main.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501
  1. /*############################################################################
  2. # Copyright 2016 Intel Corporation
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. ############################################################################*/
  16. /*!
  17. * \file
  18. * \brief Verifysig example implementation.
  19. */
  20. #include <stdio.h>
  21. #include <stdlib.h>
  22. #include <string.h>
  23. #include <dropt.h>
  24. #include "epid/common/errors.h"
  25. #include "epid/common/types.h"
  26. #include "epid/common/file_parser.h"
  27. #include "epid/verifier/api.h"
  28. #include "epid/verifier/1.1/api.h"
  29. #include "util/buffutil.h"
  30. #include "util/convutil.h"
  31. #include "util/envutil.h"
  32. #include "src/verifysig.h"
  33. #include "src/verifysig11.h"
  34. // Defaults
  35. #define PROGRAM_NAME "verifysig"
  36. #define PUBKEYFILE_DEFAULT "pubkey.bin"
  37. #define PRIVRL_DEFAULT NULL
  38. #define SIGRL_DEFAULT NULL
  39. #define GRPRL_DEFAULT "grprl.bin"
  40. #define VERIFIERRL_DEFAULT NULL
  41. #define SIG_DEFAULT "sig.dat"
  42. #define CACERT_DEFAULT "cacert.bin"
  43. #define HASHALG_DEFAULT "SHA-512"
  44. #define UNPARSED_HASHALG (kInvalidHashAlg)
  45. #define VPRECMPI_DEFAULT NULL
  46. #define VPRECMPO_DEFAULT NULL
  47. /// parses string to a hashalg type
  48. static dropt_error HandleHashalg(dropt_context* context,
  49. const char* option_argument,
  50. void* handler_data) {
  51. dropt_error err = dropt_error_none;
  52. HashAlg* hashalg = handler_data;
  53. (void)context;
  54. if (option_argument == NULL) {
  55. *hashalg = UNPARSED_HASHALG;
  56. } else if (option_argument[0] == '\0') {
  57. err = dropt_error_insufficient_arguments;
  58. } else if (StringToHashAlg(option_argument, hashalg)) {
  59. err = dropt_error_none;
  60. } else {
  61. /* Reject the value as being inappropriate for this handler. */
  62. err = dropt_error_mismatch;
  63. }
  64. return err;
  65. }
  66. /// Main entrypoint
  67. int main(int argc, char* argv[]) {
  68. // intermediate return value for C style functions
  69. int ret_value = EXIT_SUCCESS;
  70. // intermediate return value for EPID functions
  71. EpidStatus result = kEpidErr;
  72. // User Settings
  73. // Signature file name parameter
  74. static char* sig_file = SIG_DEFAULT;
  75. // Message string parameter
  76. static char* msg_str = NULL;
  77. size_t msg_size = 0;
  78. // Basename string parameter
  79. static char* basename_str = NULL;
  80. size_t basename_size = 0;
  81. // PrivRl file name parameter
  82. static char* privrl_file = NULL;
  83. // SigRl file name parameter
  84. static char* sigrl_file = NULL;
  85. // GrpRl file name parameter
  86. static char* grprl_file = NULL;
  87. // VerRl file name parameter
  88. static char* verrl_file = NULL;
  89. // Group public key file name parameter
  90. static char* pubkey_file = NULL;
  91. // Verifier pre-computed settings input file name parameter
  92. static char* vprecmpi_file = NULL;
  93. // Verifier pre-computed settings output file name parameter
  94. static char* vprecmpo_file = NULL;
  95. // CA certificate file name parameter
  96. static char* cacert_file_name = NULL;
  97. // Verbose flag parameter
  98. static bool verbose = false;
  99. // help flag parameter
  100. static bool show_help = false;
  101. // Buffers and computed values
