/** @file A hook-in library for NetworkPkg/TlsAuthConfigDxe, in order to set volatile variables related to TLS configuration, before TlsAuthConfigDxe or HttpDxe (which is a UEFI_DRIVER) consume them. Copyright (C) 2013, 2015, 2018, Red Hat, Inc. Copyright (c) 2008 - 2012, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/licenses/bsd-license.php THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. **/ #include #include #include #include #include #include #include #include #include /** Read the list of trusted CA certificates from the fw_cfg file "etc/edk2/https/cacerts", and store it to gEfiTlsCaCertificateGuid:EFI_TLS_CA_CERTIFICATE_VARIABLE. The contents are validated (for well-formedness) by NetworkPkg/HttpDxe. **/ STATIC VOID SetCaCerts ( VOID ) { EFI_STATUS Status; FIRMWARE_CONFIG_ITEM HttpsCaCertsItem; UINTN HttpsCaCertsSize; VOID *HttpsCaCerts; Status = QemuFwCfgFindFile ("etc/edk2/https/cacerts", &HttpsCaCertsItem, &HttpsCaCertsSize); if (EFI_ERROR (Status)) { DEBUG ((DEBUG_VERBOSE, "%a:%a: not touching CA cert list\n", gEfiCallerBaseName, __FUNCTION__)); return; } // // Delete the current EFI_TLS_CA_CERTIFICATE_VARIABLE if it exists. This // serves two purposes: // // (a) If the variable exists with EFI_VARIABLE_NON_VOLATILE attribute, we // cannot make it volatile without deleting it first. // // (b) If we fail to recreate the variable later, deleting the current one is // still justified if the fw_cfg file exists. Emptying the set of trusted // CA certificates will fail HTTPS boot, which is better than trusting // any certificate that's possibly missing from the fw_cfg file. // Status = gRT->SetVariable ( EFI_TLS_CA_CERTIFICATE_VARIABLE, // VariableName &gEfiTlsCaCertificateGuid, // VendorGuid 0, // Attributes 0, // DataSize NULL // Data ); if (EFI_ERROR (Status) && (Status != EFI_NOT_FOUND)) { // // This is fatal. // DEBUG ((DEBUG_ERROR, "%a:%a: failed to delete %g:\"%s\"\n", gEfiCallerBaseName, __FUNCTION__, &gEfiTlsCaCertificateGuid, EFI_TLS_CA_CERTIFICATE_VARIABLE)); ASSERT_EFI_ERROR (Status); CpuDeadLoop (); } if (HttpsCaCertsSize == 0) { DEBUG ((DEBUG_VERBOSE, "%a:%a: applied empty CA cert list\n", gEfiCallerBaseName, __FUNCTION__)); return; } HttpsCaCerts = AllocatePool (HttpsCaCertsSize); if (HttpsCaCerts == NULL) { DEBUG ((DEBUG_ERROR, "%a:%a: failed to allocate HttpsCaCerts\n", gEfiCallerBaseName, __FUNCTION__)); return; } QemuFwCfgSelectItem (HttpsCaCertsItem); QemuFwCfgReadBytes (HttpsCaCertsSize, HttpsCaCerts); Status = gRT->SetVariable ( EFI_TLS_CA_CERTIFICATE_VARIABLE, // VariableName &gEfiTlsCaCertificateGuid, // VendorGuid EFI_VARIABLE_BOOTSERVICE_ACCESS, // Attributes HttpsCaCertsSize, // DataSize HttpsCaCerts // Data ); if (EFI_ERROR (Status)) { DEBUG ((DEBUG_ERROR, "%a:%a: failed to set %g:\"%s\": %r\n", gEfiCallerBaseName, __FUNCTION__, &gEfiTlsCaCertificateGuid, EFI_TLS_CA_CERTIFICATE_VARIABLE, Status)); goto FreeHttpsCaCerts; } DEBUG ((DEBUG_VERBOSE, "%a:%a: stored CA cert list (%Lu byte(s))\n", gEfiCallerBaseName, __FUNCTION__, (UINT64)HttpsCaCertsSize)); FreeHttpsCaCerts: FreePool (HttpsCaCerts); } /** Read the list of trusted cipher suites from the fw_cfg file "etc/edk2/https/ciphers", and store it to gEdkiiHttpTlsCipherListGuid:EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE. The contents are propagated by NetworkPkg/HttpDxe to NetworkPkg/TlsDxe; the list is processed by the latter. **/ STATIC VOID SetCipherSuites ( VOID ) { EFI_STATUS Status; FIRMWARE_CONFIG_ITEM HttpsCiphersItem; UINTN HttpsCiphersSize; VOID *HttpsCiphers; Status = QemuFwCfgFindFile ("etc/edk2/https/ciphers", &HttpsCiphersItem, &HttpsCiphersSize); if (EFI_ERROR (Status)) { DEBUG ((DEBUG_VERBOSE, "%a:%a: not touching cipher suites\n", gEfiCallerBaseName, __FUNCTION__)); return; } // // From this point on, any failure is fatal. An ordered cipher preference // list is available from QEMU, thus we cannot let the firmware attempt HTTPS // boot with either pre-existent or non-existent preferences. An empty set of // cipher suites does not fail HTTPS boot automatically; the default cipher // suite preferences would take effect, and we must prevent that. // // Delete the current EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE if it exists. If // the variable exists with EFI_VARIABLE_NON_VOLATILE attribute, we cannot // make it volatile without deleting it first. // Status = gRT->SetVariable ( EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE, // VariableName &gEdkiiHttpTlsCipherListGuid, // VendorGuid 0, // Attributes 0, // DataSize NULL // Data ); if (EFI_ERROR (Status) && (Status != EFI_NOT_FOUND)) { DEBUG ((DEBUG_ERROR, "%a:%a: failed to delete %g:\"%s\"\n", gEfiCallerBaseName, __FUNCTION__, &gEdkiiHttpTlsCipherListGuid, EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE)); goto Done; } if (HttpsCiphersSize == 0) { DEBUG ((DEBUG_ERROR, "%a:%a: list of cipher suites must not be empty\n", gEfiCallerBaseName, __FUNCTION__)); Status = EFI_INVALID_PARAMETER; goto Done; } HttpsCiphers = AllocatePool (HttpsCiphersSize); if (HttpsCiphers == NULL) { DEBUG ((DEBUG_ERROR, "%a:%a: failed to allocate HttpsCiphers\n", gEfiCallerBaseName, __FUNCTION__)); Status = EFI_OUT_OF_RESOURCES; goto Done; } QemuFwCfgSelectItem (HttpsCiphersItem); QemuFwCfgReadBytes (HttpsCiphersSize, HttpsCiphers); Status = gRT->SetVariable ( EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE, // VariableName &gEdkiiHttpTlsCipherListGuid, // VendorGuid EFI_VARIABLE_BOOTSERVICE_ACCESS, // Attributes HttpsCiphersSize, // DataSize HttpsCiphers // Data ); if (EFI_ERROR (Status)) { DEBUG ((DEBUG_ERROR, "%a:%a: failed to set %g:\"%s\"\n", gEfiCallerBaseName, __FUNCTION__, &gEdkiiHttpTlsCipherListGuid, EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE)); goto FreeHttpsCiphers; } DEBUG ((DEBUG_VERBOSE, "%a:%a: stored list of cipher suites (%Lu byte(s))\n", gEfiCallerBaseName, __FUNCTION__, (UINT64)HttpsCiphersSize)); FreeHttpsCiphers: FreePool (HttpsCiphers); Done: if (EFI_ERROR (Status)) { ASSERT_EFI_ERROR (Status); CpuDeadLoop (); } } RETURN_STATUS EFIAPI TlsAuthConfigInit ( VOID ) { SetCaCerts (); SetCipherSuites (); return RETURN_SUCCESS; }