mirror of https://github.com/acidanthera/audk.git
SecurityPkg: Add support for RngDxe on AARCH64
AARCH64 support has been added to BaseRngLib via the optional ARMv8.5 FEAT_RNG. Refactor RngDxe to support AARCH64, note support for it in the VALID_ARCHITECTURES line of RngDxe.inf and enable it in SecurityPkg.dsc. Signed-off-by: Rebecca Cran <rebecca@nuviainc.com> Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn> Acked-by: Jiewen Yao <Jiewen.yao@intel.com> Reviewed-by: Sami Mujawar <sami.mujawar@arm.com>
This commit is contained in:
parent
9301e5644c
commit
4e5ecdbac8
|
@ -0,0 +1,126 @@
|
||||||
|
/** @file
|
||||||
|
RNG Driver to produce the UEFI Random Number Generator protocol.
|
||||||
|
|
||||||
|
The driver will use the RNDR instruction to produce random numbers.
|
||||||
|
|
||||||
|
RNG Algorithms defined in UEFI 2.4:
|
||||||
|
- EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID
|
||||||
|
- EFI_RNG_ALGORITHM_RAW - Unsupported
|
||||||
|
- EFI_RNG_ALGORITHM_SP800_90_HMAC_256_GUID
|
||||||
|
- EFI_RNG_ALGORITHM_SP800_90_HASH_256_GUID
|
||||||
|
- EFI_RNG_ALGORITHM_X9_31_3DES_GUID - Unsupported
|
||||||
|
- EFI_RNG_ALGORITHM_X9_31_AES_GUID - Unsupported
|
||||||
|
|
||||||
|
Copyright (c) 2021, NUVIA Inc. All rights reserved.<BR>
|
||||||
|
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||||
|
(C) Copyright 2015 Hewlett Packard Enterprise Development LP<BR>
|
||||||
|
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include <Library/BaseLib.h>
|
||||||
|
#include <Library/BaseMemoryLib.h>
|
||||||
|
#include <Library/UefiBootServicesTableLib.h>
|
||||||
|
#include <Library/TimerLib.h>
|
||||||
|
#include <Protocol/Rng.h>
|
||||||
|
|
||||||
|
#include "RngDxeInternals.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
Produces and returns an RNG value using either the default or specified RNG algorithm.
|
||||||
|
|
||||||
|
@param[in] This A pointer to the EFI_RNG_PROTOCOL instance.
|
||||||
|
@param[in] RNGAlgorithm A pointer to the EFI_RNG_ALGORITHM that identifies the RNG
|
||||||
|
algorithm to use. May be NULL in which case the function will
|
||||||
|
use its default RNG algorithm.
|
||||||
|
@param[in] RNGValueLength The length in bytes of the memory buffer pointed to by
|
||||||
|
RNGValue. The driver shall return exactly this numbers of bytes.
|
||||||
|
@param[out] RNGValue A caller-allocated memory buffer filled by the driver with the
|
||||||
|
resulting RNG value.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS The RNG value was returned successfully.
|
||||||
|
@retval EFI_UNSUPPORTED The algorithm specified by RNGAlgorithm is not supported by
|
||||||
|
this driver.
|
||||||
|
@retval EFI_DEVICE_ERROR An RNG value could not be retrieved due to a hardware or
|
||||||
|
firmware error.
|
||||||
|
@retval EFI_NOT_READY There is not enough random data available to satisfy the length
|
||||||
|
requested by RNGValueLength.
|
||||||
|
@retval EFI_INVALID_PARAMETER RNGValue is NULL or RNGValueLength is zero.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EFIAPI
|
||||||
|
RngGetRNG (
|
||||||
|
IN EFI_RNG_PROTOCOL *This,
|
||||||
|
IN EFI_RNG_ALGORITHM *RNGAlgorithm, OPTIONAL
|
||||||
|
IN UINTN RNGValueLength,
|
||||||
|
OUT UINT8 *RNGValue
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
|
||||||
|
if ((RNGValueLength == 0) || (RNGValue == NULL)) {
|
||||||
|
return EFI_INVALID_PARAMETER;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (RNGAlgorithm == NULL) {
|
||||||
|
//
|
||||||
|
// Use the default RNG algorithm if RNGAlgorithm is NULL.
|
||||||
|
//
|
||||||
|
RNGAlgorithm = PcdGetPtr (PcdCpuRngSupportedAlgorithm);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (CompareGuid (RNGAlgorithm, PcdGetPtr (PcdCpuRngSupportedAlgorithm))) {
|
||||||
|
Status = RngGetBytes (RNGValueLength, RNGValue);
|
||||||
|
return Status;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Other algorithms are unsupported by this driver.
|
||||||
|
//
|
||||||
|
return EFI_UNSUPPORTED;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Returns information about the random number generation implementation.
|
||||||
|
|
||||||
|
@param[in,out] RNGAlgorithmListSize On input, the size in bytes of RNGAlgorithmList.
|
||||||
|
On output with a return code of EFI_SUCCESS, the size
|
||||||
|
in bytes of the data returned in RNGAlgorithmList. On output
|
||||||
|
with a return code of EFI_BUFFER_TOO_SMALL,
|
||||||
|
the size of RNGAlgorithmList required to obtain the list.
|
||||||
|
@param[out] RNGAlgorithmList A caller-allocated memory buffer filled by the driver
|
||||||
|
with one EFI_RNG_ALGORITHM element for each supported
|
||||||
|
RNG algorithm. The list must not change across multiple
|
||||||
|
calls to the same driver. The first algorithm in the list
|
||||||
|
is the default algorithm for the driver.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS The RNG algorithm list was returned successfully.
|
||||||
|
@retval EFI_BUFFER_TOO_SMALL The buffer RNGAlgorithmList is too small to hold the result.
|
||||||
|
|
||||||
|
**/
|
||||||
|
UINTN
|
||||||
|
EFIAPI
|
||||||
|
ArchGetSupportedRngAlgorithms (
|
||||||
|
IN OUT UINTN *RNGAlgorithmListSize,
|
||||||
|
OUT EFI_RNG_ALGORITHM *RNGAlgorithmList
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN RequiredSize;
|
||||||
|
EFI_RNG_ALGORITHM *CpuRngSupportedAlgorithm;
|
||||||
|
|
||||||
|
RequiredSize = sizeof (EFI_RNG_ALGORITHM);
|
||||||
|
|
||||||
|
if (*RNGAlgorithmListSize < RequiredSize) {
|
||||||
|
*RNGAlgorithmListSize = RequiredSize;
|
||||||
|
return EFI_BUFFER_TOO_SMALL;
|
||||||
|
}
|
||||||
|
|
||||||
|
CpuRngSupportedAlgorithm = PcdGetPtr (PcdCpuRngSupportedAlgorithm);
|
||||||
|
|
||||||
|
CopyMem(&RNGAlgorithmList[0], CpuRngSupportedAlgorithm, sizeof (EFI_RNG_ALGORITHM));
|
||||||
|
|
||||||
|
*RNGAlgorithmListSize = RequiredSize;
|
||||||
|
return EFI_SUCCESS;
|
||||||
|
}
|
|
@ -8,48 +8,9 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
**/
|
**/
|
||||||
#include <Library/RngLib.h>
|
#include <Library/RngLib.h>
|
||||||
|
|
||||||
#include "RdRand.h"
|
|
||||||
#include "AesCore.h"
|
#include "AesCore.h"
|
||||||
|
#include "RdRand.h"
|
||||||
/**
|
#include "RngDxeInternals.h"
|
||||||
Calls RDRAND to fill a buffer of arbitrary size with random bytes.
|
|
||||||
|
|
||||||
@param[in] Length Size of the buffer, in bytes, to fill with.
|
|
||||||
@param[out] RandBuffer Pointer to the buffer to store the random result.
|
|
||||||
|
|
||||||
@retval EFI_SUCCESS Random bytes generation succeeded.
|
|
||||||
@retval EFI_NOT_READY Failed to request random bytes.
|
|
||||||
|
|
||||||
**/
|
|
||||||
EFI_STATUS
|
|
||||||
EFIAPI
|
|
||||||
RdRandGetBytes (
|
|
||||||
IN UINTN Length,
|
|
||||||
OUT UINT8 *RandBuffer
|
|
||||||
)
|
|
||||||
{
|
|
||||||
BOOLEAN IsRandom;
|
|
||||||
UINT64 TempRand[2];
|
|
||||||
|
|
||||||
while (Length > 0) {
|
|
||||||
IsRandom = GetRandomNumber128 (TempRand);
|
|
||||||
if (!IsRandom) {
|
|
||||||
return EFI_NOT_READY;
|
|
||||||
}
|
|
||||||
if (Length >= sizeof (TempRand)) {
|
|
||||||
WriteUnaligned64 ((UINT64*)RandBuffer, TempRand[0]);
|
|
||||||
RandBuffer += sizeof (UINT64);
|
|
||||||
WriteUnaligned64 ((UINT64*)RandBuffer, TempRand[1]);
|
|
||||||
RandBuffer += sizeof (UINT64);
|
|
||||||
Length -= sizeof (TempRand);
|
|
||||||
} else {
|
|
||||||
CopyMem (RandBuffer, TempRand, Length);
|
|
||||||
Length = 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return EFI_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Creates a 128bit random value that is fully forward and backward prediction resistant,
|
Creates a 128bit random value that is fully forward and backward prediction resistant,
|
||||||
|
@ -92,7 +53,7 @@ RdRandGetSeed128 (
|
||||||
//
|
//
|
||||||
for (Index = 0; Index < 32; Index++) {
|
for (Index = 0; Index < 32; Index++) {
|
||||||
MicroSecondDelay (10);
|
MicroSecondDelay (10);
|
||||||
Status = RdRandGetBytes (16, RandByte);
|
Status = RngGetBytes (16, RandByte);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
return Status;
|
return Status;
|
||||||
}
|
}
|
|
@ -23,23 +23,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
#include <Library/TimerLib.h>
|
#include <Library/TimerLib.h>
|
||||||
#include <Protocol/Rng.h>
|
#include <Protocol/Rng.h>
|
||||||
|
|
||||||
/**
|
|
||||||
Calls RDRAND to fill a buffer of arbitrary size with random bytes.
|
|
||||||
|
|
||||||
@param[in] Length Size of the buffer, in bytes, to fill with.
|
|
||||||
@param[out] RandBuffer Pointer to the buffer to store the random result.
|
|
||||||
|
|
||||||
@retval EFI_SUCCESS Random bytes generation succeeded.
|
|
||||||
@retval EFI_NOT_READY Failed to request random bytes.
|
|
||||||
|
|
||||||
**/
|
|
||||||
EFI_STATUS
|
|
||||||
EFIAPI
|
|
||||||
RdRandGetBytes (
|
|
||||||
IN UINTN Length,
|
|
||||||
OUT UINT8 *RandBuffer
|
|
||||||
);
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Generate high-quality entropy source through RDRAND.
|
Generate high-quality entropy source through RDRAND.
|
||||||
|
|
|
@ -0,0 +1,145 @@
|
||||||
|
/** @file
|
||||||
|
RNG Driver to produce the UEFI Random Number Generator protocol.
|
||||||
|
|
||||||
|
The driver will use the new RDRAND instruction to produce high-quality, high-performance
|
||||||
|
entropy and random number.
|
||||||
|
|
||||||
|
RNG Algorithms defined in UEFI 2.4:
|
||||||
|
- EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID - Supported
|
||||||
|
(RDRAND implements a hardware NIST SP800-90 AES-CTR-256 based DRBG)
|
||||||
|
- EFI_RNG_ALGORITHM_RAW - Supported
|
||||||
|
(Structuring RDRAND invocation can be guaranteed as high-quality entropy source)
|
||||||
|
- EFI_RNG_ALGORITHM_SP800_90_HMAC_256_GUID - Unsupported
|
||||||
|
- EFI_RNG_ALGORITHM_SP800_90_HASH_256_GUID - Unsupported
|
||||||
|
- EFI_RNG_ALGORITHM_X9_31_3DES_GUID - Unsupported
|
||||||
|
- EFI_RNG_ALGORITHM_X9_31_AES_GUID - Unsupported
|
||||||
|
|
||||||
|
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||||
|
(C) Copyright 2015 Hewlett Packard Enterprise Development LP<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "RdRand.h"
|
||||||
|
#include "RngDxeInternals.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
Produces and returns an RNG value using either the default or specified RNG algorithm.
|
||||||
|
|
||||||
|
@param[in] This A pointer to the EFI_RNG_PROTOCOL instance.
|
||||||
|
@param[in] RNGAlgorithm A pointer to the EFI_RNG_ALGORITHM that identifies the RNG
|
||||||
|
algorithm to use. May be NULL in which case the function will
|
||||||
|
use its default RNG algorithm.
|
||||||
|
@param[in] RNGValueLength The length in bytes of the memory buffer pointed to by
|
||||||
|
RNGValue. The driver shall return exactly this numbers of bytes.
|
||||||
|
@param[out] RNGValue A caller-allocated memory buffer filled by the driver with the
|
||||||
|
resulting RNG value.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS The RNG value was returned successfully.
|
||||||
|
@retval EFI_UNSUPPORTED The algorithm specified by RNGAlgorithm is not supported by
|
||||||
|
this driver.
|
||||||
|
@retval EFI_DEVICE_ERROR An RNG value could not be retrieved due to a hardware or
|
||||||
|
firmware error.
|
||||||
|
@retval EFI_NOT_READY There is not enough random data available to satisfy the length
|
||||||
|
requested by RNGValueLength.
|
||||||
|
@retval EFI_INVALID_PARAMETER RNGValue is NULL or RNGValueLength is zero.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EFIAPI
|
||||||
|
RngGetRNG (
|
||||||
|
IN EFI_RNG_PROTOCOL *This,
|
||||||
|
IN EFI_RNG_ALGORITHM *RNGAlgorithm, OPTIONAL
|
||||||
|
IN UINTN RNGValueLength,
|
||||||
|
OUT UINT8 *RNGValue
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
|
||||||
|
if ((RNGValueLength == 0) || (RNGValue == NULL)) {
|
||||||
|
return EFI_INVALID_PARAMETER;
|
||||||
|
}
|
||||||
|
|
||||||
|
Status = EFI_UNSUPPORTED;
|
||||||
|
if (RNGAlgorithm == NULL) {
|
||||||
|
//
|
||||||
|
// Use the default RNG algorithm if RNGAlgorithm is NULL.
