Loading...
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright(c) 2016-20 Intel Corporation. */
3
4#define _GNU_SOURCE
5#include <assert.h>
6#include <getopt.h>
7#include <stdbool.h>
8#include <stdint.h>
9#include <stdio.h>
10#include <stdlib.h>
11#include <string.h>
12#include <sys/stat.h>
13#include <sys/types.h>
14#include <unistd.h>
15#include <openssl/err.h>
16#include <openssl/pem.h>
17#include "defines.h"
18#include "main.h"
19
20/*
21 * FIXME: OpenSSL 3.0 has deprecated some functions. For now just ignore
22 * the warnings.
23 */
24#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
25
26struct q1q2_ctx {
27 BN_CTX *bn_ctx;
28 BIGNUM *m;
29 BIGNUM *s;
30 BIGNUM *q1;
31 BIGNUM *qr;
32 BIGNUM *q2;
33};
34
35static void free_q1q2_ctx(struct q1q2_ctx *ctx)
36{
37 BN_CTX_free(ctx->bn_ctx);
38 BN_free(ctx->m);
39 BN_free(ctx->s);
40 BN_free(ctx->q1);
41 BN_free(ctx->qr);
42 BN_free(ctx->q2);
43}
44
45static bool alloc_q1q2_ctx(const uint8_t *s, const uint8_t *m,
46 struct q1q2_ctx *ctx)
47{
48 ctx->bn_ctx = BN_CTX_new();
49 ctx->s = BN_bin2bn(s, SGX_MODULUS_SIZE, NULL);
50 ctx->m = BN_bin2bn(m, SGX_MODULUS_SIZE, NULL);
51 ctx->q1 = BN_new();
52 ctx->qr = BN_new();
53 ctx->q2 = BN_new();
54
55 if (!ctx->bn_ctx || !ctx->s || !ctx->m || !ctx->q1 || !ctx->qr ||
56 !ctx->q2) {
57 free_q1q2_ctx(ctx);
58 return false;
59 }
60
61 return true;
62}
63
64static void reverse_bytes(void *data, int length)
65{
66 int i = 0;
67 int j = length - 1;
68 uint8_t temp;
69 uint8_t *ptr = data;
70
71 while (i < j) {
72 temp = ptr[i];
73 ptr[i] = ptr[j];
74 ptr[j] = temp;
75 i++;
76 j--;
77 }
78}
79
80static bool calc_q1q2(const uint8_t *s, const uint8_t *m, uint8_t *q1,
81 uint8_t *q2)
82{
83 struct q1q2_ctx ctx;
84 int len;
85
86 if (!alloc_q1q2_ctx(s, m, &ctx)) {
87 fprintf(stderr, "Not enough memory for Q1Q2 calculation\n");
88 return false;
89 }
90
91 if (!BN_mul(ctx.q1, ctx.s, ctx.s, ctx.bn_ctx))
92 goto out;
93
94 if (!BN_div(ctx.q1, ctx.qr, ctx.q1, ctx.m, ctx.bn_ctx))
95 goto out;
96
97 if (BN_num_bytes(ctx.q1) > SGX_MODULUS_SIZE) {
98 fprintf(stderr, "Too large Q1 %d bytes\n",
99 BN_num_bytes(ctx.q1));
100 goto out;
101 }
102
103 if (!BN_mul(ctx.q2, ctx.s, ctx.qr, ctx.bn_ctx))
104 goto out;
105
106 if (!BN_div(ctx.q2, NULL, ctx.q2, ctx.m, ctx.bn_ctx))
107 goto out;
108
109 if (BN_num_bytes(ctx.q2) > SGX_MODULUS_SIZE) {
110 fprintf(stderr, "Too large Q2 %d bytes\n",
111 BN_num_bytes(ctx.q2));
112 goto out;
113 }
114
115 len = BN_bn2bin(ctx.q1, q1);
116 reverse_bytes(q1, len);
117 len = BN_bn2bin(ctx.q2, q2);
118 reverse_bytes(q2, len);
119
120 free_q1q2_ctx(&ctx);
121 return true;
122out:
123 free_q1q2_ctx(&ctx);
124 return false;
125}
126
127struct sgx_sigstruct_payload {
128 struct sgx_sigstruct_header header;
129 struct sgx_sigstruct_body body;
130};
131
132static bool check_crypto_errors(void)
133{
134 int err;
135 bool had_errors = false;
136 const char *filename;
137 int line;
138 char str[256];
139
