sign-file 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115
  1. #!/bin/sh
  2. #
  3. # Sign a module file using the given key.
  4. #
  5. # Format: sign-file <key> <x509> <src-file> <dst-file>
  6. #
  7. scripts=`dirname $0`
  8. CONFIG_MODULE_SIG_SHA512=y
  9. if [ -r .config ]
  10. then
  11. . ./.config
  12. fi
  13. key="$1"
  14. x509="$2"
  15. src="$3"
  16. dst="$4"
  17. if [ ! -r "$key" ]
  18. then
  19. echo "Can't read private key" >&2
  20. exit 2
  21. fi
  22. if [ ! -r "$x509" ]
  23. then
  24. echo "Can't read X.509 certificate" >&2
  25. exit 2
  26. fi
  27. if [ ! -r "$x509.signer" ]
  28. then
  29. echo "Can't read Signer name" >&2
  30. exit 2;
  31. fi
  32. if [ ! -r "$x509.keyid" ]
  33. then
  34. echo "Can't read Key identifier" >&2
  35. exit 2;
  36. fi
  37. #
  38. # Signature parameters
  39. #
  40. algo=1 # Public-key crypto algorithm: RSA
  41. hash= # Digest algorithm
  42. id_type=1 # Identifier type: X.509
  43. #
  44. # Digest the data
  45. #
  46. dgst=
  47. if [ "$CONFIG_MODULE_SIG_SHA1" = "y" ]
  48. then
  49. prologue="0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14"
  50. dgst=-sha1
  51. hash=2
  52. elif [ "$CONFIG_MODULE_SIG_SHA224" = "y" ]
  53. then
  54. prologue="0x30, 0x2d, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04, 0x05, 0x00, 0x04, 0x1C"
  55. dgst=-sha224
  56. hash=7
  57. elif [ "$CONFIG_MODULE_SIG_SHA256" = "y" ]
  58. then
  59. prologue="0x30, 0x31, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20"
  60. dgst=-sha256
  61. hash=4
  62. elif [ "$CONFIG_MODULE_SIG_SHA384" = "y" ]
  63. then
  64. prologue="0x30, 0x41, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30"
  65. dgst=-sha384
  66. hash=5
  67. elif [ "$CONFIG_MODULE_SIG_SHA512" = "y" ]
  68. then
  69. prologue="0x30, 0x51, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40"
  70. dgst=-sha512
  71. hash=6
  72. else
  73. echo "$0: Can't determine hash algorithm" >&2
  74. exit 2
  75. fi
  76. (
  77. perl -e "binmode STDOUT; print pack(\"C*\", $prologue)" || exit $?
  78. openssl dgst $dgst -binary $src || exit $?
  79. ) >$src.dig || exit $?
  80. #
  81. # Generate the binary signature, which will be just the integer that comprises
  82. # the signature with no metadata attached.
  83. #
  84. openssl rsautl -sign -inkey $key -keyform PEM -in $src.dig -out $src.sig || exit $?
  85. signerlen=`stat -c %s $x509.signer`
  86. keyidlen=`stat -c %s $x509.keyid`
  87. siglen=`stat -c %s $src.sig`
  88. #
  89. # Build the signed binary
  90. #
  91. (
  92. cat $src || exit $?
  93. echo '~Module signature appended~' || exit $?
  94. cat $x509.signer $x509.keyid || exit $?
  95. # Preface each signature integer with a 2-byte BE length
  96. perl -e "binmode STDOUT; print pack(\"n\", $siglen)" || exit $?
  97. cat $src.sig || exit $?
  98. # Generate the information block
  99. perl -e "binmode STDOUT; print pack(\"CCCCCxxxN\", $algo, $hash, $id_type, $signerlen, $keyidlen, $siglen + 2)" || exit $?
  100. ) >$dst~ || exit $?
  101. # Permit in-place signing
  102. mv $dst~ $dst || exit $?