Linux Audio

Check our new training course

Loading...
v6.2
  1// SPDX-License-Identifier: GPL-2.0-or-later
  2/* Parse a Microsoft Individual Code Signing blob
  3 *
  4 * Copyright (C) 2014 Red Hat, Inc. All Rights Reserved.
  5 * Written by David Howells (dhowells@redhat.com)
 
 
 
 
 
  6 */
  7
  8#define pr_fmt(fmt) "MSCODE: "fmt
  9#include <linux/kernel.h>
 10#include <linux/slab.h>
 11#include <linux/err.h>
 12#include <linux/oid_registry.h>
 13#include <crypto/pkcs7.h>
 14#include "verify_pefile.h"
 15#include "mscode.asn1.h"
 16
 17/*
 18 * Parse a Microsoft Individual Code Signing blob
 19 */
 20int mscode_parse(void *_ctx, const void *content_data, size_t data_len,
 21		 size_t asn1hdrlen)
 22{
 23	struct pefile_context *ctx = _ctx;
 24
 25	content_data -= asn1hdrlen;
 26	data_len += asn1hdrlen;
 27	pr_devel("Data: %zu [%*ph]\n", data_len, (unsigned)(data_len),
 28		 content_data);
 29
 30	return asn1_ber_decoder(&mscode_decoder, ctx, content_data, data_len);
 31}
 32
 33/*
 34 * Check the content type OID
 35 */
 36int mscode_note_content_type(void *context, size_t hdrlen,
 37			     unsigned char tag,
 38			     const void *value, size_t vlen)
 39{
 40	enum OID oid;
 41
 42	oid = look_up_OID(value, vlen);
 43	if (oid == OID__NR) {
 44		char buffer[50];
 45
 46		sprint_oid(value, vlen, buffer, sizeof(buffer));
 47		pr_err("Unknown OID: %s\n", buffer);
 48		return -EBADMSG;
 49	}
 50
 51	/*
 52	 * pesign utility had a bug where it was putting
 53	 * OID_msIndividualSPKeyPurpose instead of OID_msPeImageDataObjId
 54	 * So allow both OIDs.
 55	 */
 56	if (oid != OID_msPeImageDataObjId &&
 57	    oid != OID_msIndividualSPKeyPurpose) {
 58		pr_err("Unexpected content type OID %u\n", oid);
 59		return -EBADMSG;
 60	}
 61
 62	return 0;
 63}
 64
 65/*
 66 * Note the digest algorithm OID
 67 */
 68int mscode_note_digest_algo(void *context, size_t hdrlen,
 69			    unsigned char tag,
 70			    const void *value, size_t vlen)
 71{
 72	struct pefile_context *ctx = context;
 73	char buffer[50];
 74	enum OID oid;
 75
 76	oid = look_up_OID(value, vlen);
 77	switch (oid) {
 78	case OID_md4:
 79		ctx->digest_algo = "md4";
 80		break;
 81	case OID_md5:
 82		ctx->digest_algo = "md5";
 83		break;
 84	case OID_sha1:
 85		ctx->digest_algo = "sha1";
 86		break;
 87	case OID_sha256:
 88		ctx->digest_algo = "sha256";
 89		break;
 90	case OID_sha384:
 91		ctx->digest_algo = "sha384";
 92		break;
 93	case OID_sha512:
 94		ctx->digest_algo = "sha512";
 95		break;
 96	case OID_sha224:
 97		ctx->digest_algo = "sha224";
 98		break;
 99
100	case OID__NR:
101		sprint_oid(value, vlen, buffer, sizeof(buffer));
102		pr_err("Unknown OID: %s\n", buffer);
103		return -EBADMSG;
104
105	default:
106		pr_err("Unsupported content type: %u\n", oid);
107		return -ENOPKG;
108	}
109
110	return 0;
111}
112
113/*
114 * Note the digest we're guaranteeing with this certificate
115 */
116int mscode_note_digest(void *context, size_t hdrlen,
117		       unsigned char tag,
118		       const void *value, size_t vlen)
119{
120	struct pefile_context *ctx = context;
121
122	ctx->digest = kmemdup(value, vlen, GFP_KERNEL);
123	if (!ctx->digest)
124		return -ENOMEM;
125
126	ctx->digest_len = vlen;
127
128	return 0;
129}
v4.10.11
 
