1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun * Copyright (c) 2022 Rockchip Electronics Co. Ltd.
3*4882a593Smuzhiyun */
4*4882a593Smuzhiyun
5*4882a593Smuzhiyun #include <stdlib.h>
6*4882a593Smuzhiyun #include <string.h>
7*4882a593Smuzhiyun
8*4882a593Smuzhiyun #include "rkcrypto_core.h"
9*4882a593Smuzhiyun #include "rkcrypto_trace.h"
10*4882a593Smuzhiyun #include "rkcrypto_random.h"
11*4882a593Smuzhiyun
12*4882a593Smuzhiyun #ifndef ARRAY_SIZE
13*4882a593Smuzhiyun #define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
14*4882a593Smuzhiyun #endif
15*4882a593Smuzhiyun
16*4882a593Smuzhiyun #define RSA_PKCS1_TYPE_MIN_PAD_LEN (11)
17*4882a593Smuzhiyun
18*4882a593Smuzhiyun /**< Identifier for RSA signature operations. */
19*4882a593Smuzhiyun #define MBEDTLS_RSA_SIGN 1
20*4882a593Smuzhiyun
21*4882a593Smuzhiyun /**< Identifier for RSA encryption and decryption operations. */
22*4882a593Smuzhiyun #define MBEDTLS_RSA_CRYPT 2
23*4882a593Smuzhiyun
24*4882a593Smuzhiyun #define ASN1_INTEGER ((uint8_t)0x02)
25*4882a593Smuzhiyun #define ASN1_BIT_STRING ((uint8_t)0x03)
26*4882a593Smuzhiyun #define ASN1_OCT_STRING ((uint8_t)0x04)
27*4882a593Smuzhiyun #define ASN1_NULL ((uint8_t)0x05)
28*4882a593Smuzhiyun #define ASN1_OBJ_IDENTIFIER ((uint8_t)0x06)
29*4882a593Smuzhiyun #define ASN1_SEQUENCE ((uint8_t)0x30)
30*4882a593Smuzhiyun #define ASN1_CONTEXT0 ((uint8_t)0xA0)
31*4882a593Smuzhiyun #define ASN1_CONTEXT1 ((uint8_t)0xA1)
32*4882a593Smuzhiyun
33*4882a593Smuzhiyun typedef struct {
34*4882a593Smuzhiyun const uint8_t *data; //the buffer of data
35*4882a593Smuzhiyun uint16_t *data_len; //valid length of data
36*4882a593Smuzhiyun uint8_t tag; //ASN1 data type
37*4882a593Smuzhiyun uint8_t need_plus; //to identify weather the data is a positive number
38*4882a593Smuzhiyun } asn1_object_t;
39*4882a593Smuzhiyun
40*4882a593Smuzhiyun struct hash_oid_item {
41*4882a593Smuzhiyun uint32_t hash_algo;
42*4882a593Smuzhiyun const uint8_t *oid;
43*4882a593Smuzhiyun uint32_t oid_size;
44*4882a593Smuzhiyun };
45*4882a593Smuzhiyun
46*4882a593Smuzhiyun static const uint8_t sha1_oid[] = {0x2b, 0x0e, 0x03, 0x02, 0x1a};
47*4882a593Smuzhiyun static const uint8_t sha224_oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04};
48*4882a593Smuzhiyun static const uint8_t sha256_oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01};
49*4882a593Smuzhiyun static const uint8_t sha384_oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02};
50*4882a593Smuzhiyun static const uint8_t sha512_oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03};
51*4882a593Smuzhiyun
52*4882a593Smuzhiyun struct hash_oid_item hash_oid_tbl[] = {
53*4882a593Smuzhiyun {RK_ALGO_SHA1, sha1_oid, sizeof(sha1_oid)},
54*4882a593Smuzhiyun {RK_ALGO_SHA224, sha224_oid, sizeof(sha224_oid)},
55*4882a593Smuzhiyun {RK_ALGO_SHA256, sha256_oid, sizeof(sha256_oid)},
56*4882a593Smuzhiyun {RK_ALGO_SHA384, sha384_oid, sizeof(sha384_oid)},
57*4882a593Smuzhiyun {RK_ALGO_SHA512, sha512_oid, sizeof(sha512_oid)},
58*4882a593Smuzhiyun };
59*4882a593Smuzhiyun
