xref: /freebsd/usr.sbin/uefisign/pe.c (revision 81ad6265)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2014 The FreeBSD Foundation
5  *
6  * This software was developed by Edward Tomasz Napierala under sponsorship
7  * from the FreeBSD Foundation.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28  * SUCH DAMAGE.
29  *
30  */
31 
32 /*
33  * PE format reference:
34  * http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx
35  */
36 
37 #include <sys/cdefs.h>
38 __FBSDID("$FreeBSD$");
39 
40 #include <assert.h>
41 #include <err.h>
42 #include <errno.h>
43 #include <stddef.h>
44 #include <stdio.h>
45 #include <stdint.h>
46 #include <stdlib.h>
47 #include <string.h>
48 #include <unistd.h>
49 
50 #include "uefisign.h"
51 
52 #ifndef CTASSERT
53 #define CTASSERT(x)		_CTASSERT(x, __LINE__)
54 #define _CTASSERT(x, y)		__CTASSERT(x, y)
55 #define __CTASSERT(x, y)	typedef char __assert_ ## y [(x) ? 1 : -1]
56 #endif
57 
58 #define PE_ALIGMENT_SIZE	8
59 
60 struct mz_header {
61 	uint8_t			mz_signature[2];
62 	uint8_t			mz_dont_care[58];
63 	uint16_t		mz_lfanew;
64 } __attribute__((packed));
65 
66 struct coff_header {
67 	uint8_t			coff_dont_care[2];
68 	uint16_t		coff_number_of_sections;
69 	uint8_t			coff_dont_care_either[16];
70 } __attribute__((packed));
71 
72 #define	PE_SIGNATURE		0x00004550
73 
74 struct pe_header {
75 	uint32_t		pe_signature;
76 	struct coff_header	pe_coff;
77 } __attribute__((packed));
78 
79 #define	PE_OPTIONAL_MAGIC_32		0x010B
80 #define	PE_OPTIONAL_MAGIC_32_PLUS	0x020B
81 
82 #define	PE_OPTIONAL_SUBSYSTEM_EFI_APPLICATION	10
83 #define	PE_OPTIONAL_SUBSYSTEM_EFI_BOOT		11
84 #define	PE_OPTIONAL_SUBSYSTEM_EFI_RUNTIME	12
85 
86 struct pe_optional_header_32 {
87 	uint16_t		po_magic;
88 	uint8_t			po_dont_care[58];
89 	uint32_t		po_size_of_headers;
90 	uint32_t		po_checksum;
91 	uint16_t		po_subsystem;
92 	uint8_t			po_dont_care_either[22];
93 	uint32_t		po_number_of_rva_and_sizes;
94 } __attribute__((packed));
95 
96 CTASSERT(offsetof(struct pe_optional_header_32, po_size_of_headers) == 60);
97 CTASSERT(offsetof(struct pe_optional_header_32, po_checksum) == 64);
98 CTASSERT(offsetof(struct pe_optional_header_32, po_subsystem) == 68);
99 CTASSERT(offsetof(struct pe_optional_header_32, po_number_of_rva_and_sizes) == 92);
100 
101 struct pe_optional_header_32_plus {
102 	uint16_t		po_magic;
103 	uint8_t			po_dont_care[58];
104 	uint32_t		po_size_of_headers;
105 	uint32_t		po_checksum;
106 	uint16_t		po_subsystem;
107 	uint8_t			po_dont_care_either[38];
108 	uint32_t		po_number_of_rva_and_sizes;
109 } __attribute__((packed));
110 
111 CTASSERT(offsetof(struct pe_optional_header_32_plus, po_size_of_headers) == 60);
112 CTASSERT(offsetof(struct pe_optional_header_32_plus, po_checksum) == 64);
113 CTASSERT(offsetof(struct pe_optional_header_32_plus, po_subsystem) == 68);
114 CTASSERT(offsetof(struct pe_optional_header_32_plus, po_number_of_rva_and_sizes) == 108);
115 
116 #define	PE_DIRECTORY_ENTRY_CERTIFICATE	4
117 
118 struct pe_directory_entry {
119 	uint32_t	pde_rva;
120 	uint32_t	pde_size;
121 } __attribute__((packed));
122 
123 struct pe_section_header {
124 	uint8_t			psh_dont_care[16];
125 	uint32_t		psh_size_of_raw_data;
126 	uint32_t		psh_pointer_to_raw_data;
127 	uint8_t			psh_dont_care_either[16];
128 } __attribute__((packed));
129 
130 CTASSERT(offsetof(struct pe_section_header, psh_size_of_raw_data) == 16);
