From bed25dcb7da869e1426855453784de948ae7c255 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Micha=C5=82=20Trojnara?= Date: Wed, 24 Apr 2019 06:17:31 +0200 Subject: [PATCH] Error formatting fixes closes #3 --- osslsigncode.c | 80 ++++++++++++++++++++++++-------------------------- 1 file changed, 39 insertions(+), 41 deletions(-) diff --git a/osslsigncode.c b/osslsigncode.c index c51ac03..237d917 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -1864,21 +1864,21 @@ static int msi_extract_signature_to_file(GsfInfile *infile, char *outfile) if (exsig != NULL) { exlen = (unsigned long) gsf_input_remaining(exsig); if (exlen > EVP_MAX_MD_SIZE) { - printf("MsiDigitalSignatureEx is larger than EVP_MAX_MD_SIZE. Aborting...\n\n"); + printf("MsiDigitalSignatureEx is larger than EVP_MAX_MD_SIZE\n"); ret = 1; goto out; } exdata = OPENSSL_malloc(exlen); if (gsf_input_read(exsig, exlen, exdata) == NULL) { - printf("Unable to read MsiDigitalSignatureEx\n\n"); + printf("Unable to read MsiDigitalSignatureEx\n"); ret = 1; goto out; } tohex(exdata, hexbuf, exlen); - printf("Note: MSI includes a MsiDigitalSignatureEx section.\n"); - printf("MsiDigitalSignatureEx pre-hash: %s\n\n", hexbuf); + printf("Note: MSI includes a MsiDigitalSignatureEx section\n"); + printf("MsiDigitalSignatureEx pre-hash: %s\n", hexbuf); } out: @@ -2647,37 +2647,37 @@ int main(int argc, char **argv) { ENGINE_load_dynamic(); ENGINE * dyn = ENGINE_by_id("dynamic"); if (!dyn) - DO_EXIT_0("Failed to load 'dynamic' engine"); + DO_EXIT_0("Failed to load 'dynamic' engine\n"); if (1 != ENGINE_ctrl_cmd_string(dyn, "SO_PATH", p11engine, CMD_MANDATORY)) - DO_EXIT_1("Failed to set dyn SO_PATH to '%s'", p11engine); + DO_EXIT_1("Failed to set dyn SO_PATH to '%s'\n", p11engine); if (1 != ENGINE_ctrl_cmd_string(dyn, "ID", "pkcs11", CMD_MANDATORY)) - DO_EXIT_0("Failed to set dyn ID to 'pkcs11'"); + DO_EXIT_0("Failed to set dyn ID to 'pkcs11'\n"); if (1 != ENGINE_ctrl_cmd(dyn, "LIST_ADD", 1, NULL, NULL, CMD_MANDATORY)) - DO_EXIT_0("Failed to set dyn LIST_ADD to '1'"); + DO_EXIT_0("Failed to set dyn LIST_ADD to '1'\n"); if (1 != ENGINE_ctrl_cmd(dyn, "LOAD", 1, NULL, NULL, CMD_MANDATORY)) - DO_EXIT_0("Failed to set dyn LOAD to '1'"); + DO_EXIT_0("Failed to set dyn LOAD to '1'\n"); ENGINE * pkcs11 = ENGINE_by_id("pkcs11"); if (!pkcs11) - DO_EXIT_0("Failed to find and load pkcs11 engine"); + DO_EXIT_0("Failed to find and load pkcs11 engine\n"); if (1 != ENGINE_ctrl_cmd_string(pkcs11, "MODULE_PATH", p11module, CMD_MANDATORY)) - DO_EXIT_1("Failed to set pkcs11 engine MODULE_PATH to '%s'", p11module); + DO_EXIT_1("Failed to set pkcs11 engine MODULE_PATH to '%s'\n", p11module); if (pass != NULL) { if (1 != ENGINE_ctrl_cmd_string(pkcs11, "PIN", pass, CMD_MANDATORY)) - DO_EXIT_0("Failed to set pkcs11 PIN"); + DO_EXIT_0("Failed to set pkcs11 PIN\n"); } if (1 != ENGINE_init(pkcs11)) - DO_EXIT_0("Failed to initialized pkcs11 engine"); + DO_EXIT_0("Failed to initialized pkcs11 engine\n"); pkey = ENGINE_load_private_key(pkcs11, keyfile, NULL, NULL); if (pkey == NULL) - DO_EXIT_1("Failed to load private key %s", keyfile); + DO_EXIT_1("Failed to load private key %s\n", keyfile); if ((btmp = BIO_new_file(certfile, "rb")) == NULL || ((p7 = d2i_PKCS7_bio(btmp, NULL)) == NULL && (certs = PEM_read_certs(btmp, "")) == NULL)) @@ -2769,17 +2769,17 @@ int main(int argc, char **argv) { src = gsf_input_stdio_new(infile, NULL); if (!src) - DO_EXIT_1("Error opening file %s", infile); + DO_EXIT_1("Error opening file %s\n", infile); ole = gsf_infile_msole_new(src, NULL); if (cmd == CMD_EXTRACT) { if (output_pkcs7) { sig = msi_extract_signature_to_pkcs7(ole); if (!sig) - DO_EXIT_0("Unable to extract existing signature."); + DO_EXIT_0("Unable to extract existing signature\n"); outdata = BIO_new_file(outfile, "w+b"); if (outdata == NULL) - DO_EXIT_1("Unable to open %s\n\n", outfile); + DO_EXIT_1("Unable to open %s\n", outfile); ret = !PEM_write_bio_PKCS7(outdata, sig); BIO_free_all(outdata); } else { @@ -2801,7 +2801,7 @@ int main(int argc, char **argv) { unsigned long dselen = 0; int has_dse = 0; if (msi_extract_dse(ole, NULL, &dselen, &has_dse) != 0 && has_dse) { - DO_EXIT_0("Unable to extract MsiDigitalSigantureEx section.\n"); + DO_EXIT_0("Unable to extract MsiDigitalSigantureEx section\n"); } if (has_dse) { int mdlen = EVP_MD_size(md); @@ -2815,7 +2815,7 @@ int main(int argc, char **argv) { cursig = msi_extract_signature_to_pkcs7(ole); if (cursig == NULL) { - DO_EXIT_0("Unable to extract existing signature in -nest mode"); + DO_EXIT_0("Unable to extract existing signature in -nest mode\n"); } if (cmd == CMD_ADD) { sig = cursig; @@ -2825,7 +2825,7 @@ int main(int argc, char **argv) { sink = gsf_output_stdio_new(outfile, NULL); if (!sink) - DO_EXIT_1("Error opening output file %s", outfile); + DO_EXIT_1("Error opening output file %s\n", outfile); outole = gsf_outfile_msole_new(sink); /* @@ -2874,7 +2874,7 @@ int main(int argc, char **argv) { BIO_push(prehash, BIO_new(BIO_s_null())); if (!msi_prehash(ole, NULL, prehash)) - DO_EXIT_0("unable to calculate MSI pre-hash ('metadata') hash.\n"); + DO_EXIT_0("Unable to calculate MSI pre-hash ('metadata') hash\n"); p_msiex = malloc(EVP_MAX_MD_SIZE); len_msiex = BIO_gets(prehash, (char*)p_msiex, EVP_MAX_MD_SIZE); @@ -2883,7 +2883,7 @@ int main(int argc, char **argv) { } if (!msi_handle_dir(ole, outole, hash)) { - DO_EXIT_0("unable to msi_handle_dir()\n"); + DO_EXIT_0("Unable to msi_handle_dir()\n"); } if (cmd == CMD_REMOVE) { @@ -2956,8 +2956,7 @@ int main(int argc, char **argv) { unsigned short magic; if (jp >= 0) - fprintf(stderr, "Warning: -jp option is only valid " - "for CAB files.\n"); + fprintf(stderr, "Warning: -jp option is only valid for CAB files\n"); magic = GET_UINT16_LE(indata + peheader + 24); if (magic == 0x20b) { @@ -2989,7 +2988,7 @@ int main(int argc, char **argv) { if (output_pkcs7) { sig = extract_existing_pe_pkcs7(indata, sigpos ? sigpos : fileend, siglen); if (!sig) - DO_EXIT_0("Unable to extract existing signature."); + DO_EXIT_0("Unable to extract existing signature\n"); PEM_write_bio_PKCS7(outdata, sig); } else { BIO_write(outdata, indata + sigpos, siglen); @@ -3000,7 +2999,7 @@ int main(int argc, char **argv) { if ((cmd == CMD_SIGN && nest) || (cmd == CMD_ATTACH && nest) || cmd == CMD_ADD) { cursig = extract_existing_pe_pkcs7(indata, sigpos ? sigpos : fileend, siglen); if (cursig == NULL) { - DO_EXIT_0("Unable to extract existing signature in -nest mode"); + DO_EXIT_0("Unable to extract existing signature in -nest mode\n"); } if (cmd == CMD_ADD) { sig = cursig; @@ -3068,7 +3067,7 @@ int main(int argc, char **argv) { } } if (!sig) - DO_EXIT_0("No valid signature found."); + DO_EXIT_0("No valid signature found\n"); goto add_only; } @@ -3215,7 +3214,7 @@ add_only: #ifdef ENABLE_CURL /* add counter-signature/timestamp */ if (nturl && add_timestamp_authenticode(sig, turl, nturl, proxy, noverifypeer)) - DO_EXIT_0("authenticode timestamping failed\n"); + DO_EXIT_0("Authenticode timestamping failed\n"); if (ntsurl && add_timestamp_rfc3161(sig, tsurl, ntsurl, proxy, md, noverifypeer)) DO_EXIT_0("RFC 3161 timestamping failed\n"); #endif @@ -3230,11 +3229,10 @@ add_only: #endif if (nest) { - if (cursig == NULL) { - DO_EXIT_0("no 'cursig' was extracted. this points to a bug in the code. aborting...\n") - } + if (cursig == NULL) + DO_EXIT_0("Internal error: No 'cursig' was extracted\n") if (pkcs7_set_nested_signature(cursig, sig) == 0) - DO_EXIT_0("unable to append the nested signature to the current signature\n"); + DO_EXIT_0("Unable to append the nested signature to the current signature\n"); outsig = cursig; } else { outsig = sig; @@ -3243,7 +3241,7 @@ add_only: /* Append signature to outfile */ if (((len = i2d_PKCS7(outsig, NULL)) <= 0) || (p = OPENSSL_malloc(len)) == NULL) - DO_EXIT_1("i2d_PKCS - memory allocation failed: %d\n", len); + DO_EXIT_1("i2d_PKCS memory allocation failed: %d\n", len); i2d_PKCS7(outsig, &p); p -= len; padlen = (8 - len%8) % 8; @@ -3269,13 +3267,13 @@ add_only: if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) { GsfOutput *child = gsf_outfile_new_child(outole, "\05DigitalSignature", FALSE); if (!gsf_output_write(child, len, p)) - DO_EXIT_1("Failed to write MSI 'DigitalSignature' signature to %s", infile); + DO_EXIT_1("Failed to write MSI 'DigitalSignature' signature to %s\n", infile); gsf_output_close(child); if (p_msiex != NULL) { child = gsf_outfile_new_child(outole, "\05MsiDigitalSignatureEx", FALSE); if (!gsf_output_write(child, len_msiex, p_msiex)) { - DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s", infile); + DO_EXIT_1("Failed to write MSI 'MsiDigitalSignatureEx' signature to %s\n", infile); } gsf_output_close(child); } @@ -3315,15 +3313,15 @@ skip_signing: if (type == FILE_TYPE_PE) { outdatasize = get_file_size(outfile); if (!outdatasize) - DO_EXIT_0("Error verifying result.\n"); + DO_EXIT_0("Error verifying result\n"); outdataverify = map_file(outfile, outdatasize); if (!outdataverify) - DO_EXIT_0("Error verifying result.\n"); + DO_EXIT_0("Error verifying result\n"); int sigpos = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16); int siglen = GET_UINT32_LE(outdataverify + peheader + 152 + pe32plus*16 + 4); ret = verify_pe_file(outdataverify, peheader, pe32plus, sigpos, siglen, leafhash); if (ret) { - DO_EXIT_0("Signature mismatch.\n"); + DO_EXIT_0("Signature mismatch\n"); } } else if (type == FILE_TYPE_MSI) { #ifdef WITH_GSF @@ -3332,13 +3330,13 @@ skip_signing: src = gsf_input_stdio_new(outfile, NULL); if (!src) - DO_EXIT_1("Error opening file %s", outfile); + DO_EXIT_1("Error opening file %s\n", outfile); ole = gsf_infile_msole_new(src, NULL); g_object_unref(src); ret = msi_verify_file(ole, leafhash); g_object_unref(ole); if (ret) { - DO_EXIT_0("Signature mismatch.\n"); + DO_EXIT_0("Signature mismatch\n"); } #else DO_EXIT_1("libgsf is not available, msi support is disabled: %s\n", infile); @@ -3346,7 +3344,7 @@ skip_signing: } else { DO_EXIT_1("Unknown input type for file: %s\n", infile); } - printf("Signature successfully attached.\n"); + printf("Signature successfully attached\n"); } else { printf(ret ? "Failed\n" : "Succeeded\n"); }