mirror of
https://github.com/mtrojnar/osslsigncode.git
synced 2025-04-04 17:00:11 -05:00
6531 lines
194 KiB
C
6531 lines
194 KiB
C
/*
|
|
OpenSSL based Authenticode signing for PE/MSI/Java CAB files.
|
|
|
|
Copyright (C) 2005-2015 Per Allansson <pallansson@gmail.com>
|
|
Copyright (C) 2018-2021 Michał Trojnara <Michal.Trojnara@stunnel.org>
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
In addition, as a special exception, the copyright holders give
|
|
permission to link the code of portions of this program with the
|
|
OpenSSL library under certain conditions as described in each
|
|
individual source file, and distribute linked combinations
|
|
including the two.
|
|
You must obey the GNU General Public License in all respects
|
|
for all of the code used other than OpenSSL. If you modify
|
|
file(s) with this exception, you may extend this exception to your
|
|
version of the file(s), but you are not obligated to do so. If you
|
|
do not wish to do so, delete this exception statement from your
|
|
version. If you delete this exception statement from all source
|
|
files in the program, then also delete it here.
|
|
*/
|
|
|
|
/*
|
|
Implemented with good help from:
|
|
|
|
* Peter Gutmann's analysis of Authenticode:
|
|
|
|
https://www.cs.auckland.ac.nz/~pgut001/pubs/authenticode.txt
|
|
|
|
* MS CAB SDK documentation
|
|
|
|
https://docs.microsoft.com/en-us/previous-versions/ms974336(v=msdn.10)
|
|
|
|
* MS PE/COFF documentation
|
|
|
|
https://docs.microsoft.com/en-us/windows/win32/debug/pe-format
|
|
|
|
* MS Windows Authenticode PE Signature Format
|
|
|
|
http://msdn.microsoft.com/en-US/windows/hardware/gg463183
|
|
|
|
(Although the part of how the actual checksumming is done is not
|
|
how it is done inside Windows. The end result is however the same
|
|
on all "normal" PE files.)
|
|
|
|
* tail -c, tcpdump, mimencode & openssl asn1parse :)
|
|
|
|
*/
|
|
|
|
#define OPENSSL_API_COMPAT 0x10100000L
|
|
#define OPENSSL_NO_DEPRECATED
|
|
|
|
#if defined(_MSC_VER) || defined(__MINGW32__)
|
|
#define HAVE_WINDOWS_H
|
|
#endif /* _MSC_VER || __MINGW32__ */
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif /* HAVE_CONFIG_H */
|
|
|
|
#ifdef HAVE_WINDOWS_H
|
|
#define NOCRYPT
|
|
#define WIN32_LEAN_AND_MEAN
|
|
#include <windows.h>
|
|
#endif /* HAVE_WINDOWS_H */
|
|
|
|
#include <stdio.h>
|
|
#include <stdbool.h>
|
|
#include <stdlib.h>
|
|
#ifndef _WIN32
|
|
#include <unistd.h>
|
|
#endif /* _WIN32 */
|
|
#include <string.h>
|
|
#include <time.h>
|
|
#include <ctype.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <fcntl.h>
|
|
|
|
#ifndef _WIN32
|
|
#ifdef HAVE_SYS_MMAN_H
|
|
#include <sys/mman.h>
|
|
#endif /* HAVE_SYS_MMAN_H */
|
|
|
|
#ifdef HAVE_TERMIOS_H
|
|
#include <termios.h>
|
|
#endif /* HAVE_TERMIOS_H */
|
|
#endif /* _WIN32 */
|
|
|
|
#include <openssl/err.h>
|
|
#include <openssl/objects.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/x509.h>
|
|
#include <openssl/x509v3.h> /* X509_PURPOSE */
|
|
#include <openssl/cms.h>
|
|
#include <openssl/pkcs7.h>
|
|
#include <openssl/pkcs12.h>
|
|
#include <openssl/pem.h>
|
|
#include <openssl/asn1t.h>
|
|
#include <openssl/bn.h>
|
|
#include <openssl/conf.h>
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
#include <openssl/engine.h>
|
|
#endif /* OPENSSL_NO_ENGINE */
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
#include <openssl/provider.h>
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
|
|
#include "msi.h"
|
|
#include "osslsigncode.h"
|
|
|
|
#ifdef ENABLE_CURL
|
|
#ifdef __CYGWIN__
|
|
#ifndef SOCKET
|
|
#define SOCKET UINT_PTR
|
|
#endif /* SOCKET */
|
|
#endif /* __CYGWIN__ */
|
|
#include <curl/curl.h>
|
|
|
|
#define MAX_TS_SERVERS 256
|
|
#endif /* ENABLE_CURL */
|
|
|
|
#if defined (HAVE_TERMIOS_H) || defined (HAVE_GETPASS)
|
|
#define PROVIDE_ASKPASS 1
|
|
#endif
|
|
|
|
#ifdef _WIN32
|
|
#define FILE_CREATE_MODE "w+b"
|
|
#else
|
|
#define FILE_CREATE_MODE "w+bx"
|
|
#endif
|
|
|
|
/* Microsoft OID Authenticode */
|
|
#define SPC_INDIRECT_DATA_OBJID "1.3.6.1.4.1.311.2.1.4"
|
|
#define SPC_STATEMENT_TYPE_OBJID "1.3.6.1.4.1.311.2.1.11"
|
|
#define SPC_SP_OPUS_INFO_OBJID "1.3.6.1.4.1.311.2.1.12"
|
|
#define SPC_PE_IMAGE_DATA_OBJID "1.3.6.1.4.1.311.2.1.15"
|
|
#define SPC_CAB_DATA_OBJID "1.3.6.1.4.1.311.2.1.25"
|
|
#define SPC_SIPINFO_OBJID "1.3.6.1.4.1.311.2.1.30"
|
|
#define SPC_PE_IMAGE_PAGE_HASHES_V1 "1.3.6.1.4.1.311.2.3.1" /* SHA1 */
|
|
#define SPC_PE_IMAGE_PAGE_HASHES_V2 "1.3.6.1.4.1.311.2.3.2" /* SHA256 */
|
|
#define SPC_NESTED_SIGNATURE_OBJID "1.3.6.1.4.1.311.2.4.1"
|
|
/* Microsoft OID Time Stamping */
|
|
#define SPC_TIME_STAMP_REQUEST_OBJID "1.3.6.1.4.1.311.3.2.1"
|
|
#define SPC_RFC3161_OBJID "1.3.6.1.4.1.311.3.3.1"
|
|
/* Microsoft OID Crypto 2.0 */
|
|
#define MS_CTL_OBJID "1.3.6.1.4.1.311.10.1"
|
|
/* Microsoft OID Microsoft_Java */
|
|
#define MS_JAVA_SOMETHING "1.3.6.1.4.1.311.15.1"
|
|
|
|
#define SPC_UNAUTHENTICATED_DATA_BLOB_OBJID "1.3.6.1.4.1.42921.1.2.1"
|
|
|
|
/* Public Key Cryptography Standards PKCS#9 */
|
|
#define PKCS9_MESSAGE_DIGEST "1.2.840.113549.1.9.4"
|
|
#define PKCS9_SIGNING_TIME "1.2.840.113549.1.9.5"
|
|
#define PKCS9_COUNTER_SIGNATURE "1.2.840.113549.1.9.6"
|
|
|
|
/* WIN_CERTIFICATE structure declared in Wintrust.h */
|
|
#define WIN_CERT_REVISION_2_0 0x0200
|
|
#define WIN_CERT_TYPE_PKCS_SIGNED_DATA 0x0002
|
|
|
|
/*
|
|
* FLAG_PREV_CABINET is set if the cabinet file is not the first in a set
|
|
* of cabinet files. When this bit is set, the szCabinetPrev and szDiskPrev
|
|
* fields are present in this CFHEADER.
|
|
*/
|
|
#define FLAG_PREV_CABINET 0x0001
|
|
/*
|
|
* FLAG_NEXT_CABINET is set if the cabinet file is not the last in a set of
|
|
* cabinet files. When this bit is set, the szCabinetNext and szDiskNext
|
|
* fields are present in this CFHEADER.
|
|
*/
|
|
#define FLAG_NEXT_CABINET 0x0002
|
|
/*
|
|
* FLAG_RESERVE_PRESENT is set if the cabinet file contains any reserved
|
|
* fields. When this bit is set, the cbCFHeader, cbCFFolder, and cbCFData
|
|
* fields are present in this CFHEADER.
|
|
*/
|
|
#define FLAG_RESERVE_PRESENT 0x0004
|
|
|
|
#define INVALID_TIME ((time_t)-1)
|
|
|
|
typedef struct SIGNATURE_st {
|
|
PKCS7 *p7;
|
|
int md_nid;
|
|
ASN1_STRING *digest;
|
|
time_t signtime;
|
|
char *url;
|
|
char *desc;
|
|
const u_char *purpose;
|
|
const u_char *level;
|
|
CMS_ContentInfo *timestamp;
|
|
time_t time;
|
|
ASN1_STRING *blob;
|
|
} SIGNATURE;
|
|
|
|
DEFINE_STACK_OF(SIGNATURE)
|
|
DECLARE_ASN1_FUNCTIONS(SIGNATURE)
|
|
|
|
typedef struct {
|
|
char *infile;
|
|
char *outfile;
|
|
char *sigfile;
|
|
char *certfile;
|
|
char *xcertfile;
|
|
char *keyfile;
|
|
char *pvkfile;
|
|
char *pkcs12file;
|
|
int output_pkcs7;
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
char *p11engine;
|
|
char *p11module;
|
|
char *p11cert;
|
|
#endif /* OPENSSL_NO_ENGINE */
|
|
int askpass;
|
|
char *readpass;
|
|
char *pass;
|
|
int comm;
|
|
int pagehash;
|
|
char *desc;
|
|
const EVP_MD *md;
|
|
char *url;
|
|
time_t time;
|
|
#ifdef ENABLE_CURL
|
|
char *turl[MAX_TS_SERVERS];
|
|
int nturl;
|
|
char *tsurl[MAX_TS_SERVERS];
|
|
int ntsurl;
|
|
char *proxy;
|
|
int noverifypeer;
|
|
#endif /* ENABLE_CURL */
|
|
int addBlob;
|
|
int nest;
|
|
int ignore_timestamp;
|
|
int verbose;
|
|
int add_msi_dse;
|
|
char *catalog;
|
|
char *cafile;
|
|
char *crlfile;
|
|
char *tsa_cafile;
|
|
char *tsa_crlfile;
|
|
char *leafhash;
|
|
int jp;
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
int legacy;
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
} GLOBAL_OPTIONS;
|
|
|
|
typedef struct {
|
|
EVP_PKEY *pkey;
|
|
X509 *cert;
|
|
STACK_OF(X509) *certs;
|
|
STACK_OF(X509) *xcerts;
|
|
STACK_OF(X509_CRL) *crls;
|
|
} CRYPTO_PARAMS;
|
|
|
|
typedef struct {
|
|
MSI_FILE *msi;
|
|
MSI_DIRENT *dirent;
|
|
u_char *p_msiex;
|
|
int len_msiex;
|
|
} MSI_PARAMS;
|
|
|
|
/*
|
|
* ASN.1 definitions (more or less from official MS Authenticode docs)
|
|
*/
|
|
|
|
typedef struct {
|
|
int type;
|
|
union {
|
|
ASN1_BMPSTRING *unicode;
|
|
ASN1_IA5STRING *ascii;
|
|
} value;
|
|
} SpcString;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(SpcString)
|
|
|
|
ASN1_CHOICE(SpcString) = {
|
|
ASN1_IMP_OPT(SpcString, value.unicode, ASN1_BMPSTRING, 0),
|
|
ASN1_IMP_OPT(SpcString, value.ascii, ASN1_IA5STRING, 1)
|
|
} ASN1_CHOICE_END(SpcString)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(SpcString)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_OCTET_STRING *classId;
|
|
ASN1_OCTET_STRING *serializedData;
|
|
} SpcSerializedObject;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(SpcSerializedObject)
|
|
|
|
ASN1_SEQUENCE(SpcSerializedObject) = {
|
|
ASN1_SIMPLE(SpcSerializedObject, classId, ASN1_OCTET_STRING),
|
|
ASN1_SIMPLE(SpcSerializedObject, serializedData, ASN1_OCTET_STRING)
|
|
} ASN1_SEQUENCE_END(SpcSerializedObject)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(SpcSerializedObject)
|
|
|
|
|
|
typedef struct {
|
|
int type;
|
|
union {
|
|
ASN1_IA5STRING *url;
|
|
SpcSerializedObject *moniker;
|
|
SpcString *file;
|
|
} value;
|
|
} SpcLink;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(SpcLink)
|
|
|
|
ASN1_CHOICE(SpcLink) = {
|
|
ASN1_IMP_OPT(SpcLink, value.url, ASN1_IA5STRING, 0),
|
|
ASN1_IMP_OPT(SpcLink, value.moniker, SpcSerializedObject, 1),
|
|
ASN1_EXP_OPT(SpcLink, value.file, SpcString, 2)
|
|
} ASN1_CHOICE_END(SpcLink)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(SpcLink)
|
|
|
|
|
|
typedef struct {
|
|
SpcString *programName;
|
|
SpcLink *moreInfo;
|
|
} SpcSpOpusInfo;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(SpcSpOpusInfo)
|
|
|
|
ASN1_SEQUENCE(SpcSpOpusInfo) = {
|
|
ASN1_EXP_OPT(SpcSpOpusInfo, programName, SpcString, 0),
|
|
ASN1_EXP_OPT(SpcSpOpusInfo, moreInfo, SpcLink, 1)
|
|
} ASN1_SEQUENCE_END(SpcSpOpusInfo)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(SpcSpOpusInfo)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_OBJECT *type;
|
|
ASN1_TYPE *value;
|
|
} SpcAttributeTypeAndOptionalValue;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(SpcAttributeTypeAndOptionalValue)
|
|
|
|
ASN1_SEQUENCE(SpcAttributeTypeAndOptionalValue) = {
|
|
ASN1_SIMPLE(SpcAttributeTypeAndOptionalValue, type, ASN1_OBJECT),
|
|
ASN1_OPT(SpcAttributeTypeAndOptionalValue, value, ASN1_ANY)
|
|
} ASN1_SEQUENCE_END(SpcAttributeTypeAndOptionalValue)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(SpcAttributeTypeAndOptionalValue)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_OBJECT *algorithm;
|
|
ASN1_TYPE *parameters;
|
|
} AlgorithmIdentifier;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(AlgorithmIdentifier)
|
|
|
|
ASN1_SEQUENCE(AlgorithmIdentifier) = {
|
|
ASN1_SIMPLE(AlgorithmIdentifier, algorithm, ASN1_OBJECT),
|
|
ASN1_OPT(AlgorithmIdentifier, parameters, ASN1_ANY)
|
|
} ASN1_SEQUENCE_END(AlgorithmIdentifier)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(AlgorithmIdentifier)
|
|
|
|
|
|
typedef struct {
|
|
AlgorithmIdentifier *digestAlgorithm;
|
|
ASN1_OCTET_STRING *digest;
|
|
} DigestInfo;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(DigestInfo)
|
|
|
|
ASN1_SEQUENCE(DigestInfo) = {
|
|
ASN1_SIMPLE(DigestInfo, digestAlgorithm, AlgorithmIdentifier),
|
|
ASN1_SIMPLE(DigestInfo, digest, ASN1_OCTET_STRING)
|
|
} ASN1_SEQUENCE_END(DigestInfo)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(DigestInfo)
|
|
|
|
|
|
typedef struct {
|
|
SpcAttributeTypeAndOptionalValue *data;
|
|
DigestInfo *messageDigest;
|
|
} SpcIndirectDataContent;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(SpcIndirectDataContent)
|
|
|
|
ASN1_SEQUENCE(SpcIndirectDataContent) = {
|
|
ASN1_SIMPLE(SpcIndirectDataContent, data, SpcAttributeTypeAndOptionalValue),
|
|
ASN1_SIMPLE(SpcIndirectDataContent, messageDigest, DigestInfo)
|
|
} ASN1_SEQUENCE_END(SpcIndirectDataContent)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(SpcIndirectDataContent)
|
|
|
|
|
|
typedef struct CatalogAuthAttr_st {
|
|
ASN1_OBJECT *type;
|
|
ASN1_TYPE *contents;
|
|
} CatalogAuthAttr;
|
|
|
|
DEFINE_STACK_OF(CatalogAuthAttr)
|
|
DECLARE_ASN1_FUNCTIONS(CatalogAuthAttr)
|
|
|
|
ASN1_SEQUENCE(CatalogAuthAttr) = {
|
|
ASN1_SIMPLE(CatalogAuthAttr, type, ASN1_OBJECT),
|
|
ASN1_OPT(CatalogAuthAttr, contents, ASN1_ANY)
|
|
} ASN1_SEQUENCE_END(CatalogAuthAttr)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(CatalogAuthAttr)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_OCTET_STRING *digest;
|
|
STACK_OF(CatalogAuthAttr) *attributes;
|
|
} CatalogInfo;
|
|
|
|
DEFINE_STACK_OF(CatalogInfo)
|
|
DECLARE_ASN1_FUNCTIONS(CatalogInfo)
|
|
|
|
ASN1_SEQUENCE(CatalogInfo) = {
|
|
ASN1_SIMPLE(CatalogInfo, digest, ASN1_OCTET_STRING),
|
|
ASN1_SET_OF(CatalogInfo, attributes, CatalogAuthAttr)
|
|
} ASN1_SEQUENCE_END(CatalogInfo)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(CatalogInfo)
|
|
|
|
|
|
typedef struct {
|
|
/* 1.3.6.1.4.1.311.12.1.1 szOID_CATALOG_LIST */
|
|
SpcAttributeTypeAndOptionalValue *type;
|
|
ASN1_OCTET_STRING *identifier;
|
|
ASN1_UTCTIME *time;
|
|
/* 1.3.6.1.4.1.311.12.1.2 CatalogVersion = 1
|
|
* 1.3.6.1.4.1.311.12.1.3 CatalogVersion = 2 */
|
|
SpcAttributeTypeAndOptionalValue *version;
|
|
STACK_OF(CatalogInfo) *header_attributes;
|
|
/* 1.3.6.1.4.1.311.12.2.1 CAT_NAMEVALUE_OBJID */
|
|
ASN1_TYPE *filename;
|
|
} MsCtlContent;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(MsCtlContent)
|
|
|
|
ASN1_SEQUENCE(MsCtlContent) = {
|
|
ASN1_SIMPLE(MsCtlContent, type, SpcAttributeTypeAndOptionalValue),
|
|
ASN1_SIMPLE(MsCtlContent, identifier, ASN1_OCTET_STRING),
|
|
ASN1_SIMPLE(MsCtlContent, time, ASN1_UTCTIME),
|
|
ASN1_SIMPLE(MsCtlContent, version, SpcAttributeTypeAndOptionalValue),
|
|
ASN1_SEQUENCE_OF(MsCtlContent, header_attributes, CatalogInfo),
|
|
ASN1_OPT(MsCtlContent, filename, ASN1_ANY)
|
|
} ASN1_SEQUENCE_END(MsCtlContent)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(MsCtlContent)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_BIT_STRING *flags;
|
|
SpcLink *file;
|
|
} SpcPeImageData;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(SpcPeImageData)
|
|
|
|
ASN1_SEQUENCE(SpcPeImageData) = {
|
|
ASN1_SIMPLE(SpcPeImageData, flags, ASN1_BIT_STRING),
|
|
ASN1_EXP_OPT(SpcPeImageData, file, SpcLink, 0)
|
|
} ASN1_SEQUENCE_END(SpcPeImageData)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(SpcPeImageData)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_INTEGER *a;
|
|
ASN1_OCTET_STRING *string;
|
|
ASN1_INTEGER *b;
|
|
ASN1_INTEGER *c;
|
|
ASN1_INTEGER *d;
|
|
ASN1_INTEGER *e;
|
|
ASN1_INTEGER *f;
|
|
} SpcSipInfo;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(SpcSipInfo)
|
|
|
|
ASN1_SEQUENCE(SpcSipInfo) = {
|
|
ASN1_SIMPLE(SpcSipInfo, a, ASN1_INTEGER),
|
|
ASN1_SIMPLE(SpcSipInfo, string, ASN1_OCTET_STRING),
|
|
ASN1_SIMPLE(SpcSipInfo, b, ASN1_INTEGER),
|
|
ASN1_SIMPLE(SpcSipInfo, c, ASN1_INTEGER),
|
|
ASN1_SIMPLE(SpcSipInfo, d, ASN1_INTEGER),
|
|
ASN1_SIMPLE(SpcSipInfo, e, ASN1_INTEGER),
|
|
ASN1_SIMPLE(SpcSipInfo, f, ASN1_INTEGER),
|
|
} ASN1_SEQUENCE_END(SpcSipInfo)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(SpcSipInfo)
|
|
|
|
|
|
typedef struct {
|
|
AlgorithmIdentifier *digestAlgorithm;
|
|
ASN1_OCTET_STRING *digest;
|
|
} MessageImprint;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(MessageImprint)
|
|
|
|
ASN1_SEQUENCE(MessageImprint) = {
|
|
ASN1_SIMPLE(MessageImprint, digestAlgorithm, AlgorithmIdentifier),
|
|
ASN1_SIMPLE(MessageImprint, digest, ASN1_OCTET_STRING)
|
|
} ASN1_SEQUENCE_END(MessageImprint)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(MessageImprint)
|
|
|
|
#ifdef ENABLE_CURL
|
|
|
|
typedef struct {
|
|
ASN1_OBJECT *type;
|
|
ASN1_OCTET_STRING *signature;
|
|
} TimeStampRequestBlob;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(TimeStampRequestBlob)
|
|
|
|
ASN1_SEQUENCE(TimeStampRequestBlob) = {
|
|
ASN1_SIMPLE(TimeStampRequestBlob, type, ASN1_OBJECT),
|
|
ASN1_EXP_OPT(TimeStampRequestBlob, signature, ASN1_OCTET_STRING, 0)
|
|
} ASN1_SEQUENCE_END(TimeStampRequestBlob)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(TimeStampRequestBlob)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_OBJECT *type;
|
|
TimeStampRequestBlob *blob;
|
|
} TimeStampRequest;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(TimeStampRequest)
|
|
|
|
ASN1_SEQUENCE(TimeStampRequest) = {
|
|
ASN1_SIMPLE(TimeStampRequest, type, ASN1_OBJECT),
|
|
ASN1_SIMPLE(TimeStampRequest, blob, TimeStampRequestBlob)
|
|
} ASN1_SEQUENCE_END(TimeStampRequest)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(TimeStampRequest)
|
|
|
|
/* RFC3161 Time stamping */
|
|
|
|
typedef struct {
|
|
ASN1_INTEGER *status;
|
|
STACK_OF(ASN1_UTF8STRING) *statusString;
|
|
ASN1_BIT_STRING *failInfo;
|
|
} PKIStatusInfo;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(PKIStatusInfo)
|
|
|
|
ASN1_SEQUENCE(PKIStatusInfo) = {
|
|
ASN1_SIMPLE(PKIStatusInfo, status, ASN1_INTEGER),
|
|
ASN1_SEQUENCE_OF_OPT(PKIStatusInfo, statusString, ASN1_UTF8STRING),
|
|
ASN1_OPT(PKIStatusInfo, failInfo, ASN1_BIT_STRING)
|
|
} ASN1_SEQUENCE_END(PKIStatusInfo)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(PKIStatusInfo)
|
|
|
|
|
|
typedef struct {
|
|
PKIStatusInfo *status;
|
|
PKCS7 *token;
|
|
} TimeStampResp;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(TimeStampResp)
|
|
|
|
ASN1_SEQUENCE(TimeStampResp) = {
|
|
ASN1_SIMPLE(TimeStampResp, status, PKIStatusInfo),
|
|
ASN1_OPT(TimeStampResp, token, PKCS7)
|
|
} ASN1_SEQUENCE_END(TimeStampResp)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(TimeStampResp)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_INTEGER *version;
|
|
MessageImprint *messageImprint;
|
|
ASN1_OBJECT *reqPolicy;
|
|
ASN1_INTEGER *nonce;
|
|
ASN1_BOOLEAN certReq;
|
|
STACK_OF(X509_EXTENSION) *extensions;
|
|
} TimeStampReq;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(TimeStampReq)
|
|
|
|
ASN1_SEQUENCE(TimeStampReq) = {
|
|
ASN1_SIMPLE(TimeStampReq, version, ASN1_INTEGER),
|
|
ASN1_SIMPLE(TimeStampReq, messageImprint, MessageImprint),
|
|
ASN1_OPT (TimeStampReq, reqPolicy, ASN1_OBJECT),
|
|
ASN1_OPT (TimeStampReq, nonce, ASN1_INTEGER),
|
|
ASN1_SIMPLE(TimeStampReq, certReq, ASN1_FBOOLEAN),
|
|
ASN1_IMP_SEQUENCE_OF_OPT(TimeStampReq, extensions, X509_EXTENSION, 0)
|
|
} ASN1_SEQUENCE_END(TimeStampReq)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(TimeStampReq)
|
|
|
|
#endif /* ENABLE_CURL */
|
|
|
|
typedef struct {
|
|
ASN1_INTEGER *seconds;
|
|
ASN1_INTEGER *millis;
|
|
ASN1_INTEGER *micros;
|
|
} TimeStampAccuracy;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(TimeStampAccuracy)
|
|
|
|
ASN1_SEQUENCE(TimeStampAccuracy) = {
|
|
ASN1_OPT(TimeStampAccuracy, seconds, ASN1_INTEGER),
|
|
ASN1_IMP_OPT(TimeStampAccuracy, millis, ASN1_INTEGER, 0),
|
|
ASN1_IMP_OPT(TimeStampAccuracy, micros, ASN1_INTEGER, 1)
|
|
} ASN1_SEQUENCE_END(TimeStampAccuracy)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(TimeStampAccuracy)
|
|
|
|
|
|
typedef struct {
|
|
ASN1_INTEGER *version;
|
|
ASN1_OBJECT *policy_id;
|
|
MessageImprint *messageImprint;
|
|
ASN1_INTEGER *serial;
|
|
ASN1_GENERALIZEDTIME *time;
|
|
TimeStampAccuracy *accuracy;
|
|
ASN1_BOOLEAN ordering;
|
|
ASN1_INTEGER *nonce;
|
|
GENERAL_NAME *tsa;
|
|
STACK_OF(X509_EXTENSION) *extensions;
|
|
} TimeStampToken;
|
|
|
|
DECLARE_ASN1_FUNCTIONS(TimeStampToken)
|
|
|
|
ASN1_SEQUENCE(TimeStampToken) = {
|
|
ASN1_SIMPLE(TimeStampToken, version, ASN1_INTEGER),
|
|
ASN1_SIMPLE(TimeStampToken, policy_id, ASN1_OBJECT),
|
|
ASN1_SIMPLE(TimeStampToken, messageImprint, MessageImprint),
|
|
ASN1_SIMPLE(TimeStampToken, serial, ASN1_INTEGER),
|
|
ASN1_SIMPLE(TimeStampToken, time, ASN1_GENERALIZEDTIME),
|
|
ASN1_OPT(TimeStampToken, accuracy, TimeStampAccuracy),
|
|
ASN1_OPT(TimeStampToken, ordering, ASN1_FBOOLEAN),
|
|
ASN1_OPT(TimeStampToken, nonce, ASN1_INTEGER),
|
|
ASN1_EXP_OPT(TimeStampToken, tsa, GENERAL_NAME, 0),
|
|
ASN1_IMP_SEQUENCE_OF_OPT(TimeStampToken, extensions, X509_EXTENSION, 1)
|
|
} ASN1_SEQUENCE_END(TimeStampToken)
|
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(TimeStampToken)
|
|
|
|
/*
|
|
* $ echo -n 3006030200013000 | xxd -r -p | openssl asn1parse -i -inform der
|
|
* 0:d=0 hl=2 l= 6 cons: SEQUENCE
|
|
* 2:d=1 hl=2 l= 2 prim: BIT STRING
|
|
* 6:d=1 hl=2 l= 0 cons: SEQUENCE
|
|
*/
|
|
const u_char java_attrs_low[] = {
|
|
0x30, 0x06, 0x03, 0x02, 0x00, 0x01, 0x30, 0x00
|
|
};
|
|
|
|
/*
|
|
* $ echo -n 300c060a2b060104018237020115 | xxd -r -p | openssl asn1parse -i -inform der
|
|
* 0:d=0 hl=2 l= 12 cons: SEQUENCE
|
|
* 2:d=1 hl=2 l= 10 prim: OBJECT :Microsoft Individual Code Signing
|
|
*/
|
|
const u_char purpose_ind[] = {
|
|
0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
|
|
0x01, 0x82, 0x37, 0x02, 0x01, 0x15
|
|
};
|
|
|
|
/*
|
|
* $ echo -n 300c060a2b060104018237020116 | xxd -r -p | openssl asn1parse -i -inform der
|
|
* 0:d=0 hl=2 l= 12 cons: SEQUENCE
|
|
* 2:d=1 hl=2 l= 10 prim: OBJECT :Microsoft Commercial Code Signing
|
|
*/
|
|
const u_char purpose_comm[] = {
|
|
0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
|
|
0x01, 0x82, 0x37, 0x02, 0x01, 0x16
|
|
};
|
|
|
|
const u_char classid_page_hash[] = {
|
|
0xa6, 0xb5, 0x86, 0xd5, 0xb4, 0xa1, 0x24, 0x66,
|
|
0xae, 0x05, 0xa2, 0x17, 0xda, 0x8e, 0x60, 0xd6
|
|
};
|
|
|
|
static SpcSpOpusInfo *createOpus(const char *desc, const char *url)
|
|
{
|
|
SpcSpOpusInfo *info = SpcSpOpusInfo_new();
|
|
|
|
if (desc) {
|
|
info->programName = SpcString_new();
|
|
info->programName->type = 1;
|
|
info->programName->value.ascii = ASN1_IA5STRING_new();
|
|
ASN1_STRING_set((ASN1_STRING *)info->programName->value.ascii,
|
|
desc, (int)strlen(desc));
|
|
}
|
|
if (url) {
|
|
info->moreInfo = SpcLink_new();
|
|
info->moreInfo->type = 0;
|
|
info->moreInfo->value.url = ASN1_IA5STRING_new();
|
|
ASN1_STRING_set((ASN1_STRING *)info->moreInfo->value.url,
|
|
url, (int)strlen(url));
|
|
}
|
|
return info;
|
|
}
|
|
|
|
/*
|
|
* Return the header length (tag and length octets) of the ASN.1 type
|
|
*/
|
|
static int asn1_simple_hdr_len(const u_char *p, int len)
|
|
{
|
|
if (len <= 2 || p[0] > 0x31)
|
|
return 0;
|
|
return (p[1]&0x80) ? (2 + (p[1]&0x7f)) : 2;
|
|
}
|
|
|
|
/*
|
|
* Add a custom, non-trusted time to the PKCS7 structure to prevent OpenSSL
|
|
* adding the _current_ time. This allows to create a deterministic signature
|
|
* when no trusted timestamp server was specified, making osslsigncode
|
|
* behaviour closer to signtool.exe (which doesn't include any non-trusted
|
|
* time in this case.)
|
|
*/
|
|
static int pkcs7_add_signing_time(PKCS7_SIGNER_INFO *si, time_t time)
|
|
{
|
|
if (time == INVALID_TIME) /* -time option was not specified */
|
|
return 1; /* success */
|
|
return PKCS7_add_signed_attribute(si,
|
|
NID_pkcs9_signingTime, V_ASN1_UTCTIME,
|
|
ASN1_TIME_adj(NULL, time, 0, 0));
|
|
}
|
|
|
|
static void tohex(const u_char *v, char *b, int len)
|
|
{
|
|
int i, j = 0;
|
|
for(i=0; i<len; i++) {
|
|
#ifdef WIN32
|
|
int size = EVP_MAX_MD_SIZE*2+1;
|
|
j += sprintf_s(b+j, size-j, "%02X", v[i]);
|
|
#else
|
|
j += sprintf(b+j, "%02X", v[i]);
|
|
#endif /* WIN32 */
|
|
}
|
|
}
|
|
|
|
static void print_hash(const char *descript1, const char *descript2, const u_char *hashbuf, int length)
|
|
{
|
|
char hexbuf[EVP_MAX_MD_SIZE*2+1];
|
|
|
|
if (length > EVP_MAX_MD_SIZE) {
|
|
printf("Invalid message digest size\n");
|
|
return;
|
|
}
|
|
tohex(hashbuf, hexbuf, length);
|
|
printf("%s: %s %s\n", descript1, hexbuf, descript2);
|
|
}
|
|
|
|
static int compare_digests(u_char *mdbuf, u_char *cmdbuf, int mdtype)
|
|
{
|
|
int mdlen = EVP_MD_size(EVP_get_digestbynid(mdtype));
|
|
int mdok = !memcmp(mdbuf, cmdbuf, (size_t)mdlen);
|
|
printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype));
|
|
print_hash("Current message digest ", "", mdbuf, mdlen);
|
|
print_hash("Calculated message digest ", mdok ? "\n" : " MISMATCH!!!\n", cmdbuf, mdlen);
|
|
return mdok;
|
|
}
|
|
|
|
static int is_content_type(PKCS7 *p7, const char *objid)
|
|
{
|
|
ASN1_OBJECT *indir_objid;
|
|
int retval;
|
|
|
|
indir_objid = OBJ_txt2obj(objid, 1);
|
|
retval = p7 && PKCS7_type_is_signed(p7) &&
|
|
!OBJ_cmp(p7->d.sign->contents->type, indir_objid) &&
|
|
(p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE ||
|
|
p7->d.sign->contents->d.other->type == V_ASN1_OCTET_STRING);
|
|
ASN1_OBJECT_free(indir_objid);
|
|
return retval;
|
|
}
|
|
|
|
int bio_hash_data(char *indata, BIO *hash, uint32_t idx, uint32_t offset, uint32_t fileend)
|
|
{
|
|
size_t written;
|
|
uint32_t want;
|
|
uint32_t start = offset ? offset : idx;
|
|
|
|
while (start < fileend) {
|
|
want = fileend - start;
|
|
if (want > SIZE_64K)
|
|
want = SIZE_64K;
|
|
if (!BIO_write_ex(hash, indata + idx, want, &written)) {
|
|
BIO_free_all(hash);
|
|
return 0; /* FAILED */
|
|
}
|
|
idx += (uint32_t)written;
|
|
start += (uint32_t)written;
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
#ifdef ENABLE_CURL
|
|
|
|
static int blob_has_nl = 0;
|
|
|
|
/*
|
|
* Callback for writing received data
|
|
*/
|
|
static size_t curl_write(void *ptr, size_t sz, size_t nmemb, void *stream)
|
|
{
|
|
size_t written, len = sz * nmemb;
|
|
|
|
if (len > 0 && !blob_has_nl) {
|
|
if (memchr(ptr, '\n', len))
|
|
blob_has_nl = 1;
|
|
}
|
|
if (!BIO_write_ex((BIO*)stream, ptr, len, &written) || written != len)
|
|
return 0; /* FAILED */
|
|
return written;
|
|
}
|
|
|
|
static void print_timestamp_error(const char *url, long http_code)
|
|
{
|
|
if (http_code != -1) {
|
|
printf("Failed to convert timestamp reply from %s; "
|
|
"HTTP status %ld\n", url, http_code);
|
|
} else {
|
|
printf("Failed to convert timestamp reply from %s; "
|
|
"no HTTP status available", url);
|
|
}
|
|
ERR_print_errors_fp(stdout);
|
|
}
|
|
|
|
/*
|
|
A timestamp request looks like this:
|
|
|
|
POST <someurl> HTTP/1.1
|
|
Content-Type: application/octet-stream
|
|
Content-Length: ...
