blob: f338e73275994b9d76d4da3b0532d0a46bb00ef7 [file] [log] [blame]
AKASHI Takahiro593e17d2020-04-14 11:51:39 +09001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * Copyright (c) 2018 Patrick Wildt <patrick@blueri.se>
4 * Copyright (c) 2019 Linaro Limited, Author: AKASHI Takahiro
5 */
6
AKASHI Takahiro593e17d2020-04-14 11:51:39 +09007#include <charset.h>
8#include <efi_loader.h>
Heinrich Schuchardt02fef8b2021-09-09 08:25:08 +02009#include <efi_variable.h>
AKASHI Takahiro593e17d2020-04-14 11:51:39 +090010#include <image.h>
11#include <hexdump.h>
12#include <malloc.h>
AKASHI Takahiro1115edd2020-07-21 19:35:22 +090013#include <crypto/pkcs7.h>
AKASHI Takahiroe3f5c9c2020-04-21 09:38:17 +090014#include <crypto/pkcs7_parser.h>
AKASHI Takahiro1115edd2020-07-21 19:35:22 +090015#include <crypto/public_key.h>
AKASHI Takahiro593e17d2020-04-14 11:51:39 +090016#include <linux/compat.h>
17#include <linux/oid_registry.h>
Masahisa Kojimaf6081a82021-05-14 09:53:36 +090018#include <u-boot/hash-checksum.h>
AKASHI Takahiro593e17d2020-04-14 11:51:39 +090019#include <u-boot/rsa.h>
20#include <u-boot/sha256.h>
AKASHI Takahiro593e17d2020-04-14 11:51:39 +090021
AKASHI Takahiro593e17d2020-04-14 11:51:39 +090022const efi_guid_t efi_guid_sha256 = EFI_CERT_SHA256_GUID;
23const efi_guid_t efi_guid_cert_rsa2048 = EFI_CERT_RSA2048_GUID;
24const efi_guid_t efi_guid_cert_x509 = EFI_CERT_X509_GUID;
25const efi_guid_t efi_guid_cert_x509_sha256 = EFI_CERT_X509_SHA256_GUID;
Ilias Apalodimasb436cc62022-05-06 15:36:00 +030026const efi_guid_t efi_guid_cert_x509_sha384 = EFI_CERT_X509_SHA384_GUID;
27const efi_guid_t efi_guid_cert_x509_sha512 = EFI_CERT_X509_SHA512_GUID;
AKASHI Takahiroa4292ec2020-05-29 15:41:18 +090028const efi_guid_t efi_guid_cert_type_pkcs7 = EFI_CERT_TYPE_PKCS7_GUID;
AKASHI Takahiro593e17d2020-04-14 11:51:39 +090029
Sughosh Ganu201b8062020-12-30 19:27:07 +053030static u8 pkcs7_hdr[] = {
31 /* SEQUENCE */
32 0x30, 0x82, 0x05, 0xc7,
33 /* OID: pkcs7-signedData */
34 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x02,
35 /* Context Structured? */
36 0xa0, 0x82, 0x05, 0xb8,
37};
38
39/**
40 * efi_parse_pkcs7_header - parse a signature in payload
41 * @buf: Pointer to payload's value
42 * @buflen: Length of @buf
43 * @tmpbuf: Pointer to temporary buffer
44 *
45 * Parse a signature embedded in payload's value and instantiate
46 * a pkcs7_message structure. Since pkcs7_parse_message() accepts only
47 * pkcs7's signedData, some header needed be prepended for correctly
48 * parsing authentication data
49 * A temporary buffer will be allocated if needed, and it should be
50 * kept valid during the authentication because some data in the buffer
51 * will be referenced by efi_signature_verify().
52 *
53 * Return: Pointer to pkcs7_message structure on success, NULL on error
54 */
55struct pkcs7_message *efi_parse_pkcs7_header(const void *buf,
56 size_t buflen,
57 u8 **tmpbuf)
58{
59 u8 *ebuf;
60 size_t ebuflen, len;
61 struct pkcs7_message *msg;
62
63 /*
64 * This is the best assumption to check if the binary is
65 * already in a form of pkcs7's signedData.
