Error formatting fixes

closes #3
This commit is contained in:
Michał Trojnara 2019-04-24 06:17:31 +02:00
parent 8c82f76905
commit bed25dcb7d

View File

@ -1864,21 +1864,21 @@ static int msi_extract_signature_to_file(GsfInfile *infile, char *outfile)
if (exsig != NULL) {
exlen = (unsigned long) gsf_input_remaining(exsig);
if (exlen > EVP_MAX_MD_SIZE) {
printf("MsiDigitalSignatureEx is larger than EVP_MAX_MD_SIZE. Aborting...\n\n");
printf("MsiDigitalSignatureEx is larger than EVP_MAX_MD_SIZE\n");
ret = 1;
goto out;
}
exdata = OPENSSL_malloc(exlen);
if (gsf_input_read(exsig, exlen, exdata) == NULL) {
printf("Unable to read MsiDigitalSignatureEx\n\n");
printf("Unable to read MsiDigitalSignatureEx\n");
ret = 1;
goto out;
}
tohex(exdata, hexbuf, exlen);
printf("Note: MSI includes a MsiDigitalSignatureEx section.\n");
printf("MsiDigitalSignatureEx pre-hash: %s\n\n", hexbuf);
printf("Note: MSI includes a MsiDigitalSignatureEx section\n");
printf("MsiDigitalSignatureEx pre-hash: %s\n", hexbuf);
}
out:
@ -2647,37 +2647,37 @@ int main(int argc, char **argv) {
ENGINE_load_dynamic();
ENGINE * dyn = ENGINE_by_id("dynamic");
if (!dyn)
DO_EXIT_0("Failed to load 'dynamic' engine");
DO_EXIT_0("Failed to load 'dynamic' engine\n");
if (1 != ENGINE_ctrl_cmd_string(dyn, "SO_PATH", p11engine, CMD_MANDATORY))
DO_EXIT_1("Failed to set dyn SO_PATH to '%s'", p11engine);
DO_EXIT_1("Failed to set dyn SO_PATH to '%s'\n", p11engine);
if (1 != ENGINE_ctrl_cmd_string(dyn, "ID", "pkcs11", CMD_MANDATORY))
DO_EXIT_0("Failed to set dyn ID to 'pkcs11'");
DO_EXIT_0("Failed to set dyn ID to 'pkcs11'\n");
if (1 != ENGINE_ctrl_cmd(dyn, "LIST_ADD", 1, NULL, NULL, CMD_MANDATORY))
DO_EXIT_0("Failed to set dyn LIST_ADD to '1'");
DO_EXIT_0("Failed to set dyn LIST_ADD to '1'\n");
if (1 != ENGINE_ctrl_cmd(dyn, "LOAD", 1, NULL, NULL, CMD_MANDATORY))
DO_EXIT_0("Failed to set dyn LOAD to '1'");
DO_EXIT_0("Failed to set dyn LOAD to '1'\n");
ENGINE * pkcs11 = ENGINE_by_id("pkcs11");
if (!pkcs11)
DO_EXIT_0("Failed to find and load pkcs11 engine");
DO_EXIT_0("Failed to find and load pkcs11 engine\n");
if (1 != ENGINE_ctrl_cmd_string(pkcs11, "MODULE_PATH", p11module, CMD_MANDATORY))
DO_EXIT_1("Failed to set pkcs11 engine MODULE_PATH to '%s'", p11module);
DO_EXIT_1("Failed to set pkcs11 engine MODULE_PATH to '%s'\n", p11module);
if (pass != NULL) {
if (1 != ENGINE_ctrl_cmd_string(pkcs11, "PIN", pass, CMD_MANDATORY))
DO_EXIT_0("Failed to set pkcs11 PIN");
DO_EXIT_0("Failed to set pkcs11 PIN\n");
}
if (1 != ENGINE_init(pkcs11))
DO_EXIT_0("Failed to initialized pkcs11 engine");
DO_EXIT_0("Failed to initialized pkcs11 engine\n");
pkey = ENGINE_load_private_key(pkcs11, keyfile, NULL, NULL);
if (pkey == NULL)
DO_EXIT_1("Failed to load private key %s", keyfile);
DO_EXIT_1("Failed to load private key %s\n", keyfile);
if ((btmp = BIO_new_file(certfile, "rb")) == NULL ||
((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL &&
(certs = PEM_read_certs(btmp, "")) == NULL))
@ -2769,17 +2769,17 @@ int main(int argc, char **argv) {
src = gsf_input_stdio_new(infile, NULL);
if (!src)
DO_EXIT_1("Error opening file %s", infile);
DO_EXIT_1("Error opening file %s\n", infile);
ole = gsf_infile_msole_new(src, NULL);
if (cmd == CMD_EXTRACT) {
