mirror of
https://github.com/mtrojnar/osslsigncode.git
synced 2025-04-05 01:00:11 -05:00
CRL support with new CRLfile global option (#28)
This commit is contained in:
parent
98910f675a
commit
49f25a1914
3
TODO.md
3
TODO.md
@ -1,8 +1,5 @@
|
|||||||
- signature extraction/removal/verificaton on MSI/CAB files
|
- signature extraction/removal/verificaton on MSI/CAB files
|
||||||
- improved signature verification on PE files
|
|
||||||
- clean up / untangle code
|
- clean up / untangle code
|
||||||
- separate timestamping
|
- separate timestamping
|
||||||
- man page
|
|
||||||
- remove mmap usage to increase portability
|
- remove mmap usage to increase portability
|
||||||
- tests
|
|
||||||
- fix other stuff marked 'XXX'
|
- fix other stuff marked 'XXX'
|
||||||
|
454
osslsigncode.c
454
osslsigncode.c
@ -2,7 +2,7 @@
|
|||||||
OpenSSL based Authenticode signing for PE/MSI/Java CAB files.
|
OpenSSL based Authenticode signing for PE/MSI/Java CAB files.
|
||||||
|
|
||||||
Copyright (C) 2005-2015 Per Allansson <pallansson@gmail.com>
|
Copyright (C) 2005-2015 Per Allansson <pallansson@gmail.com>
|
||||||
Copyright (C) 2018-2019 Michał Trojnara <Michal.Trojnara@stunnel.org>
|
Copyright (C) 2018-2020 Michał Trojnara <Michal.Trojnara@stunnel.org>
|
||||||
|
|
||||||
This program is free software: you can redistribute it and/or modify
|
This program is free software: you can redistribute it and/or modify
|
||||||
it under the terms of the GNU General Public License as published by
|
it under the terms of the GNU General Public License as published by
|
||||||
@ -70,6 +70,7 @@ typedef unsigned char u_char;
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
#include <stdbool.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#ifndef _WIN32
|
#ifndef _WIN32
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
@ -882,53 +883,274 @@ static void cleanup_lib_state(void)
|
|||||||
ERR_free_strings();
|
ERR_free_strings();
|
||||||
}
|
}
|
||||||
|
|
||||||
static void usage(const char *argv0)
|
static bool on_list(const char *txt, const char *list[]) {
|
||||||
|
while (*list)
|
||||||
|
if (!strcmp(txt, *list++))
|
||||||
|
return true;
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void usage(const char *argv0, const char *cmd)
|
||||||
{
|
{
|
||||||
fprintf(stderr,
|
printf("\nUsage: %s", argv0);
|
||||||
"Usage: %s\n\n\t[ --version | -v ]\n\n"
|
const char *cmds_all[] = {"all", NULL};
|
||||||
"\t[ sign ]\n"
|
if (on_list(cmd, cmds_all)) {
|
||||||
"\t\t( -certs <certfile> -key <keyfile> | -pkcs12 <pkcs12file> |\n"
|
printf("\n\n%1s[ --version | -v ]\n", "");
|
||||||
"\t\t [ -pkcs11engine <engine> ] -pkcs11module <module> -certs <certfile> -key <pkcs11 key id>)\n"
|
printf("%1s[ --help ]\n\n", "");
|
||||||
"\t\t[ -pass <password> ] "
|
}
|
||||||
|
const char *cmds_sign[] = {"all", "sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_sign)) {
|
||||||
|
printf("%1s[ sign ] ( -certs <certfile> -key <keyfile> | -pkcs12 <pkcs12file> |\n", "");
|
||||||
|
printf("%12s [ -pkcs11engine <engine> ] -pkcs11module <module> -certs <certfile> -key <pkcs11 key id>)\n", "");
|
||||||
|
printf("%12s[ -pass <password>", "");
|
||||||
#ifdef PROVIDE_ASKPASS
|
#ifdef PROVIDE_ASKPASS
|
||||||
"[ -askpass ]"
|
printf("%1s [ -askpass ]", "");
|
||||||
#endif
|
#endif
|
||||||
"[ -readpass <file> ]\n"
|
printf("%1s[ -readpass <file> ]\n", "");
|
||||||
"\t\t[ -ac <crosscertfile> ]\n"
|
printf("%12s[ -ac <crosscertfile> ]\n", "");
|
||||||
"\t\t[ -h {md5,sha1,sha2(56),sha384,sha512} ]\n"
|
printf("%12s[ -h {md5,sha1,sha2(56),sha384,sha512} ]\n", "");
|
||||||
"\t\t[ -n <desc> ] [ -i <url> ] [ -jp <level> ] [ -comm ]\n"
|
printf("%12s[ -n <desc> ] [ -i <url> ] [ -jp <level> ] [ -comm ]\n", "");
|
||||||
"\t\t[ -ph ]\n"
|
printf("%12s[ -ph ]\n", "");
|
||||||
#ifdef ENABLE_CURL
|
#ifdef ENABLE_CURL
|
||||||
"\t\t[ -t <timestampurl> [ -t ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n"
|
printf("%12s[ -t <timestampurl> [ -t ... ] [ -p <proxy> ] [ -noverifypeer ]\n", "");
|
||||||
"\t\t[ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n"
|
printf("%12s[ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n", "");
|
||||||
#endif
|
#endif
|
||||||
"\t\t[ -st <unix-time> ]\n"
|
printf("%12s[ -st <unix-time> ]\n", "");
|
||||||
"\t\t[ -addUnauthenticatedBlob ]\n\n"
|
printf("%12s[ -addUnauthenticatedBlob ]\n", "");
|
||||||
"\t\t[ -nest ]\n\n"
|
printf("%12s[ -nest ]\n", "");
|
||||||
"\t\t[ -verbose ]\n\n"
|
printf("%12s[ -verbose ]\n", "");
|
||||||
#ifdef WITH_GSF
|
#ifdef WITH_GSF
|
||||||
"\t\tMSI specific:\n"
|
printf("%12s[ -add-msi-dse ]\n", "");
|
||||||
"\t\t[ -add-msi-dse ]\n\n"
|
|
||||||
#endif
|
#endif
|
||||||
"\t\t[ -in ] <infile> [-out ] <outfile>\n\n"
|
printf("%12s[ -in ] <infile> [-out ] <outfile>\n\n", "");
|
||||||
"\textract-signature [ -pem ] [ -in ] <infile> [ -out ] <outfile>\n\n"
|
}
|
||||||
"\tremove-signature [ -in ] <infile> [ -out ] <outfile>\n\n"
|
const char *cmds_add[] = {"all", "add", NULL};
|
||||||
"\tattach-signature [ -sigin ] <sigfile> [ -in ] <infile> [ -out ] <outfile>\n"
|
if (on_list(cmd, cmds_add)) {
|
||||||
"\t\t[ -CAfile <infile> ]\n\n"
|
printf("%1sadd [-addUnauthenticatedBlob]\n", "");
|
||||||
"\tverify [ -in ] <infile>\n"
|
#ifdef ENABLE_CURL
|
||||||
"\t\t[ -CAfile <infile> ]\n"
|
printf("%12s[ -t <timestampurl> [ -t ... ] [ -p <proxy> ] [ -noverifypeer ]\n", "");
|
||||||
"\t\t[ -untrusted <infile> ]\n"
|
printf("%12s[ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n", "");
|
||||||
"\t\t[ -require-leaf-hash {md5,sha1,sha2(56),sha384,sha512}:XXXXXXXXXXXX... ]\n\n"
|
#endif
|
||||||
"\tadd [-addUnauthenticatedBlob] [ -in ] <infile> [ -out ] <outfile>\n"
|
printf("%12s[ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
||||||
"\t\t[ -t <timestampurl> [ -t ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n"
|
}
|
||||||
"\t\t[ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n"
|
const char *cmds_attach[] = {"all", "attach-signature", NULL};
|
||||||
"\n"
|
if (on_list(cmd, cmds_attach)) {
|
||||||
"",
|
printf("%1sattach-signature [ -sigin ] <sigfile>\n", "");
|
||||||
argv0);
|
printf("%12s[ -CAfile <infile> ]\n", "");
|
||||||
|
printf("%12s[ -CRLfile <infile> ]\n", "");
|
||||||
|
printf("%12s[ -untrusted <infile> ]\n", "");
|
||||||
|
printf("%12s[ -nest ]\n", "");
|
||||||
|
printf("%12s[ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
||||||
|
}
|
||||||
|
const char *cmds_extract[] = {"all", "extract-signature", NULL};
|
||||||
|
if (on_list(cmd, cmds_extract)) {
|
||||||
|
printf("%1sextract-signature [ -pem ]\n", "");
|
||||||
|
printf("%12s[ -in ] <infile> [ -out ] <sigfile>\n\n", "");
|
||||||
|
}
|
||||||
|
const char *cmds_remove[] = {"all", "remove-signature", NULL};
|
||||||
|
if (on_list(cmd, cmds_remove))
|
||||||
|
printf("%1sremove-signature [ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
||||||
|
|
||||||
|
const char *cmds_verify[] = {"all", "verify", NULL};
|
||||||
|
if (on_list(cmd, cmds_verify)) {
|
||||||
|
printf("%1sverify [ -in ] <infile>\n", "");
|
||||||
|
printf("%12s[ -CAfile <infile> ]\n", "");
|
||||||
|
printf("%12s[ -CRLfile <infile> ]\n", "");
|
||||||
|
printf("%12s[ -untrusted <infile> ]\n", "");
|
||||||
|
printf("%12s[ -require-leaf-hash {md5,sha1,sha2(56),sha384,sha512}:XXXXXXXXXXXX... ]\n", "");
|
||||||
|
printf("%12s[ -verbose ]\n\n", "");
|
||||||
|
}
|
||||||
cleanup_lib_state();
|
cleanup_lib_state();
|
||||||
exit(-1);
|
exit(-1);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void help_for(const char *argv0, const char *cmd) {
|
||||||
|
|
||||||
|
const char *cmds_all[] = {"all", NULL};
|
||||||
|
if (on_list(cmd, cmds_all)) {
|
||||||
|
printf("osslsigncode is a small tool that implements part of the functionality of the Microsoft\n");
