mirror of
https://git.proxmox.com/git/efi-boot-shim
synced 2025-08-07 21:05:25 +00:00
Merge signature.h into efiauthenticated.h and guid.h
Conflicts: shim.c
This commit is contained in:
parent
40375a8bea
commit
53862ddace
4
Makefile
4
Makefile
@ -38,7 +38,7 @@ VERSION = 0.4
|
|||||||
TARGET = shim.efi MokManager.efi.signed fallback.efi.signed
|
TARGET = shim.efi MokManager.efi.signed fallback.efi.signed
|
||||||
OBJS = shim.o netboot.o cert.o dbx.o
|
OBJS = shim.o netboot.o cert.o dbx.o
|
||||||
KEYS = shim_cert.h ocsp.* ca.* shim.crt shim.csr shim.p12 shim.pem shim.key
|
KEYS = shim_cert.h ocsp.* ca.* shim.crt shim.csr shim.p12 shim.pem shim.key
|
||||||
SOURCES = shim.c shim.h netboot.c signature.h include/PeImage.h include/wincert.h
|
SOURCES = shim.c shim.h netboot.c include/PeImage.h include/wincert.h
|
||||||
MOK_OBJS = MokManager.o PasswordCrypt.o crypt_blowfish.o
|
MOK_OBJS = MokManager.o PasswordCrypt.o crypt_blowfish.o
|
||||||
MOK_SOURCES = MokManager.c shim.h console_control.h PasswordCrypt.c PasswordCrypt.h crypt_blowfish.c crypt_blowfish.h
|
MOK_SOURCES = MokManager.c shim.h console_control.h PasswordCrypt.c PasswordCrypt.h crypt_blowfish.c crypt_blowfish.h
|
||||||
FALLBACK_OBJS = fallback.o
|
FALLBACK_OBJS = fallback.o
|
||||||
@ -71,7 +71,7 @@ cert.o : cert.S
|
|||||||
dbx.o : dbx.S
|
dbx.o : dbx.S
|
||||||
$(CC) $(CFLAGS) -c -o $@ $<
|
$(CC) $(CFLAGS) -c -o $@ $<
|
||||||
|
|
||||||
shim.so: $(OBJS) Cryptlib/libcryptlib.a Cryptlib/OpenSSL/libopenssl.a
|
shim.so: $(OBJS) Cryptlib/libcryptlib.a Cryptlib/OpenSSL/libopenssl.a lib/lib.a
|
||||||
$(LD) -o $@ $(LDFLAGS) $^ $(EFI_LIBS)
|
$(LD) -o $@ $(LDFLAGS) $^ $(EFI_LIBS)
|
||||||
|
|
||||||
fallback.o: $(FALLBACK_SRCS)
|
fallback.o: $(FALLBACK_SRCS)
|
||||||
|
19
MokManager.c
19
MokManager.c
@ -4,12 +4,13 @@
|
|||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include "console_control.h"
|
#include "console_control.h"
|
||||||
#include "shim.h"
|
#include "shim.h"
|
||||||
#include "signature.h"
|
|
||||||
#include "PeImage.h"
|
#include "PeImage.h"
|
||||||
#include "PasswordCrypt.h"
|
#include "PasswordCrypt.h"
|
||||||
|
|
||||||
#include "include/console.h"
|
#include "guid.h"
|
||||||
#include "include/simple_file.h"
|
#include "console.h"
|
||||||
|
#include "simple_file.h"
|
||||||
|
#include "efiauthenticated.h"
|
||||||
|
|
||||||
#define PASSWORD_MAX 256
|
#define PASSWORD_MAX 256
|
||||||
#define PASSWORD_MIN 1
|
#define PASSWORD_MIN 1
|
||||||
@ -115,8 +116,8 @@ done:
|
|||||||
static UINT32 count_keys(void *Data, UINTN DataSize)
|
static UINT32 count_keys(void *Data, UINTN DataSize)
|
||||||
{
|
{
|
||||||