66 */
67 if (buflen > sizeof(pkcs7_hdr) &&
68 !memcmp(&((u8 *)buf)[4], &pkcs7_hdr[4], 11)) {
69 msg = pkcs7_parse_message(buf, buflen);
70 if (IS_ERR(msg))
71 return NULL;
72 return msg;
73 }
74
75 /*
76 * Otherwise, we should add a dummy prefix sequence for pkcs7
77 * message parser to be able to process.
78 * NOTE: EDK2 also uses similar hack in WrapPkcs7Data()
79 * in CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyCommon.c
80 * TODO:
81 * The header should be composed in a more refined manner.
82 */
83 EFI_PRINT("Makeshift prefix added to authentication data\n");
84 ebuflen = sizeof(pkcs7_hdr) + buflen;
85 if (ebuflen <= 0x7f) {
86 EFI_PRINT("Data is too short\n");
87 return NULL;
88 }
89
90 ebuf = malloc(ebuflen);
91 if (!ebuf) {
92 EFI_PRINT("Out of memory\n");
93 return NULL;
94 }
95
96 memcpy(ebuf, pkcs7_hdr, sizeof(pkcs7_hdr));
97 memcpy(ebuf + sizeof(pkcs7_hdr), buf, buflen);
98 len = ebuflen - 4;
99 ebuf[2] = (len >> 8) & 0xff;
100 ebuf[3] = len & 0xff;
101 len = ebuflen - 0x13;
102 ebuf[0x11] = (len >> 8) & 0xff;
103 ebuf[0x12] = len & 0xff;
104
105 msg = pkcs7_parse_message(ebuf, ebuflen);
106
107 if (IS_ERR(msg)) {
108 free(ebuf);
109 return NULL;
110 }
111
112 *tmpbuf = ebuf;
113 return msg;
114}
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900115
116/**
117 * efi_hash_regions - calculate a hash value
AKASHI Takahiro1e64d0b2020-07-08 14:01:55 +0900118 * @regs: Array of regions
119 * @count: Number of regions
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900120 * @hash: Pointer to a pointer to buffer holding a hash value
121 * @size: Size of buffer to be returned
122 *
123 * Calculate a sha256 value of @regs and return a value in @hash.
124 *
125 * Return: true on success, false on error
126 */
AKASHI Takahirob3301402022-07-05 14:48:12 +0900127bool efi_hash_regions(struct image_region *regs, int count,
128 void **hash, const char *hash_algo, int *len)
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900129{
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300130 int ret, hash_len;
131
132 if (!hash_algo)
133 return false;
134
135 hash_len = algo_to_len(hash_algo);
136 if (!hash_len)
137 return false;
138
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900139 if (!*hash) {
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300140 *hash = calloc(1, hash_len);
AKASHI Takahiro1e64d0b2020-07-08 14:01:55 +0900141 if (!*hash) {
142 EFI_PRINT("Out of memory\n");
143 return false;
144 }
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900145 }
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900146
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300147 ret = hash_calculate(hash_algo, regs, count, *hash);
148 if (ret)
149 return false;
150
151 if (len)
152 *len = hash_len;
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900153#ifdef DEBUG
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900154 EFI_PRINT("hash calculated:\n");
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900155 print_hex_dump(" ", DUMP_PREFIX_OFFSET, 16, 1,
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300156 *hash, hash_len, false);
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900157#endif
158
159 return true;
160}
161
162/**
Ilias Apalodimas4b634312022-01-29 00:20:31 +0200163 * hash_algo_supported - check if the requested hash algorithm is supported
164 * @guid: guid of the algorithm
165 *
166 * Return: true if supported false otherwise
167 */
168static bool hash_algo_supported(const efi_guid_t guid)
169{
170 int i;
171 const efi_guid_t unsupported_hashes[] = {
172 EFI_CERT_SHA1_GUID,
173 EFI_CERT_SHA224_GUID,
174 EFI_CERT_SHA384_GUID,
175 EFI_CERT_SHA512_GUID,
176 };
177
178 for (i = 0; i < ARRAY_SIZE(unsupported_hashes); i++) {
179 if (!guidcmp(&unsupported_hashes[i], &guid))
180 return false;
181 }
182
183 return true;
184}
185
186/**
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900187 * efi_signature_lookup_digest - search for an image's digest in sigdb
188 * @regs: List of regions to be authenticated
189 * @db: Signature database for trusted certificates
Ilias Apalodimas4b634312022-01-29 00:20:31 +0200190 * @dbx Caller needs to set this to true if he is searching dbx
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900191 *
192 * A message digest of image pointed to by @regs is calculated and
193 * its hash value is compared to entries in signature database pointed
194 * to by @db.
