mirror of
https://github.com/mtrojnar/osslsigncode.git
synced 2025-04-04 17:00:11 -05:00
MSI file signing support
DIFAT sectors are not supported
This commit is contained in:
parent
4f590989ce
commit
758003156e
134
msi.h
134
msi.h
@ -9,6 +9,7 @@
|
||||
#define FATSECT 0xfffffffd /* specifies a FAT sector in the FAT */
|
||||
#define ENDOFCHAIN 0xfffffffe /* end of a linked chain of sectors */
|
||||
#define NOSTREAM 0xffffffff /* terminator or empty pointer */
|
||||
#define FREESECT 0xffffffff /* empty unallocated free sectors */
|
||||
|
||||
#define DIR_UNKNOWN 0
|
||||
#define DIR_STORAGE 1
|
||||
@ -18,28 +19,32 @@
|
||||
#define RED_COLOR 0
|
||||
#define BLACK_COLOR 1
|
||||
|
||||
#define DIFAT_IN_HEADER 109
|
||||
#define DIFAT_IN_HEADER 109
|
||||
#define MINI_STREAM_CUTOFF_SIZE 0x00001000 /* 4096 bytes */
|
||||
#define HEADER_SIZE 0x200 /* 512 bytes, independent of sector size */
|
||||
|
||||
#define HEADER_SIGNATURE 0x00
|
||||
#define HEADER_SIGNATURE 0x00 /* 0xD0, 0xCF, 0x11, 0xE0, 0xA1, 0xB1, 0x1A, 0xE1 */
|
||||
#define HEADER_CLSID 0x08 /* reserved and unused */
|
||||
#define HEADER_MINOR_VER 0x18 /* 0x33 and 0x3e have been seen */
|
||||
#define HEADER_MAJOR_VER 0x1a /* 0x3 been seen in wild */
|
||||
#define HEADER_MINOR_VER 0x18 /* SHOULD be set to 0x003E */
|
||||
#define HEADER_MAJOR_VER 0x1a /* MUST be set to either 0x0003 (version 3) or 0x0004 (version 4) */
|
||||
#define HEADER_BYTE_ORDER 0x1c /* 0xfe 0xff == Intel Little Endian */
|
||||
#define HEADER_SECTOR_SHIFT 0x1e
|
||||
#define HEADER_MINI_SECTOR_SHIFT 0x20
|
||||
#define HEADER_SECTOR_SHIFT 0x1e /* MUST be set to 0x0009, or 0x000c */
|
||||
#define HEADER_MINI_SECTOR_SHIFT 0x20 /* MUST be set to 0x0006 */
|
||||
#define RESERVED 0x22 /* reserved and unused */
|
||||
#define HEADER_DIR_SECTOR 0x28
|
||||
#define HEADER_FAT_SECTOR 0x2c
|
||||
#define HEADER_DIR_SECTORS_NUM 0x28
|
||||
#define HEADER_FAT_SECTORS_NUM 0x2c
|
||||
#define HEADER_DIR_SECTOR_LOC 0x30
|
||||
#define HEADER_TRANSACTION 0x34
|
||||
#define HEADER_STREAM_CUTOFF_SIZE 0x38
|
||||
#define HEADER_MINI_STREAM_CUTOFF 0x38 /* 4096 bytes */
|
||||
#define HEADER_MINI_FAT_SECTOR_LOC 0x3c
|
||||
#define HEADER_MINI_FAT_SECTOR 0x40
|
||||
#define HEADER_DIFAT_FAT_SECTOR_LOC 0x44
|
||||
#define HEADER_DIFAT_FAT_SECTOR 0x48
|
||||
#define HEADER_MINI_FAT_SECTORS_NUM 0x40
|
||||
#define HEADER_DIFAT_SECTOR_LOC 0x44
|
||||
#define HEADER_DIFAT_SECTORS_NUM 0x48
|
||||
#define HEADER_DIFAT 0x4c
|
||||
|
||||
#define DIRENT_SIZE 0x80 /* 128 bytes */
|
||||
#define DIRENT_MAX_NAME_SIZE 0x40 /* 64 bytes */
|
||||
|
||||
#define DIRENT_NAME 0x00
|
||||
#define DIRENT_NAME_LEN 0x40 /* length in bytes incl 0 terminator */
|
||||
#define DIRENT_TYPE 0x42
|
||||
@ -61,19 +66,34 @@
|
||||
#define GET_UINT32_LE(p) (((u_char*)(p))[0] | (((u_char*)(p))[1]<<8) | \
|
||||
(((u_char*)(p))[2]<<16) | (((u_char*)(p))[3]<<24))
|
||||
|
||||
#define PUT_UINT8_LE(i,p) \
|
||||
((u_char*)(p))[0] = (i) & 0xff;
|
||||
|
||||
#define PUT_UINT16_LE(i,p) \
|
||||
((u_char*)(p))[0] = (i) & 0xff; \
|
||||
((u_char*)(p))[1] = ((i)>>8) & 0xff
|
||||
|
||||
#define PUT_UINT32_LE(i,p) \
|
||||
((u_char*)(p))[0] = (i) & 0xff; \
|
||||
((u_char*)(p))[1] = ((i)>>8) & 0xff; \
|
||||
((u_char*)(p))[2] = ((i)>>16) & 0xff; \
|
||||
((u_char*)(p))[3] = ((i)>>24) & 0xff
|
||||
|
||||
typedef unsigned char u_char;
|
||||
|
||||
typedef struct {
|
||||
unsigned char signature[8]; /* 0xd0, 0xcf, 0x11, 0xe0, 0xa1, 0xb1, 0x1a, 0xe1 */
|
||||
unsigned char unused_clsid[16]; /* reserved and unused */
|
||||
u_char signature[8]; /* 0xd0, 0xcf, 0x11, 0xe0, 0xa1, 0xb1, 0x1a, 0xe1 */
|
||||
u_char unused_clsid[16]; /* reserved and unused */
|
||||
uint16_t minorVersion;
|
||||
uint16_t majorVersion;
|
||||
uint16_t byteOrder;
|
||||
uint16_t sectorShift; /* power of 2 */
|
||||
uint16_t miniSectorShift; /* power of 2 */
|
||||
unsigned char reserved[6]; /* reserved and unused */
|
||||
uint16_t sectorShift; /* power of 2 */
|
||||
uint16_t miniSectorShift; /* power of 2 */
|
||||
u_char reserved[6]; /* reserved and unused */
|
||||
uint32_t numDirectorySector;
|
||||
uint32_t numFATSector;
|
||||
uint32_t firstDirectorySectorLocation;
|
||||
uint32_t transactionSignatureNumber;
|
||||
uint32_t transactionSignatureNumber; /* reserved */
|
||||
uint32_t miniStreamCutoffSize;
|
||||
uint32_t firstMiniFATSectorLocation;
|
||||