EFI_SIGNATURE_LIST *CertList = Data;
|
EFI_SIGNATURE_LIST *CertList = Data;
|
||||||
EFI_GUID CertType = EfiCertX509Guid;
|
EFI_GUID CertType = X509_GUID;
|
||||||
EFI_GUID HashType = EfiHashSha256Guid;
|
EFI_GUID HashType = EFI_CERT_SHA256_GUID;
|
||||||
UINTN dbsize = DataSize;
|
UINTN dbsize = DataSize;
|
||||||
UINT32 MokNum = 0;
|
UINT32 MokNum = 0;
|
||||||
|
|
||||||
@ -152,8 +153,8 @@ static MokListNode *build_mok_list(UINT32 num, void *Data, UINTN DataSize) {
|
|||||||
MokListNode *list;
|
MokListNode *list;
|
||||||
EFI_SIGNATURE_LIST *CertList = Data;
|
EFI_SIGNATURE_LIST *CertList = Data;
|
||||||
EFI_SIGNATURE_DATA *Cert;
|
EFI_SIGNATURE_DATA *Cert;
|
||||||
EFI_GUID CertType = EfiCertX509Guid;
|
EFI_GUID CertType = X509_GUID;
|
||||||
EFI_GUID HashType = EfiHashSha256Guid;
|
EFI_GUID HashType = EFI_CERT_SHA256_GUID;
|
||||||
UINTN dbsize = DataSize;
|
UINTN dbsize = DataSize;
|
||||||
UINTN count = 0;
|
UINTN count = 0;
|
||||||
|
|
||||||
@ -1271,7 +1272,7 @@ static EFI_STATUS enroll_file (void *data, UINTN datasize, BOOLEAN hash)
|
|||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
CertList = mokbuffer;
|
CertList = mokbuffer;
|
||||||
CertList->SignatureType = EfiHashSha256Guid;
|
CertList->SignatureType = EFI_CERT_SHA256_GUID;
|
||||||
CertList->SignatureSize = 16 + SHA256_DIGEST_SIZE;
|
CertList->SignatureSize = 16 + SHA256_DIGEST_SIZE;
|
||||||
CertData = (EFI_SIGNATURE_DATA *)(((UINT8 *)mokbuffer) +
|
CertData = (EFI_SIGNATURE_DATA *)(((UINT8 *)mokbuffer) +
|
||||||
sizeof(EFI_SIGNATURE_LIST));
|
sizeof(EFI_SIGNATURE_LIST));
|
||||||
@ -1285,7 +1286,7 @@ static EFI_STATUS enroll_file (void *data, UINTN datasize, BOOLEAN hash)
|
|||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
CertList = mokbuffer;
|
CertList = mokbuffer;
|
||||||
CertList->SignatureType = EfiCertX509Guid;
|
CertList->SignatureType = X509_GUID;
|
||||||
CertList->SignatureSize = 16 + datasize;
|
CertList->SignatureSize = 16 + datasize;
|
||||||
|
|
||||||
memcpy(mokbuffer + sizeof(EFI_SIGNATURE_LIST) + 16, data,
|
memcpy(mokbuffer + sizeof(EFI_SIGNATURE_LIST) + 16, data,
|
||||||
|
@ -12,6 +12,7 @@ extern EFI_GUID RSA2048_GUID;
|
|||||||
extern EFI_GUID PKCS7_GUID;
|
extern EFI_GUID PKCS7_GUID;
|
||||||
extern EFI_GUID IMAGE_PROTOCOL;
|
extern EFI_GUID IMAGE_PROTOCOL;
|
||||||
extern EFI_GUID SIMPLE_FS_PROTOCOL;
|
extern EFI_GUID SIMPLE_FS_PROTOCOL;
|
||||||
|
extern EFI_GUID EFI_CERT_SHA1_GUID;
|
||||||
extern EFI_GUID EFI_CERT_SHA256_GUID;
|
extern EFI_GUID EFI_CERT_SHA256_GUID;
|
||||||
extern EFI_GUID MOK_OWNER;
|
extern EFI_GUID MOK_OWNER;
|
||||||
extern EFI_GUID SECURITY_PROTOCOL_GUID;
|
extern EFI_GUID SECURITY_PROTOCOL_GUID;
|
||||||
|
@ -41,6 +41,7 @@ EFI_GUID RSA2048_GUID = { 0x3c5766e8, 0x269c, 0x4e34, {0xaa, 0x14, 0xed, 0x77, 0
|
|||||||
EFI_GUID PKCS7_GUID = { 0x4aafd29d, 0x68df, 0x49ee, {0x8a, 0xa9, 0x34, 0x7d, 0x37, 0x56, 0x65, 0xa7} };
|
EFI_GUID PKCS7_GUID = { 0x4aafd29d, 0x68df, 0x49ee, {0x8a, 0xa9, 0x34, 0x7d, 0x37, 0x56, 0x65, 0xa7} };
|
||||||
EFI_GUID IMAGE_PROTOCOL = LOADED_IMAGE_PROTOCOL;
|
EFI_GUID IMAGE_PROTOCOL = LOADED_IMAGE_PROTOCOL;
|
||||||
EFI_GUID SIMPLE_FS_PROTOCOL = SIMPLE_FILE_SYSTEM_PROTOCOL;
|
EFI_GUID SIMPLE_FS_PROTOCOL = SIMPLE_FILE_SYSTEM_PROTOCOL;
|
||||||
|
EFI_GUID EFI_CERT_SHA1_GUID = { 0x826ca512, 0xcf10, 0x4ac9, {0xb1, 0x87, 0xbe, 0x1, 0x49, 0x66, 0x31, 0xbd }};
|
||||||
EFI_GUID EFI_CERT_SHA256_GUID = { 0xc1c41626, 0x504c, 0x4092, { 0xac, 0xa9, 0x41, 0xf9, 0x36, 0x93, 0x43, 0x28 } };
|
EFI_GUID EFI_CERT_SHA256_GUID = { 0xc1c41626, 0x504c, 0x4092, { 0xac, 0xa9, 0x41, 0xf9, 0x36, 0x93, 0x43, 0x28 } };
|
||||||
EFI_GUID MOK_OWNER = { 0x605dab50, 0xe046, 0x4300, {0xab, 0xb6, 0x3d, 0xd8, 0x10, 0xdd, 0x8b, 0x23} };
|
EFI_GUID MOK_OWNER = { 0x605dab50, 0xe046, 0x4300, {0xab, 0xb6, 0x3d, 0xd8, 0x10, 0xdd, 0x8b, 0x23} };
|
||||||
EFI_GUID SECURITY_PROTOCOL_GUID = { 0xA46423E3, 0x4617, 0x49f1, {0xB9, 0xFF, 0xD1, 0xBF, 0xA9, 0x11, 0x58, 0x39 } };
|
EFI_GUID SECURITY_PROTOCOL_GUID = { 0xA46423E3, 0x4617, 0x49f1, {0xB9, 0xFF, 0xD1, 0xBF, 0xA9, 0x11, 0x58, 0x39 } };
|
||||||
|
20
shim.c
20
shim.c
@ -38,11 +38,13 @@
|
|||||||
#include <Library/BaseCryptLib.h>
|
#include <Library/BaseCryptLib.h>
|
||||||
#include "PeImage.h"
|
#include "PeImage.h"
|
||||||
#include "shim.h"
|
#include "shim.h"
|
||||||
#include "signature.h"
|
|
||||||
#include "netboot.h"
|
#include "netboot.h"
|
||||||
#include "shim_cert.h"
|
#include "shim_cert.h"
|
||||||
#include "ucs2.h"
|
#include "ucs2.h"
|
||||||
|
|
||||||
|
#include "guid.h"
|
||||||
|
#include "efiauthenticated.h"
|
||||||
|
|
||||||
#define FALLBACK L"\\fallback.efi"
|
#define FALLBACK L"\\fallback.efi"
|
||||||
#define MOK_MANAGER L"\\MokManager.efi"
|
#define MOK_MANAGER L"\\MokManager.efi"
|
||||||
|
|
||||||
@ -228,7 +230,7 @@ static CHECK_STATUS check_db_cert_in_ram(EFI_SIGNATURE_LIST *CertList,
|
|||||||
EFI_SIGNATURE_DATA *Cert;
|
EFI_SIGNATURE_DATA *Cert;
|
||||||
UINTN CertCount, Index;
|
UINTN CertCount, Index;
|
||||||
BOOLEAN IsFound = FALSE;
|
BOOLEAN IsFound = FALSE;
|
||||||
EFI_GUID CertType = EfiCertX509Guid;
|
EFI_GUID CertType = X509_GUID;
|
||||||
|
|
||||||
while ((dbsize > 0) && (dbsize >= CertList->SignatureListSize)) {
|
while ((dbsize > 0) && (dbsize >= CertList->SignatureListSize)) {
|
||||||
if (CompareGuid (&CertList->SignatureType, &CertType) == 0) {
|
if (CompareGuid (&CertList->SignatureType, &CertType) == 0) {
|
||||||
@ -364,11 +366,11 @@ static EFI_STATUS check_blacklist (WIN_CERTIFICATE_EFI_PKCS *cert,
|
|||||||
EFI_SIGNATURE_LIST *dbx = (EFI_SIGNATURE_LIST *)vendor_dbx;
|
EFI_SIGNATURE_LIST *dbx = (EFI_SIGNATURE_LIST *)vendor_dbx;
|
||||||
|
|
||||||
if (check_db_hash_in_ram(dbx, vendor_dbx_size, sha256hash,
|
if (check_db_hash_in_ram(dbx, vendor_dbx_size, sha256hash,
|
||||||
SHA256_DIGEST_SIZE, EfiHashSha256Guid) ==
|
SHA256_DIGEST_SIZE, EFI_CERT_SHA256_GUID) ==
|
||||||
DATA_FOUND)
|
DATA_FOUND)
|
||||||
return EFI_ACCESS_DENIED;
|
return EFI_ACCESS_DENIED;
|
||||||
if (check_db_hash_in_ram(dbx, vendor_dbx_size, sha1hash,
|
if (check_db_hash_in_ram(dbx, vendor_dbx_size, sha1hash,
|
||||||
SHA1_DIGEST_SIZE, EfiHashSha1Guid) ==
|
SHA1_DIGEST_SIZE, EFI_CERT_SHA1_GUID) ==
|
||||||
DATA_FOUND)
|
DATA_FOUND)
|
||||||
return EFI_ACCESS_DENIED;
|
return EFI_ACCESS_DENIED;
|
||||||
if (check_db_cert_in_ram(dbx, vendor_dbx_size, cert,
|
if (check_db_cert_in_ram(dbx, vendor_dbx_size, cert,
|
||||||
@ -376,10 +378,10 @@ static EFI_STATUS check_blacklist (WIN_CERTIFICATE_EFI_PKCS *cert,
|
|||||||
return EFI_ACCESS_DENIED;
|
return EFI_ACCESS_DENIED;
|
||||||
|
|
||||||
if (check_db_hash(L"dbx", secure_var, sha256hash, SHA256_DIGEST_SIZE,
|
if (check_db_hash(L"dbx", secure_var, sha256hash, SHA256_DIGEST_SIZE,
|
||||||
EfiHashSha256Guid) == DATA_FOUND)
|
EFI_CERT_SHA256_GUID) == DATA_FOUND)
|
||||||
return EFI_ACCESS_DENIED;
|
return EFI_ACCESS_DENIED;
|
||||||
if (check_db_hash(L"dbx", secure_var, sha1hash, SHA1_DIGEST_SIZE,
|
if (check_db_hash(L"dbx", secure_var, sha1hash, SHA1_DIGEST_SIZE,
|
||||||
EfiHashSha1Guid) == DATA_FOUND)
|
EFI_CERT_SHA1_GUID) == DATA_FOUND)
|
||||||
return EFI_ACCESS_DENIED;
|
return EFI_ACCESS_DENIED;
|
||||||
if (check_db_cert(L"dbx", secure_var, cert, sha256hash) == DATA_FOUND)
|
if (check_db_cert(L"dbx", secure_var, cert, sha256hash) == DATA_FOUND)
|
||||||
return EFI_ACCESS_DENIED;
|
return EFI_ACCESS_DENIED;
|
||||||
@ -397,13 +399,13 @@ static EFI_STATUS check_whitelist (WIN_CERTIFICATE_EFI_PKCS *cert,
|
|||||||
EFI_GUID shim_var = SHIM_LOCK_GUID;
|
EFI_GUID shim_var = SHIM_LOCK_GUID;
|
||||||
|
|
||||||
if (check_db_hash(L"db", secure_var, sha256hash, SHA256_DIGEST_SIZE,
|
if (check_db_hash(L"db", secure_var, sha256hash, SHA256_DIGEST_SIZE,
|
||||||
EfiHashSha256Guid) == DATA_FOUND)
|
EFI_CERT_SHA256_GUID) == DATA_FOUND)
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
if (check_db_hash(L"db", secure_var, sha1hash, SHA1_DIGEST_SIZE,
|
if (check_db_hash(L"db", secure_var, sha1hash, SHA1_DIGEST_SIZE,
|
||||||
EfiHashSha1Guid) == DATA_FOUND)
|
EFI_CERT_SHA1_GUID) == DATA_FOUND)
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
if (check_db_hash(L"MokList", shim_var, sha256hash, SHA256_DIGEST_SIZE,
|
if (check_db_hash(L"MokList", shim_var, sha256hash, SHA256_DIGEST_SIZE,
|
||||||
EfiHashSha256Guid) == DATA_FOUND)
|
EFI_CERT_SHA256_GUID) == DATA_FOUND)
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
if (check_db_cert(L"db", secure_var, cert, sha256hash) == DATA_FOUND)
|
if (check_db_cert(L"db", secure_var, cert, sha256hash) == DATA_FOUND)
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
|
43
signature.h
43
signature.h
@ -1,43 +0,0 @@
|
|||||||
#define SHA256_DIGEST_SIZE 32
|
|
||||||
|
|
||||||
EFI_GUID EfiHashSha1Guid = { 0x826ca512, 0xcf10, 0x4ac9, {0xb1, 0x87, 0xbe, 0x1, 0x49, 0x66, 0x31, 0xbd }};
|
|
||||||
EFI_GUID EfiHashSha256Guid = { 0xc1c41626, 0x504c, 0x4092, {0xac, 0xa9, 0x41, 0xf9, 0x36, 0x93, 0x43, 0x28 }};
|
|
||||||
EFI_GUID EfiCertX509Guid = { 0xa5c059a1, 0x94e4, 0x4aa7, {0x87, 0xb5, 0xab, 0x15, 0x5c, 0x2b, 0xf0, 0x72 }};
|
|
||||||
|
|
||||||
typedef struct {
|
|
||||||
///
|
|
||||||
/// An identifier which identifies the agent which added the signature to the list.
|
|
||||||
///
|
|
||||||
EFI_GUID SignatureOwner;
|
|
||||||
///
|
|
||||||
/// The format of the signature is defined by the SignatureType.
|
|
||||||
///
|
|
||||||
UINT8 SignatureData[1];
|
|
||||||
} __attribute__ ((packed)) EFI_SIGNATURE_DATA;
|
|
||||||
|
|
||||||
typedef struct {
|
|
||||||
///
|
|
||||||
/// Type of the signature. GUID signature types are defined in below.
|
|
||||||
///
|
|
||||||
EFI_GUID SignatureType;
|
|
||||||
///
|
|
||||||
/// Total size of the signature list, including this header.
|
|
||||||
///
|
|
||||||
UINT32 SignatureListSize;
|
|
||||||
///
|
|
||||||
/// Size of the signature header which precedes the array of signatures.
|
|
||||||
///
|
|
||||||
UINT32 SignatureHeaderSize;
|
|
||||||
///
|
|
||||||
/// Size of each signature.
|
|
||||||
///
|
|
||||||
UINT32 SignatureSize;
|
|
||||||
///
|
|
||||||
/// Header before the array of signatures. The format of this header is specified
|
|
||||||
/// by the SignatureType.
|
|
||||||
/// UINT8 SignatureHeader[SignatureHeaderSize];
|
|
||||||
///
|
|
||||||
/// An array of signatures. Each signature is SignatureSize bytes in length.
|
|
||||||
/// EFI_SIGNATURE_DATA Signatures[][SignatureSize];
|
|
||||||
///
|
|
||||||
} __attribute__ ((packed)) EFI_SIGNATURE_LIST;
|
|
Loading…
Reference in New Issue
Block a user