/*
* libkmod - module signature display
*
* Copyright (C) 2013 Michal Marek, SUSE
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, see .
*/
#include
#ifdef ENABLE_OPENSSL
#include
#include
#endif
#include
#include
#include
#include
#include
#include "libkmod-internal.h"
/* These types and tables were copied from the 3.7 kernel sources.
* As this is just description of the signature format, it should not be
* considered derived work (so libkmod can use the LGPL license).
*/
enum pkey_algo {
PKEY_ALGO_DSA,
PKEY_ALGO_RSA,
PKEY_ALGO__LAST
};
static const char *const pkey_algo[PKEY_ALGO__LAST] = {
[PKEY_ALGO_DSA] = "DSA",
[PKEY_ALGO_RSA] = "RSA",
};
enum pkey_hash_algo {
PKEY_HASH_MD4,
PKEY_HASH_MD5,
PKEY_HASH_SHA1,
PKEY_HASH_RIPE_MD_160,
PKEY_HASH_SHA256,
PKEY_HASH_SHA384,
PKEY_HASH_SHA512,
PKEY_HASH_SHA224,
PKEY_HASH__LAST
};
const char *const pkey_hash_algo[PKEY_HASH__LAST] = {
[PKEY_HASH_MD4] = "md4",
[PKEY_HASH_MD5] = "md5",
[PKEY_HASH_SHA1] = "sha1",
[PKEY_HASH_RIPE_MD_160] = "rmd160",
[PKEY_HASH_SHA256] = "sha256",
[PKEY_HASH_SHA384] = "sha384",
[PKEY_HASH_SHA512] = "sha512",
[PKEY_HASH_SHA224] = "sha224",
};
enum pkey_id_type {
PKEY_ID_PGP, /* OpenPGP generated key ID */
PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */
PKEY_ID_PKCS7, /* Signature in PKCS#7 message */
PKEY_ID_TYPE__LAST
};
const char *const pkey_id_type[PKEY_ID_TYPE__LAST] = {
[PKEY_ID_PGP] = "PGP",
[PKEY_ID_X509] = "X509",
[PKEY_ID_PKCS7] = "PKCS#7",
};
/*
* Module signature information block.
*/
struct module_signature {
uint8_t algo; /* Public-key crypto algorithm [enum pkey_algo] */
uint8_t hash; /* Digest algorithm [enum pkey_hash_algo] */
uint8_t id_type; /* Key identifier type [enum pkey_id_type] */
uint8_t signer_len; /* Length of signer's name */
uint8_t key_id_len; /* Length of key identifier */
uint8_t __pad[3];
uint32_t sig_len; /* Length of signature data (big endian) */
};
static bool fill_default(const char *mem, off_t size,
const struct module_signature *modsig, size_t sig_len,
struct kmod_signature_info *sig_info)
{
size -= sig_len;
sig_info->sig = mem + size;
sig_info->sig_len = sig_len;
size -= modsig->key_id_len;
sig_info->key_id = mem + size;
sig_info->key_id_len = modsig->key_id_len;
size -= modsig->signer_len;
sig_info->signer = mem + size;
sig_info->signer_len = modsig->signer_len;
sig_info->algo = pkey_algo[modsig->algo];
sig_info->hash_algo = pkey_hash_algo[modsig->hash];
sig_info->id_type = pkey_id_type[modsig->id_type];
return true;
}
#ifdef ENABLE_OPENSSL
struct pkcs7_private {
CMS_ContentInfo *cms;
unsigned char *key_id;
BIGNUM *sno;
};
static void pkcs7_free(void *s)
{
struct kmod_signature_info *si = s;
struct pkcs7_private *pvt = si->private;
CMS_ContentInfo_free(pvt->cms);
BN_free(pvt->sno);
free(pvt->key_id);
free(pvt);
si->private = NULL;
}
static int obj_to_hash_algo(const ASN1_OBJECT *o)
{
int nid;
nid = OBJ_obj2nid(o);
switch (nid) {
case NID_md4:
return PKEY_HASH_MD4;
case NID_md5:
return PKEY_HASH_MD5;
case NID_sha1:
return PKEY_HASH_SHA1;
case NID_ripemd160:
return PKEY_HASH_RIPE_MD_160;
case NID_sha256:
return PKEY_HASH_SHA256;
case NID_sha384:
return PKEY_HASH_SHA384;
case NID_sha512:
return PKEY_HASH_SHA512;
case NID_sha224:
return PKEY_HASH_SHA224;
default:
return -1;
}
return -1;
}
static const char *x509_name_to_str(X509_NAME *name)
{
int i;
X509_NAME_ENTRY *e;
ASN1_STRING *d;
ASN1_OBJECT *o;
int nid = -1;
const char *str;
for (i = 0; i < X509_NAME_entry_count(name); i++) {
e = X509_NAME_get_entry(name, i);
o = X509_NAME_ENTRY_get_object(e);
nid = OBJ_obj2nid(o);
if (nid == NID_commonName)
break;
}
if (nid == -1)
return NULL;
d = X509_NAME_ENTRY_get_data(e);
