On 16.06.20 07:26, AKASHI Takahiro wrote:
> The function, pkcs7_verify_one(), will be utilized to rework signature
> verification logic aiming to support intermediate certificates in
> "chain of trust."

Is this also copied from Linux's crypto/asymmetric_keys/pkcs7_verify.c?

If so, please, mention it in the commit message.

If everything copied from crypto/asymmetric_keys/pkcs7_verify.c were in
the same commit, the comparison would be easier.

Best regards

Heinrich


>
> To do that, its function interface is expanded, adding an extra argument
> which is expected to return the last certificate in trusted chain.
> Then, this last one must further be verified with signature database, db
> and/or dbx.
>
> Signed-off-by: AKASHI Takahiro <takahiro.aka...@linaro.org>
> ---
>  include/crypto/pkcs7.h    |  9 +++++-
>  lib/crypto/pkcs7_verify.c | 61 ++++++++++++++++++++++++++++++++++-----
>  2 files changed, 62 insertions(+), 8 deletions(-)
>
> diff --git a/include/crypto/pkcs7.h b/include/crypto/pkcs7.h
> index 8f5c8a7ee3b9..ca35df29f6fb 100644
> --- a/include/crypto/pkcs7.h
> +++ b/include/crypto/pkcs7.h
> @@ -27,7 +27,14 @@ extern int pkcs7_get_content_data(const struct 
> pkcs7_message *pkcs7,
>                                 const void **_data, size_t *_datalen,
>                                 size_t *_headerlen);
>
> -#ifndef __UBOOT__
> +#ifdef __UBOOT__
> +struct pkcs7_signed_info;
> +struct x509_certificate;
> +
> +int pkcs7_verify_one(struct pkcs7_message *pkcs7,
> +                  struct pkcs7_signed_info *sinfo,
> +                  struct x509_certificate **signer);
> +#else
>  /*
>   * pkcs7_trust.c
>   */
> diff --git a/lib/crypto/pkcs7_verify.c b/lib/crypto/pkcs7_verify.c
> index 9b9030ea4440..dda96ccf57a2 100644
> --- a/lib/crypto/pkcs7_verify.c
> +++ b/lib/crypto/pkcs7_verify.c
> @@ -302,10 +302,27 @@ static int pkcs7_find_key(struct pkcs7_message *pkcs7,
>  }
>
>  /*
> - * Verify the internal certificate chain as best we can.
> + * pkcs7_verify_sig_chain - Verify the internal certificate chain as best
> + *                          as we can.
> + * @pkcs7:   PKCS7 Signed Data
> + * @sinfo:   PKCS7 Signed Info
> + * @signer:  Singer's certificate
> + *
> + * Build up and verify the internal certificate chain against a signature
> + * in @sinfo, using certificates contained in @pkcs7 as best as we can.
> + * If the chain reaches the end, the last certificate will be returned
> + * in @signer.
> + *
> + * Return:   0 - on success, non-zero error code - otherwise
>   */
> +#ifdef __UBOOT__
> +static int pkcs7_verify_sig_chain(struct pkcs7_message *pkcs7,
> +                               struct pkcs7_signed_info *sinfo,
> +                               struct x509_certificate **signer)
> +#else
>  static int pkcs7_verify_sig_chain(struct pkcs7_message *pkcs7,
>                                 struct pkcs7_signed_info *sinfo)
> +#endif
>  {
>       struct public_key_signature *sig;
>       struct x509_certificate *x509 = sinfo->signer, *p;
> @@ -314,6 +331,8 @@ static int pkcs7_verify_sig_chain(struct pkcs7_message 
> *pkcs7,
>
>       kenter("");
>
> +     *signer = NULL;
> +
>       for (p = pkcs7->certs; p; p = p->next)
>               p->seen = false;
>
> @@ -331,6 +350,9 @@ static int pkcs7_verify_sig_chain(struct pkcs7_message 
> *pkcs7,
>                       for (p = sinfo->signer; p != x509; p = p->signer)
>                               p->blacklisted = true;
>                       pr_debug("- blacklisted\n");
> +#ifdef __UBOOT__
> +                     *signer = x509;
> +#endif
>                       return 0;
>               }
>
> @@ -356,6 +378,9 @@ static int pkcs7_verify_sig_chain(struct pkcs7_message 
> *pkcs7,
>                               goto unsupported_crypto_in_x509;
>                       x509->signer = x509;
>                       pr_debug("- self-signed\n");
> +#ifdef __UBOOT__
> +                     *signer = x509;
> +#endif
>                       return 0;
>               }
>
> @@ -386,6 +411,9 @@ static int pkcs7_verify_sig_chain(struct pkcs7_message 
> *pkcs7,
>
>               /* We didn't find the root of this chain */
>               pr_debug("- top\n");
> +#ifdef __UBOOT__
> +             *signer = x509;
> +#endif
>               return 0;
>
>       found_issuer_check_skid:
> @@ -403,6 +431,9 @@ static int pkcs7_verify_sig_chain(struct pkcs7_message 
> *pkcs7,
>               if (p->seen) {
>                       pr_warn("Sig %u: X.509 chain contains loop\n",
>                               sinfo->index);
> +#ifdef __UBOOT__
> +                     *signer = p;
> +#endif
>                       return 0;
>               }
>               ret = public_key_verify_signature(p->pub, x509->sig);
> @@ -411,6 +442,9 @@ static int pkcs7_verify_sig_chain(struct pkcs7_message 
> *pkcs7,
>               x509->signer = p;
>               if (x509 == p) {
>                       pr_debug("- self-signed\n");
> +#ifdef __UBOOT__
> +                     *signer = p;
> +#endif
>                       return 0;
>               }
>               x509 = p;
> @@ -430,13 +464,26 @@ unsupported_crypto_in_x509:
>  }
>
>  /*
> - * Verify one signed information block from a PKCS#7 message.
> + * pkcs7_verify_one - Verify one signed information block from a PKCS#7
> + *                    message.
> + * @pkcs7:   PKCS7 Signed Data
> + * @sinfo:   PKCS7 Signed Info
> + * @signer:  Signer's certificate
> + *
> + * Verify one signature in @sinfo and follow the certificate chain.
> + * If the chain reaches the end, the last certificate will be returned
> + * in @signer.
> + *
> + * Return:   0 - on success, non-zero error code - otherwise
>   */
> -#ifndef __UBOOT__
> -static
> -#endif
> +#ifdef __UBOOT__
>  int pkcs7_verify_one(struct pkcs7_message *pkcs7,
> -                  struct pkcs7_signed_info *sinfo)
> +                  struct pkcs7_signed_info *sinfo,
> +                  struct x509_certificate **signer)
> +#else
> +static int pkcs7_verify_one(struct pkcs7_message *pkcs7,
> +                         struct pkcs7_signed_info *sinfo)
> +#endif
>  {
>       int ret;
>
> @@ -480,7 +527,7 @@ int pkcs7_verify_one(struct pkcs7_message *pkcs7,
>       pr_devel("Verified signature %u\n", sinfo->index);
>
>       /* Verify the internal certificate chain */
> -     return pkcs7_verify_sig_chain(pkcs7, sinfo);
> +     return pkcs7_verify_sig_chain(pkcs7, sinfo, signer);
>  }
>
>  #ifndef __UBOOT__
>

Reply via email to