18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
28c2ecf20Sopenharmony_ci/* PKCS#7 parser
38c2ecf20Sopenharmony_ci *
48c2ecf20Sopenharmony_ci * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
58c2ecf20Sopenharmony_ci * Written by David Howells (dhowells@redhat.com)
68c2ecf20Sopenharmony_ci */
78c2ecf20Sopenharmony_ci
88c2ecf20Sopenharmony_ci#define pr_fmt(fmt) "PKCS7: "fmt
98c2ecf20Sopenharmony_ci#include <linux/kernel.h>
108c2ecf20Sopenharmony_ci#include <linux/module.h>
118c2ecf20Sopenharmony_ci#include <linux/export.h>
128c2ecf20Sopenharmony_ci#include <linux/slab.h>
138c2ecf20Sopenharmony_ci#include <linux/err.h>
148c2ecf20Sopenharmony_ci#include <linux/oid_registry.h>
158c2ecf20Sopenharmony_ci#include <crypto/public_key.h>
168c2ecf20Sopenharmony_ci#include "pkcs7_parser.h"
178c2ecf20Sopenharmony_ci#include "pkcs7.asn1.h"
188c2ecf20Sopenharmony_ci
198c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("PKCS#7 parser");
208c2ecf20Sopenharmony_ciMODULE_AUTHOR("Red Hat, Inc.");
218c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL");
228c2ecf20Sopenharmony_ci
238c2ecf20Sopenharmony_cistruct pkcs7_parse_context {
248c2ecf20Sopenharmony_ci	struct pkcs7_message	*msg;		/* Message being constructed */
258c2ecf20Sopenharmony_ci	struct pkcs7_signed_info *sinfo;	/* SignedInfo being constructed */
268c2ecf20Sopenharmony_ci	struct pkcs7_signed_info **ppsinfo;
278c2ecf20Sopenharmony_ci	struct x509_certificate *certs;		/* Certificate cache */
288c2ecf20Sopenharmony_ci	struct x509_certificate **ppcerts;
298c2ecf20Sopenharmony_ci	unsigned long	data;			/* Start of data */
308c2ecf20Sopenharmony_ci	enum OID	last_oid;		/* Last OID encountered */
318c2ecf20Sopenharmony_ci	unsigned	x509_index;
328c2ecf20Sopenharmony_ci	unsigned	sinfo_index;
338c2ecf20Sopenharmony_ci	const void	*raw_serial;
348c2ecf20Sopenharmony_ci	unsigned	raw_serial_size;
358c2ecf20Sopenharmony_ci	unsigned	raw_issuer_size;
368c2ecf20Sopenharmony_ci	const void	*raw_issuer;
378c2ecf20Sopenharmony_ci	const void	*raw_skid;
388c2ecf20Sopenharmony_ci	unsigned	raw_skid_size;
398c2ecf20Sopenharmony_ci	bool		expect_skid;
408c2ecf20Sopenharmony_ci};
418c2ecf20Sopenharmony_ci
428c2ecf20Sopenharmony_ci/*
438c2ecf20Sopenharmony_ci * Free a signed information block.
448c2ecf20Sopenharmony_ci */
458c2ecf20Sopenharmony_cistatic void pkcs7_free_signed_info(struct pkcs7_signed_info *sinfo)
468c2ecf20Sopenharmony_ci{
478c2ecf20Sopenharmony_ci	if (sinfo) {
488c2ecf20Sopenharmony_ci		public_key_signature_free(sinfo->sig);
498c2ecf20Sopenharmony_ci		kfree(sinfo);
508c2ecf20Sopenharmony_ci	}
518c2ecf20Sopenharmony_ci}
528c2ecf20Sopenharmony_ci
538c2ecf20Sopenharmony_ci/**
548c2ecf20Sopenharmony_ci * pkcs7_free_message - Free a PKCS#7 message
558c2ecf20Sopenharmony_ci * @pkcs7: The PKCS#7 message to free
568c2ecf20Sopenharmony_ci */
578c2ecf20Sopenharmony_civoid pkcs7_free_message(struct pkcs7_message *pkcs7)
588c2ecf20Sopenharmony_ci{
598c2ecf20Sopenharmony_ci	struct x509_certificate *cert;
608c2ecf20Sopenharmony_ci	struct pkcs7_signed_info *sinfo;
618c2ecf20Sopenharmony_ci
628c2ecf20Sopenharmony_ci	if (pkcs7) {
638c2ecf20Sopenharmony_ci		while (pkcs7->certs) {
648c2ecf20Sopenharmony_ci			cert = pkcs7->certs;
658c2ecf20Sopenharmony_ci			pkcs7->certs = cert->next;
668c2ecf20Sopenharmony_ci			x509_free_certificate(cert);
678c2ecf20Sopenharmony_ci		}
688c2ecf20Sopenharmony_ci		while (pkcs7->crl) {
698c2ecf20Sopenharmony_ci			cert = pkcs7->crl;
708c2ecf20Sopenharmony_ci			pkcs7->crl = cert->next;
718c2ecf20Sopenharmony_ci			x509_free_certificate(cert);
728c2ecf20Sopenharmony_ci		}
738c2ecf20Sopenharmony_ci		while (pkcs7->signed_infos) {
748c2ecf20Sopenharmony_ci			sinfo = pkcs7->signed_infos;
758c2ecf20Sopenharmony_ci			pkcs7->signed_infos = sinfo->next;
768c2ecf20Sopenharmony_ci			pkcs7_free_signed_info(sinfo);
778c2ecf20Sopenharmony_ci		}
788c2ecf20Sopenharmony_ci		kfree(pkcs7);
798c2ecf20Sopenharmony_ci	}
808c2ecf20Sopenharmony_ci}
818c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(pkcs7_free_message);
828c2ecf20Sopenharmony_ci
838c2ecf20Sopenharmony_ci/*
848c2ecf20Sopenharmony_ci * Check authenticatedAttributes are provided or not provided consistently.
858c2ecf20Sopenharmony_ci */
868c2ecf20Sopenharmony_cistatic int pkcs7_check_authattrs(struct pkcs7_message *msg)
878c2ecf20Sopenharmony_ci{
888c2ecf20Sopenharmony_ci	struct pkcs7_signed_info *sinfo;
898c2ecf20Sopenharmony_ci	bool want = false;
908c2ecf20Sopenharmony_ci
918c2ecf20Sopenharmony_ci	sinfo = msg->signed_infos;
928c2ecf20Sopenharmony_ci	if (!sinfo)
938c2ecf20Sopenharmony_ci		goto inconsistent;
948c2ecf20Sopenharmony_ci
958c2ecf20Sopenharmony_ci	if (sinfo->authattrs) {
968c2ecf20Sopenharmony_ci		want = true;
978c2ecf20Sopenharmony_ci		msg->have_authattrs = true;
988c2ecf20Sopenharmony_ci	}
998c2ecf20Sopenharmony_ci
1008c2ecf20Sopenharmony_ci	for (sinfo = sinfo->next; sinfo; sinfo = sinfo->next)
1018c2ecf20Sopenharmony_ci		if (!!sinfo->authattrs != want)
1028c2ecf20Sopenharmony_ci			goto inconsistent;
1038c2ecf20Sopenharmony_ci	return 0;
1048c2ecf20Sopenharmony_ci
1058c2ecf20Sopenharmony_ciinconsistent:
1068c2ecf20Sopenharmony_ci	pr_warn("Inconsistently supplied authAttrs\n");
1078c2ecf20Sopenharmony_ci	return -EINVAL;
1088c2ecf20Sopenharmony_ci}
1098c2ecf20Sopenharmony_ci
1108c2ecf20Sopenharmony_ci/**
1118c2ecf20Sopenharmony_ci * pkcs7_parse_message - Parse a PKCS#7 message
1128c2ecf20Sopenharmony_ci * @data: The raw binary ASN.1 encoded message to be parsed
1138c2ecf20Sopenharmony_ci * @datalen: The size of the encoded message
1148c2ecf20Sopenharmony_ci */
1158c2ecf20Sopenharmony_cistruct pkcs7_message *pkcs7_parse_message(const void *data, size_t datalen)
1168c2ecf20Sopenharmony_ci{
1178c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx;
1188c2ecf20Sopenharmony_ci	struct pkcs7_message *msg = ERR_PTR(-ENOMEM);
1198c2ecf20Sopenharmony_ci	int ret;
1208c2ecf20Sopenharmony_ci
1218c2ecf20Sopenharmony_ci	ctx = kzalloc(sizeof(struct pkcs7_parse_context), GFP_KERNEL);
1228c2ecf20Sopenharmony_ci	if (!ctx)
1238c2ecf20Sopenharmony_ci		goto out_no_ctx;
1248c2ecf20Sopenharmony_ci	ctx->msg = kzalloc(sizeof(struct pkcs7_message), GFP_KERNEL);
1258c2ecf20Sopenharmony_ci	if (!ctx->msg)
1268c2ecf20Sopenharmony_ci		goto out_no_msg;
1278c2ecf20Sopenharmony_ci	ctx->sinfo = kzalloc(sizeof(struct pkcs7_signed_info), GFP_KERNEL);
1288c2ecf20Sopenharmony_ci	if (!ctx->sinfo)
1298c2ecf20Sopenharmony_ci		goto out_no_sinfo;
1308c2ecf20Sopenharmony_ci	ctx->sinfo->sig = kzalloc(sizeof(struct public_key_signature),
1318c2ecf20Sopenharmony_ci				  GFP_KERNEL);
1328c2ecf20Sopenharmony_ci	if (!ctx->sinfo->sig)
1338c2ecf20Sopenharmony_ci		goto out_no_sig;
1348c2ecf20Sopenharmony_ci
1358c2ecf20Sopenharmony_ci	ctx->data = (unsigned long)data;
1368c2ecf20Sopenharmony_ci	ctx->ppcerts = &ctx->certs;
1378c2ecf20Sopenharmony_ci	ctx->ppsinfo = &ctx->msg->signed_infos;
1388c2ecf20Sopenharmony_ci
1398c2ecf20Sopenharmony_ci	/* Attempt to decode the signature */
1408c2ecf20Sopenharmony_ci	ret = asn1_ber_decoder(&pkcs7_decoder, ctx, data, datalen);
1418c2ecf20Sopenharmony_ci	if (ret < 0) {
1428c2ecf20Sopenharmony_ci		msg = ERR_PTR(ret);
1438c2ecf20Sopenharmony_ci		goto out;
1448c2ecf20Sopenharmony_ci	}
1458c2ecf20Sopenharmony_ci
1468c2ecf20Sopenharmony_ci	ret = pkcs7_check_authattrs(ctx->msg);
1478c2ecf20Sopenharmony_ci	if (ret < 0) {
1488c2ecf20Sopenharmony_ci		msg = ERR_PTR(ret);
1498c2ecf20Sopenharmony_ci		goto out;
1508c2ecf20Sopenharmony_ci	}
1518c2ecf20Sopenharmony_ci
1528c2ecf20Sopenharmony_ci	msg = ctx->msg;
1538c2ecf20Sopenharmony_ci	ctx->msg = NULL;
1548c2ecf20Sopenharmony_ci
1558c2ecf20Sopenharmony_ciout:
1568c2ecf20Sopenharmony_ci	while (ctx->certs) {
1578c2ecf20Sopenharmony_ci		struct x509_certificate *cert = ctx->certs;
1588c2ecf20Sopenharmony_ci		ctx->certs = cert->next;
1598c2ecf20Sopenharmony_ci		x509_free_certificate(cert);
1608c2ecf20Sopenharmony_ci	}
1618c2ecf20Sopenharmony_ciout_no_sig:
1628c2ecf20Sopenharmony_ci	pkcs7_free_signed_info(ctx->sinfo);
1638c2ecf20Sopenharmony_ciout_no_sinfo:
1648c2ecf20Sopenharmony_ci	pkcs7_free_message(ctx->msg);
1658c2ecf20Sopenharmony_ciout_no_msg:
1668c2ecf20Sopenharmony_ci	kfree(ctx);
1678c2ecf20Sopenharmony_ciout_no_ctx:
1688c2ecf20Sopenharmony_ci	return msg;
1698c2ecf20Sopenharmony_ci}
1708c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(pkcs7_parse_message);
1718c2ecf20Sopenharmony_ci
1728c2ecf20Sopenharmony_ci/**
1738c2ecf20Sopenharmony_ci * pkcs7_get_content_data - Get access to the PKCS#7 content
1748c2ecf20Sopenharmony_ci * @pkcs7: The preparsed PKCS#7 message to access
1758c2ecf20Sopenharmony_ci * @_data: Place to return a pointer to the data
1768c2ecf20Sopenharmony_ci * @_data_len: Place to return the data length
1778c2ecf20Sopenharmony_ci * @_headerlen: Size of ASN.1 header not included in _data
1788c2ecf20Sopenharmony_ci *
1798c2ecf20Sopenharmony_ci * Get access to the data content of the PKCS#7 message.  The size of the
1808c2ecf20Sopenharmony_ci * header of the ASN.1 object that contains it is also provided and can be used
1818c2ecf20Sopenharmony_ci * to adjust *_data and *_data_len to get the entire object.
1828c2ecf20Sopenharmony_ci *
1838c2ecf20Sopenharmony_ci * Returns -ENODATA if the data object was missing from the message.
1848c2ecf20Sopenharmony_ci */
1858c2ecf20Sopenharmony_ciint pkcs7_get_content_data(const struct pkcs7_message *pkcs7,
1868c2ecf20Sopenharmony_ci			   const void **_data, size_t *_data_len,
1878c2ecf20Sopenharmony_ci			   size_t *_headerlen)
1888c2ecf20Sopenharmony_ci{
1898c2ecf20Sopenharmony_ci	if (!pkcs7->data)
1908c2ecf20Sopenharmony_ci		return -ENODATA;
1918c2ecf20Sopenharmony_ci
1928c2ecf20Sopenharmony_ci	*_data = pkcs7->data;
1938c2ecf20Sopenharmony_ci	*_data_len = pkcs7->data_len;
1948c2ecf20Sopenharmony_ci	if (_headerlen)
1958c2ecf20Sopenharmony_ci		*_headerlen = pkcs7->data_hdrlen;
1968c2ecf20Sopenharmony_ci	return 0;
1978c2ecf20Sopenharmony_ci}
1988c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(pkcs7_get_content_data);
1998c2ecf20Sopenharmony_ci
2008c2ecf20Sopenharmony_ci/*
2018c2ecf20Sopenharmony_ci * Note an OID when we find one for later processing when we know how
2028c2ecf20Sopenharmony_ci * to interpret it.
2038c2ecf20Sopenharmony_ci */
2048c2ecf20Sopenharmony_ciint pkcs7_note_OID(void *context, size_t hdrlen,
2058c2ecf20Sopenharmony_ci		   unsigned char tag,
2068c2ecf20Sopenharmony_ci		   const void *value, size_t vlen)
2078c2ecf20Sopenharmony_ci{
2088c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
2098c2ecf20Sopenharmony_ci
2108c2ecf20Sopenharmony_ci	ctx->last_oid = look_up_OID(value, vlen);
2118c2ecf20Sopenharmony_ci	if (ctx->last_oid == OID__NR) {
2128c2ecf20Sopenharmony_ci		char buffer[50];
2138c2ecf20Sopenharmony_ci		sprint_oid(value, vlen, buffer, sizeof(buffer));
2148c2ecf20Sopenharmony_ci		printk("PKCS7: Unknown OID: [%lu] %s\n",
2158c2ecf20Sopenharmony_ci		       (unsigned long)value - ctx->data, buffer);
2168c2ecf20Sopenharmony_ci	}
2178c2ecf20Sopenharmony_ci	return 0;
2188c2ecf20Sopenharmony_ci}
2198c2ecf20Sopenharmony_ci
2208c2ecf20Sopenharmony_ci/*
2218c2ecf20Sopenharmony_ci * Note the digest algorithm for the signature.
2228c2ecf20Sopenharmony_ci */
2238c2ecf20Sopenharmony_ciint pkcs7_sig_note_digest_algo(void *context, size_t hdrlen,
2248c2ecf20Sopenharmony_ci			       unsigned char tag,
2258c2ecf20Sopenharmony_ci			       const void *value, size_t vlen)
2268c2ecf20Sopenharmony_ci{
2278c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
2288c2ecf20Sopenharmony_ci
2298c2ecf20Sopenharmony_ci	switch (ctx->last_oid) {
2308c2ecf20Sopenharmony_ci	case OID_md4:
2318c2ecf20Sopenharmony_ci		ctx->sinfo->sig->hash_algo = "md4";
2328c2ecf20Sopenharmony_ci		break;
2338c2ecf20Sopenharmony_ci	case OID_md5:
2348c2ecf20Sopenharmony_ci		ctx->sinfo->sig->hash_algo = "md5";
2358c2ecf20Sopenharmony_ci		break;
2368c2ecf20Sopenharmony_ci	case OID_sha1:
2378c2ecf20Sopenharmony_ci		ctx->sinfo->sig->hash_algo = "sha1";
2388c2ecf20Sopenharmony_ci		break;
2398c2ecf20Sopenharmony_ci	case OID_sha256:
2408c2ecf20Sopenharmony_ci		ctx->sinfo->sig->hash_algo = "sha256";
2418c2ecf20Sopenharmony_ci		break;
2428c2ecf20Sopenharmony_ci	case OID_sha384:
2438c2ecf20Sopenharmony_ci		ctx->sinfo->sig->hash_algo = "sha384";
2448c2ecf20Sopenharmony_ci		break;
2458c2ecf20Sopenharmony_ci	case OID_sha512:
2468c2ecf20Sopenharmony_ci		ctx->sinfo->sig->hash_algo = "sha512";
2478c2ecf20Sopenharmony_ci		break;
2488c2ecf20Sopenharmony_ci	case OID_sha224:
2498c2ecf20Sopenharmony_ci		ctx->sinfo->sig->hash_algo = "sha224";
2508c2ecf20Sopenharmony_ci		break;
2518c2ecf20Sopenharmony_ci	default:
2528c2ecf20Sopenharmony_ci		printk("Unsupported digest algo: %u\n", ctx->last_oid);
2538c2ecf20Sopenharmony_ci		return -ENOPKG;
2548c2ecf20Sopenharmony_ci	}
2558c2ecf20Sopenharmony_ci	return 0;
2568c2ecf20Sopenharmony_ci}
2578c2ecf20Sopenharmony_ci
2588c2ecf20Sopenharmony_ci/*
2598c2ecf20Sopenharmony_ci * Note the public key algorithm for the signature.