195 *
196 * Return: true if found, false if not
197 */
198bool efi_signature_lookup_digest(struct efi_image_regions *regs,
Ilias Apalodimas4b634312022-01-29 00:20:31 +0200199 struct efi_signature_store *db,
200 bool dbx)
201
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900202{
203 struct efi_signature_store *siglist;
204 struct efi_sig_data *sig_data;
205 void *hash = NULL;
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900206 bool found = false;
Ilias Apalodimas5ee900c2022-01-29 00:20:32 +0200207 bool hash_done = false;
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900208
209 EFI_PRINT("%s: Enter, %p, %p\n", __func__, regs, db);
210
211 if (!regs || !db || !db->sig_data_list)
212 goto out;
213
214 for (siglist = db; siglist; siglist = siglist->next) {
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300215 int len = 0;
216 const char *hash_algo = NULL;
Ilias Apalodimas4b634312022-01-29 00:20:31 +0200217 /*
218 * if the hash algorithm is unsupported and we get an entry in
219 * dbx reject the image
220 */
221 if (dbx && !hash_algo_supported(siglist->sig_type)) {
222 found = true;
223 continue;
224 };
225 /*
226 * Only support sha256 for now, that's what
227 * hash-to-efi-sig-list produces
228 */
229 if (guidcmp(&siglist->sig_type, &efi_guid_sha256))
230 continue;
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900231
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300232 hash_algo = guid_to_sha_str(&efi_guid_sha256);
233 /*
234 * We could check size and hash_algo but efi_hash_regions()
235 * will do that for us
236 */
Ilias Apalodimas5ee900c2022-01-29 00:20:32 +0200237 if (!hash_done &&
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300238 !efi_hash_regions(regs->reg, regs->num, &hash, hash_algo,
239 &len)) {
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900240 EFI_PRINT("Digesting an image failed\n");
241 break;
242 }
Ilias Apalodimas5ee900c2022-01-29 00:20:32 +0200243 hash_done = true;
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900244
245 for (sig_data = siglist->sig_data_list; sig_data;
246 sig_data = sig_data->next) {
247#ifdef DEBUG
248 EFI_PRINT("Msg digest in database:\n");
249 print_hex_dump(" ", DUMP_PREFIX_OFFSET, 16, 1,
250 sig_data->data, sig_data->size, false);
251#endif
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300252 if (sig_data->size == len &&
253 !memcmp(sig_data->data, hash, len)) {
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900254 found = true;
255 free(hash);
256 goto out;
257 }
258 }
259
260 free(hash);
261 hash = NULL;
262 }
263
264out:
265 EFI_PRINT("%s: Exit, found: %d\n", __func__, found);
266 return found;
267}
268
269/**
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900270 * efi_lookup_certificate - find a certificate within db
271 * @msg: Signature
272 * @db: Signature database
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900273 *
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900274 * Search signature database pointed to by @db and find a certificate
275 * pointed to by @cert.
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900276 *
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900277 * Return: true if found, false otherwise.
