From: David Howells Date: Tue, 15 Jan 2013 15:33:40 +0000 (+0000) Subject: pefile: Strip the wrapper off of the cert data block X-Git-Tag: next-20130218~61^2~5 X-Git-Url: https://git.karo-electronics.de/?a=commitdiff_plain;h=b027d7a3d2061994a15e36730c3955a9711fd7bc;p=karo-tx-linux.git pefile: Strip the wrapper off of the cert data block The certificate data block in a PE binary has a wrapper around the PKCS#7 signature we actually want to get at. Strip this off and check that we've got something that appears to be a PKCS#7 signature. Signed-off-by: David Howells Reviewed-by: Kees Cook --- diff --git a/crypto/asymmetric_keys/pefile_parser.c b/crypto/asymmetric_keys/pefile_parser.c index fb80cf064622..f2d4df06f1dd 100644 --- a/crypto/asymmetric_keys/pefile_parser.c +++ b/crypto/asymmetric_keys/pefile_parser.c @@ -15,6 +15,7 @@ #include #include #include +#include #include #include #include @@ -144,6 +145,61 @@ static int pefile_parse_binary(struct key_preparsed_payload *prep, return 0; } +/* + * Check and strip the PE wrapper from around the signature and check that the + * remnant looks something like PKCS#7. + */ +static int pefile_strip_sig_wrapper(struct key_preparsed_payload *prep, + struct pefile_context *ctx) +{ + struct win_certificate wrapper; + const u8 *pkcs7; + + if (ctx->sig_len < sizeof(wrapper)) { + pr_devel("Signature wrapper too short\n"); + return -ELIBBAD; + } + + memcpy(&wrapper, prep->data + ctx->sig_offset, sizeof(wrapper)); + pr_devel("sig wrapper = { %x, %x, %x }\n", + wrapper.length, wrapper.revision, wrapper.cert_type); + if (wrapper.length != ctx->sig_len) { + pr_devel("Signature wrapper len wrong\n"); + return -ELIBBAD; + } + if (wrapper.revision != WIN_CERT_REVISION_2_0) { + pr_devel("Signature is not revision 2.0\n"); + return -ENOTSUPP; + } + if (wrapper.cert_type != WIN_CERT_TYPE_PKCS_SIGNED_DATA) { + pr_devel("Signature certificate type is not PKCS\n"); + return -ENOTSUPP; + } + + ctx->sig_offset += sizeof(wrapper); + ctx->sig_len -= sizeof(wrapper); + if (ctx->sig_len == 0) { + pr_devel("Signature data missing\n"); + return -EKEYREJECTED; + } + + /* What's left should a PKCS#7 cert */ + pkcs7 = prep->data + ctx->sig_offset; + if (pkcs7[0] == (ASN1_CONS_BIT | ASN1_SEQ)) { + if (pkcs7[1] == 0x82 && + pkcs7[2] == (((ctx->sig_len - 4) >> 8) & 0xff) && + pkcs7[3] == ((ctx->sig_len - 4) & 0xff)) + return 0; + if (pkcs7[1] == 0x80) + return 0; + if (pkcs7[1] > 0x82) + return -EMSGSIZE; + } + + pr_devel("Signature data not PKCS#7\n"); + return -ELIBBAD; +} + /* * Parse a PE binary. */ @@ -159,6 +215,10 @@ static int pefile_key_preparse(struct key_preparsed_payload *prep) if (ret < 0) return ret; + ret = pefile_strip_sig_wrapper(prep, &ctx); + if (ret < 0) + return ret; + return -ENOANO; // Not yet complete }