public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Liming Gao" <liming.gao@intel.com>
To: "matthewfcarlson@gmail.com" <matthewfcarlson@gmail.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: Ard Biesheuvel <ard.biesheuvel@arm.com>,
	"Kinney, Michael D" <michael.d.kinney@intel.com>,
	"Liu, Zhiguang" <zhiguang.liu@intel.com>,
	"Gao, Liming" <liming.gao@intel.com>
Subject: Re: [PATCH v6 2/5] MdePkg: BaseRngLibDxe: Add RngLib that uses RngDxe
Date: Thu, 13 Aug 2020 09:10:07 +0000	[thread overview]
Message-ID: <CY4PR11MB152674199AD19BDE7DFD355B80430@CY4PR11MB1526.namprd11.prod.outlook.com> (raw)
In-Reply-To: <20200812224338.287-3-matthewfcarlson@gmail.com>

Matthew:
  Based on the naming rule for the libraries in MdePkg, this new library instance name should be DxeRngLib or DxeRngLibRngProtocol.

Thanks
Liming
-----Original Message-----
From: matthewfcarlson@gmail.com <matthewfcarlson@gmail.com> 
Sent: 2020年8月13日 6:44
To: devel@edk2.groups.io
Cc: Ard Biesheuvel <ard.biesheuvel@arm.com>; Kinney, Michael D <michael.d.kinney@intel.com>; Gao, Liming <liming.gao@intel.com>; Liu, Zhiguang <zhiguang.liu@intel.com>; Matthew Carlson <matthewfcarlson@gmail.com>
Subject: [PATCH v6 2/5] MdePkg: BaseRngLibDxe: Add RngLib that uses RngDxe

From: Matthew Carlson <macarl@microsoft.com>

This adds a RngLib that uses the RngProtocol to provide randomness.
This means that the RngLib is meant to be used with DXE_DRIVERS.

Ref: https://github.com/tianocore/edk2/pull/845
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1871

Cc: Ard Biesheuvel <ard.biesheuvel@arm.com>
Cc: Michael D Kinney <michael.d.kinney@intel.com>
Cc: Liming Gao <liming.gao@intel.com>
Cc: Zhiguang Liu <zhiguang.liu@intel.com>
Signed-off-by: Matthew Carlson <matthewfcarlson@gmail.com>
---
 MdePkg/Library/BaseRngLibDxe/RngDxeLib.c       | 200 ++++++++++++++++++++
 MdePkg/Library/BaseRngLibDxe/BaseRngLibDxe.inf |  38 ++++
 MdePkg/MdePkg.dsc                              |   4 +-
 3 files changed, 241 insertions(+), 1 deletion(-)

diff --git a/MdePkg/Library/BaseRngLibDxe/RngDxeLib.c b/MdePkg/Library/BaseRngLibDxe/RngDxeLib.c
new file mode 100644
index 000000000000..8ee29329de13
--- /dev/null
+++ b/MdePkg/Library/BaseRngLibDxe/RngDxeLib.c
@@ -0,0 +1,200 @@
+/** @file

+ Provides an implementation of the library class RngLib that uses the Rng protocol.

+

+Copyright (c) Microsoft Corporation. All rights reserved.

+SPDX-License-Identifier: BSD-2-Clause-Patent

+

+**/

+#include <Uefi.h>

+#include <Library/UefiBootServicesTableLib.h>

+#include <Library/DebugLib.h>

+#include <Library/RngLib.h>

+#include <Protocol/Rng.h>

+

+/**

+Routine Description:

+

+    Generates a random number via the NIST

+    800-9A algorithm.  Refer to

+    http://csrc.nist.gov/groups/STM/cavp/documents/drbg/DRBGVS.pdf

+    for more information.

+

+    Arguments:

+

+    Buffer      -- Buffer to receive the random number.

+    BufferSize  -- Number of bytes in Buffer.

+

+Return Value:

+

+    EFI_SUCCESS or underlying failure code.

+

+**/

+EFI_STATUS

+EFIAPI

+GenerateRandomNumberViaNist800Algorithm(

+  OUT UINT8* Buffer,

+  IN  UINTN  BufferSize

+  )

+{

+  EFI_STATUS        Status;

+  EFI_RNG_PROTOCOL* RngProtocol;

+

+  RngProtocol = NULL;

+

+  if (Buffer == NULL) {

+      DEBUG((DEBUG_ERROR, "[%a] Buffer == NULL.\n", __FUNCTION__));

+      return EFI_INVALID_PARAMETER;

+  }

+

+  Status = gBS->LocateProtocol(&gEfiRngProtocolGuid, NULL, (VOID **)&RngProtocol);

+  if (EFI_ERROR(Status) || RngProtocol == NULL) {

+      DEBUG((DEBUG_ERROR, "[%a] Could not locate RNG prototocol, Status = %r\n", __FUNCTION__, Status));

+      return Status;

+  }

+

+  Status = RngProtocol->GetRNG(RngProtocol, &gEfiRngAlgorithmSp80090Ctr256Guid, BufferSize, Buffer);

+  DEBUG((DEBUG_INFO, "[%a] GetRNG algorithm CTR-256 - Status = %r\n", __FUNCTION__, Status));

+  if(!EFI_ERROR(Status)) {

+    return Status;

+  }

+

+  Status = RngProtocol->GetRNG(RngProtocol, &gEfiRngAlgorithmSp80090Hmac256Guid, BufferSize, Buffer);

+  DEBUG((DEBUG_INFO, "[%a] GetRNG algorithm HMAC-256 - Status = %r\n", __FUNCTION__, Status));

+  if(!EFI_ERROR(Status)) {

+    return Status;

+  }

+

+  Status = RngProtocol->GetRNG(RngProtocol, &gEfiRngAlgorithmSp80090Hash256Guid, BufferSize, Buffer);

+  DEBUG((DEBUG_INFO, "[%a] GetRNG algorithm Hash-256 - Status = %r\n", __FUNCTION__, Status));

+  if(!EFI_ERROR(Status)) {

+    return Status;

+  }

+  // If we get to this point, we have failed

+  DEBUG((DEBUG_ERROR, "[%a] GetRNG() failed, staus = %r\n", __FUNCTION__, Status));

+

+  return Status;

+}// GenerateRandomNumberViaNist800Algorithm()

+

+

+/**

+  Generates a 16-bit random number.

+

+  if Rand is NULL, return FALSE.

+

+  @param[out] Rand     Buffer pointer to store the 16-bit random value.

+

+  @retval TRUE         Random number generated successfully.

+  @retval FALSE        Failed to generate the random number.

+

+**/

+BOOLEAN

+EFIAPI

+GetRandomNumber16 (

+  OUT     UINT16                    *Rand

+  )

+{

+  EFI_STATUS Status;

+

+  if (Rand == NULL)

+  {

+    return FALSE;

+  }

+

+  Status = GenerateRandomNumberViaNist800Algorithm ((UINT8 *)Rand, 2);

+  if (EFI_ERROR(Status))

+  {

+    return FALSE;

+  }

+  return TRUE;

+}

+

+/**

+  Generates a 32-bit random number.

+

+  if Rand is NULL, return FALSE.

+

+  @param[out] Rand     Buffer pointer to store the 32-bit random value.

+

+  @retval TRUE         Random number generated successfully.

+  @retval FALSE        Failed to generate the random number.

+

+**/

+BOOLEAN

+EFIAPI

+GetRandomNumber32 (

+  OUT     UINT32                    *Rand

+  )

+{

+  EFI_STATUS Status;

+

+  if (Rand == NULL) {

+    return FALSE;

+  }

+

+  Status = GenerateRandomNumberViaNist800Algorithm ((UINT8 *)Rand, 4);

+  if (EFI_ERROR(Status)) {

+    return FALSE;

+  }

+  return TRUE;

+}

+

+/**

+  Generates a 64-bit random number.

+

+  if Rand is NULL, return FALSE.

+

+  @param[out] Rand     Buffer pointer to store the 64-bit random value.

+

+  @retval TRUE         Random number generated successfully.

+  @retval FALSE        Failed to generate the random number.

+

+**/

+BOOLEAN

+EFIAPI

+GetRandomNumber64 (

+  OUT     UINT64                    *Rand

+  )

+{

+  EFI_STATUS Status;

+

+  if (Rand == NULL)

+  {

+    return FALSE;

+  }

+

+  Status = GenerateRandomNumberViaNist800Algorithm ((UINT8 *)Rand, 8);

+  if (EFI_ERROR(Status)) {

+    return FALSE;

+  }

+  return TRUE;

+}

+

+/**

+  Generates a 128-bit random number.

+

+  if Rand is NULL, return FALSE.

+

+  @param[out] Rand     Buffer pointer to store the 128-bit random value.

+

+  @retval TRUE         Random number generated successfully.

+  @retval FALSE        Failed to generate the random number.

+

+**/

+BOOLEAN

+EFIAPI

+GetRandomNumber128 (

+  OUT     UINT64                    *Rand

+  )

+{

+  EFI_STATUS Status;

+

+  if (Rand == NULL) {

+    return FALSE;

+  }

+

+  Status = GenerateRandomNumberViaNist800Algorithm ((UINT8 *)Rand, 16);

+  if (EFI_ERROR(Status)) {

+    return FALSE;

+  }

+  return TRUE;

+}

diff --git a/MdePkg/Library/BaseRngLibDxe/BaseRngLibDxe.inf b/MdePkg/Library/BaseRngLibDxe/BaseRngLibDxe.inf
new file mode 100644
index 000000000000..819a106b1376
--- /dev/null
+++ b/MdePkg/Library/BaseRngLibDxe/BaseRngLibDxe.inf
@@ -0,0 +1,38 @@
+# @file

+# Provides implementation of the library class RngLib that uses the RngProtocol

+#

+# @copyright

+# Copyright (c) Microsoft Corporation. All rights reserved.

+# SPDX-License-Identifier: BSD-2-Clause-Patent

+#

+# MU_CHANGE: New file

+##

+

+[Defines]

+  INF_VERSION     = 0x00010017

+  BASE_NAME       = BaseRngLibDxe

+  FILE_GUID       = FF9F84C5-A33E-44E3-9BB5-0D654B2D4149

+  MODULE_TYPE     = DXE_DRIVER

+  VERSION_STRING  = 1.0

+  LIBRARY_CLASS   = RngLib|DXE_DRIVER UEFI_APPLICATION UEFI_DRIVER

+

+[Packages]

+  MdePkg/MdePkg.dec

+

+[Sources]

+  RngDxeLib.c

+

+[LibraryClasses]

+  DebugLib

+  UefiBootServicesTableLib

+

+[Protocols]

+  gEfiRngProtocolGuid                 ## CONSUMES

+

+[Depex]

+  gEfiRngProtocolGuid

+

+[Guids]

+  gEfiRngAlgorithmSp80090Ctr256Guid            ## CONSUMES

+  gEfiRngAlgorithmSp80090Hash256Guid           ## CONSUMES

+  gEfiRngAlgorithmSp80090Hmac256Guid           ## CONSUMES

diff --git a/MdePkg/MdePkg.dsc b/MdePkg/MdePkg.dsc
index d7ba3a730909..837a0047400e 100644
--- a/MdePkg/MdePkg.dsc
+++ b/MdePkg/MdePkg.dsc
@@ -62,8 +62,10 @@
   MdePkg/Library/BasePostCodeLibPort80/BasePostCodeLibPort80.inf

   MdePkg/Library/BasePrintLib/BasePrintLib.inf

   MdePkg/Library/BaseReportStatusCodeLibNull/BaseReportStatusCodeLibNull.inf

-  MdePkg/Library/BaseRngLibTimerLib/BaseRngLibTimerLib.inf

+  MdePkg/Library/BaseRngLibDxe/BaseRngLibDxe.inf

   MdePkg/Library/BaseRngLibNull/BaseRngLibNull.inf

+  MdePkg/Library/BaseRngLibTimerLib/BaseRngLibTimerLib.inf

+

   MdePkg/Library/BaseSerialPortLibNull/BaseSerialPortLibNull.inf

   MdePkg/Library/BaseSynchronizationLib/BaseSynchronizationLib.inf

   MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplate.inf

-- 
2.27.0.windows.1


  reply	other threads:[~2020-08-13  9:10 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-08-12 22:43 [PATCH v6 0/5] Use RngLib instead of TimerLib for OpensslLib Matthew Carlson
2020-08-12 22:43 ` [PATCH v6 1/5] MdePkg: TimerRngLib: Added RngLib that uses TimerLib Matthew Carlson
2020-08-13 12:09   ` Ard Biesheuvel
2020-08-13 18:59     ` Matthew Carlson
2020-08-12 22:43 ` [PATCH v6 2/5] MdePkg: BaseRngLibDxe: Add RngLib that uses RngDxe Matthew Carlson
2020-08-13  9:10   ` Liming Gao [this message]
2020-08-13 12:19   ` Ard Biesheuvel
2020-08-13 19:18     ` Matthew Carlson
2020-08-12 22:43 ` [PATCH v6 3/5] OvmfPkg: Add RngLib based on TimerLib for Crypto Matthew Carlson
2020-08-13  8:34   ` Laszlo Ersek
2020-08-12 22:43 ` [PATCH v6 4/5] ArmVirtPkg: Add RngLib based on TimerLib for CryptoPkg Matthew Carlson
2020-08-13  8:31   ` Laszlo Ersek
2020-08-12 22:43 ` [PATCH v6 5/5] CryptoPkg: OpensslLib: Use RngLib to generate entropy in rand_pool Matthew Carlson
2020-08-13 12:21   ` Ard Biesheuvel
2020-08-13 15:14 ` [PATCH v6 0/5] Use RngLib instead of TimerLib for OpensslLib Yao, Jiewen
2020-08-13 19:42   ` Matthew Carlson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CY4PR11MB152674199AD19BDE7DFD355B80430@CY4PR11MB1526.namprd11.prod.outlook.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox