blob: 6e0bebf1d41d75a403216a1955d6b7fd6b79e207 [file] [log] [blame]
Masahisa Kojimac3b5af62022-11-20 09:21:18 +09001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * Menu-driven UEFI Secure Boot Key Maintenance
4 *
5 * Copyright (c) 2022 Masahisa Kojima, Linaro Limited
6 */
7
8#include <ansi.h>
9#include <common.h>
10#include <charset.h>
11#include <hexdump.h>
12#include <log.h>
13#include <malloc.h>
14#include <menu.h>
15#include <efi_loader.h>
16#include <efi_config.h>
17#include <efi_variable.h>
18#include <crypto/pkcs7_parser.h>
19
Masahisa Kojimad0f9ae32022-11-20 09:21:19 +090020struct eficonfig_sig_data {
21 struct efi_signature_list *esl;
22 struct efi_signature_data *esd;
23 struct list_head list;
24 u16 *varname;
25};
26
Masahisa Kojimac3b5af62022-11-20 09:21:18 +090027enum efi_sbkey_signature_type {
28 SIG_TYPE_X509 = 0,
29 SIG_TYPE_HASH,
30 SIG_TYPE_CRL,
31 SIG_TYPE_RSA2048,
32};
33
34struct eficonfig_sigtype_to_str {
35 efi_guid_t sig_type;
36 char *str;
37 enum efi_sbkey_signature_type type;
38};
39
40static const struct eficonfig_sigtype_to_str sigtype_to_str[] = {
41 {EFI_CERT_X509_GUID, "X509", SIG_TYPE_X509},
42 {EFI_CERT_SHA256_GUID, "SHA256", SIG_TYPE_HASH},
43 {EFI_CERT_X509_SHA256_GUID, "X509_SHA256 CRL", SIG_TYPE_CRL},
44 {EFI_CERT_X509_SHA384_GUID, "X509_SHA384 CRL", SIG_TYPE_CRL},
45 {EFI_CERT_X509_SHA512_GUID, "X509_SHA512 CRL", SIG_TYPE_CRL},
46 /* U-Boot does not support the following signature types */
47/* {EFI_CERT_RSA2048_GUID, "RSA2048", SIG_TYPE_RSA2048}, */
48/* {EFI_CERT_RSA2048_SHA256_GUID, "RSA2048_SHA256", SIG_TYPE_RSA2048}, */
49/* {EFI_CERT_SHA1_GUID, "SHA1", SIG_TYPE_HASH}, */
50/* {EFI_CERT_RSA2048_SHA_GUID, "RSA2048_SHA", SIG_TYPE_RSA2048 }, */
51/* {EFI_CERT_SHA224_GUID, "SHA224", SIG_TYPE_HASH}, */
52/* {EFI_CERT_SHA384_GUID, "SHA384", SIG_TYPE_HASH}, */
53/* {EFI_CERT_SHA512_GUID, "SHA512", SIG_TYPE_HASH}, */
54};
55
56/**
57 * file_have_auth_header() - check file has EFI_VARIABLE_AUTHENTICATION_2 header
58 * @buf: pointer to file
59 * @size: file size
60 * Return: true if file has auth header, false otherwise
61 */
62static bool file_have_auth_header(void *buf, efi_uintn_t size)
63{
64 struct efi_variable_authentication_2 *auth = buf;
65
66 if (auth->auth_info.hdr.wCertificateType != WIN_CERT_TYPE_EFI_GUID)
67 return false;
68
69 if (guidcmp(&auth->auth_info.cert_type, &efi_guid_cert_type_pkcs7))
70 return false;
71
72 return true;
73}
74
75/**
76 * eficonfig_process_enroll_key() - enroll key into signature database
77 *
78 * @data: pointer to the data for each entry
79 * Return: status code
80 */
81static efi_status_t eficonfig_process_enroll_key(void *data)
82{
83 u32 attr;
84 char *buf = NULL;
85 efi_uintn_t size;
86 efi_status_t ret;
87 struct efi_file_handle *f = NULL;
88 struct efi_device_path *full_dp = NULL;
89 struct eficonfig_select_file_info file_info;
90
91 file_info.current_path = calloc(1, EFICONFIG_FILE_PATH_BUF_SIZE);
92 if (!file_info.current_path) {
93 ret = EFI_OUT_OF_RESOURCES;
94 goto out;
95 }
96
97 ret = eficonfig_process_select_file(&file_info);
98 if (ret != EFI_SUCCESS)
99 goto out;
100
101 full_dp = eficonfig_create_device_path(file_info.dp_volume, file_info.current_path);
102 if (!full_dp) {
103 ret = EFI_OUT_OF_RESOURCES;
104 goto out;
105 }
106 f = efi_file_from_path(full_dp);
107 if (!f) {
108 ret = EFI_NOT_FOUND;
109 goto out;
110 }
111
112 size = 0;
113 ret = EFI_CALL(f->getinfo(f, &efi_file_info_guid, &size, NULL));
114 if (ret != EFI_BUFFER_TOO_SMALL)
