mirror of
https://github.com/mtrojnar/osslsigncode.git
synced 2025-04-05 09:08:04 -05:00
new option -c specifies the catalog file by name
This commit is contained in:
parent
86d593f264
commit
f8849b8048
464
osslsigncode.c
464
osslsigncode.c
@ -254,6 +254,7 @@ typedef struct {
|
|||||||
#ifdef WITH_GSF
|
#ifdef WITH_GSF
|
||||||
int add_msi_dse;
|
int add_msi_dse;
|
||||||
#endif /* WITH_GSF */
|
#endif /* WITH_GSF */
|
||||||
|
char *catalog;
|
||||||
char *cafile;
|
char *cafile;
|
||||||
char *crlfile;
|
char *crlfile;
|
||||||
char *untrusted;
|
char *untrusted;
|
||||||
@ -725,12 +726,12 @@ static void tohex(const unsigned char *v, char *b, int len)
|
|||||||
sprintf(b+i*2, "%02X", v[i]);
|
sprintf(b+i*2, "%02X", v[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int is_indirect_data_signature(PKCS7 *p7)
|
static int is_content_type(PKCS7 *p7, const char *objid)
|
||||||
{
|
{
|
||||||
ASN1_OBJECT *indir_objid;
|
ASN1_OBJECT *indir_objid;
|
||||||
int retval;
|
int retval;
|
||||||
|
|
||||||
indir_objid = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1);
|
indir_objid = OBJ_txt2obj(objid, 1);
|
||||||
retval = p7 && PKCS7_type_is_signed(p7) &&
|
retval = p7 && PKCS7_type_is_signed(p7) &&
|
||||||
!OBJ_cmp(p7->d.sign->contents->type, indir_objid) &&
|
!OBJ_cmp(p7->d.sign->contents->type, indir_objid) &&
|
||||||
p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE;
|
p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE;
|
||||||
@ -1104,7 +1105,7 @@ static void usage(const char *argv0, const char *cmd)
|
|||||||
printf("%1s[ --help ]\n\n", "");
|
printf("%1s[ --help ]\n\n", "");
|
||||||
}
|
}
|
||||||
if (on_list(cmd, cmds_sign)) {
|
if (on_list(cmd, cmds_sign)) {
|
||||||
printf("%1s[ sign ] ( -certs <certfile> -key <keyfile> | -pkcs12 <pkcs12file> |\n", "");
|
printf("%1s[ sign ] ( -certs | -spc <certfile> -key <keyfile> | -pkcs12 <pkcs12file> |\n", "");
|
||||||
printf("%12s [ -pkcs11engine <engine> ] -pkcs11module <module> -certs <certfile> -key <pkcs11 key id>)\n", "");
|
printf("%12s [ -pkcs11engine <engine> ] -pkcs11module <module> -certs <certfile> -key <pkcs11 key id>)\n", "");
|
||||||
printf("%12s[ -pass <password>", "");
|
printf("%12s[ -pass <password>", "");
|
||||||
#ifdef PROVIDE_ASKPASS
|
#ifdef PROVIDE_ASKPASS
|
||||||
@ -1154,6 +1155,7 @@ static void usage(const char *argv0, const char *cmd)
|
|||||||
printf("%1sremove-signature [ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
printf("%1sremove-signature [ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
||||||
if (on_list(cmd, cmds_verify)) {
|
if (on_list(cmd, cmds_verify)) {
|
||||||
printf("%1sverify [ -in ] <infile>\n", "");
|
printf("%1sverify [ -in ] <infile>\n", "");
|
||||||
|
printf("%12s[ -c | -catalog <infile> ]\n", "");
|
||||||
printf("%12s[ -CAfile <infile> ]\n", "");
|
printf("%12s[ -CAfile <infile> ]\n", "");
|
||||||
printf("%12s[ -CRLfile <infile> ]\n", "");
|
printf("%12s[ -CRLfile <infile> ]\n", "");
|
||||||
printf("%12s[ -untrusted <infile> ]\n", "");
|
printf("%12s[ -untrusted <infile> ]\n", "");
|
||||||
@ -1183,6 +1185,7 @@ static void help_for(const char *argv0, const char *cmd)
|
|||||||
const char *cmds_askpass[] = {"sign", NULL};
|
const char *cmds_askpass[] = {"sign", NULL};
|
||||||
#endif /* PROVIDE_ASKPASS */
|
#endif /* PROVIDE_ASKPASS */
|
||||||
const char *cmds_CAfile[] = {"attach-signature", "verify", NULL};
|
const char *cmds_CAfile[] = {"attach-signature", "verify", NULL};
|
||||||
|
const char *cmds_catalog[] = {"verify", NULL};
|
||||||
const char *cmds_certs[] = {"sign", NULL};
|
const char *cmds_certs[] = {"sign", NULL};
|
||||||
const char *cmds_comm[] = {"sign", NULL};
|
const char *cmds_comm[] = {"sign", NULL};
|
||||||
const char *cmds_CRLfile[] = {"attach-signature", "verify", NULL};
|
const char *cmds_CRLfile[] = {"attach-signature", "verify", NULL};
|
||||||
@ -1283,10 +1286,12 @@ static void help_for(const char *argv0, const char *cmd)
|
|||||||
if (on_list(cmd, cmds_askpass))
|
if (on_list(cmd, cmds_askpass))
|
||||||
printf("%-24s= ask for the private key password\n", "-askpass");
|
printf("%-24s= ask for the private key password\n", "-askpass");
|
||||||
#endif /* PROVIDE_ASKPASS */
|
#endif /* PROVIDE_ASKPASS */
|
||||||
|
if (on_list(cmd, cmds_catalog))
|
||||||
|
printf("%-24s= specifies the catalog file by name\n", "-c, -catalog");
|
||||||
if (on_list(cmd, cmds_CAfile))
|
if (on_list(cmd, cmds_CAfile))
|
||||||
printf("%-24s= the file containing one or more trusted certificates in PEM format\n", "-CAfile");
|
printf("%-24s= the file containing one or more trusted certificates in PEM format\n", "-CAfile");
|
||||||
if (on_list(cmd, cmds_certs))
|
if (on_list(cmd, cmds_certs))
|
||||||
printf("%-24s= the signing certificate to use\n", "-certs");
|
printf("%-24s= the signing certificate to use\n", "-certs, -spc");
|
||||||
if (on_list(cmd, cmds_comm))
|
if (on_list(cmd, cmds_comm))
|
||||||
printf("%-24s= set commercial purpose (default: individual purpose)\n", "-comm");
|
printf("%-24s= set commercial purpose (default: individual purpose)\n", "-comm");
|
||||||
if (on_list(cmd, cmds_CRLfile))
|
if (on_list(cmd, cmds_CRLfile))
|
||||||
@ -2651,6 +2656,8 @@ static int verify_signature(SIGNATURE *signature, GLOBAL_OPTIONS *options)
|
|||||||
return 1; /* FAILED */
|
return 1; /* FAILED */
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if (options->catalog)
|
||||||
|
printf("\nFile is signed in catalog: %s\n", options->catalog);
|
||||||
printf("\nCAfile: %s\n", options->cafile);
|
printf("\nCAfile: %s\n", options->cafile);
|
||||||
if (options->crlfile)
|
if (options->crlfile)
|
||||||
printf("CRLfile: %s\n", options->crlfile);
|
printf("CRLfile: %s\n", options->crlfile);
|
||||||
@ -2961,10 +2968,10 @@ static int msi_verify_pkcs7(SIGNATURE *signature, GsfInfile *infile, unsigned ch
|
|||||||
const EVP_MD *md;
|
const EVP_MD *md;
|
||||||
BIO *hash, *prehash;
|
BIO *hash, *prehash;
|
||||||
|
|
||||||
if (is_indirect_data_signature(signature->p7)) {
|
if (is_content_type(signature->p7, SPC_INDIRECT_DATA_OBJID)) {
|
||||||
ASN1_STRING *astr = signature->p7->d.sign->contents->d.other->value.sequence;
|
ASN1_STRING *content_val = signature->p7->d.sign->contents->d.other->value.sequence;
|
||||||
const unsigned char *p = astr->data;
|
const unsigned char *p = content_val->data;
|
||||||
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, astr->length);
|
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, content_val->length);
|
||||||
if (idc) {
|
if (idc) {
|
||||||
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
||||||
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
||||||
@ -3053,6 +3060,37 @@ out:
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Compute a simple sha1/sha256 message digest of the MSI file */
|
||||||
|
static void msi_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf, size_t fileend)
|
||||||
|
{
|
||||||
|
BIO *bio = NULL;
|
||||||
|
static unsigned char bfb[16*1024*1024];
|
||||||
|
EVP_MD_CTX *mdctx;
|
||||||
|
size_t n;
|
||||||
|
int l;
|
||||||
|
|
||||||
|
bio = BIO_new_mem_buf(indata, fileend);
|
||||||
|
mdctx = EVP_MD_CTX_new();
|
||||||
|
EVP_DigestInit(mdctx, md);
|
||||||
|
memset(mdbuf, 0, EVP_MAX_MD_SIZE);
|
||||||
|
(void)BIO_seek(bio, 0);
|
||||||
|
|
||||||
|
n = 0;
|
||||||
|
while (n < fileend) {
|
||||||
|
size_t want = fileend - n;
|
||||||
|
if (want > sizeof(bfb))
|
||||||
|
want = sizeof(bfb);
|
||||||
|
l = BIO_read(bio, bfb, want);
|
||||||
|
if (l <= 0)
|
||||||
|
break;
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, l);
|
||||||
|
n += l;
|
||||||
|
}
|
||||||
|
EVP_DigestFinal(mdctx, mdbuf, NULL);
|
||||||
|
EVP_MD_CTX_free(mdctx);
|
||||||
|
BIO_free(bio);
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* msi_get_child returns the first child that its value name matches the pattern.
|
* msi_get_child returns the first child that its value name matches the pattern.
|
||||||
* The returned input stream must be unrefed.
|
* The returned input stream must be unrefed.
|
||||||
@ -3425,6 +3463,8 @@ static int msi_add_MsiDigitalSignatureEx(GsfOutfile *outole, GSF_PARAMS *gsfpara
|
|||||||
/*
|
/*
|
||||||
* PE file support
|
* PE file support
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
/* Compute a message digest value of the signed or unsigned PE file */
|
||||||
static void pe_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf, FILE_HEADER *header)
|
static void pe_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf, FILE_HEADER *header)
|
||||||
{
|
{
|
||||||
BIO *bio = NULL;
|
BIO *bio = NULL;
|
||||||
@ -3432,14 +3472,19 @@ static void pe_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf,
|
|||||||
EVP_MD_CTX *mdctx;
|
EVP_MD_CTX *mdctx;
|
||||||
size_t n;
|
size_t n;
|
||||||
int l;
|
int l;
|
||||||
|
size_t offset;
|
||||||
|
|
||||||
bio = BIO_new_mem_buf(indata, header->sigpos + header->siglen);
|
if (header->sigpos)
|
||||||
|
offset = header->sigpos;
|
||||||
|
else
|
||||||
|
offset = header->fileend;
|
||||||
|
|
||||||
|
bio = BIO_new_mem_buf(indata, offset);
|
||||||
mdctx = EVP_MD_CTX_new();
|
mdctx = EVP_MD_CTX_new();
|
||||||
EVP_DigestInit(mdctx, md);
|
EVP_DigestInit(mdctx, md);
|
||||||
|
|
||||||
memset(mdbuf, 0, EVP_MAX_MD_SIZE);
|
memset(mdbuf, 0, EVP_MAX_MD_SIZE);
|
||||||
|
|
||||||
(void)BIO_seek(bio, 0);
|
(void)BIO_seek(bio, 0);
|
||||||
|
|
||||||
BIO_read(bio, bfb, header->header_size + 88);
|
BIO_read(bio, bfb, header->header_size + 88);
|
||||||
EVP_DigestUpdate(mdctx, bfb, header->header_size + 88);
|
EVP_DigestUpdate(mdctx, bfb, header->header_size + 88);
|
||||||
BIO_read(bio, bfb, 4);
|
BIO_read(bio, bfb, 4);
|
||||||
@ -3448,8 +3493,8 @@ static void pe_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf,
|
|||||||
BIO_read(bio, bfb, 8);
|
BIO_read(bio, bfb, 8);
|
||||||
|
|
||||||
n = header->header_size + 88 + 4 + 60 + header->pe32plus * 16 + 8;
|
n = header->header_size + 88 + 4 + 60 + header->pe32plus * 16 + 8;
|
||||||
while (n < header->sigpos) {
|
while (n < offset) {
|
||||||
size_t want = header->sigpos - n;
|
size_t want = offset - n;
|
||||||
if (want > sizeof(bfb))
|
if (want > sizeof(bfb))
|
||||||
want = sizeof(bfb);
|
want = sizeof(bfb);
|
||||||
l = BIO_read(bio, bfb, want);
|
l = BIO_read(bio, bfb, want);
|
||||||
@ -3458,6 +3503,16 @@ static void pe_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf,
|
|||||||
EVP_DigestUpdate(mdctx, bfb, l);
|
EVP_DigestUpdate(mdctx, bfb, l);
|
||||||
n += l;
|
n += l;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!header->sigpos) {
|
||||||
|
/* pad (with 0's) unsigned PE file to 8 byte boundary */
|
||||||
|
int len = 8 - header->fileend % 8;
|
||||||
|
if (len > 0 && len != 8) {
|
||||||
|
memset(bfb, 0, len);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, len);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
EVP_DigestFinal(mdctx, mdbuf, NULL);
|
EVP_DigestFinal(mdctx, mdbuf, NULL);
|
||||||
EVP_MD_CTX_free(mdctx);
|
EVP_MD_CTX_free(mdctx);
|
||||||
BIO_free(bio);
|
BIO_free(bio);
|
||||||
@ -3528,10 +3583,10 @@ static int pe_verify_pkcs7(SIGNATURE *signature, char *indata, FILE_HEADER *head
|
|||||||
size_t phlen = 0;
|
size_t phlen = 0;
|
||||||
const EVP_MD *md;
|
const EVP_MD *md;
|
||||||
|
|
||||||
if (is_indirect_data_signature(signature->p7)) {
|
if (is_content_type(signature->p7, SPC_INDIRECT_DATA_OBJID)) {
|
||||||
ASN1_STRING *astr = signature->p7->d.sign->contents->d.other->value.sequence;
|
ASN1_STRING *content_val = signature->p7->d.sign->contents->d.other->value.sequence;
|
||||||
const unsigned char *p = astr->data;
|
const unsigned char *p = content_val->data;
|
||||||
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, astr->length);
|
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, content_val->length);
|
||||||
if (idc) {
|
if (idc) {
|
||||||
pe_extract_page_hash(idc->data, &ph, &phlen, &phtype);
|
pe_extract_page_hash(idc->data, &ph, &phlen, &phtype);
|
||||||
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
||||||
@ -3819,13 +3874,20 @@ static int cab_verify_header(char *indata, char *infile, size_t filesize, FILE_H
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void cab_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf, size_t offset)
|
/* Compute a message digest value of the signed or unsigned CAB file */
|
||||||
|
static void cab_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf, FILE_HEADER *header)