uint32_t numMiniFATSector;
|
||||
@ -83,33 +103,33 @@ typedef struct {
|
||||
} MSI_FILE_HDR;
|
||||
|
||||
typedef struct {
|
||||
unsigned char name[DIRENT_MAX_NAME_SIZE];
|
||||
u_char name[DIRENT_MAX_NAME_SIZE];
|
||||
uint16_t nameLen;
|
||||
uint8_t type;
|
||||
uint8_t colorFlag;
|
||||
uint32_t leftSiblingID; /* Note that it's actually the left/right child in the RB-tree */
|
||||
uint32_t rightSiblingID; /* so entry.leftSibling.rightSibling does NOT go back to entry */
|
||||
uint32_t leftSiblingID;
|
||||
uint32_t rightSiblingID;
|
||||
uint32_t childID;
|
||||
unsigned char clsid[16];
|
||||
unsigned char stateBits[4];
|
||||
unsigned char creationTime[8];
|
||||
unsigned char modifiedTime[8];
|
||||
u_char clsid[16];
|
||||
u_char stateBits[4];
|
||||
u_char creationTime[8];
|
||||
u_char modifiedTime[8];
|
||||
uint32_t startSectorLocation;
|
||||
unsigned char size[8];
|
||||
} MSI_FILE_ENTRY;
|
||||
u_char size[8];
|
||||
} MSI_ENTRY;
|
||||
|
||||
typedef struct {
|
||||
unsigned char name[DIRENT_MAX_NAME_SIZE];
|
||||
u_char name[DIRENT_MAX_NAME_SIZE];
|
||||
uint16_t nameLen;
|
||||
uint8_t type;
|
||||
MSI_FILE_ENTRY *entry;
|
||||
STACK_OF(MSI_DIR_ENTRY) *children;
|
||||
} MSI_DIR_ENTRY;
|
||||
MSI_ENTRY *entry;
|
||||
STACK_OF(MSI_DIRENT) *children;
|
||||
} MSI_DIRENT;
|
||||
|
||||
DEFINE_STACK_OF(MSI_DIR_ENTRY)
|
||||
DEFINE_STACK_OF(MSI_DIRENT)
|
||||
|
||||
typedef struct {
|
||||
const unsigned char *m_buffer;
|
||||
const u_char *m_buffer;
|
||||
size_t m_bufferLen;
|
||||
MSI_FILE_HDR *m_hdr;
|
||||
size_t m_sectorSize;
|
||||
@ -117,6 +137,26 @@ typedef struct {
|
||||
size_t m_miniStreamStartSector;
|
||||
} MSI_FILE;
|
||||
|
||||
typedef struct {
|
||||
char *header;
|
||||
char *ministream;
|
||||
char *minifat;
|
||||
char *fat;
|
||||
uint32_t dirtreeLen;
|
||||
uint32_t miniStreamLen;
|
||||
uint32_t minifatLen;
|
||||
uint32_t fatLen;
|
||||
int ministreamsMemallocCount;
|
||||
int minifatMemallocCount;
|
||||
int fatMemallocCount;
|
||||
int dirtreeSectorsCount;
|
||||
int minifatSectorsCount;
|
||||
int fatSectorsCount;
|
||||
int miniSectorNum;
|
||||
int sectorNum;
|
||||
size_t sectorSize;
|
||||
} MSI_OUT;
|
||||
|
||||
static u_char msi_magic[] = {
|
||||
0xd0, 0xcf, 0x11, 0xe0, 0xa1, 0xb1, 0x1a, 0xe1
|
||||
};
|
||||
@ -126,7 +166,7 @@ static const u_char digital_signature[] = {
|
||||
0x69, 0x00, 0x74, 0x00, 0x61, 0x00, 0x6C, 0x00,
|
||||
0x53, 0x00, 0x69, 0x00, 0x67, 0x00, 0x6E, 0x00,
|
||||
0x61, 0x00, 0x74, 0x00, 0x75, 0x00, 0x72, 0x00,
|
||||
0x65, 0x00
|
||||
0x65, 0x00, 0x00, 0x00
|
||||
};
|
||||
|
||||
static const u_char digital_signature_ex[] = {
|
||||
@ -135,17 +175,19 @@ static const u_char digital_signature_ex[] = {
|
||||
0x74, 0x00, 0x61, 0x00, 0x6C, 0x00, 0x53, 0x00,
|
||||
0x69, 0x00, 0x67, 0x00, 0x6E, 0x00, 0x61, 0x00,
|
||||
0x74, 0x00, 0x75, 0x00, 0x72, 0x00, 0x65, 0x00,
|
||||
0x45, 0x00, 0x78, 0x00
|
||||
0x45, 0x00, 0x78, 0x00, 0x00, 0x00
|
||||
};
|
||||
|
||||
int msi_read_file(MSI_FILE *msi, MSI_FILE_ENTRY *entry, size_t offset, char *buffer, size_t len);
|
||||
MSI_FILE *msi_msifile_new(char *buffer, size_t len);
|
||||
void msi_msifile_free(MSI_FILE *msi);
|
||||
MSI_FILE_ENTRY *msi_get_root_entry(MSI_FILE *msi);
|
||||
MSI_DIR_ENTRY *msi_dirent_new(MSI_FILE *msi, MSI_FILE_ENTRY *entry,
|
||||
MSI_DIR_ENTRY *parent, MSI_FILE_ENTRY **ds, MSI_FILE_ENTRY **dse);
|
||||
int msi_dirent_free(MSI_DIR_ENTRY *dirent);
|
||||
MSI_FILE_HDR *msi_get_file_info(MSI_FILE *msi);
|
||||
int msi_prehash_dir(MSI_DIR_ENTRY *dirent, BIO *hash);
|
||||
int msi_hash_dir(MSI_FILE *msi, MSI_DIR_ENTRY *dirent, BIO *hash);
|
||||
void msi_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf, size_t fileend);
|
||||
int msi_file_read(MSI_FILE *msi, MSI_ENTRY *entry, size_t offset, char *buffer, size_t len);
|
||||
MSI_FILE *msi_file_new(char *buffer, size_t len);
|
||||
void msi_file_free(MSI_FILE *msi);
|
||||
MSI_ENTRY *msi_root_entry_get(MSI_FILE *msi);
|
||||
MSI_DIRENT *msi_dirent_new(MSI_FILE *msi, MSI_ENTRY *entry, MSI_DIRENT *parent);
|
||||
MSI_ENTRY *msi_signatures_get(MSI_DIRENT *dirent, MSI_ENTRY **dse);
|
||||
void msi_dirent_free(MSI_DIRENT *dirent);
|
||||
MSI_FILE_HDR *msi_header_get(MSI_FILE *msi);
|
||||
int msi_prehash_dir(MSI_DIRENT *dirent, BIO *hash, int is_root);
|
||||
int msi_hash_dir(MSI_FILE *msi, MSI_DIRENT *dirent, BIO *hash, int is_root);
|
||||
void msi_calc_digest(char *indata, const EVP_MD *md, u_char *mdbuf, size_t fileend);
|
||||
int msi_dirent_delete(MSI_DIRENT *dirent, const u_char *name);
|
||||
int msi_file_write(MSI_FILE *msi, MSI_DIRENT *dirent, u_char *p, int len, u_char *p_msiex, int len_msiex, BIO *outdata);
|
||||
|
348
osslsigncode.c
348
osslsigncode.c
@ -73,7 +73,6 @@
|
||||
#define NOCRYPT
|
||||
#define WIN32_LEAN_AND_MEAN
|
||||
#include <windows.h>
|
||||
typedef unsigned char u_char;
|
||||
#endif /* HAVE_WINDOWS_H */
|
||||
|
||||
#include <stdio.h>
|
||||
@ -281,9 +280,7 @@ typedef struct {
|
||||
|
||||
typedef struct {
|
||||
MSI_FILE *msi;
|
||||
MSI_DIR_ENTRY *dirent;
|
||||
MSI_FILE_ENTRY *ds;
|
||||
MSI_FILE_ENTRY *dse;
|
||||
MSI_DIRENT *dirent;
|
||||
unsigned char *p_msiex;
|
||||
int len_msiex;
|
||||
} MSI_PARAMS;
|
||||
@ -1154,6 +1151,7 @@ static void usage(const char *argv0, const char *cmd)
|
||||
printf("%12s[ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n", "");
|
||||
#endif /* ENABLE_CURL */
|
||||
printf("%12s[ -verbose ]\n", "");
|
||||
printf("%12s[ -add-msi-dse ]\n", "");
|
||||
printf("%12s[ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
||||
}
|
||||
if (on_list(cmd, cmds_attach)) {
|
||||
@ -1163,6 +1161,7 @@ static void usage(const char *argv0, const char *cmd)
|
||||
printf("%12s[ -untrusted <infile> ]\n", "");
|
||||
printf("%12s[ -CRLuntrusted <infile> ]\n", "");
|
||||
printf("%12s[ -nest ]\n", "");
|
||||
printf("%12s[ -add-msi-dse ]\n", "");
|
||||
printf("%12s[ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
||||
}
|
||||
if (on_list(cmd, cmds_extract)) {
|
||||
@ -1394,17 +1393,6 @@ static void help_for(const char *argv0, const char *cmd)
|
||||
#define DO_EXIT_1(x, y) { printf(x, y); goto err_cleanup; }
|
||||
#define DO_EXIT_2(x, y, z) { printf(x, y, z); goto err_cleanup; }
|
||||
|
||||
#define PUT_UINT16_LE(i,p) \
|
||||
((u_char*)(p))[0] = (i) & 0xff; \
|
||||
((u_char*)(p))[1] = ((i)>>8) & 0xff
|
||||
|
||||
#define PUT_UINT32_LE(i,p) \
|
||||
((u_char*)(p))[0] = (i) & 0xff; \
|
||||
((u_char*)(p))[1] = ((i)>>8) & 0xff; \
|
||||
((u_char*)(p))[2] = ((i)>>16) & 0xff; \
|
||||
((u_char*)(p))[3] = ((i)>>24) & 0xff
|
||||
|
||||
|
||||
typedef enum {
|
||||
FILE_TYPE_CAB,
|
||||
FILE_TYPE_PE,
|
||||
@ -2220,11 +2208,9 @@ static int print_attributes(SIGNATURE *signature, int verbose)
|
||||
}
|
||||
if (signature->url) {
|
||||
printf("\tURL description: %s\n", signature->url);
|
||||
OPENSSL_free(signature->url);
|
||||
}
|
||||
if (signature->desc) {
|
||||
printf("\tText description: %s\n", signature->desc);
|
||||
OPENSSL_free(signature->desc);
|
||||
}
|
||||
if (signature->level) {
|
||||
if (!memcmp(signature->level, java_attrs_low, sizeof(java_attrs_low)))
|
||||
@ -2443,6 +2429,8 @@ static int append_signature_list(STACK_OF(SIGNATURE) **signatures, PKCS7 *p7, in
|
||||
OPENSSL_free(signature->desc);
|
||||
}
|
||||
PKCS7_free(signature->p7);
|
||||
OPENSSL_free(signature->url);
|
||||
OPENSSL_free(signature->desc);
|
||||
OPENSSL_free(signature);
|
||||
return 0; /* FAILED */
|
||||
}
|
||||
@ -2835,23 +2823,20 @@ static int verify_signature(SIGNATURE *signature, GLOBAL_OPTIONS *options)
|
||||
* https://msdn.microsoft.com/en-us/library/dd942138.aspx
|
||||
*/
|
||||
|
||||
static int msi_verify_header(char *indata, char *infile, size_t filesize, MSI_PARAMS *msiparams,
|
||||
FILE_HEADER *header)
|
||||
static int msi_verify_header(char *indata, char *infile, size_t filesize, MSI_PARAMS *msiparams)
|
||||
{
|
||||
int ret = 1;
|
||||
MSI_FILE_ENTRY *ds = NULL;
|
||||
MSI_FILE_ENTRY *dse = NULL;
|
||||
MSI_ENTRY *root;
|
||||
MSI_FILE_HDR *hdr;
|
||||
|
||||
msiparams->msi = msi_msifile_new(indata, filesize);
|
||||
msiparams->msi = msi_file_new(indata, filesize);
|
||||
if (!msiparams->msi) {
|
||||
printf("Corrupt MSI file: %s\n", infile);
|
||||
return 0; /* FAILED */
|
||||
}
|
||||
MSI_FILE_ENTRY *root = msi_get_root_entry(msiparams->msi);
|
||||
msiparams->dirent = msi_dirent_new(msiparams->msi, root, NULL, &ds, &dse);
|
||||
msiparams->ds = ds;
|
||||
msiparams->dse = dse;
|
||||
MSI_FILE_HDR *hdr = msi_get_file_info(msiparams->msi);
|
||||
root = msi_root_entry_get(msiparams->msi);
|
||||
msiparams->dirent = msi_dirent_new(msiparams->msi, root, NULL);
|
||||
hdr = msi_header_get(msiparams->msi);
|
||||
|
||||
/* Minor Version field SHOULD be set to 0x003E.
|
||||
* Major Version field MUST be set to either 0x0003 (version 3) or 0x0004 (version 4). */
|
||||
@ -2894,11 +2879,10 @@ static int msi_verify_header(char *indata, char *infile, size_t filesize, MSI_PA
|
||||
printf("Unsupported Mini Stream Cutoff Size: 0x%08X\n", hdr->miniStreamCutoffSize);
|
||||
ret = 0; /* FAILED */
|
||||
}
|
||||
header->fileend = filesize;
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int msi_verify_pkcs7(SIGNATURE *signature, MSI_FILE *msi, MSI_DIR_ENTRY *dirent,
|
||||
static int msi_verify_pkcs7(SIGNATURE *signature, MSI_FILE *msi, MSI_DIRENT *dirent,
|
||||
char *exdata, uint32_t exlen, GLOBAL_OPTIONS *options)
|
||||
{
|
||||
int ret = 1, mdok, mdtype = -1;
|
||||
@ -2939,7 +2923,7 @@ static int msi_verify_pkcs7(SIGNATURE *signature, MSI_FILE *msi, MSI_DIR_ENTRY *
|
||||
tohex((unsigned char *)exdata, hexbuf, exlen);
|
||||
printf("Current MsiDigitalSignatureEx : %s\n", hexbuf);
|
||||
|
||||
if (!msi_prehash_dir(dirent, prehash)) {
|
||||
if (!msi_prehash_dir(dirent, prehash, 1)) {
|
||||
printf("Failed to calculate pre-hash used for MsiDigitalSignatureEx\n\n");
|
||||
BIO_free_all(hash);
|
||||
BIO_free_all(prehash);
|
||||
@ -2952,7 +2936,7 @@ static int msi_verify_pkcs7(SIGNATURE *signature, MSI_FILE *msi, MSI_DIR_ENTRY *
|
||||
printf("Calculated MsiDigitalSignatureEx : %s\n", hexbuf);
|
||||
}
|
||||
|
||||
if (!msi_hash_dir(msi, dirent, hash)) {
|
||||
if (!msi_hash_dir(msi, dirent, hash, 1)) {
|
||||
printf("Failed to calculate DigitalSignature\n\n");
|
||||
BIO_free_all(hash);
|
||||
goto out;
|
||||
@ -2986,23 +2970,25 @@ static int msi_verify_file(MSI_PARAMS *msiparams, GLOBAL_OPTIONS *options)
|
||||
PKCS7 *p7;
|
||||
|
||||
STACK_OF(SIGNATURE) *signatures = sk_SIGNATURE_new_null();
|
||||
MSI_ENTRY *dse = NULL;
|
||||
MSI_ENTRY *ds = msi_signatures_get(msiparams->dirent, &dse);
|
||||
|
||||
if (!msiparams->ds) {
|
||||
if (!ds) {
|
||||
printf("MSI file has no signature\n\n");
|
||||
goto out;
|
||||
}
|
||||
inlen = GET_UINT32_LE(msiparams->ds->size);
|
||||
inlen = GET_UINT32_LE(ds->size);
|
||||
indata = OPENSSL_malloc(inlen);
|
||||
if (!msi_read_file(msiparams->msi, msiparams->ds, 0, indata, inlen)) {
|
||||
if (!msi_file_read(msiparams->msi, ds, 0, indata, inlen)) {
|
||||
printf("DigitalSignature stream data error\n\n");
|
||||
goto out;
|
||||
}
|
||||
if (!msiparams->dse) {
|
||||
if (!dse) {
|
||||
printf("Warning: MsiDigitalSignatureEx stream doesn't exist\n");
|
||||
} else {
|
||||
exlen = GET_UINT32_LE(msiparams->dse->size);
|
||||
exlen = GET_UINT32_LE(dse->size);
|
||||
exdata = OPENSSL_malloc(exlen);
|
||||
if (!msi_read_file(msiparams->msi, msiparams->dse, 0, exdata, exlen)) {
|
||||
if (!msi_file_read(msiparams->msi, dse, 0, exdata, exlen)) {
|
||||
printf("MsiDigitalSignatureEx stream data error\n\n");
|
||||
goto out;
|
||||
}
|
||||
@ -3028,6 +3014,8 @@ static int msi_verify_file(MSI_PARAMS *msiparams, GLOBAL_OPTIONS *options)
|
||||
ERR_clear_error();
|
||||
}
|
||||
PKCS7_free(signature->p7);
|
||||
OPENSSL_free(signature->url);
|
||||
OPENSSL_free(signature->desc);
|
||||
OPENSSL_free(signature);
|
||||
}
|
||||
printf("Number of verified signatures: %d\n", i);
|
||||
@ -3038,22 +3026,17 @@ out:
|
||||
return ret;
|
||||
}
|
||||
|
||||
static PKCS7 *msi_extract_existing_pkcs7(MSI_PARAMS *msiparams, char **data, uint32_t *len)
|
||||
static PKCS7 *msi_extract_existing_pkcs7(MSI_PARAMS *msiparams, MSI_ENTRY *ds, char **data, uint32_t len)
|
||||
{
|
||||
PKCS7 *p7 = NULL;
|
||||
const unsigned char *blob;
|
||||
|
||||
if (!msiparams->ds) {
|
||||
return NULL;
|
||||
}
|
||||
*len = GET_UINT32_LE(msiparams->ds->size);
|
||||
*data = OPENSSL_malloc(*len);
|
||||
if (!msi_read_file(msiparams->msi, msiparams->ds, 0, *data, *len)) {
|
||||
if (!msi_file_read(msiparams->msi, ds, 0, *data, len)) {
|
||||
printf("DigitalSignature stream data error\n");
|
||||
return NULL;
|
||||
}
|
||||
blob = (unsigned char *)*data;
|
||||
p7 = d2i_PKCS7(NULL, &blob, *len);
|
||||
p7 = d2i_PKCS7(NULL, &blob, len);
|
||||
if (!p7) {
|
||||
printf("Failed to extract PKCS7 data\n");
|
||||
return NULL;
|
||||
@ -3065,11 +3048,18 @@ static int msi_extract_file(MSI_PARAMS *msiparams, BIO *outdata, int output_pkcs
|
||||
{
|
||||
int ret;
|
||||
PKCS7 *sig;
|
||||
uint32_t len;
|
||||
char *data;
|
||||
uint32_t len = 0;
|
||||
|
||||
MSI_ENTRY *ds = msi_signatures_get(msiparams->dirent, NULL);
|
||||
if (!ds) {
|
||||
printf("MSI file has no signature\n\n");
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
len = GET_UINT32_LE(ds->size);
|
||||
data = OPENSSL_malloc(len);
|
||||
(void)BIO_reset(outdata);
|
||||
sig = msi_extract_existing_pkcs7(msiparams, &data, &len);
|
||||
sig = msi_extract_existing_pkcs7(msiparams, ds, &data, len);
|
||||
if (!sig) {
|
||||
printf("Unable to extract existing signature\n");
|
||||
return 1; /* FAILED */
|
||||
@ -3084,6 +3074,79 @@ static int msi_extract_file(MSI_PARAMS *msiparams, BIO *outdata, int output_pkcs
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int msi_remove_file(MSI_PARAMS *msiparams, BIO *outdata)
|
||||
{
|
||||
if (!msi_dirent_delete(msiparams->dirent, digital_signature_ex)) {
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
if (!msi_dirent_delete(msiparams->dirent, digital_signature)) {
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
if (!msi_file_write(msiparams->msi, msiparams->dirent, NULL, 0, NULL, 0, outdata)) {
|
||||
printf("Saving the msi file failed\n");
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
return 0; /* OK */
|
||||
}
|
||||
|
||||
/*
|
||||
* MsiDigitalSignatureEx is an enhanced signature type that
|
||||
* can be used when signing MSI files. In addition to
|
||||
* file content, it also hashes some file metadata, specifically
|
||||
* file names, file sizes, creation times and modification times.
|
||||
*
|
||||
* The file content hashing part stays the same, so the
|
||||
* msi_handle_dir() function can be used across both variants.
|
||||
*
|
||||
* When an MsiDigitalSigntaureEx section is present in an MSI file,
|
||||
* the meaning of the DigitalSignature section changes: Instead
|
||||
* of being merely a file content hash (as what is output by the
|
||||
* msi_handle_dir() function), it is now hashes both content
|
||||
* and metadata.
|
||||
*
|
||||
* Here is how it works:
|
||||
*
|
||||
* First, a "pre-hash" is calculated. This is the "metadata" hash.
|
||||
* It iterates over the files in the MSI in the same order as the
|
||||
* file content hashing method would - but it only processes the
|
||||
* metadata.
|
||||
*
|
||||
* Once the pre-hash is calculated, a new hash is created for
|
||||
* calculating the hash of the file content. The output of the
|
||||
* pre-hash is added as the first element of the file content hash.
|
||||
*
|
||||
* After the pre-hash is written, what follows is the "regular"
|
||||
* stream of data that would normally be written when performing
|
||||
* file content hashing.
|
||||
*
|
||||
* The output of this hash, which combines both metadata and file
|
||||
* content, is what will be output in signed form to the
|
||||
* DigitalSignature section when in 'MsiDigitalSignatureEx' mode.
|
||||
*
|
||||
* As mentioned previously, this new mode of operation is signalled
|
||||
* by the presence of a 'MsiDigitalSignatureEx' section in the MSI
|
||||
* file. This section must come after the 'DigitalSignature'
|
||||
* section, and its content must be the output of the pre-hash
|
||||
* ("metadata") hash.
|
||||
*/
|
||||
|
||||
static int msi_calc_MsiDigitalSignatureEx(MSI_PARAMS *msiparams, const EVP_MD *md, BIO *hash)
|
||||
{
|
||||
BIO *prehash = BIO_new(BIO_f_md());
|
||||
BIO_set_md(prehash, md);
|
||||
BIO_push(prehash, BIO_new(BIO_s_null()));
|
||||
|
||||
if (!msi_prehash_dir(msiparams->dirent, prehash, 1)) {
|
||||
printf("Unable to calculate MSI pre-hash ('metadata') hash\n");
|
||||
return 0; /* FAILED */
|
||||
}
|
||||
msiparams->p_msiex = OPENSSL_malloc(EVP_MAX_MD_SIZE);
|
||||
msiparams->len_msiex = BIO_gets(prehash, (char*)msiparams->p_msiex, EVP_MAX_MD_SIZE);
|
||||
BIO_write(hash, msiparams->p_msiex, msiparams->len_msiex);
|
||||
BIO_free_all(prehash);
|
||||
return 1; /* OK */
|
||||
}
|
||||
|
||||
/*
|
||||
* PE file support
|
||||
*/
|
||||
@ -3333,6 +3396,8 @@ static int pe_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *opt
|
||||
ERR_clear_error();
|
||||
}
|
||||
PKCS7_free(signature->p7);
|
||||
OPENSSL_free(signature->url);
|
||||
OPENSSL_free(signature->desc);
|
||||
OPENSSL_free(signature);
|
||||
}
|
||||
printf("Number of verified signatures: %d\n", i);
|
||||
@ -3670,7 +3735,7 @@ out:
|
||||
return ret;
|
||||
}
|
||||
|
||||
static PKCS7 *cab_extract_existing_pkcs7(char *indata, FILE_HEADER *header)
|
||||
static PKCS7 *extract_existing_pkcs7(char *indata, FILE_HEADER *header)
|
||||
{
|
||||
PKCS7 *p7 = NULL;
|
||||
const unsigned char *blob;
|
||||
@ -3690,7 +3755,7 @@ static int cab_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *op
|
||||
printf("No signature found\n\n");
|
||||
goto out;
|
||||
}
|
||||
p7 = cab_extract_existing_pkcs7(indata, header);
|
||||
p7 = extract_existing_pkcs7(indata, header);
|
||||
if (!p7) {
|
||||
printf("Failed to extract PKCS7 data\n\n");
|
||||
goto out;
|
||||
@ -3710,6 +3775,8 @@ static int cab_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *op
|
||||
ERR_clear_error();
|
||||
}
|
||||
PKCS7_free(signature->p7);
|
||||
OPENSSL_free(signature->url);
|
||||
OPENSSL_free(signature->desc);
|
||||
OPENSSL_free(signature);
|
||||
}
|
||||
printf("Number of verified signatures: %d\n", i);
|
||||
@ -3725,7 +3792,7 @@ static int cab_extract_file(char *indata, FILE_HEADER *header, BIO *outdata, int
|
||||
|
||||
(void)BIO_reset(outdata);
|
||||
if (output_pkcs7) {
|
||||
sig = cab_extract_existing_pkcs7(indata, header);
|
||||
sig = extract_existing_pkcs7(indata, header);
|
||||
if (!sig) {
|
||||
printf("Unable to extract existing signature\n");
|
||||
return 1; /* FAILED */
|
||||
@ -4185,6 +4252,8 @@ static int cat_verify_file(char *catdata, FILE_HEADER *catheader,
|
||||
ERR_clear_error();
|
||||
}
|
||||
PKCS7_free(signature->p7);
|
||||
OPENSSL_free(signature->url);
|
||||
OPENSSL_free(signature->desc);
|
||||
OPENSSL_free(signature);
|
||||
}
|
||||
printf("Number of verified signatures: %d\n", i);
|
||||
@ -4365,7 +4434,7 @@ static int add_unauthenticated_blob(PKCS7 *sig)
|
||||
* Append signature to the outfile
|
||||
*/
|
||||
static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type,
|
||||
GLOBAL_OPTIONS *options, size_t *padlen, int *len, BIO *outdata)
|
||||
GLOBAL_OPTIONS *options, MSI_PARAMS *msiparams, size_t *padlen, int *len, BIO *outdata)
|
||||
{
|
||||
u_char *p = NULL;
|
||||
static char buf[64*1024];
|
||||
@ -4407,7 +4476,14 @@ static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type,
|
||||
BIO_write(outdata, p, *padlen);
|
||||
}
|
||||
} else if (type == FILE_TYPE_MSI) {
|
||||
/* TODO */
|
||||
int len_msi = *len;
|
||||
unsigned char *p_msi = OPENSSL_malloc(len_msi);
|
||||
memcpy(p_msi, p, len_msi);
|
||||
if (!msi_file_write(msiparams->msi, msiparams->dirent, p_msi, len_msi,
|
||||
msiparams->p_msiex, msiparams->len_msiex, outdata)) {
|
||||
printf("Saving the msi file failed\n");
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
} else if (type == FILE_TYPE_CAT) {
|
||||
i2d_PKCS7_bio(outdata, outsig);
|
||||
}
|
||||
@ -4551,7 +4627,7 @@ static int input_validation(file_type_t type, GLOBAL_OPTIONS *options, FILE_HEAD
|
||||
printf("Warning: -ph option is only valid for PE files\n");
|
||||
if (options->jp >= 0)
|
||||
printf("Warning: -jp option is only valid for CAB files\n");
|
||||
if (!msi_verify_header(indata, options->infile, filesize, msiparams, header)) {
|
||||
if (!msi_verify_header(indata, options->infile, filesize, msiparams)) {
|
||||
printf("Corrupt MSI file\n");
|
||||
return 0; /* FAILED */
|
||||
}
|
||||
@ -4559,7 +4635,8 @@ static int input_validation(file_type_t type, GLOBAL_OPTIONS *options, FILE_HEAD
|
||||
return 1; /* OK */
|
||||
}
|
||||
|
||||
static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPTIONS *options)
|
||||
static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPTIONS *options,
|
||||
MSI_PARAMS *msiparams)
|
||||
{
|
||||
size_t filesize;
|
||||
char *outdata;
|
||||
@ -4603,7 +4680,24 @@ static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPT
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
} else if (type == FILE_TYPE_MSI) {
|
||||
/* TODO */
|
||||
