116 lines
2.7 KiB
Plaintext
116 lines
2.7 KiB
Plaintext
|
#!/bin/sh
|
||
|
#
|
||
|
# Sign a module file using the given key.
|
||
|
#
|
||
|
# Format: sign-file <key> <x509> <src-file> <dst-file>
|
||
|
#
|
||
|
|
||
|
scripts=`dirname $0`
|
||
|
|
||
|
CONFIG_MODULE_SIG_SHA512=y
|
||
|
if [ -r .config ]
|
||
|
then
|
||
|
. ./.config
|
||
|
fi
|
||
|
|
||
|
key="$1"
|
||
|
x509="$2"
|
||
|
src="$3"
|
||
|
dst="$4"
|
||
|
|
||
|
if [ ! -r "$key" ]
|
||
|
then
|
||
|
echo "Can't read private key" >&2
|
||
|
exit 2
|
||
|
fi
|
||
|
|
||
|
if [ ! -r "$x509" ]
|
||
|
then
|
||
|
echo "Can't read X.509 certificate" >&2
|
||
|
exit 2
|
||
|
fi
|
||
|
if [ ! -r "$x509.signer" ]
|
||
|
then
|
||
|
echo "Can't read Signer name" >&2
|
||
|
exit 2;
|
||
|
fi
|
||
|
if [ ! -r "$x509.keyid" ]
|
||
|
then
|
||
|
echo "Can't read Key identifier" >&2
|
||
|
exit 2;
|
||
|
fi
|
||
|
|
||
|
#
|
||
|
# Signature parameters
|
||
|
#
|
||
|
algo=1 # Public-key crypto algorithm: RSA
|
||
|
hash= # Digest algorithm
|
||
|
id_type=1 # Identifier type: X.509
|
||
|
|
||
|
#
|
||
|
# Digest the data
|
||
|
#
|
||
|
dgst=
|
||
|
if [ "$CONFIG_MODULE_SIG_SHA1" = "y" ]
|
||
|
then
|
||
|
prologue="0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14"
|
||
|
dgst=-sha1
|
||
|
hash=2
|
||
|
elif [ "$CONFIG_MODULE_SIG_SHA224" = "y" ]
|
||
|
then
|
||
|
prologue="0x30, 0x2d, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04, 0x05, 0x00, 0x04, 0x1C"
|
||
|
dgst=-sha224
|
||
|
hash=7
|
||
|
elif [ "$CONFIG_MODULE_SIG_SHA256" = "y" ]
|
||
|
then
|
||
|
prologue="0x30, 0x31, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20"
|
||
|
dgst=-sha256
|
||
|
hash=4
|
||
|
elif [ "$CONFIG_MODULE_SIG_SHA384" = "y" ]
|
||
|
then
|
||
|
prologue="0x30, 0x41, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30"
|
||
|
dgst=-sha384
|
||
|
hash=5
|
||
|
elif [ "$CONFIG_MODULE_SIG_SHA512" = "y" ]
|
||
|
then
|
||
|
prologue="0x30, 0x51, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40"
|
||
|
dgst=-sha512
|
||
|
hash=6
|
||
|
else
|
||
|
echo "$0: Can't determine hash algorithm" >&2
|
||
|
exit 2
|
||
|
fi
|
||
|
|
||
|
(
|
||
|
perl -e "binmode STDOUT; print pack(\"C*\", $prologue)" || exit $?
|
||
|
openssl dgst $dgst -binary $src || exit $?
|
||
|
) >$src.dig || exit $?
|
||
|
|
||
|
#
|
||
|
# Generate the binary signature, which will be just the integer that comprises
|
||
|
# the signature with no metadata attached.
|
||
|
#
|
||
|
openssl rsautl -sign -inkey $key -keyform PEM -in $src.dig -out $src.sig || exit $?
|
||
|
signerlen=`stat -c %s $x509.signer`
|
||
|
keyidlen=`stat -c %s $x509.keyid`
|
||
|
siglen=`stat -c %s $src.sig`
|
||
|
|
||
|
#
|
||
|
# Build the signed binary
|
||
|
#
|
||
|
(
|
||
|
cat $src || exit $?
|
||
|
echo '~Module signature appended~' || exit $?
|
||
|
cat $x509.signer $x509.keyid || exit $?
|
||
|
|
||
|
# Preface each signature integer with a 2-byte BE length
|
||
|
perl -e "binmode STDOUT; print pack(\"n\", $siglen)" || exit $?
|
||
|
cat $src.sig || exit $?
|
||
|
|
||
|
# Generate the information block
|
||
|
perl -e "binmode STDOUT; print pack(\"CCCCCxxxN\", $algo, $hash, $id_type, $signerlen, $keyidlen, $siglen + 2)" || exit $?
|
||
|
) >$dst~ || exit $?
|
||
|
|
||
|
# Permit in-place signing
|
||
|
mv $dst~ $dst || exit $?
|