public inbox for u-boot@lists.denx.de
 help / color / mirror / Atom feed
From: AKASHI Takahiro <takahiro.akashi@linaro.org>
To: u-boot@lists.denx.de
Subject: [PATCH v5 01/16] efi_loader: add CONFIG_EFI_SECURE_BOOT config option
Date: Tue, 25 Feb 2020 14:02:21 +0900	[thread overview]
Message-ID: <20200225050220.GB9257@linaro.org> (raw)
In-Reply-To: <20e90a0f-40e1-04cb-451a-64e621fe3c67@gmx.de>

On Sun, Feb 23, 2020 at 11:56:09AM +0100, Heinrich Schuchardt wrote:
> On 1/28/20 9:25 AM, AKASHI Takahiro wrote:
> > Under this configuration, UEFI secure boot support will be added
> > in later patches.
> > 
> > Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
> 
> This patch should be after all the patches that are necessary for secure
> boot, i.e. after patch 09/16. I can take care of that.

I disagree.
Doing so will constrain bisect ability to some extent because
any code under EFI_SECURE_BOOT will never have a chance to be
compiled until this patch is applied.
Then bisect result could be inaccurate.

Thanks,
-Takahiro Akashi


> Best regards
> 
> Heinrich
> 
> > ---
> >   lib/efi_loader/Kconfig | 18 ++++++++++++++++++
> >   1 file changed, 18 insertions(+)
> > 
> > diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig
> > index a7afa3f29e88..4b09a07f1b0a 100644
> > --- a/lib/efi_loader/Kconfig
> > +++ b/lib/efi_loader/Kconfig
> > @@ -130,4 +130,22 @@ config EFI_RNG_PROTOCOL
> >   	  "Support for EFI_RNG_PROTOCOL implementation. Uses the rng
> >   	   device on the platform"
> > 
> > +config EFI_SECURE_BOOT
> > +	bool "Enable EFI secure boot support"
> > +	depends on EFI_LOADER
> > +	select SHA256
> > +	select RSA
> > +	select RSA_VERIFY_WITH_PKEY
> > +	select IMAGE_SIGN_INFO
> > +	select ASYMMETRIC_KEY_TYPE
> > +	select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
> > +	select X509_CERTIFICATE_PARSER
> > +	select PKCS7_MESSAGE_PARSER
> > +	default n
> > +	help
> > +	  Select this option to enable EFI secure boot support.
> > +	  Once SecureBoot mode is enforced, any EFI binary can run only if
> > +	  it is signed with a trusted key. To do that, you need to install,
> > +	  at least, PK, KEK and db.
> > +
> >   endif
> > 
> 

  reply	other threads:[~2020-02-25  5:02 UTC|newest]

Thread overview: 34+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-01-28  8:25 [PATCH v5 00/16] efi_loader: add secure boot support AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 01/16] efi_loader: add CONFIG_EFI_SECURE_BOOT config option AKASHI Takahiro
2020-02-23 10:56   ` Heinrich Schuchardt
2020-02-25  5:02     ` AKASHI Takahiro [this message]
2020-01-28  8:25 ` [PATCH v5 02/16] efi_loader: add signature verification functions AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 03/16] efi_loader: add signature database parser AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 04/16] efi_loader: variable: support variable authentication AKASHI Takahiro
2020-02-23 11:20   ` Heinrich Schuchardt
2020-02-25  5:10     ` AKASHI Takahiro
2020-02-25  6:46   ` Heinrich Schuchardt
2020-02-26  0:51     ` AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 05/16] efi_loader: variable: add secure boot state transition AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 06/16] efi_loader: variable: add VendorKeys variable AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 07/16] efi_loader: image_loader: support image authentication AKASHI Takahiro
2020-02-24 18:29   ` Heinrich Schuchardt
2020-02-25  5:25     ` AKASHI Takahiro
2020-02-25  6:40       ` Heinrich Schuchardt
2020-02-25  6:57         ` AKASHI Takahiro
2020-02-25  6:44   ` Heinrich Schuchardt
2020-02-26  0:50     ` AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 08/16] efi_loader: set up secure boot AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 09/16] cmd: env: use appropriate guid for authenticated UEFI variable AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 10/16] cmd: env: add "-at" option to "env set -e" command AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 11/16] cmd: efidebug: add "test bootmgr" sub-command AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 12/16] efi_loader, pytest: set up secure boot environment AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 13/16] efi_loader, pytest: add UEFI secure boot tests (authenticated variables) AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 14/16] efi_loader, pytest: add UEFI secure boot tests (image) AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 15/16] sandbox: add extra configurations for UEFI and related tests AKASHI Takahiro
2020-01-28  8:25 ` [PATCH v5 16/16] travis: add packages for UEFI secure boot test AKASHI Takahiro
2020-02-23 11:46   ` Heinrich Schuchardt
2020-02-25  5:16     ` AKASHI Takahiro
2020-02-23 11:53 ` [PATCH v5 00/16] efi_loader: add secure boot support Heinrich Schuchardt
2020-02-25  5:19   ` AKASHI Takahiro
2020-02-23 21:48 ` Heinrich Schuchardt

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200225050220.GB9257@linaro.org \
    --to=takahiro.akashi@linaro.org \
    --cc=u-boot@lists.denx.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox