123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603 |
-
-
- FILE_LICENCE ( GPL2_OR_LATER );
-
-
-
- #include <stdint.h>
- #include <string.h>
- #include <time.h>
- #include <errno.h>
- #include <ipxe/asn1.h>
- #include <ipxe/x509.h>
- #include <ipxe/uaccess.h>
- #include <ipxe/cms.h>
-
-
- #define EACCES_NON_SIGNING \
- __einfo_error ( EINFO_EACCES_NON_SIGNING )
- #define EINFO_EACCES_NON_SIGNING \
- __einfo_uniqify ( EINFO_EACCES, 0x01, "Not a signing certificate" )
- #define EACCES_NON_CODE_SIGNING \
- __einfo_error ( EINFO_EACCES_NON_CODE_SIGNING )
- #define EINFO_EACCES_NON_CODE_SIGNING \
- __einfo_uniqify ( EINFO_EACCES, 0x02, "Not a code-signing certificate" )
- #define EACCES_INCOMPLETE \
- __einfo_error ( EINFO_EACCES_INCOMPLETE )
- #define EINFO_EACCES_INCOMPLETE \
- __einfo_uniqify ( EINFO_EACCES, 0x03, "Incomplete certificate chain" )
- #define EACCES_WRONG_NAME \
- __einfo_error ( EINFO_EACCES_WRONG_NAME )
- #define EINFO_EACCES_WRONG_NAME \
- __einfo_uniqify ( EINFO_EACCES, 0x04, "Incorrect certificate name" )
- #define EINVAL_DIGEST \
- __einfo_error ( EINFO_EINVAL_DIGEST )
- #define EINFO_EINVAL_DIGEST \
- __einfo_uniqify ( EINFO_EINVAL, 0x01, "Not a digest algorithm" )
- #define EINVAL_PUBKEY \
- __einfo_error ( EINFO_EINVAL_PUBKEY )
- #define EINFO_EINVAL_PUBKEY \
- __einfo_uniqify ( EINFO_EINVAL, 0x02, "Not a public-key algorithm" )
- #define ENOTSUP_SIGNEDDATA \
- __einfo_error ( EINFO_ENOTSUP_SIGNEDDATA )
- #define EINFO_ENOTSUP_SIGNEDDATA \
- __einfo_uniqify ( EINFO_ENOTSUP, 0x01, "Not a digital signature" )
- #define ENOTSUP_DIGEST \
- __einfo_error ( EINFO_ENOTSUP_DIGEST )
- #define EINFO_ENOTSUP_DIGEST \
- __einfo_uniqify ( EINFO_ENOTSUP, 0x02, "Unsupported digest algorithm" )
- #define ENOTSUP_PUBKEY \
- __einfo_error ( EINFO_ENOTSUP_PUBKEY )
- #define EINFO_ENOTSUP_PUBKEY \
- __einfo_uniqify ( EINFO_ENOTSUP, 0x03, \
- "Unsupported public-key algorithm" )
-
-
- static uint8_t oid_signeddata[] = { ASN1_OID_SIGNEDDATA };
-
-
- static struct asn1_cursor oid_signeddata_cursor =
- ASN1_OID_CURSOR ( oid_signeddata );
-
-
- static int cms_parse_content_type ( struct cms_signature *sig,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_OID );
-
-
- if ( asn1_compare ( &cursor, &oid_signeddata_cursor ) != 0 ) {
- DBGC ( sig, "CMS %p does not contain signedData:\n", sig );
- DBGC_HDA ( sig, 0, raw->data, raw->len );
- return -ENOTSUP_SIGNEDDATA;
- }
-
- DBGC ( sig, "CMS %p contains signedData\n", sig );
- return 0;
- }
-
-
- static int cms_parse_signer_identifier ( struct cms_signature *sig,
- struct cms_signer_info *info,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- memcpy ( &info->issuer, &cursor, sizeof ( info->issuer ) );
- if ( ( rc = asn1_shrink ( &info->issuer, ASN1_SEQUENCE ) ) != 0 ) {
- DBGC ( sig, "CMS %p/%p could not locate issuer: %s\n",
- sig, info, strerror ( rc ) );
- DBGC_HDA ( sig, 0, raw->data, raw->len );
- return rc;
- }
- DBGC ( sig, "CMS %p/%p issuer is:\n", sig, info );
- DBGC_HDA ( sig, 0, info->issuer.data, info->issuer.len );
- asn1_skip_any ( &cursor );
-
-
- memcpy ( &info->serial, &cursor, sizeof ( info->serial ) );
- if ( ( rc = asn1_shrink ( &info->serial, ASN1_INTEGER ) ) != 0 ) {
- DBGC ( sig, "CMS %p/%p could not locate serialNumber: %s\n",
- sig, info, strerror ( rc ) );
- DBGC_HDA ( sig, 0, raw->data, raw->len );
- return rc;
- }
- DBGC ( sig, "CMS %p/%p serial number is:\n", sig, info );
- DBGC_HDA ( sig, 0, info->serial.data, info->serial.len );
-
- return 0;
- }
-
-
- static int cms_parse_digest_algorithm ( struct cms_signature *sig,
- struct cms_signer_info *info,
- const struct asn1_cursor *raw ) {
- struct asn1_algorithm *algorithm;
-
-
- algorithm = asn1_algorithm ( raw );
- if ( ! algorithm ) {
- DBGC ( sig, "CMS %p/%p could not identify digest algorithm:\n",
- sig, info );
- DBGC_HDA ( sig, 0, raw->data, raw->len );
- return -ENOTSUP_DIGEST;
- }
-
-
- if ( ! algorithm->digest ) {
- DBGC ( sig, "CMS %p/%p algorithm %s is not a digest "
- "algorithm\n", sig, info, algorithm->name );
- return -EINVAL_DIGEST;
- }
-
-
- info->digest = algorithm->digest;
- DBGC ( sig, "CMS %p/%p digest algorithm is %s\n",
- sig, info, algorithm->name );
-
- return 0;
- }
-
-
- static int cms_parse_signature_algorithm ( struct cms_signature *sig,
- struct cms_signer_info *info,
- const struct asn1_cursor *raw ) {
- struct asn1_algorithm *algorithm;
-
-
- algorithm = asn1_algorithm ( raw );
- if ( ! algorithm ) {
- DBGC ( sig, "CMS %p/%p could not identify public-key "
- "algorithm:\n", sig, info );
- DBGC_HDA ( sig, 0, raw->data, raw->len );
- return -ENOTSUP_PUBKEY;
- }
-
-
- if ( ! algorithm->pubkey ) {
- DBGC ( sig, "CMS %p/%p algorithm %s is not a public-key "
- "algorithm\n", sig, info, algorithm->name );
- return -EINVAL_PUBKEY;
- }
-
-
- info->pubkey = algorithm->pubkey;
- DBGC ( sig, "CMS %p/%p public-key algorithm is %s\n",
- sig, info, algorithm->name );
-
- return 0;
- }
-
-
- static int cms_parse_signature_value ( struct cms_signature *sig,
- struct cms_signer_info *info,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- if ( ( rc = asn1_enter ( &cursor, ASN1_OCTET_STRING ) ) != 0 ) {
- DBGC ( sig, "CMS %p/%p could not locate signature:\n",
- sig, info );
- DBGC_HDA ( sig, 0, raw->data, raw->len );
- return rc;
- }
-
-
- info->signature = cursor.data;
- info->signature_len = cursor.len;
- DBGC ( sig, "CMS %p/%p signature value is:\n", sig, info );
- DBGC_HDA ( sig, 0, info->signature, info->signature_len );
-
- return 0;
- }
-
-
- static int cms_parse_signer_info ( struct cms_signature *sig,
- struct cms_signer_info *info,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- asn1_skip ( &cursor, ASN1_INTEGER );
-
-
- if ( ( rc = cms_parse_signer_identifier ( sig, info, &cursor ) ) != 0 )
- return rc;
- asn1_skip_any ( &cursor );
-
-
- if ( ( rc = cms_parse_digest_algorithm ( sig, info, &cursor ) ) != 0 )
- return rc;
- asn1_skip_any ( &cursor );
-
-
- asn1_skip_if_exists ( &cursor, ASN1_EXPLICIT_TAG ( 0 ) );
-
-
- if ( ( rc = cms_parse_signature_algorithm ( sig, info, &cursor ) ) != 0)
- return rc;
- asn1_skip_any ( &cursor );
-
-
- if ( ( rc = cms_parse_signature_value ( sig, info, &cursor ) ) != 0 )
- return rc;
-
- return 0;
- }
-
-
- int cms_parse ( struct cms_signature *sig, const void *data, size_t len ) {
- struct asn1_cursor cursor;
- int rc;
-
-
- memset ( sig, 0, sizeof ( *sig ) );
- cursor.data = data;
- cursor.len = len;
-
-
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- if ( ( rc = cms_parse_content_type ( sig, &cursor ) ) != 0 )
- return rc;
- asn1_skip_any ( &cursor );
-
-
- asn1_enter ( &cursor, ASN1_EXPLICIT_TAG ( 0 ) );
-
-
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- asn1_skip ( &cursor, ASN1_INTEGER );
-
-
- asn1_skip ( &cursor, ASN1_SET );
-
-
- asn1_skip ( &cursor, ASN1_SEQUENCE );
-
-
- memcpy ( &sig->certificates, &cursor, sizeof ( sig->certificates ) );
- if ( ( rc = asn1_enter ( &sig->certificates,
- ASN1_EXPLICIT_TAG ( 0 ) ) ) != 0 ) {
- DBGC ( sig, "CMS %p could not locate certificates:\n", sig );
- DBGC_HDA ( sig, 0, data, len );
- return rc;
- }
- asn1_skip_any ( &cursor );
-
-
- asn1_skip_if_exists ( &cursor, ASN1_EXPLICIT_TAG ( 1 ) );
-
-
- asn1_enter ( &cursor, ASN1_SET );
-
-
- if ( ( rc = cms_parse_signer_info ( sig, &sig->info, &cursor ) ) != 0 )
- return rc;
-
- return 0;
- }
-
-
- struct cms_chain_context {
-
- struct cms_signature *sig;
-
- struct cms_signer_info *info;
- };
-
-
- static int cms_parse_next ( struct x509_certificate *cert,
- const struct x509_certificate *previous,
- void *ctx ) {
- struct cms_chain_context *context = ctx;
- struct cms_signature *sig = context->sig;
- struct cms_signer_info *info = context->info;
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, &sig->certificates, sizeof ( cursor ) );
- while ( cursor.len ) {
-
-
- if ( ( rc = x509_parse ( cert, cursor.data,
- cursor.len ) ) != 0 ) {
- DBGC ( sig, "CMS %p/%p could not parse certificate:\n",
- sig, info );
- DBGC_HDA ( sig, 0, cursor.data, cursor.len );
- return rc;
- }
-
- if ( previous == NULL ) {
-
-
- if ( ( asn1_compare ( &info->issuer,
- &cert->issuer.raw ) == 0 ) &&
- ( asn1_compare ( &info->serial,
- &cert->serial.raw ) == 0 ) ) {
- return 0;
- }
- } else {
-
-
- if ( asn1_compare ( &previous->issuer.raw,
- &cert->subject.raw ) == 0 ) {
- return 0;
- }
- }
-
-
- asn1_skip_any ( &cursor );
- }
-
- DBGC ( sig, "CMS %p/%p reached end of certificate chain\n", sig, info );
- return -EACCES_INCOMPLETE;
- }
-
-
- static void cms_digest ( struct cms_signature *sig,
- struct cms_signer_info *info,
- userptr_t data, size_t len, void *out ) {
- struct digest_algorithm *digest = info->digest;
- uint8_t ctx[ digest->ctxsize ];
- uint8_t block[ digest->blocksize ];
- size_t offset = 0;
- size_t frag_len;
-
-
- digest_init ( digest, ctx );
-
-
- while ( len ) {
- frag_len = len;
- if ( frag_len > sizeof ( block ) )
- frag_len = sizeof ( block );
- copy_from_user ( block, data, offset, frag_len );
- digest_update ( digest, ctx, block, frag_len );
- offset += frag_len;
- len -= frag_len;
- }
-
-
- digest_final ( digest, ctx, out );
-
- DBGC ( sig, "CMS %p/%p digest value:\n", sig, info );
- DBGC_HDA ( sig, 0, out, digest->digestsize );
- }
-
-
- static int cms_verify_digest ( struct cms_signature *sig,
- struct cms_signer_info *info,
- struct x509_certificate *cert,
- userptr_t data, size_t len ) {
- struct digest_algorithm *digest = info->digest;
- struct pubkey_algorithm *pubkey = info->pubkey;
- struct x509_public_key *public_key = &cert->subject.public_key;
- uint8_t digest_out[ digest->digestsize ];
- uint8_t ctx[ pubkey->ctxsize ];
- int rc;
-
-
- cms_digest ( sig, info, data, len, digest_out );
-
-
- if ( ( rc = pubkey_init ( pubkey, ctx, public_key->raw.data,
- public_key->raw.len ) ) != 0 ) {
- DBGC ( sig, "CMS %p/%p could not initialise public key: %s\n",
- sig, info, strerror ( rc ) );
- goto err_init;
- }
-
-
- if ( ( rc = pubkey_verify ( pubkey, ctx, digest, digest_out,
- info->signature,
- info->signature_len ) ) != 0 ) {
- DBGC ( sig, "CMS %p/%p signature verification failed: %s\n",
- sig, info, strerror ( rc ) );
- return rc;
- }
-
- pubkey_final ( pubkey, ctx );
- err_init:
- return rc;
- }
-
-
- static int cms_verify_signer_info ( struct cms_signature *sig,
- struct cms_signer_info *info,
- userptr_t data, size_t len,
- const char *name, time_t time,
- struct x509_root *root ) {
- struct cms_chain_context context;
- struct x509_certificate cert;
- int rc;
-
-
- context.sig = sig;
- context.info = info;
- if ( ( rc = x509_validate_chain ( cms_parse_next, &context, time, root,
- &cert ) ) != 0 ) {
- DBGC ( sig, "CMS %p/%p could not validate chain: %s\n",
- sig, info, strerror ( rc ) );
- return rc;
- }
-
-
- if ( ! ( cert.extensions.usage.bits & X509_DIGITAL_SIGNATURE ) ) {
- DBGC ( sig, "CMS %p/%p certificate cannot create signatures\n",
- sig, info );
- return -EACCES_NON_SIGNING;
- }
-
-
- if ( ! ( cert.extensions.ext_usage.bits & X509_CODE_SIGNING ) ) {
- DBGC ( sig, "CMS %p/%p certificate is not code-signing\n",
- sig, info );
- return -EACCES_NON_CODE_SIGNING;
- }
-
-
- if ( ( name != NULL ) &&
- ( ( cert.subject.name.len != strlen ( name ) ) ||
- ( memcmp ( cert.subject.name.data, name,
- cert.subject.name.len ) != 0 ) ) ) {
- DBGC ( sig, "CMS %p/%p certificate name incorrect\n",
- sig, info );
- return -EACCES_WRONG_NAME;
- }
-
-
- if ( ( rc = cms_verify_digest ( sig, info, &cert, data, len ) ) != 0 )
- return rc;
-
- return 0;
- }
-
-
- int cms_verify ( struct cms_signature *sig, userptr_t data, size_t len,
- const char *name, time_t time, struct x509_root *root ) {
- int rc;
-
-
- if ( ( rc = cms_verify_signer_info ( sig, &sig->info, data, len,
- name, time, root ) ) != 0 )
- return rc;
-
- return 0;
- }
|