| #!/usr/bin/env python3 |
| ## SPDX-License-Identifier: GPL-2.0-only |
| # |
| # EFI variable store utilities. |
| # |
| # (c) 2020 Paulo Alcantara <palcantara@suse.de> |
| # |
| |
| import os |
| import struct |
| import uuid |
| import time |
| import zlib |
| import argparse |
| from OpenSSL import crypto |
| |
| # U-Boot variable store format (version 1) |
| UBOOT_EFI_VAR_FILE_MAGIC = 0x0161566966456255 |
| |
| # UEFI variable attributes |
| EFI_VARIABLE_NON_VOLATILE = 0x1 |
| EFI_VARIABLE_BOOTSERVICE_ACCESS = 0x2 |
| EFI_VARIABLE_RUNTIME_ACCESS = 0x4 |
| EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS = 0x10 |
| EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS = 0x20 |
| EFI_VARIABLE_READ_ONLY = 1 << 31 |
| NV_BS = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS |
| NV_BS_RT = NV_BS | EFI_VARIABLE_RUNTIME_ACCESS |
| NV_BS_RT_AT = NV_BS_RT | EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS |
| DEFAULT_VAR_ATTRS = NV_BS_RT |
| |
| # vendor GUIDs |
| EFI_GLOBAL_VARIABLE_GUID = '8be4df61-93ca-11d2-aa0d-00e098032b8c' |
| EFI_IMAGE_SECURITY_DATABASE_GUID = 'd719b2cb-3d3a-4596-a3bc-dad00e67656f' |
| EFI_CERT_TYPE_PKCS7_GUID = '4aafd29d-68df-49ee-8aa9-347d375665a7' |
| WIN_CERT_TYPE_EFI_GUID = 0x0ef1 |
| WIN_CERT_REVISION = 0x0200 |
| |
| var_attrs = { |
| 'NV': EFI_VARIABLE_NON_VOLATILE, |
| 'BS': EFI_VARIABLE_BOOTSERVICE_ACCESS, |
| 'RT': EFI_VARIABLE_RUNTIME_ACCESS, |
| 'AT': EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS, |
| 'RO': EFI_VARIABLE_READ_ONLY, |
| 'AW': EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS, |
| } |
| |
| var_guids = { |
| 'EFI_GLOBAL_VARIABLE_GUID': EFI_GLOBAL_VARIABLE_GUID, |
| 'EFI_IMAGE_SECURITY_DATABASE_GUID': EFI_IMAGE_SECURITY_DATABASE_GUID, |
| } |
| |
| class EfiStruct: |
| # struct efi_var_file |
| var_file_fmt = '<QQLL' |
| var_file_size = struct.calcsize(var_file_fmt) |
| # struct efi_var_entry |
| var_entry_fmt = '<LLQ16s' |
| var_entry_size = struct.calcsize(var_entry_fmt) |
| # struct efi_time |
| var_time_fmt = '<H6BLh2B' |
| var_time_size = struct.calcsize(var_time_fmt) |
| # WIN_CERTIFICATE |
| var_win_cert_fmt = '<L2H' |
| var_win_cert_size = struct.calcsize(var_win_cert_fmt) |
| # WIN_CERTIFICATE_UEFI_GUID |
| var_win_cert_uefi_guid_fmt = var_win_cert_fmt+'16s' |
| var_win_cert_uefi_guid_size = struct.calcsize(var_win_cert_uefi_guid_fmt) |
| |
| class EfiVariable: |
| def __init__(self, size, attrs, time, guid, name, data): |
| self.size = size |
| self.attrs = attrs |
| self.time = time |
| self.guid = guid |
| self.name = name |
| self.data = data |
| |
| def calc_crc32(buf): |
| return zlib.crc32(buf) & 0xffffffff |
| |
| class EfiVariableStore: |
| def __init__(self, infile): |
| self.infile = infile |
| self.efi = EfiStruct() |
| if os.path.exists(self.infile) and os.stat(self.infile).st_size > self.efi.var_file_size: |
| with open(self.infile, 'rb') as f: |
| buf = f.read() |
| self._check_header(buf) |
| self.ents = buf[self.efi.var_file_size:] |
| else: |
| self.ents = bytearray() |
| |
| def _check_header(self, buf): |
| hdr = struct.unpack_from(self.efi.var_file_fmt, buf, 0) |
| magic, crc32 = hdr[1], hdr[3] |
| |
| if magic != UBOOT_EFI_VAR_FILE_MAGIC: |
| print("err: invalid magic number: %s"%hex(magic)) |
| exit(1) |
| if crc32 != calc_crc32(buf[self.efi.var_file_size:]): |
| print("err: invalid crc32: %s"%hex(crc32)) |
| exit(1) |
| |
| def _get_var_name(self, buf): |
| name = '' |
| for i in range(0, len(buf) - 1, 2): |
| if not buf[i] and not buf[i+1]: |
| break |
| name += chr(buf[i]) |
| return ''.join([chr(x) for x in name.encode('utf_16_le') if x]), i + 2 |
| |
| def _next_var(self, offs=0): |
| size, attrs, time, guid = struct.unpack_from(self.efi.var_entry_fmt, self.ents, offs) |
| data_fmt = str(size)+"s" |
| offs += self.efi.var_entry_size |
| name, namelen = self._get_var_name(self.ents[offs:]) |
| offs += namelen |
| data = struct.unpack_from(data_fmt, self.ents, offs)[0] |
| # offset to next 8-byte aligned variable entry |
| offs = (offs + len(data) + 7) & ~7 |
| return EfiVariable(size, attrs, time, uuid.UUID(bytes_le=guid), name, data), offs |
| |
| def __iter__(self): |
| self.offs = 0 |
| return self |
| |
| def __next__(self): |
| if self.offs < len(self.ents): |
| var, noffs = self._next_var(self.offs) |
| self.offs = noffs |
| return var |
| else: |
| raise StopIteration |
| |
| def __len__(self): |
| return len(self.ents) |
| |
| def _set_var(self, guid, name_data, size, attrs, tsec): |
| ent = struct.pack(self.efi.var_entry_fmt, |
| size, |
| attrs, |
| tsec, |
| uuid.UUID(guid).bytes_le) |
| ent += name_data |
| self.ents += ent |
| |
| def del_var(self, guid, name, attrs): |
| offs = 0 |
| while offs < len(self.ents): |
| var, loffs = self._next_var(offs) |
| if var.name == name and str(var.guid) == guid: |
| if var.attrs != attrs: |
| print("err: attributes don't match") |
| exit(1) |
| self.ents = self.ents[:offs] + self.ents[loffs:] |
| return |
| offs = loffs |
| print("err: variable not found") |
| exit(1) |
| |
| def set_var(self, guid, name, data, size, attrs): |
| offs = 0 |
| while offs < len(self.ents): |
| var, loffs = self._next_var(offs) |
| if var.name == name and str(var.guid) == guid: |
| if var.attrs != attrs: |
| print("err: attributes don't match") |
| exit(1) |
| # make room for updating var |
| self.ents = self.ents[:offs] + self.ents[loffs:] |
| break |
| offs = loffs |
| |
| tsec = int(time.time()) if attrs & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS else 0 |
| nd = name.encode('utf_16_le') + b"\x00\x00" + data |
| # U-Boot variable format requires the name + data blob to be 8-byte aligned |
| pad = ((len(nd) + 7) & ~7) - len(nd) |
| nd += bytes([0] * pad) |
| |
| return self._set_var(guid, nd, size, attrs, tsec) |
| |
| def save(self): |
| hdr = struct.pack(self.efi.var_file_fmt, |
| 0, |
| UBOOT_EFI_VAR_FILE_MAGIC, |
| len(self.ents) + self.efi.var_file_size, |
| calc_crc32(self.ents)) |
| |
| with open(self.infile, 'wb') as f: |
| f.write(hdr) |
| f.write(self.ents) |
| |
| def parse_attrs(attrs): |
| v = DEFAULT_VAR_ATTRS |
| if attrs: |
| v = 0 |
| for i in attrs.split(','): |
| v |= var_attrs[i.upper()] |
| return v |
| |
| def parse_data(val, vtype): |
| if not val or not vtype: |
| return None, 0 |
| fmt = { 'u8': '<B', 'u16': '<H', 'u32': '<L', 'u64': '<Q' } |
| if vtype.lower() == 'file': |
| with open(val, 'rb') as f: |
| data = f.read() |
| return data, len(data) |
| if vtype.lower() == 'str': |
| data = val.encode('utf-8') |
| return data, len(data) |
| if vtype.lower() == 'nil': |
| return None, 0 |
| i = fmt[vtype.lower()] |
| return struct.pack(i, int(val)), struct.calcsize(i) |
| |
| def parse_args(args): |
| name = args.name |
| attrs = parse_attrs(args.attrs) |
| guid = args.guid if args.guid else EFI_GLOBAL_VARIABLE_GUID |
| |
| if name.lower() == 'db' or name.lower() == 'dbx': |
| name = name.lower() |
| guid = EFI_IMAGE_SECURITY_DATABASE_GUID |
| attrs = NV_BS_RT_AT |
| elif name.lower() == 'pk' or name.lower() == 'kek': |
| name = name.upper() |
| guid = EFI_GLOBAL_VARIABLE_GUID |
| attrs = NV_BS_RT_AT |
| |
| data, size = parse_data(args.data, args.type) |
| return guid, name, attrs, data, size |
| |
| def cmd_set(args): |
| env = EfiVariableStore(args.infile) |
| guid, name, attrs, data, size = parse_args(args) |
| env.set_var(guid=guid, name=name, data=data, size=size, attrs=attrs) |
| env.save() |
| |
| def print_var(var): |
| print(var.name+':') |
| print(" "+str(var.guid)+' '+''.join([x for x in var_guids if str(var.guid) == var_guids[x]])) |
| print(" "+'|'.join([x for x in var_attrs if var.attrs & var_attrs[x]])+", DataSize = %s"%hex(var.size)) |
| hexdump(var.data) |
| |
| def cmd_print(args): |
| env = EfiVariableStore(args.infile) |
| if not args.name and not args.guid and not len(env): |
| return |
| |
| found = False |
| for var in env: |
| if not args.name: |
| if args.guid and args.guid != str(var.guid): |
| continue |
| print_var(var) |
| found = True |
| else: |
| if args.name != var.name or (args.guid and args.guid != str(var.guid)): |
| continue |
| print_var(var) |
| found = True |
| |
| if not found: |
| print("err: variable not found") |
| exit(1) |
| |
| def cmd_del(args): |
| env = EfiVariableStore(args.infile) |
| attrs = parse_attrs(args.attrs) |
| guid = args.guid if args.guid else EFI_GLOBAL_VARIABLE_GUID |
| env.del_var(guid, args.name, attrs) |
| env.save() |
| |
| def pkcs7_sign(cert, key, buf): |
| with open(cert, 'r') as f: |
| crt = crypto.load_certificate(crypto.FILETYPE_PEM, f.read()) |
| with open(key, 'r') as f: |
| pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, f.read()) |
| |
| PKCS7_BINARY = 0x80 |
| PKCS7_DETACHED = 0x40 |
| PKCS7_NOATTR = 0x100 |
| |
| bio_in = crypto._new_mem_buf(buf) |
| p7 = crypto._lib.PKCS7_sign(crt._x509, pkey._pkey, crypto._ffi.NULL, bio_in, |
| PKCS7_BINARY|PKCS7_DETACHED|PKCS7_NOATTR) |
| bio_out = crypto._new_mem_buf() |
| crypto._lib.i2d_PKCS7_bio(bio_out, p7) |
| return crypto._bio_to_string(bio_out) |
| |
| # UEFI 2.8 Errata B "8.2.2 Using the EFI_VARIABLE_AUTHENTICATION_2 descriptor" |
| def cmd_sign(args): |
| guid, name, attrs, data, _ = parse_args(args) |
| attrs |= EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS |
| efi = EfiStruct() |
| |
| tm = time.localtime() |
| etime = struct.pack(efi.var_time_fmt, |
| tm.tm_year, tm.tm_mon, tm.tm_mday, |
| tm.tm_hour, tm.tm_min, tm.tm_sec, |
| 0, 0, 0, 0, 0) |
| |
| buf = name.encode('utf_16_le') + uuid.UUID(guid).bytes_le + attrs.to_bytes(4, byteorder='little') + etime |
| if data: |
| buf += data |
| sig = pkcs7_sign(args.cert, args.key, buf) |
| |
| desc = struct.pack(efi.var_win_cert_uefi_guid_fmt, |
| efi.var_win_cert_uefi_guid_size + len(sig), |
| WIN_CERT_REVISION, |
| WIN_CERT_TYPE_EFI_GUID, |
| uuid.UUID(EFI_CERT_TYPE_PKCS7_GUID).bytes_le) |
| |
| with open(args.outfile, 'wb') as f: |
| if data: |
| f.write(etime + desc + sig + data) |
| else: |
| f.write(etime + desc + sig) |
| |
| def main(): |
| ap = argparse.ArgumentParser(description='EFI variable store utilities') |
| subp = ap.add_subparsers(help="sub-command help") |
| |
| printp = subp.add_parser('print', help='get/list EFI variables') |
| printp.add_argument('--infile', '-i', required=True, help='file to save the EFI variables') |
| printp.add_argument('--name', '-n', help='variable name') |
| printp.add_argument('--guid', '-g', help='vendor GUID') |
| printp.set_defaults(func=cmd_print) |
| |
| setp = subp.add_parser('set', help='set EFI variable') |
| setp.add_argument('--infile', '-i', required=True, help='file to save the EFI variables') |
| setp.add_argument('--name', '-n', required=True, help='variable name') |
| setp.add_argument('--attrs', '-a', help='variable attributes (values: nv,bs,rt,at,ro,aw)') |
| setp.add_argument('--guid', '-g', help="vendor GUID (default: %s)"%EFI_GLOBAL_VARIABLE_GUID) |
| setp.add_argument('--type', '-t', help='variable type (values: file|u8|u16|u32|u64|str)') |
| setp.add_argument('--data', '-d', help='data or filename') |
| setp.set_defaults(func=cmd_set) |
| |
| delp = subp.add_parser('del', help='delete EFI variable') |
| delp.add_argument('--infile', '-i', required=True, help='file to save the EFI variables') |
| delp.add_argument('--name', '-n', required=True, help='variable name') |
| delp.add_argument('--attrs', '-a', help='variable attributes (values: nv,bs,rt,at,ro,aw)') |
| delp.add_argument('--guid', '-g', help="vendor GUID (default: %s)"%EFI_GLOBAL_VARIABLE_GUID) |
| delp.set_defaults(func=cmd_del) |
| |
| signp = subp.add_parser('sign', help='sign time-based EFI payload') |
| signp.add_argument('--cert', '-c', required=True, help='x509 certificate filename in PEM format') |
| signp.add_argument('--key', '-k', required=True, help='signing certificate filename in PEM format') |
| signp.add_argument('--name', '-n', required=True, help='variable name') |
| signp.add_argument('--attrs', '-a', help='variable attributes (values: nv,bs,rt,at,ro,aw)') |
| signp.add_argument('--guid', '-g', help="vendor GUID (default: %s)"%EFI_GLOBAL_VARIABLE_GUID) |
| signp.add_argument('--type', '-t', required=True, help='variable type (values: file|u8|u16|u32|u64|str|nil)') |
| signp.add_argument('--data', '-d', help='data or filename') |
| signp.add_argument('--outfile', '-o', required=True, help='output filename of signed EFI payload') |
| signp.set_defaults(func=cmd_sign) |
| |
| args = ap.parse_args() |
| if hasattr(args, "func"): |
| args.func(args) |
| else: |
| ap.print_help() |
| |
| def group(a, *ns): |
| for n in ns: |
| a = [a[i:i+n] for i in range(0, len(a), n)] |
| return a |
| |
| def join(a, *cs): |
| return [cs[0].join(join(t, *cs[1:])) for t in a] if cs else a |
| |
| def hexdump(data): |
| toHex = lambda c: '{:02X}'.format(c) |
| toChr = lambda c: chr(c) if 32 <= c < 127 else '.' |
| make = lambda f, *cs: join(group(list(map(f, data)), 8, 2), *cs) |
| hs = make(toHex, ' ', ' ') |
| cs = make(toChr, ' ', '') |
| for i, (h, c) in enumerate(zip(hs, cs)): |
| print (' {:010X}: {:48} {:16}'.format(i * 16, h, c)) |
| |
| if __name__ == '__main__': |
| main() |