diff options
author | David Howells <dhowells@redhat.com> | 2014-07-01 11:02:52 -0400 |
---|---|---|
committer | David Howells <dhowells@redhat.com> | 2014-07-09 09:58:37 -0400 |
commit | af316fc442ef23901bbfcec5af55e69ca6ce9563 (patch) | |
tree | d638d69cfe97e2c8b74aa99fd82d25661baa5e16 /crypto/asymmetric_keys | |
parent | dd7d66f21b9eb6a3979d8c9ba910eba772cfbbc9 (diff) |
pefile: Digest the PE binary and compare to the PKCS#7 data
Digest the signed parts of the PE binary, canonicalising the section table
before we need it, and then compare the the resulting digest to the one in the
PKCS#7 signed content.
Signed-off-by: David Howells <dhowells@redhat.com>
Acked-by: Vivek Goyal <vgoyal@redhat.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'crypto/asymmetric_keys')
-rw-r--r-- | crypto/asymmetric_keys/verify_pefile.c | 197 |
1 files changed, 197 insertions, 0 deletions
diff --git a/crypto/asymmetric_keys/verify_pefile.c b/crypto/asymmetric_keys/verify_pefile.c index b975918e82d2..029a36510e80 100644 --- a/crypto/asymmetric_keys/verify_pefile.c +++ b/crypto/asymmetric_keys/verify_pefile.c | |||
@@ -185,6 +185,192 @@ static int pefile_strip_sig_wrapper(const void *pebuf, | |||
185 | return -ELIBBAD; | 185 | return -ELIBBAD; |
186 | } | 186 | } |
187 | 187 | ||
188 | /* | ||
189 | * Compare two sections for canonicalisation. | ||
190 | */ | ||
191 | static int pefile_compare_shdrs(const void *a, const void *b) | ||
192 | { | ||
193 | const struct section_header *shdra = a; | ||
194 | const struct section_header *shdrb = b; | ||
195 | int rc; | ||
196 | |||
197 | if (shdra->data_addr > shdrb->data_addr) | ||
198 | return 1; | ||
199 | if (shdrb->data_addr > shdra->data_addr) | ||
200 | return -1; | ||
201 | |||
202 | if (shdra->virtual_address > shdrb->virtual_address) | ||
203 | return 1; | ||
204 | if (shdrb->virtual_address > shdra->virtual_address) | ||
205 | return -1; | ||
206 | |||
207 | rc = strcmp(shdra->name, shdrb->name); | ||
208 | if (rc != 0) | ||
209 | return rc; | ||
210 | |||
211 | if (shdra->virtual_size > shdrb->virtual_size) | ||
212 | return 1; | ||
213 | if (shdrb->virtual_size > shdra->virtual_size) | ||
214 | return -1; | ||
215 | |||
216 | if (shdra->raw_data_size > shdrb->raw_data_size) | ||
217 | return 1; | ||
218 | if (shdrb->raw_data_size > shdra->raw_data_size) | ||
219 | return -1; | ||
220 | |||
221 | return 0; | ||
222 | } | ||
223 | |||
224 | /* | ||
225 | * Load the contents of the PE binary into the digest, leaving out the image | ||
226 | * checksum and the certificate data block. | ||
227 | */ | ||
228 | static int pefile_digest_pe_contents(const void *pebuf, unsigned int pelen, | ||
229 | struct pefile_context *ctx, | ||
230 | struct shash_desc *desc) | ||
231 | { | ||
232 | unsigned *canon, tmp, loop, i, hashed_bytes; | ||
233 | int ret; | ||
234 | |||
235 | /* Digest the header and data directory, but leave out the image | ||
236 | * checksum and the data dirent for the signature. | ||
237 | */ | ||
238 | ret = crypto_shash_update(desc, pebuf, ctx->image_checksum_offset); | ||
239 | if (ret < 0) | ||
240 | return ret; | ||
241 | |||
242 | tmp = ctx->image_checksum_offset + sizeof(uint32_t); | ||
243 | ret = crypto_shash_update(desc, pebuf + tmp, | ||
244 | ctx->cert_dirent_offset - tmp); | ||
245 | if (ret < 0) | ||
246 | return ret; | ||
247 | |||
248 | tmp = ctx->cert_dirent_offset + sizeof(struct data_dirent); | ||
249 | ret = crypto_shash_update(desc, pebuf + tmp, ctx->header_size - tmp); | ||
250 | if (ret < 0) | ||
251 | return ret; | ||
252 | |||
253 | canon = kcalloc(ctx->n_sections, sizeof(unsigned), GFP_KERNEL); | ||
254 | if (!canon) | ||
255 | return -ENOMEM; | ||
256 | |||
257 | /* We have to canonicalise the section table, so we perform an | ||
258 | * insertion sort. | ||
259 | */ | ||
260 | canon[0] = 0; | ||
261 | for (loop = 1; loop < ctx->n_sections; loop++) { | ||
262 | for (i = 0; i < loop; i++) { | ||
263 | if (pefile_compare_shdrs(&ctx->secs[canon[i]], | ||
264 | &ctx->secs[loop]) > 0) { | ||
265 | memmove(&canon[i + 1], &canon[i], | ||
266 | (loop - i) * sizeof(canon[0])); | ||
267 | break; | ||
268 | } | ||
269 | } | ||
270 | canon[i] = loop; | ||
271 | } | ||
272 | |||
273 | hashed_bytes = ctx->header_size; | ||
274 | for (loop = 0; loop < ctx->n_sections; loop++) { | ||
275 | i = canon[loop]; | ||
276 | if (ctx->secs[i].raw_data_size == 0) | ||
277 | continue; | ||
278 | ret = crypto_shash_update(desc, | ||
279 | pebuf + ctx->secs[i].data_addr, | ||
280 | ctx->secs[i].raw_data_size); | ||
281 | if (ret < 0) { | ||
282 | kfree(canon); | ||
283 | return ret; | ||
284 | } | ||
285 | hashed_bytes += ctx->secs[i].raw_data_size; | ||
286 | } | ||
287 | kfree(canon); | ||
288 | |||
289 | if (pelen > hashed_bytes) { | ||
290 | tmp = hashed_bytes + ctx->certs_size; | ||
291 | ret = crypto_shash_update(desc, | ||
292 | pebuf + hashed_bytes, | ||
293 | pelen - tmp); | ||
294 | if (ret < 0) | ||
295 | return ret; | ||
296 | } | ||
297 | |||
298 | return 0; | ||
299 | } | ||
300 | |||
301 | /* | ||
302 | * Digest the contents of the PE binary, leaving out the image checksum and the | ||
303 | * certificate data block. | ||
304 | */ | ||
305 | static int pefile_digest_pe(const void *pebuf, unsigned int pelen, | ||
306 | struct pefile_context *ctx) | ||
307 | { | ||
308 | struct crypto_shash *tfm; | ||
309 | struct shash_desc *desc; | ||
310 | size_t digest_size, desc_size; | ||
311 | void *digest; | ||
312 | int ret; | ||
313 | |||
314 | kenter(",%u", ctx->digest_algo); | ||
315 | |||
316 | /* Allocate the hashing algorithm we're going to need and find out how | ||
317 | * big the hash operational data will be. | ||
318 | */ | ||
319 | tfm = crypto_alloc_shash(hash_algo_name[ctx->digest_algo], 0, 0); | ||
320 | if (IS_ERR(tfm)) | ||
321 | return (PTR_ERR(tfm) == -ENOENT) ? -ENOPKG : PTR_ERR(tfm); | ||
322 | |||
323 | desc_size = crypto_shash_descsize(tfm) + sizeof(*desc); | ||
324 | digest_size = crypto_shash_digestsize(tfm); | ||
325 | |||
326 | if (digest_size != ctx->digest_len) { | ||
327 | pr_debug("Digest size mismatch (%zx != %x)\n", | ||
328 | digest_size, ctx->digest_len); | ||
329 | ret = -EBADMSG; | ||
330 | goto error_no_desc; | ||
331 | } | ||
332 | pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); | ||
333 | |||
334 | ret = -ENOMEM; | ||
335 | desc = kzalloc(desc_size + digest_size, GFP_KERNEL); | ||
336 | if (!desc) | ||
337 | goto error_no_desc; | ||
338 | |||
339 | desc->tfm = tfm; | ||
340 | desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
341 | ret = crypto_shash_init(desc); | ||
342 | if (ret < 0) | ||
343 | goto error; | ||
344 | |||
345 | ret = pefile_digest_pe_contents(pebuf, pelen, ctx, desc); | ||
346 | if (ret < 0) | ||
347 | goto error; | ||
348 | |||
349 | digest = (void *)desc + desc_size; | ||
350 | ret = crypto_shash_final(desc, digest); | ||
351 | if (ret < 0) | ||
352 | goto error; | ||
353 | |||
354 | pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); | ||
355 | |||
356 | /* Check that the PE file digest matches that in the MSCODE part of the | ||
357 | * PKCS#7 certificate. | ||
358 | */ | ||
359 | if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { | ||
360 | pr_debug("Digest mismatch\n"); | ||
361 | ret = -EKEYREJECTED; | ||
362 | } else { | ||
363 | pr_debug("The digests match!\n"); | ||
364 | } | ||
365 | |||
366 | error: | ||
367 | kfree(desc); | ||
368 | error_no_desc: | ||
369 | crypto_free_shash(tfm); | ||
370 | kleave(" = %d", ret); | ||
371 | return ret; | ||
372 | } | ||
373 | |||
188 | /** | 374 | /** |
189 | * verify_pefile_signature - Verify the signature on a PE binary image | 375 | * verify_pefile_signature - Verify the signature on a PE binary image |
190 | * @pebuf: Buffer containing the PE binary image | 376 | * @pebuf: Buffer containing the PE binary image |
@@ -252,6 +438,17 @@ int verify_pefile_signature(const void *pebuf, unsigned pelen, | |||
252 | pr_debug("Digest: %u [%*ph]\n", | 438 | pr_debug("Digest: %u [%*ph]\n", |
253 | ctx.digest_len, ctx.digest_len, ctx.digest); | 439 | ctx.digest_len, ctx.digest_len, ctx.digest); |
254 | 440 | ||
441 | /* Generate the digest and check against the PKCS7 certificate | ||
442 | * contents. | ||
443 | */ | ||
444 | ret = pefile_digest_pe(pebuf, pelen, &ctx); | ||
445 | if (ret < 0) | ||
446 | goto error; | ||
447 | |||
448 | ret = pkcs7_verify(pkcs7); | ||
449 | if (ret < 0) | ||
450 | goto error; | ||
451 | |||
255 | ret = -ENOANO; // Not yet complete | 452 | ret = -ENOANO; // Not yet complete |
256 | 453 | ||
257 | error: | 454 | error: |