CloverBootloader/rEFIt_UEFI/entry_scan/secureboot.cpp
jief666 9cb4016bc5 Final refactoring of plist : now each tag is a class.
Rename strerror to efiStrError because of conflict when run cpp_tests on
Mac.
Switch base64_decode_block to long to avoid warning and cast.
Correct GetTableType4(). Size was used without being initialized.
2020-08-25 18:35:19 +03:00

490 lines
16 KiB
C++

/*
* refit/scan/secureboot.c
*
* Copyright (c) 2006-2010 Christoph Pfisterer
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* * Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the
* distribution.
*
* * Neither the name of Christoph Pfisterer nor the names of the
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
//CONST INTN SecureBootDef = 0; // jief : not used ??
#ifdef ENABLE_SECURE_BOOT
#include "entry_scan.h"
#include <Protocol/Security.h>
#include <Protocol/Security2.h>
#ifndef DEBUG_ALL
#define DEBUG_SECURE_BOOT 1
#else
#define DEBUG_SECURE_BOOT DEBUG_ALL
#endif
#if DEBUG_SECURE_BOOT == 0
#define DBG(...)
#else
#define DBG(...) DebugLog(DEBUG_SECURE_BOOT, __VA_ARGS__)
#endif
// Enable secure boot
VOID EnableSecureBoot(VOID)
{
EFI_STATUS Status = EFI_NOT_FOUND;
BOOLEAN WantDefaultKeys;
CONST CHAR16 *ErrorString = NULL;
UINTN CloverSignatureSize = 0;
VOID *CloverSignature = NULL;
// Check in setup mode
if (gSettings.SecureBoot || !gSettings.SecureBootSetupMode) {
return;
}
// Ask user if they want to use default keys
WantDefaultKeys = YesNoMessage(L"Secure Boot", L"Enroll the default keys too?");
DBG("Enabling secure boot with%s default keys\n", WantDefaultKeys ? "" : "out");
// Get this image's certificate
if (SelfFullDevicePath != NULL) {
UINT32 AuthenticationStatus = 0;
UINTN FileSize = 0;
// Open the file buffer
VOID *FileBuffer = GetFileBufferByFilePath(FALSE, SelfFullDevicePath, &FileSize, &AuthenticationStatus);
if (FileBuffer != NULL) {
if (FileSize > 0) {
// Retrieve the certificates
CloverSignature = GetImageSignatureDatabase(FileBuffer, FileSize, &CloverSignatureSize, FALSE);
if (CloverSignature != NULL) {
if (CloverSignatureSize > 0) {
// Found signature
Status = EFI_SUCCESS;
} else {
FreePool(CloverSignature);
CloverSignature = NULL;
}
}
}
FreePool(FileBuffer);
}
// Check and alert about image not found
if ((FileBuffer == NULL) || (FileSize == 0)) {
CHAR16 *FilePath = FileDevicePathToStr(SelfFullDevicePath);
if (FilePath != NULL) {
DBG("Failed to load Clover image from %ls\n", FilePath);
FreePool(FilePath);
} else {
DBG("Failed to load Clover image\n");
}
}
}
if (EFI_ERROR(Status) || (CloverSignature == NULL)) {
ErrorString = L"Clover does not have a certificate";
} else {
// Enroll secure boot keys
Status = EnrollSecureBootKeys(CloverSignature, CloverSignatureSize, WantDefaultKeys);
if (EFI_ERROR(Status)) {
ErrorString = L"Failed to enroll secure boot keys";
}
FreePool(CloverSignature);
}
// Reinit secure boot now
InitializeSecureBoot();
// Install the security policy hooks or redisable
if (!EFI_ERROR(Status)) {
Status = InstallSecureBoot();
if (EFI_ERROR(Status)) {
ErrorString = L"Secure boot protocols not found";
}
}
if (EFI_ERROR(Status)) {
XStringW Str = SWPrintf("Enabling secure boot failed because\n%ls", ErrorString);
AlertMessage(L"Enable Secure Boot", Str);
DBG("Enabling secure boot failed because %ls! Status: %s\n", ErrorString.wc_str(), efiStrError(Status));
DisableSecureBoot();
}
}
CONST CHAR16 *SecureBootPolicyToStr(IN UINTN Policy)
{
STATIC CONST CHAR16 *SecureBootPolicyStrings[] = {
L"Deny",
L"Allow",
L"Query",
L"Insert",
L"WhiteList",
L"BlackList",
L"User",
};
STATIC CONST UINTN SecureBootPolicyStringsCount = (sizeof(SecureBootPolicyStrings) / (sizeof(CONST CHAR16 *)));
if (Policy < SecureBootPolicyStringsCount) {
return SecureBootPolicyStrings[Policy];
}
return L"Deny";
}
STATIC VOID PrintSecureBootInfo(VOID)
{
// Nothing to do if secure boot is disabled or in setup mode
if (!gSettings.SecureBoot) {
DBG("Secure Boot: %s\n", (gSettings.SecureBootSetupMode ? "Setup" : "Disabled"));
} else {
// Secure boot is enabled
DBG("Secure Boot: %s\n", (gSettings.SecureBootSetupMode ? "Forced" : "Enabled"));
DBG("Boot Policy: %ls\n", SecureBootPolicyToStr(gSettings.SecureBootPolicy));
}
}
// Alert message for disable failure
STATIC VOID DisableMessage(IN EFI_STATUS Status,
IN CHAR16 *String,
IN CHAR16 *ErrorString)
{
XStringW Str;
if (ErrorString != NULL) {
Str = SWPrintf(L"%ls\n%ls\n%ls", String, ErrorString, efiStrError(Status));
} else {
Str = SWPrintf(L"%s\n%s", String, efiStrError(Status));
}
DBG("Secure Boot: %ls", Str.wc_str());
AlertMessage(L"Disable Secure Boot", Str);
}
// Disable secure boot
VOID DisableSecureBoot(VOID)
{
EFI_STATUS Status;
CHAR16 *ErrorString = NULL;
// Check in user mode
if (gSettings.SecureBootSetupMode || !gSettings.SecureBoot) {
return;
}
UninstallSecureBoot();
// Clear the platform database
Status = ClearSecureBootKeys();
if (EFI_ERROR(Status)) {
ErrorString = L"Failed to clear platform database!\nIs Clover platform database owner?";
} else if (YesNoMessage(L"Disable Secure Boot", L"Do you want to clear all databases (suggested)?")) {
// Clear all databases if wanted
Status = SetSignatureDatabase(EXCHANGE_DATABASE_NAME, &EXCHANGE_DATABASE_GUID, NULL, 0);
if (EFI_ERROR(Status)) {
DisableMessage(Status, L"Failed to disable secure boot!", L"Failed to clear exchange database!");
}
Status = ClearAuthorizedDatabase();
if (EFI_ERROR(Status)) {
ErrorString = L"Failed to clear authorized database!";
}
}
// Alert failure to user
if (EFI_ERROR(Status)) {
DisableMessage(Status, L"Failed to disable secure boot!", ErrorString);
} else {
// Reinit secure boot now
InitializeSecureBoot();
PrintSecureBootInfo();
}
}
// The previous protocol functions
STATIC EFI_SECURITY_FILE_AUTHENTICATION_STATE gSecurityFileAuthentication;
STATIC EFI_SECURITY2_FILE_AUTHENTICATION gSecurity2FileAuthentication;
// Pre check the secure boot policy
STATIC BOOLEAN EFIAPI
PrecheckSecureBootPolicy(IN OUT EFI_STATUS *AuthenticationStatus,
IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath)
{
CHAR16 *DevicePathStr;
UINTN Index;
if ((AuthenticationStatus == NULL) || (DevicePath == NULL)) {
return FALSE;
}
switch (gSettings.SecureBootPolicy) {
case SECURE_BOOT_POLICY_ALLOW:
// Allow all images
*AuthenticationStatus = EFI_SUCCESS;
return TRUE;
case SECURE_BOOT_POLICY_WHITELIST:
// Check the white list for this image
DevicePathStr = FileDevicePathToStr((EFI_DEVICE_PATH_PROTOCOL *)DevicePath);
if (DevicePathStr == NULL) {
return FALSE;
}
for (Index = 0; Index < gSettings.SecureBootWhiteListCount; ++Index) {
if ((gSettings.SecureBootWhiteList[Index] != NULL) &&
(StriStr(DevicePathStr, gSettings.SecureBootWhiteList[Index]) != NULL)) {
// White listed
*AuthenticationStatus = EFI_SUCCESS;
return TRUE;
}
}
return TRUE;
case SECURE_BOOT_POLICY_BLACKLIST:
// Check the black list for this image
DevicePathStr = FileDevicePathToStr((EFI_DEVICE_PATH_PROTOCOL *)DevicePath);
if (DevicePathStr == NULL) {
return FALSE;
}
for (Index = 0; Index < gSettings.SecureBootBlackListCount; ++Index) {
