From b96f440b038b606bbe18c93e574470b9784ecdc3 Mon Sep 17 00:00:00 2001 From: Mikkel Krautz Date: Wed, 1 May 2013 19:54:45 +0200 Subject: [PATCH] PE, MSI: implement -require-leaf-hash for CMD_VERIFY. --- osslsigncode.c | 116 ++++++++++++++++++++++++++++++++++++++++++++++--- 1 file changed, 111 insertions(+), 5 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index b522ed0..2abfa80 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -736,7 +736,9 @@ static void usage(const char *argv0) "\t\t[ -in ] [-out ] \n\n" "\textract-signature [ -in ] [ -out ] \n\n" "\tremove-signature [ -in ] [ -out ] \n\n" - "\tverify [ -in ] \n\n" + "\tverify [ -in ] \n" + "\t\t[ -require-leaf-hash {md5,sha1,sha2(56),sha384,sha512}:XXXXXXXXXXXX... ]\n" + "\n" "", argv0); cleanup_lib_state(); @@ -988,6 +990,84 @@ static void recalc_pe_checksum(BIO *bio, unsigned int peheader) BIO_write(bio, buf, 4); } +static unsigned char nib2val(unsigned char c) { + if (c >= '0' && c <= '9') { + return c - '0'; + } else if (c >= 'a' && c <= 'f') { + return c - 'a' + 10; + } else if (c >= 'A' && c <= 'F') { + return c - 'A' + 10; + } +} + +static int verify_leaf_hash(X509 *leaf, char *leafhash) { + char *orig = leafhash; + char *mdid = orig; + char *hash = NULL; + while (leafhash != NULL && *leafhash != '\0') { + if (*leafhash == ':') { + *leafhash = '\0'; + ++leafhash; + hash = leafhash; + break; + } + ++leafhash; + } + if (hash == NULL) { + printf("Unable to parse -require-leaf-hash parameter: %s\n\n", orig); + return 1; + } + + const EVP_MD *md = EVP_get_digestbyname(mdid); + if (md == NULL) { + printf("Unable to lookup digest by name '%s'\n", mdid); + return 1; + } + + unsigned long sz = EVP_MD_size(md); + unsigned long actual = strlen(hash); + if (actual%2 != 0) { + printf("Hash length mismatch: length is uneven.\n"); + return 1; + } + actual /= 2; + if (actual != sz) { + printf("Hash length mismatch: '%s' digest must be %lu bytes long (got %lu bytes)\n", mdid, sz, actual); + return 1; + } + + unsigned char mdbuf[EVP_MAX_MD_SIZE]; + unsigned char cmdbuf[EVP_MAX_MD_SIZE]; + int i = 0, j = 0; + while (i < sz*2) { + unsigned char x; + x = nib2val(hash[i+1]); + x |= nib2val(hash[i]) << 4; + mdbuf[j] = x; + i += 2; + j += 1; + } + + unsigned long certlen = i2d_X509(leaf, NULL); + unsigned char *certbuf = malloc(certlen); + unsigned char *tmp = certbuf; + i2d_X509(leaf, &tmp); + + EVP_MD_CTX *ctx = EVP_MD_CTX_create(); + EVP_DigestInit_ex(ctx, md, NULL); + EVP_DigestUpdate(ctx, certbuf, certlen); + EVP_DigestFinal_ex(ctx, cmdbuf, NULL); + EVP_MD_CTX_destroy(ctx); + + free(certbuf); + + if (memcmp(mdbuf, cmdbuf, EVP_MD_size(md))) { + return 1; + } + + return 0; +} + #ifdef WITH_GSF static gint msi_base64_decode(gint x) { @@ -1254,7 +1334,7 @@ static gboolean msi_handle_dir(GsfInfile *infile, GsfOutfile *outole, BIO *hash) /* * msi_verify_file checks whether or not the signature of infile is valid. */ -static int msi_verify_file(GsfInfile *infile) { +static int msi_verify_file(GsfInfile *infile, char *leafhash) { GsfInput *sig = NULL; GsfInput *exsig = NULL; gchar decoded[0x40]; @@ -1419,6 +1499,7 @@ static int msi_verify_file(GsfInfile *infile) { ret = 1; } + int leafok = 0; STACK_OF(X509) *signers = PKCS7_get0_signers(p7, NULL, 0); printf("Number of signers: %d\n", sk_X509_num(signers)); for (i=0; i