  102. // Signature buffer
  103. void* sig = NULL;
  104. size_t sig_size = 0;
  105. // PrivRl buffer
  106. void* signed_priv_rl = NULL;
  107. size_t signed_priv_rl_size = 0;
  108. // SigRl buffer
  109. void* signed_sig_rl = NULL;
  110. size_t signed_sig_rl_size = 0;
  111. // GrpRl buffer
  112. void* signed_grp_rl = NULL;
  113. size_t signed_grp_rl_size = 0;
  114. // VerRl buffer
  115. VerifierRl* ver_rl = NULL;
  116. size_t ver_rl_size = 0;
  117. // Group public key buffer
  118. void* signed_pubkey = NULL;
  119. size_t signed_pubkey_size = 0;
  120. // Verifier pre-computed settings
  121. void* verifier_precmp = NULL;
  122. size_t verifier_precmp_size = 0;
  123. size_t vprecmpi_file_size = 0;
  124. // Flag that Verifier pre-computed settings input is valid
  125. bool use_precmp_in;
  126. // CA certificate
  127. EpidCaCertificate cacert = {0};
  128. // Hash algorithm
  129. static HashAlg hashalg = UNPARSED_HASHALG;
  130. dropt_option options[] = {
  131. {'\0', "sig", "load signature from FILE (default: " SIG_DEFAULT ")",
  132. "FILE", dropt_handle_string, &sig_file},
  133. {'\0', "msg", "MESSAGE that was signed (default: empty)", "MESSAGE",
  134. dropt_handle_string, &msg_str},
  135. {'\0', "bsn", "BASENAME used in signature (default: random)", "BASENAME",
  136. dropt_handle_string, &basename_str},
  137. {'\0', "privrl", "load private key revocation list from FILE", "FILE",
  138. dropt_handle_string, &privrl_file},
  139. {'\0', "sigrl", "load signature based revocation list from FILE", "FILE",
  140. dropt_handle_string, &sigrl_file},
  141. {'\0', "grprl",
  142. "load group revocation list from FILE\n (default: " GRPRL_DEFAULT ")",
  143. "FILE", dropt_handle_string, &grprl_file},
  144. {'\0', "verifierrl", "load verifier revocation list from FILE", "FILE",
  145. dropt_handle_string, &verrl_file},
  146. {'\0', "gpubkey",
  147. "load group public key from FILE (default: " PUBKEYFILE_DEFAULT ")",
  148. "FILE", dropt_handle_string, &pubkey_file},
  149. {'\0', "vprecmpi", "load pre-computed verifier data from FILE", "FILE",
  150. dropt_handle_string, &vprecmpi_file},
  151. {'\0', "vprecmpo", "write pre-computed verifier data to FILE", "FILE",
  152. dropt_handle_string, &vprecmpo_file},
  153. {'\0', "capubkey",
  154. "load IoT Issuing CA public key from FILE\n (default: " CACERT_DEFAULT
  155. ")",
  156. "FILE", dropt_handle_string, &cacert_file_name},
  157. {'\0', "hashalg",
  158. "use specified hash algorithm for 2.0 groups "
  159. "(default: " HASHALG_DEFAULT ")",
  160. "{SHA-256 | SHA-384 | SHA-512}", HandleHashalg, &hashalg},
  161. {'h', "help", "display this help and exit", NULL, dropt_handle_bool,
  162. &show_help, dropt_attr_halt},
  163. {'v', "verbose", "print status messages to stdout", NULL,
  164. dropt_handle_bool, &verbose},
  165. {0} /* Required sentinel value. */
  166. };
  167. dropt_context* dropt_ctx = NULL;
  168. // set program name for logging
  169. set_prog_name(PROGRAM_NAME);
  170. do {
  171. EpidVersion epid_version = kNumEpidVersions;
  172. // Read command line args
  173. dropt_ctx = dropt_new_context(options);
  174. if (!dropt_ctx) {
  175. ret_value = EXIT_FAILURE;
  176. break;
  177. } else if (argc > 0) {
  178. /* Parse the arguments from argv.
  179. *
  180. * argv[1] is always safe to access since argv[argc] is guaranteed
  181. * to be NULL and since we've established that argc > 0.