|
||||||
|
printf("tool signtool.exe - more exactly the Authenticode signing and timestamping.\n");
|
||||||
|
printf("It can sign and timestamp PE (EXE/SYS/DLL/etc), CAB and MSI files,\n");
|
||||||
|
printf("supports getting the timestamp through a proxy as well.\n");
|
||||||
|
printf("osslsigncode also supports signature verification, removal and extraction.\n\n");
|
||||||
|
printf("%-22s = print osslsigncode version and usage\n", "--version | -v");
|
||||||
|
printf("%-22s = print osslsigncode help menu\n\n", "--help");
|
||||||
|
printf("Commands:\n");
|
||||||
|
printf("%-22s = add an unauthenticated blob or a timestamp to a previously-signed file\n", "add");
|
||||||
|
printf("%-22s = sign file using a given signature\n", "attach-signature");
|
||||||
|
printf("%-22s = extract signature from a previously-signed file\n", "extract-signature");
|
||||||
|
printf("%-22s = remove sections of the embedded signature on a file\n", "remove-signature");
|
||||||
|
printf("%-22s = digitally sign a file\n", "sign");
|
||||||
|
printf("%-22s = verifies the digital signature of a file\n\n", "verify");
|
||||||
|
printf("For help on a specific command, enter %s <command> --help\n", argv0);
|
||||||
|
}
|
||||||
|
const char *cmds_add[] = {"add", NULL};
|
||||||
|
if (on_list(cmd, cmds_add)) {
|
||||||
|
printf("\nUse the \"add\" command to add an unauthenticated blob or a timestamp to a previously-signed file.\n\n");
|
||||||
|
printf("Options:\n");
|
||||||
|
}
|
||||||
|
const char *cmds_attach[] = {"attach-signature", NULL};
|
||||||
|
if (on_list(cmd, cmds_attach)) {
|
||||||
|
printf("\nUse the \"attach-signature\" command to attach the signature stored in the \"sigin\" file.\n");
|
||||||
|
printf("In order to verify this signature you should specify how to find needed CA or TSA\n");
|
||||||
|
printf("certificates, if appropriate.\n\n");
|
||||||
|
printf("Options:\n");
|
||||||
|
}
|
||||||
|
const char *cmds_extract[] = {"extract-signature", NULL};
|
||||||
|
if (on_list(cmd, cmds_extract)) {
|
||||||
|
printf("\nUse the \"extract-signature\" command to extract the embedded signature from a previously-signed file.\n");
|
||||||
|
printf("DER is the default format of the output file, but can be changed to PEM.\n\n");
|
||||||
|
printf("Options:\n");
|
||||||
|
}
|
||||||
|
const char *cmds_remove[] = {"remove-signature", NULL};
|
||||||
|
if (on_list(cmd, cmds_remove)) {
|
||||||
|
printf("\nUse the \"remove-signature\" command to remove sections of the embedded signature on a file.\n\n");
|
||||||
|
printf("Options:\n");
|
||||||
|
}
|
||||||
|
const char *cmds_sign[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_sign)) {
|
||||||
|
printf("\nUse the \"sign\" command to sign files using embedded signatures.\n");
|
||||||
|
printf("Signing protects a file from tampering, and allows users to verify the signer\n");
|
||||||
|
printf("based on a signing certificate. The options below allow you to specify signing\n");
|
||||||
|
printf("parameters and to select the signing certificate you wish to use.\n\n");
|
||||||
|
printf("Options:\n");
|
||||||
|
}
|
||||||
|
const char *cmds_verify[] = {"verify", NULL};
|
||||||
|
if (on_list(cmd, cmds_verify)) {
|
||||||
|
printf("\nUse the \"verify\" command to verify embedded signatures.\n");
|
||||||
|
printf("Verification determines if the signing certificate was issued by a trusted party,\n");
|
||||||
|
printf("whether that certificate has been revoked, and whether the certificate is valid\n");
|
||||||
|
printf("under a specific policy. Options allow you to specify requirements that must be met\n");
|
||||||
|
printf("and to specify how to find needed CA or TSA certificates, if appropriate.\n\n");
|
||||||
|
printf("Options:\n");
|
||||||
|
}
|
||||||
|
const char *cmds_ac[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_ac))
|
||||||
|
printf("%-24s= an additional certificate to be added to the signature block\n", "-ac");
|
||||||
|
#ifdef WITH_GSF
|
||||||
|
const char *cmds_add_msi_dse[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_add_msi_dse))
|
||||||
|
printf("%-24s= sign a MSI file with the add-msi-dse option\n", "-add-msi-dse");
|
||||||
|
#endif
|
||||||
|
const char *cmds_addUnauthenticatedBlob[] = {"sign", "add", NULL};
|
||||||
|
if (on_list(cmd, cmds_addUnauthenticatedBlob))
|
||||||
|
printf("%-24s= add an unauthenticated blob to the PE/MSI file\n", "-addUnauthenticatedBlob");
|
||||||
|
#ifdef PROVIDE_ASKPASS
|
||||||
|
const char *cmds_askpass[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_askpass))
|
||||||
|
printf("%-24s= ask for the private key password\n", "-askpass");
|
||||||
|
#endif
|
||||||
|
const char *cmds_CAfile[] = {"attach-signature", "verify", NULL};
|
||||||
|
if (on_list(cmd, cmds_CAfile))
|
||||||
|
printf("%-24s= the file containing one or more trusted certificates in PEM format\n", "-CAfile");
|
||||||
|
const char *cmds_certs[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_certs))
|
||||||
|
printf("%-24s= the signing certificate to use\n", "-certs");
|
||||||
|
const char *cmds_comm[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_comm))
|
||||||
|
printf("%-24s= set commercial purpose (default: individual purpose)\n", "-comm");
|
||||||
|
const char *cmds_CRLfile[] = {"attach-signature", "verify", NULL};
|
||||||
|
if (on_list(cmd, cmds_CRLfile))
|
||||||
|
printf("%-24s= the file containing one or more CRLs in PEM format\n", "-CRLfile");
|
||||||
|
const char *cmds_h[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_h)) {
|
||||||
|
printf("%-24s= {md5|sha1|sha2(56)|sha384|sha512}\n", "-h");
|
||||||
|
printf("%26sset of cryptographic hash functions\n", "");
|
||||||
|
}
|
||||||
|
const char *cmds_i[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_i))
|
||||||
|
printf("%-24s= specifies a URL for expanded description of the signed content\n", "-i");
|
||||||
|
const char *cmds_in[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", "verify", NULL};
|
||||||
|
if (on_list(cmd, cmds_in))
|
||||||
|
printf("%-24s= input file\n", "-in");
|
||||||
|
const char *cmds_jp[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_jp)) {
|
||||||
|
printf("%-24s= low | medium | high\n", "-jp");
|
||||||
|
printf("%26slevels of permissions in Microsoft Internet Explorer 4.x for CAB files\n", "");
|
||||||
|
printf("%26sonly \"low\" level is now supported\n", "");
|
||||||
|
}
|
||||||
|
const char *cmds_key[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_key))
|
||||||
|
printf("%-24s= the private key to use\n", "-key");
|
||||||
|
const char *cmds_n[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_n))
|
||||||
|
printf("%-24s= specifies a description of the signed content\n", "-n");
|
||||||
|
const char *cmds_nest[] = {"attach-signature", "sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_nest))
|
||||||
|
printf("%-24s= add the new nested signature instead of replacing the first one\n", "-nest");
|
||||||
|
#ifdef ENABLE_CURL
|
||||||
|
const char *cmds_noverifypeer[] = {"add", "sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_noverifypeer))
|
||||||
|
printf("%-24s= do not verify the Time-Stamp Authority's SSL certificate\n", "-noverifypeer");
|
||||||
|
#endif
|
||||||
|
const char *cmds_out[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_out))
|
||||||
|
printf("%-24s= output file\n", "-out");
|
||||||
|
#ifdef ENABLE_CURL
|
||||||
|
const char *cmds_p[] = {"add", "sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_p))
|
||||||
|
printf("%-24s= proxy to connect to the desired Time-Stamp Authority server\n", "-p");
|
||||||
|
#endif
|
||||||
|
const char *cmds_pass[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_pass))
|
||||||
|
printf("%-24s= the private key password\n", "-pass");
|
||||||
|
const char *cmds_pem[] = {"extract-signature", NULL};
|
||||||
|
if (on_list(cmd, cmds_pem))
|
||||||
|
printf("%-24s= output data format PEM to use (default: DER)\n", "-pem");
|
||||||
|
const char *cmds_ph[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_ph))
|
||||||
|
printf("%-24s= generate page hashes for executable files\n", "-ph");
|
||||||
|
const char *cmds_pkcs11engine[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_pkcs11engine))
|
||||||
|
printf("%-24s= PKCS11 engine\n", "-pkcs11engine");
|
||||||
|
const char *cmds_pkcs11module[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_pkcs11module))
|
||||||
|
printf("%-24s= PKCS11 module\n", "-pkcs11module");
|
||||||
|
const char *cmds_pkcs12[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_pkcs12))
|
||||||
|
printf("%-24s= PKCS#12 container with the certificate and the private key\n", "-pkcs12");
|
||||||
|
const char *cmds_readpass[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_readpass))
|
||||||
|
printf("%-24s= the private key password source\n", "-readpass");
|
||||||
|
const char *cmds_require_leaf_hash[] = {"verify", NULL};
|
||||||
|
if (on_list(cmd, cmds_require_leaf_hash)) {
|
||||||
|
printf("%-24s= {md5|sha1|sha2(56)|sha384|sha512}:XXXXXXXXXXXX...\n", "-require-leaf-hash");
|
||||||
|
printf("%26sspecifies an optional hash algorithm to use when computing\n", "");
|
||||||
|
printf("%26sthe leaf certificate (in DER form) hash and compares\n", "");
|
||||||
|
printf("%26sthe provided hash against the computed hash\n", "");
|
||||||
|
}
|
||||||
|
const char *cmds_sigin[] = {"attach-signature", NULL};
|
||||||
|
if (on_list(cmd, cmds_sigin))
|
||||||
|
printf("%-24s= a file containing the signature to be attached\n", "-sigin");
|
||||||
|
const char *cmds_st[] = {"sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_st))
|
||||||
|
printf("%-24s= the unix-time to set the signing time\n", "-st");
|
||||||
|
#ifdef ENABLE_CURL
|
||||||
|
const char *cmds_t[] = {"add", "sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_t)) {
|
||||||
|
printf("%-24s= specifies that the digital signature will be timestamped\n", "-t");
|
||||||
|
printf("%26sby the Time-Stamp Authority (TSA) indicated by the URL\n", "");
|
||||||
|
printf("%26sthis option cannot be used with the -ts option\n", "");
|
||||||
|
}
|
||||||
|
const char *cmds_ts[] = {"add", "sign", NULL};
|
||||||
|
if (on_list(cmd, cmds_ts)) {
|
||||||
|
printf("%-24s= specifies the URL of the RFC 3161 Time-Stamp Authority server\n", "-ts");
|
||||||
|
printf("%26sthis option cannot be used with the -t option\n", "");
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
const char *cmds_untrusted[] = {"attach-signature", "verify", NULL};
|
||||||
|
if (on_list(cmd, cmds_untrusted)) {
|
||||||
|
printf("%-24s= set of additional untrusted certificates which may be needed\n", "-untrusted");
|
||||||
|
printf("%26swhen building the certificate chain for the Time-Stamp Authority's signing certificate,\n", "");
|
||||||
|
printf("%26sthe file should contain one or more certificates in PEM format\n", "");
|
||||||
|
}
|
||||||
|
const char *cmds_verbose[] = {"sign", "verify", NULL};
|
||||||
|
if (on_list(cmd, cmds_verbose)) {
|
||||||
|
printf("%-24s= include additional output in the log\n", "-verbose");
|
||||||
|
}
|
||||||
|
usage(argv0, cmd);
|
||||||
|
}
|
||||||
|
|
||||||
#define DO_EXIT_0(x) { fprintf(stderr, x); goto err_cleanup; }
|
#define DO_EXIT_0(x) { fprintf(stderr, x); goto err_cleanup; }
|
||||||
#define DO_EXIT_1(x, y) { fprintf(stderr, x, y); goto err_cleanup; }
|
#define DO_EXIT_1(x, y) { fprintf(stderr, x, y); goto err_cleanup; }
|
||||||
#define DO_EXIT_2(x, y, z) { fprintf(stderr, x, y, z); goto err_cleanup; }
|
#define DO_EXIT_2(x, y, z) { fprintf(stderr, x, y, z); goto err_cleanup; }
|
||||||
@ -1372,7 +1594,7 @@ static ASN1_UTCTIME *get_signing_time(PKCS7_SIGNER_INFO *si)
|
|||||||
char object_txt[128];
|
char object_txt[128];
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
auth_attr = PKCS7_get_signed_attributes(si); // cont[0]
|
auth_attr = PKCS7_get_signed_attributes(si); /* cont[0] */
|
||||||
if (auth_attr)
|
if (auth_attr)
|
||||||
for (i=0; i<X509at_get_attr_count(auth_attr); i++) {
|
for (i=0; i<X509at_get_attr_count(auth_attr); i++) {
|
||||||
attr = X509at_get_attr(auth_attr, i);
|
attr = X509at_get_attr(auth_attr, i);
|
||||||
@ -1391,7 +1613,7 @@ static ASN1_UTCTIME *get_signing_time(PKCS7_SIGNER_INFO *si)
|
|||||||
return time;
|
return time;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int load_file_lookup(X509_STORE *store, char *name, int purpose)
|
static int load_file_lookup(X509_STORE *store, char *certs, char *crl, int purpose)
|
||||||
{
|
{
|
||||||
X509_LOOKUP *lookup;
|
X509_LOOKUP *lookup;
|
||||||
X509_VERIFY_PARAM *param;
|
X509_VERIFY_PARAM *param;
|
||||||
@ -1399,13 +1621,21 @@ static int load_file_lookup(X509_STORE *store, char *name, int purpose)
|
|||||||
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
|
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
|
||||||
if (!lookup)
|
if (!lookup)
|
||||||
return 0; /* FAILED */
|
return 0; /* FAILED */
|
||||||
if (!X509_load_cert_file(lookup, name, X509_FILETYPE_PEM)) {
|
if (!X509_load_cert_file(lookup, certs, X509_FILETYPE_PEM)) {
|
||||||
fprintf(stderr, "Error: no certificate found in %s\n", name);
|
fprintf(stderr, "Error: no certificate found in %s\n", certs);
|
||||||
return 0; /* FAILED */
|
return 0; /* FAILED */
|
||||||
}
|
}
|
||||||
|
if (crl)
|
||||||
|
if (!X509_load_crl_file(lookup, crl, X509_FILETYPE_PEM)) {
|
||||||
|
fprintf(stderr, "Error: no CRL found in %s\n", crl);
|
||||||
|
return 0; /* FAILED */
|
||||||
|
}
|
||||||
param = X509_STORE_get0_param(store);
|
param = X509_STORE_get0_param(store);
|
||||||
if (param == NULL)
|
if (param == NULL)
|
||||||
return 0; /* FAILED */
|
return 0; /* FAILED */
|
||||||
|
if (crl)
|
||||||
|
if (!X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK))
|
||||||
|
return 0; /* FAILED */
|
||||||
if (!X509_VERIFY_PARAM_set_purpose(param, purpose))
|
if (!X509_VERIFY_PARAM_set_purpose(param, purpose))
|
||||||
return 0; /* FAILED */
|
return 0; /* FAILED */
|
||||||
if (!X509_STORE_set1_param(store, param))
|
if (!X509_STORE_set1_param(store, param))
|
||||||
@ -1532,7 +1762,7 @@ static int pkcs7_print_attributes(PKCS7_SIGNED *p7_signed, PKCS7 **tmstamp_p7, A
|
|||||||
printf("\nSigning Time: ");
|
printf("\nSigning Time: ");
|
||||||
print_time(get_signing_time(si));
|
print_time(get_signing_time(si));
|
||||||
|
|
||||||
unauth_attr = PKCS7_get_attributes(si); // cont[1]
|
unauth_attr = PKCS7_get_attributes(si); /* cont[1] */
|
||||||
if (unauth_attr)
|
if (unauth_attr)
|
||||||
for (i=0; i<X509at_get_attr_count(unauth_attr); i++) {
|
for (i=0; i<X509at_get_attr_count(unauth_attr); i++) {
|
||||||
attr = X509at_get_attr(unauth_attr, i);
|
attr = X509at_get_attr(unauth_attr, i);
|
||||||
@ -1620,11 +1850,10 @@ static int TST_verify(PKCS7 *tmstamp_p7, PKCS7_SIGNER_INFO *si)
|
|||||||
fprintf(stderr, "\tComputed message digest : %s\n", hexbuf);
|
fprintf(stderr, "\tComputed message digest : %s\n", hexbuf);
|
||||||
tohex(hash->data, hexbuf, hash->length);
|
tohex(hash->data, hexbuf, hash->length);
|
||||||
fprintf(stderr, "\tReceived message digest : %s\n" , hexbuf);
|
fprintf(stderr, "\tReceived message digest : %s\n" , hexbuf);
|
||||||
printf("Trusted Timestamp verification: failed\n");
|
printf("File's message digest verification: failed\n");
|
||||||
return 0; /* FAILED */
|
return 0; /* FAILED */
|
||||||
} else
|
} /* else Computed and received message digests matched */
|
||||||
printf("Trusted Timestamp verification: ok\n");
|
} /* else Countersignature Timestamp */
|
||||||
} // else Countersignature Timestamp
|
|
||||||
TimeStampToken_free(token);
|
TimeStampToken_free(token);
|
||||||
return 1; /* OK */
|
return 1; /* OK */
|
||||||
}
|
}
|
||||||
@ -1690,7 +1919,7 @@ static int verify_timestamp(PKCS7 *p7, PKCS7 *tmstamp_p7, char *untrusted)
|
|||||||
|
|
||||||
printf("TSA's certificates file: %s\n", untrusted);
|
printf("TSA's certificates file: %s\n", untrusted);
|
||||||
store = X509_STORE_new();
|
store = X509_STORE_new();
|
||||||
if (!load_file_lookup(store, untrusted, X509_PURPOSE_TIMESTAMP_SIGN)) {
|
if (!load_file_lookup(store, untrusted, NULL, X509_PURPOSE_TIMESTAMP_SIGN)) {
|
||||||
fprintf(stderr, "Failed to add timestamp store lookup file\n");
|
fprintf(stderr, "Failed to add timestamp store lookup file\n");
|
||||||
ret = 1; /* FAILED */
|
ret = 1; /* FAILED */
|
||||||
}
|
}
|
||||||
@ -1712,7 +1941,7 @@ static int verify_timestamp(PKCS7 *p7, PKCS7 *tmstamp_p7, char *untrusted)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, char *cafile)
|
static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, char *cafile, char *crlfile)
|
||||||
{
|
{
|
||||||
X509_STORE *store = NULL;
|
X509_STORE *store = NULL;
|
||||||
int ret = 0, verok;
|
int ret = 0, verok;
|
||||||
@ -1722,7 +1951,7 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, char *ca
|
|||||||
time_t time;
|
time_t time;
|
||||||
|
|
||||||
store = X509_STORE_new();
|
store = X509_STORE_new();
|
||||||
if (!load_file_lookup(store, cafile, X509_PURPOSE_CRL_SIGN)) {
|
if (!load_file_lookup(store, cafile, crlfile, X509_PURPOSE_CRL_SIGN)) {
|
||||||
fprintf(stderr, "Failed to add store lookup file\n");
|
fprintf(stderr, "Failed to add store lookup file\n");
|
||||||
ret = 1; /* FAILED */
|
ret = 1; /* FAILED */
|
||||||
}
|
}
|
||||||
@ -1752,7 +1981,7 @@ static int verify_authenticode(PKCS7 *p7, ASN1_UTCTIME *timestamp_time, char *ca
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int verify_pkcs7(PKCS7 *p7, char *leafhash, char *cafile, char *untrusted)
|
static int verify_pkcs7(PKCS7 *p7, char *leafhash, char *cafile, char *crlfile, char *untrusted)
|
||||||
{
|
{
|
||||||
PKCS7 *tmstamp_p7 = NULL;
|
PKCS7 *tmstamp_p7 = NULL;
|
||||||
ASN1_UTCTIME *timestamp_time = NULL;
|
ASN1_UTCTIME *timestamp_time = NULL;
|
||||||
@ -1770,11 +1999,15 @@ static int verify_pkcs7(PKCS7 *p7, char *leafhash, char *cafile, char *untrusted
|
|||||||
ret = 1; /* FAILED */
|
ret = 1; /* FAILED */
|
||||||
}
|
}
|
||||||
printf("\nCAfile: %s\n", cafile);
|
printf("\nCAfile: %s\n", cafile);
|
||||||
|
if (crlfile)
|
||||||
|
printf("CRLfile: %s\n", crlfile);
|
||||||
if (tmstamp_p7)
|
if (tmstamp_p7)
|
||||||
ret |= verify_timestamp(p7, tmstamp_p7, untrusted);
|
ret |= verify_timestamp(p7, tmstamp_p7, untrusted);
|
||||||
|
else
|
||||||
|
printf("\nFile is not timestamped\n");
|
||||||
if (ret == 1)
|
if (ret == 1)
|
||||||
timestamp_time = NULL;
|
timestamp_time = NULL;
|
||||||
ret |= verify_authenticode(p7, timestamp_time, cafile);
|
ret |= verify_authenticode(p7, timestamp_time, cafile, crlfile);
|
||||||
|
|
||||||
if (tmstamp_p7) {
|
if (tmstamp_p7) {
|
||||||
PKCS7_free(tmstamp_p7);
|
PKCS7_free(tmstamp_p7);
|
||||||
@ -2051,7 +2284,7 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash)
|
|||||||
*/
|
*/
|
||||||
static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile,
|
static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile,
|
||||||
unsigned char *exdata, size_t exlen, char *leafhash,
|
unsigned char *exdata, size_t exlen, char *leafhash,
|
||||||
int allownest, char *cafile, char *untrusted)
|
int allownest, char *cafile, char *crlfile, char *untrusted)
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
int mdtype = -1;
|
int mdtype = -1;
|
||||||
@ -2158,14 +2391,14 @@ static int msi_verify_pkcs7(PKCS7 *p7, GsfInfile *infile,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
printf("\n");
|
printf("\n");
|
||||||
ret |= verify_pkcs7(p7, leafhash, cafile, untrusted);
|
ret |= verify_pkcs7(p7, leafhash, cafile, crlfile, untrusted);
|
||||||
|
|
||||||
if (allownest) {
|
if (allownest) {
|
||||||
int has_sig = 0;
|
int has_sig = 0;
|
||||||
PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig);
|
PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig);
|
||||||
if (p7nest) {
|
if (p7nest) {
|
||||||
printf("\n");
|
printf("\n");
|
||||||
int nest_ret = msi_verify_pkcs7(p7nest, infile, exdata, exlen, leafhash, 0, cafile, untrusted);
|
int nest_ret = msi_verify_pkcs7(p7nest, infile, exdata, exlen, leafhash, 0, cafile, crlfile, untrusted);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = nest_ret;
|
ret = nest_ret;
|
||||||
PKCS7_free(p7nest);
|
PKCS7_free(p7nest);
|
||||||
@ -2185,7 +2418,7 @@ out:
|
|||||||
/*
|
/*
|
||||||
* msi_verify_file checks whether or not the signature of infile is valid.
|
* msi_verify_file checks whether or not the signature of infile is valid.
|
||||||
*/
|
*/
|
||||||
static int msi_verify_file(GsfInfile *infile, char *leafhash, char *cafile, char *untrusted)
|
static int msi_verify_file(GsfInfile *infile, char *leafhash, char *cafile, char *crlfile, char *untrusted)
|
||||||
{
|
{
|
||||||
GsfInput *sig = NULL;
|
GsfInput *sig = NULL;
|
||||||
GsfInput *exsig = NULL;
|
GsfInput *exsig = NULL;
|
||||||
@ -2230,7 +2463,7 @@ static int msi_verify_file(GsfInfile *infile, char *leafhash, char *cafile, char
|
|||||||
const unsigned char *blob = (unsigned char *)indata;
|
const unsigned char *blob = (unsigned char *)indata;
|
||||||
p7 = d2i_PKCS7(NULL, &blob, inlen);
|
p7 = d2i_PKCS7(NULL, &blob, inlen);
|
||||||
|
|
||||||
ret = msi_verify_pkcs7(p7, infile, exdata, exlen, leafhash, 1, cafile, untrusted);
|
ret = msi_verify_pkcs7(p7, infile, exdata, exlen, leafhash, 1, cafile, crlfile, untrusted);
|
||||||
|
|
||||||
out:
|
out:
|
||||||
OPENSSL_free(indata);
|
OPENSSL_free(indata);
|
||||||
@ -2485,7 +2718,7 @@ static void extract_page_hash(SpcAttributeTypeAndOptionalValue *obj,
|
|||||||
|
|
||||||
static int verify_pe_pkcs7(PKCS7 *p7, char *indata, size_t peheader,
|
static int verify_pe_pkcs7(PKCS7 *p7, char *indata, size_t peheader,
|
||||||
int pe32plus, size_t sigpos, size_t siglen,
|
int pe32plus, size_t sigpos, size_t siglen,
|
||||||
char *leafhash, int allownest, char *cafile, char *untrusted)
|
char *leafhash, int allownest, char *cafile, char *crlfile, char *untrusted)
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
int mdtype = -1, phtype = -1;
|
int mdtype = -1, phtype = -1;
|
||||||
@ -2546,14 +2779,14 @@ static int verify_pe_pkcs7(PKCS7 *p7, char *indata, size_t peheader,
|
|||||||
OPENSSL_free(cph);
|
OPENSSL_free(cph);
|
||||||
}
|
}
|
||||||
|
|
||||||
ret |= verify_pkcs7(p7, leafhash, cafile, untrusted);
|
ret |= verify_pkcs7(p7, leafhash, cafile, crlfile, untrusted);
|
||||||
|
|
||||||
if (allownest) {
|
if (allownest) {
|
||||||
int has_sig = 0;
|
int has_sig = 0;
|
||||||
PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig);
|
PKCS7 *p7nest = pkcs7_get_nested_signature(p7, &has_sig);
|
||||||
if (p7nest) {
|
if (p7nest) {
|
||||||
printf("\n");
|
printf("\n");
|
||||||
int nest_ret = verify_pe_pkcs7(p7nest, indata, peheader, pe32plus, sigpos, siglen, leafhash, 0, cafile, untrusted);
|
int nest_ret = verify_pe_pkcs7(p7nest, indata, peheader, pe32plus, sigpos, siglen, leafhash, 0, cafile, crlfile, untrusted);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = nest_ret;
|
ret = nest_ret;
|
||||||
PKCS7_free(p7nest);
|
PKCS7_free(p7nest);
|
||||||
@ -2597,7 +2830,7 @@ static PKCS7 *extract_existing_pe_pkcs7(char *indata,
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int verify_pe_file(char *indata, size_t peheader, int pe32plus,
|
static int verify_pe_file(char *indata, size_t peheader, int pe32plus,
|
||||||
size_t sigpos, size_t siglen, char *leafhash, char *cafile, char *untrusted)
|
size_t sigpos, size_t siglen, char *leafhash, char *cafile, char *crlfile, char *untrusted)
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
unsigned int pe_checksum = GET_UINT32_LE(indata + peheader + 88);
|
unsigned int pe_checksum = GET_UINT32_LE(indata + peheader + 88);
|
||||||
@ -2622,7 +2855,7 @@ static int verify_pe_file(char *indata, size_t peheader, int pe32plus,
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = verify_pe_pkcs7(p7, indata, peheader, pe32plus, sigpos, siglen, leafhash, 1, cafile, untrusted);
|
ret = verify_pe_pkcs7(p7, indata, peheader, pe32plus, sigpos, siglen, leafhash, 1, cafile, crlfile, untrusted);
|
||||||
PKCS7_free(p7);
|
PKCS7_free(p7);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
@ -2778,6 +3011,7 @@ int main(int argc, char **argv) {
|
|||||||
int askpass = 0;
|
int askpass = 0;
|
||||||
|
|
||||||
char *cafile = NULL;
|
char *cafile = NULL;
|
||||||
|
char *crlfile = NULL;
|
||||||
char *untrusted = NULL;
|
char *untrusted = NULL;
|
||||||
char *leafhash = NULL;
|
char *leafhash = NULL;
|
||||||
#ifdef ENABLE_CURL
|
#ifdef ENABLE_CURL
|
||||||
@ -2835,6 +3069,18 @@ int main(int argc, char **argv) {
|
|||||||
|
|
||||||
md = EVP_sha1();
|
md = EVP_sha1();
|
||||||
|
|
||||||
|
if (!strcmp(argv[1], "--help")) {
|
||||||
|
printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n\n",
|
||||||
|
SSLeay_version(SSLEAY_VERSION),
|
||||||
|
#ifdef ENABLE_CURL
|
||||||
|
curl_version()
|
||||||
|
#else
|
||||||
|
"no libcurl available"
|
||||||
|
#endif
|
||||||
|
);
|
||||||
|
help_for(argv0, "all");
|
||||||
|
}
|
||||||
|
|
||||||
if (argc > 1) {
|
if (argc > 1) {
|
||||||
if (!strcmp(argv[1], "sign")) {
|
if (!strcmp(argv[1], "sign")) {
|
||||||
cmd = CMD_SIGN;
|
cmd = CMD_SIGN;
|
||||||
@ -2847,7 +3093,7 @@ int main(int argc, char **argv) {
|
|||||||
} else if (!strcmp(argv[1], "attach-signature")) {
|
} else if (!strcmp(argv[1], "attach-signature")) {
|
||||||
cmd = CMD_ATTACH;
|
cmd = CMD_ATTACH;
|
||||||
argv++;
|
argv++;
|
||||||
argc--;
|
argc--;
|
||||||
} else if (!strcmp(argv[1], "remove-signature")) {
|
} else if (!strcmp(argv[1], "remove-signature")) {
|
||||||
cmd = CMD_REMOVE;
|
cmd = CMD_REMOVE;
|
||||||
argv++;
|
argv++;
|
||||||
@ -2870,57 +3116,57 @@ int main(int argc, char **argv) {
|
|||||||
|
|
||||||
for (argc--,argv++; argc >= 1; argc--,argv++) {
|
for (argc--,argv++; argc >= 1; argc--,argv++) {
|
||||||
if (!strcmp(*argv, "-in")) {
|
if (!strcmp(*argv, "-in")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
infile = *(++argv);
|
infile = *(++argv);
|
||||||
} else if (!strcmp(*argv, "-out")) {
|
} else if (!strcmp(*argv, "-out")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
outfile = *(++argv);
|
outfile = *(++argv);
|
||||||
} else if (!strcmp(*argv, "-sigin")) {
|
} else if (!strcmp(*argv, "-sigin")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
sigfile = *(++argv);
|
sigfile = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && (!strcmp(*argv, "-spc") || !strcmp(*argv, "-certs"))) {
|
} else if ((cmd == CMD_SIGN) && (!strcmp(*argv, "-spc") || !strcmp(*argv, "-certs"))) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
certfile = *(++argv);
|
certfile = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-ac")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-ac")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
xcertfile = *(++argv);
|
xcertfile = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-key")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-key")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
keyfile = *(++argv);
|
keyfile = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs12")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs12")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
pkcs12file = *(++argv);
|
pkcs12file = *(++argv);
|
||||||
} else if ((cmd == CMD_EXTRACT) && !strcmp(*argv, "-pem")) {
|
} else if ((cmd == CMD_EXTRACT) && !strcmp(*argv, "-pem")) {
|
||||||
output_pkcs7 = 1;
|
output_pkcs7 = 1;
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11engine")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11engine")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
p11engine = *(++argv);
|
p11engine = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11module")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11module")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
p11module = *(++argv);
|
p11module = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pass")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-pass")) {
|
||||||
if (askpass || readpass) usage(argv0);
|
if (askpass || readpass) usage(argv0, "all");
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
pass = strdup(*(++argv));
|
pass = strdup(*(++argv));
|
||||||
memset(*argv, 0, strlen(*argv));
|
memset(*argv, 0, strlen(*argv));
|
||||||
#ifdef PROVIDE_ASKPASS
|
#ifdef PROVIDE_ASKPASS
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-askpass")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-askpass")) {
|
||||||
if (pass || readpass) usage(argv0);
|
if (pass || readpass) usage(argv0, "all");
|
||||||
askpass = 1;
|
askpass = 1;
|
||||||
#endif
|
#endif
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-readpass")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-readpass")) {
|
||||||
if (askpass || pass) usage(argv0);
|
if (askpass || pass) usage(argv0, "all");
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
readpass = *(++argv);
|
readpass = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-comm")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-comm")) {
|
||||||
comm = 1;
|
comm = 1;
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-ph")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-ph")) {
|
||||||
pagehash = 1;
|
pagehash = 1;
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-n")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-n")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
desc = *(++argv);
|
desc = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-h")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-h")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
++argv;
|
++argv;
|
||||||
if (!strcmp(*argv, "md5")) {
|
if (!strcmp(*argv, "md5")) {
|
||||||
md = EVP_md5();
|
md = EVP_md5();
|
||||||
@ -2933,23 +3179,23 @@ int main(int argc, char **argv) {
|
|||||||
} else if (!strcmp(*argv, "sha512")) {
|
} else if (!strcmp(*argv, "sha512")) {
|
||||||
md = EVP_sha512();
|
md = EVP_sha512();
|
||||||
} else {
|
} else {
|
||||||
usage(argv0);
|
usage(argv0, "all");
|
||||||
}
|
}
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-i")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-i")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
url = *(++argv);
|
url = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-st")) {
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "-st")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
signing_time = (time_t)strtoul(*(++argv), NULL, 10);
|
signing_time = (time_t)strtoul(*(++argv), NULL, 10);
|
||||||
#ifdef ENABLE_CURL
|
#ifdef ENABLE_CURL
|
||||||
} else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-t")) {
|
} else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-t")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
turl[nturl++] = *(++argv);
|
turl[nturl++] = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-ts")) {
|
} else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-ts")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
tsurl[ntsurl++] = *(++argv);
|
tsurl[ntsurl++] = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-p")) {
|
} else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-p")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
proxy = *(++argv);
|
proxy = *(++argv);
|
||||||
} else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-noverifypeer")) {
|
} else if ((cmd == CMD_SIGN || cmd == CMD_ADD) && !strcmp(*argv, "-noverifypeer")) {
|
||||||
noverifypeer = 1;
|
noverifypeer = 1;
|
||||||
@ -2965,15 +3211,18 @@ int main(int argc, char **argv) {
|
|||||||
add_msi_dse = 1;
|
add_msi_dse = 1;
|
||||||
#endif
|
#endif
|
||||||
} else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-CAfile")) {
|
} else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-CAfile")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
OPENSSL_free(cafile);
|
OPENSSL_free(cafile);
|
||||||
cafile = OPENSSL_strdup(*++argv);
|
cafile = OPENSSL_strdup(*++argv);
|
||||||
|
} else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-CRLfile")) {
|
||||||
|
if (--argc < 1) usage(argv0, "all");
|
||||||
|
crlfile = OPENSSL_strdup(*++argv);
|
||||||
} else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-untrusted")) {
|
} else if ((cmd == CMD_VERIFY || cmd == CMD_ATTACH) && !strcmp(*argv, "-untrusted")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
OPENSSL_free(untrusted);
|
OPENSSL_free(untrusted);
|
||||||
untrusted = OPENSSL_strdup(*++argv);
|
untrusted = OPENSSL_strdup(*++argv);
|
||||||
} else if ((cmd == CMD_VERIFY) && !strcmp(*argv, "-require-leaf-hash")) {
|
} else if ((cmd == CMD_VERIFY) && !strcmp(*argv, "-require-leaf-hash")) {
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
leafhash = (*++argv);
|
leafhash = (*++argv);
|
||||||
} else if (!strcmp(*argv, "-v") || !strcmp(*argv, "--version")) {
|
} else if (!strcmp(*argv, "-v") || !strcmp(*argv, "--version")) {
|
||||||
printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n",
|
printf(PACKAGE_STRING ", using:\n\t%s\n\t%s\n",
|
||||||
@ -2996,11 +3245,22 @@ int main(int argc, char **argv) {
|
|||||||
);
|
);
|
||||||
printf("\nPlease send bug-reports to "
|
printf("\nPlease send bug-reports to "
|
||||||
PACKAGE_BUGREPORT
|
PACKAGE_BUGREPORT
|
||||||
"\n\n");
|
"\n");
|
||||||
|
} else if ((cmd == CMD_ADD) && !strcmp(*argv, "--help")) {
|
||||||
|
help_for(argv0, "add");
|
||||||
|
} else if ((cmd == CMD_ATTACH) && !strcmp(*argv, "--help")) {
|
||||||
|
help_for(argv0, "attach-signature");
|
||||||
|
} else if ((cmd == CMD_EXTRACT) && !strcmp(*argv, "--help")) {
|
||||||
|
help_for(argv0, "extract-signature");
|
||||||
|
} else if ((cmd == CMD_REMOVE) && !strcmp(*argv, "--help")) {
|
||||||
|
help_for(argv0, "remove-signature");
|
||||||
|
} else if ((cmd == CMD_SIGN) && !strcmp(*argv, "--help")) {
|
||||||
|
help_for(argv0, "sign");
|
||||||
|
} else if ((cmd == CMD_VERIFY) && !strcmp(*argv, "--help")) {
|
||||||
|
help_for(argv0, "verify");
|
||||||
} else if (!strcmp(*argv, "-jp")) {
|
} else if (!strcmp(*argv, "-jp")) {
|
||||||
char *ap;
|
char *ap;
|
||||||
if (--argc < 1) usage(argv0);
|
if (--argc < 1) usage(argv0, "all");
|
||||||
ap = *(++argv);
|
ap = *(++argv);
|
||||||
for (i=0; ap[i]; i++) ap[i] = tolower((int)ap[i]);
|
for (i=0; ap[i]; i++) ap[i] = tolower((int)ap[i]);
|
||||||
if (!strcmp(ap, "low")) {
|
if (!strcmp(ap, "low")) {
|
||||||
@ -3010,7 +3270,7 @@ int main(int argc, char **argv) {
|
|||||||
} else if (!strcmp(ap, "high")) {
|
} else if (!strcmp(ap, "high")) {
|
||||||
jp = 2;
|
jp = 2;
|
||||||
}
|
}
|
||||||
if (jp != 0) usage(argv0); /* XXX */
|
if (jp != 0) usage(argv0, "all"); /* XXX */
|
||||||
} else {
|
} else {
|
||||||
failarg = *argv;
|
failarg = *argv;
|
||||||
break;
|
break;
|
||||||
@ -3038,7 +3298,7 @@ int main(int argc, char **argv) {
|
|||||||
(cmd == CMD_SIGN && !((certfile && keyfile) || pkcs12file || p11module))) {
|
(cmd == CMD_SIGN && !((certfile && keyfile) || pkcs12file || p11module))) {
|
||||||
if (failarg)
|
if (failarg)
|
||||||
fprintf(stderr, "Unknown option: %s\n", failarg);
|
fprintf(stderr, "Unknown option: %s\n", failarg);
|
||||||
usage(argv0);
|
usage(argv0, "all");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (readpass) {
|
if (readpass) {
|
||||||
@ -3254,7 +3514,7 @@ int main(int argc, char **argv) {
|
|||||||
}
|
}
|
||||||
goto skip_signing;
|
goto skip_signing;
|
||||||
} else if (cmd == CMD_VERIFY) {
|
} else if (cmd == CMD_VERIFY) {
|
||||||
ret = msi_verify_file(ole, leafhash, cafile, untrusted);
|
ret = msi_verify_file(ole, leafhash, cafile, crlfile, untrusted);
|
||||||
goto skip_signing;
|
goto skip_signing;
|
||||||
} else if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) {
|
} else if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) {
|
||||||
if (nest || cmd == CMD_ADD) {
|
if (nest || cmd == CMD_ADD) {
|
||||||
@ -3482,7 +3742,7 @@ int main(int argc, char **argv) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (cmd == CMD_VERIFY) {
|
if (cmd == CMD_VERIFY) {
|
||||||
ret = verify_pe_file(indata, peheader, pe32plus, sigpos ? sigpos : fileend, siglen, leafhash, cafile, untrusted);
|
ret = verify_pe_file(indata, peheader, pe32plus, sigpos ? sigpos : fileend, siglen, leafhash, cafile, crlfile, untrusted);
|
||||||
goto skip_signing;
|
goto skip_signing;
|
||||||
}
|
}
|
||||||
if (sigpos > 0) {
|
if (sigpos > 0) {
|
||||||
@ -3791,7 +4051,7 @@ skip_signing:
|
|||||||
DO_EXIT_0("Error verifying result\n");
|
DO_EXIT_0("Error verifying result\n");
|
||||||
int sigpos = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16);
|
int sigpos = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16);
|
||||||
int siglen = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16 + 4);
|
int siglen = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16 + 4);
|
||||||
ret = verify_pe_file(outdataverify, peheader, pe32plus, sigpos, siglen, leafhash, cafile, untrusted);
|
ret = verify_pe_file(outdataverify, peheader, pe32plus, sigpos, siglen, leafhash, cafile, crlfile, untrusted);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
DO_EXIT_0("Signature mismatch\n");
|
DO_EXIT_0("Signature mismatch\n");
|
||||||
}
|
}
|
||||||
@ -3805,7 +4065,7 @@ skip_signing:
|
|||||||
DO_EXIT_1("Error opening file %s\n", outfile);
|
DO_EXIT_1("Error opening file %s\n", outfile);
|
||||||
ole = gsf_infile_msole_new(src, NULL);
|
ole = gsf_infile_msole_new(src, NULL);
|
||||||
g_object_unref(src);
|
g_object_unref(src);
|
||||||
ret = msi_verify_file(ole, leafhash, cafile, untrusted);
|
ret = msi_verify_file(ole, leafhash, cafile, crlfile, untrusted);
|
||||||
g_object_unref(ole);
|
g_object_unref(ole);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
DO_EXIT_0("Signature mismatch\n");
|
DO_EXIT_0("Signature mismatch\n");
|
||||||
@ -3822,6 +4082,8 @@ skip_signing:
|
|||||||
}
|
}
|
||||||
OPENSSL_free(cafile);
|
OPENSSL_free(cafile);
|
||||||
OPENSSL_free(untrusted);
|
OPENSSL_free(untrusted);
|
||||||
|
if (crlfile)
|
||||||
|
OPENSSL_free(crlfile);
|
||||||
cleanup_lib_state();
|
cleanup_lib_state();
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
|
@ -47,6 +47,38 @@ TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c '
|
|||||||
2>> "makecerts.log" 1>&2'
|
2>> "makecerts.log" 1>&2'
|
||||||
test_result $?
|
test_result $?
|
||||||
|
|
||||||
|
printf "\nGenerate private RSA encrypted key\n" >> "makecerts.log"
|
||||||
|
$OPENSSL genrsa -des3 -out demoCA/private.key -passout pass:$password \
|
||||||
|
2>> "makecerts.log" 1>&2
|
||||||
|
test_result $?
|
||||||
|
cat demoCA/private.key >> tmp/keyp.pem 2>> "makecerts.log"
|
||||||
|
|
||||||
|
printf "\nGenerate private RSA decrypted key\n" >> "makecerts.log"
|
||||||
|
$OPENSSL rsa -in demoCA/private.key -passin pass:$password -out tmp/key.pem \
|
||||||
|
2>> "makecerts.log" 1>&2
|
||||||
|
test_result $?
|
||||||
|
|
||||||
|
printf "\nGenerate a certificate to revoke\n" >> "makecerts.log"
|
||||||
|
$OPENSSL req -config $CONF -new -key demoCA/private.key -passin pass:$password -out demoCA/revoked.csr \
|
||||||
|
-subj "/C=PL/O=osslsigncode/OU=CA/CN=revoked/emailAddress=revoked@example.com" \
|
||||||
|
2>> "makecerts.log" 1>&2
|
||||||
|
$OPENSSL ca -config $CONF -batch -in demoCA/revoked.csr -out demoCA/revoked.cer \
|
||||||
|
2>> "makecerts.log" 1>&2
|
||||||
|
$OPENSSL x509 -in demoCA/revoked.cer -out tmp/revoked.pem \
|
||||||
|
2>> "makecerts.log" 1>&2
|
||||||
|
|
||||||
|
printf "\nRevoke above certificate\n" >> "makecerts.log"
|
||||||
|
$OPENSSL ca -config $CONF -revoke demoCA/1000.pem \
|
||||||
|
2>> "makecerts.log" 1>&2
|
||||||
|
|
||||||
|
printf "\nGenerate CRL file\n" >> "makecerts.log"
|
||||||
|
TZ=GMT faketime -f '@2019-01-01 00:00:00' /bin/bash -c '
|
||||||
|
script_path=$(pwd)
|
||||||
|
OPENSSL=openssl
|
||||||
|
CONF="${script_path}/openssltest.cnf"
|
||||||
|
$OPENSSL ca -config $CONF -gencrl -crldays 8766 -out tmp/CACertCRL.pem \
|
||||||
|
2>> "makecerts.log" 1>&2'
|
||||||
|
|
||||||
printf "\nGenerate CSP Cross-Certificate\n" >> "makecerts.log"
|
printf "\nGenerate CSP Cross-Certificate\n" >> "makecerts.log"
|
||||||
$OPENSSL genrsa -out demoCA/cross.key \
|
$OPENSSL genrsa -out demoCA/cross.key \
|
||||||
2>> "makecerts.log" 1>&2
|
2>> "makecerts.log" 1>&2
|
||||||
@ -59,17 +91,6 @@ $OPENSSL req -config $CONF -new -x509 -days 900 -key demoCA/cross.key -out tmp/c
|
|||||||
2>> "makecerts.log" 1>&2'
|
2>> "makecerts.log" 1>&2'
|
||||||
test_result $?
|
test_result $?
|
||||||
|
|
||||||
printf "\nGenerate private RSA encrypted key\n" >> "makecerts.log"
|
|
||||||
$OPENSSL genrsa -des3 -out demoCA/private.key -passout pass:$password \
|
|
||||||
2>> "makecerts.log" 1>&2
|
|
||||||
test_result $?
|
|
||||||
cat demoCA/private.key >> tmp/keyp.pem 2>> "makecerts.log"
|
|
||||||
|
|
||||||
printf "\nGenerate private RSA decrypted key\n" >> "makecerts.log"
|
|
||||||
$OPENSSL rsa -in demoCA/private.key -passin pass:$password -out tmp/key.pem \
|
|
||||||
2>> "makecerts.log" 1>&2
|
|
||||||
test_result $?
|
|
||||||
|
|
||||||
printf "\nGenerate code signing certificate\n" >> "makecerts.log"
|
printf "\nGenerate code signing certificate\n" >> "makecerts.log"
|
||||||
$OPENSSL req -config $CONF -new -key demoCA/private.key -passin pass:$password -out demoCA/cert.csr \
|
$OPENSSL req -config $CONF -new -key demoCA/private.key -passin pass:$password -out demoCA/cert.csr \
|
||||||
-subj "/C=PL/ST=Mazovia Province/L=Warsaw/O=osslsigncode/OU=CA/CN=localhost/emailAddress=osslsigncode@example.com" \
|
-subj "/C=PL/ST=Mazovia Province/L=Warsaw/O=osslsigncode/OU=CA/CN=localhost/emailAddress=osslsigncode@example.com" \
|
||||||
@ -116,6 +137,7 @@ test_result $?
|
|||||||
|
|
||||||
# copy new files
|
# copy new files
|
||||||
if [ -s tmp/CACert.pem ] && [ -s tmp/crosscert.pem ] && [ -s tmp/expired.pem ] && [ -s tmp/cert.pem ] && \
|
if [ -s tmp/CACert.pem ] && [ -s tmp/crosscert.pem ] && [ -s tmp/expired.pem ] && [ -s tmp/cert.pem ] && \
|
||||||
|
[ -s tmp/CACertCRL.pem ] && [ -s tmp/revoked.pem ] && \
|
||||||
[ -s tmp/key.pem ] && [ -s tmp/keyp.pem ] && [ -s tmp/key.der ] && \
|
[ -s tmp/key.pem ] && [ -s tmp/keyp.pem ] && [ -s tmp/key.der ] && \
|
||||||
[ -s tmp/cert.der ] && [ -s tmp/cert.spc ] && [ -s tmp/cert.p12 ]
|
[ -s tmp/cert.der ] && [ -s tmp/cert.spc ] && [ -s tmp/cert.p12 ]
|
||||||
then
|
then
|
||||||
|
@ -11,6 +11,7 @@ if [ -s "test.exe" ]
|
|||||||
then
|
then
|
||||||
../../osslsigncode attach-signature -sigin "sign_pe.pem" \
|
../../osslsigncode attach-signature -sigin "sign_pe.pem" \
|
||||||
-CAfile "${script_path}/../certs/CACert.pem" \
|
-CAfile "${script_path}/../certs/CACert.pem" \
|
||||||
|
-CRLfile "${script_path}/../certs/CACertCRL.pem" \
|
||||||
-in "test.exe" -out "test_321.exe"
|
-in "test.exe" -out "test_321.exe"
|
||||||
verify_signature "$?" "321" "exe" "success" "@2019-09-01 12:00:00" \
|
verify_signature "$?" "321" "exe" "success" "@2019-09-01 12:00:00" \
|
||||||
"sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN"
|
"sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN"
|
||||||
@ -29,6 +30,7 @@ if [ -s "sample.msi" ]
|
|||||||
then
|
then
|
||||||
../../osslsigncode attach-signature -sigin "sign_msi.pem" \
|
../../osslsigncode attach-signature -sigin "sign_msi.pem" \
|
||||||
-CAfile "${script_path}/../certs/CACert.pem" \
|
-CAfile "${script_path}/../certs/CACert.pem" \
|
||||||
|
-CRLfile "${script_path}/../certs/CACertCRL.pem" \
|
||||||
-in "sample.msi" -out "test_322.msi"
|
-in "sample.msi" -out "test_322.msi"
|
||||||
verify_signature "$?" "322" "msi" "success" "@2019-09-01 12:00:00" \
|
verify_signature "$?" "322" "msi" "success" "@2019-09-01 12:00:00" \
|
||||||
"sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN"
|
"sha256sum" "ASCII" "osslsigncode" "UNUSED_PATTERN"
|
||||||
|
@ -13,15 +13,8 @@ if [ -s "test.exe" ]
|
|||||||
-st "1556668800" \
|
-st "1556668800" \
|
||||||
-certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.der" \
|
-certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.der" \
|
||||||
-in "test.exe" -out "test_401.exe"
|
-in "test.exe" -out "test_401.exe"
|
||||||
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
|
verify_leaf_hash "$?" "401" "exe" "@2019-05-01 00:00:00"
|
||||||
printf "Verify time: " && date && printf "\n"
|
test_result "$?" "$test_name"
|
||||||
script_path=$(pwd)
|
|
||||||
../../osslsigncode verify -CAfile "${script_path}/../certs/CACert.pem" -in "test_401.exe" \
|
|
||||||
-require-leaf-hash SHA256:$(sha256sum "${script_path}/../certs/cert.der" | cut -d" " -f1)'
|
|
||||||
if test_result "$?" "$test_name"
|
|
||||||
then
|
|
||||||
rm -f "test_401.exe"
|
|
||||||
fi
|
|
||||||
else
|
else
|
||||||
printf "Test skipped\n"
|
printf "Test skipped\n"
|
||||||
fi
|
fi
|
||||||
@ -30,23 +23,16 @@ if [ -s "test.exe" ]
|
|||||||
# Command is not supported for non-PE/non-MSI files
|
# Command is not supported for non-PE/non-MSI files
|
||||||
|
|
||||||
# MSI file
|
# MSI file
|
||||||
test_name="402. Compare the leaf certificate hash against specified SHA256 message digest for the MSI file"
|
test_name="403. Compare the leaf certificate hash against specified SHA256 message digest for the MSI file"
|
||||||
printf "\n%s\n" "$test_name"
|
printf "\n%s\n" "$test_name"
|
||||||
if [ -s "sample.msi" ]
|
if [ -s "sample.msi" ]
|
||||||
then
|
then
|
||||||
../../osslsigncode sign -h sha256 \
|
../../osslsigncode sign -h sha256 \
|
||||||
-st "1556668800" \
|
-st "1556668800" \
|
||||||
-certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.der" \
|
-certs "${script_path}/../certs/cert.pem" -key "${script_path}/../certs/key.der" \
|
||||||
-in "sample.msi" -out "test_402.msi"
|
-in "sample.msi" -out "test_403.msi"
|
||||||
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
|
verify_leaf_hash "$?" "403" "msi" "@2019-05-01 00:00:00"
|
||||||
printf "Verify time: " && date && printf "\n"
|
test_result "$?" "$test_name"
|
||||||
script_path=$(pwd)
|
|
||||||
../../osslsigncode verify -CAfile "${script_path}/../certs/CACert.pem" -in "test_402.msi" \
|
|
||||||
-require-leaf-hash SHA256:$(sha256sum "${script_path}/../certs/cert.der" | cut -d" " -f1)'
|
|
||||||
if test_result "$?" "$test_name"
|
|
||||||
then
|
|
||||||
rm -f "test_402.msi"
|
|
||||||
fi
|
|
||||||
else
|
else
|
||||||
printf "Test skipped\n"
|
printf "Test skipped\n"
