16
16
package verify
17
17
18
18
import (
19
+ "context"
19
20
"crypto/ecdsa"
20
21
"crypto/rsa"
21
22
"crypto/x509"
@@ -294,6 +295,12 @@ type CRLUnavailableErr struct {
294
295
// GetCrlAndCheckRoot downloads the given cert's CRL from one of the distribution points and
295
296
// verifies that the CRL is valid and doesn't revoke an intermediate key.
296
297
func GetCrlAndCheckRoot (r * trust.AMDRootCerts , opts * Options ) (* x509.RevocationList , error ) {
298
+ return GetCrlAndCheckRootContext (context .Background (), r , opts )
299
+ }
300
+
301
+ // GetCrlAndCheckRootContext behaves like GetCrlAndCheckRoot but forwards the context to the
302
+ // HTTPSGetter.
303
+ func GetCrlAndCheckRootContext (ctx context.Context , r * trust.AMDRootCerts , opts * Options ) (* x509.RevocationList , error ) {
297
304
r .Mu .Lock ()
298
305
defer r .Mu .Unlock ()
299
306
getter := opts .Getter
@@ -308,7 +315,7 @@ func GetCrlAndCheckRoot(r *trust.AMDRootCerts, opts *Options) (*x509.RevocationL
308
315
}
309
316
var errs error
310
317
for _ , url := range r .ProductCerts .Ask .CRLDistributionPoints {
311
- bytes , err := getter . Get ( url )
318
+ bytes , err := trust . GetWith ( ctx , getter , url )
312
319
if err != nil {
313
320
errs = multierr .Append (errs , err )
314
321
continue
@@ -354,8 +361,13 @@ func verifyCRL(r *trust.AMDRootCerts) error {
354
361
355
362
// VcekNotRevoked will consult the online CRL listed in the VCEK certificate for whether this cert
356
363
// has been revoked. Returns nil if not revoked, error on any problem.
357
- func VcekNotRevoked (r * trust.AMDRootCerts , _ * x509.Certificate , options * Options ) error {
358
- _ , err := GetCrlAndCheckRoot (r , options )
364
+ func VcekNotRevoked (r * trust.AMDRootCerts , cert * x509.Certificate , options * Options ) error {
365
+ return VcekNotRevokedContext (context .Background (), r , cert , options )
366
+ }
367
+
368
+ // VcekNotRevokedContext behaves like VcekNotRevoked but forwards the context to the HTTPSGetter.
369
+ func VcekNotRevokedContext (ctx context.Context , r * trust.AMDRootCerts , _ * x509.Certificate , options * Options ) error {
370
+ _ , err := GetCrlAndCheckRootContext (ctx , r , options )
359
371
return err
360
372
}
361
373
@@ -571,7 +583,7 @@ type Options struct {
571
583
// any missing certificates in an attestation's certificate chain. Uses Getter if false.
572
584
DisableCertFetching bool
573
585
// Getter takes a URL and returns the body of its contents. By default uses http.Get and returns
574
- // the body.
586
+ // the body. If Getter implements trust.ContextHTTPSGetter, GetContext will be preferred over Get.
575
587
Getter trust.HTTPSGetter
576
588
// Now is the time at which to verify the validity of certificates. If unset, uses time.Now().
577
589
Now time.Time
@@ -662,6 +674,11 @@ func updateProductExpectation(product **spb.SevProduct, reportProduct *spb.SevPr
662
674
// SnpAttestation verifies the protobuf representation of an attestation report's signature based
663
675
// on the report's SignatureAlgo, provided the certificate chain is valid.
664
676
func SnpAttestation (attestation * spb.Attestation , options * Options ) error {
677
+ return SnpAttestationContext (context .Background (), attestation , options )
678
+ }
679
+
680
+ // SnpAttestationContext behaves like SnpAttestation but forwards the context to the HTTPSGetter.
681
+ func SnpAttestationContext (ctx context.Context , attestation * spb.Attestation , options * Options ) error {
665
682
if options == nil {
666
683
return fmt .Errorf ("options cannot be nil" )
667
684
}
@@ -670,7 +687,7 @@ func SnpAttestation(attestation *spb.Attestation, options *Options) error {
670
687
}
671
688
// Make sure we have the whole certificate chain, or at least the product
672
689
// info.
673
- if err := fillInAttestation (attestation , options ); err != nil {
690
+ if err := fillInAttestation (ctx , attestation , options ); err != nil {
674
691
return err
675
692
}
676
693
@@ -786,7 +803,7 @@ func cpuidWorkaround(attestation *spb.Attestation, options *Options) (string, fu
786
803
787
804
// fillInAttestation uses AMD's KDS to populate any empty certificate field in the attestation's
788
805
// certificate chain.