if (output_pkcs7) {
sig = msi_extract_signature_to_pkcs7(ole);
if (!sig)
DO_EXIT_0("Unable to extract existing signature.");
DO_EXIT_0("Unable to extract existing signature\n");
outdata = BIO_new_file(outfile, "w+b");
if (outdata == NULL)
DO_EXIT_1("Unable to open %s\n\n", outfile);
DO_EXIT_1("Unable to open %s\n", outfile);
ret = !PEM_write_bio_PKCS7(outdata, sig);
BIO_free_all(outdata);
} else {
@ -2801,7 +2801,7 @@ int main(int argc, char **argv) {
unsigned long dselen = 0;
int has_dse = 0;
if (msi_extract_dse(ole, NULL, &dselen, &has_dse) != 0 && has_dse) {
DO_EXIT_0("Unable to extract MsiDigitalSigantureEx section.\n");
DO_EXIT_0("Unable to extract MsiDigitalSigantureEx section\n");
}
if (has_dse) {
int mdlen = EVP_MD_size(md);
@ -2815,7 +2815,7 @@ int main(int argc, char **argv) {
cursig = msi_extract_signature_to_pkcs7(ole);
if (cursig == NULL) {
DO_EXIT_0("Unable to extract existing signature in -nest mode");
DO_EXIT_0("Unable to extract existing signature in -nest mode\n");
}
if (cmd == CMD_ADD) {
sig = cursig;
@ -2825,7 +2825,7 @@ int main(int argc, char **argv) {
sink = gsf_output_stdio_new(outfile, NULL);
if (!sink)
DO_EXIT_1("Error opening output file %s", outfile);
DO_EXIT_1("Error opening output file %s\n", outfile);
outole = gsf_outfile_msole_new(sink);
/*
@ -2874,7 +2874,7 @@ int main(int argc, char **argv) {
BIO_push(prehash, BIO_new(BIO_s_null()));
if (!msi_prehash(ole, NULL, prehash))
DO_EXIT_0("unable to calculate MSI pre-hash ('metadata') hash.\n");
DO_EXIT_0("Unable to calculate MSI pre-hash ('metadata') hash\n");
p_msiex = malloc(EVP_MAX_MD_SIZE);
len_msiex = BIO_gets(prehash, (char*)p_msiex, EVP_MAX_MD_SIZE);
@ -2883,7 +2883,7 @@ int main(int argc, char **argv) {
}
if (!msi_handle_dir(ole, outole, hash)) {
DO_EXIT_0("unable to msi_handle_dir()\n");
DO_EXIT_0("Unable to msi_handle_dir()\n");
}
if (cmd == CMD_REMOVE) {
@ -2956,8 +2956,7 @@ int main(int argc, char **argv) {
unsigned short magic;
if (jp >= 0)
fprintf(stderr, "Warning: -jp option is only valid "
"for CAB files.\n");
fprintf(stderr, "Warning: -jp option is only valid for CAB files\n");
magic = GET_UINT16_LE(indata + peheader + 24);
if (magic == 0x20b) {
@ -2989,7 +2988,7 @@ int main(int argc, char **argv) {
if (output_pkcs7) {
sig = extract_existing_pe_pkcs7(indata, sigpos ? sigpos : fileend, siglen);
if (!sig)
DO_EXIT_0("Unable to extract existing signature.");
DO_EXIT_0("Unable to extract existing signature\n");
PEM_write_bio_PKCS7(outdata, sig);
} else {
BIO_write(outdata, indata + sigpos, siglen);
@ -3000,7 +2999,7 @@ int main(int argc, char **argv) {
if ((cmd == CMD_SIGN && nest) || (cmd == CMD_ATTACH && nest) || cmd == CMD_ADD) {
cursig = extract_existing_pe_pkcs7(indata, sigpos ? sigpos : fileend, siglen);
if (cursig == NULL) {
DO_EXIT_0("Unable to extract existing signature in -nest mode");
DO_EXIT_0("Unable to extract existing signature in -nest mode\n");
}
if (cmd == CMD_ADD) {
sig = cursig;
@ -3068,7 +3067,7 @@ int main(int argc, char **argv) {
}
}
if (!sig)
DO_EXIT_0("No valid signature found.");
DO_EXIT_0("No valid signature found\n");
goto add_only;
}
@ -3215,7 +3214,7 @@ add_only:
#ifdef ENABLE_CURL
/* add counter-signature/timestamp */
if (nturl && add_timestamp_authenticode(sig, turl, nturl, proxy, noverifypeer))
DO_EXIT_0("authenticode timestamping failed\n");
DO_EXIT_0("Authenticode timestamping failed\n");
if (ntsurl && add_timestamp_rfc3161(sig, tsurl, ntsurl, proxy, md, noverifypeer))
DO_EXIT_0("RFC 3161 timestamping failed\n");
#endif
@ -3230,11 +3229,10 @@ add_only:
#endif
if (nest) {
if (cursig == NULL) {
DO_EXIT_0("no 'cursig' was extracted. this points to a bug in the code. aborting...\n")
}
if (cursig == NULL)
DO_EXIT_0("Internal error: No 'cursig' was extracted\n")
if (pkcs7_set_nested_signature(cursig, sig) == 0)
DO_EXIT_0("unable to append the nested signature to the current signature\n");
DO_EXIT_0("Unable to append the nested signature to the current signature\n");
outsig = cursig;
} else {
outsig = sig;
@ -3243,7 +3241,7 @@ add_only:
/* Append signature to outfile */
if (((len = i2d_PKCS7(outsig, NULL)) <= 0) ||
(p = OPENSSL_malloc(len)) == NULL)
DO_EXIT_1("i2d_PKCS - memory allocation failed: %d\n", len);
DO_EXIT_1("i2d_PKCS memory allocation failed: %d\n", len);
i2d_PKCS7(outsig, &p);
p -= len;
padlen = (8 - len%8) % 8;
@ -3269,13 +3267,13 @@ add_only:
if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) {
GsfOutput *child = gsf_outfile_new_child(outole, "\05DigitalSignature", FALSE);
if (!gsf_output_write(child, len, p))
DO_EXIT_1("Failed to write MSI 'DigitalSignature' signature to %s", infile);
DO_EXIT_1("Failed to write MSI 'DigitalSignature' signature to %s\n", infile);
gsf_output_close(child);
if (p_msiex != NULL) {
child = gsf_outfile_new_child(outole, "\05MsiDigitalSignatureEx", FALSE);
if (!gsf_output_write(child, len_msiex, p_msiex)) {
DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s", infile);
DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", infile);
}
gsf_output_close(child);
}
@ -3315,15 +3313,15 @@ skip_signing:
if (type == FILE_TYPE_PE) {
outdatasize = get_file_size(outfile);
if (!outdatasize)
DO_EXIT_0("Error verifying result.\n");
DO_EXIT_0("Error verifying result\n");
outdataverify = map_file(outfile, outdatasize);
if (!outdataverify)
DO_EXIT_0("Error verifying result.\n");
DO_EXIT_0("Error verifying result\n");
int sigpos = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16);
int siglen = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16 + 4);
ret = verify_pe_file(outdataverify, peheader, pe32plus, sigpos, siglen, leafhash);
if (ret) {
DO_EXIT_0("Signature mismatch.\n");
DO_EXIT_0("Signature mismatch\n");
}
} else if (type == FILE_TYPE_MSI) {
#ifdef WITH_GSF
@ -3332,13 +3330,13 @@ skip_signing:
src = gsf_input_stdio_new(outfile, NULL);
if (!src)
DO_EXIT_1("Error opening file %s", outfile);
DO_EXIT_1("Error opening file %s\n", outfile);
ole = gsf_infile_msole_new(src, NULL);
g_object_unref(src);
ret = msi_verify_file(ole, leafhash);
g_object_unref(ole);
if (ret) {
DO_EXIT_0("Signature mismatch.\n");
DO_EXIT_0("Signature mismatch\n");
}
#else
DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", infile);
@ -3346,7 +3344,7 @@ skip_signing:
} else {
DO_EXIT_1("Unknown input type for file: %s\n", infile);
}
printf("Signature successfully attached.\n");
printf("Signature successfully attached\n");
} else {
printf(ret ? "Failed\n" : "Succeeded\n");
}