123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155 |
- /*############################################################################
- # Copyright 2017 Intel Corporation
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- ############################################################################*/
- /// Tpm2Sign implementation.
- /*! \file */
- #include "epid/member/tpm2/sign.h"
- #include <stddef.h>
- #include <string.h>
- #include <tss2/tss.h>
- #include "epid/common/math/finitefield.h"
- #include "epid/common/src/epid2params.h"
- #include "epid/common/src/hashsize.h"
- #include "epid/common/src/memory.h"
- #include "epid/common/types.h"
- #include "epid/member/tpm2/getrandom.h"
- #include "epid/member/tpm2/ibm_tss/conversion.h"
- #include "epid/member/tpm2/ibm_tss/printtss.h"
- #include "epid/member/tpm2/ibm_tss/state.h"
- /// Handle Intel(R) EPID Error with Break
- #define BREAK_ON_EPID_ERROR(ret) \
- if (kEpidNoErr != (ret)) { \
- break; \
- }
- /// Bit 7 binary mask
- #define BIT7 0x080
- /// Binary 00011111
- #define BITS0500 0x3f
- EpidStatus Tpm2Sign(Tpm2Ctx* ctx, void const* digest, size_t digest_len,
- uint16_t counter, FfElement* k, FfElement* s) {
- EpidStatus sts = kEpidErr;
- TPM_RC rc = TPM_RC_SUCCESS;
- if (!ctx || !ctx->epid2_params || !digest || !s) {
- return kEpidBadArgErr;
- }
- if (0 == digest_len || EpidGetHashSize(ctx->hash_alg) != digest_len) {
- return kEpidBadArgErr;
- }
- if (ctx->key_handle == 0) {
- return kEpidBadArgErr;
- }
- do {
- TPMI_SH_AUTH_SESSION sessionHandle0 = TPM_RS_PW;
- unsigned int sessionAttributes0 = 0;
- Sign_In in = {0};
- Sign_Out out;
- FiniteField* Fp = ctx->epid2_params->Fp;
- FpElemStr k_str;
- FpElemStr s_str;
- in.keyHandle = ctx->key_handle;
- if (0 != memcpy_S(in.digest.t.buffer, sizeof(in.digest.t.buffer), digest,
- digest_len)) {
- sts = kEpidErr;
- break;
- }
- in.digest.t.size = (uint16_t)digest_len;
- in.inScheme.scheme = TPM_ALG_ECDAA;
- in.inScheme.details.ecdaa.hashAlg = EpidtoTpm2HashAlg(ctx->hash_alg);
- in.inScheme.details.ecdaa.count = counter;
- /* proof that digest was created by the TPM (NULL ticket) */
- /* Table 91 - Definition of TPMT_TK_HASHCHECK Structure */
- in.validation.tag = TPM_ST_HASHCHECK;
- in.validation.hierarchy = TPM_RH_NULL;
- in.validation.digest.t.size = 0;
- rc =
- TSS_Execute(ctx->tss, (RESPONSE_PARAMETERS*)&out,
- (COMMAND_PARAMETERS*)&in, NULL, TPM_CC_Sign, sessionHandle0,
- NULL, sessionAttributes0, TPM_RH_NULL, NULL, 0);
- if (rc != TPM_RC_SUCCESS) {
- print_tpm2_response_code("TPM2_Sign", rc);
- // workaround based on Table 2:15 to filter response code format defining
- // handle, session, or parameter number modifier if bit 7 is 1 error is
- // RC_FMT1
- if ((rc & BIT7) != 0) {
- rc = rc & (BITS0500 | RC_FMT1);
- if (TPM_RC_VALUE == rc) {
- sts = kEpidBadArgErr;
- }
- } else {
- sts = kEpidErr;
- }
- break;
- }
- if (k) {
- sts = WriteTpm2FfElement(&out.signature.signature.ecdaa.signatureR,
- (OctStr256*)&k_str);
- BREAK_ON_EPID_ERROR(sts);
- sts = ReadFfElement(Fp, &k_str, sizeof(k_str), k);
- BREAK_ON_EPID_ERROR(sts);
- }
- sts = WriteTpm2FfElement(&out.signature.signature.ecdaa.signatureS,
- (OctStr256*)&s_str);
- BREAK_ON_EPID_ERROR(sts);
- sts = ReadFfElement(Fp, &s_str, sizeof(s_str), s);
- BREAK_ON_EPID_ERROR(sts);
- } while (0);
- return sts;
- }
- EpidStatus Tpm2ReleaseCounter(Tpm2Ctx* ctx, uint16_t counter) {
- EpidStatus sts = kEpidErr;
- if (!ctx) {
- return kEpidBadArgErr;
- }
- do {
- TPM_RC rc = TPM_RC_SUCCESS;
- TPMI_SH_AUTH_SESSION sessionHandle0 = TPM_RS_PW;
- unsigned int sessionAttributes0 = 0;
- Sign_In in = {0};
- Sign_Out out;
- in.keyHandle = ctx->key_handle;
- in.digest.t.size = (uint16_t)EpidGetHashSize(ctx->hash_alg);
- memset(in.digest.t.buffer, 0x1, (size_t)in.digest.t.size);
- in.inScheme.scheme = TPM_ALG_ECDAA;
- in.inScheme.details.ecdaa.hashAlg = EpidtoTpm2HashAlg(ctx->hash_alg);
- in.inScheme.details.ecdaa.count = counter;
- in.validation.tag = TPM_ST_HASHCHECK;
- in.validation.hierarchy = TPM_RH_NULL;
- in.validation.digest.t.size = 0;
- rc =
- TSS_Execute(ctx->tss, (RESPONSE_PARAMETERS*)&out,
- (COMMAND_PARAMETERS*)&in, NULL, TPM_CC_Sign, sessionHandle0,
- NULL, sessionAttributes0, TPM_RH_NULL, NULL, 0);
- if (rc != TPM_RC_SUCCESS && (rc & (BITS0500 | RC_FMT1)) != TPM_RC_VALUE) {
- print_tpm2_response_code("Tpm2ReleaseCounter: TPM2_Sign", rc);
- sts = kEpidErr;
- break;
- }
- sts = kEpidNoErr;
- } while (0);
- return sts;
- }
|