140 for ( ; ; ) {
141 if (ERR_peek_error() == 0)
142 break;
143
144 had_errors = true;
145 err = ERR_get_error_line(&filename, &line);
146 ERR_error_string_n(err, str, sizeof(str));
147 fprintf(stderr, "crypto: %s: %s:%d\n", str, filename, line);
148 }
149
150 return had_errors;
151}
152
153static inline const BIGNUM *get_modulus(RSA *key)
154{
155 const BIGNUM *n;
156
157 RSA_get0_key(key, &n, NULL, NULL);
158 return n;
159}
160
161static RSA *gen_sign_key(void)
162{
163 unsigned long sign_key_length;
164 BIO *bio;
165 RSA *key;
166
167 sign_key_length = (unsigned long)&sign_key_end -
168 (unsigned long)&sign_key;
169
170 bio = BIO_new_mem_buf(&sign_key, sign_key_length);
171 if (!bio)
172 return NULL;
173
174 key = PEM_read_bio_RSAPrivateKey(bio, NULL, NULL, NULL);
175 BIO_free(bio);
176
177 return key;
178}
179
180enum mrtags {
181 MRECREATE = 0x0045544145524345,
182 MREADD = 0x0000000044444145,
183 MREEXTEND = 0x00444E4554584545,
184};
185
186static bool mrenclave_update(EVP_MD_CTX *ctx, const void *data)
187{
188 if (!EVP_DigestUpdate(ctx, data, 64)) {
189 fprintf(stderr, "digest update failed\n");
190 return false;
191 }
192
193 return true;
194}
195
196static bool mrenclave_commit(EVP_MD_CTX *ctx, uint8_t *mrenclave)
197{
198 unsigned int size;
199
200 if (!EVP_DigestFinal_ex(ctx, (unsigned char *)mrenclave, &size)) {
201 fprintf(stderr, "digest commit failed\n");
202 return false;
203 }
204
205 if (size != 32) {
206 fprintf(stderr, "invalid digest size = %u\n", size);
207 return false;
208 }
209
210 return true;
211}
212
213struct mrecreate {
214 uint64_t tag;
215 uint32_t ssaframesize;
216 uint64_t size;
217 uint8_t reserved[44];
218} __attribute__((__packed__));
219
220
221static bool mrenclave_ecreate(EVP_MD_CTX *ctx, uint64_t blob_size)
222{
223 struct mrecreate mrecreate;
224 uint64_t encl_size;
225
226 for (encl_size = 0x1000; encl_size < blob_size; )
227 encl_size <<= 1;
228
229 memset(&mrecreate, 0, sizeof(mrecreate));
230 mrecreate.tag = MRECREATE;
231 mrecreate.ssaframesize = 1;
232 mrecreate.size = encl_size;
233
234 if (!EVP_DigestInit_ex(ctx, EVP_sha256(), NULL))
235 return false;
236
237 return mrenclave_update(ctx, &mrecreate);
238}
239
240struct mreadd {
241 uint64_t tag;
242 uint64_t offset;
243 uint64_t flags; /* SECINFO flags */
244 uint8_t reserved[40];
245} __attribute__((__packed__));
246
247static bool mrenclave_eadd(EVP_MD_CTX *ctx, uint64_t offset, uint64_t flags)
248{
249 struct mreadd mreadd;
250
251 memset(&mreadd, 0, sizeof(mreadd));
252 mreadd.tag = MREADD;
253 mreadd.offset = offset;
254 mreadd.flags = flags;
255
256 return mrenclave_update(ctx, &mreadd);
257}
258
259struct mreextend {
260 uint64_t tag;
261 uint64_t offset;
262 uint8_t reserved[48];
263} __attribute__((__packed__));
264
265static bool mrenclave_eextend(EVP_MD_CTX *ctx, uint64_t offset,
266 const uint8_t *data)
267{
268 struct mreextend mreextend;
269 int i;
270
271 for (i = 0; i < 0x1000; i += 0x100) {
272 memset(&mreextend, 0, sizeof(mreextend));
273 mreextend.tag = MREEXTEND;
274 mreextend.offset = offset + i;
275
276 if (!mrenclave_update(ctx, &mreextend))
277 return false;
278
279 if (!mrenclave_update(ctx, &data[i + 0x00]))
280 return false;
281
282 if (!mrenclave_update(ctx, &data[i + 0x40]))
283 return false;
284
285 if (!mrenclave_update(ctx, &data[i + 0x80]))
286 return false;
287
288 if (!mrenclave_update(ctx, &data[i + 0xC0]))
289 return false;
290 }
291
292 return true;
293}
294
295static bool mrenclave_segment(EVP_MD_CTX *ctx, struct encl *encl,
296 struct encl_segment *seg)
297{
298 uint64_t end = seg->size;
299 uint64_t offset;
300
301 for (offset = 0; offset < end; offset += PAGE_SIZE) {
302 if (!mrenclave_eadd(ctx, seg->offset + offset, seg->flags))
303 return false;
304
305 if (seg->measure) {
306 if (!mrenclave_eextend(ctx, seg->offset + offset, seg->src + offset))
307 return false;
308 }
309 }
310
311 return true;
312}
313
314bool encl_measure(struct encl *encl)
315{
316 uint64_t header1[2] = {0x000000E100000006, 0x0000000000010000};
317 uint64_t header2[2] = {0x0000006000000101, 0x0000000100000060};
318 struct sgx_sigstruct *sigstruct = &encl->sigstruct;
319 struct sgx_sigstruct_payload payload;
320 uint8_t digest[SHA256_DIGEST_LENGTH];
321 EVP_MD_CTX *ctx = NULL;
322 unsigned int siglen;
323 RSA *key = NULL;
324 int i;
325
326 memset(sigstruct, 0, sizeof(*sigstruct));
327
328 sigstruct->header.header1[0] = header1[0];
329 sigstruct->header.header1[1] = header1[1];
330 sigstruct->header.header2[0] = header2[0];
331 sigstruct->header.header2[1] = header2[1];
332 sigstruct->exponent = 3;
333 sigstruct->body.attributes = SGX_ATTR_MODE64BIT;
334 sigstruct->body.xfrm = 3;
335
336 /* sanity check */
337 if (check_crypto_errors())
338 goto err;
339
340 key = gen_sign_key();
341 if (!key) {
342 ERR_print_errors_fp(stdout);
343 goto err;
344 }
345
346 BN_bn2bin(get_modulus(key), sigstruct->modulus);
347
348 ctx = EVP_MD_CTX_create();
349 if (!ctx)
350 goto err;
351
352 if (!mrenclave_ecreate(ctx, encl->src_size))
353 goto err;
354
355 for (i = 0; i < encl->nr_segments; i++) {
356 struct encl_segment *seg = &encl->segment_tbl[i];
357
358 if (!mrenclave_segment(ctx, encl, seg))
359 goto err;
360 }
361
362 if (!mrenclave_commit(ctx, sigstruct->body.mrenclave))
363 goto err;
364
365 memcpy(&payload.header, &sigstruct->header, sizeof(sigstruct->header));
366 memcpy(&payload.body, &sigstruct->body, sizeof(sigstruct->body));
367
368 SHA256((unsigned char *)&payload, sizeof(payload), digest);
369
370 if (!RSA_sign(NID_sha256, digest, SHA256_DIGEST_LENGTH,
371 sigstruct->signature, &siglen, key))
372 goto err;
373
374 if (!calc_q1q2(sigstruct->signature, sigstruct->modulus, sigstruct->q1,
375 sigstruct->q2))
376 goto err;
377
378 /* BE -> LE */
379 reverse_bytes(sigstruct->signature, SGX_MODULUS_SIZE);
380 reverse_bytes(sigstruct->modulus, SGX_MODULUS_SIZE);
381
382 EVP_MD_CTX_destroy(ctx);
383 RSA_free(key);
384 return true;
385
386err:
387 if (ctx)
388 EVP_MD_CTX_destroy(ctx);
389 RSA_free(key);
390 return false;
391}
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright(c) 2016-20 Intel Corporation. */
3
4#define _GNU_SOURCE
5#include <assert.h>
6#include <getopt.h>
7#include <stdbool.h>
8#include <stdint.h>
9#include <stdio.h>
10#include <stdlib.h>
11#include <string.h>
12#include <sys/stat.h>
13#include <sys/types.h>
14#include <unistd.h>
15#include <openssl/err.h>
16#include <openssl/pem.h>
17#include "defines.h"
18#include "main.h"
19
20struct q1q2_ctx {
21 BN_CTX *bn_ctx;
22 BIGNUM *m;
23 BIGNUM *s;
24 BIGNUM *q1;
25 BIGNUM *qr;
26 BIGNUM *q2;
27};
28
29static void free_q1q2_ctx(struct q1q2_ctx *ctx)
30{
31 BN_CTX_free(ctx->bn_ctx);
32 BN_free(ctx->m);
33 BN_free(ctx->s);
34 BN_free(ctx->q1);
35 BN_free(ctx->qr);
36 BN_free(ctx->q2);
37}
38
39static bool alloc_q1q2_ctx(const uint8_t *s, const uint8_t *m,
40 struct q1q2_ctx *ctx)
41{
42 ctx->bn_ctx = BN_CTX_new();
43 ctx->s = BN_bin2bn(s, SGX_MODULUS_SIZE, NULL);
44 ctx->m = BN_bin2bn(m, SGX_MODULUS_SIZE, NULL);
45 ctx->q1 = BN_new();
46 ctx->qr = BN_new();
47 ctx->q2 = BN_new();
48
49 if (!ctx->bn_ctx || !ctx->s || !ctx->m || !ctx->q1 || !ctx->qr ||
50 !ctx->q2) {
51 free_q1q2_ctx(ctx);
52 return false;
53 }
54
55 return true;
56}
57
58static void reverse_bytes(void *data, int length)
59{
60 int i = 0;
61 int j = length - 1;
62 uint8_t temp;
63 uint8_t *ptr = data;
64
65 while (i < j) {
66 temp = ptr[i];
67 ptr[i] = ptr[j];
68 ptr[j] = temp;
69 i++;
70 j--;
71 }
72}
73
74static bool calc_q1q2(const uint8_t *s, const uint8_t *m, uint8_t *q1,
75 uint8_t *q2)
76{
77 struct q1q2_ctx ctx;
78 int len;
79
80 if (!alloc_q1q2_ctx(s, m, &ctx)) {
81 fprintf(stderr, "Not enough memory for Q1Q2 calculation\n");
82 return false;
83 }
84
85 if (!BN_mul(ctx.q1, ctx.s, ctx.s, ctx.bn_ctx))
86 goto out;
87
88 if (!BN_div(ctx.q1, ctx.qr, ctx.q1, ctx.m, ctx.bn_ctx))
89 goto out;
90
91 if (BN_num_bytes(ctx.q1) > SGX_MODULUS_SIZE) {
92 fprintf(stderr, "Too large Q1 %d bytes\n",
93 BN_num_bytes(ctx.q1));
94 goto out;
95 }
96
97 if (!BN_mul(ctx.q2, ctx.s, ctx.qr, ctx.bn_ctx))
98 goto out;
99
100 if (!BN_div(ctx.q2, NULL, ctx.q2, ctx.m, ctx.bn_ctx))
101 goto out;
102
103 if (BN_num_bytes(ctx.q2) > SGX_MODULUS_SIZE) {
104 fprintf(stderr, "Too large Q2 %d bytes\n",
105 BN_num_bytes(ctx.q2));
106 goto out;
107 }
108
109 len = BN_bn2bin(ctx.q1, q1);
110 reverse_bytes(q1, len);
111 len = BN_bn2bin(ctx.q2, q2);
112 reverse_bytes(q2, len);
113
114 free_q1q2_ctx(&ctx);
115 return true;
116out:
117 free_q1q2_ctx(&ctx);
118 return false;
119}
120
121struct sgx_sigstruct_payload {
122 struct sgx_sigstruct_header header;
123 struct sgx_sigstruct_body body;
124};
125
126static bool check_crypto_errors(void)
127{
128 int err;
129 bool had_errors = false;
130 const char *filename;
131 int line;
132 char str[256];
133
134 for ( ; ; ) {
135 if (ERR_peek_error() == 0)
136 break;
137
138 had_errors = true;
139 err = ERR_get_error_line(&filename, &line);
140 ERR_error_string_n(err, str, sizeof(str));
141 fprintf(stderr, "crypto: %s: %s:%d\n", str, filename, line);
142 }
143
144 return had_errors;
145}
146
147static inline const BIGNUM *get_modulus(RSA *key)
148{
149 const BIGNUM *n;
150
151 RSA_get0_key(key, &n, NULL, NULL);
152 return n;
153}
154
155static RSA *gen_sign_key(void)
156{
157 unsigned long sign_key_length;
158 BIO *bio;
159 RSA *key;
160
161 sign_key_length = (unsigned long)&sign_key_end -
162 (unsigned long)&sign_key;
163
164 bio = BIO_new_mem_buf(&sign_key, sign_key_length);
165 if (!bio)
166 return NULL;
167
168 key = PEM_read_bio_RSAPrivateKey(bio, NULL, NULL, NULL);
169 BIO_free(bio);
170
171 return key;
172}
173
174enum mrtags {
175 MRECREATE = 0x0045544145524345,
176 MREADD = 0x0000000044444145,
177 MREEXTEND = 0x00444E4554584545,
178};
179
180static bool mrenclave_update(EVP_MD_CTX *ctx, const void *data)
181{
182 if (!EVP_DigestUpdate(ctx, data, 64)) {
183 fprintf(stderr, "digest update failed\n");
184 return false;
185 }
186
187 return true;
188}
189
190static bool mrenclave_commit(EVP_MD_CTX *ctx, uint8_t *mrenclave)
191{
192 unsigned int size;
193
194 if (!EVP_DigestFinal_ex(ctx, (unsigned char *)mrenclave, &size)) {
195 fprintf(stderr, "digest commit failed\n");
196 return false;
197 }
198
199 if (size != 32) {
200 fprintf(stderr, "invalid digest size = %u\n", size);
201 return false;
202 }
203
204 return true;
205}
206
207struct mrecreate {
208 uint64_t tag;
209 uint32_t ssaframesize;
210 uint64_t size;
211 uint8_t reserved[44];
212} __attribute__((__packed__));
213
214
215static bool mrenclave_ecreate(EVP_MD_CTX *ctx, uint64_t blob_size)
216{
217 struct mrecreate mrecreate;
218 uint64_t encl_size;
219
220 for (encl_size = 0x1000; encl_size < blob_size; )
221 encl_size <<= 1;
222
223 memset(&mrecreate, 0, sizeof(mrecreate));
224 mrecreate.tag = MRECREATE;
225 mrecreate.ssaframesize = 1;
226 mrecreate.size = encl_size;
227
228 if (!EVP_DigestInit_ex(ctx, EVP_sha256(), NULL))
229 return false;
230
231 return mrenclave_update(ctx, &mrecreate);
232}
233
234struct mreadd {
235 uint64_t tag;
236 uint64_t offset;
237 uint64_t flags; /* SECINFO flags */
238 uint8_t reserved[40];
239} __attribute__((__packed__));
240
241static bool mrenclave_eadd(EVP_MD_CTX *ctx, uint64_t offset, uint64_t flags)
242{
243 struct mreadd mreadd;
244
245 memset(&mreadd, 0, sizeof(mreadd));
246 mreadd.tag = MREADD;
247 mreadd.offset = offset;
248 mreadd.flags = flags;
249
250 return mrenclave_update(ctx, &mreadd);
251}
252
253struct mreextend {
254 uint64_t tag;
255 uint64_t offset;
256 uint8_t reserved[48];
257} __attribute__((__packed__));
258
259static bool mrenclave_eextend(EVP_MD_CTX *ctx, uint64_t offset,
260 const uint8_t *data)
261{
262 struct mreextend mreextend;
263 int i;
264
265 for (i = 0; i < 0x1000; i += 0x100) {
266 memset(&mreextend, 0, sizeof(mreextend));
267 mreextend.tag = MREEXTEND;
268 mreextend.offset = offset + i;
269
270 if (!mrenclave_update(ctx, &mreextend))
271 return false;
272
273 if (!mrenclave_update(ctx, &data[i + 0x00]))
274 return false;
275
276 if (!mrenclave_update(ctx, &data[i + 0x40]))
277 return false;
278
279 if (!mrenclave_update(ctx, &data[i + 0x80]))
280 return false;
281
282 if (!mrenclave_update(ctx, &data[i + 0xC0]))
283 return false;
284 }
285
286 return true;
287}
288
289static bool mrenclave_segment(EVP_MD_CTX *ctx, struct encl *encl,
290 struct encl_segment *seg)
291{
292 uint64_t end = seg->offset + seg->size;
293 uint64_t offset;
294
295 for (offset = seg->offset; offset < end; offset += PAGE_SIZE) {
296 if (!mrenclave_eadd(ctx, offset, seg->flags))
297 return false;
298
299 if (!mrenclave_eextend(ctx, offset, encl->src + offset))
300 return false;
301 }
302
303 return true;
304}
305
306bool encl_measure(struct encl *encl)
307{
308 uint64_t header1[2] = {0x000000E100000006, 0x0000000000010000};
309 uint64_t header2[2] = {0x0000006000000101, 0x0000000100000060};
310 struct sgx_sigstruct *sigstruct = &encl->sigstruct;
311 struct sgx_sigstruct_payload payload;
312 uint8_t digest[SHA256_DIGEST_LENGTH];
313 unsigned int siglen;
314 RSA *key = NULL;
315 EVP_MD_CTX *ctx;
316 int i;
317
318 memset(sigstruct, 0, sizeof(*sigstruct));
319
320 sigstruct->header.header1[0] = header1[0];
321 sigstruct->header.header1[1] = header1[1];
322 sigstruct->header.header2[0] = header2[0];
323 sigstruct->header.header2[1] = header2[1];
324 sigstruct->exponent = 3;
325 sigstruct->body.attributes = SGX_ATTR_MODE64BIT;
326 sigstruct->body.xfrm = 3;
327
328 /* sanity check */
329 if (check_crypto_errors())
330 goto err;
331
332 key = gen_sign_key();
333 if (!key) {
334 ERR_print_errors_fp(stdout);
335 goto err;
336 }
337
338 BN_bn2bin(get_modulus(key), sigstruct->modulus);
339
340 ctx = EVP_MD_CTX_create();
341 if (!ctx)
342 goto err;
343
344 if (!mrenclave_ecreate(ctx, encl->src_size))
345 goto err;
346
347 for (i = 0; i < encl->nr_segments; i++) {
348 struct encl_segment *seg = &encl->segment_tbl[i];
349
350 if (!mrenclave_segment(ctx, encl, seg))
351 goto err;
352 }
353
354 if (!mrenclave_commit(ctx, sigstruct->body.mrenclave))
355 goto err;
356
357 memcpy(&payload.header, &sigstruct->header, sizeof(sigstruct->header));
358 memcpy(&payload.body, &sigstruct->body, sizeof(sigstruct->body));
359
360 SHA256((unsigned char *)&payload, sizeof(payload), digest);
361
362 if (!RSA_sign(NID_sha256, digest, SHA256_DIGEST_LENGTH,
363 sigstruct->signature, &siglen, key))
364 goto err;
365
366 if (!calc_q1q2(sigstruct->signature, sigstruct->modulus, sigstruct->q1,
367 sigstruct->q2))
368 goto err;
369
370 /* BE -> LE */
371 reverse_bytes(sigstruct->signature, SGX_MODULUS_SIZE);
372 reverse_bytes(sigstruct->modulus, SGX_MODULUS_SIZE);
373
374 EVP_MD_CTX_destroy(ctx);
375 RSA_free(key);
376 return true;
377
378err:
379 EVP_MD_CTX_destroy(ctx);
380 RSA_free(key);
381 return false;
382}