mirror of
https://github.com/mtrojnar/osslsigncode.git
synced 2025-04-04 08:50:12 -05:00
803 lines
24 KiB
C
803 lines
24 KiB
C
/*
|
|
* osslsigncode support library
|
|
*
|
|
* Copyright (C) 2021-2023 Michał Trojnara <Michal.Trojnara@stunnel.org>
|
|
* Author: Małgorzata Olszówka <Malgorzata.Olszowka@stunnel.org>
|
|
*/
|
|
|
|
#include "osslsigncode.h"
|
|
#include "helpers.h"
|
|
|
|
/* Prototypes */
|
|
static SpcSpOpusInfo *spc_sp_opus_info_create(FILE_FORMAT_CTX *ctx);
|
|
static int spc_indirect_data_content_create(u_char **blob, int *len, FILE_FORMAT_CTX *ctx);
|
|
static int pkcs7_signer_info_add_spc_sp_opus_info(PKCS7_SIGNER_INFO *si, FILE_FORMAT_CTX *ctx);
|
|
static int pkcs7_signer_info_add_signing_time(PKCS7_SIGNER_INFO *si, FILE_FORMAT_CTX *ctx);
|
|
static int pkcs7_signer_info_add_purpose(PKCS7_SIGNER_INFO *si, FILE_FORMAT_CTX *ctx);
|
|
static int pkcs7_signer_info_add_sequence_number(PKCS7_SIGNER_INFO *si, FILE_FORMAT_CTX *ctx);
|
|
static STACK_OF(X509) *X509_chain_get_sorted(FILE_FORMAT_CTX *ctx, int signer);
|
|
static int X509_compare(const X509 *const *a, const X509 *const *b);
|
|
|
|
/*
|
|
* Common functions
|
|
*/
|
|
|
|
/*
|
|
* [in] infile
|
|
* [returns] file size
|
|
*/
|
|
uint32_t get_file_size(const char *infile)
|
|
{
|
|
int ret;
|
|
#ifdef _WIN32
|
|
struct _stat64 st;
|
|
ret = _stat64(infile, &st);
|
|
#else
|
|
struct stat st;
|
|
ret = stat(infile, &st);
|
|
#endif
|
|
if (ret) {
|
|
printf("Failed to open file: %s\n", infile);
|
|
return 0;
|
|
}
|
|
|
|
if (st.st_size < 4) {
|
|
printf("Unrecognized file type - file is too short: %s\n", infile);
|
|
return 0;
|
|
}
|
|
if (st.st_size > UINT32_MAX) {
|
|
printf("Unsupported file - too large: %s\n", infile);
|
|
return 0;
|
|
}
|
|
return (uint32_t)st.st_size;
|
|
}
|
|
|
|
/*
|
|
* [in] infile: starting address for the new mapping
|
|
* [returns] pointer to the mapped area
|
|
*/
|
|
char *map_file(const char *infile, const size_t size)
|
|
{
|
|
char *indata = NULL;
|
|
#ifdef WIN32
|
|
HANDLE fhandle, fmap;
|
|
(void)size;
|
|
fhandle = CreateFile(infile, GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL);
|
|
if (fhandle == INVALID_HANDLE_VALUE) {
|
|
return NULL;
|
|
}
|
|
fmap = CreateFileMapping(fhandle, NULL, PAGE_READONLY, 0, 0, NULL);
|
|
CloseHandle(fhandle);
|
|
if (fmap == NULL) {
|
|
return NULL;
|
|
}
|
|
indata = (char *)MapViewOfFile(fmap, FILE_MAP_READ, 0, 0, 0);
|
|
CloseHandle(fmap);
|
|
#else
|
|
#ifdef HAVE_SYS_MMAN_H
|
|
int fd = open(infile, O_RDONLY);
|
|
if (fd < 0) {
|
|
return NULL;
|
|
}
|
|
indata = mmap(0, size, PROT_READ, MAP_PRIVATE, fd, 0);
|
|
if (indata == MAP_FAILED) {
|
|
close(fd);
|
|
return NULL;
|
|
}
|
|
close(fd);
|
|
#else
|
|
printf("No file mapping function\n");
|
|
return NULL;
|
|
#endif /* HAVE_SYS_MMAN_H */
|
|
#endif /* WIN32 */
|
|
return indata;
|
|
}
|
|
|
|
/*
|
|
* [in] indata: starting address space
|
|
* [in] size: mapped area length
|
|
* [returns] none
|
|
*/
|
|
void unmap_file(char *indata, const size_t size)
|
|
{
|
|
if (!indata)
|
|
return;
|
|
#ifdef WIN32
|
|
(void)size;
|
|
UnmapViewOfFile(indata);
