From patchwork Thu Jul 18 20:35:21 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Javier Tia X-Patchwork-Id: 46635 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96B86C52CD8 for ; Thu, 18 Jul 2024 20:35:59 +0000 (UTC) Received: from mail-yw1-f171.google.com (mail-yw1-f171.google.com [209.85.128.171]) by mx.groups.io with SMTP id smtpd.web11.4151.1721334953266332467 for ; Thu, 18 Jul 2024 13:35:53 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@linaro.org header.s=google header.b=qUfYVXDm; spf=pass (domain: linaro.org, ip: 209.85.128.171, mailfrom: javier.tia@linaro.org) Received: by mail-yw1-f171.google.com with SMTP id 00721157ae682-66108213e88so12086477b3.1 for ; Thu, 18 Jul 2024 13:35:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1721334952; x=1721939752; darn=lists.yoctoproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=fsqt7llxekc2W5nszGnzv5KjpZccTr4WLkYLzg1W4TQ=; b=qUfYVXDmS7qfUO41gIrP5JBIv+qafDpelCmLlahZpzTTcaOjHsLHGL1pyeVry4I6PK 4wUCXEC2VTOAsGNhXDsHKm4STTw3z9m1l1aWg87F632YBb+7ZcHGHlaB4ZZCtadFCTu8 aSwG7gZK94iYeXAACEvWM0JCrwefIEt/s9UnHw3/BIQQB6TQF6kqmixskFZvl4pu4PyS 6zE3qZaioKJ6/EFiTi0NNjNhd+ur1xEaYsiB1DJagNkKNlL4y7VIeinJA8463leLTb7C GsA7w/Jd7pstCSqlBrtoIApsiB9A8qbpD7qmVoGMgFIxHVkZ7JJLWIw0N41kqrS0Wy1W MM5A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1721334952; x=1721939752; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=fsqt7llxekc2W5nszGnzv5KjpZccTr4WLkYLzg1W4TQ=; b=Jk5fB9uVE5LpMypCvdyb66p++HsLQWu4A5X2nKkPn4JSRftTfu7cA/kabiPR2FbJTz 3AC0SQNjiEU/G9ZQF9VdnOHJuTAc3J6kJamtnHdJTj1diE+LyKvZURrI7APOZeaMP9Jy /wKfuM7Lnw60nWKlgfDh4OTVDqCTCMuGjNIWK8H7P+xMLbUtstX9WZOqfETF9gJ8U9Wg sSx2e2ptFocBU8fI1PP6mtaEV/KuVFuG4TlmbgvpXJLH3m2PuUNIwrHQYZXCKXh4U8JO sEsyWZs6ToLYco5AQogqsXjXrZrDQjlTbvFdfSKOxVskl7Ljvf+3Y+B7CxgQpVqo5CPN poAA== X-Gm-Message-State: AOJu0YxI2o0xf2UxWKnYoIj+6sfunk6/WwLmEwC5eSGXF6MFXsyqM4IK //Mwvz4wfyvWUW7XvYkIcZpCrGreXAcs8/Dul9JpOOg/liu/nTIlBSCC1Brs7tZ2p0qKBs7JPFa JYSQ= X-Google-Smtp-Source: AGHT+IECoviJcCG9GdwM0O3xxP9978JXpGeVTjXc5XgdhWQUy/aqENSBFOlWFkxGNk6DGngD8JUsxw== X-Received: by 2002:a05:690c:6512:b0:615:2a14:4ea6 with SMTP id 00721157ae682-664fd98a8c2mr81572987b3.8.1721334952355; Thu, 18 Jul 2024 13:35:52 -0700 (PDT) Received: from localhost.localdomain ([190.171.102.111]) by smtp.gmail.com with ESMTPSA id 00721157ae682-6695245a1dasm171657b3.53.2024.07.18.13.35.