123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350 |
- /*
- * Copyright (C) 2011-2017 Intel Corporation. All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- *
- */
- #include <cstddef>
- #include "pse_pr_inc.h"
- #include "sign_csr.h"
- #include "le2be_macros.h"
- #include "sgx_trts.h"
- #include <cstring>
- #include "ae_ipp.h"
- #define BREAK_IF_NULL(a) { if (NULL == (a)) break; }
- #define BREAK_IF_IPPERR(a) { if (ippStsNoErr != (a)) break; }
- #define LEN_ECDSA_SIG_COMP 32
- #include "pse_product_type.hh"
- static uint8_t CertificateSigningRequestTemplate[] =
- {
- /*0000h:*/ 0x30, 0x82, 0x01, 0xB9,
- /* BEGIN -- Certificate Request Info (to be signed) */
- 0x30, 0x82, 0x01, 0x5E,
- 0x02, 0x01, 0x00, 0x30, 0x81, 0xB7, 0x31, 0x0B,
- /*0010h:*/ 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x0C, 0x02, 0x55, 0x53, 0x31, 0x0B, 0x30, 0x09, 0x06,
- /*0020h:*/ 0x03, 0x55, 0x04, 0x08, 0x0C, 0x02, 0x43, 0x41, 0x31, 0x14, 0x30, 0x12, 0x06, 0x03, 0x55, 0x04,
- /*0030h:*/ 0x07, 0x0C, 0x0B, 0x53, 0x61, 0x6E, 0x74, 0x61, 0x20, 0x43, 0x6C, 0x61, 0x72, 0x61, 0x31, 0x1A,
- /*0040h:*/ 0x30, 0x18, 0x06, 0x03, 0x55, 0x04, 0x0A, 0x0C, 0x11, 0x49, 0x6E, 0x74, 0x65, 0x6C, 0x20, 0x43,
- /*0050h:*/ 0x6F, 0x72, 0x70, 0x6F, 0x72, 0x61, 0x74, 0x69, 0x6F, 0x6E, 0x31, 0x37, 0x30, 0x35, 0x06, 0x03,
- /*0060h:*/ 0x55, 0x04, 0x0B, 0x0C, 0x2E, 0x49, 0x6E, 0x74, 0x65, 0x6C, 0x20, 0x50, 0x53, 0x45, 0x20,
- /* BEGIN -- organizationalUnitName GUID */
- 0x65,
- /*0070h:*/ 0x66, 0x65, 0x66, 0x65, 0x66, 0x65, 0x66, 0x2D, 0x65, 0x66, 0x65, 0x66, 0x2D, 0x65, 0x66, 0x65,
- /*0080h:*/ 0x66, 0x2D, 0x65, 0x66, 0x65, 0x66, 0x2D, 0x65, 0x66, 0x65, 0x66, 0x65, 0x66, 0x65, 0x66, 0x65,
- /*0090h:*/ 0x66, 0x65, 0x66,
- /* END -- organizationalUnitName GUID */
- 0x31, 0x16, 0x30, 0x14, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0C, 0x0D, 0x77, 0x77,
- /*00A0h:*/ 0x77, 0x2E, 0x69, 0x6E, 0x74, 0x65, 0x6C, 0x2E, 0x63, 0x6F, 0x6D, 0x31, 0x18, 0x30, 0x16, 0x06,
- /*00B0h:*/ 0x0A, 0x09, 0x92, 0x26, 0x89, 0x93, 0xF2, 0x2C, 0x64, 0x01, 0x01, 0x0C, 0x08, 0x46, 0x46, 0x46,
- /*00C0h:*/ 0x46, 0x46, 0x46, 0x46, 0x46, 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2A, 0x86, 0x48, 0xCE, 0x3D,
- /*00D0h:*/ 0x02, 0x01, 0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07, 0x03, 0x42, 0x00, 0x04,
- /* BEGIN -- Public Key (64 bytes) - (public key Px || public key Py) */
- /*00E0h:*/ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
- /*00F0h:*/ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
- /*0100h:*/ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
- /*0110h:*/ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
- /* END -- Public Key (64 bytes) */
- /*0120h:*/ 0xA0, 0x44, 0x30, 0x42, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E, 0x31,
- /*0130h:*/ 0x35, 0x30, 0x33, 0x30, 0x0E, 0x06, 0x03, 0x55, 0x1D, 0x0F, 0x01, 0x01, 0xFF, 0x04, 0x04, 0x03,
- /*0140h:*/ 0x02, 0x06, 0xC0, 0x30, 0x0C, 0x06, 0x03, 0x55, 0x1D, 0x13, 0x01, 0x01, 0xFF, 0x04, 0x02, 0x30,
- /*0150h:*/ 0x00, 0x30, 0x13, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF8, 0x4D, 0x01, 0x09, 0x02, 0x01, 0x01,
- /*0160h:*/ 0xFF, 0x04, 0x03, 0x0A, 0x01,
- #if !defined(PRODUCT_TYPE)
- #error PRODUCT_TYPE not #defined
- #endif
- PRODUCT_TYPE, /* product ID */
- /* END -- Certificate Request Info (to be signed) */
-
- /* ecdsaWithSHA256 (1.2.840.10045.4.3.2) */
- 0x30, 0x0A, 0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04,
- /*0170h:*/ 0x03, 0x02,
-
- /* BEGIN -- Signature data (max 75 bytes) */
- /* 0x03 || MM || 0x00 || 0x30 || NN || 0x02 || XX || sigX || 0x02 || YY || sigY */
- 0x03, 0x49, 0x00,
- 0x30, 0x46,
- /* Signature X ( 0x02 || XX || Sx (max 33bytes, See X.690 8.3 Encoding of an integer value) */
- 0x02, 0x21,
- 0x00, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
- /*0180h:*/ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
- /*0190h:*/ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
- /* Signature Y ( 0x02 || YY || Sy (max 33bytes, See X.690 8.3 Encoding of an integer value) */
- 0x02, 0x21,
- 0x00, 0xaa, 0xaa, 0xaa,
- /*01A0h:*/ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
- /*01B0h:*/ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa
- /* END -- Signature data */
- };
- const int nOffset_CSRSize = 0x0002; // Location of CSR length (length excludes 4 bytes header)
- //const int nSize_CSRSize = 2;
- const int nOffset_CSRInfo = 0x0004; // Offset to start of CSR Info block (Signature is computed using SHA256 Message Digest of CSR Info field)
- const int nSize_CSRInfo = 4 + 350; // Length of CSR Info block to sign
- const int nOffset_GUID = 0x006F;
- const int nSize_GUID = 36; // fefefefe-fefe-fefe-fefe-fefefefefefe (8-4-4-4-12)
- const int nOffset_PublicKey = 0x00E0; // Offset to start of Public Key
- const int nOffset_SigSize1 = 0x0173; // Offset to length for signature block (1 byte)
- const int nOffset_SigSize2 = 0x0176; // Offset to length for signature block (1 byte)
- const uint16_t nOffset_SigX = 0x0177; // Offset to start of signature (size will vary from 68 to 70 bytes)
- /* Steps:
- 1) The public key will be stuffed in the CSR record
- 2) A new GUID will be created and placed in the organizationalUnitName field
- 2) The CSR record info signature will be computed using the ECDSA private key
- 3) The signature will be separated into X and Y components
- 4) Prepare X component of signature
- if Byte 0 of X component has high bit set then prepare X component
- 0x02 || 0x21 || 0x00 || X
- else
- 0x02 || 0x20 || X
- 5) Prepare Y component of signature
