18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 28c2ecf20Sopenharmony_ci/* PKCS#7 parser 38c2ecf20Sopenharmony_ci * 48c2ecf20Sopenharmony_ci * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved. 58c2ecf20Sopenharmony_ci * Written by David Howells (dhowells@redhat.com) 68c2ecf20Sopenharmony_ci */ 78c2ecf20Sopenharmony_ci 88c2ecf20Sopenharmony_ci#define pr_fmt(fmt) "PKCS7: "fmt 98c2ecf20Sopenharmony_ci#include <linux/kernel.h> 108c2ecf20Sopenharmony_ci#include <linux/module.h> 118c2ecf20Sopenharmony_ci#include <linux/export.h> 128c2ecf20Sopenharmony_ci#include <linux/slab.h> 138c2ecf20Sopenharmony_ci#include <linux/err.h> 148c2ecf20Sopenharmony_ci#include <linux/oid_registry.h> 158c2ecf20Sopenharmony_ci#include <crypto/public_key.h> 168c2ecf20Sopenharmony_ci#include "pkcs7_parser.h" 178c2ecf20Sopenharmony_ci#include "pkcs7.asn1.h" 188c2ecf20Sopenharmony_ci 198c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("PKCS#7 parser"); 208c2ecf20Sopenharmony_ciMODULE_AUTHOR("Red Hat, Inc."); 218c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 228c2ecf20Sopenharmony_ci 238c2ecf20Sopenharmony_cistruct pkcs7_parse_context { 248c2ecf20Sopenharmony_ci struct pkcs7_message *msg; /* Message being constructed */ 258c2ecf20Sopenharmony_ci struct pkcs7_signed_info *sinfo; /* SignedInfo being constructed */ 268c2ecf20Sopenharmony_ci struct pkcs7_signed_info **ppsinfo; 278c2ecf20Sopenharmony_ci struct x509_certificate *certs; /* Certificate cache */ 288c2ecf20Sopenharmony_ci struct x509_certificate **ppcerts; 298c2ecf20Sopenharmony_ci unsigned long data; /* Start of data */ 308c2ecf20Sopenharmony_ci enum OID last_oid; /* Last OID encountered */ 318c2ecf20Sopenharmony_ci unsigned x509_index; 328c2ecf20Sopenharmony_ci unsigned sinfo_index; 338c2ecf20Sopenharmony_ci const void *raw_serial; 348c2ecf20Sopenharmony_ci unsigned raw_serial_size; 358c2ecf20Sopenharmony_ci unsigned raw_issuer_size; 368c2ecf20Sopenharmony_ci const void *raw_issuer; 378c2ecf20Sopenharmony_ci const void *raw_skid; 388c2ecf20Sopenharmony_ci unsigned raw_skid_size; 398c2ecf20Sopenharmony_ci bool expect_skid; 408c2ecf20Sopenharmony_ci}; 418c2ecf20Sopenharmony_ci 428c2ecf20Sopenharmony_ci/* 438c2ecf20Sopenharmony_ci * Free a signed information block. 448c2ecf20Sopenharmony_ci */ 458c2ecf20Sopenharmony_cistatic void pkcs7_free_signed_info(struct pkcs7_signed_info *sinfo) 468c2ecf20Sopenharmony_ci{ 478c2ecf20Sopenharmony_ci if (sinfo) { 488c2ecf20Sopenharmony_ci public_key_signature_free(sinfo->sig); 498c2ecf20Sopenharmony_ci kfree(sinfo); 508c2ecf20Sopenharmony_ci } 518c2ecf20Sopenharmony_ci} 528c2ecf20Sopenharmony_ci 538c2ecf20Sopenharmony_ci/** 548c2ecf20Sopenharmony_ci * pkcs7_free_message - Free a PKCS#7 message 558c2ecf20Sopenharmony_ci * @pkcs7: The PKCS#7 message to free 568c2ecf20Sopenharmony_ci */ 578c2ecf20Sopenharmony_civoid pkcs7_free_message(struct pkcs7_message *pkcs7) 588c2ecf20Sopenharmony_ci{ 598c2ecf20Sopenharmony_ci struct x509_certificate *cert; 608c2ecf20Sopenharmony_ci struct pkcs7_signed_info *sinfo; 618c2ecf20Sopenharmony_ci 628c2ecf20Sopenharmony_ci if (pkcs7) { 638c2ecf20Sopenharmony_ci while (pkcs7->certs) { 648c2ecf20Sopenharmony_ci cert = pkcs7->certs; 658c2ecf20Sopenharmony_ci pkcs7->certs = cert->next; 668c2ecf20Sopenharmony_ci x509_free_certificate(cert); 678c2ecf20Sopenharmony_ci } 688c2ecf20Sopenharmony_ci while (pkcs7->crl) { 698c2ecf20Sopenharmony_ci cert = pkcs7->crl; 708c2ecf20Sopenharmony_ci pkcs7->crl = cert->next; 718c2ecf20Sopenharmony_ci x509_free_certificate(cert); 728c2ecf20Sopenharmony_ci } 738c2ecf20Sopenharmony_ci while (pkcs7->signed_infos) { 748c2ecf20Sopenharmony_ci sinfo = pkcs7->signed_infos; 758c2ecf20Sopenharmony_ci pkcs7->signed_infos = sinfo->next; 768c2ecf20Sopenharmony_ci pkcs7_free_signed_info(sinfo); 778c2ecf20Sopenharmony_ci } 788c2ecf20Sopenharmony_ci kfree(pkcs7); 798c2ecf20Sopenharmony_ci } 808c2ecf20Sopenharmony_ci} 818c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(pkcs7_free_message); 828c2ecf20Sopenharmony_ci 838c2ecf20Sopenharmony_ci/* 848c2ecf20Sopenharmony_ci * Check authenticatedAttributes are provided or not provided consistently. 858c2ecf20Sopenharmony_ci */ 868c2ecf20Sopenharmony_cistatic int pkcs7_check_authattrs(struct pkcs7_message *msg) 878c2ecf20Sopenharmony_ci{ 888c2ecf20Sopenharmony_ci struct pkcs7_signed_info *sinfo; 898c2ecf20Sopenharmony_ci bool want = false; 908c2ecf20Sopenharmony_ci 918c2ecf20Sopenharmony_ci sinfo = msg->signed_infos; 928c2ecf20Sopenharmony_ci if (!sinfo) 938c2ecf20Sopenharmony_ci goto inconsistent; 948c2ecf20Sopenharmony_ci 958c2ecf20Sopenharmony_ci if (sinfo->authattrs) { 968c2ecf20Sopenharmony_ci want = true; 978c2ecf20Sopenharmony_ci msg->have_authattrs = true; 988c2ecf20Sopenharmony_ci } 998c2ecf20Sopenharmony_ci 1008c2ecf20Sopenharmony_ci for (sinfo = sinfo->next; sinfo; sinfo = sinfo->next) 1018c2ecf20Sopenharmony_ci if (!!sinfo->authattrs != want) 1028c2ecf20Sopenharmony_ci goto inconsistent; 1038c2ecf20Sopenharmony_ci return 0; 1048c2ecf20Sopenharmony_ci 1058c2ecf20Sopenharmony_ciinconsistent: 1068c2ecf20Sopenharmony_ci pr_warn("Inconsistently supplied authAttrs\n"); 1078c2ecf20Sopenharmony_ci return -EINVAL; 1088c2ecf20Sopenharmony_ci} 1098c2ecf20Sopenharmony_ci 1108c2ecf20Sopenharmony_ci/** 1118c2ecf20Sopenharmony_ci * pkcs7_parse_message - Parse a PKCS#7 message 1128c2ecf20Sopenharmony_ci * @data: The raw binary ASN.1 encoded message to be parsed 1138c2ecf20Sopenharmony_ci * @datalen: The size of the encoded message 1148c2ecf20Sopenharmony_ci */ 1158c2ecf20Sopenharmony_cistruct pkcs7_message *pkcs7_parse_message(const void *data, size_t datalen) 1168c2ecf20Sopenharmony_ci{ 1178c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx; 1188c2ecf20Sopenharmony_ci struct pkcs7_message *msg = ERR_PTR(-ENOMEM); 1198c2ecf20Sopenharmony_ci int ret; 1208c2ecf20Sopenharmony_ci 1218c2ecf20Sopenharmony_ci ctx = kzalloc(sizeof(struct pkcs7_parse_context), GFP_KERNEL); 1228c2ecf20Sopenharmony_ci if (!ctx) 1238c2ecf20Sopenharmony_ci goto out_no_ctx; 1248c2ecf20Sopenharmony_ci ctx->msg = kzalloc(sizeof(struct pkcs7_message), GFP_KERNEL); 1258c2ecf20Sopenharmony_ci if (!ctx->msg) 1268c2ecf20Sopenharmony_ci goto out_no_msg; 1278c2ecf20Sopenharmony_ci ctx->sinfo = kzalloc(sizeof(struct pkcs7_signed_info), GFP_KERNEL); 1288c2ecf20Sopenharmony_ci if (!ctx->sinfo) 1298c2ecf20Sopenharmony_ci goto out_no_sinfo; 1308c2ecf20Sopenharmony_ci ctx->sinfo->sig = kzalloc(sizeof(struct public_key_signature), 1318c2ecf20Sopenharmony_ci GFP_KERNEL); 1328c2ecf20Sopenharmony_ci if (!ctx->sinfo->sig) 1338c2ecf20Sopenharmony_ci goto out_no_sig; 1348c2ecf20Sopenharmony_ci 1358c2ecf20Sopenharmony_ci ctx->data = (unsigned long)data; 1368c2ecf20Sopenharmony_ci ctx->ppcerts = &ctx->certs; 1378c2ecf20Sopenharmony_ci ctx->ppsinfo = &ctx->msg->signed_infos; 1388c2ecf20Sopenharmony_ci 1398c2ecf20Sopenharmony_ci /* Attempt to decode the signature */ 1408c2ecf20Sopenharmony_ci ret = asn1_ber_decoder(&pkcs7_decoder, ctx, data, datalen); 1418c2ecf20Sopenharmony_ci if (ret < 0) { 1428c2ecf20Sopenharmony_ci msg = ERR_PTR(ret); 1438c2ecf20Sopenharmony_ci goto out; 1448c2ecf20Sopenharmony_ci } 1458c2ecf20Sopenharmony_ci 1468c2ecf20Sopenharmony_ci ret = pkcs7_check_authattrs(ctx->msg); 1478c2ecf20Sopenharmony_ci if (ret < 0) { 1488c2ecf20Sopenharmony_ci msg = ERR_PTR(ret); 1498c2ecf20Sopenharmony_ci goto out; 1508c2ecf20Sopenharmony_ci } 1518c2ecf20Sopenharmony_ci 1528c2ecf20Sopenharmony_ci msg = ctx->msg; 1538c2ecf20Sopenharmony_ci ctx->msg = NULL; 1548c2ecf20Sopenharmony_ci 1558c2ecf20Sopenharmony_ciout: 1568c2ecf20Sopenharmony_ci while (ctx->certs) { 1578c2ecf20Sopenharmony_ci struct x509_certificate *cert = ctx->certs; 1588c2ecf20Sopenharmony_ci ctx->certs = cert->next; 1598c2ecf20Sopenharmony_ci x509_free_certificate(cert); 1608c2ecf20Sopenharmony_ci } 1618c2ecf20Sopenharmony_ciout_no_sig: 1628c2ecf20Sopenharmony_ci pkcs7_free_signed_info(ctx->sinfo); 1638c2ecf20Sopenharmony_ciout_no_sinfo: 1648c2ecf20Sopenharmony_ci pkcs7_free_message(ctx->msg); 1658c2ecf20Sopenharmony_ciout_no_msg: 1668c2ecf20Sopenharmony_ci kfree(ctx); 1678c2ecf20Sopenharmony_ciout_no_ctx: 1688c2ecf20Sopenharmony_ci return msg; 1698c2ecf20Sopenharmony_ci} 1708c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(pkcs7_parse_message); 1718c2ecf20Sopenharmony_ci 1728c2ecf20Sopenharmony_ci/** 1738c2ecf20Sopenharmony_ci * pkcs7_get_content_data - Get access to the PKCS#7 content 1748c2ecf20Sopenharmony_ci * @pkcs7: The preparsed PKCS#7 message to access 1758c2ecf20Sopenharmony_ci * @_data: Place to return a pointer to the data 1768c2ecf20Sopenharmony_ci * @_data_len: Place to return the data length 1778c2ecf20Sopenharmony_ci * @_headerlen: Size of ASN.1 header not included in _data 1788c2ecf20Sopenharmony_ci * 1798c2ecf20Sopenharmony_ci * Get access to the data content of the PKCS#7 message. The size of the 1808c2ecf20Sopenharmony_ci * header of the ASN.1 object that contains it is also provided and can be used 1818c2ecf20Sopenharmony_ci * to adjust *_data and *_data_len to get the entire object. 1828c2ecf20Sopenharmony_ci * 1838c2ecf20Sopenharmony_ci * Returns -ENODATA if the data object was missing from the message. 1848c2ecf20Sopenharmony_ci */ 1858c2ecf20Sopenharmony_ciint pkcs7_get_content_data(const struct pkcs7_message *pkcs7, 1868c2ecf20Sopenharmony_ci const void **_data, size_t *_data_len, 1878c2ecf20Sopenharmony_ci size_t *_headerlen) 1888c2ecf20Sopenharmony_ci{ 1898c2ecf20Sopenharmony_ci if (!pkcs7->data) 1908c2ecf20Sopenharmony_ci return -ENODATA; 1918c2ecf20Sopenharmony_ci 1928c2ecf20Sopenharmony_ci *_data = pkcs7->data; 1938c2ecf20Sopenharmony_ci *_data_len = pkcs7->data_len; 1948c2ecf20Sopenharmony_ci if (_headerlen) 1958c2ecf20Sopenharmony_ci *_headerlen = pkcs7->data_hdrlen; 1968c2ecf20Sopenharmony_ci return 0; 1978c2ecf20Sopenharmony_ci} 1988c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(pkcs7_get_content_data); 1998c2ecf20Sopenharmony_ci 2008c2ecf20Sopenharmony_ci/* 2018c2ecf20Sopenharmony_ci * Note an OID when we find one for later processing when we know how 2028c2ecf20Sopenharmony_ci * to interpret it. 2038c2ecf20Sopenharmony_ci */ 2048c2ecf20Sopenharmony_ciint pkcs7_note_OID(void *context, size_t hdrlen, 2058c2ecf20Sopenharmony_ci unsigned char tag, 2068c2ecf20Sopenharmony_ci const void *value, size_t vlen) 2078c2ecf20Sopenharmony_ci{ 2088c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 2098c2ecf20Sopenharmony_ci 2108c2ecf20Sopenharmony_ci ctx->last_oid = look_up_OID(value, vlen); 2118c2ecf20Sopenharmony_ci if (ctx->last_oid == OID__NR) { 2128c2ecf20Sopenharmony_ci char buffer[50]; 2138c2ecf20Sopenharmony_ci sprint_oid(value, vlen, buffer, sizeof(buffer)); 2148c2ecf20Sopenharmony_ci printk("PKCS7: Unknown OID: [%lu] %s\n", 2158c2ecf20Sopenharmony_ci (unsigned long)value - ctx->data, buffer); 2168c2ecf20Sopenharmony_ci } 2178c2ecf20Sopenharmony_ci return 0; 2188c2ecf20Sopenharmony_ci} 2198c2ecf20Sopenharmony_ci 2208c2ecf20Sopenharmony_ci/* 2218c2ecf20Sopenharmony_ci * Note the digest algorithm for the signature. 2228c2ecf20Sopenharmony_ci */ 2238c2ecf20Sopenharmony_ciint pkcs7_sig_note_digest_algo(void *context, size_t hdrlen, 2248c2ecf20Sopenharmony_ci unsigned char tag, 2258c2ecf20Sopenharmony_ci const void *value, size_t vlen) 2268c2ecf20Sopenharmony_ci{ 2278c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 2288c2ecf20Sopenharmony_ci 2298c2ecf20Sopenharmony_ci switch (ctx->last_oid) { 2308c2ecf20Sopenharmony_ci case OID_md4: 2318c2ecf20Sopenharmony_ci ctx->sinfo->sig->hash_algo = "md4"; 2328c2ecf20Sopenharmony_ci break; 2338c2ecf20Sopenharmony_ci case OID_md5: 2348c2ecf20Sopenharmony_ci ctx->sinfo->sig->hash_algo = "md5"; 2358c2ecf20Sopenharmony_ci break; 2368c2ecf20Sopenharmony_ci case OID_sha1: 2378c2ecf20Sopenharmony_ci ctx->sinfo->sig->hash_algo = "sha1"; 2388c2ecf20Sopenharmony_ci break; 2398c2ecf20Sopenharmony_ci case OID_sha256: 2408c2ecf20Sopenharmony_ci ctx->sinfo->sig->hash_algo = "sha256"; 2418c2ecf20Sopenharmony_ci break; 2428c2ecf20Sopenharmony_ci case OID_sha384: 2438c2ecf20Sopenharmony_ci ctx->sinfo->sig->hash_algo = "sha384"; 2448c2ecf20Sopenharmony_ci break; 2458c2ecf20Sopenharmony_ci case OID_sha512: 2468c2ecf20Sopenharmony_ci ctx->sinfo->sig->hash_algo = "sha512"; 2478c2ecf20Sopenharmony_ci break; 2488c2ecf20Sopenharmony_ci case OID_sha224: 2498c2ecf20Sopenharmony_ci ctx->sinfo->sig->hash_algo = "sha224"; 2508c2ecf20Sopenharmony_ci break; 2518c2ecf20Sopenharmony_ci default: 2528c2ecf20Sopenharmony_ci printk("Unsupported digest algo: %u\n", ctx->last_oid); 2538c2ecf20Sopenharmony_ci return -ENOPKG; 2548c2ecf20Sopenharmony_ci } 2558c2ecf20Sopenharmony_ci return 0; 2568c2ecf20Sopenharmony_ci} 2578c2ecf20Sopenharmony_ci 2588c2ecf20Sopenharmony_ci/* 2598c2ecf20Sopenharmony_ci * Note the public key algorithm for the signature. 