect_data_blob(u_char **blob, int *len, const EVP_MD *md, idc->data->type = dtype; idc->data->value->value.sequence->data = p; idc->data->value->value.sequence->length = l; - idc->messageDigest->digestAlgorithm->algorithm = OBJ_nid2obj(EVP_MD_nid(md)); + idc->messageDigest->digestAlgorithm->algorithm = OBJ_nid2obj(EVP_MD_nid(options->md)); idc->messageDigest->digestAlgorithm->parameters = ASN1_TYPE_new(); idc->messageDigest->digestAlgorithm->parameters->type = V_ASN1_NULL; - hashlen = EVP_MD_size(md); + hashlen = EVP_MD_size(options->md); hash = OPENSSL_malloc(hashlen); memset(hash, 0, hashlen); ASN1_OCTET_STRING_set(idc->messageDigest->digest, hash, hashlen); @@ -4741,8 +4747,7 @@ int main(int argc, char **argv) if (!create_new_signature(sig, type, &options, &cparams)) DO_EXIT_0("Creating a new signature failed\n"); - get_indirect_data_blob(&p, &len, options.md, type, options.pagehash, indata, - header.header_size, header.pe32plus, header.fileend); + get_indirect_data_blob(&p, &len, &options, &header, type, indata); len -= EVP_MD_size(options.md); memcpy(buf, p, len); OPENSSL_free(p); From b7f04613113b35f219fb83747963ebb33c2a9341 Mon Sep 17 00:00:00 2001 From: olszomal Date: Tue, 24 Mar 2020 14:04:37 +0100 Subject: [PATCH 17/35] page hash verification --- osslsigncode.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 29561a7..c4651b4 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -2990,10 +2990,11 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, tohex(ph, hexbuf, (phlen < 32) ? phlen : 32); printf("Page hash : %s ...\n", hexbuf); size_t cphlen = 0; - unsigned char *cph = calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &phlen); + unsigned char *cph = calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &cphlen); tohex(cph, hexbuf, (cphlen < 32) ? cphlen : 32); - printf("Calculated page hash : %s ...%s\n\n", hexbuf, - ((phlen != cphlen) || memcmp(ph, cph, phlen)) ? " MISMATCH!!!":""); + mdok = (phlen != cphlen) || memcmp(ph, cph, phlen); + if (mdok) ret = 1; + printf("Calculated page hash : %s ...%s\n\n", hexbuf, mdok ? " MISMATCH!!!":""); OPENSSL_free(ph); OPENSSL_free(cph); } From 9f6af8becb1df9f795213b09044e0585a8ae1196 Mon Sep 17 00:00:00 2001 From: olszomal Date: Tue, 24 Mar 2020 14:44:03 +0100 Subject: [PATCH 18/35] set_indirect_data_blob() --- osslsigncode.c | 114 +++++++++++++++++++++++++++---------------------- 1 file changed, 62 insertions(+), 52 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index c4651b4..88a267f 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -1491,6 +1491,67 @@ static void get_indirect_data_blob(u_char **blob, int *len, GLOBAL_OPTIONS *opti p = *blob; i2d_SpcIndirectDataContent(idc, &p); SpcIndirectDataContent_free(idc); + *len -= EVP_MD_size(options->md); +} + +static int set_signing_blob(PKCS7 *sig, BIO *hash, char *buf, int len) +{ + unsigned char mdbuf[EVP_MAX_MD_SIZE]; + int mdlen; + size_t seqhdrlen; + BIO *sigbio; + PKCS7 *td7; + + mdlen = BIO_gets(hash, (char*)mdbuf, EVP_MAX_MD_SIZE); + memcpy(buf+len, mdbuf, mdlen); + seqhdrlen = asn1_simple_hdr_len((unsigned char*)buf, len); + + if ((sigbio = PKCS7_dataInit(sig, NULL)) == NULL) { + fprintf(stderr, "PKCS7_dataInit failed\n"); + return 0; /* FAILED */ + } + BIO_write(sigbio, buf+seqhdrlen, len-seqhdrlen+mdlen); + (void)BIO_flush(sigbio); + + if (!PKCS7_dataFinal(sig, sigbio)) { + fprintf(stderr, "PKCS7_dataFinal failed\n"); + return 0; /* FAILED */ + } + BIO_free_all(sigbio); + + /* + replace the data part with the MS Authenticode + spcIndirectDataContext blob + */ + td7 = PKCS7_new(); + td7->type = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1); + td7->d.other = ASN1_TYPE_new(); + td7->d.other->type = V_ASN1_SEQUENCE; + td7->d.other->value.sequence = ASN1_STRING_new(); + ASN1_STRING_set(td7->d.other->value.sequence, buf, len+mdlen); + if (!PKCS7_set_content(sig, td7)) { + PKCS7_free(td7); + fprintf(stderr, "PKCS7_set_content failed\n"); + return 0; /* FAILED */ + } + return 1; /* OK */ +} + +static int set_indirect_data_blob(PKCS7 *sig, BIO *hash, file_type_t type, + char *indata, GLOBAL_OPTIONS *options, FILE_HEADER *header) +{ + static char buf[64*1024]; + u_char *p = NULL; + int len = 0; + + get_indirect_data_blob(&p, &len, options, header, type, indata); + memcpy(buf, p, len); + OPENSSL_free(p); + + if (!set_signing_blob(sig, hash, buf, len)) + return 0; /* FAILED */ + + return 1; /* OK */ } static unsigned int calc_pe_checksum(BIO *bio, FILE_HEADER *header) @@ -3831,49 +3892,6 @@ static int create_new_signature(PKCS7 *sig, file_type_t type, return 1; /* OK */ } -static int set_signing_bob(PKCS7 *sig, BIO *hash, char *buf, int len) -{ - unsigned char mdbuf[EVP_MAX_MD_SIZE]; - int mdlen; - size_t seqhdrlen; - BIO *sigbio; - PKCS7 *td7; - - mdlen = BIO_gets(hash, (char*)mdbuf, EVP_MAX_MD_SIZE); - memcpy(buf+len, mdbuf, mdlen); - seqhdrlen = asn1_simple_hdr_len((unsigned char*)buf, len); - - if ((sigbio = PKCS7_dataInit(sig, NULL)) == NULL) { - fprintf(stderr, "PKCS7_dataInit failed\n"); - return 0; /* FAILED */ - } - BIO_write(sigbio, buf+seqhdrlen, len-seqhdrlen+mdlen); - (void)BIO_flush(sigbio); - - if (!PKCS7_dataFinal(sig, sigbio)) { - fprintf(stderr, "PKCS7_dataFinal failed\n"); - return 0; /* FAILED */ - } - BIO_free_all(sigbio); - - /* - replace the data part with the MS Authenticode - spcIndirectDataContext blob - */ - td7 = PKCS7_new(); - td7->type = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1); - td7->d.other = ASN1_TYPE_new(); - td7->d.other->type = V_ASN1_SEQUENCE; - td7->d.other->value.sequence = ASN1_STRING_new(); - ASN1_STRING_set(td7->d.other->value.sequence, buf, len+mdlen); - if (!PKCS7_set_content(sig, td7)) { - PKCS7_free(td7); - fprintf(stderr, "PKCS7_set_content failed\n"); - return 0; /* FAILED */ - } - return 1; /* OK */ -} - static STACK_OF(X509) *PEM_read_certs_with_pass(BIO *bin, char *certpass) { STACK_OF(X509) *certs = sk_X509_new_null(); @@ -4733,27 +4751,19 @@ int main(int argc, char **argv) if (cmd == CMD_ADD) goto add_only; - if (cmd == CMD_ATTACH) { sig = attach_sigfile(options.sigfile, type); if (!sig) DO_EXIT_0("Unable to extract valid signature\n"); goto add_only; } - if (cmd != CMD_SIGN) goto skip_signing; sig = PKCS7_new(); if (!create_new_signature(sig, type, &options, &cparams)) DO_EXIT_0("Creating a new signature failed\n"); - - get_indirect_data_blob(&p, &len, &options, &header, type, indata); - len -= EVP_MD_size(options.md); - memcpy(buf, p, len); - OPENSSL_free(p); - - if (!set_signing_bob(sig, hash, buf, len)) + if (!set_indirect_data_blob(sig, hash, type, indata, &options, &header)) DO_EXIT_0("Signing failed\n"); add_only: From e570907a5933a35c35d46c570ce5fb854a9e1c77 Mon Sep 17 00:00:00 2001 From: olszomal Date: Wed, 25 Mar 2020 13:52:08 +0100 Subject: [PATCH 19/35] Append signature to outfile --- osslsigncode.c | 180 +++++++++++++++++++++++++++++-------------------- 1 file changed, 107 insertions(+), 73 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 88a267f..b7688f3 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -622,33 +622,6 @@ static void tohex(const unsigned char *v, char *b, int len) sprintf(b+i*2, "%02X", v[i]); } -static int add_unauthenticated_blob(PKCS7 *sig) -{ - u_char *p = NULL; - int len = 1024+4; - char prefix[] = "\x0c\x82\x04\x00---BEGIN_BLOB---"; /* Length data for ASN1 attribute plus prefix */ - char postfix[] = "---END_BLOB---"; - - PKCS7_SIGNER_INFO *si = sk_PKCS7_SIGNER_INFO_value(sig->d.sign->signer_info, 0); - - p = OPENSSL_malloc(len); - memset(p, 0, len); - memcpy(p, prefix, sizeof(prefix)); - memcpy(p+len-sizeof(postfix), postfix, sizeof(postfix)); - - ASN1_STRING *astr = ASN1_STRING_new(); - ASN1_STRING_set(astr, p, len); - - int nid = OBJ_create(SPC_UNAUTHENTICATED_DATA_BLOB_OBJID, - "unauthenticatedData", "unauthenticatedData"); - - PKCS7_add_attribute (si, nid, V_ASN1_SEQUENCE, astr); - - OPENSSL_free(p); - - return 0; -} - #ifdef ENABLE_CURL static int blob_has_nl = 0; @@ -3892,6 +3865,102 @@ static int create_new_signature(PKCS7 *sig, file_type_t type, return 1; /* OK */ } +static int add_unauthenticated_blob(PKCS7 *sig) +{ + PKCS7_SIGNER_INFO *si; + ASN1_STRING *astr; + u_char *p = NULL; + int nid, len = 1024+4; + /* Length data for ASN1 attribute plus prefix */ + char prefix[] = "\x0c\x82\x04\x00---BEGIN_BLOB---"; + char postfix[] = "---END_BLOB---"; + + si = sk_PKCS7_SIGNER_INFO_value(sig->d.sign->signer_info, 0); + if ((p = OPENSSL_malloc(len)) == NULL) + return 1; /* FAILED */ + memset(p, 0, len); + memcpy(p, prefix, sizeof(prefix)); + memcpy(p+len-sizeof(postfix), postfix, sizeof(postfix)); + astr = ASN1_STRING_new(); + ASN1_STRING_set(astr, p, len); + nid = OBJ_create(SPC_UNAUTHENTICATED_DATA_BLOB_OBJID, + "unauthenticatedData", "unauthenticatedData"); + PKCS7_add_attribute (si, nid, V_ASN1_SEQUENCE, astr); + OPENSSL_free(p); + + return 0; /* OK */ +} + +#ifdef WITH_GSF +static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t *cmd, + GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata, + GsfOutfile *outole, u_char *p_msiex, int len_msiex) +#else +static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t *cmd, + GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata) +#endif +{ + u_char *p = NULL; + static char buf[64*1024]; + PKCS7 *outsig = NULL; + + if (options->nest) { + if (cursig == NULL) { + fprintf(stderr, "Internal error: No 'cursig' was extracted\n"); + return 0; /* FAILED */ + } + if (pkcs7_set_nested_signature(cursig, sig, options->signing_time) == 0) { + fprintf(stderr, "Unable to append the nested signature to the current signature\n"); + return 0; /* FAILED */ + } + outsig = cursig; + } else { + outsig = sig; + } + + /* Append signature to outfile */ + if (((*len = i2d_PKCS7(outsig, NULL)) <= 0) || (p = OPENSSL_malloc(*len)) == NULL) { + fprintf(stderr, "i2d_PKCS memory allocation failed: %d\n", *len); + return 0; /* FAILED */ + } + i2d_PKCS7(outsig, &p); + p -= *len; + *padlen = (8 - *len%8) % 8; + + if (type == FILE_TYPE_PE) { + PUT_UINT32_LE(*len + 8 + *padlen, buf); + PUT_UINT16_LE(WIN_CERT_REVISION_2, buf + 4); + PUT_UINT16_LE(WIN_CERT_TYPE_PKCS_SIGNED_DATA, buf + 6); + BIO_write(outdata, buf, 8); + } + + if (type == FILE_TYPE_PE || type == FILE_TYPE_CAB) { + BIO_write(outdata, p, *len); + /* pad (with 0's) asn1 blob to 8 byte boundary */ + if (*padlen > 0) { + memset(p, 0, *padlen); + BIO_write(outdata, p, *padlen); + } + #ifdef WITH_GSF + } else if (type == FILE_TYPE_MSI) { + /* Only output signatures if we're signing */ + if (*cmd == CMD_SIGN || *cmd == CMD_ADD || *cmd == CMD_ATTACH) { + if (!msi_add_DigitalSignature(outole, p, *len)) { + fprintf(stderr, "Failed to write MSI 'DigitalSignature' signature to %s\n", options->infile); + return 0; /* FAILED */ + } + if (p_msiex != NULL && !msi_add_MsiDigitalSignatureEx(outole, p_msiex, len_msiex)) { + fprintf(stderr, "Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", options->infile); + return 0; /* FAILED */ + } + } + #endif + } + OPENSSL_free(p); + + return 1; /* OK */ +} + static STACK_OF(X509) *PEM_read_certs_with_pass(BIO *bin, char *certpass) { STACK_OF(X509) *certs = sk_X509_new_null(); @@ -4555,10 +4624,9 @@ int main(int argc, char **argv) FILE_HEADER header; CRYPTO_PARAMS cparams; BIO *hash = NULL, *outdata = NULL; - PKCS7 *cursig = NULL, *outsig = NULL, *sig = NULL; + PKCS7 *cursig = NULL, *sig = NULL; static char buf[64*1024]; char *indata, *outdataverify; - u_char *p = NULL; int ret = 0, len = 0; size_t padlen = 0, filesize, outdatasize; file_type_t type; @@ -4784,54 +4852,20 @@ add_only: DO_EXIT_0("PKCS7 output failed\n"); #endif - if (options.nest) { - if (cursig == NULL) - DO_EXIT_0("Internal error: No 'cursig' was extracted\n") - if (pkcs7_set_nested_signature(cursig, sig, options.signing_time) == 0) - DO_EXIT_0("Unable to append the nested signature to the current signature\n"); - outsig = cursig; - } else { - outsig = sig; - } - - /* Append signature to outfile */ - if (((len = i2d_PKCS7(outsig, NULL)) <= 0) || - (p = OPENSSL_malloc(len)) == NULL) - DO_EXIT_1("i2d_PKCS memory allocation failed: %d\n", len); - i2d_PKCS7(outsig, &p); - p -= len; - padlen = (8 - len%8) % 8; - - if (type == FILE_TYPE_PE) { - PUT_UINT32_LE(len+8+padlen, buf); - PUT_UINT16_LE(WIN_CERT_REVISION_2, buf + 4); - PUT_UINT16_LE(WIN_CERT_TYPE_PKCS_SIGNED_DATA, buf + 6); - BIO_write(outdata, buf, 8); - } - - if (type == FILE_TYPE_PE || type == FILE_TYPE_CAB) { - BIO_write(outdata, p, len); - /* pad (with 0's) asn1 blob to 8 byte boundary */ - if (padlen > 0) { - memset(p, 0, padlen); - BIO_write(outdata, p, padlen); - } #ifdef WITH_GSF - } else if (type == FILE_TYPE_MSI) { - /* Only output signatures if we're signing. */ - if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { - if (!msi_add_DigitalSignature(outole, p, len)) - DO_EXIT_1("Failed to write MSI 'DigitalSignature' signature to %s\n", options.infile); - if (p_msiex != NULL && !msi_add_MsiDigitalSignatureEx(outole, p_msiex, len_msiex)) - DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", options.infile); - gsf_output_close(GSF_OUTPUT(outole)); - g_object_unref(sink); - } -#endif + if (!append_signature(sig, cursig, type, &cmd, &options, &padlen, &len, outdata, + outole, p_msiex, len_msiex)) + DO_EXIT_0("Append signature to outfile failed\n"); + if (type == FILE_TYPE_MSI) { + gsf_output_close(GSF_OUTPUT(outole)); + g_object_unref(sink); } +#else + if (!append_signature(sig, cursig, type, &cmd, &options, &padlen, &len, outdata)) + DO_EXIT_0("Append signature to outfile failed\n"); +#endif PKCS7_free(sig); - OPENSSL_free(p); skip_signing: From 18b19cbe5d495b473b3ec68ce08854e30f33b6fe Mon Sep 17 00:00:00 2001 From: olszomal Date: Wed, 25 Mar 2020 14:06:36 +0100 Subject: [PATCH 20/35] Update additional data size --- osslsigncode.c | 61 ++++++++++++++++++++++++++++---------------------- 1 file changed, 34 insertions(+), 27 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index b7688f3..f5ecaca 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -3892,11 +3892,11 @@ static int add_unauthenticated_blob(PKCS7 *sig) } #ifdef WITH_GSF -static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t *cmd, +static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t cmd, GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata, GsfOutfile *outole, u_char *p_msiex, int len_msiex) #else -static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t *cmd, +static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t cmd, GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata) #endif { @@ -3944,7 +3944,7 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ #ifdef WITH_GSF } else if (type == FILE_TYPE_MSI) { /* Only output signatures if we're signing */ - if (*cmd == CMD_SIGN || *cmd == CMD_ADD || *cmd == CMD_ATTACH) { + if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { if (!msi_add_DigitalSignature(outole, p, *len)) { fprintf(stderr, "Failed to write MSI 'DigitalSignature' signature to %s\n", options->infile); return 0; /* FAILED */ @@ -3961,6 +3961,34 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ return 1; /* OK */ } +static void update_data_size(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, + size_t padlen, int len, BIO *outdata) +{ + static char buf[64*1024]; + + if (type == FILE_TYPE_PE) { + if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { + /* Update signature position and size */ + (void)BIO_seek(outdata, header->header_size + 152 + header->pe32plus * 16); + PUT_UINT32_LE(header->fileend, buf); /* Previous file end = signature table start */ + BIO_write(outdata, buf, 4); + PUT_UINT32_LE(len+8+padlen, buf); + BIO_write(outdata, buf, 4); + } + if (cmd == CMD_SIGN || cmd == CMD_REMOVE || cmd == CMD_ADD || cmd == CMD_ATTACH) + recalc_pe_checksum(outdata, header); + } else if (type == FILE_TYPE_CAB && (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH)) { + /* + * Update additional data size. + * Additional data size is located at offset 0x30 (from file beginning) + * and consist of 4 bytes (little-endian order). + */ + (void)BIO_seek(outdata, 0x30); + PUT_UINT32_LE(len+padlen, buf); + BIO_write(outdata, buf, 4); + } +} + static STACK_OF(X509) *PEM_read_certs_with_pass(BIO *bin, char *certpass) { STACK_OF(X509) *certs = sk_X509_new_null(); @@ -4625,7 +4653,6 @@ int main(int argc, char **argv) CRYPTO_PARAMS cparams; BIO *hash = NULL, *outdata = NULL; PKCS7 *cursig = NULL, *sig = NULL; - static char buf[64*1024]; char *indata, *outdataverify; int ret = 0, len = 0; size_t padlen = 0, filesize, outdatasize; @@ -4853,7 +4880,7 @@ add_only: #endif #ifdef WITH_GSF - if (!append_signature(sig, cursig, type, &cmd, &options, &padlen, &len, outdata, + if (!append_signature(sig, cursig, type, cmd, &options, &padlen, &len, outdata, outole, p_msiex, len_msiex)) DO_EXIT_0("Append signature to outfile failed\n"); if (type == FILE_TYPE_MSI) { @@ -4861,7 +4888,7 @@ add_only: g_object_unref(sink); } #else - if (!append_signature(sig, cursig, type, &cmd, &options, &padlen, &len, outdata)) + if (!append_signature(sig, cursig, type, cmd, &options, &padlen, &len, outdata)) DO_EXIT_0("Append signature to outfile failed\n"); #endif @@ -4869,27 +4896,7 @@ add_only: skip_signing: - if (type == FILE_TYPE_PE) { - if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { - /* Update signature position and size */ - (void)BIO_seek(outdata, header.header_size + 152 + header.pe32plus * 16); - PUT_UINT32_LE(header.fileend, buf); /* Previous file end = signature table start */ - BIO_write(outdata, buf, 4); - PUT_UINT32_LE(len+8+padlen, buf); - BIO_write(outdata, buf, 4); - } - if (cmd == CMD_SIGN || cmd == CMD_REMOVE || cmd == CMD_ADD || cmd == CMD_ATTACH) - recalc_pe_checksum(outdata, &header); - } else if (type == FILE_TYPE_CAB && (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH)) { - /* - * Update additional data size. - * Additional data size is located at offset 0x30 (from file beginning) - * and consist of 4 bytes (little-endian order). - */ - (void)BIO_seek(outdata, 0x30); - PUT_UINT32_LE(len+padlen, buf); - BIO_write(outdata, buf, 4); - } + update_data_size(type, cmd, &header, padlen, len, outdata); BIO_free_all(hash); hash = outdata = NULL; From cdd2a23bf1e37e7834feac05146a60370955f5da Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 26 Mar 2020 09:16:18 +0100 Subject: [PATCH 21/35] check attached data --- osslsigncode.c | 132 +++++++++++++++++++++++++++++++------------------ 1 file changed, 83 insertions(+), 49 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index f5ecaca..845f303 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -4056,6 +4056,81 @@ static char *map_file(const char *infile, const off_t size) #endif return indata; } + +static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPTIONS *options) +{ + size_t filesize; + char *outdata; + + if (type == FILE_TYPE_PE) { + filesize = get_file_size(options->outfile); + if (!filesize) { + fprintf(stderr, "Error verifying result\n"); + return 0; /* FAILED */ + } + outdata = map_file(options->outfile, filesize); + if (!outdata) { + fprintf(stderr, "Error verifying result\n"); + return 0; /* FAILED */ + } + if (!verify_pe_header(outdata, options->outfile, filesize, header)) { + fprintf(stderr, "Corrupt PE file\n"); + return 0; /* FAILED */ + } + if (verify_pe_file(outdata, header, options)) { + fprintf(stderr, "Signature mismatch\n"); + return 0; /* FAILED */ + } + } else if (type == FILE_TYPE_CAB) { + filesize = get_file_size(options->outfile); + if (!filesize) { + fprintf(stderr, "Error verifying result\n"); + return 0; /* FAILED */ + } + outdata = map_file(options->outfile, filesize); + if (!outdata) { + fprintf(stderr, "Error verifying result\n"); + return 0; /* FAILED */ + } + if (!verify_cab_header(outdata, options->outfile, filesize, header)) { + fprintf(stderr, "Corrupt CAB file\n"); + return 0; /* FAILED */ + } + if (verify_cab_file(outdata, header, options)) { + fprintf(stderr, "Signature mismatch\n"); + return 0; /* FAILED */ + } + } else if (type == FILE_TYPE_MSI) { +#ifdef WITH_GSF + GsfInput *src; + GsfInfile *ole; + int ret; + + src = gsf_input_stdio_new(options->outfile, NULL); + if (!src) { + fprintf(stderr, "Error opening file %s\n", options->outfile); + return 0; /* FAILED */ + } + ole = gsf_infile_msole_new(src, NULL); + g_object_unref(src); + ret = msi_verify_file(ole, options); + g_object_unref(ole); + if (ret) { + fprintf(stderr, "Signature mismatch\n"); + return 0; /* FAILED */ + } +#else + fprintf(stderr, "libgsf is not available, msi support is disabled: %s\n", options->infile); + return 0; /* FAILED */ +#endif + } else { + fprintf(stderr, "Unknown input type for file: %s\n", options->infile); + return 0; /* FAILED */ + } + + return 1; /* OK */ +} + static int get_file_type(char *indata, char *infile, file_type_t *type) { static u_char msi_signature[] = { @@ -4653,9 +4728,9 @@ int main(int argc, char **argv) CRYPTO_PARAMS cparams; BIO *hash = NULL, *outdata = NULL; PKCS7 *cursig = NULL, *sig = NULL; - char *indata, *outdataverify; + char *indata; int ret = 0, len = 0; - size_t padlen = 0, filesize, outdatasize; + size_t padlen = 0, filesize; file_type_t type; cmd_type_t cmd; @@ -4902,54 +4977,12 @@ skip_signing: hash = outdata = NULL; if (cmd == CMD_ATTACH) { - if (type == FILE_TYPE_PE) { - outdatasize = get_file_size(options.outfile); - if (!outdatasize) - DO_EXIT_0("Error verifying result\n"); - outdataverify = map_file(options.outfile, outdatasize); - if (!outdataverify) - DO_EXIT_0("Error verifying result\n"); - if (!verify_pe_header(outdataverify, options.outfile, outdatasize, &header)) - goto err_cleanup; - ret = verify_pe_file(outdataverify, &header, &options); - if (ret) - DO_EXIT_0("Signature mismatch\n"); - } else if (type == FILE_TYPE_CAB) { - outdatasize = get_file_size(options.outfile); - if (!outdatasize) - DO_EXIT_0("Error verifying result\n"); - outdataverify = map_file(options.outfile, outdatasize); - if (!outdataverify) - DO_EXIT_0("Error verifying result\n"); - if (!verify_cab_header(outdataverify, options.outfile, outdatasize, &header)) - goto err_cleanup; - ret = verify_cab_file(outdataverify, &header, &options); - if (ret) - DO_EXIT_0("Signature mismatch\n"); - } else if (type == FILE_TYPE_MSI) { -#ifdef WITH_GSF - GsfInput *src; - GsfInfile *ole; - - src = gsf_input_stdio_new(options.outfile, NULL); - if (!src) - DO_EXIT_1("Error opening file %s\n", options.outfile); - ole = gsf_infile_msole_new(src, NULL); - g_object_unref(src); - ret = msi_verify_file(ole, &options); - g_object_unref(ole); - if (ret) - DO_EXIT_0("Signature mismatch\n"); -#else - DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", options.infile); -#endif - } else { - DO_EXIT_1("Unknown input type for file: %s\n", options.infile); - } - printf("Signature successfully attached\n"); - } else { + if (check_attached_data(type, &header, &options)) + printf("Signature successfully attached\n"); + else + goto err_cleanup; + } else printf(ret ? "Failed\n" : "Succeeded\n"); - } OPENSSL_free(options.cafile); OPENSSL_free(options.untrusted); @@ -4960,6 +4993,7 @@ skip_signing: return ret; err_cleanup: + ERR_print_errors_fp(stderr); free_crypto_params(&cparams); if (hash) From 