123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214 |
- /*
- * Copyright (C) 2011-2018 Intel Corporation. All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- *
- */
- #include "sgx_ecc256_common.h"
- sgx_status_t sgx_rsa3072_sign(const uint8_t * p_data,
- uint32_t data_size,
- const sgx_rsa3072_key_t * p_key,
- sgx_rsa3072_signature_t * p_signature)
- {
- if ((p_data == NULL) || (data_size < 1) || (p_key == NULL) ||
- (p_signature == NULL) )
- {
- return SGX_ERROR_INVALID_PARAMETER;
- }
- IppStatus ipp_ret = ippStsNoErr;
- IppHashAlgId hash_alg = ippHashAlg_SHA256;
- IppsRSAPrivateKeyState* p_rsa_privatekey_ctx = NULL;
- Ipp8u *temp_buff = NULL;
- IppsBigNumState* p_prikey_mod_bn = NULL;
- IppsBigNumState* p_prikey_d_bn = NULL;
- do
- {
- // Initializa IPP BN from the private key
- ipp_ret = sgx_ipp_newBN((const Ipp32u *)p_key->mod, sizeof(p_key->mod), &p_prikey_mod_bn);
- ERROR_BREAK(ipp_ret);
- ipp_ret = sgx_ipp_newBN((const Ipp32u *)p_key->d, sizeof(p_key->d), &p_prikey_d_bn);
- ERROR_BREAK(ipp_ret);
- // allocate private key context
- int private_key_ctx_size = 0;
- ipp_ret = ippsRSA_GetSizePrivateKeyType1(SGX_RSA3072_KEY_SIZE * 8, SGX_RSA3072_PRI_EXP_SIZE * 8,
- &private_key_ctx_size);
- ERROR_BREAK(ipp_ret);
- p_rsa_privatekey_ctx = (IppsRSAPrivateKeyState*)malloc(private_key_ctx_size);
- if (!p_rsa_privatekey_ctx) {
- ipp_ret = ippStsMemAllocErr;
- break;
- }
- // initialize the private key context
- ipp_ret = ippsRSA_InitPrivateKeyType1(SGX_RSA3072_KEY_SIZE * 8, SGX_RSA3072_PRI_EXP_SIZE * 8,
- p_rsa_privatekey_ctx, private_key_ctx_size);
- ERROR_BREAK(ipp_ret);
- ipp_ret = ippsRSA_SetPrivateKeyType1(p_prikey_mod_bn, p_prikey_d_bn, p_rsa_privatekey_ctx);
- ERROR_BREAK(ipp_ret);
- // allocate temp buffer for RSA calculation
- int private_key_buffer_size = 0;
- ipp_ret = ippsRSA_GetBufferSizePrivateKey(&private_key_buffer_size, p_rsa_privatekey_ctx);
- ERROR_BREAK(ipp_ret);
- temp_buff = (Ipp8u*)malloc(private_key_buffer_size);
- if (!temp_buff) {
- ipp_ret = ippStsMemAllocErr;
- break;
- }
- // sign the data buffer
- ipp_ret = ippsRSASign_PKCS1v15(p_data, data_size, *p_signature, p_rsa_privatekey_ctx, NULL, hash_alg, temp_buff);
- } while (0);
- sgx_ipp_secure_free_BN(p_prikey_mod_bn, sizeof(p_key->mod));
- sgx_ipp_secure_free_BN(p_prikey_d_bn, sizeof(p_key->d));
- SAFE_FREE(p_rsa_privatekey_ctx);
- SAFE_FREE(temp_buff);
- switch (ipp_ret)
- {
- case ippStsNoErr: return SGX_SUCCESS;
- case ippStsNoMemErr:
- case ippStsMemAllocErr: return SGX_ERROR_OUT_OF_MEMORY;
- case ippStsNullPtrErr:
- case ippStsLengthErr:
- case ippStsOutOfRangeErr:
- case ippStsSizeErr:
- case ippStsBadArgErr: return SGX_ERROR_INVALID_PARAMETER;
- default: return SGX_ERROR_UNEXPECTED;
- }
- }
- sgx_status_t sgx_rsa3072_verify(const uint8_t *p_data,
- uint32_t data_size,
- const sgx_rsa3072_public_key_t *p_public,
- const sgx_rsa3072_signature_t *p_signature,
- sgx_rsa_result_t *p_result)
- {
- if ((p_data == NULL) || (data_size < 1) || (p_public == NULL) ||
- (p_signature == NULL) || (p_result == NULL))
- {
- return SGX_ERROR_INVALID_PARAMETER;
- }
- *p_result = SGX_RSA_INVALID_SIGNATURE;
- IppStatus ipp_ret = ippStsNoErr;
- IppHashAlgId hash_alg = ippHashAlg_SHA256;
- IppsRSAPublicKeyState* p_rsa_publickey_ctx = NULL;
- Ipp8u *temp_buff = NULL;
- IppsBigNumState* p_pubkey_mod_bn = NULL;
- IppsBigNumState* p_pubkey_exp_bn = NULL;
- int result = 0;
- do
- {
- // Initializa IPP BN from the public key
- ipp_ret = sgx_ipp_newBN((const Ipp32u *)p_public->mod, sizeof(p_public->mod), &p_pubkey_mod_bn);
- ERROR_BREAK(ipp_ret);
- ipp_ret = sgx_ipp_newBN((const Ipp32u *)&p_public->exp, sizeof(p_public->exp), &p_pubkey_exp_bn);
- ERROR_BREAK(ipp_ret);
- // allocate public key context
- int public_key_ctx_size = 0;
- ipp_ret = ippsRSA_GetSizePublicKey(SGX_RSA3072_KEY_SIZE * 8, SGX_RSA3072_PUB_EXP_SIZE * 8,
- &public_key_ctx_size);
- ERROR_BREAK(ipp_ret);
- p_rsa_publickey_ctx = (IppsRSAPublicKeyState*)malloc(public_key_ctx_size);
- if (!p_rsa_publickey_ctx) {
- ipp_ret = ippStsMemAllocErr;
- break;
- }
- // initialize the public key context
- ipp_ret = ippsRSA_InitPublicKey(SGX_RSA3072_KEY_SIZE * 8, SGX_RSA3072_PUB_EXP_SIZE * 8,
- p_rsa_publickey_ctx, public_key_ctx_size);
- ERROR_BREAK(ipp_ret);
- ipp_ret = ippsRSA_SetPublicKey(p_pubkey_mod_bn, p_pubkey_exp_bn, p_rsa_publickey_ctx);
- ERROR_BREAK(ipp_ret);
- // allocate temp buffer for RSA calculation
- int public_key_buffer_size = 0;
- ipp_ret = ippsRSA_GetBufferSizePublicKey(&public_key_buffer_size, p_rsa_publickey_ctx);
- ERROR_BREAK(ipp_ret);
- temp_buff = (Ipp8u*)malloc(public_key_buffer_size);
- if (!temp_buff) {
- ipp_ret = ippStsMemAllocErr;
- break;
- }
- // verify the signature
- ipp_ret = ippsRSAVerify_PKCS1v15(p_data, data_size, *p_signature, &result, p_rsa_publickey_ctx, hash_alg, temp_buff);
- } while (0);
- if ((result != 0) && (ipp_ret == ippStsNoErr))
- {
- /* validation pass successfully */
- *p_result = SGX_RSA_VALID;
- }
- sgx_ipp_secure_free_BN(p_pubkey_mod_bn, sizeof(p_public->mod));
- sgx_ipp_secure_free_BN(p_pubkey_exp_bn, sizeof(p_public->exp));
- SAFE_FREE(p_rsa_publickey_ctx);
- SAFE_FREE(temp_buff);
- switch (ipp_ret)
- {
- case ippStsNoErr: return SGX_SUCCESS;
- case ippStsNoMemErr:
- case ippStsMemAllocErr: return SGX_ERROR_OUT_OF_MEMORY;
- case ippStsNullPtrErr:
- case ippStsLengthErr:
- case ippStsOutOfRangeErr:
- case ippStsSizeErr:
- case ippStsBadArgErr: return SGX_ERROR_INVALID_PARAMETER;
- default: return SGX_ERROR_UNEXPECTED;
- }
- }
|