freebsd-skq/lib/libsecureboot/brf.c
sjg 114933b262 Add libsecureboot
Used by loader and veriexec
Depends on libbearssl

Reviewed by:	emaste
Sponsored by:	Juniper Networks
Differential Revision:	D16335
2019-02-26 06:09:10 +00:00

404 lines
8.4 KiB
C

// The functions here are derrived from BearSSL/tools/*.c
// When that is refactored suitably we can use them directly.
/*
* Copyright (c) 2016 Thomas Pornin <pornin@bolet.org>
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated documentation files (the
* "Software"), to deal in the Software without restriction, including
* without limitation the rights to use, copy, modify, merge, publish,
* distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so, subject to
* the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
#define NEED_BRSSL_H
#include "libsecureboot-priv.h"
#include <brssl.h>
static int
is_ign(int c)
{
if (c == 0) {
return (0);
}
if (c <= 32 || c == '-' || c == '_' || c == '.'
|| c == '/' || c == '+' || c == ':')
{
return (1);
}
return (0);
}
/*
* Get next non-ignored character, normalised:
* ASCII letters are converted to lowercase
* control characters, space, '-', '_', '.', '/', '+' and ':' are ignored
* A terminating zero is returned as 0.
*/
static int
next_char(const char **ps, const char *limit)
{
for (;;) {
int c;
if (*ps == limit) {
return (0);
}
c = *(*ps) ++;
if (c == 0) {
return (0);
}
if (c >= 'A' && c <= 'Z') {
c += 'a' - 'A';
}
if (!is_ign(c)) {
return (c);
}
}
}
/*
* Partial string equality comparison, with normalisation.
*/
static int
eqstr_chunk(const char *s1, size_t s1_len, const char *s2, size_t s2_len)
{
const char *lim1, *lim2;
lim1 = s1 + s1_len;
lim2 = s2 + s2_len;
for (;;) {
int c1, c2;
c1 = next_char(&s1, lim1);
c2 = next_char(&s2, lim2);
if (c1 != c2) {
return (0);
}
if (c1 == 0) {
return (1);
}
}
}
/* see brssl.h */
int
eqstr(const char *s1, const char *s2)
{
return (eqstr_chunk(s1, strlen(s1), s2, strlen(s2)));
}
int
looks_like_DER(const unsigned char *buf, size_t len)
{
int fb;
size_t dlen;
if (len < 2) {
return (0);
}
if (*buf ++ != 0x30) {
return (0);
}
fb = *buf ++;
len -= 2;
if (fb < 0x80) {
return ((size_t)fb == len);
} else if (fb == 0x80) {
return (0);
} else {
fb -= 0x80;
if (len < (size_t)fb + 2) {
return (0);
}
len -= (size_t)fb;
dlen = 0;
while (fb -- > 0) {
if (dlen > (len >> 8)) {
return (0);
}
dlen = (dlen << 8) + (size_t)*buf ++;
}
return (dlen == len);
}
}
static void
vblob_append(void *cc, const void *data, size_t len)
{
bvector *bv;
bv = cc;
VEC_ADDMANY(*bv, data, len);
}
void
free_pem_object_contents(pem_object *po)
{
if (po != NULL) {
xfree(po->name);
xfree(po->data);
}
}
pem_object *
decode_pem(const void *src, size_t len, size_t *num)
{
VECTOR(pem_object) pem_list = VEC_INIT;
br_pem_decoder_context pc;
pem_object po, *pos;
const unsigned char *buf;
bvector bv = VEC_INIT;
int inobj;
int extra_nl;
*num = 0;
br_pem_decoder_init(&pc);
buf = src;
inobj = 0;
po.name = NULL;
po.data = NULL;
po.data_len = 0;
extra_nl = 1;
while (len > 0) {
size_t tlen;
tlen = br_pem_decoder_push(&pc, buf, len);
buf += tlen;
len -= tlen;
switch (br_pem_decoder_event(&pc)) {
case BR_PEM_BEGIN_OBJ:
po.name = xstrdup(br_pem_decoder_name(&pc));
br_pem_decoder_setdest(&pc, vblob_append, &bv);
inobj = 1;
break;
case BR_PEM_END_OBJ:
if (inobj) {
po.data = VEC_TOARRAY(bv);
po.data_len = VEC_LEN(bv);
VEC_ADD(pem_list, po);
VEC_CLEAR(bv);
po.name = NULL;
po.data = NULL;
po.data_len = 0;
inobj = 0;
}
break;
case BR_PEM_ERROR:
xfree(po.name);
VEC_CLEAR(bv);
ve_error_set("ERROR: invalid PEM encoding");
VEC_CLEAREXT(pem_list, &free_pem_object_contents);
return (NULL);
}
/*
* We add an extra newline at the end, in order to
* support PEM files that lack the newline on their last
* line (this is somwehat invalid, but PEM format is not
* standardised and such files do exist in the wild, so
* we'd better accept them).
*/
if (len == 0 && extra_nl) {
extra_nl = 0;
buf = (const unsigned char *)"\n";
len = 1;
}
}
if (inobj) {
ve_error_set("ERROR: unfinished PEM object");
xfree(po.name);
VEC_CLEAR(bv);
VEC_CLEAREXT(pem_list, &free_pem_object_contents);
return (NULL);
}
*num = VEC_LEN(pem_list);
VEC_ADD(pem_list, po);
pos = VEC_TOARRAY(pem_list);
VEC_CLEAR(pem_list);
return (pos);
}
br_x509_certificate *
parse_certificates(unsigned char *buf, size_t len, size_t *num)
{
VECTOR(br_x509_certificate) cert_list = VEC_INIT;
pem_object *pos;
size_t u, num_pos;
br_x509_certificate *xcs;
br_x509_certificate dummy;
*num = 0;
/*
* Check for a DER-encoded certificate.
*/
if (looks_like_DER(buf, len)) {
xcs = xmalloc(2 * sizeof *xcs);
xcs[0].data = buf;
xcs[0].data_len = len;
xcs[1].data = NULL;
xcs[1].data_len = 0;
*num = 1;
return (xcs);
}
pos = decode_pem(buf, len, &num_pos);
if (pos == NULL) {
return (NULL);
}
for (u = 0; u < num_pos; u ++) {
if (eqstr(pos[u].name, "CERTIFICATE")
|| eqstr(pos[u].name, "X509 CERTIFICATE"))
{
br_x509_certificate xc;
xc.data = pos[u].data;
xc.data_len = pos[u].data_len;
pos[u].data = NULL;
VEC_ADD(cert_list, xc);
}
}
for (u = 0; u < num_pos; u ++) {
free_pem_object_contents(&pos[u]);
}
xfree(pos);
if (VEC_LEN(cert_list) == 0) {
return (NULL);
}
*num = VEC_LEN(cert_list);
dummy.data = NULL;
dummy.data_len = 0;
VEC_ADD(cert_list, dummy);
xcs = VEC_TOARRAY(cert_list);
VEC_CLEAR(cert_list);
return (xcs);
}
br_x509_certificate *
read_certificates(const char *fname, size_t *num)
{
br_x509_certificate *xcs;
unsigned char *buf;
size_t len;
*num = 0;
/*
* TODO: reading the whole file is crude; we could parse them
* in a streamed fashion. But it does not matter much in practice.
*/
buf = read_file(fname, &len);
if (buf == NULL) {
return (NULL);
}
xcs = parse_certificates(buf, len, num);
if (xcs == NULL) {
ve_error_set("ERROR: no certificate in file '%s'\n", fname);
}
xfree(buf);
return (xcs);
}
/* see brssl.h */
void
free_certificates(br_x509_certificate *certs, size_t num)
{
size_t u;
for (u = 0; u < num; u ++) {
xfree(certs[u].data);
}
xfree(certs);
}
static void
dn_append(void *ctx, const void *buf, size_t len)
{
VEC_ADDMANY(*(bvector *)ctx, buf, len);
}
int
certificate_to_trust_anchor_inner(br_x509_trust_anchor *ta,
br_x509_certificate *xc)
{
br_x509_decoder_context dc;
bvector vdn = VEC_INIT;
br_x509_pkey *pk;
br_x509_decoder_init(&dc, dn_append, &vdn);
br_x509_decoder_push(&dc, xc->data, xc->data_len);
pk = br_x509_decoder_get_pkey(&dc);
if (pk == NULL) {
ve_error_set("ERROR: CA decoding failed with error %d\n",
br_x509_decoder_last_error(&dc));
VEC_CLEAR(vdn);
return (-1);
}
ta->dn.data = VEC_TOARRAY(vdn);
ta->dn.len = VEC_LEN(vdn);
VEC_CLEAR(vdn);
ta->flags = 0;
if (br_x509_decoder_isCA(&dc)) {
ta->flags |= BR_X509_TA_CA;
}
switch (pk->key_type) {
case BR_KEYTYPE_RSA:
ta->pkey.key_type = BR_KEYTYPE_RSA;
ta->pkey.key.rsa.n = xblobdup(pk->key.rsa.n, pk->key.rsa.nlen);
ta->pkey.key.rsa.nlen = pk->key.rsa.nlen;
ta->pkey.key.rsa.e = xblobdup(pk->key.rsa.e, pk->key.rsa.elen);
ta->pkey.key.rsa.elen = pk->key.rsa.elen;
break;
case BR_KEYTYPE_EC:
ta->pkey.key_type = BR_KEYTYPE_EC;
ta->pkey.key.ec.curve = pk->key.ec.curve;
ta->pkey.key.ec.q = xblobdup(pk->key.ec.q, pk->key.ec.qlen);
ta->pkey.key.ec.qlen = pk->key.ec.qlen;
break;
default:
ve_error_set("ERROR: unsupported public key type in CA\n");
xfree(ta->dn.data);
return (-1);
}
return (0);
}
/* see brssl.h */
void
free_ta_contents(br_x509_trust_anchor *ta)
{
xfree(ta->dn.data);
switch (ta->pkey.key_type) {
case BR_KEYTYPE_RSA:
xfree(ta->pkey.key.rsa.n);
xfree(ta->pkey.key.rsa.e);
break;
case BR_KEYTYPE_EC:
xfree(ta->pkey.key.ec.q);
break;
}
}