summaryrefslogtreecommitdiff
path: root/Cryptlib/Include/openssl/crypto.h
diff options
context:
space:
mode:
authorPeter Jones <pjones@redhat.com>2013-09-09 12:37:50 -0400
committerPeter Jones <pjones@redhat.com>2013-10-01 14:03:16 -0400
commit39df41ceb5a793f7db9233a2741d30c55b6a8861 (patch)
treed9302ca984993d8f7baf45080c7afbb9ad569c5c /Cryptlib/Include/openssl/crypto.h
parent02388bcd58e73effdc828e8df9bbf5553c594835 (diff)
downloadefi-boot-shim-39df41ceb5a793f7db9233a2741d30c55b6a8861.tar.gz
efi-boot-shim-39df41ceb5a793f7db9233a2741d30c55b6a8861.zip
Harden shim against non-participating bootloaders.
It works like this: during startup of shim, we hook into the system's ExitBootServices() and StartImage(). If the system's StartImage() is called, we automatically unhook, because we're chainloading to something the system can verify. When shim's verify is called, we record what kind of certificate the image was verified against. If the call /succeeds/, we remove our hooks. If ExitBootServices() is called, we check how the bootloader verified whatever it is loading. If it was verified by its hash, we unhook everything and call the system's EBS(). If it was verified by certificate, we check if it has called shim_verify(). If it has, we unhook everything and call the system's EBS() If the bootloader has not verified anything, and is itself verified by a certificate, we display a security violation warning and halt the machine.
Diffstat (limited to 'Cryptlib/Include/openssl/crypto.h')
0 files changed, 0 insertions, 0 deletions