  182. */
  183. char** rest = dropt_parse(dropt_ctx, -1, &argv[1]);
  184. if (dropt_get_error(dropt_ctx) != dropt_error_none) {
  185. log_error(dropt_get_error_message(dropt_ctx));
  186. if (dropt_error_invalid_option == dropt_get_error(dropt_ctx)) {
  187. fprintf(stderr, "Try '%s --help' for more information.\n",
  188. PROGRAM_NAME);
  189. }
  190. ret_value = EXIT_FAILURE;
  191. break;
  192. } else if (show_help) {
  193. log_fmt(
  194. "Usage: %s [OPTION]...\n"
  195. "Verify signature was created by group member in good standing\n"
  196. "\n"
  197. "Options:\n",
  198. PROGRAM_NAME);
  199. dropt_print_help(stdout, dropt_ctx, NULL);
  200. ret_value = EXIT_SUCCESS;
  201. break;
  202. } else if (*rest) {
  203. // we have unparsed (positional) arguments
  204. log_error("invalid argument: %s", *rest);
  205. fprintf(stderr, "Try '%s --help' for more information.\n",
  206. PROGRAM_NAME);
  207. ret_value = EXIT_FAILURE;
  208. break;
  209. } else {
  210. if (verbose) {
  211. verbose = ToggleVerbosity();
  212. }
  213. if (!sig_file) sig_file = SIG_DEFAULT;
  214. if (!grprl_file) grprl_file = GRPRL_DEFAULT;
  215. if (!pubkey_file) pubkey_file = PUBKEYFILE_DEFAULT;
  216. if (!cacert_file_name) cacert_file_name = CACERT_DEFAULT;
  217. if (msg_str) msg_size = strlen(msg_str);
  218. if (basename_str) basename_size = strlen(basename_str);
  219. if (verbose) {
  220. log_msg("\nOption values:");
  221. log_msg(" sig_file : %s", sig_file);
  222. log_msg(" msg_str : %s", msg_str);
  223. log_msg(" basename_str : %s", basename_str);
  224. log_msg(" privrl_file : %s", privrl_file);
  225. log_msg(" sigrl_file : %s", sigrl_file);
  226. log_msg(" grprl_file : %s", grprl_file);
  227. log_msg(" verrl_file : %s", verrl_file);
  228. log_msg(" vprecmpi_file : %s", vprecmpi_file);
  229. log_msg(" vprecmpo_file : %s", vprecmpo_file);
  230. log_msg(" hashalg : %s", (UNPARSED_HASHALG == hashalg)
  231. ? "(default)"
  232. : HashAlgToString(hashalg));
  233. log_msg(" cacert_file_name : %s", cacert_file_name);
  234. log_msg("");
  235. }
  236. }
  237. }
  238. // convert command line args to usable formats
  239. // Signature
  240. sig = NewBufferFromFile(sig_file, &sig_size);
  241. if (!sig) {
  242. ret_value = EXIT_FAILURE;
  243. break;
  244. }
  245. // PrivRl
  246. if (privrl_file) {
  247. signed_priv_rl = NewBufferFromFile(privrl_file, &signed_priv_rl_size);
  248. if (!signed_priv_rl) {
  249. ret_value = EXIT_FAILURE;
  250. break;
  251. }
  252. }
  253. // SigRl
  254. if (sigrl_file) {
  255. signed_sig_rl = NewBufferFromFile(sigrl_file, &signed_sig_rl_size);
  256. if (!signed_sig_rl) {
  257. ret_value = EXIT_FAILURE;
  258. break;
  259. }
  260. }
  261. // GrpRl
  262. signed_grp_rl = NewBufferFromFile(grprl_file, &signed_grp_rl_size);
  263. if (!signed_grp_rl) {
  264. ret_value = EXIT_FAILURE;
  265. break;
  266. }
  267. // VerRl
  268. if (verrl_file) {
  269. ver_rl = (VerifierRl*)NewBufferFromFile(verrl_file, &ver_rl_size);
  270. if (!ver_rl) {
  271. ret_value = EXIT_FAILURE;
  272. break;
  273. }
  274. }
  275. // Group public key
  276. signed_pubkey = NewBufferFromFile(pubkey_file, &signed_pubkey_size);
  277. if (!signed_pubkey) {
  278. ret_value = EXIT_FAILURE;
  279. break;
  280. }
  281. // CA certificate
  282. if (0 != ReadLoud(cacert_file_name, &cacert, sizeof(cacert))) {
  283. ret_value = EXIT_FAILURE;
  284. break;
  285. }
  286. // Security note:
  287. // Application must confirm that IoT EPID Issuing CA certificate is
  288. // authorized by IoT EPID Root CA, e.g., signed by IoT EPID Root CA.
  289. if (!IsCaCertAuthorizedByRootCa(&cacert, sizeof(cacert))) {
  290. log_error("CA certificate is not authorized");
  291. ret_value = EXIT_FAILURE;
  292. break;
  293. }
  294. // Detect EPID version
  295. result = EpidParseFileHeader(signed_pubkey, signed_pubkey_size,
  296. &epid_version, NULL);
  297. if (kEpidNoErr != result || kNumEpidVersions <= epid_version) {
  298. log_error("EPID version can not be detected");
  299. ret_value = EXIT_FAILURE;
  300. break;
  301. }
  302. // Configure hashalg based on group
  303. if (kEpid1x == epid_version) {
  304. if (!(kSha256 == hashalg || UNPARSED_HASHALG == hashalg)) {
  305. log_error(
  306. "unsupported hash algorithm: %s only supported for 2.0 groups",
  307. HashAlgToString(hashalg));
  308. ret_value = EXIT_FAILURE;
  309. break;
  310. }
  311. } else {
  312. if (UNPARSED_HASHALG == hashalg) {
  313. hashalg = kSha512;
  314. }
  315. }
  316. // Load Verifier pre-computed settings
  317. if (kEpid1x == epid_version) {
  318. verifier_precmp_size = sizeof(Epid11VerifierPrecomp);
  319. } else if (kEpid2x == epid_version) {
  320. verifier_precmp_size = sizeof(VerifierPrecomp);
  321. } else {
  322. log_error("EPID version %s is not supported",
  323. EpidVersionToString(epid_version));
  324. ret_value = EXIT_FAILURE;
  325. break;
  326. }
  327. verifier_precmp = AllocBuffer(verifier_precmp_size);
  328. use_precmp_in = false;
  329. if (vprecmpi_file) {
  330. vprecmpi_file_size = GetFileSize(vprecmpi_file);
  331. if (verifier_precmp_size != vprecmpi_file_size) {
  332. if (kEpid2x == epid_version &&
  333. vprecmpi_file_size == verifier_precmp_size - sizeof(GroupId)) {
  334. log_error(
  335. "incorrect input precomp size: precomp format may have changed, "
  336. "try regenerating it");
  337. } else {
  338. log_error("incorrect input precomp size");
  339. }
  340. ret_value = EXIT_FAILURE;
  341. break;
  342. }
  343. use_precmp_in = true;
  344. if (0 != ReadLoud(vprecmpi_file, verifier_precmp, verifier_precmp_size)) {
  345. ret_value = EXIT_FAILURE;
  346. break;
  347. }
  348. }
  349. // Report Settings
  350. if (verbose) {
  351. log_msg("==============================================");
  352. log_msg("Verifying Message:");
  353. log_msg("");
  354. log_msg(" [in] EPID version: %s", EpidVersionToString(epid_version));
  355. log_msg("");
  356. log_msg(" [in] Signature Len: %d", (int)sig_size);
  357. log_msg(" [in] Signature: ");
  358. PrintBuffer(sig, sig_size);
  359. log_msg("");
  360. log_msg(" [in] Message Len: %d", (int)msg_size);
  361. log_msg(" [in] Message: ");
  362. PrintBuffer(msg_str, msg_size);
  363. log_msg("");
  364. log_msg(" [in] BaseName Len: %d", (int)basename_size);
  365. log_msg(" [in] BaseName: ");
  366. PrintBuffer(basename_str, basename_size);
  367. log_msg("");
  368. log_msg(" [in] PrivRl Len: %d", (int)signed_priv_rl_size);
  369. log_msg(" [in] PrivRl: ");
  370. PrintBuffer(signed_priv_rl, signed_priv_rl_size);
  371. log_msg("");
  372. log_msg(" [in] SigRl Len: %d", (int)signed_sig_rl_size);
  373. log_msg(" [in] SigRl: ");
  374. PrintBuffer(signed_sig_rl, signed_sig_rl_size);
  375. log_msg("");
  376. log_msg(" [in] GrpRl Len: %d", (int)signed_grp_rl_size);
  377. log_msg(" [in] GrpRl: ");
  378. PrintBuffer(signed_grp_rl, signed_grp_rl_size);
  379. log_msg("");
  380. log_msg(" [in] VerRl Len: %d", (int)ver_rl_size);
  381. log_msg(" [in] VerRl: ");
  382. PrintBuffer(ver_rl, ver_rl_size);
  383. log_msg("");
  384. log_msg(" [in] Group Public Key: ");
  385. PrintBuffer(signed_pubkey, sizeof(signed_pubkey_size));
  386. log_msg("");
  387. log_msg(" [in] Hash Algorithm: %s", HashAlgToString(hashalg));
  388. if (use_precmp_in) {
  389. log_msg("");
  390. log_msg(" [in] Verifier PreComp: ");
  391. PrintBuffer(verifier_precmp, verifier_precmp_size);
  392. }
  393. log_msg("==============================================");
  394. }
  395. // Verify
  396. if (kEpid2x == epid_version) {
  397. result =
  398. Verify(sig, sig_size, msg_str, msg_size, basename_str, basename_size,
  399. signed_priv_rl, signed_priv_rl_size, signed_sig_rl,
  400. signed_sig_rl_size, signed_grp_rl, signed_grp_rl_size, ver_rl,
  401. ver_rl_size, signed_pubkey, signed_pubkey_size, &cacert,
  402. hashalg, (VerifierPrecomp*)verifier_precmp, use_precmp_in);
  403. } else if (kEpid1x == epid_version) {
  404. result = Verify11(sig, sig_size, msg_str, msg_size, basename_str,
  405. basename_size, signed_priv_rl, signed_priv_rl_size,
  406. signed_sig_rl, signed_sig_rl_size, signed_grp_rl,
  407. signed_grp_rl_size, signed_pubkey, signed_pubkey_size,
  408. &cacert, (Epid11VerifierPrecomp*)verifier_precmp,
  409. use_precmp_in);
  410. } else {
  411. log_error("EPID version %s is not supported",
  412. EpidVersionToString(epid_version));
  413. ret_value = EXIT_FAILURE;
  414. break;
  415. }
  416. // Report Result
  417. if (kEpidNoErr == result) {
  418. log_msg("signature verified successfully");
  419. } else {
  420. log_error("signature verification failed: %s",
  421. EpidStatusToString(result));
  422. ret_value = result;
  423. break;
  424. }
  425. // Store Verifier pre-computed settings
  426. if (vprecmpo_file) {
  427. if (0 !=
  428. WriteLoud(verifier_precmp, verifier_precmp_size, vprecmpo_file)) {
  429. ret_value = EXIT_FAILURE;
  430. break;
  431. }
  432. }
  433. // Success
  434. ret_value = EXIT_SUCCESS;
  435. } while (0);
  436. // Free allocated buffers
  437. if (sig) free(sig);
  438. if (signed_priv_rl) free(signed_priv_rl);
  439. if (signed_sig_rl) free(signed_sig_rl);
  440. if (signed_grp_rl) free(signed_grp_rl);
  441. if (ver_rl) free(ver_rl);
  442. if (signed_pubkey) free(signed_pubkey);
  443. if (verifier_precmp) free(verifier_precmp);
  444. dropt_free_context(dropt_ctx);
  445. return ret_value;
  446. }