178 lines
7.4 KiB
C++
178 lines
7.4 KiB
C++
|
#include "ServiceProvider.h"
|
||
|
#include "sample_libcrypto.h"
|
||
|
#include "ecp.h"
|
||
|
#include <stdio.h>
|
||
|
#include <stdlib.h>
|
||
|
#include <stddef.h>
|
||
|
#include <time.h>
|
||
|
#include <string.h>
|
||
|
#include "ias_ra.h"
|
||
|
#include "UtilityFunctions.h"
|
||
|
|
||
|
using namespace std;
|
||
|
|
||
|
#if !defined(SWAP_ENDIAN_DW)
|
||
|
#define SWAP_ENDIAN_DW(dw) ((((dw) & 0x000000ff) << 24) \
|
||
|
| (((dw) & 0x0000ff00) << 8) \
|
||
|
| (((dw) & 0x00ff0000) >> 8) \
|
||
|
| (((dw) & 0xff000000) >> 24))
|
||
|
#endif
|
||
|
#if !defined(SWAP_ENDIAN_32B)
|
||
|
#define SWAP_ENDIAN_32B(ptr) \
|
||
|
{\
|
||
|
unsigned int temp = 0; \
|
||
|
temp = SWAP_ENDIAN_DW(((unsigned int*)(ptr))[0]); \
|
||
|
((unsigned int*)(ptr))[0] = SWAP_ENDIAN_DW(((unsigned int*)(ptr))[7]); \
|
||
|
((unsigned int*)(ptr))[7] = temp; \
|
||
|
temp = SWAP_ENDIAN_DW(((unsigned int*)(ptr))[1]); \
|
||
|
((unsigned int*)(ptr))[1] = SWAP_ENDIAN_DW(((unsigned int*)(ptr))[6]); \
|
||
|
((unsigned int*)(ptr))[6] = temp; \
|
||
|
temp = SWAP_ENDIAN_DW(((unsigned int*)(ptr))[2]); \
|
||
|
((unsigned int*)(ptr))[2] = SWAP_ENDIAN_DW(((unsigned int*)(ptr))[5]); \
|
||
|
((unsigned int*)(ptr))[5] = temp; \
|
||
|
temp = SWAP_ENDIAN_DW(((unsigned int*)(ptr))[3]); \
|
||
|
((unsigned int*)(ptr))[3] = SWAP_ENDIAN_DW(((unsigned int*)(ptr))[4]); \
|
||
|
((unsigned int*)(ptr))[4] = temp; \
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
// This is the ECDSA NIST P-256 private key used to sign platform_info_blob.
|
||
|
// This private
|
||
|
// key and the public key in SDK untrusted KElibrary should be a temporary key
|
||
|
// pair. For production parts an attestation server will sign the platform_info_blob with the
|
||
|
// production private key and the SDK untrusted KE library will have the public
|
||
|
// key for verifcation.
|
||
|
|
||
|
static const sample_ec256_private_t g_rk_priv_key = {
|
||
|
{
|
||
|
0x63,0x2c,0xd4,0x02,0x7a,0xdc,0x56,0xa5,
|
||
|
0x59,0x6c,0x44,0x3e,0x43,0xca,0x4e,0x0b,
|
||
|
0x58,0xcd,0x78,0xcb,0x3c,0x7e,0xd5,0xb9,
|
||
|
0xf2,0x91,0x5b,0x39,0x0d,0xb3,0xb5,0xfb
|
||
|
}
|
||
|
};
|
||
|
|
||
|
|
||
|
// Simulates the attestation server function for verifying the quote produce by
|
||
|
// the ISV enclave. It doesn't decrypt or verify the quote in
|
||
|
// the simulation. Just produces the attestaion verification
|
||
|
// report with the platform info blob.
|
||
|
//
|
||
|
// @param p_isv_quote Pointer to the quote generated by the ISV
|
||
|
// enclave.
|
||
|
// @param pse_manifest Pointer to the PSE manifest if used.
|
||
|
// @param p_attestation_verification_report Pointer the outputed
|
||
|
// verification report.
|
||
|
//
|
||
|
// @return int
|
||
|
|
||
|
int ias_verify_attestation_evidence(
|
||
|
uint8_t *p_isv_quote,
|
||
|
uint8_t* pse_manifest,
|
||
|
ias_att_report_t* p_attestation_verification_report,
|
||
|
WebService *ws) {
|
||
|
int ret = 0;
|
||
|
sample_ecc_state_handle_t ecc_state = NULL;
|
||
|
|
||
|
vector<pair<string, string>> result;
|
||
|
bool error = ws->verifyQuote(p_isv_quote, pse_manifest, NULL, &result);
|
||
|
|
||
|
|
||
|
if (error || (NULL == p_isv_quote) || (NULL == p_attestation_verification_report)) {
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
string report_id;
|
||
|
uintmax_t test;
|
||
|
ias_quote_status_t quoteStatus;
|
||
|
string timestamp, epidPseudonym, isvEnclaveQuoteStatus;
|
||
|
|
||
|
for (auto x : result) {
|
||
|
if (x.first == "id") {
|
||
|
report_id = x.second;
|
||
|
} else if (x.first == "timestamp") {
|
||
|
timestamp = x.second;
|
||
|
} else if (x.first == "epidPseudonym") {
|
||
|
epidPseudonym = x.second;
|
||
|
} else if (x.first == "isvEnclaveQuoteStatus") {
|
||
|
if (x.second == "OK")
|
||
|
quoteStatus = IAS_QUOTE_OK;
|
||
|
else if (x.second == "SIGNATURE_INVALID")
|
||
|
quoteStatus = IAS_QUOTE_SIGNATURE_INVALID;
|
||
|
else if (x.second == "GROUP_REVOKED")
|
||
|
quoteStatus = IAS_QUOTE_GROUP_REVOKED;
|
||
|
else if (x.second == "SIGNATURE_REVOKED")
|
||
|
quoteStatus = IAS_QUOTE_SIGNATURE_REVOKED;
|
||
|
else if (x.second == "KEY_REVOKED")
|
||
|
quoteStatus = IAS_QUOTE_KEY_REVOKED;
|
||
|
else if (x.second == "SIGRL_VERSION_MISMATCH")
|
||
|
quoteStatus = IAS_QUOTE_SIGRL_VERSION_MISMATCH;
|
||
|
else if (x.second == "GROUP_OUT_OF_DATE")
|
||
|
quoteStatus = IAS_QUOTE_GROUP_OUT_OF_DATE;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
report_id.copy(p_attestation_verification_report->id, report_id.size());
|
||
|
p_attestation_verification_report->status = quoteStatus;
|
||
|
p_attestation_verification_report->revocation_reason = IAS_REVOC_REASON_NONE;
|
||
|
|
||
|
//this is only sent back from the IAS if something bad happened for reference please see
|
||
|
//https://software.intel.com/sites/default/files/managed/3d/c8/IAS_1_0_API_spec_1_1_Final.pdf
|
||
|
//for testing purposes we assume the world is nice and sunny
|
||
|
p_attestation_verification_report->info_blob.sample_epid_group_status =
|
||
|
0 << IAS_EPID_GROUP_STATUS_REVOKED_BIT_POS
|
||
|
| 0 << IAS_EPID_GROUP_STATUS_REKEY_AVAILABLE_BIT_POS;
|
||
|
p_attestation_verification_report->info_blob.sample_tcb_evaluation_status =
|
||
|
0 << IAS_TCB_EVAL_STATUS_CPUSVN_OUT_OF_DATE_BIT_POS
|
||
|
| 0 << IAS_TCB_EVAL_STATUS_ISVSVN_OUT_OF_DATE_BIT_POS;
|
||
|
p_attestation_verification_report->info_blob.pse_evaluation_status =
|
||
|
0 << IAS_PSE_EVAL_STATUS_ISVSVN_OUT_OF_DATE_BIT_POS
|
||
|
| 0 << IAS_PSE_EVAL_STATUS_EPID_GROUP_REVOKED_BIT_POS
|
||
|
| 0 << IAS_PSE_EVAL_STATUS_PSDASVN_OUT_OF_DATE_BIT_POS
|
||
|
| 0 << IAS_PSE_EVAL_STATUS_SIGRL_OUT_OF_DATE_BIT_POS
|
||
|
| 0 << IAS_PSE_EVAL_STATUS_PRIVRL_OUT_OF_DATE_BIT_POS;
|
||
|
|
||
|
memset(p_attestation_verification_report->info_blob.latest_equivalent_tcb_psvn, 0, PSVN_SIZE);
|
||
|
memset(p_attestation_verification_report->info_blob.latest_pse_isvsvn, 0, ISVSVN_SIZE);
|
||
|
memset(p_attestation_verification_report->info_blob.latest_psda_svn, 0, PSDA_SVN_SIZE);
|
||
|
memset(p_attestation_verification_report->info_blob.performance_rekey_gid, 0, GID_SIZE);
|
||
|
|
||
|
// Generate the Service providers ECCDH key pair.
|
||
|
do {
|
||
|
ret = sample_ecc256_open_context(&ecc_state);
|
||
|
if (SAMPLE_SUCCESS != ret) {
|
||
|
Log("Error, cannot get ECC context", log::error);
|
||
|
ret = -1;
|
||
|
break;
|
||
|
}
|
||
|
// Sign
|
||
|
ret = sample_ecdsa_sign((uint8_t *)&p_attestation_verification_report->info_blob.sample_epid_group_status,
|
||
|
sizeof(ias_platform_info_blob_t) - sizeof(sample_ec_sign256_t),
|
||
|
(sample_ec256_private_t *)&g_rk_priv_key,
|
||
|
(sample_ec256_signature_t *)&p_attestation_verification_report->info_blob.signature,
|
||
|
ecc_state);
|
||
|
|
||
|
if (SAMPLE_SUCCESS != ret) {
|
||
|
Log("Error, sign ga_gb fail", log::error);
|
||
|
ret = SP_INTERNAL_ERROR;
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
SWAP_ENDIAN_32B(p_attestation_verification_report->info_blob.signature.x);
|
||
|
SWAP_ENDIAN_32B(p_attestation_verification_report->info_blob.signature.y);
|
||
|
|
||
|
} while (0);
|
||
|
|
||
|
if (ecc_state) {
|
||
|
sample_ecc256_close_context(ecc_state);
|
||
|
}
|
||
|
|
||
|
p_attestation_verification_report->pse_status = IAS_PSE_OK;
|
||
|
|
||
|
// For now, don't simulate the policy reports.
|
||
|
p_attestation_verification_report->policy_report_size = 0;
|
||
|
|
||
|
return ret;
|
||
|
}
|
||
|
|