diff options
author | Patrick Ohly <patrick.ohly@intel.com> | 2016-12-21 09:18:05 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-03-01 11:17:45 +0000 |
commit | ae147e9cf5d0f0504adcc08fd20d36e1f269593e (patch) | |
tree | 4509661a691756430df2b659959ce132e2df709d | |
parent | 715f4e3ec1743a9565cefeee6707edabbd5a2201 (diff) | |
download | poky-ae147e9cf5d0f0504adcc08fd20d36e1f269593e.tar.gz |
ovmf: build image which enrolls standard keys
When booting a qemu virtual machine with ovmf.secboot, it comes up
with no keys installed and thus Secure Boot disabled. To lock down
the machine like a typical PC, one has to enroll the same keys
that PC vendors normally install, i.e. the ones from Microsoft.
This can be done manually (see
https://wiki.ubuntu.com/SecurityTeam/SecureBoot and
https://github.com/tianocore-docs/Docs/raw/master/White_Papers/A_Tour_Beyond_BIOS_into_UEFI_Secure_Boot_White_Paper.pdf) or automatically with the EnrollDefaultKeys.efi helper
from the Fedora ovmf rpm.
To use this with qemu:
$ bitbake ovmf-shell-image
...
$ runqemu serial nographic qemux86 ovmf-shell-image wic ovmf.secboot
...
UEFI Interactive Shell v2.1
EDK II
UEFI v2.60 (EDK II, 0x00010000)
Mapping table
FS0: Alias(s):HD2b:;BLK4:
PciRoot(0x0)/Pci(0x5,0x0)/HD(1,GPT,06AEF759-3982-4AF6-B517-70BA6304FC1C,0x800,0x566C)
BLK0: Alias(s):
PciRoot(0x0)/Pci(0x1,0x0)/Floppy(0x0)
BLK1: Alias(s):
PciRoot(0x0)/Pci(0x1,0x0)/Floppy(0x1)
BLK2: Alias(s):
PciRoot(0x0)/Pci(0x1,0x1)/Ata(0x0)
BLK3: Alias(s):
PciRoot(0x0)/Pci(0x5,0x0)
Press ESC in 1 seconds to skip startup.nsh or any other key to continue.
Shell> fs0:EnrollDefaultKeys.efi
info: SetupMode=1 SecureBoot=0 SecureBootEnable=0 CustomMode=0 VendorKeys=1
info: SetupMode=0 SecureBoot=1 SecureBootEnable=1 CustomMode=0 VendorKeys=0
info: success
Shell> reset
Remember that this will modify
deploy/images/qemux86/ovmf.secboot.qcow2, so make a copy and use the
full path of that copy instead of the "ovmf" argument if needed.
The ovmf-shell-image contains an EFI shell, which is what got started
here directly. After enrolling the keys, Secure Boot is active and the
same image cannot be booted anymore, so the BIOS goes through the
normal boot targets (including network boot, which can take a while to
time out), and ends up in the internal EFI shell. Trying to invoke
bootia32.efi (the shell from the image) or EnrollDefaultKeys.efi then
fails:
Shell> bootia32.efi
Command Error Status: Security Violation
The main purpose at the moment is to test that Secure Boot enforcement
really works. If we had a way to sign generated images, that part could
also be tested by booting in a locked down qemu instance.
0007-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch is
from
https://src.fedoraproject.org/cgit/rpms/edk2.git/tree/0007-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch?id=b1781931894bf2057464e634beed68b1e3218c9e
with one line changed to fix
https://bugzilla.redhat.com/show_bug.cgi?id=132502:
"EFI_STATUS Status = EFI_SUCCESS;" in EnrollListOfX509Certs() lacked
the initializer.
(From OE-Core rev: 1913ace7d0898b5a23a2dbdc574ab1d8648927c5)
Signed-off-by: Patrick Ohly <patrick.ohly@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
4 files changed, 1167 insertions, 0 deletions
diff --git a/meta/recipes-core/ovmf/ovmf-shell-image.bb b/meta/recipes-core/ovmf/ovmf-shell-image.bb new file mode 100644 index 0000000000..029547b94a --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf-shell-image.bb | |||
@@ -0,0 +1,17 @@ | |||
1 | DESCRIPTION = "boot image with UEFI shell and tools" | ||
2 | |||
3 | # For this image recipe, only the wic format with a | ||
4 | # single vfat partition makes sense. | ||
5 | IMAGE_FSTYPES_forcevariable = 'wic' | ||
6 | |||
7 | WKS_FILE = "ovmf/ovmf-shell-image.wks" | ||
8 | inherit image | ||
9 | |||
10 | # We want a minimal image with just ovmf-shell-efi unpacked in it. We | ||
11 | # avoid installing unnecessary stuff as much as possible, but some | ||
12 | # things still get through and need to be removed. | ||
13 | PACKAGE_INSTALL = "ovmf-shell-efi" | ||
14 | LINGUAS_INSTALL = "" | ||
15 | do_image () { | ||
16 | rm -rf `ls -d ${IMAGE_ROOTFS}/* | grep -v efi` | ||
17 | } | ||
diff --git a/meta/recipes-core/ovmf/ovmf/0007-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch b/meta/recipes-core/ovmf/ovmf/0007-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch new file mode 100644 index 0000000000..3aa6cc4acb --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/0007-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch | |||
@@ -0,0 +1,1124 @@ | |||
1 | From: Laszlo Ersek <lersek@redhat.com> | ||
2 | Date: Mon, 6 Jul 2015 20:22:02 +0200 | ||
3 | Subject: [PATCH] OvmfPkg: EnrollDefaultKeys: application for enrolling default | ||
4 | keys | ||
5 | |||
6 | (A port of the <https://bugzilla.redhat.com/show_bug.cgi?id=1148296> patch | ||
7 | to Gerd's public RPMs.) | ||
8 | |||
9 | This application is meant to be invoked by the management layer, after | ||
10 | booting the UEFI shell and getting a shell prompt on the serial console. | ||
11 | The app enrolls a number of certificates (see below), and then reports | ||
12 | status to the serial console as well. The expected output is "info: | ||
13 | success": | ||
14 | |||
15 | > Shell> EnrollDefaultKeys.efi | ||
16 | > info: SetupMode=1 SecureBoot=0 SecureBootEnable=0 CustomMode=0 VendorKeys=1 | ||
17 | > info: SetupMode=0 SecureBoot=1 SecureBootEnable=1 CustomMode=0 VendorKeys=0 | ||
18 | > info: success | ||
19 | > Shell> | ||
20 | |||
21 | In case of success, the management layer can force off or reboot the VM | ||
22 | (for example with the "reset -s" or "reset -c" UEFI shell commands, | ||
23 | respectively), and start the guest installation with SecureBoot enabled. | ||
24 | |||
25 | PK: | ||
26 | - A unique, static, ad-hoc certificate whose private half has been | ||
27 | destroyed (more precisely, never saved) and is therefore unusable for | ||
28 | signing. (The command for creating this certificate is saved in the | ||
29 | source code.) | ||
30 | |||
31 | KEK: | ||
32 | - same ad-hoc certificate as used for the PK, | ||
33 | - "Microsoft Corporation KEK CA 2011" -- the dbx data in Fedora's dbxtool | ||
34 | package is signed (indirectly, through a chain) with this; enrolling | ||
35 | such a KEK should allow guests to install those updates. | ||
36 | |||
37 | DB: | ||
38 | - "Microsoft Windows Production PCA 2011" -- to load Windows 8 and Windows | ||
39 | Server 2012 R2, | ||
40 | - "Microsoft Corporation UEFI CA 2011" -- to load Linux and signed PCI | ||
41 | oproms. | ||
42 | |||
43 | Contributed-under: TianoCore Contribution Agreement 1.0 | ||
44 | Signed-off-by: Laszlo Ersek <lersek@redhat.com> | ||
45 | Upstream-Status: Inappropriate [not author] | ||
46 | Signed-off-by: Patrick Ohly <patrick.ohly@intel.com> | ||
47 | --- | ||
48 | OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | 960 ++++++++++++++++++++++++ | ||
49 | OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf | 51 ++ | ||
50 | OvmfPkg/OvmfPkgIa32.dsc | 4 + | ||
51 | OvmfPkg/OvmfPkgIa32X64.dsc | 4 + | ||
52 | OvmfPkg/OvmfPkgX64.dsc | 4 + | ||
53 | 5 files changed, 1023 insertions(+) | ||
54 | create mode 100644 OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | ||
55 | create mode 100644 OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf | ||
56 | |||
57 | diff --git a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | ||
58 | new file mode 100644 | ||
59 | index 0000000..081212b | ||
60 | --- /dev/null | ||
61 | +++ b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | ||
62 | @@ -0,0 +1,960 @@ | ||
63 | +/** @file | ||
64 | + Enroll default PK, KEK, DB. | ||
65 | + | ||
66 | + Copyright (C) 2014, Red Hat, Inc. | ||
67 | + | ||
68 | + This program and the accompanying materials are licensed and made available | ||
69 | + under the terms and conditions of the BSD License which accompanies this | ||
70 | + distribution. The full text of the license may be found at | ||
71 | + http://opensource.org/licenses/bsd-license. | ||
72 | + | ||
73 | + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT | ||
74 | + WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. | ||
75 | +**/ | ||
76 | +#include <Guid/AuthenticatedVariableFormat.h> // gEfiCustomModeEnableGuid | ||
77 | +#include <Guid/GlobalVariable.h> // EFI_SETUP_MODE_NAME | ||
78 | +#include <Guid/ImageAuthentication.h> // EFI_IMAGE_SECURITY_DATABASE | ||
79 | +#include <Library/BaseMemoryLib.h> // CopyGuid() | ||
80 | +#include <Library/DebugLib.h> // ASSERT() | ||
81 | +#include <Library/MemoryAllocationLib.h> // FreePool() | ||
82 | +#include <Library/ShellCEntryLib.h> // ShellAppMain() | ||
83 | +#include <Library/UefiLib.h> // AsciiPrint() | ||
84 | +#include <Library/UefiRuntimeServicesTableLib.h> // gRT | ||
85 | + | ||
86 | +// | ||
87 | +// The example self-signed certificate below, which we'll use for both Platform | ||
88 | +// Key, and first Key Exchange Key, has been generated with the following | ||
89 | +// non-interactive openssl command. The passphrase is read from /dev/urandom, | ||
90 | +// and not saved, and the private key is written to /dev/null. In other words, | ||
91 | +// we can't sign anything else against this certificate, which is our purpose. | ||
92 | +// | ||
93 | +/* | ||
94 | + openssl req \ | ||
95 | + -passout file:<(head -c 16 /dev/urandom) \ | ||
96 | + -x509 \ | ||
97 | + -newkey rsa:2048 \ | ||
98 | + -keyout /dev/null \ | ||
99 | + -outform DER \ | ||
100 | + -subj $( | ||
101 | + printf /C=US | ||
102 | + printf /ST=TestStateOrProvince | ||
103 | + printf /L=TestLocality | ||
104 | + printf /O=TestOrganization | ||
105 | + printf /OU=TestOrganizationalUnit | ||
106 | + printf /CN=TestCommonName | ||
107 | + printf /emailAddress=test@example.com | ||
108 | + ) \ | ||
109 | + 2>/dev/null \ | ||
110 | + | xxd -i | ||
111 | +*/ | ||
112 | +STATIC CONST UINT8 ExampleCert[] = { | ||
113 | + 0x30, 0x82, 0x04, 0x45, 0x30, 0x82, 0x03, 0x2d, 0xa0, 0x03, 0x02, 0x01, 0x02, | ||
114 | + 0x02, 0x09, 0x00, 0xcf, 0x9f, 0x51, 0xa3, 0x07, 0xdb, 0x54, 0xa1, 0x30, 0x0d, | ||
115 | + 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, | ||
116 | + 0x30, 0x81, 0xb8, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, | ||
117 | + 0x02, 0x55, 0x53, 0x31, 0x1c, 0x30, 0x1a, 0x06, 0x03, 0x55, 0x04, 0x08, 0x0c, | ||
118 | + 0x13, 0x54, 0x65, 0x73, 0x74, 0x53, 0x74, 0x61, 0x74, 0x65, 0x4f, 0x72, 0x50, | ||
119 | + 0x72, 0x6f, 0x76, 0x69, 0x6e, 0x63, 0x65, 0x31, 0x15, 0x30, 0x13, 0x06, 0x03, | ||
120 | + 0x55, 0x04, 0x07, 0x0c, 0x0c, 0x54, 0x65, 0x73, 0x74, 0x4c, 0x6f, 0x63, 0x61, | ||
121 | + 0x6c, 0x69, 0x74, 0x79, 0x31, 0x19, 0x30, 0x17, 0x06, 0x03, 0x55, 0x04, 0x0a, | ||
122 | + 0x0c, 0x10, 0x54, 0x65, 0x73, 0x74, 0x4f, 0x72, 0x67, 0x61, 0x6e, 0x69, 0x7a, | ||
123 | + 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x31, 0x1f, 0x30, 0x1d, 0x06, 0x03, 0x55, 0x04, | ||
124 | + 0x0b, 0x0c, 0x16, 0x54, 0x65, 0x73, 0x74, 0x4f, 0x72, 0x67, 0x61, 0x6e, 0x69, | ||
125 | + 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x61, 0x6c, 0x55, 0x6e, 0x69, 0x74, 0x31, | ||
126 | + 0x17, 0x30, 0x15, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, 0x0e, 0x54, 0x65, 0x73, | ||
127 | + 0x74, 0x43, 0x6f, 0x6d, 0x6d, 0x6f, 0x6e, 0x4e, 0x61, 0x6d, 0x65, 0x31, 0x1f, | ||
128 | + 0x30, 0x1d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x01, | ||
129 | + 0x16, 0x10, 0x74, 0x65, 0x73, 0x74, 0x40, 0x65, 0x78, 0x61, 0x6d, 0x70, 0x6c, | ||
130 | + 0x65, 0x2e, 0x63, 0x6f, 0x6d, 0x30, 0x1e, 0x17, 0x0d, 0x31, 0x34, 0x31, 0x30, | ||
131 | + 0x30, 0x39, 0x31, 0x33, 0x32, 0x38, 0x32, 0x32, 0x5a, 0x17, 0x0d, 0x31, 0x34, | ||
132 | + 0x31, 0x31, 0x30, 0x38, 0x31, 0x33, 0x32, 0x38, 0x32, 0x32, 0x5a, 0x30, 0x81, | ||
133 | + 0xb8, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, 0x55, | ||
134 | + 0x53, 0x31, 0x1c, 0x30, 0x1a, 0x06, 0x03, 0x55, 0x04, 0x08, 0x0c, 0x13, 0x54, | ||
135 | + 0x65, 0x73, 0x74, 0x53, 0x74, 0x61, 0x74, 0x65, 0x4f, 0x72, 0x50, 0x72, 0x6f, | ||
136 | + 0x76, 0x69, 0x6e, 0x63, 0x65, 0x31, 0x15, 0x30, 0x13, 0x06, 0x03, 0x55, 0x04, | ||
137 | + 0x07, 0x0c, 0x0c, 0x54, 0x65, 0x73, 0x74, 0x4c, 0x6f, 0x63, 0x61, 0x6c, 0x69, | ||
138 | + 0x74, 0x79, 0x31, 0x19, 0x30, 0x17, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x0c, 0x10, | ||
139 | + 0x54, 0x65, 0x73, 0x74, 0x4f, 0x72, 0x67, 0x61, 0x6e, 0x69, 0x7a, 0x61, 0x74, | ||
140 | + 0x69, 0x6f, 0x6e, 0x31, 0x1f, 0x30, 0x1d, 0x06, 0x03, 0x55, 0x04, 0x0b, 0x0c, | ||
141 | + 0x16, 0x54, 0x65, 0x73, 0x74, 0x4f, 0x72, 0x67, 0x61, 0x6e, 0x69, 0x7a, 0x61, | ||
142 | + 0x74, 0x69, 0x6f, 0x6e, 0x61, 0x6c, 0x55, 0x6e, 0x69, 0x74, 0x31, 0x17, 0x30, | ||
143 | + 0x15, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, 0x0e, 0x54, 0x65, 0x73, 0x74, 0x43, | ||
144 | + 0x6f, 0x6d, 0x6d, 0x6f, 0x6e, 0x4e, 0x61, 0x6d, 0x65, 0x31, 0x1f, 0x30, 0x1d, | ||
145 | + 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x01, 0x16, 0x10, | ||
146 | + 0x74, 0x65, 0x73, 0x74, 0x40, 0x65, 0x78, 0x61, 0x6d, 0x70, 0x6c, 0x65, 0x2e, | ||
147 | + 0x63, 0x6f, 0x6d, 0x30, 0x82, 0x01, 0x22, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, | ||
148 | + 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x82, 0x01, 0x0f, | ||
149 | + 0x00, 0x30, 0x82, 0x01, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0xbf, 0xf1, 0xce, | ||
150 | + 0x17, 0x32, 0xac, 0xc4, 0x4b, 0xb2, 0xed, 0x84, 0x76, 0xe5, 0xd0, 0xf8, 0x21, | ||
151 | + 0xac, 0x10, 0xf8, 0x18, 0x09, 0x0e, 0x07, 0x13, 0x76, 0x21, 0x5c, 0xc4, 0xcc, | ||
152 | + 0xd5, 0xe6, 0x25, 0xa7, 0x26, 0x53, 0x79, 0x2f, 0x16, 0x4b, 0x85, 0xbd, 0xae, | ||
153 | + 0x42, 0x64, 0x58, 0xcb, 0x5e, 0xe8, 0x6e, 0x5a, 0xd0, 0xc4, 0x0f, 0x38, 0x16, | ||
154 | + 0xbe, 0xd3, 0x22, 0xa7, 0x3c, 0x9b, 0x8b, 0x5e, 0xcb, 0x62, 0x35, 0xc5, 0x9b, | ||
155 | + 0xe2, 0x8e, 0x4c, 0x65, 0x57, 0x4f, 0xcb, 0x27, 0xad, 0xe7, 0x63, 0xa7, 0x77, | ||
156 | + 0x2b, 0xd5, 0x02, 0x42, 0x70, 0x46, 0xac, 0xba, 0xb6, 0x60, 0x57, 0xd9, 0xce, | ||
157 | + 0x31, 0xc5, 0x12, 0x03, 0x4a, 0xf7, 0x2a, 0x2b, 0x40, 0x06, 0xb4, 0xdb, 0x31, | ||
158 | + 0xb7, 0x83, 0x6c, 0x67, 0x87, 0x98, 0x8b, 0xce, 0x1b, 0x30, 0x7a, 0xfa, 0x35, | ||
159 | + 0x6c, 0x86, 0x20, 0x74, 0xc5, 0x7d, 0x32, 0x31, 0x18, 0xeb, 0x69, 0xf7, 0x2d, | ||
160 | + 0x20, 0xc4, 0xf0, 0xd2, 0xfa, 0x67, 0x81, 0xc1, 0xbb, 0x23, 0xbb, 0x75, 0x1a, | ||
161 | + 0xe4, 0xb4, 0x49, 0x99, 0xdf, 0x12, 0x4c, 0xe3, 0x6d, 0x76, 0x24, 0x85, 0x24, | ||
162 | + 0xae, 0x5a, 0x9e, 0xbd, 0x54, 0x1c, 0xf9, 0x0e, 0xed, 0x96, 0xb5, 0xd8, 0xa2, | ||
163 | + 0x0d, 0x2a, 0x38, 0x5d, 0x12, 0x97, 0xb0, 0x4d, 0x75, 0x85, 0x1e, 0x47, 0x6d, | ||
164 | + 0xe1, 0x25, 0x59, 0xcb, 0xe9, 0x33, 0x86, 0x6a, 0xef, 0x98, 0x24, 0xa0, 0x2b, | ||
165 | + 0x02, 0x7b, 0xc0, 0x9f, 0x88, 0x03, 0xb0, 0xbe, 0x22, 0x65, 0x83, 0x77, 0xb3, | ||
166 | + 0x30, 0xba, 0xe0, 0x3b, 0x54, 0x31, 0x3a, 0x45, 0x81, 0x9c, 0x48, 0xaf, 0xc1, | ||
167 | + 0x11, 0x5b, 0xf2, 0x3a, 0x1e, 0x33, 0x1b, 0x8f, 0x0e, 0x04, 0xa4, 0x16, 0xd4, | ||
168 | + 0x6b, 0x57, 0xee, 0xe7, 0xba, 0xf5, 0xee, 0xaf, 0xe2, 0x4c, 0x50, 0xf8, 0x68, | ||
169 | + 0x57, 0x88, 0xfb, 0x7f, 0xa3, 0xcf, 0x02, 0x03, 0x01, 0x00, 0x01, 0xa3, 0x50, | ||
170 | + 0x30, 0x4e, 0x30, 0x1d, 0x06, 0x03, 0x55, 0x1d, 0x0e, 0x04, 0x16, 0x04, 0x14, | ||
171 | + 0x1e, 0x44, 0xe5, 0xef, 0xcd, 0x6e, 0x1f, 0xdb, 0xcb, 0x4f, 0x94, 0x8f, 0xe3, | ||
172 | + 0x3b, 0x1a, 0x8c, 0xe6, 0x95, 0x29, 0x61, 0x30, 0x1f, 0x06, 0x03, 0x55, 0x1d, | ||
173 | + 0x23, 0x04, 0x18, 0x30, 0x16, 0x80, 0x14, 0x1e, 0x44, 0xe5, 0xef, 0xcd, 0x6e, | ||
174 | + 0x1f, 0xdb, 0xcb, 0x4f, 0x94, 0x8f, 0xe3, 0x3b, 0x1a, 0x8c, 0xe6, 0x95, 0x29, | ||
175 | + 0x61, 0x30, 0x0c, 0x06, 0x03, 0x55, 0x1d, 0x13, 0x04, 0x05, 0x30, 0x03, 0x01, | ||
176 | + 0x01, 0xff, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, | ||
177 | + 0x01, 0x0b, 0x05, 0x00, 0x03, 0x82, 0x01, 0x01, 0x00, 0x12, 0x9c, 0x3e, 0x38, | ||
178 | + 0xfc, 0x26, 0xea, 0x6d, 0xb7, 0x5c, 0x29, 0x3c, 0x76, 0x20, 0x0c, 0xb2, 0xa9, | ||
179 | + 0x0f, 0xdf, 0xc0, 0x85, 0xfe, 0xeb, 0xec, 0x1d, 0x5d, 0x73, 0x84, 0xac, 0x8a, | ||
180 | + 0xb4, 0x2a, 0x86, 0x38, 0x30, 0xaf, 0xd2, 0x2d, 0x2a, 0xde, 0x54, 0xc8, 0x5c, | ||
181 | + 0x29, 0x90, 0x24, 0xf2, 0x39, 0xc1, 0xa5, 0x00, 0xb4, 0xb7, 0xd8, 0xdc, 0x59, | ||
182 | + 0x64, 0x50, 0x62, 0x5f, 0x54, 0xf1, 0x73, 0x02, 0x4d, 0x43, 0xc5, 0xc3, 0xc4, | ||
183 | + 0x0e, 0x62, 0x60, 0x8c, 0x53, 0x66, 0x57, 0x77, 0xb5, 0x81, 0xda, 0x1f, 0x81, | ||
184 | + 0xda, 0xe9, 0xd6, 0x5e, 0x82, 0xce, 0xa7, 0x5c, 0xc0, 0xa6, 0xbe, 0x9c, 0x5c, | ||
185 | + 0x7b, 0xa5, 0x15, 0xc8, 0xd7, 0x14, 0x53, 0xd3, 0x5c, 0x1c, 0x9f, 0x8a, 0x9f, | ||
186 | + 0x66, 0x15, 0xd5, 0xd3, 0x2a, 0x27, 0x0c, 0xee, 0x9f, 0x80, 0x39, 0x88, 0x7b, | ||
187 | + 0x24, 0xde, 0x0c, 0x61, 0xa3, 0x44, 0xd8, 0x8d, 0x2e, 0x79, 0xf8, 0x1e, 0x04, | ||
188 | + 0x5a, 0xcb, 0xd6, 0x9c, 0xa3, 0x22, 0x8f, 0x09, 0x32, 0x1e, 0xe1, 0x65, 0x8f, | ||
189 | + 0x10, 0x5f, 0xd8, 0x52, 0x56, 0xd5, 0x77, 0xac, 0x58, 0x46, 0x60, 0xba, 0x2e, | ||
190 | + 0xe2, 0x3f, 0x58, 0x7d, 0x60, 0xfc, 0x31, 0x4a, 0x3a, 0xaf, 0x61, 0x55, 0x5f, | ||
191 | + 0xfb, 0x68, 0x14, 0x74, 0xda, 0xdc, 0x42, 0x78, 0xcc, 0xee, 0xff, 0x5c, 0x03, | ||
192 | + 0x24, 0x26, 0x2c, 0xb8, 0x3a, 0x81, 0xad, 0xdb, 0xe7, 0xed, 0xe1, 0x62, 0x84, | ||
193 | + 0x07, 0x1a, 0xc8, 0xa4, 0x4e, 0xb0, 0x87, 0xf7, 0x96, 0xd8, 0x33, 0x9b, 0x0d, | ||
194 | + 0xa7, 0x77, 0xae, 0x5b, 0xaf, 0xad, 0xe6, 0x5a, 0xc9, 0xfa, 0xa4, 0xe4, 0xe5, | ||
195 | + 0x57, 0xbb, 0x97, 0xdd, 0x92, 0x85, 0xd8, 0x03, 0x45, 0xfe, 0xd8, 0x6b, 0xb1, | ||
196 | + 0xdb, 0x85, 0x36, 0xb9, 0xd9, 0x28, 0xbf, 0x17, 0xae, 0x11, 0xde, 0x10, 0x19, | ||
197 | + 0x26, 0x5b, 0xc0, 0x3d, 0xc7 | ||
198 | +}; | ||
199 | + | ||
200 | +// | ||
201 | +// Second KEK: "Microsoft Corporation KEK CA 2011". | ||
202 | +// SHA1: 31:59:0b:fd:89:c9:d7:4e:d0:87:df:ac:66:33:4b:39:31:25:4b:30 | ||
203 | +// | ||
204 | +// "dbx" updates in "dbxtool" are signed with a key derived from this KEK. | ||
205 | +// | ||
206 | +STATIC CONST UINT8 MicrosoftKEK[] = { | ||
207 | + 0x30, 0x82, 0x05, 0xe8, 0x30, 0x82, 0x03, 0xd0, 0xa0, 0x03, 0x02, 0x01, 0x02, | ||
208 | + 0x02, 0x0a, 0x61, 0x0a, 0xd1, 0x88, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x30, | ||
209 | + 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, | ||
210 | + 0x00, 0x30, 0x81, 0x91, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, | ||
211 | + 0x13, 0x02, 0x55, 0x53, 0x31, 0x13, 0x30, 0x11, 0x06, 0x03, 0x55, 0x04, 0x08, | ||
212 | + 0x13, 0x0a, 0x57, 0x61, 0x73, 0x68, 0x69, 0x6e, 0x67, 0x74, 0x6f, 0x6e, 0x31, | ||
213 | + 0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x07, 0x13, 0x07, 0x52, 0x65, 0x64, | ||
214 | + 0x6d, 0x6f, 0x6e, 0x64, 0x31, 0x1e, 0x30, 0x1c, 0x06, 0x03, 0x55, 0x04, 0x0a, | ||
215 | + 0x13, 0x15, 0x4d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, 0x20, 0x43, | ||
216 | + 0x6f, 0x72, 0x70, 0x6f, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x31, 0x3b, 0x30, | ||
217 | + 0x39, 0x06, 0x03, 0x55, 0x04, 0x03, 0x13, 0x32, 0x4d, 0x69, 0x63, 0x72, 0x6f, | ||
218 | + 0x73, 0x6f, 0x66, 0x74, 0x20, 0x43, 0x6f, 0x72, 0x70, 0x6f, 0x72, 0x61, 0x74, | ||
219 | + 0x69, 0x6f, 0x6e, 0x20, 0x54, 0x68, 0x69, 0x72, 0x64, 0x20, 0x50, 0x61, 0x72, | ||
220 | + 0x74, 0x79, 0x20, 0x4d, 0x61, 0x72, 0x6b, 0x65, 0x74, 0x70, 0x6c, 0x61, 0x63, | ||
221 | + 0x65, 0x20, 0x52, 0x6f, 0x6f, 0x74, 0x30, 0x1e, 0x17, 0x0d, 0x31, 0x31, 0x30, | ||
222 | + 0x36, 0x32, 0x34, 0x32, 0x30, 0x34, 0x31, 0x32, 0x39, 0x5a, 0x17, 0x0d, 0x32, | ||
223 | + 0x36, 0x30, 0x36, 0x32, 0x34, 0x32, 0x30, 0x35, 0x31, 0x32, 0x39, 0x5a, 0x30, | ||
224 | + 0x81, 0x80, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, | ||
225 | + 0x55, 0x53, 0x31, 0x13, 0x30, 0x11, 0x06, 0x03, 0x55, 0x04, 0x08, 0x13, 0x0a, | ||
226 | + 0x57, 0x61, 0x73, 0x68, 0x69, 0x6e, 0x67, 0x74, 0x6f, 0x6e, 0x31, 0x10, 0x30, | ||
227 | + 0x0e, 0x06, 0x03, 0x55, 0x04, 0x07, 0x13, 0x07, 0x52, 0x65, 0x64, 0x6d, 0x6f, | ||
228 | + 0x6e, 0x64, 0x31, 0x1e, 0x30, 0x1c, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x13, 0x15, | ||
229 | + 0x4d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, 0x20, 0x43, 0x6f, 0x72, | ||
230 | + 0x70, 0x6f, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x31, 0x2a, 0x30, 0x28, 0x06, | ||
231 | + 0x03, 0x55, 0x04, 0x03, 0x13, 0x21, 0x4d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, | ||
232 | + 0x66, 0x74, 0x20, 0x43, 0x6f, 0x72, 0x70, 0x6f, 0x72, 0x61, 0x74, 0x69, 0x6f, | ||
233 | + 0x6e, 0x20, 0x4b, 0x45, 0x4b, 0x20, 0x43, 0x41, 0x20, 0x32, 0x30, 0x31, 0x31, | ||
234 | + 0x30, 0x82, 0x01, 0x22, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, | ||
235 | + 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x82, 0x01, 0x0f, 0x00, 0x30, 0x82, | ||
236 | + 0x01, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0xc4, 0xe8, 0xb5, 0x8a, 0xbf, 0xad, | ||
237 | + 0x57, 0x26, 0xb0, 0x26, 0xc3, 0xea, 0xe7, 0xfb, 0x57, 0x7a, 0x44, 0x02, 0x5d, | ||
238 | + 0x07, 0x0d, 0xda, 0x4a, 0xe5, 0x74, 0x2a, 0xe6, 0xb0, 0x0f, 0xec, 0x6d, 0xeb, | ||
239 | + 0xec, 0x7f, 0xb9, 0xe3, 0x5a, 0x63, 0x32, 0x7c, 0x11, 0x17, 0x4f, 0x0e, 0xe3, | ||
240 | + 0x0b, 0xa7, 0x38, 0x15, 0x93, 0x8e, 0xc6, 0xf5, 0xe0, 0x84, 0xb1, 0x9a, 0x9b, | ||
241 | + 0x2c, 0xe7, 0xf5, 0xb7, 0x91, 0xd6, 0x09, 0xe1, 0xe2, 0xc0, 0x04, 0xa8, 0xac, | ||
242 | + 0x30, 0x1c, 0xdf, 0x48, 0xf3, 0x06, 0x50, 0x9a, 0x64, 0xa7, 0x51, 0x7f, 0xc8, | ||
243 | + 0x85, 0x4f, 0x8f, 0x20, 0x86, 0xce, 0xfe, 0x2f, 0xe1, 0x9f, 0xff, 0x82, 0xc0, | ||
244 | + 0xed, 0xe9, 0xcd, 0xce, 0xf4, 0x53, 0x6a, 0x62, 0x3a, 0x0b, 0x43, 0xb9, 0xe2, | ||
245 | + 0x25, 0xfd, 0xfe, 0x05, 0xf9, 0xd4, 0xc4, 0x14, 0xab, 0x11, 0xe2, 0x23, 0x89, | ||
246 | + 0x8d, 0x70, 0xb7, 0xa4, 0x1d, 0x4d, 0xec, 0xae, 0xe5, 0x9c, 0xfa, 0x16, 0xc2, | ||
247 | + 0xd7, 0xc1, 0xcb, 0xd4, 0xe8, 0xc4, 0x2f, 0xe5, 0x99, 0xee, 0x24, 0x8b, 0x03, | ||
248 | + 0xec, 0x8d, 0xf2, 0x8b, 0xea, 0xc3, 0x4a, 0xfb, 0x43, 0x11, 0x12, 0x0b, 0x7e, | ||
249 | + 0xb5, 0x47, 0x92, 0x6c, 0xdc, 0xe6, 0x04, 0x89, 0xeb, 0xf5, 0x33, 0x04, 0xeb, | ||
250 | + 0x10, 0x01, 0x2a, 0x71, 0xe5, 0xf9, 0x83, 0x13, 0x3c, 0xff, 0x25, 0x09, 0x2f, | ||
251 | + 0x68, 0x76, 0x46, 0xff, 0xba, 0x4f, 0xbe, 0xdc, 0xad, 0x71, 0x2a, 0x58, 0xaa, | ||
252 | + 0xfb, 0x0e, 0xd2, 0x79, 0x3d, 0xe4, 0x9b, 0x65, 0x3b, 0xcc, 0x29, 0x2a, 0x9f, | ||
253 | + 0xfc, 0x72, 0x59, 0xa2, 0xeb, 0xae, 0x92, 0xef, 0xf6, 0x35, 0x13, 0x80, 0xc6, | ||
254 | + 0x02, 0xec, 0xe4, 0x5f, 0xcc, 0x9d, 0x76, 0xcd, 0xef, 0x63, 0x92, 0xc1, 0xaf, | ||
255 | + 0x79, 0x40, 0x84, 0x79, 0x87, 0x7f, 0xe3, 0x52, 0xa8, 0xe8, 0x9d, 0x7b, 0x07, | ||
256 | + 0x69, 0x8f, 0x15, 0x02, 0x03, 0x01, 0x00, 0x01, 0xa3, 0x82, 0x01, 0x4f, 0x30, | ||
257 | + 0x82, 0x01, 0x4b, 0x30, 0x10, 0x06, 0x09, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, | ||
258 | + 0x37, 0x15, 0x01, 0x04, 0x03, 0x02, 0x01, 0x00, 0x30, 0x1d, 0x06, 0x03, 0x55, | ||
259 | + 0x1d, 0x0e, 0x04, 0x16, 0x04, 0x14, 0x62, 0xfc, 0x43, 0xcd, 0xa0, 0x3e, 0xa4, | ||
260 | + 0xcb, 0x67, 0x12, 0xd2, 0x5b, 0xd9, 0x55, 0xac, 0x7b, 0xcc, 0xb6, 0x8a, 0x5f, | ||
261 | + 0x30, 0x19, 0x06, 0x09, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, | ||
262 | + 0x04, 0x0c, 0x1e, 0x0a, 0x00, 0x53, 0x00, 0x75, 0x00, 0x62, 0x00, 0x43, 0x00, | ||
263 | + 0x41, 0x30, 0x0b, 0x06, 0x03, 0x55, 0x1d, 0x0f, 0x04, 0x04, 0x03, 0x02, 0x01, | ||
264 | + 0x86, 0x30, 0x0f, 0x06, 0x03, 0x55, 0x1d, 0x13, 0x01, 0x01, 0xff, 0x04, 0x05, | ||
265 | + 0x30, 0x03, 0x01, 0x01, 0xff, 0x30, 0x1f, 0x06, 0x03, 0x55, 0x1d, 0x23, 0x04, | ||
266 | + 0x18, 0x30, 0x16, 0x80, 0x14, 0x45, 0x66, 0x52, 0x43, 0xe1, 0x7e, 0x58, 0x11, | ||
267 | + 0xbf, 0xd6, 0x4e, 0x9e, 0x23, 0x55, 0x08, 0x3b, 0x3a, 0x22, 0x6a, 0xa8, 0x30, | ||
268 | + 0x5c, 0x06, 0x03, 0x55, 0x1d, 0x1f, 0x04, 0x55, 0x30, 0x53, 0x30, 0x51, 0xa0, | ||
269 | + 0x4f, 0xa0, 0x4d, 0x86, 0x4b, 0x68, 0x74, 0x74, 0x70, 0x3a, 0x2f, 0x2f, 0x63, | ||
270 | + 0x72, 0x6c, 0x2e, 0x6d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, 0x2e, | ||
271 | + 0x63, 0x6f, 0x6d, 0x2f, 0x70, 0x6b, 0x69, 0x2f, 0x63, 0x72, 0x6c, 0x2f, 0x70, | ||
272 | + 0x72, 0x6f, 0x64, 0x75, 0x63, 0x74, 0x73, 0x2f, 0x4d, 0x69, 0x63, 0x43, 0x6f, | ||
273 | + 0x72, 0x54, 0x68, 0x69, 0x50, 0x61, 0x72, 0x4d, 0x61, 0x72, 0x52, 0x6f, 0x6f, | ||
274 | + 0x5f, 0x32, 0x30, 0x31, 0x30, 0x2d, 0x31, 0x30, 0x2d, 0x30, 0x35, 0x2e, 0x63, | ||
275 | + 0x72, 0x6c, 0x30, 0x60, 0x06, 0x08, 0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x01, | ||
276 | + 0x01, 0x04, 0x54, 0x30, 0x52, 0x30, 0x50, 0x06, 0x08, 0x2b, 0x06, 0x01, 0x05, | ||
277 | + 0x05, 0x07, 0x30, 0x02, 0x86, 0x44, 0x68, 0x74, 0x74, 0x70, 0x3a, 0x2f, 0x2f, | ||
278 | + 0x77, 0x77, 0x77, 0x2e, 0x6d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, | ||
279 | + 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x70, 0x6b, 0x69, 0x2f, 0x63, 0x65, 0x72, 0x74, | ||
280 | + 0x73, 0x2f, 0x4d, 0x69, 0x63, 0x43, 0x6f, 0x72, 0x54, 0x68, 0x69, 0x50, 0x61, | ||
281 | + 0x72, 0x4d, 0x61, 0x72, 0x52, 0x6f, 0x6f, 0x5f, 0x32, 0x30, 0x31, 0x30, 0x2d, | ||
282 | + 0x31, 0x30, 0x2d, 0x30, 0x35, 0x2e, 0x63, 0x72, 0x74, 0x30, 0x0d, 0x06, 0x09, | ||
283 | + 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x03, 0x82, | ||
284 | + 0x02, 0x01, 0x00, 0xd4, 0x84, 0x88, 0xf5, 0x14, 0x94, 0x18, 0x02, 0xca, 0x2a, | ||
285 | + 0x3c, 0xfb, 0x2a, 0x92, 0x1c, 0x0c, 0xd7, 0xa0, 0xd1, 0xf1, 0xe8, 0x52, 0x66, | ||
286 | + 0xa8, 0xee, 0xa2, 0xb5, 0x75, 0x7a, 0x90, 0x00, 0xaa, 0x2d, 0xa4, 0x76, 0x5a, | ||
287 | + 0xea, 0x79, 0xb7, 0xb9, 0x37, 0x6a, 0x51, 0x7b, 0x10, 0x64, 0xf6, 0xe1, 0x64, | ||
288 | + 0xf2, 0x02, 0x67, 0xbe, 0xf7, 0xa8, 0x1b, 0x78, 0xbd, 0xba, 0xce, 0x88, 0x58, | ||
289 | + 0x64, 0x0c, 0xd6, 0x57, 0xc8, 0x19, 0xa3, 0x5f, 0x05, 0xd6, 0xdb, 0xc6, 0xd0, | ||
290 | + 0x69, 0xce, 0x48, 0x4b, 0x32, 0xb7, 0xeb, 0x5d, 0xd2, 0x30, 0xf5, 0xc0, 0xf5, | ||
291 | + 0xb8, 0xba, 0x78, 0x07, 0xa3, 0x2b, 0xfe, 0x9b, 0xdb, 0x34, 0x56, 0x84, 0xec, | ||
292 | + 0x82, 0xca, 0xae, 0x41, 0x25, 0x70, 0x9c, 0x6b, 0xe9, 0xfe, 0x90, 0x0f, 0xd7, | ||
293 | + 0x96, 0x1f, 0xe5, 0xe7, 0x94, 0x1f, 0xb2, 0x2a, 0x0c, 0x8d, 0x4b, 0xff, 0x28, | ||
294 | + 0x29, 0x10, 0x7b, 0xf7, 0xd7, 0x7c, 0xa5, 0xd1, 0x76, 0xb9, 0x05, 0xc8, 0x79, | ||
295 | + 0xed, 0x0f, 0x90, 0x92, 0x9c, 0xc2, 0xfe, 0xdf, 0x6f, 0x7e, 0x6c, 0x0f, 0x7b, | ||
296 | + 0xd4, 0xc1, 0x45, 0xdd, 0x34, 0x51, 0x96, 0x39, 0x0f, 0xe5, 0x5e, 0x56, 0xd8, | ||
297 | + 0x18, 0x05, 0x96, 0xf4, 0x07, 0xa6, 0x42, 0xb3, 0xa0, 0x77, 0xfd, 0x08, 0x19, | ||
298 | + 0xf2, 0x71, 0x56, 0xcc, 0x9f, 0x86, 0x23, 0xa4, 0x87, 0xcb, 0xa6, 0xfd, 0x58, | ||
299 | + 0x7e, 0xd4, 0x69, 0x67, 0x15, 0x91, 0x7e, 0x81, 0xf2, 0x7f, 0x13, 0xe5, 0x0d, | ||
300 | + 0x8b, 0x8a, 0x3c, 0x87, 0x84, 0xeb, 0xe3, 0xce, 0xbd, 0x43, 0xe5, 0xad, 0x2d, | ||
301 | + 0x84, 0x93, 0x8e, 0x6a, 0x2b, 0x5a, 0x7c, 0x44, 0xfa, 0x52, 0xaa, 0x81, 0xc8, | ||
302 | + 0x2d, 0x1c, 0xbb, 0xe0, 0x52, 0xdf, 0x00, 0x11, 0xf8, 0x9a, 0x3d, 0xc1, 0x60, | ||
303 | + 0xb0, 0xe1, 0x33, 0xb5, 0xa3, 0x88, 0xd1, 0x65, 0x19, 0x0a, 0x1a, 0xe7, 0xac, | ||
304 | + 0x7c, 0xa4, 0xc1, 0x82, 0x87, 0x4e, 0x38, 0xb1, 0x2f, 0x0d, 0xc5, 0x14, 0x87, | ||
305 | + 0x6f, 0xfd, 0x8d, 0x2e, 0xbc, 0x39, 0xb6, 0xe7, 0xe6, 0xc3, 0xe0, 0xe4, 0xcd, | ||
306 | + 0x27, 0x84, 0xef, 0x94, 0x42, 0xef, 0x29, 0x8b, 0x90, 0x46, 0x41, 0x3b, 0x81, | ||
307 | + 0x1b, 0x67, 0xd8, 0xf9, 0x43, 0x59, 0x65, 0xcb, 0x0d, 0xbc, 0xfd, 0x00, 0x92, | ||
308 | + 0x4f, 0xf4, 0x75, 0x3b, 0xa7, 0xa9, 0x24, 0xfc, 0x50, 0x41, 0x40, 0x79, 0xe0, | ||
309 | + 0x2d, 0x4f, 0x0a, 0x6a, 0x27, 0x76, 0x6e, 0x52, 0xed, 0x96, 0x69, 0x7b, 0xaf, | ||
310 | + 0x0f, 0xf7, 0x87, 0x05, 0xd0, 0x45, 0xc2, 0xad, 0x53, 0x14, 0x81, 0x1f, 0xfb, | ||
311 | + 0x30, 0x04, 0xaa, 0x37, 0x36, 0x61, 0xda, 0x4a, 0x69, 0x1b, 0x34, 0xd8, 0x68, | ||
312 | + 0xed, 0xd6, 0x02, 0xcf, 0x6c, 0x94, 0x0c, 0xd3, 0xcf, 0x6c, 0x22, 0x79, 0xad, | ||
313 | + 0xb1, 0xf0, 0xbc, 0x03, 0xa2, 0x46, 0x60, 0xa9, 0xc4, 0x07, 0xc2, 0x21, 0x82, | ||
314 | + 0xf1, 0xfd, 0xf2, 0xe8, 0x79, 0x32, 0x60, 0xbf, 0xd8, 0xac, 0xa5, 0x22, 0x14, | ||
315 | + 0x4b, 0xca, 0xc1, 0xd8, 0x4b, 0xeb, 0x7d, 0x3f, 0x57, 0x35, 0xb2, 0xe6, 0x4f, | ||
316 | + 0x75, 0xb4, 0xb0, 0x60, 0x03, 0x22, 0x53, 0xae, 0x91, 0x79, 0x1d, 0xd6, 0x9b, | ||
317 | + 0x41, 0x1f, 0x15, 0x86, 0x54, 0x70, 0xb2, 0xde, 0x0d, 0x35, 0x0f, 0x7c, 0xb0, | ||
318 | + 0x34, 0x72, 0xba, 0x97, 0x60, 0x3b, 0xf0, 0x79, 0xeb, 0xa2, 0xb2, 0x1c, 0x5d, | ||
319 | + 0xa2, 0x16, 0xb8, 0x87, 0xc5, 0xe9, 0x1b, 0xf6, 0xb5, 0x97, 0x25, 0x6f, 0x38, | ||
320 | + 0x9f, 0xe3, 0x91, 0xfa, 0x8a, 0x79, 0x98, 0xc3, 0x69, 0x0e, 0xb7, 0xa3, 0x1c, | ||
