Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2/*  Copyright(c) 2016-20 Intel Corporation. */
  3
  4#define _GNU_SOURCE
  5#include <assert.h>
  6#include <getopt.h>
  7#include <stdbool.h>
  8#include <stdint.h>
  9#include <stdio.h>
 10#include <stdlib.h>
 11#include <string.h>
 12#include <sys/stat.h>
 13#include <sys/types.h>
 14#include <unistd.h>
 15#include <openssl/err.h>
 16#include <openssl/pem.h>
 17#include "defines.h"
 18#include "main.h"
 19
 20/*
 21 * FIXME: OpenSSL 3.0 has deprecated some functions. For now just ignore
 22 * the warnings.
 23 */
 24#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
 25
 26struct q1q2_ctx {
 27	BN_CTX *bn_ctx;
 28	BIGNUM *m;
 29	BIGNUM *s;
 30	BIGNUM *q1;
 31	BIGNUM *qr;
 32	BIGNUM *q2;
 33};
 34
 35static void free_q1q2_ctx(struct q1q2_ctx *ctx)
 36{
 37	BN_CTX_free(ctx->bn_ctx);
 38	BN_free(ctx->m);
 39	BN_free(ctx->s);
 40	BN_free(ctx->q1);
 41	BN_free(ctx->qr);
 42	BN_free(ctx->q2);
 43}
 44
 45static bool alloc_q1q2_ctx(const uint8_t *s, const uint8_t *m,
 46			   struct q1q2_ctx *ctx)
 47{
 48	ctx->bn_ctx = BN_CTX_new();
 49	ctx->s = BN_bin2bn(s, SGX_MODULUS_SIZE, NULL);
 50	ctx->m = BN_bin2bn(m, SGX_MODULUS_SIZE, NULL);
 51	ctx->q1 = BN_new();
 52	ctx->qr = BN_new();
 53	ctx->q2 = BN_new();
 54
 55	if (!ctx->bn_ctx || !ctx->s || !ctx->m || !ctx->q1 || !ctx->qr ||
 56	    !ctx->q2) {
 57		free_q1q2_ctx(ctx);
 58		return false;
 59	}
 60
 61	return true;
 62}
 63
 64static void reverse_bytes(void *data, int length)
 65{
 66	int i = 0;
 67	int j = length - 1;
 68	uint8_t temp;
 69	uint8_t *ptr = data;
 70
 71	while (i < j) {
 72		temp = ptr[i];
 73		ptr[i] = ptr[j];
 74		ptr[j] = temp;
 75		i++;
 76		j--;
 77	}
 78}
 79
 80static bool calc_q1q2(const uint8_t *s, const uint8_t *m, uint8_t *q1,
 81		      uint8_t *q2)
 82{
 83	struct q1q2_ctx ctx;
 84	int len;
 85
 86	if (!alloc_q1q2_ctx(s, m, &ctx)) {
 87		fprintf(stderr, "Not enough memory for Q1Q2 calculation\n");
 88		return false;
 89	}
 90
 91	if (!BN_mul(ctx.q1, ctx.s, ctx.s, ctx.bn_ctx))
 92		goto out;
 93
 94	if (!BN_div(ctx.q1, ctx.qr, ctx.q1, ctx.m, ctx.bn_ctx))
 95		goto out;
 96
 97	if (BN_num_bytes(ctx.q1) > SGX_MODULUS_SIZE) {
 98		fprintf(stderr, "Too large Q1 %d bytes\n",
 99			BN_num_bytes(ctx.q1));
100		goto out;
101	}
102
103	if (!BN_mul(ctx.q2, ctx.s, ctx.qr, ctx.bn_ctx))
104		goto out;
105
106	if (!BN_div(ctx.q2, NULL, ctx.q2, ctx.m, ctx.bn_ctx))
107		goto out;
108
109	if (BN_num_bytes(ctx.q2) > SGX_MODULUS_SIZE) {
110		fprintf(stderr, "Too large Q2 %d bytes\n",
111			BN_num_bytes(ctx.q2));
112		goto out;
113	}
114
115	len = BN_bn2bin(ctx.q1, q1);
116	reverse_bytes(q1, len);
117	len = BN_bn2bin(ctx.q2, q2);
118	reverse_bytes(q2, len);
119
120	free_q1q2_ctx(&ctx);
121	return true;
122out:
123	free_q1q2_ctx(&ctx);
124	return false;
125}
126
127struct sgx_sigstruct_payload {
128	struct sgx_sigstruct_header header;
129	struct sgx_sigstruct_body body;
130};
131
132static bool check_crypto_errors(void)
133{
134	int err;
135	bool had_errors = false;