- if Byte 0 of Y component has high bit set then prepare Y component
- 0x02 || 0x21 || 0x00 || Y
- else
- 0x02 || 0x20 || Y
- 6) Update CSR length (307, 308, or 309 bytes)
- 7) Update DER signature length (68, 69, or 70 bytes)
- 8) Copy prepared signature components immediately after DER signature length byte
- 9) Adjust size of CSR reported
- */
- SignCSR::SignCSR(void)
- {
- }
- SignCSR::~SignCSR(void)
- {
- }
- static inline char ConvertValueToAscii(const uint8_t in)
- {
- if(in <= 0x09)
- {
- return (uint8_t)(in + 48);
- }
- else if(in <= 0x0F)
- {
- return (uint8_t)(in + 55);
- }
- return 0;
- }
- static bool getFormatedGUID(uint8_t* pGUID, uint32_t nGUID)
- {
- uint32_t i;
- uint8_t randBuffer[16];
- uint8_t asciiBuffer[32];
- if (nGUID < 36)
- return false;
- if (0 != sgx_read_rand(randBuffer, sizeof(randBuffer)))
- return false;
- uint8_t* p = randBuffer;
- for (i = 0; i < sizeof(asciiBuffer); i += 2)
- {
- asciiBuffer[i] = ConvertValueToAscii((uint8_t)(*p >> 4));
- asciiBuffer[i+1] = ConvertValueToAscii(*p & 0xf);
- ++p;
- }
- // 01234567-9012-4567-9012-546890123456
- p = asciiBuffer;
- for (i = 0; i < nGUID; i++)
- {
- if (i == 8 || i == 13 || i == 18 || i == 23)
- pGUID[i] = '-';
- else
- {
- pGUID[i] = *p;
- ++p;
- }
- }
- return true;
- }
- size_t SignCSR::GetMaxSize()
- {
- // May be 2 bytes larger than needed depending on whether X/Y fields of signature need a leading 0x00.
- return sizeof(CertificateSigningRequestTemplate);
- }
- // Note: The keys input are little-endian
- ae_error_t SignCSR::GetSignedTemplate(
- /*in */ EcDsaPrivKey* pPrivateKey,
- /*in */ EcDsaPubKey* pPublicKey,
- /*in */ sgx_ecc_state_handle_t csr_ecc_handle,
- /*out*/ Ipp8u* pSignedTemplate,
- /*i/o*/ uint16_t* pnBytes)
- {
- ae_error_t aeStatus = PSE_PR_INSUFFICIENT_MEMORY_ERROR;
- uint8_t SerializedSignature[64];
- if (NULL == pSignedTemplate || NULL == pnBytes ||
- NULL == pPrivateKey || NULL == pPublicKey || NULL == csr_ecc_handle)
- return PSE_PR_BAD_POINTER_ERROR;
- if (GetMaxSize() > *pnBytes)
- return PSE_PR_BUFFER_TOO_SMALL_ERROR;
- memset_s(pSignedTemplate, *pnBytes, 0, *pnBytes);
- memcpy(pSignedTemplate, CertificateSigningRequestTemplate, sizeof(CertificateSigningRequestTemplate));
- // Write serialized public key to template (public key Px || public key Py)
- memcpy(&pSignedTemplate[nOffset_PublicKey], pPublicKey, sizeof(EcDsaPubKey));
- // convert the public key field to big endian
- SwapEndian_32B(&pSignedTemplate[nOffset_PublicKey] + 0);
- SwapEndian_32B(&pSignedTemplate[nOffset_PublicKey] + 32);
- do
- {
- if (!getFormatedGUID(&pSignedTemplate[nOffset_GUID], nSize_GUID))
- {
- aeStatus = PSE_PR_INTERNAL_ERROR;
- break;
- }
- if (SGX_SUCCESS == sgx_ecdsa_sign(&pSignedTemplate[nOffset_CSRInfo], nSize_CSRInfo,
- (sgx_ec256_private_t *)pPrivateKey,
- (sgx_ec256_signature_t *)SerializedSignature,
- csr_ecc_handle))
- {
- /* Convert the signature to big endian format */
- SwapEndian_32B(SerializedSignature);
- SwapEndian_32B(&(SerializedSignature[32]));
- }
- else
- {
- break;
- }
- // SigBuffer = 0x02 || length of component X || Component X of Sigature || 0x02 || length of component Y || Component Y of Sigature
- uint8_t SigBuffer[70] = {0};
- uint16_t i = 0;
- // Place signature X,Y component into buffer
- // SerializedSignature[0]~ is X component and SerializedSignature[32]~ is Y component
- for (int offset = 0; offset <= LEN_ECDSA_SIG_COMP; offset += LEN_ECDSA_SIG_COMP)
- {
- SigBuffer[i++] = 0x02;
- if ((SerializedSignature[offset] & 0x80))
- {
- // Add a leading zero if the bit 8 of the first byte is 1
- SigBuffer[i++] = LEN_ECDSA_SIG_COMP + 1;
- SigBuffer[i++] = 0x00;
- memcpy(&SigBuffer[i], &SerializedSignature[offset], LEN_ECDSA_SIG_COMP);
- i += LEN_ECDSA_SIG_COMP;
- }
- else
- {
- // The leading j bytes need to be removed if those bytes are all 0s and the bit 8 of the j+1 byte is also 0
- int j = 0;
- while (j < LEN_ECDSA_SIG_COMP - 1 && SerializedSignature[offset + j] == 0 && (SerializedSignature[offset + j + 1] & 0x80) == 0)
- j++;
- if (j == LEN_ECDSA_SIG_COMP - 1 && SerializedSignature[offset + j] == 0)
- {
- // The component buffer is all 0s, which should not happen
- aeStatus = PSE_PR_INTERNAL_ERROR;
- goto exit;
- }
- SigBuffer[i++] = LEN_ECDSA_SIG_COMP - j;
- memcpy(&SigBuffer[i], &SerializedSignature[offset + j], LEN_ECDSA_SIG_COMP - j);
- i += LEN_ECDSA_SIG_COMP - j;
- }
- }
- pSignedTemplate[nOffset_SigSize1] = (Ipp8u)(i + 3);
- pSignedTemplate[nOffset_SigSize2] = (Ipp8u)(i);
- memcpy(&pSignedTemplate[nOffset_SigX], SigBuffer, i);
- *pnBytes = (uint16_t)(nOffset_SigX + i);
- uint16_t csrLength = (uint16_t)(*pnBytes - 4);
- pSignedTemplate[nOffset_CSRSize+0] = (Ipp8u)(csrLength >> 8);
- pSignedTemplate[nOffset_CSRSize+1] = (Ipp8u)(csrLength & 0xff);
- aeStatus = AE_SUCCESS;
- } while (0);
- exit:
- // If we weren't successful, don't let any data out
- if (AE_FAILED(aeStatus))
- {
- if (NULL != pSignedTemplate && NULL != pnBytes)
- memset_s(pSignedTemplate, *pnBytes, 0, *pnBytes);
- aeStatus = PSE_PR_SIGNING_CSR_ERROR;
- }
- #if 0 //for debugging to verify signature was generated correctly
- else
- {
- uint8_t result;
- // Convert the signature back to little endian, for verification API
- SwapEndian_32B(SerializedSignature);
- SwapEndian_32B(&(SerializedSignature[32]));
- if ((SGX_SUCCESS != sgx_ecdsa_verify(&pSignedTemplate[nOffset_CSRInfo], nSize_CSRInfo,
- (sgx_ec256_public_t *)pPublicKey, (sgx_ec256_signature_t *)SerializedSignature,
- &result, csr_ecc_handle)) || (result != SGX_EC_VALID ))
- {
- aeStatus = PSE_PR_SIGNING_CSR_ERROR;
- }
- }
- #endif
- return aeStatus;
- }
|