public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Sukerkar, Amol N" <amol.n.sukerkar@intel.com>
To: "Wang, Jian J" <jian.j.wang@intel.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: "Kinney, Michael D" <michael.d.kinney@intel.com>,
	"Yao, Jiewen" <jiewen.yao@intel.com>,
	"Agrawal, Sachin" <sachin.agrawal@intel.com>,
	"Musti, Srinivas" <srinivas.musti@intel.com>,
	"Lakkimsetti, Subash" <subash.lakkimsetti@intel.com>,
	"Sukerkar, Amol N" <amol.n.sukerkar@intel.com>
Subject: Re: [edk2-devel] [PATCH v4 2/2] CryptoPkg/BaseHashLib: Implement Unified Hash Calculation API
Date: Thu, 23 Jan 2020 15:24:41 +0000	[thread overview]
Message-ID: <MWHPR11MB0064ECA08AC0839005F80128AC0F0@MWHPR11MB0064.namprd11.prod.outlook.com> (raw)
In-Reply-To: <D827630B58408649ACB04F44C5100036259F6E82@SHSMSX107.ccr.corp.intel.com>

Hi Jian,

You are correct that using local variable will link the unused libraries. In any case, I will simplify the BaseHashLib library further based on comments so far.

About your comment:
(3) Why do you need additional buffer here? The extra copy can be avoided by passing the '*Digest' to XxxFinal function below. Am I missing something here?
[ANS] Initially the idea was to make sure that the buffer passed into xxxFinal call didn't cause any buffer overflow since there is no way to detect the size of the buffer allocated by the caller. However, you are correct. We cannot prevent it. Next call CopyMem will cause the same issue. It is the responsibility of the caller to allocate enough memory for the digest based on the hashing algorithm used.

Thanks,
Amol

-----Original Message-----
From: Wang, Jian J <jian.j.wang@intel.com> 
Sent: Monday, January 20, 2020 10:17 AM
To: devel@edk2.groups.io; Sukerkar, Amol N <amol.n.sukerkar@intel.com>
Cc: Kinney, Michael D <michael.d.kinney@intel.com>; Yao, Jiewen <jiewen.yao@intel.com>; Agrawal, Sachin <sachin.agrawal@intel.com>; Musti, Srinivas <srinivas.musti@intel.com>; Lakkimsetti, Subash <subash.lakkimsetti@intel.com>
Subject: RE: [edk2-devel] [PATCH v4 2/2] CryptoPkg/BaseHashLib: Implement Unified Hash Calculation API

Amol,

One general comment in advance. The switch/case are using parameter HashPolicy.
Since it's a local variable not constant, I'm not sure whether or not the compiler will optimize out not effective hash algorithm choices. Please double check the linked code. If not, you should not pass the value of PcdSystemHashPolicy via a parameter. Instead, you should use this PCD directly in switch/case.

See my other comments below.


> -----Original Message-----
> From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of 
> Sukerkar, Amol N
> Sent: Saturday, January 18, 2020 6:32 AM
> To: devel@edk2.groups.io
> Cc: Kinney, Michael D <michael.d.kinney@intel.com>; Yao, Jiewen 
> <jiewen.yao@intel.com>; Wang, Jian J <jian.j.wang@intel.com>; Agrawal, 
> Sachin <sachin.agrawal@intel.com>; Musti, Srinivas 
> <srinivas.musti@intel.com>; Lakkimsetti, Subash 
> <subash.lakkimsetti@intel.com>
> Subject: [edk2-devel] [PATCH v4 2/2] CryptoPkg/BaseHashLib: Implement 
> Unified Hash Calculation API
> 
> This commit introduces a Unified Hash API to calculate hash using a 
> hashing algorithm specified by the PCD, PcdSystemHashPolicy. This 
> library interfaces with the various hashing API, such as, MD4, MD5, 
> SHA1, SHA256,
> SHA512 and SM3_256 implemented in BaseCryptLib. The user can calculate 
> the desired hash by setting PcdSystemHashPolicy to appropriate value.
> 
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> Cc: Jian J Wang <jian.j.wang@intel.com>
> Cc: Michael D Kinney <michael.d.kinney@intel.com>
> Signed-off-by: Sukerkar, Amol N <amol.n.sukerkar@intel.com>
> ---
>  CryptoPkg/Library/BaseHashLib/BaseHashLibCommon.c | 254
> ++++++++++++++++++++
>  CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.c    | 100 ++++++++
>  CryptoPkg/Library/BaseHashLib/BaseHashLibPei.c    | 101 ++++++++
>  CryptoPkg/CryptoPkg.dec                           |  21 ++
>  CryptoPkg/CryptoPkg.dsc                           |   6 +-
>  CryptoPkg/CryptoPkg.uni                           |  17 ++
>  CryptoPkg/Include/Library/BaseHashLib.h           |  85 +++++++
>  CryptoPkg/Library/BaseHashLib/BaseHashLibCommon.h |  72 ++++++
> CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.inf  |  45 ++++
> CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.uni  |  17 ++
> CryptoPkg/Library/BaseHashLib/BaseHashLibPei.inf  |  46 ++++
> CryptoPkg/Library/BaseHashLib/BaseHashLibPei.uni  |  16 ++
>  12 files changed, 779 insertions(+), 1 deletion(-)
> 
> diff --git a/CryptoPkg/Library/BaseHashLib/BaseHashLibCommon.c
> b/CryptoPkg/Library/BaseHashLib/BaseHashLibCommon.c
> new file mode 100644
> index 000000000000..217537566796
> --- /dev/null
> +++ b/CryptoPkg/Library/BaseHashLib/BaseHashLibCommon.c
> @@ -0,0 +1,254 @@
> +/** @file
> +  Implement image verification services for secure boot service
> +
> +  Caution: This file requires additional review when modified.
> +  This library will have external input - PE/COFF image.
> +  This external input must be validated carefully to avoid security 
> + issue like  buffer overflow, integer overflow.
> +
> +  DxeImageVerificationLibImageRead() function will make sure the 
> + PE/COFF
> image content
> +  read is within the image buffer.
> +
> +  DxeImageVerificationHandler(), HashPeImageByType(), HashPeImage()
> function will accept
> +  untrusted PE/COFF image and validate its data structure within this 
> + image
> buffer before use.
> +
> +Copyright (c) 2009 - 2020, Intel Corporation. All rights 
> +reserved.<BR>
> +(C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR> This 
> +program and the accompanying materials are licensed and made 
> +available under the terms and conditions of the BSD
> License
> +which accompanies this distribution.  The full text of the license 
> +may be found
> at
> +http://opensource.org/licenses/bsd-license.php
> +
> +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
> +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS
> OR IMPLIED.
> +
> +**/
> +
> +#include <Library/BaseLib.h>
> +#include <Library/BaseMemoryLib.h>
> +#include <Library/MemoryAllocationLib.h> #include 
> +<Library/BaseCryptLib.h> #include <Library/DebugLib.h> #include 
> +<Library/PcdLib.h> #include <Library/BaseHashLib.h>
> +
> +#include "BaseHashLibCommon.h"
> +
> +/**
> +  Init hash sequence with Hash Algorithm specified by HashPolicy.
> +
> +  @param HashPolicy  Hash Algorithm Policy.
> +  @param HashHandle  Hash handle.
> +
> +  @retval TRUE       Hash start and HashHandle returned.
> +  @retval FALSE      Hash Init unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashInitInternal (
> +  IN UINT8          HashPolicy,
> +  OUT HASH_HANDLE   *HashHandle
> +  )
> +{
> +  BOOLEAN  Status;
> +  VOID     *HashCtx;
> +  UINTN    CtxSize;
> +
> +  switch (HashPolicy) {
> +    case HASH_MD4:
> +      CtxSize = Md4GetContextSize ();
> +      HashCtx = AllocatePool (CtxSize);
> +      ASSERT (HashCtx != NULL);
> +
> +      Status = Md4Init (HashCtx);
> +      break;
> +
> +    case HASH_MD5:
> +      CtxSize = Md5GetContextSize ();
> +      HashCtx = AllocatePool (CtxSize);
> +      ASSERT (HashCtx != NULL);
> +
> +     Status = Md5Init (HashCtx);
> +      break;
> +
> +    case HASH_SHA1:
> +      CtxSize = Sha1GetContextSize ();
> +      HashCtx = AllocatePool (CtxSize);
> +      ASSERT (HashCtx != NULL);
> +
> +      Status = Sha1Init (HashCtx);
> +      break;
> +
> +    case HASH_SHA256:
> +      CtxSize = Sha256GetContextSize ();
> +      HashCtx = AllocatePool (CtxSize);
> +      ASSERT (HashCtx != NULL);
> +
> +      Status = Sha256Init (HashCtx);
> +      break;
> +
> +    case HASH_SHA384:
> +      CtxSize = Sha384GetContextSize ();
> +      HashCtx = AllocatePool (CtxSize);
> +      ASSERT (HashCtx != NULL);
> +
> +      Status = Sha384Init (HashCtx);
> +      break;
> +
> +    case HASH_SHA512:
> +      CtxSize = Sha512GetContextSize ();
> +      HashCtx = AllocatePool (CtxSize);
> +      ASSERT (HashCtx != NULL);
> +
> +      Status = Sha512Init (HashCtx);
> +      break;
> +
> +    case HASH_SM3_256:
> +      CtxSize = Sm3GetContextSize ();
> +      HashCtx = AllocatePool (CtxSize);
> +      ASSERT (HashCtx != NULL);
> +
> +      Status = Sm3Init (HashCtx);
> +      break;
> +
> +    default:
> +      ASSERT (FALSE);
> +      break;

(1) Status was not initialized before. Although there's ASSERT, still suggest to assign FALSE to Status for 'default' case.

