mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-05 02:51:00 +00:00
7fdc02b3d7
Signature database (db or dbx) may have not only certificates that contain a public key for RSA decryption, but also digests of signed images. In this test case, if database has an image's digest (EFI_CERT_SHA256_GUID) and if the value matches to a hash value calculated from image's binary, authentication should pass in case of db, and fail in case of dbx. Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org> Use defined time stamps for sign-efi-sig-list. Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
249 lines
12 KiB
Python
249 lines
12 KiB
Python
# SPDX-License-Identifier: GPL-2.0+
|
|
# Copyright (c) 2019, Linaro Limited
|
|
# Author: AKASHI Takahiro <takahiro.akashi@linaro.org>
|
|
#
|
|
# U-Boot UEFI: Signed Image Authentication Test
|
|
|
|
"""
|
|
This test verifies image authentication for signed images.
|
|
"""
|
|
|
|
import pytest
|
|
|
|
|
|
@pytest.mark.boardspec('sandbox')
|
|
@pytest.mark.buildconfigspec('efi_secure_boot')
|
|
@pytest.mark.buildconfigspec('cmd_efidebug')
|
|
@pytest.mark.buildconfigspec('cmd_fat')
|
|
@pytest.mark.buildconfigspec('cmd_nvedit_efi')
|
|
@pytest.mark.slow
|
|
class TestEfiSignedImage(object):
|
|
def test_efi_signed_image_auth1(self, u_boot_console, efi_boot_env):
|
|
"""
|
|
Test Case 1 - Secure boot is not in force
|
|
"""
|
|
u_boot_console.restart_uboot()
|
|
disk_img = efi_boot_env
|
|
with u_boot_console.log.section('Test Case 1a'):
|
|
# Test Case 1a, run signed image if no PK
|
|
output = u_boot_console.run_command_list([
|
|
'host bind 0 %s' % disk_img,
|
|
'efidebug boot add 1 HELLO1 host 0:1 /helloworld.efi.signed ""',
|
|
'efidebug boot next 1',
|
|
'bootefi bootmgr'])
|
|
assert 'Hello, world!' in ''.join(output)
|
|
|
|
with u_boot_console.log.section('Test Case 1b'):
|
|
# Test Case 1b, run unsigned image if no PK
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 2 HELLO2 host 0:1 /helloworld.efi ""',
|
|
'efidebug boot next 2',
|
|
'bootefi bootmgr'])
|
|
assert 'Hello, world!' in ''.join(output)
|
|
|
|
def test_efi_signed_image_auth2(self, u_boot_console, efi_boot_env):
|
|
"""
|
|
Test Case 2 - Secure boot is in force,
|
|
authenticated by db (TEST_db certificate in db)
|
|
"""
|
|
u_boot_console.restart_uboot()
|
|
disk_img = efi_boot_env
|
|
with u_boot_console.log.section('Test Case 2a'):
|
|
# Test Case 2a, db is not yet installed
|
|
output = u_boot_console.run_command_list([
|
|
'host bind 0 %s' % disk_img,
|
|
'fatload host 0:1 4000000 KEK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
|
|
'fatload host 0:1 4000000 PK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 1 HELLO1 host 0:1 /helloworld.efi.signed ""',
|
|
'efidebug boot next 1',
|
|
'efidebug test bootmgr'])
|
|
assert('\'HELLO1\' failed' in ''.join(output))
|
|
assert('efi_start_image() returned: 26' in ''.join(output))
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 2 HELLO2 host 0:1 /helloworld.efi ""',
|
|
'efidebug boot next 2',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO2\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
|
|
with u_boot_console.log.section('Test Case 2b'):
|
|
# Test Case 2b, authenticated by db
|
|
output = u_boot_console.run_command_list([
|
|
'fatload host 0:1 4000000 db.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot next 2',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO2\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot next 1',
|
|
'bootefi bootmgr'])
|
|
assert 'Hello, world!' in ''.join(output)
|
|
|
|
def test_efi_signed_image_auth3(self, u_boot_console, efi_boot_env):
|
|
"""
|
|
Test Case 3 - rejected by dbx (TEST_db certificate in dbx)
|
|
"""
|
|
u_boot_console.restart_uboot()
|
|
disk_img = efi_boot_env
|
|
with u_boot_console.log.section('Test Case 3a'):
|
|
# Test Case 3a, rejected by dbx
|
|
output = u_boot_console.run_command_list([
|
|
'host bind 0 %s' % disk_img,
|
|
'fatload host 0:1 4000000 db.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx',
|
|
'fatload host 0:1 4000000 KEK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
|
|
'fatload host 0:1 4000000 PK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 1 HELLO host 0:1 /helloworld.efi.signed ""',
|
|
'efidebug boot next 1',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
|
|
with u_boot_console.log.section('Test Case 3b'):
|
|
# Test Case 3b, rejected by dbx even if db allows
|
|
output = u_boot_console.run_command_list([
|
|
'fatload host 0:1 4000000 db.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot next 1',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
|
|
def test_efi_signed_image_auth4(self, u_boot_console, efi_boot_env):
|
|
"""
|
|
Test Case 4 - revoked by dbx (digest of TEST_db certificate in dbx)
|
|
"""
|
|
u_boot_console.restart_uboot()
|
|
disk_img = efi_boot_env
|
|
with u_boot_console.log.section('Test Case 4'):
|
|
# Test Case 4, rejected by dbx
|
|
output = u_boot_console.run_command_list([
|
|
'host bind 0 %s' % disk_img,
|
|
'fatload host 0:1 4000000 dbx_hash.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx',
|
|
'fatload host 0:1 4000000 db.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db',
|
|
'fatload host 0:1 4000000 KEK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
|
|
'fatload host 0:1 4000000 PK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 1 HELLO host 0:1 /helloworld.efi.signed ""',
|
|
'efidebug boot next 1',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
|
|
def test_efi_signed_image_auth5(self, u_boot_console, efi_boot_env):
|
|
"""
|
|
Test Case 5 - multiple signatures
|
|
one signed with TEST_db, and
|
|
one signed with TEST_db1
|
|
"""
|
|
u_boot_console.restart_uboot()
|
|
disk_img = efi_boot_env
|
|
with u_boot_console.log.section('Test Case 5a'):
|
|
# Test Case 5a, rejected if any of signatures is not verified
|
|
output = u_boot_console.run_command_list([
|
|
'host bind 0 %s' % disk_img,
|
|
'fatload host 0:1 4000000 db.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db',
|
|
'fatload host 0:1 4000000 KEK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
|
|
'fatload host 0:1 4000000 PK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 1 HELLO host 0:1 /helloworld.efi.signed_2sigs ""',
|
|
'efidebug boot next 1',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
|
|
with u_boot_console.log.section('Test Case 5b'):
|
|
# Test Case 5b, authenticated if both signatures are verified
|
|
output = u_boot_console.run_command_list([
|
|
'fatload host 0:1 4000000 db1.auth',
|
|
'setenv -e -nv -bs -rt -at -a -i 4000000,$filesize db'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 1 HELLO host 0:1 /helloworld.efi.signed_2sigs ""',
|
|
'efidebug boot next 1',
|
|
'bootefi bootmgr'])
|
|
assert 'Hello, world!' in ''.join(output)
|
|
|
|
with u_boot_console.log.section('Test Case 5c'):
|
|
# Test Case 5c, rejected if any of signatures is revoked
|
|
output = u_boot_console.run_command_list([
|
|
'fatload host 0:1 4000000 dbx_hash1.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 1 HELLO host 0:1 /helloworld.efi.signed_2sigs ""',
|
|
'efidebug boot next 1',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
|
|
def test_efi_signed_image_auth6(self, u_boot_console, efi_boot_env):
|
|
"""
|
|
Test Case 6 - using digest of signed image in database
|
|
"""
|
|
u_boot_console.restart_uboot()
|
|
disk_img = efi_boot_env
|
|
with u_boot_console.log.section('Test Case 6a'):
|
|
# Test Case 6a, verified by image's digest in db
|
|
output = u_boot_console.run_command_list([
|
|
'host bind 0 %s' % disk_img,
|
|
'fatload host 0:1 4000000 db_hello_signed.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db',
|
|
'fatload host 0:1 4000000 KEK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
|
|
'fatload host 0:1 4000000 PK.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot add 1 HELLO host 0:1 /helloworld.efi.signed ""',
|
|
'efidebug boot next 1',
|
|
'bootefi bootmgr'])
|
|
assert 'Hello, world!' in ''.join(output)
|
|
|
|
with u_boot_console.log.section('Test Case 6b'):
|
|
# Test Case 6b, rejected by TEST_db certificate in dbx
|
|
output = u_boot_console.run_command_list([
|
|
'fatload host 0:1 4000000 dbx_db.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot next 1',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|
|
|
|
with u_boot_console.log.section('Test Case 6c'):
|
|
# Test Case 6c, rejected by image's digest in dbx
|
|
output = u_boot_console.run_command_list([
|
|
'fatload host 0:1 4000000 db.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize db',
|
|
'fatload host 0:1 4000000 dbx_hello_signed.auth',
|
|
'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx'])
|
|
assert 'Failed to set EFI variable' not in ''.join(output)
|
|
output = u_boot_console.run_command_list([
|
|
'efidebug boot next 1',
|
|
'efidebug test bootmgr'])
|
|
assert '\'HELLO\' failed' in ''.join(output)
|
|
assert 'efi_start_image() returned: 26' in ''.join(output)
|