|
|
#else
|
|
munmap(indata, size);
|
|
#endif /* WIN32 */
|
|
}
|
|
|
|
/*
|
|
* Retrieve a decoded PKCS#7 structure
|
|
* [in] data: encoded PEM or DER data
|
|
* [in] size: data size
|
|
* [returns] pointer to PKCS#7 structure
|
|
*/
|
|
PKCS7 *pkcs7_read_data(char *data, uint32_t size)
|
|
{
|
|
PKCS7 *p7 = NULL;
|
|
BIO *bio;
|
|
const char pemhdr[] = "-----BEGIN PKCS7-----";
|
|
|
|
bio = BIO_new_mem_buf(data, (int)size);
|
|
if (size >= sizeof pemhdr && !memcmp(data, pemhdr, sizeof pemhdr - 1)) {
|
|
/* PEM format */
|
|
p7 = PEM_read_bio_PKCS7(bio, NULL, NULL, NULL);
|
|
} else { /* DER format */
|
|
p7 = d2i_PKCS7_bio(bio, NULL);
|
|
}
|
|
BIO_free_all(bio);
|
|
return p7;
|
|
}
|
|
|
|
/*
|
|
* [in, out] ctx: structure holds input and output data
|
|
* [out] outdata: BIO outdata file
|
|
* [in] p7: PKCS#7 signature
|
|
* [returns] 1 on error or 0 on success
|
|
*/
|
|
int data_write_pkcs7(FILE_FORMAT_CTX *ctx, BIO *outdata, PKCS7 *p7)
|
|
{
|
|
int ret;
|
|
|
|
(void)BIO_reset(outdata);
|
|
if (ctx->options->output_pkcs7) {
|
|
/* PEM format */
|
|
ret = !PEM_write_bio_PKCS7(outdata, p7);
|
|
} else {
|
|
/* default DER format */
|
|
ret = !i2d_PKCS7_bio(outdata, p7);
|
|
}
|
|
if (ret) {
|
|
printf("Unable to write pkcs7 object\n");
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Allocate, set type, add content and return a new PKCS#7 signature
|
|
* [in] ctx: structure holds input and output data
|
|
* [returns] pointer to PKCS#7 structure
|
|
*/
|
|
PKCS7 *pkcs7_create(FILE_FORMAT_CTX *ctx)
|
|
{
|
|
int i, signer = -1;
|
|
PKCS7 *p7;
|
|
PKCS7_SIGNER_INFO *si = NULL;
|
|
STACK_OF(X509) *chain = NULL;
|
|
|
|
p7 = PKCS7_new();
|
|
PKCS7_set_type(p7, NID_pkcs7_signed);
|
|
PKCS7_content_new(p7, NID_pkcs7_data);
|
|
if (ctx->options->cert != NULL) {
|
|
/*
|
|
* the private key and corresponding certificate are parsed from the PKCS12
|
|
* structure or loaded from the security token, so we may omit to check
|
|
* the consistency of a private key with the public key in an X509 certificate
|
|
*/
|
|
si = PKCS7_add_signature(p7, ctx->options->cert, ctx->options->pkey,
|
|
ctx->options->md);
|
|
if (si == NULL)
|
|
return NULL; /* FAILED */
|
|
} else {
|
|
/* find the signer's certificate located somewhere in the whole certificate chain */
|
|
for (i=0; i<sk_X509_num(ctx->options->certs); i++) {
|
|
X509 *signcert = sk_X509_value(ctx->options->certs, i);
|
|
if (X509_check_private_key(signcert, ctx->options->pkey)) {
|
|
si = PKCS7_add_signature(p7, signcert, ctx->options->pkey, ctx->options->md);
|
|
signer = i;
|
|
break;
|
|
}
|
|
}
|
|
if (si == NULL) {
|
|
printf("Failed to checking the consistency of a private key: %s\n",
|
|
ctx->options->keyfile);
|
|
printf(" with a public key in any X509 certificate: %s\n\n",
|
|
ctx->options->certfile);
|
|
return NULL; /* FAILED */
|
|
}
|
|
}
|
|
if (!pkcs7_signer_info_add_signing_time(si, ctx)) {
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!pkcs7_signer_info_add_purpose(si, ctx)) {
|
|
return NULL; /* FAILED */
|
|
}
|
|
if ((ctx->options->desc || ctx->options->url) &&
|
|
!pkcs7_signer_info_add_spc_sp_opus_info(si, ctx)) {
|
|
printf("Couldn't allocate memory for opus info\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
if ((ctx->options->nested_number >= 0) &&
|
|
!pkcs7_signer_info_add_sequence_number(si, ctx)) {
|
|
return NULL; /* FAILED */
|
|
}
|
|
/* create X509 chain sorted in ascending order by their DER encoding */
|
|
chain = X509_chain_get_sorted(ctx, signer);
|
|
if (chain == NULL) {
|
|
printf("Failed to create a sorted certificate chain\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
/* add sorted certificate chain */
|
|
for (i=0; i<sk_X509_num(chain); i++) {
|
|
PKCS7_add_certificate(p7, sk_X509_value(chain, i));
|
|
}
|
|
/* add crls */
|
|
if (ctx->options->crls) {
|
|
for (i=0; i<sk_X509_CRL_num(ctx->options->crls); i++)
|
|
PKCS7_add_crl(p7, sk_X509_CRL_value(ctx->options->crls, i));
|
|
}
|
|
sk_X509_free(chain);
|
|
return p7; /* OK */
|
|
}
|
|
|
|
/*
|
|
* PE, MSI, CAB and APPX file specific
|
|
* Add "1.3.6.1.4.1.311.2.1.4" SPC_INDIRECT_DATA_OBJID signed attribute
|
|
* [in, out] p7: new PKCS#7 signature
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
int add_indirect_data_object(PKCS7 *p7)
|
|
{
|
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info;
|
|
PKCS7_SIGNER_INFO *si;
|
|
|
|
signer_info = PKCS7_get_signer_info(p7);
|
|
if (!signer_info)
|
|
return 0; /* FAILED */
|
|
si = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
|
if (!si)
|
|
return 0; /* FAILED */
|
|
if (!PKCS7_add_signed_attribute(si, NID_pkcs9_contentType,
|
|
V_ASN1_OBJECT, OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1)))
|
|
return 0; /* FAILED */
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* PE, MSI, CAB and APPX format specific
|
|
* Sign the MS Authenticode spcIndirectDataContent blob.
|
|
* The spcIndirectDataContent structure is used in Authenticode signatures
|
|
* to store the digest and other attributes of the signed file.
|
|
* [in, out] p7: new PKCS#7 signature
|
|
* [in] content: spcIndirectDataContent
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
int sign_spc_indirect_data_content(PKCS7 *p7, ASN1_OCTET_STRING *content)
|
|
{
|
|
int len, hdrlen;
|
|
const u_char *data;
|
|
PKCS7 *td7;
|
|
|
|
data = ASN1_STRING_get0_data(content);
|
|
len = ASN1_STRING_length(content);
|
|
hdrlen = ASN1_object_size(0, len, V_ASN1_SEQUENCE) - len;
|
|
|
|
if (!pkcs7_sign_content(p7, data + hdrlen, len - hdrlen)) {
|
|
printf("Failed to sign spcIndirectDataContent\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
td7 = PKCS7_new();
|
|
if (!td7) {
|
|
return 0; /* FAILED */
|
|
}
|
|
td7->type = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1);
|
|
td7->d.other = ASN1_TYPE_new();
|
|
td7->d.other->type = V_ASN1_SEQUENCE;
|
|
td7->d.other->value.sequence = ASN1_STRING_new();
|
|
ASN1_STRING_set(td7->d.other->value.sequence, data, len);
|
|
if (!PKCS7_set_content(p7, td7)) {
|
|
printf("PKCS7_set_content failed\n");
|
|
PKCS7_free(td7);
|
|
return 0; /* FAILED */
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* Add encapsulated content to signed PKCS7 structure.
|
|
* [in] content: spcIndirectDataContent
|
|
* [returns] new PKCS#7 signature with encapsulated content
|
|
*/
|
|
PKCS7 *pkcs7_set_content(ASN1_OCTET_STRING *content)
|
|
{
|
|
PKCS7 *p7, *td7;
|
|
|
|
p7 = PKCS7_new();
|
|
if (!p7) {
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!PKCS7_set_type(p7, NID_pkcs7_signed)) {
|
|
PKCS7_free(p7);
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!PKCS7_content_new(p7, NID_pkcs7_data)) {
|
|
PKCS7_free(p7);
|
|
return NULL; /* FAILED */
|
|
}
|
|
td7 = PKCS7_new();
|
|
if (!td7) {
|
|
PKCS7_free(p7);
|
|
return NULL; /* FAILED */
|
|
}
|
|
td7->type = OBJ_txt2obj(SPC_INDIRECT_DATA_OBJID, 1);
|
|
td7->d.other = ASN1_TYPE_new();
|
|
td7->d.other->type = V_ASN1_SEQUENCE;
|
|
td7->d.other->value.sequence = content;
|
|
if (!PKCS7_set_content(p7, td7)) {
|
|
PKCS7_free(td7);
|
|
PKCS7_free(p7);
|
|
return NULL; /* FAILED */
|
|
}
|
|
return p7;
|
|
}
|
|
|
|
/*
|
|
* Return spcIndirectDataContent.
|
|
* [in] hash: message digest BIO
|
|
* [in] ctx: structure holds input and output data
|
|
* [returns] content
|
|
*/
|
|
ASN1_OCTET_STRING *spc_indirect_data_content_get(BIO *hash, FILE_FORMAT_CTX *ctx)
|
|
{
|
|
ASN1_OCTET_STRING *content;
|
|
u_char mdbuf[5 * EVP_MAX_MD_SIZE + 24];
|
|
int mdlen, hashlen, len = 0;
|
|
u_char *data, *p = NULL;
|
|
|
|
content = ASN1_OCTET_STRING_new();
|
|
if (!content) {
|
|
return NULL; /* FAILED */
|
|
}
|
|
if (!spc_indirect_data_content_create(&p, &len, ctx)) {
|
|
ASN1_OCTET_STRING_free(content);
|
|
return NULL; /* FAILED */
|
|
}
|
|
hashlen = ctx->format->hash_length_get(ctx);
|
|
if (hashlen > EVP_MAX_MD_SIZE) {
|
|
/* APPX format specific */
|
|
mdlen = BIO_read(hash, (char*)mdbuf, hashlen);
|
|
} else {
|
|
mdlen = BIO_gets(hash, (char*)mdbuf, EVP_MAX_MD_SIZE);
|
|
}
|
|
data = OPENSSL_malloc((size_t)(len + mdlen));
|
|
memcpy(data, p, (size_t)len);
|
|
OPENSSL_free(p);
|
|
memcpy(data + len, mdbuf, (size_t)mdlen);
|
|
if (!ASN1_OCTET_STRING_set(content, data, len + mdlen)) {
|
|
ASN1_OCTET_STRING_free(content);
|
|
OPENSSL_free(data);
|
|
return NULL; /* FAILED */
|
|
}
|
|
OPENSSL_free(data);
|
|
return content;
|
|
}
|
|
|
|
/*
|
|
* Signs the data and place the signature in p7
|
|
* [in, out] p7: new PKCS#7 signature
|
|
* [in] data: content data
|
|
* [in] len: content length
|
|
*/
|
|
int pkcs7_sign_content(PKCS7 *p7, const u_char *data, int len)
|
|
{
|
|
BIO *p7bio;
|
|
|
|
if ((p7bio = PKCS7_dataInit(p7, NULL)) == NULL) {
|
|
printf("PKCS7_dataInit failed\n");
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_write(p7bio, data, len);
|
|
(void)BIO_flush(p7bio);
|
|
if (!PKCS7_dataFinal(p7, p7bio)) {
|
|
printf("PKCS7_dataFinal failed\n");
|
|
BIO_free_all(p7bio);
|
|
return 0; /* FAILED */
|
|
}
|
|
BIO_free_all(p7bio);
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/* Return the header length (tag and length octets) of the ASN.1 type
|
|
* [in] p: ASN.1 data
|
|
* [in] len: ASN.1 data length
|
|
* [returns] header length
|
|
*/
|
|
int asn1_simple_hdr_len(const u_char *p, int len)
|
|
{
|
|
if (len <= 2 || p[0] > 0x31)
|
|
return 0;
|
|
return (p[1]&0x80) ? (2 + (p[1]&0x7f)) : 2;
|
|
}
|
|
|
|
/*
|
|
* [in, out] hash: BIO with message digest method
|
|
* [in] indata: starting address space
|
|
* [in] idx: offset