> +  }
> +
> +  *HashHandle = (HASH_HANDLE)HashCtx;
> +
> +  return Status;
> +}
> +
> +/**
> +  Update hash data with Hash Algorithm specified by HashPolicy.
> +
> +  @param HashPolicy    Hash Algorithm Policy.
> +  @param HashHandle    Hash handle.
> +  @param DataToHash    Data to be hashed.
> +  @param DataToHashLen Data size.
> +
> +  @retval TRUE         Hash updated.
> +  @retval FALSE        Hash updated unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashUpdateInternal (
> +  IN UINT8        HashPolicy,
> +  IN HASH_HANDLE  HashHandle,
> +  IN VOID         *DataToHash,
> +  IN UINTN        DataToHashLen
> +  )
> +{
> +  BOOLEAN  Status;
> +  VOID     *HashCtx;
> +
> +  HashCtx = (VOID *)HashHandle;
> +
> +  switch (HashPolicy) {
> +    case HASH_MD4:
> +      Status = Md4Update (HashCtx, DataToHash, DataToHashLen);
> +      break;
> +
> +    case HASH_MD5:
> +      Status = Md5Update (HashCtx, DataToHash, DataToHashLen);
> +      break;
> +
> +    case HASH_SHA1:
> +      Status = Sha1Update (HashCtx, DataToHash, DataToHashLen);
> +      break;
> +
> +    case HASH_SHA256:
> +      Status = Sha256Update (HashCtx, DataToHash, DataToHashLen);
> +      break;
> +
> +    case HASH_SHA384:
> +      Status = Sha384Update (HashCtx, DataToHash, DataToHashLen);
> +      break;
> +
> +    case HASH_SHA512:
> +      Status = Sha512Update (HashCtx, DataToHash, DataToHashLen);
> +      break;
> +
> +    case HASH_SM3_256:
> +      Status = Sm3Update (HashCtx, DataToHash, DataToHashLen);
> +      break;
> +
> +    default:
> +      ASSERT (FALSE);
> +      break;

(2) Same as (1). Suggest assigning FALSE to Status in 'default' case.

> +  }
> +
> +  return Status;
> +}
> +
> +/**
> +  Hash complete with Hash Algorithm specified by HashPolicy.
> +
> +  @param HashPolicy    Hash Algorithm Policy.
> +  @param HashHandle    Hash handle.
> +  @param Digest        Hash Digest.
> +
> +  @retval TRUE         Hash complete and Digest is returned.
> +  @retval FALSE        Hash complete unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashFinalInternal (
> +  IN UINT8        HashPolicy,
> +  IN HASH_HANDLE  HashHandle,
> +  OUT UINT8       **Digest
> +  )
> +{
> +  BOOLEAN  Status;
> +  VOID     *HashCtx;
> +  UINT8    DigestData[SHA512_DIGEST_SIZE];
> +

(3) Why do you need additional buffer here? The extra copy can be avoided by passing the '*Digest' to XxxFinal function below. Am I missing something here?

> +  HashCtx = (VOID *)HashHandle;
> +
> +  switch (HashPolicy) {
> +    case HASH_MD4:
> +      Status = Md4Final (HashCtx, DigestData);
> +      CopyMem (*Digest, DigestData, MD4_DIGEST_SIZE);
> +      break;
> +
> +    case HASH_MD5:
> +      Status = Md5Final (HashCtx, DigestData);
> +      CopyMem (*Digest, DigestData, MD5_DIGEST_SIZE);
> +      break;
> +
> +    case HASH_SHA1:
> +      Status = Sha1Final (HashCtx, DigestData);
> +      CopyMem (*Digest, DigestData, SHA1_DIGEST_SIZE);
> +      break;
> +
> +    case HASH_SHA256:
> +      Status = Sha256Final (HashCtx, DigestData);
> +      CopyMem (*Digest, DigestData, SHA256_DIGEST_SIZE);
> +      break;
> +
> +    case HASH_SHA384:
> +      Status = Sha384Final (HashCtx, DigestData);
> +      CopyMem (*Digest, DigestData, SHA384_DIGEST_SIZE);
> +      break;
> +
> +    case HASH_SHA512:
> +      Status = Sha512Final (HashCtx, DigestData);
> +      CopyMem (*Digest, DigestData, SHA512_DIGEST_SIZE);
> +      break;
> +
> +    case HASH_SM3_256:
> +      Status = Sm3Final (HashCtx, DigestData);
> +      CopyMem (*Digest, DigestData, SM3_256_DIGEST_SIZE);
> +      break;
> +
> +    default:
> +      ASSERT (FALSE);
> +      break;

(4) Same as (1) and (2)

> +  }
> +
> +  FreePool (HashCtx);
> +
> +  return Status;
> +}
> diff --git a/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.c
> b/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.c
> new file mode 100644
> index 000000000000..226c2d6a4aae
> --- /dev/null
> +++ b/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.c
> @@ -0,0 +1,100 @@
> +/** @file
> +  This library is Unified Hash API. It will redirect hash request to
> +  the hash handler specified by PcdSystemHashPolicy such as SHA1, 
> +SHA256,
> +  SHA384 and SM3...
> +
> +Copyright (c) 2013 - 2020, Intel Corporation. All rights reserved. 
> +<BR>

(5) This is new file. Start year should be 2020.

> +SPDX-License-Identifier: BSD-2-Clause-Patent
> +
> +**/
> +
> +
> +#include <Library/BaseLib.h>
> +#include <Library/BaseMemoryLib.h>
> +#include <Library/MemoryAllocationLib.h> #include 
> +<Library/DebugLib.h> #include <Library/PcdLib.h> #include 
> +<Library/BaseHashLib.h>
> +
> +#include "BaseHashLibCommon.h"
> +
> +/**
> +  Init hash sequence.
> +
> +  @param HashHandle  Hash handle.
> +
> +  @retval TRUE       Hash start and HashHandle returned.
> +  @retval FALSE      Hash Init unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiInit (
> +  OUT  HASH_HANDLE   *HashHandle
> +)
> +{
> +  BOOLEAN     Status;
> +  UINT8       HashPolicy;
> +  HASH_HANDLE Handle;
> +
> +  HashPolicy = PcdGet8 (PcdSystemHashPolicy);
> +
> +  Status = HashInitInternal (HashPolicy, &Handle);
> +
> +  *HashHandle = Handle;
> +
> +  return Status;
> +}
> +
> +/**
> +  Update hash data.
> +
> +  @param HashHandle    Hash handle.
> +  @param DataToHash    Data to be hashed.
> +  @param DataToHashLen Data size.
> +
> +  @retval TRUE         Hash updated.
> +  @retval FALSE        Hash updated unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiUpdate (
> +  IN HASH_HANDLE    HashHandle,
> +  IN VOID           *DataToHash,
> +  IN UINTN          DataToHashLen
> +)
> +{
> +  BOOLEAN     Status;
> +  UINT8       HashPolicy;
> +
> +  HashPolicy = PcdGet8 (PcdSystemHashPolicy);
> +
> +  Status = HashUpdateInternal (HashPolicy, HashHandle, DataToHash,
> DataToHashLen);
> +
> +  return Status;
> +}
> +
> +/**
> +  Hash complete.
> +
> +  @param HashHandle    Hash handle.
> +  @param Digest        Hash Digest.
> +
> +  @retval TRUE         Hash complete and Digest is returned.
> +  @retval FALSE        Hash complete unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiFinal (
> +  IN  HASH_HANDLE HashHandle,
> +  OUT UINT8       *Digest
> +)
> +{
> +  BOOLEAN     Status;
> +  UINT8       HashPolicy;
> +
> +  HashPolicy = PcdGet8 (PcdSystemHashPolicy);
> +
> +  Status = HashFinalInternal (HashPolicy, &HashHandle, &Digest);
> +
> +  return Status;
> +}
> diff --git a/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.c
> b/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.c
> new file mode 100644
> index 000000000000..a9fa0d978088
> --- /dev/null
> +++ b/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.c
> @@ -0,0 +1,101 @@
> +/** @file
> +  This library is Unified Hash API. It will redirect hash request to
> +  the hash handler specified by PcdSystemHashPolicy such as SHA1, 
> +SHA256,
> +  SHA384 and SM3...
> +
> +Copyright (c) 2013 - 2020, Intel Corporation. All rights reserved. 
> +<BR>

(6) This is new file. Start year should be 2020.

> +SPDX-License-Identifier: BSD-2-Clause-Patent
> +
> +**/
> +
> +
> +#include <Library/BaseLib.h>
> +#include <Library/BaseMemoryLib.h>
> +#include <Library/MemoryAllocationLib.h> #include 
> +<Library/DebugLib.h> #include <Library/PcdLib.h> #include 
> +<Library/HobLib.h> #include <Library/BaseHashLib.h>
> +
> +#include "BaseHashLibCommon.h"
> +
> +/**
> +  Init hash sequence.
> +
> +  @param HashHandle  Hash handle.
> +
> +  @retval TRUE       Hash start and HashHandle returned.
> +  @retval FALSE      Hash Init unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiInit (
> +  OUT  HASH_HANDLE   *HashHandle
> +)
> +{
> +  BOOLEAN     Status;
> +  UINT8       HashPolicy;
> +  HASH_HANDLE Handle;
> +
> +  HashPolicy = PcdGet8 (PcdSystemHashPolicy);
> +
> +  Status = HashInitInternal (HashPolicy, &Handle);
> +
> +  *HashHandle = Handle;
> +
> +  return Status;
> +}
> +
> +/**
> +  Update hash data.
> +
> +  @param HashHandle    Hash handle.
> +  @param DataToHash    Data to be hashed.
> +  @param DataToHashLen Data size.
> +
> +  @retval TRUE         Hash updated.
> +  @retval FALSE        Hash updated unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiUpdate (
> +  IN HASH_HANDLE    HashHandle,
> +  IN VOID           *DataToHash,
> +  IN UINTN          DataToHashLen
> +)
> +{
> +  BOOLEAN     Status;
> +  UINT8       HashPolicy;
> +
> +  HashPolicy = PcdGet8 (PcdSystemHashPolicy);
> +
> +  Status = HashUpdateInternal (HashPolicy, HashHandle, DataToHash,
> DataToHashLen);
> +
> +  return Status;
> +}
> +
> +/**
> +  Hash complete.
> +
> +  @param HashHandle    Hash handle.
> +  @param Digest        Hash Digest.
> +
> +  @retval TRUE         Hash complete and Digest is returned.
> +  @retval FALSE        Hash complete unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiFinal (
> +  IN  HASH_HANDLE HashHandle,
> +  OUT UINT8      *Digest
> +)
> +{
> +  BOOLEAN     Status;
> +  UINT8       HashPolicy;
> +
> +  HashPolicy = PcdGet8 (PcdSystemHashPolicy);
> +
> +  Status = HashFinalInternal (HashPolicy, HashHandle, &Digest);
> +
> +  return Status;
> +}
> diff --git a/CryptoPkg/CryptoPkg.dec b/CryptoPkg/CryptoPkg.dec index 
> a548ec7ddc71..9288c652f8e4 100644
> --- a/CryptoPkg/CryptoPkg.dec
> +++ b/CryptoPkg/CryptoPkg.dec
> @@ -33,10 +33,31 @@ [LibraryClasses]
>    ##
>    TlsLib|Include/Library/TlsLib.h
> 
> +  ##  @libraryclass  Provides Unified API for different hash implementations.
> +  #
> +  BaseHashLib|Include/Library/BaseHashLib.h
> +
>  [Guids]
>    ## Security package token space guid.
>    # Include/Guid/CryptoPkgTokenSpace.h
>    gEfiCryptoPkgTokenSpaceGuid      = { 0xd3fb176, 0x9569, 0x4d51, { 0xa3, 0xef,
> 0x7d, 0x61, 0xc6, 0x4f, 0xea, 0xba }}
> 
> +[PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx]
> +  ## This PCD indicates the HASH algorithm to verify unsigned PE/COFF 
> +image
> +  #  Based on the value set, the required algorithm is chosen to 
> +verify
> +  #  the unsigned image during Secure Boot.<BR>
> +  #  The hashing algorithm selected must match the hashing algorithm 
> +used to
> +  #  hash the image to be added to DB using tools such as KeyEnroll.<BR>
> +  #     0x00000001    - MD4.<BR>
> +  #     0x00000002    - MD5.<BR>
> +  #     0x00000003    - SHA1.<BR>
> +  #     0x00000004    - SHA256.<BR>
> +  #     0x00000005    - SHA384.<BR>
> +  #     0x00000006    - SHA512.<BR>
> +  #     0x00000007    - SM3_256.<BR>
> +  # @Prompt Set policy for hashing unsigned image for Secure Boot.
> +  # @ValidRange 0x80000001 | 0x00000001 - 0x00000007
> +
> gEfiCryptoPkgTokenSpaceGuid.PcdSystemHashPolicy|0x04|UINT8|0x00000001
> +
>  [UserExtensions.TianoCore."ExtraFiles"]
>    CryptoPkgExtra.uni
> diff --git a/CryptoPkg/CryptoPkg.dsc b/CryptoPkg/CryptoPkg.dsc index 
> ec43c1f0a47e..1d2956d20483 100644
> --- a/CryptoPkg/CryptoPkg.dsc
> +++ b/CryptoPkg/CryptoPkg.dsc
> @@ -1,7 +1,7 @@
>  ## @file
>  #  Cryptographic Library Package for UEFI Security Implementation.
>  #
> -#  Copyright (c) 2009 - 2018, Intel Corporation. All rights 
> reserved.<BR>
> +#  Copyright (c) 2009 - 2020, Intel Corporation. All rights 
> +reserved.<BR>
>  #  SPDX-License-Identifier: BSD-2-Clause-Patent  #  ## @@ -62,9 
> +62,11 @@ [LibraryClasses.ARM]
> 
>  [LibraryClasses.common.PEIM]
>    BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf
> +  BaseHashLib|CryptoPkg/Library/BaseHashLib/BaseHashLibPei.inf
> 
>  [LibraryClasses.common.DXE_DRIVER]
>    BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
> +  BaseHashLib|CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.inf
> 
>  [LibraryClasses.common.DXE_RUNTIME_DRIVER]
>    BaseCryptLib|CryptoPkg/Library/BaseCryptLib/RuntimeCryptLib.inf
> @@ -120,6 +122,8 @@ [Components]
>    CryptoPkg/Library/TlsLibNull/TlsLibNull.inf
>    CryptoPkg/Library/OpensslLib/OpensslLib.inf
>    CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
> +  CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.inf
> +  CryptoPkg/Library/BaseHashLib/BaseHashLibPei.inf
> 
>  [Components.IA32, Components.X64]
>    CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf
> diff --git a/CryptoPkg/CryptoPkg.uni b/CryptoPkg/CryptoPkg.uni index 
> beb0036ef583..ebbebed4924d 100644
> --- a/CryptoPkg/CryptoPkg.uni
> +++ b/CryptoPkg/CryptoPkg.uni
> @@ -17,3 +17,20 @@
> 
> 
> 
> +#string STR_gEfiCryptoPkgTokenSpaceGuid_PcdSystemHashPolicy_PROMPT
> #language en-US "HASH algorithm to verify unsigned PE/COFF image"
> +
> +#string STR_gEfiCryptoPkgTokenSpaceGuid_PcdSystemHashPolicy_HELP
> #language en-US "This PCD indicates the HASH algorithm to verify 
> unsigned PE/COFF image.<BR><BR>\n"
> +                                                                       
> + "Based on the value set, the
> required algorithm is chosen to verify\n"
> +                                                                       
> + "the unsigned image during
> Secure Boot.<BR>\n"
> +                                                                       
> + "The hashing algorithm
> selected must match the hashing algorithm used to\n"
> +                                                                       
> + "hash the image to be added
> to DB using tools such as KeyEnroll.<BR>\n"
> +                                                                                        "0x00000001  -  MD4.<BR>\n"
> +                                                                                        "0x00000002  -  MD5.<BR>\n"
> +                                                                                        "0x00000003  -  SHA1.<BR>\n"
> +                                                                       
> + "0x00000004  -
> SHA256.<BR>\n"
> +                                                                       
> + "0x00000005  -
> SHA384.<BR>\n"
> +                                                                       
> + "0x00000006  -
> SHA512.<BR>\n"
> +                                                                                        "0x00000007  -  SM3.<BR>"
> +
> +
> +
> diff --git a/CryptoPkg/Include/Library/BaseHashLib.h
> b/CryptoPkg/Include/Library/BaseHashLib.h
> new file mode 100644
> index 000000000000..c07e4a9a44aa
> --- /dev/null
> +++ b/CryptoPkg/Include/Library/BaseHashLib.h
> @@ -0,0 +1,85 @@
> +/** @file
> +  The internal header file includes the common header files, defines
> +  internal structure and functions used by ImageVerificationLib.
> +
> +Copyright (c) 2009 - 2020, Intel Corporation. All rights 
> +reserved.<BR> This program and the accompanying materials are 
> +licensed and made available under the terms and conditions of the BSD
> License
> +which accompanies this distribution.  The full text of the license 
> +may be found
> at
> +http://opensource.org/licenses/bsd-license.php
> +
> +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
> +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS
> OR IMPLIED.
> +

(7) License is not correct. Use the standard two-clause one.

> +**/
> +
> +#ifndef __BASEHASHLIB_H_
> +#define __BASEHASHLIB_H_
> +
> +#include <Uefi.h>
> +
> +typedef UINTN  HASH_HANDLE;
> +
> +//
> +// Hash Algorithms
> +//
> +#define HASH_INVALID    0x00000000
> +#define HASH_MD4        0x00000001
> +#define HASH_MD5        0x00000002
> +#define HASH_SHA1       0x00000003
> +#define HASH_SHA256     0x00000004
> +#define HASH_SHA384     0x00000005
> +#define HASH_SHA512     0x00000006
> +#define HASH_SM3_256    0x00000007
> +#define HASH_MAX        0x00000008
> +
> +
> +/**
> +  Init hash sequence.
> +
> +  @param HashHandle  Hash handle.
> +
> +  @retval TRUE       Hash start and HashHandle returned.
> +  @retval FALSE      Hash Init unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiInit (
> +  OUT  HASH_HANDLE   *HashHandle
> +);
> +
> +/**
> +  Update hash data.
> +
> +  @param HashHandle    Hash handle.
> +  @param DataToHash    Data to be hashed.
> +  @param DataToHashLen Data size.
> +
> +  @retval TRUE         Hash updated.
> +  @retval FALSE        Hash updated unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiUpdate (
> +  IN HASH_HANDLE    HashHandle,
> +  IN VOID           *DataToHash,
> +  IN UINTN          DataToHashLen
> +);
> +
> +/**
> +  Hash complete.
> +
> +  @param HashHandle    Hash handle.
> +  @param Digest        Hash Digest.
> +
> +  @retval TRUE         Hash complete and Digest is returned.
> +  @retval FALSE        Hash complete unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashApiFinal (
> +  IN  HASH_HANDLE HashHandle,
> +  OUT UINT8       *Digest
> +);
> +
> +#endif
> diff --git a/CryptoPkg/Library/BaseHashLib/BaseHashLibCommon.h
> b/CryptoPkg/Library/BaseHashLib/BaseHashLibCommon.h
> new file mode 100644
> index 000000000000..b022284d1a27
> --- /dev/null
> +++ b/CryptoPkg/Library/BaseHashLib/BaseHashLibCommon.h
> @@ -0,0 +1,72 @@
> +/** @file
> +  The internal header file includes the common header files, defines
> +  internal structure and functions used by ImageVerificationLib.
> +
> +Copyright (c) 2009 - 2020, Intel Corporation. All rights 
> +reserved.<BR> This program and the accompanying materials are 
> +licensed and made available under the terms and conditions of the BSD
> License
> +which accompanies this distribution.  The full text of the license 
> +may be found
> at
> +http://opensource.org/licenses/bsd-license.php
> +
> +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
> +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS
> OR IMPLIED.
> +
> +**/
> +

(8) License is not correct. Use the standard two-clause one.

> +#ifndef __BASEHASHLIB_COMMON_H_
> +#define __BASEHASHLIB_COMMON_H_
> +
> +/**
> +  Init hash sequence with Hash Algorithm specified by HashPolicy.
> +
> +  @param HashHandle Hash handle.
> +
> +  @retval EFI_SUCCESS          Hash start and HashHandle returned.
> +  @retval EFI_UNSUPPORTED      System has no HASH library registered.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashInitInternal (
> +  IN UINT8          HashPolicy,
> +  OUT HASH_HANDLE   *HashHandle
> +  );
> +
> +/**
> +  Hash complete with Hash Algorithm specified by HashPolicy.
> +
> +  @param HashPolicy    Hash Algorithm Policy.
> +  @param HashHandle    Hash handle.
> +  @param Digest        Hash Digest.
> +
> +  @retval TRUE         Hash complete and Digest is returned.
> +  @retval FALSE        Hash complete unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashUpdateInternal (
> +  IN UINT8        HashPolicy,
> +  IN HASH_HANDLE  HashHandle,
> +  IN VOID         *DataToHash,
> +  IN UINTN        DataToHashLen
> +  );
> +
> +/**
> +  Update hash data with Hash Algorithm specified by HashPolicy.
> +
> +  @param HashPolicy    Hash Algorithm Policy.
> +  @param HashHandle    Hash handle.
> +  @param DataToHash    Data to be hashed.
> +  @param DataToHashLen Data size.
> +
> +  @retval TRUE         Hash updated.
> +  @retval FALSE        Hash updated unsuccessful.
> +**/
> +BOOLEAN
> +EFIAPI
> +HashFinalInternal (
> +  IN UINT8        HashPolicy,
> +  IN HASH_HANDLE  HashHandle,
> +  OUT UINT8       **Digest
> +  );
> +
> +#endif
> diff --git a/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.inf
> b/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.inf
> new file mode 100644
> index 000000000000..732c8f0d1f47
> --- /dev/null
> +++ b/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.inf
> @@ -0,0 +1,45 @@
> +## @file
> +#  Provides hash service by registered hash handler # #  This library 
> +is Base Hash Lib. It will redirect hash request to each individual #
> +hash handler registered, such as SHA1, SHA256, SHA384, SM3.
> +#
> +# Copyright (c) 2018 - 2020, Intel Corporation. All rights 
> +reserved.<BR>

(9) This is new file. The start year should be this year.

> +# SPDX-License-Identifier: BSD-2-Clause-Patent # ##
> +
> +[Defines]
> +  INF_VERSION                    = 0x00010005
> +  BASE_NAME                      = BaseHashLibDxe
> +  MODULE_UNI_FILE                = BaseHashLibDxe.uni
> +  FILE_GUID                      = 158DC712-F15A-44dc-93BB-1675045BE066
> +  MODULE_TYPE                    = DXE_DRIVER
> +  VERSION_STRING                 = 1.0
> +  LIBRARY_CLASS                  = BaseHashLib|DXE_DRIVER DXE_RUNTIME_DRIVER
> DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
> +
> +#
> +# The following information is for reference only and not required by 
> +the build
> tools.
> +#
> +#  VALID_ARCHITECTURES           = IA32 X64
> +#
> +
> +[Sources]
> +  BaseHashLibCommon.h
> +  BaseHashLibCommon.c
> +  BaseHashLibDxe.c
> +
> +[Packages]
> +  MdePkg/MdePkg.dec
> +  CryptoPkg/CryptoPkg.dec
> +
> +[LibraryClasses]
> +  BaseLib
> +  BaseMemoryLib
> +  DebugLib
> +  MemoryAllocationLib
> +  BaseCryptLib
> +  PcdLib
> +
> +[Pcd]
> +  gEfiCryptoPkgTokenSpaceGuid.PcdSystemHashPolicy    ## CONSUMES
> diff --git a/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.uni
> b/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.uni
> new file mode 100644
> index 000000000000..53e025918828
> --- /dev/null
> +++ b/CryptoPkg/Library/BaseHashLib/BaseHashLibDxe.uni
> @@ -0,0 +1,17 @@
> +// /** @file
> +// Provides hash service by registered hash handler // // This 
> +library is Unified Hash API. It will redirect hash request to each 
> +individual // hash handler registered, such as SHA1, SHA256. Platform 
> +can use
> PcdTpm2HashMask to
> +// mask some hash engines.
> +//
> +// Copyright (c) 2018 - 2020, Intel Corporation. All rights 
> +reserved.<BR> //

(10) This is new file. The start year should be this year.