115 goto out;
116
117 buf = malloc(size);
118 if (!buf) {
119 ret = EFI_OUT_OF_RESOURCES;
120 goto out;
121 }
122 ret = EFI_CALL(f->getinfo(f, &efi_file_info_guid, &size, buf));
123 if (ret != EFI_SUCCESS)
124 goto out;
125
126 size = ((struct efi_file_info *)buf)->file_size;
127 free(buf);
128
129 if (!size) {
130 eficonfig_print_msg("ERROR! File is empty.");
131 ret = EFI_INVALID_PARAMETER;
132 goto out;
133 }
134
135 buf = malloc(size);
136 if (!buf) {
137 ret = EFI_OUT_OF_RESOURCES;
138 goto out;
139 }
140
141 ret = EFI_CALL(f->read(f, &size, buf));
142 if (ret != EFI_SUCCESS) {
143 eficonfig_print_msg("ERROR! Failed to read file.");
144 goto out;
145 }
146 if (!file_have_auth_header(buf, size)) {
147 eficonfig_print_msg("ERROR! Invalid file format. Only .auth variables is allowed.");
148 ret = EFI_INVALID_PARAMETER;
149 goto out;
150 }
151
152 attr = EFI_VARIABLE_NON_VOLATILE |
153 EFI_VARIABLE_BOOTSERVICE_ACCESS |
154 EFI_VARIABLE_RUNTIME_ACCESS |
155 EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS;
156
157 /* PK can enroll only one certificate */
158 if (u16_strcmp(data, u"PK")) {
159 efi_uintn_t db_size = 0;
160
161 /* check the variable exists. If exists, add APPEND_WRITE attribute */
162 ret = efi_get_variable_int(data, efi_auth_var_get_guid(data), NULL,
163 &db_size, NULL, NULL);
164 if (ret == EFI_BUFFER_TOO_SMALL)
165 attr |= EFI_VARIABLE_APPEND_WRITE;
166 }
167
168 ret = efi_set_variable_int((u16 *)data, efi_auth_var_get_guid((u16 *)data),
169 attr, size, buf, false);
170 if (ret != EFI_SUCCESS)
171 eficonfig_print_msg("ERROR! Failed to update signature database");
172
173out:
174 free(file_info.current_path);
175 free(buf);
176 efi_free_pool(full_dp);
177 if (f)
178 EFI_CALL(f->close(f));
179
180 /* return to the parent menu */
181 ret = (ret == EFI_ABORTED) ? EFI_NOT_READY : ret;
182
183 return ret;
184}
185
Masahisa Kojimad0f9ae32022-11-20 09:21:19 +0900186/**
187 * eficonfig_process_show_siglist() - show signature list content
188 *
189 * @data: pointer to the data for each entry
190 * Return: status code
191 */
192static efi_status_t eficonfig_process_show_siglist(void *data)
193{
194 u32 i;
195 struct eficonfig_sig_data *sg = data;
196
197 puts(ANSI_CURSOR_HIDE);
198 puts(ANSI_CLEAR_CONSOLE);
199 printf(ANSI_CURSOR_POSITION, 1, 1);
200
201 printf("\n ** Show Signature Database (%ls) **\n\n"
202 " Owner GUID:\n"
203 " %pUL\n",
204 sg->varname, sg->esd->signature_owner.b);
205
206 for (i = 0; i < ARRAY_SIZE(sigtype_to_str); i++) {
207 if (!guidcmp(&sg->esl->signature_type, &sigtype_to_str[i].sig_type)) {
208 printf(" Signature Type:\n"
209 " %s\n", sigtype_to_str[i].str);
210
211 switch (sigtype_to_str[i].type) {
212 case SIG_TYPE_X509:
213 {
214 struct x509_certificate *cert_tmp;
215
216 cert_tmp = x509_cert_parse(sg->esd->signature_data,
217 sg->esl->signature_size);
218 printf(" Subject:\n"
219 " %s\n"
220 " Issuer:\n"
221 " %s\n",
222 cert_tmp->subject, cert_tmp->issuer);
223 break;
224 }
225 case SIG_TYPE_CRL:
226 {
227 u32 hash_size = sg->esl->signature_size - sizeof(efi_guid_t) -
228 sizeof(struct efi_time);
229 struct efi_time *time =
230 (struct efi_time *)((u8 *)sg->esd->signature_data +
231 hash_size);
232
233 printf(" ToBeSignedHash:\n");
234 print_hex_dump(" ", DUMP_PREFIX_NONE, 16, 1,
235 sg->esd->signature_data, hash_size, false);
236 printf(" TimeOfRevocation:\n"
237 " %d-%d-%d %02d:%02d:%02d\n",
238 time->year, time->month, time->day,
239 time->hour, time->minute, time->second);
240 break;
