|  | // SPDX-License-Identifier: GPL-2.0 | 
|  | /*  Copyright(c) 2016-20 Intel Corporation. */ | 
|  |  | 
|  | #define _GNU_SOURCE | 
|  | #include <assert.h> | 
|  | #include <getopt.h> | 
|  | #include <stdbool.h> | 
|  | #include <stdint.h> | 
|  | #include <stdio.h> | 
|  | #include <stdlib.h> | 
|  | #include <string.h> | 
|  | #include <sys/stat.h> | 
|  | #include <sys/types.h> | 
|  | #include <unistd.h> | 
|  | #include <openssl/err.h> | 
|  | #include <openssl/pem.h> | 
|  | #include "defines.h" | 
|  | #include "main.h" | 
|  |  | 
|  | /* | 
|  | * FIXME: OpenSSL 3.0 has deprecated some functions. For now just ignore | 
|  | * the warnings. | 
|  | */ | 
|  | #pragma GCC diagnostic ignored "-Wdeprecated-declarations" | 
|  |  | 
|  | struct q1q2_ctx { | 
|  | BN_CTX *bn_ctx; | 
|  | BIGNUM *m; | 
|  | BIGNUM *s; | 
|  | BIGNUM *q1; | 
|  | BIGNUM *qr; | 
|  | BIGNUM *q2; | 
|  | }; | 
|  |  | 
|  | static void free_q1q2_ctx(struct q1q2_ctx *ctx) | 
|  | { | 
|  | BN_CTX_free(ctx->bn_ctx); | 
|  | BN_free(ctx->m); | 
|  | BN_free(ctx->s); | 
|  | BN_free(ctx->q1); | 
|  | BN_free(ctx->qr); | 
|  | BN_free(ctx->q2); | 
|  | } | 
|  |  | 
|  | static bool alloc_q1q2_ctx(const uint8_t *s, const uint8_t *m, | 
|  | struct q1q2_ctx *ctx) | 
|  | { | 
|  | ctx->bn_ctx = BN_CTX_new(); | 
|  | ctx->s = BN_bin2bn(s, SGX_MODULUS_SIZE, NULL); | 
|  | ctx->m = BN_bin2bn(m, SGX_MODULUS_SIZE, NULL); | 
|  | ctx->q1 = BN_new(); | 
|  | ctx->qr = BN_new(); | 
|  | ctx->q2 = BN_new(); | 
|  |  | 
|  | if (!ctx->bn_ctx || !ctx->s || !ctx->m || !ctx->q1 || !ctx->qr || | 
|  | !ctx->q2) { | 
|  | free_q1q2_ctx(ctx); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | static void reverse_bytes(void *data, int length) | 
|  | { | 
|  | int i = 0; | 
|  | int j = length - 1; | 
|  | uint8_t temp; | 
|  | uint8_t *ptr = data; | 
|  |  | 
|  | while (i < j) { | 
|  | temp = ptr[i]; | 
|  | ptr[i] = ptr[j]; | 
|  | ptr[j] = temp; | 
|  | i++; | 
|  | j--; | 
|  | } | 
|  | } | 
|  |  | 
|  | static bool calc_q1q2(const uint8_t *s, const uint8_t *m, uint8_t *q1, | 
|  | uint8_t *q2) | 
|  | { | 
|  | struct q1q2_ctx ctx; | 
|  | int len; | 
|  |  | 
|  | if (!alloc_q1q2_ctx(s, m, &ctx)) { | 
|  | fprintf(stderr, "Not enough memory for Q1Q2 calculation\n"); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (!BN_mul(ctx.q1, ctx.s, ctx.s, ctx.bn_ctx)) | 
|  | goto out; | 
|  |  | 
|  | if (!BN_div(ctx.q1, ctx.qr, ctx.q1, ctx.m, ctx.bn_ctx)) | 
|  | goto out; | 
|  |  | 
|  | if (BN_num_bytes(ctx.q1) > SGX_MODULUS_SIZE) { | 
|  | fprintf(stderr, "Too large Q1 %d bytes\n", | 
|  | BN_num_bytes(ctx.q1)); | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | if (!BN_mul(ctx.q2, ctx.s, ctx.qr, ctx.bn_ctx)) | 
|  | goto out; | 
|  |  | 
|  | if (!BN_div(ctx.q2, NULL, ctx.q2, ctx.m, ctx.bn_ctx)) | 
|  | goto out; | 
|  |  | 
|  | if (BN_num_bytes(ctx.q2) > SGX_MODULUS_SIZE) { | 
|  | fprintf(stderr, "Too large Q2 %d bytes\n", | 
|  | BN_num_bytes(ctx.q2)); | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | len = BN_bn2bin(ctx.q1, q1); | 
|  | reverse_bytes(q1, len); | 
|  | len = BN_bn2bin(ctx.q2, q2); | 
|  | reverse_bytes(q2, len); | 
|  |  | 
|  | free_q1q2_ctx(&ctx); | 
|  | return true; | 
|  | out: | 
|  | free_q1q2_ctx(&ctx); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | struct sgx_sigstruct_payload { | 
|  | struct sgx_sigstruct_header header; | 
|  | struct sgx_sigstruct_body body; | 
|  | }; | 
|  |  | 
|  | static bool check_crypto_errors(void) | 
|  | { | 
|  | int err; | 
|  | bool had_errors = false; | 
|  | const char *filename; | 
|  | int line; | 
|  | char str[256]; | 
|  |  | 
|  | for ( ; ; ) { | 
|  | if (ERR_peek_error() == 0) | 
|  | break; | 
|  |  | 
|  | had_errors = true; | 
|  | err = ERR_get_error_line(&filename, &line); | 
|  | ERR_error_string_n(err, str, sizeof(str)); | 
|  | fprintf(stderr, "crypto: %s: %s:%d\n", str, filename, line); | 
|  | } | 
|  |  | 
|  | return had_errors; | 
|  | } | 
|  |  | 
|  | static inline const BIGNUM *get_modulus(RSA *key) | 
|  | { | 
|  | const BIGNUM *n; | 
|  |  | 
|  | RSA_get0_key(key, &n, NULL, NULL); | 
|  | return n; | 
|  | } | 
|  |  | 
|  | static RSA *gen_sign_key(void) | 
|  | { | 
|  | unsigned long sign_key_length; | 
|  | BIO *bio; | 
|  | RSA *key; | 
|  |  | 
|  | sign_key_length = (unsigned long)&sign_key_end - | 
|  | (unsigned long)&sign_key; | 
|  |  | 
|  | bio = BIO_new_mem_buf(&sign_key, sign_key_length); | 
|  | if (!bio) | 
|  | return NULL; | 
|  |  | 
|  | key = PEM_read_bio_RSAPrivateKey(bio, NULL, NULL, NULL); | 
|  | BIO_free(bio); | 
|  |  | 
|  | return key; | 
|  | } | 
|  |  | 
|  | enum mrtags { | 
|  | MRECREATE = 0x0045544145524345, | 
|  | MREADD = 0x0000000044444145, | 
|  | MREEXTEND = 0x00444E4554584545, | 
|  | }; | 
|  |  | 
|  | static bool mrenclave_update(EVP_MD_CTX *ctx, const void *data) | 
|  | { | 
|  | if (!EVP_DigestUpdate(ctx, data, 64)) { | 
|  | fprintf(stderr, "digest update failed\n"); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | static bool mrenclave_commit(EVP_MD_CTX *ctx, uint8_t *mrenclave) | 
|  | { | 
|  | unsigned int size; | 
|  |  | 
|  | if (!EVP_DigestFinal_ex(ctx, (unsigned char *)mrenclave, &size)) { | 
|  | fprintf(stderr, "digest commit failed\n"); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (size != 32) { | 
|  | fprintf(stderr, "invalid digest size = %u\n", size); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | struct mrecreate { | 
|  | uint64_t tag; | 
|  | uint32_t ssaframesize; | 
|  | uint64_t size; | 
|  | uint8_t reserved[44]; | 
|  | } __attribute__((__packed__)); | 
|  |  | 
|  |  | 
|  | static bool mrenclave_ecreate(EVP_MD_CTX *ctx, uint64_t blob_size) | 
|  | { | 
|  | struct mrecreate mrecreate; | 
|  | uint64_t encl_size; | 
|  |  | 
|  | for (encl_size = 0x1000; encl_size < blob_size; ) | 
|  | encl_size <<= 1; | 
|  |  | 
|  | memset(&mrecreate, 0, sizeof(mrecreate)); | 
|  | mrecreate.tag = MRECREATE; | 
|  | mrecreate.ssaframesize = 1; | 
|  | mrecreate.size = encl_size; | 
|  |  | 
|  | if (!EVP_DigestInit_ex(ctx, EVP_sha256(), NULL)) | 
|  | return false; | 
|  |  | 
|  | return mrenclave_update(ctx, &mrecreate); | 
|  | } | 
|  |  | 
|  | struct mreadd { | 
|  | uint64_t tag; | 
|  | uint64_t offset; | 
|  | uint64_t flags; /* SECINFO flags */ | 
|  | uint8_t reserved[40]; | 
|  | } __attribute__((__packed__)); | 
|  |  | 
|  | static bool mrenclave_eadd(EVP_MD_CTX *ctx, uint64_t offset, uint64_t flags) | 
|  | { | 
|  | struct mreadd mreadd; | 
|  |  | 
|  | memset(&mreadd, 0, sizeof(mreadd)); | 
|  | mreadd.tag = MREADD; | 
|  | mreadd.offset = offset; | 
|  | mreadd.flags = flags; | 
|  |  | 
|  | return mrenclave_update(ctx, &mreadd); | 
|  | } | 
|  |  | 
|  | struct mreextend { | 
|  | uint64_t tag; | 
|  | uint64_t offset; | 
|  | uint8_t reserved[48]; | 
|  | } __attribute__((__packed__)); | 
|  |  | 
|  | static bool mrenclave_eextend(EVP_MD_CTX *ctx, uint64_t offset, | 
|  | const uint8_t *data) | 
|  | { | 
|  | struct mreextend mreextend; | 
|  | int i; | 
|  |  | 
|  | for (i = 0; i < 0x1000; i += 0x100) { | 
|  | memset(&mreextend, 0, sizeof(mreextend)); | 
|  | mreextend.tag = MREEXTEND; | 
|  | mreextend.offset = offset + i; | 
|  |  | 
|  | if (!mrenclave_update(ctx, &mreextend)) | 
|  | return false; | 
|  |  | 
|  | if (!mrenclave_update(ctx, &data[i + 0x00])) | 
|  | return false; | 
|  |  | 
|  | if (!mrenclave_update(ctx, &data[i + 0x40])) | 
|  | return false; | 
|  |  | 
|  | if (!mrenclave_update(ctx, &data[i + 0x80])) | 
|  | return false; | 
|  |  | 
|  | if (!mrenclave_update(ctx, &data[i + 0xC0])) | 
|  | return false; | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | static bool mrenclave_segment(EVP_MD_CTX *ctx, struct encl *encl, | 
|  | struct encl_segment *seg) | 
|  | { | 
|  | uint64_t end = seg->size; | 
|  | uint64_t offset; | 
|  |  | 
|  | for (offset = 0; offset < end; offset += PAGE_SIZE) { | 
|  | if (!mrenclave_eadd(ctx, seg->offset + offset, seg->flags)) | 
|  | return false; | 
|  |  | 
|  | if (seg->measure) { | 
|  | if (!mrenclave_eextend(ctx, seg->offset + offset, seg->src + offset)) | 
|  | return false; | 
|  | } | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool encl_measure(struct encl *encl) | 
|  | { | 
|  | uint64_t header1[2] = {0x000000E100000006, 0x0000000000010000}; | 
|  | uint64_t header2[2] = {0x0000006000000101, 0x0000000100000060}; | 
|  | struct sgx_sigstruct *sigstruct = &encl->sigstruct; | 
|  | struct sgx_sigstruct_payload payload; | 
|  | uint8_t digest[SHA256_DIGEST_LENGTH]; | 
|  | EVP_MD_CTX *ctx = NULL; | 
|  | unsigned int siglen; | 
|  | RSA *key = NULL; | 
|  | int i; | 
|  |  | 
|  | memset(sigstruct, 0, sizeof(*sigstruct)); | 
|  |  | 
|  | sigstruct->header.header1[0] = header1[0]; | 
|  | sigstruct->header.header1[1] = header1[1]; | 
|  | sigstruct->header.header2[0] = header2[0]; | 
|  | sigstruct->header.header2[1] = header2[1]; | 
|  | sigstruct->exponent = 3; | 
|  | sigstruct->body.attributes = SGX_ATTR_MODE64BIT; | 
|  | sigstruct->body.xfrm = 3; | 
|  |  | 
|  | /* sanity check */ | 
|  | if (check_crypto_errors()) | 
|  | goto err; | 
|  |  | 
|  | key = gen_sign_key(); | 
|  | if (!key) { | 
|  | ERR_print_errors_fp(stdout); | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | BN_bn2bin(get_modulus(key), sigstruct->modulus); | 
|  |  | 
|  | ctx = EVP_MD_CTX_create(); | 
|  | if (!ctx) | 
|  | goto err; | 
|  |  | 
|  | if (!mrenclave_ecreate(ctx, encl->src_size)) | 
|  | goto err; | 
|  |  | 
|  | for (i = 0; i < encl->nr_segments; i++) { | 
|  | struct encl_segment *seg = &encl->segment_tbl[i]; | 
|  |  | 
|  | if (!mrenclave_segment(ctx, encl, seg)) | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | if (!mrenclave_commit(ctx, sigstruct->body.mrenclave)) | 
|  | goto err; | 
|  |  | 
|  | memcpy(&payload.header, &sigstruct->header, sizeof(sigstruct->header)); | 
|  | memcpy(&payload.body, &sigstruct->body, sizeof(sigstruct->body)); | 
|  |  | 
|  | SHA256((unsigned char *)&payload, sizeof(payload), digest); | 
|  |  | 
|  | if (!RSA_sign(NID_sha256, digest, SHA256_DIGEST_LENGTH, | 
|  | sigstruct->signature, &siglen, key)) | 
|  | goto err; | 
|  |  | 
|  | if (!calc_q1q2(sigstruct->signature, sigstruct->modulus, sigstruct->q1, | 
|  | sigstruct->q2)) | 
|  | goto err; | 
|  |  | 
|  | /* BE -> LE */ | 
|  | reverse_bytes(sigstruct->signature, SGX_MODULUS_SIZE); | 
|  | reverse_bytes(sigstruct->modulus, SGX_MODULUS_SIZE); | 
|  |  | 
|  | EVP_MD_CTX_destroy(ctx); | 
|  | RSA_free(key); | 
|  | return true; | 
|  |  | 
|  | err: | 
|  | if (ctx) | 
|  | EVP_MD_CTX_destroy(ctx); | 
|  | RSA_free(key); | 
|  | return false; | 
|  | } |