  1/* Parse a Microsoft Individual Code Signing blob
  2 *
  3 * Copyright (C) 2014 Red Hat, Inc. All Rights Reserved.
  4 * Written by David Howells (dhowells@redhat.com)
  5 *
  6 * This program is free software; you can redistribute it and/or
  7 * modify it under the terms of the GNU General Public Licence
  8 * as published by the Free Software Foundation; either version
  9 * 2 of the Licence, or (at your option) any later version.
 10 */
 11
 12#define pr_fmt(fmt) "MSCODE: "fmt
 13#include <linux/kernel.h>
 14#include <linux/slab.h>
 15#include <linux/err.h>
 16#include <linux/oid_registry.h>
 17#include <crypto/pkcs7.h>
 18#include "verify_pefile.h"
 19#include "mscode-asn1.h"
 20
 21/*
 22 * Parse a Microsoft Individual Code Signing blob
 23 */
 24int mscode_parse(void *_ctx, const void *content_data, size_t data_len,
 25		 size_t asn1hdrlen)
 26{
 27	struct pefile_context *ctx = _ctx;
 28
 29	content_data -= asn1hdrlen;
 30	data_len += asn1hdrlen;
 31	pr_devel("Data: %zu [%*ph]\n", data_len, (unsigned)(data_len),
 32		 content_data);
 33
 34	return asn1_ber_decoder(&mscode_decoder, ctx, content_data, data_len);
 35}
 36
 37/*
 38 * Check the content type OID
 39 */
 40int mscode_note_content_type(void *context, size_t hdrlen,
 41			     unsigned char tag,
 42			     const void *value, size_t vlen)
 43{
 44	enum OID oid;
 45
 46	oid = look_up_OID(value, vlen);
 47	if (oid == OID__NR) {
 48		char buffer[50];
 49
 50		sprint_oid(value, vlen, buffer, sizeof(buffer));
 51		pr_err("Unknown OID: %s\n", buffer);
 52		return -EBADMSG;
 53	}
 54
 55	/*
 56	 * pesign utility had a bug where it was putting
 57	 * OID_msIndividualSPKeyPurpose instead of OID_msPeImageDataObjId
 58	 * So allow both OIDs.
 59	 */
 60	if (oid != OID_msPeImageDataObjId &&
 61	    oid != OID_msIndividualSPKeyPurpose) {
 62		pr_err("Unexpected content type OID %u\n", oid);
 63		return -EBADMSG;
 64	}
 65
 66	return 0;
 67}
 68
 69/*
 70 * Note the digest algorithm OID
 71 */
 72int mscode_note_digest_algo(void *context, size_t hdrlen,
 73			    unsigned char tag,
 74			    const void *value, size_t vlen)
 75{
 76	struct pefile_context *ctx = context;
 77	char buffer[50];
 78	enum OID oid;
 79
 80	oid = look_up_OID(value, vlen);
 81	switch (oid) {
 82	case OID_md4:
 83		ctx->digest_algo = "md4";
 84		break;
 85	case OID_md5:
 86		ctx->digest_algo = "md5";
 87		break;
 88	case OID_sha1:
 89		ctx->digest_algo = "sha1";
 90		break;
 91	case OID_sha256:
 92		ctx->digest_algo = "sha256";
 93		break;
 94	case OID_sha384:
 95		ctx->digest_algo = "sha384";
 96		break;
 97	case OID_sha512:
 98		ctx->digest_algo = "sha512";
 99		break;
100	case OID_sha224:
101		ctx->digest_algo = "sha224";
102		break;
103
104	case OID__NR:
105		sprint_oid(value, vlen, buffer, sizeof(buffer));
106		pr_err("Unknown OID: %s\n", buffer);
107		return -EBADMSG;
108
109	default:
110		pr_err("Unsupported content type: %u\n", oid);
111		return -ENOPKG;
112	}
113
114	return 0;
115}
116
117/*
118 * Note the digest we're guaranteeing with this certificate
119 */
120int mscode_note_digest(void *context, size_t hdrlen,
121		       unsigned char tag,
122		       const void *value, size_t vlen)
123{
124	struct pefile_context *ctx = context;
125
126	ctx->digest = kmemdup(value, vlen, GFP_KERNEL);
127	if (!ctx->digest)
128		return -ENOMEM;
129
130	ctx->digest_len = vlen;
131
132	return 0;
133}