241 }
242 case SIG_TYPE_HASH:
243 {
244 u32 hash_size = sg->esl->signature_size - sizeof(efi_guid_t);
245
246 printf(" Hash:\n");
247 print_hex_dump(" ", DUMP_PREFIX_NONE, 16, 1,
248 sg->esd->signature_data, hash_size, false);
249 break;
250 }
251 default:
252 eficonfig_print_msg("ERROR! Unsupported format.");
253 return EFI_INVALID_PARAMETER;
254 }
255 }
256 }
257
258 while (tstc())
259 getchar();
260
261 printf("\n\n Press any key to continue");
262 getchar();
263
264 return EFI_SUCCESS;
265}
266
267/**
268 * prepare_signature_list_menu() - create the signature list menu entry
269 *
270 * @efimenu: pointer to the efimenu structure
271 * @varname: pointer to the variable name
272 * @db: pointer to the variable raw data
273 * @db_size: variable data size
274 * @func: callback of each entry
275 * Return: status code
276 */
277static efi_status_t prepare_signature_list_menu(struct efimenu *efi_menu, void *varname,
278 void *db, efi_uintn_t db_size,
279 eficonfig_entry_func func)
280{
281 u32 num = 0;
282 efi_uintn_t size;
283 struct eficonfig_sig_data *sg;
284 struct efi_signature_list *esl;
285 struct efi_signature_data *esd;
286 efi_status_t ret = EFI_SUCCESS;
287
288 INIT_LIST_HEAD(&efi_menu->list);
289
290 esl = db;
291 size = db_size;
292 while (size > 0) {
293 u32 remain;
294
295 esd = (struct efi_signature_data *)((u8 *)esl +
296 (sizeof(struct efi_signature_list) +
297 esl->signature_header_size));
298 remain = esl->signature_list_size - sizeof(struct efi_signature_list) -
299 esl->signature_header_size;
300 for (; remain > 0; remain -= esl->signature_size) {
301 char buf[37];
302 char *title;
303
304 if (num >= EFICONFIG_ENTRY_NUM_MAX - 1) {
305 ret = EFI_OUT_OF_RESOURCES;
306 goto out;
307 }
308
309 sg = calloc(1, sizeof(struct eficonfig_sig_data));
310 if (!sg) {
311 ret = EFI_OUT_OF_RESOURCES;
312 goto err;
313 }
314
315 snprintf(buf, sizeof(buf), "%pUL", &esd->signature_owner);
316 title = strdup(buf);
317 if (!title) {
318 free(sg);
319 ret = EFI_OUT_OF_RESOURCES;
320 goto err;
321 }
322
323 sg->esl = esl;
324 sg->esd = esd;
325 sg->varname = varname;
326 ret = eficonfig_append_menu_entry(efi_menu, title, func, sg);
327 if (ret != EFI_SUCCESS) {
328 free(sg);
329 free(title);
330 goto err;
331 }
332 esd = (struct efi_signature_data *)((u8 *)esd + esl->signature_size);
333 num++;
334 }
335
336 size -= esl->signature_list_size;
337 esl = (struct efi_signature_list *)((u8 *)esl + esl->signature_list_size);
338 }
339out:
340 ret = eficonfig_append_quit_entry(efi_menu);
341err:
342 return ret;
343}
344
345/**
346 * enumerate_and_show_signature_database() - enumerate and show the signature database
347 *
348 * @data: pointer to the data for each entry
349 * Return: status code
350 */
351static efi_status_t enumerate_and_show_signature_database(void *varname)
352{
353 void *db;
354 char buf[50];
355 efi_status_t ret;
356 efi_uintn_t db_size;
357 struct efimenu *efi_menu;
358 struct list_head *pos, *n;
359 struct eficonfig_entry *entry;
360
361 db = efi_get_var(varname, efi_auth_var_get_guid(varname), &db_size);
362 if (!db) {
363 eficonfig_print_msg("There is no entry in the signature database.");
364 return EFI_NOT_FOUND;
365 }
366
367 efi_menu = calloc(1, sizeof(struct efimenu));
368 if (!efi_menu) {
369 free(db);
370 return EFI_OUT_OF_RESOURCES;
371 }
372
373 ret = prepare_signature_list_menu(efi_menu, varname, db, db_size,
374 eficonfig_process_show_siglist);
375 if (ret != EFI_SUCCESS)
376 goto out;
377
