]> git.proxmox.com Git - mirror_edk2.git/blame - CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
CryptoPkg: Fix typos in comments
[mirror_edk2.git] / CryptoPkg / Library / BaseCryptLib / Pk / CryptAuthenticode.c
CommitLineData
b7d320f8 1/** @file\r
2 Authenticode Portable Executable Signature Verification over OpenSSL.\r
3\r
dc204d5a
JY
4 Caution: This module requires additional review when modified.\r
5 This library will have external input - signature (e.g. PE/COFF Authenticode).\r
6 This external input must be validated carefully to avoid security issue like\r
7 buffer overflow, integer overflow.\r
8\r
9 AuthenticodeVerify() will get PE/COFF Authenticode and will do basic check for\r
10 data structure.\r
11\r
1463ce18 12Copyright (c) 2011 - 2015, Intel Corporation. All rights reserved.<BR>\r
b7d320f8 13This program and the accompanying materials\r
14are licensed and made available under the terms and conditions of the BSD License\r
15which accompanies this distribution. The full text of the license may be found at\r
16http://opensource.org/licenses/bsd-license.php\r
17\r
18THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
19WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
20\r
21**/\r
22\r
23#include "InternalCryptLib.h"\r
24\r
25#include <openssl/objects.h>\r
26#include <openssl/x509.h>\r
27#include <openssl/pkcs7.h>\r
28\r
fe5eea5e 29//\r
30// OID ASN.1 Value for SPC_INDIRECT_DATA_OBJID\r
31//\r
32UINT8 mSpcIndirectOidValue[] = {\r
33 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x02, 0x01, 0x04\r
34 };\r
b7d320f8 35\r
36/**\r
2998af86 37 Verifies the validity of a PE/COFF Authenticode Signature as described in "Windows\r
b7d320f8 38 Authenticode Portable Executable Signature Format".\r
39\r
16d2c32c 40 If AuthData is NULL, then return FALSE.\r
41 If ImageHash is NULL, then return FALSE.\r
b7d320f8 42\r
dc204d5a
JY
43 Caution: This function may receive untrusted input.\r
44 PE/COFF Authenticode is external input, so this function will do basic check for\r
45 Authenticode data structure.\r
46\r
b7d320f8 47 @param[in] AuthData Pointer to the Authenticode Signature retrieved from signed\r
48 PE/COFF image to be verified.\r
49 @param[in] DataSize Size of the Authenticode Signature in bytes.\r
50 @param[in] TrustedCert Pointer to a trusted/root certificate encoded in DER, which\r
51 is used for certificate chain verification.\r
52 @param[in] CertSize Size of the trusted certificate in bytes.\r
2998af86 53 @param[in] ImageHash Pointer to the original image file hash value. The procedure\r
b7d320f8 54 for calculating the image hash value is described in Authenticode\r
55 specification.\r
56 @param[in] HashSize Size of Image hash value in bytes.\r
57\r
58 @retval TRUE The specified Authenticode Signature is valid.\r
59 @retval FALSE Invalid Authenticode Signature.\r
60\r
61**/\r
62BOOLEAN\r
63EFIAPI\r
64AuthenticodeVerify (\r
65 IN CONST UINT8 *AuthData,\r
66 IN UINTN DataSize,\r
67 IN CONST UINT8 *TrustedCert,\r
68 IN UINTN CertSize,\r
69 IN CONST UINT8 *ImageHash,\r
70 IN UINTN HashSize\r
71 )\r
72{\r
73 BOOLEAN Status;\r
74 PKCS7 *Pkcs7;\r
1463ce18 75 CONST UINT8 *Temp;\r
b7d320f8 76 CONST UINT8 *OrigAuthData;\r
77 UINT8 *SpcIndirectDataContent;\r
78 UINT8 Asn1Byte;\r
79 UINTN ContentSize;\r
e6eaada4 80 CONST UINT8 *SpcIndirectDataOid;\r
b7d320f8 81\r
82 //\r
16d2c32c 83 // Check input parameters.\r
b7d320f8 84 //\r
16d2c32c 85 if ((AuthData == NULL) || (TrustedCert == NULL) || (ImageHash == NULL)) {\r
86 return FALSE;\r
87 }\r
88\r
89 if ((DataSize > INT_MAX) || (CertSize > INT_MAX) || (HashSize > INT_MAX)) {\r
90 return FALSE;\r
91 }\r
da9e7418 92\r
b7d320f8 93 Status = FALSE;\r
94 Pkcs7 = NULL;\r
95 OrigAuthData = AuthData;\r
96\r
97 //\r
98 // Retrieve & Parse PKCS#7 Data (DER encoding) from Authenticode Signature\r
99 //\r
1463ce18
QL
100 Temp = AuthData;\r
101 Pkcs7 = d2i_PKCS7 (NULL, &Temp, (int)DataSize);\r
b7d320f8 102 if (Pkcs7 == NULL) {\r
103 goto _Exit;\r
104 }\r
105\r
106 //\r
107 // Check if it's PKCS#7 Signed Data (for Authenticode Scenario)\r
108 //\r
109 if (!PKCS7_type_is_signed (Pkcs7)) {\r
110 goto _Exit;\r
111 }\r
112\r
113 //\r
114 // NOTE: OpenSSL PKCS7 Decoder didn't work for Authenticode-format signed data due to\r
115 // some authenticode-specific structure. Use opaque ASN.1 string to retrieve\r
116 // PKCS#7 ContentInfo here.\r
117 //\r
e6eaada4
DW
118 SpcIndirectDataOid = OBJ_get0_data(Pkcs7->d.sign->contents->type);\r
119 if (OBJ_length(Pkcs7->d.sign->contents->type) != sizeof(mSpcIndirectOidValue) ||\r
120 CompareMem (\r
fe5eea5e 121 SpcIndirectDataOid,\r
122 mSpcIndirectOidValue,\r
123 sizeof (mSpcIndirectOidValue)\r
124 ) != 0) {\r
125 //\r
126 // Un-matched SPC_INDIRECT_DATA_OBJID.\r
127 //\r
128 goto _Exit;\r
2ac68e8b 129 }\r
fe5eea5e 130\r
131\r
b7d320f8 132 SpcIndirectDataContent = (UINT8 *)(Pkcs7->d.sign->contents->d.other->value.asn1_string->data);\r
133\r
134 //\r
135 // Retrieve the SEQUENCE data size from ASN.1-encoded SpcIndirectDataContent.\r
136 //\r
137 Asn1Byte = *(SpcIndirectDataContent + 1);\r
16d2c32c 138\r
b7d320f8 139 if ((Asn1Byte & 0x80) == 0) {\r
140 //\r
2ac68e8b 141 // Short Form of Length Encoding (Length < 128)\r
b7d320f8 142 //\r
143 ContentSize = (UINTN) (Asn1Byte & 0x7F);\r
144 //\r
145 // Skip the SEQUENCE Tag;\r
146 //\r
147 SpcIndirectDataContent += 2;\r
2ac68e8b
QL
148\r
149 } else if ((Asn1Byte & 0x81) == 0x81) {\r
150 //\r
151 // Long Form of Length Encoding (128 <= Length < 255, Single Octet)\r
152 //\r
153 ContentSize = (UINTN) (*(UINT8 *)(SpcIndirectDataContent + 2));\r
154 //\r
155 // Skip the SEQUENCE Tag;\r
156 //\r
157 SpcIndirectDataContent += 3;\r
158\r
16d2c32c 159 } else if ((Asn1Byte & 0x82) == 0x82) {\r
b7d320f8 160 //\r
2ac68e8b 161 // Long Form of Length Encoding (Length > 255, Two Octet)\r
b7d320f8 162 //\r
0e241454 163 ContentSize = (UINTN) (*(UINT8 *)(SpcIndirectDataContent + 2));\r
164 ContentSize = (ContentSize << 8) + (UINTN)(*(UINT8 *)(SpcIndirectDataContent + 3));\r
b7d320f8 165 //\r
166 // Skip the SEQUENCE Tag;\r
167 //\r
168 SpcIndirectDataContent += 4;\r
2ac68e8b 169\r
16d2c32c 170 } else {\r
171 goto _Exit;\r
b7d320f8 172 }\r
173\r
174 //\r
175 // Compare the original file hash value to the digest retrieve from SpcIndirectDataContent\r
176 // defined in Authenticode\r
177 // NOTE: Need to double-check HashLength here!\r
178 //\r
179 if (CompareMem (SpcIndirectDataContent + ContentSize - HashSize, ImageHash, HashSize) != 0) {\r
180 //\r
181 // Un-matched PE/COFF Hash Value\r
182 //\r
183 goto _Exit;\r
184 }\r
185\r
186 //\r
187 // Verifies the PKCS#7 Signed Data in PE/COFF Authenticode Signature\r
188 //\r
189 Status = (BOOLEAN) Pkcs7Verify (OrigAuthData, DataSize, TrustedCert, CertSize, SpcIndirectDataContent, ContentSize);\r
190\r
191_Exit:\r
192 //\r
193 // Release Resources\r
194 //\r
195 PKCS7_free (Pkcs7);\r
196\r
197 return Status;\r
198}\r