375 lines
9.1 KiB
C
375 lines
9.1 KiB
C
/** @file
|
|
Provides an implementation of the library class RngLib that uses the Rng protocol.
|
|
|
|
Copyright (c) 2023 - 2024, Arm Limited. All rights reserved.
|
|
Copyright (c) Microsoft Corporation. All rights reserved.
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
**/
|
|
#include <Uefi.h>
|
|
#include <Library/UefiBootServicesTableLib.h>
|
|
#include <Library/BaseMemoryLib.h>
|
|
#include <Library/DebugLib.h>
|
|
#include <Library/MemoryAllocationLib.h>
|
|
#include <Library/RngLib.h>
|
|
#include <Protocol/Rng.h>
|
|
|
|
STATIC EFI_RNG_PROTOCOL *mRngProtocol;
|
|
STATIC UINTN mFirstAlgo = MAX_UINTN;
|
|
|
|
typedef struct {
|
|
/// Guid of the secure algorithm.
|
|
EFI_GUID *Guid;
|
|
|
|
/// Algorithm name.
|
|
CONST CHAR8 *Name;
|
|
|
|
/// The algorithm is available for use.
|
|
BOOLEAN Available;
|
|
} SECURE_RNG_ALGO_ARRAY;
|
|
|
|
//
|
|
// These represent UEFI SPEC defined algorithms that should be supported by
|
|
// the RNG protocol and are generally considered secure.
|
|
//
|
|
static SECURE_RNG_ALGO_ARRAY mSecureHashAlgorithms[] = {
|
|
#ifdef MDE_CPU_AARCH64
|
|
{
|
|
&gEfiRngAlgorithmArmRndr, // unspecified SP800-90A DRBG (through RNDR instr.)
|
|
"ARM-RNDR",
|
|
FALSE,
|
|
},
|
|
#endif
|
|
{
|
|
&gEfiRngAlgorithmSp80090Ctr256Guid, // SP800-90A DRBG CTR using AES-256
|
|
"DRBG-CTR",
|
|
FALSE,
|
|
},
|
|
{
|
|
&gEfiRngAlgorithmSp80090Hmac256Guid, // SP800-90A DRBG HMAC using SHA-256
|
|
"DRBG-HMAC",
|
|
FALSE,
|
|
},
|
|
{
|
|
&gEfiRngAlgorithmSp80090Hash256Guid, // SP800-90A DRBG Hash using SHA-256
|
|
"DRBG-Hash",
|
|
FALSE,
|
|
},
|
|
{
|
|
&gEfiRngAlgorithmRaw, // Raw data from NRBG (or TRNG)
|
|
"TRNG",
|
|
FALSE,
|
|
},
|
|
};
|
|
|
|
/**
|
|
Constructor routine to probe the available secure Rng algorithms.
|
|
|
|
@param ImageHandle The firmware allocated handle for the EFI image.
|
|
@param SystemTable A pointer to the EFI System Table.
|
|
|
|
@retval EFI_SUCCESS Success.
|
|
@retval EFI_NOT_FOUND Not found.
|
|
@retval EFI_INVALID_PARAMETER Invalid parameter.
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
DxeRngLibConstructor (
|
|
IN EFI_HANDLE ImageHandle,
|
|
IN EFI_SYSTEM_TABLE *SystemTable
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN RngArraySize;
|
|
UINTN RngArrayCnt;
|
|
UINT32 Index;
|
|
UINT32 Index1;
|
|
EFI_RNG_ALGORITHM *RngArray;
|
|
|
|
Status = gBS->LocateProtocol (&gEfiRngProtocolGuid, NULL, (VOID **)&mRngProtocol);
|
|
if (EFI_ERROR (Status) || (mRngProtocol == NULL)) {
|
|
DEBUG ((DEBUG_ERROR, "%a: Could not locate RNG protocol, Status = %r\n", __func__, Status));
|
|
return Status;
|
|
}
|
|
|
|
RngArraySize = 0;
|
|
|
|
Status = mRngProtocol->GetInfo (mRngProtocol, &RngArraySize, NULL);
|
|
if (EFI_ERROR (Status) && (Status != EFI_BUFFER_TOO_SMALL)) {
|
|
return Status;
|
|
} else if (RngArraySize == 0) {
|
|
return EFI_NOT_FOUND;
|
|
}
|
|
|
|
RngArrayCnt = RngArraySize / sizeof (*RngArray);
|
|
|
|
RngArray = AllocateZeroPool (RngArraySize);
|
|
if (RngArray == NULL) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
|
|
Status = mRngProtocol->GetInfo (mRngProtocol, &RngArraySize, RngArray);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ExitHandler;
|
|
}
|
|
|
|
for (Index = 0; Index < RngArrayCnt; Index++) {
|
|
for (Index1 = 0; Index1 < ARRAY_SIZE (mSecureHashAlgorithms); Index1++) {
|
|
if (CompareGuid (&RngArray[Index], mSecureHashAlgorithms[Index1].Guid)) {
|
|
mSecureHashAlgorithms[Index1].Available = TRUE;
|
|
if (mFirstAlgo == MAX_UINTN) {
|
|
mFirstAlgo = Index1;
|
|
}
|
|
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
ExitHandler:
|
|
FreePool (RngArray);
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
Routine Description:
|
|
|
|
Generates a random number via the NIST
|
|
800-9A algorithm. Refer to
|
|
http://csrc.nist.gov/groups/STM/cavp/documents/drbg/DRBGVS.pdf
|
|
for more information.
|
|
|
|
@param[out] Buffer Buffer to receive the random number.
|
|
@param[in] BufferSize Number of bytes in Buffer.
|
|
|
|
@retval EFI_SUCCESS or underlying failure code.
|
|
**/
|
|
STATIC
|
|
EFI_STATUS
|
|
GenerateRandomNumberViaNist800Algorithm (
|
|
OUT UINT8 *Buffer,
|
|
IN UINTN BufferSize
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN Index;
|
|
SECURE_RNG_ALGO_ARRAY *Algo;
|
|
|
|
if (Buffer == NULL) {
|
|
DEBUG ((DEBUG_ERROR, "%a: Buffer == NULL.\n", __func__));
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (mRngProtocol == NULL) {
|
|
return EFI_NOT_FOUND;
|
|
}
|
|
|
|
// Try the first available algorithm.
|
|
if (mFirstAlgo != MAX_UINTN) {
|
|
Algo = &mSecureHashAlgorithms[mFirstAlgo];
|
|
Status = mRngProtocol->GetRNG (mRngProtocol, Algo->Guid, BufferSize, Buffer);
|
|
DEBUG ((
|
|
DEBUG_INFO,
|
|
"%a: GetRNG algorithm %a - Status = %r\n",
|
|
__func__,
|
|
Algo->Name,
|
|
Status
|
|
));
|
|
if (!EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
|
|
Index = mFirstAlgo + 1;
|
|
} else {
|
|
Index = 0;
|
|
}
|
|
|
|
// Iterate over other available algorithms.
|
|
for ( ; Index < ARRAY_SIZE (mSecureHashAlgorithms); Index++) {
|
|
Algo = &mSecureHashAlgorithms[Index];
|
|
if (!Algo->Available) {
|
|
continue;
|
|
}
|
|
|
|
Status = mRngProtocol->GetRNG (mRngProtocol, Algo->Guid, BufferSize, Buffer);
|
|
DEBUG ((
|
|
DEBUG_INFO,
|
|
"%a: GetRNG algorithm %a - Status = %r\n",
|
|
__func__,
|
|
Algo->Name,
|
|
Status
|
|
));
|
|
if (!EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
}
|
|
|
|
if (PcdGetBool (PcdEnforceSecureRngAlgorithms)) {
|
|
// Platform does not permit the use of the default (insecure) algorithm.
