📄 bsg.c
字号:
// ===================================================================// // Copyright (c) 2005, Intel Corp.// All rights reserved.//// Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions // are met://// * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer.// * Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following // disclaimer in the documentation and/or other materials provided // with the distribution.// * Neither the name of Intel Corporation nor the names of its // contributors may be used to endorse or promote products derived// from this software without specific prior written permission.//// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS // FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE // COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES// (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR // SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)// HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, // STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) // ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED// OF THE POSSIBILITY OF SUCH DAMAGE.// ===================================================================// // bsg.cpp// // This file will handle all the TPM Byte Stream functions// // ==================================================================#include <stdio.h>#include <string.h>#include <stdarg.h>#include <malloc.h>#include "tcg.h"#include "crypto.h"#include "bsg.h"#include "log.h"static int g_log_recursion_level = 0;// a largest buffer size. if we get a buf size bigger than this when unpacking,// will complain!#define BSG_MAX_BUF_SIZE (1<<18)#define bsglog(fmt, ...) do { \ int __i; \ for (__i=0; __i < g_log_recursion_level; __i++) { \ vtpmloginfomore (VTPM_LOG_BSG, "%s", " "); \ } \ vtpmloginfomore (VTPM_LOG_BSG, fmt, __VA_ARGS__); \ } while (0)// FIXME: trigger the selfcheck--need to use glibc hook to do this//BOOL dummy1 = BSG_static_selfcheck();// Interpretting Types// -------------------// // Incoming Types are composed of two parts {format, info} squished into a// BSG_UINT32. The first 4 bits is a format spec indicating what type of// data it is. If the first 4 bits are zero the info corresponds to a value in// BSG_s_fmt[]. This is a structure whose composition is described in// BSG_s_fmt[]. If the value is non-zero, info corresponds to the size of the// data (in bytes) being passed in. For example a UINT32 being passed in would// have a format of (__FMT_CONST | 4). If both, the format and info are zero,// this is interpretted as the end of the structure, and the result is returned.// these flags are mutually exclusive, so I'll just make them// format values which indicate the semantics of the 'info' part and the source// data. The above description has been accordingly adjusted.// format values for determining what type of data the incoming type is// it's a 4 bit value, occupying the high 4 bits#define __FMT_CONST (1UL << 28) // Constant sized value#define __FMT_DATA (2UL << 28) // Believed to be raw data NOT {size,data}#define __FMT_SIZE (3UL << 28) // A size. Used in FMT_SIZE??_DATA.#define __FMT_HSIZE (4UL << 28) // A number of handles#define __FMT_PACKED (5UL << 28) // 'info' is unused; the source data consists // of {size32, data} but we're to pack only the // data as that is already packed, and so // can/must be unpacked without // explicitly reading it size#define __FMT_MASK 0x0FFFFFFFUL // this masks out the 4-bit format#define __FMT_MASK_SIZE(type) ((type) & __FMT_MASK)#define __FMT_MASK_FORMAT(type) ((type) & (~__FMT_MASK))// constant (8/16/32-bits)#define FMT_U8 (__FMT_CONST | 1UL)#define FMT_U16 (__FMT_CONST | 2UL)#define FMT_U32 (__FMT_CONST | 4UL)// const with a compiler-computed size#define FMT_SIZEOF(type) (__FMT_CONST | sizeof(type))// other data (size bytes) // Used primarily for DIGESTS -> FMT_DATA(20)#define FMT_DATA(size) (__FMT_DATA | ((BSG_UINT32) (size) & __FMT_MASK))// 16/32-bit size followed by N bytes of data#define FMT_SIZE16_DATA (__FMT_SIZE | 2UL)#define FMT_SIZE32_DATA (__FMT_SIZE | 4UL)// 16-bit size followed by N key handles#define FMT_SIZE16_HANDLES (__FMT_HSIZE | 2UL)#define DIGEST_SIZE 20 typedef BSG_UINT32 BSG_HANDLE;// TCPA_AUTH has 11 fields!#define MAX_FIELDS 11typedef struct BSG_Format{ BSG_Type type; const char* name; BSG_UINT32 fields[MAX_FIELDS + 1];} BSG_Format;/* * TCPA structure data formats */// this has to be manually kept in sync with the// Type enum!! the static_selfcheck() function should be used regularly!static BSG_Format s_fmt[] ={ {BSG_TYPE_UINT32, "BSG_TYPE_UINT32", {FMT_U32, 0}}, {BSG_TYPE_UINT16, "BSG_TYPE_UINT16", {FMT_U16, 0}}, {BSG_TYPE_BYTE, "BSG_TYPE_BYTE", {FMT_U8, 0}}, {BSG_TYPE_BOOL, "BSG_TYPE_BOOL", {FMT_U8, 0}}, {BSG_TPM_SIZE32_DATA, "BSG_TPM_SIZE32_DATA", {FMT_SIZE32_DATA, 0}}, {BSG_TPM_TAG, "BSG_TPM_TAG", {FMT_SIZEOF(TPM_TAG), 0}}, {BSG_TPM_HANDLE, "BSG_TPM_HANDLE", {FMT_SIZEOF(TPM_HANDLE), 0}}, {BSG_TPM_RESULT, "BSG_TPM_RESULT", {FMT_SIZEOF(TPM_RESULT), 0}}, {BSG_TPM_RESOURCE_TYPE, "BSG_TPM_RESOURCE_TYPE", {FMT_SIZEOF(TPM_RESOURCE_TYPE), 0}}, {BSG_TPM_COMMAND_CODE, "BSG_TPM_COMMAND_CODE", {FMT_U32, 0}}, {BSG_TPM_AUTH_DATA_USAGE, "BSG_TPM_AUTH_DATA_USAGE", {FMT_U8, 0}}, {BSG_TPM_ALGORITHM_ID, "BSG_TPM_ALGORITHM_ID", {FMT_U32, 0}}, {BSG_TPM_PROTOCOL_ID, "BSG_TPM_PROTOCOL_ID", {FMT_SIZEOF(TPM_PROTOCOL_ID), 0}}, {BSG_TPM_KEY_USAGE, "BSG_TPM_KEY_USAGE", {FMT_U16, 0}}, {BSG_TPM_ENC_SCHEME, "BSG_TPM_ENC_SCHEME", {FMT_U16, 0}}, {BSG_TPM_SIG_SCHEME, "BSG_TPM_SIG_SCHEME", {FMT_U16, 0}}, {BSG_TPM_MIGRATE_SCHEME, "BSG_TPM_MIGRATE_SCHEME", {FMT_U16, 0}}, {BSG_TPM_KEY_FLAGS, "BSG_TPM_KEY_FLAGS", {FMT_U32, 0}}, {BSG_TPM_AUTHDATA, "BSG_TPM_AUTHDATA", {FMT_DATA(DIGEST_SIZE), 0}}, {BSG_TPM_SECRET, "BSG_TPM_SECRET", {BSG_TPM_AUTHDATA, 0}}, {BSG_TPM_ENCAUTH, "BSG_TPM_ENCAUTH", {BSG_TPM_AUTHDATA, 0}}, {BSG_TPM_PAYLOAD_TYPE, "BSG_TPM_PAYLOAD_TYPE", {FMT_SIZEOF(TPM_PAYLOAD_TYPE), 0}}, {BSG_TPM_VERSION, "BSG_TPM_VERSION", {FMT_DATA(4), 0}}, // vers 1.2 {BSG_TPM_DIGEST, "BSG_TPM_DIGEST", {FMT_DATA(DIGEST_SIZE), 0}}, {BSG_TPM_COMPOSITE_HASH, "BSG_TPM_COMPOSITE_HASH", {BSG_TPM_DIGEST, 0}}, {BSG_TPM_CHOSENID_HASH, "BSG_TPM_CHOSENID_HASH", {BSG_TPM_DIGEST, 0}}, {BSG_TPM_NONCE, "BSG_TPM_NONCE", {FMT_DATA(DIGEST_SIZE), 0}}, {BSG_TPM_KEY_HANDLE, "BSG_TPM_KEY_HANDLE", {FMT_SIZEOF(TPM_KEY_HANDLE), 0}}, {BSG_TPM_KEY_HANDLE_LIST, "BSG_TPM_KEY_HANDLE_LIST", {FMT_SIZE16_HANDLES, 0}}, {BSG_TPM_KEY_PARMS, "BSG_TPM_KEY_PARMS", { BSG_TPM_ALGORITHM_ID, BSG_TPM_ENC_SCHEME, BSG_TPM_SIG_SCHEME, FMT_SIZE32_DATA, 0}}, {BSG_TPM_RSA_KEY_PARMS, "BSG_TPM_RSA_KEY_PARMS", { FMT_U32, FMT_U32, FMT_SIZE32_DATA, 0}}, {BSG_TPM_STORE_PUBKEY, "BSG_TPM_STORE_PUBKEY", {FMT_SIZE32_DATA, 0}}, {BSG_TPM_PUBKEY, "BSG_TPM_PUBKEY", {BSG_TPM_KEY_PARMS, BSG_TPM_STORE_PUBKEY, 0}}, {BSG_TPM_KEY, "BSG_TPM_KEY", { BSG_TPM_VERSION, BSG_TPM_KEY_USAGE, BSG_TPM_KEY_FLAGS, BSG_TPM_AUTH_DATA_USAGE, BSG_TPM_KEY_PARMS, FMT_SIZE32_DATA, // the PCR_INFO BSG_TPM_STORE_PUBKEY, FMT_SIZE32_DATA, // the encrypted part 0}}, {BSG_TPM_MIGRATIONKEYAUTH, "BSG_TPM_MIGRATIONKEYAUTH", { BSG_TPM_PUBKEY, BSG_TPM_MIGRATE_SCHEME, BSG_TPM_DIGEST, 0}}, {BSG_TCPA_AUDIT_EVENT, "TCPA_AUDIT_EVENT", { BSG_TPM_COMMAND_CODE, BSG_TPM_RESULT, 0 }}, {BSG_TCPA_EVENT_CERT, "TCPA_EVENT_CERT", { BSG_TPM_DIGEST, BSG_TPM_DIGEST, FMT_DATA(2), FMT_SIZE32_DATA, 0}}, {BSG_TPM_PCR_SELECTION, "BSG_TPM_PCR_SELECTION", {FMT_SIZE16_DATA, 0} }, {BSG_TPM_PCR_COMPOSITE, "BSG_TPM_PCR_COMPOSITE", { BSG_TPM_PCR_SELECTION, FMT_SIZE32_DATA, 0} }, {BSG_TPM_PCR_INFO, "BSG_TPM_PCR_INFO", { BSG_TPM_PCR_SELECTION, BSG_TPM_COMPOSITE_HASH, BSG_TPM_COMPOSITE_HASH, 0} }, {BSG_TPM_STORED_DATA, "BSG_TPM_STORED_DATA", { BSG_TPM_VERSION, FMT_SIZE32_DATA, FMT_SIZE32_DATA, 0}}, {BSG_TPM_SYMMETRIC_KEY, "BSG_TPM_SYMMETRIC_KEY", { BSG_TPM_ALGORITHM_ID, BSG_TPM_ENC_SCHEME, FMT_SIZE16_DATA, 0}}, {BSG_TPM_STORE_PRIVKEY, "BSG_TPM_STORE_PRIVKEY", {FMT_SIZE32_DATA, 0}}, {BSG_TPM_STORE_ASYMKEY, "BSG_TPM_STORE_ASYMKEY", { BSG_TPM_PAYLOAD_TYPE, BSG_TPM_SECRET, BSG_TPM_SECRET, BSG_TPM_DIGEST, BSG_TPM_STORE_PRIVKEY, 0}}, {BSG_TPM_MIGRATE_ASYMKEY, "BSG_TPM_MIGRATE_ASYMKEY", { BSG_TPM_PAYLOAD_TYPE, BSG_TPM_SECRET, BSG_TPM_DIGEST, FMT_U32, BSG_TPM_STORE_PRIVKEY, 0}}, {BSG_TPM_QUOTE_INFO, "BSG_TPM_QUOTE_INFO", { BSG_TPM_VERSION, FMT_DATA(4), BSG_TPM_COMPOSITE_HASH, BSG_TPM_NONCE, 0}}, {BSG_TPM_IDENTITY_CONTENTS, "BSG_TPM_IDENTITY_CONTENTS", { BSG_TPM_VERSION, FMT_U32, BSG_TPM_CHOSENID_HASH, BSG_TPM_PUBKEY, 0}}, {BSG_TPM_PCRVALUE, "BSG_TPM_PCRVALUE", {FMT_DATA(DIGEST_SIZE), 0}}, {BSG_TCPA_PCR_FLAGS, "TCPA_PCR_FLAGS", { FMT_U8, FMT_U8, 0}}, {BSG_TCS_AUTH, "TCS_AUTH", { BSG_TYPE_UINT32, BSG_TPM_NONCE, BSG_TPM_NONCE, BSG_TYPE_BOOL, BSG_TPM_AUTHDATA, 0}}, {BSG_TPM_KEY_NONSENSITIVE, "BSG_TPM_KEY_NONSENSITIVE", { BSG_TPM_VERSION, BSG_TPM_KEY_USAGE, BSG_TPM_KEY_FLAGS, BSG_TPM_AUTH_DATA_USAGE, BSG_TPM_KEY_PARMS, FMT_SIZE32_DATA, BSG_TPM_STORE_PUBKEY, 0}}, {BSG_PACKED, "BSG_PACKED", { __FMT_PACKED, 0 }}, {BSG_TYPE_MAX, "", {0}},};static const BSG_Format* find_format (BSG_Type t) { BSG_Format * f = s_fmt; if (t >= BSG_TYPE_MAX) { return NULL; } // WARNING: this depends on the enum and s_fmt[] array being in sync! make // sure to run the static_selfcheck() to make sure f = s_fmt + (t - BSG_TYPE_FIRST); return f;}//// a consistency-checking routine which can be run at compile time// (ie. immediately after compilation)//// tasks:// - verify that s_fmt has one entry per Type t, and that entry is at s_fmt[t]//// conditions:// - need that s_fmt[0] is the first type listed in the Type enum! ie the first// Type has value 0, not 1//// FIXME: should have a function be passed in here which is called if the test// fails. Then the caller can decide what to do: abort, notify, whatever// BOOL BSG_static_selfcheck (){ int i; for (i=BSG_TYPE_FIRST; i <= BSG_TYPE_MAX; i++) { if (s_fmt[i - BSG_TYPE_FIRST].type != i) { bsglog ("%s\n", "BSG: static_selfcheck failed!\n"); bsglog ("failure at %i, allegedly %s\n", i, s_fmt[i - BSG_TYPE_FIRST].name); abort(); return FALSE; } } bsglog ("%s\n", "BSG: static_selfcheck success!"); return TRUE;}/** * Flatten a TCPA structure into a buffer in big-endian format * @type: TCPA structure type * @src: (IN) TCPA structure (OUT) end of TCPA structure * @dst: (OUT) flattened data * Returns: Flattened size or -1 for unknown types */// make it so that it can just run through the whole process and return// the packed size, without packing anything. this will be done if dst is NULL.static int BSG_Pack_private(BSG_Type type, const BSG_BYTE** src, BSG_BYTE* dst){ // check incoming parameters if (*src == NULL) return 0; const BSG_BYTE* s = *src; BSG_BYTE* d = dst; BSG_UINT32 size = __FMT_MASK_SIZE(type); BSG_UINT32 format = __FMT_MASK_FORMAT(type); if (format == __FMT_CONST) // We are dealing with a fixed length value eg. UINT32 { BSG_UINT32 val = 0; switch (size) { case 1: val = * (BYTE*) s; break; case 2: val = * (unsigned short*) s; break; case 4: val = * (BSG_UINT32*) s; break; } if (dst) BSG_PackConst(val, size, d); s += size; d += size; } else if (format == __FMT_DATA) { // We are dealing with raw data. Not sure when // this is used. if (dst) { bsglog ("BSG: __FMT_DATA size %d, src %p, dst %p\n", size, s, d); memcpy(d, s, size); } s += size; d += size; } else if (format == __FMT_SIZE || format == __FMT_HSIZE) { // It's a size, followed by that much data or handles BSG_UINT32 psize = 0; switch (size) { case 1: psize = * (BYTE*) s; break; case 2: psize = * (unsigned short*) s; break; case 4: psize = * (BSG_UINT32*) s; break; } if (dst) BSG_PackConst(psize, size, d); s += size; d += size; // now 's' points to an address, so cast it to BSG_BYTE** const BSG_BYTE* pdata = * ((BSG_BYTE**) s); s += sizeof(BSG_BYTE*); if (format == __FMT_HSIZE) {// This is a list of psize Handles if (dst) { BSG_HANDLE* d2 = (BSG_HANDLE*) d; BSG_HANDLE* p2 = (BSG_HANDLE*) pdata; BSG_UINT32 i; for (i = 0; i < psize; i++) d2[i] = BSG_UnpackConst((BSG_BYTE*)(p2 + i), 4); } d += psize * sizeof(BSG_HANDLE); } else {// If it's not psize handles, it's psize data. if (psize > 0) { if (dst) { bsglog ("BSG: __FMT_SIZE, size=%d, src=%p, dst=%p\n",
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -