mirror of
https://xff.cz/git/u-boot/
synced 2025-09-01 16:52:14 +02:00
efi_loader: add sha384/512 on certificate revocation
Currently we don't support sha384/512 for the X.509 certificate in dbx. Moreover if we come across such a hash we skip the check and approve the image, although the image might needs to be rejected. Rework the code a bit and fix it by adding an array of structs with the supported GUIDs, len and literal used in the U-Boot crypto APIs instead of hardcoding the GUID types. It's worth noting here that efi_hash_regions() can now be reused from efi_signature_lookup_digest() and add sha348/512 support there as well Signed-off-by: Ilias Apalodimas <ilias.apalodimas@linaro.org>
This commit is contained in:
committed by
Heinrich Schuchardt
parent
3ae6cf5400
commit
b436cc6a57
@@ -300,6 +300,8 @@ extern const efi_guid_t efi_guid_image_security_database;
|
||||
extern const efi_guid_t efi_guid_sha256;
|
||||
extern const efi_guid_t efi_guid_cert_x509;
|
||||
extern const efi_guid_t efi_guid_cert_x509_sha256;
|
||||
extern const efi_guid_t efi_guid_cert_x509_sha384;
|
||||
extern const efi_guid_t efi_guid_cert_x509_sha512;
|
||||
extern const efi_guid_t efi_guid_cert_type_pkcs7;
|
||||
|
||||
/* GUID of RNG protocol */
|
||||
@@ -677,6 +679,10 @@ efi_status_t efi_file_size(struct efi_file_handle *fh, efi_uintn_t *size);
|
||||
/* get a device path from a Boot#### option */
|
||||
struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid);
|
||||
|
||||
/* get len, string (used in u-boot crypto from a guid */
|
||||
const char *guid_to_sha_str(const efi_guid_t *guid);
|
||||
int algo_to_len(const char *algo);
|
||||
|
||||
/**
|
||||
* efi_size_in_pages() - convert size in bytes to size in pages
|
||||
*
|
||||
|
Reference in New Issue
Block a user