378 snprintf(buf, sizeof(buf), " ** Show Signature Database (%ls) **", (u16 *)varname);
379 ret = eficonfig_process_common(efi_menu, buf);
380out:
381 list_for_each_safe(pos, n, &efi_menu->list) {
382 entry = list_entry(pos, struct eficonfig_entry, list);
383 free(entry->data);
384 }
385 eficonfig_destroy(efi_menu);
386 free(db);
387
388 return ret;
389}
390
391/**
392 * eficonfig_process_show_signature_database() - process show signature database
393 *
394 * @data: pointer to the data for each entry
395 * Return: status code
396 */
397static efi_status_t eficonfig_process_show_signature_database(void *data)
398{
399 efi_status_t ret;
400
401 while (1) {
402 ret = enumerate_and_show_signature_database(data);
403 if (ret != EFI_SUCCESS && ret != EFI_NOT_READY)
404 break;
405 }
406
407 /* return to the parent menu */
408 ret = (ret == EFI_ABORTED) ? EFI_NOT_READY : ret;
409
410 return ret;
411}
412
Masahisa Kojimac3b5af62022-11-20 09:21:18 +0900413static struct eficonfig_item key_config_menu_items[] = {
414 {"Enroll New Key", eficonfig_process_enroll_key},
Masahisa Kojimad0f9ae32022-11-20 09:21:19 +0900415 {"Show Signature Database", eficonfig_process_show_signature_database},
Masahisa Kojimac3b5af62022-11-20 09:21:18 +0900416 {"Quit", eficonfig_process_quit},
417};
418
419/**
420 * eficonfig_process_set_secure_boot_key() - display the key configuration menu
421 *
422 * @data: pointer to the data for each entry
423 * Return: status code
424 */
425static efi_status_t eficonfig_process_set_secure_boot_key(void *data)
426{
427 u32 i;
428 efi_status_t ret;
429 char header_str[32];
430 struct efimenu *efi_menu;
431
432 for (i = 0; i < ARRAY_SIZE(key_config_menu_items); i++)
433 key_config_menu_items[i].data = data;
434
435 snprintf(header_str, sizeof(header_str), " ** Configure %ls **", (u16 *)data);
436
437 while (1) {
438 efi_menu = eficonfig_create_fixed_menu(key_config_menu_items,
439 ARRAY_SIZE(key_config_menu_items));
440
441 ret = eficonfig_process_common(efi_menu, header_str);
442 eficonfig_destroy(efi_menu);
443
444 if (ret == EFI_ABORTED)
445 break;
446 }
447
448 /* return to the parent menu */
449 ret = (ret == EFI_ABORTED) ? EFI_NOT_READY : ret;
450
451 return ret;
452}
453
454static const struct eficonfig_item secure_boot_menu_items[] = {
455 {"PK", eficonfig_process_set_secure_boot_key, u"PK"},
456 {"KEK", eficonfig_process_set_secure_boot_key, u"KEK"},
457 {"db", eficonfig_process_set_secure_boot_key, u"db"},
458 {"dbx", eficonfig_process_set_secure_boot_key, u"dbx"},
459 {"Quit", eficonfig_process_quit},
460};
461
462/**
463 * eficonfig_process_secure_boot_config() - display the key list menu
464 *
465 * @data: pointer to the data for each entry
466 * Return: status code
467 */
468efi_status_t eficonfig_process_secure_boot_config(void *data)
469{
470 efi_status_t ret;
471 struct efimenu *efi_menu;
472
473 while (1) {
474 char header_str[64];
475
476 snprintf(header_str, sizeof(header_str),
477 " ** UEFI Secure Boot Key Configuration (SecureBoot : %s) **",
478 (efi_secure_boot_enabled() ? "ON" : "OFF"));
479
480 efi_menu = eficonfig_create_fixed_menu(secure_boot_menu_items,
481 ARRAY_SIZE(secure_boot_menu_items));
482 if (!efi_menu) {
483 ret = EFI_OUT_OF_RESOURCES;
484 break;
485 }
486
487 ret = eficonfig_process_common(efi_menu, header_str);
488 eficonfig_destroy(efi_menu);
489
490 if (ret == EFI_ABORTED)
491 break;
492 }
493
494 /* return to the parent menu */
495 ret = (ret == EFI_ABORTED) ? EFI_NOT_READY : ret;
496
497 return ret;
498}