> +// SPDX-License-Identifier: BSD-2-Clause-Patent // // **/
> +
> +
> +#string STR_MODULE_ABSTRACT             #language en-US "Provides hash
> service by specified hash handler"
> +
> +#string STR_MODULE_DESCRIPTION          #language en-US "This library is
> Unified Hash API. It will redirect hash request to the hash handler 
> specified by PcdSystemHashPolicy."
> diff --git a/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.inf
> b/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.inf
> new file mode 100644
> index 000000000000..4ff23f88c1c3
> --- /dev/null
> +++ b/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.inf
> @@ -0,0 +1,46 @@
> +## @file
> +#  Provides hash service by registered hash handler # #  This library 
> +is BaseCrypto router. It will redirect hash request to each
> individual
> +#  hash handler registered, such as SHA1, SHA256, SM3.
> +#
> +# Copyright (c) 2018 - 2020, Intel Corporation. All rights 
> +reserved.<BR>

(11) This is new file. The start year should be this year.

> +# SPDX-License-Identifier: BSD-2-Clause-Patent # ##
> +
> +[Defines]
> +  INF_VERSION                    = 0x00010005
> +  BASE_NAME                      = BaseHashLibPei
> +  MODULE_UNI_FILE                = BaseHashLibPei.uni
> +  FILE_GUID                      = DDCBCFBA-8EEB-488a-96D6-097831A6E50B
> +  MODULE_TYPE                    = PEIM
> +  VERSION_STRING                 = 1.0
> +  LIBRARY_CLASS                  = BaseHashLib|PEIM
> +
> +#
> +# The following information is for reference only and not required by 
> +the build
> tools.
> +#
> +#  VALID_ARCHITECTURES           = IA32 X64
> +#
> +
> +[Sources]
> +  BaseHashLibCommon.h
> +  BaseHashLibCommon.c
> +  BaseHashLibPei.c
> +
> +[Packages]
> +  MdePkg/MdePkg.dec
> +  CryptoPkg/CryptoPkg.dec
> +  MdeModulePkg/MdeModulePkg.dec
> +
> +[LibraryClasses]
> +  BaseLib
> +  BaseMemoryLib
> +  DebugLib
> +  MemoryAllocationLib
> +  BaseCryptLib
> +  PcdLib
> +
> +[Pcd]
> +  gEfiCryptoPkgTokenSpaceGuid.PcdSystemHashPolicy    ## CONSUMES
> diff --git a/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.uni
> b/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.uni
> new file mode 100644
> index 000000000000..a1abcc1cdfa0
> --- /dev/null
> +++ b/CryptoPkg/Library/BaseHashLib/BaseHashLibPei.uni
> @@ -0,0 +1,16 @@
> +// /** @file
> +// Provides hash service by registered hash handler // // This 
> +library is Unified Hash API. It will redirect hash request to each 
> +individual // hash handler registered, such as SHA1, SHA256.
> +//
> +// Copyright (c) 2018 - 2020, Intel Corporation. All rights 
> +reserved.<BR>

(12) This is new file. The start year should be this year.

> +//
> +// SPDX-License-Identifier: BSD-2-Clause-Patent // // **/
> +
> +
> +#string STR_MODULE_ABSTRACT             #language en-US "Provides hash
> service by specified hash handler"
> +
> +#string STR_MODULE_DESCRIPTION          #language en-US "This library is
> Unified Hash API. It will redirect hash request to the hash handler 
> specified by PcdSystemHashPolicy."
> --
> 2.16.2.windows.1
> 
> 
> 



      reply	other threads:[~2020-01-23 15:25 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-01-17 22:31 [PATCH v4 0/2] CryptoPkg/BaseHashLib: Implement Unified Hash Calculation API Sukerkar, Amol N
2020-01-17 22:31 ` [PATCH v4 1/2] CryptoPkg: Add CryptoPkg Token Space GUID Sukerkar, Amol N
2020-01-20 16:54   ` Wang, Jian J
2020-01-17 22:32 ` [PATCH v4 2/2] CryptoPkg/BaseHashLib: Implement Unified Hash Calculation API Sukerkar, Amol N
2020-01-17 23:33   ` [edk2-devel] " Hot Tian
2020-01-23 15:07     ` Sukerkar, Amol N
2020-01-20 17:17   ` Wang, Jian J
2020-01-23 15:24     ` Sukerkar, Amol N [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=MWHPR11MB0064ECA08AC0839005F80128AC0F0@MWHPR11MB0064.namprd11.prod.outlook.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox