1 /*-
2 * Copyright (c) 2019 Stormshield.
3 * Copyright (c) 2019 Semihalf.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
16 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
18 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
19 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
22 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
23 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
24 * POSSIBILITY OF SUCH DAMAGE.
25 *
26 */
27
28 #include <sys/cdefs.h>
29 #define NEED_BRSSL_H
30 #include "../libsecureboot-priv.h"
31 #include <brssl.h>
32
33 void
ve_efi_init(void)34 ve_efi_init(void)
35 {
36 br_x509_certificate *xcs;
37 hash_data *digests;
38 size_t num;
39 int result;
40 static int once = 0;
41
42 if (once > 0)
43 return;
44
45 once = 1;
46
47 result = efi_secure_boot_enabled();
48 if (result <= 0)
49 return;
50
51 xcs = efi_get_trusted_certs(&num);
52 if (num > 0 && xcs != NULL) {
53 num = ve_trust_anchors_add(xcs, num);
54 free_certificates(xcs, num);
55 }
56 xcs = efi_get_forbidden_certs(&num);
57 if (num > 0 && xcs != NULL) {
58 num = ve_forbidden_anchors_add(xcs, num);
59 free_certificates(xcs, num);
60 }
61 digests = efi_get_forbidden_digests(&num);
62 if (num > 0 && digests != NULL) {
63 ve_forbidden_digest_add(digests, num);
64 /*
65 * Don't free the buffors for digests,
66 * since they are shallow copied.
67 */
68 xfree(digests);
69 }
70
71 return;
72 }
73