77493d5cde9ad84c20f83c5e30cc3bca77b8aa5a Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 26 Mar 2020 10:38:02 +0100 Subject: [PATCH 22/35] input options and input file header validation --- osslsigncode.c | 72 ++++++++++++++++++++++++++++++-------------------- 1 file changed, 44 insertions(+), 28 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 845f303..2ba7887 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -4057,6 +4057,46 @@ static char *map_file(const char *infile, const off_t size) return indata; } +static int input_validation(file_type_t type, GLOBAL_OPTIONS *options, FILE_HEADER *header, + char *indata, size_t filesize) +{ + if (type == FILE_TYPE_CAB) { + if (options->pagehash == 1) + fprintf(stderr, "Warning: -ph option is only valid for PE files\n"); +#ifdef WITH_GSF + if (options->add_msi_dse == 1) + fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); +#endif + if (!verify_cab_header(indata, options->infile, filesize, header)) { + fprintf(stderr, "Corrupt CAB file\n"); + return 0; /* FAILED */ + } + } else if (type == FILE_TYPE_PE) { + if (options->jp >= 0) + fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); +#ifdef WITH_GSF + if (options->add_msi_dse == 1) + fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); +#endif + if (!verify_pe_header(indata, options->infile, filesize, header)) { + fprintf(stderr, "Corrupt PE file\n"); + return 0; /* FAILED */ + } + + } else if (type == FILE_TYPE_MSI) { + if (options->pagehash == 1) + fprintf(stderr, "Warning: -ph option is only valid for PE files\n"); + if (options->jp >= 0) + fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); +#ifndef WITH_GSF + fprintf(stderr, "libgsf is not available, msi support is disabled: %s\n", options->infile); + return 0; /* FAILED */ +#endif + } + + return 1; /* OK */ +} + static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPTIONS *options) { size_t filesize; @@ -4777,33 +4817,11 @@ int main(int argc, char **argv) hash = BIO_new(BIO_f_md()); BIO_set_md(hash, options.md); - if (type == FILE_TYPE_CAB) { - if (options.pagehash == 1) - fprintf(stderr, "Warning: -ph option is only valid for PE files\n"); -#ifdef WITH_GSF - if (options.add_msi_dse == 1) - fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); -#endif - if (!verify_cab_header(indata, options.infile, filesize, &header)) - goto err_cleanup; - - } else if (type == FILE_TYPE_PE) { - if (options.jp >= 0) - fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); -#ifdef WITH_GSF - if (options.add_msi_dse == 1) - fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); -#endif - if (!verify_pe_header(indata, options.infile, filesize, &header)) - goto err_cleanup; - - } else if (type == FILE_TYPE_MSI) { - if (options.pagehash == 1) - fprintf(stderr, "Warning: -ph option is only valid for PE files\n"); - if (options.jp >= 0) - fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); + if (!input_validation(type, &options, &header, indata, filesize)) + goto err_cleanup; #ifdef WITH_GSF + if (type == FILE_TYPE_MSI) { GsfInput *src; GsfInfile *ole; @@ -4849,10 +4867,8 @@ int main(int argc, char **argv) gsf_output_close(GSF_OUTPUT(outole)); g_object_unref(sink); } -#else - DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", options.infile); -#endif } +#endif if ((type == FILE_TYPE_CAB || type == FILE_TYPE_PE) && (cmd != CMD_VERIFY)) { /* Create outdata file */ From 3635d586fb2fae0e39a14ba4e876475f1c7b960a Mon Sep 17 00:00:00 2001 From: olszomal Date: Fri, 27 Mar 2020 13:51:59 +0100 Subject: [PATCH 23/35] create pkcs7 object and prepare file to sign --- osslsigncode.c | 288 +++++++++++++++++++++++++++++++------------------ 1 file changed, 183 insertions(+), 105 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 2ba7887..98f34ee 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -246,6 +246,15 @@ typedef struct { STACK_OF(X509) *xcerts; } CRYPTO_PARAMS; +#ifdef WITH_GSF +typedef struct { + GsfOutfile *outole; + GsfOutput *sink; + u_char *p_msiex; + int len_msiex; +} GSF_PARAMS; +#endif + /* ASN.1 definitions (more or less from official MS Authenticode docs) */ @@ -3799,13 +3808,15 @@ static int add_opus_attribute(PKCS7_SIGNER_INFO *si, char *desc, char *url) return 1; /* OK */ } -static int create_new_signature(PKCS7 *sig, file_type_t type, +static PKCS7 *create_new_signature(file_type_t type, GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) { int i; + PKCS7 *sig; PKCS7_SIGNER_INFO *si; X509 *signcert; + sig = PKCS7_new(); PKCS7_set_type(sig, NID_pkcs7_signed); si = NULL; if (cparams->cert != NULL) @@ -3821,7 +3832,7 @@ static int create_new_signature(PKCS7 *sig, file_type_t type, if (si == NULL) { fprintf(stderr, "PKCS7_add_signature failed\n"); - return 0; /* FAILED */ + return NULL; /* FAILED */ } pkcs7_add_signing_time(si, options->signing_time); @@ -3836,7 +3847,7 @@ static int create_new_signature(PKCS7 *sig, file_type_t type, if ((options->desc || options->url) && !add_opus_attribute(si, options->desc, options->url)) { fprintf(stderr, "Couldn't allocate memory for opus info\n"); - return 0; /* FAILED */ + return NULL; /* FAILED */ } PKCS7_content_new(sig, NID_pkcs7_data); @@ -3862,7 +3873,7 @@ static int create_new_signature(PKCS7 *sig, file_type_t type, cparams->xcerts = NULL; } - return 1; /* OK */ + return sig; /* OK */ } static int add_unauthenticated_blob(PKCS7 *sig) @@ -3893,8 +3904,7 @@ static int add_unauthenticated_blob(PKCS7 *sig) #ifdef WITH_GSF static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t cmd, - GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata, - GsfOutfile *outole, u_char *p_msiex, int len_msiex) + GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata, GSF_PARAMS *gsfparams) #else static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t cmd, GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata) @@ -3945,11 +3955,12 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ } else if (type == FILE_TYPE_MSI) { /* Only output signatures if we're signing */ if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { - if (!msi_add_DigitalSignature(outole, p, *len)) { + if (!msi_add_DigitalSignature(gsfparams->outole, p, *len)) { fprintf(stderr, "Failed to write MSI 'DigitalSignature' signature to %s\n", options->infile); return 0; /* FAILED */ } - if (p_msiex != NULL && !msi_add_MsiDigitalSignatureEx(outole, p_msiex, len_msiex)) { + if (gsfparams->p_msiex != NULL && + !msi_add_MsiDigitalSignatureEx(gsfparams->outole, gsfparams->p_msiex, gsfparams->len_msiex)) { fprintf(stderr, "Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", options->infile); return 0; /* FAILED */ } @@ -4148,7 +4159,7 @@ static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPT src = gsf_input_stdio_new(options->outfile, NULL); if (!src) { - fprintf(stderr, "Error opening file %s\n", options->outfile); + fprintf(stderr, "Error opening output file %s\n", options->outfile); return 0; /* FAILED */ } ole = gsf_infile_msole_new(src, NULL); @@ -4521,6 +4532,131 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) return sig; /* OK */ } +static PKCS7 *get_pkcs7(cmd_type_t cmd, BIO *hash, file_type_t type, char *indata, + GLOBAL_OPTIONS *options, FILE_HEADER *header, CRYPTO_PARAMS *cparams) +{ + PKCS7 *sig = NULL; + + if (cmd == CMD_ATTACH) { + sig = attach_sigfile(options->sigfile, type); + if (!sig) { + fprintf(stderr, "Unable to extract valid signature\n"); + return NULL; /* FAILED */ + } + } else if (cmd == CMD_SIGN) { + sig = create_new_signature(type, options, cparams); + if (!sig) { + fprintf(stderr, "Creating a new signature failed\n"); + return NULL; /* FAILED */ + } + if (!set_indirect_data_blob(sig, hash, type, indata, options, header)) { + fprintf(stderr, "Signing failed\n"); + return NULL; /* FAILED */ + } + } + + return sig; +} + +#ifdef WITH_GSF +static PKCS7 *presign_msi_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, + GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata, + BIO *hash, GsfInfile *ole, GSF_PARAMS *gsfparams, PKCS7 **cursig) +{ + PKCS7 *sig = NULL; + + if ((cmd == CMD_SIGN && options->nest) || + (cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) { + if (!msi_check_MsiDigitalSignatureEx(ole, options->md)) + return NULL; /* FAILED */ + *cursig = msi_extract_signature_to_pkcs7(ole); + if (*cursig == NULL) { + fprintf(stderr, "Unable to extract existing signature in -nest mode\n"); + return NULL; /* FAILED */ + } + if (cmd == CMD_ADD) + sig = *cursig; + } + gsfparams->sink = gsf_output_stdio_new(options->outfile, NULL); + if (!gsfparams->sink) { + fprintf(stderr, "Error opening output file %s\n", options->outfile); + return NULL; /* FAILED */ + } + gsfparams->outole = gsf_outfile_msole_new(gsfparams->sink); + + BIO_push(hash, BIO_new(BIO_s_null())); + if (options->add_msi_dse) { + gsfparams->p_msiex = malloc(EVP_MAX_MD_SIZE); + if (!msi_calc_MsiDigitalSignatureEx(ole, options->md, hash, gsfparams->p_msiex, &gsfparams->len_msiex)) + return NULL; /* FAILED */ + } + if (!msi_handle_dir(ole, gsfparams->outole, hash)) { + fprintf(stderr, "Unable to msi_handle_dir()\n"); + return NULL; /* FAILED */ + } + if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN)) + sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams); + + return sig; /* OK */ +} +#endif + +static PKCS7 *presign_pe_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, + GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata, + BIO *hash, BIO *outdata, PKCS7 **cursig) +{ + PKCS7 *sig = NULL; + + if ((cmd == CMD_SIGN && options->nest) || + (cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) { + *cursig = extract_existing_pe_pkcs7(indata, header); + if (!*cursig) { + fprintf(stderr, "Unable to extract existing signature\n"); + return NULL; /* FAILED */ + } + if (cmd == CMD_ADD) + sig = *cursig; + } + if (header->sigpos > 0) { + /* Strip current signature */ + header->fileend = header->sigpos; + } + modify_pe_header(indata, header, hash, outdata); + + if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN)) + sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams); + + return sig; /* OK */ +} + +static PKCS7 *presign_cab_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, + GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata, + BIO *hash, BIO *outdata, PKCS7 **cursig) +{ + PKCS7 *sig = NULL; + + if ((cmd == CMD_SIGN && options->nest) || + (cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) { + *cursig = extract_existing_cab_pkcs7(indata, header); + if (!*cursig) { + fprintf(stderr, "Unable to extract existing signature\n"); + return NULL; /* FAILED */ + } + if (cmd == CMD_ADD) + sig = *cursig; + } + if (header->header_size == 20) + /* Strip current signature and modify header */ + modify_cab_header(indata, header, hash, outdata); + else + add_cab_header(indata, header, hash, outdata); + + if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN)) + sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams); + + return sig; /* OK */ +} + static cmd_type_t get_command(char **argv) { if (!strcmp(argv[1], "--help")) { @@ -4766,20 +4902,16 @@ int main(int argc, char **argv) GLOBAL_OPTIONS options; FILE_HEADER header; CRYPTO_PARAMS cparams; +#ifdef WITH_GSF + GSF_PARAMS gsfparams; +#endif BIO *hash = NULL, *outdata = NULL; PKCS7 *cursig = NULL, *sig = NULL; char *indata; int ret = 0, len = 0; size_t padlen = 0, filesize; file_type_t type; - cmd_type_t cmd; - -#ifdef WITH_GSF - GsfOutfile *outole = NULL; - GsfOutput *sink = NULL; - u_char *p_msiex = NULL; - int len_msiex = 0; -#endif + cmd_type_t cmd = CMD_SIGN; /* Set up OpenSSL */ ERR_load_crypto_strings(); @@ -4807,9 +4939,14 @@ int main(int argc, char **argv) indata = map_file(options.infile, filesize); if (indata == NULL) DO_EXIT_1("Failed to open file: %s\n", options.infile); + /* reset file header */ memset(&header, 0, sizeof(FILE_HEADER)); header.fileend = filesize; +#ifdef WITH_GSF + /* reset Gsf parameters */ + memset(&gsfparams, 0, sizeof(GSF_PARAMS)); +#endif if (!get_file_type(indata, options.infile, &type)) goto err_cleanup; @@ -4836,36 +4973,15 @@ int main(int argc, char **argv) } else if (cmd == CMD_VERIFY) { ret = msi_verify_file(ole, &options); goto skip_signing; - } else if ((cmd == CMD_SIGN && options.nest) || - (cmd == CMD_ATTACH && options.nest) || cmd == CMD_ADD) { - if (!msi_check_MsiDigitalSignatureEx(ole, options.md)) + } else { + sig = presign_msi_file(type, cmd, &header, &options, &cparams, indata, + hash, ole, &gsfparams, &cursig); + if (cmd == CMD_REMOVE) { + gsf_output_close(GSF_OUTPUT(gsfparams.outole)); + g_object_unref(gsfparams.sink); + goto skip_signing; + } else if (!sig) goto err_cleanup; - cursig = msi_extract_signature_to_pkcs7(ole); - if (cursig == NULL) { - DO_EXIT_0("Unable to extract existing signature in -nest mode\n"); - } - if (cmd == CMD_ADD) { - sig = cursig; - } - } - sink = gsf_output_stdio_new(options.outfile, NULL); - if (!sink) - DO_EXIT_1("Error opening output file %s\n", options.outfile); - outole = gsf_outfile_msole_new(sink); - - BIO_push(hash, BIO_new(BIO_s_null())); - if (options.add_msi_dse) { - p_msiex = malloc(EVP_MAX_MD_SIZE); - if (!msi_calc_MsiDigitalSignatureEx(ole, options.md, hash, p_msiex, &len_msiex)) - goto err_cleanup; - } - if (!msi_handle_dir(ole, outole, hash)) { - DO_EXIT_0("Unable to msi_handle_dir()\n"); - } - - if (cmd == CMD_REMOVE) { - gsf_output_close(GSF_OUTPUT(outole)); - g_object_unref(sink); } } #endif @@ -4882,78 +4998,40 @@ int main(int argc, char **argv) if (!(header.flags & FLAG_RESERVE_PRESENT) && (cmd == CMD_REMOVE || cmd == CMD_EXTRACT)) { DO_EXIT_1("CAB file does not have any signature: %s\n", options.infile); - } - if (cmd == CMD_EXTRACT) { + } else if (cmd == CMD_EXTRACT) { ret = extract_cab_file(indata, &header, outdata, options.output_pkcs7); goto skip_signing; - } - if (cmd == CMD_REMOVE) { + } else if (cmd == CMD_REMOVE) { remove_cab_file(indata, &header, filesize, outdata); goto skip_signing; - } - if (cmd == CMD_VERIFY) { + } else if (cmd == CMD_VERIFY) { ret = verify_cab_file(indata, &header, &options); goto skip_signing; + } else { + sig = presign_cab_file(type, cmd, &header, &options, &cparams, indata, + hash, outdata, &cursig); + if (!sig) + goto err_cleanup; } - if ((cmd == CMD_SIGN && options.nest) || - (cmd == CMD_ATTACH && options.nest) || cmd == CMD_ADD) { - cursig = extract_existing_cab_pkcs7(indata, &header); - if (!cursig) - DO_EXIT_0("Unable to extract existing signature\n"); - if (cmd == CMD_ADD) - sig = cursig; - } - if (header.header_size == 20) - /* Strip current signature and modify header */ - modify_cab_header(indata, &header, hash, outdata); - else - add_cab_header(indata, &header, hash, outdata); - } else if (type == FILE_TYPE_PE) { - if ((cmd == CMD_REMOVE || cmd == CMD_EXTRACT) && header.sigpos == 0) + if ((cmd == CMD_REMOVE || cmd == CMD_EXTRACT) && header.sigpos == 0) { DO_EXIT_1("PE file does not have any signature: %s\n", options.infile); - if (cmd == CMD_EXTRACT) { + } else if (cmd == CMD_EXTRACT) { ret = extract_pe_file(indata, &header, outdata, options.output_pkcs7); goto skip_signing; - } - if ((cmd == CMD_SIGN && options.nest) || - (cmd == CMD_ATTACH && options.nest) || cmd == CMD_ADD) { - cursig = extract_existing_pe_pkcs7(indata, &header); - if (!cursig) - DO_EXIT_0("Unable to extract existing signature\n"); - if (cmd == CMD_ADD) - sig = cursig; - } - if (cmd == CMD_VERIFY) { + } else if (cmd == CMD_VERIFY) { ret = verify_pe_file(indata, &header, &options); goto skip_signing; + } else { + sig = presign_pe_file(type, cmd, &header, &options, &cparams, indata, + hash, outdata, &cursig); + if (cmd == CMD_REMOVE) + goto skip_signing; + else if (!sig) + goto err_cleanup; } - if (header.sigpos > 0) { - /* Strip current signature */ - header.fileend = header.sigpos; - } - modify_pe_header(indata, &header, hash, outdata); } - if (cmd == CMD_ADD) - goto add_only; - if (cmd == CMD_ATTACH) { - sig = attach_sigfile(options.sigfile, type); - if (!sig) - DO_EXIT_0("Unable to extract valid signature\n"); - goto add_only; - } - if (cmd != CMD_SIGN) - goto skip_signing; - - sig = PKCS7_new(); - if (!create_new_signature(sig, type, &options, &cparams)) - DO_EXIT_0("Creating a new signature failed\n"); - if (!set_indirect_data_blob(sig, hash, type, indata, &options, &header)) - DO_EXIT_0("Signing failed\n"); - -add_only: - #ifdef ENABLE_CURL /* add counter-signature/timestamp */ if (options.nturl && add_timestamp_authenticode(sig, &options)) @@ -4972,11 +5050,11 @@ add_only: #ifdef WITH_GSF if (!append_signature(sig, cursig, type, cmd, &options, &padlen, &len, outdata, - outole, p_msiex, len_msiex)) + &gsfparams)) DO_EXIT_0("Append signature to outfile failed\n"); if (type == FILE_TYPE_MSI) { - gsf_output_close(GSF_OUTPUT(outole)); - g_object_unref(sink); + gsf_output_close(GSF_OUTPUT(gsfparams.outole)); + g_object_unref(gsfparams.sink); } #else if (!append_signature(sig, cursig, type, cmd, &options, &padlen, &len, outdata)) From ee2d65d354b084adca198c7663e83c61945371e1 Mon Sep 17 00:00:00 2001 From: olszomal Date: Fri, 27 Mar 2020 14:04:14 +0100 Subject: [PATCH 24/35] msi_calc_MsiDigitalSignatureEx() with GSF_PARAMS struct --- osslsigncode.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 98f34ee..1131a44 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -2843,7 +2843,7 @@ static int msi_check_MsiDigitalSignatureEx(GsfInfile *ole, const EVP_MD *md) */ static int msi_calc_MsiDigitalSignatureEx(GsfInfile *ole, const EVP_MD *md, - BIO *hash, u_char *p_msiex, int *len_msiex) + BIO *hash, GSF_PARAMS *gsfparams) { BIO *prehash; @@ -2855,8 +2855,8 @@ static int msi_calc_MsiDigitalSignatureEx(GsfInfile *ole, const EVP_MD *md, fprintf(stderr, "Unable to calculate MSI pre-hash ('metadata') hash\n"); return 0; /* FAILED */ } - *len_msiex = BIO_gets(prehash, (char*)p_msiex, EVP_MAX_MD_SIZE); - BIO_write(hash, p_msiex, *len_msiex); + gsfparams->len_msiex = BIO_gets(prehash, (char*)gsfparams->p_msiex, EVP_MAX_MD_SIZE); + BIO_write(hash, gsfparams->p_msiex, gsfparams->len_msiex); return 1; /* OK */ } @@ -4587,7 +4587,7 @@ static PKCS7 *presign_msi_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *he BIO_push(hash, BIO_new(BIO_s_null())); if (options->add_msi_dse) { gsfparams->p_msiex = malloc(EVP_MAX_MD_SIZE); - if (!msi_calc_MsiDigitalSignatureEx(ole, options->md, hash, gsfparams->p_msiex, &gsfparams->len_msiex)) + if (!msi_calc_MsiDigitalSignatureEx(ole, options->md, hash, gsfparams)) return NULL; /* FAILED */ } if (!msi_handle_dir(ole, gsfparams->outole, hash)) { From 63831661894aa7eede05f9e96e28325346dfff47 Mon Sep 17 00:00:00 2001 From: olszomal Date: Fri, 27 Mar 2020 15:00:47 +0100 Subject: [PATCH 25/35] enable MsiDigitalSignatureEx --- osslsigncode.c | 36 ++++++++++++++++--------------- tests/recipes/41_sign_add_msi_dse | 3 +-- 2 files changed, 20 insertions(+), 19 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index aa32beb..1d6f5e9 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -106,7 +106,7 @@ typedef unsigned char u_char; #include #include #include -#include /* X509_PURPOSE_CRL_SIGN */ +#include /* X509_PURPOSE */ #include #include #include @@ -125,6 +125,7 @@ typedef unsigned char u_char; #include #define MAX_TS_SERVERS 256 +#define GSF_CAN_READ_MSI_METADATA #endif @@ -136,24 +137,25 @@ typedef unsigned char u_char; #define TRUE 1 #endif + #if defined (HAVE_TERMIOS_H) || defined (HAVE_GETPASS) #define PROVIDE_ASKPASS 1 #endif /* MS Authenticode object ids */ -#define SPC_INDIRECT_DATA_OBJID "1.3.6.1.4.1.311.2.1.4" -#define SPC_STATEMENT_TYPE_OBJID "1.3.6.1.4.1.311.2.1.11" -#define SPC_SP_OPUS_INFO_OBJID "1.3.6.1.4.1.311.2.1.12" -#define SPC_MS_JAVA_SOMETHING "1.3.6.1.4.1.311.15.1" -#define SPC_PE_IMAGE_DATA_OBJID "1.3.6.1.4.1.311.2.1.15" -#define SPC_CAB_DATA_OBJID "1.3.6.1.4.1.311.2.1.25" +#define SPC_INDIRECT_DATA_OBJID "1.3.6.1.4.1.311.2.1.4" +#define SPC_STATEMENT_TYPE_OBJID "1.3.6.1.4.1.311.2.1.11" +#define SPC_SP_OPUS_INFO_OBJID "1.3.6.1.4.1.311.2.1.12" +#define SPC_MS_JAVA_SOMETHING "1.3.6.1.4.1.311.15.1" +#define SPC_PE_IMAGE_DATA_OBJID "1.3.6.1.4.1.311.2.1.15" +#define SPC_CAB_DATA_OBJID "1.3.6.1.4.1.311.2.1.25" #define SPC_TIME_STAMP_REQUEST_OBJID "1.3.6.1.4.1.311.3.2.1" -#define SPC_SIPINFO_OBJID "1.3.6.1.4.1.311.2.1.30" +#define SPC_SIPINFO_OBJID "1.3.6.1.4.1.311.2.1.30" -#define SPC_PE_IMAGE_PAGE_HASHES_V1 "1.3.6.1.4.1.311.2.3.1" /* Page hash using SHA1 */ -#define SPC_PE_IMAGE_PAGE_HASHES_V2 "1.3.6.1.4.1.311.2.3.2" /* Page hash using SHA256 */ +#define SPC_PE_IMAGE_PAGE_HASHES_V1 "1.3.6.1.4.1.311.2.3.1" /* Page hash using SHA1 */ +#define SPC_PE_IMAGE_PAGE_HASHES_V2 "1.3.6.1.4.1.311.2.3.2" /* Page hash using SHA256 */ -#define SPC_NESTED_SIGNATURE_OBJID "1.3.6.1.4.1.311.2.4.1" +#define SPC_NESTED_SIGNATURE_OBJID "1.3.6.1.4.1.311.2.4.1" #define SPC_RFC3161_OBJID "1.3.6.1.4.1.311.3.3.1" #define SPC_AUTHENTICODE_COUNTER_SIGNATURE_OBJID "1.2.840.113549.1.9.6" @@ -185,6 +187,8 @@ typedef unsigned char u_char; */ #define FLAG_RESERVE_PRESENT 0x0004 +#define INVALID_TIME ((time_t)-1) + typedef struct { char *infile; char *outfile; @@ -255,8 +259,6 @@ typedef struct { } GSF_PARAMS; #endif -#define INVALID_TIME ((time_t)-1) - /* ASN.1 definitions (more or less from official MS Authenticode docs) @@ -2549,7 +2551,7 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, #ifdef GSF_CAN_READ_MSI_METADATA if (exdata) { tohex(cexmdbuf, hexbuf, EVP_MD_size(md)); - int exok = !memcmp(exdata, cexmdbuf, MIN(EVP_MD_size(md), exlen)); + int exok = !memcmp(exdata, cexmdbuf, MIN((size_t)EVP_MD_size(md), exlen)); if (!exok) ret = 1; printf("Calculated MsiDigitalSignatureEx : %s", hexbuf); if (exok) { @@ -2918,13 +2920,13 @@ static int msi_add_DigitalSignature(GsfOutfile *outole, u_char *p, int len) return ret; } -static int msi_add_MsiDigitalSignatureEx(GsfOutfile *outole, u_char *p_msiex, int len_msiex) +static int msi_add_MsiDigitalSignatureEx(GsfOutfile *outole, GSF_PARAMS *gsfparams) { GsfOutput *child; int ret = 1; child = gsf_outfile_new_child(outole, "\05MsiDigitalSignatureEx", FALSE); - if (!gsf_output_write(child, len_msiex, p_msiex)) + if (!gsf_output_write(child, gsfparams->len_msiex, gsfparams->p_msiex)) ret = 0; gsf_output_close(child); @@ -4003,7 +4005,7 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ return 0; /* FAILED */ } if (gsfparams->p_msiex != NULL && - !msi_add_MsiDigitalSignatureEx(gsfparams->outole, gsfparams->p_msiex, gsfparams->len_msiex)) { + !msi_add_MsiDigitalSignatureEx(gsfparams->outole, gsfparams)) { fprintf(stderr, "Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", options->infile); return 0; /* FAILED */ } diff --git a/tests/recipes/41_sign_add_msi_dse b/tests/recipes/41_sign_add_msi_dse index bdb853d..0ef3b50 100644 --- a/tests/recipes/41_sign_add_msi_dse +++ b/tests/recipes/41_sign_add_msi_dse @@ -25,9 +25,8 @@ if test -s "sample.msi" -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/keyp.pem" \ -pass passme \ -in "sample.msi" -out "test_411.msi" -#"MsiDigitalSignatureEx 4d00730069004400690067006900740061006c005300690067006e0061007400750072006500450078" verify_signature "$?" "411" "msi" "success" "@2019-09-01 12:00:00" \ - "UNUSED_PATTERN" "HEX" "4d00730069004400690067006900740061006c005300690067006e0061007400750072006500450078" "UNUSED_PATTERN" + "UNUSED_PATTERN" "HEX" "MsiDigitalSignatureEx" "UNUSED_PATTERN" test_result "$?" "$test_name" else printf "Test skipped\n" From 3ae025a133931b4684615d117281c464965c79c2 Mon Sep 17 00:00:00 2001 From: olszomal Date: Tue, 31 Mar 2020 12:55:09 +0200 Subject: [PATCH 26/35] code cleaning --- osslsigncode.c | 402 ++++++++++++++++--------------------------------- 1 file changed, 133 insertions(+), 269 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 1d6f5e9..86b9dbb 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -36,15 +36,15 @@ * Peter Gutmann's analysis of Authenticode: - http://www.cs.auckland.ac.nz/~pgut001/pubs/authenticode.txt + https://www.cs.auckland.ac.nz/~pgut001/pubs/authenticode.txt * MS CAB SDK documentation - http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dncabsdk/html/cabdl.asp + https://docs.microsoft.com/en-us/previous-versions/ms974336(v=msdn.10) * MS PE/COFF documentation - http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx + https://docs.microsoft.com/en-us/windows/win32/debug/pe-format * MS Windows Authenticode PE Signature Format @@ -60,21 +60,21 @@ #ifdef HAVE_CONFIG_H #include "config.h" -#endif +#endif /* HAVE_CONFIG_H */ #ifdef HAVE_WINDOWS_H #define NOCRYPT #define WIN32_LEAN_AND_MEAN #include typedef unsigned char u_char; -#endif +#endif /* HAVE_WINDOWS_H */ #include #include #include #ifndef _WIN32 #include -#endif +#endif /* _WIN32 */ #include #include #include @@ -85,12 +85,12 @@ typedef unsigned char u_char; #ifndef _WIN32 #ifdef HAVE_SYS_MMAN_H #include -#endif +#endif /* HAVE_SYS_MMAN_H */ #ifdef HAVE_TERMIOS_H #include -#endif -#endif +#endif /* HAVE_TERMIOS_H */ +#endif /* _WIN32 */ #ifdef WITH_GSF #include @@ -100,7 +100,7 @@ typedef unsigned char u_char; #include #include #include -#endif +#endif /* WITH_GSF */ #include #include @@ -114,20 +114,18 @@ typedef unsigned char u_char; #include #ifndef OPENSSL_NO_ENGINE #include -#endif +#endif /* OPENSSL_NO_ENGINE */ #ifdef ENABLE_CURL #ifdef __CYGWIN__ #ifndef SOCKET #define SOCKET UINT_PTR -#endif -#endif +#endif /* SOCKET */ +#endif /* __CYGWIN__ */ #include #define MAX_TS_SERVERS 256 -#define GSF_CAN_READ_MSI_METADATA - -#endif +#endif /* ENABLE_CURL */ #ifndef FALSE #define FALSE 0 @@ -137,6 +135,7 @@ typedef unsigned char u_char; #define TRUE 1 #endif +#define GSF_CAN_READ_MSI_METADATA #if defined (HAVE_TERMIOS_H) || defined (HAVE_GETPASS) #define PROVIDE_ASKPASS 1 @@ -217,13 +216,13 @@ typedef struct { int ntsurl; char *proxy; int noverifypeer; -#endif +#endif /* ENABLE_CURL */ int addBlob; int nest; int verbose; #ifdef WITH_GSF int add_msi_dse; -#endif +#endif /* WITH_GSF */ char *cafile; char *crlfile; char *untrusted; @@ -257,11 +256,11 @@ typedef struct { u_char *p_msiex; int len_msiex; } GSF_PARAMS; -#endif +#endif /* WITH_GSF */ /* - ASN.1 definitions (more or less from official MS Authenticode docs) + * ASN.1 definitions (more or less from official MS Authenticode docs) */ typedef struct { @@ -275,8 +274,8 @@ typedef struct { DECLARE_ASN1_FUNCTIONS(SpcString) ASN1_CHOICE(SpcString) = { - ASN1_IMP_OPT(SpcString, value.unicode, ASN1_BMPSTRING , 0), - ASN1_IMP_OPT(SpcString, value.ascii, ASN1_IA5STRING, 1) + ASN1_IMP_OPT(SpcString, value.unicode, ASN1_BMPSTRING, 0), + ASN1_IMP_OPT(SpcString, value.ascii, ASN1_IA5STRING, 1) } ASN1_CHOICE_END(SpcString) IMPLEMENT_ASN1_FUNCTIONS(SpcString) @@ -309,9 +308,9 @@ typedef struct { DECLARE_ASN1_FUNCTIONS(SpcLink) ASN1_CHOICE(SpcLink) = { - ASN1_IMP_OPT(SpcLink, value.url, ASN1_IA5STRING, 0), + ASN1_IMP_OPT(SpcLink, value.url, ASN1_IA5STRING, 0), ASN1_IMP_OPT(SpcLink, value.moniker, SpcSerializedObject, 1), - ASN1_EXP_OPT(SpcLink, value.file, SpcString, 2) + ASN1_EXP_OPT(SpcLink, value.file, SpcString, 2) } ASN1_CHOICE_END(SpcLink) IMPLEMENT_ASN1_FUNCTIONS(SpcLink) @@ -594,7 +593,6 @@ static SpcSpOpusInfo* createOpus(const char *desc, const char *url) ASN1_STRING_set((ASN1_STRING *)info->programName->value.ascii, (const unsigned char*)desc, strlen(desc)); } - if (url) { info->moreInfo = SpcLink_new(); info->moreInfo->type = 0; @@ -602,7 +600,6 @@ static SpcSpOpusInfo* createOpus(const char *desc, const char *url) ASN1_STRING_set((ASN1_STRING *)info->moreInfo->value.url, (const unsigned char*)url, strlen(url)); } - return info; } @@ -658,7 +655,6 @@ static void print_timestamp_error(const char *url, long http_code) fprintf(stderr, "Failed to convert timestamp reply from %s; " "no HTTP status available", url); } - ERR_print_errors_fp(stderr); } @@ -755,7 +751,6 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, p = OPENSSL_malloc(len); len = i2d_TimeStampReq(req, &p); p -= len; - TimeStampReq_free(req); } else { TimeStampRequest *req = TimeStampRequest_new(); @@ -771,7 +766,6 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, req->blob->signature = NULL; TimeStampRequest_free(req); } - bout = BIO_new(BIO_s_mem()); if (!rfc3161) { b64 = BIO_new(BIO_f_base64()); @@ -815,7 +809,6 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, * char *resp_body = NULL; * long resp_body_len = BIO_get_mem_data(bin, &resp_body); */ - if (rfc3161) { TimeStampResp *reply; (void)BIO_flush(bin); @@ -832,7 +825,6 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, TimeStampResp_free(reply); return -1; } - if (((len = i2d_PKCS7(reply->token, NULL)) <= 0) || (p = OPENSSL_malloc(len)) == NULL) { if (verbose) { @@ -869,7 +861,6 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, print_timestamp_error(url, http_code); return -1; } - BIO_free_all(b64_bin); for(i = sk_X509_num(p7->d.sign->cert)-1; i>=0; i--) PKCS7_add_certificate(sig, sk_X509_value(p7->d.sign->cert, i)); @@ -891,14 +882,11 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, OPENSSL_free(p); PKCS7_add_attribute(si, NID_pkcs9_countersignature, V_ASN1_SEQUENCE, astr); - PKCS7_free(p7); } } - curl_easy_cleanup(curl); curl_global_cleanup(); - return (int)c; } @@ -928,7 +916,7 @@ static int add_timestamp_rfc3161(PKCS7 *sig, GLOBAL_OPTIONS *options) #ifdef WITH_GSF static int gsf_initialized = 0; -#endif +#endif /* WITH_GSF */ static void cleanup_lib_state(void) { @@ -946,7 +934,8 @@ static void cleanup_lib_state(void) ERR_free_strings(); } -static bool on_list(const char *txt, const char *list[]) { +static bool on_list(const char *txt, const char *list[]) +{ while (*list) if (!strcmp(txt, *list++)) return true; @@ -977,14 +966,14 @@ static void usage(const char *argv0, const char *cmd) #ifdef ENABLE_CURL printf("%12s[ -t [ -t ... ] [ -p ] [ -noverifypeer ]\n", ""); printf("%12s[ -ts [ -ts ... ] [ -p ] [ -noverifypeer ] ]\n", ""); -#endif +#endif /* ENABLE_CURL */ printf("%12s[ -st ]\n", ""); printf("%12s[ -addUnauthenticatedBlob ]\n", ""); printf("%12s[ -nest ]\n", ""); printf("%12s[ -verbose ]\n", ""); #ifdef WITH_GSF printf("%12s[ -add-msi-dse ]\n", ""); -#endif +#endif /* WITH_GSF */ printf("%12s[ -in ] [-out ] \n\n", ""); } const char *cmds_add[] = {"all", "add", NULL}; @@ -993,7 +982,7 @@ static void usage(const char *argv0, const char *cmd) #ifdef ENABLE_CURL printf("%12s[ -t [ -t ... ] [ -p ] [ -noverifypeer ]\n", ""); printf("%12s[ -ts [ -ts ... ] [ -p ] [ -noverifypeer ] ]\n", ""); -#endif +#endif /* ENABLE_CURL */ printf("%12s[ -in ] [ -out ] \n\n", ""); } const char *cmds_attach[] = {"all", "attach-signature", NULL}; @@ -1027,8 +1016,8 @@ static void usage(const char *argv0, const char *cmd) exit(-1); } -static void help_for(const char *argv0, const char *cmd) { - +static void help_for(const char *argv0, const char *cmd) +{ const char *cmds_all[] = {"all", NULL}; if (on_list(cmd, cmds_all)) { printf("osslsigncode is a small tool that implements part of the functionality of the Microsoft\n"); @@ -1094,7 +1083,7 @@ static void help_for(const char *argv0, const char *cmd) { const char *cmds_add_msi_dse[] = {"sign", NULL}; if (on_list(cmd, cmds_add_msi_dse)) printf("%-24s= sign a MSI file with the add-msi-dse option\n", "-add-msi-dse"); -#endif +#endif /* WITH_GSF */ const char *cmds_addUnauthenticatedBlob[] = {"sign", "add", NULL}; if (on_list(cmd, cmds_addUnauthenticatedBlob)) printf("%-24s= add an unauthenticated blob to the PE/MSI file\n", "-addUnauthenticatedBlob"); @@ -1102,7 +1091,7 @@ static void help_for(const char *argv0, const char *cmd) { const char *cmds_askpass[] = {"sign", NULL}; if (on_list(cmd, cmds_askpass)) printf("%-24s= ask for the private key password\n", "-askpass"); -#endif +#endif /* PROVIDE_ASKPASS */ const char *cmds_CAfile[] = {"attach-signature", "verify", NULL}; if (on_list(cmd, cmds_CAfile)) printf("%-24s= the file containing one or more trusted certificates in PEM format\n", "-CAfile"); @@ -1145,7 +1134,7 @@ static void help_for(const char *argv0, const char *cmd) { const char *cmds_noverifypeer[] = {"add", "sign", NULL}; if (on_list(cmd, cmds_noverifypeer)) printf("%-24s= do not verify the Time-Stamp Authority's SSL certificate\n", "-noverifypeer"); -#endif +#endif /* ENABLE_CURL */ const char *cmds_out[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", NULL}; if (on_list(cmd, cmds_out)) printf("%-24s= output file\n", "-out"); @@ -1153,7 +1142,7 @@ static void help_for(const char *argv0, const char *cmd) { const char *cmds_p[] = {"add", "sign", NULL}; if (on_list(cmd, cmds_p)) printf("%-24s= proxy to connect to the desired Time-Stamp Authority server\n", "-p"); -#endif +#endif /* ENABLE_CURL */ const char *cmds_pass[] = {"sign", NULL}; if (on_list(cmd, cmds_pass)) printf("%-24s= the private key password\n", "-pass"); @@ -1200,7 +1189,7 @@ static void help_for(const char *argv0, const char *cmd) { printf("%-24s= specifies the URL of the RFC 3161 Time-Stamp Authority server\n", "-ts"); printf("%26sthis option cannot be used with the -t option\n", ""); } -#endif +#endif /* ENABLE_CURL */ const char *cmds_untrusted[] = {"attach-signature", "verify", NULL}; if (on_list(cmd, cmds_untrusted)) { printf("%-24s= set of additional untrusted certificates which may be needed\n", "-untrusted"); @@ -1213,7 +1202,7 @@ static void help_for(const char *argv0, const char *cmd) { usage(argv0, cmd); } -#define DO_EXIT_0(x) { fprintf(stderr, x); goto err_cleanup; } +#define DO_EXIT_0(x) { fprintf(stderr, x); goto err_cleanup; } #define DO_EXIT_1(x, y) { fprintf(stderr, x, y); goto err_cleanup; } #define DO_EXIT_2(x, y, z) { fprintf(stderr, x, y, z); goto err_cleanup; } @@ -1221,17 +1210,17 @@ static void help_for(const char *argv0, const char *cmd) { #define GET_UINT16_LE(p) (((u_char*)(p))[0] | (((u_char*)(p))[1]<<8)) -#define GET_UINT32_LE(p) (((u_char*)(p))[0] | (((u_char*)(p))[1]<<8) | \ - (((u_char*)(p))[2]<<16) | (((u_char*)(p))[3]<<24)) +#define GET_UINT32_LE(p) (((u_char*)(p))[0] | (((u_char*)(p))[1]<<8) | \ + (((u_char*)(p))[2]<<16) | (((u_char*)(p))[3]<<24)) -#define PUT_UINT16_LE(i,p) \ - ((u_char*)(p))[0] = (i) & 0xff; \ +#define PUT_UINT16_LE(i,p) \ + ((u_char*)(p))[0] = (i) & 0xff; \ ((u_char*)(p))[1] = ((i)>>8) & 0xff -#define PUT_UINT32_LE(i,p) \ - ((u_char*)(p))[0] = (i) & 0xff; \ - ((u_char*)(p))[1] = ((i)>>8) & 0xff; \ - ((u_char*)(p))[2] = ((i)>>16) & 0xff; \ +#define PUT_UINT32_LE(i,p) \ + ((u_char*)(p))[0] = (i) & 0xff; \ + ((u_char*)(p))[1] = ((i)>>8) & 0xff; \ + ((u_char*)(p))[2] = ((i)>>16) & 0xff; \ ((u_char*)(p))[3] = ((i)>>24) & 0xff @@ -1272,7 +1261,7 @@ static const unsigned char classid_page_hash[] = { 0xAE, 0x05, 0xA2, 0x17, 0xDA, 0x8E, 0x60, 0xD6 }; -static unsigned char *calc_page_hash(char *indata, size_t header_size, +static unsigned char *pe_calc_page_hash(char *indata, size_t header_size, int pe32plus, size_t sigpos, int phtype, size_t *rphlen) { unsigned short nsections = GET_UINT16_LE(indata + header_size + 6); @@ -1336,7 +1325,7 @@ static SpcLink *get_page_hash_link(int phtype, char *indata, FILE_HEADER *header SpcSerializedObject *so; SpcLink *link; - ph = calc_page_hash(indata, header->header_size, header->pe32plus, header->fileend, phtype, &phlen); + ph = pe_calc_page_hash(indata, header->header_size, header->pe32plus, header->fileend, phtype, &phlen); if (!ph) { fprintf(stderr, "Failed to calculate page hash\n"); exit(-1); @@ -1505,7 +1494,6 @@ static int set_signing_blob(PKCS7 *sig, BIO *hash, char *buf, int len) return 0; /* FAILED */ } BIO_free_all(sigbio); - /* replace the data part with the MS Authenticode spcIndirectDataContext blob @@ -1534,14 +1522,12 @@ static int set_indirect_data_blob(PKCS7 *sig, BIO *hash, file_type_t type, get_indirect_data_blob(&p, &len, options, header, type, indata); memcpy(buf, p, len); OPENSSL_free(p); - if (!set_signing_blob(sig, hash, buf, len)) return 0; /* FAILED */ - return 1; /* OK */ } -static unsigned int calc_pe_checksum(BIO *bio, FILE_HEADER *header) +static unsigned int pe_calc_checksum(BIO *bio, FILE_HEADER *header) { unsigned int checkSum = 0; unsigned short val; @@ -1551,7 +1537,6 @@ static unsigned int calc_pe_checksum(BIO *bio, FILE_HEADER *header) /* recalculate the checksum */ buf = OPENSSL_malloc(sizeof(unsigned short)*32768); - (void)BIO_seek(bio, 0); while ((nread = BIO_read(bio, buf, sizeof(unsigned short)*32768)) > 0) { int i; @@ -1564,18 +1549,15 @@ static unsigned int calc_pe_checksum(BIO *bio, FILE_HEADER *header) size += 2; } } - OPENSSL_free(buf); - checkSum = 0xffff & (checkSum + (checkSum >> 0x10)); checkSum += size; - return checkSum; } -static void recalc_pe_checksum(BIO *bio, FILE_HEADER *header) +static void pe_recalc_checksum(BIO *bio, FILE_HEADER *header) { - unsigned int checkSum = calc_pe_checksum(bio, header); + unsigned int checkSum = pe_calc_checksum(bio, header); char buf[4]; /* write back checksum */ @@ -1612,7 +1594,6 @@ static int verify_leaf_hash(X509 *leaf, const char *leafhash) ret = 1; goto out; } - /* compute the leaf certificate hash */ EVP_MD_CTX *ctx = EVP_MD_CTX_create(); EVP_DigestInit_ex(ctx, md, NULL); @@ -1764,7 +1745,6 @@ static int load_crlfile_lookup(X509_STORE *store, char *crl) return 0; /* FAILED */ if (!X509_STORE_set1_param(store, param)) return 0; /* FAILED */ - return 1; /* OK */ } @@ -1787,7 +1767,6 @@ static int load_file_lookup(X509_STORE *store, char *certs, int purpose) return 0; /* FAILED */ if (!X509_STORE_set1_param(store, param)) return 0; /* FAILED */ - return 1; /* OK */ } @@ -1804,7 +1783,6 @@ static int set_store_time(X509_STORE *store, time_t time) return 0; /* FAILED */ } X509_VERIFY_PARAM_free(param); - return 1; /* OK */ } @@ -1825,7 +1803,6 @@ static ASN1_UTCTIME *print_timestamp(PKCS7_SIGNER_INFO *si) issuer = X509_NAME_oneline(si->issuer_and_serial->issuer, NULL, 0); serial = BN_bn2hex(ASN1_INTEGER_to_BN(si->issuer_and_serial->serial, NULL)); printf("Timestamp Verified by:\n\t\tIssuer : %s\n\t\tSerial : %s\n", issuer, serial); - return timestamp_time; /* OK */ } @@ -1839,7 +1816,6 @@ static PKCS7 *find_countersignature(PKCS7_SIGNED *p7_signed, const unsigned char si = sk_PKCS7_SIGNER_INFO_value(p7_signed->signer_info, 0); if (si == NULL) return NULL; /* FAILED */ - /* Create new signed PKCS7 timestamp structure. */ p7 = PKCS7_new(); if (!PKCS7_set_type(p7, NID_pkcs7_signed)) { @@ -1873,7 +1849,6 @@ static PKCS7 *find_countersignature(PKCS7_SIGNED *p7_signed, const unsigned char return NULL; /* FAILED */ } *timestamp_time = print_timestamp(countersignature); - return p7; /* OK */ } @@ -1889,7 +1864,6 @@ static PKCS7 *find_rfc3161(const unsigned char *data, int length, ASN1_UTCTIME * if (si == NULL) return NULL; /* FAILED */ *timestamp_time = print_timestamp(si); - return p7; /* OK */ } @@ -1955,7 +1929,6 @@ static int pkcs7_print_attributes(PKCS7_SIGNED *p7_signed, PKCS7 **tmstamp_p7, printf("\nPolicy OID: %s\n", object_txt); } /* else there is no unauthorized attribute */ - return 1; /* OK */ } @@ -2044,7 +2017,6 @@ static int pkcs7_set_nested_signature(PKCS7 *p7, PKCS7 *p7nest, time_t signing_t if (((len = i2d_PKCS7(p7nest, NULL)) <= 0) || (p = OPENSSL_malloc(len)) == NULL) return 0; - i2d_PKCS7(p7nest, &p); p -= len; ASN1_STRING *astr = ASN1_STRING_new(); @@ -2055,7 +2027,6 @@ static int pkcs7_set_nested_signature(PKCS7 *p7, PKCS7 *p7nest, time_t signing_t pkcs7_add_signing_time(si, signing_time); if (PKCS7_add_attribute(si, OBJ_txt2nid(SPC_NESTED_SIGNATURE_OBJID), V_ASN1_SEQUENCE, astr) == 0) return 0; - return 1; } @@ -2086,7 +2057,6 @@ static int verify_timestamp(PKCS7 *p7, PKCS7 *tmstamp_p7, GLOBAL_OPTIONS *option ret = 0; /* FAILED */ } X509_STORE_free(store); - return ret; } @@ -2119,7 +2089,6 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, GLOBAL_O ret = 1; /* FAILED */ } } - /* check extended key usage flag XKU_CODE_SIGN */ signers = PKCS7_get0_signers(p7, NULL, 0); if (!signers || sk_X509_num(signers) != 1) @@ -2145,10 +2114,8 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, GLOBAL_O ERR_print_errors_fp(stdout); ret = 1; /* FAILED */ } - BIO_free(bio); X509_STORE_free(store); - return ret; } @@ -2178,12 +2145,10 @@ static int verify_pkcs7(PKCS7 *p7, GLOBAL_OPTIONS *options) timestamp_time = NULL; ret |= verify_authenticode(p7, timestamp_time, options); - if (tmstamp_p7) { PKCS7_free(tmstamp_p7); tmstamp_p7 = NULL; } - return ret; } @@ -2257,7 +2222,6 @@ static gint msi_cmp(gpointer a, gpointer b) return 2*anc > 2*bnc ? 1 : -1; g_free(pa); g_free(pb); - return diff; } @@ -2283,10 +2247,8 @@ static GSList *msi_sorted_infile_children(GsfInfile *infile) continue; if (!g_strcmp0(decoded, "\05MsiDigitalSignatureEx")) continue; - sorted = g_slist_insert_sorted(sorted, (gpointer)name, (GCompareFunc)msi_cmp); } - return sorted; } @@ -2304,11 +2266,8 @@ static gboolean msi_prehash_utf16_name(gchar *name, BIO *hash) if (u16name == NULL) { return FALSE; } - BIO_write(hash, u16name, 2*chars_written); - g_free(u16name); - return TRUE; } @@ -2327,17 +2286,14 @@ static gboolean msi_prehash(GsfInfile *infile, gchar *dirname, BIO *hash) guint8 zeroes[8]; memset(&zeroes, 0, sizeof(zeroes)); - gsf_infile_msole_get_class_id(GSF_INFILE_MSOLE(infile), classid); if (dirname != NULL) { if (!msi_prehash_utf16_name(dirname, hash)) return FALSE; } - BIO_write(hash, classid, sizeof(classid)); BIO_write(hash, zeroes, 4); - if (dirname != NULL) { /* * Creation time and modification time for the root directory. @@ -2347,15 +2303,12 @@ static gboolean msi_prehash(GsfInfile *infile, gchar *dirname, BIO *hash) BIO_write(hash, zeroes, 8); /* ctime as Windows FILETIME */ BIO_write(hash, zeroes, 8); /* mtime as Windows FILETIME */ } - sorted = msi_sorted_infile_children(infile); - for (; sorted; sorted = sorted->next) { gchar *name = (gchar*)sorted->data; GsfInput *child = gsf_infile_child_by_name(infile, name); if (child == NULL) continue; - gboolean is_dir = GSF_IS_INFILE(child) && gsf_infile_num_children(GSF_INFILE(child)) > 0; if (is_dir) { if (!msi_prehash(GSF_INFILE(child), name, hash)) @@ -2363,20 +2316,17 @@ static gboolean msi_prehash(GsfInfile *infile, gchar *dirname, BIO *hash) } else { if (!msi_prehash_utf16_name(name, hash)) return FALSE; - /* * File size. */ gsf_off_t size = gsf_input_remaining(child); guint32 sizebuf = GUINT32_TO_LE((guint32)size); BIO_write(hash, &sizebuf, sizeof(sizebuf)); - /* * Reserved - must be 0. Corresponds to * offset 0x7c..0x7f in the CDFv2 file. */ BIO_write(hash, zeroes, 4); - /* * Creation time and modification time * as Windows FILETIMEs. We keep them @@ -2387,9 +2337,7 @@ static gboolean msi_prehash(GsfInfile *infile, gchar *dirname, BIO *hash) BIO_write(hash, zeroes, 8); /* mtime as Windows FILETIME */ } } - g_slist_free(sorted); - return TRUE; } @@ -2412,13 +2360,11 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash) gsf_outfile_msole_set_class_id(GSF_OUTFILE_MSOLE(outole), classid); sorted = msi_sorted_infile_children(infile); - for (; sorted; sorted = sorted->next) { gchar *name = (gchar*)sorted->data; GsfInput *child = gsf_infile_child_by_name(infile, name); if (child == NULL) continue; - gboolean is_dir = GSF_IS_INFILE(child) && gsf_infile_num_children(GSF_INFILE(child)) > 0; GsfOutput *outchild = NULL; if (outole != NULL) @@ -2437,17 +2383,13 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash) } } } - if (outchild != NULL) { gsf_output_close(outchild); g_object_unref(outchild); } } - BIO_write(hash, classid, sizeof(classid)); - g_slist_free(sorted); - return TRUE; } @@ -2481,26 +2423,21 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, } ASN1_OBJECT_free(indir_objid); } - if (mdtype == -1) { printf("Failed to extract current message digest\n\n"); ret = 1; goto out; } - if (p7 == NULL) { printf("Failed to read PKCS7 signature from DigitalSignature section\n\n"); ret = 1; goto out; } - printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype)); - const EVP_MD *md = EVP_get_digestbynid(mdtype); BIO *hash = BIO_new(BIO_f_md()); BIO_set_md(hash, md); BIO_push(hash, BIO_new(BIO_s_null())); - if (exdata) { /* * Until libgsf can read more MSI metadata, we can't @@ -2523,19 +2460,16 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, ret = 1; goto out; } - BIO_gets(prehash, (char*)cexmdbuf, EVP_MAX_MD_SIZE); BIO_write(hash, (char*)cexmdbuf, EVP_MD_size(md)); #else BIO_write(hash, (char *)exdata, EVP_MD_size(md)); #endif } - if (!msi_handle_dir(infile, NULL, hash)) { ret = 1; goto out; } - BIO_gets(hash, (char*)cmdbuf, EVP_MAX_MD_SIZE); tohex(cmdbuf, hexbuf, EVP_MD_size(md)); int mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); @@ -2609,14 +2543,12 @@ static int msi_verify_file(GsfInfile *infile, GLOBAL_OPTIONS *options) ret = 1; goto out; } - unsigned long inlen = (unsigned long) gsf_input_remaining(sig); indata = OPENSSL_malloc(inlen); if (gsf_input_read(sig, inlen, indata) == NULL) { ret = 1; goto out; } - unsigned long exlen = 0; if (exsig != NULL) { exlen = (unsigned long) gsf_input_remaining(exsig); @@ -2626,19 +2558,15 @@ static int msi_verify_file(GsfInfile *infile, GLOBAL_OPTIONS *options) goto out; } } - const unsigned char *blob = (unsigned char *)indata; p7 = d2i_PKCS7(NULL, &blob, inlen); - ret = msi_verify_pkcs7(p7, infile, exdata, exlen, 1, options); out: OPENSSL_free(indata); OPENSSL_free(exdata); - if (p7) PKCS7_free(p7); - return ret; } @@ -2662,17 +2590,13 @@ static int msi_extract_dse(GsfInfile *infile, unsigned char **dsebuf, ret = 1; goto out; } - if (has_dse != NULL) { *has_dse = 1; } - size = gsf_input_remaining(exsig); - if (dselen != NULL) { *dselen = (unsigned long) size; } - if (dsebuf != NULL) { buf = OPENSSL_malloc(size); if (gsf_input_read(exsig, size, buf) == NULL) { @@ -2715,7 +2639,6 @@ static int msi_extract_signature_to_file(GsfInfile *infile, char *outfile) ret = 1; goto out; } - /* Create outdata file */ outdata = BIO_new_file(outfile, "w+bx"); if (outdata == NULL) { @@ -2723,13 +2646,11 @@ static int msi_extract_signature_to_file(GsfInfile *infile, char *outfile) ret = 1; goto out; } - while (gsf_input_remaining(sig) > 0) { gsf_off_t size = MIN(gsf_input_remaining(sig), 4096); guint8 const *data = gsf_input_read(sig, size, NULL); BIO_write(outdata, data, size); } - if (exsig != NULL) { exlen = (unsigned long) gsf_input_remaining(exsig); if (exlen > EVP_MAX_MD_SIZE) { @@ -2737,14 +2658,12 @@ static int msi_extract_signature_to_file(GsfInfile *infile, char *outfile) ret = 1; goto out; } - exdata = OPENSSL_malloc(exlen); if (gsf_input_read(exsig, exlen, exdata) == NULL) { printf("Unable to read MsiDigitalSignatureEx\n"); ret = 1; goto out; } - tohex(exdata, hexbuf, exlen); printf("Note: MSI includes a MsiDigitalSignatureEx section\n"); printf("MsiDigitalSignatureEx pre-hash: %s\n", hexbuf); @@ -2774,16 +2693,12 @@ static PKCS7 *msi_extract_signature_to_pkcs7(GsfInfile *infile) if (!g_strcmp0(decoded, "\05DigitalSignature")) sig = child; } - if (sig == NULL) { + if (sig == NULL) goto out; - } - size = gsf_input_remaining(sig); buf = OPENSSL_malloc(size); - if (gsf_input_read(sig, size, buf) == NULL) { + if (gsf_input_read(sig, size, buf) == NULL) goto out; - } - const unsigned char *p7buf = buf; p7 = d2i_PKCS7(NULL, &p7buf, size); @@ -2842,7 +2757,6 @@ static int msi_check_MsiDigitalSignatureEx(GsfInfile *ole, const EVP_MD *md) return 0; /* FAILED */ } } - return 1; /* OK */ } @@ -2902,7 +2816,6 @@ static int msi_calc_MsiDigitalSignatureEx(GsfInfile *ole, const EVP_MD *md, } gsfparams->len_msiex = BIO_gets(prehash, (char*)gsfparams->p_msiex, EVP_MAX_MD_SIZE); BIO_write(hash, gsfparams->p_msiex, gsfparams->len_msiex); - return 1; /* OK */ } #endif @@ -2916,7 +2829,6 @@ static int msi_add_DigitalSignature(GsfOutfile *outole, u_char *p, int len) if (!gsf_output_write(child, len, p)) ret = 0; gsf_output_close(child); - return ret; } @@ -2929,14 +2841,13 @@ static int msi_add_MsiDigitalSignatureEx(GsfOutfile *outole, GSF_PARAMS *gsfpara if (!gsf_output_write(child, gsfparams->len_msiex, gsfparams->p_msiex)) ret = 0; gsf_output_close(child); - return ret; } /* * PE file support */ -static void calc_pe_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, FILE_HEADER *header) +static void pe_calc_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, FILE_HEADER *header) { static unsigned char bfb[16*1024*1024]; EVP_MD_CTX *mdctx; @@ -2965,12 +2876,11 @@ static void calc_pe_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, FIL EVP_DigestUpdate(mdctx, bfb, l); n += l; } - EVP_DigestFinal(mdctx, mdbuf, NULL); EVP_MD_CTX_free(mdctx); } -static void extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, +static void pe_extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, unsigned char **ph, size_t *phlen, int *phtype) { *phlen = 0; @@ -2979,19 +2889,16 @@ static void extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, SpcPeImageData *id = d2i_SpcPeImageData(NULL, &blob, obj->value->value.sequence->length); if (id == NULL) return; - if (id->file->type != 1) { SpcPeImageData_free(id); return; } - SpcSerializedObject *so = id->file->value.moniker; if (so->classId->length != sizeof(classid_page_hash) || memcmp(so->classId->data, classid_page_hash, sizeof (classid_page_hash))) { SpcPeImageData_free(id); return; } - /* skip ASN.1 SET hdr */ size_t l = asn1_simple_hdr_len(so->serializedData->data, so->serializedData->length); blob = so->serializedData->data + l; @@ -3012,7 +2919,6 @@ static void extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, SpcAttributeTypeAndOptionalValue_free(obj); return; } - /* Skip ASN.1 SET hdr */ size_t l2 = asn1_simple_hdr_len(obj->value->value.sequence->data, obj->value->value.sequence->length); /* Skip ASN.1 OCTET STRING hdr */ @@ -3024,7 +2930,7 @@ static void extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, SpcAttributeTypeAndOptionalValue_free(obj); } -static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, +static int pe_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, int allownest, GLOBAL_OPTIONS *options) { int ret = 0; @@ -3044,7 +2950,7 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, const unsigned char *p = astr->data; SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, astr->length); if (idc) { - extract_page_hash(idc->data, &ph, &phlen, &phtype); + pe_extract_page_hash(idc->data, &ph, &phlen, &phtype); if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) { mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm); memcpy(mdbuf, idc->messageDigest->digest->data, idc->messageDigest->digest->length); @@ -3053,12 +2959,10 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, } } ASN1_OBJECT_free(indir_objid); - if (mdtype == -1) { printf("Failed to extract current message digest\n\n"); return -1; } - printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype)); const EVP_MD *md = EVP_get_digestbynid(mdtype); @@ -3066,7 +2970,7 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, printf("Current message digest : %s\n", hexbuf); bio = BIO_new_mem_buf(indata, header->sigpos + header->siglen); - calc_pe_digest(bio, md, cmdbuf, header); + pe_calc_digest(bio, md, cmdbuf, header); BIO_free(bio); tohex(cmdbuf, hexbuf, EVP_MD_size(md)); int mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); @@ -3078,7 +2982,7 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, tohex(ph, hexbuf, (phlen < 32) ? phlen : 32); printf("Page hash : %s ...\n", hexbuf); size_t cphlen = 0; - unsigned char *cph = calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &cphlen); + unsigned char *cph = pe_calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &cphlen); tohex(cph, hexbuf, (cphlen < 32) ? cphlen : 32); mdok = (phlen != cphlen) || memcmp(ph, cph, phlen); if (mdok) ret = 1; @@ -3093,7 +2997,7 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, int has_sig = 0; PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig); if (p7nest) { - int nest_ret = verify_pe_pkcs7(p7nest, indata, header, 0, options); + int nest_ret = pe_verify_pkcs7(p7nest, indata, header, 0, options); if (ret) ret = nest_ret; PKCS7_free(p7nest); @@ -3102,15 +3006,14 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, ret = 1; } } - return ret; } /* - * extract_existing_pe_pkcs7 retrieves a decoded PKCS7 struct + * pe_extract_existing_pkcs7 retrieves a decoded PKCS7 struct * corresponding to the existing signature of the PE file. */ -static PKCS7 *extract_existing_pe_pkcs7(char *indata, FILE_HEADER *header) +static PKCS7 *pe_extract_existing_pkcs7(char *indata, FILE_HEADER *header) { size_t pos = 0; PKCS7 *p7 = NULL; @@ -3127,11 +3030,10 @@ static PKCS7 *extract_existing_pe_pkcs7(char *indata, FILE_HEADER *header) l += (8 - l%8); pos += l; } - return p7; } -static int verify_pe_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options) +static int pe_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options) { int ret = 0; @@ -3140,7 +3042,7 @@ static int verify_pe_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *opt printf("Current PE checksum : %08X\n", header->pe_checksum); BIO *bio = BIO_new_mem_buf(indata, header->sigpos + header->siglen); - unsigned int real_pe_checksum = calc_pe_checksum(bio, header); + unsigned int real_pe_checksum = pe_calc_checksum(bio, header); BIO_free(bio); if (header->pe_checksum && header->pe_checksum != real_pe_checksum) ret = 1; @@ -3150,27 +3052,24 @@ static int verify_pe_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *opt printf("No signature found\n\n"); return 1; } - - PKCS7 *p7 = extract_existing_pe_pkcs7(indata, header); + PKCS7 *p7 = pe_extract_existing_pkcs7(indata, header); if (!p7) { printf("Failed to extract PKCS7 data\n\n"); return -1; } - - ret = verify_pe_pkcs7(p7, indata, header, 1, options); + ret = pe_verify_pkcs7(p7, indata, header, 1, options); PKCS7_free(p7); - return ret; } -static int extract_pe_file(char *indata, FILE_HEADER *header, BIO *outdata, int output_pkcs7) +static int pe_extract_file(char *indata, FILE_HEADER *header, BIO *outdata, int output_pkcs7) { int ret = 0; PKCS7 *sig; (void)BIO_reset(outdata); if (output_pkcs7) { - sig = extract_existing_pe_pkcs7(indata, header); + sig = pe_extract_existing_pkcs7(indata, header); if (!sig) { fprintf(stderr, "Unable to extract existing signature\n"); return 1; /* FAILED */ @@ -3179,11 +3078,10 @@ static int extract_pe_file(char *indata, FILE_HEADER *header, BIO *outdata, int } else { ret = !BIO_write(outdata, indata + header->sigpos, header->siglen); } - return ret; } -static int verify_pe_header(char *indata, char *infile, size_t filesize, FILE_HEADER *header) +static int pe_verify_header(char *indata, char *infile, size_t filesize, FILE_HEADER *header) { int ret = 1; @@ -3224,11 +3122,10 @@ static int verify_pe_header(char *indata, char *infile, size_t filesize, FILE_HE printf("Corrupt PE file - current signature not at end of file: %s\n", infile); ret = 0; /* FAILED */ } - return ret; } -static void modify_pe_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) +static void pe_modify_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) { int len = 0, i; static char buf[64*1024]; @@ -3259,7 +3156,7 @@ static void modify_pe_header(char *indata, FILE_HEADER *header, BIO *hash, BIO * * https://www.file-recovery.com/cab-signature-format.htm */ -static int verify_cab_header(char *indata, char *infile, size_t filesize, FILE_HEADER *header) +static int cab_verify_header(char *indata, char *infile, size_t filesize, FILE_HEADER *header) { int ret = 1; size_t reserved; @@ -3315,11 +3212,10 @@ static int verify_cab_header(char *indata, char *infile, size_t filesize, FILE_H ret = 0; /* FAILED */ } } - return ret; } -static int calc_cab_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, size_t offset) +static int cab_calc_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, size_t offset) { size_t coffFiles, nfolders, flags; static unsigned char bfb[16*1024*1024]; @@ -3428,11 +3324,10 @@ static int calc_cab_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, siz EVP_DigestFinal(mdctx, mdbuf, NULL); EVP_MD_CTX_free(mdctx); - return 0; /* OK */ } -static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, +static int cab_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, int allownest, GLOBAL_OPTIONS *options) { int ret = 0; @@ -3452,7 +3347,7 @@ static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, const unsigned char *p = astr->data; SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, astr->length); if (idc) { - extract_page_hash(idc->data, &ph, &phlen, &phtype); + pe_extract_page_hash(idc->data, &ph, &phlen, &phtype); if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) { mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm); memcpy(mdbuf, idc->messageDigest->digest->data, idc->messageDigest->digest->length); @@ -3472,7 +3367,7 @@ static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, printf("Current message digest : %s\n", hexbuf); bio = BIO_new_mem_buf(indata, header->sigpos); - ret |= calc_cab_digest(bio, md, cmdbuf, header->sigpos); + ret |= cab_calc_digest(bio, md, cmdbuf, header->sigpos); BIO_free(bio); tohex(cmdbuf, hexbuf, EVP_MD_size(md)); @@ -3487,7 +3382,7 @@ static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, int has_sig = 0; PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig); if (p7nest) { - int nest_ret = verify_cab_pkcs7(p7nest, indata, header, 0, options); + int nest_ret = cab_verify_pkcs7(p7nest, indata, header, 0, options); if (ret) ret = nest_ret; PKCS7_free(p7nest); @@ -3496,22 +3391,20 @@ static int verify_cab_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, ret = 1; } } - return ret; } -static PKCS7 *extract_existing_cab_pkcs7(char *indata, FILE_HEADER *header) +static PKCS7 *cab_extract_existing_pkcs7(char *indata, FILE_HEADER *header) { PKCS7 *p7 = NULL; const unsigned char *blob; blob = (unsigned char*)indata + header->sigpos; p7 = d2i_PKCS7(NULL, &blob, header->siglen); - return p7; } -static int verify_cab_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options) +static int cab_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options) { PKCS7 *p7; int ret = 0; @@ -3520,26 +3413,24 @@ static int verify_cab_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *op printf("No signature found\n\n"); return 1; /* FAILED */ } - p7 = extract_existing_cab_pkcs7(indata, header); + p7 = cab_extract_existing_pkcs7(indata, header); if (!p7) { printf("Failed to extract PKCS7 data\n\n"); return -1; /* FAILED */ } - - ret |= verify_cab_pkcs7(p7, indata, header, 1, options); + ret |= cab_verify_pkcs7(p7, indata, header, 1, options); PKCS7_free(p7); - return ret; } -static int extract_cab_file(char *indata, FILE_HEADER *header, BIO *outdata, int output_pkcs7) +static int cab_extract_file(char *indata, FILE_HEADER *header, BIO *outdata, int output_pkcs7) { int ret = 0; PKCS7 *sig; (void)BIO_reset(outdata); if (output_pkcs7) { - sig = extract_existing_cab_pkcs7(indata, header); + sig = cab_extract_existing_pkcs7(indata, header); if (!sig) { fprintf(stderr, "Unable to extract existing signature\n"); return 1; /* FAILED */ @@ -3548,11 +3439,10 @@ static int extract_cab_file(char *indata, FILE_HEADER *header, BIO *outdata, int } else { ret = !BIO_write(outdata, indata + header->sigpos, header->siglen); } - return ret; } -static void write_optional_names(size_t flags, char *indata, BIO *outdata, int *len) +static void cab_optional_names(size_t flags, char *indata, BIO *outdata, int *len) { int i; @@ -3593,7 +3483,7 @@ static void write_optional_names(size_t flags, char *indata, BIO *outdata, int * *len = i; } -static void remove_cab_file(char *indata, FILE_HEADER *header, size_t filesize, BIO *outdata) +static void cab_remove_file(char *indata, FILE_HEADER *header, size_t filesize, BIO *outdata) { int i; unsigned short nfolders; @@ -3633,7 +3523,7 @@ static void remove_cab_file(char *indata, FILE_HEADER *header, size_t filesize, */ BIO_write(outdata, indata+32, 4); i = 60; - write_optional_names(flags, indata, outdata, &i); + cab_optional_names(flags, indata, outdata, &i); /* * (u8 * cFolders) CFFOLDER - structure contains information about * one of the folders or partial folders stored in this cabinet file @@ -3652,7 +3542,7 @@ static void remove_cab_file(char *indata, FILE_HEADER *header, size_t filesize, BIO_write(outdata, indata + i, filesize - header->siglen - i); } -static void modify_cab_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) +static void cab_modify_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) { int i; unsigned short nfolders; @@ -3694,7 +3584,7 @@ static void modify_cab_header(char *indata, FILE_HEADER *header, BIO *hash, BIO BIO_write(hash, indata+56, 4); i = 60; - write_optional_names(flags, indata, hash, &i); + cab_optional_names(flags, indata, hash, &i); /* * (u8 * cFolders) CFFOLDER - structure contains information about * one of the folders or partial folders stored in this cabinet file @@ -3709,7 +3599,7 @@ static void modify_cab_header(char *indata, FILE_HEADER *header, BIO *hash, BIO BIO_write(hash, indata + i, header->sigpos - i); } -static void add_cab_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) +static void cab_add_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) { int i; unsigned short nfolders; @@ -3756,7 +3646,7 @@ static void add_cab_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *ou BIO_write(hash, cabsigned+20, 4); i = 36; - write_optional_names(flags, indata, hash, &i); + cab_optional_names(flags, indata, hash, &i); /* * (u8 * cFolders) CFFOLDER - structure contains information about * one of the folders or partial folders stored in this cabinet file @@ -3796,7 +3686,6 @@ static void add_jp_attribute(PKCS7_SIGNER_INFO *si, int jp) default: break; } - if (attrs) { astr = ASN1_STRING_new(); ASN1_STRING_set(astr, attrs, len); @@ -3849,7 +3738,6 @@ static int add_opus_attribute(PKCS7_SIGNER_INFO *si, char *desc, char *url) V_ASN1_SEQUENCE, astr); SpcSpOpusInfo_free(opus); - return 1; /* OK */ } @@ -3879,7 +3767,6 @@ static PKCS7 *create_new_signature(file_type_t type, fprintf(stderr, "PKCS7_add_signature failed\n"); return NULL; /* FAILED */ } - pkcs7_add_signing_time(si, options->signing_time); PKCS7_add_signed_attribute(si, NID_pkcs9_contentType, V_ASN1_OBJECT, OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1)); @@ -3894,7 +3781,6 @@ static PKCS7 *create_new_signature(file_type_t type, fprintf(stderr, "Couldn't allocate memory for opus info\n"); return NULL; /* FAILED */ } - PKCS7_content_new(sig, NID_pkcs7_data); if (cparams->cert != NULL) { @@ -3917,7 +3803,6 @@ static PKCS7 *create_new_signature(file_type_t type, sk_X509_free(cparams->xcerts); cparams->xcerts = NULL; } - return sig; /* OK */ } @@ -3943,10 +3828,12 @@ static int add_unauthenticated_blob(PKCS7 *sig) "unauthenticatedData", "unauthenticatedData"); PKCS7_add_attribute (si, nid, V_ASN1_SEQUENCE, astr); OPENSSL_free(p); - return 0; /* OK */ } +/* + * Append signature to the outfile + */ #ifdef WITH_GSF static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t cmd, GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata, GSF_PARAMS *gsfparams) @@ -3972,7 +3859,6 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ } else { outsig = sig; } - /* Append signature to outfile */ if (((*len = i2d_PKCS7(outsig, NULL)) <= 0) || (p = OPENSSL_malloc(*len)) == NULL) { fprintf(stderr, "i2d_PKCS memory allocation failed: %d\n", *len); @@ -3988,7 +3874,6 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ PUT_UINT16_LE(WIN_CERT_TYPE_PKCS_SIGNED_DATA, buf + 6); BIO_write(outdata, buf, 8); } - if (type == FILE_TYPE_PE || type == FILE_TYPE_CAB) { BIO_write(outdata, p, *len); /* pad (with 0's) asn1 blob to 8 byte boundary */ @@ -4013,7 +3898,6 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ #endif } OPENSSL_free(p); - return 1; /* OK */ } @@ -4032,7 +3916,7 @@ static void update_data_size(file_type_t type, cmd_type_t cmd, FILE_HEADER *head BIO_write(outdata, buf, 4); } if (cmd == CMD_SIGN || cmd == CMD_REMOVE || cmd == CMD_ADD || cmd == CMD_ATTACH) - recalc_pe_checksum(outdata, header); + pe_recalc_checksum(outdata, header); } else if (type == FILE_TYPE_CAB && (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH)) { /* * Update additional data size. @@ -4123,7 +4007,7 @@ static int input_validation(file_type_t type, GLOBAL_OPTIONS *options, FILE_HEAD if (options->add_msi_dse == 1) fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); #endif - if (!verify_cab_header(indata, options->infile, filesize, header)) { + if (!cab_verify_header(indata, options->infile, filesize, header)) { fprintf(stderr, "Corrupt CAB file\n"); return 0; /* FAILED */ } @@ -4134,7 +4018,7 @@ static int input_validation(file_type_t type, GLOBAL_OPTIONS *options, FILE_HEAD if (options->add_msi_dse == 1) fprintf(stderr, "Warning: -add-msi-dse option is only valid for MSI files\n"); #endif - if (!verify_pe_header(indata, options->infile, filesize, header)) { + if (!pe_verify_header(indata, options->infile, filesize, header)) { fprintf(stderr, "Corrupt PE file\n"); return 0; /* FAILED */ } @@ -4149,7 +4033,6 @@ static int input_validation(file_type_t type, GLOBAL_OPTIONS *options, FILE_HEAD return 0; /* FAILED */ #endif } - return 1; /* OK */ } @@ -4169,11 +4052,11 @@ static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPT fprintf(stderr, "Error verifying result\n"); return 0; /* FAILED */ } - if (!verify_pe_header(outdata, options->outfile, filesize, header)) { + if (!pe_verify_header(outdata, options->outfile, filesize, header)) { fprintf(stderr, "Corrupt PE file\n"); return 0; /* FAILED */ } - if (verify_pe_file(outdata, header, options)) { + if (pe_verify_file(outdata, header, options)) { fprintf(stderr, "Signature mismatch\n"); return 0; /* FAILED */ } @@ -4188,11 +4071,11 @@ static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPT fprintf(stderr, "Error verifying result\n"); return 0; /* FAILED */ } - if (!verify_cab_header(outdata, options->outfile, filesize, header)) { + if (!cab_verify_header(outdata, options->outfile, filesize, header)) { fprintf(stderr, "Corrupt CAB file\n"); return 0; /* FAILED */ } - if (verify_cab_file(outdata, header, options)) { + if (cab_verify_file(outdata, header, options)) { fprintf(stderr, "Signature mismatch\n"); return 0; /* FAILED */ } @@ -4223,7 +4106,6 @@ static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPT fprintf(stderr, "Unknown input type for file: %s\n", options->infile); return 0; /* FAILED */ } - return 1; /* OK */ } @@ -4247,7 +4129,6 @@ static int get_file_type(char *indata, char *infile, file_type_t *type) printf("Unrecognized file type: %s\n", infile); return 0; /* FAILED */ } - return 1; /* OK */ } @@ -4269,17 +4150,13 @@ static char *getpassword(const char *prompt) fprintf(stderr, "Failed to set terminal attributes\n"); return NULL; } - p = fgets(passbuf, sizeof(passbuf), stdin); - if (tcsetattr(fileno(stdin), TCSANOW, &ofl) != 0) fprintf(stderr, "Failed to restore terminal attributes\n"); - if (!p) { fprintf(stderr, "Failed to read password\n"); return NULL; } - passbuf[strlen(passbuf)-1] = 0x00; char *pass = strdup(passbuf); memset(passbuf, 0, sizeof(passbuf)); @@ -4315,7 +4192,6 @@ static int read_password(GLOBAL_OPTIONS *options) options->pass = getpassword("Password: "); #endif } - return 1; /* OK */ } @@ -4456,10 +4332,8 @@ static int read_crypto_params(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) } BIO_free(btmp); } - if (cparams->certs == NULL && p7 != NULL) cparams->certs = sk_X509_dup(p7->d.sign->cert); - if (options->xcertfile) { if ((btmp = BIO_new_file(options->xcertfile, "rb")) == NULL || ((p7x = d2i_PKCS7_bio(btmp, NULL)) == NULL && @@ -4471,12 +4345,10 @@ static int read_crypto_params(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) PKCS7_free(p7x); p7x = NULL; } - if (options->pass) { memset(options->pass, 0, strlen(options->pass)); options->pass = NULL; } - return ret; /* OK */ } @@ -4510,7 +4382,6 @@ static char *get_cafile(void) } else { openssl_dir = OPENSSL_strdup("/etc"); } - cafile = OPENSSL_malloc(strlen(sslpart1) + strlen(sslpart2) + 1); strcpy(cafile, openssl_dir); strcat(cafile, sslpart2); @@ -4519,7 +4390,7 @@ static char *get_cafile(void) return cafile; } -static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) +static PKCS7 *get_sigfile(char *sigfile, file_type_t type) { PKCS7 *sig = NULL; size_t sigfilesize; @@ -4538,28 +4409,26 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) fprintf(stderr, "Failed to open file: %s\n", sigfile); return NULL; /* FAILED */ } - - /* reset header */ - memset(&header, 0, sizeof(FILE_HEADER)); - header.fileend = sigfilesize; - if (sigfilesize >= sizeof(pemhdr) && !memcmp(insigdata, pemhdr, sizeof(pemhdr)-1)) { sigbio = BIO_new_mem_buf(insigdata, sigfilesize); sig = PEM_read_bio_PKCS7(sigbio, NULL, NULL, NULL); BIO_free_all(sigbio); } else { + /* reset header */ + memset(&header, 0, sizeof(FILE_HEADER)); + header.fileend = sigfilesize; if (type == FILE_TYPE_PE) { - if (!verify_pe_header(insigdata, sigfile, sigfilesize, &header)) + if (!pe_verify_header(insigdata, sigfile, sigfilesize, &header)) return NULL; /* FAILED */ - sig = extract_existing_pe_pkcs7(insigdata, &header); + sig = pe_extract_existing_pkcs7(insigdata, &header); if (!sig) { fprintf(stderr, "Failed to extract PKCS7 data: %s\n", sigfile); return NULL; /* FAILED */ } } else if (type == FILE_TYPE_CAB) { - if (!verify_cab_header(insigdata, sigfile, sigfilesize, &header)) + if (!cab_verify_header(insigdata, sigfile, sigfilesize, &header)) return NULL; /* FAILED */ - sig = extract_existing_cab_pkcs7(insigdata, &header); + sig = cab_extract_existing_pkcs7(insigdata, &header); if (!sig) { fprintf(stderr, "Failed to extract PKCS7 data: %s\n", sigfile); return NULL; /* FAILED */ @@ -4577,13 +4446,16 @@ static PKCS7 *attach_sigfile(char *sigfile, file_type_t type) return sig; /* OK */ } +/* + * Obtain an existing signature or create a new one + */ static PKCS7 *get_pkcs7(cmd_type_t cmd, BIO *hash, file_type_t type, char *indata, GLOBAL_OPTIONS *options, FILE_HEADER *header, CRYPTO_PARAMS *cparams) { PKCS7 *sig = NULL; if (cmd == CMD_ATTACH) { - sig = attach_sigfile(options->sigfile, type); + sig = get_sigfile(options->sigfile, type); if (!sig) { fprintf(stderr, "Unable to extract valid signature\n"); return NULL; /* FAILED */ @@ -4599,12 +4471,14 @@ static PKCS7 *get_pkcs7(cmd_type_t cmd, BIO *hash, file_type_t type, char *indat return NULL; /* FAILED */ } } - return sig; } +/* + * Prepare the output file for signing + */ #ifdef WITH_GSF -static PKCS7 *presign_msi_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, +static PKCS7 *msi_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata, BIO *hash, GsfInfile *ole, GSF_PARAMS *gsfparams, PKCS7 **cursig) { @@ -4641,12 +4515,11 @@ static PKCS7 *presign_msi_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *he } if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN)) sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams); - return sig; /* OK */ } #endif -static PKCS7 *presign_pe_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, +static PKCS7 *pe_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata, BIO *hash, BIO *outdata, PKCS7 **cursig) { @@ -4654,7 +4527,7 @@ static PKCS7 *presign_pe_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *hea if ((cmd == CMD_SIGN && options->nest) || (cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) { - *cursig = extract_existing_pe_pkcs7(indata, header); + *cursig = pe_extract_existing_pkcs7(indata, header); if (!*cursig) { fprintf(stderr, "Unable to extract existing signature\n"); return NULL; /* FAILED */ @@ -4666,15 +4539,13 @@ static PKCS7 *presign_pe_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *hea /* Strip current signature */ header->fileend = header->sigpos; } - modify_pe_header(indata, header, hash, outdata); - + pe_modify_header(indata, header, hash, outdata); if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN)) sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams); - return sig; /* OK */ } -static PKCS7 *presign_cab_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, +static PKCS7 *cab_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata, BIO *hash, BIO *outdata, PKCS7 **cursig) { @@ -4682,7 +4553,7 @@ static PKCS7 *presign_cab_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *he if ((cmd == CMD_SIGN && options->nest) || (cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) { - *cursig = extract_existing_cab_pkcs7(indata, header); + *cursig = cab_extract_existing_pkcs7(indata, header); if (!*cursig) { fprintf(stderr, "Unable to extract existing signature\n"); return NULL; /* FAILED */ @@ -4692,13 +4563,11 @@ static PKCS7 *presign_cab_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *he } if (header->header_size == 20) /* Strip current signature and modify header */ - modify_cab_header(indata, header, hash, outdata); + cab_modify_header(indata, header, hash, outdata); else - add_cab_header(indata, header, hash, outdata); - + cab_add_header(indata, header, hash, outdata); if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN)) sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams); - return sig; /* OK */ } @@ -4741,7 +4610,6 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION argv++; argc--; } - /* reset options */ memset(options, 0, sizeof(GLOBAL_OPTIONS)); options->md = EVP_sha1(); @@ -4752,7 +4620,6 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION options->cafile = get_cafile(); options->untrusted = get_cafile(); } - for (argc--,argv++; argc >= 1; argc--,argv++) { if (!strcmp(*argv, "-in")) { if (--argc < 1) usage(argv0, "all"); @@ -4915,12 +4782,10 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION break; } } - if (!options->infile && argc > 0) { options->infile = *(argv++); argc--; } - if (*cmd != CMD_VERIFY && (!options->outfile && argc > 0)) { if (!strcmp(*argv, "-out")) { argv++; @@ -4931,7 +4796,6 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION argc--; } } - if (argc > 0 || (options->nturl && options->ntsurl) || !options->infile || (*cmd != CMD_VERIFY && !options->outfile) || (*cmd == CMD_SIGN && !((options->certfile && options->keyfile) || @@ -4991,7 +4855,7 @@ int main(int argc, char **argv) #ifdef WITH_GSF /* reset Gsf parameters */ memset(&gsfparams, 0, sizeof(GSF_PARAMS)); -#endif +#endif /* WITH_GSF */ if (!get_file_type(indata, options.infile, &type)) goto err_cleanup; @@ -5019,7 +4883,7 @@ int main(int argc, char **argv) ret = msi_verify_file(ole, &options); goto skip_signing; } else { - sig = presign_msi_file(type, cmd, &header, &options, &cparams, indata, + sig = msi_presign_file(type, cmd, &header, &options, &cparams, indata, hash, ole, &gsfparams, &cursig); if (cmd == CMD_REMOVE) { gsf_output_close(GSF_OUTPUT(gsfparams.outole)); @@ -5029,7 +4893,7 @@ int main(int argc, char **argv) goto err_cleanup; } } -#endif +#endif /* WITH_GSF */ if ((type == FILE_TYPE_CAB || type == FILE_TYPE_PE) && (cmd != CMD_VERIFY)) { /* Create outdata file */ @@ -5044,16 +4908,16 @@ int main(int argc, char **argv) (cmd == CMD_REMOVE || cmd == CMD_EXTRACT)) { DO_EXIT_1("CAB file does not have any signature: %s\n", options.infile); } else if (cmd == CMD_EXTRACT) { - ret = extract_cab_file(indata, &header, outdata, options.output_pkcs7); + ret = cab_extract_file(indata, &header, outdata, options.output_pkcs7); goto skip_signing; } else if (cmd == CMD_REMOVE) { - remove_cab_file(indata, &header, filesize, outdata); + cab_remove_file(indata, &header, filesize, outdata); goto skip_signing; } else if (cmd == CMD_VERIFY) { - ret = verify_cab_file(indata, &header, &options); + ret = cab_verify_file(indata, &header, &options); goto skip_signing; } else { - sig = presign_cab_file(type, cmd, &header, &options, &cparams, indata, + sig = cab_presign_file(type, cmd, &header, &options, &cparams, indata, hash, outdata, &cursig); if (!sig) goto err_cleanup; @@ -5062,13 +4926,13 @@ int main(int argc, char **argv) if ((cmd == CMD_REMOVE || cmd == CMD_EXTRACT) && header.sigpos == 0) { DO_EXIT_1("PE file does not have any signature: %s\n", options.infile); } else if (cmd == CMD_EXTRACT) { - ret = extract_pe_file(indata, &header, outdata, options.output_pkcs7); + ret = pe_extract_file(indata, &header, outdata, options.output_pkcs7); goto skip_signing; } else if (cmd == CMD_VERIFY) { - ret = verify_pe_file(indata, &header, &options); + ret = pe_verify_file(indata, &header, &options); goto skip_signing; } else { - sig = presign_pe_file(type, cmd, &header, &options, &cparams, indata, + sig = pe_presign_file(type, cmd, &header, &options, &cparams, indata, hash, outdata, &cursig); if (cmd == CMD_REMOVE) goto skip_signing; @@ -5083,7 +4947,7 @@ int main(int argc, char **argv) DO_EXIT_0("Authenticode timestamping failed\n"); if (options.ntsurl && add_timestamp_rfc3161(sig, &options)) DO_EXIT_0("RFC 3161 timestamping failed\n"); -#endif +#endif /* ENABLE_CURL */ if (options.addBlob && add_unauthenticated_blob(sig)) DO_EXIT_0("Adding unauthenticated blob failed\n"); @@ -5104,7 +4968,7 @@ int main(int argc, char **argv) #else if (!append_signature(sig, cursig, type, cmd, &options, &padlen, &len, outdata)) DO_EXIT_0("Append signature to outfile failed\n"); -#endif +#endif /* WITH_GSF */ PKCS7_free(sig); From a79c0c64265637cfcff21b068e0b7aa55e30655f Mon Sep 17 00:00:00 2001 From: olszomal Date: Wed, 1 Apr 2020 13:25:58 +0200 Subject: [PATCH 27/35] is_indirect_data_signature() --- osslsigncode.c | 29 ++++++++++++++++------------- 1 file changed, 16 insertions(+), 13 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 86b9dbb..a9a6fc6 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -633,6 +633,19 @@ static void tohex(const unsigned char *v, char *b, int len) sprintf(b+i*2, "%02X", v[i]); } +static int is_indirect_data_signature(PKCS7 *p7) +{ + ASN1_OBJECT *indir_objid; + int retval; + + indir_objid = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1); + retval = p7 && PKCS7_type_is_signed(p7) && + !OBJ_cmp(p7->d.sign->contents->type, indir_objid) && + p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE; + ASN1_OBJECT_free(indir_objid); + return retval; +} + #ifdef ENABLE_CURL static int blob_has_nl = 0; @@ -2409,8 +2422,7 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, #endif char hexbuf[EVP_MAX_MD_SIZE*2+1]; - ASN1_OBJECT *indir_objid = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1); - if (p7 && PKCS7_type_is_signed(p7) && !OBJ_cmp(p7->d.sign->contents->type, indir_objid) && p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE) { + if (is_indirect_data_signature(p7)) { ASN1_STRING *astr = p7->d.sign->contents->d.other->value.sequence; const unsigned char *p = astr->data; SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, astr->length); @@ -2421,7 +2433,6 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, } SpcIndirectDataContent_free(idc); } - ASN1_OBJECT_free(indir_objid); } if (mdtype == -1) { printf("Failed to extract current message digest\n\n"); @@ -2942,10 +2953,7 @@ static int pe_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, size_t phlen = 0; BIO *bio = NULL; - ASN1_OBJECT *indir_objid = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1); - if (PKCS7_type_is_signed(p7) && - !OBJ_cmp(p7->d.sign->contents->type, indir_objid) && - p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE) { + if (is_indirect_data_signature(p7)) { ASN1_STRING *astr = p7->d.sign->contents->d.other->value.sequence; const unsigned char *p = astr->data; SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, astr->length); @@ -2958,7 +2966,6 @@ static int pe_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, SpcIndirectDataContent_free(idc); } } - ASN1_OBJECT_free(indir_objid); if (mdtype == -1) { printf("Failed to extract current message digest\n\n"); return -1; @@ -3339,10 +3346,7 @@ static int cab_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, size_t phlen = 0; BIO *bio = NULL; - ASN1_OBJECT *indir_objid = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1); - if (PKCS7_type_is_signed(p7) && - !OBJ_cmp(p7->d.sign->contents->type, indir_objid) && - p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE) { + if (is_indirect_data_signature(p7)) { ASN1_STRING *astr = p7->d.sign->contents->d.other->value.sequence; const unsigned char *p = astr->data; SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, astr->length); @@ -3355,7 +3359,6 @@ static int cab_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, SpcIndirectDataContent_free(idc); } } - ASN1_OBJECT_free(indir_objid); if (mdtype == -1) { printf("Failed to extract current message digest\n\n"); return -1; /* FAILED */ From 26d35cee401cf5e04508890e6e0972c503fee2b5 Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 2 Apr 2020 12:03:06 +0200 Subject: [PATCH 28/35] C89 standard compatibility --- osslsigncode.c | 406 ++++++++++++++++++++++++++++--------------------- 1 file changed, 231 insertions(+), 175 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index a9a6fc6..be46728 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -582,7 +582,7 @@ ASN1_SEQUENCE(TimeStampToken) = { IMPLEMENT_ASN1_FUNCTIONS(TimeStampToken) -static SpcSpOpusInfo* createOpus(const char *desc, const char *url) +static SpcSpOpusInfo *createOpus(const char *desc, const char *url) { SpcSpOpusInfo *info = SpcSpOpusInfo_new(); @@ -591,14 +591,14 @@ static SpcSpOpusInfo* createOpus(const char *desc, const char *url) info->programName->type = 1; info->programName->value.ascii = ASN1_IA5STRING_new(); ASN1_STRING_set((ASN1_STRING *)info->programName->value.ascii, - (const unsigned char*)desc, strlen(desc)); + (const unsigned char*)desc, strlen(desc)); } if (url) { info->moreInfo = SpcLink_new(); info->moreInfo->type = 0; info->moreInfo->value.url = ASN1_IA5STRING_new(); ASN1_STRING_set((ASN1_STRING *)info->moreInfo->value.url, - (const unsigned char*)url, strlen(url)); + (const unsigned char*)url, strlen(url)); } return info; } @@ -709,14 +709,12 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, BIO *bout, *bin, *b64; u_char *p = NULL; int len = 0; - PKCS7_SIGNER_INFO *si = - sk_PKCS7_SIGNER_INFO_value - (sig->d.sign->signer_info, 0); - - if (!url) return -1; + PKCS7_SIGNER_INFO *si; + if (!url) + return -1; + si = sk_PKCS7_SIGNER_INFO_value(sig->d.sign->signer_info, 0); curl = curl_easy_init(); - if (proxy) { curl_easy_setopt(curl, CURLOPT_PROXY, proxy); if (!strncmp("http:", proxy, 5)) @@ -724,10 +722,8 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, if (!strncmp("socks:", proxy, 6)) curl_easy_setopt(curl, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5); } - curl_easy_setopt(curl, CURLOPT_URL, url); /* curl_easy_setopt(curl, CURLOPT_VERBOSE, 42); */ - if (noverifypeer) curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, FALSE); @@ -745,6 +741,7 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, if (rfc3161) { unsigned char mdbuf[EVP_MAX_MD_SIZE]; EVP_MD_CTX *mdctx; + TimeStampReq *req = TimeStampReq_new(); mdctx = EVP_MD_CTX_new(); EVP_DigestInit(mdctx, md); @@ -752,7 +749,6 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, EVP_DigestFinal(mdctx, mdbuf, NULL); EVP_MD_CTX_free(mdctx); - TimeStampReq *req = TimeStampReq_new(); ASN1_INTEGER_set(req->version, 1); req->messageImprint->digestAlgorithm->algorithm = OBJ_nid2obj(EVP_MD_nid(md)); req->messageImprint->digestAlgorithm->parameters = ASN1_TYPE_new(); @@ -788,7 +784,6 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, (void)BIO_flush(bout); OPENSSL_free(p); p = NULL; - len = BIO_get_mem_data(bout, &p); curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, len); @@ -801,20 +796,16 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, curl_write); c = curl_easy_perform(curl); - curl_slist_free_all(slist); BIO_free_all(bout); - if (c) { BIO_free_all(bin); if (verbose) fprintf(stderr, "CURL failure: %s %s\n", curl_easy_strerror(c), url); } else { - (void)BIO_flush(bin); - long http_code = -1; + (void)BIO_flush(bin); curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &http_code); - /* * At this point we could also look at the response body (and perhaps * log it if we fail to decode the response): @@ -824,6 +815,8 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, */ if (rfc3161) { TimeStampResp *reply; + STACK_OF(X509_ATTRIBUTE) *attrs = sk_X509_ATTRIBUTE_new_null(); + (void)BIO_flush(bin); reply = ASN1_item_d2i_bio(ASN1_ITEM_rptr(TimeStampResp), bin, NULL); BIO_free_all(bin); @@ -851,9 +844,7 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, p -= len; TimeStampResp_free(reply); - STACK_OF(X509_ATTRIBUTE) *attrs = sk_X509_ATTRIBUTE_new_null(); - attrs = X509at_add1_attr_by_txt - (&attrs, SPC_RFC3161_OBJID, V_ASN1_SET, p, len); + attrs = X509at_add1_attr_by_txt(&attrs, SPC_RFC3161_OBJID, V_ASN1_SET, p, len); OPENSSL_free(p); PKCS7_set_attributes(si, attrs); sk_X509_ATTRIBUTE_pop_free(attrs, X509_ATTRIBUTE_free); @@ -863,6 +854,7 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, PKCS7_SIGNER_INFO *info; ASN1_STRING *astr; BIO* b64_bin; + b64 = BIO_new(BIO_f_base64()); if (!blob_has_nl) BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL); @@ -957,20 +949,26 @@ static bool on_list(const char *txt, const char *list[]) static void usage(const char *argv0, const char *cmd) { - printf("\nUsage: %s", argv0); const char *cmds_all[] = {"all", NULL}; + const char *cmds_sign[] = {"all", "sign", NULL}; + const char *cmds_add[] = {"all", "add", NULL}; + const char *cmds_attach[] = {"all", "attach-signature", NULL}; + const char *cmds_extract[] = {"all", "extract-signature", NULL}; + const char *cmds_remove[] = {"all", "remove-signature", NULL}; + const char *cmds_verify[] = {"all", "verify", NULL}; + + printf("\nUsage: %s", argv0); if (on_list(cmd, cmds_all)) { printf("\n\n%1s[ --version | -v ]\n", ""); printf("%1s[ --help ]\n\n", ""); } - const char *cmds_sign[] = {"all", "sign", NULL}; if (on_list(cmd, cmds_sign)) { printf("%1s[ sign ] ( -certs -key | -pkcs12 |\n", ""); printf("%12s [ -pkcs11engine ] -pkcs11module -certs -key )\n", ""); printf("%12s[ -pass ", ""); #ifdef PROVIDE_ASKPASS printf("%1s [ -askpass ]", ""); -#endif +#endif /* PROVIDE_ASKPASS */ printf("%1s[ -readpass ]\n", ""); printf("%12s[ -ac ]\n", ""); printf("%12s[ -h {md5,sha1,sha2(56),sha384,sha512} ]\n", ""); @@ -989,7 +987,6 @@ static void usage(const char *argv0, const char *cmd) #endif /* WITH_GSF */ printf("%12s[ -in ] [-out ] \n\n", ""); } - const char *cmds_add[] = {"all", "add", NULL}; if (on_list(cmd, cmds_add)) { printf("%1sadd [-addUnauthenticatedBlob]\n", ""); #ifdef ENABLE_CURL @@ -998,7 +995,6 @@ static void usage(const char *argv0, const char *cmd) #endif /* ENABLE_CURL */ printf("%12s[ -in ] [ -out ] \n\n", ""); } - const char *cmds_attach[] = {"all", "attach-signature", NULL}; if (on_list(cmd, cmds_attach)) { printf("%1sattach-signature [ -sigin ] \n", ""); printf("%12s[ -CAfile ]\n", ""); @@ -1007,16 +1003,12 @@ static void usage(const char *argv0, const char *cmd) printf("%12s[ -nest ]\n", ""); printf("%12s[ -in ] [ -out ] \n\n", ""); } - const char *cmds_extract[] = {"all", "extract-signature", NULL}; if (on_list(cmd, cmds_extract)) { printf("%1sextract-signature [ -pem ]\n", ""); printf("%12s[ -in ] [ -out ] \n\n", ""); } - const char *cmds_remove[] = {"all", "remove-signature", NULL}; if (on_list(cmd, cmds_remove)) printf("%1sremove-signature [ -in ] [ -out ] \n\n", ""); - - const char *cmds_verify[] = {"all", "verify", NULL}; if (on_list(cmd, cmds_verify)) { printf("%1sverify [ -in ] \n", ""); printf("%12s[ -CAfile ]\n", ""); @@ -1032,6 +1024,55 @@ static void usage(const char *argv0, const char *cmd) static void help_for(const char *argv0, const char *cmd) { const char *cmds_all[] = {"all", NULL}; + const char *cmds_add[] = {"add", NULL}; + const char *cmds_attach[] = {"attach-signature", NULL}; + const char *cmds_extract[] = {"extract-signature", NULL}; + const char *cmds_remove[] = {"remove-signature", NULL}; + const char *cmds_sign[] = {"sign", NULL}; + const char *cmds_verify[] = {"verify", NULL}; + const char *cmds_ac[] = {"sign", NULL}; +#ifdef WITH_GSF + const char *cmds_add_msi_dse[] = {"sign", NULL}; +#endif /* WITH_GSF */ + const char *cmds_addUnauthenticatedBlob[] = {"sign", "add", NULL}; +#ifdef PROVIDE_ASKPASS + const char *cmds_askpass[] = {"sign", NULL}; +#endif /* PROVIDE_ASKPASS */ + const char *cmds_CAfile[] = {"attach-signature", "verify", NULL}; + const char *cmds_certs[] = {"sign", NULL}; + const char *cmds_comm[] = {"sign", NULL}; + const char *cmds_CRLfile[] = {"attach-signature", "verify", NULL}; + const char *cmds_h[] = {"sign", NULL}; + const char *cmds_i[] = {"sign", NULL}; + const char *cmds_in[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", "verify", NULL}; + const char *cmds_jp[] = {"sign", NULL}; + const char *cmds_key[] = {"sign", NULL}; + const char *cmds_n[] = {"sign", NULL}; + const char *cmds_nest[] = {"attach-signature", "sign", NULL}; +#ifdef ENABLE_CURL + const char *cmds_noverifypeer[] = {"add", "sign", NULL}; +#endif /* ENABLE_CURL */ + const char *cmds_out[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", NULL}; +#ifdef ENABLE_CURL + const char *cmds_p[] = {"add", "sign", NULL}; +#endif /* ENABLE_CURL */ + const char *cmds_pass[] = {"sign", NULL}; + const char *cmds_pem[] = {"extract-signature", NULL}; + const char *cmds_ph[] = {"sign", NULL}; + const char *cmds_pkcs11engine[] = {"sign", NULL}; + const char *cmds_pkcs11module[] = {"sign", NULL}; + const char *cmds_pkcs12[] = {"sign", NULL}; + const char *cmds_readpass[] = {"sign", NULL}; + const char *cmds_require_leaf_hash[] = {"verify", NULL}; + const char *cmds_sigin[] = {"attach-signature", NULL}; + const char *cmds_st[] = {"sign", NULL}; +#ifdef ENABLE_CURL + const char *cmds_t[] = {"add", "sign", NULL}; + const char *cmds_ts[] = {"add", "sign", NULL}; +#endif /* ENABLE_CURL */ + const char *cmds_untrusted[] = {"attach-signature", "verify", NULL}; + const char *cmds_verbose[] = {"sign", "verify", NULL}; + if (on_list(cmd, cmds_all)) { printf("osslsigncode is a small tool that implements part of the functionality of the Microsoft\n"); printf("tool signtool.exe - more exactly the Authenticode signing and timestamping.\n"); @@ -1049,30 +1090,25 @@ static void help_for(const char *argv0, const char *cmd) printf("%-22s = verifies the digital signature of a file\n\n", "verify"); printf("For help on a specific command, enter %s --help\n", argv0); } - const char *cmds_add[] = {"add", NULL}; if (on_list(cmd, cmds_add)) { printf("\nUse the \"add\" command to add an unauthenticated blob or a timestamp to a previously-signed file.\n\n"); printf("Options:\n"); } - const char *cmds_attach[] = {"attach-signature", NULL}; if (on_list(cmd, cmds_attach)) { printf("\nUse the \"attach-signature\" command to attach the signature stored in the \"sigin\" file.\n"); printf("In order to verify this signature you should specify how to find needed CA or TSA\n"); printf("certificates, if appropriate.\n\n"); printf("Options:\n"); } - const char *cmds_extract[] = {"extract-signature", NULL}; if (on_list(cmd, cmds_extract)) { printf("\nUse the \"extract-signature\" command to extract the embedded signature from a previously-signed file.\n"); printf("DER is the default format of the output file, but can be changed to PEM.\n\n"); printf("Options:\n"); } - const char *cmds_remove[] = {"remove-signature", NULL}; if (on_list(cmd, cmds_remove)) { printf("\nUse the \"remove-signature\" command to remove sections of the embedded signature on a file.\n\n"); printf("Options:\n"); } - const char *cmds_sign[] = {"sign", NULL}; if (on_list(cmd, cmds_sign)) { printf("\nUse the \"sign\" command to sign files using embedded signatures.\n"); printf("Signing protects a file from tampering, and allows users to verify the signer\n"); @@ -1080,7 +1116,6 @@ static void help_for(const char *argv0, const char *cmd) printf("parameters and to select the signing certificate you wish to use.\n\n"); printf("Options:\n"); } - const char *cmds_verify[] = {"verify", NULL}; if (on_list(cmd, cmds_verify)) { printf("\nUse the \"verify\" command to verify embedded signatures.\n"); printf("Verification determines if the signing certificate was issued by a trusted party,\n"); @@ -1089,126 +1124,94 @@ static void help_for(const char *argv0, const char *cmd) printf("and to specify how to find needed CA or TSA certificates, if appropriate.\n\n"); printf("Options:\n"); } - const char *cmds_ac[] = {"sign", NULL}; if (on_list(cmd, cmds_ac)) printf("%-24s= an additional certificate to be added to the signature block\n", "-ac"); #ifdef WITH_GSF - const char *cmds_add_msi_dse[] = {"sign", NULL}; if (on_list(cmd, cmds_add_msi_dse)) printf("%-24s= sign a MSI file with the add-msi-dse option\n", "-add-msi-dse"); #endif /* WITH_GSF */ - const char *cmds_addUnauthenticatedBlob[] = {"sign", "add", NULL}; if (on_list(cmd, cmds_addUnauthenticatedBlob)) printf("%-24s= add an unauthenticated blob to the PE/MSI file\n", "-addUnauthenticatedBlob"); #ifdef PROVIDE_ASKPASS - const char *cmds_askpass[] = {"sign", NULL}; if (on_list(cmd, cmds_askpass)) printf("%-24s= ask for the private key password\n", "-askpass"); #endif /* PROVIDE_ASKPASS */ - const char *cmds_CAfile[] = {"attach-signature", "verify", NULL}; if (on_list(cmd, cmds_CAfile)) printf("%-24s= the file containing one or more trusted certificates in PEM format\n", "-CAfile"); - const char *cmds_certs[] = {"sign", NULL}; if (on_list(cmd, cmds_certs)) printf("%-24s= the signing certificate to use\n", "-certs"); - const char *cmds_comm[] = {"sign", NULL}; if (on_list(cmd, cmds_comm)) printf("%-24s= set commercial purpose (default: individual purpose)\n", "-comm"); - const char *cmds_CRLfile[] = {"attach-signature", "verify", NULL}; if (on_list(cmd, cmds_CRLfile)) printf("%-24s= the file containing one or more CRLs in PEM format\n", "-CRLfile"); - const char *cmds_h[] = {"sign", NULL}; if (on_list(cmd, cmds_h)) { printf("%-24s= {md5|sha1|sha2(56)|sha384|sha512}\n", "-h"); printf("%26sset of cryptographic hash functions\n", ""); } - const char *cmds_i[] = {"sign", NULL}; if (on_list(cmd, cmds_i)) printf("%-24s= specifies a URL for expanded description of the signed content\n", "-i"); - const char *cmds_in[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", "verify", NULL}; if (on_list(cmd, cmds_in)) printf("%-24s= input file\n", "-in"); - const char *cmds_jp[] = {"sign", NULL}; if (on_list(cmd, cmds_jp)) { printf("%-24s= low | medium | high\n", "-jp"); printf("%26slevels of permissions in Microsoft Internet Explorer 4.x for CAB files\n", ""); printf("%26sonly \"low\" level is now supported\n", ""); } - const char *cmds_key[] = {"sign", NULL}; if (on_list(cmd, cmds_key)) printf("%-24s= the private key to use\n", "-key"); - const char *cmds_n[] = {"sign", NULL}; if (on_list(cmd, cmds_n)) printf("%-24s= specifies a description of the signed content\n", "-n"); - const char *cmds_nest[] = {"attach-signature", "sign", NULL}; if (on_list(cmd, cmds_nest)) printf("%-24s= add the new nested signature instead of replacing the first one\n", "-nest"); #ifdef ENABLE_CURL - const char *cmds_noverifypeer[] = {"add", "sign", NULL}; if (on_list(cmd, cmds_noverifypeer)) printf("%-24s= do not verify the Time-Stamp Authority's SSL certificate\n", "-noverifypeer"); #endif /* ENABLE_CURL */ - const char *cmds_out[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", NULL}; if (on_list(cmd, cmds_out)) printf("%-24s= output file\n", "-out"); #ifdef ENABLE_CURL - const char *cmds_p[] = {"add", "sign", NULL}; if (on_list(cmd, cmds_p)) printf("%-24s= proxy to connect to the desired Time-Stamp Authority server\n", "-p"); #endif /* ENABLE_CURL */ - const char *cmds_pass[] = {"sign", NULL}; if (on_list(cmd, cmds_pass)) printf("%-24s= the private key password\n", "-pass"); - const char *cmds_pem[] = {"extract-signature", NULL}; if (on_list(cmd, cmds_pem)) printf("%-24s= output data format PEM to use (default: DER)\n", "-pem"); - const char *cmds_ph[] = {"sign", NULL}; if (on_list(cmd, cmds_ph)) printf("%-24s= generate page hashes for executable files\n", "-ph"); - const char *cmds_pkcs11engine[] = {"sign", NULL}; if (on_list(cmd, cmds_pkcs11engine)) printf("%-24s= PKCS11 engine\n", "-pkcs11engine"); - const char *cmds_pkcs11module[] = {"sign", NULL}; if (on_list(cmd, cmds_pkcs11module)) printf("%-24s= PKCS11 module\n", "-pkcs11module"); - const char *cmds_pkcs12[] = {"sign", NULL}; if (on_list(cmd, cmds_pkcs12)) printf("%-24s= PKCS#12 container with the certificate and the private key\n", "-pkcs12"); - const char *cmds_readpass[] = {"sign", NULL}; if (on_list(cmd, cmds_readpass)) printf("%-24s= the private key password source\n", "-readpass"); - const char *cmds_require_leaf_hash[] = {"verify", NULL}; if (on_list(cmd, cmds_require_leaf_hash)) { printf("%-24s= {md5|sha1|sha2(56)|sha384|sha512}:XXXXXXXXXXXX...\n", "-require-leaf-hash"); printf("%26sspecifies an optional hash algorithm to use when computing\n", ""); printf("%26sthe leaf certificate (in DER form) hash and compares\n", ""); printf("%26sthe provided hash against the computed hash\n", ""); } - const char *cmds_sigin[] = {"attach-signature", NULL}; if (on_list(cmd, cmds_sigin)) printf("%-24s= a file containing the signature to be attached\n", "-sigin"); - const char *cmds_st[] = {"sign", NULL}; if (on_list(cmd, cmds_st)) printf("%-24s= the unix-time to set the signing time\n", "-st"); #ifdef ENABLE_CURL - const char *cmds_t[] = {"add", "sign", NULL}; if (on_list(cmd, cmds_t)) { printf("%-24s= specifies that the digital signature will be timestamped\n", "-t"); printf("%26sby the Time-Stamp Authority (TSA) indicated by the URL\n", ""); printf("%26sthis option cannot be used with the -ts option\n", ""); } - const char *cmds_ts[] = {"add", "sign", NULL}; if (on_list(cmd, cmds_ts)) { printf("%-24s= specifies the URL of the RFC 3161 Time-Stamp Authority server\n", "-ts"); printf("%26sthis option cannot be used with the -t option\n", ""); } #endif /* ENABLE_CURL */ - const char *cmds_untrusted[] = {"attach-signature", "verify", NULL}; if (on_list(cmd, cmds_untrusted)) { printf("%-24s= set of additional untrusted certificates which may be needed\n", "-untrusted"); printf("%26sthe file should contain one or more certificates in PEM format\n", ""); } - const char *cmds_verbose[] = {"sign", "verify", NULL}; if (on_list(cmd, cmds_verbose)) { printf("%-24s= include additional output in the log\n", "-verbose"); } @@ -1240,7 +1243,7 @@ static void help_for(const char *argv0, const char *cmd) typedef enum { FILE_TYPE_CAB, FILE_TYPE_PE, - FILE_TYPE_MSI, + FILE_TYPE_MSI } file_type_t; typedef enum { @@ -1249,7 +1252,7 @@ typedef enum { CMD_REMOVE, CMD_VERIFY, CMD_ADD, - CMD_ATTACH, + CMD_ATTACH } cmd_type_t; @@ -1277,33 +1280,40 @@ static const unsigned char classid_page_hash[] = { static unsigned char *pe_calc_page_hash(char *indata, size_t header_size, int pe32plus, size_t sigpos, int phtype, size_t *rphlen) { - unsigned short nsections = GET_UINT16_LE(indata + header_size + 6); - size_t pagesize = GET_UINT32_LE(indata + header_size + 56); - size_t hdrsize = GET_UINT32_LE(indata + header_size + 84); - const EVP_MD *md = EVP_get_digestbynid(phtype); - int pphlen = 4 + EVP_MD_size(md); - int phlen = pphlen * (3 + nsections + sigpos / pagesize); - unsigned char *res = OPENSSL_malloc(phlen); - unsigned char *zeroes = OPENSSL_zalloc(pagesize); + unsigned short nsections, sizeofopthdr; + size_t pagesize, hdrsize; + size_t rs, ro, l, lastpos = 0; + int pphlen, phlen, i, pi = 1; + unsigned char *res, *zeroes; + char *sections; + const EVP_MD *md; EVP_MD_CTX *mdctx; + nsections = GET_UINT16_LE(indata + header_size + 6); + pagesize = GET_UINT32_LE(indata + header_size + 56); + hdrsize = GET_UINT32_LE(indata + header_size + 84); + md = EVP_get_digestbynid(phtype); + pphlen = 4 + EVP_MD_size(md); + phlen = pphlen * (3 + nsections + sigpos / pagesize); + + res = OPENSSL_malloc(phlen); + zeroes = OPENSSL_zalloc(pagesize); + mdctx = EVP_MD_CTX_new(); EVP_DigestInit(mdctx, md); EVP_DigestUpdate(mdctx, indata, header_size + 88); EVP_DigestUpdate(mdctx, indata + header_size + 92, 60 + pe32plus*16); - EVP_DigestUpdate(mdctx, indata + header_size + 160 + pe32plus*16, hdrsize - (header_size + 160 + pe32plus*16)); + EVP_DigestUpdate(mdctx, indata + header_size + 160 + pe32plus*16, + hdrsize - (header_size + 160 + pe32plus*16)); EVP_DigestUpdate(mdctx, zeroes, pagesize - hdrsize); memset(res, 0, 4); EVP_DigestFinal(mdctx, res + 4, NULL); - unsigned short sizeofopthdr = GET_UINT16_LE(indata + header_size + 20); - char *sections = indata + header_size + 24 + sizeofopthdr; - int i, pi = 1; - size_t lastpos = 0; + sizeofopthdr = GET_UINT16_LE(indata + header_size + 20); + sections = indata + header_size + 24 + sizeofopthdr; for (i=0; iheader_size, header->pe32plus, header->fileend, phtype, &phlen); + ph = pe_calc_page_hash(indata, header->header_size, header->pe32plus, \ + header->fileend, phtype, &phlen); if (!ph) { fprintf(stderr, "Failed to calculate page hash\n"); exit(-1); @@ -1352,7 +1364,7 @@ static SpcLink *get_page_hash_link(int phtype, char *indata, FILE_HEADER *header ASN1_OCTET_STRING_set(tostr->value.octet_string, ph, phlen); OPENSSL_free(ph); - STACK_OF(ASN1_TYPE) *oset = sk_ASN1_TYPE_new_null(); + oset = sk_ASN1_TYPE_new_null(); sk_ASN1_TYPE_push(oset, tostr); l = i2d_ASN1_SET_ANY(oset, NULL); tmp = p = OPENSSL_malloc(l); @@ -1361,7 +1373,8 @@ static SpcLink *get_page_hash_link(int phtype, char *indata, FILE_HEADER *header sk_ASN1_TYPE_free(oset); aval = SpcAttributeTypeAndOptionalValue_new(); - aval->type = OBJ_txt2obj((phtype == NID_sha1) ? SPC_PE_IMAGE_PAGE_HASHES_V1 : SPC_PE_IMAGE_PAGE_HASHES_V2, 1); + aval->type = OBJ_txt2obj((phtype == NID_sha1) ? \ + SPC_PE_IMAGE_PAGE_HASHES_V1 : SPC_PE_IMAGE_PAGE_HASHES_V2, 1); aval->value = ASN1_TYPE_new(); aval->value->type = V_ASN1_SET; aval->value->value.set = ASN1_STRING_new(); @@ -1378,7 +1391,7 @@ static SpcLink *get_page_hash_link(int phtype, char *indata, FILE_HEADER *header ASN1_STRING_set(taval->value.sequence, p, l); OPENSSL_free(p); - STACK_OF(ASN1_TYPE) *aset = sk_ASN1_TYPE_new_null(); + aset = sk_ASN1_TYPE_new_null(); sk_ASN1_TYPE_push(aset, taval); l = i2d_ASN1_SET_ANY(aset, NULL); tmp = p = OPENSSL_malloc(l); @@ -1405,9 +1418,6 @@ static void get_indirect_data_blob(u_char **blob, int *len, GLOBAL_OPTIONS *opti void *hash; ASN1_OBJECT *dtype; SpcIndirectDataContent *idc; - SpcLink *link; - SpcPeImageData *pid; - SpcSipInfo *si; static const unsigned char msistr[] = { 0xf1, 0x10, 0x0c, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x46 @@ -1418,7 +1428,7 @@ static void get_indirect_data_blob(u_char **blob, int *len, GLOBAL_OPTIONS *opti idc->data->value->type = V_ASN1_SEQUENCE; idc->data->value->value.sequence = ASN1_STRING_new(); if (type == FILE_TYPE_CAB) { - link = get_obsolete_link(); + SpcLink *link = get_obsolete_link(); l = i2d_SpcLink(link, NULL); p = OPENSSL_malloc(l); i2d_SpcLink(link, &p); @@ -1426,7 +1436,7 @@ static void get_indirect_data_blob(u_char **blob, int *len, GLOBAL_OPTIONS *opti dtype = OBJ_txt2obj(SPC_CAB_DATA_OBJID, 1); SpcLink_free(link); } else if (type == FILE_TYPE_PE) { - pid = SpcPeImageData_new(); + SpcPeImageData *pid = SpcPeImageData_new(); ASN1_BIT_STRING_set(pid->flags, (unsigned char*)"0", 0); if (options->pagehash) { phtype = NID_sha1; @@ -1443,7 +1453,7 @@ static void get_indirect_data_blob(u_char **blob, int *len, GLOBAL_OPTIONS *opti dtype = OBJ_txt2obj(SPC_PE_IMAGE_DATA_OBJID, 1); SpcPeImageData_free(pid); } else if (type == FILE_TYPE_MSI) { - si = SpcSipInfo_new(); + SpcSipInfo *si = SpcSipInfo_new(); ASN1_INTEGER_set(si->a, 1); ASN1_INTEGER_set(si->b, 0); ASN1_INTEGER_set(si->c, 0); @@ -1582,7 +1592,13 @@ static void pe_recalc_checksum(BIO *bio, FILE_HEADER *header) static int verify_leaf_hash(X509 *leaf, const char *leafhash) { int ret = 0; - unsigned char *mdbuf = NULL; + unsigned char *mdbuf = NULL, *certbuf, *tmp; + unsigned char cmdbuf[EVP_MAX_MD_SIZE]; + char hexbuf[EVP_MAX_MD_SIZE*2+1]; + const EVP_MD *md; + long mdlen = 0; + EVP_MD_CTX *ctx; + size_t certlen; /* decode the provided hash */ char *mdid = OPENSSL_strdup(leafhash); @@ -1593,13 +1609,12 @@ static int verify_leaf_hash(X509 *leaf, const char *leafhash) goto out; } *hash++ = '\0'; - const EVP_MD *md = EVP_get_digestbyname(mdid); + md = EVP_get_digestbyname(mdid); if (md == NULL) { printf("Unable to lookup digest by name '%s'\n", mdid); ret = 1; goto out; } - long mdlen = 0; mdbuf = OPENSSL_hexstr2buf(hash, &mdlen); if (mdlen != EVP_MD_size(md)) { printf("Hash length mismatch: '%s' digest must be %d bytes long (got %ld bytes)\n", @@ -1608,21 +1623,19 @@ static int verify_leaf_hash(X509 *leaf, const char *leafhash) goto out; } /* compute the leaf certificate hash */ - EVP_MD_CTX *ctx = EVP_MD_CTX_create(); + ctx = EVP_MD_CTX_create(); EVP_DigestInit_ex(ctx, md, NULL); - size_t certlen = i2d_X509(leaf, NULL); - unsigned char *certbuf = OPENSSL_malloc(certlen); - unsigned char *tmp = certbuf; + certlen = i2d_X509(leaf, NULL); + certbuf = OPENSSL_malloc(certlen); + tmp = certbuf; i2d_X509(leaf, &tmp); EVP_DigestUpdate(ctx, certbuf, certlen); OPENSSL_free(certbuf); - unsigned char cmdbuf[EVP_MAX_MD_SIZE]; EVP_DigestFinal_ex(ctx, cmdbuf, NULL); EVP_MD_CTX_destroy(ctx); /* compare the provided hash against the computed hash */ if (memcmp(mdbuf, cmdbuf, EVP_MD_size(md))) { - char hexbuf[EVP_MAX_MD_SIZE*2+1]; tohex(cmdbuf, hexbuf, EVP_MD_size(md)); printf("Hash value mismatch: %s computed\n", hexbuf); ret = 1; @@ -1699,6 +1712,7 @@ static int print_certs(PKCS7 *p7) { X509 *cert; int i, count; + count = sk_X509_num(p7->d.sign->cert); printf("\nNumber of certificates: %d\n", count); for (i=0; isigner_info, 0); @@ -2006,11 +2019,16 @@ static int TST_verify(PKCS7 *tmstamp_p7, PKCS7_SIGNER_INFO *si) static PKCS7 *pkcs7_get_nested_signature(PKCS7 *p7, int *has_sig) { PKCS7 *ret = NULL; - PKCS7_SIGNER_INFO *si = sk_PKCS7_SIGNER_INFO_value(p7->d.sign->signer_info, 0); - ASN1_TYPE *nestedSignature = PKCS7_get_attribute(si, OBJ_txt2nid(SPC_NESTED_SIGNATURE_OBJID)); + PKCS7_SIGNER_INFO *si; + ASN1_TYPE *nestedSignature; + ASN1_STRING *astr; + const unsigned char *p; + + si = sk_PKCS7_SIGNER_INFO_value(p7->d.sign->signer_info, 0); + nestedSignature = PKCS7_get_attribute(si, OBJ_txt2nid(SPC_NESTED_SIGNATURE_OBJID)); if (nestedSignature) { - ASN1_STRING *astr = nestedSignature->value.sequence; - const unsigned char *p = astr->data; + astr = nestedSignature->value.sequence; + p = astr->data; ret = d2i_PKCS7(NULL, &p, astr->length); } if (has_sig) @@ -2026,17 +2044,19 @@ static int pkcs7_set_nested_signature(PKCS7 *p7, PKCS7 *p7nest, time_t signing_t { u_char *p = NULL; int len = 0; + ASN1_STRING *astr; + PKCS7_SIGNER_INFO *si; if (((len = i2d_PKCS7(p7nest, NULL)) <= 0) || (p = OPENSSL_malloc(len)) == NULL) return 0; i2d_PKCS7(p7nest, &p); p -= len; - ASN1_STRING *astr = ASN1_STRING_new(); + astr = ASN1_STRING_new(); ASN1_STRING_set(astr, p, len); OPENSSL_free(p); - PKCS7_SIGNER_INFO *si = sk_PKCS7_SIGNER_INFO_value(p7->d.sign->signer_info, 0); + si = sk_PKCS7_SIGNER_INFO_value(p7->d.sign->signer_info, 0); pkcs7_add_signing_time(si, signing_time); if (PKCS7_add_attribute(si, OBJ_txt2nid(SPC_NESTED_SIGNATURE_OBJID), V_ASN1_SEQUENCE, astr) == 0) return 0; @@ -2295,8 +2315,12 @@ static gboolean msi_prehash_utf16_name(gchar *name, BIO *hash) static gboolean msi_prehash(GsfInfile *infile, gchar *dirname, BIO *hash) { GSList *sorted = NULL; - guint8 classid[16]; - guint8 zeroes[8]; + guint8 classid[16], zeroes[8]; + gchar *name; + GsfInput *child; + gboolean is_dir; + gsf_off_t size; + guint32 sizebuf; memset(&zeroes, 0, sizeof(zeroes)); gsf_infile_msole_get_class_id(GSF_INFILE_MSOLE(infile), classid); @@ -2318,11 +2342,11 @@ static gboolean msi_prehash(GsfInfile *infile, gchar *dirname, BIO *hash) } sorted = msi_sorted_infile_children(infile); for (; sorted; sorted = sorted->next) { - gchar *name = (gchar*)sorted->data; - GsfInput *child = gsf_infile_child_by_name(infile, name); + name = (gchar*)sorted->data; + child = gsf_infile_child_by_name(infile, name); if (child == NULL) continue; - gboolean is_dir = GSF_IS_INFILE(child) && gsf_infile_num_children(GSF_INFILE(child)) > 0; + is_dir = GSF_IS_INFILE(child) && gsf_infile_num_children(GSF_INFILE(child)) > 0; if (is_dir) { if (!msi_prehash(GSF_INFILE(child), name, hash)) return FALSE; @@ -2332,8 +2356,8 @@ static gboolean msi_prehash(GsfInfile *infile, gchar *dirname, BIO *hash) /* * File size. */ - gsf_off_t size = gsf_input_remaining(child); - guint32 sizebuf = GUINT32_TO_LE((guint32)size); + size = gsf_input_remaining(child); + sizebuf = GUINT32_TO_LE((guint32)size); BIO_write(hash, &sizebuf, sizeof(sizebuf)); /* * Reserved - must be 0. Corresponds to @@ -2367,6 +2391,12 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash) { guint8 classid[16]; GSList *sorted = NULL; + gchar *name; + GsfInput *child; + GsfOutput *outchild = NULL; + gboolean is_dir; + gsf_off_t size; + guint8 const *data; gsf_infile_msole_get_class_id(GSF_INFILE_MSOLE(infile), classid); if (outole != NULL) @@ -2374,12 +2404,11 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash) sorted = msi_sorted_infile_children(infile); for (; sorted; sorted = sorted->next) { - gchar *name = (gchar*)sorted->data; - GsfInput *child = gsf_infile_child_by_name(infile, name); + name = (gchar*)sorted->data; + child = gsf_infile_child_by_name(infile, name); if (child == NULL) continue; - gboolean is_dir = GSF_IS_INFILE(child) && gsf_infile_num_children(GSF_INFILE(child)) > 0; - GsfOutput *outchild = NULL; + is_dir = GSF_IS_INFILE(child) && gsf_infile_num_children(GSF_INFILE(child)) > 0; if (outole != NULL) outchild = gsf_outfile_new_child(outole, name, is_dir); if (is_dir) { @@ -2388,8 +2417,8 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash) } } else { while (gsf_input_remaining(child) > 0) { - gsf_off_t size = MIN(gsf_input_remaining(child), 4096); - guint8 const *data = gsf_input_read(child, size, NULL); + size = MIN(gsf_input_remaining(child), 4096); + data = gsf_input_read(child, size, NULL); BIO_write(hash, data, size); if (outchild != NULL && !gsf_output_write(outchild, size, data)) { return FALSE; @@ -2413,7 +2442,7 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash) static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, size_t exlen, int allownest, GLOBAL_OPTIONS *options) { - int ret = 0; + int ret = 0, mdok, exok; int mdtype = -1; unsigned char mdbuf[EVP_MAX_MD_SIZE]; unsigned char cmdbuf[EVP_MAX_MD_SIZE]; @@ -2421,6 +2450,8 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, unsigned char cexmdbuf[EVP_MAX_MD_SIZE]; #endif char hexbuf[EVP_MAX_MD_SIZE*2+1]; + const EVP_MD *md; + BIO *hash, *prehash; if (is_indirect_data_signature(p7)) { ASN1_STRING *astr = p7->d.sign->contents->d.other->value.sequence; @@ -2445,8 +2476,8 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, goto out; } printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype)); - const EVP_MD *md = EVP_get_digestbynid(mdtype); - BIO *hash = BIO_new(BIO_f_md()); + md = EVP_get_digestbynid(mdtype); + hash = BIO_new(BIO_f_md()); BIO_set_md(hash, md); BIO_push(hash, BIO_new(BIO_s_null())); if (exdata) { @@ -2463,7 +2494,7 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, * file content hashes ourselves. */ #ifdef GSF_CAN_READ_MSI_METADATA - BIO *prehash = BIO_new(BIO_f_md()); + prehash = BIO_new(BIO_f_md()); BIO_set_md(prehash, md); BIO_push(prehash, BIO_new(BIO_s_null())); @@ -2483,8 +2514,9 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, } BIO_gets(hash, (char*)cmdbuf, EVP_MAX_MD_SIZE); tohex(cmdbuf, hexbuf, EVP_MD_size(md)); - int mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); - if (!mdok) ret = 1; + mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); + if (!mdok) + ret = 1; /* FAILED */ printf("Calculated DigitalSignature : %s", hexbuf); if (mdok) { printf("\n"); @@ -2496,8 +2528,9 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile, unsigned char *exdata, #ifdef GSF_CAN_READ_MSI_METADATA if (exdata) { tohex(cexmdbuf, hexbuf, EVP_MD_size(md)); - int exok = !memcmp(exdata, cexmdbuf, MIN((size_t)EVP_MD_size(md), exlen)); - if (!exok) ret = 1; + exok = !memcmp(exdata, cexmdbuf, MIN((size_t)EVP_MD_size(md), exlen)); + if (!exok) + ret = 1; /* FAILED */ printf("Calculated MsiDigitalSignatureEx : %s", hexbuf); if (exok) { printf("\n"); @@ -2532,17 +2565,19 @@ out: */ static int msi_verify_file(GsfInfile *infile, GLOBAL_OPTIONS *options) { - GsfInput *sig = NULL; - GsfInput *exsig = NULL; + GsfInput *child, *sig = NULL, *exsig = NULL; unsigned char *exdata = NULL; unsigned char *indata = NULL; gchar decoded[0x40]; int i, ret = 0; PKCS7 *p7 = NULL; + const guint8 *name; + unsigned long inlen, exlen = 0; + const unsigned char *blob; for (i = 0; i < gsf_infile_num_children(infile); i++) { - GsfInput *child = gsf_infile_child_by_index(infile, i); - const guint8 *name = (const guint8*)gsf_input_name(child); + child = gsf_infile_child_by_index(infile, i); + name = (const guint8*)gsf_input_name(child); msi_decode(name, decoded); if (!g_strcmp0(decoded, "\05DigitalSignature")) sig = child; @@ -2554,13 +2589,12 @@ static int msi_verify_file(GsfInfile *infile, GLOBAL_OPTIONS *options) ret = 1; goto out; } - unsigned long inlen = (unsigned long) gsf_input_remaining(sig); + inlen = (unsigned long) gsf_input_remaining(sig); indata = OPENSSL_malloc(inlen); if (gsf_input_read(sig, inlen, indata) == NULL) { ret = 1; goto out; } - unsigned long exlen = 0; if (exsig != NULL) { exlen = (unsigned long) gsf_input_remaining(exsig); exdata = OPENSSL_malloc(exlen); @@ -2569,7 +2603,7 @@ static int msi_verify_file(GsfInfile *infile, GLOBAL_OPTIONS *options) goto out; } } - const unsigned char *blob = (unsigned char *)indata; + blob = (unsigned char *)indata; p7 = d2i_PKCS7(NULL, &blob, inlen); ret = msi_verify_pkcs7(p7, infile, exdata, exlen, 1, options); @@ -2690,16 +2724,18 @@ out: static PKCS7 *msi_extract_signature_to_pkcs7(GsfInfile *infile) { - GsfInput *sig = NULL; + GsfInput *sig = NULL, *child; + const guint8 *name; gchar decoded[0x40]; PKCS7 *p7 = NULL; u_char *buf = NULL; gsf_off_t size = 0; int i = 0; + const unsigned char *p7buf; for (i = 0; i < gsf_infile_num_children(infile); i++) { - GsfInput *child = gsf_infile_child_by_index(infile, i); - const guint8 *name = (const guint8*)gsf_input_name(child); + child = gsf_infile_child_by_index(infile, i); + name = (const guint8*)gsf_input_name(child); msi_decode(name, decoded); if (!g_strcmp0(decoded, "\05DigitalSignature")) sig = child; @@ -2710,7 +2746,7 @@ static PKCS7 *msi_extract_signature_to_pkcs7(GsfInfile *infile) buf = OPENSSL_malloc(size); if (gsf_input_read(sig, size, buf) == NULL) goto out; - const unsigned char *p7buf = buf; + p7buf = buf; p7 = d2i_PKCS7(NULL, &p7buf, size); out: @@ -2862,6 +2898,8 @@ static void pe_calc_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, FIL { static unsigned char bfb[16*1024*1024]; EVP_MD_CTX *mdctx; + size_t n; + int l; mdctx = EVP_MD_CTX_new(); EVP_DigestInit(mdctx, md); @@ -2876,12 +2914,12 @@ static void pe_calc_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, FIL EVP_DigestUpdate(mdctx, bfb, 60 + header->pe32plus * 16); BIO_read(bio, bfb, 8); - size_t n = header->header_size + 88 + 4 + 60 + header->pe32plus * 16 + 8; + n = header->header_size + 88 + 4 + 60 + header->pe32plus * 16 + 8; while (n < header->sigpos) { size_t want = header->sigpos - n; if (want > sizeof(bfb)) want = sizeof(bfb); - int l = BIO_read(bio, bfb, want); + l = BIO_read(bio, bfb, want); if (l <= 0) break; EVP_DigestUpdate(mdctx, bfb, l); @@ -2894,31 +2932,35 @@ static void pe_calc_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, FIL static void pe_extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, unsigned char **ph, size_t *phlen, int *phtype) { - *phlen = 0; + const unsigned char *blob; + SpcPeImageData *id; + SpcSerializedObject *so; + size_t l, l2; + char buf[128]; - const unsigned char *blob = obj->value->value.sequence->data; - SpcPeImageData *id = d2i_SpcPeImageData(NULL, &blob, obj->value->value.sequence->length); + *phlen = 0; + blob = obj->value->value.sequence->data; + id = d2i_SpcPeImageData(NULL, &blob, obj->value->value.sequence->length); if (id == NULL) return; if (id->file->type != 1) { SpcPeImageData_free(id); return; } - SpcSerializedObject *so = id->file->value.moniker; + so = id->file->value.moniker; if (so->classId->length != sizeof(classid_page_hash) || memcmp(so->classId->data, classid_page_hash, sizeof (classid_page_hash))) { SpcPeImageData_free(id); return; } /* skip ASN.1 SET hdr */ - size_t l = asn1_simple_hdr_len(so->serializedData->data, so->serializedData->length); + l = asn1_simple_hdr_len(so->serializedData->data, so->serializedData->length); blob = so->serializedData->data + l; obj = d2i_SpcAttributeTypeAndOptionalValue(NULL, &blob, so->serializedData->length - l); SpcPeImageData_free(id); if (!obj) return; - char buf[128]; *phtype = 0; buf[0] = 0x00; OBJ_obj2txt(buf, sizeof(buf), obj->type, 1); @@ -2931,7 +2973,7 @@ static void pe_extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, return; } /* Skip ASN.1 SET hdr */ - size_t l2 = asn1_simple_hdr_len(obj->value->value.sequence->data, obj->value->value.sequence->length); + l2 = asn1_simple_hdr_len(obj->value->value.sequence->data, obj->value->value.sequence->length); /* Skip ASN.1 OCTET STRING hdr */ l = asn1_simple_hdr_len(obj->value->value.sequence->data + l2, obj->value->value.sequence->length - l2); l += l2; @@ -2944,7 +2986,7 @@ static void pe_extract_page_hash(SpcAttributeTypeAndOptionalValue *obj, static int pe_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, int allownest, GLOBAL_OPTIONS *options) { - int ret = 0; + int ret = 0, mdok; int mdtype = -1, phtype = -1; unsigned char mdbuf[EVP_MAX_MD_SIZE]; unsigned char cmdbuf[EVP_MAX_MD_SIZE]; @@ -2952,6 +2994,7 @@ static int pe_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, unsigned char *ph = NULL; size_t phlen = 0; BIO *bio = NULL; + const EVP_MD *md; if (is_indirect_data_signature(p7)) { ASN1_STRING *astr = p7->d.sign->contents->d.other->value.sequence; @@ -2972,7 +3015,7 @@ static int pe_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, } printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype)); - const EVP_MD *md = EVP_get_digestbynid(mdtype); + md = EVP_get_digestbynid(mdtype); tohex(mdbuf, hexbuf, EVP_MD_size(md)); printf("Current message digest : %s\n", hexbuf); @@ -2980,19 +3023,23 @@ static int pe_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, pe_calc_digest(bio, md, cmdbuf, header); BIO_free(bio); tohex(cmdbuf, hexbuf, EVP_MD_size(md)); - int mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); - if (!mdok) ret = 1; + mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); + if (!mdok) + ret = 1; /* FAILED */ printf("Calculated message digest : %s%s\n\n", hexbuf, mdok?"":" MISMATCH!!!"); if (phlen > 0) { + size_t cphlen = 0; + unsigned char *cph; + printf("Page hash algorithm : %s\n", OBJ_nid2sn(phtype)); tohex(ph, hexbuf, (phlen < 32) ? phlen : 32); printf("Page hash : %s ...\n", hexbuf); - size_t cphlen = 0; - unsigned char *cph = pe_calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &cphlen); + cph = pe_calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &cphlen); tohex(cph, hexbuf, (cphlen < 32) ? cphlen : 32); mdok = (phlen != cphlen) || memcmp(ph, cph, phlen); - if (mdok) ret = 1; + if (mdok) + ret = 1; /* FAILED */ printf("Calculated page hash : %s ...%s\n\n", hexbuf, mdok ? " MISMATCH!!!":""); OPENSSL_free(ph); OPENSSL_free(cph); @@ -3043,13 +3090,16 @@ static PKCS7 *pe_extract_existing_pkcs7(char *indata, FILE_HEADER *header) static int pe_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options) { int ret = 0; + BIO *bio; + unsigned int real_pe_checksum; + PKCS7 *p7; if (header->siglen == 0) header->siglen = header->fileend; printf("Current PE checksum : %08X\n", header->pe_checksum); - BIO *bio = BIO_new_mem_buf(indata, header->sigpos + header->siglen); - unsigned int real_pe_checksum = pe_calc_checksum(bio, header); + bio = BIO_new_mem_buf(indata, header->sigpos + header->siglen); + real_pe_checksum = pe_calc_checksum(bio, header); BIO_free(bio); if (header->pe_checksum && header->pe_checksum != real_pe_checksum) ret = 1; @@ -3059,7 +3109,7 @@ static int pe_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *opt printf("No signature found\n\n"); return 1; } - PKCS7 *p7 = pe_extract_existing_pkcs7(indata, header); + p7 = pe_extract_existing_pkcs7(indata, header); if (!p7) { printf("Failed to extract PKCS7 data\n\n"); return -1; @@ -3227,9 +3277,10 @@ static int cab_calc_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, siz size_t coffFiles, nfolders, flags; static unsigned char bfb[16*1024*1024]; EVP_MD_CTX *mdctx; + int l; + mdctx = EVP_MD_CTX_new(); EVP_DigestInit(mdctx, md); - memset(mdbuf, 0, EVP_MAX_MD_SIZE); (void)BIO_seek(bio, 0); @@ -3322,7 +3373,7 @@ static int cab_calc_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, siz size_t want = offset - coffFiles; if (want > sizeof(bfb)) want = sizeof(bfb); - int l = BIO_read(bio, bfb, want); + l = BIO_read(bio, bfb, want); if (l <= 0) break; EVP_DigestUpdate(mdctx, bfb, l); @@ -3337,7 +3388,7 @@ static int cab_calc_digest(BIO *bio, const EVP_MD *md, unsigned char *mdbuf, siz static int cab_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, int allownest, GLOBAL_OPTIONS *options) { - int ret = 0; + int ret = 0, mdok; int mdtype = -1, phtype = -1; unsigned char mdbuf[EVP_MAX_MD_SIZE]; unsigned char cmdbuf[EVP_MAX_MD_SIZE]; @@ -3345,6 +3396,7 @@ static int cab_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, unsigned char *ph = NULL; size_t phlen = 0; BIO *bio = NULL; + const EVP_MD *md; if (is_indirect_data_signature(p7)) { ASN1_STRING *astr = p7->d.sign->contents->d.other->value.sequence; @@ -3365,7 +3417,7 @@ static int cab_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, } printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype)); - const EVP_MD *md = EVP_get_digestbynid(mdtype); + md = EVP_get_digestbynid(mdtype); tohex(mdbuf, hexbuf, EVP_MD_size(md)); printf("Current message digest : %s\n", hexbuf); @@ -3374,7 +3426,7 @@ static int cab_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, BIO_free(bio); tohex(cmdbuf, hexbuf, EVP_MD_size(md)); - int mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); + mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md)); if (!mdok) ret = 1; /* FAILED */ printf("Calculated message digest : %s%s\n\n", hexbuf, mdok?"":" MISMATCH!!!"); @@ -3409,8 +3461,8 @@ static PKCS7 *cab_extract_existing_pkcs7(char *indata, FILE_HEADER *header) static int cab_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options) { - PKCS7 *p7; int ret = 0; + PKCS7 *p7; if (header->header_size != 20) { printf("No signature found\n\n"); @@ -4140,7 +4192,7 @@ static char *getpassword(const char *prompt) { #ifdef HAVE_TERMIOS_H struct termios ofl, nfl; - char *p, passbuf[1024]; + char *p, passbuf[1024], *pass; fputs(prompt, stdout); @@ -4161,7 +4213,7 @@ static char *getpassword(const char *prompt) return NULL; } passbuf[strlen(passbuf)-1] = 0x00; - char *pass = strdup(passbuf); + pass = strdup(passbuf); memset(passbuf, 0, sizeof(passbuf)); return pass; #else @@ -4740,7 +4792,7 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION curl_version() #else "no libcurl available" -#endif +#endif /* ENABLE_CURL */ ); printf( #ifdef WITH_GSF @@ -4750,7 +4802,7 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION libgsf_micro_version #else "\tno libgsf available\n" -#endif +#endif /* WITH_GSF */ ); printf("\nPlease send bug-reports to " PACKAGE_BUGREPORT @@ -4799,7 +4851,11 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION argc--; } } - if (argc > 0 || (options->nturl && options->ntsurl) || !options->infile || + if (argc > 0 || +#ifdef ENABLE_CURL + (options->nturl && options->ntsurl) || +#endif + !options->infile || (*cmd != CMD_VERIFY && !options->outfile) || (*cmd == CMD_SIGN && !((options->certfile && options->keyfile) || options->pkcs12file || options->p11module))) { From 1e4681980f7615fdd25bc4ee20c43216e429971a Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 2 Apr 2020 12:18:37 +0200 Subject: [PATCH 29/35] print osslsigncode version and usage --- osslsigncode.c | 44 ++++++++++++++++++++++---------------------- tests/testall.sh | 2 +- 2 files changed, 23 insertions(+), 23 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index be46728..8ea83cc 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -4638,6 +4638,28 @@ static cmd_type_t get_command(char **argv) #endif ); help_for(argv[0], "all"); + } else if (!strcmp(argv[1], "-v") || !strcmp(argv[1], "--version")) { + printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n", + SSLeay_version(SSLEAY_VERSION), +#ifdef ENABLE_CURL + curl_version() +#else + "no libcurl available" +#endif /* ENABLE_CURL */ + ); + printf( +#ifdef WITH_GSF + "\tlibgsf %d.%d.%d\n", + libgsf_major_version, + libgsf_minor_version, + libgsf_micro_version +#else + "\tno libgsf available\n" +#endif /* WITH_GSF */ + ); + printf("\nPlease send bug-reports to " + PACKAGE_BUGREPORT + "\n"); } else if (!strcmp(argv[1], "sign")) return CMD_SIGN; else if (!strcmp(argv[1], "extract-signature")) @@ -4785,28 +4807,6 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION } else if ((*cmd == CMD_VERIFY) && !strcmp(*argv, "-require-leaf-hash")) { if (--argc < 1) usage(argv0, "all"); options->leafhash = (*++argv); - } else if (!strcmp(*argv, "-v") || !strcmp(*argv, "--version")) { - printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n", - SSLeay_version(SSLEAY_VERSION), -#ifdef ENABLE_CURL - curl_version() -#else - "no libcurl available" -#endif /* ENABLE_CURL */ - ); - printf( -#ifdef WITH_GSF - "\tlibgsf %d.%d.%d\n", - libgsf_major_version, - libgsf_minor_version, - libgsf_micro_version -#else - "\tno libgsf available\n" -#endif /* WITH_GSF */ - ); - printf("\nPlease send bug-reports to " - PACKAGE_BUGREPORT - "\n"); } else if ((*cmd == CMD_ADD) && !strcmp(*argv, "--help")) { help_for(argv0, "add"); } else if ((*cmd == CMD_ATTACH) && !strcmp(*argv, "--help")) { diff --git a/tests/testall.sh b/tests/testall.sh index f14ca22..1e855f9 100755 --- a/tests/testall.sh +++ b/tests/testall.sh @@ -91,7 +91,7 @@ if grep -q "no libgsf available" "results.log" # Timestamping support if grep -q "no libcurl available" "results.log" then - printf "%s\n" "configure --with_curl is required for timestamping support" + printf "%s\n" "configure --with-curl is required for timestamping support" fi # Tests requirements From 7c39f73ff6809e3ff4cfb272a469596b50fe2d88 Mon Sep 17 00:00:00 2001 From: olszomal Date: Fri, 3 Apr 2020 11:44:56 +0200 Subject: [PATCH 30/35] memory cleanup --- osslsigncode.c | 182 ++++++++++++++++++++++++++----------------------- 1 file changed, 96 insertions(+), 86 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 8ea83cc..b0a10d5 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -712,7 +712,7 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, PKCS7_SIGNER_INFO *si; if (!url) - return -1; + return 1; si = sk_PKCS7_SIGNER_INFO_value(sig->d.sign->signer_info, 0); curl = curl_easy_init(); if (proxy) { @@ -823,13 +823,13 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, if (!reply) { if (verbose) print_timestamp_error(url, http_code); - return -1; + return 1; } if (ASN1_INTEGER_get(reply->status->status) != 0) { if (verbose) fprintf(stderr, "Timestamping failed: %ld\n", ASN1_INTEGER_get(reply->status->status)); TimeStampResp_free(reply); - return -1; + return 1; } if (((len = i2d_PKCS7(reply->token, NULL)) <= 0) || (p = OPENSSL_malloc(len)) == NULL) { @@ -838,7 +838,7 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, ERR_print_errors_fp(stderr); } TimeStampResp_free(reply); - return -1; + return 1; } len = i2d_PKCS7(reply->token, &p); p -= len; @@ -864,7 +864,7 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, BIO_free_all(b64_bin); if (verbose) print_timestamp_error(url, http_code); - return -1; + return 1; } BIO_free_all(b64_bin); for(i = sk_X509_num(p7->d.sign->cert)-1; i>=0; i--) @@ -878,7 +878,7 @@ static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161, ERR_print_errors_fp(stderr); } PKCS7_free(p7); - return -1; + return 1; } len = i2d_PKCS7_SIGNER_INFO(info, &p); p -= len; @@ -901,9 +901,10 @@ static int add_timestamp_authenticode(PKCS7 *sig, GLOBAL_OPTIONS *options) for (i=0; inturl; i++) { int res = add_timestamp(sig, options->turl[i], options->proxy, 0, NULL, options->verbose || options->nturl == 1, options->noverifypeer); - if (!res) return 0; + if (!res) + return 0; /* OK */ } - return -1; + return 1; /* FAILED */ } static int add_timestamp_rfc3161(PKCS7 *sig, GLOBAL_OPTIONS *options) @@ -912,9 +913,10 @@ static int add_timestamp_rfc3161(PKCS7 *sig, GLOBAL_OPTIONS *options) for (i=0; intsurl; i++) { int res = add_timestamp(sig, options->tsurl[i], options->proxy, 1, options->md, options->verbose || options->ntsurl == 1, options->noverifypeer); - if (!res) return 0; + if (!res) + return 0; /* OK */ } - return -1; + return 1; /* FAILED */ } #endif /* ENABLE_CURL */ @@ -1682,6 +1684,7 @@ static int print_cert(X509 *cert, int i) print_time(X509_getm_notAfter(cert)); OPENSSL_free(subject); OPENSSL_free(issuer); + OPENSSL_free(serial); return 1; /* OK */ } @@ -1830,6 +1833,7 @@ static ASN1_UTCTIME *print_timestamp(PKCS7_SIGNER_INFO *si) issuer = X509_NAME_oneline(si->issuer_and_serial->issuer, NULL, 0); serial = BN_bn2hex(ASN1_INTEGER_to_BN(si->issuer_and_serial->serial, NULL)); printf("Timestamp Verified by:\n\t\tIssuer : %s\n\t\tSerial : %s\n", issuer, serial); + OPENSSL_free(serial); return timestamp_time; /* OK */ } @@ -2865,7 +2869,6 @@ static int msi_calc_MsiDigitalSignatureEx(GsfInfile *ole, const EVP_MD *md, BIO_write(hash, gsfparams->p_msiex, gsfparams->len_msiex); return 1; /* OK */ } -#endif static int msi_add_DigitalSignature(GsfOutfile *outole, u_char *p, int len) { @@ -2891,6 +2894,9 @@ static int msi_add_MsiDigitalSignatureEx(GsfOutfile *outole, GSF_PARAMS *gsfpara return ret; } +#endif + + /* * PE file support */ @@ -3011,7 +3017,7 @@ static int pe_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, } if (mdtype == -1) { printf("Failed to extract current message digest\n\n"); - return -1; + return 1; /* FAILED */ } printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype)); @@ -3112,7 +3118,7 @@ static int pe_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *opt p7 = pe_extract_existing_pkcs7(indata, header); if (!p7) { printf("Failed to extract PKCS7 data\n\n"); - return -1; + return 1; } ret = pe_verify_pkcs7(p7, indata, header, 1, options); PKCS7_free(p7); @@ -3413,7 +3419,7 @@ static int cab_verify_pkcs7(PKCS7 *p7, char *indata, FILE_HEADER *header, } if (mdtype == -1) { printf("Failed to extract current message digest\n\n"); - return -1; /* FAILED */ + return 1; /* FAILED */ } printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype)); @@ -3471,7 +3477,7 @@ static int cab_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *op p7 = cab_extract_existing_pkcs7(indata, header); if (!p7) { printf("Failed to extract PKCS7 data\n\n"); - return -1; /* FAILED */ + return 1; /* FAILED */ } ret |= cab_verify_pkcs7(p7, indata, header, 1, options); PKCS7_free(p7); @@ -3538,7 +3544,7 @@ static void cab_optional_names(size_t flags, char *indata, BIO *outdata, int *le *len = i; } -static void cab_remove_file(char *indata, FILE_HEADER *header, size_t filesize, BIO *outdata) +static int cab_remove_file(char *indata, FILE_HEADER *header, size_t filesize, BIO *outdata) { int i; unsigned short nfolders; @@ -3595,6 +3601,8 @@ static void cab_remove_file(char *indata, FILE_HEADER *header, size_t filesize, } /* Write what's left - the compressed data bytes */ BIO_write(outdata, indata + i, filesize - header->siglen - i); + + return 0; /* OK */ } static void cab_modify_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata) @@ -3815,9 +3823,6 @@ static PKCS7 *create_new_signature(file_type_t type, /* X509_print_fp(stdout, signcert); */ si = PKCS7_add_signature(sig, signcert, cparams->pkey, options->md); } - EVP_PKEY_free(cparams->pkey); - cparams->pkey = NULL; - if (si == NULL) { fprintf(stderr, "PKCS7_add_signature failed\n"); return NULL; /* FAILED */ @@ -3838,11 +3843,8 @@ static PKCS7 *create_new_signature(file_type_t type, } PKCS7_content_new(sig, NID_pkcs7_data); - if (cparams->cert != NULL) { + if (cparams->cert != NULL) PKCS7_add_certificate(sig, cparams->cert); - X509_free(cparams->cert); - cparams->cert = NULL; - } if (cparams->xcerts) { for(i = sk_X509_num(cparams->xcerts)-1; i>=0; i--) PKCS7_add_certificate(sig, sk_X509_value(cparams->xcerts, i)); @@ -3850,14 +3852,6 @@ static PKCS7 *create_new_signature(file_type_t type, for (i = sk_X509_num(cparams->certs)-1; i>=0; i--) PKCS7_add_certificate(sig, sk_X509_value(cparams->certs, i)); - if (cparams->certs) { - sk_X509_free(cparams->certs); - cparams->certs = NULL; - } - if (cparams->xcerts) { - sk_X509_free(cparams->xcerts); - cparams->xcerts = NULL; - } return sig; /* OK */ } @@ -3881,7 +3875,7 @@ static int add_unauthenticated_blob(PKCS7 *sig) ASN1_STRING_set(astr, p, len); nid = OBJ_create(SPC_UNAUTHENTICATED_DATA_BLOB_OBJID, "unauthenticatedData", "unauthenticatedData"); - PKCS7_add_attribute (si, nid, V_ASN1_SEQUENCE, astr); + PKCS7_add_attribute(si, nid, V_ASN1_SEQUENCE, astr); OPENSSL_free(p); return 0; /* OK */ } @@ -3893,7 +3887,7 @@ static int add_unauthenticated_blob(PKCS7 *sig) static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t cmd, GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata, GSF_PARAMS *gsfparams) #else -static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_type_t cmd, +static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata) #endif { @@ -3904,11 +3898,11 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ if (options->nest) { if (cursig == NULL) { fprintf(stderr, "Internal error: No 'cursig' was extracted\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } if (pkcs7_set_nested_signature(cursig, sig, options->signing_time) == 0) { fprintf(stderr, "Unable to append the nested signature to the current signature\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } outsig = cursig; } else { @@ -3917,7 +3911,7 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ /* Append signature to outfile */ if (((*len = i2d_PKCS7(outsig, NULL)) <= 0) || (p = OPENSSL_malloc(*len)) == NULL) { fprintf(stderr, "i2d_PKCS memory allocation failed: %d\n", *len); - return 0; /* FAILED */ + return 1; /* FAILED */ } i2d_PKCS7(outsig, &p); p -= *len; @@ -3942,18 +3936,18 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, cmd_typ if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { if (!msi_add_DigitalSignature(gsfparams->outole, p, *len)) { fprintf(stderr, "Failed to write MSI 'DigitalSignature' signature to %s\n", options->infile); - return 0; /* FAILED */ + return 1; /* FAILED */ } if (gsfparams->p_msiex != NULL && !msi_add_MsiDigitalSignatureEx(gsfparams->outole, gsfparams)) { fprintf(stderr, "Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", options->infile); - return 0; /* FAILED */ + return 1; /* FAILED */ } } #endif } OPENSSL_free(p); - return 1; /* OK */ + return 0; /* OK */ } static void update_data_size(file_type_t type, cmd_type_t cmd, FILE_HEADER *header, @@ -4100,39 +4094,39 @@ static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPT filesize = get_file_size(options->outfile); if (!filesize) { fprintf(stderr, "Error verifying result\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } outdata = map_file(options->outfile, filesize); if (!outdata) { fprintf(stderr, "Error verifying result\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } if (!pe_verify_header(outdata, options->outfile, filesize, header)) { fprintf(stderr, "Corrupt PE file\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } if (pe_verify_file(outdata, header, options)) { fprintf(stderr, "Signature mismatch\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } } else if (type == FILE_TYPE_CAB) { filesize = get_file_size(options->outfile); if (!filesize) { fprintf(stderr, "Error verifying result\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } outdata = map_file(options->outfile, filesize); if (!outdata) { fprintf(stderr, "Error verifying result\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } if (!cab_verify_header(outdata, options->outfile, filesize, header)) { fprintf(stderr, "Corrupt CAB file\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } if (cab_verify_file(outdata, header, options)) { fprintf(stderr, "Signature mismatch\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } } else if (type == FILE_TYPE_MSI) { #ifdef WITH_GSF @@ -4143,7 +4137,7 @@ static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPT src = gsf_input_stdio_new(options->outfile, NULL); if (!src) { fprintf(stderr, "Error opening output file %s\n", options->outfile); - return 0; /* FAILED */ + return 1; /* FAILED */ } ole = gsf_infile_msole_new(src, NULL); g_object_unref(src); @@ -4151,17 +4145,17 @@ static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPT g_object_unref(ole); if (ret) { fprintf(stderr, "Signature mismatch\n"); - return 0; /* FAILED */ + return 1; /* FAILED */ } #else fprintf(stderr, "libgsf is not available, msi support is disabled: %s\n", options->infile); - return 0; /* FAILED */ + return 1; /* FAILED */ #endif } else { fprintf(stderr, "Unknown input type for file: %s\n", options->infile); - return 0; /* FAILED */ + return 1; /* FAILED */ } - return 1; /* OK */ + return 0; /* OK */ } static int get_file_type(char *indata, char *infile, file_type_t *type) @@ -4273,7 +4267,7 @@ static char *read_key(GLOBAL_OPTIONS *options) static int read_crypto_params(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) { - PKCS12 *p12; + PKCS12 *p12 = NULL; PKCS7 *p7 = NULL, *p7x = NULL; BIO *btmp; const int CMD_MANDATORY = 0; @@ -4407,16 +4401,32 @@ static int read_crypto_params(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) return ret; /* OK */ } -static void free_crypto_params(CRYPTO_PARAMS *cparams) +static void free_crypto_params(CRYPTO_PARAMS *cparams, GLOBAL_OPTIONS *options) { - if (cparams->pkey) + if (options->keyfile || options->pkcs12file) { EVP_PKEY_free(cparams->pkey); - if (cparams->cert) + cparams->pkey = NULL; + } + if (options->pkcs12file) { X509_free(cparams->cert); - if (cparams->certs) + cparams->cert = NULL; + } + if (options->certfile) { sk_X509_free(cparams->certs); - if (cparams->xcerts) + cparams->certs = NULL; + } + if (options->xcertfile) { sk_X509_free(cparams->xcerts); + cparams->xcerts = NULL; + } +} + +static void free_options(GLOBAL_OPTIONS *options) +{ + OPENSSL_free(options->cafile); + OPENSSL_free(options->untrusted); + if (options->crlfile) + OPENSSL_free(options->crlfile); } static char *get_cafile(void) @@ -4635,7 +4645,7 @@ static cmd_type_t get_command(char **argv) curl_version() #else "no libcurl available" -#endif +#endif /* ENABLE_CURL */ ); help_for(argv[0], "all"); } else if (!strcmp(argv[1], "-v") || !strcmp(argv[1], "--version")) { @@ -4876,7 +4886,7 @@ int main(int argc, char **argv) BIO *hash = NULL, *outdata = NULL; PKCS7 *cursig = NULL, *sig = NULL; char *indata; - int ret = 0, len = 0; + int ret = -1, len = 0; size_t padlen = 0, filesize; file_type_t type; cmd_type_t cmd = CMD_SIGN; @@ -4947,6 +4957,7 @@ int main(int argc, char **argv) if (cmd == CMD_REMOVE) { gsf_output_close(GSF_OUTPUT(gsfparams.outole)); g_object_unref(gsfparams.sink); + ret = 0; goto skip_signing; } else if (!sig) goto err_cleanup; @@ -4970,7 +4981,7 @@ int main(int argc, char **argv) ret = cab_extract_file(indata, &header, outdata, options.output_pkcs7); goto skip_signing; } else if (cmd == CMD_REMOVE) { - cab_remove_file(indata, &header, filesize, outdata); + ret = cab_remove_file(indata, &header, filesize, outdata); goto skip_signing; } else if (cmd == CMD_VERIFY) { ret = cab_verify_file(indata, &header, &options); @@ -4993,9 +5004,10 @@ int main(int argc, char **argv) } else { sig = pe_presign_file(type, cmd, &header, &options, &cparams, indata, hash, outdata, &cursig); - if (cmd == CMD_REMOVE) + if (cmd == CMD_REMOVE) { + ret = 0; /* OK */ goto skip_signing; - else if (!sig) + } else if (!sig) goto err_cleanup; } } @@ -5017,17 +5029,17 @@ int main(int argc, char **argv) #endif #ifdef WITH_GSF - if (!append_signature(sig, cursig, type, cmd, &options, &padlen, &len, outdata, - &gsfparams)) - DO_EXIT_0("Append signature to outfile failed\n"); + ret = append_signature(sig, cursig, type, cmd, &options, &padlen, &len, + outdata, &gsfparams); if (type == FILE_TYPE_MSI) { gsf_output_close(GSF_OUTPUT(gsfparams.outole)); g_object_unref(gsfparams.sink); } #else - if (!append_signature(sig, cursig, type, cmd, &options, &padlen, &len, outdata)) - DO_EXIT_0("Append signature to outfile failed\n"); + ret = append_signature(sig, cursig, type, &options, &padlen, &len, outdata); #endif /* WITH_GSF */ + if (ret) + DO_EXIT_0("Append signature to outfile failed\n"); PKCS7_free(sig); @@ -5038,33 +5050,31 @@ skip_signing: BIO_free_all(hash); hash = outdata = NULL; - if (cmd == CMD_ATTACH) { - if (check_attached_data(type, &header, &options)) + if (!ret && cmd == CMD_ATTACH) { + ret = check_attached_data(type, &header, &options); + if (!ret) printf("Signature successfully attached\n"); - else - goto err_cleanup; - } else - printf(ret ? "Failed\n" : "Succeeded\n"); - - OPENSSL_free(options.cafile); - OPENSSL_free(options.untrusted); - if (options.crlfile) - OPENSSL_free(options.crlfile); - cleanup_lib_state(); - - return ret; + /* else + * the new signature has been successfully appended to the outfile + * but only its verification failed (incorrect verification parameters?) + * so the output file is not deleted + */ + } err_cleanup: - ERR_print_errors_fp(stderr); - free_crypto_params(&cparams); if (hash) BIO_free_all(hash); if (outdata) unlink(options.outfile); - fprintf(stderr, "\nFailed\n"); + free_crypto_params(&cparams, &options); + free_options(&options); + if (ret) + ERR_print_errors_fp(stderr); cleanup_lib_state(); - return -1; + + printf(ret ? "Failed\n" : "Succeeded\n"); + return ret; } /* From 077783aa2aef342adf1a0fc3920ada1c3d1327bb Mon Sep 17 00:00:00 2001 From: olszomal Date: Fri, 3 Apr 2020 12:31:59 +0200 Subject: [PATCH 31/35] signer extended key usage XKU_CODE_SIGN --- osslsigncode.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/osslsigncode.c b/osslsigncode.c index b0a10d5..1892e51 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -2130,7 +2130,7 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, GLOBAL_O signers = PKCS7_get0_signers(p7, NULL, 0); if (!signers || sk_X509_num(signers) != 1) ret = 1; /* FAILED */ - if (!(X509_get_extension_flags(sk_X509_value(signers, 0)) && XKU_CODE_SIGN)) { + if (!(X509_get_extended_key_usage(sk_X509_value(signers, 0)) & XKU_CODE_SIGN)) { fprintf(stderr, "Unsupported Signer's certificate purpose\n"); ret = 1; /* FAILED */ } From 235448d839b3b66f3af43d35f6ff9e110521b784 Mon Sep 17 00:00:00 2001 From: olszomal Date: Fri, 3 Apr 2020 15:12:43 +0200 Subject: [PATCH 32/35] fixed memory leaks --- osslsigncode.c | 23 ++++++++++++++--------- 1 file changed, 14 insertions(+), 9 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index 1892e51..a2d6abd 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -1949,8 +1949,11 @@ static int pkcs7_print_attributes(PKCS7_SIGNED *p7_signed, PKCS7 **tmstamp_p7, value = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_UTF8STRING, NULL); if (value == NULL) return 0; /* FAILED */ - if (verbose) - printf("Data Blob: %s\n", OPENSSL_buf2hexstr(value->data, value->length)); + if (verbose) { + char *data_blob = OPENSSL_buf2hexstr(value->data, value->length); + printf("Data Blob: %s\n", data_blob); + OPENSSL_free(data_blob); + } printf("Data Blob length: %d bytes\n", value->length); } else if (!strcmp(object_txt, SPC_NESTED_SIGNATURE_OBJID)) { /* 1.3.6.1.4.1.311.2.4.1 */ @@ -3930,7 +3933,7 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, memset(p, 0, *padlen); BIO_write(outdata, p, *padlen); } - #ifdef WITH_GSF +#ifdef WITH_GSF } else if (type == FILE_TYPE_MSI) { /* Only output signatures if we're signing */ if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { @@ -3944,7 +3947,7 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type, return 1; /* FAILED */ } } - #endif +#endif } OPENSSL_free(p); return 0; /* OK */ @@ -4170,10 +4173,10 @@ static int get_file_type(char *indata, char *infile, file_type_t *type) *type = FILE_TYPE_PE; } else if (!memcmp(indata, msi_signature, sizeof(msi_signature))) { *type = FILE_TYPE_MSI; - #ifdef WITH_GSF +#ifdef WITH_GSF gsf_init(); gsf_initialized = 1; - #endif +#endif } else { printf("Unrecognized file type: %s\n", infile); return 0; /* FAILED */ @@ -4207,7 +4210,7 @@ static char *getpassword(const char *prompt) return NULL; } passbuf[strlen(passbuf)-1] = 0x00; - pass = strdup(passbuf); + pass = OPENSSL_strdup(passbuf); memset(passbuf, 0, sizeof(passbuf)); return pass; #else @@ -4234,7 +4237,7 @@ static int read_password(GLOBAL_OPTIONS *options) return 0; /* FAILED */ } passbuf[passlen] = 0x00; - options->pass = strdup(passbuf); + options->pass = OPENSSL_strdup(passbuf); memset(passbuf, 0, sizeof(passbuf)); #ifdef PROVIDE_ASKPASS } else if (options->askpass) { @@ -4427,6 +4430,8 @@ static void free_options(GLOBAL_OPTIONS *options) OPENSSL_free(options->untrusted); if (options->crlfile) OPENSSL_free(options->crlfile); + if (options->pass) + OPENSSL_free(options->pass); } static char *get_cafile(void) @@ -4740,7 +4745,7 @@ static void main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTION } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pass")) { if (options->askpass || options->readpass) usage(argv0, "all"); if (--argc < 1) usage(argv0, "all"); - options->pass = strdup(*(++argv)); + options->pass = OPENSSL_strdup(*(++argv)); memset(*argv, 0, strlen(*argv)); #ifdef PROVIDE_ASKPASS } else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-askpass")) { From cafa23819bbe268af9f98ed2e00da3f0155f9fa0 Mon Sep 17 00:00:00 2001 From: olszomal Date: Tue, 7 Apr 2020 15:49:00 +0200 Subject: [PATCH 33/35] more memory leaks fixed --- osslsigncode.c | 50 +++++++++++++++++++++++++++++++++++--------------- 1 file changed, 35 insertions(+), 15 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index a2d6abd..8be4de4 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -1679,11 +1679,13 @@ static int print_cert(X509 *cert, int i) printf("\tSigner #%d:\n\t\tSubject: %s\n\t\tIssuer : %s\n\t\tSerial : %s\n\t\tCertificate expiration date:\n", i, subject, issuer, serial); printf("\t\t\tnotBefore : "); - print_time(X509_getm_notBefore(cert)); + print_time(X509_get0_notBefore(cert)); printf("\t\t\tnotAfter : "); - print_time(X509_getm_notAfter(cert)); + print_time(X509_get0_notAfter(cert)); + OPENSSL_free(subject); OPENSSL_free(issuer); + BN_free(serialbn); OPENSSL_free(serial); return 1; /* OK */ } @@ -1822,6 +1824,7 @@ static ASN1_UTCTIME *print_timestamp(PKCS7_SIGNER_INFO *si) ASN1_UTCTIME *timestamp_time = NULL; int md_nid; char *issuer, *serial; + BIGNUM *serialbn; version = si->version; md_nid = OBJ_obj2nid(si->digest_alg->algorithm); @@ -1831,8 +1834,11 @@ static ASN1_UTCTIME *print_timestamp(PKCS7_SIGNER_INFO *si) timestamp_time = get_signing_time(si); print_time(timestamp_time); issuer = X509_NAME_oneline(si->issuer_and_serial->issuer, NULL, 0); - serial = BN_bn2hex(ASN1_INTEGER_to_BN(si->issuer_and_serial->serial, NULL)); + serialbn = ASN1_INTEGER_to_BN(si->issuer_and_serial->serial, NULL); + serial = BN_bn2hex(serialbn); printf("Timestamp Verified by:\n\t\tIssuer : %s\n\t\tSerial : %s\n", issuer, serial); + OPENSSL_free(issuer); + BN_free(serialbn); OPENSSL_free(serial); return timestamp_time; /* OK */ } @@ -2107,7 +2113,6 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, GLOBAL_O size_t seqhdrlen; BIO *bio = NULL; int day, sec; - time_t time = INVALID_TIME; STACK_OF(X509) *signers; seqhdrlen = asn1_simple_hdr_len(p7->d.sign->contents->d.other->value.sequence->data, @@ -2121,13 +2126,18 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, GLOBAL_O ret = 1; /* FAILED */ } if (timestamp_time) { - if (!ASN1_TIME_diff(&day, &sec, ASN1_TIME_set(NULL, 0), timestamp_time)) + ASN1_TIME *ptime; + time_t time = INVALID_TIME; + + ptime = ASN1_TIME_set(NULL, 0); + if (!ASN1_TIME_diff(&day, &sec, ptime, timestamp_time)) ret = 1; /* FAILED */ time = 86400*day+sec; if (!set_store_time(store, time)) { fprintf(stderr, "Failed to set store time\n"); ret = 1; /* FAILED */ } + ASN1_TIME_free(ptime); } /* check extended key usage flag XKU_CODE_SIGN */ signers = PKCS7_get0_signers(p7, NULL, 0); @@ -2154,6 +2164,7 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, GLOBAL_O ERR_print_errors_fp(stdout); ret = 1; /* FAILED */ } + sk_X509_free(signers); BIO_free(bio); X509_STORE_free(store); return ret; @@ -4385,7 +4396,9 @@ static int read_crypto_params(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) BIO_free(btmp); } if (cparams->certs == NULL && p7 != NULL) - cparams->certs = sk_X509_dup(p7->d.sign->cert); + /* certificate file in the SPC format */ + cparams->certs = X509_chain_up_ref(p7->d.sign->cert); + if (options->xcertfile) { if ((btmp = BIO_new_file(options->xcertfile, "rb")) == NULL || ((p7x = d2i_PKCS7_bio(btmp, NULL)) == NULL && @@ -4397,16 +4410,16 @@ static int read_crypto_params(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams) PKCS7_free(p7x); p7x = NULL; } - if (options->pass) { + if (options->pass) memset(options->pass, 0, strlen(options->pass)); - options->pass = NULL; - } + + PKCS7_free(p7); return ret; /* OK */ } static void free_crypto_params(CRYPTO_PARAMS *cparams, GLOBAL_OPTIONS *options) { - if (options->keyfile || options->pkcs12file) { + if (options->keyfile || options->pvkfile || options->pkcs12file) { EVP_PKEY_free(cparams->pkey); cparams->pkey = NULL; } @@ -4414,12 +4427,12 @@ static void free_crypto_params(CRYPTO_PARAMS *cparams, GLOBAL_OPTIONS *options) X509_free(cparams->cert); cparams->cert = NULL; } - if (options->certfile) { - sk_X509_free(cparams->certs); + if (options->certfile || options->pkcs12file) { + sk_X509_pop_free(cparams->certs, X509_free); cparams->certs = NULL; } if (options->xcertfile) { - sk_X509_free(cparams->xcerts); + sk_X509_pop_free(cparams->xcerts, X509_free); cparams->xcerts = NULL; } } @@ -4890,9 +4903,9 @@ int main(int argc, char **argv) #endif BIO *hash = NULL, *outdata = NULL; PKCS7 *cursig = NULL, *sig = NULL; - char *indata; + char *indata = NULL; int ret = -1, len = 0; - size_t padlen = 0, filesize; + size_t padlen = 0, filesize = 0; file_type_t type; cmd_type_t cmd = CMD_SIGN; @@ -5046,6 +5059,8 @@ int main(int argc, char **argv) if (ret) DO_EXIT_0("Append signature to outfile failed\n"); + if (cmd != CMD_ADD) + PKCS7_free(cursig); PKCS7_free(sig); skip_signing: @@ -5072,6 +5087,11 @@ err_cleanup: BIO_free_all(hash); if (outdata) unlink(options.outfile); +#ifdef WIN32 + UnmapViewOfFile(indata); +#else + munmap(indata, filesize); +#endif free_crypto_params(&cparams, &options); free_options(&options); if (ret) From e2f984f5c93299a8e8cd629784f04d39d4fcdc5a Mon Sep 17 00:00:00 2001 From: olszomal Date: Wed, 8 Apr 2020 14:21:53 +0200 Subject: [PATCH 34/35] attach DER signature --- osslsigncode.c | 36 ++++------- ...act_signature => 26_extract_signature_pem} | 26 ++++---- tests/recipes/27_extract_signature_der | 61 +++++++++++++++++++ tests/recipes/31_attach_signature_der | 58 ++++++++++++++++++ ...tach_signature => 32_attach_signature_pem} | 8 +-- tests/testall.sh | 1 + 6 files changed, 150 insertions(+), 40 deletions(-) rename tests/recipes/{31_extract_signature => 26_extract_signature_pem} (63%) create mode 100644 tests/recipes/27_extract_signature_der create mode 100644 tests/recipes/31_attach_signature_der rename tests/recipes/{32_attach_signature => 32_attach_signature_pem} (87%) diff --git a/osslsigncode.c b/osslsigncode.c index 8be4de4..dad1615 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -2791,9 +2791,8 @@ static int msi_extract_file(GsfInfile *ole, GLOBAL_OPTIONS *options) } ret = !PEM_write_bio_PKCS7(outdata, sig); BIO_free_all(outdata); - } else { + } else ret = msi_extract_signature_to_file(ole, options->outfile); - } return ret; } @@ -3152,9 +3151,10 @@ static int pe_extract_file(char *indata, FILE_HEADER *header, BIO *outdata, int return 1; /* FAILED */ } ret = !PEM_write_bio_PKCS7(outdata, sig); - } else { - ret = !BIO_write(outdata, indata + header->sigpos, header->siglen); - } + PKCS7_free(sig); + } else + ret = !BIO_write(outdata, indata + header->sigpos, header->siglen); + return ret; } @@ -3511,9 +3511,10 @@ static int cab_extract_file(char *indata, FILE_HEADER *header, BIO *outdata, int return 1; /* FAILED */ } ret = !PEM_write_bio_PKCS7(outdata, sig); - } else { + PKCS7_free(sig); + } else ret = !BIO_write(outdata, indata + header->sigpos, header->siglen); - } + return ret; } @@ -4499,24 +4500,13 @@ static PKCS7 *get_sigfile(char *sigfile, file_type_t type) } else { /* reset header */ memset(&header, 0, sizeof(FILE_HEADER)); - header.fileend = sigfilesize; - if (type == FILE_TYPE_PE) { - if (!pe_verify_header(insigdata, sigfile, sigfilesize, &header)) - return NULL; /* FAILED */ + header.siglen = sigfilesize; + header.sigpos = 0; + if (type == FILE_TYPE_PE) sig = pe_extract_existing_pkcs7(insigdata, &header); - if (!sig) { - fprintf(stderr, "Failed to extract PKCS7 data: %s\n", sigfile); - return NULL; /* FAILED */ - } - } else if (type == FILE_TYPE_CAB) { - if (!cab_verify_header(insigdata, sigfile, sigfilesize, &header)) - return NULL; /* FAILED */ + else if (type == FILE_TYPE_CAB) sig = cab_extract_existing_pkcs7(insigdata, &header); - if (!sig) { - fprintf(stderr, "Failed to extract PKCS7 data: %s\n", sigfile); - return NULL; /* FAILED */ - } - } else if (type == FILE_TYPE_MSI) { + else if (type == FILE_TYPE_MSI) { #ifdef WITH_GSF const unsigned char *p = (unsigned char*)insigdata; sig = d2i_PKCS7(NULL, &p, sigfilesize); diff --git a/tests/recipes/31_extract_signature b/tests/recipes/26_extract_signature_pem similarity index 63% rename from tests/recipes/31_extract_signature rename to tests/recipes/26_extract_signature_pem index 7611591..550f01f 100644 --- a/tests/recipes/31_extract_signature +++ b/tests/recipes/26_extract_signature_pem @@ -1,21 +1,21 @@ #!/bin/sh -# Extract the signature from the PE/CAB/MSI file. +# Extract the signature in the PEM format from the PE/CAB/MSI file. . $(dirname $0)/../test_library script_path=$(pwd) # PE file -test_name="311. Extract the signature from the PE file" +test_name="261. Extract the PEM signature from the PE file" printf "\n%s\n" "$test_name" if test -s "test.exe" then ../../osslsigncode sign -h sha512 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "test.exe" -out "test_311.exe" && \ + -in "test.exe" -out "test_261.exe" && \ ../../osslsigncode extract-signature -pem \ - -in "test_311.exe" -out "sign_pe.pem" - verify_signature "$?" "311" "exe" "success" "@2019-09-01 12:00:00" \ + -in "test_261.exe" -out "sign_pe.pem" + verify_signature "$?" "261" "exe" "success" "@2019-09-01 12:00:00" \ "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else @@ -23,17 +23,17 @@ if test -s "test.exe" fi # CAB file -test_name="312. Extract the signature from the CAB file" +test_name="262. Extract the PEM signature from the CAB file" printf "\n%s\n" "$test_name" if [ -s "test.ex_" ] then ../../osslsigncode sign -h sha512 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "test.ex_" -out "test_312.ex_" && \ + -in "test.ex_" -out "test_262.ex_" && \ ../../osslsigncode extract-signature -pem \ - -in "test_312.ex_" -out "sign_cab.pem" - verify_signature "$?" "312" "ex_" "success" "@2019-09-01 12:00:00" \ + -in "test_262.ex_" -out "sign_cab.pem" + verify_signature "$?" "262" "ex_" "success" "@2019-09-01 12:00:00" \ "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else @@ -41,17 +41,17 @@ if [ -s "test.ex_" ] fi # MSI file -test_name="313. Extract the signature from the MSI file" +test_name="263. Extract the PEM signature from the MSI file" printf "\n%s\n" "$test_name" if test -s "sample.msi" then ../../osslsigncode sign -h sha512 \ -st "1556668800" \ -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ - -in "sample.msi" -out "test_313.msi" && \ + -in "sample.msi" -out "test_263.msi" && \ ../../osslsigncode extract-signature -pem \ - -in "test_313.msi" -out "sign_msi.pem" - verify_signature "$?" "313" "msi" "success" "@2019-09-01 12:00:00" \ + -in "test_263.msi" -out "sign_msi.pem" + verify_signature "$?" "263" "msi" "success" "@2019-09-01 12:00:00" \ "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" test_result "$?" "$test_name" else diff --git a/tests/recipes/27_extract_signature_der b/tests/recipes/27_extract_signature_der new file mode 100644 index 0000000..20c1ae5 --- /dev/null +++ b/tests/recipes/27_extract_signature_der @@ -0,0 +1,61 @@ +#!/bin/sh +# Extract the signature in the DER format from the PE/CAB/MSI file. + +. $(dirname $0)/../test_library +script_path=$(pwd) + +# PE file +test_name="271. Extract the DER signature from the PE file" +printf "\n%s\n" "$test_name" +if test -s "test.exe" + then + ../../osslsigncode sign -h sha512 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "test.exe" -out "test_271.exe" && \ + ../../osslsigncode extract-signature \ + -in "test_271.exe" -out "sign_pe.der" + verify_signature "$?" "271" "exe" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +# CAB file +test_name="272. Extract the DER signature from the CAB file" +printf "\n%s\n" "$test_name" +if [ -s "test.ex_" ] + then + ../../osslsigncode sign -h sha512 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "test.ex_" -out "test_272.ex_" && \ + ../../osslsigncode extract-signature \ + -in "test_272.ex_" -out "sign_cab.der" + verify_signature "$?" "272" "ex_" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +# MSI file +test_name="273. Extract the DER signature from the MSI file" +printf "\n%s\n" "$test_name" +if test -s "sample.msi" + then + ../../osslsigncode sign -h sha512 \ + -st "1556668800" \ + -certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.pem" \ + -in "sample.msi" -out "test_273.msi" && \ + ../../osslsigncode extract-signature \ + -in "test_273.msi" -out "sign_msi.der" + verify_signature "$?" "273" "msi" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +exit 0 diff --git a/tests/recipes/31_attach_signature_der b/tests/recipes/31_attach_signature_der new file mode 100644 index 0000000..1743eaa --- /dev/null +++ b/tests/recipes/31_attach_signature_der @@ -0,0 +1,58 @@ +#!/bin/sh +# Attach the DER signature to the PE/CAB/MSI file. + +. $(dirname $0)/../test_library +script_path=$(pwd) + +# PE file +test_name="311. Attach the DER signature to the PE file" +printf "\n%s\n" "$test_name" +if test -s "test.exe" + then + ../../osslsigncode attach-signature \ + -sigin "sign_pe.der" \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "test.exe" -out "test_311.exe" + verify_signature "$?" "311" "exe" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +# CAB file +test_name="312. Attach the DER signature to the CAB file" +printf "\n%s\n" "$test_name" +if [ -s "test.ex_" ] + then + ../../osslsigncode attach-signature \ + -sigin "sign_cab.der" \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "test.ex_" -out "test_312.ex_" + verify_signature "$?" "312" "ex_" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +# MSI file +test_name="313. Attach the DER signature to the MSI file" +printf "\n%s\n" "$test_name" +if test -s "sample.msi" + then + ../../osslsigncode attach-signature \ + -sigin "sign_msi.der" \ + -CAfile "${script_path}/../certs/CACert.pem" \ + -CRLfile "${script_path}/../certs/CACertCRL.pem" \ + -in "sample.msi" -out "test_313.msi" + verify_signature "$?" "313" "msi" "success" "@2019-09-01 12:00:00" \ + "sha256sum" "ASCII" "SHA512" "UNUSED_PATTERN" + test_result "$?" "$test_name" + else + printf "Test skipped\n" + fi + +exit 0 diff --git a/tests/recipes/32_attach_signature b/tests/recipes/32_attach_signature_pem similarity index 87% rename from tests/recipes/32_attach_signature rename to tests/recipes/32_attach_signature_pem index d610748..1903814 100644 --- a/tests/recipes/32_attach_signature +++ b/tests/recipes/32_attach_signature_pem @@ -1,11 +1,11 @@ #!/bin/sh -# Attach the signature to the PE/CAB/MSI file. +# Attach the PEM signature to the PE/CAB/MSI file. . $(dirname $0)/../test_library script_path=$(pwd) # PE file -test_name="321. Attach the signature to the PE file" +test_name="321. Attach the PEM signature to the PE file" printf "\n%s\n" "$test_name" if test -s "test.exe" then @@ -22,7 +22,7 @@ if test -s "test.exe" fi # CAB file -test_name="322. Attach the signature to the CAB file" +test_name="322. Attach the PEM signature to the CAB file" printf "\n%s\n" "$test_name" if [ -s "test.ex_" ] then @@ -39,7 +39,7 @@ if [ -s "test.ex_" ] fi # MSI file -test_name="323. Attach the signature to the MSI file" +test_name="323. Attach the PEM signature to the MSI file" printf "\n%s\n" "$test_name" if test -s "sample.msi" then diff --git a/tests/testall.sh b/tests/testall.sh index 1e855f9..0bbb553 100755 --- a/tests/testall.sh +++ b/tests/testall.sh @@ -102,6 +102,7 @@ if test -n "$(command -v faketime)" make_tests result=$? rm -f "test.exe" "test.ex_" "sample.msi" "sample.wxs" "FoobarAppl10.exe" + rm -f "sign_pe.der" "sign_cab.der" "sign_msi.der" rm -f "sign_pe.pem" "sign_cab.pem" "sign_msi.pem" "verify.log" else printf "%s\n" "xxd not found in \$PATH" From e59e922d322c378bac2384b2efaa87e228b2d621 Mon Sep 17 00:00:00 2001 From: olszomal Date: Thu, 9 Apr 2020 10:45:25 +0200 Subject: [PATCH 35/35] last merge error - X509_PURPOSE_ANY --- osslsigncode.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/osslsigncode.c b/osslsigncode.c index dad1615..4cf59e2 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -2121,7 +2121,7 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, GLOBAL_O p7->d.sign->contents->d.other->value.sequence->length - seqhdrlen); store = X509_STORE_new(); - if (!load_file_lookup(store, options->cafile, X509_PURPOSE_CRL_SIGN)) { + if (!load_file_lookup(store, options->cafile, X509_PURPOSE_ANY)) { fprintf(stderr, "Failed to add store lookup file\n"); ret = 1; /* FAILED */ }