321 | + 0x20, 0x05, 0x97, 0xf8, 0xca, 0x14, 0xae, 0x00, 0xd7, 0xc4, 0xf3, 0xc0, 0x14, | ||
322 | + 0x10, 0x75, 0x6b, 0x34, 0xa0, 0x1b, 0xb5, 0x99, 0x60, 0xf3, 0x5c, 0xb0, 0xc5, | ||
323 | + 0x57, 0x4e, 0x36, 0xd2, 0x32, 0x84, 0xbf, 0x9e | ||
324 | +}; | ||
325 | + | ||
326 | +// | ||
327 | +// First DB entry: "Microsoft Windows Production PCA 2011" | ||
328 | +// SHA1: 58:0a:6f:4c:c4:e4:b6:69:b9:eb:dc:1b:2b:3e:08:7b:80:d0:67:8d | ||
329 | +// | ||
330 | +// Windows 8 and Windows Server 2012 R2 boot loaders are signed with a chain | ||
331 | +// rooted in this certificate. | ||
332 | +// | ||
333 | +STATIC CONST UINT8 MicrosoftPCA[] = { | ||
334 | + 0x30, 0x82, 0x05, 0xd7, 0x30, 0x82, 0x03, 0xbf, 0xa0, 0x03, 0x02, 0x01, 0x02, | ||
335 | + 0x02, 0x0a, 0x61, 0x07, 0x76, 0x56, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x30, | ||
336 | + 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, | ||
337 | + 0x00, 0x30, 0x81, 0x88, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, | ||
338 | + 0x13, 0x02, 0x55, 0x53, 0x31, 0x13, 0x30, 0x11, 0x06, 0x03, 0x55, 0x04, 0x08, | ||
339 | + 0x13, 0x0a, 0x57, 0x61, 0x73, 0x68, 0x69, 0x6e, 0x67, 0x74, 0x6f, 0x6e, 0x31, | ||
340 | + 0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x07, 0x13, 0x07, 0x52, 0x65, 0x64, | ||
341 | + 0x6d, 0x6f, 0x6e, 0x64, 0x31, 0x1e, 0x30, 0x1c, 0x06, 0x03, 0x55, 0x04, 0x0a, | ||
342 | + 0x13, 0x15, 0x4d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, 0x20, 0x43, | ||
343 | + 0x6f, 0x72, 0x70, 0x6f, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x31, 0x32, 0x30, | ||
344 | + 0x30, 0x06, 0x03, 0x55, 0x04, 0x03, 0x13, 0x29, 0x4d, 0x69, 0x63, 0x72, 0x6f, | ||
345 | + 0x73, 0x6f, 0x66, 0x74, 0x20, 0x52, 0x6f, 0x6f, 0x74, 0x20, 0x43, 0x65, 0x72, | ||
346 | + 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x20, 0x41, 0x75, 0x74, 0x68, | ||
347 | + 0x6f, 0x72, 0x69, 0x74, 0x79, 0x20, 0x32, 0x30, 0x31, 0x30, 0x30, 0x1e, 0x17, | ||
348 | + 0x0d, 0x31, 0x31, 0x31, 0x30, 0x31, 0x39, 0x31, 0x38, 0x34, 0x31, 0x34, 0x32, | ||
349 | + 0x5a, 0x17, 0x0d, 0x32, 0x36, 0x31, 0x30, 0x31, 0x39, 0x31, 0x38, 0x35, 0x31, | ||
350 | + 0x34, 0x32, 0x5a, 0x30, 0x81, 0x84, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, | ||
351 | + 0x04, 0x06, 0x13, 0x02, 0x55, 0x53, 0x31, 0x13, 0x30, 0x11, 0x06, 0x03, 0x55, | ||
352 | + 0x04, 0x08, 0x13, 0x0a, 0x57, 0x61, 0x73, 0x68, 0x69, 0x6e, 0x67, 0x74, 0x6f, | ||
353 | + 0x6e, 0x31, 0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x07, 0x13, 0x07, 0x52, | ||
354 | + 0x65, 0x64, 0x6d, 0x6f, 0x6e, 0x64, 0x31, 0x1e, 0x30, 0x1c, 0x06, 0x03, 0x55, | ||
355 | + 0x04, 0x0a, 0x13, 0x15, 0x4d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, | ||
356 | + 0x20, 0x43, 0x6f, 0x72, 0x70, 0x6f, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x31, | ||
357 | + 0x2e, 0x30, 0x2c, 0x06, 0x03, 0x55, 0x04, 0x03, 0x13, 0x25, 0x4d, 0x69, 0x63, | ||
358 | + 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, 0x20, 0x57, 0x69, 0x6e, 0x64, 0x6f, 0x77, | ||
359 | + 0x73, 0x20, 0x50, 0x72, 0x6f, 0x64, 0x75, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x20, | ||
360 | + 0x50, 0x43, 0x41, 0x20, 0x32, 0x30, 0x31, 0x31, 0x30, 0x82, 0x01, 0x22, 0x30, | ||
361 | + 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, | ||
362 | + 0x00, 0x03, 0x82, 0x01, 0x0f, 0x00, 0x30, 0x82, 0x01, 0x0a, 0x02, 0x82, 0x01, | ||
363 | + 0x01, 0x00, 0xdd, 0x0c, 0xbb, 0xa2, 0xe4, 0x2e, 0x09, 0xe3, 0xe7, 0xc5, 0xf7, | ||
364 | + 0x96, 0x69, 0xbc, 0x00, 0x21, 0xbd, 0x69, 0x33, 0x33, 0xef, 0xad, 0x04, 0xcb, | ||
365 | + 0x54, 0x80, 0xee, 0x06, 0x83, 0xbb, 0xc5, 0x20, 0x84, 0xd9, 0xf7, 0xd2, 0x8b, | ||
366 | + 0xf3, 0x38, 0xb0, 0xab, 0xa4, 0xad, 0x2d, 0x7c, 0x62, 0x79, 0x05, 0xff, 0xe3, | ||
367 | + 0x4a, 0x3f, 0x04, 0x35, 0x20, 0x70, 0xe3, 0xc4, 0xe7, 0x6b, 0xe0, 0x9c, 0xc0, | ||
368 | + 0x36, 0x75, 0xe9, 0x8a, 0x31, 0xdd, 0x8d, 0x70, 0xe5, 0xdc, 0x37, 0xb5, 0x74, | ||
369 | + 0x46, 0x96, 0x28, 0x5b, 0x87, 0x60, 0x23, 0x2c, 0xbf, 0xdc, 0x47, 0xa5, 0x67, | ||
370 | + 0xf7, 0x51, 0x27, 0x9e, 0x72, 0xeb, 0x07, 0xa6, 0xc9, 0xb9, 0x1e, 0x3b, 0x53, | ||
371 | + 0x35, 0x7c, 0xe5, 0xd3, 0xec, 0x27, 0xb9, 0x87, 0x1c, 0xfe, 0xb9, 0xc9, 0x23, | ||
372 | + 0x09, 0x6f, 0xa8, 0x46, 0x91, 0xc1, 0x6e, 0x96, 0x3c, 0x41, 0xd3, 0xcb, 0xa3, | ||
373 | + 0x3f, 0x5d, 0x02, 0x6a, 0x4d, 0xec, 0x69, 0x1f, 0x25, 0x28, 0x5c, 0x36, 0xff, | ||
374 | + 0xfd, 0x43, 0x15, 0x0a, 0x94, 0xe0, 0x19, 0xb4, 0xcf, 0xdf, 0xc2, 0x12, 0xe2, | ||
375 | + 0xc2, 0x5b, 0x27, 0xee, 0x27, 0x78, 0x30, 0x8b, 0x5b, 0x2a, 0x09, 0x6b, 0x22, | ||
376 | + 0x89, 0x53, 0x60, 0x16, 0x2c, 0xc0, 0x68, 0x1d, 0x53, 0xba, 0xec, 0x49, 0xf3, | ||
377 | + 0x9d, 0x61, 0x8c, 0x85, 0x68, 0x09, 0x73, 0x44, 0x5d, 0x7d, 0xa2, 0x54, 0x2b, | ||
378 | + 0xdd, 0x79, 0xf7, 0x15, 0xcf, 0x35, 0x5d, 0x6c, 0x1c, 0x2b, 0x5c, 0xce, 0xbc, | ||
379 | + 0x9c, 0x23, 0x8b, 0x6f, 0x6e, 0xb5, 0x26, 0xd9, 0x36, 0x13, 0xc3, 0x4f, 0xd6, | ||
380 | + 0x27, 0xae, 0xb9, 0x32, 0x3b, 0x41, 0x92, 0x2c, 0xe1, 0xc7, 0xcd, 0x77, 0xe8, | ||
381 | + 0xaa, 0x54, 0x4e, 0xf7, 0x5c, 0x0b, 0x04, 0x87, 0x65, 0xb4, 0x43, 0x18, 0xa8, | ||
382 | + 0xb2, 0xe0, 0x6d, 0x19, 0x77, 0xec, 0x5a, 0x24, 0xfa, 0x48, 0x03, 0x02, 0x03, | ||
383 | + 0x01, 0x00, 0x01, 0xa3, 0x82, 0x01, 0x43, 0x30, 0x82, 0x01, 0x3f, 0x30, 0x10, | ||
384 | + 0x06, 0x09, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x15, 0x01, 0x04, 0x03, | ||
385 | + 0x02, 0x01, 0x00, 0x30, 0x1d, 0x06, 0x03, 0x55, 0x1d, 0x0e, 0x04, 0x16, 0x04, | ||
386 | + 0x14, 0xa9, 0x29, 0x02, 0x39, 0x8e, 0x16, 0xc4, 0x97, 0x78, 0xcd, 0x90, 0xf9, | ||
387 | + 0x9e, 0x4f, 0x9a, 0xe1, 0x7c, 0x55, 0xaf, 0x53, 0x30, 0x19, 0x06, 0x09, 0x2b, | ||
388 | + 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x04, 0x0c, 0x1e, 0x0a, 0x00, | ||
389 | + 0x53, 0x00, 0x75, 0x00, 0x62, 0x00, 0x43, 0x00, 0x41, 0x30, 0x0b, 0x06, 0x03, | ||
390 | + 0x55, 0x1d, 0x0f, 0x04, 0x04, 0x03, 0x02, 0x01, 0x86, 0x30, 0x0f, 0x06, 0x03, | ||
391 | + 0x55, 0x1d, 0x13, 0x01, 0x01, 0xff, 0x04, 0x05, 0x30, 0x03, 0x01, 0x01, 0xff, | ||
392 | + 0x30, 0x1f, 0x06, 0x03, 0x55, 0x1d, 0x23, 0x04, 0x18, 0x30, 0x16, 0x80, 0x14, | ||
393 | + 0xd5, 0xf6, 0x56, 0xcb, 0x8f, 0xe8, 0xa2, 0x5c, 0x62, 0x68, 0xd1, 0x3d, 0x94, | ||
394 | + 0x90, 0x5b, 0xd7, 0xce, 0x9a, 0x18, 0xc4, 0x30, 0x56, 0x06, 0x03, 0x55, 0x1d, | ||
395 | + 0x1f, 0x04, 0x4f, 0x30, 0x4d, 0x30, 0x4b, 0xa0, 0x49, 0xa0, 0x47, 0x86, 0x45, | ||
396 | + 0x68, 0x74, 0x74, 0x70, 0x3a, 0x2f, 0x2f, 0x63, 0x72, 0x6c, 0x2e, 0x6d, 0x69, | ||
397 | + 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x70, | ||
398 | + 0x6b, 0x69, 0x2f, 0x63, 0x72, 0x6c, 0x2f, 0x70, 0x72, 0x6f, 0x64, 0x75, 0x63, | ||
399 | + 0x74, 0x73, 0x2f, 0x4d, 0x69, 0x63, 0x52, 0x6f, 0x6f, 0x43, 0x65, 0x72, 0x41, | ||
400 | + 0x75, 0x74, 0x5f, 0x32, 0x30, 0x31, 0x30, 0x2d, 0x30, 0x36, 0x2d, 0x32, 0x33, | ||
401 | + 0x2e, 0x63, 0x72, 0x6c, 0x30, 0x5a, 0x06, 0x08, 0x2b, 0x06, 0x01, 0x05, 0x05, | ||
402 | + 0x07, 0x01, 0x01, 0x04, 0x4e, 0x30, 0x4c, 0x30, 0x4a, 0x06, 0x08, 0x2b, 0x06, | ||
403 | + 0x01, 0x05, 0x05, 0x07, 0x30, 0x02, 0x86, 0x3e, 0x68, 0x74, 0x74, 0x70, 0x3a, | ||
404 | + 0x2f, 0x2f, 0x77, 0x77, 0x77, 0x2e, 0x6d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, | ||
405 | + 0x66, 0x74, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x70, 0x6b, 0x69, 0x2f, 0x63, 0x65, | ||
406 | + 0x72, 0x74, 0x73, 0x2f, 0x4d, 0x69, 0x63, 0x52, 0x6f, 0x6f, 0x43, 0x65, 0x72, | ||
407 | + 0x41, 0x75, 0x74, 0x5f, 0x32, 0x30, 0x31, 0x30, 0x2d, 0x30, 0x36, 0x2d, 0x32, | ||
408 | + 0x33, 0x2e, 0x63, 0x72, 0x74, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, | ||
409 | + 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x03, 0x82, 0x02, 0x01, 0x00, 0x14, | ||
410 | + 0xfc, 0x7c, 0x71, 0x51, 0xa5, 0x79, 0xc2, 0x6e, 0xb2, 0xef, 0x39, 0x3e, 0xbc, | ||
411 | + 0x3c, 0x52, 0x0f, 0x6e, 0x2b, 0x3f, 0x10, 0x13, 0x73, 0xfe, 0xa8, 0x68, 0xd0, | ||
412 | + 0x48, 0xa6, 0x34, 0x4d, 0x8a, 0x96, 0x05, 0x26, 0xee, 0x31, 0x46, 0x90, 0x61, | ||
413 | + 0x79, 0xd6, 0xff, 0x38, 0x2e, 0x45, 0x6b, 0xf4, 0xc0, 0xe5, 0x28, 0xb8, 0xda, | ||
414 | + 0x1d, 0x8f, 0x8a, 0xdb, 0x09, 0xd7, 0x1a, 0xc7, 0x4c, 0x0a, 0x36, 0x66, 0x6a, | ||
415 | + 0x8c, 0xec, 0x1b, 0xd7, 0x04, 0x90, 0xa8, 0x18, 0x17, 0xa4, 0x9b, 0xb9, 0xe2, | ||
416 | + 0x40, 0x32, 0x36, 0x76, 0xc4, 0xc1, 0x5a, 0xc6, 0xbf, 0xe4, 0x04, 0xc0, 0xea, | ||
417 | + 0x16, 0xd3, 0xac, 0xc3, 0x68, 0xef, 0x62, 0xac, 0xdd, 0x54, 0x6c, 0x50, 0x30, | ||
418 | + 0x58, 0xa6, 0xeb, 0x7c, 0xfe, 0x94, 0xa7, 0x4e, 0x8e, 0xf4, 0xec, 0x7c, 0x86, | ||
419 | + 0x73, 0x57, 0xc2, 0x52, 0x21, 0x73, 0x34, 0x5a, 0xf3, 0xa3, 0x8a, 0x56, 0xc8, | ||
420 | + 0x04, 0xda, 0x07, 0x09, 0xed, 0xf8, 0x8b, 0xe3, 0xce, 0xf4, 0x7e, 0x8e, 0xae, | ||
421 | + 0xf0, 0xf6, 0x0b, 0x8a, 0x08, 0xfb, 0x3f, 0xc9, 0x1d, 0x72, 0x7f, 0x53, 0xb8, | ||
422 | + 0xeb, 0xbe, 0x63, 0xe0, 0xe3, 0x3d, 0x31, 0x65, 0xb0, 0x81, 0xe5, 0xf2, 0xac, | ||
423 | + 0xcd, 0x16, 0xa4, 0x9f, 0x3d, 0xa8, 0xb1, 0x9b, 0xc2, 0x42, 0xd0, 0x90, 0x84, | ||
424 | + 0x5f, 0x54, 0x1d, 0xff, 0x89, 0xea, 0xba, 0x1d, 0x47, 0x90, 0x6f, 0xb0, 0x73, | ||
425 | + 0x4e, 0x41, 0x9f, 0x40, 0x9f, 0x5f, 0xe5, 0xa1, 0x2a, 0xb2, 0x11, 0x91, 0x73, | ||
426 | + 0x8a, 0x21, 0x28, 0xf0, 0xce, 0xde, 0x73, 0x39, 0x5f, 0x3e, 0xab, 0x5c, 0x60, | ||
427 | + 0xec, 0xdf, 0x03, 0x10, 0xa8, 0xd3, 0x09, 0xe9, 0xf4, 0xf6, 0x96, 0x85, 0xb6, | ||
428 | + 0x7f, 0x51, 0x88, 0x66, 0x47, 0x19, 0x8d, 0xa2, 0xb0, 0x12, 0x3d, 0x81, 0x2a, | ||
429 | + 0x68, 0x05, 0x77, 0xbb, 0x91, 0x4c, 0x62, 0x7b, 0xb6, 0xc1, 0x07, 0xc7, 0xba, | ||
430 | + 0x7a, 0x87, 0x34, 0x03, 0x0e, 0x4b, 0x62, 0x7a, 0x99, 0xe9, 0xca, 0xfc, 0xce, | ||
431 | + 0x4a, 0x37, 0xc9, 0x2d, 0xa4, 0x57, 0x7c, 0x1c, 0xfe, 0x3d, 0xdc, 0xb8, 0x0f, | ||
432 | + 0x5a, 0xfa, 0xd6, 0xc4, 0xb3, 0x02, 0x85, 0x02, 0x3a, 0xea, 0xb3, 0xd9, 0x6e, | ||
433 | + 0xe4, 0x69, 0x21, 0x37, 0xde, 0x81, 0xd1, 0xf6, 0x75, 0x19, 0x05, 0x67, 0xd3, | ||
434 | + 0x93, 0x57, 0x5e, 0x29, 0x1b, 0x39, 0xc8, 0xee, 0x2d, 0xe1, 0xcd, 0xe4, 0x45, | ||
435 | + 0x73, 0x5b, 0xd0, 0xd2, 0xce, 0x7a, 0xab, 0x16, 0x19, 0x82, 0x46, 0x58, 0xd0, | ||
436 | + 0x5e, 0x9d, 0x81, 0xb3, 0x67, 0xaf, 0x6c, 0x35, 0xf2, 0xbc, 0xe5, 0x3f, 0x24, | ||
437 | + 0xe2, 0x35, 0xa2, 0x0a, 0x75, 0x06, 0xf6, 0x18, 0x56, 0x99, 0xd4, 0x78, 0x2c, | ||
438 | + 0xd1, 0x05, 0x1b, 0xeb, 0xd0, 0x88, 0x01, 0x9d, 0xaa, 0x10, 0xf1, 0x05, 0xdf, | ||
439 | + 0xba, 0x7e, 0x2c, 0x63, 0xb7, 0x06, 0x9b, 0x23, 0x21, 0xc4, 0xf9, 0x78, 0x6c, | ||
440 | + 0xe2, 0x58, 0x17, 0x06, 0x36, 0x2b, 0x91, 0x12, 0x03, 0xcc, 0xa4, 0xd9, 0xf2, | ||
441 | + 0x2d, 0xba, 0xf9, 0x94, 0x9d, 0x40, 0xed, 0x18, 0x45, 0xf1, 0xce, 0x8a, 0x5c, | ||
442 | + 0x6b, 0x3e, 0xab, 0x03, 0xd3, 0x70, 0x18, 0x2a, 0x0a, 0x6a, 0xe0, 0x5f, 0x47, | ||
443 | + 0xd1, 0xd5, 0x63, 0x0a, 0x32, 0xf2, 0xaf, 0xd7, 0x36, 0x1f, 0x2a, 0x70, 0x5a, | ||
444 | + 0xe5, 0x42, 0x59, 0x08, 0x71, 0x4b, 0x57, 0xba, 0x7e, 0x83, 0x81, 0xf0, 0x21, | ||
445 | + 0x3c, 0xf4, 0x1c, 0xc1, 0xc5, 0xb9, 0x90, 0x93, 0x0e, 0x88, 0x45, 0x93, 0x86, | ||
446 | + 0xe9, 0xb1, 0x20, 0x99, 0xbe, 0x98, 0xcb, 0xc5, 0x95, 0xa4, 0x5d, 0x62, 0xd6, | ||
447 | + 0xa0, 0x63, 0x08, 0x20, 0xbd, 0x75, 0x10, 0x77, 0x7d, 0x3d, 0xf3, 0x45, 0xb9, | ||
448 | + 0x9f, 0x97, 0x9f, 0xcb, 0x57, 0x80, 0x6f, 0x33, 0xa9, 0x04, 0xcf, 0x77, 0xa4, | ||
449 | + 0x62, 0x1c, 0x59, 0x7e | ||
450 | +}; | ||
451 | + | ||
452 | +// | ||
453 | +// Second DB entry: "Microsoft Corporation UEFI CA 2011" | ||
454 | +// SHA1: 46:de:f6:3b:5c:e6:1c:f8:ba:0d:e2:e6:63:9c:10:19:d0:ed:14:f3 | ||
455 | +// | ||
456 | +// To verify the "shim" binary and PCI expansion ROMs with. | ||
457 | +// | ||
458 | +STATIC CONST UINT8 MicrosoftUefiCA[] = { | ||
459 | + 0x30, 0x82, 0x06, 0x10, 0x30, 0x82, 0x03, 0xf8, 0xa0, 0x03, 0x02, 0x01, 0x02, | ||
460 | + 0x02, 0x0a, 0x61, 0x08, 0xd3, 0xc4, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x30, | ||
461 | + 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, | ||
462 | + 0x00, 0x30, 0x81, 0x91, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, | ||
463 | + 0x13, 0x02, 0x55, 0x53, 0x31, 0x13, 0x30, 0x11, 0x06, 0x03, 0x55, 0x04, 0x08, | ||
464 | + 0x13, 0x0a, 0x57, 0x61, 0x73, 0x68, 0x69, 0x6e, 0x67, 0x74, 0x6f, 0x6e, 0x31, | ||
465 | + 0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x07, 0x13, 0x07, 0x52, 0x65, 0x64, | ||
466 | + 0x6d, 0x6f, 0x6e, 0x64, 0x31, 0x1e, 0x30, 0x1c, 0x06, 0x03, 0x55, 0x04, 0x0a, | ||
467 | + 0x13, 0x15, 0x4d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, 0x20, 0x43, | ||
468 | + 0x6f, 0x72, 0x70, 0x6f, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x31, 0x3b, 0x30, | ||
469 | + 0x39, 0x06, 0x03, 0x55, 0x04, 0x03, 0x13, 0x32, 0x4d, 0x69, 0x63, 0x72, 0x6f, | ||
470 | + 0x73, 0x6f, 0x66, 0x74, 0x20, 0x43, 0x6f, 0x72, 0x70, 0x6f, 0x72, 0x61, 0x74, | ||
471 | + 0x69, 0x6f, 0x6e, 0x20, 0x54, 0x68, 0x69, 0x72, 0x64, 0x20, 0x50, 0x61, 0x72, | ||
472 | + 0x74, 0x79, 0x20, 0x4d, 0x61, 0x72, 0x6b, 0x65, 0x74, 0x70, 0x6c, 0x61, 0x63, | ||
473 | + 0x65, 0x20, 0x52, 0x6f, 0x6f, 0x74, 0x30, 0x1e, 0x17, 0x0d, 0x31, 0x31, 0x30, | ||
474 | + 0x36, 0x32, 0x37, 0x32, 0x31, 0x32, 0x32, 0x34, 0x35, 0x5a, 0x17, 0x0d, 0x32, | ||
475 | + 0x36, 0x30, 0x36, 0x32, 0x37, 0x32, 0x31, 0x33, 0x32, 0x34, 0x35, 0x5a, 0x30, | ||
476 | + 0x81, 0x81, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, | ||
477 | + 0x55, 0x53, 0x31, 0x13, 0x30, 0x11, 0x06, 0x03, 0x55, 0x04, 0x08, 0x13, 0x0a, | ||
478 | + 0x57, 0x61, 0x73, 0x68, 0x69, 0x6e, 0x67, 0x74, 0x6f, 0x6e, 0x31, 0x10, 0x30, | ||
479 | + 0x0e, 0x06, 0x03, 0x55, 0x04, 0x07, 0x13, 0x07, 0x52, 0x65, 0x64, 0x6d, 0x6f, | ||
480 | + 0x6e, 0x64, 0x31, 0x1e, 0x30, 0x1c, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x13, 0x15, | ||
481 | + 0x4d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, 0x20, 0x43, 0x6f, 0x72, | ||
482 | + 0x70, 0x6f, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x31, 0x2b, 0x30, 0x29, 0x06, | ||
483 | + 0x03, 0x55, 0x04, 0x03, 0x13, 0x22, 0x4d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, | ||
484 | + 0x66, 0x74, 0x20, 0x43, 0x6f, 0x72, 0x70, 0x6f, 0x72, 0x61, 0x74, 0x69, 0x6f, | ||
485 | + 0x6e, 0x20, 0x55, 0x45, 0x46, 0x49, 0x20, 0x43, 0x41, 0x20, 0x32, 0x30, 0x31, | ||
486 | + 0x31, 0x30, 0x82, 0x01, 0x22, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, | ||
487 | + 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x82, 0x01, 0x0f, 0x00, 0x30, | ||
488 | + 0x82, 0x01, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0xa5, 0x08, 0x6c, 0x4c, 0xc7, | ||
489 | + 0x45, 0x09, 0x6a, 0x4b, 0x0c, 0xa4, 0xc0, 0x87, 0x7f, 0x06, 0x75, 0x0c, 0x43, | ||
490 | + 0x01, 0x54, 0x64, 0xe0, 0x16, 0x7f, 0x07, 0xed, 0x92, 0x7d, 0x0b, 0xb2, 0x73, | ||
491 | + 0xbf, 0x0c, 0x0a, 0xc6, 0x4a, 0x45, 0x61, 0xa0, 0xc5, 0x16, 0x2d, 0x96, 0xd3, | ||
492 | + 0xf5, 0x2b, 0xa0, 0xfb, 0x4d, 0x49, 0x9b, 0x41, 0x80, 0x90, 0x3c, 0xb9, 0x54, | ||
493 | + 0xfd, 0xe6, 0xbc, 0xd1, 0x9d, 0xc4, 0xa4, 0x18, 0x8a, 0x7f, 0x41, 0x8a, 0x5c, | ||
494 | + 0x59, 0x83, 0x68, 0x32, 0xbb, 0x8c, 0x47, 0xc9, 0xee, 0x71, 0xbc, 0x21, 0x4f, | ||
495 | + 0x9a, 0x8a, 0x7c, 0xff, 0x44, 0x3f, 0x8d, 0x8f, 0x32, 0xb2, 0x26, 0x48, 0xae, | ||
496 | + 0x75, 0xb5, 0xee, 0xc9, 0x4c, 0x1e, 0x4a, 0x19, 0x7e, 0xe4, 0x82, 0x9a, 0x1d, | ||
497 | + 0x78, 0x77, 0x4d, 0x0c, 0xb0, 0xbd, 0xf6, 0x0f, 0xd3, 0x16, 0xd3, 0xbc, 0xfa, | ||
498 | + 0x2b, 0xa5, 0x51, 0x38, 0x5d, 0xf5, 0xfb, 0xba, 0xdb, 0x78, 0x02, 0xdb, 0xff, | ||
499 | + 0xec, 0x0a, 0x1b, 0x96, 0xd5, 0x83, 0xb8, 0x19, 0x13, 0xe9, 0xb6, 0xc0, 0x7b, | ||
500 | + 0x40, 0x7b, 0xe1, 0x1f, 0x28, 0x27, 0xc9, 0xfa, 0xef, 0x56, 0x5e, 0x1c, 0xe6, | ||
501 | + 0x7e, 0x94, 0x7e, 0xc0, 0xf0, 0x44, 0xb2, 0x79, 0x39, 0xe5, 0xda, 0xb2, 0x62, | ||
502 | + 0x8b, 0x4d, 0xbf, 0x38, 0x70, 0xe2, 0x68, 0x24, 0x14, 0xc9, 0x33, 0xa4, 0x08, | ||
503 | + 0x37, 0xd5, 0x58, 0x69, 0x5e, 0xd3, 0x7c, 0xed, 0xc1, 0x04, 0x53, 0x08, 0xe7, | ||
504 | + 0x4e, 0xb0, 0x2a, 0x87, 0x63, 0x08, 0x61, 0x6f, 0x63, 0x15, 0x59, 0xea, 0xb2, | ||
505 | + 0x2b, 0x79, 0xd7, 0x0c, 0x61, 0x67, 0x8a, 0x5b, 0xfd, 0x5e, 0xad, 0x87, 0x7f, | ||
506 | + 0xba, 0x86, 0x67, 0x4f, 0x71, 0x58, 0x12, 0x22, 0x04, 0x22, 0x22, 0xce, 0x8b, | ||
507 | + 0xef, 0x54, 0x71, 0x00, 0xce, 0x50, 0x35, 0x58, 0x76, 0x95, 0x08, 0xee, 0x6a, | ||
508 | + 0xb1, 0xa2, 0x01, 0xd5, 0x02, 0x03, 0x01, 0x00, 0x01, 0xa3, 0x82, 0x01, 0x76, | ||
509 | + 0x30, 0x82, 0x01, 0x72, 0x30, 0x12, 0x06, 0x09, 0x2b, 0x06, 0x01, 0x04, 0x01, | ||
510 | + 0x82, 0x37, 0x15, 0x01, 0x04, 0x05, 0x02, 0x03, 0x01, 0x00, 0x01, 0x30, 0x23, | ||
511 | + 0x06, 0x09, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x15, 0x02, 0x04, 0x16, | ||
512 | + 0x04, 0x14, 0xf8, 0xc1, 0x6b, 0xb7, 0x7f, 0x77, 0x53, 0x4a, 0xf3, 0x25, 0x37, | ||
513 | + 0x1d, 0x4e, 0xa1, 0x26, 0x7b, 0x0f, 0x20, 0x70, 0x80, 0x30, 0x1d, 0x06, 0x03, | ||
514 | + 0x55, 0x1d, 0x0e, 0x04, 0x16, 0x04, 0x14, 0x13, 0xad, 0xbf, 0x43, 0x09, 0xbd, | ||
515 | + 0x82, 0x70, 0x9c, 0x8c, 0xd5, 0x4f, 0x31, 0x6e, 0xd5, 0x22, 0x98, 0x8a, 0x1b, | ||
516 | + 0xd4, 0x30, 0x19, 0x06, 0x09, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, | ||
517 | + 0x02, 0x04, 0x0c, 0x1e, 0x0a, 0x00, 0x53, 0x00, 0x75, 0x00, 0x62, 0x00, 0x43, | ||
518 | + 0x00, 0x41, 0x30, 0x0b, 0x06, 0x03, 0x55, 0x1d, 0x0f, 0x04, 0x04, 0x03, 0x02, | ||
519 | + 0x01, 0x86, 0x30, 0x0f, 0x06, 0x03, 0x55, 0x1d, 0x13, 0x01, 0x01, 0xff, 0x04, | ||
520 | + 0x05, 0x30, 0x03, 0x01, 0x01, 0xff, 0x30, 0x1f, 0x06, 0x03, 0x55, 0x1d, 0x23, | ||
521 | + 0x04, 0x18, 0x30, 0x16, 0x80, 0x14, 0x45, 0x66, 0x52, 0x43, 0xe1, 0x7e, 0x58, | ||
522 | + 0x11, 0xbf, 0xd6, 0x4e, 0x9e, 0x23, 0x55, 0x08, 0x3b, 0x3a, 0x22, 0x6a, 0xa8, | ||
523 | + 0x30, 0x5c, 0x06, 0x03, 0x55, 0x1d, 0x1f, 0x04, 0x55, 0x30, 0x53, 0x30, 0x51, | ||
524 | + 0xa0, 0x4f, 0xa0, 0x4d, 0x86, 0x4b, 0x68, 0x74, 0x74, 0x70, 0x3a, 0x2f, 0x2f, | ||
525 | + 0x63, 0x72, 0x6c, 0x2e, 0x6d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, 0x74, | ||
526 | + 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x70, 0x6b, 0x69, 0x2f, 0x63, 0x72, 0x6c, 0x2f, | ||
527 | + 0x70, 0x72, 0x6f, 0x64, 0x75, 0x63, 0x74, 0x73, 0x2f, 0x4d, 0x69, 0x63, 0x43, | ||
528 | + 0x6f, 0x72, 0x54, 0x68, 0x69, 0x50, 0x61, 0x72, 0x4d, 0x61, 0x72, 0x52, 0x6f, | ||
529 | + 0x6f, 0x5f, 0x32, 0x30, 0x31, 0x30, 0x2d, 0x31, 0x30, 0x2d, 0x30, 0x35, 0x2e, | ||
530 | + 0x63, 0x72, 0x6c, 0x30, 0x60, 0x06, 0x08, 0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, | ||
531 | + 0x01, 0x01, 0x04, 0x54, 0x30, 0x52, 0x30, 0x50, 0x06, 0x08, 0x2b, 0x06, 0x01, | ||
532 | + 0x05, 0x05, 0x07, 0x30, 0x02, 0x86, 0x44, 0x68, 0x74, 0x74, 0x70, 0x3a, 0x2f, | ||
533 | + 0x2f, 0x77, 0x77, 0x77, 0x2e, 0x6d, 0x69, 0x63, 0x72, 0x6f, 0x73, 0x6f, 0x66, | ||
534 | + 0x74, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x70, 0x6b, 0x69, 0x2f, 0x63, 0x65, 0x72, | ||
535 | + 0x74, 0x73, 0x2f, 0x4d, 0x69, 0x63, 0x43, 0x6f, 0x72, 0x54, 0x68, 0x69, 0x50, | ||
536 | + 0x61, 0x72, 0x4d, 0x61, 0x72, 0x52, 0x6f, 0x6f, 0x5f, 0x32, 0x30, 0x31, 0x30, | ||
537 | + 0x2d, 0x31, 0x30, 0x2d, 0x30, 0x35, 0x2e, 0x63, 0x72, 0x74, 0x30, 0x0d, 0x06, | ||
538 | + 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x03, | ||
539 | + 0x82, 0x02, 0x01, 0x00, 0x35, 0x08, 0x42, 0xff, 0x30, 0xcc, 0xce, 0xf7, 0x76, | ||
540 | + 0x0c, 0xad, 0x10, 0x68, 0x58, 0x35, 0x29, 0x46, 0x32, 0x76, 0x27, 0x7c, 0xef, | ||
541 | + 0x12, 0x41, 0x27, 0x42, 0x1b, 0x4a, 0xaa, 0x6d, 0x81, 0x38, 0x48, 0x59, 0x13, | ||
542 | + 0x55, 0xf3, 0xe9, 0x58, 0x34, 0xa6, 0x16, 0x0b, 0x82, 0xaa, 0x5d, 0xad, 0x82, | ||
543 | + 0xda, 0x80, 0x83, 0x41, 0x06, 0x8f, 0xb4, 0x1d, 0xf2, 0x03, 0xb9, 0xf3, 0x1a, | ||
544 | + 0x5d, 0x1b, 0xf1, 0x50, 0x90, 0xf9, 0xb3, 0x55, 0x84, 0x42, 0x28, 0x1c, 0x20, | ||
545 | + 0xbd, 0xb2, 0xae, 0x51, 0x14, 0xc5, 0xc0, 0xac, 0x97, 0x95, 0x21, 0x1c, 0x90, | ||
546 | + 0xdb, 0x0f, 0xfc, 0x77, 0x9e, 0x95, 0x73, 0x91, 0x88, 0xca, 0xbd, 0xbd, 0x52, | ||
547 | + 0xb9, 0x05, 0x50, 0x0d, 0xdf, 0x57, 0x9e, 0xa0, 0x61, 0xed, 0x0d, 0xe5, 0x6d, | ||
548 | + 0x25, 0xd9, 0x40, 0x0f, 0x17, 0x40, 0xc8, 0xce, 0xa3, 0x4a, 0xc2, 0x4d, 0xaf, | ||
549 | + 0x9a, 0x12, 0x1d, 0x08, 0x54, 0x8f, 0xbd, 0xc7, 0xbc, 0xb9, 0x2b, 0x3d, 0x49, | ||
550 | + 0x2b, 0x1f, 0x32, 0xfc, 0x6a, 0x21, 0x69, 0x4f, 0x9b, 0xc8, 0x7e, 0x42, 0x34, | ||
551 | + 0xfc, 0x36, 0x06, 0x17, 0x8b, 0x8f, 0x20, 0x40, 0xc0, 0xb3, 0x9a, 0x25, 0x75, | ||
552 | + 0x27, 0xcd, 0xc9, 0x03, 0xa3, 0xf6, 0x5d, 0xd1, 0xe7, 0x36, 0x54, 0x7a, 0xb9, | ||
553 | + 0x50, 0xb5, 0xd3, 0x12, 0xd1, 0x07, 0xbf, 0xbb, 0x74, 0xdf, 0xdc, 0x1e, 0x8f, | ||
554 | + 0x80, 0xd5, 0xed, 0x18, 0xf4, 0x2f, 0x14, 0x16, 0x6b, 0x2f, 0xde, 0x66, 0x8c, | ||
555 | + 0xb0, 0x23, 0xe5, 0xc7, 0x84, 0xd8, 0xed, 0xea, 0xc1, 0x33, 0x82, 0xad, 0x56, | ||
556 | + 0x4b, 0x18, 0x2d, 0xf1, 0x68, 0x95, 0x07, 0xcd, 0xcf, 0xf0, 0x72, 0xf0, 0xae, | ||
557 | + 0xbb, 0xdd, 0x86, 0x85, 0x98, 0x2c, 0x21, 0x4c, 0x33, 0x2b, 0xf0, 0x0f, 0x4a, | ||
558 | + 0xf0, 0x68, 0x87, 0xb5, 0x92, 0x55, 0x32, 0x75, 0xa1, 0x6a, 0x82, 0x6a, 0x3c, | ||
559 | + 0xa3, 0x25, 0x11, 0xa4, 0xed, 0xad, 0xd7, 0x04, 0xae, 0xcb, 0xd8, 0x40, 0x59, | ||
560 | + 0xa0, 0x84, 0xd1, 0x95, 0x4c, 0x62, 0x91, 0x22, 0x1a, 0x74, 0x1d, 0x8c, 0x3d, | ||
561 | + 0x47, 0x0e, 0x44, 0xa6, 0xe4, 0xb0, 0x9b, 0x34, 0x35, 0xb1, 0xfa, 0xb6, 0x53, | ||
562 | + 0xa8, 0x2c, 0x81, 0xec, 0xa4, 0x05, 0x71, 0xc8, 0x9d, 0xb8, 0xba, 0xe8, 0x1b, | ||
563 | + 0x44, 0x66, 0xe4, 0x47, 0x54, 0x0e, 0x8e, 0x56, 0x7f, 0xb3, 0x9f, 0x16, 0x98, | ||
564 | + 0xb2, 0x86, 0xd0, 0x68, 0x3e, 0x90, 0x23, 0xb5, 0x2f, 0x5e, 0x8f, 0x50, 0x85, | ||
565 | + 0x8d, 0xc6, 0x8d, 0x82, 0x5f, 0x41, 0xa1, 0xf4, 0x2e, 0x0d, 0xe0, 0x99, 0xd2, | ||
566 | + 0x6c, 0x75, 0xe4, 0xb6, 0x69, 0xb5, 0x21, 0x86, 0xfa, 0x07, 0xd1, 0xf6, 0xe2, | ||
567 | + 0x4d, 0xd1, 0xda, 0xad, 0x2c, 0x77, 0x53, 0x1e, 0x25, 0x32, 0x37, 0xc7, 0x6c, | ||
568 | + 0x52, 0x72, 0x95, 0x86, 0xb0, 0xf1, 0x35, 0x61, 0x6a, 0x19, 0xf5, 0xb2, 0x3b, | ||
569 | + 0x81, 0x50, 0x56, 0xa6, 0x32, 0x2d, 0xfe, 0xa2, 0x89, 0xf9, 0x42, 0x86, 0x27, | ||
570 | + 0x18, 0x55, 0xa1, 0x82, 0xca, 0x5a, 0x9b, 0xf8, 0x30, 0x98, 0x54, 0x14, 0xa6, | ||
571 | + 0x47, 0x96, 0x25, 0x2f, 0xc8, 0x26, 0xe4, 0x41, 0x94, 0x1a, 0x5c, 0x02, 0x3f, | ||
572 | + 0xe5, 0x96, 0xe3, 0x85, 0x5b, 0x3c, 0x3e, 0x3f, 0xbb, 0x47, 0x16, 0x72, 0x55, | ||
573 | + 0xe2, 0x25, 0x22, 0xb1, 0xd9, 0x7b, 0xe7, 0x03, 0x06, 0x2a, 0xa3, 0xf7, 0x1e, | ||
574 | + 0x90, 0x46, 0xc3, 0x00, 0x0d, 0xd6, 0x19, 0x89, 0xe3, 0x0e, 0x35, 0x27, 0x62, | ||
575 | + 0x03, 0x71, 0x15, 0xa6, 0xef, 0xd0, 0x27, 0xa0, 0xa0, 0x59, 0x37, 0x60, 0xf8, | ||
576 | + 0x38, 0x94, 0xb8, 0xe0, 0x78, 0x70, 0xf8, 0xba, 0x4c, 0x86, 0x87, 0x94, 0xf6, | ||
577 | + 0xe0, 0xae, 0x02, 0x45, 0xee, 0x65, 0xc2, 0xb6, 0xa3, 0x7e, 0x69, 0x16, 0x75, | ||
578 | + 0x07, 0x92, 0x9b, 0xf5, 0xa6, 0xbc, 0x59, 0x83, 0x58 | ||
579 | +}; | ||
580 | + | ||
581 | +// | ||
582 | +// The most important thing about the variable payload is that it is a list of | ||
583 | +// lists, where the element size of any given *inner* list is constant. | ||
584 | +// | ||
585 | +// Since X509 certificates vary in size, each of our *inner* lists will contain | ||
586 | +// one element only (one X.509 certificate). This is explicitly mentioned in | ||
587 | +// the UEFI specification, in "28.4.1 Signature Database", in a Note. | ||
588 | +// | ||
589 | +// The list structure looks as follows: | ||
590 | +// | ||
591 | +// struct EFI_VARIABLE_AUTHENTICATION_2 { | | ||
592 | +// struct EFI_TIME { | | ||
593 | +// UINT16 Year; | | ||
594 | +// UINT8 Month; | | ||
595 | +// UINT8 Day; | | ||
596 | +// UINT8 Hour; | | ||
597 | +// UINT8 Minute; | | ||
598 | +// UINT8 Second; | | ||
599 | +// UINT8 Pad1; | | ||
600 | +// UINT32 Nanosecond; | | ||
601 | +// INT16 TimeZone; | | ||
602 | +// UINT8 Daylight; | | ||
603 | +// UINT8 Pad2; | | ||
604 | +// } TimeStamp; | | ||
605 | +// | | ||
606 | +// struct WIN_CERTIFICATE_UEFI_GUID { | | | ||
607 | +// struct WIN_CERTIFICATE { | | | ||
608 | +// UINT32 dwLength; ----------------------------------------+ | | ||
609 | +// UINT16 wRevision; | | | ||
610 | +// UINT16 wCertificateType; | | | ||
611 | +// } Hdr; | +- DataSize | ||
612 | +// | | | ||
613 | +// EFI_GUID CertType; | | | ||
614 | +// UINT8 CertData[1] = { <--- "struct hack" | | | ||
615 | +// struct EFI_SIGNATURE_LIST { | | | | ||
616 | +// EFI_GUID SignatureType; | | | | ||
617 | +// UINT32 SignatureListSize; -------------------------+ | | | ||
618 | +// UINT32 SignatureHeaderSize; | | | | ||
619 | +// UINT32 SignatureSize; ---------------------------+ | | | | ||
620 | +// UINT8 SignatureHeader[SignatureHeaderSize]; | | | | | ||
621 | +// v | | | | ||
622 | +// struct EFI_SIGNATURE_DATA { | | | | | ||
623 | +// EFI_GUID SignatureOwner; | | | | | ||
624 | +// UINT8 SignatureData[1] = { <--- "struct hack" | | | | | ||
625 | +// X.509 payload | | | | | ||
626 | +// } | | | | | ||
627 | +// } Signatures[]; | | | | ||
628 | +// } SigLists[]; | | | ||
629 | +// }; | | | ||
630 | +// } AuthInfo; | | | ||
631 | +// }; | | ||
632 | +// | ||
633 | +// Given that the "struct hack" invokes undefined behavior (which is why C99 | ||
634 | +// introduced the flexible array member), and because subtracting those pesky | ||
635 | +// sizes of 1 is annoying, and because the format is fully specified in the | ||
636 | +// UEFI specification, we'll introduce two matching convenience structures that | ||
637 | +// are customized for our X.509 purposes. | ||
638 | +// | ||
639 | +#pragma pack(1) | ||
640 | +typedef struct { | ||
641 | + EFI_TIME TimeStamp; | ||
642 | + | ||
643 | + // | ||
644 | + // dwLength covers data below | ||
645 | + // | ||
646 | + UINT32 dwLength; | ||
647 | + UINT16 wRevision; | ||
648 | + UINT16 wCertificateType; | ||
649 | + EFI_GUID CertType; | ||
650 | +} SINGLE_HEADER; | ||
651 | + | ||
652 | +typedef struct { | ||
653 | + // | ||
654 | + // SignatureListSize covers data below | ||
655 | + // | ||
656 | + EFI_GUID SignatureType; | ||
657 | + UINT32 SignatureListSize; | ||
658 | + UINT32 SignatureHeaderSize; // constant 0 | ||
659 | + UINT32 SignatureSize; | ||
660 | + | ||
661 | + // | ||
662 | + // SignatureSize covers data below | ||
663 | + // | ||
664 | + EFI_GUID SignatureOwner; | ||
665 | + | ||
666 | + // | ||
667 | + // X.509 certificate follows | ||
668 | + // | ||
669 | +} REPEATING_HEADER; | ||
670 | +#pragma pack() | ||
671 | + | ||
672 | +/** | ||
673 | + Enroll a set of DER-formatted X.509 certificates in a global variable, | ||
674 | + overwriting it. | ||
675 | + | ||
676 | + The variable will be rewritten with NV+BS+RT+AT attributes. | ||
677 | + | ||
678 | + @param[in] VariableName The name of the variable to overwrite. | ||
679 | + | ||
680 | + @param[in] VendorGuid The namespace (ie. vendor GUID) of the variable to | ||
681 | + overwrite. | ||
682 | + | ||
683 | + @param[in] ... A list of | ||
684 | + | ||
685 | + IN CONST UINT8 *Cert, | ||
686 | + IN UINTN CertSize, | ||
687 | + IN CONST EFI_GUID *OwnerGuid | ||
688 | + | ||
689 | + triplets. If the first component of a triplet is | ||
690 | + NULL, then the other two components are not | ||
691 | + accessed, and processing is terminated. The list of | ||
692 | + X.509 certificates is enrolled in the variable | ||
693 | + specified, overwriting it. The OwnerGuid component | ||
694 | + identifies the agent installing the certificate. | ||
695 | + | ||
696 | + @retval EFI_INVALID_PARAMETER The triplet list is empty (ie. the first Cert | ||
697 | + value is NULL), or one of the CertSize values | ||
698 | + is 0, or one of the CertSize values would | ||
699 | + overflow the accumulated UINT32 data size. | ||
700 | + | ||
701 | + @retval EFI_OUT_OF_RESOURCES Out of memory while formatting variable | ||
702 | + payload. | ||
703 | + | ||
704 | + @retval EFI_SUCCESS Enrollment successful; the variable has been | ||
705 | + overwritten (or created). | ||
706 | + | ||
707 | + @return Error codes from gRT->GetTime() and | ||
708 | + gRT->SetVariable(). | ||
709 | +**/ | ||
710 | +STATIC | ||
711 | +EFI_STATUS | ||
712 | +EFIAPI | ||
713 | +EnrollListOfX509Certs ( | ||
714 | + IN CHAR16 *VariableName, | ||
715 | + IN EFI_GUID *VendorGuid, | ||
716 | + ... | ||
717 | + ) | ||
718 | +{ | ||
719 | + UINTN DataSize; | ||
720 | + SINGLE_HEADER *SingleHeader; | ||
721 | + REPEATING_HEADER *RepeatingHeader; | ||
722 | + VA_LIST Marker; | ||
723 | + CONST UINT8 *Cert; | ||
724 | + EFI_STATUS Status = EFI_SUCCESS; | ||
725 | + UINT8 *Data; | ||
726 | + UINT8 *Position; | ||
727 | + | ||
728 | + // | ||
729 | + // compute total size first, for UINT32 range check, and allocation | ||
730 | + // | ||
731 | + DataSize = sizeof *SingleHeader; | ||
732 | + VA_START (Marker, VendorGuid); | ||
733 | + for (Cert = VA_ARG (Marker, CONST UINT8 *); | ||
734 | + Cert != NULL; | ||
735 | + Cert = VA_ARG (Marker, CONST UINT8 *)) { | ||
736 | + UINTN CertSize; | ||
737 | + | ||
738 | + CertSize = VA_ARG (Marker, UINTN); | ||
739 | + (VOID)VA_ARG (Marker, CONST EFI_GUID *); | ||
740 | + | ||
741 | + if (CertSize == 0 || | ||
742 | + CertSize > MAX_UINT32 - sizeof *RepeatingHeader || | ||
743 | + DataSize > MAX_UINT32 - sizeof *RepeatingHeader - CertSize) { | ||
744 | + Status = EFI_INVALID_PARAMETER; | ||
745 | + break; | ||
746 | + } | ||
747 | + DataSize += sizeof *RepeatingHeader + CertSize; | ||
748 | + } | ||
749 | + VA_END (Marker); | ||
750 | + | ||
751 | + if (DataSize == sizeof *SingleHeader) { | ||
752 | + Status = EFI_INVALID_PARAMETER; | ||
753 | + } | ||
754 | + if (EFI_ERROR (Status)) { | ||
755 | + goto Out; | ||
756 | + } | ||
757 | + | ||
758 | + Data = AllocatePool (DataSize); | ||
759 | + if (Data == NULL) { | ||
760 | + Status = EFI_OUT_OF_RESOURCES; | ||
761 | + goto Out; | ||
762 | + } | ||
763 | + | ||
764 | + Position = Data; | ||
765 | + | ||
766 | + SingleHeader = (SINGLE_HEADER *)Position; | ||
767 | + Status = gRT->GetTime (&SingleHeader->TimeStamp, NULL); | ||
768 | + if (EFI_ERROR (Status)) { | ||
769 | + goto FreeData; | ||
770 | + } | ||
771 | + SingleHeader->TimeStamp.Pad1 = 0; | ||
772 | + SingleHeader->TimeStamp.Nanosecond = 0; | ||
773 | + SingleHeader->TimeStamp.TimeZone = 0; | ||
774 | + SingleHeader->TimeStamp.Daylight = 0; | ||
775 | + SingleHeader->TimeStamp.Pad2 = 0; | ||
776 | +#if 0 | ||
777 | + SingleHeader->dwLength = DataSize - sizeof SingleHeader->TimeStamp; | ||
778 | +#else | ||
779 | + // | ||
780 | + // This looks like a bug in edk2. According to the UEFI specification, | ||
781 | + // dwLength is "The length of the entire certificate, including the length of | ||
782 | + // the header, in bytes". That shouldn't stop right after CertType -- it | ||
783 | + // should include everything below it. | ||
784 | + // | ||
785 | + SingleHeader->dwLength = sizeof *SingleHeader | ||
786 | + - sizeof SingleHeader->TimeStamp; | ||
787 | +#endif | ||
788 | + SingleHeader->wRevision = 0x0200; | ||
789 | + SingleHeader->wCertificateType = WIN_CERT_TYPE_EFI_GUID; | ||
790 | + CopyGuid (&SingleHeader->CertType, &gEfiCertPkcs7Guid); | ||
791 | + Position += sizeof *SingleHeader; | ||
792 | + | ||
793 | + VA_START (Marker, VendorGuid); | ||
794 | + for (Cert = VA_ARG (Marker, CONST UINT8 *); | ||
795 | + Cert != NULL; | ||
796 | + Cert = VA_ARG (Marker, CONST UINT8 *)) { | ||
797 | + UINTN CertSize; | ||
798 | + CONST EFI_GUID *OwnerGuid; | ||
799 | + | ||
800 | + CertSize = VA_ARG (Marker, UINTN); | ||
801 | + OwnerGuid = VA_ARG (Marker, CONST EFI_GUID *); | ||
802 | + | ||
803 | + RepeatingHeader = (REPEATING_HEADER *)Position; | ||
804 | + CopyGuid (&RepeatingHeader->SignatureType, &gEfiCertX509Guid); | ||
805 | + RepeatingHeader->SignatureListSize = sizeof *RepeatingHeader + CertSize; | ||
806 | + RepeatingHeader->SignatureHeaderSize = 0; | ||
807 | + RepeatingHeader->SignatureSize = | ||
808 | + sizeof RepeatingHeader->SignatureOwner + CertSize; | ||
809 | + CopyGuid (&RepeatingHeader->SignatureOwner, OwnerGuid); | ||
810 | + Position += sizeof *RepeatingHeader; | ||
811 | + | ||
812 | + CopyMem (Position, Cert, CertSize); | ||
813 | + Position += CertSize; | ||
814 | + } | ||
815 | + VA_END (Marker); | ||
816 | + | ||
817 | + ASSERT (Data + DataSize == Position); | ||
818 | + | ||
819 | + Status = gRT->SetVariable (VariableName, VendorGuid, | ||
820 | + (EFI_VARIABLE_NON_VOLATILE | | ||
821 | + EFI_VARIABLE_BOOTSERVICE_ACCESS | | ||
822 | + EFI_VARIABLE_RUNTIME_ACCESS | | ||
823 | + EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS), | ||
824 | + DataSize, Data); | ||
825 | + | ||
826 | +FreeData: | ||
827 | + FreePool (Data); | ||
828 | + | ||
829 | +Out: | ||
830 | + if (EFI_ERROR (Status)) { | ||
831 | + AsciiPrint ("error: %a(\"%s\", %g): %r\n", __FUNCTION__, VariableName, | ||
832 | + VendorGuid, Status); | ||
833 | + } | ||
834 | + return Status; | ||
835 | +} | ||
836 | + | ||
837 | + | ||
838 | +STATIC | ||
839 | +EFI_STATUS | ||
840 | +EFIAPI | ||
841 | +GetExact ( | ||
842 | + IN CHAR16 *VariableName, | ||
843 | + IN EFI_GUID *VendorGuid, | ||
844 | + OUT VOID *Data, | ||
845 | + IN UINTN DataSize, | ||
846 | + IN BOOLEAN AllowMissing | ||
847 | + ) | ||
848 | +{ | ||
849 | + UINTN Size; | ||
850 | + EFI_STATUS Status; | ||
851 | + | ||
852 | + Size = DataSize; | ||
853 | + Status = gRT->GetVariable (VariableName, VendorGuid, NULL, &Size, Data); | ||
854 | + if (EFI_ERROR (Status)) { | ||
855 | + if (Status == EFI_NOT_FOUND && AllowMissing) { | ||
856 | + ZeroMem (Data, DataSize); | ||
857 | + return EFI_SUCCESS; | ||
858 | + } | ||
859 | + | ||
860 | + AsciiPrint ("error: GetVariable(\"%s\", %g): %r\n", VariableName, | ||
861 | + VendorGuid, Status); | ||
862 | + return Status; | ||
863 | + } | ||
864 | + | ||
865 | + if (Size != DataSize) { | ||
866 | + AsciiPrint ("error: GetVariable(\"%s\", %g): expected size 0x%Lx, " | ||
867 | + "got 0x%Lx\n", VariableName, VendorGuid, (UINT64)DataSize, (UINT64)Size); | ||
868 | + return EFI_PROTOCOL_ERROR; | ||
869 | + } | ||
870 | + | ||
871 | + return EFI_SUCCESS; | ||
872 | +} | ||
873 | + | ||
874 | +typedef struct { | ||
875 | + UINT8 SetupMode; | ||
876 | + UINT8 SecureBoot; | ||
877 | + UINT8 SecureBootEnable; | ||
878 | + UINT8 CustomMode; | ||
879 | + UINT8 VendorKeys; | ||
880 | +} SETTINGS; | ||
881 | + | ||
882 | +STATIC | ||
883 | +EFI_STATUS | ||
884 | +EFIAPI | ||
885 | +GetSettings ( | ||
886 | + OUT SETTINGS *Settings | ||
887 | + ) | ||
888 | +{ | ||
889 | + EFI_STATUS Status; | ||
890 | + | ||
891 | + Status = GetExact (EFI_SETUP_MODE_NAME, &gEfiGlobalVariableGuid, | ||
892 | + &Settings->SetupMode, sizeof Settings->SetupMode, FALSE); | ||
893 | + if (EFI_ERROR (Status)) { | ||
894 | + return Status; | ||
895 | + } | ||
896 | + | ||
897 | + Status = GetExact (EFI_SECURE_BOOT_MODE_NAME, &gEfiGlobalVariableGuid, | ||
898 | + &Settings->SecureBoot, sizeof Settings->SecureBoot, FALSE); | ||
899 | + if (EFI_ERROR (Status)) { | ||
900 | + return Status; | ||
901 | + } | ||
902 | + | ||
903 | + Status = GetExact (EFI_SECURE_BOOT_ENABLE_NAME, | ||
904 | + &gEfiSecureBootEnableDisableGuid, &Settings->SecureBootEnable, | ||
905 | + sizeof Settings->SecureBootEnable, TRUE); | ||
906 | + if (EFI_ERROR (Status)) { | ||
907 | + return Status; | ||
908 | + } | ||
909 | + | ||
910 | + Status = GetExact (EFI_CUSTOM_MODE_NAME, &gEfiCustomModeEnableGuid, | ||
911 | + &Settings->CustomMode, sizeof Settings->CustomMode, FALSE); | ||
912 | + if (EFI_ERROR (Status)) { | ||
913 | + return Status; | ||
914 | + } | ||
915 | + | ||
916 | + Status = GetExact (EFI_VENDOR_KEYS_VARIABLE_NAME, &gEfiGlobalVariableGuid, | ||
917 | + &Settings->VendorKeys, sizeof Settings->VendorKeys, FALSE); | ||
918 | + return Status; | ||
919 | +} | ||
920 | + | ||
921 | +STATIC | ||
922 | +VOID | ||
923 | +EFIAPI | ||
924 | +PrintSettings ( | ||
925 | + IN CONST SETTINGS *Settings | ||
926 | + ) | ||
927 | +{ | ||
928 | + AsciiPrint ("info: SetupMode=%d SecureBoot=%d SecureBootEnable=%d " | ||
929 | + "CustomMode=%d VendorKeys=%d\n", Settings->SetupMode, Settings->SecureBoot, | ||
930 | + Settings->SecureBootEnable, Settings->CustomMode, Settings->VendorKeys); | ||
931 | +} | ||
932 | + | ||
933 | + | ||
934 | +INTN | ||
935 | +EFIAPI | ||
936 | +ShellAppMain ( | ||
937 | + IN UINTN Argc, | ||
938 | + IN CHAR16 **Argv | ||
939 | + ) | ||
940 | +{ | ||
941 | + EFI_STATUS Status; | ||
942 | + SETTINGS Settings; | ||
943 | + | ||
944 | + Status = GetSettings (&Settings); | ||
945 | + if (EFI_ERROR (Status)) { | ||
946 | + return 1; | ||
947 | + } | ||
948 | + PrintSettings (&Settings); | ||
949 | + | ||
950 | + if (Settings.SetupMode != 1) { | ||
951 | + AsciiPrint ("error: already in User Mode\n"); | ||
952 | + return 1; | ||
953 | + } | ||
954 | + | ||
955 | + if (Settings.CustomMode != CUSTOM_SECURE_BOOT_MODE) { | ||
956 | + Settings.CustomMode = CUSTOM_SECURE_BOOT_MODE; | ||
957 | + Status = gRT->SetVariable (EFI_CUSTOM_MODE_NAME, &gEfiCustomModeEnableGuid, | ||
958 | + (EFI_VARIABLE_NON_VOLATILE | | ||
959 | + EFI_VARIABLE_BOOTSERVICE_ACCESS), | ||
960 | + sizeof Settings.CustomMode, &Settings.CustomMode); | ||
961 | + if (EFI_ERROR (Status)) { | ||
962 | + AsciiPrint ("error: SetVariable(\"%s\", %g): %r\n", EFI_CUSTOM_MODE_NAME, | ||
963 | + &gEfiCustomModeEnableGuid, Status); | ||
964 | + return 1; | ||
965 | + } | ||
966 | + } | ||
967 | + | ||
968 | + Status = EnrollListOfX509Certs ( | ||
969 | + EFI_IMAGE_SECURITY_DATABASE, | ||
970 | + &gEfiImageSecurityDatabaseGuid, | ||
971 | + MicrosoftPCA, sizeof MicrosoftPCA, &gEfiCallerIdGuid, | ||
972 | + MicrosoftUefiCA, sizeof MicrosoftUefiCA, &gEfiCallerIdGuid, | ||
973 | + NULL); | ||
974 | + if (EFI_ERROR (Status)) { | ||
975 | + return 1; | ||
976 | + } | ||
977 | + | ||
978 | + Status = EnrollListOfX509Certs ( | ||
979 | + EFI_KEY_EXCHANGE_KEY_NAME, | ||
980 | + &gEfiGlobalVariableGuid, | ||
981 | + ExampleCert, sizeof ExampleCert, &gEfiCallerIdGuid, | ||
982 | + MicrosoftKEK, sizeof MicrosoftKEK, &gEfiCallerIdGuid, | ||
983 | + NULL); | ||
984 | + if (EFI_ERROR (Status)) { | ||
985 | + return 1; | ||
986 | + } | ||
987 | + | ||
988 | + Status = EnrollListOfX509Certs ( | ||
989 | + EFI_PLATFORM_KEY_NAME, | ||
990 | + &gEfiGlobalVariableGuid, | ||
991 | + ExampleCert, sizeof ExampleCert, &gEfiGlobalVariableGuid, | ||
992 | + NULL); | ||
993 | + if (EFI_ERROR (Status)) { | ||
994 | + return 1; | ||
995 | + } | ||
996 | + | ||
997 | + Settings.CustomMode = STANDARD_SECURE_BOOT_MODE; | ||
998 | + Status = gRT->SetVariable (EFI_CUSTOM_MODE_NAME, &gEfiCustomModeEnableGuid, | ||
999 | + EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS, | ||
1000 | + sizeof Settings.CustomMode, &Settings.CustomMode); | ||
1001 | + if (EFI_ERROR (Status)) { | ||
1002 | + AsciiPrint ("error: SetVariable(\"%s\", %g): %r\n", EFI_CUSTOM_MODE_NAME, | ||
1003 | + &gEfiCustomModeEnableGuid, Status); | ||
1004 | + return 1; | ||
1005 | + } | ||
1006 | + | ||
1007 | + Status = GetSettings (&Settings); | ||
1008 | + if (EFI_ERROR (Status)) { | ||
1009 | + return 1; | ||
1010 | + } | ||
1011 | + PrintSettings (&Settings); | ||
1012 | + | ||
1013 | + if (Settings.SetupMode != 0 || Settings.SecureBoot != 1 || | ||
1014 | + Settings.SecureBootEnable != 1 || Settings.CustomMode != 0 || | ||
1015 | + Settings.VendorKeys != 0) { | ||
1016 | + AsciiPrint ("error: unexpected\n"); | ||
1017 | + return 1; | ||
1018 | + } | ||
1019 | + | ||
1020 | + AsciiPrint ("info: success\n"); | ||
1021 | + return 0; | ||
1022 | +} | ||
1023 | diff --git a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf | ||
1024 | new file mode 100644 | ||
1025 | index 0000000..ac919bb | ||
1026 | --- /dev/null | ||
1027 | +++ b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf | ||
1028 | @@ -0,0 +1,51 @@ | ||
1029 | +## @file | ||
1030 | +# Enroll default PK, KEK, DB. | ||
1031 | +# | ||
1032 | +# Copyright (C) 2014, Red Hat, Inc. | ||
1033 | +# | ||
1034 | +# This program and the accompanying materials are licensed and made available | ||
1035 | +# under the terms and conditions of the BSD License which accompanies this | ||
1036 | +# distribution. The full text of the license may be found at | ||
1037 | +# http://opensource.org/licenses/bsd-license. | ||
1038 | +# | ||
1039 | +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, | ||
1040 | +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR | ||
1041 | +# IMPLIED. | ||
1042 | +## | ||
1043 | + | ||
1044 | +[Defines] | ||
1045 | + INF_VERSION = 0x00010006 | ||
1046 | + BASE_NAME = EnrollDefaultKeys | ||
1047 | + FILE_GUID = D5C1DF0B-1BAC-4EDF-BA48-08834009CA5A | ||
1048 | + MODULE_TYPE = UEFI_APPLICATION | ||
1049 | + VERSION_STRING = 0.1 | ||
1050 | + ENTRY_POINT = ShellCEntryLib | ||
1051 | + | ||
1052 | +# | ||
1053 | +# VALID_ARCHITECTURES = IA32 X64 | ||
1054 | +# | ||
1055 | + | ||
1056 | +[Sources] | ||
1057 | + EnrollDefaultKeys.c | ||
1058 | + | ||
1059 | +[Packages] | ||
1060 | + MdePkg/MdePkg.dec | ||
1061 | + MdeModulePkg/MdeModulePkg.dec | ||
1062 | + SecurityPkg/SecurityPkg.dec | ||
1063 | + ShellPkg/ShellPkg.dec | ||
1064 | + | ||
1065 | +[Guids] | ||
1066 | + gEfiCertPkcs7Guid | ||
1067 | + gEfiCertX509Guid | ||
1068 | + gEfiCustomModeEnableGuid | ||
1069 | + gEfiGlobalVariableGuid | ||
1070 | + gEfiImageSecurityDatabaseGuid | ||
1071 | + gEfiSecureBootEnableDisableGuid | ||
1072 | + | ||
1073 | +[LibraryClasses] | ||
1074 | + BaseMemoryLib | ||
1075 | + DebugLib | ||
1076 | + MemoryAllocationLib | ||
1077 | + ShellCEntryLib | ||
1078 | + UefiLib | ||
1079 | + UefiRuntimeServicesTableLib | ||
1080 | diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc | ||
1081 | index fa9661c..e2e6ba3 100644 | ||
1082 | --- a/OvmfPkg/OvmfPkgIa32.dsc | ||
1083 | +++ b/OvmfPkg/OvmfPkgIa32.dsc | ||
1084 | @@ -764,6 +764,10 @@ | ||
1085 | |||
1086 | !if $(SECURE_BOOT_ENABLE) == TRUE | ||
1087 | SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf | ||
1088 | + OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf { | ||
1089 | + <LibraryClasses> | ||
1090 | + ShellCEntryLib|ShellPkg/Library/UefiShellCEntryLib/UefiShellCEntryLib.inf | ||
1091 | + } | ||
1092 | !endif | ||
1093 | |||
1094 | OvmfPkg/PlatformDxe/Platform.inf | ||
1095 | diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc | ||
1096 | index 667584a..a0ae1aa 100644 | ||
1097 | --- a/OvmfPkg/OvmfPkgIa32X64.dsc | ||
1098 | +++ b/OvmfPkg/OvmfPkgIa32X64.dsc | ||
1099 | @@ -773,6 +773,10 @@ | ||
1100 | |||
1101 | !if $(SECURE_BOOT_ENABLE) == TRUE | ||
1102 | SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf | ||
1103 | + OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf { | ||
1104 | + <LibraryClasses> | ||
1105 | + ShellCEntryLib|ShellPkg/Library/UefiShellCEntryLib/UefiShellCEntryLib.inf | ||
1106 | + } | ||
1107 | !endif | ||
1108 | |||
1109 | OvmfPkg/PlatformDxe/Platform.inf | ||
1110 | diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc | ||
1111 | index 5ae8469..87cee52 100644 | ||
1112 | --- a/OvmfPkg/OvmfPkgX64.dsc | ||
1113 | +++ b/OvmfPkg/OvmfPkgX64.dsc | ||
1114 | @@ -771,6 +771,10 @@ | ||
1115 | |||
1116 | !if $(SECURE_BOOT_ENABLE) == TRUE | ||
1117 | SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf | ||
1118 | + OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf { | ||
1119 | + <LibraryClasses> | ||
1120 | + ShellCEntryLib|ShellPkg/Library/UefiShellCEntryLib/UefiShellCEntryLib.inf | ||
1121 | + } | ||
1122 | !endif | ||
1123 | |||
1124 | OvmfPkg/PlatformDxe/Platform.inf | ||
diff --git a/meta/recipes-core/ovmf/ovmf/ovmf-shell-image.wks b/meta/recipes-core/ovmf/ovmf/ovmf-shell-image.wks new file mode 100644 index 0000000000..1d2f16bd33 --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/ovmf-shell-image.wks | |||
@@ -0,0 +1,4 @@ | |||
1 | # short-description: Create an EFI disk image with just the EFI system partition | ||
2 | |||
3 | part / --source rootfs --ondisk sda --fstype=vfat --align 1024 | ||
4 | bootloader --ptable gpt --timeout=5 | ||
diff --git a/meta/recipes-core/ovmf/ovmf_git.bb b/meta/recipes-core/ovmf/ovmf_git.bb index bdec6aa851..436b2f06f2 100644 --- a/meta/recipes-core/ovmf/ovmf_git.bb +++ b/meta/recipes-core/ovmf/ovmf_git.bb | |||
@@ -19,6 +19,7 @@ SRC_URI = "git://github.com/tianocore/edk2.git;branch=master \ | |||
19 | 19 | ||
20 | SRC_URI_append_class-target = " \ | 20 | SRC_URI_append_class-target = " \ |
21 | ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'http://www.openssl.org/source/openssl-1.0.2j.tar.gz;name=openssl;subdir=${S}/CryptoPkg/Library/OpensslLib', '', d)} \ | 21 | ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'http://www.openssl.org/source/openssl-1.0.2j.tar.gz;name=openssl;subdir=${S}/CryptoPkg/Library/OpensslLib', '', d)} \ |
22 | file://0007-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch \ | ||
22 | " | 23 | " |
23 | 24 | ||
24 | SRCREV="4575a602ca6072ee9d04150b38bfb143cbff8588" | 25 | SRCREV="4575a602ca6072ee9d04150b38bfb143cbff8588" |
@@ -136,6 +137,7 @@ do_compile_class-target() { | |||
136 | ln ${build_dir}/FV/OVMF.fd ${WORKDIR}/ovmf/ovmf.fd | 137 | ln ${build_dir}/FV/OVMF.fd ${WORKDIR}/ovmf/ovmf.fd |
137 | ln ${build_dir}/FV/OVMF_CODE.fd ${WORKDIR}/ovmf/ovmf.code.fd | 138 | ln ${build_dir}/FV/OVMF_CODE.fd ${WORKDIR}/ovmf/ovmf.code.fd |
138 | ln ${build_dir}/FV/OVMF_VARS.fd ${WORKDIR}/ovmf/ovmf.vars.fd | 139 | ln ${build_dir}/FV/OVMF_VARS.fd ${WORKDIR}/ovmf/ovmf.vars.fd |
140 | ln ${build_dir}/${OVMF_ARCH}/Shell.efi ${WORKDIR}/ovmf/ | ||
139 | 141 | ||
140 | if ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'true', 'false', d)}; then | 142 | if ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'true', 'false', d)}; then |
141 | # See CryptoPkg/Library/OpensslLib/Patch-HOWTO.txt and | 143 | # See CryptoPkg/Library/OpensslLib/Patch-HOWTO.txt and |
@@ -150,6 +152,7 @@ do_compile_class-target() { | |||
150 | ${S}/OvmfPkg/build.sh $PARALLEL_JOBS -a $OVMF_ARCH -b RELEASE -t ${FIXED_GCCVER} ${OVMF_SECURE_BOOT_FLAGS} | 152 | ${S}/OvmfPkg/build.sh $PARALLEL_JOBS -a $OVMF_ARCH -b RELEASE -t ${FIXED_GCCVER} ${OVMF_SECURE_BOOT_FLAGS} |
151 | ln ${build_dir}/FV/OVMF.fd ${WORKDIR}/ovmf/ovmf.secboot.fd | 153 | ln ${build_dir}/FV/OVMF.fd ${WORKDIR}/ovmf/ovmf.secboot.fd |
152 | ln ${build_dir}/FV/OVMF_CODE.fd ${WORKDIR}/ovmf/ovmf.secboot.code.fd | 154 | ln ${build_dir}/FV/OVMF_CODE.fd ${WORKDIR}/ovmf/ovmf.secboot.code.fd |
155 | ln ${build_dir}/${OVMF_ARCH}/EnrollDefaultKeys.efi ${WORKDIR}/ovmf/ | ||
153 | fi | 156 | fi |
154 | } | 157 | } |
155 | 158 | ||
@@ -159,8 +162,27 @@ do_install_class-native() { | |||
159 | } | 162 | } |
160 | 163 | ||
161 | do_install_class-target() { | 164 | do_install_class-target() { |
165 | # Content for UEFI shell iso. We install the EFI shell as | ||
166 | # bootx64/ia32.efi because then it can be started even when the | ||
167 | # firmware itself does not contain it. | ||
168 | install -d ${D}/efi/boot | ||
169 | install ${WORKDIR}/ovmf/Shell.efi ${D}/efi/boot/boot${@ "ia32" if "${TARGET_ARCH}" != "x86_64" else "x64"}.efi | ||
170 | if ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'true', 'false', d)}; then | ||
171 | install ${WORKDIR}/ovmf/EnrollDefaultKeys.efi ${D} | ||
172 | fi | ||
162 | } | 173 | } |
163 | 174 | ||
175 | # This always gets packaged because ovmf-shell-image depends on it. | ||
176 | # This allows testing that recipe in all configurations because it | ||
177 | # can always be part of a world build. | ||
178 | # | ||
179 | # However, EnrollDefaultKeys.efi is only included when Secure Boot is enabled. | ||
180 | PACKAGES =+ "ovmf-shell-efi" | ||
181 | FILES_ovmf-shell-efi = " \ | ||
182 | EnrollDefaultKeys.efi \ | ||
183 | efi/ \ | ||
184 | " | ||
185 | |||
164 | do_deploy() { | 186 | do_deploy() { |
165 | } | 187 | } |
166 | do_deploy[cleandirs] = "${DEPLOYDIR}" | 188 | do_deploy[cleandirs] = "${DEPLOYDIR}" |