2020-04-14 02:51:51 +00:00
|
|
|
# SPDX-License-Identifier: GPL-2.0+
|
|
|
|
# Copyright (c) 2019, Linaro Limited
|
|
|
|
# Author: AKASHI Takahiro <takahiro.akashi@linaro.org>
|
|
|
|
#
|
|
|
|
# U-Boot UEFI: Signed Image Authentication Test
|
|
|
|
|
|
|
|
"""
|
|
|
|
This test verifies image authentication for signed images.
|
|
|
|
"""
|
|
|
|
|
|
|
|
import pytest
|
|
|
|
|
2020-07-08 05:01:58 +00:00
|
|
|
|
2020-04-14 02:51:51 +00:00
|
|
|
@pytest.mark.boardspec('sandbox')
|
|
|
|
@pytest.mark.buildconfigspec('efi_secure_boot')
|
|
|
|
@pytest.mark.buildconfigspec('cmd_efidebug')
|
|
|
|
@pytest.mark.buildconfigspec('cmd_fat')
|
|
|
|
@pytest.mark.buildconfigspec('cmd_nvedit_efi')
|
|
|
|
@pytest.mark.slow
|
|
|
|
class TestEfiSignedImage(object):
|
|
|
|
def test_efi_signed_image_auth1(self, u_boot_console, efi_boot_env):
|
|
|
|
"""
|
2020-07-08 05:02:00 +00:00
|
|
|
Test Case 1 - Secure boot is not in force
|
2020-04-14 02:51:51 +00:00
|
|
|
"""
|
|
|
|
u_boot_console.restart_uboot()
|
|
|
|
disk_img = efi_boot_env
|
|
|
|
with u_boot_console.log.section('Test Case 1a'):
|
2020-07-08 05:02:00 +00:00
|
|
|
# Test Case 1a, run signed image if no PK
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'host bind 0 %s' % disk_img,
|
2020-06-09 05:09:32 +00:00
|
|
|
'efidebug boot add 1 HELLO1 host 0:1 /helloworld.efi.signed ""',
|
2020-04-14 02:51:51 +00:00
|
|
|
'efidebug boot next 1',
|
|
|
|
'bootefi bootmgr'])
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'Hello, world!' in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
|
|
|
|
with u_boot_console.log.section('Test Case 1b'):
|
2020-07-08 05:02:00 +00:00
|
|
|
# Test Case 1b, run unsigned image if no PK
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'efidebug boot add 2 HELLO2 host 0:1 /helloworld.efi ""',
|
|
|
|
'efidebug boot next 2',
|
|
|
|
'bootefi bootmgr'])
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'Hello, world!' in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
|
2020-07-08 05:02:00 +00:00
|
|
|
def test_efi_signed_image_auth2(self, u_boot_console, efi_boot_env):
|
|
|
|
"""
|
|
|
|
Test Case 2 - Secure boot is in force,
|
|
|
|
authenticated by db (TEST_db certificate in db)
|
|
|
|
"""
|
|
|
|
u_boot_console.restart_uboot()
|
|
|
|
disk_img = efi_boot_env
|
|
|
|
with u_boot_console.log.section('Test Case 2a'):
|
|
|
|
# Test Case 2a, db is not yet installed
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
2020-07-08 05:02:00 +00:00
|
|
|
'host bind 0 %s' % disk_img,
|
2020-04-14 02:51:51 +00:00
|
|
|
'fatload host 0:1 4000000 KEK.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
|
|
|
|
'fatload host 0:1 4000000 PK.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
2020-07-08 05:02:00 +00:00
|
|
|
'efidebug boot add 1 HELLO1 host 0:1 /helloworld.efi.signed ""',
|
|
|
|
'efidebug boot next 1',
|
|
|
|
'efidebug test bootmgr'])
|
|
|
|
assert('\'HELLO1\' failed' in ''.join(output))
|
|
|
|
assert('efi_start_image() returned: 26' in ''.join(output))
|
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'efidebug boot add 2 HELLO2 host 0:1 /helloworld.efi ""',
|
2020-04-14 02:51:51 +00:00
|
|
|
'efidebug boot next 2',
|
2020-07-08 05:02:00 +00:00
|
|
|
'efidebug test bootmgr'])
|
2020-07-08 05:01:59 +00:00
|
|
|
assert '\'HELLO2\' failed' in ''.join(output)
|
2020-07-08 05:02:00 +00:00
|
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
|
|
|
|
|
|
with u_boot_console.log.section('Test Case 2b'):
|
|
|
|
# Test Case 2b, authenticated by db
|
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'fatload host 0:1 4000000 db.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db'])
|
|
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'efidebug boot next 2',
|
|
|
|
'efidebug test bootmgr'])
|
2020-07-08 05:02:00 +00:00
|
|
|
assert '\'HELLO2\' failed' in ''.join(output)
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'efidebug boot next 1',
|
|
|
|
'bootefi bootmgr'])
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'Hello, world!' in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
|
2020-07-08 05:02:00 +00:00
|
|
|
def test_efi_signed_image_auth3(self, u_boot_console, efi_boot_env):
|
2020-04-14 02:51:51 +00:00
|
|
|
"""
|
2020-07-08 05:02:00 +00:00
|
|
|
Test Case 3 - rejected by dbx (TEST_db certificate in dbx)
|
2020-04-14 02:51:51 +00:00
|
|
|
"""
|
|
|
|
u_boot_console.restart_uboot()
|
|
|
|
disk_img = efi_boot_env
|
2020-07-08 05:02:00 +00:00
|
|
|
with u_boot_console.log.section('Test Case 3a'):
|
|
|
|
# Test Case 3a, rejected by dbx
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'host bind 0 %s' % disk_img,
|
|
|
|
'fatload host 0:1 4000000 db.auth',
|
2020-06-09 05:09:32 +00:00
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx',
|
2020-04-14 02:51:51 +00:00
|
|
|
'fatload host 0:1 4000000 KEK.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
|
|
|
|
'fatload host 0:1 4000000 PK.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'efidebug boot add 1 HELLO host 0:1 /helloworld.efi.signed ""',
|
|
|
|
'efidebug boot next 1',
|
|
|
|
'efidebug test bootmgr'])
|
2020-07-08 05:02:00 +00:00
|
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
|
2020-07-08 05:02:00 +00:00
|
|
|
with u_boot_console.log.section('Test Case 3b'):
|
|
|
|
# Test Case 3b, rejected by dbx even if db allows
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'fatload host 0:1 4000000 db.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db'])
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
2020-04-14 02:51:51 +00:00
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'efidebug boot next 1',
|
|
|
|
'efidebug test bootmgr'])
|
2020-07-08 05:02:00 +00:00
|
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
2020-07-08 05:01:59 +00:00
|
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
2020-07-08 05:02:01 +00:00
|
|
|
|
|
|
|
def test_efi_signed_image_auth4(self, u_boot_console, efi_boot_env):
|
|
|
|
"""
|
|
|
|
Test Case 4 - revoked by dbx (digest of TEST_db certificate in dbx)
|
|
|
|
"""
|
|
|
|
u_boot_console.restart_uboot()
|
|
|
|
disk_img = efi_boot_env
|
|
|
|
with u_boot_console.log.section('Test Case 4'):
|
|
|
|
# Test Case 4, rejected by dbx
|
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'host bind 0 %s' % disk_img,
|
|
|
|
'fatload host 0:1 4000000 dbx_hash.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx',
|
|
|
|
'fatload host 0:1 4000000 db.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db',
|
|
|
|
'fatload host 0:1 4000000 KEK.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
|
|
|
|
'fatload host 0:1 4000000 PK.auth',
|
|
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
|
|
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
|
|
output = u_boot_console.run_command_list([
|
|
|
|
'efidebug boot add 1 HELLO host 0:1 /helloworld.efi.signed ""',
|
|
|
|
'efidebug boot next 1',
|
|
|
|
'efidebug test bootmgr'])
|
|
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
|
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|