123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263 |
- /*
- * Copyright (C) 2011-2016 Intel Corporation. All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- *
- */
- #include "arch.h"
- #include "sgx_tcrypto.h"
- #include "pek_pub_key.h"
- #include "pve_qe_common.h"
- #include <string.h>
- #include "peksk_pub.hh"
- //Function to verify the ECDSA signature of a PEK
- //SHA1 value for integrity checking is not verified since the ECDSA verification could make sure the integrity at the sametime.
- sgx_status_t check_pek_signature(const signed_pek_t& signed_pek, uint8_t *result)
- {
- sgx_status_t status = SGX_SUCCESS;
- sgx_ecc_state_handle_t handle= 0;
- sgx_ec256_signature_t ec_signature;
- status = sgx_ecc256_open_context(&handle);
- if(SGX_SUCCESS!=status){
- return status;
- }
- se_static_assert(sizeof(ec_signature)==sizeof(signed_pek.pek_signature));
- memcpy(&ec_signature, signed_pek.pek_signature, sizeof(signed_pek.pek_signature));
- SWAP_ENDIAN_32B(ec_signature.x);
- SWAP_ENDIAN_32B(ec_signature.y);
- status = sgx_ecdsa_verify(reinterpret_cast<const uint8_t *>(&signed_pek),
- static_cast<uint32_t>(sizeof(signed_pek.n)+sizeof(signed_pek.e)),
- const_cast<sgx_ec256_public_t *>(&g_pek_pub_key_little_endian),
- &ec_signature,
- result,
- handle);
- (void)sgx_ecc256_close_context(handle);
- return status;
- }
|