Update the chaining requirements with regards to the Platform Key.

Signed-off-by: Fu Siyuan <siyuan.fu@intel.com>
Reviewed-by: Ye Ting <ting.ye@intel.com>
Reviewed-by: Dong Guo <guo.dong@intel.com>

git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@14661 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
Fu Siyuan 2013-09-12 05:26:15 +00:00 committed by sfu5
parent a555940b2d
commit 74b5fd7a11
1 changed files with 26 additions and 7 deletions

View File

@ -2195,7 +2195,24 @@ VerifyTimeBasedPayload (
if (AuthVarType == AuthVarTypePk) {
//
// Get platform key from variable.
// Verify that the signature has been made with the current Platform Key (no chaining for PK).
// First, get signer's certificates from SignedData.
//
VerifyStatus = Pkcs7GetSigners (
SigData,
SigDataSize,
&SignerCerts,
&CertStackSize,
&RootCert,
&RootCertSize
);
if (!VerifyStatus) {
goto Exit;
}
//
// Second, get the current platform key from variable. Check whether it's identical with signer's certificates
// in SignedData. If not, return error immediately.
//
Status = FindVariable (
EFI_PLATFORM_KEY_NAME,
@ -2205,14 +2222,16 @@ VerifyTimeBasedPayload (
FALSE
);
if (EFI_ERROR (Status)) {
return Status;
VerifyStatus = FALSE;
goto Exit;
}
CertList = (EFI_SIGNATURE_LIST *) GetVariableDataPtr (PkVariable.CurrPtr);
Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
RootCert = Cert->SignatureData;
RootCertSize = CertList->SignatureSize - (sizeof (EFI_SIGNATURE_DATA) - 1);
if ((RootCertSize != (CertList->SignatureSize - (sizeof (EFI_SIGNATURE_DATA) - 1))) ||
(CompareMem (Cert->SignatureData, RootCert, RootCertSize) != 0)) {
VerifyStatus = FALSE;
goto Exit;
}
//
// Verify Pkcs7 SignedData via Pkcs7Verify library.
@ -2368,7 +2387,7 @@ VerifyTimeBasedPayload (
Exit:
if (AuthVarType == AuthVarTypePriv) {
if (AuthVarType == AuthVarTypePk || AuthVarType == AuthVarTypePriv) {
Pkcs7FreeSigners (RootCert);
Pkcs7FreeSigners (SignerCerts);
}