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 18 Jul 2024 13:35:51 -0700 (PDT) From: Javier Tia To: meta-arm@lists.yoctoproject.org Cc: Mikko Rapeli , Ross Burton , Javier Tia Subject: [PATCH v1 2/7] qemuarm64-secureboot: Introduce UEFI_SB_KEYS_DIR Date: Thu, 18 Jul 2024 14:35:21 -0600 Message-ID: <20240718203526.52214-3-javier.tia@linaro.org> X-Mailer: git-send-email 2.45.2 In-Reply-To: <20240718203526.52214-1-javier.tia@linaro.org> References: <20240718203526.52214-1-javier.tia@linaro.org> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 18 Jul 2024 20:35:59 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5901 UEFI_SB_KEYS_DIR saves UEFI keys path. To avoid security issues, UEFI keys are not provided and they can be generated by gen_uefi_keys.sh script. Signed-off-by: Javier Tia --- meta-arm/conf/layer.conf | 2 ++ meta-arm/uefi-sb-keys/gen_uefi_keys.sh | 35 ++++++++++++++++++++++++++ 2 files changed, 37 insertions(+) create mode 100755 meta-arm/uefi-sb-keys/gen_uefi_keys.sh diff --git a/meta-arm/conf/layer.conf b/meta-arm/conf/layer.conf index 9e9c9dbd..2854dd69 100644 --- a/meta-arm/conf/layer.conf +++ b/meta-arm/conf/layer.conf @@ -21,3 +21,5 @@ HOSTTOOLS_NONFATAL += "telnet" addpylib ${LAYERDIR}/lib oeqa WARN_QA:append:layer-meta-arm = " patch-status" + +UEFI_SB_KEYS_DIR ??= "${LAYERDIR}/uefi-sb-keys" \ No newline at end of file diff --git a/meta-arm/uefi-sb-keys/gen_uefi_keys.sh b/meta-arm/uefi-sb-keys/gen_uefi_keys.sh new file mode 100755 index 00000000..fc7f25c9 --- /dev/null +++ b/meta-arm/uefi-sb-keys/gen_uefi_keys.sh @@ -0,0 +1,35 @@ +#/bin/sh + +set -eux + +#Create PK +openssl req -x509 -sha256 -newkey rsa:2048 -subj /CN=Linaro_LEDGE/ -keyout PK.key -out PK.crt -nodes -days 3650 +cert-to-efi-sig-list -g 11111111-2222-3333-4444-123456789abc PK.crt PK.esl +sign-efi-sig-list -c PK.crt -k PK.key PK PK.esl PK.auth + +#Create KEK +openssl req -x509 -sha256 -newkey rsa:2048 -subj /CN=Linaro_LEDGE/ -keyout KEK.key -out KEK.crt -nodes -days 3650 +cert-to-efi-sig-list -g 11111111-2222-3333-4444-123456789abc KEK.crt KEK.esl +sign-efi-sig-list -c PK.crt -k PK.key KEK KEK.esl KEK.auth + +#Create DB +openssl req -x509 -sha256 -newkey rsa:2048 -subj /CN=Linaro_LEDGE/ -keyout db.key -out db.crt -nodes -days 3650 +cert-to-efi-sig-list -g 11111111-2222-3333-4444-123456789abc db.crt db.esl +sign-efi-sig-list -c KEK.crt -k KEK.key db db.esl db.auth + +#Create DBX +openssl req -x509 -sha256 -newkey rsa:2048 -subj /CN=Linaro_LEDGE/ -keyout dbx.key -out dbx.crt -nodes -days 3650 +cert-to-efi-sig-list -g 11111111-2222-3333-4444-123456789abc dbx.crt dbx.esl +sign-efi-sig-list -c KEK.crt -k KEK.key dbx dbx.esl dbx.auth + +#Sign image +#sbsign --key db.key --cert db.crt Image + +#Digest image +#hash-to-efi-sig-list Image db_Image.hash +#sign-efi-sig-list -c KEK.crt -k KEK.key db db_Image.hash db_Image.auth + +#Empty cert for testing +touch noPK.esl +sign-efi-sig-list -c PK.crt -k PK.key PK noPK.esl noPK.auth +