|
|
* [in] fileend: the length of the hashed area
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
int bio_hash_data(BIO *hash, char *indata, size_t idx, size_t fileend)
|
|
{
|
|
while (idx < fileend) {
|
|
size_t want, written;
|
|
want = fileend - idx;
|
|
if (want > SIZE_64K)
|
|
want = SIZE_64K;
|
|
if (!BIO_write_ex(hash, indata + idx, want, &written))
|
|
return 0; /* FAILED */
|
|
idx += written;
|
|
}
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* [in] descript1, descript2: descriptions
|
|
* [in] mdbuf: message digest
|
|
* [in] len: message digest length
|
|
* [returns] none
|
|
*/
|
|
void print_hash(const char *descript1, const char *descript2, const u_char *mdbuf, int len)
|
|
{
|
|
char *hexbuf = NULL;
|
|
int size, i, j = 0;
|
|
|
|
size = 2 * len + 1;
|
|
hexbuf = OPENSSL_malloc((size_t)size);
|
|
for (i = 0; i < len; i++) {
|
|
#ifdef WIN32
|
|
j += sprintf_s(hexbuf + j, size - j, "%02X", mdbuf[i]);
|
|
#else
|
|
j += sprintf(hexbuf + j, "%02X", mdbuf[i]);
|
|
#endif /* WIN32 */
|
|
}
|
|
printf("%s: %s %s\n", descript1, hexbuf, descript2);
|
|
OPENSSL_free(hexbuf);
|
|
}
|
|
|
|
/*
|
|
* [in] p7: new PKCS#7 signature
|
|
* [in] objid: Microsoft OID Authenticode
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
int is_content_type(PKCS7 *p7, const char *objid)
|
|
{
|
|
ASN1_OBJECT *indir_objid;
|
|
int ret;
|
|
|
|
indir_objid = OBJ_txt2obj(objid, 1);
|
|
ret = p7 && PKCS7_type_is_signed(p7) &&
|
|
!OBJ_cmp(p7->d.sign->contents->type, indir_objid) &&
|
|
(p7->d.sign->contents->d.other->type == V_ASN1_SEQUENCE ||
|
|
p7->d.sign->contents->d.other->type == V_ASN1_OCTET_STRING);
|
|
ASN1_OBJECT_free(indir_objid);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* [in] p7: new PKCS#7 signature
|
|
* [returns] pointer to MsCtlContent structure
|
|
*/
|
|
MsCtlContent *ms_ctl_content_get(PKCS7 *p7)
|
|
{
|
|
ASN1_STRING *value;
|
|
const u_char *data;
|
|
|
|
if (!is_content_type(p7, MS_CTL_OBJID)) {
|
|
printf("Failed to find MS_CTL_OBJID\n");
|
|
return NULL; /* FAILED */
|
|
}
|
|
value = p7->d.sign->contents->d.other->value.sequence;
|
|
data = ASN1_STRING_get0_data(value);
|
|
return d2i_MsCtlContent(NULL, &data, ASN1_STRING_length(value));
|
|
}
|
|
|
|
/*
|
|
* [in] attribute: catalog attribute
|
|
* [returns] catalog content
|
|
*/
|
|
ASN1_TYPE *catalog_content_get(CatalogAuthAttr *attribute)
|
|
{
|
|
ASN1_STRING *value;
|
|
STACK_OF(ASN1_TYPE) *contents;
|
|
ASN1_TYPE *content;
|
|
const u_char *contents_data;
|
|
|
|
value = attribute->contents->value.sequence;
|
|
contents_data = ASN1_STRING_get0_data(value);
|
|
contents = d2i_ASN1_SET_ANY(NULL, &contents_data, ASN1_STRING_length(value));
|
|
if (!contents)
|
|
return 0; /* FAILED */
|
|
content = sk_ASN1_TYPE_value(contents, 0);
|
|
sk_ASN1_TYPE_free(contents);
|
|
return content;
|
|
}
|
|
|
|
/*
|
|
* PE and CAB format specific
|
|
* [in] none
|
|
* [returns] pointer to SpcLink
|
|
*/
|
|
SpcLink *spc_link_obsolete_get(void)
|
|
{
|
|
const u_char obsolete[] = {
|
|
0x00, 0x3c, 0x00, 0x3c, 0x00, 0x3c, 0x00, 0x4f,
|
|
0x00, 0x62, 0x00, 0x73, 0x00, 0x6f, 0x00, 0x6c,
|
|
0x00, 0x65, 0x00, 0x74, 0x00, 0x65, 0x00, 0x3e,
|
|
0x00, 0x3e, 0x00, 0x3e
|
|
};
|
|
SpcLink *link = SpcLink_new();
|
|
link->type = 2;
|
|
link->value.file = SpcString_new();
|
|
link->value.file->type = 0;
|
|
link->value.file->value.unicode = ASN1_BMPSTRING_new();
|
|
ASN1_STRING_set(link->value.file->value.unicode, obsolete, sizeof obsolete);
|
|
return link;
|
|
}
|
|
|
|
/*
|
|
* [in] mdbuf, cmdbuf: message digests
|
|
* [in] mdtype: message digest algorithm type
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
int compare_digests(u_char *mdbuf, u_char *cmdbuf, int mdtype)
|
|
{
|
|
int mdlen = EVP_MD_size(EVP_get_digestbynid(mdtype));
|
|
int mdok = !memcmp(mdbuf, cmdbuf, (size_t)mdlen);
|
|
printf("Message digest algorithm : %s\n", OBJ_nid2sn(mdtype));
|
|
print_hash("Current message digest ", "", mdbuf, mdlen);
|
|
print_hash("Calculated message digest ", mdok ? "\n" : " MISMATCH!!!\n", cmdbuf, mdlen);
|
|
return mdok;
|
|
}
|
|
|
|
/*
|
|
* Helper functions
|
|
*/
|
|
|
|
/*
|
|
* [in] ctx: FILE_FORMAT_CTX structure
|
|
* [returns] pointer to SpcSpOpusInfo structure
|
|
*/
|
|
static SpcSpOpusInfo *spc_sp_opus_info_create(FILE_FORMAT_CTX *ctx)
|
|
{
|
|
SpcSpOpusInfo *info = SpcSpOpusInfo_new();
|
|
|
|
if (ctx->options->desc) {
|
|
info->programName = SpcString_new();
|
|
info->programName->type = 1;
|
|
info->programName->value.ascii = ASN1_IA5STRING_new();
|
|
ASN1_STRING_set((ASN1_STRING *)info->programName->value.ascii,
|
|
ctx->options->desc, (int)strlen(ctx->options->desc));
|
|
}
|
|
if (ctx->options->url) {
|
|
info->moreInfo = SpcLink_new();
|
|
info->moreInfo->type = 0;
|
|
info->moreInfo->value.url = ASN1_IA5STRING_new();
|
|
ASN1_STRING_set((ASN1_STRING *)info->moreInfo->value.url,
|
|
ctx->options->url, (int)strlen(ctx->options->url));
|
|
}
|
|
return info;
|
|
}
|
|
|
|
/*
|
|
* [out] blob: SpcIndirectDataContent data
|
|
* [out] len: SpcIndirectDataContent data length
|
|
* [in] ctx: FILE_FORMAT_CTX structure
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
static int spc_indirect_data_content_create(u_char **blob, int *len, FILE_FORMAT_CTX *ctx)
|
|
{
|
|
u_char *p = NULL;
|
|
int mdtype, hashlen, l = 0;
|
|
void *hash;
|
|
SpcIndirectDataContent *idc = SpcIndirectDataContent_new();
|
|
|
|
if (ctx->format->md_get) {
|
|
/* APPX file specific - use a hash algorithm specified in the AppxBlockMap.xml file */
|
|
mdtype = EVP_MD_nid(ctx->format->md_get(ctx));
|
|
} else {
|
|
mdtype = EVP_MD_nid(ctx->options->md);
|
|
}
|
|
idc->data->value = ASN1_TYPE_new();
|
|
idc->data->value->type = V_ASN1_SEQUENCE;
|
|
idc->data->value->value.sequence = ASN1_STRING_new();
|
|
idc->data->type = ctx->format->data_blob_get(&p, &l, ctx);
|
|
idc->data->value->value.sequence->data = p;
|
|
idc->data->value->value.sequence->length = l;
|
|
idc->messageDigest->digestAlgorithm->algorithm = OBJ_nid2obj(mdtype);
|
|
idc->messageDigest->digestAlgorithm->parameters = ASN1_TYPE_new();
|
|
idc->messageDigest->digestAlgorithm->parameters->type = V_ASN1_NULL;
|
|
|
|
hashlen = ctx->format->hash_length_get(ctx);
|
|
hash = OPENSSL_zalloc((size_t)hashlen);
|
|
ASN1_OCTET_STRING_set(idc->messageDigest->digest, hash, hashlen);
|
|
OPENSSL_free(hash);
|
|
|
|
*len = i2d_SpcIndirectDataContent(idc, NULL);
|
|
*blob = OPENSSL_malloc((size_t)*len);
|
|
p = *blob;
|
|
i2d_SpcIndirectDataContent(idc, &p);
|
|
SpcIndirectDataContent_free(idc);
|
|
*len -= hashlen;
|
|
return 1; /* OK */
|
|
}
|
|
|
|
/*
|
|
* [in, out] si: PKCS7_SIGNER_INFO structure
|
|
* [in] ctx: FILE_FORMAT_CTX structure
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
static int pkcs7_signer_info_add_spc_sp_opus_info(PKCS7_SIGNER_INFO *si, FILE_FORMAT_CTX *ctx)
|
|
{
|
|
SpcSpOpusInfo *opus;
|
|
ASN1_STRING *astr;
|
|
int len;
|
|
u_char *p = NULL;
|
|
|
|
opus = spc_sp_opus_info_create(ctx);
|
|
if ((len = i2d_SpcSpOpusInfo(opus, NULL)) <= 0
|
|
|| (p = OPENSSL_malloc((size_t)len)) == NULL) {
|
|
SpcSpOpusInfo_free(opus);
|
|
return 0; /* FAILED */
|
|
}
|
|
i2d_SpcSpOpusInfo(opus, &p);
|
|
p -= len;
|
|
astr = ASN1_STRING_new();
|
|
ASN1_STRING_set(astr, p, len);
|
|
OPENSSL_free(p);
|
|
SpcSpOpusInfo_free(opus);
|
|
return PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_SP_OPUS_INFO_OBJID),
|
|
V_ASN1_SEQUENCE, astr);
|
|
}
|
|
|
|
/*
|
|
* Add a custom, non-trusted time to the PKCS7 structure to prevent OpenSSL
|
|
* adding the _current_ time. This allows to create a deterministic signature
|
|
* when no trusted timestamp server was specified, making osslsigncode
|
|
* behaviour closer to signtool.exe (which doesn't include any non-trusted
|
|
* time in this case.)
|
|
* [in, out] si: PKCS7_SIGNER_INFO structure
|
|
* [in] ctx: structure holds input and output data
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
static int pkcs7_signer_info_add_signing_time(PKCS7_SIGNER_INFO *si, FILE_FORMAT_CTX *ctx)
|
|
{
|
|
if (ctx->options->time == INVALID_TIME) /* -time option was not specified */
|
|
return 1; /* SUCCESS */
|
|
return PKCS7_add_signed_attribute(si, NID_pkcs9_signingTime, V_ASN1_UTCTIME,
|
|
ASN1_TIME_adj(NULL, ctx->options->time, 0, 0));
|
|
}
|
|
|
|
/*
|
|
* [in, out] si: PKCS7_SIGNER_INFO structure
|
|
* [in] ctx: structure holds input and output data
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
static int pkcs7_signer_info_add_purpose(PKCS7_SIGNER_INFO *si, FILE_FORMAT_CTX *ctx)
|
|
{
|
|
static const u_char purpose_ind[] = {
|
|
0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
|
|
0x01, 0x82, 0x37, 0x02, 0x01, 0x15
|
|
};
|
|
static const u_char purpose_comm[] = {
|
|
0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
|
|
0x01, 0x82, 0x37, 0x02, 0x01, 0x16
|
|
};
|
|
ASN1_STRING *purpose = ASN1_STRING_new();
|
|
|
|
if (ctx->options->comm) {
|
|
ASN1_STRING_set(purpose, purpose_comm, sizeof purpose_comm);
|
|
} else {
|
|
ASN1_STRING_set(purpose, purpose_ind, sizeof purpose_ind);
|
|
}
|
|
return PKCS7_add_signed_attribute(si, OBJ_txt2nid(SPC_STATEMENT_TYPE_OBJID),
|
|
V_ASN1_SEQUENCE, purpose);
|
|
}
|
|
|
|
/*
|
|
* [in, out] si: PKCS7_SIGNER_INFO structure
|
|
* [in] ctx: structure holds input and output data
|
|
* [returns] 0 on error or 1 on success
|
|
*/
|
|
static int pkcs7_signer_info_add_sequence_number(PKCS7_SIGNER_INFO *si, FILE_FORMAT_CTX *ctx)
|
|
{
|
|
ASN1_INTEGER *number = ASN1_INTEGER_new();
|
|
|
|
if (!number)
|
|
return 0; /* FAILED */
|
|
if (!ASN1_INTEGER_set(number, ctx->options->nested_number + 1)) {
|
|
ASN1_INTEGER_free(number);
|
|
return 0; /* FAILED */
|
|
}
|
|
return PKCS7_add_signed_attribute(si, OBJ_txt2nid(PKCS9_SEQUENCE_NUMBER),
|
|
V_ASN1_INTEGER, number);
|
|
}
|
|
|
|
/*
|
|
* Create certificate chain sorted in ascending order by their DER encoding.
|
|
* [in] ctx: structure holds input and output data
|
|
* [in] signer: signer's certificate number in the certificate chain
|
|
* [returns] sorted certificate chain
|
|
*/
|
|
static STACK_OF(X509) *X509_chain_get_sorted(FILE_FORMAT_CTX *ctx, int signer)
|
|
{
|
|
int i;
|
|
STACK_OF(X509) *chain = sk_X509_new(X509_compare);
|
|
|
|
/* add the signer's certificate */
|
|
if (ctx->options->cert != NULL && !sk_X509_push(chain, ctx->options->cert)) {
|
|
sk_X509_free(chain);
|
|
return NULL;
|
|
}
|
|
if (signer != -1 && !sk_X509_push(chain, sk_X509_value(ctx->options->certs, signer))) {
|
|
sk_X509_free(chain);
|
|
return NULL;
|
|
}
|
|
/* add the certificate chain */
|
|
for (i=0; i<sk_X509_num(ctx->options->certs); i++) {
|
|
if (i == signer)
|
|
continue;
|
|
if (!sk_X509_push(chain, sk_X509_value(ctx->options->certs, i))) {
|
|
sk_X509_free(chain);
|
|
return NULL;
|
|
}
|
|
}
|
|
/* add all cross certificates */
|
|
if (ctx->options->xcerts) {
|
|
for (i=0; i<sk_X509_num(ctx->options->xcerts); i++) {
|
|
if (!sk_X509_push(chain, sk_X509_value(ctx->options->xcerts, i))) {
|
|
sk_X509_free(chain);
|
|
return NULL;
|
|
}
|
|
}
|
|
}
|
|
/* sort certificate chain using the supplied comparison function */
|
|
sk_X509_sort(chain);
|
|
return chain;
|
|
}
|
|
|
|
/*
|
|
* X.690-compliant certificate comparison function
|
|
* Windows requires catalog files to use PKCS#7
|
|
* content ordering specified in X.690 section 11.6
|
|
* https://support.microsoft.com/en-us/topic/october-13-2020-kb4580358-security-only-update-d3f6eb3c-d7c4-a9cb-0de6-759386bf7113
|
|
* This algorithm is different from X509_cmp()
|
|
* [in] a_ptr, b_ptr: pointers to X509 certificates
|
|
* [returns] certificates order
|
|
*/
|
|
static int X509_compare(const X509 *const *a, const X509 *const *b)
|
|
{
|
|
u_char *a_data, *b_data, *a_tmp, *b_tmp;
|
|
size_t a_len, b_len;
|
|
int ret;
|
|
|
|
a_len = (size_t)i2d_X509(*a, NULL);
|
|
a_tmp = a_data = OPENSSL_malloc(a_len);
|
|
i2d_X509(*a, &a_tmp);
|
|
|
|
b_len = (size_t)i2d_X509(*b, NULL);
|
|
b_tmp = b_data = OPENSSL_malloc(b_len);
|
|
i2d_X509(*b, &b_tmp);
|
|
|
|
ret = memcmp(a_data, b_data, MIN(a_len, b_len));
|
|
OPENSSL_free(a_data);
|
|
OPENSSL_free(b_data);
|
|
|
|
if (ret == 0 && a_len != b_len) /* identical up to the length of the shorter DER */
|
|
ret = a_len < b_len ? -1 : 1; /* shorter is smaller */
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
Local Variables:
|
|
c-basic-offset: 4
|
|
tab-width: 4
|
|
indent-tabs-mode: nil
|
|
End:
|
|
|
|
vim: set ts=4 expandtab:
|
|
*/
|