LCOV - code coverage report
Current view: top level - library/spdm_requester_lib - libspdm_req_finish.c (source / functions) Coverage Total Hit
Test: coverage.info Lines: 74.9 % 259 194
Test Date: 2025-11-02 08:10:32 Functions: 83.3 % 6 5

            Line data    Source code
       1              : /**
       2              :  *  Copyright Notice:
       3              :  *  Copyright 2021-2025 DMTF. All rights reserved.
       4              :  *  License: BSD 3-Clause License. For full text see link: https://github.com/DMTF/libspdm/blob/main/LICENSE.md
       5              :  **/
       6              : 
       7              : #include "internal/libspdm_requester_lib.h"
       8              : #include "internal/libspdm_secured_message_lib.h"
       9              : 
      10              : #if LIBSPDM_ENABLE_CAPABILITY_KEY_EX_CAP
      11              : 
      12              : #pragma pack(1)
      13              : typedef struct {
      14              :     spdm_message_header_t header;
      15              :     uint16_t opaque_length;
      16              :     uint8_t opaque_data[SPDM_MAX_OPAQUE_DATA_SIZE];
      17              :     uint8_t signature[LIBSPDM_REQ_SIGNATURE_DATA_MAX_SIZE];
      18              :     uint8_t verify_data[LIBSPDM_MAX_HASH_SIZE];
      19              : } libspdm_finish_request_mine_t;
      20              : 
      21              : typedef struct {
      22              :     spdm_message_header_t header;
      23              :     uint16_t opaque_length;
      24              :     uint8_t opaque_data[SPDM_MAX_OPAQUE_DATA_SIZE];
      25              :     uint8_t verify_data[LIBSPDM_MAX_HASH_SIZE];
      26              : } libspdm_finish_response_mine_t;
      27              : #pragma pack()
      28              : 
      29            9 : bool libspdm_verify_finish_rsp_hmac(libspdm_context_t *spdm_context,
      30              :                                     libspdm_session_info_t *session_info,
      31              :                                     const void *hmac_data, size_t hmac_data_size)
      32              : {
      33              :     size_t hash_size;
      34              :     uint8_t calc_hmac_data[LIBSPDM_MAX_HASH_SIZE];
      35              :     bool result;
      36              : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
      37              :     uint8_t slot_id;
      38              :     uint8_t *cert_chain_buffer;
      39              :     size_t cert_chain_buffer_size;
      40              :     uint8_t *mut_cert_chain_buffer;
      41              :     size_t mut_cert_chain_buffer_size;
      42              :     uint8_t *th_curr_data;
      43              :     size_t th_curr_data_size;
      44              :     libspdm_th_managed_buffer_t th_curr;
      45              :     uint8_t hash_data[LIBSPDM_MAX_HASH_SIZE];
      46              : #endif
      47              : 
      48            9 :     hash_size = libspdm_get_hash_size(spdm_context->connection_info.algorithm.base_hash_algo);
      49            9 :     LIBSPDM_ASSERT(hash_size == hmac_data_size);
      50              : 
      51              : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
      52              :     slot_id = spdm_context->connection_info.peer_used_cert_chain_slot_id;
      53              :     LIBSPDM_ASSERT((slot_id < SPDM_MAX_SLOT_COUNT) || (slot_id == 0xFF));
      54              :     if (slot_id == 0xFF) {
      55              :         result = libspdm_get_peer_public_key_buffer(
      56              :             spdm_context, (const void **)&cert_chain_buffer, &cert_chain_buffer_size);
      57              :     } else {
      58              :         result = libspdm_get_peer_cert_chain_buffer(
      59              :             spdm_context, (const void **)&cert_chain_buffer, &cert_chain_buffer_size);
      60              :     }
      61              :     if (!result) {
      62              :         return false;
      63              :     }
      64              : 
      65              :     if (session_info->mut_auth_requested != 0) {
      66              :         slot_id = spdm_context->connection_info.local_used_cert_chain_slot_id;
      67              :         LIBSPDM_ASSERT((slot_id < SPDM_MAX_SLOT_COUNT) || (slot_id == 0xFF));
      68              :         if (slot_id == 0xFF) {
      69              :             result = libspdm_get_local_public_key_buffer(
      70              :                 spdm_context, (const void **)&mut_cert_chain_buffer, &mut_cert_chain_buffer_size);
      71              :         } else {
      72              :             result = libspdm_get_local_cert_chain_buffer(
      73              :                 spdm_context, (const void **)&mut_cert_chain_buffer, &mut_cert_chain_buffer_size);
      74              :         }
      75              :         if (!result) {
      76              :             return false;
      77              :         }
      78              :     } else {
      79              :         mut_cert_chain_buffer = NULL;
      80              :         mut_cert_chain_buffer_size = 0;
      81              :     }
      82              : 
      83              :     result = libspdm_calculate_th_for_finish(
      84              :         spdm_context, session_info, cert_chain_buffer,
      85              :         cert_chain_buffer_size, mut_cert_chain_buffer,
      86              :         mut_cert_chain_buffer_size, &th_curr);
      87              :     if (!result) {
      88              :         return false;
      89              :     }
      90              :     th_curr_data = libspdm_get_managed_buffer(&th_curr);
      91              :     th_curr_data_size = libspdm_get_managed_buffer_size(&th_curr);
      92              : 
      93              :     result = libspdm_hash_all (spdm_context->connection_info.algorithm.base_hash_algo,
      94              :                                th_curr_data, th_curr_data_size, hash_data);
      95              :     if (!result) {
      96              :         return false;
      97              :     }
      98              : 
      99              :     result = libspdm_hmac_all_with_response_finished_key(
     100              :         session_info->secured_message_context, hash_data,
     101              :         hash_size, calc_hmac_data);
     102              :     if (!result) {
     103              :         return false;
     104              :     }
     105              : #else
     106            9 :     result = libspdm_calculate_th_hmac_for_finish_rsp(
     107              :         spdm_context, session_info, &hash_size, calc_hmac_data);
     108            9 :     if (!result) {
     109            0 :         return false;
     110              :     }
     111              : #endif
     112            9 :     LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "th_curr hmac - "));
     113            9 :     LIBSPDM_INTERNAL_DUMP_DATA(calc_hmac_data, hash_size);
     114            9 :     LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "\n"));
     115              : 
     116            9 :     if (!libspdm_consttime_is_mem_equal(calc_hmac_data, hmac_data, hash_size)) {
     117            2 :         LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "!!! verify_finish_rsp_hmac - FAIL !!!\n"));
     118            2 :         return false;
     119              :     }
     120            7 :     LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "!!! verify_finish_rsp_hmac - PASS !!!\n"));
     121              : 
     122            7 :     return true;
     123              : }
     124              : 
     125           38 : bool libspdm_generate_finish_req_hmac(libspdm_context_t *spdm_context,
     126              :                                       libspdm_session_info_t *session_info,
     127              :                                       void *hmac)
     128              : {
     129              :     size_t hash_size;
     130              :     uint8_t calc_hmac_data[LIBSPDM_MAX_HASH_SIZE];
     131              :     bool result;
     132              : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
     133              :     uint8_t slot_id;
     134              :     uint8_t *cert_chain_buffer;
     135              :     size_t cert_chain_buffer_size;
     136              :     uint8_t *mut_cert_chain_buffer;
     137              :     size_t mut_cert_chain_buffer_size;
     138              :     uint8_t *th_curr_data;
     139              :     size_t th_curr_data_size;
     140              :     libspdm_th_managed_buffer_t th_curr;
     141              :     uint8_t hash_data[LIBSPDM_MAX_HASH_SIZE];
     142              : #endif
     143              : 
     144           38 :     hash_size = libspdm_get_hash_size(spdm_context->connection_info.algorithm.base_hash_algo);
     145              : 
     146              : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
     147              :     slot_id = spdm_context->connection_info.peer_used_cert_chain_slot_id;
     148              :     LIBSPDM_ASSERT((slot_id < SPDM_MAX_SLOT_COUNT) || (slot_id == 0xFF));
     149              :     if (slot_id == 0xFF) {
     150              :         result = libspdm_get_peer_public_key_buffer(
     151              :             spdm_context, (const void **)&cert_chain_buffer, &cert_chain_buffer_size);
     152              :     } else {
     153              :         result = libspdm_get_peer_cert_chain_buffer(
     154              :             spdm_context, (const void **)&cert_chain_buffer, &cert_chain_buffer_size);
     155              :     }
     156              :     if (!result) {
     157              :         return false;
     158              :     }
     159              : 
     160              :     if (session_info->mut_auth_requested != 0) {
     161              :         slot_id = spdm_context->connection_info.local_used_cert_chain_slot_id;
     162              :         LIBSPDM_ASSERT((slot_id < SPDM_MAX_SLOT_COUNT) || (slot_id == 0xFF));
     163              :         if (slot_id == 0xFF) {
     164              :             result = libspdm_get_local_public_key_buffer(
     165              :                 spdm_context, (const void **)&mut_cert_chain_buffer, &mut_cert_chain_buffer_size);
     166              :         } else {
     167              :             result = libspdm_get_local_cert_chain_buffer(
     168              :                 spdm_context, (const void **)&mut_cert_chain_buffer, &mut_cert_chain_buffer_size);
     169              :         }
     170              :         if (!result) {
     171              :             return false;
     172              :         }
     173              :     } else {
     174              :         mut_cert_chain_buffer = NULL;
     175              :         mut_cert_chain_buffer_size = 0;
     176              :     }
     177              : 
     178              :     result = libspdm_calculate_th_for_finish(
     179              :         spdm_context, session_info, cert_chain_buffer,
     180              :         cert_chain_buffer_size, mut_cert_chain_buffer,
     181              :         mut_cert_chain_buffer_size, &th_curr);
     182              :     if (!result) {
     183              :         return false;
     184              :     }
     185              :     th_curr_data = libspdm_get_managed_buffer(&th_curr);
     186              :     th_curr_data_size = libspdm_get_managed_buffer_size(&th_curr);
     187              : 
     188              :     result = libspdm_hash_all (spdm_context->connection_info.algorithm.base_hash_algo,
     189              :                                th_curr_data, th_curr_data_size, hash_data);
     190              :     if (!result) {
     191              :         return false;
     192              :     }
     193              : 
     194              :     result = libspdm_hmac_all_with_request_finished_key(
     195              :         session_info->secured_message_context, hash_data,
     196              :         hash_size, calc_hmac_data);
     197              :     if (!result) {
     198              :         return false;
     199              :     }
     200              : #else
     201           38 :     result = libspdm_calculate_th_hmac_for_finish_req(
     202              :         spdm_context, session_info, &hash_size, calc_hmac_data);
     203           38 :     if (!result) {
     204            0 :         return false;
     205              :     }
     206              : #endif
     207           38 :     LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "th_curr hmac - "));
     208           38 :     LIBSPDM_INTERNAL_DUMP_DATA(calc_hmac_data, hash_size);
     209           38 :     LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "\n"));
     210              : 
     211           38 :     libspdm_copy_mem(hmac, hash_size, calc_hmac_data, hash_size);
     212              : 
     213           38 :     return true;
     214              : }
     215              : 
     216              : #if LIBSPDM_ENABLE_CAPABILITY_MUT_AUTH_CAP
     217              : 
     218            5 : bool libspdm_generate_finish_req_signature(libspdm_context_t *spdm_context,
     219              :                                            libspdm_session_info_t *session_info,
     220              :                                            uint8_t slot_id,
     221              :                                            uint8_t *signature)
     222              : {
     223              :     bool result;
     224              :     size_t signature_size;
     225              : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
     226              :     uint8_t *cert_chain_buffer;
     227              :     size_t cert_chain_buffer_size;
     228              :     uint8_t *mut_cert_chain_buffer;
     229              :     size_t mut_cert_chain_buffer_size;
     230              :     uint8_t *th_curr_data;
     231              :     size_t th_curr_data_size;
     232              :     libspdm_th_managed_buffer_t th_curr;
     233              : #endif
     234              : #if !(LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT) || (LIBSPDM_DEBUG_PRINT_ENABLE)
     235              :     size_t hash_size;
     236              : #endif
     237              : #if ((LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT) && (LIBSPDM_DEBUG_BLOCK_ENABLE)) || \
     238              :     !(LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT)
     239              :     uint8_t hash_data[LIBSPDM_MAX_HASH_SIZE];
     240              : #endif
     241              : 
     242            5 :     if (spdm_context->connection_info.algorithm.req_pqc_asym_alg != 0) {
     243            0 :         signature_size = libspdm_get_req_pqc_asym_signature_size(
     244              :             spdm_context->connection_info.algorithm.req_pqc_asym_alg);
     245              :     } else {
     246            5 :         signature_size = libspdm_get_req_asym_signature_size(
     247            5 :             spdm_context->connection_info.algorithm.req_base_asym_alg);
     248              :     }
     249              : 
     250              : #if !(LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT) || (LIBSPDM_DEBUG_PRINT_ENABLE)
     251            5 :     hash_size = libspdm_get_hash_size(spdm_context->connection_info.algorithm.base_hash_algo);
     252              : #endif
     253              : 
     254              : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
     255              :     LIBSPDM_ASSERT((slot_id < SPDM_MAX_SLOT_COUNT) || (slot_id == 0xFF));
     256              :     if (slot_id == 0xFF) {
     257              :         result = libspdm_get_peer_public_key_buffer(
     258              :             spdm_context, (const void **)&cert_chain_buffer, &cert_chain_buffer_size);
     259              :     } else {
     260              :         result = libspdm_get_peer_cert_chain_buffer(
     261              :             spdm_context, (const void **)&cert_chain_buffer, &cert_chain_buffer_size);
     262              :     }
     263              :     if (!result) {
     264              :         return false;
     265              :     }
     266              : 
     267              :     slot_id = spdm_context->connection_info.local_used_cert_chain_slot_id;
     268              :     LIBSPDM_ASSERT((slot_id < SPDM_MAX_SLOT_COUNT) || (slot_id == 0xFF));
     269              :     if (slot_id == 0xFF) {
     270              :         result = libspdm_get_local_public_key_buffer(
     271              :             spdm_context, (const void **)&mut_cert_chain_buffer, &mut_cert_chain_buffer_size);
     272              :     } else {
     273              :         result = libspdm_get_local_cert_chain_buffer(
     274              :             spdm_context, (const void **)&mut_cert_chain_buffer, &mut_cert_chain_buffer_size);
     275              :     }
     276              :     if (!result) {
     277              :         return false;
     278              :     }
     279              : 
     280              :     result = libspdm_calculate_th_for_finish(
     281              :         spdm_context, session_info, cert_chain_buffer,
     282              :         cert_chain_buffer_size, mut_cert_chain_buffer,
     283              :         mut_cert_chain_buffer_size, &th_curr);
     284              :     if (!result) {
     285              :         return false;
     286              :     }
     287              :     th_curr_data = libspdm_get_managed_buffer(&th_curr);
     288              :     th_curr_data_size = libspdm_get_managed_buffer_size(&th_curr);
     289              : 
     290              :     /* Debug code only - required for debug print of th_curr below*/
     291              :     LIBSPDM_DEBUG_CODE(
     292              :         if (!libspdm_hash_all(
     293              :                 spdm_context->connection_info.algorithm.base_hash_algo,
     294              :                 th_curr_data, th_curr_data_size, hash_data)) {
     295              :         return false;
     296              :     }
     297              :         );
     298              : #else
     299            5 :     result = libspdm_calculate_th_hash_for_finish(
     300              :         spdm_context, session_info, &hash_size, hash_data);
     301            5 :     if (!result) {
     302            0 :         return false;
     303              :     }
     304              : #endif
     305            5 :     LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "th_curr hash - "));
     306            5 :     LIBSPDM_INTERNAL_DUMP_DATA(hash_data, hash_size);
     307            5 :     LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "\n"));
     308              : 
     309              : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
     310              :     result = libspdm_requester_data_sign(
     311              :         spdm_context,
     312              :         spdm_context->connection_info.version,
     313              :         libspdm_slot_id_to_key_pair_id(spdm_context, slot_id, true),
     314              :         SPDM_FINISH,
     315              :         spdm_context->connection_info.algorithm.req_base_asym_alg,
     316              :         spdm_context->connection_info.algorithm.req_pqc_asym_alg,
     317              :         spdm_context->connection_info.algorithm.base_hash_algo,
     318              :         false, th_curr_data, th_curr_data_size, signature, &signature_size);
     319              : #else
     320           10 :     result = libspdm_requester_data_sign(
     321              :         spdm_context,
     322            5 :         spdm_context->connection_info.version,
     323            5 :         libspdm_slot_id_to_key_pair_id(spdm_context, slot_id, true),
     324              :         SPDM_FINISH,
     325            5 :         spdm_context->connection_info.algorithm.req_base_asym_alg,
     326              :         spdm_context->connection_info.algorithm.req_pqc_asym_alg,
     327              :         spdm_context->connection_info.algorithm.base_hash_algo,
     328              :         true, hash_data, hash_size, signature, &signature_size);
     329              : #endif
     330            5 :     if (result) {
     331            5 :         LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "signature - "));
     332            5 :         LIBSPDM_INTERNAL_DUMP_DATA(signature, signature_size);
     333            5 :         LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "\n"));
     334              :     }
     335              : 
     336            5 :     return result;
     337              : }
     338              : #endif /* LIBSPDM_ENABLE_CAPABILITY_MUT_AUTH_CAP */
     339              : 
     340              : /**
     341              :  * This function sends FINISH and receives FINISH_RSP for SPDM finish.
     342              :  *
     343              :  * @param  spdm_context       A pointer to the SPDM context.
     344              :  * @param  session_id         session_id to the FINISH request.
     345              :  * @param  req_slot_id_param  req_slot_id_param to the FINISH request.
     346              :  **/
     347           42 : static libspdm_return_t libspdm_try_send_receive_finish(
     348              :     libspdm_context_t *spdm_context,
     349              :     uint32_t session_id,
     350              :     uint8_t req_slot_id_param,
     351              :     const void *requester_opaque_data,
     352              :     size_t requester_opaque_data_size,
     353              :     void *responder_opaque_data,
     354              :     size_t *responder_opaque_data_size)
     355              : {
     356              :     libspdm_return_t status;
     357              :     libspdm_finish_request_mine_t *spdm_request;
     358              :     size_t spdm_request_size;
     359              :     size_t signature_size;
     360              :     size_t hmac_size;
     361              :     libspdm_finish_response_mine_t *spdm_response;
     362              :     size_t spdm_response_size;
     363              :     libspdm_session_info_t *session_info;
     364              :     uint8_t *ptr;
     365              :     bool result;
     366              :     uint8_t th2_hash_data[LIBSPDM_MAX_HASH_SIZE];
     367              :     libspdm_session_state_t session_state;
     368              :     uint8_t *message;
     369              :     size_t message_size;
     370              :     size_t transport_header_size;
     371              :     size_t opaque_data_entry_size;
     372              :     size_t opaque_data_size;
     373              : 
     374              :     /* -=[Check Parameters Phase]=- */
     375           42 :     if (libspdm_get_connection_version(spdm_context) < SPDM_MESSAGE_VERSION_11) {
     376            0 :         return LIBSPDM_STATUS_UNSUPPORTED_CAP;
     377              :     }
     378              : 
     379           42 :     session_info = libspdm_get_session_info_via_session_id(spdm_context, session_id);
     380           42 :     if (session_info == NULL) {
     381            0 :         status = LIBSPDM_STATUS_INVALID_PARAMETER;
     382            0 :         goto error;
     383              :     }
     384              : 
     385              :     /* -=[Verify State Phase]=- */
     386           42 :     if (!libspdm_is_capabilities_flag_supported(
     387              :             spdm_context, true,
     388              :             SPDM_GET_CAPABILITIES_REQUEST_FLAGS_KEY_EX_CAP,
     389              :             SPDM_GET_CAPABILITIES_RESPONSE_FLAGS_KEY_EX_CAP)) {
     390            1 :         status = LIBSPDM_STATUS_UNSUPPORTED_CAP;
     391            1 :         goto error;
     392              :     }
     393              : 
     394           41 :     if (spdm_context->connection_info.connection_state < LIBSPDM_CONNECTION_STATE_NEGOTIATED) {
     395            2 :         status = LIBSPDM_STATUS_INVALID_STATE_LOCAL;
     396            2 :         goto error;
     397              :     }
     398              : 
     399           39 :     session_state = libspdm_secured_message_get_session_state(
     400              :         session_info->secured_message_context);
     401           39 :     if (session_state != LIBSPDM_SESSION_STATE_HANDSHAKING) {
     402            1 :         status = LIBSPDM_STATUS_INVALID_STATE_LOCAL;
     403            1 :         goto error;
     404              :     }
     405           38 :     if (session_info->mut_auth_requested != 0) {
     406            5 :         if ((req_slot_id_param >= SPDM_MAX_SLOT_COUNT) && (req_slot_id_param != 0xFF)) {
     407            0 :             status = LIBSPDM_STATUS_INVALID_PARAMETER;
     408            0 :             goto error;
     409              :         }
     410              :     } else {
     411           33 :         if (req_slot_id_param != 0) {
     412            0 :             status = LIBSPDM_STATUS_INVALID_PARAMETER;
     413            0 :             goto error;
     414              :         }
     415              :     }
     416              : 
     417              :     /* -=[Construct Request Phase]=- */
     418           38 :     transport_header_size = spdm_context->local_context.capability.transport_header_size;
     419           38 :     status = libspdm_acquire_sender_buffer (spdm_context, &message_size, (void **)&message);
     420           38 :     if (LIBSPDM_STATUS_IS_ERROR(status)) {
     421            0 :         goto error;
     422              :     }
     423           38 :     LIBSPDM_ASSERT (message_size >= transport_header_size +
     424              :                     spdm_context->local_context.capability.transport_tail_size);
     425           38 :     spdm_request = (void *)(message + transport_header_size);
     426           38 :     spdm_request_size = message_size - transport_header_size -
     427           38 :                         spdm_context->local_context.capability.transport_tail_size;
     428              : 
     429           38 :     LIBSPDM_ASSERT(spdm_request_size >= sizeof(spdm_request->header));
     430           38 :     spdm_request->header.spdm_version = libspdm_get_connection_version (spdm_context);
     431           38 :     spdm_request->header.request_response_code = SPDM_FINISH;
     432           38 :     spdm_request->header.param1 = 0;
     433           38 :     spdm_request->header.param2 = 0;
     434              : 
     435           38 :     ptr = (uint8_t *)spdm_request + sizeof(spdm_finish_request_t);
     436           38 :     if (libspdm_get_connection_version(spdm_context) >= SPDM_MESSAGE_VERSION_14) {
     437            1 :         if (requester_opaque_data != NULL) {
     438            0 :             LIBSPDM_ASSERT(requester_opaque_data_size <= SPDM_MAX_OPAQUE_DATA_SIZE);
     439            0 :             LIBSPDM_ASSERT (spdm_request_size >= sizeof(spdm_finish_request_t) +
     440              :                             sizeof(uint16_t) + requester_opaque_data_size);
     441              : 
     442            0 :             libspdm_write_uint16(ptr, (uint16_t)requester_opaque_data_size);
     443            0 :             ptr += sizeof(uint16_t);
     444              : 
     445            0 :             libspdm_copy_mem(ptr,
     446              :                              (spdm_request_size - (sizeof(spdm_finish_request_t) +
     447              :                                                    sizeof(uint16_t))),
     448              :                              requester_opaque_data, requester_opaque_data_size);
     449            0 :             opaque_data_size = requester_opaque_data_size;
     450              :         } else {
     451            1 :             opaque_data_size = 0;
     452            1 :             LIBSPDM_ASSERT (spdm_request_size >= sizeof(spdm_finish_request_t) +
     453              :                             sizeof(uint16_t) + opaque_data_size);
     454              : 
     455            1 :             libspdm_write_uint16(ptr, (uint16_t)opaque_data_size);
     456            1 :             ptr += sizeof(uint16_t);
     457              :         }
     458            1 :         ptr += opaque_data_size;
     459            1 :         opaque_data_entry_size = sizeof(uint16_t) + opaque_data_size;
     460              :     } else {
     461           37 :         opaque_data_entry_size = 0;
     462              :     }
     463              : 
     464           38 :     signature_size = 0;
     465              : #if LIBSPDM_ENABLE_CAPABILITY_MUT_AUTH_CAP
     466           38 :     if (session_info->mut_auth_requested != 0) {
     467            5 :         spdm_request->header.param1 = SPDM_FINISH_REQUEST_ATTRIBUTES_SIGNATURE_INCLUDED;
     468            5 :         spdm_request->header.param2 = req_slot_id_param;
     469            5 :         if (spdm_context->connection_info.algorithm.req_pqc_asym_alg != 0) {
     470            0 :             signature_size = libspdm_get_req_pqc_asym_signature_size(
     471              :                 spdm_context->connection_info.algorithm.req_pqc_asym_alg);
     472              :         } else {
     473            5 :             signature_size = libspdm_get_req_asym_signature_size(
     474            5 :                 spdm_context->connection_info.algorithm.req_base_asym_alg);
     475              :         }
     476              :     }
     477              : #endif
     478              : 
     479           38 :     spdm_context->connection_info.local_used_cert_chain_slot_id = req_slot_id_param;
     480           38 :     if ((session_info->mut_auth_requested != 0) && (req_slot_id_param != 0xFF)) {
     481            5 :         LIBSPDM_ASSERT(req_slot_id_param < SPDM_MAX_SLOT_COUNT);
     482            5 :         spdm_context->connection_info.local_used_cert_chain_buffer =
     483            5 :             spdm_context->local_context.local_cert_chain_provision[req_slot_id_param];
     484            5 :         spdm_context->connection_info.local_used_cert_chain_buffer_size =
     485            5 :             spdm_context->local_context.local_cert_chain_provision_size[req_slot_id_param];
     486              :     }
     487              : 
     488           38 :     hmac_size = libspdm_get_hash_size(spdm_context->connection_info.algorithm.base_hash_algo);
     489           38 :     LIBSPDM_ASSERT (spdm_request_size >= sizeof(spdm_finish_request_t) + opaque_data_entry_size +
     490              :                     signature_size + hmac_size);
     491           38 :     spdm_request_size = sizeof(spdm_finish_request_t) + opaque_data_entry_size +
     492           38 :                         signature_size + hmac_size;
     493              : 
     494           38 :     status = libspdm_append_message_f(spdm_context, session_info, true, (uint8_t *)spdm_request,
     495           38 :                                       spdm_request_size - signature_size - hmac_size);
     496           38 :     if (LIBSPDM_STATUS_IS_ERROR(status)) {
     497            0 :         libspdm_release_sender_buffer (spdm_context);
     498            0 :         goto error;
     499              :     }
     500              : #if LIBSPDM_ENABLE_CAPABILITY_MUT_AUTH_CAP
     501           38 :     if (session_info->mut_auth_requested != 0) {
     502            5 :         result = libspdm_generate_finish_req_signature(
     503              :             spdm_context, session_info, req_slot_id_param, ptr);
     504            5 :         if (!result) {
     505            0 :             libspdm_release_sender_buffer (spdm_context);
     506            0 :             status = LIBSPDM_STATUS_CRYPTO_ERROR;
     507            0 :             goto error;
     508              :         }
     509            5 :         status = libspdm_append_message_f(spdm_context, session_info, true, ptr, signature_size);
     510            5 :         if (LIBSPDM_STATUS_IS_ERROR(status)) {
     511            0 :             libspdm_release_sender_buffer (spdm_context);
     512            0 :             goto error;
     513              :         }
     514            5 :         ptr += signature_size;
     515              :     }
     516              : #endif
     517              : 
     518           38 :     result = libspdm_generate_finish_req_hmac(spdm_context, session_info, ptr);
     519           38 :     if (!result) {
     520            0 :         libspdm_release_sender_buffer (spdm_context);
     521            0 :         status = LIBSPDM_STATUS_CRYPTO_ERROR;
     522            0 :         goto error;
     523              :     }
     524              : 
     525           38 :     status = libspdm_append_message_f(spdm_context, session_info, true, ptr, hmac_size);
     526           38 :     if (LIBSPDM_STATUS_IS_ERROR(status)) {
     527            0 :         libspdm_release_sender_buffer (spdm_context);
     528            0 :         goto error;
     529              :     }
     530              : 
     531              :     /* -=[Send Request Phase]=- */
     532           38 :     status = libspdm_send_spdm_request(spdm_context, &session_id, spdm_request_size, spdm_request);
     533           38 :     if (LIBSPDM_STATUS_IS_ERROR(status)) {
     534            1 :         libspdm_release_sender_buffer (spdm_context);
     535            1 :         goto error;
     536              :     }
     537              : 
     538           37 :     libspdm_reset_message_buffer_via_request_code(spdm_context, session_info, SPDM_FINISH);
     539              : 
     540           37 :     libspdm_release_sender_buffer (spdm_context);
     541           37 :     spdm_request = (void *)spdm_context->last_spdm_request;
     542              : 
     543              :     /* -=[Receive Response Phase]=- */
     544           37 :     status = libspdm_acquire_receiver_buffer (spdm_context, &message_size, (void **)&message);
     545           37 :     if (LIBSPDM_STATUS_IS_ERROR(status)) {
     546            0 :         goto error;
     547              :     }
     548           37 :     LIBSPDM_ASSERT (message_size >= transport_header_size);
     549           37 :     spdm_response = (void *)(message);
     550           37 :     spdm_response_size = message_size;
     551              : 
     552           37 :     status = libspdm_receive_spdm_response(
     553              :         spdm_context, &session_id, &spdm_response_size, (void **)&spdm_response);
     554           37 :     if (LIBSPDM_STATUS_IS_ERROR(status)) {
     555            0 :         goto receive_done;
     556              :     }
     557              : 
     558              :     /* -=[Validate Response Phase]=- */
     559           37 :     if (spdm_response_size < sizeof(spdm_message_header_t)) {
     560            0 :         status = LIBSPDM_STATUS_INVALID_MSG_SIZE;
     561            0 :         goto receive_done;
     562              :     }
     563           37 :     if (spdm_response->header.request_response_code == SPDM_ERROR) {
     564           25 :         if (spdm_response->header.param1 == SPDM_ERROR_CODE_DECRYPT_ERROR) {
     565            2 :             status = LIBSPDM_STATUS_SESSION_MSG_ERROR;
     566            2 :             goto receive_done;
     567              :         }
     568           23 :         if (spdm_response->header.param1 != SPDM_ERROR_CODE_RESPONSE_NOT_READY) {
     569           21 :             libspdm_reset_message_f (spdm_context, session_info);
     570              :         }
     571           23 :         status = libspdm_handle_error_response_main(
     572              :             spdm_context, &session_id,
     573              :             &spdm_response_size, (void **)&spdm_response,
     574              :             SPDM_FINISH, SPDM_FINISH_RSP);
     575           23 :         if (LIBSPDM_STATUS_IS_ERROR(status)) {
     576           22 :             goto receive_done;
     577              :         }
     578           12 :     } else if (spdm_response->header.request_response_code != SPDM_FINISH_RSP) {
     579            1 :         status = LIBSPDM_STATUS_INVALID_MSG_FIELD;
     580            1 :         goto receive_done;
     581              :     }
     582           12 :     if (spdm_response->header.spdm_version != spdm_request->header.spdm_version) {
     583            0 :         status = LIBSPDM_STATUS_INVALID_MSG_FIELD;
     584            0 :         goto receive_done;
     585              :     }
     586              : 
     587           12 :     if (!libspdm_is_capabilities_flag_supported(
     588              :             spdm_context, true,
     589              :             SPDM_GET_CAPABILITIES_REQUEST_FLAGS_HANDSHAKE_IN_THE_CLEAR_CAP,
     590              :             SPDM_GET_CAPABILITIES_RESPONSE_FLAGS_HANDSHAKE_IN_THE_CLEAR_CAP)) {
     591            2 :         hmac_size = 0;
     592              :     }
     593              : 
     594           12 :     ptr = (uint8_t *)spdm_response + sizeof(spdm_finish_response_t);
     595              : 
     596           12 :     if (libspdm_get_connection_version(spdm_context) >= SPDM_MESSAGE_VERSION_14) {
     597            1 :         if (spdm_response_size < sizeof(spdm_finish_response_t) + sizeof(uint16_t) + hmac_size) {
     598            0 :             status = LIBSPDM_STATUS_INVALID_MSG_SIZE;
     599            0 :             goto receive_done;
     600              :         }
     601            1 :         opaque_data_size = libspdm_read_uint16((const uint8_t *)ptr);
     602            1 :         ptr += sizeof(uint16_t);
     603            1 :         if (opaque_data_size > SPDM_MAX_OPAQUE_DATA_SIZE) {
     604            0 :             status = LIBSPDM_STATUS_INVALID_MSG_FIELD;
     605            0 :             goto receive_done;
     606              :         }
     607            1 :         if (spdm_response_size < sizeof(spdm_finish_response_t) + sizeof(uint16_t) +
     608            1 :             opaque_data_size + hmac_size) {
     609            0 :             status = LIBSPDM_STATUS_INVALID_MSG_SIZE;
     610            0 :             goto receive_done;
     611              :         }
     612              : 
     613            1 :         if ((responder_opaque_data != NULL) && (responder_opaque_data_size != NULL)) {
     614            0 :             if (opaque_data_size >= *responder_opaque_data_size) {
     615            0 :                 status = LIBSPDM_STATUS_BUFFER_TOO_SMALL;
     616            0 :                 goto receive_done;
     617              :             }
     618            0 :             libspdm_copy_mem(responder_opaque_data, *responder_opaque_data_size,
     619              :                              ptr, opaque_data_size);
     620            0 :             *responder_opaque_data_size = opaque_data_size;
     621              :         }
     622              : 
     623            1 :         ptr += opaque_data_size;
     624            1 :         opaque_data_entry_size = sizeof(uint16_t) + opaque_data_size;
     625              :     } else {
     626           11 :         if (spdm_response_size < sizeof(spdm_finish_response_t) + hmac_size) {
     627            1 :             status = LIBSPDM_STATUS_INVALID_MSG_SIZE;
     628            1 :             goto receive_done;
     629              :         }
     630           10 :         if ((responder_opaque_data != NULL) && (responder_opaque_data_size != NULL)) {
     631            0 :             *responder_opaque_data_size = 0;
     632              :         }
     633           10 :         opaque_data_entry_size = 0;
     634              :     }
     635           11 :     spdm_response_size = sizeof(spdm_finish_response_t) + opaque_data_entry_size + hmac_size;
     636              : 
     637           11 :     status = libspdm_append_message_f(spdm_context, session_info, true, spdm_response,
     638              :                                       spdm_response_size - hmac_size);
     639           11 :     if (LIBSPDM_STATUS_IS_ERROR(status)) {
     640            0 :         goto receive_done;
     641              :     }
     642              : 
     643           11 :     if (libspdm_is_capabilities_flag_supported(
     644              :             spdm_context, true,
     645              :             SPDM_GET_CAPABILITIES_REQUEST_FLAGS_HANDSHAKE_IN_THE_CLEAR_CAP,
     646              :             SPDM_GET_CAPABILITIES_RESPONSE_FLAGS_HANDSHAKE_IN_THE_CLEAR_CAP)) {
     647            9 :         LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "verify_data (0x%zx):\n", hmac_size));
     648            9 :         LIBSPDM_INTERNAL_DUMP_HEX(ptr, hmac_size);
     649            9 :         result = libspdm_verify_finish_rsp_hmac(spdm_context, session_info,
     650              :                                                 ptr, hmac_size);
     651            9 :         if (!result) {
     652            2 :             status = LIBSPDM_STATUS_VERIF_FAIL;
     653            2 :             goto receive_done;
     654              :         }
     655              : 
     656            7 :         status = libspdm_append_message_f(
     657              :             spdm_context, session_info, true,
     658              :             ptr, hmac_size);
     659            7 :         if (LIBSPDM_STATUS_IS_ERROR(status)) {
     660            0 :             goto receive_done;
     661              :         }
     662              :     }
     663              : 
     664              :     /* -=[Process Response Phase]=- */
     665            9 :     LIBSPDM_DEBUG((LIBSPDM_DEBUG_INFO, "libspdm_generate_session_data_key[%x]\n", session_id));
     666            9 :     result = libspdm_calculate_th2_hash(spdm_context, session_info, true, th2_hash_data);
     667            9 :     if (!result) {
     668            0 :         status = LIBSPDM_STATUS_CRYPTO_ERROR;
     669            0 :         goto receive_done;
     670              :     }
     671            9 :     result = libspdm_generate_session_data_key(
     672              :         session_info->secured_message_context, th2_hash_data);
     673            9 :     if (!result) {
     674            0 :         status = LIBSPDM_STATUS_CRYPTO_ERROR;
     675            0 :         goto receive_done;
     676              :     }
     677              : 
     678              :     /* -=[Update State Phase]=- */
     679            9 :     libspdm_secured_message_set_session_state(
     680              :         session_info->secured_message_context, LIBSPDM_SESSION_STATE_ESTABLISHED);
     681              : 
     682              :     /* -=[Log Message Phase]=- */
     683              :     #if LIBSPDM_ENABLE_MSG_LOG
     684            9 :     libspdm_append_msg_log(spdm_context, spdm_response, spdm_response_size);
     685              :     #endif /* LIBSPDM_ENABLE_MSG_LOG */
     686              : 
     687            9 :     libspdm_release_receiver_buffer (spdm_context);
     688              : 
     689            9 :     return LIBSPDM_STATUS_SUCCESS;
     690              : 
     691           28 : receive_done:
     692           28 :     libspdm_release_receiver_buffer (spdm_context);
     693           33 : error:
     694           33 :     if (status != LIBSPDM_STATUS_BUSY_PEER) {
     695           31 :         libspdm_free_session_id(spdm_context, session_id);
     696              :     }
     697              : 
     698           33 :     return status;
     699              : }
     700              : 
     701           41 : libspdm_return_t libspdm_send_receive_finish(libspdm_context_t *spdm_context,
     702              :                                              uint32_t session_id,
     703              :                                              uint8_t req_slot_id_param)
     704              : {
     705              :     size_t retry;
     706              :     uint64_t retry_delay_time;
     707              :     libspdm_return_t status;
     708              : 
     709           41 :     spdm_context->crypto_request = true;
     710           41 :     retry = spdm_context->retry_times;
     711           41 :     retry_delay_time = spdm_context->retry_delay_time;
     712              :     do {
     713           42 :         status = libspdm_try_send_receive_finish(spdm_context, session_id,
     714              :                                                  req_slot_id_param,
     715              :                                                  NULL, 0, NULL, NULL);
     716           42 :         if (status != LIBSPDM_STATUS_BUSY_PEER) {
     717           40 :             return status;
     718              :         }
     719              : 
     720            2 :         libspdm_sleep(retry_delay_time);
     721            2 :     } while (retry-- != 0);
     722              : 
     723            1 :     return status;
     724              : }
     725              : 
     726            0 : libspdm_return_t libspdm_send_receive_finish_ex(
     727              :     libspdm_context_t *spdm_context,
     728              :     uint32_t session_id,
     729              :     uint8_t req_slot_id_param,
     730              :     const void *requester_opaque_data,
     731              :     size_t requester_opaque_data_size,
     732              :     void *responder_opaque_data,
     733              :     size_t *responder_opaque_data_size)
     734              : {
     735              :     size_t retry;
     736              :     uint64_t retry_delay_time;
     737              :     libspdm_return_t status;
     738              : 
     739            0 :     spdm_context->crypto_request = true;
     740            0 :     retry = spdm_context->retry_times;
     741            0 :     retry_delay_time = spdm_context->retry_delay_time;
     742              :     do {
     743            0 :         status = libspdm_try_send_receive_finish(spdm_context, session_id,
     744              :                                                  req_slot_id_param,
     745              :                                                  requester_opaque_data,
     746              :                                                  requester_opaque_data_size,
     747              :                                                  responder_opaque_data,
     748              :                                                  responder_opaque_data_size);
     749            0 :         if (status != LIBSPDM_STATUS_BUSY_PEER) {
     750            0 :             return status;
     751              :         }
     752              : 
     753            0 :         libspdm_sleep(retry_delay_time);
     754            0 :     } while (retry-- != 0);
     755              : 
     756            0 :     return status;
     757              : }
     758              : 
     759              : #endif /* LIBSPDM_ENABLE_CAPABILITY_KEY_EX_CAP*/
        

Generated by: LCOV version 2.0-1