mirror of https://github.com/acidanthera/audk.git
114 lines
3.1 KiB
C
114 lines
3.1 KiB
C
/** @file
|
|
Non-runtime specific implementation of PKCS#7 SignedData Verification Wrapper.
|
|
|
|
Copyright (c) 2024, Intel Corporation. All rights reserved.<BR>
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
**/
|
|
|
|
#include "InternalCryptLib.h"
|
|
#include <mbedtls/pkcs7.h>
|
|
|
|
/**
|
|
Extracts the attached content from a PKCS#7 signed data if existed. The input signed
|
|
data could be wrapped in a ContentInfo structure.
|
|
|
|
If P7Data, Content, or ContentSize is NULL, then return FALSE. If P7Length overflow,
|
|
then return FALSE. If the P7Data is not correctly formatted, then return FALSE.
|
|
|
|
Caution: This function may receive untrusted input. So this function will do
|
|
basic check for PKCS#7 data structure.
|
|
|
|
@param[in] P7Data Pointer to the PKCS#7 signed data to process.
|
|
@param[in] P7Length Length of the PKCS#7 signed data in bytes.
|
|
@param[out] Content Pointer to the extracted content from the PKCS#7 signedData.
|
|
It's caller's responsibility to free the buffer with FreePool().
|
|
@param[out] ContentSize The size of the extracted content in bytes.
|
|
|
|
@retval TRUE The P7Data was correctly formatted for processing.
|
|
@retval FALSE The P7Data was not correctly formatted for processing.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
Pkcs7GetAttachedContent (
|
|
IN CONST UINT8 *P7Data,
|
|
IN UINTN P7Length,
|
|
OUT VOID **Content,
|
|
OUT UINTN *ContentSize
|
|
)
|
|
{
|
|
BOOLEAN Status;
|
|
UINT8 *SignedData;
|
|
UINTN SignedDataSize;
|
|
BOOLEAN Wrapped;
|
|
INTN Ret;
|
|
mbedtls_pkcs7 Pkcs7;
|
|
mbedtls_pkcs7_data *MbedtlsContent;
|
|
|
|
mbedtls_pkcs7_init (&Pkcs7);
|
|
|
|
//
|
|
// Check input parameter.
|
|
//
|
|
if ((P7Data == NULL) || (P7Length > INT_MAX) || (Content == NULL) || (ContentSize == NULL)) {
|
|
return FALSE;
|
|
}
|
|
|
|
*Content = NULL;
|
|
SignedData = NULL;
|
|
|
|
Status = WrapPkcs7Data (P7Data, P7Length, &Wrapped, &SignedData, &SignedDataSize);
|
|
if (!Status || (SignedDataSize > INT_MAX)) {
|
|
goto _Exit;
|
|
}
|
|
|
|
Status = FALSE;
|
|
|
|
Ret = mbedtls_pkcs7_parse_der (&Pkcs7, SignedData, (INT32)SignedDataSize);
|
|
|
|
//
|
|
// The type of Pkcs7 must be signedData
|
|
//
|
|
if (Ret != MBEDTLS_PKCS7_SIGNED_DATA) {
|
|
goto _Exit;
|
|
}
|
|
|
|
//
|
|
// Check for detached or attached content
|
|
//
|
|
MbedtlsContent = &(Pkcs7.signed_data.content);
|
|
|
|
if (MbedtlsContent == NULL) {
|
|
//
|
|
// No Content supplied for PKCS7 detached signedData
|
|
//
|
|
*Content = NULL;
|
|
*ContentSize = 0;
|
|
} else {
|
|
//
|
|
// Retrieve the attached content in PKCS7 signedData
|
|
//
|
|
if ((MbedtlsContent->data.len > 0) && (MbedtlsContent->data.p != NULL)) {
|
|
*ContentSize = MbedtlsContent->data.len;
|
|
*Content = AllocateZeroPool (*ContentSize);
|
|
if (*Content == NULL) {
|
|
*ContentSize = 0;
|
|
goto _Exit;
|
|
}
|
|
|
|
CopyMem (*Content, MbedtlsContent->data.p, *ContentSize);
|
|
}
|
|
}
|
|
|
|
Status = TRUE;
|
|
|
|
_Exit:
|
|
//
|
|
// Release Resources
|
|
//
|
|
mbedtls_pkcs7_free (&Pkcs7);
|
|
|
|
return Status;
|
|
}
|