filesize = get_file_size(options->outfile);
|
||||
if (!filesize) {
|
||||
printf("Error verifying result\n");
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
outdata = map_file(options->outfile, filesize);
|
||||
if (!outdata) {
|
||||
printf("Error verifying result\n");
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
if (!msi_verify_header(outdata, options->outfile, filesize, msiparams)) {
|
||||
printf("Corrupt CAB file\n");
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
if (msi_verify_file(msiparams, options)) {
|
||||
printf("Signature mismatch\n");
|
||||
return 1; /* FAILED */
|
||||
}
|
||||
} else {
|
||||
printf("Unknown input type for file: %s\n", options->infile);
|
||||
return 1; /* FAILED */
|
||||
@ -5047,8 +5141,9 @@ out:
|
||||
return ret; /* OK */
|
||||
}
|
||||
|
||||
static void free_msi_params(MSI_PARAMS *msiparams) {
|
||||
msi_msifile_free(msiparams->msi);
|
||||
static void free_msi_params(MSI_PARAMS *msiparams)
|
||||
{
|
||||
msi_file_free(msiparams->msi);
|
||||
msi_dirent_free(msiparams->dirent);
|
||||
}
|
||||
|
||||
@ -5133,12 +5228,8 @@ static PKCS7 *get_sigfile(char *sigfile, file_type_t type)
|
||||
header.sigpos = 0;
|
||||
if (type == FILE_TYPE_PE)
|
||||
sig = pe_extract_existing_pkcs7(insigdata, &header);
|
||||
else if (type == FILE_TYPE_CAB)
|
||||
sig = cab_extract_existing_pkcs7(insigdata, &header);
|
||||
else if (type == FILE_TYPE_MSI) {
|
||||
/* TODO */
|
||||
/* sig = msi_extract_existing_pkcs7(msiparams, NULL, 0); */
|
||||
}
|
||||
else
|
||||
sig = extract_existing_pkcs7(insigdata, &header);
|
||||
}
|
||||
return sig; /* OK */
|
||||
}
|
||||
@ -5147,8 +5238,7 @@ static PKCS7 *get_sigfile(char *sigfile, file_type_t type)
|
||||
* Obtain an existing signature or create a new one
|
||||
*/
|
||||
static PKCS7 *get_pkcs7(cmd_type_t cmd, BIO *hash, file_type_t type, char *indata,
|
||||
GLOBAL_OPTIONS *options, FILE_HEADER *header, CRYPTO_PARAMS *cparams,
|
||||
PKCS7 *cursig)
|
||||
GLOBAL_OPTIONS *options, FILE_HEADER *header, CRYPTO_PARAMS *cparams, PKCS7 *cursig)
|
||||
{
|
||||
PKCS7 *sig = NULL;
|
||||
|
||||
@ -5181,6 +5271,84 @@ static PKCS7 *get_pkcs7(cmd_type_t cmd, BIO *hash, file_type_t type, char *indat
|
||||
return sig;
|
||||
}
|
||||
|
||||
/*
|
||||
* Perform a sanity check for the MsiDigitalSignatureEx section.
|
||||
* If the file we're attempting to sign has an MsiDigitalSignatureEx
|
||||
* section, we can't add a nested signature of a different MD type
|
||||
* without breaking the initial signature.
|
||||
*/
|
||||
static int msi_check_MsiDigitalSignatureEx(GLOBAL_OPTIONS *options, MSI_ENTRY *dse)
|
||||
{
|
||||
if (dse && GET_UINT32_LE(dse->size) != EVP_MD_size(options->md)) {
|
||||
printf("Unable to add nested signature with a different MD type (-h parameter) "
|
||||
"than what exists in the MSI file already.\nThis is due to the presence of "
|
||||
"MsiDigitalSignatureEx (-add-msi-dse parameter).\n\n");
|
||||
return 0; /* FAILED */
|
||||
}
|
||||
if (!dse && options->add_msi_dse) {
|
||||
printf("Unable to add signature with -add-msi-dse parameter "
|
||||
"without breaking the initial signature.\n\n");
|
||||
return 0; /* FAILED */
|
||||
}
|
||||
if (dse && !options->add_msi_dse) {
|
||||
printf("Unable to add signature without -add-msi-dse parameter "
|
||||
"without breaking the initial signature.\nThis is due to the presence of "
|
||||
"MsiDigitalSignatureEx (-add-msi-dse parameter).\n"
|
||||
"Should use -add-msi-dse options in this case.\n\n");
|
||||
return 0; /* FAILED */
|
||||
}
|
||||
return 1; /* OK */
|
||||
}
|
||||
|
||||
/*
|
||||
* Prepare the output file for signing
|
||||
*/
|
||||
static PKCS7 *msi_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header,
|
||||
GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata,
|
||||
BIO *hash, PKCS7 **cursig, MSI_PARAMS *msiparams)
|
||||
{
|
||||
PKCS7 *sig = NULL;
|
||||
uint32_t len;
|
||||
char *data;
|
||||
|
||||
if (options->add_msi_dse && !msi_calc_MsiDigitalSignatureEx(msiparams, options->md, hash)) {
|
||||
printf("Unable to calc MsiDigitalSignatureEx\n");
|
||||
return NULL; /* FAILED */
|
||||
}
|
||||
if (!msi_hash_dir(msiparams->msi, msiparams->dirent, hash, 1)) {
|
||||
printf("Unable to msi_handle_dir()\n");
|
||||
return NULL; /* FAILED */
|
||||
}
|
||||
|
||||
/* Obtain a current signature from previously-signed file */
|
||||
if ((cmd == CMD_SIGN && options->nest) ||
|
||||
(cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) {
|
||||
MSI_ENTRY *dse = NULL;
|
||||
MSI_ENTRY *ds = msi_signatures_get(msiparams->dirent, &dse);
|
||||
if (!ds) {
|
||||
printf("MSI file has no signature\n\n");
|
||||
return NULL; /* FAILED */
|
||||
}
|
||||
if (!msi_check_MsiDigitalSignatureEx(options, dse)) {
|
||||
return NULL; /* FAILED */
|
||||
}
|
||||
len = GET_UINT32_LE(ds->size);
|
||||
data = OPENSSL_malloc(len);
|
||||
*cursig = msi_extract_existing_pkcs7(msiparams, ds, &data, len);
|
||||
OPENSSL_free(data);
|
||||
if (!*cursig) {
|
||||
printf("Unable to extract existing signature\n");
|
||||
return NULL; /* FAILED */
|
||||
}
|
||||
if (cmd == CMD_ADD)
|
||||
sig = *cursig;
|
||||
}
|
||||
/* Obtain an existing signature or create a new one */
|
||||
if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN))
|
||||
sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams, NULL);
|
||||
return sig; /* OK */
|
||||
}
|
||||
|
||||
static PKCS7 *pe_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header,
|
||||
GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata,
|
||||
BIO *hash, BIO *outdata, PKCS7 **cursig)
|
||||
@ -5218,7 +5386,7 @@ static PKCS7 *cab_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *he
|
||||
/* Obtain a current signature from previously-signed file */
|
||||
if ((cmd == CMD_SIGN && options->nest) ||
|
||||
(cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) {
|
||||
*cursig = cab_extract_existing_pkcs7(indata, header);
|
||||
*cursig = extract_existing_pkcs7(indata, header);
|
||||
if (!*cursig) {
|
||||
printf("Unable to extract existing signature\n");
|
||||
return NULL; /* FAILED */
|
||||
@ -5411,7 +5579,7 @@ static int main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTIONS
|
||||
options->timestamp_expiration = 1;
|
||||
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD || *cmd == CMD_VERIFY) && !strcmp(*argv, "-verbose")) {
|
||||
options->verbose = 1;
|
||||
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-add-msi-dse")) {
|
||||
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD || *cmd == CMD_ATTACH) && !strcmp(*argv, "-add-msi-dse")) {
|
||||
options->add_msi_dse = 1;
|
||||
} else if ((*cmd == CMD_VERIFY) && (!strcmp(*argv, "-c") || !strcmp(*argv, "-catalog"))) {
|
||||
if (--argc < 1) usage(argv0, "all");
|
||||
@ -5532,6 +5700,11 @@ int main(int argc, char **argv)
|
||||
/* reset crypto */
|
||||
memset(&cparams, 0, sizeof(CRYPTO_PARAMS));
|
||||
|
||||
/* reset MSI parameters */
|
||||
memset(&msiparams, 0, sizeof(MSI_PARAMS));
|
||||
msiparams.msi = NULL;
|
||||
msiparams.dirent = NULL;
|
||||
|
||||
/* commands and options initialization */
|
||||
if (!main_configure(argc, argv, &cmd, &options))
|
||||
goto err_cleanup;
|
||||
@ -5546,16 +5719,14 @@ int main(int argc, char **argv)
|
||||
filesize = get_file_size(options.infile);
|
||||
if (filesize == 0)
|
||||
goto err_cleanup;
|
||||
indata = map_file(options.infile, filesize);
|
||||
if (indata == NULL)
|
||||
DO_EXIT_1("Failed to open file: %s\n", options.infile);
|
||||
|
||||
/* reset file header */
|
||||
memset(&header, 0, sizeof(FILE_HEADER));
|
||||
header.fileend = filesize;
|
||||
|
||||
/* reset MSI parameters */
|
||||
memset(&msiparams, 0, sizeof(MSI_PARAMS));
|
||||
|
||||
indata = map_file(options.infile, filesize);
|
||||
if (indata == NULL)
|
||||
DO_EXIT_1("Failed to open file: %s\n", options.infile);
|
||||
|
||||
if (!get_file_type(indata, options.infile, &type))
|
||||
goto err_cleanup;
|
||||
@ -5607,11 +5778,10 @@ int main(int argc, char **argv)
|
||||
ret = msi_verify_file(&msiparams, &options);
|
||||
goto skip_signing;
|
||||
} else {
|
||||
/* TODO */
|
||||
/* sig = msi_presign_file(type, cmd, &header, &options, &cparams, indata,
|
||||
hash, outdata, &cursig, &msiparams); */
|
||||
sig = msi_presign_file(type, cmd, &header, &options, &cparams, indata,
|
||||
hash, &cursig, &msiparams);
|
||||
if (cmd == CMD_REMOVE) {
|
||||
ret = 0; /* OK */
|
||||
ret = msi_remove_file(&msiparams, outdata);
|
||||
goto skip_signing;
|
||||
} else if (!sig)
|
||||
goto err_cleanup;
|
||||
@ -5682,19 +5852,27 @@ int main(int argc, char **argv)
|
||||
DO_EXIT_0("PKCS7 output failed\n");
|
||||
#endif
|
||||
|
||||
ret = append_signature(sig, cursig, type, &options, &padlen, &len, outdata);
|
||||
ret = append_signature(sig, cursig, type, &options, &msiparams, &padlen, &len, outdata);
|
||||
if (ret)
|
||||
DO_EXIT_0("Append signature to outfile failed\n");
|
||||
|
||||
|
||||
skip_signing:
|
||||
|
||||
update_data_size(type, cmd, &header, padlen, len, outdata);
|
||||
|
||||
BIO_free_all(hash);
|
||||
hash = outdata = NULL;
|
||||
if (type == FILE_TYPE_MSI) {
|
||||
BIO_free_all(outdata);
|
||||
outdata = NULL;
|
||||
} else {
|
||||
BIO_free_all(hash);
|
||||
hash = outdata = NULL;
|
||||
}
|
||||
|
||||
if (!ret && cmd == CMD_ATTACH) {
|
||||
ret = check_attached_data(type, &header, &options);
|
||||
/* reset MSI parameters */
|
||||
free_msi_params(&msiparams);
|
||||
memset(&msiparams, 0, sizeof(MSI_PARAMS));
|
||||
ret = check_attached_data(type, &header, &options, &msiparams);
|
||||
if (!ret)
|
||||
printf("Signature successfully attached\n");
|
||||
/* else
|
||||
@ -5705,14 +5883,16 @@ skip_signing:
|
||||
}
|
||||
|
||||
err_cleanup:
|
||||
|
||||
if (cmd != CMD_ADD)
|
||||
PKCS7_free(cursig);
|
||||
PKCS7_free(sig);
|
||||
if (hash)
|
||||
BIO_free_all(hash);
|
||||
if (outdata)
|
||||
if (outdata) {
|
||||
BIO_free_all(outdata);
|
||||
outdata = NULL;
|
||||
unlink(options.outfile);
|
||||
}
|
||||
#ifdef WIN32
|
||||
UnmapViewOfFile(indata);
|
||||
#else
|
||||
|
Loading…
x
Reference in New Issue
Block a user