2608c2ecf20Sopenharmony_ci */
2618c2ecf20Sopenharmony_ciint pkcs7_sig_note_pkey_algo(void *context, size_t hdrlen,
2628c2ecf20Sopenharmony_ci			     unsigned char tag,
2638c2ecf20Sopenharmony_ci			     const void *value, size_t vlen)
2648c2ecf20Sopenharmony_ci{
2658c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
2668c2ecf20Sopenharmony_ci
2678c2ecf20Sopenharmony_ci	switch (ctx->last_oid) {
2688c2ecf20Sopenharmony_ci	case OID_rsaEncryption:
2698c2ecf20Sopenharmony_ci		ctx->sinfo->sig->pkey_algo = "rsa";
2708c2ecf20Sopenharmony_ci		ctx->sinfo->sig->encoding = "pkcs1";
2718c2ecf20Sopenharmony_ci		break;
2728c2ecf20Sopenharmony_ci	case OID_id_ecdsa_with_sha1:
2738c2ecf20Sopenharmony_ci	case OID_id_ecdsa_with_sha224:
2748c2ecf20Sopenharmony_ci	case OID_id_ecdsa_with_sha256:
2758c2ecf20Sopenharmony_ci	case OID_id_ecdsa_with_sha384:
2768c2ecf20Sopenharmony_ci	case OID_id_ecdsa_with_sha512:
2778c2ecf20Sopenharmony_ci		ctx->sinfo->sig->pkey_algo = "ecdsa";
2788c2ecf20Sopenharmony_ci		ctx->sinfo->sig->encoding = "x962";
2798c2ecf20Sopenharmony_ci		break;
2808c2ecf20Sopenharmony_ci	default:
2818c2ecf20Sopenharmony_ci		printk("Unsupported pkey algo: %u\n", ctx->last_oid);
2828c2ecf20Sopenharmony_ci		return -ENOPKG;
2838c2ecf20Sopenharmony_ci	}
2848c2ecf20Sopenharmony_ci	return 0;
2858c2ecf20Sopenharmony_ci}
2868c2ecf20Sopenharmony_ci
2878c2ecf20Sopenharmony_ci/*
2888c2ecf20Sopenharmony_ci * We only support signed data [RFC2315 sec 9].
2898c2ecf20Sopenharmony_ci */
2908c2ecf20Sopenharmony_ciint pkcs7_check_content_type(void *context, size_t hdrlen,
2918c2ecf20Sopenharmony_ci			     unsigned char tag,
2928c2ecf20Sopenharmony_ci			     const void *value, size_t vlen)
2938c2ecf20Sopenharmony_ci{
2948c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
2958c2ecf20Sopenharmony_ci
2968c2ecf20Sopenharmony_ci	if (ctx->last_oid != OID_signed_data) {
2978c2ecf20Sopenharmony_ci		pr_warn("Only support pkcs7_signedData type\n");
2988c2ecf20Sopenharmony_ci		return -EINVAL;
2998c2ecf20Sopenharmony_ci	}
3008c2ecf20Sopenharmony_ci
3018c2ecf20Sopenharmony_ci	return 0;
3028c2ecf20Sopenharmony_ci}
3038c2ecf20Sopenharmony_ci
3048c2ecf20Sopenharmony_ci/*
3058c2ecf20Sopenharmony_ci * Note the SignedData version
3068c2ecf20Sopenharmony_ci */
3078c2ecf20Sopenharmony_ciint pkcs7_note_signeddata_version(void *context, size_t hdrlen,
3088c2ecf20Sopenharmony_ci				  unsigned char tag,
3098c2ecf20Sopenharmony_ci				  const void *value, size_t vlen)
3108c2ecf20Sopenharmony_ci{
3118c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
3128c2ecf20Sopenharmony_ci	unsigned version;
3138c2ecf20Sopenharmony_ci
3148c2ecf20Sopenharmony_ci	if (vlen != 1)
3158c2ecf20Sopenharmony_ci		goto unsupported;
3168c2ecf20Sopenharmony_ci
3178c2ecf20Sopenharmony_ci	ctx->msg->version = version = *(const u8 *)value;
3188c2ecf20Sopenharmony_ci	switch (version) {
3198c2ecf20Sopenharmony_ci	case 1:
3208c2ecf20Sopenharmony_ci		/* PKCS#7 SignedData [RFC2315 sec 9.1]
3218c2ecf20Sopenharmony_ci		 * CMS ver 1 SignedData [RFC5652 sec 5.1]
3228c2ecf20Sopenharmony_ci		 */
3238c2ecf20Sopenharmony_ci		break;
3248c2ecf20Sopenharmony_ci	case 3:
3258c2ecf20Sopenharmony_ci		/* CMS ver 3 SignedData [RFC2315 sec 5.1] */
3268c2ecf20Sopenharmony_ci		break;
3278c2ecf20Sopenharmony_ci	default:
3288c2ecf20Sopenharmony_ci		goto unsupported;
3298c2ecf20Sopenharmony_ci	}
3308c2ecf20Sopenharmony_ci
3318c2ecf20Sopenharmony_ci	return 0;
3328c2ecf20Sopenharmony_ci
3338c2ecf20Sopenharmony_ciunsupported:
3348c2ecf20Sopenharmony_ci	pr_warn("Unsupported SignedData version\n");
3358c2ecf20Sopenharmony_ci	return -EINVAL;
3368c2ecf20Sopenharmony_ci}
3378c2ecf20Sopenharmony_ci
3388c2ecf20Sopenharmony_ci/*
3398c2ecf20Sopenharmony_ci * Note the SignerInfo version
3408c2ecf20Sopenharmony_ci */
3418c2ecf20Sopenharmony_ciint pkcs7_note_signerinfo_version(void *context, size_t hdrlen,
3428c2ecf20Sopenharmony_ci				  unsigned char tag,
3438c2ecf20Sopenharmony_ci				  const void *value, size_t vlen)
3448c2ecf20Sopenharmony_ci{
3458c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
3468c2ecf20Sopenharmony_ci	unsigned version;
3478c2ecf20Sopenharmony_ci
3488c2ecf20Sopenharmony_ci	if (vlen != 1)
3498c2ecf20Sopenharmony_ci		goto unsupported;
3508c2ecf20Sopenharmony_ci
3518c2ecf20Sopenharmony_ci	version = *(const u8 *)value;
3528c2ecf20Sopenharmony_ci	switch (version) {
3538c2ecf20Sopenharmony_ci	case 1:
3548c2ecf20Sopenharmony_ci		/* PKCS#7 SignerInfo [RFC2315 sec 9.2]
3558c2ecf20Sopenharmony_ci		 * CMS ver 1 SignerInfo [RFC5652 sec 5.3]
3568c2ecf20Sopenharmony_ci		 */
3578c2ecf20Sopenharmony_ci		if (ctx->msg->version != 1)
3588c2ecf20Sopenharmony_ci			goto version_mismatch;
3598c2ecf20Sopenharmony_ci		ctx->expect_skid = false;
3608c2ecf20Sopenharmony_ci		break;
3618c2ecf20Sopenharmony_ci	case 3:
3628c2ecf20Sopenharmony_ci		/* CMS ver 3 SignerInfo [RFC2315 sec 5.3] */
3638c2ecf20Sopenharmony_ci		if (ctx->msg->version == 1)
3648c2ecf20Sopenharmony_ci			goto version_mismatch;
3658c2ecf20Sopenharmony_ci		ctx->expect_skid = true;
3668c2ecf20Sopenharmony_ci		break;
3678c2ecf20Sopenharmony_ci	default:
3688c2ecf20Sopenharmony_ci		goto unsupported;
3698c2ecf20Sopenharmony_ci	}
3708c2ecf20Sopenharmony_ci
3718c2ecf20Sopenharmony_ci	return 0;
3728c2ecf20Sopenharmony_ci
3738c2ecf20Sopenharmony_ciunsupported:
3748c2ecf20Sopenharmony_ci	pr_warn("Unsupported SignerInfo version\n");
3758c2ecf20Sopenharmony_ci	return -EINVAL;
3768c2ecf20Sopenharmony_civersion_mismatch:
3778c2ecf20Sopenharmony_ci	pr_warn("SignedData-SignerInfo version mismatch\n");
3788c2ecf20Sopenharmony_ci	return -EBADMSG;
3798c2ecf20Sopenharmony_ci}
3808c2ecf20Sopenharmony_ci
3818c2ecf20Sopenharmony_ci/*
3828c2ecf20Sopenharmony_ci * Extract a certificate and store it in the context.
3838c2ecf20Sopenharmony_ci */
3848c2ecf20Sopenharmony_ciint pkcs7_extract_cert(void *context, size_t hdrlen,
3858c2ecf20Sopenharmony_ci		       unsigned char tag,
3868c2ecf20Sopenharmony_ci		       const void *value, size_t vlen)
3878c2ecf20Sopenharmony_ci{
3888c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
3898c2ecf20Sopenharmony_ci	struct x509_certificate *x509;
3908c2ecf20Sopenharmony_ci
3918c2ecf20Sopenharmony_ci	if (tag != ((ASN1_UNIV << 6) | ASN1_CONS_BIT | ASN1_SEQ)) {
3928c2ecf20Sopenharmony_ci		pr_debug("Cert began with tag %02x at %lu\n",
3938c2ecf20Sopenharmony_ci			 tag, (unsigned long)ctx - ctx->data);
3948c2ecf20Sopenharmony_ci		return -EBADMSG;
3958c2ecf20Sopenharmony_ci	}
3968c2ecf20Sopenharmony_ci
3978c2ecf20Sopenharmony_ci	/* We have to correct for the header so that the X.509 parser can start
3988c2ecf20Sopenharmony_ci	 * from the beginning.  Note that since X.509 stipulates DER, there
3998c2ecf20Sopenharmony_ci	 * probably shouldn't be an EOC trailer - but it is in PKCS#7 (which
4008c2ecf20Sopenharmony_ci	 * stipulates BER).
4018c2ecf20Sopenharmony_ci	 */
4028c2ecf20Sopenharmony_ci	value -= hdrlen;
4038c2ecf20Sopenharmony_ci	vlen += hdrlen;
4048c2ecf20Sopenharmony_ci
4058c2ecf20Sopenharmony_ci	if (((u8*)value)[1] == 0x80)
4068c2ecf20Sopenharmony_ci		vlen += 2; /* Indefinite length - there should be an EOC */
4078c2ecf20Sopenharmony_ci
4088c2ecf20Sopenharmony_ci	x509 = x509_cert_parse(value, vlen);
4098c2ecf20Sopenharmony_ci	if (IS_ERR(x509))
4108c2ecf20Sopenharmony_ci		return PTR_ERR(x509);
4118c2ecf20Sopenharmony_ci
4128c2ecf20Sopenharmony_ci	x509->index = ++ctx->x509_index;
4138c2ecf20Sopenharmony_ci	pr_debug("Got cert %u for %s\n", x509->index, x509->subject);
4148c2ecf20Sopenharmony_ci	pr_debug("- fingerprint %*phN\n", x509->id->len, x509->id->data);
4158c2ecf20Sopenharmony_ci
4168c2ecf20Sopenharmony_ci	*ctx->ppcerts = x509;
4178c2ecf20Sopenharmony_ci	ctx->ppcerts = &x509->next;
4188c2ecf20Sopenharmony_ci	return 0;
4198c2ecf20Sopenharmony_ci}
4208c2ecf20Sopenharmony_ci
4218c2ecf20Sopenharmony_ci/*
4228c2ecf20Sopenharmony_ci * Save the certificate list
4238c2ecf20Sopenharmony_ci */
4248c2ecf20Sopenharmony_ciint pkcs7_note_certificate_list(void *context, size_t hdrlen,
4258c2ecf20Sopenharmony_ci				unsigned char tag,
4268c2ecf20Sopenharmony_ci				const void *value, size_t vlen)
4278c2ecf20Sopenharmony_ci{
4288c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
4298c2ecf20Sopenharmony_ci
4308c2ecf20Sopenharmony_ci	pr_devel("Got cert list (%02x)\n", tag);
4318c2ecf20Sopenharmony_ci
4328c2ecf20Sopenharmony_ci	*ctx->ppcerts = ctx->msg->certs;
4338c2ecf20Sopenharmony_ci	ctx->msg->certs = ctx->certs;
4348c2ecf20Sopenharmony_ci	ctx->certs = NULL;
4358c2ecf20Sopenharmony_ci	ctx->ppcerts = &ctx->certs;
4368c2ecf20Sopenharmony_ci	return 0;
4378c2ecf20Sopenharmony_ci}
4388c2ecf20Sopenharmony_ci
4398c2ecf20Sopenharmony_ci/*
4408c2ecf20Sopenharmony_ci * Note the content type.