|
||||||
|
//
|
||||||
|
RNGAlgorithm = &gEfiRngAlgorithmSp80090Ctr256Guid;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// NIST SP800-90-AES-CTR-256 supported by RDRAND
|
||||||
|
//
|
||||||
|
if (CompareGuid (RNGAlgorithm, &gEfiRngAlgorithmSp80090Ctr256Guid)) {
|
||||||
|
Status = RngGetBytes (RNGValueLength, RNGValue);
|
||||||
|
return Status;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// The "raw" algorithm is intended to provide entropy directly
|
||||||
|
//
|
||||||
|
if (CompareGuid (RNGAlgorithm, &gEfiRngAlgorithmRaw)) {
|
||||||
|
//
|
||||||
|
// When a DRBG is used on the output of a entropy source,
|
||||||
|
// its security level must be at least 256 bits according to UEFI Spec.
|
||||||
|
//
|
||||||
|
if (RNGValueLength < 32) {
|
||||||
|
return EFI_INVALID_PARAMETER;
|
||||||
|
}
|
||||||
|
|
||||||
|
Status = RdRandGenerateEntropy (RNGValueLength, RNGValue);
|
||||||
|
return Status;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Other algorithms were unsupported by this driver.
|
||||||
|
//
|
||||||
|
return Status;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Returns information about the random number generation implementation.
|
||||||
|
|
||||||
|
@param[in,out] RNGAlgorithmListSize On input, the size in bytes of RNGAlgorithmList.
|
||||||
|
On output with a return code of EFI_SUCCESS, the size
|
||||||
|
in bytes of the data returned in RNGAlgorithmList. On output
|
||||||
|
with a return code of EFI_BUFFER_TOO_SMALL,
|
||||||
|
the size of RNGAlgorithmList required to obtain the list.
|
||||||
|
@param[out] RNGAlgorithmList A caller-allocated memory buffer filled by the driver
|
||||||
|
with one EFI_RNG_ALGORITHM element for each supported
|
||||||
|
RNG algorithm. The list must not change across multiple
|
||||||
|
calls to the same driver. The first algorithm in the list
|
||||||
|
is the default algorithm for the driver.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS The RNG algorithm list was returned successfully.
|
||||||
|
@retval EFI_BUFFER_TOO_SMALL The buffer RNGAlgorithmList is too small to hold the result.
|
||||||
|
|
||||||
|
**/
|
||||||
|
UINTN
|
||||||
|
EFIAPI
|
||||||
|
ArchGetSupportedRngAlgorithms (
|
||||||
|
IN OUT UINTN *RNGAlgorithmListSize,
|
||||||
|
OUT EFI_RNG_ALGORITHM *RNGAlgorithmList
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN RequiredSize;
|
||||||
|
EFI_RNG_ALGORITHM *CpuRngSupportedAlgorithm;
|
||||||
|
|
||||||
|
RequiredSize = 2 * sizeof (EFI_RNG_ALGORITHM);
|
||||||
|
|
||||||
|
if (*RNGAlgorithmListSize < RequiredSize) {
|
||||||
|
*RNGAlgorithmListSize = RequiredSize;
|
||||||
|
return EFI_BUFFER_TOO_SMALL;
|
||||||
|
}
|
||||||
|
|
||||||
|
CpuRngSupportedAlgorithm = PcdGetPtr (PcdCpuRngSupportedAlgorithm);
|
||||||
|
|
||||||
|
CopyMem(&RNGAlgorithmList[0], CpuRngSupportedAlgorithm, sizeof (EFI_RNG_ALGORITHM));
|
||||||
|
|
||||||
|
// x86 platforms also support EFI_RNG_ALGORITHM_RAW via RDSEED
|
||||||
|
CopyMem(&RNGAlgorithmList[1], &gEfiRngAlgorithmRaw, sizeof (EFI_RNG_ALGORITHM));
|
||||||
|
|
||||||
|
*RNGAlgorithmListSize = RequiredSize;
|
||||||
|
return EFI_SUCCESS;
|
||||||
|
}
|
|
@ -1,34 +1,32 @@
|
||||||
/** @file
|
/** @file
|
||||||
RNG Driver to produce the UEFI Random Number Generator protocol.
|
RNG Driver to produce the UEFI Random Number Generator protocol.
|
||||||
|
|
||||||
The driver will use the new RDRAND instruction to produce high-quality, high-performance
|
The driver uses CPU RNG instructions to produce high-quality,
|
||||||
entropy and random number.
|
high-performance entropy and random number.
