13ea0450a9
UEFI related headers were copied from edk2. A new build option "MK_LOADER_EFI_SECUREBOOT" was added to allow loading of trusted anchors from UEFI. Certificate revocation support is also introduced. The forbidden certificates are loaded from dbx variable. Verification fails in two cases: There is a direct match between cert in dbx and the one in the chain. The CA used to sign the chain is found in dbx. One can also insert a hash of TBS section of a certificate into dbx. In this case verifications fails only if a direct match with a certificate in chain is found. Submitted by: Kornel Duleba <mindal@semihalf.com> Reviewed by: sjg Obtained from: Semihalf Sponsored by: Stormshield Differential Revision: https://reviews.freebsd.org/D19093
61 lines
2.4 KiB
C
61 lines
2.4 KiB
C
/*-
|
|
* Copyright (c) 2017, Juniper Networks, Inc.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
/*
|
|
* $FreeBSD$
|
|
*/
|
|
#ifndef _LIBSECUREBOOT_PRIV_H_
|
|
#define _LIBSECUREBOOT_PRIV_H_
|
|
|
|
/* public api */
|
|
#include "libsecureboot.h"
|
|
|
|
typedef struct {
|
|
unsigned char *data;
|
|
size_t hash_size;
|
|
} hash_data;
|
|
|
|
size_t ve_trust_anchors_add(br_x509_certificate *, size_t);
|
|
size_t ve_forbidden_anchors_add(br_x509_certificate *, size_t);
|
|
void ve_forbidden_digest_add(hash_data *digest, size_t);
|
|
char *fingerprint_info_lookup(int, const char *);
|
|
|
|
br_x509_certificate * parse_certificates(unsigned char *, size_t, size_t *);
|
|
int certificate_to_trust_anchor_inner(br_x509_trust_anchor *,
|
|
br_x509_certificate *);
|
|
|
|
int verify_rsa_digest(br_rsa_public_key *pkey,
|
|
const unsigned char *hash_oid,
|
|
unsigned char *mdata, size_t mlen,
|
|
unsigned char *sdata, size_t slen);
|
|
|
|
int openpgp_self_tests(void);
|
|
|
|
int efi_secure_boot_enabled(void);
|
|
br_x509_certificate* efi_get_trusted_certs(size_t *count);
|
|
br_x509_certificate* efi_get_forbidden_certs(size_t *count);
|
|
hash_data* efi_get_forbidden_digests(size_t *count);
|
|
|
|
#endif /* _LIBSECUREBOOT_PRIV_H_ */
|