Looking at the mailing list archive, it appears that the patch may have
been munged by line wrap (unclear as to why; used `mutt -H` to send `git
format-patch`'s output).

Regardless, if it doesn't apply for anyone, a byte-for-byte unmodified copy
can also be found at
https://raw.githubusercontent.com/charles-dyfis-net/grub-openpgp-compat-test/fa5029ee0c2a8be073b05245c247c2610b5f864d/0001-pgp-Recognize-issuer-subpackets-in-either-hashed-or-.patch
<https://raw.githubusercontent.com/charles-dyfis-net/grub-openpgp-compat-test/master/0001-pgp-Recognize-issuer-subpackets-in-either-hashed-or-.patch>

Thanks/apologies/&c.,
-- Charles

On Sat, May 30, 2020 at 4:20 PM Charles Duffy <char...@dyfis.net> wrote:

> Currently, GRUB's OpenPGP signature parsing searches for the issuer
> field (specifying the key to use) only in the unhashed portion of the
> signature.
>
> RFC 4880 permits almost all fields (with the sole exception of signature
> creation time, which MUST be recognized only in the hashed area) to be
> present either in hashed or unhashed areas; and specifies that
> implementations should use the unhashed area only for "advisory
> information".
>
> While GnuPG's decision to consider issuer ID advisory is defensible
> (after all, one could simply do an exhaustive search of known public
> keys in its absence), it is not the only valid decision; in particular,
> the Go x/crypto/openpgp library chooses to store issuer ID in the hashed
> area.
>
> Without this patch, trying to verify a valid signature made by
> x/crypto/openpgp results in `error: public key 00000000 not found.`,
> because the `keyid` variable is unpopulated.
>
> This patch, originally written by Ignat Korchagin and ported to GRUB
> 2.04 by Daniel Axtens, remedies this. I (Charles Duffy) have tried to
> address review comments on the original requesting that named constants
> be used to enhance readability.
>
> There are still outstanding compatibility issues parsing public keys
> not serialized by GnuPG; these may be addressed in a later patch.
>
> Signed-off-by: Ignat Korchagin <ig...@cloudflare.com>
> Signed-off-by: Daniel Axtens <d...@axtens.net>
> Signed-off-by: Charles Duffy <char...@dyfis.net>
> ---
>  grub-core/commands/pgp.c | 137 +++++++++++++++++++++++++++------------
>  1 file changed, 97 insertions(+), 40 deletions(-)
>
> diff --git a/grub-core/commands/pgp.c b/grub-core/commands/pgp.c
> index bbf6871fe..b49b997c4 100644
> --- a/grub-core/commands/pgp.c
> +++ b/grub-core/commands/pgp.c
> @@ -39,6 +39,17 @@ enum
>      OPTION_SKIP_SIG = 0
>    };
>
> +enum
> +  {
> +    OPENPGP_SIG_SUBPACKET_TYPE_ISSUER = 16 /* subpacket contains 8-octet
> key id, see RFC4880 5.2.3.5 */
> +  };
> +
> +enum
> +  {
> +    OPENPGP_SIG_SUBPACKET_LEN_2BYTE_LIMIT = 192,
> +    OPENPGP_SIG_SUBPACKET_LEN_5BYTE_CONST = 255
> +  };
> +
>  static const struct grub_arg_option options[] =
>    {
>      {"skip-sig", 's', 0,
> @@ -448,6 +459,47 @@ struct grub_pubkey_context
>    void *hash_context;
>  };
>
> +static grub_uint64_t
> +grub_subpacket_keyid_search (const grub_uint8_t * sub, grub_ssize_t
> sub_len)
> +{
> +  const grub_uint8_t *ptr;
> +  grub_uint32_t l;
> +  grub_uint64_t keyid = 0;
> +
> +  for (ptr = sub; ptr < sub + sub_len; ptr += l)
> +    {
> +      /* this algorithm is expressely given in RFC 4880 5.2.3.1 to parse
> length
> +       * specifications, which may be 1-byte, 2-byte or 5-bytes long */
> +      if (*ptr < OPENPGP_SIG_SUBPACKET_LEN_2BYTE_LIMIT)
> +       l = *ptr++;
> +      /* 2-octet length field; the two high bits used to specify this
> format
> +       * are not part of the data, and the value as a whole is offset to
> avoid
> +       * having multiple ways to specify values that would fit in the
> 1-byte
> +       * form */
> +      else if (*ptr < OPENPGP_SIG_SUBPACKET_LEN_5BYTE_CONST)
> +       {
> +         if (ptr + 1 >= sub + sub_len)
> +           break;
> +         l = (((ptr[0] - OPENPGP_SIG_SUBPACKET_LEN_2BYTE_LIMIT) <<
> GRUB_CHAR_BIT) | ptr[1])
> +                + OPENPGP_SIG_SUBPACKET_LEN_2BYTE_LIMIT;
> +         ptr += 2;
> +       }
> +      /* 5-octet length field, 0xff constant followed by 4-byte value */
> +      else
> +       {
> +         if (ptr + 5 >= sub + sub_len)
> +           break;
> +         l = grub_be_to_cpu32 (grub_get_unaligned32 (ptr + 1));
> +         ptr += 5;
> +       }
> +      /* determine whether we found the packet we're looking for */
> +      if (*ptr == OPENPGP_SIG_SUBPACKET_TYPE_ISSUER && l >= 8)
> +       keyid = grub_get_unaligned64 (ptr + 1);
> +    }
> +
> +  return keyid;
> +}
> +
>  static grub_err_t
>  grub_verify_signature_init (struct grub_pubkey_context *ctxt, grub_file_t
> sig)
>  {
> @@ -520,7 +572,7 @@ grub_verify_signature_real (struct grub_pubkey_context
> *ctxt,
>    gcry_mpi_t mpis[10];
>    grub_uint8_t pk = ctxt->v4.pkeyalgo;
>    grub_size_t i;
> -  grub_uint8_t *readbuf = NULL;
> +  grub_uint8_t *readbuf = NULL, *subpacket_buf = NULL;
>    unsigned char *hval;
>    grub_ssize_t rem = grub_be_to_cpu16 (ctxt->v4.hashed_sub);
>    grub_uint32_t headlen = grub_cpu_to_be32 (rem + 6);
> @@ -538,17 +590,29 @@ grub_verify_signature_real (struct
> grub_pubkey_context *ctxt,
>
>    ctxt->hash->write (ctxt->hash_context, &ctxt->v, sizeof (ctxt->v));
>    ctxt->hash->write (ctxt->hash_context, &ctxt->v4, sizeof (ctxt->v4));
> -  while (rem)
> +
> +  subpacket_buf = grub_malloc (rem);
> +  if (!subpacket_buf)
> +    goto fail;
> +
> +  r = 0;
> +  while (r < rem)
>      {
> -      r = grub_file_read (ctxt->sig, readbuf,
> -                         rem < READBUF_SIZE ? rem : READBUF_SIZE);
> -      if (r < 0)
> -       goto fail;
> -      if (r == 0)
> +      grub_ssize_t rr = grub_file_read (ctxt->sig, subpacket_buf + r, rem
> - r);
> +      if (rr < 0)
> +        goto fail;
> +      if (rr == 0)
>         break;
> -      ctxt->hash->write (ctxt->hash_context, readbuf, r);
> -      rem -= r;
> +      r += rr;
>      }
> +  if (r != rem)
> +    goto fail;
> +  ctxt->hash->write (ctxt->hash_context, subpacket_buf, rem);
> +
> +  keyid = grub_subpacket_keyid_search (subpacket_buf, rem);
> +  grub_free (subpacket_buf);
> +  subpacket_buf = NULL;
> +
>    ctxt->hash->write (ctxt->hash_context, &ctxt->v, sizeof (ctxt->v));
>    s = 0xff;
>    ctxt->hash->write (ctxt->hash_context, &s, sizeof (s));
> @@ -556,37 +620,27 @@ grub_verify_signature_real (struct
> grub_pubkey_context *ctxt,
>    r = grub_file_read (ctxt->sig, &unhashed_sub, sizeof (unhashed_sub));
>    if (r != sizeof (unhashed_sub))
>      goto fail;
> -  {
> -    grub_uint8_t *ptr;
> -    grub_uint32_t l;
> -    rem = grub_be_to_cpu16 (unhashed_sub);
> -    if (rem > READBUF_SIZE)
> -      goto fail;
> -    r = grub_file_read (ctxt->sig, readbuf, rem);
> -    if (r != rem)
> -      goto fail;
> -    for (ptr = readbuf; ptr < readbuf + rem; ptr += l)
> -      {
> -       if (*ptr < 192)
> -         l = *ptr++;
> -       else if (*ptr < 255)
> -         {
> -           if (ptr + 1 >= readbuf + rem)
> -             break;
> -           l = (((ptr[0] & ~192) << GRUB_CHAR_BIT) | ptr[1]) + 192;
> -           ptr += 2;
> -         }
> -       else
> -         {
> -           if (ptr + 5 >= readbuf + rem)
> -             break;
> -           l = grub_be_to_cpu32 (grub_get_unaligned32 (ptr + 1));
> -           ptr += 5;
> -         }
> -       if (*ptr == 0x10 && l >= 8)
> -         keyid = grub_get_unaligned64 (ptr + 1);
> -      }
> -  }
> +
> +  rem = grub_be_to_cpu16 (unhashed_sub);
> +  subpacket_buf = grub_malloc (rem);
> +  if (!subpacket_buf)
> +    goto fail;
> +
> +  r = 0;
> +  while (r < rem)
> +    {
> +     grub_ssize_t rr = grub_file_read (ctxt->sig, subpacket_buf + r, rem
> - r);
> +     if (rr < 0)
> +       goto fail;
> +     if (rr == 0)
> +       break;
> +     r += rr;
> +    }
> +  if (r != rem)
> +    goto fail;
> +
> +  if (keyid == 0)
> +    keyid = grub_subpacket_keyid_search (subpacket_buf, rem);
>
>    ctxt->hash->final (ctxt->hash_context);
>
> @@ -656,10 +710,13 @@ grub_verify_signature_real (struct
> grub_pubkey_context *ctxt,
>      goto fail;
>
>    grub_free (readbuf);
> +  grub_free (subpacket_buf);
>
>    return GRUB_ERR_NONE;
>
>   fail:
> +  if (subpacket_buf)
> +    grub_free (subpacket_buf);
>    grub_free (readbuf);
>    if (!grub_errno)
>      return grub_error (GRUB_ERR_BAD_SIGNATURE, N_("bad signature"));
> --
> 2.25.4
>
>
_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to