|
||||||
|
|
||||||
RNG Algorithms defined in UEFI 2.4:
|
RNG Algorithms defined in UEFI 2.4:
|
||||||
- EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID - Supported
|
- EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID
|
||||||
(RDRAND implements a hardware NIST SP800-90 AES-CTR-256 based DRBG)
|
- EFI_RNG_ALGORITHM_RAW
|
||||||
- EFI_RNG_ALGORITHM_RAW - Supported
|
- EFI_RNG_ALGORITHM_SP800_90_HMAC_256_GUID
|
||||||
(Structuring RDRAND invocation can be guaranteed as high-quality entropy source)
|
- EFI_RNG_ALGORITHM_SP800_90_HASH_256_GUID
|
||||||
- EFI_RNG_ALGORITHM_SP800_90_HMAC_256_GUID - Unsupported
|
- EFI_RNG_ALGORITHM_X9_31_3DES_GUID
|
||||||
- EFI_RNG_ALGORITHM_SP800_90_HASH_256_GUID - Unsupported
|
- EFI_RNG_ALGORITHM_X9_31_AES_GUID
|
||||||
- EFI_RNG_ALGORITHM_X9_31_3DES_GUID - Unsupported
|
|
||||||
- EFI_RNG_ALGORITHM_X9_31_AES_GUID - Unsupported
|
|
||||||
|
|
||||||
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||||
(C) Copyright 2015 Hewlett Packard Enterprise Development LP<BR>
|
(C) Copyright 2015 Hewlett Packard Enterprise Development LP<BR>
|
||||||
|
|
||||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
**/
|
**/
|
||||||
|
|
||||||
#include "RdRand.h"
|
#include <Library/BaseLib.h>
|
||||||
|
#include <Library/BaseMemoryLib.h>
|
||||||
|
#include <Library/UefiBootServicesTableLib.h>
|
||||||
|
#include <Library/RngLib.h>
|
||||||
|
#include <Library/TimerLib.h>
|
||||||
|
#include <Protocol/Rng.h>
|
||||||
|
|
||||||
//
|
#include "RngDxeInternals.h"
|
||||||
// Supported RNG Algorithms list by this driver.
|
|
||||||
//
|
|
||||||
EFI_RNG_ALGORITHM mSupportedRngAlgorithms[] = {
|
|
||||||
EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID,
|
|
||||||
EFI_RNG_ALGORITHM_RAW
|
|
||||||
};
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Returns information about the random number generation implementation.
|
Returns information about the random number generation implementation.
|
||||||
|
@ -62,106 +60,23 @@ RngGetInfo (
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
EFI_STATUS Status;
|
EFI_STATUS Status;
|
||||||
UINTN RequiredSize;
|
|
||||||
|
|
||||||
if ((This == NULL) || (RNGAlgorithmListSize == NULL)) {
|
if ((This == NULL) || (RNGAlgorithmListSize == NULL)) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
|
||||||
RequiredSize = sizeof (mSupportedRngAlgorithms);
|
|
||||||
if (*RNGAlgorithmListSize < RequiredSize) {
|
|
||||||
Status = EFI_BUFFER_TOO_SMALL;
|
|
||||||
} else {
|
|
||||||
//
|
//
|
||||||
// Return algorithm list supported by driver.
|
// Return algorithm list supported by driver.
|
||||||
//
|
//
|
||||||
if (RNGAlgorithmList != NULL) {
|
if (RNGAlgorithmList != NULL) {
|
||||||
CopyMem (RNGAlgorithmList, mSupportedRngAlgorithms, RequiredSize);
|
Status = ArchGetSupportedRngAlgorithms (RNGAlgorithmListSize, RNGAlgorithmList);
|
||||||
Status = EFI_SUCCESS;
|
|
||||||
} else {
|
} else {
|
||||||
Status = EFI_INVALID_PARAMETER;
|
Status = EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
}
|
|
||||||
*RNGAlgorithmListSize = RequiredSize;
|
|
||||||
|
|
||||||
return Status;
|
return Status;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
Produces and returns an RNG value using either the default or specified RNG algorithm.
|
|
||||||
|
|
||||||
@param[in] This A pointer to the EFI_RNG_PROTOCOL instance.
|
|
||||||
@param[in] RNGAlgorithm A pointer to the EFI_RNG_ALGORITHM that identifies the RNG
|
|
||||||
algorithm to use. May be NULL in which case the function will
|
|
||||||
use its default RNG algorithm.
|
|
||||||
@param[in] RNGValueLength The length in bytes of the memory buffer pointed to by
|
|
||||||
RNGValue. The driver shall return exactly this numbers of bytes.
|
|
||||||
@param[out] RNGValue A caller-allocated memory buffer filled by the driver with the
|
|
||||||
resulting RNG value.
|
|
||||||
|
|
||||||
@retval EFI_SUCCESS The RNG value was returned successfully.
|
|
||||||
@retval EFI_UNSUPPORTED The algorithm specified by RNGAlgorithm is not supported by
|
|
||||||
this driver.
|
|
||||||
@retval EFI_DEVICE_ERROR An RNG value could not be retrieved due to a hardware or
|
|
||||||
firmware error.
|
|
||||||
@retval EFI_NOT_READY There is not enough random data available to satisfy the length
|
|
||||||
requested by RNGValueLength.
|
|
||||||
@retval EFI_INVALID_PARAMETER RNGValue is NULL or RNGValueLength is zero.
|
|
||||||
|
|
||||||
**/
|
|
||||||
EFI_STATUS
|
|
||||||
EFIAPI
|
|
||||||
RngGetRNG (
|
|
||||||
IN EFI_RNG_PROTOCOL *This,
|
|
||||||
IN EFI_RNG_ALGORITHM *RNGAlgorithm, OPTIONAL
|
|
||||||
IN UINTN RNGValueLength,
|
|
||||||
OUT UINT8 *RNGValue
|
|
||||||
)
|
|
||||||
{
|
|
||||||
EFI_STATUS Status;
|
|
||||||
|
|
||||||
if ((RNGValueLength == 0) || (RNGValue == NULL)) {
|
|
||||||
return EFI_INVALID_PARAMETER;
|
|
||||||
}
|
|
||||||
|
|
||||||
Status = EFI_UNSUPPORTED;
|
|
||||||
if (RNGAlgorithm == NULL) {
|
|
||||||
//
|
|
||||||
// Use the default RNG algorithm if RNGAlgorithm is NULL.
|
|
||||||
//
|
|
||||||
RNGAlgorithm = &gEfiRngAlgorithmSp80090Ctr256Guid;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// NIST SP800-90-AES-CTR-256 supported by RDRAND
|
|
||||||
//
|
|
||||||
if (CompareGuid (RNGAlgorithm, &gEfiRngAlgorithmSp80090Ctr256Guid)) {
|
|
||||||
Status = RdRandGetBytes (RNGValueLength, RNGValue);
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// The "raw" algorithm is intended to provide entropy directly
|
|
||||||
//
|
|
||||||
if (CompareGuid (RNGAlgorithm, &gEfiRngAlgorithmRaw)) {
|
|
||||||
//
|
|
||||||
// When a DRBG is used on the output of a entropy source,
|
|
||||||
// its security level must be at least 256 bits according to UEFI Spec.
|
|
||||||
//
|
|
||||||
if (RNGValueLength < 32) {
|
|
||||||
return EFI_INVALID_PARAMETER;
|
|
||||||
}
|
|
||||||
|
|
||||||
Status = RdRandGenerateEntropy (RNGValueLength, RNGValue);
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Other algorithms were unsupported by this driver.
|
|
||||||
//
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
//
|
||||||
// The Random Number Generator (RNG) protocol
|
// The Random Number Generator (RNG) protocol
|
||||||
//
|
//
|
||||||
|
@ -204,3 +119,44 @@ RngDriverEntry (
|
||||||
|
|
||||||
return Status;
|
return Status;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Calls RDRAND to fill a buffer of arbitrary size with random bytes.
|
||||||
|
|
||||||
|
@param[in] Length Size of the buffer, in bytes, to fill with.
|
||||||
|
@param[out] RandBuffer Pointer to the buffer to store the random result.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS Random bytes generation succeeded.
|
||||||
|
@retval EFI_NOT_READY Failed to request random bytes.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EFIAPI
|
||||||
|
RngGetBytes (
|
||||||
|
IN UINTN Length,
|
||||||
|
OUT UINT8 *RandBuffer
|
||||||
|
)
|
||||||
|
{
|
||||||
|
BOOLEAN IsRandom;
|
||||||
|
UINT64 TempRand[2];
|
||||||
|
|
||||||
|
while (Length > 0) {
|
||||||
|
IsRandom = GetRandomNumber128 (TempRand);
|
||||||
|
if (!IsRandom) {
|
||||||
|
return EFI_NOT_READY;
|
||||||
|
}
|
||||||
|
if (Length >= sizeof (TempRand)) {
|
||||||
|
WriteUnaligned64 ((UINT64*)RandBuffer, TempRand[0]);
|
||||||
|
RandBuffer += sizeof (UINT64);
|
||||||
|
WriteUnaligned64 ((UINT64*)RandBuffer, TempRand[1]);
|
||||||
|
RandBuffer += sizeof (UINT64);
|
||||||
|
Length -= sizeof (TempRand);
|
||||||
|
} else {
|
||||||
|
CopyMem (RandBuffer, TempRand, Length);
|
||||||
|
Length = 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return EFI_SUCCESS;
|
||||||
|
}
|
||||||
|
|
|
@ -26,15 +26,22 @@
|
||||||
#
|
#
|
||||||
# The following information is for reference only and not required by the build tools.
|
# The following information is for reference only and not required by the build tools.
|
||||||
#
|
#
|
||||||
# VALID_ARCHITECTURES = IA32 X64
|
# VALID_ARCHITECTURES = IA32 X64 AARCH64
|
||||||
#
|
#
|
||||||
|
|
||||||
[Sources.common]
|
[Sources.common]
|
||||||
RngDxe.c
|
RngDxe.c
|
||||||
RdRand.c
|
RngDxeInternals.h
|
||||||
RdRand.h
|
|
||||||
AesCore.c
|
[Sources.IA32, Sources.X64]
|
||||||
AesCore.h
|
Rand/RngDxe.c
|
||||||
|
Rand/RdRand.c
|
||||||
|
Rand/RdRand.h
|
||||||
|
Rand/AesCore.c
|
||||||
|
Rand/AesCore.h
|
||||||
|
|
||||||
|
[Sources.AARCH64]
|
||||||
|
AArch64/RngDxe.c
|
||||||
|
|
||||||
[Packages]
|
[Packages]
|
||||||
MdePkg/MdePkg.dec
|
MdePkg/MdePkg.dec
|
||||||
|
@ -50,12 +57,19 @@
|
||||||
RngLib
|
RngLib
|
||||||
|
|
||||||
[Guids]
|
[Guids]
|
||||||
|
gEfiRngAlgorithmSp80090Hash256Guid ## SOMETIMES_PRODUCES ## GUID # Unique ID of the algorithm for RNG
|
||||||
|
gEfiRngAlgorithmSp80090Hmac256Guid ## SOMETIMES_PRODUCES ## GUID # Unique ID of the algorithm for RNG
|
||||||
gEfiRngAlgorithmSp80090Ctr256Guid ## SOMETIMES_PRODUCES ## GUID # Unique ID of the algorithm for RNG
|
gEfiRngAlgorithmSp80090Ctr256Guid ## SOMETIMES_PRODUCES ## GUID # Unique ID of the algorithm for RNG
|
||||||
|
gEfiRngAlgorithmX9313DesGuid ## SOMETIMES_PRODUCES ## GUID # Unique ID of the algorithm for RNG
|
||||||
|
gEfiRngAlgorithmX931AesGuid ## SOMETIMES_PRODUCES ## GUID # Unique ID of the algorithm for RNG
|
||||||
gEfiRngAlgorithmRaw ## SOMETIMES_PRODUCES ## GUID # Unique ID of the algorithm for RNG
|
gEfiRngAlgorithmRaw ## SOMETIMES_PRODUCES ## GUID # Unique ID of the algorithm for RNG
|
||||||
|
|
||||||
[Protocols]
|
[Protocols]
|
||||||
gEfiRngProtocolGuid ## PRODUCES
|
gEfiRngProtocolGuid ## PRODUCES
|
||||||
|
|
||||||
|
[Pcd]
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdCpuRngSupportedAlgorithm ## CONSUMES
|
||||||
|
|
||||||
[Depex]
|
[Depex]
|
||||||
TRUE
|
TRUE
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,117 @@
|
||||||
|
/** @file
|
||||||
|
Function prototypes for UEFI Random Number Generator protocol support.
|
||||||
|
|
||||||
|
Copyright (c) 2021, NUVIA Inc. All rights reserved.<BR>
|
||||||
|
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#ifndef RNGDXE_INTERNALS_H_
|
||||||
|
#define RNGDXE_INTERNALS_H_
|
||||||
|
|
||||||
|
/**
|
||||||
|
Returns information about the random number generation implementation.
|
||||||
|
|
||||||
|
@param[in] This A pointer to the EFI_RNG_PROTOCOL instance.
|
||||||
|
@param[in,out] RNGAlgorithmListSize On input, the size in bytes of RNGAlgorithmList.
|
||||||
|
On output with a return code of EFI_SUCCESS, the size
|
||||||
|
in bytes of the data returned in RNGAlgorithmList. On output
|
||||||
|
with a return code of EFI_BUFFER_TOO_SMALL,
|
||||||
|
the size of RNGAlgorithmList required to obtain the list.
|
||||||
|
@param[out] RNGAlgorithmList A caller-allocated memory buffer filled by the driver
|
||||||
|
with one EFI_RNG_ALGORITHM element for each supported
|
||||||
|
RNG algorithm. The list must not change across multiple
|
||||||
|
calls to the same driver. The first algorithm in the list
|
||||||
|
is the default algorithm for the driver.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS The RNG algorithm list was returned successfully.
|
||||||
|
@retval EFI_UNSUPPORTED The services is not supported by this driver.
|
||||||
|
@retval EFI_DEVICE_ERROR The list of algorithms could not be retrieved due to a
|
||||||
|
hardware or firmware error.
|
||||||
|
@retval EFI_INVALID_PARAMETER One or more of the parameters are incorrect.
|
||||||
|
@retval EFI_BUFFER_TOO_SMALL The buffer RNGAlgorithmList is too small to hold the result.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EFIAPI
|
||||||
|
RngGetInfo (
|
||||||
|
IN EFI_RNG_PROTOCOL *This,
|
||||||
|
IN OUT UINTN *RNGAlgorithmListSize,
|
||||||
|
OUT EFI_RNG_ALGORITHM *RNGAlgorithmList
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Produces and returns an RNG value using either the default or specified RNG algorithm.
|
||||||
|
|
||||||
|
@param[in] This A pointer to the EFI_RNG_PROTOCOL instance.
|
||||||
|
@param[in] RNGAlgorithm A pointer to the EFI_RNG_ALGORITHM that identifies the RNG
|
||||||
|
algorithm to use. May be NULL in which case the function will
|
||||||
|
use its default RNG algorithm.
|
||||||
|
@param[in] RNGValueLength The length in bytes of the memory buffer pointed to by
|
||||||
|
RNGValue. The driver shall return exactly this numbers of bytes.
|
||||||
|
@param[out] RNGValue A caller-allocated memory buffer filled by the driver with the
|
||||||
|
resulting RNG value.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS The RNG value was returned successfully.
|
||||||
|
@retval EFI_UNSUPPORTED The algorithm specified by RNGAlgorithm is not supported by
|
||||||
|
this driver.
|
||||||
|
@retval EFI_DEVICE_ERROR An RNG value could not be retrieved due to a hardware or
|
||||||
|
firmware error.
|
||||||
|
@retval EFI_NOT_READY There is not enough random data available to satisfy the length
|
||||||
|
requested by RNGValueLength.
|
||||||
|
@retval EFI_INVALID_PARAMETER RNGValue is NULL or RNGValueLength is zero.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EFIAPI
|
||||||
|
RngGetRNG (
|
||||||
|
IN EFI_RNG_PROTOCOL *This,
|
||||||
|
IN EFI_RNG_ALGORITHM *RNGAlgorithm, OPTIONAL
|
||||||
|
IN UINTN RNGValueLength,
|
||||||
|
OUT UINT8 *RNGValue
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Returns information about the random number generation implementation.
|
||||||
|
|
||||||
|
@param[in,out] RNGAlgorithmListSize On input, the size in bytes of RNGAlgorithmList.
|
||||||
|
On output with a return code of EFI_SUCCESS, the size
|
||||||
|
in bytes of the data returned in RNGAlgorithmList. On output
|
||||||
|
with a return code of EFI_BUFFER_TOO_SMALL,
|
||||||
|
the size of RNGAlgorithmList required to obtain the list.
|
||||||
|
@param[out] RNGAlgorithmList A caller-allocated memory buffer filled by the driver
|
||||||
|
with one EFI_RNG_ALGORITHM element for each supported
|
||||||
|
RNG algorithm. The list must not change across multiple
|
||||||
|
calls to the same driver. The first algorithm in the list
|
||||||
|
is the default algorithm for the driver.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS The RNG algorithm list was returned successfully.
|
||||||
|
@retval EFI_BUFFER_TOO_SMALL The buffer RNGAlgorithmList is too small to hold the result.
|
||||||
|
|
||||||
|
**/
|
||||||
|
UINTN
|
||||||
|
EFIAPI
|
||||||
|
ArchGetSupportedRngAlgorithms (
|
||||||
|
IN OUT UINTN *RNGAlgorithmListSize,
|
||||||
|
OUT EFI_RNG_ALGORITHM *RNGAlgorithmList
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Runs CPU RNG instruction to fill a buffer of arbitrary size with random bytes.
|
||||||
|
|
||||||
|
@param[in] Length Size of the buffer, in bytes, to fill with.
|
||||||
|
@param[out] RandBuffer Pointer to the buffer to store the random result.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS Random bytes generation succeeded.
|
||||||
|
@retval EFI_NOT_READY Failed to request random bytes.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EFIAPI
|
||||||
|
RngGetBytes (
|
||||||
|
IN UINTN Length,
|
||||||
|
OUT UINT8 *RandBuffer
|
||||||
|
);
|
||||||
|
|
||||||
|
#endif // RNGDXE_INTERNALS_H_
|
|
@ -297,6 +297,8 @@
|
||||||
gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeFvVerificationPass|0x0303100A|UINT32|0x00010030
|
gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeFvVerificationPass|0x0303100A|UINT32|0x00010030
|
||||||
gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeFvVerificationFail|0x0303100B|UINT32|0x00010031
|
gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeFvVerificationFail|0x0303100B|UINT32|0x00010031
|
||||||
|
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdCpuRngSupportedAlgorithm|{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}|VOID*|0x00010032
|
||||||
|
|
||||||
[PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx]
|
[PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx]
|
||||||
## Image verification policy for OptionRom. Only following values are valid:<BR><BR>
|
## Image verification policy for OptionRom. Only following values are valid:<BR><BR>
|
||||||
# NOTE: Do NOT use 0x5 and 0x2 since it violates the UEFI specification and has been removed.<BR>
|
# NOTE: Do NOT use 0x5 and 0x2 since it violates the UEFI specification and has been removed.<BR>
|
||||||
|
|
|
@ -259,6 +259,12 @@
|
||||||
[Components.IA32, Components.X64, Components.ARM, Components.AARCH64]
|
[Components.IA32, Components.X64, Components.ARM, Components.AARCH64]
|
||||||
SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf
|
SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf
|
||||||
|
|
||||||
|
[Components.IA32, Components.X64, Components.AARCH64]
|
||||||
|
#
|
||||||
|
# Random Number Generator
|
||||||
|
#
|
||||||
|
SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf
|
||||||
|
|
||||||
[Components.IA32, Components.X64]
|
[Components.IA32, Components.X64]
|
||||||
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
|
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
|
||||||
|
|
||||||
|
@ -334,11 +340,6 @@
|
||||||
SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.inf
|
SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.inf
|
||||||
SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/StandaloneMmTcg2PhysicalPresenceLib.inf
|
SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/StandaloneMmTcg2PhysicalPresenceLib.inf
|
||||||
|
|
||||||
#
|
|
||||||
# Random Number Generator
|
|
||||||
#
|
|
||||||
SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf
|
|
||||||
|
|
||||||
#
|
#
|
||||||
# Opal Password solution
|
# Opal Password solution
|
||||||
#
|
#
|
||||||
|
|
Loading…
Reference in New Issue