|
|
Status = EFI_SECURITY_VIOLATION;
|
|
} else {
|
|
// If all the other methods have failed, use the default method from the RngProtocol
|
|
Status = mRngProtocol->GetRNG (mRngProtocol, NULL, BufferSize, Buffer);
|
|
DEBUG ((DEBUG_INFO, "%a: GetRNG algorithm default - Status = %r\n", __func__, Status));
|
|
if (!EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
}
|
|
|
|
// If we get to this point, we have failed
|
|
DEBUG ((DEBUG_ERROR, "%a: GetRNG() failed, Status = %r\n", __func__, Status));
|
|
|
|
return Status;
|
|
}// GenerateRandomNumberViaNist800Algorithm()
|
|
|
|
/**
|
|
Generates a 16-bit random number.
|
|
|
|
if Rand is NULL, return FALSE.
|
|
|
|
@param[out] Rand Buffer pointer to store the 16-bit random value.
|
|
|
|
@retval TRUE Random number generated successfully.
|
|
@retval FALSE Failed to generate the random number.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
GetRandomNumber16 (
|
|
OUT UINT16 *Rand
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
if (Rand == NULL) {
|
|
return FALSE;
|
|
}
|
|
|
|
Status = GenerateRandomNumberViaNist800Algorithm ((UINT8 *)Rand, sizeof (UINT16));
|
|
if (EFI_ERROR (Status)) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Generates a 32-bit random number.
|
|
|
|
if Rand is NULL, return FALSE.
|
|
|
|
@param[out] Rand Buffer pointer to store the 32-bit random value.
|
|
|
|
@retval TRUE Random number generated successfully.
|
|
@retval FALSE Failed to generate the random number.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
GetRandomNumber32 (
|
|
OUT UINT32 *Rand
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
if (Rand == NULL) {
|
|
return FALSE;
|
|
}
|
|
|
|
Status = GenerateRandomNumberViaNist800Algorithm ((UINT8 *)Rand, sizeof (UINT32));
|
|
if (EFI_ERROR (Status)) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Generates a 64-bit random number.
|
|
|
|
if Rand is NULL, return FALSE.
|
|
|
|
@param[out] Rand Buffer pointer to store the 64-bit random value.
|
|
|
|
@retval TRUE Random number generated successfully.
|
|
@retval FALSE Failed to generate the random number.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
GetRandomNumber64 (
|
|
OUT UINT64 *Rand
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
if (Rand == NULL) {
|
|
return FALSE;
|
|
}
|
|
|
|
Status = GenerateRandomNumberViaNist800Algorithm ((UINT8 *)Rand, sizeof (UINT64));
|
|
if (EFI_ERROR (Status)) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Generates a 128-bit random number.
|
|
|
|
if Rand is NULL, return FALSE.
|
|
|
|
@param[out] Rand Buffer pointer to store the 128-bit random value.
|
|
|
|
@retval TRUE Random number generated successfully.
|
|
@retval FALSE Failed to generate the random number.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
GetRandomNumber128 (
|
|
OUT UINT64 *Rand
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
if (Rand == NULL) {
|
|
return FALSE;
|
|
}
|
|
|
|
Status = GenerateRandomNumberViaNist800Algorithm ((UINT8 *)Rand, 2 * sizeof (UINT64));
|
|
if (EFI_ERROR (Status)) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Get a GUID identifying the RNG algorithm implementation.
|
|
|
|
@param [out] RngGuid If success, contains the GUID identifying
|
|
the RNG algorithm implementation.
|
|
|
|
@retval EFI_SUCCESS Success.
|
|
@retval EFI_UNSUPPORTED Not supported.
|
|
@retval EFI_INVALID_PARAMETER Invalid parameter.
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
GetRngGuid (
|
|
GUID *RngGuid
|
|
)
|
|
{
|
|
/* It is not possible to know beforehand which Rng algorithm will
|
|
* be used by this library.
|
|
* This API is mainly used by RngDxe. RngDxe relies on the RngLib.
|
|
* The RngLib|DxeRngLib.inf implementation locates and uses an installed
|
|
* EFI_RNG_PROTOCOL.
|
|
* It is thus not possible to have both RngDxe and RngLib|DxeRngLib.inf.
|
|
* and it is ok not to support this API.
|
|
*/
|
|
return EFI_UNSUPPORTED;
|
|
}
|