789
- func fillInAttestation (attestation * spb.Attestation , options * Options ) error {
806
+ func fillInAttestation (ctx context. Context , attestation * spb.Attestation , options * Options ) error {
790
807
if options .DisableCertFetching {
791
808
return nil
792
809
}
@@ -810,7 +827,7 @@ func fillInAttestation(attestation *spb.Attestation, options *Options) error {
810
827
attestation .CertificateChain = chain
811
828
}
812
829
if len (chain .GetAskCert ()) == 0 || len (chain .GetArkCert ()) == 0 {
813
- askark , err := trust .GetProductChain ( productLine , info .SigningKey , getter )
830
+ askark , err := trust .GetProductChainContext ( ctx , productLine , info .SigningKey , getter )
814
831
if err != nil {
815
832
return err
816
833
}
@@ -826,7 +843,7 @@ func fillInAttestation(attestation *spb.Attestation, options *Options) error {
826
843
case abi .VcekReportSigner :
827
844
if len (chain .GetVcekCert ()) == 0 {
828
845
vcekURL := kds .VCEKCertURL (productLine , report .GetChipId (), kds .TCBVersion (report .GetReportedTcb ()))
829
- vcek , err := getter . Get ( vcekURL )
846
+ vcek , err := trust . GetWith ( ctx , getter , vcekURL )
830
847
if err != nil {
831
848
return & trust.AttestationRecreationErr {
832
849
Msg : fmt .Sprintf ("could not download VCEK certificate: %v" , err ),
@@ -854,11 +871,17 @@ func fillInAttestation(attestation *spb.Attestation, options *Options) error {
854
871
// chain for the VCEK that supposedly signed the given report, and returns the Attestation
855
872
// representation of their combination. If getter is nil, uses Golang's http.Get.
856
873
func GetAttestationFromReport (report * spb.Report , options * Options ) (* spb.Attestation , error ) {
874
+ return GetAttestationFromReportContext (context .Background (), report , options )
875
+ }
876
+
877
+ // GetAttestationFromReportContext behaves like GetAttestationFromReport but forwards the context
878
+ // to the HTTPSGetter.
879
+ func GetAttestationFromReportContext (ctx context.Context , report * spb.Report , options * Options ) (* spb.Attestation , error ) {
857
880
result := & spb.Attestation {
858
881
Report : report ,
859
882
CertificateChain : & spb.CertificateChain {Extras : map [string ][]byte {}},
860
883
}
861
- if err := fillInAttestation (result , options ); err != nil {
884
+ if err := fillInAttestation (ctx , result , options ); err != nil {
862
885
return nil , err
863
886
}
864
887
// Attempt to fill in the product field of the attestation. Don't error at this
@@ -886,23 +909,33 @@ func GetAttestationFromReport(report *spb.Report, options *Options) (*spb.Attest
886
909
// on the report's SignatureAlgo and uses the AMD Key Distribution Service to download the
887
910
// report's corresponding VCEK certificate.
888
911
func SnpReport (report * spb.Report , options * Options ) error {
912
+ return SnpReportContext (context .Background (), report , options )
913
+ }
914
+
915
+ // SnpReportContext behaves like SnpReport but forwards the context to the HTTPSGetter.
916
+ func SnpReportContext (ctx context.Context , report * spb.Report , options * Options ) error {
889
917
if options .DisableCertFetching {
890
918
return errors .New ("cannot verify attestation report without fetching certificates" )
891
919
}
892
- attestation , err := GetAttestationFromReport ( report , options )
920
+ attestation , err := GetAttestationFromReportContext ( ctx , report , options )
893
921
if err != nil {
894
922
return fmt .Errorf ("could not recreate attestation from report: %w" , err )
895
923
}
896
- return SnpAttestation ( attestation , options )
924
+ return SnpAttestationContext ( ctx , attestation , options )
897
925
}
898
926
899
927
// RawSnpReport verifies the raw bytes representation of an attestation report's signature
900
928
// based on the report's SignatureAlgo and uses the AMD Key Distribution Service to download
901
929
// the report's corresponding VCEK certificate.
902
930
func RawSnpReport (rawReport []byte , options * Options ) error {
931
+ return RawSnpReportContext (context .Background (), rawReport , options )
932
+ }
933
+
934
+ // RawSnpReportContext behaves like RawSnpReport but forwards the context to the HTTPSGetter.
935
+ func RawSnpReportContext (ctx context.Context , rawReport []byte , options * Options ) error {
903
936
report , err := abi .ReportToProto (rawReport )
904
937
if err != nil {
905
938
return fmt .Errorf ("could not interpret report bytes: %v" , err )
906
939
}
907
- return SnpReport ( report , options )
940
+ return SnpReportContext ( ctx , report , options )
908
941
}
0 commit comments