context.c 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289
  1. /*############################################################################
  2. # Copyright 2016-2017 Intel Corporation
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. ############################################################################*/
  16. /*!
  17. * \file
  18. * \brief Member context implementation.
  19. */
  20. #include <epid/member/api.h>
  21. #include <string.h>
  22. #include "epid/common/src/endian_convert.h"
  23. #include "epid/common/src/epid2params.h"
  24. #include "epid/common/src/memory.h"
  25. #include "epid/common/src/sigrlvalid.h"
  26. #include "epid/common/src/stack.h"
  27. #include "epid/common/types.h"
  28. #include "epid/member/software_member.h"
  29. #include "epid/member/src/allowed_basenames.h"
  30. #include "epid/member/src/context.h"
  31. #include "epid/member/src/precomp.h"
  32. #include "epid/member/tpm2/context.h"
  33. #include "epid/member/tpm2/createprimary.h"
  34. #include "epid/member/tpm2/load_external.h"
  35. #include "epid/member/tpm2/sign.h"
  36. /// Handle SDK Error with Break
  37. #define BREAK_ON_EPID_ERROR(ret) \
  38. if (kEpidNoErr != (ret)) { \
  39. break; \
  40. }
  41. EpidStatus EpidMemberGetSize(MemberParams const* params, size_t* context_size) {
  42. if (!params || !context_size) {
  43. return kEpidBadArgErr;
  44. }
  45. *context_size = sizeof(MemberCtx);
  46. return kEpidNoErr;
  47. }
  48. EpidStatus EpidMemberInit(MemberParams const* params, MemberCtx* ctx) {
  49. EpidStatus sts = kEpidErr;
  50. if (!params || !ctx) {
  51. return kEpidBadArgErr;
  52. }
  53. memset(ctx, 0, sizeof(*ctx));
  54. do {
  55. const FpElemStr* f = NULL;
  56. // set the default hash algorithm to sha512
  57. ctx->hash_alg = kSha512;
  58. #ifdef TPM_TSS // if build for TSS, make Sha256 default
  59. ctx->hash_alg = kSha256;
  60. #endif
  61. ctx->sig_rl = NULL;
  62. ctx->precomp_ready = false;
  63. ctx->is_initially_provisioned = false;
  64. ctx->is_provisioned = false;
  65. ctx->primary_key_set = false;
  66. sts = CreateBasenames(&ctx->allowed_basenames);
  67. BREAK_ON_EPID_ERROR(sts);
  68. // Internal representation of Epid2Params
  69. sts = CreateEpid2Params(&ctx->epid2_params);
  70. BREAK_ON_EPID_ERROR(sts);
  71. // create TPM2 context
  72. sts = Tpm2CreateContext(params, ctx->epid2_params, &ctx->rnd_func,
  73. &ctx->rnd_param, &f, &ctx->tpm2_ctx);
  74. BREAK_ON_EPID_ERROR(sts);
  75. if (!CreateStack(sizeof(PreComputedSignature), &ctx->presigs)) {
  76. sts = kEpidMemAllocErr;
  77. BREAK_ON_EPID_ERROR(sts);
  78. }
  79. ctx->f = f;
  80. ctx->join_ctr = 0;
  81. ctx->rf_ctr = 0;
  82. ctx->rnu_ctr = 0;
  83. sts = NewEcPoint(ctx->epid2_params->G1, (EcPoint**)&ctx->A);
  84. BREAK_ON_EPID_ERROR(sts);
  85. sts = NewFfElement(ctx->epid2_params->Fp, (FfElement**)&ctx->x);
  86. BREAK_ON_EPID_ERROR(sts);
  87. sts = NewEcPoint(ctx->epid2_params->G1, (EcPoint**)&ctx->h1);
  88. BREAK_ON_EPID_ERROR(sts);
  89. sts = NewEcPoint(ctx->epid2_params->G1, (EcPoint**)&ctx->h2);
  90. BREAK_ON_EPID_ERROR(sts);
  91. sts = NewEcPoint(ctx->epid2_params->G2, (EcPoint**)&ctx->w);
  92. BREAK_ON_EPID_ERROR(sts);
  93. sts = NewFfElement(ctx->epid2_params->GT, (FfElement**)&ctx->e12);
  94. BREAK_ON_EPID_ERROR(sts);
  95. sts = NewFfElement(ctx->epid2_params->GT, (FfElement**)&ctx->e22);
  96. BREAK_ON_EPID_ERROR(sts);
  97. sts = NewFfElement(ctx->epid2_params->GT, (FfElement**)&ctx->e2w);
  98. BREAK_ON_EPID_ERROR(sts);
  99. sts = NewFfElement(ctx->epid2_params->GT, (FfElement**)&ctx->ea2);
  100. BREAK_ON_EPID_ERROR(sts);
  101. sts = Tpm2SetHashAlg(ctx->tpm2_ctx, ctx->hash_alg);
  102. BREAK_ON_EPID_ERROR(sts);
  103. ctx->primary_key_set = true;
  104. sts = kEpidNoErr;
  105. } while (0);
  106. if (kEpidNoErr != sts) {
  107. EpidMemberDeinit(ctx);
  108. }
  109. return (sts);
  110. }
  111. void EpidMemberDeinit(MemberCtx* ctx) {
  112. size_t i = 0;
  113. size_t presig_size = 0;
  114. PreComputedSignature* buf = NULL;
  115. if (!ctx) {
  116. return;
  117. }
  118. presig_size = StackGetSize(ctx->presigs);
  119. buf = StackGetBuf(ctx->presigs);
  120. for (i = 0; i < presig_size; ++i) {
  121. (void)Tpm2ReleaseCounter(ctx->tpm2_ctx, (buf++)->rf_ctr);
  122. }
  123. (void)Tpm2ReleaseCounter(ctx->tpm2_ctx, ctx->join_ctr);
  124. (void)Tpm2ReleaseCounter(ctx->tpm2_ctx, ctx->rf_ctr);
  125. (void)Tpm2ReleaseCounter(ctx->tpm2_ctx, ctx->rnu_ctr);
  126. DeleteStack(&ctx->presigs);
  127. ctx->rnd_param = NULL;
  128. DeleteEcPoint((EcPoint**)&(ctx->h1));
  129. DeleteEcPoint((EcPoint**)&(ctx->h2));
  130. DeleteEcPoint((EcPoint**)&(ctx->A));
  131. DeleteFfElement((FfElement**)&ctx->x);
  132. DeleteEcPoint((EcPoint**)&(ctx->w));
  133. DeleteFfElement((FfElement**)&ctx->e12);
  134. DeleteFfElement((FfElement**)&ctx->e22);
  135. DeleteFfElement((FfElement**)&ctx->e2w);
  136. DeleteFfElement((FfElement**)&ctx->ea2);
  137. Tpm2DeleteContext(&ctx->tpm2_ctx);
  138. DeleteEpid2Params(&ctx->epid2_params);
  139. DeleteBasenames(&ctx->allowed_basenames);
  140. }
  141. EpidStatus EpidMemberCreate(MemberParams const* params, MemberCtx** ctx) {
  142. size_t context_size = 0;
  143. EpidStatus sts = kEpidErr;
  144. MemberCtx* member_ctx = NULL;
  145. if (!params || !ctx) {
  146. return kEpidBadArgErr;
  147. }
  148. do {
  149. sts = EpidMemberGetSize(params, &context_size);
  150. BREAK_ON_EPID_ERROR(sts);
  151. member_ctx = SAFE_ALLOC(context_size);
  152. if (!member_ctx) {
  153. BREAK_ON_EPID_ERROR(kEpidMemAllocErr);
  154. }
  155. sts = EpidMemberInit(params, member_ctx);
  156. BREAK_ON_EPID_ERROR(sts);
  157. } while (0);
  158. if (kEpidNoErr != sts) {
  159. SAFE_FREE(member_ctx);
  160. member_ctx = NULL;
  161. }
  162. *ctx = member_ctx;
