]> git.proxmox.com Git - mirror_edk2.git/commitdiff
Security: Add HashLibTdx
authorMin Xu <min.m.xu@intel.com>
Mon, 16 May 2022 07:42:15 +0000 (15:42 +0800)
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
Fri, 3 Jun 2022 11:41:36 +0000 (11:41 +0000)
RFC: https://bugzilla.tianocore.org/show_bug.cgi?id=3853

This library provides hash service by registered hash handler in Td
guest. Currently only SHA384 is supported. After that the hash value is
extended to Td RTMR registers which is similar to TPM PCRs.

Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
Signed-off-by: Min Xu <min.m.xu@intel.com>
SecurityPkg/Library/HashLibTdx/HashLibTdx.c [new file with mode: 0644]
SecurityPkg/Library/HashLibTdx/HashLibTdx.inf [new file with mode: 0644]
SecurityPkg/SecurityPkg.dsc

diff --git a/SecurityPkg/Library/HashLibTdx/HashLibTdx.c b/SecurityPkg/Library/HashLibTdx/HashLibTdx.c
new file mode 100644 (file)
index 0000000..75d96ee
--- /dev/null
@@ -0,0 +1,207 @@
+/** @file\r
+  This library is HashLib for Tdx.\r
+\r
+Copyright (c) 2021 - 2022, Intel Corporation. All rights reserved. <BR>\r
+SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+\r
+#include <PiPei.h>\r
+#include <Library/BaseLib.h>\r
+#include <Library/BaseMemoryLib.h>\r
+#include <Library/DebugLib.h>\r
+#include <Library/PcdLib.h>\r
+#include <Library/HashLib.h>\r
+#include <Library/TdxLib.h>\r
+#include <Protocol/CcMeasurement.h>\r
+\r
+EFI_GUID  mSha384Guid = HASH_ALGORITHM_SHA384_GUID;\r
+\r
+//\r
+// Currently TDX supports SHA384.\r
+//\r
+HASH_INTERFACE  mHashInterface =  {\r
+  { 0 }, NULL, NULL, NULL\r
+};\r
+\r
+UINTN  mHashInterfaceCount = 0;\r
+\r
+/**\r
+  Start hash sequence.\r
+\r
+  @param HashHandle Hash handle.\r
+\r
+  @retval EFI_SUCCESS          Hash sequence start and HandleHandle returned.\r
+  @retval EFI_OUT_OF_RESOURCES No enough resource to start hash.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+HashStart (\r
+  OUT HASH_HANDLE  *HashHandle\r
+  )\r
+{\r
+  HASH_HANDLE  HashCtx;\r
+\r
+  if (mHashInterfaceCount == 0) {\r
+    ASSERT (FALSE);\r
+    return EFI_UNSUPPORTED;\r
+  }\r
+\r
+  HashCtx = 0;\r
+  mHashInterface.HashInit (&HashCtx);\r
+\r
+  *HashHandle = HashCtx;\r
+\r
+  return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+  Update hash sequence data.\r
+\r
+  @param HashHandle    Hash handle.\r
+  @param DataToHash    Data to be hashed.\r
+  @param DataToHashLen Data size.\r
+\r
+  @retval EFI_SUCCESS     Hash sequence updated.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+HashUpdate (\r
+  IN HASH_HANDLE  HashHandle,\r
+  IN VOID         *DataToHash,\r
+  IN UINTN        DataToHashLen\r
+  )\r
+{\r
+  if (mHashInterfaceCount == 0) {\r
+    ASSERT (FALSE);\r
+    return EFI_UNSUPPORTED;\r
+  }\r
+\r
+  mHashInterface.HashUpdate (HashHandle, DataToHash, DataToHashLen);\r
+\r
+  return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+  Hash sequence complete and extend to PCR.\r
+\r
+  @param HashHandle    Hash handle.\r
+  @param PcrIndex      PCR to be extended.\r
+  @param DataToHash    Data to be hashed.\r
+  @param DataToHashLen Data size.\r
+  @param DigestList    Digest list.\r
+\r
+  @retval EFI_SUCCESS     Hash sequence complete and DigestList is returned.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+HashCompleteAndExtend (\r
+  IN HASH_HANDLE          HashHandle,\r
+  IN TPMI_DH_PCR          PcrIndex,\r
+  IN VOID                 *DataToHash,\r
+  IN UINTN                DataToHashLen,\r
+  OUT TPML_DIGEST_VALUES  *DigestList\r
+  )\r
+{\r
+  TPML_DIGEST_VALUES  Digest;\r
+  EFI_STATUS          Status;\r
+\r
+  if (mHashInterfaceCount == 0) {\r
+    ASSERT (FALSE);\r
+    return EFI_UNSUPPORTED;\r
+  }\r
+\r
+  ZeroMem (DigestList, sizeof (*DigestList));\r
+\r
+  mHashInterface.HashUpdate (HashHandle, DataToHash, DataToHashLen);\r
+  mHashInterface.HashFinal (HashHandle, &Digest);\r
+\r
+  CopyMem (\r
+    &DigestList->digests[0],\r
+    &Digest.digests[0],\r
+    sizeof (Digest.digests[0])\r
+    );\r
+  DigestList->count++;\r
+\r
+  ASSERT (DigestList->count == 1 && DigestList->digests[0].hashAlg == TPM_ALG_SHA384);\r
+\r
+  Status = TdExtendRtmr (\r
+             (UINT32 *)DigestList->digests[0].digest.sha384,\r
+             SHA384_DIGEST_SIZE,\r
+             (UINT8)PcrIndex\r
+             );\r
+\r
+  ASSERT (!EFI_ERROR (Status));\r
+  return Status;\r
+}\r
+\r
+/**\r
+  Hash data and extend to RTMR.\r
+\r
+  @param PcrIndex      PCR to be extended.\r
+  @param DataToHash    Data to be hashed.\r
+  @param DataToHashLen Data size.\r
+  @param DigestList    Digest list.\r
+\r
+  @retval EFI_SUCCESS     Hash data and DigestList is returned.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+HashAndExtend (\r
+  IN TPMI_DH_PCR          PcrIndex,\r
+  IN VOID                 *DataToHash,\r
+  IN UINTN                DataToHashLen,\r
+  OUT TPML_DIGEST_VALUES  *DigestList\r
+  )\r
+{\r
+  HASH_HANDLE  HashHandle;\r
+  EFI_STATUS   Status;\r
+\r
+  if (mHashInterfaceCount == 0) {\r
+    ASSERT (FALSE);\r
+    return EFI_UNSUPPORTED;\r
+  }\r
+\r
+  ASSERT (TdIsEnabled ());\r
+\r
+  HashStart (&HashHandle);\r
+  HashUpdate (HashHandle, DataToHash, DataToHashLen);\r
+  Status = HashCompleteAndExtend (HashHandle, PcrIndex, NULL, 0, DigestList);\r
+\r
+  return Status;\r
+}\r
+\r
+/**\r
+  This service register Hash.\r
+\r
+  @param HashInterface  Hash interface\r
+\r
+  @retval EFI_SUCCESS          This hash interface is registered successfully.\r
+  @retval EFI_UNSUPPORTED      System does not support register this interface.\r
+  @retval EFI_ALREADY_STARTED  System already register this interface.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+RegisterHashInterfaceLib (\r
+  IN HASH_INTERFACE  *HashInterface\r
+  )\r
+{\r
+  ASSERT (TdIsEnabled ());\r
+\r
+  //\r
+  // Only SHA384 is allowed.\r
+  //\r
+  if (!CompareGuid (&mSha384Guid, &HashInterface->HashGuid)) {\r
+    return EFI_UNSUPPORTED;\r
+  }\r
+\r
+  if (mHashInterfaceCount != 0) {\r
+    ASSERT (FALSE);\r
+    return EFI_OUT_OF_RESOURCES;\r
+  }\r
+\r
+  CopyMem (&mHashInterface, HashInterface, sizeof (*HashInterface));\r
+  mHashInterfaceCount++;\r
+\r
+  return EFI_SUCCESS;\r
+}\r
diff --git a/SecurityPkg/Library/HashLibTdx/HashLibTdx.inf b/SecurityPkg/Library/HashLibTdx/HashLibTdx.inf
new file mode 100644 (file)
index 0000000..9461321
--- /dev/null
@@ -0,0 +1,37 @@
+## @file\r
+#  Provides hash service by registered hash handler in Tdx.\r
+#\r
+#  This library is HashLib for Tdx. Currently only SHA384 is supported.\r
+#\r
+# Copyright (c) 2020 - 2021, Intel Corporation. All rights reserved.<BR>\r
+# SPDX-License-Identifier: BSD-2-Clause-Patent\r
+#\r
+##\r
+\r
+[Defines]\r
+  INF_VERSION                    = 0x00010005\r
+  BASE_NAME                      = HashLibTdx\r
+  FILE_GUID                      = 77F6EA3E-1ABA-4467-A447-926E8CEB2D13\r
+  MODULE_TYPE                    = BASE\r
+  VERSION_STRING                 = 1.0\r
+  LIBRARY_CLASS                  = HashLib|SEC DXE_DRIVER\r
+\r
+#\r
+# The following information is for reference only and not required by the build tools.\r
+#\r
+#  VALID_ARCHITECTURES           = X64\r
+#\r
+\r
+[Sources]\r
+  HashLibTdx.c\r
+\r
+[Packages]\r
+  MdePkg/MdePkg.dec\r
+  SecurityPkg/SecurityPkg.dec\r
+\r
+[LibraryClasses]\r
+  BaseLib\r
+  BaseMemoryLib\r
+  DebugLib\r
+  PcdLib\r
+  TdxLib\r
index 73a93c2285b13a2e0ce45b08a1230a766e0d759a..0d8c997b2f40b6b4cc35adab5bc4dbe56aeed16e 100644 (file)
@@ -72,6 +72,7 @@
   MmUnblockMemoryLib|MdePkg/Library/MmUnblockMemoryLib/MmUnblockMemoryLibNull.inf\r
   SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBootVariableLib.inf\r
   SecureBootVariableProvisionLib|SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariableProvisionLib.inf\r
+  TdxLib|MdePkg/Library/TdxLib/TdxLib.inf\r
 \r
 [LibraryClasses.ARM, LibraryClasses.AARCH64]\r
   #\r
 [LibraryClasses.RISCV64]\r
   RngLib|MdePkg/Library/BaseRngLibTimerLib/BaseRngLibTimerLib.inf\r
 \r
+[LibraryClasses.X64.SEC]\r
+  HashLib|SecurityPkg/Library/HashLibTdx/HashLibTdx.inf\r
+\r
+[LibraryClasses.X64.DXE_DRIVER]\r
+  HashLib|SecurityPkg/Library/HashLibTdx/HashLibTdx.inf\r
+\r
 [LibraryClasses.common.PEIM]\r
   PeimEntryPoint|MdePkg/Library/PeimEntryPoint/PeimEntryPoint.inf\r
   PeiServicesLib|MdePkg/Library/PeiServicesLib/PeiServicesLib.inf\r
   #\r
   SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf\r
 \r
+[Components.X64]\r
+  SecurityPkg/Library/HashLibTdx/HashLibTdx.inf\r
+\r
 [Components.IA32, Components.X64]\r
   SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
 \r