|
|
Accept: application/octet-stream
|
|
User-Agent: Transport
|
|
Host: ...
|
|
Cache-Control: no-cache
|
|
|
|
<base64encoded blob>
|
|
|
|
.. and the blob has the following ASN1 structure:
|
|
|
|
0:d=0 hl=4 l= 291 cons: SEQUENCE
|
|
4:d=1 hl=2 l= 10 prim: OBJECT :1.3.6.1.4.1.311.3.2.1
|
|
16:d=1 hl=4 l= 275 cons: SEQUENCE
|
|
20:d=2 hl=2 l= 9 prim: OBJECT :pkcs7-data
|
|
31:d=2 hl=4 l= 260 cons: cont [ 0 ]
|
|
35:d=3 hl=4 l= 256 prim: OCTET STRING
|
|
<signature>
|
|
|
|
.. and it returns a base64 encoded PKCS#7 structure.
|
|
*/
|
|
|
|
/*
|
|
* Encode RFC 3161 timestamp request and write it into BIO
|
|
*/
|
|
static BIO *encode_rfc3161_request(PKCS7 *sig, const EVP_MD *md)
|
|
{
|
|
PKCS7_SIGNER_INFO *si;
|
|
u_char mdbuf[EVP_MAX_MD_SIZE];
|
|
TimeStampReq *req;
|
|
BIO *bout, *bhash;
|
|
u_char *p;
|
|
int len;
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info = PKCS7_get_signer_info(sig);
|
|
|
|
if (!signer_info)
|
|
return NULL; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si)
|
|
return NULL; /* FAILED */
|
|
|
|
bhash = BIO_new(BIO_f_md());
|
|
if (!BIO_set_md(bhash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(bhash);
|
|
return NULL; /* FAILED */
|
|
}
|
|
BIO_push(bhash, BIO_new(BIO_s_null()));
|
|
BIO_write(bhash, si->enc_digest->data, si->enc_digest->length);
|
|
BIO_gets(bhash, (char*)mdbuf, EVP_MD_size(md));
|
|
BIO_free_all(bhash);
|
|
|
|
req = TimeStampReq_new();
|
|
ASN1_INTEGER_set(req->version, 1);
|
|
req->messageImprint->digestAlgorithm->algorithm = OBJ_nid2obj(EVP_MD_nid(md));
|
|
req->messageImprint->digestAlgorithm->parameters = ASN1_TYPE_new();
|
|
req->messageImprint->digestAlgorithm->parameters->type = V_ASN1_NULL;
|
|
ASN1_OCTET_STRING_set(req->messageImprint->digest, mdbuf, EVP_MD_size(md));
|
|
req->certReq = 0xFF;
|
|
|
|
len = i2d_TimeStampReq(req, NULL);
|
|
p = OPENSSL_malloc((size_t)len);
|
|
len = i2d_TimeStampReq(req, &p);
|
|
p -= len;
|
|
TimeStampReq_free(req);
|
|
|
|
bout = BIO_new(BIO_s_mem());
|
|
BIO_write(bout, p, len);
|
|
OPENSSL_free(p);
|
|
(void)BIO_flush(bout);
|
|
return bout;
|
|
}
|
|
|
|
/*
|
|
* Encode authenticode timestamp request and write it into BIO
|
|
*/
|
|
static BIO *encode_authenticode_request(PKCS7 *sig)
|
|
{
|
|
PKCS7_SIGNER_INFO *si;
|
|
TimeStampRequest *req;
|
|
BIO *bout, *b64;
|
|
u_char *p;
|
|
int len;
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info = PKCS7_get_signer_info(sig);
|
|
|
|
if (!signer_info)
|
|
return 0; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si)
|
|
return 0; /* FAILED */
|
|
|
|
req = TimeStampRequest_new();
|
|
req->type = OBJ_txt2obj(SPC_TIME_STAMP_REQUEST_OBJID, 1);
|
|
req->blob->type = OBJ_nid2obj(NID_pkcs7_data);
|
|
req->blob->signature = si->enc_digest;
|
|
|
|
len = i2d_TimeStampRequest(req, NULL);
|
|
p = OPENSSL_malloc((size_t)len);
|
|
len = i2d_TimeStampRequest(req, &p);
|
|
p -= len;
|
|
req->blob->signature = NULL;
|
|
TimeStampRequest_free(req);
|
|
|
|
bout = BIO_new(BIO_s_mem());
|
|
b64 = BIO_new(BIO_f_base64());
|
|
bout = BIO_push(b64, bout);
|
|
BIO_write(bout, p, len);
|
|
OPENSSL_free(p);
|
|
(void)BIO_flush(bout);
|
|
return bout;
|
|
}
|
|
|
|
/*
|
|
* Decode a curl response from BIO.
|
|
* If successful the RFC 3161 timestamp will be written into
|
|
* the PKCS7 SignerInfo structure as an unauthorized attribute - cont[1].
|
|
*/
|
|
static CURLcode decode_rfc3161_response(PKCS7 *sig, BIO *bin, int verbose)
|
|
{
|
|
PKCS7_SIGNER_INFO *si;
|
|
STACK_OF(X509_ATTRIBUTE) *attrs;
|
|
TimeStampResp *reply;
|
|
u_char *p;
|
|
int i, len;
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info = PKCS7_get_signer_info(sig);
|
|
|
|
if (!signer_info)
|
|
return 1; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si)
|
|
return 1; /* FAILED */
|
|
|
|
reply = ASN1_item_d2i_bio(ASN1_ITEM_rptr(TimeStampResp), bin, NULL);
|
|
BIO_free_all(bin);
|
|
if (!reply || !reply->status)
|
|
return 1; /* FAILED */
|
|
if (ASN1_INTEGER_get(reply->status->status) != 0) {
|
|
if (verbose) {
|
|
printf("Timestamping failed: status %ld\n", ASN1_INTEGER_get(reply->status->status));
|
|
for (i = 0; i < sk_ASN1_UTF8STRING_num(reply->status->statusString); i++) {
|
|
ASN1_UTF8STRING *status = sk_ASN1_UTF8STRING_value(reply->status->statusString, i);
|
|
printf("%s\n", ASN1_STRING_get0_data(status));
|
|
}
|
|
}
|
|
TimeStampResp_free(reply);
|
|
return 1; /* FAILED */
|
|
}
|
|
if (((len = i2d_PKCS7(reply->token, NULL)) <= 0) || (p = OPENSSL_malloc((size_t)len)) == NULL) {
|
|
if (verbose) {
|
|
printf("Failed to convert pkcs7: %d\n", len);
|
|
ERR_print_errors_fp(stdout);
|
|
}
|
|
TimeStampResp_free(reply);
|
|
return 1; /* FAILED */
|
|
}
|
|
len = i2d_PKCS7(reply->token, &p);
|
|
p -= len;
|
|
TimeStampResp_free(reply);
|
|
|
|
attrs = sk_X509_ATTRIBUTE_new_null();
|
|
attrs = X509at_add1_attr_by_txt(&attrs, SPC_RFC3161_OBJID, V_ASN1_SET, p, len);
|
|
OPENSSL_free(p);
|
|
|
|
PKCS7_set_attributes(si, attrs);
|
|
sk_X509_ATTRIBUTE_pop_free(attrs, X509_ATTRIBUTE_free);
|
|
return 0; /* OK */
|
|
}
|
|
|
|
/*
|
|
* Decode a curl response from BIO.
|
|
* If successful the authenticode timestamp will be written into
|
|
* the PKCS7 SignerInfo structure as an unauthorized attribute - cont[1].
|
|
*/
|
|
static CURLcode decode_authenticode_response(PKCS7 *sig, BIO *bin, int verbose)
|
|
{
|
|
PKCS7 *p7;
|
|
PKCS7_SIGNER_INFO *info, *si;
|
|
STACK_OF(X509_ATTRIBUTE) *attrs;
|
|
BIO* b64, *b64_bin;
|
|
u_char *p;
|
|
int len, i;
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info;
|
|
|
|
b64 = BIO_new(BIO_f_base64());
|
|
if (!blob_has_nl)
|
|
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
|
|
b64_bin = BIO_push(b64, bin);
|
|
p7 = d2i_PKCS7_bio(b64_bin, NULL);
|
|
BIO_free_all(b64_bin);
|
|
if (p7 == NULL)
|
|
return 1; /* FAILED */
|
|
|
|
for(i = sk_X509_num(p7->d.sign->cert)-1; i>=0; i--)
|
|
PKCS7_add_certificate(sig, sk_X509_value(p7->d.sign->cert, i));
|
|
|
|
signer_info = PKCS7_get_signer_info(p7);
|
|
if (!signer_info)
|
|
return 1; /* FAILED */
|
|
info = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!info)
|
|
return 1; /* FAILED */
|
|
if (((len = i2d_PKCS7_SIGNER_INFO(info, NULL)) <= 0) || (p = OPENSSL_malloc((size_t)len)) == NULL) {
|
|
if (verbose) {
|
|
printf("Failed to convert signer info: %d\n", len);
|
|
ERR_print_errors_fp(stdout);
|
|
}
|
|
PKCS7_free(p7);
|
|
return 1; /* FAILED */
|
|
}
|
|
len = i2d_PKCS7_SIGNER_INFO(info, &p);
|
|
p -= len;
|
|
PKCS7_free(p7);
|
|
|
|
attrs = sk_X509_ATTRIBUTE_new_null();
|
|
attrs = X509at_add1_attr_by_txt(&attrs, PKCS9_COUNTER_SIGNATURE, V_ASN1_SET, p, len);
|
|
OPENSSL_free(p);
|
|
|
|
signer_info = PKCS7_get_signer_info(sig);
|
|
if (!signer_info)
|
|
return 1; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si)
|
|
return 1; /* FAILED */
|
|
/*
|
|
* PKCS7_set_attributes() frees up all elements of si->unauth_attr
|
|
* and sets there a copy of attrs so overrides the previous timestamp
|
|
*/
|
|
PKCS7_set_attributes(si, attrs);
|
|
sk_X509_ATTRIBUTE_pop_free(attrs, X509_ATTRIBUTE_free);
|
|
return 0; /* OK */
|
|
}
|
|
|
|
/*
|
|
* Add timestamp to the PKCS7 SignerInfo structure:
|
|
* sig->d.sign->signer_info->unauth_attr
|
|
*/
|
|
static int add_timestamp(PKCS7 *sig, char *url, char *proxy, int rfc3161,
|
|
const EVP_MD *md, int verbose, int noverifypeer)
|
|
{
|
|
CURL *curl;
|
|
struct curl_slist *slist = NULL;
|
|
CURLcode res;
|
|
BIO *bout, *bin;
|
|
u_char *p = NULL;
|
|
long len = 0;
|
|
|
|
if (!url)
|
|
return 1; /* FAILED */
|
|
|
|
/* Encode timestamp request */
|
|
if (rfc3161) {
|
|
bout = encode_rfc3161_request(sig, md);
|
|
} else {
|
|
bout = encode_authenticode_request(sig);
|
|
}
|
|
if (!bout)
|
|
return 1; /* FAILED */
|
|
|
|
/* Start a libcurl easy session and set options for a curl easy handle */
|
|
curl = curl_easy_init();
|
|
if (proxy) {
|
|
res = curl_easy_setopt(curl, CURLOPT_PROXY, proxy);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
if (!strncmp("http:", proxy, 5)) {
|
|
res = curl_easy_setopt(curl, CURLOPT_PROXYTYPE, CURLPROXY_HTTP);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
}
|
|
if (!strncmp("socks:", proxy, 6)) {
|
|
res = curl_easy_setopt(curl, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
}
|
|
}
|
|
res = curl_easy_setopt(curl, CURLOPT_URL, url);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
/*
|
|
* ask libcurl to show us the verbose output
|
|
* curl_easy_setopt(curl, CURLOPT_VERBOSE, 42);
|
|
*/
|
|
if (noverifypeer) {
|
|
res = curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
}
|
|
|
|
if (rfc3161) {
|
|
slist = curl_slist_append(slist, "Content-Type: application/timestamp-query");
|
|
slist = curl_slist_append(slist, "Accept: application/timestamp-reply");
|
|
} else {
|
|
slist = curl_slist_append(slist, "Content-Type: application/octet-stream");
|
|
slist = curl_slist_append(slist, "Accept: application/octet-stream");
|
|
}
|
|
slist = curl_slist_append(slist, "User-Agent: Transport");
|
|
slist = curl_slist_append(slist, "Cache-Control: no-cache");
|
|
res = curl_easy_setopt(curl, CURLOPT_HTTPHEADER, slist);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
|
|
len = BIO_get_mem_data(bout, &p);
|
|
res = curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, len);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
res = curl_easy_setopt(curl, CURLOPT_POSTFIELDS, (char*)p);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
|
|
bin = BIO_new(BIO_s_mem());
|
|
BIO_set_mem_eof_return(bin, 0);
|
|
res = curl_easy_setopt(curl, CURLOPT_POST, 1);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
res = curl_easy_setopt(curl, CURLOPT_WRITEDATA, bin);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
res = curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, curl_write);
|
|
if (res != CURLE_OK) {
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
}
|
|
/* Perform the request */
|
|
res = curl_easy_perform(curl);
|
|
curl_slist_free_all(slist);
|
|
BIO_free_all(bout);
|
|
|
|
if (res != CURLE_OK) {
|
|
BIO_free_all(bin);
|
|
if (verbose)
|
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
|
} else {
|
|
/* CURLE_OK (0) */
|
|
long http_code = -1;
|
|
(void)BIO_flush(bin);
|
|
curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &http_code);
|
|
/* Decode a curl response from BIO and write it into the PKCS7 structure */
|
|
if (rfc3161)
|
|
res = decode_rfc3161_response(sig, bin, verbose);
|
|
else
|
|
res = decode_authenticode_response(sig, bin, verbose);
|
|
if (res && verbose)
|
|
print_timestamp_error(url, http_code);
|
|
}
|
|
/* End a libcurl easy handle */
|
|
curl_easy_cleanup(curl);
|
|
return (int)res;
|
|
}
|
|
|
|
static int add_timestamp_authenticode(PKCS7 *sig, GLOBAL_OPTIONS *options)
|
|
{
|
|
int i;
|
|
for (i=0; i<options->nturl; i++) {
|
|
int res = add_timestamp(sig, options->turl[i], options->proxy, 0, NULL,
|
|
options->verbose || options->nturl == 1, options->noverifypeer);
|
|
if (!res)
|
|
return 0; /* OK */
|
|
}
|
|
return 1; /* FAILED */
|
|
}
|
|
|
|
static int add_timestamp_rfc3161(PKCS7 *sig, GLOBAL_OPTIONS *options)
|
|
{
|
|
int i;
|
|
for (i=0; i<options->ntsurl; i++) {
|
|
int res = add_timestamp(sig, options->tsurl[i], options->proxy, 1, options->md,
|
|
options->verbose || options->ntsurl == 1, options->noverifypeer);
|
|
if (!res)
|
|
return 0; /* OK */
|
|
}
|
|
return 1; /* FAILED */
|
|
}
|
|
#endif /* ENABLE_CURL */
|
|
|
|
|
|
static bool on_list(const char *txt, const char *list[])
|
|
{
|
|
while (*list)
|
|
if (!strcmp(txt, *list++))
|
|
return true;
|
|
return false;
|
|
}
|
|
|
|
static void usage(const char *argv0, const char *cmd)
|
|
{
|
|
const char *cmds_all[] = {"all", NULL};
|
|
const char *cmds_sign[] = {"all", "sign", NULL};
|
|
const char *cmds_add[] = {"all", "add", NULL};
|
|
const char *cmds_attach[] = {"all", "attach-signature", NULL};
|
|
const char *cmds_extract[] = {"all", "extract-signature", NULL};
|
|
const char *cmds_remove[] = {"all", "remove-signature", NULL};
|
|
const char *cmds_verify[] = {"all", "verify", NULL};
|
|
|
|
printf("\nUsage: %s", argv0);
|
|
if (on_list(cmd, cmds_all)) {
|
|
printf("\n\n%1s[ --version | -v ]\n", "");
|
|
printf("%1s[ --help ]\n\n", "");
|
|
}
|
|
if (on_list(cmd, cmds_sign)) {
|
|
printf("%1s[ sign ] ( -certs | -spc <certfile> -key <keyfile> | -pkcs12 <pkcs12file> |\n", "");
|
|
printf("%12s [ -pkcs11engine <engine> ] -pkcs11module <module> -pkcs11cert <pkcs11 cert id> |\n", "");
|
|
printf("%12s -certs <certfile> -key <pkcs11 key id>)\n", "");
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
printf("%12s[ -nolegacy ]\n", "");
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
printf("%12s[ -pass <password>", "");
|
|
#ifdef PROVIDE_ASKPASS
|
|
printf("%1s [ -askpass ]", "");
|
|
#endif /* PROVIDE_ASKPASS */
|
|
printf("%1s[ -readpass <file> ]\n", "");
|
|
printf("%12s[ -ac <crosscertfile> ]\n", "");
|
|
printf("%12s[ -h {md5,sha1,sha2(56),sha384,sha512} ]\n", "");
|
|
printf("%12s[ -n <desc> ] [ -i <url> ] [ -jp <level> ] [ -comm ]\n", "");
|
|
printf("%12s[ -ph ]\n", "");
|
|
#ifdef ENABLE_CURL
|
|
printf("%12s[ -t <timestampurl> [ -t ... ] [ -p <proxy> ] [ -noverifypeer ]\n", "");
|
|
printf("%12s[ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n", "");
|
|
#endif /* ENABLE_CURL */
|
|
printf("%12s[ -time <unix-time> ]\n", "");
|
|
printf("%12s[ -addUnauthenticatedBlob ]\n", "");
|
|
printf("%12s[ -nest ]\n", "");
|
|
printf("%12s[ -verbose ]\n", "");
|
|
printf("%12s[ -add-msi-dse ]\n", "");
|
|
printf("%12s[ -in ] <infile> [-out ] <outfile>\n\n", "");
|
|
}
|
|
if (on_list(cmd, cmds_add)) {
|
|
printf("%1sadd [-addUnauthenticatedBlob]\n", "");
|
|
#ifdef ENABLE_CURL
|
|
printf("%12s[ -t <timestampurl> [ -t ... ] [ -p <proxy> ] [ -noverifypeer ]\n", "");
|
|
printf("%12s[ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]\n", "");
|
|
#endif /* ENABLE_CURL */
|
|
printf("%12s[ -h {md5,sha1,sha2(56),sha384,sha512} ]\n", "");
|
|
printf("%12s[ -verbose ]\n", "");
|
|
printf("%12s[ -add-msi-dse ]\n", "");
|
|
printf("%12s[ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
|
}
|
|
if (on_list(cmd, cmds_attach)) {
|
|
printf("%1sattach-signature [ -sigin ] <sigfile>\n", "");
|
|
printf("%12s[ -CAfile <infile> ]\n", "");
|
|
printf("%12s[ -CRLfile <infile> ]\n", "");
|
|
printf("%12s[ -TSA-CAfile <infile> ]\n", "");
|
|
printf("%12s[ -TSA-CRLfile <infile> ]\n", "");
|
|
printf("%12s[ -time <unix-time> ]\n", "");
|
|
printf("%12s[ -h {md5,sha1,sha2(56),sha384,sha512} ]\n", "");
|
|
printf("%12s[ -require-leaf-hash {md5,sha1,sha2(56),sha384,sha512}:XXXXXXXXXXXX... ]\n", "");
|
|
printf("%12s[ -nest ]\n", "");
|
|
printf("%12s[ -add-msi-dse ]\n", "");
|
|
printf("%12s[ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
|
}
|
|
if (on_list(cmd, cmds_extract)) {
|
|
printf("%1sextract-signature [ -pem ]\n", "");
|
|
printf("%12s[ -in ] <infile> [ -out ] <sigfile>\n\n", "");
|
|
}
|
|
if (on_list(cmd, cmds_remove))
|
|
printf("%1sremove-signature [ -in ] <infile> [ -out ] <outfile>\n\n", "");
|
|
if (on_list(cmd, cmds_verify)) {
|
|
printf("%1sverify [ -in ] <infile>\n", "");
|
|
printf("%12s[ -c | -catalog <infile> ]\n", "");
|
|
printf("%12s[ -CAfile <infile> ]\n", "");
|
|
printf("%12s[ -CRLfile <infile> ]\n", "");
|
|
printf("%12s[ -TSA-CAfile <infile> ]\n", "");
|
|
printf("%12s[ -TSA-CRLfile <infile> ]\n", "");
|
|
printf("%12s[ -ignore-timestamp ]\n", "");
|
|
printf("%12s[ -time <unix-time> ]\n", "");
|
|
printf("%12s[ -require-leaf-hash {md5,sha1,sha2(56),sha384,sha512}:XXXXXXXXXXXX... ]\n", "");
|
|
printf("%12s[ -verbose ]\n\n", "");
|
|
}
|
|
}
|
|
|
|
static void help_for(const char *argv0, const char *cmd)
|
|
{
|
|
const char *cmds_all[] = {"all", NULL};
|
|
const char *cmds_add[] = {"add", NULL};
|
|
const char *cmds_attach[] = {"attach-signature", NULL};
|
|
const char *cmds_extract[] = {"extract-signature", NULL};
|
|
const char *cmds_remove[] = {"remove-signature", NULL};
|
|
const char *cmds_sign[] = {"sign", NULL};
|
|
const char *cmds_verify[] = {"verify", NULL};
|
|
const char *cmds_ac[] = {"sign", NULL};
|
|
const char *cmds_add_msi_dse[] = {"add", "attach-signature", "sign", NULL};
|
|
const char *cmds_addUnauthenticatedBlob[] = {"sign", "add", NULL};
|
|
#ifdef PROVIDE_ASKPASS
|
|
const char *cmds_askpass[] = {"sign", NULL};
|
|
#endif /* PROVIDE_ASKPASS */
|
|
const char *cmds_CAfile[] = {"attach-signature", "verify", NULL};
|
|
const char *cmds_catalog[] = {"verify", NULL};
|
|
const char *cmds_certs[] = {"sign", NULL};
|
|
const char *cmds_comm[] = {"sign", NULL};
|
|
const char *cmds_CRLfile[] = {"attach-signature", "verify", NULL};
|
|
const char *cmds_CRLfileTSA[] = {"attach-signature", "verify", NULL};
|
|
const char *cmds_h[] = {"add", "attach-signature", "sign", NULL};
|
|
const char *cmds_i[] = {"sign", NULL};
|
|
const char *cmds_in[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", "verify", NULL};
|
|
const char *cmds_jp[] = {"sign", NULL};
|
|
const char *cmds_key[] = {"sign", NULL};
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
const char *cmds_nolegacy[] = {"sign", NULL};
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
const char *cmds_n[] = {"sign", NULL};
|
|
const char *cmds_nest[] = {"attach-signature", "sign", NULL};
|
|
#ifdef ENABLE_CURL
|
|
const char *cmds_noverifypeer[] = {"add", "sign", NULL};
|
|
#endif /* ENABLE_CURL */
|
|
const char *cmds_out[] = {"add", "attach-signature", "extract-signature", "remove-signature", "sign", NULL};
|
|
#ifdef ENABLE_CURL
|
|
const char *cmds_p[] = {"add", "sign", NULL};
|
|
#endif /* ENABLE_CURL */
|
|
const char *cmds_pass[] = {"sign", NULL};
|
|
const char *cmds_pem[] = {"extract-signature", NULL};
|
|
const char *cmds_ph[] = {"sign", NULL};
|
|
const char *cmds_pkcs11cert[] = {"sign", NULL};
|
|
const char *cmds_pkcs11engine[] = {"sign", NULL};
|
|
const char *cmds_pkcs11module[] = {"sign", NULL};
|
|
const char *cmds_pkcs12[] = {"sign", NULL};
|
|
const char *cmds_readpass[] = {"sign", NULL};
|
|
const char *cmds_require_leaf_hash[] = {"attach-signature", "verify", NULL};
|
|
const char *cmds_sigin[] = {"attach-signature", NULL};
|
|
const char *cmds_time[] = {"attach-signature", "sign", "verify", NULL};
|
|
const char *cmds_ignore_timestamp[] = {"verify", NULL};
|
|
#ifdef ENABLE_CURL
|
|
const char *cmds_t[] = {"add", "sign", NULL};
|
|
const char *cmds_ts[] = {"add", "sign", NULL};
|
|
#endif /* ENABLE_CURL */
|
|
const char *cmds_CAfileTSA[] = {"attach-signature", "verify", NULL};
|
|
const char *cmds_verbose[] = {"add", "sign", "verify", NULL};
|
|
|
|
if (on_list(cmd, cmds_all)) {
|
|
printf("osslsigncode is a small tool that implements part of the functionality of the Microsoft\n");
|
|
printf("tool signtool.exe - more exactly the Authenticode signing and timestamping.\n");
|
|
printf("It can sign and timestamp PE (EXE/SYS/DLL/etc), CAB and MSI files,\n");
|
|
printf("supports getting the timestamp through a proxy as well.\n");
|
|
printf("osslsigncode also supports signature verification, removal and extraction.\n\n");
|
|
printf("%-22s = print osslsigncode version and usage\n", "--version | -v");
|
|
printf("%-22s = print osslsigncode help menu\n\n", "--help");
|
|
printf("Commands:\n");
|
|
printf("%-22s = add an unauthenticated blob or a timestamp to a previously-signed file\n", "add");
|
|
printf("%-22s = sign file using a given signature\n", "attach-signature");
|
|
printf("%-22s = extract signature from a previously-signed file\n", "extract-signature");
|
|
printf("%-22s = remove sections of the embedded signature on a file\n", "remove-signature");
|
|
printf("%-22s = digitally sign a file\n", "sign");
|
|
printf("%-22s = verifies the digital signature of a file\n\n", "verify");
|
|
printf("For help on a specific command, enter %s <command> --help\n", argv0);
|
|
}
|
|
if (on_list(cmd, cmds_add)) {
|
|
printf("\nUse the \"add\" command to add an unauthenticated blob or a timestamp to a previously-signed file.\n\n");
|
|
printf("Options:\n");
|
|
}
|
|
if (on_list(cmd, cmds_attach)) {
|
|
printf("\nUse the \"attach-signature\" command to attach the signature stored in the \"sigin\" file.\n");
|
|
printf("In order to verify this signature you should specify how to find needed CA or TSA\n");
|
|
printf("certificates, if appropriate.\n\n");
|
|
printf("Options:\n");
|
|
}
|
|
if (on_list(cmd, cmds_extract)) {
|
|
printf("\nUse the \"extract-signature\" command to extract the embedded signature from a previously-signed file.\n");
|
|
printf("DER is the default format of the output file, but can be changed to PEM.\n\n");
|
|
printf("Options:\n");
|
|
}
|
|
if (on_list(cmd, cmds_remove)) {
|
|
printf("\nUse the \"remove-signature\" command to remove sections of the embedded signature on a file.\n\n");
|
|
printf("Options:\n");
|
|
}
|
|
if (on_list(cmd, cmds_sign)) {
|
|
printf("\nUse the \"sign\" command to sign files using embedded signatures.\n");
|
|
printf("Signing protects a file from tampering, and allows users to verify the signer\n");
|
|
printf("based on a signing certificate. The options below allow you to specify signing\n");
|
|
printf("parameters and to select the signing certificate you wish to use.\n\n");
|
|
printf("Options:\n");
|
|
}
|
|
if (on_list(cmd, cmds_verify)) {
|
|
printf("\nUse the \"verify\" command to verify embedded signatures.\n");
|
|
printf("Verification determines if the signing certificate was issued by a trusted party,\n");
|
|
printf("whether that certificate has been revoked, and whether the certificate is valid\n");
|
|
printf("under a specific policy. Options allow you to specify requirements that must be met\n");
|
|
printf("and to specify how to find needed CA or TSA certificates, if appropriate.\n\n");
|
|
printf("Options:\n");
|
|
}
|
|
if (on_list(cmd, cmds_ac))
|
|
printf("%-24s= additional certificates to be added to the signature block\n", "-ac");
|
|
if (on_list(cmd, cmds_add_msi_dse))
|
|
printf("%-24s= sign a MSI file with the add-msi-dse option\n", "-add-msi-dse");
|
|
if (on_list(cmd, cmds_addUnauthenticatedBlob))
|
|
printf("%-24s= add an unauthenticated blob to the PE/MSI file\n", "-addUnauthenticatedBlob");
|
|
#ifdef PROVIDE_ASKPASS
|
|
if (on_list(cmd, cmds_askpass))
|
|
printf("%-24s= ask for the private key password\n", "-askpass");
|
|
#endif /* PROVIDE_ASKPASS */
|
|
if (on_list(cmd, cmds_catalog))
|
|
printf("%-24s= specifies the catalog file by name\n", "-c, -catalog");
|
|
if (on_list(cmd, cmds_CAfile))
|
|
printf("%-24s= the file containing one or more trusted certificates in PEM format\n", "-CAfile");
|
|
if (on_list(cmd, cmds_certs))
|
|
printf("%-24s= the signing certificate to use\n", "-certs, -spc");
|
|
if (on_list(cmd, cmds_comm))
|
|
printf("%-24s= set commercial purpose (default: individual purpose)\n", "-comm");
|
|
if (on_list(cmd, cmds_CRLfile))
|
|
printf("%-24s= the file containing one or more CRLs in PEM format\n", "-CRLfile");
|
|
if (on_list(cmd, cmds_h)) {
|
|
printf("%-24s= {md5|sha1|sha2(56)|sha384|sha512}\n", "-h");
|
|
printf("%26sset of cryptographic hash functions\n", "");
|
|
}
|
|
if (on_list(cmd, cmds_i))
|
|
printf("%-24s= specifies a URL for expanded description of the signed content\n", "-i");
|
|
if (on_list(cmd, cmds_in))
|
|
printf("%-24s= input file\n", "-in");
|
|
if (on_list(cmd, cmds_jp)) {
|
|
printf("%-24s= low | medium | high\n", "-jp");
|
|
printf("%26slevels of permissions in Microsoft Internet Explorer 4.x for CAB files\n", "");
|
|
printf("%26sonly \"low\" level is now supported\n", "");
|
|
}
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
if (on_list(cmd, cmds_nolegacy))
|
|
printf("%-24s= disable legacy mode and don't automatically load the legacy provider\n", "-nolegacy");
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
if (on_list(cmd, cmds_key))
|
|
printf("%-24s= the private key to use or PKCS#11 URI identifies a key in the token\n", "-key");
|
|
if (on_list(cmd, cmds_n))
|
|
printf("%-24s= specifies a description of the signed content\n", "-n");
|
|
if (on_list(cmd, cmds_nest))
|
|
printf("%-24s= add the new nested signature instead of replacing the first one\n", "-nest");
|
|
#ifdef ENABLE_CURL
|
|
if (on_list(cmd, cmds_noverifypeer))
|
|
printf("%-24s= do not verify the Time-Stamp Authority's SSL certificate\n", "-noverifypeer");
|
|
#endif /* ENABLE_CURL */
|
|
if (on_list(cmd, cmds_out))
|
|
printf("%-24s= output file\n", "-out");
|
|
#ifdef ENABLE_CURL
|
|
if (on_list(cmd, cmds_p))
|
|
printf("%-24s= proxy to connect to the desired Time-Stamp Authority server\n", "-p");
|
|
#endif /* ENABLE_CURL */
|
|
if (on_list(cmd, cmds_pass))
|
|
printf("%-24s= the private key password\n", "-pass");
|
|
if (on_list(cmd, cmds_pem))
|
|
printf("%-24s= output data format PEM to use (default: DER)\n", "-pem");
|
|
if (on_list(cmd, cmds_ph))
|
|
printf("%-24s= generate page hashes for executable files\n", "-ph");
|
|
if (on_list(cmd, cmds_pkcs11cert))
|
|
printf("%-24s= PKCS#11 URI identifies a certificate in the token\n", "-pkcs11cert");
|
|
if (on_list(cmd, cmds_pkcs11engine))
|
|
printf("%-24s= PKCS#11 engine\n", "-pkcs11engine");
|
|
if (on_list(cmd, cmds_pkcs11module))
|
|
printf("%-24s= PKCS#11 module\n", "-pkcs11module");
|
|
if (on_list(cmd, cmds_pkcs12))
|
|
printf("%-24s= PKCS#12 container with the certificate and the private key\n", "-pkcs12");
|
|
if (on_list(cmd, cmds_readpass))
|
|
printf("%-24s= the private key password source\n", "-readpass");
|
|
if (on_list(cmd, cmds_require_leaf_hash)) {
|
|
printf("%-24s= {md5|sha1|sha2(56)|sha384|sha512}:XXXXXXXXXXXX...\n", "-require-leaf-hash");
|
|
printf("%26sspecifies an optional hash algorithm to use when computing\n", "");
|
|
printf("%26sthe leaf certificate (in DER form) hash and compares\n", "");
|
|
printf("%26sthe provided hash against the computed hash\n", "");
|
|
}
|
|
if (on_list(cmd, cmds_sigin))
|
|
printf("%-24s= a file containing the signature to be attached\n", "-sigin");
|
|
if (on_list(cmd, cmds_ignore_timestamp))
|
|
printf("%-24s= disable verification of the Timestamp Server signature\n", "-ignore-timestamp");
|
|
#ifdef ENABLE_CURL
|
|
if (on_list(cmd, cmds_t)) {
|
|
printf("%-24s= specifies that the digital signature will be timestamped\n", "-t");
|
|
printf("%26sby the Time-Stamp Authority (TSA) indicated by the URL\n", "");
|
|
printf("%26sthis option cannot be used with the -ts option\n", "");
|
|
}
|
|
if (on_list(cmd, cmds_ts)) {
|
|
printf("%-24s= specifies the URL of the RFC 3161 Time-Stamp Authority server\n", "-ts");
|
|
printf("%26sthis option cannot be used with the -t option\n", "");
|
|
}
|
|
#endif /* ENABLE_CURL */
|
|
if (on_list(cmd, cmds_time))
|
|
printf("%-24s= the unix-time to set the signing and/or verifying time\n", "-time");
|
|
if (on_list(cmd, cmds_CAfileTSA))
|
|
printf("%-24s= the file containing one or more Time-Stamp Authority certificates in PEM format\n", "-TSA-CAfile");
|
|
if (on_list(cmd, cmds_CRLfileTSA))
|
|
printf("%-24s= the file containing one or more Time-Stamp Authority CRLs in PEM format\n", "-TSA-CRLfile");
|
|
if (on_list(cmd, cmds_verbose))
|
|
printf("%-24s= include additional output in the log\n", "-verbose");
|
|
usage(argv0, cmd);
|
|
}
|
|
|
|
#define DO_EXIT_0(x) { printf(x); goto err_cleanup; }
|
|
#define DO_EXIT_1(x, y) { printf(x, y); goto err_cleanup; }
|
|
#define DO_EXIT_2(x, y, z) { printf(x, y, z); goto err_cleanup; }
|
|
|
|
typedef enum {
|
|
FILE_TYPE_CAB,
|
|
FILE_TYPE_PE,
|
|
FILE_TYPE_MSI,
|
|
FILE_TYPE_CAT,
|
|
FILE_TYPE_ANY
|
|
} file_type_t;
|
|
|
|
typedef enum {
|
|
CMD_SIGN,
|
|
CMD_EXTRACT,
|
|
CMD_REMOVE,
|
|
CMD_VERIFY,
|
|
CMD_ADD,
|
|
CMD_ATTACH,
|
|
CMD_HELP,
|
|
CMD_DEFAULT
|
|
} cmd_type_t;
|
|
|
|
|
|
static SpcLink *get_obsolete_link(void)
|
|
{
|
|
const u_char obsolete[] = {
|
|
0x00, 0x3c, 0x00, 0x3c, 0x00, 0x3c, 0x00, 0x4f,
|
|
0x00, 0x62, 0x00, 0x73, 0x00, 0x6f, 0x00, 0x6c,
|
|
0x00, 0x65, 0x00, 0x74, 0x00, 0x65, 0x00, 0x3e,
|
|
0x00, 0x3e, 0x00, 0x3e
|
|
};
|
|
SpcLink *link = SpcLink_new();
|
|
link->type = 2;
|
|
link->value.file = SpcString_new();
|
|
link->value.file->type = 0;
|
|
link->value.file->value.unicode = ASN1_BMPSTRING_new();
|
|
ASN1_STRING_set(link->value.file->value.unicode, obsolete, sizeof obsolete);
|
|
return link;
|
|
}
|
|
|
|
static u_char *pe_calc_page_hash(char *indata, uint32_t header_size,
|
|
uint32_t pe32plus, uint32_t sigpos, int phtype, int *rphlen)
|
|
{
|
|
uint16_t nsections, opthdr_size;
|
|
uint32_t alignment, pagesize, hdrsize;
|
|
uint32_t rs, ro, l, lastpos = 0;
|
|
int pphlen, phlen, i, pi = 1;
|
|
size_t written;
|
|
u_char *res, *zeroes;
|
|
char *sections;
|
|
const EVP_MD *md = EVP_get_digestbynid(phtype);
|
|
BIO *bhash;
|
|
|
|
/* NumberOfSections indicates the size of the section table,
|
|
* which immediately follows the headers, can be up to 65535 under Vista and later */
|
|
nsections = GET_UINT16_LE(indata + header_size + 6);
|
|
if (nsections == 0 || nsections > UINT16_MAX) {
|
|
printf("Corrupted number of sections: 0x%08X\n", nsections);
|
|
return NULL; /* FAILED */
|
|
}
|
|
/* FileAlignment is the alignment factor (in bytes) that is used to align
|
|
* the raw data of sections in the image file. The value should be a power
|
|
* of 2 between 512 and 64 K, inclusive. The default is 512. */
|
|
alignment = GET_UINT32_LE(indata + header_size + 60);
|
|
if (alignment < 512 || alignment > UINT16_MAX) {
|
|
printf("Corrupted file alignment factor: 0x%08X\n", alignment);
|
|
return NULL; /* FAILED */
|
|
}
|
|
/* SectionAlignment is the alignment (in bytes) of sections when they are
|
|
* loaded into memory. It must be greater than or equal to FileAlignment.
|
|
* The default is the page size for the architecture.
|
|
* The large page size is at most 4 MB.
|
|
* https://devblogs.microsoft.com/oldnewthing/20210510-00/?p=105200 */
|
|
pagesize = GET_UINT32_LE(indata + header_size + 56);
|
|
if (pagesize == 0 || pagesize < alignment || pagesize > 4194304) {
|
|
printf("Corrupted page size: 0x%08X\n", pagesize);
|
|
return NULL; /* FAILED */
|
|
}
|
|
/* SizeOfHeaders is the combined size of an MS-DOS stub, PE header,
|
|
* and section headers rounded up to a multiple of FileAlignment. */
|
|
hdrsize = GET_UINT32_LE(indata + header_size + 84);
|
|
if (hdrsize < header_size || hdrsize > UINT32_MAX) {
|
|
printf("Corrupted headers size: 0x%08X\n", hdrsize);
|
|
return NULL; /* FAILED */
|
|
}
|
|
/* SizeOfOptionalHeader is the size of the optional header, which is
|
|
* required for executable files, but for object files should be zero,
|
|
* and can't be bigger than the file */
|
|
opthdr_size = GET_UINT16_LE(indata + header_size + 20);
|
|
if (opthdr_size == 0 || opthdr_size > sigpos) {
|
|
printf("Corrupted optional header size: 0x%08X\n", opthdr_size);
|
|
return NULL; /* FAILED */
|
|
}
|
|
pphlen = 4 + EVP_MD_size(md);
|
|
phlen = pphlen * (3 + (int)nsections + (int)(sigpos / pagesize));
|
|
|
|
bhash = BIO_new(BIO_f_md());
|
|
if (!BIO_set_md(bhash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(bhash);
|
|
return NULL; /* FAILED */
|
|
}
|
|
BIO_push(bhash, BIO_new(BIO_s_null()));
|
|
if (!BIO_write_ex(bhash, indata, header_size + 88, &written)
|
|
|| written != header_size + 88) {
|
|
BIO_free_all(bhash);
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!BIO_write_ex(bhash, indata + header_size + 92, 60 + pe32plus*16, &written)
|
|
|| written != 60 + pe32plus*16) {
|
|
BIO_free_all(bhash);
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!BIO_write_ex(bhash, indata + header_size + 160 + pe32plus*16,
|
|
hdrsize - (header_size + 160 + pe32plus*16), &written)
|
|
|| written != hdrsize - (header_size + 160 + pe32plus*16)) {
|
|
BIO_free_all(bhash);
|
|
return NULL; /* FAILED */
|
|
}
|
|
zeroes = OPENSSL_zalloc((size_t)pagesize);
|
|
if (!BIO_write_ex(bhash, zeroes, pagesize - hdrsize, &written)
|
|
|| written != pagesize - hdrsize) {
|
|
BIO_free_all(bhash);
|
|
OPENSSL_free(zeroes);
|
|
return NULL; /* FAILED */
|
|
}
|
|
res = OPENSSL_malloc((size_t)phlen);
|
|
memset(res, 0, 4);
|
|
BIO_gets(bhash, (char*)res + 4, EVP_MD_size(md));
|
|
BIO_free_all(bhash);
|
|
|
|
sections = indata + header_size + 24 + opthdr_size;
|
|
for (i=0; i<nsections; i++) {
|
|
/* Resource Table address and size */
|
|
rs = GET_UINT32_LE(sections + 16);
|
|
ro = GET_UINT32_LE(sections + 20);
|
|
if (rs == 0 || rs >= UINT32_MAX) {
|
|
continue;
|
|
}
|
|
for (l=0; l < rs; l+=pagesize, pi++) {
|
|
PUT_UINT32_LE(ro + l, res + pi*pphlen);
|
|
bhash = BIO_new(BIO_f_md());
|
|
if (!BIO_set_md(bhash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(bhash);
|
|
OPENSSL_free(zeroes);
|
|
OPENSSL_free(res);
|
|
return NULL; /* FAILED */
|
|
}
|
|
BIO_push(bhash, BIO_new(BIO_s_null()));
|
|
if (rs - l < pagesize) {
|
|
if (!BIO_write_ex(bhash, indata + ro + l, rs - l, &written)
|
|
|| written != rs - l) {
|
|
BIO_free_all(bhash);
|
|
OPENSSL_free(zeroes);
|
|
OPENSSL_free(res);
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!BIO_write_ex(bhash, zeroes, pagesize - (rs - l), &written)
|
|
|| written != pagesize - (rs - l)) {
|
|
BIO_free_all(bhash);
|
|
OPENSSL_free(zeroes);
|
|
OPENSSL_free(res);
|
|
return NULL; /* FAILED */
|
|
}
|
|
} else {
|
|
if (!BIO_write_ex(bhash, indata + ro + l, pagesize, &written)
|
|
|| written != pagesize) {
|
|
BIO_free_all(bhash);
|
|
OPENSSL_free(zeroes);
|
|
OPENSSL_free(res);
|
|
return NULL; /* FAILED */
|
|
}
|
|
}
|
|
BIO_gets(bhash, (char*)res + pi*pphlen + 4, EVP_MD_size(md));
|
|
BIO_free_all(bhash);
|
|
}
|
|
lastpos = ro + rs;
|
|
sections += 40;
|
|
}
|
|
PUT_UINT32_LE(lastpos, res + pi*pphlen);
|
|
memset(res + pi*pphlen + 4, 0, (size_t)EVP_MD_size(md));
|
|
pi++;
|
|
OPENSSL_free(zeroes);
|
|
*rphlen = pi*pphlen;
|
|
return res;
|
|
}
|
|
|
|
static SpcLink *get_page_hash_link(int phtype, char *indata, FILE_HEADER *header)
|
|
{
|
|
u_char *ph, *p, *tmp;
|
|
int l, phlen;
|
|
ASN1_TYPE *tostr;
|
|
SpcAttributeTypeAndOptionalValue *aval;
|
|
ASN1_TYPE *taval;
|
|
SpcSerializedObject *so;
|
|
SpcLink *link;
|
|
STACK_OF(ASN1_TYPE) *oset, *aset;
|
|
|
|
ph = pe_calc_page_hash(indata, header->header_size, header->pe32plus,
|
|
header->fileend, phtype, &phlen);
|
|
if (!ph) {
|
|
printf("Failed to calculate page hash\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
print_hash("Calculated page hash ", "...", ph, (phlen < 32) ? phlen : 32);
|
|
|
|
tostr = ASN1_TYPE_new();
|
|
tostr->type = V_ASN1_OCTET_STRING;
|
|
tostr->value.octet_string = ASN1_OCTET_STRING_new();
|
|
ASN1_OCTET_STRING_set(tostr->value.octet_string, ph, phlen);
|
|
OPENSSL_free(ph);
|
|
|
|
oset = sk_ASN1_TYPE_new_null();
|
|
sk_ASN1_TYPE_push(oset, tostr);
|
|
l = i2d_ASN1_SET_ANY(oset, NULL);
|
|
tmp = p = OPENSSL_malloc((size_t)l);
|
|
i2d_ASN1_SET_ANY(oset, &tmp);
|
|
ASN1_TYPE_free(tostr);
|
|
sk_ASN1_TYPE_free(oset);
|
|
|
|
aval = SpcAttributeTypeAndOptionalValue_new();
|
|
aval->type = OBJ_txt2obj((phtype == NID_sha1) ? \
|
|
SPC_PE_IMAGE_PAGE_HASHES_V1 : SPC_PE_IMAGE_PAGE_HASHES_V2, 1);
|
|
aval->value = ASN1_TYPE_new();
|
|
aval->value->type = V_ASN1_SET;
|
|
aval->value->value.set = ASN1_STRING_new();
|
|
ASN1_STRING_set(aval->value->value.set, p, l);
|
|
OPENSSL_free(p);
|
|
l = i2d_SpcAttributeTypeAndOptionalValue(aval, NULL);
|
|
tmp = p = OPENSSL_malloc((size_t)l);
|
|
i2d_SpcAttributeTypeAndOptionalValue(aval, &tmp);
|
|
SpcAttributeTypeAndOptionalValue_free(aval);
|
|
|
|
taval = ASN1_TYPE_new();
|
|
taval->type = V_ASN1_SEQUENCE;
|
|
taval->value.sequence = ASN1_STRING_new();
|
|
ASN1_STRING_set(taval->value.sequence, p, l);
|
|
OPENSSL_free(p);
|
|
|
|
aset = sk_ASN1_TYPE_new_null();
|
|
sk_ASN1_TYPE_push(aset, taval);
|
|
l = i2d_ASN1_SET_ANY(aset, NULL);
|
|
tmp = p = OPENSSL_malloc((size_t)l);
|
|
l = i2d_ASN1_SET_ANY(aset, &tmp);
|
|
ASN1_TYPE_free(taval);
|
|
sk_ASN1_TYPE_free(aset);
|
|
|
|
so = SpcSerializedObject_new();
|
|
ASN1_OCTET_STRING_set(so->classId, classid_page_hash, sizeof classid_page_hash);
|
|
ASN1_OCTET_STRING_set(so->serializedData, p, l);
|
|
OPENSSL_free(p);
|
|
|
|
link = SpcLink_new();
|
|
link->type = 1;
|
|
link->value.moniker = so;
|
|
return link;
|
|
}
|
|
|
|
static int get_indirect_data_blob(u_char **blob, int *len, GLOBAL_OPTIONS *options,
|
|
FILE_HEADER *header, file_type_t type, char *indata)
|
|
{
|
|
u_char *p;
|
|
int hashlen, l, phtype;
|
|
void *hash;
|
|
ASN1_OBJECT *dtype;
|
|
SpcIndirectDataContent *idc;
|
|
const u_char msistr[] = {
|
|
0xf1, 0x10, 0x0c, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x46
|
|
};
|
|
|
|
idc = SpcIndirectDataContent_new();
|
|
idc->data->value = ASN1_TYPE_new();
|
|
idc->data->value->type = V_ASN1_SEQUENCE;
|
|
idc->data->value->value.sequence = ASN1_STRING_new();
|
|
if (type == FILE_TYPE_CAB) {
|
|
SpcLink *link = get_obsolete_link();
|
|
l = i2d_SpcLink(link, NULL);
|
|
p = OPENSSL_malloc((size_t)l);
|
|
i2d_SpcLink(link, &p);
|
|
p -= l;
|
|
dtype = OBJ_txt2obj(SPC_CAB_DATA_OBJID, 1);
|
|
SpcLink_free(link);
|
|
} else if (type == FILE_TYPE_PE) {
|
|
SpcPeImageData *pid = SpcPeImageData_new();
|
|
ASN1_BIT_STRING_set_bit(pid->flags, 0, 1);
|
|
if (options->pagehash) {
|
|
SpcLink *link;
|
|
phtype = NID_sha1;
|
|
if (EVP_MD_size(options->md) > EVP_MD_size(EVP_sha1()))
|
|
phtype = NID_sha256;
|
|
link = get_page_hash_link(phtype, indata, header);
|
|
if (!link)
|
|
return 0; /* FAILED */
|
|
pid->file = link;
|
|
} else {
|
|
pid->file = get_obsolete_link();
|
|
}
|
|
l = i2d_SpcPeImageData(pid, NULL);
|
|
p = OPENSSL_malloc((size_t)l);
|
|
i2d_SpcPeImageData(pid, &p);
|
|
p -= l;
|
|
dtype = OBJ_txt2obj(SPC_PE_IMAGE_DATA_OBJID, 1);
|
|
SpcPeImageData_free(pid);
|
|
} else if (type == FILE_TYPE_MSI) {
|
|
SpcSipInfo *si = SpcSipInfo_new();
|
|
ASN1_INTEGER_set(si->a, 1);
|
|
ASN1_INTEGER_set(si->b, 0);
|
|
ASN1_INTEGER_set(si->c, 0);
|
|
ASN1_INTEGER_set(si->d, 0);
|
|
ASN1_INTEGER_set(si->e, 0);
|
|
ASN1_INTEGER_set(si->f, 0);
|
|
ASN1_OCTET_STRING_set(si->string, msistr, sizeof msistr);
|
|
l = i2d_SpcSipInfo(si, NULL);
|
|
p = OPENSSL_malloc((size_t)l);
|
|
i2d_SpcSipInfo(si, &p);
|
|
p -= l;
|
|
dtype = OBJ_txt2obj(SPC_SIPINFO_OBJID, 1);
|
|
SpcSipInfo_free(si);
|
|
} else {
|
|
printf("Unexpected file type: %d\n", type);
|
|
return 0; /* FAILED */
|
|
}
|
|
|
|
idc->data->type = dtype;
|
|
idc->data->value->value.sequence->data = p;
|
|
idc->data->value->value.sequence->length = l;
|
|
idc->messageDigest->digestAlgorithm->algorithm = OBJ_nid2obj(EVP_MD_nid(options->md));
|
|
idc->messageDigest->digestAlgorithm->parameters = ASN1_TYPE_new();
|
|
idc->messageDigest->digestAlgorithm->parameters->type = V_ASN1_NULL;
|
|
|
|
hashlen = EVP_MD_size(options->md);
|
|
hash = OPENSSL_malloc((size_t)hashlen);
|
|
memset(hash, 0, (size_t)hashlen);
|
|
ASN1_OCTET_STRING_set(idc->messageDigest->digest, hash, hashlen);
|
|
OPENSSL_free(hash);
|
|
|
|
*len = i2d_SpcIndirectDataContent(idc, NULL);
|
|
*blob = OPENSSL_malloc((size_t)*len);
|
|
p = *blob;
|
|
i2d_SpcIndirectDataContent(idc, &p);
|
|
SpcIndirectDataContent_free(idc);
|
|
*len -= EVP_MD_size(options->md);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int set_signing_blob(PKCS7 *sig, BIO *hash, u_char *buf, int len)
|
|
{
|
|
u_char mdbuf[EVP_MAX_MD_SIZE];
|
|
int mdlen, seqhdrlen;
|
|
BIO *sigbio;
|
|
PKCS7 *td7;
|
|
|
|
mdlen = BIO_gets(hash, (char*)mdbuf, EVP_MAX_MD_SIZE);
|
|
memcpy(buf+len, mdbuf, (size_t)mdlen);
|
|
seqhdrlen = asn1_simple_hdr_len(buf, len);
|
|
|
|
if ((sigbio = PKCS7_dataInit(sig, NULL)) == NULL) {
|
|
printf("PKCS7_dataInit failed\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_write(sigbio, buf+seqhdrlen, len-seqhdrlen+mdlen);
|
|
(void)BIO_flush(sigbio);
|
|
|
|
if (!PKCS7_dataFinal(sig, sigbio)) {
|
|
printf("PKCS7_dataFinal failed\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_free_all(sigbio);
|
|
/*
|
|
replace the data part with the MS Authenticode
|
|
spcIndirectDataContext blob
|
|
*/
|
|
td7 = PKCS7_new();
|
|
td7->type = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1);
|
|
td7->d.other = ASN1_TYPE_new();
|
|
td7->d.other->type = V_ASN1_SEQUENCE;
|
|
td7->d.other->value.sequence = ASN1_STRING_new();
|
|
ASN1_STRING_set(td7->d.other->value.sequence, buf, len+mdlen);
|
|
if (!PKCS7_set_content(sig, td7)) {
|
|
PKCS7_free(td7);
|
|
printf("PKCS7_set_content failed\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int set_content_blob(PKCS7 *sig, PKCS7 *cursig)
|
|
{
|
|
PKCS7 *contents;
|
|
u_char *content;
|
|
int seqhdrlen, content_length;
|
|
BIO *sigbio;
|
|
|
|
contents = cursig->d.sign->contents;
|
|
seqhdrlen = asn1_simple_hdr_len(contents->d.other->value.sequence->data,
|
|
contents->d.other->value.sequence->length);
|
|
content = contents->d.other->value.sequence->data + seqhdrlen;
|
|
content_length = contents->d.other->value.sequence->length - seqhdrlen;
|
|
|
|
if ((sigbio = PKCS7_dataInit(sig, NULL)) == NULL) {
|
|
printf("PKCS7_dataInit failed\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_write(sigbio, content, content_length);
|
|
(void)BIO_flush(sigbio);
|
|
if (!PKCS7_dataFinal(sig, sigbio)) {
|
|
printf("PKCS7_dataFinal failed\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_free_all(sigbio);
|
|
if (!PKCS7_set_content(sig, PKCS7_dup(contents))) {
|
|
printf("PKCS7_set_content failed\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int set_indirect_data_blob(PKCS7 *sig, BIO *hash, file_type_t type,
|
|
char *indata, GLOBAL_OPTIONS *options, FILE_HEADER *header)
|
|
{
|
|
u_char *p = NULL;
|
|
int len = 0;
|
|
u_char *buf;
|
|
|
|
if (!get_indirect_data_blob(&p, &len, options, header, type, indata))
|
|
return 0; /* FAILED */
|
|
buf = OPENSSL_malloc(SIZE_64K);
|
|
memcpy(buf, p, (size_t)len);
|
|
OPENSSL_free(p);
|
|
if (!set_signing_blob(sig, hash, buf, len)) {
|
|
OPENSSL_free(buf);
|
|
return 0; /* FAILED */
|
|
}
|
|
OPENSSL_free(buf);
|
|
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* A signed PE file is padded (with 0's) to 8 byte boundary.
|
|
* Ignore any last odd byte in an unsigned file.
|
|
*/
|
|
static uint32_t pe_calc_checksum(BIO *bio, FILE_HEADER *header)
|
|
{
|
|
uint32_t checkSum = 0, offset = 0;
|
|
int nread;
|
|
unsigned short *buf = OPENSSL_malloc(SIZE_64K);
|
|
|
|
/* recalculate the checksum */
|
|
(void)BIO_seek(bio, 0);
|
|
while ((nread = BIO_read(bio, buf, SIZE_64K)) > 0) {
|
|
unsigned short val;
|
|
int i;
|
|
for (i = 0; i < nread / 2; i++) {
|
|
val = LE_UINT16(buf[i]);
|
|
if (offset == header->header_size + 88 || offset == header->header_size + 90)
|
|
val = 0;
|
|
checkSum += val;
|
|
checkSum = LOWORD(LOWORD(checkSum) + HIWORD(checkSum));
|
|
offset += 2;
|
|
}
|
|
}
|
|
OPENSSL_free(buf);
|
|
checkSum = LOWORD(LOWORD(checkSum) + HIWORD(checkSum));
|
|
checkSum += offset;
|
|
return checkSum;
|
|
}
|
|
|
|
static void pe_recalc_checksum(BIO *bio, FILE_HEADER *header)
|
|
{
|
|
uint32_t checksum = pe_calc_checksum(bio, header);
|
|
char buf[4];
|
|
|
|
/* write back checksum */
|
|
(void)BIO_seek(bio, header->header_size + 88);
|
|
PUT_UINT32_LE(checksum, buf);
|
|
BIO_write(bio, buf, 4);
|
|
}
|
|
|
|
static uint32_t pe_calc_realchecksum(char *indata, FILE_HEADER *header)
|
|
{
|
|
uint32_t n = 0, checkSum = 0, offset = 0;
|
|
BIO *bio = BIO_new(BIO_s_mem());
|
|
unsigned short *buf = OPENSSL_malloc(SIZE_64K);
|
|
|
|
/* calculate the checkSum */
|
|
while (n < header->fileend) {
|
|
size_t i, written, nread;
|
|
size_t left = header->fileend - n;
|
|
unsigned short val;
|
|
if (left > SIZE_64K)
|
|
left = SIZE_64K;
|
|
if (!BIO_write_ex(bio, indata + n, left, &written))
|
|
goto err; /* FAILED */
|
|
(void)BIO_seek(bio, 0);
|
|
n += (uint32_t)written;
|
|
if (!BIO_read_ex(bio, buf, written, &nread))
|
|
goto err; /* FAILED */
|
|
for (i = 0; i < nread / 2; i++) {
|
|
val = LE_UINT16(buf[i]);
|
|
if (offset == header->header_size + 88 || offset == header->header_size + 90)
|
|
val = 0;
|
|
checkSum += val;
|
|
checkSum = LOWORD(LOWORD(checkSum) + HIWORD(checkSum));
|
|
offset += 2;
|
|
}
|
|
}
|
|
checkSum = LOWORD(LOWORD(checkSum) + HIWORD(checkSum));
|
|
checkSum += offset;
|
|
err:
|
|
OPENSSL_free(buf);
|
|
BIO_free(bio);
|
|
return checkSum;
|
|
}
|
|
|
|
static int verify_leaf_hash(X509 *leaf, const char *leafhash)
|
|
{
|
|
int ret = 1;
|
|
u_char *mdbuf = NULL, *certbuf, *tmp;
|
|
u_char cmdbuf[EVP_MAX_MD_SIZE];
|
|
const EVP_MD *md;
|
|
long mdlen = 0;
|
|
size_t certlen, written;
|
|
BIO *bhash = BIO_new(BIO_f_md());
|
|
|
|
/* decode the provided hash */
|
|
char *mdid = OPENSSL_strdup(leafhash);
|
|
char *hash = strchr(mdid, ':');
|
|
if (hash == NULL) {
|
|
printf("\nUnable to parse -require-leaf-hash parameter: %s\n", leafhash);
|
|
goto out;
|
|
}
|
|
*hash++ = '\0';
|
|
md = EVP_get_digestbyname(mdid);
|
|
if (md == NULL) {
|
|
printf("\nUnable to lookup digest by name '%s'\n", mdid);
|
|
goto out;
|
|
}
|
|
mdbuf = OPENSSL_hexstr2buf(hash, &mdlen);
|
|
if (mdlen != EVP_MD_size(md)) {
|
|
printf("\nHash length mismatch: '%s' digest must be %d bytes long (got %ld bytes)\n",
|
|
mdid, EVP_MD_size(md), mdlen);
|
|
goto out;
|
|
}
|
|
/* compute the leaf certificate hash */
|
|
if (!BIO_set_md(bhash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
goto out;
|
|
}
|
|
BIO_push(bhash, BIO_new(BIO_s_null()));
|
|
certlen = (size_t)i2d_X509(leaf, NULL);
|
|
certbuf = OPENSSL_malloc(certlen);
|
|
tmp = certbuf;
|
|
i2d_X509(leaf, &tmp);
|
|
if (!BIO_write_ex(bhash, certbuf, certlen, &written) || written != certlen) {
|
|
OPENSSL_free(certbuf);
|
|
goto out;
|
|
}
|
|
BIO_gets(bhash, (char*)cmdbuf, EVP_MD_size(md));
|
|
OPENSSL_free(certbuf);
|
|
|
|
/* compare the provided hash against the computed hash */
|
|
if (memcmp(mdbuf, cmdbuf, (size_t)EVP_MD_size(md))) {
|
|
print_hash("\nLeaf hash value mismatch", "computed", cmdbuf, EVP_MD_size(md));
|
|
goto out;
|
|
}
|
|
ret = 0; /* OK */
|
|
out:
|
|
BIO_free_all(bhash);
|
|
OPENSSL_free(mdid);
|
|
OPENSSL_free(mdbuf);
|
|
return ret;
|
|
}
|
|
|
|
static int asn1_print_time(const ASN1_TIME *time)
|
|
{
|
|
BIO *bp;
|
|
|
|
if ((time == NULL) || (!ASN1_TIME_check(time))) {
|
|
printf("N/A\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
bp = BIO_new_fp(stdout, BIO_NOCLOSE);
|
|
ASN1_TIME_print(bp, time);
|
|
BIO_free(bp);
|
|
printf("\n");
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int print_time_t(const time_t time)
|
|
{
|
|
ASN1_TIME *s;
|
|
int ret;
|
|
|
|
if (time == INVALID_TIME) {
|
|
printf("N/A\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
if ((s = ASN1_TIME_set(NULL, time)) == NULL) {
|
|
printf("N/A\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
ret = asn1_print_time(s);
|
|
ASN1_TIME_free(s);
|
|
return ret;
|
|
|
|
}
|
|
|
|
static time_t asn1_get_time_t(const ASN1_TIME *s)
|
|
{
|
|
struct tm tm;
|
|
|
|
if ((s == NULL) || (!ASN1_TIME_check(s))) {
|
|
return INVALID_TIME;
|
|
}
|
|
if (ASN1_TIME_to_tm(s, &tm)) {
|
|
#ifdef _WIN32
|
|
return _mkgmtime(&tm);
|
|
#else
|
|
return timegm(&tm);
|
|
#endif
|
|
} else {
|
|
return INVALID_TIME;
|
|
}
|
|
}
|
|
|
|
static int print_cert(X509 *cert, int i)
|
|
{
|
|
char *subject, *issuer, *serial;
|
|
BIGNUM *serialbn;
|
|
|
|
subject = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0);
|
|
issuer = X509_NAME_oneline(X509_get_issuer_name(cert), NULL, 0);
|
|
serialbn = ASN1_INTEGER_to_BN(X509_get_serialNumber(cert), NULL);
|
|
serial = BN_bn2hex(serialbn);
|
|
if (i > 0)
|
|
printf("\t------------------\n");
|
|
printf("\tSigner #%d:\n\t\tSubject: %s\n\t\tIssuer : %s\n\t\tSerial : %s\n\t\tCertificate expiration date:\n",
|
|
i, subject, issuer, serial);
|
|
printf("\t\t\tnotBefore : ");
|
|
asn1_print_time(X509_get0_notBefore(cert));
|
|
printf("\t\t\tnotAfter : ");
|
|
asn1_print_time(X509_get0_notAfter(cert));
|
|
|
|
OPENSSL_free(subject);
|
|
OPENSSL_free(issuer);
|
|
BN_free(serialbn);
|
|
OPENSSL_free(serial);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static X509 *find_signer(PKCS7 *p7, char *leafhash, int *leafok)
|
|
{
|
|
STACK_OF(X509) *signers;
|
|
X509 *cert = NULL;
|
|
int ret = 0;
|
|
|
|
/*
|
|
* retrieve the signer's certificate from p7,
|
|
* search only internal certificates if it was requested
|
|
*/
|
|
signers = PKCS7_get0_signers(p7, NULL, 0);
|
|
if (!signers || sk_X509_num(signers) != 1) {
|
|
printf("PKCS7_get0_signers error\n");
|
|
goto out;
|
|
}
|
|
printf("Signer's certificate:\n");
|
|
cert = sk_X509_value(signers, 0);
|
|
if ((cert == NULL) || (!print_cert(cert, 0)))
|
|
goto out;
|
|
if (leafhash != NULL && *leafok == 0)
|
|
*leafok = verify_leaf_hash(cert, leafhash) == 0;
|
|
|
|
ret = 1; /* OK */
|
|
out:
|
|
if (!ret)
|
|
ERR_print_errors_fp(stdout);
|
|
sk_X509_free(signers);
|
|
return cert;
|
|
}
|
|
|
|
static int print_certs(PKCS7 *p7)
|
|
{
|
|
X509 *cert;
|
|
int i, count;
|
|
|
|
count = sk_X509_num(p7->d.sign->cert);
|
|
printf("\nNumber of certificates: %d\n", count);
|
|
for (i=0; i<count; i++) {
|
|
cert = sk_X509_value(p7->d.sign->cert, i);
|
|
if ((cert == NULL) || (!print_cert(cert, i)))
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static time_t si_get_time(PKCS7_SIGNER_INFO *si)
|
|
{
|
|
STACK_OF(X509_ATTRIBUTE) *auth_attr;
|
|
X509_ATTRIBUTE *attr;
|
|
ASN1_OBJECT *object;
|
|
ASN1_UTCTIME *time = NULL;
|
|
time_t posix_time;
|
|
char object_txt[128];
|
|
int i;
|
|
|
|
auth_attr = PKCS7_get_signed_attributes(si); /* cont[0] */
|
|
if (auth_attr)
|
|
for (i=0; i<X509at_get_attr_count(auth_attr); i++) {
|
|
attr = X509at_get_attr(auth_attr, i);
|
|
object = X509_ATTRIBUTE_get0_object(attr);
|
|
if (object == NULL)
|
|
return INVALID_TIME; /* FAILED */
|
|
object_txt[0] = 0x00;
|
|
OBJ_obj2txt(object_txt, sizeof object_txt, object, 1);
|
|
if (!strcmp(object_txt, PKCS9_SIGNING_TIME)) {
|
|
/* PKCS#9 signing time - Policy OID: 1.2.840.113549.1.9.5 */
|
|
time = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_UTCTIME, NULL);
|
|
}
|
|
}
|
|
posix_time = asn1_get_time_t(time);
|
|
return posix_time;
|
|
}
|
|
|
|
static time_t cms_get_time(CMS_ContentInfo *cms)
|
|
{
|
|
ASN1_OCTET_STRING **pos;
|
|
const u_char *p = NULL;
|
|
TimeStampToken *token = NULL;
|
|
ASN1_GENERALIZEDTIME *asn1_time = NULL;
|
|
time_t posix_time = INVALID_TIME;
|
|
|
|
pos = CMS_get0_content(cms);
|
|
if (pos != NULL && *pos != NULL) {
|
|
p = (*pos)->data;
|
|
token = d2i_TimeStampToken(NULL, &p, (*pos)->length);
|
|
if (token) {
|
|
asn1_time = token->time;
|
|
posix_time = asn1_get_time_t(asn1_time);
|
|
TimeStampToken_free(token);
|
|
}
|
|
}
|
|
return posix_time;
|
|
}
|
|
|
|
static int verify_callback(int ok, X509_STORE_CTX *ctx)
|
|
{
|
|
int error = X509_STORE_CTX_get_error(ctx);
|
|
int depth = X509_STORE_CTX_get_error_depth(ctx);
|
|
|
|
if (!ok && error == X509_V_ERR_CERT_HAS_EXPIRED) {
|
|
if (depth == 0) {
|
|
printf("\nWarning: Ignoring expired signer certificate for CRL validation\n");
|
|
return 1;
|
|
} else {
|
|
X509 *current_cert = X509_STORE_CTX_get_current_cert(ctx);
|
|
printf("\nError: Expired CA certificate:\n");
|
|
print_cert(current_cert, 0);
|
|
printf("\n");
|
|
}
|
|
}
|
|
return ok;
|
|
}
|
|
|
|
static int load_crlfile_lookup(X509_STORE *store, char *certs, char *crl)
|
|
{
|
|
X509_LOOKUP *lookup;
|
|
X509_VERIFY_PARAM *param;
|
|
|
|
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
|
|
if (!lookup)
|
|
return 0; /* FAILED */
|
|
if (!X509_load_cert_file(lookup, certs, X509_FILETYPE_PEM)) {
|
|
printf("\nError: no certificate found\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
if (crl && !X509_load_crl_file(lookup, crl, X509_FILETYPE_PEM)) {
|
|
printf("\nError: no CRL found in %s\n", crl);
|
|
return 0; /* FAILED */
|
|
}
|
|
|
|
param = X509_STORE_get0_param(store);
|
|
if (param == NULL)
|
|
return 0; /* FAILED */
|
|
/* enable CRL checking for the certificate chain leaf certificate */
|
|
if (!X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK))
|
|
return 0; /* FAILED */
|
|
if (!X509_STORE_set1_param(store, param))
|
|
return 0; /* FAILED */
|
|
X509_STORE_set_verify_cb(store, verify_callback);
|
|
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int load_file_lookup(X509_STORE *store, char *certs)
|
|
{
|
|
X509_LOOKUP *lookup;
|
|
X509_VERIFY_PARAM *param;
|
|
|
|
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
|
|
if (!lookup || !certs)
|
|
return 0; /* FAILED */
|
|
if (!X509_load_cert_file(lookup, certs, X509_FILETYPE_PEM)) {
|
|
printf("\nError: no certificate found\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
|
|
param = X509_STORE_get0_param(store);
|
|
if (param == NULL)
|
|
return 0; /* FAILED */
|
|
if (!X509_VERIFY_PARAM_set_purpose(param, X509_PURPOSE_ANY))
|
|
return 0; /* FAILED */
|
|
if (!X509_STORE_set1_param(store, param))
|
|
return 0; /* FAILED */
|
|
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int set_store_time(X509_STORE *store, time_t time)
|
|
{
|
|
X509_VERIFY_PARAM *param;
|
|
|
|
param = X509_STORE_get0_param(store);
|
|
if (param == NULL)
|
|
return 0; /* FAILED */
|
|
X509_VERIFY_PARAM_set_time(param, time);
|
|
if (!X509_STORE_set1_param(store, param))
|
|
return 0; /* FAILED */
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int cms_print_timestamp(CMS_ContentInfo *cms, time_t time)
|
|
{
|
|
STACK_OF(CMS_SignerInfo) *sinfos;
|
|
CMS_SignerInfo *si;
|
|
int md_nid;
|
|
ASN1_INTEGER *serialno;
|
|
char *issuer_name, *serial;
|
|
BIGNUM *serialbn;
|
|
X509_ALGOR *pdig;
|
|
X509_NAME *issuer = NULL;
|
|
|
|
sinfos = CMS_get0_SignerInfos(cms);
|
|
if (sinfos == NULL)
|
|
return 0; /* FAILED */
|
|
si = sk_CMS_SignerInfo_value(sinfos, 0);
|
|
if (si == NULL)
|
|
return 0; /* FAILED */
|
|
printf("\nThe signature is timestamped: ");
|
|
print_time_t(time);
|
|
CMS_SignerInfo_get0_algs(si, NULL, NULL, &pdig, NULL);
|
|
if (pdig == NULL || pdig->algorithm == NULL)
|
|
return 0; /* FAILED */
|
|
md_nid = OBJ_obj2nid(pdig->algorithm);
|
|
printf("Hash Algorithm: %s\n", (md_nid == NID_undef) ? "UNKNOWN" : OBJ_nid2ln(md_nid));
|
|
if (!CMS_SignerInfo_get0_signer_id(si, NULL, &issuer, &serialno) || !issuer)
|
|
return 0; /* FAILED */
|
|
issuer_name = X509_NAME_oneline(issuer, NULL, 0);
|
|
serialbn = ASN1_INTEGER_to_BN(serialno, NULL);
|
|
serial = BN_bn2hex(serialbn);
|
|
printf("Timestamp Verified by:\n\t\tIssuer : %s\n\t\tSerial : %s\n", issuer_name, serial);
|
|
OPENSSL_free(issuer_name);
|
|
BN_free(serialbn);
|
|
OPENSSL_free(serial);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* Create new CMS_ContentInfo struct for Authenticode Timestamp.
|
|
* This struct does not contain any TimeStampToken as specified in RFC 3161.
|
|
*/
|
|
static CMS_ContentInfo *cms_get_timestamp(PKCS7_SIGNED *p7_signed, PKCS7_SIGNER_INFO *countersignature)
|
|
{
|
|
CMS_ContentInfo *cms = NULL;
|
|
PKCS7_SIGNER_INFO *si;
|
|
PKCS7 *p7 = NULL, *content = NULL;
|
|
u_char *p = NULL;
|
|
const u_char *q;
|
|
int i, len = 0;
|
|
|
|
p7 = PKCS7_new();
|
|
si = sk_PKCS7_SIGNER_INFO_value(p7_signed->signer_info, 0);
|
|
if (si == NULL)
|
|
goto out;
|
|
|
|
/* Create new signed PKCS7 timestamp structure. */
|
|
if (!PKCS7_set_type(p7, NID_pkcs7_signed))
|
|
goto out;
|
|
if (!PKCS7_add_signer(p7, countersignature))
|
|
goto out;
|
|
for (i = 0; i < sk_X509_num(p7_signed->cert); i++) {
|
|
if (!PKCS7_add_certificate(p7, sk_X509_value(p7_signed->cert, i)))
|
|
goto out;
|
|
}
|
|
|
|
/* Create new encapsulated NID_id_smime_ct_TSTInfo content. */
|
|
content = PKCS7_new();
|
|
content->d.other = ASN1_TYPE_new();
|
|
content->type = OBJ_nid2obj(NID_id_smime_ct_TSTInfo);
|
|
ASN1_TYPE_set1(content->d.other, V_ASN1_OCTET_STRING, si->enc_digest);
|
|
/* Add encapsulated content to signed PKCS7 timestamp structure:
|
|
p7->d.sign->contents = content */
|
|
if (!PKCS7_set_content(p7, content)) {
|
|
PKCS7_free(content);
|
|
goto out;
|
|
}
|
|
|
|
/* Convert PKCS7 into CMS_ContentInfo */
|
|
if (((len = i2d_PKCS7(p7, NULL)) <= 0) || (p = OPENSSL_malloc((size_t)len)) == NULL) {
|
|
printf("Failed to convert pkcs7: %d\n", len);
|
|
goto out;
|
|
}
|
|
len = i2d_PKCS7(p7, &p);
|
|
p -= len;
|
|
q = p;
|
|
cms = d2i_CMS_ContentInfo(NULL, &q, len);
|
|
OPENSSL_free(p);
|
|
|
|
out:
|
|
if (!cms)
|
|
ERR_print_errors_fp(stdout);
|
|
PKCS7_free(p7);
|
|
return cms;
|
|
}
|
|
|
|
/*
|
|
* RFC3852: the message-digest authenticated attribute type MUST be
|
|
* present when there are any authenticated attributes present
|
|
*/
|
|
static int print_attributes(SIGNATURE *signature, int verbose)
|
|
{
|
|
const u_char *mdbuf;
|
|
int len;
|
|
|
|
if (!signature->digest)
|
|
return 0; /* FAILED */
|
|
|
|
printf("\nAuthenticated attributes:\n");
|
|
printf("\tMessage digest algorithm: %s\n",
|
|
(signature->md_nid == NID_undef) ? "UNKNOWN" : OBJ_nid2sn(signature->md_nid));
|
|
mdbuf = ASN1_STRING_get0_data(signature->digest);
|
|
len = ASN1_STRING_length(signature->digest);
|
|
print_hash("\tMessage digest", "", mdbuf, len);
|
|
printf("\tSigning time: ");
|
|
print_time_t(signature->signtime);
|
|
|
|
if (signature->purpose) {
|
|
if (!memcmp(signature->purpose, purpose_comm, sizeof purpose_comm))
|
|
printf("\tMicrosoft Commercial Code Signing purpose\n");
|
|
else if (!memcmp(signature->purpose, purpose_ind, sizeof purpose_ind))
|
|
printf("\tMicrosoft Individual Code Signing purpose\n");
|
|
else
|
|
printf("\tUnrecognized Code Signing purpose\n");
|
|
}
|
|
if (signature->url) {
|
|
printf("\tURL description: %s\n", signature->url);
|
|
}
|
|
if (signature->desc) {
|
|
printf("\tText description: %s\n", signature->desc);
|
|
}
|
|
if (signature->level) {
|
|
if (!memcmp(signature->level, java_attrs_low, sizeof java_attrs_low))
|
|
printf("\tLow level of permissions in Microsoft Internet Explorer 4.x for CAB files\n");
|
|
else
|
|
printf("\tUnrecognized level of permissions in Microsoft Internet Explorer 4.x for CAB files\n");
|
|
}
|
|
|
|
/* Unauthenticated attributes */
|
|
if (signature->timestamp) {
|
|
if (!cms_print_timestamp(signature->timestamp, signature->time))
|
|
return 0; /* FAILED */
|
|
}
|
|
if (signature->blob) {
|
|
if (verbose) {
|
|
char *data_blob;
|
|
data_blob = OPENSSL_buf2hexstr(signature->blob->data, signature->blob->length);
|
|
printf("\nUnauthenticated Data Blob:\n%s\n", data_blob);
|
|
OPENSSL_free(data_blob);
|
|
}
|
|
printf("\nUnauthenticated Data Blob length: %d bytes\n",signature->blob->length);
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static void get_signed_attributes(SIGNATURE *signature, STACK_OF(X509_ATTRIBUTE) *auth_attr)
|
|
{
|
|
X509_ATTRIBUTE *attr;
|
|
ASN1_OBJECT *object;
|
|
ASN1_STRING *value;
|
|
char object_txt[128];
|
|
const u_char *data;
|
|
int i;
|
|
|
|
for (i=0; i<X509at_get_attr_count(auth_attr); i++) {
|
|
attr = X509at_get_attr(auth_attr, i);
|
|
object = X509_ATTRIBUTE_get0_object(attr);
|
|
if (object == NULL)
|
|
continue;
|
|
object_txt[0] = 0x00;
|
|
OBJ_obj2txt(object_txt, sizeof object_txt, object, 1);
|
|
if (!strcmp(object_txt, PKCS9_MESSAGE_DIGEST)) {
|
|
/* PKCS#9 message digest - Policy OID: 1.2.840.113549.1.9.4 */
|
|
signature->digest = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_OCTET_STRING, NULL);
|
|
} else if (!strcmp(object_txt, PKCS9_SIGNING_TIME)) {
|
|
/* PKCS#9 signing time - Policy OID: 1.2.840.113549.1.9.5 */
|
|
ASN1_UTCTIME *time;
|
|
time = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_UTCTIME, NULL);
|
|
signature->signtime = asn1_get_time_t(time);
|
|
} else if (!strcmp(object_txt, SPC_SP_OPUS_INFO_OBJID)) {
|
|
/* Microsoft OID: 1.3.6.1.4.1.311.2.1.12 */
|
|
SpcSpOpusInfo *opus;
|
|
value = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_SEQUENCE, NULL);
|
|
if (value == NULL)
|
|
continue;
|
|
data = ASN1_STRING_get0_data(value);
|
|
opus = d2i_SpcSpOpusInfo(NULL, &data, ASN1_STRING_length(value));
|
|
if (opus == NULL)
|
|
continue;
|
|
if (opus->moreInfo && opus->moreInfo->type == 0)
|
|
signature->url = OPENSSL_strdup((char *)opus->moreInfo->value.url->data);
|
|
if (opus->programName) {
|
|
if (opus->programName->type == 0) {
|
|
u_char *desc;
|
|
int len = ASN1_STRING_to_UTF8(&desc, opus->programName->value.unicode);
|
|
if (len >= 0) {
|
|
signature->desc = OPENSSL_strndup((char *)desc, (size_t)len);
|
|
OPENSSL_free(desc);
|
|
}
|
|
} else {
|
|
signature->desc = OPENSSL_strdup((char *)opus->programName->value.ascii->data);
|
|
}
|
|
}
|
|
SpcSpOpusInfo_free(opus);
|
|
} else if (!strcmp(object_txt, SPC_STATEMENT_TYPE_OBJID)) {
|
|
/* Microsoft OID: 1.3.6.1.4.1.311.2.1.11 */
|
|
value = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_SEQUENCE, NULL);
|
|
if (value == NULL)
|
|
continue;
|
|
signature->purpose = ASN1_STRING_get0_data(value);
|
|
} else if (!strcmp(object_txt, MS_JAVA_SOMETHING)) {
|
|
/* Microsoft OID: 1.3.6.1.4.1.311.15.1 */
|
|
value = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_SEQUENCE, NULL);
|
|
if (value == NULL)
|
|
continue;
|
|
signature->level = ASN1_STRING_get0_data(value);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void signature_free(SIGNATURE *signature)
|
|
{
|
|
if (signature->timestamp) {
|
|
CMS_ContentInfo_free(signature->timestamp);
|
|
ERR_clear_error();
|
|
}
|
|
PKCS7_free(signature->p7);
|
|
/* If memory has not been allocated nothing is done */
|
|
OPENSSL_free(signature->url);
|
|
OPENSSL_free(signature->desc);
|
|
OPENSSL_free(signature);
|
|
}
|
|
|
|
static int append_signature_list(STACK_OF(SIGNATURE) **signatures, PKCS7 *p7, int allownest);
|
|
|
|
static void get_unsigned_attributes(STACK_OF(SIGNATURE) **signatures, SIGNATURE *signature,
|
|
STACK_OF(X509_ATTRIBUTE) *unauth_attr, PKCS7 *p7, int allownest)
|
|
{
|
|
X509_ATTRIBUTE *attr;
|
|
ASN1_OBJECT *object;
|
|
ASN1_STRING *value;
|
|
char object_txt[128];
|
|
const u_char *data;
|
|
int i, j;
|
|
|
|
for (i=0; i<X509at_get_attr_count(unauth_attr); i++) {
|
|
attr = X509at_get_attr(unauth_attr, i);
|
|
object = X509_ATTRIBUTE_get0_object(attr);
|
|
if (object == NULL)
|
|
continue;
|
|
object_txt[0] = 0x00;
|
|
OBJ_obj2txt(object_txt, sizeof object_txt, object, 1);
|
|
if (!strcmp(object_txt, PKCS9_COUNTER_SIGNATURE)) {
|
|
/* Authenticode Timestamp - Policy OID: 1.2.840.113549.1.9.6 */
|
|
PKCS7_SIGNER_INFO *countersi;
|
|
CMS_ContentInfo *timestamp = NULL;
|
|
time_t time;
|
|
value = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_SEQUENCE, NULL);
|
|
if (value == NULL)
|
|
continue;
|
|
data = ASN1_STRING_get0_data(value);
|
|
countersi = d2i_PKCS7_SIGNER_INFO(NULL, &data, ASN1_STRING_length(value));
|
|
if (countersi == NULL) {
|
|
printf("Error: Authenticode Timestamp could not be decoded correctly\n");
|
|
ERR_print_errors_fp(stdout);
|
|
continue;
|
|
}
|
|
time = si_get_time(countersi);
|
|
if (time != INVALID_TIME) {
|
|
timestamp = cms_get_timestamp(p7->d.sign, countersi);
|
|
if (timestamp) {
|
|
signature->time = time;
|
|
signature->timestamp = timestamp;
|
|
} else {
|
|
printf("Error: Corrupt Authenticode Timestamp embedded content\n");
|
|
}
|
|
} else {
|
|
printf("Error: PKCS9_TIMESTAMP_SIGNING_TIME attribute not found\n");
|
|
PKCS7_SIGNER_INFO_free(countersi);
|
|
}
|
|
} else if (!strcmp(object_txt, SPC_RFC3161_OBJID)) {
|
|
/* RFC3161 Timestamp - Policy OID: 1.3.6.1.4.1.311.3.3.1 */
|
|
CMS_ContentInfo *timestamp = NULL;
|
|
time_t time;
|
|
value = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_SEQUENCE, NULL);
|
|
if (value == NULL)
|
|
continue;
|
|
data = ASN1_STRING_get0_data(value);
|
|
timestamp = d2i_CMS_ContentInfo(NULL, &data, ASN1_STRING_length(value));
|
|
if (timestamp == NULL) {
|
|
printf("Error: RFC3161 Timestamp could not be decoded correctly\n");
|
|
ERR_print_errors_fp(stdout);
|
|
continue;
|
|
}
|
|
time = cms_get_time(timestamp);
|
|
if (time != INVALID_TIME) {
|
|
signature->time = time;
|
|
signature->timestamp = timestamp;
|
|
} else {
|
|
printf("Error: Corrupt RFC3161 Timestamp embedded content\n");
|
|
CMS_ContentInfo_free(timestamp);
|
|
ERR_print_errors_fp(stdout);
|
|
}
|
|
} else if (allownest && !strcmp(object_txt, SPC_NESTED_SIGNATURE_OBJID)) {
|
|
/* Nested Signature - Policy OID: 1.3.6.1.4.1.311.2.4.1 */
|
|
PKCS7 *nested;
|
|
for (j=0; j<X509_ATTRIBUTE_count(attr); j++) {
|
|
value = X509_ATTRIBUTE_get0_data(attr, j, V_ASN1_SEQUENCE, NULL);
|
|
if (value == NULL)
|
|
continue;
|
|
data = ASN1_STRING_get0_data(value);
|
|
nested = d2i_PKCS7(NULL, &data, ASN1_STRING_length(value));
|
|
if (nested)
|
|
if (!append_signature_list(signatures, nested, 0)) {
|
|
printf("Failed to append signature list\n\n");
|
|
PKCS7_free(nested);
|
|
}
|
|
}
|
|
} else if (!strcmp(object_txt, SPC_UNAUTHENTICATED_DATA_BLOB_OBJID)) {
|
|
/* Unauthenticated Data Blob - Policy OID: 1.3.6.1.4.1.42921.1.2.1 */
|
|
signature->blob = X509_ATTRIBUTE_get0_data(attr, 0, V_ASN1_UTF8STRING, NULL);
|
|
} else
|
|
printf("Unsupported Policy OID: %s\n\n", object_txt);
|
|
}
|
|
}
|
|
|
|
static int append_signature_list(STACK_OF(SIGNATURE) **signatures, PKCS7 *p7, int allownest)
|
|
{
|
|
SIGNATURE *signature = NULL;
|
|
PKCS7_SIGNER_INFO *si;
|
|
STACK_OF(X509_ATTRIBUTE) *auth_attr, *unauth_attr;
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info = PKCS7_get_signer_info(p7);
|
|
|
|
if (!signer_info)
|
|
return 0; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si)
|
|
return 0; /* FAILED */
|
|
|
|
signature = OPENSSL_malloc(sizeof(SIGNATURE));
|
|
signature->p7 = p7;
|
|
signature->md_nid = OBJ_obj2nid(si->digest_alg->algorithm);
|
|
signature->digest = NULL;
|
|
signature->signtime = INVALID_TIME;
|
|
signature->url = NULL;
|
|
signature->desc = NULL;
|
|
signature->purpose = NULL;
|
|
signature->level = NULL;
|
|
signature->timestamp = NULL;
|
|
signature->time = INVALID_TIME;
|
|
signature->blob = NULL;
|
|
|
|
auth_attr = PKCS7_get_signed_attributes(si); /* cont[0] */
|
|
if (auth_attr)
|
|
get_signed_attributes(signature, auth_attr);
|
|
|
|
unauth_attr = PKCS7_get_attributes(si); /* cont[1] */
|
|
if (unauth_attr)
|
|
get_unsigned_attributes(signatures, signature, unauth_attr, p7, allownest);
|
|
|
|
if (!sk_SIGNATURE_unshift(*signatures, signature)) {
|
|
printf("Failed to insert signature\n");
|
|
signature_free(signature);
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* compare the hash provided from the TSTInfo object against the hash computed
|
|
* from the signature created by the signing certificate's private key
|
|
*/
|
|
static int TST_verify(CMS_ContentInfo *timestamp, PKCS7_SIGNER_INFO *si)
|
|
{
|
|
ASN1_OCTET_STRING *hash, **pos;
|
|
TimeStampToken *token = NULL;
|
|
const u_char *p = NULL;
|
|
u_char mdbuf[EVP_MAX_MD_SIZE];
|
|
const EVP_MD *md;
|
|
int md_nid;
|
|
BIO *bhash;
|
|
|
|
pos = CMS_get0_content(timestamp);
|
|
if (pos != NULL && *pos != NULL) {
|
|
p = (*pos)->data;
|
|
token = d2i_TimeStampToken(NULL, &p, (*pos)->length);
|
|
if (token) {
|
|
/* compute a hash from the encrypted message digest value of the file */
|
|
md_nid = OBJ_obj2nid(token->messageImprint->digestAlgorithm->algorithm);
|
|
md = EVP_get_digestbynid(md_nid);
|
|
bhash = BIO_new(BIO_f_md());
|
|
if (!BIO_set_md(bhash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(bhash);
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_push(bhash, BIO_new(BIO_s_null()));
|
|
BIO_write(bhash, si->enc_digest->data, si->enc_digest->length);
|
|
BIO_gets(bhash, (char*)mdbuf, EVP_MD_size(md));
|
|
BIO_free_all(bhash);
|
|
|
|
/* compare the provided hash against the computed hash */
|
|
hash = token->messageImprint->digest;
|
|
/* hash->length == EVP_MD_size(md) */
|
|
if (memcmp(mdbuf, hash->data, (size_t)hash->length)) {
|
|
printf("Hash value mismatch:\n\tMessage digest algorithm: %s\n",
|
|
(md_nid == NID_undef) ? "UNKNOWN" : OBJ_nid2ln(md_nid));
|
|
print_hash("\tComputed message digest", "", mdbuf, EVP_MD_size(md));
|
|
print_hash("\tReceived message digest", "", hash->data, hash->length);
|
|
printf("\nFile's message digest verification: failed\n");
|
|
TimeStampToken_free(token);
|
|
return 0; /* FAILED */
|
|
} /* else Computed and received message digests matched */
|
|
TimeStampToken_free(token);
|
|
} else
|
|
/* our CMS_ContentInfo struct created for Authenticode Timestamp
|
|
* does not contain any TimeStampToken as specified in RFC 3161 */
|
|
ERR_clear_error();
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int append_nested_signature(STACK_OF(X509_ATTRIBUTE) **unauth_attr, u_char *p, int len)
|
|
{
|
|
X509_ATTRIBUTE *attr = NULL;
|
|
int nid = OBJ_txt2nid(SPC_NESTED_SIGNATURE_OBJID);
|
|
|
|
if (*unauth_attr == NULL) {
|
|
if ((*unauth_attr = sk_X509_ATTRIBUTE_new_null()) == NULL)
|
|
return 0; /* FAILED */
|
|
} else {
|
|
/* try to find SPC_NESTED_SIGNATURE_OBJID attribute */
|
|
int i;
|
|
for (i = 0; i < sk_X509_ATTRIBUTE_num(*unauth_attr); i++) {
|
|
attr = sk_X509_ATTRIBUTE_value(*unauth_attr, i);
|
|
if (OBJ_obj2nid(X509_ATTRIBUTE_get0_object(attr)) == nid) {
|
|
/* append p to the V_ASN1_SEQUENCE */
|
|
if (!X509_ATTRIBUTE_set1_data(attr, V_ASN1_SEQUENCE, p, len))
|
|
return 0; /* FAILED */
|
|
return 1; /* OK */
|
|
}
|
|
}
|
|
}
|
|
/* create new unauthorized SPC_NESTED_SIGNATURE_OBJID attribute */
|
|
attr = X509_ATTRIBUTE_create_by_NID(NULL, nid, V_ASN1_SEQUENCE, p, len);
|
|
if (!attr)
|
|
return 0; /* FAILED */
|
|
if (!sk_X509_ATTRIBUTE_push(*unauth_attr, attr)) {
|
|
X509_ATTRIBUTE_free(attr);
|
|
return 0; /* FAILED */
|
|
}
|
|
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* pkcs7_set_nested_signature adds the p7nest signature to p7
|
|
* as a nested signature (SPC_NESTED_SIGNATURE).
|
|
*/
|
|
static int pkcs7_set_nested_signature(PKCS7 *p7, PKCS7 *p7nest, time_t time)
|
|
{
|
|
u_char *p = NULL;
|
|
int len = 0;
|
|
PKCS7_SIGNER_INFO *si;
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info = PKCS7_get_signer_info(p7);
|
|
|
|
if (!signer_info)
|
|
return 0; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si)
|
|
return 0; /* FAILED */
|
|
if (((len = i2d_PKCS7(p7nest, NULL)) <= 0) ||
|
|
(p = OPENSSL_malloc((size_t)len)) == NULL)
|
|
return 0; /* FAILED */
|
|
i2d_PKCS7(p7nest, &p);
|
|
p -= len;
|
|
|
|
pkcs7_add_signing_time(si, time);
|
|
if (!append_nested_signature(&(si->unauth_attr), p, len)) {
|
|
OPENSSL_free(p);
|
|
return 0; /* FAILED */
|
|
}
|
|
OPENSSL_free(p);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static char *get_clrdp_url(X509 *cert)
|
|
{
|
|
STACK_OF(DIST_POINT) *crldp;
|
|
DIST_POINT *dp;
|
|
GENERAL_NAMES *gens;
|
|
GENERAL_NAME *gen;
|
|
int i, j, gtype;
|
|
ASN1_STRING *uri;
|
|
char *url = NULL;
|
|
|
|
crldp = X509_get_ext_d2i(cert, NID_crl_distribution_points, NULL, NULL);
|
|
if (!crldp)
|
|
return NULL;
|
|
|
|
for (i = 0; i < sk_DIST_POINT_num(crldp); i++) {
|
|
dp = sk_DIST_POINT_value(crldp, i);
|
|
if (!dp->distpoint || dp->distpoint->type != 0)
|
|
continue;
|
|
gens = dp->distpoint->name.fullname;
|
|
for (j = 0; j < sk_GENERAL_NAME_num(gens); j++) {
|
|
gen = sk_GENERAL_NAME_value(gens, j);
|
|
uri = GENERAL_NAME_get0_value(gen, >ype);
|
|
if (gtype == GEN_URI && ASN1_STRING_length(uri) > 6) {
|
|
url = OPENSSL_strdup((const char *)ASN1_STRING_get0_data(uri));
|
|
if (strncmp(url, "http://", 7) == 0)
|
|
goto out;
|
|
OPENSSL_free(url);
|
|
url = NULL;
|
|
}
|
|
}
|
|
}
|
|
out:
|
|
sk_DIST_POINT_pop_free(crldp, DIST_POINT_free);
|
|
return url;
|
|
}
|
|
|
|
static int verify_crl(char *ca_file, char *crl_file, STACK_OF(X509_CRL) *crls,
|
|
X509 *signer, STACK_OF(X509) *chain)
|
|
{
|
|
X509_STORE *store = NULL;
|
|
X509_STORE_CTX *ctx = NULL;
|
|
int verok = 0;
|
|
|
|
ctx = X509_STORE_CTX_new();
|
|
if (!ctx)
|
|
goto out;
|
|
store = X509_STORE_new();
|
|
if (!store)
|
|
goto out;
|
|
if (!load_crlfile_lookup(store, ca_file, crl_file))
|
|
goto out;
|
|
|
|
/* initialise an X509_STORE_CTX structure for subsequent use by X509_verify_cert()*/
|
|
if (!X509_STORE_CTX_init(ctx, store, signer, chain))
|
|
goto out;
|
|
|
|
/* set an additional CRLs */
|
|
if (crls)
|
|
X509_STORE_CTX_set0_crls(ctx, crls);
|
|
|
|
if (X509_verify_cert(ctx) <= 0) {
|
|
int error = X509_STORE_CTX_get_error(ctx);
|
|
printf("\nX509_verify_cert: certificate verify error: %s\n",
|
|
X509_verify_cert_error_string(error));
|
|
goto out;
|
|
}
|
|
verok = 1; /* OK */
|
|
|
|
out:
|
|
if (!verok)
|
|
ERR_print_errors_fp(stdout);
|
|
/* NULL is a valid parameter value for X509_STORE_free() and X509_STORE_CTX_free() */
|
|
X509_STORE_free(store);
|
|
X509_STORE_CTX_free(ctx);
|
|
return verok;
|
|
}
|
|
|
|
static int verify_timestamp(SIGNATURE *signature, GLOBAL_OPTIONS *options)
|
|
{
|
|
X509_STORE *store;
|
|
STACK_OF(CMS_SignerInfo) *sinfos;
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info;
|
|
CMS_SignerInfo *cmssi;
|
|
X509 *signer;
|
|
STACK_OF(X509_CRL) *crls;
|
|
char *url;
|
|
PKCS7_SIGNER_INFO *si;
|
|
int verok = 0;
|
|
|
|
store = X509_STORE_new();
|
|
if (!store)
|
|
goto out;
|
|
if (load_file_lookup(store, options->tsa_cafile)) {
|
|
/*
|
|
* The TSA signing key MUST be of a sufficient length to allow for a sufficiently
|
|
* long lifetime. Even if this is done, the key will have a finite lifetime.
|
|
* Thus, any token signed by the TSA SHOULD be time-stamped again or notarized
|
|
* at a later date to renew the trust that exists in the TSA's signature.
|
|
* https://datatracker.ietf.org/doc/html/rfc3161#section-4
|
|
* Signtool does not respect this RFC and neither we do.
|
|
* So verify timestamp against the time of its creation.
|
|
*/
|
|
if (!set_store_time(store, signature->time)) {
|
|
printf("Failed to set store time\n");
|
|
X509_STORE_free(store);
|
|
goto out;
|
|
}
|
|
} else {
|
|
printf("Use the \"-TSA-CAfile\" option to add the Time-Stamp Authority certificates bundle to verify the Timestamp Server.\n");
|
|
X509_STORE_free(store);
|
|
goto out;
|
|
}
|
|
|
|
/* verify a CMS SignedData structure */
|
|
if (!CMS_verify(signature->timestamp, NULL, store, 0, NULL, 0)) {
|
|
printf("\nCMS_verify error\n");
|
|
X509_STORE_free(store);
|
|
goto out;
|
|
}
|
|
X509_STORE_free(store);
|
|
|
|
sinfos = CMS_get0_SignerInfos(signature->timestamp);
|
|
cmssi = sk_CMS_SignerInfo_value(sinfos, 0);
|
|
CMS_SignerInfo_get0_algs(cmssi, NULL, &signer, NULL, NULL);
|
|
|
|
url = get_clrdp_url(signer);
|
|
if (url) {
|
|
printf("TSA's CRL distribution point: %s\n", url);
|
|
OPENSSL_free(url);
|
|
}
|
|
|
|
/* verify a Certificate Revocation List */
|
|
crls = signature->p7->d.sign->crl;
|
|
if (options->tsa_crlfile || crls) {
|
|
STACK_OF(X509) *chain = CMS_get1_certs(signature->timestamp);
|
|
int crlok = verify_crl(options->tsa_cafile, options->tsa_crlfile, crls, signer, chain);
|
|
sk_X509_pop_free(chain, X509_free);
|
|
printf("Timestamp Server Signature CRL verification: %s\n", crlok ? "ok" : "failed");
|
|
if (!crlok)
|
|
goto out;
|
|
} else
|
|
printf("\n");
|
|
|
|
/* check extended key usage flag XKU_TIMESTAMP */
|
|
if (!(X509_get_extended_key_usage(signer) & XKU_TIMESTAMP)) {
|
|
printf("Unsupported Signer's certificate purpose XKU_TIMESTAMP\n");
|
|
goto out;
|
|
}
|
|
|
|
/* verify the hash provided from the trusted timestamp */
|
|
signer_info = PKCS7_get_signer_info(signature->p7);
|
|
if (!signer_info)
|
|
goto out;
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si)
|
|
goto out;
|
|
if (!TST_verify(signature->timestamp, si))
|
|
goto out;
|
|
|
|
verok = 1; /* OK */
|
|
out:
|
|
if (!verok)
|
|
ERR_print_errors_fp(stdout);
|
|
return verok;
|
|
}
|
|
|
|
static int verify_authenticode(SIGNATURE *signature, GLOBAL_OPTIONS *options, X509 *signer)
|
|
{
|
|
X509_STORE *store;
|
|
STACK_OF(X509_CRL) *crls;
|
|
BIO *bio = NULL;
|
|
int verok = 0;
|
|
|
|
store = X509_STORE_new();
|
|
if (!store)
|
|
goto out;
|
|
if (!load_file_lookup(store, options->cafile)) {
|
|
printf("Failed to add store lookup file\n");
|
|
X509_STORE_free(store);
|
|
goto out;
|
|
}
|
|
if (signature->time != INVALID_TIME) {
|
|
printf("Signature verification time: ");
|
|
print_time_t(signature->time);
|
|
if (!set_store_time(store, signature->time)) {
|
|
printf("Failed to set signature time\n");
|
|
X509_STORE_free(store);
|
|
goto out;
|
|
}
|
|
} else if (options->time != INVALID_TIME) {
|
|
printf("Signature verification time: ");
|
|
print_time_t(options->time);
|
|
if (!set_store_time(store, options->time)) {
|
|
printf("Failed to set verifying time\n");
|
|
X509_STORE_free(store);
|
|
goto out;
|
|
}
|
|
}
|
|
/* verify a PKCS#7 signedData structure */
|
|
if (signature->p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE) {
|
|
/* only verify the contents of the sequence */
|
|
int seqhdrlen;
|
|
seqhdrlen = asn1_simple_hdr_len(signature->p7->d.sign->contents->d.other->value.sequence->data,
|
|
signature->p7->d.sign->contents->d.other->value.sequence->length);
|
|
bio = BIO_new_mem_buf(signature->p7->d.sign->contents->d.other->value.sequence->data + seqhdrlen,
|
|
signature->p7->d.sign->contents->d.other->value.sequence->length - seqhdrlen);
|
|
} else {
|
|
/* verify the entire value */
|
|
bio = BIO_new_mem_buf(signature->p7->d.sign->contents->d.other->value.sequence->data,
|
|
signature->p7->d.sign->contents->d.other->value.sequence->length);
|
|
}
|
|
if (!PKCS7_verify(signature->p7, NULL, store, bio, NULL, 0)) {
|
|
printf("\nPKCS7_verify error\n");
|
|
X509_STORE_free(store);
|
|
BIO_free(bio);
|
|
goto out;
|
|
}
|
|
X509_STORE_free(store);
|
|
BIO_free(bio);
|
|
|
|
/* verify a Certificate Revocation List */
|
|
crls = signature->p7->d.sign->crl;
|
|
if (options->crlfile || crls) {
|
|
STACK_OF(X509) *chain = signature->p7->d.sign->cert;
|
|
int crlok = verify_crl(options->cafile, options->crlfile, crls, signer, chain);
|
|
printf("Signature CRL verification: %s\n", crlok ? "ok" : "failed");
|
|
if (!crlok)
|
|
goto out;
|
|
}
|
|
|
|
/* check extended key usage flag XKU_CODE_SIGN */
|
|
if (!(X509_get_extended_key_usage(signer) & XKU_CODE_SIGN)) {
|
|
printf("Unsupported Signer's certificate purpose XKU_CODE_SIGN\n");
|
|
goto out;
|
|
}
|
|
|
|
verok = 1; /* OK */
|
|
out:
|
|
if (!verok)
|
|
ERR_print_errors_fp(stdout);
|
|
return verok;
|
|
}
|
|
|
|
static int verify_signature(SIGNATURE *signature, GLOBAL_OPTIONS *options)
|
|
{
|
|
int leafok = 0, verok;
|
|
X509 *signer;
|
|
char *url;
|
|
|
|
signer = find_signer(signature->p7, options->leafhash, &leafok);
|
|
if (!signer) {
|
|
printf("Find signer error\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
if (!print_certs(signature->p7))
|
|
printf("Print certs error\n");
|
|
if (!print_attributes(signature, options->verbose))
|
|
printf("Print attributes error\n");
|
|
if (options->leafhash != NULL) {
|
|
printf("\nLeaf hash match: %s\n", leafok ? "ok" : "failed");
|
|
if (!leafok) {
|
|
printf("Signature verification: failed\n\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
}
|
|
if (options->catalog)
|
|
printf("\nFile is signed in catalog: %s\n", options->catalog);
|
|
printf("\nCAfile: %s\n", options->cafile);
|
|
if (options->crlfile)
|
|
printf("CRLfile: %s\n", options->crlfile);
|
|
if (options->tsa_cafile)
|
|
printf("TSA's certificates file: %s\n", options->tsa_cafile);
|
|
if (options->tsa_crlfile)
|
|
printf("TSA's CRL file: %s\n", options->tsa_crlfile);
|
|
url = get_clrdp_url(signer);
|
|
if (url) {
|
|
printf("CRL distribution point: %s\n", url);
|
|
OPENSSL_free(url);
|
|
}
|
|
|
|
if (signature->timestamp) {
|
|
if (!options->ignore_timestamp) {
|
|
int timeok = verify_timestamp(signature, options);
|
|
printf("Timestamp Server Signature verification: %s\n", timeok ? "ok" : "failed");
|
|
if (!timeok) {
|
|
signature->time = INVALID_TIME;
|
|
}
|
|
} else {
|
|
printf("\nTimestamp Server Signature verification is disabled\n\n");
|
|
signature->time = INVALID_TIME;
|
|
}
|
|
} else
|
|
printf("\nTimestamp is not available\n\n");
|
|
verok = verify_authenticode(signature, options, signer);
|
|
printf("Signature verification: %s\n\n", verok ? "ok" : "failed");
|
|
if (!verok)
|
|
return 1; /* FAILED */
|
|
|
|
return 0; /* OK */
|
|
}
|
|
|
|
/*
|
|
* MSI file support
|
|
* https://msdn.microsoft.com/en-us/library/dd942138.aspx
|
|
*/
|
|
|
|
static int msi_verify_header(char *indata, uint32_t filesize, MSI_PARAMS *msiparams)
|
|
{
|
|
MSI_ENTRY *root;
|
|
|
|
msiparams->msi = msi_file_new(indata, filesize);
|
|
if (!msiparams->msi) {
|
|
printf("Failed to parse MSI_FILE struct\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
root = msi_root_entry_get(msiparams->msi);
|
|
if (!root) {
|
|
printf("Failed to get file entry\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
if (!msi_dirent_new(msiparams->msi, root, NULL, &(msiparams->dirent))) {
|
|
printf("Failed to parse MSI_DIRENT struct\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int msi_verify_pkcs7(SIGNATURE *signature, MSI_FILE *msi, MSI_DIRENT *dirent,
|
|
char *exdata, int exlen, GLOBAL_OPTIONS *options)
|
|
{
|
|
int ret = 1, mdok, mdtype = -1;
|
|
u_char mdbuf[EVP_MAX_MD_SIZE];
|
|
u_char cmdbuf[EVP_MAX_MD_SIZE];
|
|
u_char cexmdbuf[EVP_MAX_MD_SIZE];
|
|
const EVP_MD *md;
|
|
BIO *hash;
|
|
|
|
if (is_content_type(signature->p7, SPC_INDIRECT_DATA_OBJID)) {
|
|
ASN1_STRING *content_val = signature->p7->d.sign->contents->d.other->value.sequence;
|
|
const u_char *p = content_val->data;
|
|
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, content_val->length);
|
|
if (idc) {
|
|
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
|
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
|
memcpy(mdbuf, idc->messageDigest->digest->data, (size_t)idc->messageDigest->digest->length);
|
|
}
|
|
SpcIndirectDataContent_free(idc);
|
|
}
|
|
}
|
|
if (mdtype == -1) {
|
|
printf("Failed to extract current message digest\n\n");
|
|
goto out;
|
|
}
|
|
printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype));
|
|
md = EVP_get_digestbynid(mdtype);
|
|
hash = BIO_new(BIO_f_md());
|
|
if (!BIO_set_md(hash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(hash);
|
|
goto out;
|
|
}
|
|
BIO_push(hash, BIO_new(BIO_s_null()));
|
|
if (exdata) {
|
|
BIO *prehash = BIO_new(BIO_f_md());
|
|
if (EVP_MD_size(md) != exlen) {
|
|
printf("Incorrect MsiDigitalSignatureEx stream data length\n\n");
|
|
BIO_free_all(hash);
|
|
BIO_free_all(prehash);
|
|
goto out;
|
|
}
|
|
if (!BIO_set_md(prehash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(hash);
|
|
BIO_free_all(prehash);
|
|
goto out;
|
|
}
|
|
BIO_push(prehash, BIO_new(BIO_s_null()));
|
|
|
|
print_hash("Current MsiDigitalSignatureEx ", "", (u_char *)exdata, exlen);
|
|
if (!msi_prehash_dir(dirent, prehash, 1)) {
|
|
printf("Failed to calculate pre-hash used for MsiDigitalSignatureEx\n\n");
|
|
BIO_free_all(hash);
|
|
BIO_free_all(prehash);
|
|
goto out;
|
|
}
|
|
BIO_gets(prehash, (char*)cexmdbuf, EVP_MAX_MD_SIZE);
|
|
BIO_free_all(prehash);
|
|
BIO_write(hash, (char*)cexmdbuf, EVP_MD_size(md));
|
|
print_hash("Calculated MsiDigitalSignatureEx ", "", cexmdbuf, EVP_MD_size(md));
|
|
}
|
|
|
|
if (!msi_hash_dir(msi, dirent, hash, 1)) {
|
|
printf("Failed to calculate DigitalSignature\n\n");
|
|
BIO_free_all(hash);
|
|
goto out;
|
|
}
|
|
print_hash("Current DigitalSignature ", "", mdbuf, EVP_MD_size(md));
|
|
BIO_gets(hash, (char*)cmdbuf, EVP_MAX_MD_SIZE);
|
|
BIO_free_all(hash);
|
|
mdok = !memcmp(mdbuf, cmdbuf, (size_t)EVP_MD_size(md));
|
|
print_hash("Calculated DigitalSignature ", mdok ? "\n" : " MISMATCH!!!\n", cmdbuf, EVP_MD_size(md));
|
|
if (!mdok) {
|
|
printf("Signature verification: failed\n\n");
|
|
goto out;
|
|
}
|
|
ret = verify_signature(signature, options);
|
|
out:
|
|
if (ret)
|
|
ERR_print_errors_fp(stdout);
|
|
return ret;
|
|
}
|
|
|
|
static int msi_verify_file(MSI_PARAMS *msiparams, GLOBAL_OPTIONS *options)
|
|
{
|
|
int i, ret = 1;
|
|
char *indata = NULL;
|
|
char *exdata = NULL;
|
|
const u_char *blob;
|
|
uint32_t inlen, exlen = 0;
|
|
PKCS7 *p7;
|
|
|
|
STACK_OF(SIGNATURE) *signatures = sk_SIGNATURE_new_null();
|
|
MSI_ENTRY *dse = NULL;
|
|
MSI_ENTRY *ds = msi_signatures_get(msiparams->dirent, &dse);
|
|
|
|
if (!ds) {
|
|
printf("MSI file has no signature\n\n");
|
|
goto out;
|
|
}
|
|
inlen = GET_UINT32_LE(ds->size);
|
|
if (inlen == 0 || inlen >= MAXREGSECT) {
|
|
printf("Corrupted DigitalSignature stream length 0x%08X\n", inlen);
|
|
goto out;
|
|
}
|
|
indata = OPENSSL_malloc((size_t)inlen);
|
|
if (!msi_file_read(msiparams->msi, ds, 0, indata, inlen)) {
|
|
printf("DigitalSignature stream data error\n\n");
|
|
goto out;
|
|
}
|
|
if (!dse) {
|
|
printf("Warning: MsiDigitalSignatureEx stream doesn't exist\n");
|
|
} else {
|
|
exlen = GET_UINT32_LE(dse->size);
|
|
if (exlen == 0 || exlen >= MAXREGSECT) {
|
|
printf("Corrupted MsiDigitalSignatureEx stream length 0x%08X\n", exlen);
|
|
goto out;
|
|
}
|
|
exdata = OPENSSL_malloc((size_t)exlen);
|
|
if (!msi_file_read(msiparams->msi, dse, 0, exdata, exlen)) {
|
|
printf("MsiDigitalSignatureEx stream data error\n\n");
|
|
goto out;
|
|
}
|
|
}
|
|
blob = (u_char *)indata;
|
|
p7 = d2i_PKCS7(NULL, &blob, inlen);
|
|
if (!p7) {
|
|
printf("Failed to extract PKCS7 data\n\n");
|
|
goto out;
|
|
}
|
|
if (!append_signature_list(&signatures, p7, 1)) {
|
|
printf("Failed to create signature list\n\n");
|
|
PKCS7_free(p7);
|
|
goto out;
|
|
}
|
|
for (i = 0; i < sk_SIGNATURE_num(signatures); i++) {
|
|
SIGNATURE *signature = sk_SIGNATURE_value(signatures, i);
|
|
printf("Signature Index: %d %s\n", i, i==0 ? " (Primary Signature)" : "");
|
|
ret &= msi_verify_pkcs7(signature, msiparams->msi, msiparams->dirent, exdata, (int)exlen, options);
|
|
}
|
|
printf("Number of verified signatures: %d\n", i);
|
|
out:
|
|
sk_SIGNATURE_pop_free(signatures, signature_free);
|
|
OPENSSL_free(indata);
|
|
OPENSSL_free(exdata);
|
|
return ret;
|
|
}
|
|
|
|
static PKCS7 *msi_extract_existing_pkcs7(MSI_PARAMS *msiparams, MSI_ENTRY *ds, char **data, uint32_t len)
|
|
{
|
|
PKCS7 *p7 = NULL;
|
|
const u_char *blob;
|
|
|
|
if (!msi_file_read(msiparams->msi, ds, 0, *data, len)) {
|
|
printf("DigitalSignature stream data error\n");
|
|
return NULL;
|
|
}
|
|
blob = (u_char *)*data;
|
|
p7 = d2i_PKCS7(NULL, &blob, len);
|
|
if (!p7) {
|
|
printf("Failed to extract PKCS7 data\n");
|
|
return NULL;
|
|
}
|
|
return p7;
|
|
}
|
|
|
|
static int msi_extract_file(MSI_PARAMS *msiparams, BIO *outdata, int output_pkcs7)
|
|
{
|
|
int ret = 0;
|
|
PKCS7 *sig;
|
|
uint32_t len;
|
|
char *data;
|
|
size_t written;
|
|
|
|
MSI_ENTRY *ds = msi_signatures_get(msiparams->dirent, NULL);
|
|
if (!ds) {
|
|
printf("MSI file has no signature\n\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
len = GET_UINT32_LE(ds->size);
|
|
if (len == 0 || len >= MAXREGSECT) {
|
|
printf("Corrupted DigitalSignature stream length 0x%08X\n", len);
|
|
return 1; /* FAILED */
|
|
}
|
|
data = OPENSSL_malloc((size_t)len);
|
|
(void)BIO_reset(outdata);
|
|
sig = msi_extract_existing_pkcs7(msiparams, ds, &data, len);
|
|
if (!sig) {
|
|
printf("Unable to extract existing signature\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
if (output_pkcs7) {
|
|
ret = !PEM_write_bio_PKCS7(outdata, sig);
|
|
} else {
|
|
if (!BIO_write_ex(outdata, data, len, &written) || written != len)
|
|
ret = 1; /* FAILED */
|
|
}
|
|
PKCS7_free(sig);
|
|
OPENSSL_free(data);
|
|
return ret;
|
|
}
|
|
|
|
static int msi_remove_file(MSI_PARAMS *msiparams, BIO *outdata)
|
|
{
|
|
if (!msi_dirent_delete(msiparams->dirent, digital_signature_ex, sizeof digital_signature_ex)) {
|
|
return 1; /* FAILED */
|
|
}
|
|
if (!msi_dirent_delete(msiparams->dirent, digital_signature, sizeof digital_signature)) {
|
|
return 1; /* FAILED */
|
|
}
|
|
if (!msi_file_write(msiparams->msi, msiparams->dirent, NULL, 0, NULL, 0, outdata)) {
|
|
printf("Saving the msi file failed\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
return 0; /* OK */
|
|
}
|
|
|
|
/*
|
|
* MsiDigitalSignatureEx is an enhanced signature type that
|
|
* can be used when signing MSI files. In addition to
|
|
* file content, it also hashes some file metadata, specifically
|
|
* file names, file sizes, creation times and modification times.
|
|
*
|
|
* The file content hashing part stays the same, so the
|
|
* msi_handle_dir() function can be used across both variants.
|
|
*
|
|
* When an MsiDigitalSigntaureEx section is present in an MSI file,
|
|
* the meaning of the DigitalSignature section changes: Instead
|
|
* of being merely a file content hash (as what is output by the
|
|
* msi_handle_dir() function), it is now hashes both content
|
|
* and metadata.
|
|
*
|
|
* Here is how it works:
|
|
*
|
|
* First, a "pre-hash" is calculated. This is the "metadata" hash.
|
|
* It iterates over the files in the MSI in the same order as the
|
|
* file content hashing method would - but it only processes the
|
|
* metadata.
|
|
*
|
|
* Once the pre-hash is calculated, a new hash is created for
|
|
* calculating the hash of the file content. The output of the
|
|
* pre-hash is added as the first element of the file content hash.
|
|
*
|
|
* After the pre-hash is written, what follows is the "regular"
|
|
* stream of data that would normally be written when performing
|
|
* file content hashing.
|
|
*
|
|
* The output of this hash, which combines both metadata and file
|
|
* content, is what will be output in signed form to the
|
|
* DigitalSignature section when in 'MsiDigitalSignatureEx' mode.
|
|
*
|
|
* As mentioned previously, this new mode of operation is signalled
|
|
* by the presence of a 'MsiDigitalSignatureEx' section in the MSI
|
|
* file. This section must come after the 'DigitalSignature'
|
|
* section, and its content must be the output of the pre-hash
|
|
* ("metadata") hash.
|
|
*/
|
|
|
|
static int msi_calc_MsiDigitalSignatureEx(MSI_PARAMS *msiparams, const EVP_MD *md, BIO *hash)
|
|
{
|
|
BIO *prehash = BIO_new(BIO_f_md());
|
|
if (!BIO_set_md(prehash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(prehash);
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_push(prehash, BIO_new(BIO_s_null()));
|
|
|
|
if (!msi_prehash_dir(msiparams->dirent, prehash, 1)) {
|
|
printf("Unable to calculate MSI pre-hash ('metadata') hash\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
msiparams->p_msiex = OPENSSL_malloc(EVP_MAX_MD_SIZE);
|
|
msiparams->len_msiex = BIO_gets(prehash, (char*)msiparams->p_msiex, EVP_MAX_MD_SIZE);
|
|
BIO_write(hash, msiparams->p_msiex, msiparams->len_msiex);
|
|
BIO_free_all(prehash);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* PE file support
|
|
*/
|
|
|
|
/* Compute a message digest value of the signed or unsigned PE file */
|
|
static int pe_calc_digest(char *indata, int mdtype, u_char *mdbuf, FILE_HEADER *header)
|
|
{
|
|
size_t written;
|
|
uint32_t idx = 0, fileend;
|
|
const EVP_MD *md = EVP_get_digestbynid(mdtype);
|
|
BIO *bhash = BIO_new(BIO_f_md());
|
|
|
|
if (!BIO_set_md(bhash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(bhash);
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_push(bhash, BIO_new(BIO_s_null()));
|
|
if (header->sigpos)
|
|
fileend = header->sigpos;
|
|
else
|
|
fileend = header->fileend;
|
|
|
|
/* header->header_size + 88 + 4 + 60 + header->pe32plus * 16 + 8 */
|
|
if (!BIO_write_ex(bhash, indata, header->header_size + 88, &written)
|
|
|| written != header->header_size + 88) {
|
|
BIO_free_all(bhash);
|
|
return 0; /* FAILED */
|
|
}
|
|
idx += (uint32_t)written + 4;
|
|
if (!BIO_write_ex(bhash, indata + idx, 60 + header->pe32plus * 16, &written)
|
|
|| written != 60 + header->pe32plus * 16) {
|
|
BIO_free_all(bhash);
|
|
return 0; /* FAILED */
|
|
}
|
|
idx += (uint32_t)written + 8;
|
|
if (!bio_hash_data(indata, bhash, idx, 0, fileend)) {
|
|
printf("Unable to calculate digest\n");
|
|
BIO_free_all(bhash);
|
|
return 0; /* FAILED */
|
|
}
|
|
if (!header->sigpos) {
|
|
/* pad (with 0's) unsigned PE file to 8 byte boundary */
|
|
char *buf = OPENSSL_malloc(8);
|
|
int len = 8 - header->fileend % 8;
|
|
if (len > 0 && len != 8) {
|
|
memset(buf, 0, (size_t)len);
|
|
BIO_write(bhash, buf, len);
|
|
OPENSSL_free(buf);
|
|
}
|
|
}
|
|
BIO_gets(bhash, (char*)mdbuf, EVP_MD_size(md));
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int pe_extract_page_hash(SpcAttributeTypeAndOptionalValue *obj,
|
|
u_char **ph, int *phlen, int *phtype)
|
|
{
|
|
const u_char *blob;
|
|
SpcPeImageData *id;
|
|
SpcSerializedObject *so;
|
|
int l, l2;
|
|
char buf[128];
|
|
|
|
*phlen = 0;
|
|
if (!obj || !obj->value)
|
|
return 0; /* FAILED */
|
|
blob = obj->value->value.sequence->data;
|
|
id = d2i_SpcPeImageData(NULL, &blob, obj->value->value.sequence->length);
|
|
if (!id) {
|
|
return 0; /* FAILED */
|
|
}
|
|
if (!id->file) {
|
|
SpcPeImageData_free(id);
|
|
return 0; /* FAILED */
|
|
}
|
|
if (id->file->type != 1) {
|
|
SpcPeImageData_free(id);
|
|
return 1; /* OK - this is not SpcSerializedObject structure that contains page hashes */
|
|
}
|
|
so = id->file->value.moniker;
|
|
if (so->classId->length != sizeof classid_page_hash ||
|
|
memcmp(so->classId->data, classid_page_hash, sizeof classid_page_hash)) {
|
|
SpcPeImageData_free(id);
|
|
return 0; /* FAILED */
|
|
}
|
|
/* skip ASN.1 SET hdr */
|
|
l = asn1_simple_hdr_len(so->serializedData->data, so->serializedData->length);
|
|
blob = so->serializedData->data + l;
|
|
obj = d2i_SpcAttributeTypeAndOptionalValue(NULL, &blob, so->serializedData->length - l);
|
|
SpcPeImageData_free(id);
|
|
if (!obj)
|
|
return 0; /* FAILED */
|
|
|
|
*phtype = 0;
|
|
buf[0] = 0x00;
|
|
OBJ_obj2txt(buf, sizeof buf, obj->type, 1);
|
|
if (!strcmp(buf, SPC_PE_IMAGE_PAGE_HASHES_V1)) {
|
|
*phtype = NID_sha1;
|
|
} else if (!strcmp(buf, SPC_PE_IMAGE_PAGE_HASHES_V2)) {
|
|
*phtype = NID_sha256;
|
|
} else {
|
|
SpcAttributeTypeAndOptionalValue_free(obj);
|
|
return 0; /* FAILED */
|
|
}
|
|
/* Skip ASN.1 SET hdr */
|
|
l2 = asn1_simple_hdr_len(obj->value->value.sequence->data, obj->value->value.sequence->length);
|
|
/* Skip ASN.1 OCTET STRING hdr */
|
|
l = asn1_simple_hdr_len(obj->value->value.sequence->data + l2, obj->value->value.sequence->length - l2);
|
|
l += l2;
|
|
*phlen = obj->value->value.sequence->length - l;
|
|
*ph = OPENSSL_malloc((size_t)*phlen);
|
|
memcpy(*ph, obj->value->value.sequence->data + l, (size_t)*phlen);
|
|
SpcAttributeTypeAndOptionalValue_free(obj);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int pe_page_hash(char *indata, FILE_HEADER *header, u_char *ph, int phlen, int phtype)
|
|
{
|
|
int mdok, cphlen = 0;
|
|
u_char *cph;
|
|
|
|
printf("Page hash algorithm : %s\n", OBJ_nid2sn(phtype));
|
|
print_hash("Page hash ", "...", ph, (phlen < 32) ? phlen : 32);
|
|
cph = pe_calc_page_hash(indata, header->header_size, header->pe32plus, header->sigpos, phtype, &cphlen);
|
|
mdok = (phlen == cphlen) && !memcmp(ph, cph, (size_t)phlen);
|
|
print_hash("Calculated page hash ", mdok ? "...\n" : "... MISMATCH!!!\n", cph, (cphlen < 32) ? cphlen : 32);
|
|
OPENSSL_free(cph);
|
|
return mdok;
|
|
}
|
|
|
|
static int pe_verify_pkcs7(SIGNATURE *signature, char *indata, FILE_HEADER *header,
|
|
GLOBAL_OPTIONS *options)
|
|
{
|
|
int ret = 1, mdtype = -1, phtype = -1;
|
|
u_char mdbuf[EVP_MAX_MD_SIZE];
|
|
u_char cmdbuf[EVP_MAX_MD_SIZE];
|
|
u_char *ph = NULL;
|
|
int phlen = 0;
|
|
|
|
if (is_content_type(signature->p7, SPC_INDIRECT_DATA_OBJID)) {
|
|
ASN1_STRING *content_val = signature->p7->d.sign->contents->d.other->value.sequence;
|
|
const u_char *p = content_val->data;
|
|
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, content_val->length);
|
|
if (idc) {
|
|
if (!pe_extract_page_hash(idc->data, &ph, &phlen, &phtype)) {
|
|
printf("Failed to extract a page hash\n\n");
|
|
SpcIndirectDataContent_free(idc);
|
|
goto out;
|
|
}
|
|
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
|
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
|
memcpy(mdbuf, idc->messageDigest->digest->data, (size_t)idc->messageDigest->digest->length);
|
|
}
|
|
SpcIndirectDataContent_free(idc);
|
|
}
|
|
}
|
|
if (mdtype == -1) {
|
|
printf("Failed to extract current message digest\n\n");
|
|
goto out;
|
|
}
|
|
if (!pe_calc_digest(indata, mdtype, cmdbuf, header)) {
|
|
printf("Failed to calculate message digest\n\n");
|
|
goto out;
|
|
}
|
|
if (!compare_digests(mdbuf, cmdbuf, mdtype)) {
|
|
printf("Signature verification: failed\n\n");
|
|
goto out;
|
|
}
|
|
if (phlen > 0 && !pe_page_hash(indata, header, ph, phlen, phtype)) {
|
|
printf("Signature verification: failed\n\n");
|
|
goto out;
|
|
}
|
|
|
|
ret = verify_signature(signature, options);
|
|
out:
|
|
if (ret)
|
|
ERR_print_errors_fp(stdout);
|
|
OPENSSL_free(ph);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* pe_extract_existing_pkcs7 retrieves a decoded PKCS7 struct
|
|
* corresponding to the existing signature of the PE file.
|
|
*/
|
|
static PKCS7 *pe_extract_existing_pkcs7(char *indata, FILE_HEADER *header)
|
|
{
|
|
uint32_t pos = 0;
|
|
PKCS7 *p7 = NULL;
|
|
|
|
if (header->siglen == 0 || header->siglen > header->fileend) {
|
|
printf("Corrupted signature length: 0x%08X\n", header->siglen);
|
|
return NULL; /* FAILED */
|
|
}
|
|
while (pos < header->siglen) {
|
|
uint32_t l = GET_UINT32_LE(indata + header->sigpos + pos);
|
|
uint16_t certrev = GET_UINT16_LE(indata + header->sigpos + pos + 4);
|
|
uint16_t certtype = GET_UINT16_LE(indata + header->sigpos + pos + 6);
|
|
if (certrev == WIN_CERT_REVISION_2_0 && certtype == WIN_CERT_TYPE_PKCS_SIGNED_DATA) {
|
|
const u_char *blob = (u_char *)indata + header->sigpos + pos + 8;
|
|
p7 = d2i_PKCS7(NULL, &blob, l - 8);
|
|
}
|
|
if (l%8)
|
|
l += (8 - l%8);
|
|
pos += l;
|
|
}
|
|
return p7;
|
|
}
|
|
|
|
static int pe_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options)
|
|
{
|
|
int i, peok = 1, ret = 1;
|
|
uint32_t real_pe_checksum;
|
|
PKCS7 *p7;
|
|
STACK_OF(SIGNATURE) *signatures = sk_SIGNATURE_new_null();
|
|
|
|
if (header->siglen == 0)
|
|
header->sigpos = header->fileend;
|
|
|
|
/* check PE checksum */
|
|
printf("Current PE checksum : %08X\n", header->pe_checksum);
|
|
real_pe_checksum = pe_calc_realchecksum(indata, header);
|
|
if (header->pe_checksum && header->pe_checksum != real_pe_checksum)
|
|
peok = 0;
|
|
printf("Calculated PE checksum: %08X%s\n\n", real_pe_checksum, peok ? "" : " MISMATCH!!!");
|
|
|
|
if (header->sigpos == 0 || header->siglen == 0 || header->sigpos > header->fileend) {
|
|
printf("No signature found\n\n");
|
|
goto out;
|
|
}
|
|
if (header->siglen != GET_UINT32_LE(indata + header->sigpos)) {
|
|
printf("Invalid signature\n\n");
|
|
goto out;
|
|
}
|
|
p7 = pe_extract_existing_pkcs7(indata, header);
|
|
if (!p7) {
|
|
printf("Failed to extract PKCS7 data\n\n");
|
|
goto out;
|
|
}
|
|
if (!append_signature_list(&signatures, p7, 1)) {
|
|
printf("Failed to create signature list\n\n");
|
|
PKCS7_free(p7);
|
|
goto out;
|
|
}
|
|
for (i = 0; i < sk_SIGNATURE_num(signatures); i++) {
|
|
SIGNATURE *signature = sk_SIGNATURE_value(signatures, i);
|
|
printf("Signature Index: %d %s\n", i, i==0 ? " (Primary Signature)" : "");
|
|
ret &= pe_verify_pkcs7(signature, indata, header, options);
|
|
}
|
|
printf("Number of verified signatures: %d\n", i);
|
|
out:
|
|
sk_SIGNATURE_pop_free(signatures, signature_free);
|
|
return ret;
|
|
}
|
|
|
|
static int pe_extract_file(char *indata, FILE_HEADER *header, BIO *outdata, int output_pkcs7)
|
|
{
|
|
int ret = 0;
|
|
PKCS7 *sig;
|
|
size_t written;
|
|
|
|
(void)BIO_reset(outdata);
|
|
if (output_pkcs7) {
|
|
sig = pe_extract_existing_pkcs7(indata, header);
|
|
if (!sig) {
|
|
printf("Unable to extract existing signature\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
ret = !PEM_write_bio_PKCS7(outdata, sig);
|
|
PKCS7_free(sig);
|
|
} else
|
|
if (!BIO_write_ex(outdata, indata + header->sigpos, header->siglen, &written) \
|
|
|| written != header->siglen)
|
|
ret = 1; /* FAILED */
|
|
return ret;
|
|
}
|
|
|
|
static int pe_verify_header(char *indata, char *infile, uint32_t filesize, FILE_HEADER *header)
|
|
{
|
|
if (filesize < 64) {
|
|
printf("Corrupt DOS file - too short: %s\n", infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
/* SizeOfHeaders field specifies the combined size of an MS-DOS stub, PE header,
|
|
* and section headers rounded up to a multiple of FileAlignment.
|
|
* SizeOfHeaders must be < filesize and cannot be < 0x0000002C (44) in Windows 7
|
|
* because of a bug when checking section names for compatibility purposes */
|
|
header->header_size = GET_UINT32_LE(indata + 60);
|
|
if (header->header_size < 44 || header->header_size > filesize) {
|
|
printf("Unexpected SizeOfHeaders field: 0x%08X\n", header->header_size);
|
|
return 0; /* FAILED */
|
|
}
|
|
if (filesize < header->header_size + 176) {
|
|
printf("Corrupt PE file - too short: %s\n", infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
if (memcmp(indata + header->header_size, "PE\0\0", 4)) {
|
|
printf("Unrecognized DOS file type: %s\n", infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
/* Magic field identifies the state of the image file. The most common number is
|
|
* 0x10B, which identifies it as a normal executable file,
|
|
* 0x20B identifies it as a PE32+ executable,
|
|
* 0x107 identifies it as a ROM image (not supported) */
|
|
header->magic = GET_UINT16_LE(indata + header->header_size + 24);
|
|
if (header->magic == 0x20b) {
|
|
header->pe32plus = 1;
|
|
} else if (header->magic == 0x10b) {
|
|
header->pe32plus = 0;
|
|
} else {
|
|
printf("Corrupt PE file - found unknown magic %04X: %s\n", header->magic, infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
/* The image file checksum */
|
|
header->pe_checksum = GET_UINT32_LE(indata + header->header_size + 88);
|
|
/* NumberOfRvaAndSizes field specifies the number of data-directory entries
|
|
* in the remainder of the optional header. Each describes a location and size. */
|
|
header->nrvas = GET_UINT32_LE(indata + header->header_size + 116 + header->pe32plus * 16);
|
|
if (header->nrvas < 5) {
|
|
printf("Can not handle PE files without certificate table resource: %s\n", infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
/* Certificate Table field specifies the attribute certificate table address (4 bytes) and size (4 bytes) */
|
|
header->sigpos = GET_UINT32_LE(indata + header->header_size + 152 + header->pe32plus * 16);
|
|
header->siglen = GET_UINT32_LE(indata + header->header_size + 152 + header->pe32plus * 16 + 4);
|
|
|
|
/* Since fix for MS Bulletin MS12-024 we can really assume
|
|
that signature should be last part of file */
|
|
if ((header->sigpos > 0 && header->sigpos < filesize && header->sigpos + header->siglen != filesize)
|
|
|| (header->sigpos >= filesize)) {
|
|
printf("Corrupt PE file - current signature not at end of file: %s\n", infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
if ((header->sigpos > 0 && header->siglen == 0) || (header->sigpos == 0 && header->siglen > 0)) {
|
|
printf("Corrupt signature\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int pe_modify_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata)
|
|
{
|
|
size_t i, len, written;
|
|
char *buf;
|
|
|
|
i = len = header->header_size + 88;
|
|
if (!BIO_write_ex(hash, indata, len, &written) || written != len)
|
|
return 0; /* FAILED */
|
|
buf = OPENSSL_malloc(SIZE_64K);
|
|
memset(buf, 0, 4);
|
|
BIO_write(outdata, buf, 4); /* zero out checksum */
|
|
i += 4;
|
|
len = 60 + header->pe32plus * 16;
|
|
if (!BIO_write_ex(hash, indata + i, len, &written) || written != len) {
|
|
OPENSSL_free(buf);
|
|
return 0; /* FAILED */
|
|
}
|
|
i += 60 + header->pe32plus * 16;
|
|
memset(buf, 0, 8);
|
|
BIO_write(outdata, buf, 8); /* zero out sigtable offset + pos */
|
|
i += 8;
|
|
len = header->fileend - i;
|
|
while (len > 0) {
|
|
if (!BIO_write_ex(hash, indata + i, len, &written)) {
|
|
OPENSSL_free(buf);
|
|
return 0; /* FAILED */
|
|
}
|
|
len -= written;
|
|
i += written;
|
|
}
|
|
/* pad (with 0's) pe file to 8 byte boundary */
|
|
len = 8 - header->fileend % 8;
|
|
if (len != 8) {
|
|
memset(buf, 0, len);
|
|
if (!BIO_write_ex(hash, buf, len, &written) || written != len) {
|
|
OPENSSL_free(buf);
|
|
return 0; /* FAILED */
|
|
}
|
|
header->fileend += (uint32_t)len;
|
|
}
|
|
OPENSSL_free(buf);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* CAB file support
|
|
* https://www.file-recovery.com/cab-signature-format.htm
|
|
*/
|
|
|
|
static int cab_verify_header(char *indata, char *infile, uint32_t filesize, FILE_HEADER *header)
|
|
{
|
|
uint32_t reserved;
|
|
|
|
if (filesize < 44) {
|
|
printf("Corrupt cab file - too short: %s\n", infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
header->fileend = filesize;
|
|
reserved = GET_UINT32_LE(indata + 4);
|
|
if (reserved) {
|
|
printf("Reserved1: 0x%08X\n", reserved);
|
|
return 0; /* FAILED */
|
|
}
|
|
/* flags specify bit-mapped values that indicate the presence of optional data */
|
|
header->flags = GET_UINT16_LE(indata + 30);
|
|
#if 1
|
|
if (header->flags & FLAG_PREV_CABINET) {
|
|
/* FLAG_NEXT_CABINET works */
|
|
printf("Multivolume cabinet file is unsupported: flags 0x%04X\n", header->flags);
|
|
return 0; /* FAILED */
|
|
}
|
|
#endif
|
|
if (header->flags & FLAG_RESERVE_PRESENT) {
|
|
/*
|
|
* Additional headers is located at offset 36 (cbCFHeader, cbCFFolder, cbCFData);
|
|
* size of header (4 bytes, little-endian order) must be 20 (checkpoint).
|
|
*/
|
|
header->header_size = GET_UINT32_LE(indata + 36);
|
|
if (header->header_size != 20) {
|
|
printf("Additional header size: 0x%08X\n", header->header_size);
|
|
return 0; /* FAILED */
|
|
}
|
|
reserved = GET_UINT32_LE(indata + 40);
|
|
if (reserved != 0x00100000) {
|
|
printf("abReserved: 0x%08X\n", reserved);
|
|
return 0; /* FAILED */
|
|
}
|
|
/*
|
|
* File size is defined at offset 8, however if additional header exists, this size is not valid.
|
|
* sigpos - additional data offset is located at offset 44 (from file beginning)
|
|
* and consist of 4 bytes (little-endian order)
|
|
* siglen - additional data size is located at offset 48 (from file beginning)
|
|
* and consist of 4 bytes (little-endian order)
|
|
* If there are additional headers, size of the CAB archive file is calcualted
|
|
* as additional data offset plus additional data size.
