1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */
2 /* SPDX-License-Identifier: Unlicense */
3 #include "tomcrypt_private.h"
4
5 /*! \file pkcs_1_v1_5_encode.c
6 *
7 * PKCS #1 v1.5 Padding (Andreas Lange)
8 */
9
10 #ifdef LTC_PKCS_1
11
12 /*! \brief PKCS #1 v1.5 encode.
13 *
14 * \param msg The data to encode
15 * \param msglen The length of the data to encode (octets)
16 * \param block_type Block type to use in padding (\sa ltc_pkcs_1_v1_5_blocks)
17 * \param modulus_bitlen The bit length of the RSA modulus
18 * \param prng An active PRNG state (only for LTC_PKCS_1_EME)
19 * \param prng_idx The index of the PRNG desired (only for LTC_PKCS_1_EME)
20 * \param out [out] The destination for the encoded data
21 * \param outlen [in/out] The max size and resulting size of the encoded data
22 *
23 * \return CRYPT_OK if successful
24 */
pkcs_1_v1_5_encode(const unsigned char * msg,unsigned long msglen,int block_type,unsigned long modulus_bitlen,prng_state * prng,int prng_idx,unsigned char * out,unsigned long * outlen)25 int pkcs_1_v1_5_encode(const unsigned char *msg,
26 unsigned long msglen,
27 int block_type,
28 unsigned long modulus_bitlen,
29 prng_state *prng,
30 int prng_idx,
31 unsigned char *out,
32 unsigned long *outlen)
33 {
34 unsigned long modulus_len, ps_len, i;
35 unsigned char *ps;
36 int result;
37
38 LTC_ARGCHK((msglen == 0) || (msg != NULL));
39 LTC_ARGCHK(out != NULL);
40 LTC_ARGCHK(outlen != NULL);
41
42 /* valid block_type? */
43 if ((block_type != LTC_PKCS_1_EMSA) &&
44 (block_type != LTC_PKCS_1_EME)) {
45 return CRYPT_PK_INVALID_PADDING;
46 }
47
48 if (block_type == LTC_PKCS_1_EME) { /* encryption padding, we need a valid PRNG */
49 if ((result = prng_is_valid(prng_idx)) != CRYPT_OK) {
50 return result;
51 }
52 }
53
54 modulus_len = (modulus_bitlen >> 3) + (modulus_bitlen & 7 ? 1 : 0);
55
56 /* test message size */
57 if ((msglen + 11) > modulus_len) {
58 return CRYPT_PK_INVALID_SIZE;
59 }
60
61 if (*outlen < modulus_len) {
62 *outlen = modulus_len;
63 result = CRYPT_BUFFER_OVERFLOW;
64 goto bail;
65 }
66
67 /* generate an octets string PS */
68 ps = &out[2];
69 ps_len = modulus_len - msglen - 3;
70
71 if (block_type == LTC_PKCS_1_EME) {
72 /* now choose a random ps */
73 if (prng_descriptor[prng_idx]->read(ps, ps_len, prng) != ps_len) {
74 result = CRYPT_ERROR_READPRNG;
75 goto bail;
76 }
77
78 /* transform zero bytes (if any) to non-zero random bytes */
79 for (i = 0; i < ps_len; i++) {
80 while (ps[i] == 0) {
81 if (prng_descriptor[prng_idx]->read(&ps[i], 1, prng) != 1) {
82 result = CRYPT_ERROR_READPRNG;
83 goto bail;
84 }
85 }
86 }
87 } else {
88 XMEMSET(ps, 0xFF, ps_len);
89 }
90
91 /* create string of length modulus_len */
92 out[0] = 0x00;
93 out[1] = (unsigned char)block_type; /* block_type 1 or 2 */
94 out[2 + ps_len] = 0x00;
95 if (msglen != 0) {
96 XMEMCPY(&out[2 + ps_len + 1], msg, msglen);
97 }
98 *outlen = modulus_len;
99
100 result = CRYPT_OK;
101 bail:
102 return result;
103 } /* pkcs_1_v1_5_encode */
104
105 #endif /* #ifdef LTC_PKCS_1 */
106