4418c2ecf20Sopenharmony_ci */
4428c2ecf20Sopenharmony_ciint pkcs7_note_content(void *context, size_t hdrlen,
4438c2ecf20Sopenharmony_ci		       unsigned char tag,
4448c2ecf20Sopenharmony_ci		       const void *value, size_t vlen)
4458c2ecf20Sopenharmony_ci{
4468c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
4478c2ecf20Sopenharmony_ci
4488c2ecf20Sopenharmony_ci	if (ctx->last_oid != OID_data &&
4498c2ecf20Sopenharmony_ci	    ctx->last_oid != OID_msIndirectData) {
4508c2ecf20Sopenharmony_ci		pr_warn("Unsupported data type %d\n", ctx->last_oid);
4518c2ecf20Sopenharmony_ci		return -EINVAL;
4528c2ecf20Sopenharmony_ci	}
4538c2ecf20Sopenharmony_ci
4548c2ecf20Sopenharmony_ci	ctx->msg->data_type = ctx->last_oid;
4558c2ecf20Sopenharmony_ci	return 0;
4568c2ecf20Sopenharmony_ci}
4578c2ecf20Sopenharmony_ci
4588c2ecf20Sopenharmony_ci/*
4598c2ecf20Sopenharmony_ci * Extract the data from the message and store that and its content type OID in
4608c2ecf20Sopenharmony_ci * the context.
4618c2ecf20Sopenharmony_ci */
4628c2ecf20Sopenharmony_ciint pkcs7_note_data(void *context, size_t hdrlen,
4638c2ecf20Sopenharmony_ci		    unsigned char tag,
4648c2ecf20Sopenharmony_ci		    const void *value, size_t vlen)
4658c2ecf20Sopenharmony_ci{
4668c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
4678c2ecf20Sopenharmony_ci
4688c2ecf20Sopenharmony_ci	pr_debug("Got data\n");
4698c2ecf20Sopenharmony_ci
4708c2ecf20Sopenharmony_ci	ctx->msg->data = value;
4718c2ecf20Sopenharmony_ci	ctx->msg->data_len = vlen;
4728c2ecf20Sopenharmony_ci	ctx->msg->data_hdrlen = hdrlen;
4738c2ecf20Sopenharmony_ci	return 0;
4748c2ecf20Sopenharmony_ci}
4758c2ecf20Sopenharmony_ci
4768c2ecf20Sopenharmony_ci/*
4778c2ecf20Sopenharmony_ci * Parse authenticated attributes.
4788c2ecf20Sopenharmony_ci */
4798c2ecf20Sopenharmony_ciint pkcs7_sig_note_authenticated_attr(void *context, size_t hdrlen,
4808c2ecf20Sopenharmony_ci				      unsigned char tag,
4818c2ecf20Sopenharmony_ci				      const void *value, size_t vlen)
4828c2ecf20Sopenharmony_ci{
4838c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
4848c2ecf20Sopenharmony_ci	struct pkcs7_signed_info *sinfo = ctx->sinfo;
4858c2ecf20Sopenharmony_ci	enum OID content_type;
4868c2ecf20Sopenharmony_ci
4878c2ecf20Sopenharmony_ci	pr_devel("AuthAttr: %02x %zu [%*ph]\n", tag, vlen, (unsigned)vlen, value);
4888c2ecf20Sopenharmony_ci
4898c2ecf20Sopenharmony_ci	switch (ctx->last_oid) {
4908c2ecf20Sopenharmony_ci	case OID_contentType:
4918c2ecf20Sopenharmony_ci		if (__test_and_set_bit(sinfo_has_content_type, &sinfo->aa_set))
4928c2ecf20Sopenharmony_ci			goto repeated;
4938c2ecf20Sopenharmony_ci		content_type = look_up_OID(value, vlen);
4948c2ecf20Sopenharmony_ci		if (content_type != ctx->msg->data_type) {
4958c2ecf20Sopenharmony_ci			pr_warn("Mismatch between global data type (%d) and sinfo %u (%d)\n",
4968c2ecf20Sopenharmony_ci				ctx->msg->data_type, sinfo->index,
4978c2ecf20Sopenharmony_ci				content_type);
4988c2ecf20Sopenharmony_ci			return -EBADMSG;
4998c2ecf20Sopenharmony_ci		}
5008c2ecf20Sopenharmony_ci		return 0;
5018c2ecf20Sopenharmony_ci
5028c2ecf20Sopenharmony_ci	case OID_signingTime:
5038c2ecf20Sopenharmony_ci		if (__test_and_set_bit(sinfo_has_signing_time, &sinfo->aa_set))
5048c2ecf20Sopenharmony_ci			goto repeated;
5058c2ecf20Sopenharmony_ci		/* Should we check that the signing time is consistent
5068c2ecf20Sopenharmony_ci		 * with the signer's X.509 cert?
5078c2ecf20Sopenharmony_ci		 */
5088c2ecf20Sopenharmony_ci		return x509_decode_time(&sinfo->signing_time,
5098c2ecf20Sopenharmony_ci					hdrlen, tag, value, vlen);
5108c2ecf20Sopenharmony_ci
5118c2ecf20Sopenharmony_ci	case OID_messageDigest:
5128c2ecf20Sopenharmony_ci		if (__test_and_set_bit(sinfo_has_message_digest, &sinfo->aa_set))
5138c2ecf20Sopenharmony_ci			goto repeated;
5148c2ecf20Sopenharmony_ci		if (tag != ASN1_OTS)
5158c2ecf20Sopenharmony_ci			return -EBADMSG;
5168c2ecf20Sopenharmony_ci		sinfo->msgdigest = value;
5178c2ecf20Sopenharmony_ci		sinfo->msgdigest_len = vlen;
5188c2ecf20Sopenharmony_ci		return 0;
5198c2ecf20Sopenharmony_ci
5208c2ecf20Sopenharmony_ci	case OID_smimeCapabilites:
5218c2ecf20Sopenharmony_ci		if (__test_and_set_bit(sinfo_has_smime_caps, &sinfo->aa_set))
5228c2ecf20Sopenharmony_ci			goto repeated;
5238c2ecf20Sopenharmony_ci		if (ctx->msg->data_type != OID_msIndirectData) {
5248c2ecf20Sopenharmony_ci			pr_warn("S/MIME Caps only allowed with Authenticode\n");
5258c2ecf20Sopenharmony_ci			return -EKEYREJECTED;
5268c2ecf20Sopenharmony_ci		}
5278c2ecf20Sopenharmony_ci		return 0;
5288c2ecf20Sopenharmony_ci
5298c2ecf20Sopenharmony_ci#ifdef CONFIG_SECURITY_CODE_SIGN
5308c2ecf20Sopenharmony_ci	case OID_ownerid:
5318c2ecf20Sopenharmony_ci		if (__test_and_set_bit(sinfo_has_owner_identifier, &sinfo->aa_set))
5328c2ecf20Sopenharmony_ci			goto repeated;
5338c2ecf20Sopenharmony_ci		if (tag != ASN1_UTF8STR)
5348c2ecf20Sopenharmony_ci			return -EBADMSG;
5358c2ecf20Sopenharmony_ci		sinfo->ownerid = value;
5368c2ecf20Sopenharmony_ci		sinfo->ownerid_len = vlen;
5378c2ecf20Sopenharmony_ci		return 0;
5388c2ecf20Sopenharmony_ci#endif /* CONFIG_SECURITY_CODE_SIGN */
5398c2ecf20Sopenharmony_ci
5408c2ecf20Sopenharmony_ci		/* Microsoft SpOpusInfo seems to be contain cont[0] 16-bit BE
5418c2ecf20Sopenharmony_ci		 * char URLs and cont[1] 8-bit char URLs.
5428c2ecf20Sopenharmony_ci		 *
5438c2ecf20Sopenharmony_ci		 * Microsoft StatementType seems to contain a list of OIDs that
5448c2ecf20Sopenharmony_ci		 * are also used as extendedKeyUsage types in X.509 certs.
5458c2ecf20Sopenharmony_ci		 */
5468c2ecf20Sopenharmony_ci	case OID_msSpOpusInfo:
5478c2ecf20Sopenharmony_ci		if (__test_and_set_bit(sinfo_has_ms_opus_info, &sinfo->aa_set))
5488c2ecf20Sopenharmony_ci			goto repeated;
5498c2ecf20Sopenharmony_ci		goto authenticode_check;
5508c2ecf20Sopenharmony_ci	case OID_msStatementType:
5518c2ecf20Sopenharmony_ci		if (__test_and_set_bit(sinfo_has_ms_statement_type, &sinfo->aa_set))
5528c2ecf20Sopenharmony_ci			goto repeated;
5538c2ecf20Sopenharmony_ci	authenticode_check:
5548c2ecf20Sopenharmony_ci		if (ctx->msg->data_type != OID_msIndirectData) {
5558c2ecf20Sopenharmony_ci			pr_warn("Authenticode AuthAttrs only allowed with Authenticode\n");
5568c2ecf20Sopenharmony_ci			return -EKEYREJECTED;
5578c2ecf20Sopenharmony_ci		}
5588c2ecf20Sopenharmony_ci		/* I'm not sure how to validate these */
5598c2ecf20Sopenharmony_ci		return 0;
5608c2ecf20Sopenharmony_ci	default:
5618c2ecf20Sopenharmony_ci		return 0;
5628c2ecf20Sopenharmony_ci	}
5638c2ecf20Sopenharmony_ci
5648c2ecf20Sopenharmony_cirepeated:
5658c2ecf20Sopenharmony_ci	/* We permit max one item per AuthenticatedAttribute and no repeats */
5668c2ecf20Sopenharmony_ci	pr_warn("Repeated/multivalue AuthAttrs not permitted\n");
5678c2ecf20Sopenharmony_ci	return -EKEYREJECTED;
5688c2ecf20Sopenharmony_ci}
5698c2ecf20Sopenharmony_ci
5708c2ecf20Sopenharmony_ci/*
5718c2ecf20Sopenharmony_ci * Note the set of auth attributes for digestion purposes [RFC2315 sec 9.3]
5728c2ecf20Sopenharmony_ci */
5738c2ecf20Sopenharmony_ciint pkcs7_sig_note_set_of_authattrs(void *context, size_t hdrlen,
5748c2ecf20Sopenharmony_ci				    unsigned char tag,
5758c2ecf20Sopenharmony_ci				    const void *value, size_t vlen)
5768c2ecf20Sopenharmony_ci{
5778c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
5788c2ecf20Sopenharmony_ci	struct pkcs7_signed_info *sinfo = ctx->sinfo;
5798c2ecf20Sopenharmony_ci
5808c2ecf20Sopenharmony_ci	if (!test_bit(sinfo_has_content_type, &sinfo->aa_set) ||
5818c2ecf20Sopenharmony_ci	    !test_bit(sinfo_has_message_digest, &sinfo->aa_set)) {
5828c2ecf20Sopenharmony_ci		pr_warn("Missing required AuthAttr\n");
5838c2ecf20Sopenharmony_ci		return -EBADMSG;
5848c2ecf20Sopenharmony_ci	}
5858c2ecf20Sopenharmony_ci
5868c2ecf20Sopenharmony_ci	if (ctx->msg->data_type != OID_msIndirectData &&
5878c2ecf20Sopenharmony_ci	    test_bit(sinfo_has_ms_opus_info, &sinfo->aa_set)) {
5888c2ecf20Sopenharmony_ci		pr_warn("Unexpected Authenticode AuthAttr\n");
5898c2ecf20Sopenharmony_ci		return -EBADMSG;
5908c2ecf20Sopenharmony_ci	}
5918c2ecf20Sopenharmony_ci
5928c2ecf20Sopenharmony_ci	/* We need to switch the 'CONT 0' to a 'SET OF' when we digest */
5938c2ecf20Sopenharmony_ci	sinfo->authattrs = value - (hdrlen - 1);
5948c2ecf20Sopenharmony_ci	sinfo->authattrs_len = vlen + (hdrlen - 1);
5958c2ecf20Sopenharmony_ci	return 0;
5968c2ecf20Sopenharmony_ci}
5978c2ecf20Sopenharmony_ci
5988c2ecf20Sopenharmony_ci/*
5998c2ecf20Sopenharmony_ci * Note the issuing certificate serial number
6008c2ecf20Sopenharmony_ci */
6018c2ecf20Sopenharmony_ciint pkcs7_sig_note_serial(void *context, size_t hdrlen,
6028c2ecf20Sopenharmony_ci			  unsigned char tag,
6038c2ecf20Sopenharmony_ci			  const void *value, size_t vlen)
6048c2ecf20Sopenharmony_ci{
6058c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
6068c2ecf20Sopenharmony_ci	ctx->raw_serial = value;
6078c2ecf20Sopenharmony_ci	ctx->raw_serial_size = vlen;
6088c2ecf20Sopenharmony_ci	return 0;
6098c2ecf20Sopenharmony_ci}
6108c2ecf20Sopenharmony_ci
6118c2ecf20Sopenharmony_ci/*
6128c2ecf20Sopenharmony_ci * Note the issuer's name
6138c2ecf20Sopenharmony_ci */
6148c2ecf20Sopenharmony_ciint pkcs7_sig_note_issuer(void *context, size_t hdrlen,
6158c2ecf20Sopenharmony_ci			  unsigned char tag,
6168c2ecf20Sopenharmony_ci			  const void *value, size_t vlen)
6178c2ecf20Sopenharmony_ci{
6188c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
6198c2ecf20Sopenharmony_ci	ctx->raw_issuer = value;
6208c2ecf20Sopenharmony_ci	ctx->raw_issuer_size = vlen;
6218c2ecf20Sopenharmony_ci	return 0;
6228c2ecf20Sopenharmony_ci}
6238c2ecf20Sopenharmony_ci
6248c2ecf20Sopenharmony_ci/*
6258c2ecf20Sopenharmony_ci * Note the issuing cert's subjectKeyIdentifier
6268c2ecf20Sopenharmony_ci */
6278c2ecf20Sopenharmony_ciint pkcs7_sig_note_skid(void *context, size_t hdrlen,
6288c2ecf20Sopenharmony_ci			unsigned char tag,
6298c2ecf20Sopenharmony_ci			const void *value, size_t vlen)
6308c2ecf20Sopenharmony_ci{
6318c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
6328c2ecf20Sopenharmony_ci
6338c2ecf20Sopenharmony_ci	pr_devel("SKID: %02x %zu [%*ph]\n", tag, vlen, (unsigned)vlen, value);
6348c2ecf20Sopenharmony_ci
6358c2ecf20Sopenharmony_ci	ctx->raw_skid = value;
6368c2ecf20Sopenharmony_ci	ctx->raw_skid_size = vlen;
6378c2ecf20Sopenharmony_ci	return 0;
6388c2ecf20Sopenharmony_ci}
6398c2ecf20Sopenharmony_ci
6408c2ecf20Sopenharmony_ci/*
6418c2ecf20Sopenharmony_ci * Note the signature data
6428c2ecf20Sopenharmony_ci */
6438c2ecf20Sopenharmony_ciint pkcs7_sig_note_signature(void *context, size_t hdrlen,
6448c2ecf20Sopenharmony_ci			     unsigned char tag,
6458c2ecf20Sopenharmony_ci			     const void *value, size_t vlen)
6468c2ecf20Sopenharmony_ci{
6478c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
6488c2ecf20Sopenharmony_ci
6498c2ecf20Sopenharmony_ci	ctx->sinfo->sig->s = kmemdup(value, vlen, GFP_KERNEL);
6508c2ecf20Sopenharmony_ci	if (!ctx->sinfo->sig->s)
6518c2ecf20Sopenharmony_ci		return -ENOMEM;
6528c2ecf20Sopenharmony_ci
6538c2ecf20Sopenharmony_ci	ctx->sinfo->sig->s_size = vlen;
6548c2ecf20Sopenharmony_ci	return 0;
6558c2ecf20Sopenharmony_ci}
6568c2ecf20Sopenharmony_ci
6578c2ecf20Sopenharmony_ci/*
6588c2ecf20Sopenharmony_ci * Note a signature information block
6598c2ecf20Sopenharmony_ci */
6608c2ecf20Sopenharmony_ciint pkcs7_note_signed_info(void *context, size_t hdrlen,
6618c2ecf20Sopenharmony_ci			   unsigned char tag,
6628c2ecf20Sopenharmony_ci			   const void *value, size_t vlen)
6638c2ecf20Sopenharmony_ci{
6648c2ecf20Sopenharmony_ci	struct pkcs7_parse_context *ctx = context;
6658c2ecf20Sopenharmony_ci	struct pkcs7_signed_info *sinfo = ctx->sinfo;
6668c2ecf20Sopenharmony_ci	struct asymmetric_key_id *kid;
6678c2ecf20Sopenharmony_ci
6688c2ecf20Sopenharmony_ci	if (ctx->msg->data_type == OID_msIndirectData && !sinfo->authattrs) {
6698c2ecf20Sopenharmony_ci		pr_warn("Authenticode requires AuthAttrs\n");
6708c2ecf20Sopenharmony_ci		return -EBADMSG;
6718c2ecf20Sopenharmony_ci	}
6728c2ecf20Sopenharmony_ci
6738c2ecf20Sopenharmony_ci	/* Generate cert issuer + serial number key ID */
6748c2ecf20Sopenharmony_ci	if (!ctx->expect_skid) {
6758c2ecf20Sopenharmony_ci		kid = asymmetric_key_generate_id(ctx->raw_serial,
6768c2ecf20Sopenharmony_ci						 ctx->raw_serial_size,
6778c2ecf20Sopenharmony_ci						 ctx->raw_issuer,
6788c2ecf20Sopenharmony_ci						 ctx->raw_issuer_size);
6798c2ecf20Sopenharmony_ci	} else {
6808c2ecf20Sopenharmony_ci		kid = asymmetric_key_generate_id(ctx->raw_skid,
6818c2ecf20Sopenharmony_ci						 ctx->raw_skid_size,
6828c2ecf20Sopenharmony_ci						 "", 0);
6838c2ecf20Sopenharmony_ci	}
6848c2ecf20Sopenharmony_ci	if (IS_ERR(kid))
6858c2ecf20Sopenharmony_ci		return PTR_ERR(kid);
6868c2ecf20Sopenharmony_ci
6878c2ecf20Sopenharmony_ci	pr_devel("SINFO KID: %u [%*phN]\n", kid->len, kid->len, kid->data);
6888c2ecf20Sopenharmony_ci
6898c2ecf20Sopenharmony_ci	sinfo->sig->auth_ids[0] = kid;
6908c2ecf20Sopenharmony_ci	sinfo->index = ++ctx->sinfo_index;
6918c2ecf20Sopenharmony_ci	*ctx->ppsinfo = sinfo;
6928c2ecf20Sopenharmony_ci	ctx->ppsinfo = &sinfo->next;
6938c2ecf20Sopenharmony_ci	ctx->sinfo = kzalloc(sizeof(struct pkcs7_signed_info), GFP_KERNEL);
6948c2ecf20Sopenharmony_ci	if (!ctx->sinfo)
6958c2ecf20Sopenharmony_ci		return -ENOMEM;
6968c2ecf20Sopenharmony_ci	ctx->sinfo->sig = kzalloc(sizeof(struct public_key_signature),
6978c2ecf20Sopenharmony_ci				  GFP_KERNEL);
6988c2ecf20Sopenharmony_ci	if (!ctx->sinfo->sig)
6998c2ecf20Sopenharmony_ci		return -ENOMEM;
7008c2ecf20Sopenharmony_ci	return 0;
7018c2ecf20Sopenharmony_ci}
702