str = (const char *)ASN1_STRING_get0_data(d);
return str;
}
static bool fill_pkcs7(const char *mem, off_t size,
const struct module_signature *modsig, size_t sig_len,
struct kmod_signature_info *sig_info)
{
const char *pkcs7_raw;
CMS_ContentInfo *cms;
STACK_OF(CMS_SignerInfo) *sis;
CMS_SignerInfo *si;
int rc;
ASN1_OCTET_STRING *key_id;
X509_NAME *issuer;
ASN1_INTEGER *sno;
ASN1_OCTET_STRING *sig;
BIGNUM *sno_bn;
X509_ALGOR *dig_alg;
X509_ALGOR *sig_alg;
const ASN1_OBJECT *o;
BIO *in;
int len;
unsigned char *key_id_str;
struct pkcs7_private *pvt;
const char *issuer_str;
size -= sig_len;
pkcs7_raw = mem + size;
in = BIO_new_mem_buf(pkcs7_raw, sig_len);
cms = d2i_CMS_bio(in, NULL);
if (cms == NULL) {
BIO_free(in);
return false;
}
BIO_free(in);
sis = CMS_get0_SignerInfos(cms);
if (sis == NULL)
goto err;
si = sk_CMS_SignerInfo_value(sis, 0);
if (si == NULL)
goto err;
rc = CMS_SignerInfo_get0_signer_id(si, &key_id, &issuer, &sno);
if (rc == 0)
goto err;
sig = CMS_SignerInfo_get0_signature(si);
if (sig == NULL)
goto err;
CMS_SignerInfo_get0_algs(si, NULL, NULL, &dig_alg, &sig_alg);
sig_info->sig = (const char *)ASN1_STRING_get0_data(sig);
sig_info->sig_len = ASN1_STRING_length(sig);
sno_bn = ASN1_INTEGER_to_BN(sno, NULL);
if (sno_bn == NULL)
goto err;
len = BN_num_bytes(sno_bn);
key_id_str = malloc(len);
if (key_id_str == NULL)
goto err2;
BN_bn2bin(sno_bn, key_id_str);
sig_info->key_id = (const char *)key_id_str;
sig_info->key_id_len = len;
issuer_str = x509_name_to_str(issuer);
if (issuer_str != NULL) {
sig_info->signer = issuer_str;
sig_info->signer_len = strlen(issuer_str);
}
X509_ALGOR_get0(&o, NULL, NULL, dig_alg);
sig_info->hash_algo = pkey_hash_algo[obj_to_hash_algo(o)];
sig_info->id_type = pkey_id_type[modsig->id_type];
pvt = malloc(sizeof(*pvt));
if (pvt == NULL)
goto err3;
pvt->cms = cms;
pvt->key_id = key_id_str;
pvt->sno = sno_bn;
sig_info->private = pvt;
sig_info->free = pkcs7_free;
return true;
err3:
free(key_id_str);
err2:
BN_free(sno_bn);
err:
CMS_ContentInfo_free(cms);
return false;
}
#else /* ENABLE OPENSSL */
static bool fill_pkcs7(const char *mem, off_t size,
const struct module_signature *modsig, size_t sig_len,
struct kmod_signature_info *sig_info)
{
sig_info->hash_algo = "unknown";
sig_info->id_type = pkey_id_type[modsig->id_type];
return true;
}
#endif /* ENABLE OPENSSL */
#define SIG_MAGIC "~Module signature appended~\n"
/*
* A signed module has the following layout:
*
* [ module ]
* [ signer's name ]
* [ key identifier ]
* [ signature data ]
* [ struct module_signature ]
* [ SIG_MAGIC ]
*/
bool kmod_module_signature_info(const struct kmod_file *file, struct kmod_signature_info *sig_info)
{
const char *mem;
off_t size;
const struct module_signature *modsig;
size_t sig_len;
size = kmod_file_get_size(file);
mem = kmod_file_get_contents(file);
if (size < (off_t)strlen(SIG_MAGIC))
return false;
size -= strlen(SIG_MAGIC);
if (memcmp(SIG_MAGIC, mem + size, strlen(SIG_MAGIC)) != 0)
return false;
if (size < (off_t)sizeof(struct module_signature))
return false;
size -= sizeof(struct module_signature);
modsig = (struct module_signature *)(mem + size);
if (modsig->algo >= PKEY_ALGO__LAST ||
modsig->hash >= PKEY_HASH__LAST ||
modsig->id_type >= PKEY_ID_TYPE__LAST)
return false;
sig_len = be32toh(get_unaligned(&modsig->sig_len));
if (sig_len == 0 ||
size < (int64_t)(modsig->signer_len + modsig->key_id_len + sig_len))
return false;
switch (modsig->id_type) {
case PKEY_ID_PKCS7:
return fill_pkcs7(mem, size, modsig, sig_len, sig_info);
default:
return fill_default(mem, size, modsig, sig_len, sig_info);
}
}
void kmod_module_signature_info_free(struct kmod_signature_info *sig_info)
{
if (sig_info->free)
sig_info->free(sig_info);
}