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900278 */
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900279static bool efi_lookup_certificate(struct x509_certificate *cert,
280 struct efi_signature_store *db)
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900281{
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900282 struct efi_signature_store *siglist;
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900283 struct efi_sig_data *sig_data;
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900284 struct image_region reg[1];
285 void *hash = NULL, *hash_tmp = NULL;
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300286 int len = 0;
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900287 bool found = false;
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300288 const char *hash_algo = NULL;
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900289
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900290 EFI_PRINT("%s: Enter, %p, %p\n", __func__, cert, db);
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900291
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900292 if (!cert || !db || !db->sig_data_list)
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900293 goto out;
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900294
295 /*
296 * TODO: identify a certificate using sha256 digest
297 * Is there any better way?
298 */
299 /* calculate hash of TBSCertificate */
300 reg[0].data = cert->tbs;
301 reg[0].size = cert->tbs_size;
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300302
303 /* We just need any sha256 algo to start the matching */
304 hash_algo = guid_to_sha_str(&efi_guid_sha256);
305 if (!efi_hash_regions(reg, 1, &hash, hash_algo, &len))
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900306 goto out;
307
308 EFI_PRINT("%s: searching for %s\n", __func__, cert->subject);
309 for (siglist = db; siglist; siglist = siglist->next) {
310 /* only with x509 certificate */
311 if (guidcmp(&siglist->sig_type, &efi_guid_cert_x509))
312 continue;
313
314 for (sig_data = siglist->sig_data_list; sig_data;
315 sig_data = sig_data->next) {
316 struct x509_certificate *cert_tmp;
317
318 cert_tmp = x509_cert_parse(sig_data->data,
319 sig_data->size);
320 if (IS_ERR_OR_NULL(cert_tmp))
321 continue;
322
AKASHI Takahiro52956e52020-08-14 14:39:23 +0900323 EFI_PRINT("%s: against %s\n", __func__,
324 cert_tmp->subject);
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900325 reg[0].data = cert_tmp->tbs;
326 reg[0].size = cert_tmp->tbs_size;
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300327 if (!efi_hash_regions(reg, 1, &hash_tmp, hash_algo,
328 NULL))
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900329 goto out;
330
331 x509_free_certificate(cert_tmp);
332
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300333 if (!memcmp(hash, hash_tmp, len)) {
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900334 found = true;
335 goto out;
336 }
337 }
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900338 }
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900339out:
340 free(hash);
341 free(hash_tmp);
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900342
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900343 EFI_PRINT("%s: Exit, found: %d\n", __func__, found);
344 return found;
345}
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900346
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900347/**
348 * efi_verify_certificate - verify certificate's signature with database
349 * @signer: Certificate
350 * @db: Signature database
351 * @root: Certificate to verify @signer
352 *
353 * Determine if certificate pointed to by @signer may be verified
354 * by one of certificates in signature database pointed to by @db.
355 *
356 * Return: true if certificate is verified, false otherwise.
357 */
358static bool efi_verify_certificate(struct x509_certificate *signer,
359 struct efi_signature_store *db,
360 struct x509_certificate **root)
361{
362 struct efi_signature_store *siglist;
363 struct efi_sig_data *sig_data;
364 struct x509_certificate *cert;
365 bool verified = false;
366 int ret;
367
368 EFI_PRINT("%s: Enter, %p, %p\n", __func__, signer, db);
369
370 if (!signer || !db || !db->sig_data_list)
371 goto out;
372
373 for (siglist = db; siglist; siglist = siglist->next) {
374 /* only with x509 certificate */
375 if (guidcmp(&siglist->sig_type, &efi_guid_cert_x509))
376 continue;
377
378 for (sig_data = siglist->sig_data_list; sig_data;
379 sig_data = sig_data->next) {
380 cert = x509_cert_parse(sig_data->data, sig_data->size);
381 if (IS_ERR_OR_NULL(cert)) {
382 EFI_PRINT("Cannot parse x509 certificate\n");
383 continue;
384 }
385
386 ret = public_key_verify_signature(cert->pub,
387 signer->sig);
388 if (!ret) {
389 verified = true;
390 if (root)
391 *root = cert;
392 else
393 x509_free_certificate(cert);
394 goto out;
395 }
396 x509_free_certificate(cert);
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900397 }
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900398 }
399
400out:
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900401 EFI_PRINT("%s: Exit, verified: %d\n", __func__, verified);
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900402 return verified;
403}
404
405/**
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900406 * efi_signature_check_revocation - check revocation with dbx
407 * @sinfo: Signer's info
408 * @cert: x509 certificate
409 * @dbx: Revocation signature database
410 *
411 * Search revocation signature database pointed to by @dbx and find
412 * an entry matching to certificate pointed to by @cert.
413 *
414 * While this entry contains revocation time, we don't support timestamp
415 * protocol at this time and any image will be unconditionally revoked
416 * when this match occurs.
417 *
AKASHI Takahiro52956e52020-08-14 14:39:23 +0900418 * Return: true if check passed (not found), false otherwise.
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900419 */
420static bool efi_signature_check_revocation(struct pkcs7_signed_info *sinfo,
421 struct x509_certificate *cert,
422 struct efi_signature_store *dbx)
423{
424 struct efi_signature_store *siglist;
425 struct efi_sig_data *sig_data;
426 struct image_region reg[1];
427 void *hash = NULL;
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300428 int len = 0;
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900429 time64_t revoc_time;
430 bool revoked = false;
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300431 const char *hash_algo = NULL;
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900432
433 EFI_PRINT("%s: Enter, %p, %p, %p\n", __func__, sinfo, cert, dbx);
434
435 if (!sinfo || !cert || !dbx || !dbx->sig_data_list)
436 goto out;
437
438 EFI_PRINT("Checking revocation against %s\n", cert->subject);
439 for (siglist = dbx; siglist; siglist = siglist->next) {
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300440 hash_algo = guid_to_sha_str(&siglist->sig_type);
441 if (!hash_algo)
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900442 continue;
443
444 /* calculate hash of TBSCertificate */
445 reg[0].data = cert->tbs;
446 reg[0].size = cert->tbs_size;
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300447 if (!efi_hash_regions(reg, 1, &hash, hash_algo, &len))
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900448 goto out;
449
450 for (sig_data = siglist->sig_data_list; sig_data;
451 sig_data = sig_data->next) {
452 /*
453 * struct efi_cert_x509_sha256 {
454 * u8 tbs_hash[256/8];
455 * time64_t revocation_time;
456 * };
457 */
458#ifdef DEBUG
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300459 if (sig_data->size >= len) {
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900460 EFI_PRINT("hash in db:\n");
461 print_hex_dump(" ", DUMP_PREFIX_OFFSET,
462 16, 1,
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300463 sig_data->data, len, false);
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900464 }
465#endif
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300466 if ((sig_data->size < len + sizeof(time64_t)) ||
467 memcmp(sig_data->data, hash, len))
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900468 continue;
469
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300470 memcpy(&revoc_time, sig_data->data + len,
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900471 sizeof(revoc_time));
472 EFI_PRINT("revocation time: 0x%llx\n", revoc_time);
473 /*
474 * TODO: compare signing timestamp in sinfo
475 * with revocation time
476 */
477
478 revoked = true;
479 free(hash);
480 goto out;
481 }
482 free(hash);
483 hash = NULL;
484 }
485out:
486 EFI_PRINT("%s: Exit, revoked: %d\n", __func__, revoked);
487 return !revoked;
488}
489
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900490/*
491 * efi_signature_verify - verify signatures with db and dbx
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900492 * @regs: List of regions to be authenticated
493 * @msg: Signature
494 * @db: Signature database for trusted certificates
495 * @dbx: Revocation signature database
496 *
497 * All the signature pointed to by @msg against image pointed to by @regs
498 * will be verified by signature database pointed to by @db and @dbx.
499 *
500 * Return: true if verification for all signatures passed, false otherwise
501 */
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900502bool efi_signature_verify(struct efi_image_regions *regs,
503 struct pkcs7_message *msg,
504 struct efi_signature_store *db,
505 struct efi_signature_store *dbx)
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900506{
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900507 struct pkcs7_signed_info *sinfo;
508 struct x509_certificate *signer, *root;
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900509 bool verified = false;
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900510 int ret;
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900511
512 EFI_PRINT("%s: Enter, %p, %p, %p, %p\n", __func__, regs, msg, db, dbx);
513
AKASHI Takahiro7926dfb2020-07-08 14:01:57 +0900514 if (!regs || !msg || !db || !db->sig_data_list)
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900515 goto out;
516
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900517 for (sinfo = msg->signed_infos; sinfo; sinfo = sinfo->next) {
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900518 EFI_PRINT("Signed Info: digest algo: %s, pkey algo: %s\n",
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900519 sinfo->sig->hash_algo, sinfo->sig->pkey_algo);
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900520
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900521 /*
522 * only for authenticated variable.
523 *
524 * If this function is called for image,
525 * hash calculation will be done in
526 * pkcs7_verify_one().
527 */
528 if (!msg->data &&
529 !efi_hash_regions(regs->reg, regs->num,
Ilias Apalodimasb436cc62022-05-06 15:36:00 +0300530 (void **)&sinfo->sig->digest,
531 guid_to_sha_str(&efi_guid_sha256),
532 NULL)) {
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900533 EFI_PRINT("Digesting an image failed\n");
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900534 goto out;
535 }
536
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900537 EFI_PRINT("Verifying certificate chain\n");
538 signer = NULL;
539 ret = pkcs7_verify_one(msg, sinfo, &signer);
540 if (ret == -ENOPKG)
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900541 continue;
542
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900543 if (ret < 0 || !signer)
544 goto out;
545
546 if (sinfo->blacklisted)
547 goto out;
548
549 EFI_PRINT("Verifying last certificate in chain\n");
Ilias Apalodimasbdcc0a92022-02-14 11:14:22 +0200550 if (efi_lookup_certificate(signer, db))
551 if (efi_signature_check_revocation(sinfo, signer, dbx))
552 break;
553 if (!signer->self_signed &&
554 efi_verify_certificate(signer, db, &root)) {
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900555 bool check;
556
557 check = efi_signature_check_revocation(sinfo, root,
558 dbx);
559 x509_free_certificate(root);
560 if (check)
AKASHI Takahiro52956e52020-08-14 14:39:23 +0900561 break;
AKASHI Takahiro1115edd2020-07-21 19:35:22 +0900562 }
563
564 EFI_PRINT("Certificate chain didn't reach trusted CA\n");
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900565 }
AKASHI Takahiro52956e52020-08-14 14:39:23 +0900566 if (sinfo)
567 verified = true;
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900568out:
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900569 EFI_PRINT("%s: Exit, verified: %d\n", __func__, verified);
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900570 return verified;
571}
572
573/**
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900574 * efi_signature_check_signers - check revocation against all signers with dbx
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900575 * @msg: Signature
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900576 * @dbx: Revocation signature database
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900577 *
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900578 * Determine if none of signers' certificates in @msg are revoked
579 * by signature database pointed to by @dbx.
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900580 *
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900581 * Return: true if all signers passed, false otherwise.
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900582 */
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900583bool efi_signature_check_signers(struct pkcs7_message *msg,
584 struct efi_signature_store *dbx)
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900585{
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900586 struct pkcs7_signed_info *sinfo;
587 bool revoked = false;
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900588
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900589 EFI_PRINT("%s: Enter, %p, %p\n", __func__, msg, dbx);
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900590
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900591 if (!msg || !dbx)
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900592 goto out;
593
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900594 for (sinfo = msg->signed_infos; sinfo; sinfo = sinfo->next) {
595 if (sinfo->signer &&
596 !efi_signature_check_revocation(sinfo, sinfo->signer,
597 dbx)) {
598 revoked = true;
599 break;
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900600 }
601 }
602out:
AKASHI Takahiro11bafb22020-07-08 14:01:56 +0900603 EFI_PRINT("%s: Exit, revoked: %d\n", __func__, revoked);
604 return !revoked;
AKASHI Takahiro593e17d2020-04-14 11:51:39 +0900605}
606
607/**
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900608 * efi_sigstore_free - free signature store
609 * @sigstore: Pointer to signature store structure
610 *
611 * Feee all the memories held in signature store and itself,
612 * which were allocated by efi_sigstore_parse_sigdb().
613 */
614void efi_sigstore_free(struct efi_signature_store *sigstore)
615{
616 struct efi_signature_store *sigstore_next;
617 struct efi_sig_data *sig_data, *sig_data_next;
618
619 while (sigstore) {
620 sigstore_next = sigstore->next;
621
622 sig_data = sigstore->sig_data_list;
623 while (sig_data) {
624 sig_data_next = sig_data->next;
625 free(sig_data->data);
626 free(sig_data);
627 sig_data = sig_data_next;
628 }
629
630 free(sigstore);
631 sigstore = sigstore_next;
632 }
633}
634
635/**
636 * efi_sigstore_parse_siglist - parse a signature list
637 * @name: Pointer to signature list
638 *
639 * Parse signature list and instantiate a signature store structure.
640 * Signature database is a simple concatenation of one or more
641 * signature list(s).
642 *
643 * Return: Pointer to signature store on success, NULL on error
644 */
645static struct efi_signature_store *
646efi_sigstore_parse_siglist(struct efi_signature_list *esl)
647{
648 struct efi_signature_store *siglist = NULL;
649 struct efi_sig_data *sig_data, *sig_data_next;
650 struct efi_signature_data *esd;
651 size_t left;
652
653 /*
654 * UEFI specification defines certificate types:
655 * for non-signed images,
656 * EFI_CERT_SHA256_GUID
657 * EFI_CERT_RSA2048_GUID
658 * EFI_CERT_RSA2048_SHA256_GUID
659 * EFI_CERT_SHA1_GUID
660 * EFI_CERT_RSA2048_SHA_GUID
661 * EFI_CERT_SHA224_GUID
662 * EFI_CERT_SHA384_GUID
663 * EFI_CERT_SHA512_GUID
664 *
665 * for signed images,
666 * EFI_CERT_X509_GUID
667 * NOTE: Each certificate will normally be in a separate
668 * EFI_SIGNATURE_LIST as the size may vary depending on
669 * its algo's.
670 *
671 * for timestamp revocation of certificate,
672 * EFI_CERT_X509_SHA512_GUID
673 * EFI_CERT_X509_SHA256_GUID
674 * EFI_CERT_X509_SHA384_GUID
675 */
676
677 if (esl->signature_list_size
678 <= (sizeof(*esl) + esl->signature_header_size)) {
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900679 EFI_PRINT("Siglist in wrong format\n");
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900680 return NULL;
681 }
682
683 /* Create a head */
684 siglist = calloc(sizeof(*siglist), 1);
685 if (!siglist) {
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900686 EFI_PRINT("Out of memory\n");
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900687 goto err;
688 }
689 memcpy(&siglist->sig_type, &esl->signature_type, sizeof(efi_guid_t));
690
691 /* Go through the list */
692 sig_data_next = NULL;
693 left = esl->signature_list_size
694 - (sizeof(*esl) + esl->signature_header_size);
695 esd = (struct efi_signature_data *)
696 ((u8 *)esl + sizeof(*esl) + esl->signature_header_size);
697
AKASHI Takahiro964d5322020-04-21 09:38:57 +0900698 while (left > 0) {
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900699 /* Signature must exist if there is remaining data. */
700 if (left < esl->signature_size) {
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900701 EFI_PRINT("Certificate is too small\n");
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900702 goto err;
703 }
704
705 sig_data = calloc(esl->signature_size
706 - sizeof(esd->signature_owner), 1);
707 if (!sig_data) {
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900708 EFI_PRINT("Out of memory\n");
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900709 goto err;
710 }
711
712 /* Append signature data */
713 memcpy(&sig_data->owner, &esd->signature_owner,
714 sizeof(efi_guid_t));
715 sig_data->size = esl->signature_size
716 - sizeof(esd->signature_owner);
717 sig_data->data = malloc(sig_data->size);
718 if (!sig_data->data) {
AKASHI Takahiro3e9019d2020-06-09 14:09:33 +0900719 EFI_PRINT("Out of memory\n");
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900720 goto err;
721 }
722 memcpy(sig_data->data, esd->signature_data, sig_data->size);
723
724 sig_data->next = sig_data_next;
725 sig_data_next = sig_data;
726
727 /* Next */
728 esd = (struct efi_signature_data *)
729 ((u8 *)esd + esl->signature_size);
730 left -= esl->signature_size;
731 }
732 siglist->sig_data_list = sig_data_next;
733
734 return siglist;
735
736err:
737 efi_sigstore_free(siglist);
738
739 return NULL;
740}
741
742/**
Sughosh Ganub4f20a52020-12-30 19:27:08 +0530743 * efi_sigstore_parse_sigdb - parse the signature list and populate
744 * the signature store
745 *
746 * @sig_list: Pointer to the signature list
747 * @size: Size of the signature list
748 *
749 * Parse the efi signature list and instantiate a signature store
750 * structure.
751 *
752 * Return: Pointer to signature store on success, NULL on error
753 */
754struct efi_signature_store *efi_build_signature_store(void *sig_list,
755 efi_uintn_t size)
756{
757 struct efi_signature_list *esl;
758 struct efi_signature_store *sigstore = NULL, *siglist;
759
760 esl = sig_list;
761 while (size > 0) {
762 /* List must exist if there is remaining data. */
763 if (size < sizeof(*esl)) {
764 EFI_PRINT("Signature list in wrong format\n");
765 goto err;
766 }
767
768 if (size < esl->signature_list_size) {
769 EFI_PRINT("Signature list in wrong format\n");
770 goto err;
771 }
772
773 /* Parse a single siglist. */
774 siglist = efi_sigstore_parse_siglist(esl);
775 if (!siglist) {
776 EFI_PRINT("Parsing of signature list of failed\n");
777 goto err;
778 }
779
780 /* Append siglist */
781 siglist->next = sigstore;
782 sigstore = siglist;
783
784 /* Next */
785 size -= esl->signature_list_size;
786 esl = (void *)esl + esl->signature_list_size;
787 }
788 free(sig_list);
789
790 return sigstore;
791
792err:
793 efi_sigstore_free(sigstore);
794 free(sig_list);
795
796 return NULL;
797}
798
799/**
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900800 * efi_sigstore_parse_sigdb - parse a signature database variable
801 * @name: Variable's name
802 *
803 * Read in a value of signature database variable pointed to by
804 * @name, parse it and instantiate a signature store structure.
805 *
806 * Return: Pointer to signature store on success, NULL on error
807 */
808struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name)
809{
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900810 const efi_guid_t *vendor;
811 void *db;
812 efi_uintn_t db_size;
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900813
Heinrich Schuchardt02fef8b2021-09-09 08:25:08 +0200814 vendor = efi_auth_var_get_guid(name);
815 db = efi_get_var(name, vendor, &db_size);
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900816 if (!db) {
Heinrich Schuchardt02fef8b2021-09-09 08:25:08 +0200817 EFI_PRINT("variable, %ls, not found\n", name);
818 return calloc(sizeof(struct efi_signature_store), 1);
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900819 }
820
Sughosh Ganub4f20a52020-12-30 19:27:08 +0530821 return efi_build_signature_store(db, db_size);
AKASHI Takahirobe6296d2020-04-14 11:51:40 +0900822}