mirror of
				https://github.com/smaeul/u-boot.git
				synced 2025-10-31 03:58:17 +00:00 
			
		
		
		
	Previous patch has introduced MbedTLS porting layer for PKCS7 parser, here to adjust the header and makefiles accordingly. Signed-off-by: Raymond Mao <raymond.mao@linaro.org>
		
			
				
	
	
		
			127 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			127 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* SPDX-License-Identifier: GPL-2.0-or-later */
 | |
| /* PKCS#7 crypto data parser internal definitions
 | |
|  *
 | |
|  * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
 | |
|  * Written by David Howells (dhowells@redhat.com)
 | |
|  */
 | |
| 
 | |
| #ifndef _PKCS7_PARSER_H
 | |
| #define _PKCS7_PARSER_H
 | |
| 
 | |
| #include <linux/oid_registry.h>
 | |
| #include <crypto/pkcs7.h>
 | |
| #include <crypto/x509_parser.h>
 | |
| #if CONFIG_IS_ENABLED(MBEDTLS_LIB_X509)
 | |
| #include <mbedtls/pkcs7.h>
 | |
| #include <library/x509_internal.h>
 | |
| #include <mbedtls/asn1.h>
 | |
| #include <mbedtls/oid.h>
 | |
| #endif
 | |
| #include <linux/printk.h>
 | |
| 
 | |
| #define kenter(FMT, ...) \
 | |
| 	pr_devel("==> %s("FMT")\n", __func__, ##__VA_ARGS__)
 | |
| #define kleave(FMT, ...) \
 | |
| 	pr_devel("<== %s()"FMT"\n", __func__, ##__VA_ARGS__)
 | |
| 
 | |
| /* Backup the parsed MedTLS context that we need */
 | |
| #if CONFIG_IS_ENABLED(MBEDTLS_LIB_X509)
 | |
| struct pkcs7_mbedtls_ctx {
 | |
| 	void *content_data;
 | |
| };
 | |
| 
 | |
| struct pkcs7_sinfo_mbedtls_ctx {
 | |
| 	void *authattrs_data;
 | |
| 	void *content_data_digest;
 | |
| };
 | |
| #endif
 | |
| 
 | |
| /*
 | |
|  * MbedTLS integration Notes:
 | |
|  *
 | |
|  * MbedTLS PKCS#7 library does not originally support parsing MicroSoft
 | |
|  * Authentication Code which is used for verifying the PE image digest.
 | |
|  *
 | |
|  * 1.	Authenticated Attributes (authenticatedAttributes)
 | |
|  *	MbedTLS assumes unauthenticatedAttributes and authenticatedAttributes
 | |
|  *	fields not exist.
 | |
|  *	See MbedTLS function 'pkcs7_get_signer_info' for details.
 | |
|  *
 | |
|  * 2.	MicroSoft Authentication Code (mscode)
 | |
|  *	MbedTLS only supports Content Data type defined as 1.2.840.113549.1.7.1
 | |
|  *	(MBEDTLS_OID_PKCS7_DATA, aka OID_data).
 | |
|  *	1.3.6.1.4.1.311.2.1.4 (MicroSoft Authentication Code, aka
 | |
|  *	OID_msIndirectData) is not supported.
 | |
|  *	See MbedTLS function 'pkcs7_get_content_info_type' for details.
 | |
|  *
 | |
|  * But the EFI loader assumes that a PKCS#7 message with an EFI image always
 | |
|  * contains MicroSoft Authentication Code as Content Data (msg->data is NOT
 | |
|  * NULL), see function 'efi_signature_verify'.
 | |
|  *
 | |
|  * MbedTLS patch "0002-support-MicroSoft-authentication-code-in-PKCS7-lib.patch"
 | |
|  * is to support both above features by parsing the Content Data and
 | |
|  * Authenticate Attributes from a given PKCS#7 message.
 | |
|  *
 | |
|  * Other fields we don't need to populate from MbedTLS, which are used
 | |
|  * internally by pkcs7_verify:
 | |
|  * 'signer', 'unsupported_crypto', 'blacklisted'
 | |
|  * 'sig->digest' is used internally by pkcs7_digest to calculate the hash of
 | |
|  * Content Data or Authenticate Attributes.
 | |
|  */
 | |
| struct pkcs7_signed_info {
 | |
| #if CONFIG_IS_ENABLED(MBEDTLS_LIB_X509)
 | |
| 	struct pkcs7_sinfo_mbedtls_ctx *mbedtls_ctx;
 | |
| #endif
 | |
| 	struct pkcs7_signed_info *next;
 | |
| 	struct x509_certificate *signer; /* Signing certificate (in msg->certs) */
 | |
| 	unsigned	index;
 | |
| 	bool		unsupported_crypto;	/* T if not usable due to missing crypto */
 | |
| 	bool		blacklisted;
 | |
| 
 | |
| 	/* Message digest - the digest of the Content Data (or NULL) */
 | |
| 	const void	*msgdigest;
 | |
| 	unsigned	msgdigest_len;
 | |
| 
 | |
| 	/* Authenticated Attribute data (or NULL) */
 | |
| 	unsigned	authattrs_len;
 | |
| 	const void	*authattrs;
 | |
| 	unsigned long	aa_set;
 | |
| #define	sinfo_has_content_type		0
 | |
| #define	sinfo_has_signing_time		1
 | |
| #define	sinfo_has_message_digest	2
 | |
| #define sinfo_has_smime_caps		3
 | |
| #define	sinfo_has_ms_opus_info		4
 | |
| #define	sinfo_has_ms_statement_type	5
 | |
| 	time64_t	signing_time;
 | |
| 
 | |
| 	/* Message signature.
 | |
| 	 *
 | |
| 	 * This contains the generated digest of _either_ the Content Data or
 | |
| 	 * the Authenticated Attributes [RFC2315 9.3].  If the latter, one of
 | |
| 	 * the attributes contains the digest of the the Content Data within
 | |
| 	 * it.
 | |
| 	 *
 | |
| 	 * THis also contains the issuing cert serial number and issuer's name
 | |
| 	 * [PKCS#7 or CMS ver 1] or issuing cert's SKID [CMS ver 3].
 | |
| 	 */
 | |
| 	struct public_key_signature *sig;
 | |
| };
 | |
| 
 | |
| struct pkcs7_message {
 | |
| #if CONFIG_IS_ENABLED(MBEDTLS_LIB_X509)
 | |
| 	struct pkcs7_mbedtls_ctx *mbedtls_ctx;
 | |
| #endif
 | |
| 	struct x509_certificate *certs;	/* Certificate list */
 | |
| 	struct x509_certificate *crl;	/* Revocation list */
 | |
| 	struct pkcs7_signed_info *signed_infos;
 | |
| 	u8		version;	/* Version of cert (1 -> PKCS#7 or CMS; 3 -> CMS) */
 | |
| 	bool		have_authattrs;	/* T if have authattrs */
 | |
| 
 | |
| 	/* Content Data (or NULL) */
 | |
| 	enum OID	data_type;	/* Type of Data */
 | |
| 	size_t		data_len;	/* Length of Data */
 | |
| 	size_t		data_hdrlen;	/* Length of Data ASN.1 header */
 | |
| 	const void	*data;		/* Content Data (or 0) */
 | |
| };
 | |
| #endif /* _PKCS7_PARSER_H */
 |