|
||||||
fi
|
fi
|
||||||
|
45
tests/recipes/55_verify_revoked
Normal file
45
tests/recipes/55_verify_revoked
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
# Verify PE/MSI file signed with the revoked cert.
|
||||||
|
|
||||||
|
. $(dirname $0)/../test_library
|
||||||
|
|
||||||
|
# PE file
|
||||||
|
test_name="551. Verify PE file signed with the revoked cert"
|
||||||
|
printf "\n%s\n" "$test_name"
|
||||||
|
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
|
||||||
|
then
|
||||||
|
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
|
||||||
|
script_path=$(pwd)
|
||||||
|
../../osslsigncode sign -h sha256 \
|
||||||
|
-certs "${script_path}/../certs/revoked.pem" -key "${script_path}/../certs/key.pem" \
|
||||||
|
-ts http://time.certum.pl/ \
|
||||||
|
-in "test.exe" -out "test_551.exe" 2>> "results.log" 1>&2'
|
||||||
|
verify_signature "$?" "551" "exe" "fail" "@2019-09-01 12:00:00" \
|
||||||
|
"UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN"
|
||||||
|
test_result "$?" "$test_name"
|
||||||
|
else
|
||||||
|
printf "Test skipped\n"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# CAB file
|
||||||
|
# Command is not supported for non-PE/non-MSI files
|
||||||
|
|
||||||
|
# MSI file
|
||||||
|
test_name="553. Verify MSI file signed with the revoked cert"
|
||||||
|
printf "\n%s\n" "$test_name"
|
||||||
|
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
|
||||||
|
then
|
||||||
|
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
|
||||||
|
script_path=$(pwd)
|
||||||
|
../../osslsigncode sign -h sha256 \
|
||||||
|
-certs "${script_path}/../certs/revoked.pem" -key "${script_path}/../certs/key.pem" \
|
||||||
|
-ts http://time.certum.pl/ \
|
||||||
|
-in "sample.msi" -out "test_553.msi"'
|
||||||
|
verify_signature "$?" "553" "msi" "fail" "@2019-09-01 12:00:00" \
|
||||||
|
"UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN" "UNUSED_PATTERN"
|
||||||
|
test_result "$?" "$test_name"
|
||||||
|
else
|
||||||
|
printf "Test skipped\n"
|
||||||
|
fi
|
||||||
|
|
||||||
|
exit 0
|
@ -35,7 +35,9 @@ modify_blob() {
|
|||||||
xxd -p -c 1000 "test_$1.$2" | \
|
xxd -p -c 1000 "test_$1.$2" | \
|
||||||
sed "s/$initial_blob$zero_blob/$initial_blob$modified_blob/" | \
|
sed "s/$initial_blob$zero_blob/$initial_blob$modified_blob/" | \
|
||||||
xxd -p -r > "test_$1_changed.$2"
|
xxd -p -r > "test_$1_changed.$2"
|
||||||
../../osslsigncode verify -CAfile "${script_path}/../certs/CACert.pem" \
|
../../osslsigncode verify \
|
||||||
|
-CAfile "${script_path}/../certs/CACert.pem" \
|
||||||
|
-CRLfile "${script_path}/../certs/CACertCRL.pem" \
|
||||||
-in "test_$1_changed.$2" 2>> "verify.log" 1>&2
|
-in "test_$1_changed.$2" 2>> "verify.log" 1>&2
|
||||||
result=$?
|
result=$?
|
||||||
if [ "$result" -ne 0 ] || \
|
if [ "$result" -ne 0 ] || \
|
||||||
@ -96,21 +98,25 @@ verify_signature() {
|
|||||||
# $9 modify requirement
|
# $9 modify requirement
|
||||||
|
|
||||||
local result=0
|
local result=0
|
||||||
|
printf "" > "verify.log"
|
||||||
if [ "$1" -eq 0 ]
|
if [ "$1" -eq 0 ]
|
||||||
then
|
then
|
||||||
if [ "$3" != "ex_" ]
|
if [ "$3" != "ex_" ]
|
||||||
then
|
then
|
||||||
cp "test_$2.$3" "test_tmp.tmp"
|
cp "test_$2.$3" "test_tmp.tmp"
|
||||||
TZ=GMT faketime -f "$5" /bin/bash -c '
|
TZ=GMT faketime -f "$5" /bin/bash -c '
|
||||||
printf "Verify time: " > "verify.log" && date > "verify.log" && printf "\n" > "verify.log"
|
printf "Verify time: " >> "verify.log" && date >> "verify.log" && printf "\n" >> "verify.log"
|
||||||
script_path=$(pwd)
|
script_path=$(pwd)
|
||||||
../../osslsigncode verify -CAfile "${script_path}/../certs/CACert.pem" \
|
../../osslsigncode verify \
|
||||||
-in "test_tmp.tmp" 2> "verify.log" 1>&2'
|
-CAfile "${script_path}/../certs/CACert.pem" \
|
||||||
|
-CRLfile "${script_path}/../certs/CACertCRL.pem" \
|
||||||
|
-in "test_tmp.tmp" 2>> "verify.log" 1>&2'
|
||||||
result=$?
|
result=$?
|
||||||
rm -f "test_tmp.tmp"
|
rm -f "test_tmp.tmp"
|
||||||
|
else
|
||||||
|
printf "VERIFY is not supported for CAB files\n"
|
||||||
fi
|
fi
|
||||||
if [ "$7" != "UNUSED_PATTERN" ] && [ "$8" != "UNUSED_PATTERN" ]
|
if [ "$result" -eq 0 ] && [ "$7" != "UNUSED_PATTERN" ] && [ "$8" != "UNUSED_PATTERN" ]
|
||||||
then
|
then
|
||||||
search_pattern "$2" "$3" "$7" "$8" "$9"
|
search_pattern "$2" "$3" "$7" "$8" "$9"
|
||||||
result=$?
|
result=$?
|
||||||
@ -124,10 +130,15 @@ verify_signature() {
|
|||||||
sha256sum "test_$2.$3" 2>> "sha256sum_$3.log" 1>&2
|
sha256sum "test_$2.$3" 2>> "sha256sum_$3.log" 1>&2
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
if ([ "$4" = "success" ] && [ "$result" -eq 0 ]) || ([ "$4" = "fail" ] && [ "$result" -eq 1 ])
|
if [ "$4" = "success" ] && [ "$result" -eq 0 ]
|
||||||
then
|
then
|
||||||
rm -f "test_$2.$3" "test_$2_signed.$3" "test_$2_modifed.$3" "test_$2_changed.$3"
|
rm -f "test_$2.$3" "test_$2_signed.$3" "test_$2_modifed.$3" "test_$2_changed.$3"
|
||||||
result=0
|
result=0
|
||||||
|
elif [ "$4" = "fail" ] && [ "$result" -eq 1 ]
|
||||||
|
then
|
||||||
|
rm -f "test_$2.$3" "test_$2_signed.$3" "test_$2_modifed.$3" "test_$2_changed.$3"
|
||||||
|
cat "verify.log" >> "results.log"
|
||||||
|
result=0
|
||||||
else
|
else
|
||||||
cat "verify.log" >> "results.log"
|
cat "verify.log" >> "results.log"
|
||||||
result=1
|
result=1
|
||||||
@ -135,6 +146,43 @@ verify_signature() {
|
|||||||
else
|
else
|
||||||
result=1
|
result=1
|
||||||
fi
|
fi
|
||||||
|
return "$result"
|
||||||
|
}
|
||||||
|
|
||||||
|
verify_leaf_hash() {
|
||||||
|
# $1 sign exit code
|
||||||
|
# $2 test number
|
||||||
|
# $3 filename extension
|
||||||
|
# $4 fake time
|
||||||
|
|
||||||
|
local result=0
|
||||||
|
printf "" > "verify.log"
|
||||||
|
if [ "$1" -eq 0 ]
|
||||||
|
then
|
||||||
|
if [ "$3" != "ex_" ]
|
||||||
|
then
|
||||||
|
cp "test_$2.$3" "test_tmp.tmp"
|
||||||
|
TZ=GMT faketime -f "$4" /bin/bash -c '
|
||||||
|
printf "Verify time: " >> "verify.log" && date >> "verify.log" && printf "\n" >> "verify.log"
|
||||||
|
script_path=$(pwd)
|
||||||
|
../../osslsigncode verify \
|
||||||
|
-CAfile "${script_path}/../certs/CACert.pem" \
|
||||||
|
-CRLfile "${script_path}/../certs/CACertCRL.pem" \
|
||||||
|
-require-leaf-hash SHA256:$(sha256sum "${script_path}/../certs/cert.der" | cut -d" " -f1) \
|
||||||
|
-in "test_tmp.tmp" 2>> "verify.log" 1>&2'
|
||||||
|
result=$?
|
||||||
|
rm -f "test_tmp.tmp"
|
||||||
|
else
|
||||||
|
printf "VERIFY is not supported for CAB files\n"
|
||||||
|
fi
|
||||||
|
if [ "$result" -eq 0 ]
|
||||||
|
then
|
||||||
|
rm -f "test_$2.$3"
|
||||||
|
else
|
||||||
|
cat "verify.log" >> "results.log"
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
result=1
|
||||||
|
fi
|
||||||
return "$result"
|
return "$result"
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user