188 lines
6.3 KiB
C++
188 lines
6.3 KiB
C++
/*
|
|
* Copyright (C) 2011-2019 Intel Corporation. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
* * Neither the name of Intel Corporation nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
*/
|
|
|
|
#include <string>
|
|
#include "sgx_eid.h"
|
|
#include "EnclaveInitiator_t.h"
|
|
#include "EnclaveMessageExchange.h"
|
|
#include "error_codes.h"
|
|
#include "Utility_EnclaveInitiator.h"
|
|
#include "sgx_dh.h"
|
|
|
|
#define UNUSED(val) (void)(val)
|
|
|
|
#define RESPONDER_PRODID 1
|
|
|
|
dh_session_t g_session;
|
|
|
|
/* Function Description:
|
|
* This is ECALL routine to create ECDH session.
|
|
* When it succeeds to create ECDH session, the session context is saved in g_session.
|
|
* */
|
|
extern "C" uint32_t test_create_session()
|
|
{
|
|
return create_session(&g_session);
|
|
}
|
|
|
|
/* Function Description:
|
|
* This is ECALL routine to transfer message with ECDH peer
|
|
* */
|
|
uint32_t test_message_exchange()
|
|
{
|
|
ATTESTATION_STATUS ke_status = SUCCESS;
|
|
uint32_t target_fn_id, msg_type;
|
|
char* marshalled_inp_buff;
|
|
size_t marshalled_inp_buff_len;
|
|
char* out_buff;
|
|
size_t out_buff_len;
|
|
size_t max_out_buff_size;
|
|
char* secret_response;
|
|
uint32_t secret_data;
|
|
|
|
target_fn_id = 0;
|
|
msg_type = MESSAGE_EXCHANGE;
|
|
max_out_buff_size = 50; // it's assumed the maximum payload size in response message is 50 bytes, it's for demontration purpose
|
|
secret_data = 0x12345678; //Secret Data here is shown only for purpose of demonstration.
|
|
|
|
//Marshals the secret data into a buffer
|
|
ke_status = marshal_message_exchange_request(target_fn_id, msg_type, secret_data, &marshalled_inp_buff, &marshalled_inp_buff_len);
|
|
if(ke_status != SUCCESS)
|
|
{
|
|
return ke_status;
|
|
}
|
|
|
|
//Core Reference Code function
|
|
ke_status = send_request_receive_response(&g_session, marshalled_inp_buff,
|
|
marshalled_inp_buff_len, max_out_buff_size, &out_buff, &out_buff_len);
|
|
if(ke_status != SUCCESS)
|
|
{
|
|
SAFE_FREE(marshalled_inp_buff);
|
|
SAFE_FREE(out_buff);
|
|
return ke_status;
|
|
}
|
|
|
|
//Un-marshal the secret response data
|
|
ke_status = umarshal_message_exchange_response(out_buff, &secret_response);
|
|
if(ke_status != SUCCESS)
|
|
{
|
|
SAFE_FREE(marshalled_inp_buff);
|
|
SAFE_FREE(out_buff);
|
|
return ke_status;
|
|
}
|
|
|
|
SAFE_FREE(marshalled_inp_buff);
|
|
SAFE_FREE(out_buff);
|
|
SAFE_FREE(secret_response);
|
|
return SUCCESS;
|
|
}
|
|
|
|
/* Function Descriptin:
|
|
* This is ECALL interface to close secure session*/
|
|
uint32_t test_close_session()
|
|
{
|
|
ATTESTATION_STATUS ke_status;
|
|
|
|
ke_status = close_session(&g_session);
|
|
|
|
//Erase the session context
|
|
memset(&g_session, 0, sizeof(dh_session_t));
|
|
return ke_status;
|
|
}
|
|
|
|
/* Function Description:
|
|
* This is to verify peer enclave's identity.
|
|
* For demonstration purpose, we verify below points:
|
|
* 1. peer enclave's MRSIGNER is as expected
|
|
* 2. peer enclave's PROD_ID is as expected
|
|
* 3. peer enclave's attribute is reasonable: it's INITIALIZED'ed enclave; in non-debug build configuraiton, the enlave isn't loaded with enclave debug mode.
|
|
**/
|
|
extern "C" uint32_t verify_peer_enclave_trust(sgx_dh_session_enclave_identity_t* peer_enclave_identity)
|
|
{
|
|
if (!peer_enclave_identity)
|
|
return INVALID_PARAMETER_ERROR;
|
|
// check peer enclave's MRSIGNER
|
|
|
|
// check peer enclave's product ID and enclave attribute (should be INITIALIZED'ed)
|
|
if ( !(peer_enclave_identity->attributes.flags & SGX_FLAGS_INITTED))
|
|
{
|
|
return ENCLAVE_TRUST_ERROR;
|
|
}
|
|
|
|
// check the enclave isn't loaded in enclave debug mode, except that the project is built for debug purpose
|
|
|
|
return SUCCESS;
|
|
}
|
|
|
|
/* Function Desciption: Operates on the input secret and generate the output secret
|
|
* */
|
|
uint32_t get_message_exchange_response(uint32_t inp_secret_data)
|
|
{
|
|
uint32_t secret_response;
|
|
|
|
//User should use more complex encryption method to protect their secret, below is just a simple example
|
|
secret_response = inp_secret_data & 0x11111111;
|
|
|
|
return secret_response;
|
|
|
|
}
|
|
|
|
//Generates the response from the request message
|
|
/* Function Description:
|
|
* process request message and generate response
|
|
* Parameter Descriptin:
|
|
* [input] decrypted_data: this is pointer to decrypted message
|
|
* [output] resp_buffer: this is pointer to response message, the buffer is allocated inside this function
|
|
* [output] resp_length: this points to response length
|
|
* */
|
|
extern "C" uint32_t message_exchange_response_generator(char* decrypted_data,
|
|
char** resp_buffer,
|
|
size_t* resp_length)
|
|
{
|
|
ms_in_msg_exchange_t *ms;
|
|
uint32_t inp_secret_data;
|
|
uint32_t out_secret_data;
|
|
if(!decrypted_data || !resp_length)
|
|
{
|
|
return INVALID_PARAMETER_ERROR;
|
|
}
|
|
ms = (ms_in_msg_exchange_t *)decrypted_data;
|
|
|
|
if(umarshal_message_exchange_request(&inp_secret_data,ms) != SUCCESS)
|
|
return ATTESTATION_ERROR;
|
|
|
|
out_secret_data = get_message_exchange_response(inp_secret_data);
|
|
|
|
if(marshal_message_exchange_response(resp_buffer, resp_length, out_secret_data) != SUCCESS)
|
|
return MALLOC_ERROR;
|
|
|
|
return SUCCESS;
|
|
}
|