2608c2ecf20Sopenharmony_ci */ 2618c2ecf20Sopenharmony_ciint pkcs7_sig_note_pkey_algo(void *context, size_t hdrlen, 2628c2ecf20Sopenharmony_ci unsigned char tag, 2638c2ecf20Sopenharmony_ci const void *value, size_t vlen) 2648c2ecf20Sopenharmony_ci{ 2658c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 2668c2ecf20Sopenharmony_ci 2678c2ecf20Sopenharmony_ci switch (ctx->last_oid) { 2688c2ecf20Sopenharmony_ci case OID_rsaEncryption: 2698c2ecf20Sopenharmony_ci ctx->sinfo->sig->pkey_algo = "rsa"; 2708c2ecf20Sopenharmony_ci ctx->sinfo->sig->encoding = "pkcs1"; 2718c2ecf20Sopenharmony_ci break; 2728c2ecf20Sopenharmony_ci case OID_id_ecdsa_with_sha1: 2738c2ecf20Sopenharmony_ci case OID_id_ecdsa_with_sha224: 2748c2ecf20Sopenharmony_ci case OID_id_ecdsa_with_sha256: 2758c2ecf20Sopenharmony_ci case OID_id_ecdsa_with_sha384: 2768c2ecf20Sopenharmony_ci case OID_id_ecdsa_with_sha512: 2778c2ecf20Sopenharmony_ci ctx->sinfo->sig->pkey_algo = "ecdsa"; 2788c2ecf20Sopenharmony_ci ctx->sinfo->sig->encoding = "x962"; 2798c2ecf20Sopenharmony_ci break; 2808c2ecf20Sopenharmony_ci default: 2818c2ecf20Sopenharmony_ci printk("Unsupported pkey algo: %u\n", ctx->last_oid); 2828c2ecf20Sopenharmony_ci return -ENOPKG; 2838c2ecf20Sopenharmony_ci } 2848c2ecf20Sopenharmony_ci return 0; 2858c2ecf20Sopenharmony_ci} 2868c2ecf20Sopenharmony_ci 2878c2ecf20Sopenharmony_ci/* 2888c2ecf20Sopenharmony_ci * We only support signed data [RFC2315 sec 9]. 2898c2ecf20Sopenharmony_ci */ 2908c2ecf20Sopenharmony_ciint pkcs7_check_content_type(void *context, size_t hdrlen, 2918c2ecf20Sopenharmony_ci unsigned char tag, 2928c2ecf20Sopenharmony_ci const void *value, size_t vlen) 2938c2ecf20Sopenharmony_ci{ 2948c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 2958c2ecf20Sopenharmony_ci 2968c2ecf20Sopenharmony_ci if (ctx->last_oid != OID_signed_data) { 2978c2ecf20Sopenharmony_ci pr_warn("Only support pkcs7_signedData type\n"); 2988c2ecf20Sopenharmony_ci return -EINVAL; 2998c2ecf20Sopenharmony_ci } 3008c2ecf20Sopenharmony_ci 3018c2ecf20Sopenharmony_ci return 0; 3028c2ecf20Sopenharmony_ci} 3038c2ecf20Sopenharmony_ci 3048c2ecf20Sopenharmony_ci/* 3058c2ecf20Sopenharmony_ci * Note the SignedData version 3068c2ecf20Sopenharmony_ci */ 3078c2ecf20Sopenharmony_ciint pkcs7_note_signeddata_version(void *context, size_t hdrlen, 3088c2ecf20Sopenharmony_ci unsigned char tag, 3098c2ecf20Sopenharmony_ci const void *value, size_t vlen) 3108c2ecf20Sopenharmony_ci{ 3118c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 3128c2ecf20Sopenharmony_ci unsigned version; 3138c2ecf20Sopenharmony_ci 3148c2ecf20Sopenharmony_ci if (vlen != 1) 3158c2ecf20Sopenharmony_ci goto unsupported; 3168c2ecf20Sopenharmony_ci 3178c2ecf20Sopenharmony_ci ctx->msg->version = version = *(const u8 *)value; 3188c2ecf20Sopenharmony_ci switch (version) { 3198c2ecf20Sopenharmony_ci case 1: 3208c2ecf20Sopenharmony_ci /* PKCS#7 SignedData [RFC2315 sec 9.1] 3218c2ecf20Sopenharmony_ci * CMS ver 1 SignedData [RFC5652 sec 5.1] 3228c2ecf20Sopenharmony_ci */ 3238c2ecf20Sopenharmony_ci break; 3248c2ecf20Sopenharmony_ci case 3: 3258c2ecf20Sopenharmony_ci /* CMS ver 3 SignedData [RFC2315 sec 5.1] */ 3268c2ecf20Sopenharmony_ci break; 3278c2ecf20Sopenharmony_ci default: 3288c2ecf20Sopenharmony_ci goto unsupported; 3298c2ecf20Sopenharmony_ci } 3308c2ecf20Sopenharmony_ci 3318c2ecf20Sopenharmony_ci return 0; 3328c2ecf20Sopenharmony_ci 3338c2ecf20Sopenharmony_ciunsupported: 3348c2ecf20Sopenharmony_ci pr_warn("Unsupported SignedData version\n"); 3358c2ecf20Sopenharmony_ci return -EINVAL; 3368c2ecf20Sopenharmony_ci} 3378c2ecf20Sopenharmony_ci 3388c2ecf20Sopenharmony_ci/* 3398c2ecf20Sopenharmony_ci * Note the SignerInfo version 3408c2ecf20Sopenharmony_ci */ 3418c2ecf20Sopenharmony_ciint pkcs7_note_signerinfo_version(void *context, size_t hdrlen, 3428c2ecf20Sopenharmony_ci unsigned char tag, 3438c2ecf20Sopenharmony_ci const void *value, size_t vlen) 3448c2ecf20Sopenharmony_ci{ 3458c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 3468c2ecf20Sopenharmony_ci unsigned version; 3478c2ecf20Sopenharmony_ci 3488c2ecf20Sopenharmony_ci if (vlen != 1) 3498c2ecf20Sopenharmony_ci goto unsupported; 3508c2ecf20Sopenharmony_ci 3518c2ecf20Sopenharmony_ci version = *(const u8 *)value; 3528c2ecf20Sopenharmony_ci switch (version) { 3538c2ecf20Sopenharmony_ci case 1: 3548c2ecf20Sopenharmony_ci /* PKCS#7 SignerInfo [RFC2315 sec 9.2] 3558c2ecf20Sopenharmony_ci * CMS ver 1 SignerInfo [RFC5652 sec 5.3] 3568c2ecf20Sopenharmony_ci */ 3578c2ecf20Sopenharmony_ci if (ctx->msg->version != 1) 3588c2ecf20Sopenharmony_ci goto version_mismatch; 3598c2ecf20Sopenharmony_ci ctx->expect_skid = false; 3608c2ecf20Sopenharmony_ci break; 3618c2ecf20Sopenharmony_ci case 3: 3628c2ecf20Sopenharmony_ci /* CMS ver 3 SignerInfo [RFC2315 sec 5.3] */ 3638c2ecf20Sopenharmony_ci if (ctx->msg->version == 1) 3648c2ecf20Sopenharmony_ci goto version_mismatch; 3658c2ecf20Sopenharmony_ci ctx->expect_skid = true; 3668c2ecf20Sopenharmony_ci break; 3678c2ecf20Sopenharmony_ci default: 3688c2ecf20Sopenharmony_ci goto unsupported; 3698c2ecf20Sopenharmony_ci } 3708c2ecf20Sopenharmony_ci 3718c2ecf20Sopenharmony_ci return 0; 3728c2ecf20Sopenharmony_ci 3738c2ecf20Sopenharmony_ciunsupported: 3748c2ecf20Sopenharmony_ci pr_warn("Unsupported SignerInfo version\n"); 3758c2ecf20Sopenharmony_ci return -EINVAL; 3768c2ecf20Sopenharmony_civersion_mismatch: 3778c2ecf20Sopenharmony_ci pr_warn("SignedData-SignerInfo version mismatch\n"); 3788c2ecf20Sopenharmony_ci return -EBADMSG; 3798c2ecf20Sopenharmony_ci} 3808c2ecf20Sopenharmony_ci 3818c2ecf20Sopenharmony_ci/* 3828c2ecf20Sopenharmony_ci * Extract a certificate and store it in the context. 3838c2ecf20Sopenharmony_ci */ 3848c2ecf20Sopenharmony_ciint pkcs7_extract_cert(void *context, size_t hdrlen, 3858c2ecf20Sopenharmony_ci unsigned char tag, 3868c2ecf20Sopenharmony_ci const void *value, size_t vlen) 3878c2ecf20Sopenharmony_ci{ 3888c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 3898c2ecf20Sopenharmony_ci struct x509_certificate *x509; 3908c2ecf20Sopenharmony_ci 3918c2ecf20Sopenharmony_ci if (tag != ((ASN1_UNIV << 6) | ASN1_CONS_BIT | ASN1_SEQ)) { 3928c2ecf20Sopenharmony_ci pr_debug("Cert began with tag %02x at %lu\n", 3938c2ecf20Sopenharmony_ci tag, (unsigned long)ctx - ctx->data); 3948c2ecf20Sopenharmony_ci return -EBADMSG; 3958c2ecf20Sopenharmony_ci } 3968c2ecf20Sopenharmony_ci 3978c2ecf20Sopenharmony_ci /* We have to correct for the header so that the X.509 parser can start 3988c2ecf20Sopenharmony_ci * from the beginning. Note that since X.509 stipulates DER, there 3998c2ecf20Sopenharmony_ci * probably shouldn't be an EOC trailer - but it is in PKCS#7 (which 4008c2ecf20Sopenharmony_ci * stipulates BER). 4018c2ecf20Sopenharmony_ci */ 4028c2ecf20Sopenharmony_ci value -= hdrlen; 4038c2ecf20Sopenharmony_ci vlen += hdrlen; 4048c2ecf20Sopenharmony_ci 4058c2ecf20Sopenharmony_ci if (((u8*)value)[1] == 0x80) 4068c2ecf20Sopenharmony_ci vlen += 2; /* Indefinite length - there should be an EOC */ 4078c2ecf20Sopenharmony_ci 4088c2ecf20Sopenharmony_ci x509 = x509_cert_parse(value, vlen); 4098c2ecf20Sopenharmony_ci if (IS_ERR(x509)) 4108c2ecf20Sopenharmony_ci return PTR_ERR(x509); 4118c2ecf20Sopenharmony_ci 4128c2ecf20Sopenharmony_ci x509->index = ++ctx->x509_index; 4138c2ecf20Sopenharmony_ci pr_debug("Got cert %u for %s\n", x509->index, x509->subject); 4148c2ecf20Sopenharmony_ci pr_debug("- fingerprint %*phN\n", x509->id->len, x509->id->data); 4158c2ecf20Sopenharmony_ci 4168c2ecf20Sopenharmony_ci *ctx->ppcerts = x509; 4178c2ecf20Sopenharmony_ci ctx->ppcerts = &x509->next; 4188c2ecf20Sopenharmony_ci return 0; 4198c2ecf20Sopenharmony_ci} 4208c2ecf20Sopenharmony_ci 4218c2ecf20Sopenharmony_ci/* 4228c2ecf20Sopenharmony_ci * Save the certificate list 4238c2ecf20Sopenharmony_ci */ 4248c2ecf20Sopenharmony_ciint pkcs7_note_certificate_list(void *context, size_t hdrlen, 4258c2ecf20Sopenharmony_ci unsigned char tag, 4268c2ecf20Sopenharmony_ci const void *value, size_t vlen) 4278c2ecf20Sopenharmony_ci{ 4288c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 4298c2ecf20Sopenharmony_ci 4308c2ecf20Sopenharmony_ci pr_devel("Got cert list (%02x)\n", tag); 4318c2ecf20Sopenharmony_ci 4328c2ecf20Sopenharmony_ci *ctx->ppcerts = ctx->msg->certs; 4338c2ecf20Sopenharmony_ci ctx->msg->certs = ctx->certs; 4348c2ecf20Sopenharmony_ci ctx->certs = NULL; 4358c2ecf20Sopenharmony_ci ctx->ppcerts = &ctx->certs; 4368c2ecf20Sopenharmony_ci return 0; 4378c2ecf20Sopenharmony_ci} 4388c2ecf20Sopenharmony_ci 4398c2ecf20Sopenharmony_ci/* 4408c2ecf20Sopenharmony_ci * Note the content type. 4418c2ecf20Sopenharmony_ci */ 4428c2ecf20Sopenharmony_ciint pkcs7_note_content(void *context, size_t hdrlen, 4438c2ecf20Sopenharmony_ci unsigned char tag, 4448c2ecf20Sopenharmony_ci const void *value, size_t vlen) 4458c2ecf20Sopenharmony_ci{ 4468c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 4478c2ecf20Sopenharmony_ci 4488c2ecf20Sopenharmony_ci if (ctx->last_oid != OID_data && 4498c2ecf20Sopenharmony_ci ctx->last_oid != OID_msIndirectData) { 4508c2ecf20Sopenharmony_ci pr_warn("Unsupported data type %d\n", ctx->last_oid); 4518c2ecf20Sopenharmony_ci return -EINVAL; 4528c2ecf20Sopenharmony_ci } 4538c2ecf20Sopenharmony_ci 4548c2ecf20Sopenharmony_ci ctx->msg->data_type = ctx->last_oid; 4558c2ecf20Sopenharmony_ci return 0; 4568c2ecf20Sopenharmony_ci} 4578c2ecf20Sopenharmony_ci 4588c2ecf20Sopenharmony_ci/* 4598c2ecf20Sopenharmony_ci * Extract the data from the message and store that and its content type OID in 4608c2ecf20Sopenharmony_ci * the context. 4618c2ecf20Sopenharmony_ci */ 4628c2ecf20Sopenharmony_ciint pkcs7_note_data(void *context, size_t hdrlen, 4638c2ecf20Sopenharmony_ci unsigned char tag, 4648c2ecf20Sopenharmony_ci const void *value, size_t vlen) 4658c2ecf20Sopenharmony_ci{ 4668c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 4678c2ecf20Sopenharmony_ci 4688c2ecf20Sopenharmony_ci pr_debug("Got data\n"); 4698c2ecf20Sopenharmony_ci 4708c2ecf20Sopenharmony_ci ctx->msg->data = value; 4718c2ecf20Sopenharmony_ci ctx->msg->data_len = vlen; 4728c2ecf20Sopenharmony_ci ctx->msg->data_hdrlen = hdrlen; 4738c2ecf20Sopenharmony_ci return 0; 4748c2ecf20Sopenharmony_ci} 4758c2ecf20Sopenharmony_ci 4768c2ecf20Sopenharmony_ci/* 4778c2ecf20Sopenharmony_ci * Parse authenticated attributes. 4788c2ecf20Sopenharmony_ci */ 4798c2ecf20Sopenharmony_ciint pkcs7_sig_note_authenticated_attr(void *context, size_t hdrlen, 4808c2ecf20Sopenharmony_ci unsigned char tag, 4818c2ecf20Sopenharmony_ci const void *value, size_t vlen) 4828c2ecf20Sopenharmony_ci{ 4838c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 4848c2ecf20Sopenharmony_ci struct pkcs7_signed_info *sinfo = ctx->sinfo; 4858c2ecf20Sopenharmony_ci enum OID content_type; 4868c2ecf20Sopenharmony_ci 4878c2ecf20Sopenharmony_ci pr_devel("AuthAttr: %02x %zu [%*ph]\n", tag, vlen, (unsigned)vlen, value); 4888c2ecf20Sopenharmony_ci 4898c2ecf20Sopenharmony_ci switch (ctx->last_oid) { 4908c2ecf20Sopenharmony_ci case OID_contentType: 4918c2ecf20Sopenharmony_ci if (__test_and_set_bit(sinfo_has_content_type, &sinfo->aa_set)) 4928c2ecf20Sopenharmony_ci goto repeated; 4938c2ecf20Sopenharmony_ci content_type = look_up_OID(value, vlen); 4948c2ecf20Sopenharmony_ci if (content_type != ctx->msg->data_type) { 4958c2ecf20Sopenharmony_ci pr_warn("Mismatch between global data type (%d) and sinfo %u (%d)\n", 4968c2ecf20Sopenharmony_ci ctx->msg->data_type, sinfo->index, 4978c2ecf20Sopenharmony_ci content_type); 4988c2ecf20Sopenharmony_ci return -EBADMSG; 4998c2ecf20Sopenharmony_ci } 5008c2ecf20Sopenharmony_ci return 0; 5018c2ecf20Sopenharmony_ci 5028c2ecf20Sopenharmony_ci case OID_signingTime: 5038c2ecf20Sopenharmony_ci if (__test_and_set_bit(sinfo_has_signing_time, &sinfo->aa_set)) 5048c2ecf20Sopenharmony_ci goto repeated; 5058c2ecf20Sopenharmony_ci /* Should we check that the signing time is consistent 5068c2ecf20Sopenharmony_ci * with the signer's X.509 cert? 5078c2ecf20Sopenharmony_ci */ 5088c2ecf20Sopenharmony_ci return x509_decode_time(&sinfo->signing_time, 5098c2ecf20Sopenharmony_ci hdrlen, tag, value, vlen); 5108c2ecf20Sopenharmony_ci 5118c2ecf20Sopenharmony_ci case OID_messageDigest: 5128c2ecf20Sopenharmony_ci if (__test_and_set_bit(sinfo_has_message_digest, &sinfo->aa_set)) 5138c2ecf20Sopenharmony_ci goto repeated; 5148c2ecf20Sopenharmony_ci if (tag != ASN1_OTS) 5158c2ecf20Sopenharmony_ci return -EBADMSG; 5168c2ecf20Sopenharmony_ci sinfo->msgdigest = value; 5178c2ecf20Sopenharmony_ci sinfo->msgdigest_len = vlen; 5188c2ecf20Sopenharmony_ci return 0; 5198c2ecf20Sopenharmony_ci 5208c2ecf20Sopenharmony_ci case OID_smimeCapabilites: 5218c2ecf20Sopenharmony_ci if (__test_and_set_bit(sinfo_has_smime_caps, &sinfo->aa_set)) 5228c2ecf20Sopenharmony_ci goto repeated; 5238c2ecf20Sopenharmony_ci if (ctx->msg->data_type != OID_msIndirectData) { 5248c2ecf20Sopenharmony_ci pr_warn("S/MIME Caps only allowed with Authenticode\n"); 5258c2ecf20Sopenharmony_ci return -EKEYREJECTED; 5268c2ecf20Sopenharmony_ci } 5278c2ecf20Sopenharmony_ci return 0; 5288c2ecf20Sopenharmony_ci 5298c2ecf20Sopenharmony_ci#ifdef CONFIG_SECURITY_CODE_SIGN 5308c2ecf20Sopenharmony_ci case OID_ownerid: 5318c2ecf20Sopenharmony_ci if (__test_and_set_bit(sinfo_has_owner_identifier, &sinfo->aa_set)) 5328c2ecf20Sopenharmony_ci goto repeated; 5338c2ecf20Sopenharmony_ci if (tag != ASN1_UTF8STR) 5348c2ecf20Sopenharmony_ci return -EBADMSG; 5358c2ecf20Sopenharmony_ci sinfo->ownerid = value; 5368c2ecf20Sopenharmony_ci sinfo->ownerid_len = vlen; 5378c2ecf20Sopenharmony_ci return 0; 5388c2ecf20Sopenharmony_ci#endif /* CONFIG_SECURITY_CODE_SIGN */ 5398c2ecf20Sopenharmony_ci 5408c2ecf20Sopenharmony_ci /* Microsoft SpOpusInfo seems to be contain cont[0] 16-bit BE 5418c2ecf20Sopenharmony_ci * char URLs and cont[1] 8-bit char URLs. 5428c2ecf20Sopenharmony_ci * 5438c2ecf20Sopenharmony_ci * Microsoft StatementType seems to contain a list of OIDs that 5448c2ecf20Sopenharmony_ci * are also used as extendedKeyUsage types in X.509 certs. 5458c2ecf20Sopenharmony_ci */ 5468c2ecf20Sopenharmony_ci case OID_msSpOpusInfo: 5478c2ecf20Sopenharmony_ci if (__test_and_set_bit(sinfo_has_ms_opus_info, &sinfo->aa_set)) 5488c2ecf20Sopenharmony_ci goto repeated; 5498c2ecf20Sopenharmony_ci goto authenticode_check; 5508c2ecf20Sopenharmony_ci case OID_msStatementType: 5518c2ecf20Sopenharmony_ci if (__test_and_set_bit(sinfo_has_ms_statement_type, &sinfo->aa_set)) 5528c2ecf20Sopenharmony_ci goto repeated; 5538c2ecf20Sopenharmony_ci authenticode_check: 5548c2ecf20Sopenharmony_ci if (ctx->msg->data_type != OID_msIndirectData) { 5558c2ecf20Sopenharmony_ci pr_warn("Authenticode AuthAttrs only allowed with Authenticode\n"); 5568c2ecf20Sopenharmony_ci return -EKEYREJECTED; 5578c2ecf20Sopenharmony_ci } 5588c2ecf20Sopenharmony_ci /* I'm not sure how to validate these */ 5598c2ecf20Sopenharmony_ci return 0; 5608c2ecf20Sopenharmony_ci default: 5618c2ecf20Sopenharmony_ci return 0; 5628c2ecf20Sopenharmony_ci } 5638c2ecf20Sopenharmony_ci 5648c2ecf20Sopenharmony_cirepeated: 5658c2ecf20Sopenharmony_ci /* We permit max one item per AuthenticatedAttribute and no repeats */ 5668c2ecf20Sopenharmony_ci pr_warn("Repeated/multivalue AuthAttrs not permitted\n"); 5678c2ecf20Sopenharmony_ci return -EKEYREJECTED; 5688c2ecf20Sopenharmony_ci} 5698c2ecf20Sopenharmony_ci 5708c2ecf20Sopenharmony_ci/* 5718c2ecf20Sopenharmony_ci * Note the set of auth attributes for digestion purposes [RFC2315 sec 9.3] 5728c2ecf20Sopenharmony_ci */ 5738c2ecf20Sopenharmony_ciint pkcs7_sig_note_set_of_authattrs(void *context, size_t hdrlen, 5748c2ecf20Sopenharmony_ci unsigned char tag, 5758c2ecf20Sopenharmony_ci const void *value, size_t vlen) 5768c2ecf20Sopenharmony_ci{ 5778c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 5788c2ecf20Sopenharmony_ci struct pkcs7_signed_info *sinfo = ctx->sinfo; 5798c2ecf20Sopenharmony_ci 5808c2ecf20Sopenharmony_ci if (!test_bit(sinfo_has_content_type, &sinfo->aa_set) || 5818c2ecf20Sopenharmony_ci !test_bit(sinfo_has_message_digest, &sinfo->aa_set)) { 5828c2ecf20Sopenharmony_ci pr_warn("Missing required AuthAttr\n"); 5838c2ecf20Sopenharmony_ci return -EBADMSG; 5848c2ecf20Sopenharmony_ci } 5858c2ecf20Sopenharmony_ci 5868c2ecf20Sopenharmony_ci if (ctx->msg->data_type != OID_msIndirectData && 5878c2ecf20Sopenharmony_ci test_bit(sinfo_has_ms_opus_info, &sinfo->aa_set)) { 5888c2ecf20Sopenharmony_ci pr_warn("Unexpected Authenticode AuthAttr\n"); 5898c2ecf20Sopenharmony_ci return -EBADMSG; 5908c2ecf20Sopenharmony_ci } 5918c2ecf20Sopenharmony_ci 5928c2ecf20Sopenharmony_ci /* We need to switch the 'CONT 0' to a 'SET OF' when we digest */ 5938c2ecf20Sopenharmony_ci sinfo->authattrs = value - (hdrlen - 1); 5948c2ecf20Sopenharmony_ci sinfo->authattrs_len = vlen + (hdrlen - 1); 5958c2ecf20Sopenharmony_ci return 0; 5968c2ecf20Sopenharmony_ci} 5978c2ecf20Sopenharmony_ci 5988c2ecf20Sopenharmony_ci/* 5998c2ecf20Sopenharmony_ci * Note the issuing certificate serial number 6008c2ecf20Sopenharmony_ci */ 6018c2ecf20Sopenharmony_ciint pkcs7_sig_note_serial(void *context, size_t hdrlen, 6028c2ecf20Sopenharmony_ci unsigned char tag, 6038c2ecf20Sopenharmony_ci const void *value, size_t vlen) 6048c2ecf20Sopenharmony_ci{ 6058c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 6068c2ecf20Sopenharmony_ci ctx->raw_serial = value; 6078c2ecf20Sopenharmony_ci ctx->raw_serial_size = vlen; 6088c2ecf20Sopenharmony_ci return 0; 6098c2ecf20Sopenharmony_ci} 6108c2ecf20Sopenharmony_ci 6118c2ecf20Sopenharmony_ci/* 6128c2ecf20Sopenharmony_ci * Note the issuer's name 6138c2ecf20Sopenharmony_ci */ 6148c2ecf20Sopenharmony_ciint pkcs7_sig_note_issuer(void *context, size_t hdrlen, 6158c2ecf20Sopenharmony_ci unsigned char tag, 6168c2ecf20Sopenharmony_ci const void *value, size_t vlen) 6178c2ecf20Sopenharmony_ci{ 6188c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 6198c2ecf20Sopenharmony_ci ctx->raw_issuer = value; 6208c2ecf20Sopenharmony_ci ctx->raw_issuer_size = vlen; 6218c2ecf20Sopenharmony_ci return 0; 6228c2ecf20Sopenharmony_ci} 6238c2ecf20Sopenharmony_ci 6248c2ecf20Sopenharmony_ci/* 6258c2ecf20Sopenharmony_ci * Note the issuing cert's subjectKeyIdentifier 6268c2ecf20Sopenharmony_ci */ 6278c2ecf20Sopenharmony_ciint pkcs7_sig_note_skid(void *context, size_t hdrlen, 6288c2ecf20Sopenharmony_ci unsigned char tag, 6298c2ecf20Sopenharmony_ci const void *value, size_t vlen) 6308c2ecf20Sopenharmony_ci{ 6318c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 6328c2ecf20Sopenharmony_ci 6338c2ecf20Sopenharmony_ci pr_devel("SKID: %02x %zu [%*ph]\n", tag, vlen, (unsigned)vlen, value); 6348c2ecf20Sopenharmony_ci 6358c2ecf20Sopenharmony_ci ctx->raw_skid = value; 6368c2ecf20Sopenharmony_ci ctx->raw_skid_size = vlen; 6378c2ecf20Sopenharmony_ci return 0; 6388c2ecf20Sopenharmony_ci} 6398c2ecf20Sopenharmony_ci 6408c2ecf20Sopenharmony_ci/* 6418c2ecf20Sopenharmony_ci * Note the signature data 6428c2ecf20Sopenharmony_ci */ 6438c2ecf20Sopenharmony_ciint pkcs7_sig_note_signature(void *context, size_t hdrlen, 6448c2ecf20Sopenharmony_ci unsigned char tag, 6458c2ecf20Sopenharmony_ci const void *value, size_t vlen) 6468c2ecf20Sopenharmony_ci{ 6478c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 6488c2ecf20Sopenharmony_ci 6498c2ecf20Sopenharmony_ci ctx->sinfo->sig->s = kmemdup(value, vlen, GFP_KERNEL); 6508c2ecf20Sopenharmony_ci if (!ctx->sinfo->sig->s) 6518c2ecf20Sopenharmony_ci return -ENOMEM; 6528c2ecf20Sopenharmony_ci 6538c2ecf20Sopenharmony_ci ctx->sinfo->sig->s_size = vlen; 6548c2ecf20Sopenharmony_ci return 0; 6558c2ecf20Sopenharmony_ci} 6568c2ecf20Sopenharmony_ci 6578c2ecf20Sopenharmony_ci/* 6588c2ecf20Sopenharmony_ci * Note a signature information block 6598c2ecf20Sopenharmony_ci */ 6608c2ecf20Sopenharmony_ciint pkcs7_note_signed_info(void *context, size_t hdrlen, 6618c2ecf20Sopenharmony_ci unsigned char tag, 6628c2ecf20Sopenharmony_ci const void *value, size_t vlen) 6638c2ecf20Sopenharmony_ci{ 6648c2ecf20Sopenharmony_ci struct pkcs7_parse_context *ctx = context; 6658c2ecf20Sopenharmony_ci struct pkcs7_signed_info *sinfo = ctx->sinfo; 6668c2ecf20Sopenharmony_ci struct asymmetric_key_id *kid; 6678c2ecf20Sopenharmony_ci 6688c2ecf20Sopenharmony_ci if (ctx->msg->data_type == OID_msIndirectData && !sinfo->authattrs) { 6698c2ecf20Sopenharmony_ci pr_warn("Authenticode requires AuthAttrs\n"); 6708c2ecf20Sopenharmony_ci return -EBADMSG; 6718c2ecf20Sopenharmony_ci } 6728c2ecf20Sopenharmony_ci 6738c2ecf20Sopenharmony_ci /* Generate cert issuer + serial number key ID */ 6748c2ecf20Sopenharmony_ci if (!ctx->expect_skid) { 6758c2ecf20Sopenharmony_ci kid = asymmetric_key_generate_id(ctx->raw_serial, 6768c2ecf20Sopenharmony_ci ctx->raw_serial_size, 6778c2ecf20Sopenharmony_ci ctx->raw_issuer, 6788c2ecf20Sopenharmony_ci ctx->raw_issuer_size); 6798c2ecf20Sopenharmony_ci } else { 6808c2ecf20Sopenharmony_ci kid = asymmetric_key_generate_id(ctx->raw_skid, 6818c2ecf20Sopenharmony_ci ctx->raw_skid_size, 6828c2ecf20Sopenharmony_ci "", 0); 6838c2ecf20Sopenharmony_ci } 6848c2ecf20Sopenharmony_ci if (IS_ERR(kid)) 6858c2ecf20Sopenharmony_ci return PTR_ERR(kid); 6868c2ecf20Sopenharmony_ci 6878c2ecf20Sopenharmony_ci pr_devel("SINFO KID: %u [%*phN]\n", kid->len, kid->len, kid->data); 6888c2ecf20Sopenharmony_ci 6898c2ecf20Sopenharmony_ci sinfo->sig->auth_ids[0] = kid; 6908c2ecf20Sopenharmony_ci sinfo->index = ++ctx->sinfo_index; 6918c2ecf20Sopenharmony_ci *ctx->ppsinfo = sinfo; 6928c2ecf20Sopenharmony_ci ctx->ppsinfo = &sinfo->next; 6938c2ecf20Sopenharmony_ci ctx->sinfo = kzalloc(sizeof(struct pkcs7_signed_info), GFP_KERNEL); 6948c2ecf20Sopenharmony_ci if (!ctx->sinfo) 6958c2ecf20Sopenharmony_ci return -ENOMEM; 6968c2ecf20Sopenharmony_ci ctx->sinfo->sig = kzalloc(sizeof(struct public_key_signature), 6978c2ecf20Sopenharmony_ci GFP_KERNEL); 6988c2ecf20Sopenharmony_ci if (!ctx->sinfo->sig) 6998c2ecf20Sopenharmony_ci return -ENOMEM; 7008c2ecf20Sopenharmony_ci return 0; 7018c2ecf20Sopenharmony_ci} 702