|
|
*/
|
|
header->sigpos = GET_UINT32_LE(indata + 44);
|
|
header->siglen = GET_UINT32_LE(indata + 48);
|
|
if ((header->sigpos < filesize && header->sigpos + header->siglen != filesize)
|
|
|| (header->sigpos >= filesize)) {
|
|
printf("Additional data offset:\t%u bytes\nAdditional data size:\t%u bytes\n",
|
|
header->sigpos, header->siglen);
|
|
printf("File size:\t\t%u bytes\n", filesize);
|
|
return 0; /* FAILED */
|
|
}
|
|
if ((header->sigpos > 0 && header->siglen == 0) || (header->sigpos == 0 && header->siglen > 0)) {
|
|
printf("Corrupt signature\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/* Compute a message digest value of the signed or unsigned CAB file */
|
|
static int cab_calc_digest(char *indata, int mdtype, u_char *mdbuf, FILE_HEADER *header)
|
|
{
|
|
uint32_t idx = 0, fileend, coffFiles;
|
|
const EVP_MD *md = EVP_get_digestbynid(mdtype);
|
|
BIO *bhash = BIO_new(BIO_f_md());
|
|
|
|
if (!BIO_set_md(bhash, md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(bhash);
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_push(bhash, BIO_new(BIO_s_null()));
|
|
|
|
if (header->sigpos)
|
|
fileend = header->sigpos;
|
|
else
|
|
fileend = header->fileend;
|
|
|
|
/* u1 signature[4] 4643534D MSCF: 0-3 */
|
|
BIO_write(bhash, indata, 4);
|
|
/* u4 reserved1 00000000: 4-7 skipped */
|
|
if (header->sigpos) {
|
|
uint16_t nfolders, flags;
|
|
uint32_t pos = 60;
|
|
/*
|
|
* u4 cbCabinet - size of this cabinet file in bytes: 8-11
|
|
* u4 reserved2 00000000: 12-15
|
|
*/
|
|
BIO_write(bhash, indata + 8, 8);
|
|
/* u4 coffFiles - offset of the first CFFILE entry: 16-19 */
|
|
coffFiles = GET_UINT32_LE(indata + 16);
|
|
BIO_write(bhash, indata + 16, 4);
|
|
/*
|
|
* u4 reserved3 00000000: 20-23
|
|
* u1 versionMinor 03: 24
|
|
* u1 versionMajor 01: 25
|
|
*/
|
|
BIO_write(bhash, indata + 20, 6);
|
|
/* u2 cFolders - number of CFFOLDER entries in this cabinet: 26-27 */
|
|
nfolders = GET_UINT16_LE(indata + 26);
|
|
BIO_write(bhash, indata + 26, 2);
|
|
/* u2 cFiles - number of CFFILE entries in this cabinet: 28-29 */
|
|
BIO_write(bhash, indata + 28, 2);
|
|
/* u2 flags: 30-31 */
|
|
flags = GET_UINT16_LE(indata + 30);
|
|
BIO_write(bhash, indata + 30, 2);
|
|
/* u2 setID must be the same for all cabinets in a set: 32-33 */
|
|
BIO_write(bhash, indata + 32, 2);
|
|
/*
|
|
* u2 iCabinet - number of this cabinet file in a set: 34-35 skipped
|
|
* u2 cbCFHeader: 36-37 skipped
|
|
* u1 cbCFFolder: 38 skipped
|
|
* u1 cbCFData: 39 skipped
|
|
* u22 abReserve: 40-55 skipped
|
|
* - Additional data offset: 44-47 skipped
|
|
* - Additional data size: 48-51 skipped
|
|
*/
|
|
/* u22 abReserve: 56-59 */
|
|
BIO_write(bhash, indata + 56, 4);
|
|
idx += 60;
|
|
/* TODO */
|
|
if (flags & FLAG_PREV_CABINET) {
|
|
uint8_t byte;
|
|
/* szCabinetPrev */
|
|
do {
|
|
byte = GET_UINT8_LE(indata + idx);
|
|
BIO_write(bhash, indata + idx, 1);
|
|
pos++;
|
|
idx++;
|
|
} while (byte && pos < fileend);
|
|
/* szDiskPrev */
|
|
do {
|
|
byte = GET_UINT8_LE(indata + idx);
|
|
BIO_write(bhash, indata + idx, 1);
|
|
pos++;
|
|
idx++;
|
|
} while (byte && pos < fileend);
|
|
}
|
|
if (flags & FLAG_NEXT_CABINET) {
|
|
uint8_t byte;
|
|
/* szCabinetNext */
|
|
do {
|
|
byte = GET_UINT8_LE(indata + idx);
|
|
BIO_write(bhash, indata + idx, 1);
|
|
pos++;
|
|
idx++;
|
|
} while (byte && pos < fileend);
|
|
/* szDiskNext */
|
|
do {
|
|
byte = GET_UINT8_LE(indata + idx);
|
|
BIO_write(bhash, indata + idx, 1);
|
|
pos++;
|
|
idx++;
|
|
} while (byte && pos < fileend);
|
|
}
|
|
/*
|
|
* (u8 * cFolders) CFFOLDER - structure contains information about
|
|
* one of the folders or partial folders stored in this cabinet file
|
|
*/
|
|
while (nfolders) {
|
|
BIO_write(bhash, indata + idx, 8);
|
|
idx += 8;
|
|
nfolders--;
|
|
}
|
|
} else {
|
|
/* read what's left of the unsigned CAB file */
|
|
coffFiles = 8;
|
|
}
|
|
/* (variable) ab - the compressed data bytes */
|
|
if (!bio_hash_data(indata, bhash, idx, coffFiles, fileend)) {
|
|
printf("Unable to calculate digest\n");
|
|
BIO_free_all(bhash);
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_gets(bhash, (char*)mdbuf, EVP_MD_size(md));
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int cab_verify_pkcs7(SIGNATURE *signature, char *indata, FILE_HEADER *header,
|
|
GLOBAL_OPTIONS *options)
|
|
{
|
|
int ret = 1, mdtype = -1;
|
|
u_char mdbuf[EVP_MAX_MD_SIZE];
|
|
u_char cmdbuf[EVP_MAX_MD_SIZE];
|
|
|
|
if (is_content_type(signature->p7, SPC_INDIRECT_DATA_OBJID)) {
|
|
ASN1_STRING *content_val = signature->p7->d.sign->contents->d.other->value.sequence;
|
|
const u_char *p = content_val->data;
|
|
SpcIndirectDataContent *idc = d2i_SpcIndirectDataContent(NULL, &p, content_val->length);
|
|
if (idc) {
|
|
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
|
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
|
memcpy(mdbuf, idc->messageDigest->digest->data, (size_t)idc->messageDigest->digest->length);
|
|
}
|
|
SpcIndirectDataContent_free(idc);
|
|
}
|
|
}
|
|
if (mdtype == -1) {
|
|
printf("Failed to extract current message digest\n\n");
|
|
goto out;
|
|
}
|
|
if (!cab_calc_digest(indata, mdtype, cmdbuf, header)) {
|
|
printf("Failed to calculate message digest\n\n");
|
|
goto out;
|
|
}
|
|
if (!compare_digests(mdbuf, cmdbuf, mdtype)) {
|
|
printf("Signature verification: failed\n\n");
|
|
goto out;
|
|
}
|
|
|
|
ret = verify_signature(signature, options);
|
|
out:
|
|
if (ret)
|
|
ERR_print_errors_fp(stdout);
|
|
return ret;
|
|
}
|
|
|
|
static PKCS7 *extract_existing_pkcs7(char *indata, FILE_HEADER *header)
|
|
{
|
|
PKCS7 *p7 = NULL;
|
|
const u_char *blob;
|
|
|
|
blob = (u_char *)indata + header->sigpos;
|
|
p7 = d2i_PKCS7(NULL, &blob, header->siglen);
|
|
return p7;
|
|
}
|
|
|
|
static int cab_verify_file(char *indata, FILE_HEADER *header, GLOBAL_OPTIONS *options)
|
|
{
|
|
int i, ret = 1;
|
|
PKCS7 *p7;
|
|
STACK_OF(SIGNATURE) *signatures = sk_SIGNATURE_new_null();
|
|
|
|
if (header->header_size != 20) {
|
|
printf("No signature found\n\n");
|
|
goto out;
|
|
}
|
|
if (header->sigpos == 0 || header->siglen == 0 || header->sigpos > header->fileend) {
|
|
printf("No signature found\n\n");
|
|
goto out;
|
|
}
|
|
p7 = extract_existing_pkcs7(indata, header);
|
|
if (!p7) {
|
|
printf("Failed to extract PKCS7 data\n\n");
|
|
goto out;
|
|
}
|
|
if (!append_signature_list(&signatures, p7, 1)) {
|
|
printf("Failed to create signature list\n\n");
|
|
PKCS7_free(p7);
|
|
goto out;
|
|
}
|
|
for (i = 0; i < sk_SIGNATURE_num(signatures); i++) {
|
|
SIGNATURE *signature = sk_SIGNATURE_value(signatures, i);
|
|
printf("Signature Index: %d %s\n", i, i==0 ? " (Primary Signature)" : "");
|
|
ret &= cab_verify_pkcs7(signature, indata, header, options);
|
|
}
|
|
printf("Number of verified signatures: %d\n", i);
|
|
out:
|
|
sk_SIGNATURE_pop_free(signatures, signature_free);
|
|
return ret;
|
|
}
|
|
|
|
static int cab_extract_file(char *indata, FILE_HEADER *header, BIO *outdata, int output_pkcs7)
|
|
{
|
|
int ret = 0;
|
|
PKCS7 *sig;
|
|
size_t written;
|
|
|
|
(void)BIO_reset(outdata);
|
|
if (output_pkcs7) {
|
|
sig = extract_existing_pkcs7(indata, header);
|
|
if (!sig) {
|
|
printf("Unable to extract existing signature\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
ret = !PEM_write_bio_PKCS7(outdata, sig);
|
|
PKCS7_free(sig);
|
|
} else
|
|
if (!BIO_write_ex(outdata, indata + header->sigpos, header->siglen, &written) \
|
|
|| written != header->siglen)
|
|
ret = 1; /* FAILED */
|
|
return ret;
|
|
}
|
|
|
|
static void cab_optional_names(uint16_t flags, char *indata, BIO *outdata, size_t *len)
|
|
{
|
|
size_t i = *len;
|
|
|
|
/* TODO */
|
|
if (flags & FLAG_PREV_CABINET) {
|
|
/* szCabinetPrev */
|
|
while (GET_UINT8_LE(indata+i)) {
|
|
BIO_write(outdata, indata+i, 1);
|
|
i++;
|
|
}
|
|
BIO_write(outdata, indata+i, 1);
|
|
i++;
|
|
/* szDiskPrev */
|
|
while (GET_UINT8_LE(indata+i)) {
|
|
BIO_write(outdata, indata+i, 1);
|
|
i++;
|
|
}
|
|
BIO_write(outdata, indata+i, 1);
|
|
i++;
|
|
}
|
|
if (flags & FLAG_NEXT_CABINET) {
|
|
/* szCabinetNext */
|
|
while (GET_UINT8_LE(indata+i)) {
|
|
BIO_write(outdata, indata+i, 1);
|
|
i++;
|
|
}
|
|
BIO_write(outdata, indata+i, 1);
|
|
i++;
|
|
/* szDiskNext */
|
|
while (GET_UINT8_LE(indata+i)) {
|
|
BIO_write(outdata, indata+i, 1);
|
|
i++;
|
|
}
|
|
BIO_write(outdata, indata+i, 1);
|
|
i++;
|
|
}
|
|
*len = i;
|
|
}
|
|
|
|
static int cab_remove_file(char *indata, FILE_HEADER *header, uint32_t filesize, BIO *outdata)
|
|
{
|
|
size_t i, written, len;
|
|
uint32_t tmp;
|
|
uint16_t nfolders, flags;
|
|
char *buf = OPENSSL_malloc(SIZE_64K);
|
|
|
|
/*
|
|
* u1 signature[4] 4643534D MSCF: 0-3
|
|
* u4 reserved1 00000000: 4-7
|
|
*/
|
|
BIO_write(outdata, indata, 8);
|
|
/* u4 cbCabinet - size of this cabinet file in bytes: 8-11 */
|
|
tmp = GET_UINT32_LE(indata+8) - 24;
|
|
PUT_UINT32_LE(tmp, buf);
|
|
BIO_write(outdata, buf, 4);
|
|
/* u4 reserved2 00000000: 12-15 */
|
|
BIO_write(outdata, indata+12, 4);
|
|
/* u4 coffFiles - offset of the first CFFILE entry: 16-19 */
|
|
tmp = GET_UINT32_LE(indata+16) - 24;
|
|
PUT_UINT32_LE(tmp, buf);
|
|
BIO_write(outdata, buf, 4);
|
|
/*
|
|
* u4 reserved3 00000000: 20-23
|
|
* u1 versionMinor 03: 24
|
|
* u1 versionMajor 01: 25
|
|
* u2 cFolders - number of CFFOLDER entries in this cabinet: 26-27
|
|
* u2 cFiles - number of CFFILE entries in this cabinet: 28-29
|
|
*/
|
|
BIO_write(outdata, indata+20, 10);
|
|
/* u2 flags: 30-31 */
|
|
flags = GET_UINT16_LE(indata+30);
|
|
/* coverity[result_independent_of_operands] only least significant byte is affected */
|
|
PUT_UINT16_LE(flags & (FLAG_PREV_CABINET | FLAG_NEXT_CABINET), buf);
|
|
BIO_write(outdata, buf, 2);
|
|
/*
|
|
* u2 setID must be the same for all cabinets in a set: 32-33
|
|
* u2 iCabinet - number of this cabinet file in a set: 34-35
|
|
*/
|
|
BIO_write(outdata, indata+32, 4);
|
|
i = 60;
|
|
cab_optional_names(flags, indata, outdata, &i);
|
|
/*
|
|
* (u8 * cFolders) CFFOLDER - structure contains information about
|
|
* one of the folders or partial folders stored in this cabinet file
|
|
*/
|
|
nfolders = GET_UINT16_LE(indata + 26);
|
|
while (nfolders) {
|
|
tmp = GET_UINT32_LE(indata+i);
|
|
tmp -= 24;
|
|
PUT_UINT32_LE(tmp, buf);
|
|
BIO_write(outdata, buf, 4);
|
|
BIO_write(outdata, indata+i+4, 4);
|
|
i+=8;
|
|
nfolders--;
|
|
}
|
|
OPENSSL_free(buf);
|
|
/* Write what's left - the compressed data bytes */
|
|
len = filesize - header->siglen - i;
|
|
while (len > 0) {
|
|
if (!BIO_write_ex(outdata, indata + i, len, &written))
|
|
return 1; /* FAILED */
|
|
len -= written;
|
|
i += written;
|
|
}
|
|
return 0; /* OK */
|
|
}
|
|
|
|
static int cab_modify_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata)
|
|
{
|
|
size_t i, written, len;
|
|
uint16_t nfolders, flags;
|
|
u_char buf[] = {0x00, 0x00};
|
|
|
|
/* u1 signature[4] 4643534D MSCF: 0-3 */
|
|
BIO_write(hash, indata, 4);
|
|
/* u4 reserved1 00000000: 4-7 */
|
|
BIO_write(outdata, indata+4, 4);
|
|
/*
|
|
* u4 cbCabinet - size of this cabinet file in bytes: 8-11
|
|
* u4 reserved2 00000000: 12-15
|
|
* u4 coffFiles - offset of the first CFFILE entry: 16-19
|
|
* u4 reserved3 00000000: 20-23
|
|
* u1 versionMinor 03: 24
|
|
* u1 versionMajor 01: 25
|
|
* u2 cFolders - number of CFFOLDER entries in this cabinet: 26-27
|
|
* u2 cFiles - number of CFFILE entries in this cabinet: 28-29
|
|
*/
|
|
BIO_write(hash, indata+8, 22);
|
|
/* u2 flags: 30-31 */
|
|
flags = GET_UINT16_LE(indata+30);
|
|
PUT_UINT16_LE(flags, buf);
|
|
BIO_write(hash, buf, 2);
|
|
/* u2 setID must be the same for all cabinets in a set: 32-33 */
|
|
BIO_write(hash, indata+32, 2);
|
|
/*
|
|
* u2 iCabinet - number of this cabinet file in a set: 34-35
|
|
* u2 cbCFHeader: 36-37
|
|
* u1 cbCFFolder: 38
|
|
* u1 cbCFData: 39
|
|
* u16 abReserve: 40-55
|
|
* - Additional data offset: 44-47
|
|
* - Additional data size: 48-51
|
|
*/
|
|
BIO_write(outdata, indata+34, 22);
|
|
/* u4 abReserve: 56-59 */
|
|
BIO_write(hash, indata+56, 4);
|
|
|
|
i = 60;
|
|
cab_optional_names(flags, indata, hash, &i);
|
|
/*
|
|
* (u8 * cFolders) CFFOLDER - structure contains information about
|
|
* one of the folders or partial folders stored in this cabinet file
|
|
*/
|
|
nfolders = GET_UINT16_LE(indata + 26);
|
|
while (nfolders) {
|
|
BIO_write(hash, indata + i, 8);
|
|
i += 8;
|
|
nfolders--;
|
|
}
|
|
/* Write what's left - the compressed data bytes */
|
|
len = header->sigpos - i;
|
|
while (len > 0) {
|
|
if (!BIO_write_ex(hash, indata + i, len, &written))
|
|
return 0; /* FAILED */
|
|
len -= written;
|
|
i += written;
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int cab_add_header(char *indata, FILE_HEADER *header, BIO *hash, BIO *outdata)
|
|
{
|
|
size_t i, written, len;
|
|
uint32_t tmp;
|
|
uint16_t nfolders, flags;
|
|
u_char cabsigned[] = {
|
|
0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00,
|
|
0xde, 0xad, 0xbe, 0xef, /* size of cab file */
|
|
0xde, 0xad, 0xbe, 0xef, /* size of asn1 blob */
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
|
};
|
|
char *buf = OPENSSL_malloc(SIZE_64K);
|
|
memset(buf, 0, SIZE_64K);
|
|
|
|
/* u1 signature[4] 4643534D MSCF: 0-3 */
|
|
BIO_write(hash, indata, 4);
|
|
/* u4 reserved1 00000000: 4-7 */
|
|
BIO_write(outdata, indata+4, 4);
|
|
/* u4 cbCabinet - size of this cabinet file in bytes: 8-11 */
|
|
tmp = GET_UINT32_LE(indata+8) + 24;
|
|
PUT_UINT32_LE(tmp, buf);
|
|
BIO_write(hash, buf, 4);
|
|
/* u4 reserved2 00000000: 12-15 */
|
|
BIO_write(hash, indata+12, 4);
|
|
/* u4 coffFiles - offset of the first CFFILE entry: 16-19 */
|
|
tmp = GET_UINT32_LE(indata+16) + 24;
|
|
PUT_UINT32_LE(tmp, buf+4);
|
|
BIO_write(hash, buf+4, 4);
|
|
/*
|
|
* u4 reserved3 00000000: 20-23
|
|
* u1 versionMinor 03: 24
|
|
* u1 versionMajor 01: 25
|
|
* u2 cFolders - number of CFFOLDER entries in this cabinet: 26-27
|
|
* u2 cFiles - number of CFFILE entries in this cabinet: 28-29
|
|
*/
|
|
memcpy(buf+4, indata+20, 10);
|
|
flags = GET_UINT16_LE(indata+30);
|
|
buf[4+10] = (char)flags | FLAG_RESERVE_PRESENT;
|
|
/* u2 setID must be the same for all cabinets in a set: 32-33 */
|
|
memcpy(buf+16, indata+32, 2);
|
|
BIO_write(hash, buf+4, 14);
|
|
/* u2 iCabinet - number of this cabinet file in a set: 34-35 */
|
|
BIO_write(outdata, indata+34, 2);
|
|
memcpy(cabsigned+8, buf, 4);
|
|
BIO_write(outdata, cabsigned, 20);
|
|
BIO_write(hash, cabsigned+20, 4);
|
|
|
|
i = 36;
|
|
cab_optional_names(flags, indata, hash, &i);
|
|
/*
|
|
* (u8 * cFolders) CFFOLDER - structure contains information about
|
|
* one of the folders or partial folders stored in this cabinet file
|
|
*/
|
|
nfolders = GET_UINT16_LE(indata + 26);
|
|
while (nfolders) {
|
|
tmp = GET_UINT32_LE(indata + i);
|
|
tmp += 24;
|
|
PUT_UINT32_LE(tmp, buf);
|
|
BIO_write(hash, buf, 4);
|
|
BIO_write(hash, indata + i + 4, 4);
|
|
i += 8;
|
|
nfolders--;
|
|
}
|
|
OPENSSL_free(buf);
|
|
/* Write what's left - the compressed data bytes */
|
|
len = header->fileend - i;
|
|
while (len > 0) {
|
|
if (!BIO_write_ex(hash, indata + i, len, &written))
|
|
return 0; /* FAILED */
|
|
len -= written;
|
|
i += written;
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* CAT file support
|
|
* Catalog files are a bit odd, in that they are only a PKCS7 blob.
|
|
*/
|
|
|
|
static PKCS7 *cat_extract_existing_pkcs7(char *indata, FILE_HEADER *header)
|
|
{
|
|
PKCS7 *p7 = NULL;
|
|
const u_char *blob;
|
|
|
|
blob = (u_char *)indata;
|
|
p7 = d2i_PKCS7(NULL, &blob, header->fileend);
|
|
return p7;
|
|
}
|
|
|
|
static int cat_verify_header(char *indata, uint32_t filesize, FILE_HEADER *header)
|
|
{
|
|
PKCS7 *p7;
|
|
PKCS7_SIGNER_INFO *si;
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info;
|
|
|
|
p7 = cat_extract_existing_pkcs7(indata, header);
|
|
if (!p7) {
|
|
return 0; /* FAILED */
|
|
}
|
|
if (!PKCS7_type_is_signed(p7)) {
|
|
PKCS7_free(p7);
|
|
return 0; /* FAILED */
|
|
}
|
|
signer_info = PKCS7_get_signer_info(p7);
|
|
if (!signer_info)
|
|
return 0; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si) {
|
|
/* catalog file is unsigned */
|
|
header->sigpos = filesize;
|
|
}
|
|
|
|
header->fileend = filesize;
|
|
PKCS7_free(p7);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* If the attribute type is SPC_INDIRECT_DATA_OBJID, get a digest algorithm and a message digest
|
|
* from the content and compare the message digest against the computed message digest of the file
|
|
*/
|
|
static int cat_verify_member(CatalogAuthAttr *attribute, char *indata, FILE_HEADER *header,
|
|
file_type_t filetype)
|
|
{
|
|
int ret = 1;
|
|
u_char *ph = NULL;
|
|
ASN1_OBJECT *indir_objid = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1);
|
|
|
|
if (attribute && !OBJ_cmp(attribute->type, indir_objid)) {
|
|
int mdlen, mdtype = -1, phtype = -1;
|
|
u_char mdbuf[EVP_MAX_MD_SIZE];
|
|
u_char cmdbuf[EVP_MAX_MD_SIZE];
|
|
int phlen = 0;
|
|
ASN1_TYPE *content;
|
|
SpcIndirectDataContent *idc;
|
|
|
|
ASN1_STRING *content_val = attribute->contents->value.sequence;
|
|
const u_char *p = content_val->data;
|
|
STACK_OF(ASN1_TYPE) *contents = d2i_ASN1_SET_ANY(NULL, &p, content_val->length);
|
|
if (contents == NULL)
|
|
goto out;
|
|
|
|
content = sk_ASN1_TYPE_value(contents, 0);
|
|
sk_ASN1_TYPE_free(contents);
|
|
content_val = content->value.sequence;
|
|
p = content_val->data;
|
|
idc = d2i_SpcIndirectDataContent(NULL, &p, content_val->length);
|
|
if (idc) {
|
|
if (header->sigpos) {
|
|
/* try to get a page hash if the file is signed */
|
|
if (!pe_extract_page_hash(idc->data, &ph, &phlen, &phtype)) {
|
|
printf("Failed to extract a page hash\n\n");
|
|
SpcIndirectDataContent_free(idc);
|
|
goto out;
|
|
}
|
|
}
|
|
if (idc->messageDigest && idc->messageDigest->digest && idc->messageDigest->digestAlgorithm) {
|
|
/* get a digest algorithm a message digest of the file from the content */
|
|
mdtype = OBJ_obj2nid(idc->messageDigest->digestAlgorithm->algorithm);
|
|
memcpy(mdbuf, idc->messageDigest->digest->data, (size_t)idc->messageDigest->digest->length);
|
|
}
|
|
SpcIndirectDataContent_free(idc);
|
|
}
|
|
ASN1_TYPE_free(content);
|
|
if (mdtype == -1) {
|
|
printf("Failed to extract current message digest\n\n");
|
|
goto out;
|
|
}
|
|
/* reset calculated message digest */
|
|
memset(cmdbuf, 0, EVP_MAX_MD_SIZE);
|
|
/* compute a message digest of the input file */
|
|
switch (filetype) {
|
|
case FILE_TYPE_CAB:
|
|
if (cab_calc_digest(indata, mdtype, cmdbuf, header))
|
|
goto out;
|
|
break;
|
|
case FILE_TYPE_PE:
|
|
if (!pe_calc_digest(indata, mdtype, cmdbuf, header))
|
|
goto out;
|
|
break;
|
|
case FILE_TYPE_MSI:
|
|
if (!msi_calc_digest(indata, mdtype, cmdbuf, header))
|
|
goto out;
|
|
break;
|
|
default:
|
|
printf("Unsupported input file type.\n");
|
|
goto out;
|
|
}
|
|
mdlen = EVP_MD_size(EVP_get_digestbynid(mdtype));
|
|
if (!memcmp(mdbuf, cmdbuf, (size_t)mdlen)) {
|
|
printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype));
|
|
print_hash("Current message digest ", "", mdbuf, mdlen);
|
|
print_hash("Calculated message digest ", "\n", cmdbuf, mdlen);
|
|
} else {
|
|
goto out;
|
|
}
|
|
if (phlen > 0 && !pe_page_hash(indata, header, ph, phlen, phtype)) {
|
|
printf("Signature verification: failed\n\n");
|
|
goto out;
|
|
}
|
|
ret = 0; /* OK */
|
|
}
|
|
out:
|
|
ASN1_OBJECT_free(indir_objid);
|
|
OPENSSL_free(ph);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* If the message digest of the input file is found in the catalog file,
|
|
* or the input file itself is a catalog file, verify the signature.
|
|
*/
|
|
static int cat_verify_pkcs7(SIGNATURE *signature, char *indata, FILE_HEADER *header,
|
|
file_type_t filetype, GLOBAL_OPTIONS *options)
|
|
{
|
|
int ret = 1, ok = 0;
|
|
|
|
/* A CTL (MS_CTL_OBJID) is a list of hashes of certificates or a list of hashes files */
|
|
if (options->catalog && is_content_type(signature->p7, MS_CTL_OBJID)) {
|
|
ASN1_STRING *content_val = signature->p7->d.sign->contents->d.other->value.sequence;
|
|
const u_char *p = content_val->data;
|
|
MsCtlContent *ctlc = d2i_MsCtlContent(NULL, &p, content_val->length);
|
|
if (ctlc) {
|
|
int i, j;
|
|
/* find the message digest of the file for all files added to the catalog file */
|
|
for (i = 0; i < sk_CatalogInfo_num(ctlc->header_attributes); i++) {
|
|
STACK_OF(CatalogAuthAttr) *attributes;
|
|
CatalogInfo *header_attr = sk_CatalogInfo_value(ctlc->header_attributes, i);
|
|
if (header_attr == NULL)
|
|
continue;
|
|
attributes = header_attr->attributes;
|
|
for (j = 0; j < sk_CatalogAuthAttr_num(attributes); j++) {
|
|
CatalogAuthAttr *attribute = sk_CatalogAuthAttr_value(attributes, j);
|
|
if (!cat_verify_member(attribute, indata, header, filetype)) {
|
|
/* computed message digest of the file is found in the catalog file */
|
|
ok = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (ok) {
|
|
break;
|
|
}
|
|
}
|
|
MsCtlContent_free(ctlc);
|
|
}
|
|
} else {
|
|
/* the input file is a catalog file */
|
|
ok = 1;
|
|
}
|
|
if (ok) {
|
|
/* a message digest value of the catalog file is checked by PKCS7_verify() */
|
|
ret = verify_signature(signature, options);
|
|
} else {
|
|
printf("File not found in the specified catalog.\n\n");
|
|
}
|
|
if (ret)
|
|
ERR_print_errors_fp(stdout);
|
|
return ret;
|
|
}
|
|
|
|
static int cat_verify_file(char *catdata, FILE_HEADER *catheader,
|
|
char *indata, FILE_HEADER *header, file_type_t filetype, GLOBAL_OPTIONS *options)
|
|
{
|
|
int i, ret = 1;
|
|
PKCS7 *p7;
|
|
STACK_OF(SIGNATURE) *signatures = sk_SIGNATURE_new_null();
|
|
|
|
if (header->sigpos == header->fileend ||
|
|
(options->catalog && (catheader->sigpos == catheader->fileend))) {
|
|
printf("No signature found\n\n");
|
|
goto out;
|
|
}
|
|
if (options->catalog)
|
|
p7 = cat_extract_existing_pkcs7(catdata, catheader);
|
|
else
|
|
p7 = cat_extract_existing_pkcs7(indata, header);
|
|
if (!append_signature_list(&signatures, p7, 1)) {
|
|
printf("Failed to create signature list\n\n");
|
|
PKCS7_free(p7);
|
|
goto out;
|
|
}
|
|
for (i = 0; i < sk_SIGNATURE_num(signatures); i++) {
|
|
SIGNATURE *signature = sk_SIGNATURE_value(signatures, i);
|
|
if (!options->catalog)
|
|
printf("Signature Index: %d %s\n", i, i==0 ? " (Primary Signature)" : "");
|
|
ret &= cat_verify_pkcs7(signature, indata, header, filetype, options);
|
|
}
|
|
printf("Number of verified signatures: %d\n", i);
|
|
out:
|
|
sk_SIGNATURE_pop_free(signatures, signature_free);
|
|
return ret;
|
|
}
|
|
|
|
static void add_jp_attribute(PKCS7_SIGNER_INFO *si, int jp)
|
|
{
|
|
ASN1_STRING *astr;
|
|
const u_char *attrs = NULL;
|
|
|
|
switch (jp) {
|
|
case 0:
|
|
attrs = java_attrs_low;
|
|
break;
|
|
case 1:
|
|
/* XXX */
|
|
case 2:
|
|
/* XXX */
|
|
default:
|
|
break;
|
|
}
|
|
if (attrs) {
|
|
astr = ASN1_STRING_new();
|
|
ASN1_STRING_set(astr, attrs, sizeof java_attrs_low);
|
|
PKCS7_add_signed_attribute(si, OBJ_txt2nid(MS_JAVA_SOMETHING),
|
|
V_ASN1_SEQUENCE, astr);
|
|
}
|
|
}
|
|
|
|
static int add_purpose_attribute(PKCS7_SIGNER_INFO *si, int comm)
|
|
{
|
|
ASN1_STRING *astr;
|
|
|
|
astr = ASN1_STRING_new();
|
|
if (comm) {
|
|
ASN1_STRING_set(astr, purpose_comm, sizeof purpose_comm);
|
|
} else {
|
|
ASN1_STRING_set(astr, purpose_ind, sizeof purpose_ind);
|
|
}
|
|
return PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_STATEMENT_TYPE_OBJID),
|
|
V_ASN1_SEQUENCE, astr);
|
|
}
|
|
|
|
static int add_opus_attribute(PKCS7_SIGNER_INFO *si, char *desc, char *url)
|
|
{
|
|
SpcSpOpusInfo *opus;
|
|
ASN1_STRING *astr;
|
|
int len;
|
|
u_char *p = NULL;
|
|
|
|
opus = createOpus(desc, url);
|
|
if ((len = i2d_SpcSpOpusInfo(opus, NULL)) <= 0 || (p = OPENSSL_malloc((size_t)len)) == NULL) {
|
|
SpcSpOpusInfo_free(opus);
|
|
return 0; /* FAILED */
|
|
}
|
|
i2d_SpcSpOpusInfo(opus, &p);
|
|
p -= len;
|
|
astr = ASN1_STRING_new();
|
|
ASN1_STRING_set(astr, p, len);
|
|
OPENSSL_free(p);
|
|
SpcSpOpusInfo_free(opus);
|
|
return PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_SP_OPUS_INFO_OBJID),
|
|
V_ASN1_SEQUENCE, astr);
|
|
}
|
|
|
|
static PKCS7 *create_new_signature(file_type_t type,
|
|
GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams)
|
|
{
|
|
int i, signer = -1;
|
|
PKCS7 *sig;
|
|
PKCS7_SIGNER_INFO *si = NULL;
|
|
|
|
sig = PKCS7_new();
|
|
PKCS7_set_type(sig, NID_pkcs7_signed);
|
|
|
|
if (cparams->cert != NULL) {
|
|
/*
|
|
* the private key and corresponding certificate are parsed from the PKCS12
|
|
* structure or loaded from the security token, so we may omit to check
|
|
* the consistency of a private key with the public key in an X509 certificate
|
|
*/
|
|
si = PKCS7_add_signature(sig, cparams->cert, cparams->pkey, options->md);
|
|
if (si == NULL)
|
|
return NULL; /* FAILED */
|
|
} else {
|
|
/* find the signer's certificate located somewhere in the whole certificate chain */
|
|
for (i=0; i<sk_X509_num(cparams->certs); i++) {
|
|
X509 *signcert = sk_X509_value(cparams->certs, i);
|
|
if (X509_check_private_key(signcert, cparams->pkey)) {
|
|
si = PKCS7_add_signature(sig, signcert, cparams->pkey, options->md);
|
|
signer = i;
|
|
break;
|
|
}
|
|
}
|
|
if (si == NULL) {
|
|
printf("Failed to checking the consistency of a private key: %s\n", options->keyfile);
|
|
printf(" with a public key in any X509 certificate: %s\n\n", options->certfile);
|
|
return NULL; /* FAILED */
|
|
}
|
|
}
|
|
pkcs7_add_signing_time(si, options->time);
|
|
if (type == FILE_TYPE_CAT) {
|
|
PKCS7_add_signed_attribute(si, NID_pkcs9_contentType,
|
|
V_ASN1_OBJECT, OBJ_txt2obj(MS_CTL_OBJID, 1));
|
|
} else {
|
|
PKCS7_add_signed_attribute(si, NID_pkcs9_contentType,
|
|
V_ASN1_OBJECT, OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1));
|
|
}
|
|
|
|
if (type == FILE_TYPE_CAB && options->jp >= 0)
|
|
add_jp_attribute(si, options->jp);
|
|
|
|
if (!add_purpose_attribute(si, options->comm))
|
|
return NULL; /* FAILED */
|
|
|
|
if ((options->desc || options->url) &&
|
|
!add_opus_attribute(si, options->desc, options->url)) {
|
|
printf("Couldn't allocate memory for opus info\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
PKCS7_content_new(sig, NID_pkcs7_data);
|
|
|
|
/* add the signer's certificate */
|
|
if (cparams->cert != NULL)
|
|
PKCS7_add_certificate(sig, cparams->cert);
|
|
if (signer != -1)
|
|
PKCS7_add_certificate(sig, sk_X509_value(cparams->certs, signer));
|
|
|
|
/* add the certificate chain */
|
|
for (i=0; i<sk_X509_num(cparams->certs); i++) {
|
|
if (i == signer)
|
|
continue;
|
|
PKCS7_add_certificate(sig, sk_X509_value(cparams->certs, i));
|
|
}
|
|
/* add all cross certificates */
|
|
if (cparams->xcerts) {
|
|
for (i=0; i<sk_X509_num(cparams->xcerts); i++)
|
|
PKCS7_add_certificate(sig, sk_X509_value(cparams->xcerts, i));
|
|
}
|
|
/* add crls */
|
|
if (cparams->crls) {
|
|
for (i=0; i<sk_X509_CRL_num(cparams->crls); i++)
|
|
PKCS7_add_crl(sig, sk_X509_CRL_value(cparams->crls, i));
|
|
}
|
|
return sig; /* OK */
|
|
}
|
|
|
|
static int add_unauthenticated_blob(PKCS7 *sig)
|
|
{
|
|
PKCS7_SIGNER_INFO *si;
|
|
ASN1_STRING *astr;
|
|
u_char *p = NULL;
|
|
int nid, len = 1024+4;
|
|
/* Length data for ASN1 attribute plus prefix */
|
|
const char prefix[] = "\x0c\x82\x04\x00---BEGIN_BLOB---";
|
|
const char postfix[] = "---END_BLOB---";
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info = PKCS7_get_signer_info(sig);
|
|
|
|
if (!signer_info)
|
|
return 0; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(sig->d.sign->signer_info, 0);
|
|
if (!si)
|
|
return 0; /* FAILED */
|
|
if ((p = OPENSSL_malloc((size_t)len)) == NULL)
|
|
return 0; /* FAILED */
|
|
memset(p, 0, (size_t)len);
|
|
memcpy(p, prefix, sizeof prefix);
|
|
memcpy(p + len - sizeof postfix, postfix, sizeof postfix);
|
|
astr = ASN1_STRING_new();
|
|
ASN1_STRING_set(astr, p, len);
|
|
nid = OBJ_create(SPC_UNAUTHENTICATED_DATA_BLOB_OBJID,
|
|
"unauthenticatedData", "unauthenticatedData");
|
|
PKCS7_add_attribute(si, nid, V_ASN1_SEQUENCE, astr);
|
|
OPENSSL_free(p);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* Append signature to the outfile
|
|
*/
|
|
static int append_signature(PKCS7 *sig, PKCS7 *cursig, file_type_t type,
|
|
GLOBAL_OPTIONS *options, MSI_PARAMS *msiparams, int *padlen, int *len, BIO *outdata)
|
|
{
|
|
u_char *p = NULL;
|
|
PKCS7 *outsig = NULL;
|
|
u_char buf[] = {
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
|
};
|
|
|
|
if (type != FILE_TYPE_CAT && options->nest) {
|
|
if (cursig == NULL) {
|
|
printf("Internal error: No 'cursig' was extracted\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
if (pkcs7_set_nested_signature(cursig, sig, options->time) == 0) {
|
|
printf("Unable to append the nested signature to the current signature\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
outsig = cursig;
|
|
} else {
|
|
outsig = sig;
|
|
}
|
|
/* Append signature to outfile */
|
|
if (((*len = i2d_PKCS7(outsig, NULL)) <= 0) || (p = OPENSSL_malloc((size_t)*len)) == NULL) {
|
|
printf("i2d_PKCS memory allocation failed: %d\n", *len);
|
|
return 1; /* FAILED */
|
|
}
|
|
i2d_PKCS7(outsig, &p);
|
|
p -= *len;
|
|
*padlen = (8 - *len%8) % 8;
|
|
|
|
if (type == FILE_TYPE_PE) {
|
|
PUT_UINT32_LE(*len + 8 + *padlen, buf);
|
|
PUT_UINT16_LE(WIN_CERT_REVISION_2_0, buf + 4);
|
|
PUT_UINT16_LE(WIN_CERT_TYPE_PKCS_SIGNED_DATA, buf + 6);
|
|
BIO_write(outdata, buf, 8);
|
|
}
|
|
if (type == FILE_TYPE_PE || type == FILE_TYPE_CAB) {
|
|
BIO_write(outdata, p, *len);
|
|
/* pad (with 0's) asn1 blob to 8 byte boundary */
|
|
if (*padlen > 0) {
|
|
memset(p, 0, (size_t)*padlen);
|
|
BIO_write(outdata, p, *padlen);
|
|
}
|
|
} else if (type == FILE_TYPE_MSI) {
|
|
if (!msi_file_write(msiparams->msi, msiparams->dirent, p, (uint32_t)*len,
|
|
msiparams->p_msiex, (uint32_t)msiparams->len_msiex, outdata)) {
|
|
printf("Saving the msi file failed\n");
|
|
OPENSSL_free(p);
|
|
return 1; /* FAILED */
|
|
}
|
|
} else if (type == FILE_TYPE_CAT) {
|
|
i2d_PKCS7_bio(outdata, outsig);
|
|
}
|
|
OPENSSL_free(p);
|
|
return 0; /* OK */
|
|
}
|
|
|
|
static void update_data_size(file_type_t type, cmd_type_t cmd, FILE_HEADER *header,
|
|
int padlen, int len, BIO *outdata)
|
|
{
|
|
u_char buf[] = {
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
|
};
|
|
|
|
if (type == FILE_TYPE_PE) {
|
|
if (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH) {
|
|
/* Update signature position and size */
|
|
(void)BIO_seek(outdata, header->header_size + 152 + header->pe32plus * 16);
|
|
PUT_UINT32_LE(header->fileend, buf); /* Previous file end = signature table start */
|
|
BIO_write(outdata, buf, 4);
|
|
PUT_UINT32_LE(len+8+padlen, buf);
|
|
BIO_write(outdata, buf, 4);
|
|
}
|
|
if (cmd == CMD_SIGN || cmd == CMD_REMOVE || cmd == CMD_ADD || cmd == CMD_ATTACH)
|
|
pe_recalc_checksum(outdata, header);
|
|
} else if (type == FILE_TYPE_CAB && (cmd == CMD_SIGN || cmd == CMD_ADD || cmd == CMD_ATTACH)) {
|
|
/*
|
|
* Update additional data size.
|
|
* Additional data size is located at offset 0x30 (from file beginning)
|
|
* and consist of 4 bytes (little-endian order).
|
|
*/
|
|
(void)BIO_seek(outdata, 0x30);
|
|
PUT_UINT32_LE(len+padlen, buf);
|
|
BIO_write(outdata, buf, 4);
|
|
}
|
|
}
|
|
|
|
static STACK_OF(X509) *PEM_read_certs(BIO *bin, char *certpass)
|
|
{
|
|
STACK_OF(X509) *certs = sk_X509_new_null();
|
|
X509 *x509;
|
|
(void)BIO_seek(bin, 0);
|
|
x509 = PEM_read_bio_X509(bin, NULL, NULL, certpass);
|
|
while (x509) {
|
|
sk_X509_push(certs, x509);
|
|
x509 = PEM_read_bio_X509(bin, NULL, NULL, certpass);
|
|
}
|
|
ERR_clear_error();
|
|
if (!sk_X509_num(certs)) {
|
|
sk_X509_free(certs);
|
|
return NULL;
|
|
}
|
|
return certs;
|
|
}
|
|
|
|
static uint32_t get_file_size(const char *infile)
|
|
{
|
|
int ret;
|
|
#ifdef _WIN32
|
|
struct _stat64 st;
|
|
ret = _stat64(infile, &st);
|
|
#else
|
|
struct stat st;
|
|
ret = stat(infile, &st);
|
|
#endif
|
|
if (ret) {
|
|
printf("Failed to open file: %s\n", infile);
|
|
return 0;
|
|
}
|
|
|
|
if (st.st_size < 4) {
|
|
printf("Unrecognized file type - file is too short: %s\n", infile);
|
|
return 0;
|
|
}
|
|
if (st.st_size > UINT32_MAX) {
|
|
printf("Unsupported file - too large: %s\n", infile);
|
|
return 0;
|
|
}
|
|
return (uint32_t)st.st_size;
|
|
}
|
|
|
|
static char *map_file(const char *infile, const size_t size)
|
|
{
|
|
char *indata = NULL;
|
|
#ifdef WIN32
|
|
HANDLE fhandle, fmap;
|
|
(void)size;
|
|
fhandle = CreateFile(infile, GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL);
|
|
if (fhandle == INVALID_HANDLE_VALUE) {
|
|
return NULL;
|
|
}
|
|
fmap = CreateFileMapping(fhandle, NULL, PAGE_READONLY, 0, 0, NULL);
|
|
CloseHandle(fhandle);
|
|
if (fmap == NULL) {
|
|
return NULL;
|
|
}
|
|
indata = (char *)MapViewOfFile(fmap, FILE_MAP_READ, 0, 0, 0);
|
|
CloseHandle(fmap);
|
|
#else
|
|
#ifdef HAVE_SYS_MMAN_H
|
|
int fd = open(infile, O_RDONLY);
|
|
if (fd < 0) {
|
|
return NULL;
|
|
}
|
|
indata = mmap(0, size, PROT_READ, MAP_PRIVATE, fd, 0);
|
|
if (indata == MAP_FAILED) {
|
|
close(fd);
|
|
return NULL;
|
|
}
|
|
close(fd);
|
|
#else
|
|
printf("No file mapping function\n");
|
|
return NULL;
|
|
#endif /* HAVE_SYS_MMAN_H */
|
|
#endif /* WIN32 */
|
|
return indata;
|
|
}
|
|
|
|
static void unmap_file(char *indata, const size_t size)
|
|
{
|
|
if (!indata)
|
|
return;
|
|
#ifdef WIN32
|
|
(void)size;
|
|
UnmapViewOfFile(indata);
|
|
#else
|
|
munmap(indata, size);
|
|
#endif /* WIN32 */
|
|
}
|
|
|
|
static int input_validation(file_type_t type, GLOBAL_OPTIONS *options, FILE_HEADER *header,
|
|
MSI_PARAMS *msiparams, char *indata, uint32_t filesize)
|
|
{
|
|
if (type == FILE_TYPE_CAB) {
|
|
if (options->pagehash == 1)
|
|
printf("Warning: -ph option is only valid for PE files\n");
|
|
if (options->add_msi_dse == 1)
|
|
printf("Warning: -add-msi-dse option is only valid for MSI files\n");
|
|
if (!cab_verify_header(indata, options->infile, filesize, header)) {
|
|
printf("Corrupt CAB file\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
} else if (type == FILE_TYPE_CAT) {
|
|
if (options->nest)
|
|
/* I've not tried using pkcs7_set_nested_signature as signtool won't do this */
|
|
printf("Warning: CAT files do not support nesting\n");
|
|
if (options->jp >= 0)
|
|
printf("Warning: -jp option is only valid for CAB files\n");
|
|
if (options->pagehash == 1)
|
|
printf("Warning: -ph option is only valid for PE files\n");
|
|
if (options->add_msi_dse == 1)
|
|
printf("Warning: -add-msi-dse option is only valid for MSI files\n");
|
|
if (!cat_verify_header(indata, filesize, header)) {
|
|
printf("Corrupt CAT file: %s\n", options->infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
} else if (type == FILE_TYPE_PE) {
|
|
if (options->jp >= 0)
|
|
printf("Warning: -jp option is only valid for CAB files\n");
|
|
if (options->add_msi_dse == 1)
|
|
printf("Warning: -add-msi-dse option is only valid for MSI files\n");
|
|
if (!pe_verify_header(indata, options->infile, filesize, header)) {
|
|
printf("Corrupt PE file\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
} else if (type == FILE_TYPE_MSI) {
|
|
if (options->pagehash == 1)
|
|
printf("Warning: -ph option is only valid for PE files\n");
|
|
if (options->jp >= 0)
|
|
printf("Warning: -jp option is only valid for CAB files\n");
|
|
if (!msi_verify_header(indata, filesize, msiparams)) {
|
|
printf("Corrupt MSI file: %s\n", options->infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int check_attached_data(file_type_t type, FILE_HEADER *header, GLOBAL_OPTIONS *options,
|
|
MSI_PARAMS *msiparams)
|
|
{
|
|
uint32_t filesize;
|
|
char *outdata;
|
|
int ret = 1;
|
|
|
|
filesize = get_file_size(options->outfile);
|
|
if (!filesize) {
|
|
printf("Error verifying result\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
outdata = map_file(options->outfile, filesize);
|
|
if (!outdata) {
|
|
printf("Error verifying result\n");
|
|
return 1; /* FAILED */
|
|
}
|
|
if (type == FILE_TYPE_PE) {
|
|
if (!pe_verify_header(outdata, options->outfile, filesize, header)) {
|
|
printf("Corrupt PE file\n");
|
|
goto out;
|
|
}
|
|
if (pe_verify_file(outdata, header, options)) {
|
|
printf("Signature mismatch\n");
|
|
goto out;
|
|
}
|
|
} else if (type == FILE_TYPE_CAB) {
|
|
if (!cab_verify_header(outdata, options->outfile, filesize, header)) {
|
|
printf("Corrupt CAB file\n");
|
|
goto out;
|
|
}
|
|
if (cab_verify_file(outdata, header, options)) {
|
|
printf("Signature mismatch\n");
|
|
goto out;
|
|
}
|
|
} else if (type == FILE_TYPE_MSI) {
|
|
if (!msi_verify_header(outdata, filesize, msiparams)) {
|
|
printf("Corrupt MSI file: %s\n", options->outfile);
|
|
goto out;
|
|
}
|
|
if (msi_verify_file(msiparams, options)) {
|
|
printf("Signature mismatch\n");
|
|
goto out;
|
|
}
|
|
} else {
|
|
printf("Unknown input type for file: %s\n", options->infile);
|
|
goto out;
|
|
}
|
|
ret = 0; /* OK */
|
|
out:
|
|
unmap_file(outdata, filesize);
|
|
return ret;
|
|
}
|
|
|
|
static int get_file_type(char *indata, char *infile, file_type_t *type)
|
|
{
|
|
const u_char pkcs7_signed_data[] = {
|
|
0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d,
|
|
0x01, 0x07, 0x02,
|
|
};
|
|
|
|
if (!memcmp(indata, "MSCF", 4)) {
|
|
*type = FILE_TYPE_CAB;
|
|
} else if (!memcmp(indata, "MZ", 2)) {
|
|
*type = FILE_TYPE_PE;
|
|
} else if (!memcmp(indata, msi_magic, sizeof msi_magic)) {
|
|
*type = FILE_TYPE_MSI;
|
|
} else if (!memcmp(indata + ((GET_UINT8_LE(indata+1) == 0x82) ? 4 : 5),
|
|
pkcs7_signed_data, sizeof pkcs7_signed_data)) {
|
|
/* the maximum size of a supported cat file is (2^24 -1) bytes */
|
|
*type = FILE_TYPE_CAT;
|
|
} else {
|
|
printf("Unrecognized file type: %s\n", infile);
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
#ifdef PROVIDE_ASKPASS
|
|
static char *getpassword(const char *prompt)
|
|
{
|
|
#ifdef HAVE_TERMIOS_H
|
|
struct termios ofl, nfl;
|
|
char *p, passbuf[1024], *pass;
|
|
|
|
fputs(prompt, stdout);
|
|
|
|
tcgetattr(fileno(stdin), &ofl);
|
|
nfl = ofl;
|
|
nfl.c_lflag &= ~(unsigned int)ECHO;
|
|
nfl.c_lflag |= ECHONL;
|
|
|
|
if (tcsetattr(fileno(stdin), TCSANOW, &nfl) != 0) {
|
|
printf("Failed to set terminal attributes\n");
|
|
return NULL;
|
|
}
|
|
p = fgets(passbuf, sizeof passbuf, stdin);
|
|
if (tcsetattr(fileno(stdin), TCSANOW, &ofl) != 0)
|
|
printf("Failed to restore terminal attributes\n");
|
|
if (!p) {
|
|
printf("Failed to read password\n");
|
|
return NULL;
|
|
}
|
|
passbuf[strlen(passbuf)-1] = 0x00;
|
|
pass = OPENSSL_strdup(passbuf);
|
|
memset(passbuf, 0, sizeof passbuf);
|
|
return pass;
|
|
#else
|
|
return getpass(prompt);
|
|
#endif
|
|
}
|
|
#endif
|
|
|
|
static int read_password(GLOBAL_OPTIONS *options)
|
|
{
|
|
char passbuf[4096];
|
|
int passlen;
|
|
const u_char utf8_bom[] = {0xef, 0xbb, 0xbf};
|
|
|
|
if (options->readpass) {
|
|
#ifdef WIN32
|
|
HANDLE fhandle, fmap;
|
|
LPVOID faddress;
|
|
fhandle = CreateFile(options->readpass, GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL);
|
|
if (fhandle == INVALID_HANDLE_VALUE) {
|
|
return 0; /* FAILED */
|
|
}
|
|
fmap = CreateFileMapping(fhandle, NULL, PAGE_READONLY, 0, 0, NULL);
|
|
if (fmap == NULL) {
|
|
return 0; /* FAILED */
|
|
}
|
|
faddress = MapViewOfFile(fmap, FILE_MAP_READ, 0, 0, 0);
|
|
CloseHandle(fmap);
|
|
if (faddress == NULL) {
|
|
return 0; /* FAILED */
|
|
}
|
|
passlen = (int)GetFileSize(fhandle, NULL);
|
|
memcpy(passbuf, faddress, passlen);
|
|
UnmapViewOfFile(faddress);
|
|
CloseHandle(fhandle);
|
|
#else
|
|
int passfd = open(options->readpass, O_RDONLY);
|
|
if (passfd < 0) {
|
|
return 0; /* FAILED */
|
|
}
|
|
passlen = (int)read(passfd, passbuf, sizeof passbuf - 1);
|
|
close(passfd);
|
|
#endif /* WIN32 */
|
|
if (passlen <= 0) {
|
|
return 0; /* FAILED */
|
|
}
|
|
while (passlen > 0 && (passbuf[passlen-1] == 0x0a || passbuf[passlen-1] == 0x0d)) {
|
|
passlen--;
|
|
}
|
|
passbuf[passlen] = 0x00;
|
|
if (!memcmp(passbuf, utf8_bom, sizeof utf8_bom)) {
|
|
options->pass = OPENSSL_strdup(passbuf + sizeof utf8_bom);
|
|
} else {
|
|
options->pass = OPENSSL_strdup(passbuf);
|
|
}
|
|
memset(passbuf, 0, sizeof passbuf);
|
|
#ifdef PROVIDE_ASKPASS
|
|
} else if (options->askpass) {
|
|
options->pass = getpassword("Password: ");
|
|
#endif /* PROVIDE_ASKPASS */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* Parse a PKCS#12 container with certificates and a private key.
|
|
* If successful the private key will be written to cparams->pkey,
|
|
* the corresponding certificate to cparams->cert
|
|
* and any additional certificates to cparams->certs.
|
|
*/
|
|
static int read_pkcs12file(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams)
|
|
{
|
|
BIO *btmp;
|
|
PKCS12 *p12;
|
|
int ret = 0;
|
|
|
|
btmp = BIO_new_file(options->pkcs12file, "rb");
|
|
if (!btmp) {
|
|
printf("Failed to read PKCS#12 file: %s\n", options->pkcs12file);
|
|
return 0; /* FAILED */
|
|
}
|
|
p12 = d2i_PKCS12_bio(btmp, NULL);
|
|
if (!p12) {
|
|
printf("Failed to extract PKCS#12 data: %s\n", options->pkcs12file);
|
|
goto out; /* FAILED */
|
|
}
|
|
if (!PKCS12_parse(p12, options->pass ? options->pass : "", &cparams->pkey, &cparams->cert, &cparams->certs)) {
|
|
printf("Failed to parse PKCS#12 file: %s (Wrong password?)\n", options->pkcs12file);
|
|
PKCS12_free(p12);
|
|
goto out; /* FAILED */
|
|
}
|
|
PKCS12_free(p12);
|
|
ret = 1; /* OK */
|
|
out:
|
|
BIO_free(btmp);
|
|
return ret;
|
|
}
|
|
|
|
/* Obtain a copy of the whole X509_CRL chain */
|
|
static STACK_OF(X509_CRL) *X509_CRL_chain_up_ref(STACK_OF(X509_CRL) *chain)
|
|
{
|
|
STACK_OF(X509_CRL) *ret;
|
|
int i;
|
|
ret = sk_X509_CRL_dup(chain);
|
|
if (ret == NULL)
|
|
return NULL;
|
|
for (i = 0; i < sk_X509_CRL_num(ret); i++) {
|
|
X509_CRL *x = sk_X509_CRL_value(ret, i);
|
|
if (!X509_CRL_up_ref(x))
|
|
goto err;
|
|
}
|
|
return ret;
|
|
err:
|
|
while (i-- > 0)
|
|
X509_CRL_free(sk_X509_CRL_value(ret, i));
|
|
sk_X509_CRL_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Load certificates from a file.
|
|
* If successful all certificates will be written to cparams->certs
|
|
* and optional CRLs will be written to cparams->crls.
|
|
*/
|
|
static int read_certfile(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams)
|
|
{
|
|
BIO *btmp;
|
|
int ret = 0;
|
|
|
|
btmp = BIO_new_file(options->certfile, "rb");
|
|
if (!btmp) {
|
|
printf("Failed to read certificate file: %s\n", options->certfile);
|
|
return 0; /* FAILED */
|
|
}
|
|
/* .pem certificate file */
|
|
cparams->certs = PEM_read_certs(btmp, NULL);
|
|
|
|
/* .der certificate file */
|
|
if (!cparams->certs) {
|
|
X509 *x = NULL;
|
|
(void)BIO_seek(btmp, 0);
|
|
if (d2i_X509_bio(btmp, &x)) {
|
|
cparams->certs = sk_X509_new_null();
|
|
if (!sk_X509_push(cparams->certs, x)) {
|
|
X509_free(x);
|
|
goto out; /* FAILED */
|
|
}
|
|
printf("Warning: The certificate file contains a single x509 certificate\n");
|
|
}
|
|
}
|
|
|
|
/* .spc or .p7b certificate file (PKCS#7 structure) */
|
|
if (!cparams->certs) {
|
|
PKCS7 *p7;
|
|
(void)BIO_seek(btmp, 0);
|
|
p7 = d2i_PKCS7_bio(btmp, NULL);
|
|
if (!p7)
|
|
goto out; /* FAILED */
|
|
cparams->certs = X509_chain_up_ref(p7->d.sign->cert);
|
|
|
|
/* additional CRLs may be supplied as part of a PKCS#7 signed data structure */
|
|
if (p7->d.sign->crl)
|
|
cparams->crls = X509_CRL_chain_up_ref(p7->d.sign->crl);
|
|
PKCS7_free(p7);
|
|
}
|
|
|
|
ret = 1; /* OK */
|
|
out:
|
|
if (ret == 0)
|
|
printf("No certificate found\n");
|
|
BIO_free(btmp);
|
|
return ret;
|
|
}
|
|
|
|
/* Load additional (cross) certificates from a .pem file */
|
|
static int read_xcertfile(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams)
|
|
{
|
|
BIO *btmp;
|
|
int ret = 0;
|
|
|
|
btmp = BIO_new_file(options->xcertfile, "rb");
|
|
if (!btmp) {
|
|
printf("Failed to read cross certificates file: %s\n", options->xcertfile);
|
|
return 0; /* FAILED */
|
|
}
|
|
cparams->xcerts = PEM_read_certs(btmp, NULL);
|
|
if (!cparams->xcerts) {
|
|
printf("Failed to read cross certificates file: %s\n", options->xcertfile);
|
|
goto out; /* FAILED */
|
|
}
|
|
|
|
ret = 1; /* OK */
|
|
out:
|
|
BIO_free(btmp);
|
|
return ret;
|
|
}
|
|
|
|
/* Load the private key from a file */
|
|
static int read_keyfile(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams)
|
|
{
|
|
BIO *btmp;
|
|
int ret = 0;
|
|
|
|
btmp = BIO_new_file(options->keyfile, "rb");
|
|
if (!btmp) {
|
|
printf("Failed to read private key file: %s\n", options->keyfile);
|
|
return 0; /* FAILED */
|
|
}
|
|
if (((cparams->pkey = d2i_PrivateKey_bio(btmp, NULL)) == NULL &&
|
|
(BIO_seek(btmp, 0) == 0) &&
|
|
(cparams->pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, options->pass ? options->pass : NULL)) == NULL &&
|
|
(BIO_seek(btmp, 0) == 0) &&
|
|
(cparams->pkey = PEM_read_bio_PrivateKey(btmp, NULL, NULL, NULL)) == NULL)) {
|
|
printf("Failed to decode private key file: %s (Wrong password?)\n", options->keyfile);
|
|
goto out; /* FAILED */
|
|
}
|
|
ret = 1; /* OK */
|
|
out:
|
|
BIO_free(btmp);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Decode Microsoft Private Key (PVK) file.
|
|
* PVK is a proprietary Microsoft format that stores a cryptographic private key.
|
|
* PVK files are often password-protected.
|
|
* A PVK file may have an associated .spc (PKCS7) certificate file.
|
|
*/
|
|
static char *find_pvk_key(GLOBAL_OPTIONS *options)
|
|
{
|
|
u_char magic[4];
|
|
/* Microsoft Private Key format Header Hexdump */
|
|
const u_char pvkhdr[4] = {0x1e, 0xf1, 0xb5, 0xb0};
|
|
char *pvkfile = NULL;
|
|
BIO *btmp;
|
|
|
|
if (!options->keyfile
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
|| options->p11module
|
|
#endif /* OPENSSL_NO_ENGINE */
|
|
)
|
|
return NULL; /* FAILED */
|
|
btmp = BIO_new_file(options->keyfile, "rb");
|
|
if (!btmp)
|
|
return NULL; /* FAILED */
|
|
magic[0] = 0x00;
|
|
BIO_read(btmp, magic, 4);
|
|
if (!memcmp(magic, pvkhdr, 4)) {
|
|
pvkfile = options->keyfile;
|
|
options->keyfile = NULL;
|
|
}
|
|
BIO_free(btmp);
|
|
return pvkfile;
|
|
}
|
|
|
|
static int read_pvk_key(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams)
|
|
{
|
|
BIO *btmp;
|
|
|
|
btmp = BIO_new_file(options->pvkfile, "rb");
|
|
if (!btmp) {
|
|
printf("Failed to read private key file: %s\n", options->pvkfile);
|
|
return 0; /* FAILED */
|
|
}
|
|
cparams->pkey = b2i_PVK_bio(btmp, NULL, options->pass ? options->pass : NULL);
|
|
if (!cparams->pkey && options->askpass) {
|
|
(void)BIO_seek(btmp, 0);
|
|
cparams->pkey = b2i_PVK_bio(btmp, NULL, NULL);
|
|
}
|
|
BIO_free(btmp);
|
|
if (!cparams->pkey) {
|
|
printf("Failed to decode private key file: %s\n", options->pvkfile);
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
|
|
/* Load an engine in a shareable library */
|
|
static ENGINE *dynamic_engine(GLOBAL_OPTIONS *options)
|
|
{
|
|
ENGINE *engine;
|
|
char *id;
|
|
|
|
engine = ENGINE_by_id("dynamic");
|
|
if (!engine) {
|
|
printf("Failed to load 'dynamic' engine\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (options->p11engine) { /* strip directory and extension */
|
|
char *ptr;
|
|
|
|
ptr = strrchr(options->p11engine, '/');
|
|
if (!ptr) /* no slash -> try backslash */
|
|
ptr = strrchr(options->p11engine, '\\');
|
|
if (ptr) /* directory separator found */
|
|
ptr++; /* skip it */
|
|
else /* directory separator not found */
|
|
ptr = options->p11engine;
|
|
id = OPENSSL_strdup(ptr);
|
|
ptr = strchr(id, '.');
|
|
if (ptr) /* file extensions found */
|
|
*ptr = '\0'; /* remove them */
|
|
} else {
|
|
id = OPENSSL_strdup("pkcs11");
|
|
}
|
|
if (!ENGINE_ctrl_cmd_string(engine, "SO_PATH", options->p11engine, 0)
|
|
|| !ENGINE_ctrl_cmd_string(engine, "ID", id, 0)
|
|
|| !ENGINE_ctrl_cmd_string(engine, "LIST_ADD", "1", 0)
|
|
|| !ENGINE_ctrl_cmd_string(engine, "LOAD", NULL, 0)) {
|
|
printf("Failed to set 'dynamic' engine\n");
|
|
ENGINE_free(engine);
|
|
engine = NULL; /* FAILED */
|
|
}
|
|
OPENSSL_free(id);
|
|
return engine;
|
|
}
|
|
|
|
/* Load a pkcs11 engine */
|
|
static ENGINE *pkcs11_engine()
|
|
{
|
|
ENGINE *engine = ENGINE_by_id("pkcs11");
|
|
if (!engine) {
|
|
printf("Failed to find and load 'pkcs11' engine\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
return engine; /* OK */
|
|
}
|
|
|
|
/* Load the private key and the signer certificate from a security token */
|
|
static int read_token(GLOBAL_OPTIONS *options, ENGINE *engine, CRYPTO_PARAMS *cparams)
|
|
{
|
|
if (options->p11module && !ENGINE_ctrl_cmd_string(engine, "MODULE_PATH", options->p11module, 0)) {
|
|
printf("Failed to set pkcs11 engine MODULE_PATH to '%s'\n", options->p11module);
|
|
ENGINE_free(engine);
|
|
return 0; /* FAILED */
|
|
}
|
|
if (options->pass != NULL && !ENGINE_ctrl_cmd_string(engine, "PIN", options->pass, 0)) {
|
|
printf("Failed to set pkcs11 PIN\n");
|
|
ENGINE_free(engine);
|
|
return 0; /* FAILED */
|
|
}
|
|
if (!ENGINE_init(engine)) {
|
|
printf("Failed to initialize pkcs11 engine\n");
|
|
ENGINE_free(engine);
|
|
return 0; /* FAILED */
|
|
}
|
|
/*
|
|
* ENGINE_init() returned a functional reference, so free the structural
|
|
* reference from ENGINE_by_id().
|
|
*/
|
|
ENGINE_free(engine);
|
|
|
|
if (options->p11cert) {
|
|
struct {
|
|
const char *id;
|
|
X509 *cert;
|
|
} parms;
|
|
|
|
parms.id = options->p11cert;
|
|
parms.cert = NULL;
|
|
ENGINE_ctrl_cmd(engine, "LOAD_CERT_CTRL", 0, &parms, NULL, 1);
|
|
if (!parms.cert) {
|
|
printf("Failed to load certificate %s\n", options->p11cert);
|
|
ENGINE_finish(engine);
|
|
return 0; /* FAILED */
|
|
} else
|
|
cparams->cert = parms.cert;
|
|
}
|
|
|
|
cparams->pkey = ENGINE_load_private_key(engine, options->keyfile, NULL, NULL);
|
|
/* Free the functional reference from ENGINE_init */
|
|
ENGINE_finish(engine);
|
|
if (!cparams->pkey) {
|
|
printf("Failed to load private key %s\n", options->keyfile);
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
#endif /* OPENSSL_NO_ENGINE */
|
|
|
|
static int read_crypto_params(GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* Microsoft Private Key format support */
|
|
options->pvkfile = find_pvk_key(options);
|
|
if (options->pvkfile) {
|
|
if (!read_certfile(options, cparams) || !read_pvk_key(options, cparams))
|
|
goto out; /* FAILED */
|
|
|
|
/* PKCS#12 container with certificates and the private key ("-pkcs12" option) */
|
|
} else if (options->pkcs12file) {
|
|
if (!read_pkcs12file(options, cparams))
|
|
goto out; /* FAILED */
|
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
/* PKCS11 engine and module support */
|
|
} else if ((options->p11engine) || (options->p11module)) {
|
|
ENGINE *engine;
|
|
|
|
if (options->p11engine)
|
|
engine = dynamic_engine(options);
|
|
else
|
|
engine = pkcs11_engine();
|
|
if (!engine)
|
|
goto out; /* FAILED */
|
|
printf("Engine \"%s\" set.\n", ENGINE_get_id(engine));
|
|
|
|
/* Load the private key and the signer certificate from the security token */
|
|
if (!read_token(options, engine, cparams))
|
|
goto out; /* FAILED */
|
|
|
|
/* Load the signer certificate and the whole certificate chain from a file */
|
|
if (options->certfile && !read_certfile(options, cparams))
|
|
goto out; /* FAILED */
|
|
|
|
/* PEM / DER / SPC file format support */
|
|
} else if (!read_certfile(options, cparams) || !read_keyfile(options, cparams))
|
|
goto out; /* FAILED */
|
|
#endif /* OPENSSL_NO_ENGINE */
|
|
|
|
/* Load additional (cross) certificates ("-ac" option) */
|
|
if (options->xcertfile && !read_xcertfile(options, cparams))
|
|
goto out; /* FAILED */
|
|
|
|
ret = 1;
|
|
out:
|
|
/* reset password */
|
|
if (options->pass) {
|
|
memset(options->pass, 0, strlen(options->pass));
|
|
OPENSSL_free(options->pass);
|
|
}
|
|
return ret; /* OK */
|
|
}
|
|
|
|
static void free_msi_params(MSI_PARAMS *msiparams)
|
|
{
|
|
msi_file_free(msiparams->msi);
|
|
msi_dirent_free(msiparams->dirent);
|
|
OPENSSL_free(msiparams->p_msiex);
|
|
}
|
|
|
|
static void free_crypto_params(CRYPTO_PARAMS *cparams)
|
|
{
|
|
/* If key is NULL nothing is done */
|
|
EVP_PKEY_free(cparams->pkey);
|
|
cparams->pkey = NULL;
|
|
/* If X509 structure is NULL nothing is done */
|
|
X509_free(cparams->cert);
|
|
cparams->cert = NULL;
|
|
/* Free up all elements of sk structure and sk itself */
|
|
sk_X509_pop_free(cparams->certs, X509_free);
|
|
cparams->certs = NULL;
|
|
sk_X509_pop_free(cparams->xcerts, X509_free);
|
|
cparams->xcerts = NULL;
|
|
sk_X509_CRL_pop_free(cparams->crls, X509_CRL_free);
|
|
cparams->crls = NULL;
|
|
}
|
|
|
|
static void free_options(GLOBAL_OPTIONS *options)
|
|
{
|
|
/* If memory has not been allocated nothing is done */
|
|
OPENSSL_free(options->cafile);
|
|
OPENSSL_free(options->tsa_cafile);
|
|
OPENSSL_free(options->crlfile);
|
|
OPENSSL_free(options->tsa_crlfile);
|
|
}
|
|
|
|
static char *get_cafile(void)
|
|
{
|
|
#ifndef WIN32
|
|
const char *files[] = {
|
|
"/etc/ssl/certs/ca-certificates.crt",
|
|
"/etc/pki/tls/certs/ca-bundle.crt",
|
|
"/usr/share/ssl/certs/ca-bundle.crt",
|
|
"/usr/local/share/certs/ca-root-nss.crt",
|
|
"/etc/ssl/cert.pem",
|
|
NULL
|
|
};
|
|
int i;
|
|
|
|
for (i=0; files[i]; i++) {
|
|
if (!access(files[i], R_OK)) {
|
|
return OPENSSL_strdup(files[i]);
|
|
}
|
|
}
|
|
#endif
|
|
return NULL;
|
|
}
|
|
|
|
static PKCS7 *get_sigfile(char *sigfile, file_type_t type)
|
|
{
|
|
PKCS7 *sig = NULL;
|
|
uint32_t sigfilesize;
|
|
char *insigdata;
|
|
FILE_HEADER header;
|
|
BIO *sigbio;
|
|
const char pemhdr[] = "-----BEGIN PKCS7-----";
|
|
|
|
sigfilesize = get_file_size(sigfile);
|
|
if (!sigfilesize) {
|
|
return NULL; /* FAILED */
|
|
}
|
|
insigdata = map_file(sigfile, sigfilesize);
|
|
if (!insigdata) {
|
|
printf("Failed to open file: %s\n", sigfile);
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (sigfilesize >= sizeof pemhdr && !memcmp(insigdata, pemhdr, sizeof pemhdr - 1)) {
|
|
sigbio = BIO_new_mem_buf(insigdata, (int)sigfilesize);
|
|
sig = PEM_read_bio_PKCS7(sigbio, NULL, NULL, NULL);
|
|
BIO_free_all(sigbio);
|
|
} else {
|
|
/* reset header */
|
|
memset(&header, 0, sizeof(FILE_HEADER));
|
|
header.fileend = sigfilesize;
|
|
header.siglen = sigfilesize;
|
|
header.sigpos = 0;
|
|
if (type == FILE_TYPE_PE)
|
|
sig = pe_extract_existing_pkcs7(insigdata, &header);
|
|
else
|
|
sig = extract_existing_pkcs7(insigdata, &header);
|
|
}
|
|
unmap_file(insigdata, sigfilesize);
|
|
return sig; /* OK */
|
|
}
|
|
|
|
/*
|
|
* Obtain an existing signature or create a new one
|
|
*/
|
|
static PKCS7 *get_pkcs7(cmd_type_t cmd, BIO *hash, file_type_t type, char *indata,
|
|
GLOBAL_OPTIONS *options, FILE_HEADER *header, CRYPTO_PARAMS *cparams, PKCS7 *cursig)
|
|
{
|
|
PKCS7 *sig = NULL;
|
|
|
|
if (cmd == CMD_ATTACH) {
|
|
sig = get_sigfile(options->sigfile, type);
|
|
if (!sig) {
|
|
printf("Unable to extract valid signature\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
} else if (cmd == CMD_SIGN) {
|
|
sig = create_new_signature(type, options, cparams);
|
|
if (!sig) {
|
|
printf("Creating a new signature failed\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (type == FILE_TYPE_CAT) {
|
|
if (!set_content_blob(sig, cursig)) {
|
|
PKCS7_free(sig);
|
|
printf("Signing failed\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
} else {
|
|
if (!set_indirect_data_blob(sig, hash, type, indata, options, header)) {
|
|
PKCS7_free(sig);
|
|
printf("Signing failed\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
}
|
|
}
|
|
return sig;
|
|
}
|
|
|
|
/*
|
|
* Perform a sanity check for the MsiDigitalSignatureEx section.
|
|
* If the file we're attempting to sign has an MsiDigitalSignatureEx
|
|
* section, we can't add a nested signature of a different MD type
|
|
* without breaking the initial signature.
|
|
*/
|
|
static int msi_check_MsiDigitalSignatureEx(GLOBAL_OPTIONS *options, MSI_ENTRY *dse)
|
|
{
|
|
if (dse && GET_UINT32_LE(dse->size) != (uint32_t)EVP_MD_size(options->md)) {
|
|
printf("Unable to add nested signature with a different MD type (-h parameter) "
|
|
"than what exists in the MSI file already.\nThis is due to the presence of "
|
|
"MsiDigitalSignatureEx (-add-msi-dse parameter).\n\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
if (!dse && options->add_msi_dse) {
|
|
printf("Unable to add signature with -add-msi-dse parameter "
|
|
"without breaking the initial signature.\n\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
if (dse && !options->add_msi_dse) {
|
|
printf("Unable to add signature without -add-msi-dse parameter "
|
|
"without breaking the initial signature.\nThis is due to the presence of "
|
|
"MsiDigitalSignatureEx (-add-msi-dse parameter).\n"
|
|
"Should use -add-msi-dse options in this case.\n\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* Prepare the output file for signing
|
|
*/
|
|
static PKCS7 *msi_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header,
|
|
GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata,
|
|
BIO *hash, PKCS7 **cursig, MSI_PARAMS *msiparams)
|
|
{
|
|
PKCS7 *sig = NULL;
|
|
uint32_t len;
|
|
char *data;
|
|
|
|
if (options->add_msi_dse && !msi_calc_MsiDigitalSignatureEx(msiparams, options->md, hash)) {
|
|
printf("Unable to calc MsiDigitalSignatureEx\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!msi_hash_dir(msiparams->msi, msiparams->dirent, hash, 1)) {
|
|
printf("Unable to msi_handle_dir()\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
|
|
/* Obtain a current signature from previously-signed file */
|
|
if ((cmd == CMD_SIGN && options->nest) ||
|
|
(cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) {
|
|
MSI_ENTRY *dse = NULL;
|
|
MSI_ENTRY *ds = msi_signatures_get(msiparams->dirent, &dse);
|
|
if (!ds) {
|
|
printf("MSI file has no signature\n\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!msi_check_MsiDigitalSignatureEx(options, dse)) {
|
|
return NULL; /* FAILED */
|
|
}
|
|
len = GET_UINT32_LE(ds->size);
|
|
if (len == 0 || len >= MAXREGSECT) {
|
|
printf("Corrupted DigitalSignature stream length 0x%08X\n", len);
|
|
return NULL; /* FAILED */
|
|
}
|
|
data = OPENSSL_malloc((size_t)len);
|
|
*cursig = msi_extract_existing_pkcs7(msiparams, ds, &data, len);
|
|
OPENSSL_free(data);
|
|
if (!*cursig) {
|
|
printf("Unable to extract existing signature\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (cmd == CMD_ADD)
|
|
sig = *cursig;
|
|
}
|
|
/* Obtain an existing signature or create a new one */
|
|
if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN))
|
|
sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams, NULL);
|
|
return sig; /* OK */
|
|
}
|
|
|
|
static PKCS7 *pe_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header,
|
|
GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata,
|
|
BIO *hash, BIO *outdata, PKCS7 **cursig)
|
|
{
|
|
PKCS7 *sig = NULL;
|
|
|
|
/* Obtain a current signature from previously-signed file */
|
|
if ((cmd == CMD_SIGN && options->nest) ||
|
|
(cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) {
|
|
*cursig = pe_extract_existing_pkcs7(indata, header);
|
|
if (!*cursig) {
|
|
printf("Unable to extract existing signature\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (cmd == CMD_ADD)
|
|
sig = *cursig;
|
|
}
|
|
if (header->sigpos > 0) {
|
|
/* Strip current signature */
|
|
header->fileend = header->sigpos;
|
|
}
|
|
if (!pe_modify_header(indata, header, hash, outdata)) {
|
|
printf("Unable to modify file header\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
/* Obtain an existing signature or create a new one */
|
|
if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN))
|
|
sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams, NULL);
|
|
return sig; /* OK */
|
|
}
|
|
|
|
static PKCS7 *cab_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header,
|
|
GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata,
|
|
BIO *hash, BIO *outdata, PKCS7 **cursig)
|
|
{
|
|
PKCS7 *sig = NULL;
|
|
|
|
/* Obtain a current signature from previously-signed file */
|
|
if ((cmd == CMD_SIGN && options->nest) ||
|
|
(cmd == CMD_ATTACH && options->nest) || cmd == CMD_ADD) {
|
|
*cursig = extract_existing_pkcs7(indata, header);
|
|
if (!*cursig) {
|
|
printf("Unable to extract existing signature\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (cmd == CMD_ADD)
|
|
sig = *cursig;
|
|
}
|
|
if (header->header_size == 20) {
|
|
/* Strip current signature and modify header */
|
|
if (!cab_modify_header(indata, header, hash, outdata))
|
|
return NULL; /* FAILED */
|
|
} else {
|
|
if (!cab_add_header(indata, header, hash, outdata))
|
|
return NULL; /* FAILED */
|
|
}
|
|
/* Obtain an existing signature or create a new one */
|
|
if ((cmd == CMD_ATTACH) || (cmd == CMD_SIGN))
|
|
sig = get_pkcs7(cmd, hash, type, indata, options, header, cparams, NULL);
|
|
return sig; /* OK */
|
|
}
|
|
|
|
static PKCS7 *cat_presign_file(file_type_t type, cmd_type_t cmd, FILE_HEADER *header,
|
|
GLOBAL_OPTIONS *options, CRYPTO_PARAMS *cparams, char *indata, PKCS7 **cursig)
|
|
{
|
|
PKCS7 *sig;
|
|
|
|
*cursig = cat_extract_existing_pkcs7(indata, header);
|
|
if (!*cursig) {
|
|
printf("Failed to extract PKCS7 signed data\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (cmd == CMD_ADD)
|
|
sig = *cursig;
|
|
else
|
|
sig = get_pkcs7(cmd, NULL, type, indata, options, header, cparams, *cursig);
|
|
return sig; /* OK */
|
|
}
|
|
|
|
static void print_version()
|
|
{
|
|
#ifdef PACKAGE_STRING
|
|
printf("%s, using:\n", PACKAGE_STRING);
|
|
#else /* PACKAGE_STRING */
|
|
printf("%s, using:\n", "osslsigncode custom build");
|
|
#endif /* PACKAGE_STRING */
|
|
printf("\t%s (Library: %s)\n", OPENSSL_VERSION_TEXT, OpenSSL_version(OPENSSL_VERSION));
|
|
#ifdef ENABLE_CURL
|
|
printf("\t%s\n", curl_version());
|
|
#else /* ENABLE_CURL */
|
|
printf("\t%s\n", "no libcurl available");
|
|
#endif /* ENABLE_CURL */
|
|
#ifdef PACKAGE_BUGREPORT
|
|
printf("\nPlease send bug-reports to " PACKAGE_BUGREPORT "\n");
|
|
#endif /* PACKAGE_BUGREPORT */
|
|
printf("\n");
|
|
}
|
|
|
|
static cmd_type_t get_command(char **argv)
|
|
{
|
|
if (!strcmp(argv[1], "--help")) {
|
|
print_version();
|
|
help_for(argv[0], "all");
|
|
return CMD_HELP;
|
|
} else if (!strcmp(argv[1], "-v") || !strcmp(argv[1], "--version")) {
|
|
print_version();
|
|
return CMD_HELP;
|
|
} else if (!strcmp(argv[1], "sign"))
|
|
return CMD_SIGN;
|
|
else if (!strcmp(argv[1], "extract-signature"))
|
|
return CMD_EXTRACT;
|
|
else if (!strcmp(argv[1], "attach-signature"))
|
|
return CMD_ATTACH;
|
|
else if (!strcmp(argv[1], "remove-signature"))
|
|
return CMD_REMOVE;
|
|
else if (!strcmp(argv[1], "verify"))
|
|
return CMD_VERIFY;
|
|
else if (!strcmp(argv[1], "add"))
|
|
return CMD_ADD;
|
|
return CMD_DEFAULT;
|
|
}
|
|
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
DEFINE_STACK_OF(OSSL_PROVIDER)
|
|
static STACK_OF(OSSL_PROVIDER) *providers = NULL;
|
|
|
|
static void provider_free(OSSL_PROVIDER *prov)
|
|
{
|
|
OSSL_PROVIDER_unload(prov);
|
|
}
|
|
|
|
static void providers_cleanup(void)
|
|
{
|
|
sk_OSSL_PROVIDER_pop_free(providers, provider_free);
|
|
providers = NULL;
|
|
}
|
|
|
|
static int provider_load(OSSL_LIB_CTX *libctx, const char *pname)
|
|
{
|
|
OSSL_PROVIDER *prov= OSSL_PROVIDER_load(libctx, pname);
|
|
if (prov == NULL) {
|
|
printf("Unable to load provider: %s\n", pname);
|
|
return 0; /* FAILED */
|
|
}
|
|
if (providers == NULL) {
|
|
providers = sk_OSSL_PROVIDER_new_null();
|
|
}
|
|
if (providers == NULL || !sk_OSSL_PROVIDER_push(providers, prov)) {
|
|
providers_cleanup();
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
static int use_legacy(void)
|
|
{
|
|
/* load the legacy provider if not loaded already */
|
|
if (!OSSL_PROVIDER_available(NULL, "legacy")) {
|
|
if (!provider_load(NULL, "legacy"))
|
|
return 0; /* FAILED */
|
|
/* load the default provider explicitly */
|
|
if (!provider_load(NULL, "default"))
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
|
|
static int main_configure(int argc, char **argv, cmd_type_t *cmd, GLOBAL_OPTIONS *options)
|
|
{
|
|
int i;
|
|
char *failarg = NULL;
|
|
const char *argv0;
|
|
|
|
argv0 = argv[0];
|
|
if (argc > 1) {
|
|
*cmd = get_command(argv);
|
|
if (*cmd == CMD_DEFAULT) {
|
|
*cmd = CMD_SIGN;
|
|
} else {
|
|
argv++;
|
|
argc--;
|
|
}
|
|
}
|
|
options->md = EVP_sha256();
|
|
options->time = INVALID_TIME;
|
|
options->jp = -1;
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
/* Use legacy PKCS#12 container with RC2-40-CBC private key and certificate encryption algorithm */
|
|
options->legacy = 1;
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
|
|
if (*cmd == CMD_HELP) {
|
|
return 0; /* FAILED */
|
|
}
|
|
if (*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) {
|
|
options->cafile = get_cafile();
|
|
options->tsa_cafile = get_cafile();
|
|
}
|
|
for (argc--,argv++; argc >= 1; argc--,argv++) {
|
|
if (!strcmp(*argv, "-in")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->infile = *(++argv);
|
|
} else if (!strcmp(*argv, "-out")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->outfile = *(++argv);
|
|
} else if (!strcmp(*argv, "-sigin")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->sigfile = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN) && (!strcmp(*argv, "-spc") || !strcmp(*argv, "-certs"))) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->certfile = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-ac")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->xcertfile = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-key")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->keyfile = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs12")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->pkcs12file = *(++argv);
|
|
} else if ((*cmd == CMD_EXTRACT) && !strcmp(*argv, "-pem")) {
|
|
options->output_pkcs7 = 1;
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11cert")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->p11cert = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11engine")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->p11engine = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pkcs11module")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->p11module = *(++argv);
|
|
#endif /* OPENSSL_NO_ENGINE */
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-nolegacy")) {
|
|
options->legacy = 0;
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-pass")) {
|
|
if (options->askpass || options->readpass) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->pass = OPENSSL_strdup(*(++argv));
|
|
memset(*argv, 0, strlen(*argv));
|
|
#ifdef PROVIDE_ASKPASS
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-askpass")) {
|
|
if (options->pass || options->readpass) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->askpass = 1;
|
|
#endif
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-readpass")) {
|
|
if (options->askpass || options->pass) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->readpass = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-comm")) {
|
|
options->comm = 1;
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-ph")) {
|
|
options->pagehash = 1;
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-n")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->desc = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN|| *cmd == CMD_ADD || *cmd == CMD_ATTACH)
|
|
&& !strcmp(*argv, "-h")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
++argv;
|
|
if (!strcmp(*argv, "md5")) {
|
|
options->md = EVP_md5();
|
|
} else if (!strcmp(*argv, "sha1")) {
|
|
options->md = EVP_sha1();
|
|
} else if (!strcmp(*argv, "sha2") || !strcmp(*argv, "sha256")) {
|
|
options->md = EVP_sha256();
|
|
} else if (!strcmp(*argv, "sha384")) {
|
|
options->md = EVP_sha384();
|
|
} else if (!strcmp(*argv, "sha512")) {
|
|
options->md = EVP_sha512();
|
|
} else {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "-i")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->url = *(++argv);
|
|
} else if ((*cmd == CMD_ATTACH || *cmd == CMD_SIGN || *cmd == CMD_VERIFY)
|
|
&& (!strcmp(*argv, "-time") || !strcmp(*argv, "-st"))) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->time = (time_t)strtoull(*(++argv), NULL, 10);
|
|
#ifdef ENABLE_CURL
|
|
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-t")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->turl[options->nturl++] = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-ts")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->tsurl[options->ntsurl++] = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-p")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->proxy = *(++argv);
|
|
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-noverifypeer")) {
|
|
options->noverifypeer = 1;
|
|
#endif
|
|
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD) && !strcmp(*argv, "-addUnauthenticatedBlob")) {
|
|
options->addBlob = 1;
|
|
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ATTACH) && !strcmp(*argv, "-nest")) {
|
|
options->nest = 1;
|
|
} else if ((*cmd == CMD_VERIFY) && !strcmp(*argv, "-ignore-timestamp")) {
|
|
options->ignore_timestamp = 1;
|
|
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD || *cmd == CMD_VERIFY) && !strcmp(*argv, "-verbose")) {
|
|
options->verbose = 1;
|
|
} else if ((*cmd == CMD_SIGN || *cmd == CMD_ADD || *cmd == CMD_ATTACH) && !strcmp(*argv, "-add-msi-dse")) {
|
|
options->add_msi_dse = 1;
|
|
} else if ((*cmd == CMD_VERIFY) && (!strcmp(*argv, "-c") || !strcmp(*argv, "-catalog"))) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->catalog = *(++argv);
|
|
} else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && !strcmp(*argv, "-CAfile")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
OPENSSL_free(options->cafile);
|
|
options->cafile = OPENSSL_strdup(*++argv);
|
|
} else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && !strcmp(*argv, "-CRLfile")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->crlfile = OPENSSL_strdup(*++argv);
|
|
} else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && (!strcmp(*argv, "-untrusted") || !strcmp(*argv, "-TSA-CAfile"))) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
OPENSSL_free(options->tsa_cafile);
|
|
options->tsa_cafile = OPENSSL_strdup(*++argv);
|
|
} else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && (!strcmp(*argv, "-CRLuntrusted") || !strcmp(*argv, "-TSA-CRLfile"))) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->tsa_crlfile = OPENSSL_strdup(*++argv);
|
|
} else if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && !strcmp(*argv, "-require-leaf-hash")) {
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
options->leafhash = (*++argv);
|
|
} else if ((*cmd == CMD_ADD) && !strcmp(*argv, "--help")) {
|
|
help_for(argv0, "add");
|
|
*cmd = CMD_HELP;
|
|
return 0; /* FAILED */
|
|
} else if ((*cmd == CMD_ATTACH) && !strcmp(*argv, "--help")) {
|
|
help_for(argv0, "attach-signature");
|
|
*cmd = CMD_HELP;
|
|
return 0; /* FAILED */
|
|
} else if ((*cmd == CMD_EXTRACT) && !strcmp(*argv, "--help")) {
|
|
help_for(argv0, "extract-signature");
|
|
*cmd = CMD_HELP;
|
|
return 0; /* FAILED */
|
|
} else if ((*cmd == CMD_REMOVE) && !strcmp(*argv, "--help")) {
|
|
help_for(argv0, "remove-signature");
|
|
*cmd = CMD_HELP;
|
|
return 0; /* FAILED */
|
|
} else if ((*cmd == CMD_SIGN) && !strcmp(*argv, "--help")) {
|
|
help_for(argv0, "sign");
|
|
*cmd = CMD_HELP;
|
|
return 0; /* FAILED */
|
|
} else if ((*cmd == CMD_VERIFY) && !strcmp(*argv, "--help")) {
|
|
help_for(argv0, "verify");
|
|
*cmd = CMD_HELP;
|
|
return 0; /* FAILED */
|
|
} else if (!strcmp(*argv, "-jp")) {
|
|
char *ap;
|
|
if (--argc < 1) {
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
ap = *(++argv);
|
|
for (i=0; ap[i]; i++) ap[i] = (char)tolower((int)ap[i]);
|
|
if (!strcmp(ap, "low")) {
|
|
options->jp = 0;
|
|
} else if (!strcmp(ap, "medium")) {
|
|
options->jp = 1;
|
|
} else if (!strcmp(ap, "high")) {
|
|
options->jp = 2;
|
|
}
|
|
if (options->jp != 0) { /* XXX */
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
} else {
|
|
failarg = *argv;
|
|
break;
|
|
}
|
|
}
|
|
if (!options->infile && argc > 0) {
|
|
options->infile = *(argv++);
|
|
argc--;
|
|
}
|
|
if (*cmd != CMD_VERIFY && (!options->outfile && argc > 0)) {
|
|
if (!strcmp(*argv, "-out")) {
|
|
argv++;
|
|
argc--;
|
|
}
|
|
if (argc > 0) {
|
|
options->outfile = *(argv++);
|
|
argc--;
|
|
}
|
|
}
|
|
if (argc > 0 ||
|
|
#ifdef ENABLE_CURL
|
|
(options->nturl && options->ntsurl) ||
|
|
#endif
|
|
!options->infile ||
|
|
(*cmd != CMD_VERIFY && !options->outfile) ||
|
|
(*cmd == CMD_SIGN && !((options->certfile && options->keyfile) ||
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
options->p11engine || options->p11module ||
|
|
#endif /* OPENSSL_NO_ENGINE */
|
|
options->pkcs12file))) {
|
|
if (failarg)
|
|
printf("Unknown option: %s\n", failarg);
|
|
usage(argv0, "all");
|
|
return 0; /* FAILED */
|
|
}
|
|
#ifndef WIN32
|
|
if ((*cmd == CMD_VERIFY || *cmd == CMD_ATTACH) && access(options->cafile, R_OK)) {
|
|
printf("Use the \"-CAfile\" option to add one or more trusted CA certificates to verify the signature.\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
#endif /* WIN32 */
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
if (*cmd == CMD_SIGN && options->legacy && !use_legacy()) {
|
|
printf("Warning: Legacy mode disabled\n");
|
|
}
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
return 1; /* OK */
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
GLOBAL_OPTIONS options;
|
|
FILE_HEADER header, catheader;
|
|
MSI_PARAMS msiparams;
|
|
CRYPTO_PARAMS cparams;
|
|
BIO *hash = NULL, *outdata = NULL;
|
|
PKCS7 *cursig = NULL, *sig = NULL;
|
|
char *indata = NULL, *catdata = NULL;
|
|
int ret = -1, len = 0, padlen = 0;
|
|
uint32_t filesize = 0;
|
|
file_type_t type = FILE_TYPE_ANY, filetype = FILE_TYPE_CAT;
|
|
cmd_type_t cmd = CMD_DEFAULT;
|
|
|
|
/* reset options */
|
|
memset(&options, 0, sizeof(GLOBAL_OPTIONS));
|
|
|
|
/* Set up OpenSSL */
|
|
if (!OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS
|
|
| OPENSSL_INIT_ADD_ALL_CIPHERS
|
|
| OPENSSL_INIT_ADD_ALL_DIGESTS
|
|
| OPENSSL_INIT_LOAD_CONFIG, NULL))
|
|
DO_EXIT_0("Failed to init crypto\n");
|
|
|
|
/* create some MS Authenticode OIDS we need later on */
|
|
if (!OBJ_create(SPC_STATEMENT_TYPE_OBJID, NULL, NULL) ||
|
|
!OBJ_create(MS_JAVA_SOMETHING, NULL, NULL) ||
|
|
!OBJ_create(SPC_SP_OPUS_INFO_OBJID, NULL, NULL) ||
|
|
!OBJ_create(SPC_NESTED_SIGNATURE_OBJID, NULL, NULL))
|
|
DO_EXIT_0("Failed to create objects\n");
|
|
|
|
/* reset crypto */
|
|
memset(&cparams, 0, sizeof(CRYPTO_PARAMS));
|
|
|
|
/* reset MSI parameters */
|
|
memset(&msiparams, 0, sizeof(MSI_PARAMS));
|
|
|
|
/* commands and options initialization */
|
|
if (!main_configure(argc, argv, &cmd, &options))
|
|
goto err_cleanup;
|
|
if (!read_password(&options)) {
|
|
printf("Failed to read password from file: %s\n", options.readpass);
|
|
goto err_cleanup;
|
|
}
|
|
|
|
/* read key and certificates */
|
|
if (cmd == CMD_SIGN && !read_crypto_params(&options, &cparams))
|
|
goto err_cleanup;
|
|
|
|
/* check if indata is cab or pe */
|
|
filesize = get_file_size(options.infile);
|
|
if (filesize == 0)
|
|
goto err_cleanup;
|
|
|
|
/* reset file header */
|
|
memset(&header, 0, sizeof(FILE_HEADER));
|
|
header.fileend = filesize;
|
|
|
|
indata = map_file(options.infile, filesize);
|
|
if (!indata)
|
|
DO_EXIT_1("Failed to open file: %s\n", options.infile);
|
|
|
|
if (!get_file_type(indata, options.infile, &type)) {
|
|
ret = 1; /* Failed */
|
|
goto err_cleanup;
|
|
}
|
|
if (!input_validation(type, &options, &header, &msiparams, indata, filesize)) {
|
|
ret = 1; /* Failed */
|
|
goto err_cleanup;
|
|
}
|
|
|
|
/* search catalog file to determine whether the file is signed in a catalog */
|
|
if (options.catalog) {
|
|
uint32_t catsize = get_file_size(options.catalog);
|
|
if (catsize == 0)
|
|
goto err_cleanup;
|
|
catdata = map_file(options.catalog, catsize);
|
|
if (catdata == NULL)
|
|
DO_EXIT_1("Failed to open file: %s\n", options.catalog);
|
|
filetype = type;
|
|
if (!get_file_type(catdata, options.catalog, &type))
|
|
goto err_cleanup;
|
|
/* reset file header */
|
|
memset(&catheader, 0, sizeof(FILE_HEADER));
|
|
catheader.fileend = catsize;
|
|
if (!input_validation(type, &options, &catheader, NULL, catdata, catsize)) {
|
|
ret = 1; /* Failed */
|
|
goto err_cleanup;
|
|
}
|
|
unmap_file(catdata, catsize);
|
|
}
|
|
|
|
hash = BIO_new(BIO_f_md());
|
|
if (!BIO_set_md(hash, options.md)) {
|
|
printf("Unable to set the message digest of BIO\n");
|
|
BIO_free_all(hash);
|
|
goto err_cleanup;
|
|
}
|
|
|
|
if (cmd != CMD_VERIFY) {
|
|
/* Create outdata file */
|
|
outdata = BIO_new_file(options.outfile, FILE_CREATE_MODE);
|
|
if (outdata == NULL)
|
|
DO_EXIT_1("Failed to create file: %s\n", options.outfile);
|
|
if (type == FILE_TYPE_MSI)
|
|
BIO_push(hash, BIO_new(BIO_s_null()));
|
|
else
|
|
BIO_push(hash, outdata);
|
|
}
|
|
|
|
if (type == FILE_TYPE_MSI) {
|
|
if (cmd == CMD_EXTRACT) {
|
|
ret = msi_extract_file(&msiparams, outdata, options.output_pkcs7);
|
|
goto skip_signing;
|
|
} else if (cmd == CMD_VERIFY) {
|
|
ret = msi_verify_file(&msiparams, &options);
|
|
goto skip_signing;
|
|
} else {
|
|
sig = msi_presign_file(type, cmd, &header, &options, &cparams, indata,
|
|
hash, &cursig, &msiparams);
|
|
if (cmd == CMD_REMOVE) {
|
|
ret = msi_remove_file(&msiparams, outdata);
|
|
goto skip_signing;
|
|
} else if (!sig)
|
|
goto err_cleanup;
|
|
}
|
|
} else if (type == FILE_TYPE_CAB) {
|
|
if (!(header.flags & FLAG_RESERVE_PRESENT) &&
|
|
(cmd == CMD_REMOVE || cmd == CMD_EXTRACT)) {
|
|
DO_EXIT_1("CAB file does not have any signature: %s\n", options.infile);
|
|
} else if (cmd == CMD_EXTRACT) {
|
|
ret = cab_extract_file(indata, &header, outdata, options.output_pkcs7);
|
|
goto skip_signing;
|
|
} else if (cmd == CMD_REMOVE) {
|
|
ret = cab_remove_file(indata, &header, filesize, outdata);
|
|
goto skip_signing;
|
|
} else if (cmd == CMD_VERIFY) {
|
|
ret = cab_verify_file(indata, &header, &options);
|
|
goto skip_signing;
|
|
} else {
|
|
sig = cab_presign_file(type, cmd, &header, &options, &cparams, indata,
|
|
hash, outdata, &cursig);
|
|
if (!sig)
|
|
goto err_cleanup;
|
|
}
|
|
} else if (type == FILE_TYPE_PE) {
|
|
if ((cmd == CMD_REMOVE || cmd == CMD_EXTRACT) && header.sigpos == 0) {
|
|
DO_EXIT_1("PE file does not have any signature: %s\n", options.infile);
|
|
} else if (cmd == CMD_EXTRACT) {
|
|
ret = pe_extract_file(indata, &header, outdata, options.output_pkcs7);
|
|
goto skip_signing;
|
|
} else if (cmd == CMD_VERIFY) {
|
|
ret = pe_verify_file(indata, &header, &options);
|
|
goto skip_signing;
|
|
} else {
|
|
sig = pe_presign_file(type, cmd, &header, &options, &cparams, indata,
|
|
hash, outdata, &cursig);
|
|
if (cmd == CMD_REMOVE) {
|
|
ret = 0; /* OK */
|
|
goto skip_signing;
|
|
} else if (!sig)
|
|
goto err_cleanup;
|
|
}
|
|
} else if (type == FILE_TYPE_CAT) {
|
|
if (cmd == CMD_REMOVE || cmd == CMD_EXTRACT || (cmd==CMD_ATTACH)) {
|
|
DO_EXIT_0("Unsupported command\n");
|
|
} else if (cmd == CMD_VERIFY) {
|
|
ret = cat_verify_file(catdata, &catheader, indata, &header, filetype, &options);
|
|
goto skip_signing;
|
|
} else {
|
|
sig = cat_presign_file(type, cmd, &header, &options, &cparams, indata, &cursig);
|
|
if (!sig)
|
|
goto err_cleanup;
|
|
}
|
|
}
|
|
|
|
#ifdef ENABLE_CURL
|
|
/* add counter-signature/timestamp */
|
|
if (options.nturl && add_timestamp_authenticode(sig, &options))
|
|
DO_EXIT_2("%s\n%s\n", "Authenticode timestamping failed",
|
|
"Use the \"-ts\" option to add the RFC3161 Time-Stamp Authority or choose another one Authenticode Time-Stamp Authority");
|
|
if (options.ntsurl && add_timestamp_rfc3161(sig, &options))
|
|
DO_EXIT_2("%s\n%s\n", "RFC 3161 timestamping failed",
|
|
"Use the \"-t\" option to add the Authenticode Time-Stamp Authority or choose another one RFC3161 Time-Stamp Authority");
|
|
#endif /* ENABLE_CURL */
|
|
|
|
if (options.addBlob && !add_unauthenticated_blob(sig))
|
|
DO_EXIT_0("Adding unauthenticated blob failed\n");
|
|
|
|
#if 0
|
|
if (!PEM_write_PKCS7(stdout, sig))
|
|
DO_EXIT_0("PKCS7 output failed\n");
|
|
#endif
|
|
|
|
ret = append_signature(sig, cursig, type, &options, &msiparams, &padlen, &len, outdata);
|
|
if (ret)
|
|
DO_EXIT_0("Append signature to outfile failed\n");
|
|
|
|
skip_signing:
|
|
|
|
update_data_size(type, cmd, &header, padlen, len, outdata);
|
|
|
|
if (type == FILE_TYPE_MSI) {
|
|
BIO_free_all(outdata);
|
|
outdata = NULL;
|
|
} else {
|
|
BIO_free_all(hash);
|
|
hash = outdata = NULL;
|
|
}
|
|
|
|
if (!ret && cmd == CMD_ATTACH) {
|
|
/* reset MSI parameters */
|
|
free_msi_params(&msiparams);
|
|
memset(&msiparams, 0, sizeof(MSI_PARAMS));
|
|
ret = check_attached_data(type, &header, &options, &msiparams);
|
|
if (!ret)
|
|
printf("Signature successfully attached\n");
|
|
/* else
|
|
* the new signature has been successfully appended to the outfile
|
|
* but only its verification failed (incorrect verification parameters?)
|
|
* so the output file is not deleted
|
|
*/
|
|
}
|
|
|
|
err_cleanup:
|
|
if (cmd != CMD_ADD)
|
|
PKCS7_free(cursig);
|
|
PKCS7_free(sig);
|
|
if (hash)
|
|
BIO_free_all(hash);
|
|
if (outdata) {
|
|
if (type == FILE_TYPE_MSI) {
|
|
BIO_free_all(outdata);
|
|
outdata = NULL;
|
|
}
|
|
if (options.outfile) {
|
|
#ifdef WIN32
|
|
_unlink(options.outfile);
|
|
#else
|
|
unlink(options.outfile);
|
|
#endif /* WIN32 */
|
|
}
|
|
}
|
|
unmap_file(indata, filesize);
|
|
/* coverity[uninit_use_in_call] False-positive: msiparams initialized by memset */
|
|
free_msi_params(&msiparams);
|
|
/* coverity[uninit_use_in_call] False-positive: cparams initialized by memset */
|
|
free_crypto_params(&cparams);
|
|
free_options(&options);
|
|
#if OPENSSL_VERSION_NUMBER>=0x30000000L
|
|
providers_cleanup();
|
|
#endif /* OPENSSL_VERSION_NUMBER>=0x30000000L */
|
|
if (ret)
|
|
ERR_print_errors_fp(stdout);
|
|
if (cmd == CMD_HELP)
|
|
ret = 0; /* OK */
|
|
else
|
|
printf(ret ? "Failed\n" : "Succeeded\n");
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
Local Variables:
|
|
c-basic-offset: 4
|
|
tab-width: 4
|
|
indent-tabs-mode: t
|
|
End:
|
|
|
|
vim: set ts=4 noexpandtab:
|
|
*/
|