Systemsicherheit/Assignment 7 - SGX Hands-on/SGX101_sample_code-master/RemoteAttestation/ServiceProvider/service_provider/ServiceProvider.h
Paul Zinselmeyer ba8e969470
All checks were successful
Latex Build / build-latex (Assignment 4 - Protokollsicherheit (Praxis)) (push) Successful in 1m2s
Latex Build / build-latex (Assignment 5 - Software Security - Teil 1) (push) Successful in 1m3s
Latex Build / build-latex (Assignment 6 - Software Security - Teil 2) (push) Successful in 1m0s
Latex Build / build-latex (Assignment 4 - Protokollsicherheit (Praxis)) (pull_request) Successful in 30s
Latex Build / build-latex (Assignment 5 - Software Security - Teil 1) (pull_request) Successful in 10s
Latex Build / build-latex (Assignment 6 - Software Security - Teil 2) (pull_request) Successful in 8s
[Assignment-7] add SGX sample code from VM
2024-06-29 17:55:44 +02:00

85 lines
2.1 KiB
C++

#ifndef SERVICE_PROVIDER_H
#define SERVICE_PROVIDER_H
#include <iomanip>
#include <sstream>
#include <algorithm> // std::reverse
#include <stdio.h>
#include <stdlib.h>
#include <stddef.h>
#include <time.h>
#include <string.h>
#include <iostream>
#include "Messages.pb.h"
#include "UtilityFunctions.h"
#include "LogBase.h"
#include "Network_def.h"
#include "WebService.h"
#include "remote_attestation_result.h"
#include "sgx_key_exchange.h"
#include "ias_ra.h"
using namespace std;
#define DH_HALF_KEY_LEN 32
#define DH_SHARED_KEY_LEN 32
#define SAMPLE_SP_IV_SIZE 12
enum sp_ra_msg_status_t {
SP_OK,
SP_UNSUPPORTED_EXTENDED_EPID_GROUP,
SP_INTEGRITY_FAILED,
SP_QUOTE_VERIFICATION_FAILED,
SP_IAS_FAILED,
SP_INTERNAL_ERROR,
SP_PROTOCOL_ERROR,
SP_QUOTE_VERSION_ERROR,
SP_RETRIEVE_SIGRL_ERROR
};
typedef struct _sp_db_item_t {
sgx_ec256_public_t g_a;
sgx_ec256_public_t g_b;
sgx_ec_key_128bit_t vk_key; // Shared secret key for the REPORT_DATA
sgx_ec_key_128bit_t mk_key; // Shared secret key for generating MAC's
sgx_ec_key_128bit_t sk_key; // Shared secret key for encryption
sgx_ec_key_128bit_t smk_key; // Used only for SIGMA protocol
sample_ec_priv_t b;
sgx_ps_sec_prop_desc_t ps_sec_prop;
} sp_db_item_t;
class ServiceProvider {
public:
ServiceProvider(WebService *ws);
virtual ~ServiceProvider();
int sp_ra_proc_msg0_req(const uint32_t extended_epid_group_id);
int sp_ra_proc_msg1_req(Messages::MessageMSG1 msg1, Messages::MessageMSG2 *msg2);
int sp_ra_proc_msg3_req(Messages::MessageMSG3 msg, Messages::AttestationMessage *att_msg);
sgx_ra_msg3_t* assembleMSG3(Messages::MessageMSG3 msg);
int sp_ra_proc_app_att_hmac(Messages::SecretMessage *new_msg, string hmac_key, string hmac_key_filename);
private:
WebService *ws = NULL;
bool g_is_sp_registered = false;
uint32_t extended_epid_group_id;
sp_db_item_t g_sp_db;
const uint16_t AES_CMAC_KDF_ID = 0x0001;
uint8_t validation_result[MAX_VERIFICATION_RESULT];
};
#endif