summaryrefslogtreecommitdiff
path: root/src/tspi/daa/daa_debug.c
blob: d39273bfb03e5f1bea5a23d8d2823aa34b6001fb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294


/********************************************************************************************
*   KEY PAIR WITH PROOF
********************************************************************************************/

int
save_KEY_PAIR_WITH_PROOF(FILE *file,
                         KEY_PAIR_WITH_PROOF_internal *key_pair_with_proof)
{
        save_DAA_PK_internal( file,  key_pair_with_proof->pk);
        save_DAA_PRIVATE_KEY( file, key_pair_with_proof->private_key);
        save_DAA_PK_PROOF_internal( file, key_pair_with_proof->proof);

        return 0;
}

KEY_PAIR_WITH_PROOF_internal *
load_KEY_PAIR_WITH_PROOF(FILE *file)
{
        KEY_PAIR_WITH_PROOF_internal *key_pair_with_proof =
                (KEY_PAIR_WITH_PROOF_internal *)malloc(sizeof(KEY_PAIR_WITH_PROOF_internal));

        key_pair_with_proof->pk = load_DAA_PK_internal(file);
        key_pair_with_proof->private_key = load_DAA_PRIVATE_KEY(file);
        key_pair_with_proof->proof = load_DAA_PK_PROOF_internal(file);

        return key_pair_with_proof;
}

int
save_DAA_PK_internal(FILE *file, const TSS_DAA_PK_internal *pk_internal)
{
        char *buffer;

        LogDebug("-> save_DAA_PK_internal");

        BI_SAVE( pk_internal->modulus, file);
        BI_SAVE( pk_internal->capitalS, file);
        BI_SAVE( pk_internal->capitalZ, file);
        BI_SAVE( pk_internal->capitalR0, file);
        BI_SAVE( pk_internal->capitalR1, file);
        BI_SAVE( pk_internal->gamma, file);
        BI_SAVE( pk_internal->capitalGamma, file);
        BI_SAVE( pk_internal->rho, file);
        BI_SAVE_ARRAY( pk_internal->capitalRReceiver, file);
        BI_SAVE_ARRAY( pk_internal->capitalRIssuer, file);
        fprintf( file, "%d\n", pk_internal->issuerBaseNameLength);
        buffer = (char *)malloc( pk_internal->issuerBaseNameLength + 1);
        memcpy( buffer, pk_internal->issuerBaseName, pk_internal->issuerBaseNameLength);
        buffer[ pk_internal->issuerBaseNameLength] = 0;
        fprintf( file, "%s\n", buffer);
        free( buffer);

        LogDebug("<- save_DAA_PK_internal");

        return 0;
}

TSS_DAA_PK_internal *
load_DAA_PK_internal(FILE *file)
{
        TSS_DAA_PK_internal *pk_internal =
                (TSS_DAA_PK_internal *)malloc(sizeof(TSS_DAA_PK_internal));
        char *read_buffer;

        pk_internal->modulus = bi_new_ptr();
        BI_LOAD( pk_internal->modulus, file);
        pk_internal->capitalS = bi_new_ptr();
        BI_LOAD( pk_internal->capitalS, file);
        pk_internal->capitalZ = bi_new_ptr();
        BI_LOAD( pk_internal->capitalZ, file);
        pk_internal->capitalR0 = bi_new_ptr();
        BI_LOAD( pk_internal->capitalR0, file);
        pk_internal->capitalR1 = bi_new_ptr();
        BI_LOAD( pk_internal->capitalR1, file);
        pk_internal->gamma = bi_new_ptr();
        BI_LOAD( pk_internal->gamma, file);
        pk_internal->capitalGamma = bi_new_ptr();
        BI_LOAD( pk_internal->capitalGamma, file);
        pk_internal->rho = bi_new_ptr();
        BI_LOAD( pk_internal->rho, file);
        pk_internal->capitalRReceiver = ALLOC_BI_ARRAY();
        BI_LOAD_ARRAY( pk_internal->capitalRReceiver, file);
        pk_internal->capitalRIssuer = ALLOC_BI_ARRAY();
        BI_LOAD_ARRAY( pk_internal->capitalRIssuer, file);
        pk_internal->capitalY = ALLOC_BI_ARRAY();
        populate_capitalY( pk_internal);
        pk_internal->issuerBaseNameLength = read_int( file);
        read_buffer = read_str( file);
        pk_internal->issuerBaseName = malloc( pk_internal->issuerBaseNameLength);
        memcpy( pk_internal->issuerBaseName, read_buffer, pk_internal->issuerBaseNameLength);
        compute_capitalSprime( pk_internal);
        return pk_internal;
}

int
save_DAA_PK_PROOF_internal(FILE *file, TSS_DAA_PK_PROOF_internal *proof)
{
        int i;

#ifdef DAA_DEBUG
        printf("save_DAA_PK_PROOF_internal");
#endif
        fprintf(file, "%d # %s.length\n", proof->length_challenge, "challenge");
        fprintf(file, "%s\n", dump_byte_array( proof->length_challenge,
                proof->challenge));
        fprintf(file, "%d # %s.length\n", proof->length_response, "response");
        for (i = 0; i < proof->length_response; i++) {
                BI_SAVE_ARRAY( proof->response[i], file);
        }

        return 0;
}

/* load <proof> using <filename> */
/* allocation of: */
/*              proof->challenge (BYTE*) */
/*              response (bi_array_ptr) */
TSS_DAA_PK_PROOF_internal *
load_DAA_PK_PROOF_internal(FILE *file)
{
        TSS_DAA_PK_PROOF_internal *proof =
                (TSS_DAA_PK_PROOF_internal *)malloc(sizeof(TSS_DAA_PK_PROOF_internal));
        char *read_buffer;
        int  i;

#ifdef DAA_DEBUG
        printf("load_DAA_PK_PROOF_internal");
#endif
        proof->length_challenge = read_int( file);
        read_buffer = read_str( file);
        proof->challenge = retrieve_byte_array( &(proof->length_challenge),read_buffer);
        proof->length_response = read_int( file);
        proof->response = (bi_array_ptr *)malloc( sizeof(bi_array_ptr) * proof->length_response);
        for (i = 0; i < proof->length_response; i++) {
                proof->response[i] = ALLOC_BI_ARRAY();
                BI_LOAD_ARRAY( proof->response[i], file);
        }
        return proof;
}

TSS_DAA_CRED_ISSUER *
load_TSS_DAA_CRED_ISSUER(FILE *file)
{
        TSS_DAA_CRED_ISSUER *credential =
                (TSS_DAA_CRED_ISSUER *)malloc(sizeof(TSS_DAA_CRED_ISSUER));
        char *read_buffer;
        int  i, len;

        init_tss_version( credential);
        credential->capitalALength = read_int( file);
        read_buffer = read_str( file);
        credential->capitalA = retrieve_byte_array( &(credential->capitalALength),
                                                read_buffer);
        credential->eLength = read_int( file);
        read_buffer = read_str( file);
        credential->e = retrieve_byte_array( &(credential->eLength),read_buffer);
        credential->vPrimePrimeLength = read_int( file);
        read_buffer = read_str( file);
        credential->vPrimePrime = retrieve_byte_array(&(credential->vPrimePrimeLength),
                                                        read_buffer);
        // attributes issuer
        credential->attributesIssuerLength = read_int( file);
        credential->attributesIssuer = malloc(credential->attributesIssuerLength*sizeof(BYTE*));
        for( i=0; i < (int)credential->attributesIssuerLength; i++) {
                credential->attributesIssuer[i] = retrieve_byte_array( &len, read_buffer);
        }
        credential->cPrimeLength = read_int( file);
        read_buffer = read_str( file);
        credential->cPrime = retrieve_byte_array( &(credential->cPrimeLength),read_buffer);
        credential->sELength = read_int( file);
        read_buffer = read_str( file);
        credential->sE = retrieve_byte_array( &(credential->sELength),read_buffer);
        return credential;
}

int
save_TSS_DAA_CRED_ISSUER(FILE *file, TSS_DAA_CRED_ISSUER *credential)
{
        int i;

        fprintf(file, "%d # %s.length\n", credential->capitalALength, "capitalA");
        fprintf(file, "%s\n", dump_byte_array( credential->capitalALength,
                                                credential->capitalA));
        fprintf(file, "%d # %s.length\n", credential->eLength, "e");
        fprintf(file, "%s\n", dump_byte_array( credential->eLength,
                                                credential->e));
        fprintf(file, "%d # %s.length\n", credential->vPrimePrimeLength, "vPrimePrime");
        fprintf(file, "%s\n", dump_byte_array( credential->vPrimePrimeLength,
                                                credential->vPrimePrime));
        fprintf(file, "%d # %s\n", credential->attributesIssuerLength, "attributesIssuerLength");
        for( i=0; i < (int)credential->attributesIssuerLength; i++) {
                fprintf(file, "%s\n", dump_byte_array( DAA_PARAM_SIZE_F_I / 8,
                                                        credential->attributesIssuer[i]));

        }
        fprintf(file, "%d # %s.length\n", credential->cPrimeLength, "cPrime");
        fprintf(file, "%s\n", dump_byte_array( credential->cPrimeLength,
                                                credential->cPrime));
        fprintf(file, "%d # %s.length\n", credential->sELength, "sE");
        fprintf(file, "%s\n", dump_byte_array( credential->sELength,
                                                credential->sE));
        return 0;
}

TSS_DAA_CREDENTIAL *
load_TSS_DAA_CREDENTIAL(FILE *file)
{
        TSS_DAA_CREDENTIAL *credential =
                (TSS_DAA_CREDENTIAL *)malloc(sizeof(TSS_DAA_CREDENTIAL));
        char *read_buffer;
        int  i, len;
        TSS_DAA_PK_internal *pk_internal;
        TSS_DAA_PK *pk;

        init_tss_version( credential);
        credential->capitalALength = read_int( file);
        read_buffer = read_str( file);
        credential->capitalA = retrieve_byte_array( &(credential->capitalALength),
                                                read_buffer);
        credential->exponentLength = read_int( file);
        read_buffer = read_str( file);
        credential->exponent = retrieve_byte_array( &(credential->exponentLength),
                                                read_buffer);
        credential->vBar0Length = read_int( file);
        read_buffer = read_str( file);
        credential->vBar0 = retrieve_byte_array(&(credential->vBar0Length),
                                                read_buffer);
        credential->vBar1Length = read_int( file);
        read_buffer = read_str( file);
        credential->vBar1 = retrieve_byte_array(&(credential->vBar1Length),
                                                read_buffer);
        // attributes issuer
        credential->attributesLength = read_int( file);
        printf("attributesLength=%d\n", credential->attributesLength);
        credential->attributes = malloc(credential->attributesLength * sizeof( BYTE *));
        for( i=0; i < (int)credential->attributesLength; i++) {
                read_buffer = read_str( file);
                credential->attributes[i] = retrieve_byte_array( &len, read_buffer);
                if( len != DAA_PARAM_SIZE_F_I / 8) {
                        LogError("Error when parsing attributes");
                        LogError("\tattribute length:%d", len);
                        LogError("\texpected length:%d", DAA_PARAM_SIZE_F_I / 8);
                        return NULL;
                }
        }
        pk_internal = load_DAA_PK_internal( file);
        pk = i_2_e_TSS_DAA_PK( pk_internal, &normal_malloc, (TSS_HOBJECT)NULL);
        memcpy( &(credential->issuerPK), pk, sizeof(TSS_DAA_PK));
        free( pk);
        free_TSS_DAA_PK_internal( pk_internal);
        credential->tpmSpecificEncLength = read_int( file);
        read_buffer = read_str( file);
        credential->tpmSpecificEnc = retrieve_byte_array( &(credential->tpmSpecificEncLength),
                                                        read_buffer);
        credential->daaCounter = read_int( file);
        return credential;
}

int
save_TSS_DAA_CREDENTIAL(FILE *file,
                        TSS_DAA_CREDENTIAL *credential)
{
        int i;
        TSS_DAA_PK_internal *pk_internal;

        fprintf(file, "%d # %s.length\n", credential->capitalALength, "capitalA");
        fprintf(file, "%s\n", dump_byte_array( credential->capitalALength,
                                                credential->capitalA));
        fprintf(file, "%d # %s.length\n", credential->exponentLength, "exponent");
        fprintf(file, "%s\n", dump_byte_array( credential->exponentLength,
                                                credential->exponent));
        fprintf(file, "%d # %s.length\n", credential->vBar0Length, "vBar0");
        fprintf(file, "%s\n", dump_byte_array( credential->vBar0Length,
                                                credential->vBar0));
        fprintf(file, "%d # %s.length\n", credential->vBar1Length, "vBar1");
        fprintf(file, "%s\n", dump_byte_array( credential->vBar1Length,
                                                credential->vBar1));
        fprintf(file, "%d # %s\n", credential->attributesLength, "attributesLength");
        for( i=0; i < (int)credential->attributesLength; i++) {
                fprintf(file, "%s\n", dump_byte_array( DAA_PARAM_SIZE_F_I / 8,
                                                        credential->attributes[i]));
        }
        pk_internal = e_2_i_TSS_DAA_PK( &(credential->issuerPK) );
        save_DAA_PK_internal( file, pk_internal);
        free_TSS_DAA_PK_internal( pk_internal);
        fprintf(file, "%d # %s.length\n", credential->tpmSpecificEncLength, "tpmSpecificEnc");
        fprintf(file, "%s\n", dump_byte_array( credential->tpmSpecificEncLength,
                                                credential->tpmSpecificEnc));
        fprintf(file, "%d # daaCounter\n", credential->daaCounter);
        return 0;
}