136	const char *filename;
137	int line;
138	char str[256];
139
140	for ( ; ; ) {
141		if (ERR_peek_error() == 0)
142			break;
143
144		had_errors = true;
145		err = ERR_get_error_line(&filename, &line);
146		ERR_error_string_n(err, str, sizeof(str));
147		fprintf(stderr, "crypto: %s: %s:%d\n", str, filename, line);
148	}
149
150	return had_errors;
151}
152
153static inline const BIGNUM *get_modulus(RSA *key)
154{
155	const BIGNUM *n;
156
157	RSA_get0_key(key, &n, NULL, NULL);
158	return n;
159}
160
161static RSA *gen_sign_key(void)
162{
163	unsigned long sign_key_length;
164	BIO *bio;
165	RSA *key;
166
167	sign_key_length = (unsigned long)&sign_key_end -
168			  (unsigned long)&sign_key;
169
170	bio = BIO_new_mem_buf(&sign_key, sign_key_length);
171	if (!bio)
172		return NULL;
173
174	key = PEM_read_bio_RSAPrivateKey(bio, NULL, NULL, NULL);
175	BIO_free(bio);
176
177	return key;
178}
179
180enum mrtags {
181	MRECREATE = 0x0045544145524345,
182	MREADD = 0x0000000044444145,
183	MREEXTEND = 0x00444E4554584545,
184};
185
186static bool mrenclave_update(EVP_MD_CTX *ctx, const void *data)
187{
188	if (!EVP_DigestUpdate(ctx, data, 64)) {
189		fprintf(stderr, "digest update failed\n");
190		return false;
191	}
192
193	return true;
194}
195
196static bool mrenclave_commit(EVP_MD_CTX *ctx, uint8_t *mrenclave)
197{
198	unsigned int size;
199
200	if (!EVP_DigestFinal_ex(ctx, (unsigned char *)mrenclave, &size)) {
201		fprintf(stderr, "digest commit failed\n");
202		return false;
203	}
204
205	if (size != 32) {
206		fprintf(stderr, "invalid digest size = %u\n", size);
207		return false;
208	}
209
210	return true;
211}
212
213struct mrecreate {
214	uint64_t tag;
215	uint32_t ssaframesize;
216	uint64_t size;
217	uint8_t reserved[44];
218} __attribute__((__packed__));
219
220
221static bool mrenclave_ecreate(EVP_MD_CTX *ctx, uint64_t blob_size)
222{
223	struct mrecreate mrecreate;
224	uint64_t encl_size;
225
226	for (encl_size = 0x1000; encl_size < blob_size; )
227		encl_size <<= 1;
228
229	memset(&mrecreate, 0, sizeof(mrecreate));
230	mrecreate.tag = MRECREATE;
231	mrecreate.ssaframesize = 1;
232	mrecreate.size = encl_size;
233
234	if (!EVP_DigestInit_ex(ctx, EVP_sha256(), NULL))
235		return false;
236
237	return mrenclave_update(ctx, &mrecreate);
238}
239
240struct mreadd {
241	uint64_t tag;
242	uint64_t offset;
243	uint64_t flags; /* SECINFO flags */
244	uint8_t reserved[40];
245} __attribute__((__packed__));
246
247static bool mrenclave_eadd(EVP_MD_CTX *ctx, uint64_t offset, uint64_t flags)
248{
249	struct mreadd mreadd;
250
251	memset(&mreadd, 0, sizeof(mreadd));
252	mreadd.tag = MREADD;
253	mreadd.offset = offset;
254	mreadd.flags = flags;
255
256	return mrenclave_update(ctx, &mreadd);
257}
258
259struct mreextend {
260	uint64_t tag;
261	uint64_t offset;
262	uint8_t reserved[48];
263} __attribute__((__packed__));
264
265static bool mrenclave_eextend(EVP_MD_CTX *ctx, uint64_t offset,
266			      const uint8_t *data)
267{
268	struct mreextend mreextend;
269	int i;
270
271	for (i = 0; i < 0x1000; i += 0x100) {
272		memset(&mreextend, 0, sizeof(mreextend));
273		mreextend.tag = MREEXTEND;
274		mreextend.offset = offset + i;
275
276		if (!mrenclave_update(ctx, &mreextend))
277			return false;
278
279		if (!mrenclave_update(ctx, &data[i + 0x00]))
280			return false;
281
282		if (!mrenclave_update(ctx, &data[i + 0x40]))
283			return false;
284
285		if (!mrenclave_update(ctx, &data[i + 0x80]))
286			return false;
287
288		if (!mrenclave_update(ctx, &data[i + 0xC0]))
289			return false;
290	}
291
292	return true;
293}
294
295static bool mrenclave_segment(EVP_MD_CTX *ctx, struct encl *encl,
296			      struct encl_segment *seg)
297{
298	uint64_t end = seg->size;
299	uint64_t offset;
300
301	for (offset = 0; offset < end; offset += PAGE_SIZE) {
302		if (!mrenclave_eadd(ctx, seg->offset + offset, seg->flags))
303			return false;
304
305		if (seg->measure) {
306			if (!mrenclave_eextend(ctx, seg->offset + offset, seg->src + offset))
307				return false;
308		}
309	}
310
311	return true;
312}
313
314bool encl_measure(struct encl *encl)
315{
316	uint64_t header1[2] = {0x000000E100000006, 0x0000000000010000};
317	uint64_t header2[2] = {0x0000006000000101, 0x0000000100000060};
318	struct sgx_sigstruct *sigstruct = &encl->sigstruct;
319	struct sgx_sigstruct_payload payload;
320	uint8_t digest[SHA256_DIGEST_LENGTH];
321	EVP_MD_CTX *ctx = NULL;
322	unsigned int siglen;
323	RSA *key = NULL;
 
324	int i;
325
326	memset(sigstruct, 0, sizeof(*sigstruct));
327
328	sigstruct->header.header1[0] = header1[0];
329	sigstruct->header.header1[1] = header1[1];
330	sigstruct->header.header2[0] = header2[0];
331	sigstruct->header.header2[1] = header2[1];
332	sigstruct->exponent = 3;
333	sigstruct->body.attributes = SGX_ATTR_MODE64BIT;
334	sigstruct->body.xfrm = 3;
335
336	/* sanity check */
337	if (check_crypto_errors())
338		goto err;
339
340	key = gen_sign_key();
341	if (!key) {
342		ERR_print_errors_fp(stdout);
343		goto err;
344	}
345
346	BN_bn2bin(get_modulus(key), sigstruct->modulus);
347
348	ctx = EVP_MD_CTX_create();
349	if (!ctx)
350		goto err;
351
352	if (!mrenclave_ecreate(ctx, encl->src_size))
353		goto err;
354
355	for (i = 0; i < encl->nr_segments; i++) {
356		struct encl_segment *seg = &encl->segment_tbl[i];
357
358		if (!mrenclave_segment(ctx, encl, seg))
359			goto err;
360	}
361
362	if (!mrenclave_commit(ctx, sigstruct->body.mrenclave))
363		goto err;
364
365	memcpy(&payload.header, &sigstruct->header, sizeof(sigstruct->header));
366	memcpy(&payload.body, &sigstruct->body, sizeof(sigstruct->body));
367
368	SHA256((unsigned char *)&payload, sizeof(payload), digest);
369
370	if (!RSA_sign(NID_sha256, digest, SHA256_DIGEST_LENGTH,
371		      sigstruct->signature, &siglen, key))
372		goto err;
373
374	if (!calc_q1q2(sigstruct->signature, sigstruct->modulus, sigstruct->q1,
375		       sigstruct->q2))
376		goto err;
377
378	/* BE -> LE */
379	reverse_bytes(sigstruct->signature, SGX_MODULUS_SIZE);
380	reverse_bytes(sigstruct->modulus, SGX_MODULUS_SIZE);
381
382	EVP_MD_CTX_destroy(ctx);
383	RSA_free(key);
384	return true;
385
386err:
387	if (ctx)
388		EVP_MD_CTX_destroy(ctx);
389	RSA_free(key);
390	return false;
391}
v5.14.15
  1// SPDX-License-Identifier: GPL-2.0
  2/*  Copyright(c) 2016-20 Intel Corporation. */
  3
  4#define _GNU_SOURCE
  5#include <assert.h>
  6#include <getopt.h>
  7#include <stdbool.h>
  8#include <stdint.h>
  9#include <stdio.h>
 10#include <stdlib.h>
 11#include <string.h>
 12#include <sys/stat.h>
 13#include <sys/types.h>
 14#include <unistd.h>
 15#include <openssl/err.h>
 16#include <openssl/pem.h>
 17#include "defines.h"
 18#include "main.h"
 19
 
 
 
 
 
 
 20struct q1q2_ctx {
 21	BN_CTX *bn_ctx;
 22	BIGNUM *m;
 23	BIGNUM *s;
 24	BIGNUM *q1;
 25	BIGNUM *qr;
 26	BIGNUM *q2;
 27};
 28
 29static void free_q1q2_ctx(struct q1q2_ctx *ctx)
 30{
 31	BN_CTX_free(ctx->bn_ctx);
 32	BN_free(ctx->m);
 33	BN_free(ctx->s);
 34	BN_free(ctx->q1);
 35	BN_free(ctx->qr);
 36	BN_free(ctx->q2);
 37}
 38
 39static bool alloc_q1q2_ctx(const uint8_t *s, const uint8_t *m,
 40			   struct q1q2_ctx *ctx)
 41{
 42	ctx->bn_ctx = BN_CTX_new();
 43	ctx->s = BN_bin2bn(s, SGX_MODULUS_SIZE, NULL);
 44	ctx->m = BN_bin2bn(m, SGX_MODULUS_SIZE, NULL);
 45	ctx->q1 = BN_new();
 46	ctx->qr = BN_new();
 47	ctx->q2 = BN_new();
 48
 49	if (!ctx->bn_ctx || !ctx->s || !ctx->m || !ctx->q1 || !ctx->qr ||
 50	    !ctx->q2) {
 51		free_q1q2_ctx(ctx);
 52		return false;
 53	}
 54
 55	return true;
 56}
 57
 58static void reverse_bytes(void *data, int length)
 59{
 60	int i = 0;
 61	int j = length - 1;
 62	uint8_t temp;
 63	uint8_t *ptr = data;
 64
 65	while (i < j) {
 66		temp = ptr[i];
 67		ptr[i] = ptr[j];
 68		ptr[j] = temp;
 69		i++;
 70		j--;
 71	}
 72}
 73
 74static bool calc_q1q2(const uint8_t *s, const uint8_t *m, uint8_t *q1,
 75		      uint8_t *q2)
 76{
 77	struct q1q2_ctx ctx;
 78	int len;
 79
 80	if (!alloc_q1q2_ctx(s, m, &ctx)) {
 81		fprintf(stderr, "Not enough memory for Q1Q2 calculation\n");
 82		return false;
 83	}
 84
 85	if (!BN_mul(ctx.q1, ctx.s, ctx.s, ctx.bn_ctx))
 86		goto out;
 87
 88	if (!BN_div(ctx.q1, ctx.qr, ctx.q1, ctx.m, ctx.bn_ctx))
 89		goto out;
 90
 91	if (BN_num_bytes(ctx.q1) > SGX_MODULUS_SIZE) {
 92		fprintf(stderr, "Too large Q1 %d bytes\n",
 93			BN_num_bytes(ctx.q1));
 94		goto out;
 95	}
 96
 97	if (!BN_mul(ctx.q2, ctx.s, ctx.qr, ctx.bn_ctx))
 98		goto out;
 99
100	if (!BN_div(ctx.q2, NULL, ctx.q2, ctx.m, ctx.bn_ctx))
101		goto out;
102
103	if (BN_num_bytes(ctx.q2) > SGX_MODULUS_SIZE) {
104		fprintf(stderr, "Too large Q2 %d bytes\n",
105			BN_num_bytes(ctx.q2));
106		goto out;
107	}
108
109	len = BN_bn2bin(ctx.q1, q1);
110	reverse_bytes(q1, len);
111	len = BN_bn2bin(ctx.q2, q2);
112	reverse_bytes(q2, len);
113
114	free_q1q2_ctx(&ctx);
115	return true;
116out:
117	free_q1q2_ctx(&ctx);
118	return false;
119}
120
121struct sgx_sigstruct_payload {
122	struct sgx_sigstruct_header header;
123	struct sgx_sigstruct_body body;
124};
125
126static bool check_crypto_errors(void)
127{
128	int err;
129	bool had_errors = false;
130	const char *filename;
131	int line;
132	char str[256];
133
134	for ( ; ; ) {
135		if (ERR_peek_error() == 0)
136			break;
137
138		had_errors = true;
139		err = ERR_get_error_line(&filename, &line);
140		ERR_error_string_n(err, str, sizeof(str));
141		fprintf(stderr, "crypto: %s: %s:%d\n", str, filename, line);
142	}
143
144	return had_errors;
145}
146
147static inline const BIGNUM *get_modulus(RSA *key)
148{
149	const BIGNUM *n;
150
151	RSA_get0_key(key, &n, NULL, NULL);
152	return n;
153}
154
155static RSA *gen_sign_key(void)
156{
157	unsigned long sign_key_length;
158	BIO *bio;
159	RSA *key;
160
161	sign_key_length = (unsigned long)&sign_key_end -
162			  (unsigned long)&sign_key;
163
164	bio = BIO_new_mem_buf(&sign_key, sign_key_length);
165	if (!bio)
166		return NULL;
167
168	key = PEM_read_bio_RSAPrivateKey(bio, NULL, NULL, NULL);
169	BIO_free(bio);
170
171	return key;
172}
173
174enum mrtags {
175	MRECREATE = 0x0045544145524345,
176	MREADD = 0x0000000044444145,
177	MREEXTEND = 0x00444E4554584545,
178};
179
180static bool mrenclave_update(EVP_MD_CTX *ctx, const void *data)
181{
182	if (!EVP_DigestUpdate(ctx, data, 64)) {
183		fprintf(stderr, "digest update failed\n");
184		return false;
185	}
186
187	return true;
188}
189
190static bool mrenclave_commit(EVP_MD_CTX *ctx, uint8_t *mrenclave)
191{
192	unsigned int size;
193
194	if (!EVP_DigestFinal_ex(ctx, (unsigned char *)mrenclave, &size)) {
195		fprintf(stderr, "digest commit failed\n");
196		return false;
197	}
198
199	if (size != 32) {
200		fprintf(stderr, "invalid digest size = %u\n", size);
201		return false;
202	}
203
204	return true;
205}
206
207struct mrecreate {
208	uint64_t tag;
209	uint32_t ssaframesize;
210	uint64_t size;
211	uint8_t reserved[44];
212} __attribute__((__packed__));
213
214
215static bool mrenclave_ecreate(EVP_MD_CTX *ctx, uint64_t blob_size)
216{
217	struct mrecreate mrecreate;
218	uint64_t encl_size;
219
220	for (encl_size = 0x1000; encl_size < blob_size; )
221		encl_size <<= 1;
222
223	memset(&mrecreate, 0, sizeof(mrecreate));
224	mrecreate.tag = MRECREATE;
225	mrecreate.ssaframesize = 1;
226	mrecreate.size = encl_size;
227
228	if (!EVP_DigestInit_ex(ctx, EVP_sha256(), NULL))
229		return false;
230
231	return mrenclave_update(ctx, &mrecreate);
232}
233
234struct mreadd {
235	uint64_t tag;
236	uint64_t offset;
237	uint64_t flags; /* SECINFO flags */
238	uint8_t reserved[40];
239} __attribute__((__packed__));
240
241static bool mrenclave_eadd(EVP_MD_CTX *ctx, uint64_t offset, uint64_t flags)
242{
243	struct mreadd mreadd;
244
245	memset(&mreadd, 0, sizeof(mreadd));
246	mreadd.tag = MREADD;
247	mreadd.offset = offset;
248	mreadd.flags = flags;
249
250	return mrenclave_update(ctx, &mreadd);
251}
252
253struct mreextend {
254	uint64_t tag;
255	uint64_t offset;
256	uint8_t reserved[48];
257} __attribute__((__packed__));
258
259static bool mrenclave_eextend(EVP_MD_CTX *ctx, uint64_t offset,
260			      const uint8_t *data)
261{
262	struct mreextend mreextend;
263	int i;
264
265	for (i = 0; i < 0x1000; i += 0x100) {
266		memset(&mreextend, 0, sizeof(mreextend));
267		mreextend.tag = MREEXTEND;
268		mreextend.offset = offset + i;
269
270		if (!mrenclave_update(ctx, &mreextend))
271			return false;
272
273		if (!mrenclave_update(ctx, &data[i + 0x00]))
274			return false;
275
276		if (!mrenclave_update(ctx, &data[i + 0x40]))
277			return false;
278
279		if (!mrenclave_update(ctx, &data[i + 0x80]))
280			return false;
281
282		if (!mrenclave_update(ctx, &data[i + 0xC0]))
283			return false;
284	}
285
286	return true;
287}
288
289static bool mrenclave_segment(EVP_MD_CTX *ctx, struct encl *encl,
290			      struct encl_segment *seg)
291{
292	uint64_t end = seg->offset + seg->size;
293	uint64_t offset;
294
295	for (offset = seg->offset; offset < end; offset += PAGE_SIZE) {
296		if (!mrenclave_eadd(ctx, offset, seg->flags))
297			return false;
298
299		if (!mrenclave_eextend(ctx, offset, encl->src + offset))
300			return false;
 
 
301	}
302
303	return true;
304}
305
306bool encl_measure(struct encl *encl)
307{
308	uint64_t header1[2] = {0x000000E100000006, 0x0000000000010000};
309	uint64_t header2[2] = {0x0000006000000101, 0x0000000100000060};
310	struct sgx_sigstruct *sigstruct = &encl->sigstruct;
311	struct sgx_sigstruct_payload payload;
312	uint8_t digest[SHA256_DIGEST_LENGTH];
 
313	unsigned int siglen;
314	RSA *key = NULL;
315	EVP_MD_CTX *ctx;
316	int i;
317
318	memset(sigstruct, 0, sizeof(*sigstruct));
319
320	sigstruct->header.header1[0] = header1[0];
321	sigstruct->header.header1[1] = header1[1];
322	sigstruct->header.header2[0] = header2[0];
323	sigstruct->header.header2[1] = header2[1];
324	sigstruct->exponent = 3;
325	sigstruct->body.attributes = SGX_ATTR_MODE64BIT;
326	sigstruct->body.xfrm = 3;
327
328	/* sanity check */
329	if (check_crypto_errors())
330		goto err;
331
332	key = gen_sign_key();
333	if (!key) {
334		ERR_print_errors_fp(stdout);
335		goto err;
336	}
337
338	BN_bn2bin(get_modulus(key), sigstruct->modulus);
339
340	ctx = EVP_MD_CTX_create();
341	if (!ctx)
342		goto err;
343
344	if (!mrenclave_ecreate(ctx, encl->src_size))
345		goto err;
346
347	for (i = 0; i < encl->nr_segments; i++) {
348		struct encl_segment *seg = &encl->segment_tbl[i];
349
350		if (!mrenclave_segment(ctx, encl, seg))
351			goto err;
352	}
353
354	if (!mrenclave_commit(ctx, sigstruct->body.mrenclave))
355		goto err;
356
357	memcpy(&payload.header, &sigstruct->header, sizeof(sigstruct->header));
358	memcpy(&payload.body, &sigstruct->body, sizeof(sigstruct->body));
359
360	SHA256((unsigned char *)&payload, sizeof(payload), digest);
361
362	if (!RSA_sign(NID_sha256, digest, SHA256_DIGEST_LENGTH,
363		      sigstruct->signature, &siglen, key))
364		goto err;
365
366	if (!calc_q1q2(sigstruct->signature, sigstruct->modulus, sigstruct->q1,
367		       sigstruct->q2))
368		goto err;
369
370	/* BE -> LE */
371	reverse_bytes(sigstruct->signature, SGX_MODULUS_SIZE);
372	reverse_bytes(sigstruct->modulus, SGX_MODULUS_SIZE);
373
374	EVP_MD_CTX_destroy(ctx);
375	RSA_free(key);
376	return true;
377
378err:
379	EVP_MD_CTX_destroy(ctx);
 
380	RSA_free(key);
381	return false;
382}