[U-Boot] [PATCH v2 4/4] autoboot.c: Add feature to stop autobooting via SHA256 encrypted password
Simon Glass
sjg at chromium.org
Sun May 10 16:49:08 CEST 2015
Hi Stefan,
On 8 May 2015 at 01:52, Stefan Roese <sr at denx.de> wrote:
> This patch adds the feature to only stop the autobooting, and therefor
> boot into the U-Boot prompt, when the input string / password matches
> a values that is encypted via a SHA256 hash and saved in the environment.
>
> This feature is enabled by defined these config options:
> CONFIG_AUTOBOOT_KEYED
> CONFIG_AUTOBOOT_STOP_STR_SHA256
>
> Signed-off-by: Stefan Roese <sr at denx.de>
> Cc: Simon Glass <sjg at chromium.org>
> Cc: Magnus Lilja <lilja.magnus at gmail.com>
> ---
> v2:
> - AUTOBOOT_STOP_STR_SHA256 is a string and not bool
> - Add input key length check as suggested by Magnus
> - Add "constant-length" time compare function as suggested
> by Magnus
>
> common/Kconfig | 20 +++++++--
> common/autoboot.c | 132 +++++++++++++++++++++++++++++++++++++++++++++---------
> 2 files changed, 128 insertions(+), 24 deletions(-)
Reviewed-by: Simon Glass <sjg at chromium.org>
A few optional ideas below.
>
> diff --git a/common/Kconfig b/common/Kconfig
> index ff150f0..71c5c10 100644
> --- a/common/Kconfig
> +++ b/common/Kconfig
> @@ -45,9 +45,14 @@ config AUTOBOOT_PROMPT
> the responsibility of the user to select only such arguments
> that are valid in the given context.
>
> +config AUTOBOOT_ENCRYPTION
> + bool "Enable encryption in autoboot stopping"
> + depends on AUTOBOOT_KEYED
> + default n
> +
> config AUTOBOOT_DELAY_STR
> string "Delay autobooting via specific input key / string"
> - depends on AUTOBOOT_KEYED
> + depends on AUTOBOOT_KEYED && !AUTOBOOT_ENCRYPTION
> help
> This option delays the automatic boot feature by issuing
> a specific input key or string. If CONFIG_AUTOBOOT_DELAY_STR
> @@ -59,7 +64,7 @@ config AUTOBOOT_DELAY_STR
>
> config AUTOBOOT_STOP_STR
> string "Stop autobooting via specific input key / string"
> - depends on AUTOBOOT_KEYED
> + depends on AUTOBOOT_KEYED && !AUTOBOOT_ENCRYPTION
> help
> This option enables stopping (aborting) of the automatic
> boot feature only by issuing a specific input key or
> @@ -71,7 +76,7 @@ config AUTOBOOT_STOP_STR
>
> config AUTOBOOT_KEYED_CTRLC
> bool "Enable Ctrl-C autoboot interruption"
> - depends on AUTOBOOT_KEYED
> + depends on AUTOBOOT_KEYED && !AUTOBOOT_ENCRYPTION
> default n
> help
> This option allows for the boot sequence to be interrupted
> @@ -79,6 +84,15 @@ config AUTOBOOT_KEYED_CTRLC
> Setting this variable provides an escape sequence from the
> limited "password" strings.
>
> +config AUTOBOOT_STOP_STR_SHA256
> + string "Stop autobooting via SHA256 encrypted password"
> + depends on AUTOBOOT_KEYED && AUTOBOOT_ENCRYPTION
> + help
> + This option adds the feature to only stop the autobooting,
> + and therefore boot into the U-Boot prompt, when the input
> + string / password matches a values that is encypted via
> + a SHA256 hash and saved in the environment.
> +
> endmenu
>
> comment "Commands"
> diff --git a/common/autoboot.c b/common/autoboot.c
> index f72eb18..dde3d04 100644
> --- a/common/autoboot.c
> +++ b/common/autoboot.c
> @@ -12,6 +12,7 @@
> #include <fdtdec.h>
> #include <menu.h>
> #include <post.h>
> +#include <u-boot/sha256.h>
>
> DECLARE_GLOBAL_DATA_PTR;
>
> @@ -26,15 +27,80 @@ DECLARE_GLOBAL_DATA_PTR;
> /* Stored value of bootdelay, used by autoboot_command() */
> static int stored_bootdelay;
>
> -/***************************************************************************
> - * Watch for 'delay' seconds for autoboot stop or autoboot delay string.
> - * returns: 0 - no key string, allow autoboot 1 - got key string, abort
> +#if defined(CONFIG_AUTOBOOT_KEYED)
> +#if defined(CONFIG_AUTOBOOT_STOP_STR_SHA256)
> +
> +/*
> + * Use a "constant-length" time compare function for this
> + * hash compare:
> + *
> + * https://crackstation.net/hashing-security.htm
> */
> -# if defined(CONFIG_AUTOBOOT_KEYED)
> -static int abortboot_keyed(int bootdelay)
> +static int slow_equals(u8 *a, u8 *b, int len)
> +{
> + int diff = 0;
> + int i;
> +
> + for (i = 0; i < len; i++)
> + diff |= a[i] ^ b[i];
> +
> + return diff == 0;
> +}
> +
> +static int passwd_abort(uint64_t etime)
> +{
> + const char *sha_env_str = getenv("bootstopkeysha256");
> + u8 sha_env[SHA256_SUM_LEN];
> + u8 sha[SHA256_SUM_LEN];
> + char presskey[MAX_DELAY_STOP_STR];
> + u_int presskey_len = 0;
> + int i;
> + int abort = 0;
> +
> + if (sha_env_str == NULL)
> + sha_env_str = CONFIG_AUTOBOOT_STOP_STR_SHA256;
> +
> + /*
> + * Generate the binary value from the environment hash value
> + * so that we can compare this value with the computed hash
> + * from the user input
> + */
> + for (i = 0; i < SHA256_SUM_LEN; i++) {
> + char chr[3];
> +
> + strncpy(chr, &sha_env_str[i * 2], 2);
> + sha_env[i] = simple_strtoul(chr, NULL, 16);
> + }
> +
There is similar code in parse_verify_sum() in hash.c. Not sure if it
is worth putting it in a function, like:
hash_parse_string(const char *algo_name, cost char *str, u8 *result)
It could support other algorithms for autoboot in the future if that
became useful.
> + /*
> + * We don't know how long the stop-string is, so we need to
> + * generate the sha256 hash upon each input character and
> + * compare the value with the one saved in the environment
> + */
> + do {
> + if (tstc()) {
> + /* Check for input string overflow */
> + if (presskey_len >= MAX_DELAY_STOP_STR)
> + return 0;
> +
> + presskey[presskey_len++] = getc();
> +
> + /* Calculate sha256 upon each new char */
> + sha256_csum_wd((unsigned char *)presskey, presskey_len,
> + sha, CHUNKSZ_SHA256);
Could use hash_block()
> +
> + /* And check if sha matches saved value in env */
> + if (slow_equals(sha, sha_env, SHA256_SUM_LEN))
> + abort = 1;
> + }
> + } while (!abort && get_ticks() <= etime);
> +
> + return abort;
> +}
> +#else
> +static int passwd_abort(uint64_t etime)
> {
> int abort = 0;
> - uint64_t etime = endtick(bootdelay);
> struct {
> char *str;
> u_int len;
> @@ -42,7 +108,9 @@ static int abortboot_keyed(int bootdelay)
> }
> delaykey[] = {
> { .str = getenv("bootdelaykey"), .retry = 1 },
> + { .str = getenv("bootdelaykey2"), .retry = 1 },
> { .str = getenv("bootstopkey"), .retry = 0 },
> + { .str = getenv("bootstopkey2"), .retry = 0 },
> };
>
> char presskey[MAX_DELAY_STOP_STR];
> @@ -50,26 +118,21 @@ static int abortboot_keyed(int bootdelay)
> u_int presskey_max = 0;
> u_int i;
>
> -#ifndef CONFIG_ZERO_BOOTDELAY_CHECK
> - if (bootdelay == 0)
> - return 0;
> -#endif
> -
> -# ifdef CONFIG_AUTOBOOT_PROMPT
> - /*
> - * CONFIG_AUTOBOOT_PROMPT includes the %d for all boards.
> - * To print the bootdelay value upon bootup.
> - */
> - printf(CONFIG_AUTOBOOT_PROMPT, bootdelay);
> -# endif
> -
> # ifdef CONFIG_AUTOBOOT_DELAY_STR
> if (delaykey[0].str == NULL)
> delaykey[0].str = CONFIG_AUTOBOOT_DELAY_STR;
> # endif
> -# ifdef CONFIG_AUTOBOOT_STOP_STR
> +# ifdef CONFIG_AUTOBOOT_DELAY_STR2
> if (delaykey[1].str == NULL)
> - delaykey[1].str = CONFIG_AUTOBOOT_STOP_STR;
> + delaykey[1].str = CONFIG_AUTOBOOT_DELAY_STR2;
> +# endif
> +# ifdef CONFIG_AUTOBOOT_STOP_STR
> + if (delaykey[2].str == NULL)
> + delaykey[2].str = CONFIG_AUTOBOOT_STOP_STR;
> +# endif
> +# ifdef CONFIG_AUTOBOOT_STOP_STR2
> + if (delaykey[3].str == NULL)
> + delaykey[3].str = CONFIG_AUTOBOOT_STOP_STR2;
> # endif
>
> for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) {
> @@ -119,6 +182,33 @@ static int abortboot_keyed(int bootdelay)
> }
> } while (!abort && get_ticks() <= etime);
>
> + return abort;
> +}
> +#endif
> +
> +/***************************************************************************
> + * Watch for 'delay' seconds for autoboot stop or autoboot delay string.
> + * returns: 0 - no key string, allow autoboot 1 - got key string, abort
> + */
> +static int abortboot_keyed(int bootdelay)
> +{
> + int abort;
> + uint64_t etime = endtick(bootdelay);
> +
> +#ifndef CONFIG_ZERO_BOOTDELAY_CHECK
> + if (bootdelay == 0)
> + return 0;
> +#endif
> +
> +# ifdef CONFIG_AUTOBOOT_PROMPT
> + /*
> + * CONFIG_AUTOBOOT_PROMPT includes the %d for all boards.
> + * To print the bootdelay value upon bootup.
> + */
> + printf(CONFIG_AUTOBOOT_PROMPT, bootdelay);
> +# endif
> +
> + abort = passwd_abort(etime);
> if (!abort)
> debug_bootkeys("key timeout\n");
>
> --
> 2.4.0
>
Regards,
Simon
More information about the U-Boot
mailing list