131 CTASSERT(offsetof(struct pe_section_header, psh_pointer_to_raw_data) == 20);
132 
133 #define	PE_CERTIFICATE_REVISION		0x0200
134 #define	PE_CERTIFICATE_TYPE		0x0002
135 
136 struct pe_certificate {
137 	uint32_t	pc_len;
138 	uint16_t	pc_revision;
139 	uint16_t	pc_type;
140 	char		pc_signature[0];
141 } __attribute__((packed));
142 
143 void
144 range_check(const struct executable *x, off_t off, size_t len,
145     const char *name)
146 {
147 
148 	if (off < 0) {
149 		errx(1, "%s starts at negative offset %jd",
150 		    name, (intmax_t)off);
151 	}
152 	if (off >= (off_t)x->x_len) {
153 		errx(1, "%s starts at %jd, past the end of executable at %zd",
154 		    name, (intmax_t)off, x->x_len);
155 	}
156 	if (len >= x->x_len) {
157 		errx(1, "%s size %zd is larger than the executable size %zd",
158 		    name, len, x->x_len);
159 	}
160 	if (off + len > x->x_len) {
161 		errx(1, "%s extends to %jd, past the end of executable at %zd",
162 		    name, (intmax_t)(off + len), x->x_len);
163 	}
164 }
165 
166 size_t
167 signature_size(const struct executable *x)
168 {
169 	const struct pe_directory_entry *pde;
170 
171 	range_check(x, x->x_certificate_entry_off,
172 	    x->x_certificate_entry_len, "Certificate Directory");
173 
174 	pde = (struct pe_directory_entry *)
175 	    (x->x_buf + x->x_certificate_entry_off);
176 
177 	if (pde->pde_rva != 0 && pde->pde_size == 0)
178 		warnx("signature size is 0, but its RVA is %d", pde->pde_rva);
179 	if (pde->pde_rva == 0 && pde->pde_size != 0)
180 		warnx("signature RVA is 0, but its size is %d", pde->pde_size);
181 
182 	return (pde->pde_size);
183 }
184 
185 void
186 show_certificate(const struct executable *x)
187 {
188 	struct pe_certificate *pc;
189 	const struct pe_directory_entry *pde;
190 
191 	range_check(x, x->x_certificate_entry_off,
192 	    x->x_certificate_entry_len, "Certificate Directory");
193 
194 	pde = (struct pe_directory_entry *)
195 	    (x->x_buf + x->x_certificate_entry_off);
196 
197 	if (signature_size(x) == 0) {
198 		printf("file not signed\n");
199 		return;
200 	}
201 
202 #if 0
203 	printf("certificate chunk at offset %zd, size %zd\n",
204 	    pde->pde_rva, pde->pde_size);
205 #endif
206 
207 	range_check(x, pde->pde_rva, pde->pde_size, "Certificate chunk");
208 
209 	pc = (struct pe_certificate *)(x->x_buf + pde->pde_rva);
210 	if (pc->pc_revision != PE_CERTIFICATE_REVISION) {
211 		errx(1, "wrong certificate chunk revision, is %d, should be %d",
212 		    pc->pc_revision, PE_CERTIFICATE_REVISION);
213 	}
214 	if (pc->pc_type != PE_CERTIFICATE_TYPE) {
215 		errx(1, "wrong certificate chunk type, is %d, should be %d",
216 		    pc->pc_type, PE_CERTIFICATE_TYPE);
217 	}
218 	printf("to dump PKCS7:\n    "
219 	    "dd if='%s' bs=1 skip=%zd | openssl pkcs7 -inform DER -print\n",
220 	    x->x_path, pde->pde_rva + offsetof(struct pe_certificate, pc_signature));
221 	printf("to dump raw ASN.1:\n    "
222 	    "openssl asn1parse -i -inform DER -offset %zd -in '%s'\n",
223 	    pde->pde_rva + offsetof(struct pe_certificate, pc_signature), x->x_path);
224 }
225 
226 static void
227 parse_section_table(struct executable *x, off_t off, int number_of_sections)
228 {
229 	const struct pe_section_header *psh;
230 	int i;
231 
232 	range_check(x, off, sizeof(*psh) * number_of_sections,
233 	    "section table");
234 
235 	if (x->x_headers_len < off + sizeof(*psh) * number_of_sections)
236 		errx(1, "section table outside of headers");
237 
238 	psh = (const struct pe_section_header *)(x->x_buf + off);
239 
240 	if (number_of_sections >= MAX_SECTIONS) {
241 		errx(1, "too many sections: got %d, should be %d",
242 		    number_of_sections, MAX_SECTIONS);
243 	}
244 	x->x_nsections = number_of_sections;
245 
246 	for (i = 0; i < number_of_sections; i++) {
247 		if (psh->psh_size_of_raw_data > 0 &&
248 		    psh->psh_pointer_to_raw_data < x->x_headers_len)
249 			errx(1, "section points inside the headers");
250 
251 		range_check(x, psh->psh_pointer_to_raw_data,
252 		    psh->psh_size_of_raw_data, "section");
253 #if 0
254 		printf("section %d: start %d, size %d\n",
255 		    i, psh->psh_pointer_to_raw_data, psh->psh_size_of_raw_data);
256 #endif
257 		x->x_section_off[i] = psh->psh_pointer_to_raw_data;
258 		x->x_section_len[i] = psh->psh_size_of_raw_data;
259 		psh++;
260 	}
261 }
262 
263 static void
264 parse_directory(struct executable *x, off_t off,
265     int number_of_rva_and_sizes, int number_of_sections)
266 {
267 	//int i;
268 	const struct pe_directory_entry *pde;
269 
270 	//printf("Data Directory at offset %zd\n", off);
271 
272 	if (number_of_rva_and_sizes <= PE_DIRECTORY_ENTRY_CERTIFICATE) {
273 		errx(1, "wrong NumberOfRvaAndSizes %d; should be at least %d",
274 		    number_of_rva_and_sizes, PE_DIRECTORY_ENTRY_CERTIFICATE);
275 	}
276 
277 	range_check(x, off, sizeof(*pde) * number_of_rva_and_sizes,
278 	    "PE Data Directory");
279 	if (x->x_headers_len <= off + sizeof(*pde) * number_of_rva_and_sizes)
280 		errx(1, "PE Data Directory outside of headers");
281 
282 	x->x_certificate_entry_off =
283 	    off + sizeof(*pde) * PE_DIRECTORY_ENTRY_CERTIFICATE;
284 	x->x_certificate_entry_len = sizeof(*pde);
285 #if 0
286 	printf("certificate directory entry at offset %zd, len %zd\n",
287 	    x->x_certificate_entry_off, x->x_certificate_entry_len);
288 
289 	pde = (struct pe_directory_entry *)(x->x_buf + off);
290 	for (i = 0; i < number_of_rva_and_sizes; i++) {
291 		printf("rva %zd, size %zd\n", pde->pde_rva, pde->pde_size);
292 		pde++;
293 	}
294 #endif
295 
296 	return (parse_section_table(x,
297 	    off + sizeof(*pde) * number_of_rva_and_sizes, number_of_sections));
298 }
299 
300 /*
301  * The PE checksum algorithm is undocumented; this code is mostly based on
302  * http://forum.sysinternals.com/optional-header-checksum-calculation_topic24214.html
303  *
304  * "Sum the entire image file, excluding the CheckSum field in the optional
305  * header, as an array of USHORTs, allowing any carry above 16 bits to be added
306  * back onto the low 16 bits. Then add the file size to get a 32-bit value."
307  *
308  * Note that most software does not care about the checksum at all; perhaps
309  * we could just set it to 0 instead.
310  *
311  * XXX: Endianness?
312  */
313 static uint32_t
314 compute_checksum(const struct executable *x)
315 {
316 	uint32_t cksum = 0;
317 	uint16_t tmp;
318 	int i;
319 
320 	range_check(x, x->x_checksum_off, x->x_checksum_len, "PE checksum");
321 
322 	assert(x->x_checksum_off % 2 == 0);
323 
324 	for (i = 0; i + sizeof(tmp) < x->x_len; i += 2) {
325 		/*
326 		 * Don't checksum the checksum.  The +2 is because the checksum
327 		 * is 4 bytes, and here we're iterating over 2 byte chunks.
328 		 */
329 		if (i == x->x_checksum_off || i == x->x_checksum_off + 2) {
330 			tmp = 0;
331 		} else {
332 			assert(i + sizeof(tmp) <= x->x_len);
333 			memcpy(&tmp, x->x_buf + i, sizeof(tmp));
334 		}
335 
336 		cksum += tmp;
337 		cksum += cksum >> 16;
338 		cksum &= 0xffff;
339 	}
340 
341 	cksum += cksum >> 16;
342 	cksum &= 0xffff;
343 
344 	cksum += x->x_len;
345 
346 	return (cksum);
347 }
348 
349 static void
350 parse_optional_32_plus(struct executable *x, off_t off,
351     int number_of_sections)
352 {
353 #if 0
354 	uint32_t computed_checksum;
355 #endif
356 	const struct pe_optional_header_32_plus	*po;
357 
358 	range_check(x, off, sizeof(*po), "PE Optional Header");
359 
360 	po = (struct pe_optional_header_32_plus *)(x->x_buf + off);
361 	switch (po->po_subsystem) {
362 	case PE_OPTIONAL_SUBSYSTEM_EFI_APPLICATION:
363 	case PE_OPTIONAL_SUBSYSTEM_EFI_BOOT:
364 	case PE_OPTIONAL_SUBSYSTEM_EFI_RUNTIME:
365 		break;
366 	default:
367 		errx(1, "wrong PE Optional Header subsystem 0x%x",
368 		    po->po_subsystem);
369 	}
370 
371 #if 0
372 	printf("subsystem %d, checksum 0x%x, %d data directories\n",
373 	    po->po_subsystem, po->po_checksum, po->po_number_of_rva_and_sizes);
374 #endif
375 
376 	x->x_checksum_off = off +
377 	    offsetof(struct pe_optional_header_32_plus, po_checksum);
378 	x->x_checksum_len = sizeof(po->po_checksum);
379 #if 0
380 	printf("checksum 0x%x at offset %zd, len %zd\n",
381 	    po->po_checksum, x->x_checksum_off, x->x_checksum_len);
382 
383 	computed_checksum = compute_checksum(x);
384 	if (computed_checksum != po->po_checksum) {
385 		warnx("invalid PE+ checksum; is 0x%x, should be 0x%x",
386 		    po->po_checksum, computed_checksum);
387 	}
388 #endif
389 
390 	if (x->x_len < x->x_headers_len)
391 		errx(1, "invalid SizeOfHeaders %d", po->po_size_of_headers);
392 	x->x_headers_len = po->po_size_of_headers;
393 	//printf("Size of Headers: %d\n", po->po_size_of_headers);
394 
395 	return (parse_directory(x, off + sizeof(*po),
396 	    po->po_number_of_rva_and_sizes, number_of_sections));
397 }
398 
399 static void
400 parse_optional_32(struct executable *x, off_t off, int number_of_sections)
401 {
402 #if 0
403 	uint32_t computed_checksum;
404 #endif
405 	const struct pe_optional_header_32 *po;
406 
407 	range_check(x, off, sizeof(*po), "PE Optional Header");
408 
409 	po = (struct pe_optional_header_32 *)(x->x_buf + off);
410 	switch (po->po_subsystem) {
411 	case PE_OPTIONAL_SUBSYSTEM_EFI_APPLICATION:
412 	case PE_OPTIONAL_SUBSYSTEM_EFI_BOOT:
413 	case PE_OPTIONAL_SUBSYSTEM_EFI_RUNTIME:
414 		break;
415 	default:
416 		errx(1, "wrong PE Optional Header subsystem 0x%x",
417 		    po->po_subsystem);
418 	}
419 
420 #if 0
421 	printf("subsystem %d, checksum 0x%x, %d data directories\n",
422 	    po->po_subsystem, po->po_checksum, po->po_number_of_rva_and_sizes);
423 #endif
424 
425 	x->x_checksum_off = off +
426 	    offsetof(struct pe_optional_header_32, po_checksum);
427 	x->x_checksum_len = sizeof(po->po_checksum);
428 #if 0
429 	printf("checksum at offset %zd, len %zd\n",
430 	    x->x_checksum_off, x->x_checksum_len);
431 
432 	computed_checksum = compute_checksum(x);
433 	if (computed_checksum != po->po_checksum) {
434 		warnx("invalid PE checksum; is 0x%x, should be 0x%x",
435 		    po->po_checksum, computed_checksum);
436 	}
437 #endif
438 
439 	if (x->x_len < x->x_headers_len)
440 		errx(1, "invalid SizeOfHeaders %d", po->po_size_of_headers);
441 	x->x_headers_len = po->po_size_of_headers;
442 	//printf("Size of Headers: %d\n", po->po_size_of_headers);
443 
444 	return (parse_directory(x, off + sizeof(*po),
445 	    po->po_number_of_rva_and_sizes, number_of_sections));
446 }
447 
448 static void
449 parse_optional(struct executable *x, off_t off, int number_of_sections)
450 {
451 	const struct pe_optional_header_32 *po;
452 
453 	//printf("Optional header offset %zd\n", off);
454 
455 	range_check(x, off, sizeof(*po), "PE Optional Header");
456 
457 	po = (struct pe_optional_header_32 *)(x->x_buf + off);
458 
459 	switch (po->po_magic) {
460 	case PE_OPTIONAL_MAGIC_32:
461 		return (parse_optional_32(x, off, number_of_sections));
462 	case PE_OPTIONAL_MAGIC_32_PLUS:
463 		return (parse_optional_32_plus(x, off, number_of_sections));
464 	default:
465 		errx(1, "wrong PE Optional Header magic 0x%x", po->po_magic);
466 	}
467 }
468 
469 static void
470 parse_pe(struct executable *x, off_t off)
471 {
472 	const struct pe_header *pe;
473 
474 	//printf("PE offset %zd, PE size %zd\n", off, sizeof(*pe));
475 
476 	range_check(x, off, sizeof(*pe), "PE header");
477 
478 	pe = (struct pe_header *)(x->x_buf + off);
479 	if (pe->pe_signature != PE_SIGNATURE)
480 		errx(1, "wrong PE signature 0x%x", pe->pe_signature);
481 
482 	//printf("Number of sections: %d\n", pe->pe_coff.coff_number_of_sections);
483 
484 	parse_optional(x, off + sizeof(*pe),
485 	    pe->pe_coff.coff_number_of_sections);
486 }
487 
488 void
489 parse(struct executable *x)
490 {
491 	const struct mz_header *mz;
492 
493 	range_check(x, 0, sizeof(*mz), "MZ header");
494 
495 	mz = (struct mz_header *)x->x_buf;
496 	if (mz->mz_signature[0] != 'M' || mz->mz_signature[1] != 'Z')
497 		errx(1, "MZ header not found");
498 
499 	return (parse_pe(x, mz->mz_lfanew));
500 }
501 
502 static off_t
503 append(struct executable *x, void *ptr, size_t len, size_t aligment)
504 {
505 	off_t off;
506 
507 	off = x->x_len;
508 	x->x_buf = realloc(x->x_buf, x->x_len + len + aligment);
509 	if (x->x_buf == NULL)
510 		err(1, "realloc");
511 	memcpy(x->x_buf + x->x_len, ptr, len);
512 	memset(x->x_buf + x->x_len + len, 0, aligment);
513 	x->x_len += len + aligment;
514 
515 	return (off);
516 }
517 
518 void
519 update(struct executable *x)
520 {
521 	uint32_t checksum;
522 	struct pe_certificate *pc;
523 	struct pe_directory_entry pde;
524 	size_t pc_len;
525 	size_t pc_aligment;
526 	off_t pc_off;
527 
528 	pc_len = sizeof(*pc) + x->x_signature_len;
529 	pc = calloc(1, pc_len);
530 	if (pc == NULL)
531 		err(1, "calloc");
532 
533 	if (pc_len % PE_ALIGMENT_SIZE > 0)
534 		pc_aligment = PE_ALIGMENT_SIZE - (pc_len % PE_ALIGMENT_SIZE);
535 	else
536 		pc_aligment = 0;
537 
538 #if 0
539 	/*
540 	 * Note that pc_len is the length of pc_certificate,
541 	 * not the whole structure.
542 	 *
543 	 * XXX: That's what the spec says - but it breaks at least
544 	 *      sbverify and "pesign -S", so the spec is probably wrong.
545 	 */
546 	pc->pc_len = x->x_signature_len;
547 #else
548 	pc->pc_len = pc_len;
549 #endif
550 	pc->pc_revision = PE_CERTIFICATE_REVISION;
551 	pc->pc_type = PE_CERTIFICATE_TYPE;
552 	memcpy(&pc->pc_signature, x->x_signature, x->x_signature_len);
553 
554 	pc_off = append(x, pc, pc_len, pc_aligment);
555 #if 0
556 	printf("added signature chunk at offset %zd, len %zd\n",
557 	    pc_off, pc_len);
558 #endif
559 
560 	free(pc);
561 
562 	pde.pde_rva = pc_off;
563 	pde.pde_size = pc_len + pc_aligment;
564 	memcpy(x->x_buf + x->x_certificate_entry_off, &pde, sizeof(pde));
565 
566 	checksum = compute_checksum(x);
567 	assert(sizeof(checksum) == x->x_checksum_len);
568 	memcpy(x->x_buf + x->x_checksum_off, &checksum, sizeof(checksum));
569 #if 0
570 	printf("new checksum 0x%x\n", checksum);
571 #endif
572 }
573