if ((gSettings.SecureBootBlackList[Index] != NULL) &&
(StriStr(DevicePathStr, gSettings.SecureBootBlackList[Index]) != NULL)) {
// Black listed
return TRUE;
}
}
*AuthenticationStatus = EFI_SUCCESS;
return TRUE;
case SECURE_BOOT_POLICY_USER:
DevicePathStr = FileDevicePathToStr((EFI_DEVICE_PATH_PROTOCOL *)DevicePath);
if (DevicePathStr == NULL) {
return FALSE;
}
// Check the black list for this image
for (Index = 0; Index < gSettings.SecureBootBlackListCount; ++Index) {
if ((gSettings.SecureBootBlackList[Index] != NULL) &&
(StriStr(DevicePathStr, gSettings.SecureBootBlackList[Index]) != NULL)) {
// Black listed
return TRUE;
}
}
// Check the white list for this image
for (Index = 0; Index < gSettings.SecureBootWhiteListCount; ++Index) {
if ((gSettings.SecureBootWhiteList[Index] != NULL) &&
(StriStr(DevicePathStr, gSettings.SecureBootWhiteList[Index]) != NULL)) {
// White listed
*AuthenticationStatus = EFI_SUCCESS;
return TRUE;
}
}
break;
}
return FALSE;
}
// Check the secure boot policy
STATIC BOOLEAN EFIAPI
CheckSecureBootPolicy(IN OUT EFI_STATUS *AuthenticationStatus,
IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath,
IN VOID *FileBuffer,
IN UINTN FileSize)
{
UINTN UserResponse = SECURE_BOOT_POLICY_DENY;
switch (gSettings.SecureBootPolicy) {
case SECURE_BOOT_POLICY_QUERY:
case SECURE_BOOT_POLICY_USER:
// Query user to allow image or deny image or insert image signature
UserResponse = QuerySecureBootUser(DevicePath);
DBG("VerifySecureBootImage: User selected policy: %ls\n", SecureBootPolicyToStr(UserResponse));
// Perform user action
switch (UserResponse) {
case SECURE_BOOT_POLICY_ALLOW:
*AuthenticationStatus = EFI_SUCCESS;
case SECURE_BOOT_POLICY_DENY:
default:
return TRUE;
case SECURE_BOOT_POLICY_INSERT:
// If this is forced mode then no insert
if (gSettings.SecureBootSetupMode) {
return TRUE;
}
break;
}
// Purposeful fallback to insert
case SECURE_BOOT_POLICY_INSERT:
// Insert image signature
AppendImageToAuthorizedDatabase(DevicePath, FileBuffer, FileSize);
*AuthenticationStatus = EFI_SUCCESS;
return TRUE;
case SECURE_BOOT_POLICY_ALLOW:
// Allow all images
*AuthenticationStatus = EFI_SUCCESS;
return TRUE;
case SECURE_BOOT_POLICY_DENY:
// Deny all images
return TRUE;
}
return FALSE;
}
// Override EFI_SECURITY_ARCH_PROTOCOL
EFI_STATUS EFIAPI
InternalFileAuthentication(IN CONST EFI_SECURITY_ARCH_PROTOCOL *This,
IN UINT32 AuthenticationStatus,
IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath)
{
EFI_STATUS Status = EFI_SECURITY_VIOLATION;
// Check secure boot policy
if (!PrecheckSecureBootPolicy(&Status, DevicePath)) {
// Return original security policy
Status = gSecurityFileAuthentication(This, AuthenticationStatus, DevicePath);
if (EFI_ERROR(Status)) {
// Check security policy on image
CheckSecureBootPolicy(&Status, DevicePath, NULL, 0);
}
}
if (EFI_ERROR(Status)) {
CHAR16 *DevicePathStr = FileDevicePathToStr((EFI_DEVICE_PATH_PROTOCOL *)DevicePath);
if (DevicePathStr) {
DBG("VerifySecureBootImage(1): %s %ls\n", efiStrError(Status), DevicePathStr);
FreePool(DevicePathStr);
}
}
return Status;
}
// Override EFI_SECURITY2_ARCH_PROTOCOL
EFI_STATUS EFIAPI
Internal2FileAuthentication(IN CONST EFI_SECURITY2_ARCH_PROTOCOL *This,
IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath,
IN VOID *FileBuffer,
IN UINTN FileSize,
IN BOOLEAN BootPolicy)
{
EFI_STATUS Status = EFI_SECURITY_VIOLATION;
// Check secure boot policy
if (!PrecheckSecureBootPolicy(&Status, DevicePath)) {
// Return original security policy
Status = gSecurity2FileAuthentication(This, DevicePath, FileBuffer, FileSize, BootPolicy);
if (EFI_ERROR(Status)) {
CheckSecureBootPolicy(&Status, DevicePath, FileBuffer, FileSize);
}
}
if (EFI_ERROR(Status)) {
CHAR16 *DevicePathStr = FileDevicePathToStr((EFI_DEVICE_PATH_PROTOCOL *)DevicePath);
if (DevicePathStr) {
DBG("VerifySecureBootImage(2): %s %ls\n", efiStrError(Status), DevicePathStr);
FreePool(DevicePathStr);
}
}
return Status;
}
// Verify boot policy for image
EFI_STATUS VerifySecureBootImage(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath)
{
EFI_STATUS Status = EFI_SECURITY_VIOLATION;
if (!PrecheckSecureBootPolicy(&Status, DevicePath)) {
if (!CheckSecureBootPolicy(&Status, DevicePath, NULL, 0)) {
Status = EFI_SUCCESS;
}
}
if (EFI_ERROR(Status)) {
CHAR16 *DevicePathStr = FileDevicePathToStr((EFI_DEVICE_PATH_PROTOCOL *)DevicePath);
if (DevicePathStr) {
DBG("VerifySecureBootImage: %s %ls\n", efiStrError(Status), DevicePathStr);
FreePool(DevicePathStr);
}
}
return Status;
}
// Install secure boot
EFI_STATUS InstallSecureBoot(VOID)
{
EFI_STATUS Status;
EFI_SECURITY_ARCH_PROTOCOL *Security = NULL;
EFI_SECURITY2_ARCH_PROTOCOL *Security2 = NULL;
// Check if already installed
if (gSecurityFileAuthentication) {
return EFI_SUCCESS;
}
PrintSecureBootInfo();
// Nothing to do if secure boot is disabled or in setup mode
if (!gSettings.SecureBoot || gSettings.SecureBootSetupMode) {
return EFI_SUCCESS;
}
// Locate security protocols
gBS->LocateProtocol(&gEfiSecurity2ArchProtocolGuid, NULL, (VOID **)&Security2);
Status = gBS->LocateProtocol(&gEfiSecurityArchProtocolGuid, NULL, (VOID **)&Security);
if (EFI_ERROR(Status)) {
return Status;
}
if (Security == NULL) {
return EFI_NOT_FOUND;
}
// Install policy hooks
gSecurityFileAuthentication = Security->FileAuthenticationState;
Security->FileAuthenticationState = InternalFileAuthentication;
if (Security2) {
gSecurity2FileAuthentication = Security2->FileAuthentication;
Security2->FileAuthentication = Internal2FileAuthentication;
}
return EFI_SUCCESS;
}
// Uninstall secure boot
VOID UninstallSecureBoot(VOID)
{
// Uninstall policy hooks
if (gSecurityFileAuthentication) {
EFI_SECURITY_ARCH_PROTOCOL *Security = NULL;
// Restore the security protocol function
gBS->LocateProtocol(&gEfiSecurityArchProtocolGuid, NULL, (VOID **)&Security);
if (Security) {
Security->FileAuthenticationState = gSecurityFileAuthentication;
}
gSecurityFileAuthentication = 0;
}
if (gSecurity2FileAuthentication) {
EFI_SECURITY2_ARCH_PROTOCOL *Security2 = NULL;
// Restory the security 2 protocol function
gBS->LocateProtocol(&gEfiSecurity2ArchProtocolGuid, NULL, (VOID **)&Security2);
if (Security2) {
Security2->FileAuthentication = gSecurity2FileAuthentication;
}
gSecurity2FileAuthentication = 0;
}
}
// Initialize secure boot
VOID InitializeSecureBoot(VOID)
{
// Set secure boot variables to firmware values
UINTN Size = sizeof(gSettings.SecureBootSetupMode);
gRT->GetVariable(L"SetupMode", &gEfiGlobalVariableGuid, NULL, &Size, &gSettings.SecureBootSetupMode);
Size = sizeof(gSettings.SecureBoot);
gRT->GetVariable(L"SecureBoot", &gEfiGlobalVariableGuid, NULL, &Size, &gSettings.SecureBoot);
// Make sure that secure boot is disabled if in setup mode, this will
// allow us to specify later in settings that we want to override
// setup mode and pretend like we are in secure boot mode to enforce
// secure boot policy even when secure boot is not present/disabled.
if (gSettings.SecureBootSetupMode) {
gSettings.SecureBoot = 0;
}
}
#endif // ENABLE_SECURE_BOOT