| /** @file | |
| EFI PEI Core Security services | |
| Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR> | |
| This program and the accompanying materials | |
| are licensed and made available under the terms and conditions of the BSD License | |
| which accompanies this distribution. The full text of the license may be found at | |
| http://opensource.org/licenses/bsd-license.php | |
| THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, | |
| WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. | |
| **/ | |
| #include "PeiMain.h" | |
| EFI_PEI_NOTIFY_DESCRIPTOR mNotifyList = { | |
| EFI_PEI_PPI_DESCRIPTOR_NOTIFY_DISPATCH | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST, | |
| &gEfiPeiSecurity2PpiGuid, | |
| SecurityPpiNotifyCallback | |
| }; | |
| /** | |
| Initialize the security services. | |
| @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation. | |
| @param OldCoreData Pointer to the old core data. | |
| NULL if being run in non-permament memory mode. | |
| **/ | |
| VOID | |
| InitializeSecurityServices ( | |
| IN EFI_PEI_SERVICES **PeiServices, | |
| IN PEI_CORE_INSTANCE *OldCoreData | |
| ) | |
| { | |
| if (OldCoreData == NULL) { | |
| PeiServicesNotifyPpi (&mNotifyList); | |
| } | |
| return; | |
| } | |
| /** | |
| Provide a callback for when the security PPI is installed. | |
| This routine will cache installed security PPI into PeiCore's private data. | |
| @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation. | |
| @param NotifyDescriptor The descriptor for the notification event. | |
| @param Ppi Pointer to the PPI in question. | |
| @return Always success | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| SecurityPpiNotifyCallback ( | |
| IN EFI_PEI_SERVICES **PeiServices, | |
| IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor, | |
| IN VOID *Ppi | |
| ) | |
| { | |
| PEI_CORE_INSTANCE *PrivateData; | |
| // | |
| // Get PEI Core private data | |
| // | |
| PrivateData = PEI_CORE_INSTANCE_FROM_PS_THIS (PeiServices); | |
| // | |
| // If there isn't a security PPI installed, use the one from notification | |
| // | |
| if (PrivateData->PrivateSecurityPpi == NULL) { | |
| PrivateData->PrivateSecurityPpi = (EFI_PEI_SECURITY2_PPI *)Ppi; | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| Provide a callout to the security verification service. | |
| @param PrivateData PeiCore's private data structure | |
| @param VolumeHandle Handle of FV | |
| @param FileHandle Handle of PEIM's ffs | |
| @param AuthenticationStatus Authentication status | |
| @retval EFI_SUCCESS Image is OK | |
| @retval EFI_SECURITY_VIOLATION Image is illegal | |
| @retval EFI_NOT_FOUND If security PPI is not installed. | |
| **/ | |
| EFI_STATUS | |
| VerifyPeim ( | |
| IN PEI_CORE_INSTANCE *PrivateData, | |
| IN EFI_PEI_FV_HANDLE VolumeHandle, | |
| IN EFI_PEI_FILE_HANDLE FileHandle, | |
| IN UINT32 AuthenticationStatus | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| BOOLEAN DeferExection; | |
| if (PrivateData->PrivateSecurityPpi == NULL) { | |
| Status = EFI_NOT_FOUND; | |
| } else { | |
| // | |
| // Check to see if the image is OK | |
| // | |
| Status = PrivateData->PrivateSecurityPpi->AuthenticationState ( | |
| (CONST EFI_PEI_SERVICES **) &PrivateData->Ps, | |
| PrivateData->PrivateSecurityPpi, | |
| AuthenticationStatus, | |
| VolumeHandle, | |
| FileHandle, | |
| &DeferExection | |
| ); | |
| if (DeferExection) { | |
| Status = EFI_SECURITY_VIOLATION; | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Verify a Firmware volume. | |
| @param CurrentFvAddress Pointer to the current Firmware Volume under consideration | |
| @retval EFI_SUCCESS Firmware Volume is legal | |
| **/ | |
| EFI_STATUS | |
| VerifyFv ( | |
| IN EFI_FIRMWARE_VOLUME_HEADER *CurrentFvAddress | |
| ) | |
| { | |
| // | |
| // Right now just pass the test. Future can authenticate and/or check the | |
| // FV-header or other metric for goodness of binary. | |
| // | |
| return EFI_SUCCESS; | |
| } |