11use anyhow:: bail;
22use dcap_types:: enclave_identity:: EnclaveIdentityV2 ;
3- use dcap_types:: tcbinfo :: TcbInfoV3 ;
3+ use dcap_types:: tcb_info :: TcbInfoV3 ;
44use dcap_types:: utils:: { parse_crl_der, parse_x509_der} ;
55use x509_parser:: { certificate:: X509Certificate , revocation_list:: CertificateRevocationList } ;
66
@@ -12,10 +12,10 @@ use crate::Result;
1212pub struct QvCollateral {
1313 /// TCBInfo in JSON format
1414 /// ref. <https://api.portal.trustedservices.intel.com/content/documentation.html#pcs-tcb-info-model-v3>
15- pub tcbinfo_json : Vec < u8 > ,
15+ pub tcb_info_json : Vec < u8 > ,
1616 /// QEIdentity in JSON format
1717 /// ref. <https://api.portal.trustedservices.intel.com/content/documentation.html#pcs-enclave-identity-model-v2>
18- pub qeidentity_json : Vec < u8 > ,
18+ pub qe_identity_json : Vec < u8 > ,
1919 /// SGX Intel Root CA certificate in DER format
2020 /// ref. <https://certificates.trustedservices.intel.com/Intel_SGX_Provisioning_Certification_RootCA.pem>
2121 pub sgx_intel_root_ca_der : Vec < u8 > ,
@@ -42,24 +42,24 @@ impl QvCollateral {
4242
4343 // get the total length
4444 let total_length = 4 * 6
45- + self . tcbinfo_json . len ( )
46- + self . qeidentity_json . len ( )
45+ + self . tcb_info_json . len ( )
46+ + self . qe_identity_json . len ( )
4747 + self . sgx_intel_root_ca_der . len ( )
4848 + self . sgx_tcb_signing_der . len ( )
4949 + self . sgx_intel_root_ca_crl_der . len ( )
5050 + self . sgx_pck_crl_der . len ( ) ;
5151
5252 // create the vec and copy the data
5353 let mut data = Vec :: with_capacity ( total_length) ;
54- data. extend_from_slice ( & ( self . tcbinfo_json . len ( ) as u32 ) . to_le_bytes ( ) ) ;
55- data. extend_from_slice ( & ( self . qeidentity_json . len ( ) as u32 ) . to_le_bytes ( ) ) ;
54+ data. extend_from_slice ( & ( self . tcb_info_json . len ( ) as u32 ) . to_le_bytes ( ) ) ;
55+ data. extend_from_slice ( & ( self . qe_identity_json . len ( ) as u32 ) . to_le_bytes ( ) ) ;
5656 data. extend_from_slice ( & ( self . sgx_intel_root_ca_der . len ( ) as u32 ) . to_le_bytes ( ) ) ;
5757 data. extend_from_slice ( & ( self . sgx_tcb_signing_der . len ( ) as u32 ) . to_le_bytes ( ) ) ;
5858 data. extend_from_slice ( & ( self . sgx_intel_root_ca_crl_der . len ( ) as u32 ) . to_le_bytes ( ) ) ;
5959 data. extend_from_slice ( & ( self . sgx_pck_crl_der . len ( ) as u32 ) . to_le_bytes ( ) ) ;
6060
61- data. extend_from_slice ( & self . tcbinfo_json ) ;
62- data. extend_from_slice ( & self . qeidentity_json ) ;
61+ data. extend_from_slice ( & self . tcb_info_json ) ;
62+ data. extend_from_slice ( & self . qe_identity_json ) ;
6363 data. extend_from_slice ( & self . sgx_intel_root_ca_der ) ;
6464 data. extend_from_slice ( & self . sgx_tcb_signing_der ) ;
6565 data. extend_from_slice ( & self . sgx_intel_root_ca_crl_der ) ;
@@ -77,8 +77,8 @@ impl QvCollateral {
7777
7878 // reverse the serialization process
7979 // each length is 4 bytes long, we have a total of 6 members
80- let tcbinfo_json_len = u32:: from_le_bytes ( slice[ 0 ..4 ] . try_into ( ) ?) as usize ;
81- let qeidentity_json_len = u32:: from_le_bytes ( slice[ 4 ..8 ] . try_into ( ) ?) as usize ;
80+ let tcb_info_json_len = u32:: from_le_bytes ( slice[ 0 ..4 ] . try_into ( ) ?) as usize ;
81+ let qe_identity_json_len = u32:: from_le_bytes ( slice[ 4 ..8 ] . try_into ( ) ?) as usize ;
8282 let sgx_intel_root_ca_der_len = u32:: from_le_bytes ( slice[ 8 ..12 ] . try_into ( ) ?) as usize ;
8383 let sgx_tcb_signing_der_len = u32:: from_le_bytes ( slice[ 12 ..16 ] . try_into ( ) ?) as usize ;
8484 let sgx_intel_root_ca_crl_der_len = u32:: from_le_bytes ( slice[ 16 ..20 ] . try_into ( ) ?) as usize ;
@@ -88,8 +88,8 @@ impl QvCollateral {
8888
8989 if slice. len ( )
9090 < offset
91- + tcbinfo_json_len
92- + qeidentity_json_len
91+ + tcb_info_json_len
92+ + qe_identity_json_len
9393 + sgx_intel_root_ca_der_len
9494 + sgx_tcb_signing_der_len
9595 + sgx_intel_root_ca_crl_der_len
@@ -98,10 +98,10 @@ impl QvCollateral {
9898 bail ! ( "Invalid QvCollateral length" ) ;
9999 }
100100
101- let tcbinfo_json = slice[ offset..offset + tcbinfo_json_len ] . to_vec ( ) ;
102- offset += tcbinfo_json_len ;
103- let qeidentity_json = slice[ offset..offset + qeidentity_json_len ] . to_vec ( ) ;
104- offset += qeidentity_json_len ;
101+ let tcb_info_json = slice[ offset..offset + tcb_info_json_len ] . to_vec ( ) ;
102+ offset += tcb_info_json_len ;
103+ let qe_identity_json = slice[ offset..offset + qe_identity_json_len ] . to_vec ( ) ;
104+ offset += qe_identity_json_len ;
105105 let sgx_intel_root_ca_der = slice[ offset..offset + sgx_intel_root_ca_der_len] . to_vec ( ) ;
106106 offset += sgx_intel_root_ca_der_len;
107107 let sgx_tcb_signing_der = slice[ offset..offset + sgx_tcb_signing_der_len] . to_vec ( ) ;
@@ -113,8 +113,8 @@ impl QvCollateral {
113113 offset += sgx_pck_crl_der_len;
114114
115115 Ok ( QvCollateral {
116- tcbinfo_json ,
117- qeidentity_json ,
116+ tcb_info_json ,
117+ qe_identity_json ,
118118 sgx_intel_root_ca_der,
119119 sgx_tcb_signing_der,
120120 sgx_intel_root_ca_crl_der,
@@ -123,17 +123,17 @@ impl QvCollateral {
123123 }
124124
125125 /// Returns the TCBInfoV3 struct from the TCBInfo JSON bytes
126- pub fn get_tcbinfov3 ( & self ) -> Result < TcbInfoV3 > {
127- let tcbinfo : TcbInfoV3 = serde_json:: from_slice ( & self . tcbinfo_json ) ?;
128- if tcbinfo . tcb_info . version != 3 {
129- bail ! ( "Invalid TCB Info version: {}" , tcbinfo . tcb_info. version) ;
126+ pub fn get_tcb_info_v3 ( & self ) -> Result < TcbInfoV3 > {
127+ let tcb_info_v3 : TcbInfoV3 = serde_json:: from_slice ( & self . tcb_info_json ) ?;
128+ if tcb_info_v3 . tcb_info . version != 3 {
129+ bail ! ( "Invalid TCB Info version: {}" , tcb_info_v3 . tcb_info. version) ;
130130 }
131- Ok ( tcbinfo )
131+ Ok ( tcb_info_v3 )
132132 }
133133
134134 /// Returns the EnclaveIdentityV2 struct from the QEIdentity JSON bytes
135- pub fn get_qeidentityv2 ( & self ) -> Result < EnclaveIdentityV2 > {
136- let qe: EnclaveIdentityV2 = serde_json:: from_slice ( & self . qeidentity_json ) ?;
135+ pub fn get_qe_identity_v2 ( & self ) -> Result < EnclaveIdentityV2 > {
136+ let qe: EnclaveIdentityV2 = serde_json:: from_slice ( & self . qe_identity_json ) ?;
137137 if qe. enclave_identity . version != 2 {
138138 bail ! (
139139 "Invalid QE Identity version: {}" ,
0 commit comments