blob: 2fd0a60366b091bf2c2e0828174e3a9429fc7204 [file] [log] [blame]
/*
* Copyright 2012 <James.Bottomley@HansenPartnership.com>
*
* see COPYING file
*/
#include <stdint.h>
#define __STDC_VERSION__ 199901L
#include <efi.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <openssl/pem.h>
#include <openssl/err.h>
#include <variables.h>
#include <guid.h>
int
main(int argc, char *argv[])
{
char *certfile, *efifile, *name;
const char *progname = argv[0];
if (argc != 3) {
printf("Usage: %s <efi sig list file> <cert file base name>\n", progname);
exit(1);
}
efifile = argv[1];
certfile = argv[2];
name = malloc(strlen(certfile)+10);
int fd = open(efifile, O_RDONLY);
if (fd < 0) {
fprintf(stderr, "Failed to open file %s: ", efifile);
perror("");
exit(1);
}
struct stat st;
if (fstat(fd, &st) < 0) {
fprintf(stderr, "Failed to stat file %s: ", efifile);
perror("");
exit(1);
}
void *buf = malloc(st.st_size);
if (!buf) {
fprintf(stderr, "Malloc failed: ");
perror("");
exit(1);
}
if (read(fd, buf, st.st_size) != st.st_size) {
fprintf(stderr, "Failed to read %d bytes from %s: ",
(int)st.st_size, efifile);
perror("");
exit(1);
}
close(fd);
EFI_SIGNATURE_LIST *sl;
int s, count = 0;
certlist_for_each_certentry(sl, buf, s, st.st_size) {
EFI_SIGNATURE_DATA *sd;
const char *ext;
certentry_for_each_cert(sd, sl) {
if (memcmp(&sl->SignatureType, &EFI_CERT_X509_GUID, sizeof(EFI_GUID)) == 0) {
printf("X509 ");
ext = "der";
} else if (memcmp(&sl->SignatureType, &EFI_CERT_TYPE_PKCS7_GUID, sizeof(EFI_GUID)) == 0) {
printf("PKCS7 ");
ext = "pk7";
} else if (memcmp(&sl->SignatureType, &EFI_CERT_RSA2048_GUID, sizeof(EFI_GUID)) == 0) {
printf("RSA2048 ");
ext = "rsa";
} else if (memcmp(&sl->SignatureType, &EFI_CERT_SHA256_GUID, sizeof(EFI_GUID)) == 0) {
printf("SHA256 ");
ext = "hash";
} else {
printf("UNKNOWN ");
ext = "txt";
}
printf("Header sls=%d, header=%d, sig=%d\n",
sl->SignatureListSize, sl->SignatureHeaderSize, sl->SignatureSize - (UINT32)OFFSET_OF(EFI_SIGNATURE_DATA, SignatureData));
EFI_GUID *guid = &sd->SignatureOwner;
sprintf(name, "%s-%d.%s",certfile,count++,ext);
printf("file %s: Guid %s\n", name, guid_to_str(guid));
FILE *g = fopen(name, "w");
fwrite(sd->SignatureData, 1, sl->SignatureSize - OFFSET_OF(EFI_SIGNATURE_DATA, SignatureData), g);
printf("Written %d bytes\n", sl->SignatureSize - (UINT32)OFFSET_OF(EFI_SIGNATURE_DATA, SignatureData));
fclose(g);
}
}
return 0;
}