  163. return sts;
  164. }
  165. EpidStatus EpidMemberInitialProvision(MemberCtx* ctx) {
  166. EpidStatus sts = kEpidErr;
  167. if (!ctx) {
  168. return kEpidBadArgErr;
  169. }
  170. if (ctx->is_initially_provisioned) {
  171. return kEpidOutOfSequenceError;
  172. }
  173. do {
  174. if (ctx->f) {
  175. sts = Tpm2LoadExternal(ctx->tpm2_ctx, ctx->f);
  176. BREAK_ON_EPID_ERROR(sts);
  177. } else {
  178. G1ElemStr f;
  179. sts = Tpm2CreatePrimary(ctx->tpm2_ctx, &f);
  180. BREAK_ON_EPID_ERROR(sts);
  181. }
  182. ctx->is_initially_provisioned = true;
  183. // f value was set into TPM
  184. ctx->primary_key_set = true;
  185. sts = kEpidNoErr;
  186. } while (0);
  187. return (sts);
  188. }
  189. void EpidMemberDelete(MemberCtx** ctx) {
  190. if (!ctx) {
  191. return;
  192. }
  193. EpidMemberDeinit(*ctx);
  194. SAFE_FREE(*ctx);
  195. *ctx = NULL;
  196. }
  197. EpidStatus EpidMemberSetHashAlg(MemberCtx* ctx, HashAlg hash_alg) {
  198. EpidStatus sts = kEpidErr;
  199. if (!ctx) return kEpidBadArgErr;
  200. if (kSha256 != hash_alg && kSha384 != hash_alg && kSha512 != hash_alg &&
  201. kSha512_256 != hash_alg)
  202. return kEpidBadArgErr;
  203. do {
  204. sts = Tpm2SetHashAlg(ctx->tpm2_ctx, hash_alg);
  205. BREAK_ON_EPID_ERROR(sts);
  206. ctx->hash_alg = hash_alg;
  207. } while (0);
  208. return sts;
  209. }
  210. EpidStatus EpidMemberSetSigRl(MemberCtx* ctx, SigRl const* sig_rl,
  211. size_t sig_rl_size) {
  212. if (!ctx || !sig_rl) {
  213. return kEpidBadArgErr;
  214. }
  215. if (!ctx->is_provisioned) {
  216. return kEpidOutOfSequenceError;
  217. }
  218. if (!IsSigRlValid(&ctx->pub_key.gid, sig_rl, sig_rl_size)) {
  219. return kEpidBadArgErr;
  220. }
  221. // Do not set an older version of sig rl
  222. if (ctx->sig_rl) {
  223. unsigned int current_ver = 0;
  224. unsigned int incoming_ver = 0;
  225. current_ver = ntohl(ctx->sig_rl->version);
  226. incoming_ver = ntohl(sig_rl->version);
  227. if (current_ver >= incoming_ver) {
  228. return kEpidBadArgErr;
  229. }
  230. }
  231. ctx->sig_rl = sig_rl;
  232. return kEpidNoErr;
  233. }
  234. EpidStatus EpidRegisterBasename(MemberCtx* ctx, void const* basename,
  235. size_t basename_len) {
  236. EpidStatus sts = kEpidErr;
  237. if (basename_len == 0) {
  238. return kEpidBadArgErr;
  239. }
  240. if (!ctx || !basename) {
  241. return kEpidBadArgErr;
  242. }
  243. if (IsBasenameAllowed(ctx->allowed_basenames, basename, basename_len)) {
  244. return kEpidDuplicateErr;
  245. }
  246. sts = AllowBasename(ctx->allowed_basenames, basename, basename_len);
  247. return sts;
  248. }
  249. EpidStatus EpidClearRegisteredBasenames(MemberCtx* ctx) {
  250. EpidStatus sts = kEpidErr;
  251. if (!ctx) {
  252. return kEpidBadArgErr;
  253. }
  254. DeleteBasenames(&ctx->allowed_basenames);
  255. sts = CreateBasenames(&ctx->allowed_basenames);
  256. return sts;
  257. }