|
||||||
{
|
{
|
||||||
BIO *bio;
|
BIO *bio;
|
||||||
size_t coffFiles, nfolders, flags;
|
size_t coffFiles, nfolders, flags;
|
||||||
static unsigned char bfb[16*1024*1024];
|
static unsigned char bfb[16*1024*1024];
|
||||||
EVP_MD_CTX *mdctx;
|
EVP_MD_CTX *mdctx;
|
||||||
int l;
|
int l;
|
||||||
|
size_t offset;
|
||||||
|
|
||||||
|
if (header->sigpos)
|
||||||
|
offset = header->sigpos;
|
||||||
|
else
|
||||||
|
offset = header->fileend;
|
||||||
|
|
||||||
bio = BIO_new_mem_buf(indata, offset);
|
bio = BIO_new_mem_buf(indata, offset);
|
||||||
mdctx = EVP_MD_CTX_new();
|
mdctx = EVP_MD_CTX_new();
|
||||||
@ -3838,84 +3900,89 @@ static void cab_calc_digest(char *indata, const EVP_MD *md, unsigned char *mdbuf
|
|||||||
EVP_DigestUpdate(mdctx, bfb, 4);
|
EVP_DigestUpdate(mdctx, bfb, 4);
|
||||||
/* u4 reserved1 00000000: 4-7 */
|
/* u4 reserved1 00000000: 4-7 */
|
||||||
BIO_read(bio, bfb, 4);
|
BIO_read(bio, bfb, 4);
|
||||||
/*
|
if (header->sigpos) {
|
||||||
* u4 cbCabinet - size of this cabinet file in bytes: 8-11
|
/*
|
||||||
* u4 reserved2 00000000: 12-15
|
* u4 cbCabinet - size of this cabinet file in bytes: 8-11
|
||||||
*/
|
* u4 reserved2 00000000: 12-15
|
||||||
BIO_read(bio, bfb, 8);
|
*/
|
||||||
EVP_DigestUpdate(mdctx, bfb, 8);
|
|
||||||
/* u4 coffFiles - offset of the first CFFILE entry: 16-19 */
|
|
||||||
BIO_read(bio, bfb, 4);
|
|
||||||
coffFiles = GET_UINT32_LE(bfb);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 4);
|
|
||||||
/*
|
|
||||||
* u4 reserved3 00000000: 20-23
|
|
||||||
* u1 versionMinor 03: 24
|
|
||||||
* u1 versionMajor 01: 25
|
|
||||||
*/
|
|
||||||
BIO_read(bio, bfb, 6);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 6);
|
|
||||||
/* u2 cFolders - number of CFFOLDER entries in this cabinet: 26-27 */
|
|
||||||
BIO_read(bio, bfb, 2);
|
|
||||||
nfolders = GET_UINT16_LE(bfb);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 2);
|
|
||||||
/* u2 cFiles - number of CFFILE entries in this cabinet: 28-29 */
|
|
||||||
BIO_read(bio, bfb, 2);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 2);
|
|
||||||
/* u2 flags: 30-31 */
|
|
||||||
BIO_read(bio, bfb, 2);
|
|
||||||
flags = GET_UINT16_LE(bfb);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 2);
|
|
||||||
/* u2 setID must be the same for all cabinets in a set: 32-33 */
|
|
||||||
BIO_read(bio, bfb, 2);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 2);
|
|
||||||
/*
|
|
||||||
* u2 iCabinet - number of this cabinet file in a set: 34-35
|
|
||||||
* u2 cbCFHeader: 36-37
|
|
||||||
* u1 cbCFFolder: 38
|
|
||||||
* u1 cbCFData: 39
|
|
||||||
* u22 abReserve: 40-55
|
|
||||||
* - Additional data offset: 44-47
|
|
||||||
* - Additional data size: 48-51
|
|
||||||
*/
|
|
||||||
BIO_read(bio, bfb, 22);
|
|
||||||
/* u22 abReserve: 56-59 */
|
|
||||||
BIO_read(bio, bfb, 4);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 4);
|
|
||||||
|
|
||||||
/* TODO */
|
|
||||||
if (flags & FLAG_PREV_CABINET) {
|
|
||||||
/* szCabinetPrev */
|
|
||||||
do {
|
|
||||||
BIO_read(bio, bfb, 1);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 1);
|
|
||||||
} while (bfb[0]);
|
|
||||||
/* szDiskPrev */
|
|
||||||
do {
|
|
||||||
BIO_read(bio, bfb, 1);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 1);
|
|
||||||
} while (bfb[0]);
|
|
||||||
}
|
|
||||||
if (flags & FLAG_NEXT_CABINET) {
|
|
||||||
/* szCabinetNext */
|
|
||||||
do {
|
|
||||||
BIO_read(bio, bfb, 1);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 1);
|
|
||||||
} while (bfb[0]);
|
|
||||||
/* szDiskNext */
|
|
||||||
do {
|
|
||||||
BIO_read(bio, bfb, 1);
|
|
||||||
EVP_DigestUpdate(mdctx, bfb, 1);
|
|
||||||
} while (bfb[0]);
|
|
||||||
}
|
|
||||||
/*
|
|
||||||
* (u8 * cFolders) CFFOLDER - structure contains information about
|
|
||||||
* one of the folders or partial folders stored in this cabinet file
|
|
||||||
*/
|
|
||||||
while (nfolders) {
|
|
||||||
BIO_read(bio, bfb, 8);
|
BIO_read(bio, bfb, 8);
|
||||||
EVP_DigestUpdate(mdctx, bfb, 8);
|
EVP_DigestUpdate(mdctx, bfb, 8);
|
||||||
nfolders--;
|
/* u4 coffFiles - offset of the first CFFILE entry: 16-19 */
|
||||||
|
BIO_read(bio, bfb, 4);
|
||||||
|
coffFiles = GET_UINT32_LE(bfb);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 4);
|
||||||
|
/*
|
||||||
|
* u4 reserved3 00000000: 20-23
|
||||||
|
* u1 versionMinor 03: 24
|
||||||
|
* u1 versionMajor 01: 25
|
||||||
|
*/
|
||||||
|
BIO_read(bio, bfb, 6);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 6);
|
||||||
|
/* u2 cFolders - number of CFFOLDER entries in this cabinet: 26-27 */
|
||||||
|
BIO_read(bio, bfb, 2);
|
||||||
|
nfolders = GET_UINT16_LE(bfb);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 2);
|
||||||
|
/* u2 cFiles - number of CFFILE entries in this cabinet: 28-29 */
|
||||||
|
BIO_read(bio, bfb, 2);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 2);
|
||||||
|
/* u2 flags: 30-31 */
|
||||||
|
BIO_read(bio, bfb, 2);
|
||||||
|
flags = GET_UINT16_LE(bfb);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 2);
|
||||||
|
/* u2 setID must be the same for all cabinets in a set: 32-33 */
|
||||||
|
BIO_read(bio, bfb, 2);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 2);
|
||||||
|
/*
|
||||||
|
* u2 iCabinet - number of this cabinet file in a set: 34-35
|
||||||
|
* u2 cbCFHeader: 36-37
|
||||||
|
* u1 cbCFFolder: 38
|
||||||
|
* u1 cbCFData: 39
|
||||||
|
* u22 abReserve: 40-55
|
||||||
|
* - Additional data offset: 44-47
|
||||||
|
* - Additional data size: 48-51
|
||||||
|
*/
|
||||||
|
BIO_read(bio, bfb, 22);
|
||||||
|
/* u22 abReserve: 56-59 */
|
||||||
|
BIO_read(bio, bfb, 4);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 4);
|
||||||
|
|
||||||
|
/* TODO */
|
||||||
|
if (flags & FLAG_PREV_CABINET) {
|
||||||
|
/* szCabinetPrev */
|
||||||
|
do {
|
||||||
|
BIO_read(bio, bfb, 1);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 1);
|
||||||
|
} while (bfb[0]);
|
||||||
|
/* szDiskPrev */
|
||||||
|
do {
|
||||||
|
BIO_read(bio, bfb, 1);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 1);
|
||||||
|
} while (bfb[0]);
|
||||||
|
}
|
||||||
|
if (flags & FLAG_NEXT_CABINET) {
|
||||||
|
/* szCabinetNext */
|
||||||
|
do {
|
||||||
|
BIO_read(bio, bfb, 1);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 1);
|
||||||
|
} while (bfb[0]);
|
||||||
|
/* szDiskNext */
|
||||||
|
do {
|
||||||
|
BIO_read(bio, bfb, 1);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 1);
|
||||||
|
} while (bfb[0]);
|
||||||
|
}
|
||||||
|
/*
|
||||||
|
* (u8 * cFolders) CFFOLDER - structure contains information about
|
||||||
|
* one of the folders or partial folders stored in this cabinet file
|
||||||
|
*/
|
||||||
|
while (nfolders) {
|
||||||
|
BIO_read(bio, bfb, 8);
|
||||||
|
EVP_DigestUpdate(mdctx, bfb, 8);
|
||||||
|
nfolders--;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
/* read what's left of the unsigned PE file */
|
||||||
|
coffFiles = 8;
|
||||||
}
|
}
|
||||||
/* (variable) ab - the compressed data bytes */
|
/* (variable) ab - the compressed data bytes */
|
||||||
while (coffFiles < offset) {
|
while (coffFiles < offset) {
|
||||||
@ -3943,10 +4010,10 @@ static int cab_verify_pkcs7(SIGNATURE *signature, char *indata, FILE_HEADER *hea
|
|||||||
char hexbuf[EVP_MAX_MD_SIZE*2+1];
|
char hexbuf[EVP_MAX_MD_SIZE*2+1];
|
||||||
const EVP_MD *md;
|
const EVP_MD *md;
|
||||||
|
|
||||||
if (is_indirect_data_signature(signature->p7)) {
|
if (is_content_type(signature->p7, SPC_INDIRECT_DATA_OBJID)) {
|
||||||
ASN1_STRING *astr = signature->p7->d.sign->contents->d.other->value.sequence;
|
ASN1_STRING *content_val = signature->p7->d.sign->contents->d.other->value.sequence;
|
||||||
const unsigned char *p = astr->data;
|
const unsigned char *p = content_val->data;
|
||||||
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, astr->length);
|
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, content_val->length);
|
||||||
if (idc) {
|
if (idc) {
|
||||||
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
||||||
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
||||||
@ -3965,7 +4032,7 @@ static int cab_verify_pkcs7(SIGNATURE *signature, char *indata, FILE_HEADER *hea
|
|||||||
tohex(mdbuf, hexbuf, EVP_MD_size(md));
|
tohex(mdbuf, hexbuf, EVP_MD_size(md));
|
||||||
printf("Current message digest : %s\n", hexbuf);
|
printf("Current message digest : %s\n", hexbuf);
|
||||||
|
|
||||||
cab_calc_digest(indata, md, cmdbuf, header->sigpos);
|
cab_calc_digest(indata, md, cmdbuf, header);
|
||||||
|
|
||||||
tohex(cmdbuf, hexbuf, EVP_MD_size(md));
|
tohex(cmdbuf, hexbuf, EVP_MD_size(md));
|
||||||
mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md));
|
mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md));
|
||||||
@ -4316,18 +4383,160 @@ static int cat_verify_header(char *indata, size_t filesize, FILE_HEADER *header)
|
|||||||
return 1; /* OK */
|
return 1; /* OK */
|
||||||
}
|
}
|
||||||
|
|
||||||
static int cat_verify_pkcs7(SIGNATURE *signature, GLOBAL_OPTIONS *options)
|
/*
|
||||||
|
* If the attribute type is SPC_INDIRECT_DATA_OBJID, get a digest algorithm and a message digest
|
||||||
|
* from the content and compare the message digest against the computed message digest of the file
|
||||||
|
*/
|
||||||
|
static int cat_verify_member(CatalogAuthAttr *attribute, char *indata, FILE_HEADER *header,
|
||||||
|
file_type_t filetype)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret = 1, mdok, mdtype = -1, phtype = -1;
|
||||||
|
unsigned char mdbuf[EVP_MAX_MD_SIZE];
|
||||||
|
unsigned char cmdbuf[EVP_MAX_MD_SIZE];
|
||||||
|
char hexbuf[EVP_MAX_MD_SIZE*2+1];
|
||||||
|
unsigned char *ph = NULL;
|
||||||
|
size_t phlen = 0;
|
||||||
|
const EVP_MD *md;
|
||||||
|
ASN1_STRING *content_val;
|
||||||
|
const unsigned char *p;
|
||||||
|
ASN1_OBJECT *indir_objid = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1);
|
||||||
|
|
||||||
|
if (attribute && !OBJ_cmp(attribute->type, indir_objid)) {
|
||||||
|
STACK_OF(ASN1_TYPE) *contents;
|
||||||
|
ASN1_TYPE *content;
|
||||||
|
SpcIndirectDataContent *idc;
|
||||||
|
|
||||||
|
content_val = attribute->contents->value.sequence;
|
||||||
|
p = content_val->data;
|
||||||
|
contents = d2i_ASN1_SET_ANY(NULL, &p, content_val->length);
|
||||||
|
if (contents == NULL)
|
||||||
|
goto out;
|
||||||
|
|
||||||
|
content = sk_ASN1_TYPE_value(contents, 0);
|
||||||
|
sk_ASN1_TYPE_free(contents);
|
||||||
|
content_val = content->value.sequence;
|
||||||
|
p = content_val->data;
|
||||||
|
idc = d2i_SpcIndirectDataContent(NULL, &p, content_val->length);
|
||||||
|
if (idc) {
|
||||||
|
if (header->sigpos) {
|
||||||
|
/* try to get a page hash if the file is signed */
|
||||||
|
pe_extract_page_hash(idc->data, &ph, &phlen, &phtype);
|
||||||
|
}
|
||||||
|
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
||||||
|
/* get a digest algorithm a message digest of the file from the content */
|
||||||
|
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
||||||
|
memcpy(mdbuf, idc->messageDigest->digest->data, idc->messageDigest->digest->length);
|
||||||
|
}
|
||||||
|
SpcIndirectDataContent_free(idc);
|
||||||
|
}
|
||||||
|
ASN1_TYPE_free(content);
|
||||||
|
if (mdtype == -1) {
|
||||||
|
printf("Failed to extract current message digest\n\n");
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
md = EVP_get_digestbynid(mdtype);
|
||||||
|
/* compute a message digest of the input file */
|
||||||
|
switch (filetype) {
|
||||||
|
case FILE_TYPE_CAB:
|
||||||
|
cab_calc_digest(indata, md, cmdbuf, header);
|
||||||
|
break;
|
||||||
|
case FILE_TYPE_PE:
|
||||||
|
pe_calc_digest(indata, md, cmdbuf, header);
|
||||||
|
break;
|
||||||
|
case FILE_TYPE_MSI:
|
||||||
|
msi_calc_digest(indata, md, cmdbuf, header->fileend);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
mdok = !memcmp(mdbuf, cmdbuf, EVP_MD_size(md));
|
||||||
|
if (mdok) {
|
||||||
|
printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype));
|
||||||
|
tohex(mdbuf, hexbuf, EVP_MD_size(md));
|
||||||
|
printf("Current message digest : %s\n", hexbuf);
|
||||||
|
tohex(cmdbuf, hexbuf, EVP_MD_size(md));
|
||||||
|
printf("Calculated message digest : %s\n\n", hexbuf);
|
||||||
|
} else {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (phlen > 0) {
|
||||||
|
size_t cphlen = 0;
|
||||||
|
unsigned char *cph;
|
||||||
|
cph = pe_calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &cphlen);
|
||||||
|
tohex(cph, hexbuf, (cphlen < 32) ? cphlen : 32);
|
||||||
|
mdok = (phlen = cphlen) && !memcmp(ph, cph, phlen);
|
||||||
|
OPENSSL_free(cph);
|
||||||
|
if (mdok) {
|
||||||
|
printf("Page hash algorithm : %s\n", OBJ_nid2sn(phtype));
|
||||||
|
tohex(ph, hexbuf, (phlen < 32) ? phlen : 32);
|
||||||
|
printf("Page hash : %s\n", hexbuf);
|
||||||
|
printf("Calculated page hash : %s\n\n", hexbuf);
|
||||||
|
} else {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ret = 0; /* OK */
|
||||||
|
}
|
||||||
|
out:
|
||||||
|
ASN1_OBJECT_free(indir_objid);
|
||||||
|
OPENSSL_free(ph);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If the message digest of the input file is found in the catalog file,
|
||||||
|
* or the input file itself is a catalog file, verify the signature.
|
||||||
|
*/
|
||||||
|
static int cat_verify_pkcs7(SIGNATURE *signature, char *indata, FILE_HEADER *header,
|
||||||
|
file_type_t filetype, GLOBAL_OPTIONS *options)
|
||||||
|
{
|
||||||
|
int ret = 1, ok = 0;
|
||||||
|
|
||||||
|
/* A CTL (MS_CTL_OBJID) is a list of hashes of certificates or a list of hashes files */
|
||||||
|
if (options->catalog && is_content_type(signature->p7, MS_CTL_OBJID)) {
|
||||||
|
ASN1_STRING *content_val = signature->p7->d.sign->contents->d.other->value.sequence;
|
||||||
|
const unsigned char *p = content_val->data;
|
||||||
|
MsCtlContent *ctlc = d2i_MsCtlContent(NULL, &p, content_val->length);
|
||||||
|
if (ctlc) {
|
||||||
|
int i, j;
|
||||||
|
/* find the message digest of the file for all files added to the catalog file */
|
||||||
|
for (i = 0; i < sk_CatalogInfo_num(ctlc->header_attributes); i++) {
|
||||||
|
STACK_OF(CatalogAuthAttr) *attributes;
|
||||||
|
CatalogInfo *header_attr = sk_CatalogInfo_value(ctlc->header_attributes, i);
|
||||||
|
if (header_attr == NULL)
|
||||||
|
continue;
|
||||||
|
attributes = header_attr->attributes;
|
||||||
|
for (j = 0; j < sk_CatalogAuthAttr_num(attributes); j++) {
|
||||||
|
CatalogAuthAttr *attribute = sk_CatalogAuthAttr_value(attributes, j);
|
||||||
|
if (!cat_verify_member(attribute, indata, header, filetype)) {
|
||||||
|
/* computed message digest of the file is found in the catalog file */
|
||||||
|
ok = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (ok)
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
MsCtlContent_free(ctlc);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
/* the input file is a catalog file */
|
||||||
|
ok = 1;
|
||||||
|
}
|
||||||
|
if (ok)
|
||||||
|
/* a message digest value of the catalog file is checked by PKCS7_verify() */
|
||||||
|
ret = verify_signature(signature, options);
|
||||||
|
else
|
||||||
|
printf("File not found in the specified catalog.\n\n");
|
||||||
|
|
||||||
/* The message digest is checked by PKCS7_verify() */
|
|
||||||
ret = verify_signature(signature, options);
|
|
||||||
if (!ret)
|
if (!ret)
|
||||||
ERR_print_errors_fp(stdout);
|
ERR_print_errors_fp(stdout);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int cat_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options)
|
static int cat_verify_file(char *catdata, FILE_HEADER *catheader,
|
||||||
|
char *indata, FILE_HEADER *header, file_type_t filetype, GLOBAL_OPTIONS *options)
|
||||||
{
|
{
|
||||||
int i, ret = 1;
|
int i, ret = 1;
|
||||||
PKCS7 *p7;
|
PKCS7 *p7;
|
||||||
@ -4336,11 +4545,15 @@ static int cat_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *op
|
|||||||
|
|
||||||
signatures = sk_SIGNATURE_new_null();
|
signatures = sk_SIGNATURE_new_null();
|
||||||
|
|
||||||
if (header->sigpos == header->fileend) {
|
if (header->sigpos == header->fileend ||
|
||||||
|
(options->catalog && (catheader->sigpos == catheader->fileend))) {
|
||||||
printf("No signature found\n\n");
|
printf("No signature found\n\n");
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
p7 = cat_extract_existing_pkcs7(indata, header);
|
if (options->catalog)
|
||||||
|
p7 = cat_extract_existing_pkcs7(catdata, catheader);
|
||||||
|
else
|
||||||
|
p7 = cat_extract_existing_pkcs7(indata, header);
|
||||||
if (!append_signature_list(&signatures, p7, 1)) {
|
if (!append_signature_list(&signatures, p7, 1)) {
|
||||||
printf("Failed to create signature list\n\n");
|
printf("Failed to create signature list\n\n");
|
||||||
PKCS7_free(p7);
|
PKCS7_free(p7);
|
||||||
@ -4348,9 +4561,10 @@ static int cat_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *op
|
|||||||
}
|
}
|
||||||
|
|
||||||
for (i = 0; i < sk_SIGNATURE_num(signatures); i++) {
|
for (i = 0; i < sk_SIGNATURE_num(signatures); i++) {
|
||||||
printf("Signature Index: %d %s\n", i, i==0 ? " (Primary Signature)" : "");
|
if (!options->catalog)
|
||||||
|
printf("Signature Index: %d %s\n", i, i==0 ? " (Primary Signature)" : "");
|
||||||
signature = sk_SIGNATURE_value(signatures, i);
|
signature = sk_SIGNATURE_value(signatures, i);
|
||||||
ret &= cat_verify_pkcs7(signature, options);
|
ret &= cat_verify_pkcs7(signature, indata, header, filetype, options);
|
||||||
if (signature->timestamp) {
|
if (signature->timestamp) {
|
||||||
CMS_ContentInfo_free(signature->timestamp);
|
CMS_ContentInfo_free(signature->timestamp);
|
||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
@ -5715,6 +5929,9 @@ static int main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTIONS
|
|||||||
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-add-msi-dse")) {
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-add-msi-dse")) {
|
||||||
options->add_msi_dse = 1;
|
options->add_msi_dse = 1;
|
||||||
#endif
|
#endif
|
||||||
|
} else if ((*cmd == CMD_VERIFY) && (!strcmp(*argv, "-c") || !strcmp(*argv, "-catalog"))) {
|
||||||
|
if (--argc < 1) usage(argv0, "all");
|
||||||
|
options->catalog = *(++argv);
|
||||||
} else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && !strcmp(*argv, "-CAfile")) {
|
} else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && !strcmp(*argv, "-CAfile")) {
|
||||||
if (--argc < 1) usage(argv0, "all");
|
if (--argc < 1) usage(argv0, "all");
|
||||||
OPENSSL_free(options->cafile);
|
OPENSSL_free(options->cafile);
|
||||||
@ -5803,17 +6020,17 @@ static int main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTIONS
|
|||||||
int main(int argc, char **argv)
|
int main(int argc, char **argv)
|
||||||
{
|
{
|
||||||
GLOBAL_OPTIONS options;
|
GLOBAL_OPTIONS options;
|
||||||
FILE_HEADER header;
|
FILE_HEADER header, catheader;
|
||||||
CRYPTO_PARAMS cparams;
|
CRYPTO_PARAMS cparams;
|
||||||
#ifdef WITH_GSF
|
#ifdef WITH_GSF
|
||||||
GSF_PARAMS gsfparams;
|
GSF_PARAMS gsfparams;
|
||||||
#endif
|
#endif
|
||||||
BIO *hash = NULL, *outdata = NULL;
|
BIO *hash = NULL, *outdata = NULL;
|
||||||
PKCS7 *cursig = NULL, *sig = NULL;
|
PKCS7 *cursig = NULL, *sig = NULL;
|
||||||
char *indata = NULL;
|
char *indata = NULL, *catdata = NULL;
|
||||||
int ret = -1, len = 0;
|
int ret = -1, len = 0;
|
||||||
size_t padlen = 0, filesize = 0;
|
size_t padlen = 0, filesize = 0;
|
||||||
file_type_t type;
|
file_type_t type, filetype = FILE_TYPE_CAT;
|
||||||
cmd_type_t cmd = CMD_SIGN;
|
cmd_type_t cmd = CMD_SIGN;
|
||||||
|
|
||||||
/* Set up OpenSSL */
|
/* Set up OpenSSL */
|
||||||
@ -5861,13 +6078,30 @@ int main(int argc, char **argv)
|
|||||||
|
|
||||||
if (!get_file_type(indata, options.infile, &type))
|
if (!get_file_type(indata, options.infile, &type))
|
||||||
goto err_cleanup;
|
goto err_cleanup;
|
||||||
|
if (!input_validation(type, &options, &header, indata, filesize))
|
||||||
|
goto err_cleanup;
|
||||||
|
|
||||||
|
/* search catalog file to determine whether the file is signed in a catalog */
|
||||||
|
if (options.catalog) {
|
||||||
|
size_t catsize = get_file_size(options.catalog);
|
||||||
|
if (catsize == 0)
|
||||||
|
goto err_cleanup;
|
||||||
|
catdata = map_file(options.catalog, catsize);
|
||||||
|
if (catdata == NULL)
|
||||||
|
DO_EXIT_1("Failed to open file: %s\n", options.catalog);
|
||||||
|
filetype = type;
|
||||||
|
if (!get_file_type(catdata, options.catalog, &type))
|
||||||
|
goto err_cleanup;
|
||||||
|
/* reset file header */
|
||||||
|
memset(&catheader, 0, sizeof(FILE_HEADER));
|
||||||
|
catheader.fileend = catsize;
|
||||||
|
if (!input_validation(type, &options, &catheader, catdata, catsize))
|
||||||
|
goto err_cleanup;
|
||||||
|
}
|
||||||
|
|
||||||
hash = BIO_new(BIO_f_md());
|
hash = BIO_new(BIO_f_md());
|
||||||
BIO_set_md(hash, options.md);
|
BIO_set_md(hash, options.md);
|
||||||
|
|
||||||
if (!input_validation(type, &options, &header, indata, filesize))
|
|
||||||
goto err_cleanup;
|
|
||||||
|
|
||||||
#ifdef WITH_GSF
|
#ifdef WITH_GSF
|
||||||
if (type == FILE_TYPE_MSI) {
|
if (type == FILE_TYPE_MSI) {
|
||||||
GsfInput *src;
|
GsfInput *src;
|
||||||
@ -5966,7 +6200,7 @@ int main(int argc, char **argv)
|
|||||||
if (cmd == CMD_REMOVE || cmd == CMD_EXTRACT || (cmd==CMD_ATTACH)) {
|
if (cmd == CMD_REMOVE || cmd == CMD_EXTRACT || (cmd==CMD_ATTACH)) {
|
||||||
DO_EXIT_0("Unsupported command\n");
|
DO_EXIT_0("Unsupported command\n");
|
||||||
} else if (cmd == CMD_VERIFY) {
|
} else if (cmd == CMD_VERIFY) {
|
||||||
ret = cat_verify_file(indata, &header, &options);
|
ret = cat_verify_file(catdata, &catheader, indata, &header, filetype, &options);
|
||||||
goto skip_signing;
|
goto skip_signing;
|
||||||
} else {
|
} else {
|
||||||
sig = cat_presign_file(type, cmd, &header, &options, &cparams, indata, &cursig);
|
sig = cat_presign_file(type, cmd, &header, &options, &cparams, indata, &cursig);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user