get_oid_by_md(uint32_t hash_algo,const uint8_t ** oid,uint32_t * old_len)60*4882a593Smuzhiyun static RK_RES get_oid_by_md(uint32_t hash_algo, const uint8_t **oid, uint32_t *old_len)
61*4882a593Smuzhiyun {
62*4882a593Smuzhiyun uint32_t i;
63*4882a593Smuzhiyun
64*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(hash_oid_tbl); i++) {
65*4882a593Smuzhiyun if (hash_oid_tbl[i].hash_algo == hash_algo) {
66*4882a593Smuzhiyun *oid = hash_oid_tbl[i].oid;
67*4882a593Smuzhiyun *old_len = hash_oid_tbl[i].oid_size;
68*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
69*4882a593Smuzhiyun }
70*4882a593Smuzhiyun }
71*4882a593Smuzhiyun
72*4882a593Smuzhiyun return RK_CRYPTO_ERR_PARAMETER;
73*4882a593Smuzhiyun }
74*4882a593Smuzhiyun
asn1_compose_len(uint32_t len,uint8_t * field,uint32_t * field_len)75*4882a593Smuzhiyun static RK_RES asn1_compose_len(uint32_t len, uint8_t *field, uint32_t *field_len)
76*4882a593Smuzhiyun {
77*4882a593Smuzhiyun uint8_t tmp_field[4];
78*4882a593Smuzhiyun
79*4882a593Smuzhiyun if (field == NULL || field_len == NULL)
80*4882a593Smuzhiyun return RK_CRYPTO_ERR_PARAMETER;
81*4882a593Smuzhiyun
82*4882a593Smuzhiyun if (len < 0x80) {
83*4882a593Smuzhiyun *field = len;
84*4882a593Smuzhiyun *field_len = 1;
85*4882a593Smuzhiyun } else {
86*4882a593Smuzhiyun uint32_t i, j;
87*4882a593Smuzhiyun
88*4882a593Smuzhiyun tmp_field[0] = (len >> 24) & 0xff;
89*4882a593Smuzhiyun tmp_field[1] = (len >> 16) & 0xff;
90*4882a593Smuzhiyun tmp_field[2] = (len >> 8) & 0xff;
91*4882a593Smuzhiyun tmp_field[3] = len & 0xff;
92*4882a593Smuzhiyun
93*4882a593Smuzhiyun for (i = 0; i < sizeof(tmp_field); i++) {
94*4882a593Smuzhiyun if (tmp_field[i] == 0x00)
95*4882a593Smuzhiyun continue;
96*4882a593Smuzhiyun
97*4882a593Smuzhiyun for (j = 0; j < sizeof(tmp_field) - i; j++)
98*4882a593Smuzhiyun field[j + 1] = tmp_field[j + i];
99*4882a593Smuzhiyun
100*4882a593Smuzhiyun break;
101*4882a593Smuzhiyun }
102*4882a593Smuzhiyun field[0] = 0X80 + sizeof(tmp_field) - i;
103*4882a593Smuzhiyun *field_len = sizeof(tmp_field) - i + 1;
104*4882a593Smuzhiyun }
105*4882a593Smuzhiyun
106*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
107*4882a593Smuzhiyun }
108*4882a593Smuzhiyun
asn1_set_object(const uint8_t * in,uint32_t in_len,uint8_t tag,uint8_t need_plus,uint8_t * out,uint32_t out_max,uint32_t * out_len)109*4882a593Smuzhiyun static RK_RES asn1_set_object(const uint8_t *in, uint32_t in_len, uint8_t tag, uint8_t need_plus,
110*4882a593Smuzhiyun uint8_t *out, uint32_t out_max, uint32_t *out_len)
111*4882a593Smuzhiyun {
112*4882a593Smuzhiyun RK_RES res;
113*4882a593Smuzhiyun uint8_t *pout = out;
114*4882a593Smuzhiyun uint32_t field_len;
115*4882a593Smuzhiyun uint8_t tmp_field[5];
116*4882a593Smuzhiyun
117*4882a593Smuzhiyun if (in == NULL || out == NULL || out_len == NULL)
118*4882a593Smuzhiyun return RK_CRYPTO_ERR_PARAMETER;
119*4882a593Smuzhiyun
120*4882a593Smuzhiyun *out_len = 0;
121*4882a593Smuzhiyun
122*4882a593Smuzhiyun //padding tag field
123*4882a593Smuzhiyun if (out_max < 1) {
124*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
125*4882a593Smuzhiyun goto exit;
126*4882a593Smuzhiyun }
127*4882a593Smuzhiyun
128*4882a593Smuzhiyun *pout = tag;
129*4882a593Smuzhiyun pout++;
130*4882a593Smuzhiyun out_max--;
131*4882a593Smuzhiyun
132*4882a593Smuzhiyun //padding length field
133*4882a593Smuzhiyun if (need_plus && *in >= 0x80)
134*4882a593Smuzhiyun res = asn1_compose_len(in_len + 1, tmp_field, &field_len);
135*4882a593Smuzhiyun else
136*4882a593Smuzhiyun res = asn1_compose_len(in_len, tmp_field, &field_len);
137*4882a593Smuzhiyun
138*4882a593Smuzhiyun if (res != RK_CRYPTO_SUCCESS) {
139*4882a593Smuzhiyun D_TRACE("asn1_compose_len error");
140*4882a593Smuzhiyun return res;
141*4882a593Smuzhiyun }
142*4882a593Smuzhiyun
143*4882a593Smuzhiyun if (out_max < field_len) {
144*4882a593Smuzhiyun D_TRACE("out_max = %d, field_len = %d", out_max, field_len);
145*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
146*4882a593Smuzhiyun goto exit;
147*4882a593Smuzhiyun }
148*4882a593Smuzhiyun
149*4882a593Smuzhiyun memmove(pout, tmp_field, field_len);
150*4882a593Smuzhiyun pout += field_len;
151*4882a593Smuzhiyun out_max -= field_len;
152*4882a593Smuzhiyun
153*4882a593Smuzhiyun //padding value field
154*4882a593Smuzhiyun if (need_plus && *in >= 0x80) {
155*4882a593Smuzhiyun if (out_max < 1) {
156*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
157*4882a593Smuzhiyun goto exit;
158*4882a593Smuzhiyun }
159*4882a593Smuzhiyun
160*4882a593Smuzhiyun *pout = 0x00;
161*4882a593Smuzhiyun pout++;
162*4882a593Smuzhiyun out_max--;
163*4882a593Smuzhiyun }
164*4882a593Smuzhiyun
165*4882a593Smuzhiyun if (out_max < in_len) {
166*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
167*4882a593Smuzhiyun goto exit;
168*4882a593Smuzhiyun }
169*4882a593Smuzhiyun
170*4882a593Smuzhiyun memmove(pout, in, in_len);
171*4882a593Smuzhiyun pout += in_len;
172*4882a593Smuzhiyun
173*4882a593Smuzhiyun *out_len = pout-out;
174*4882a593Smuzhiyun
175*4882a593Smuzhiyun exit:
176*4882a593Smuzhiyun return res;
177*4882a593Smuzhiyun }
178*4882a593Smuzhiyun
179*4882a593Smuzhiyun /* PKCS #1: block type 0,1,2 message padding */
180*4882a593Smuzhiyun /*************************************************
181*4882a593Smuzhiyun *EB = 00 || BT || PS || 00 || D
182*4882a593Smuzhiyun *
183*4882a593Smuzhiyun *PS_LEN >= 8, mlen < key_len - 11
184*4882a593Smuzhiyun ************************************************/
rsa_padding_add_pkcs1_type(uint16_t key_len,uint8_t bt,const uint8_t * in,uint8_t in_len,uint8_t * out)185*4882a593Smuzhiyun static RK_RES rsa_padding_add_pkcs1_type(uint16_t key_len, uint8_t bt,
186*4882a593Smuzhiyun const uint8_t *in, uint8_t in_len, uint8_t *out)
187*4882a593Smuzhiyun {
188*4882a593Smuzhiyun uint32_t plen = 0;
189*4882a593Smuzhiyun uint8_t *peb = NULL;
190*4882a593Smuzhiyun
191*4882a593Smuzhiyun if (in_len > key_len - RSA_PKCS1_TYPE_MIN_PAD_LEN) {
192*4882a593Smuzhiyun E_TRACE("key_len is invalid.\n");
193*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING_OVERFLOW;
194*4882a593Smuzhiyun }
195*4882a593Smuzhiyun
196*4882a593Smuzhiyun /* block type 0 first input data can't be zero */
197*4882a593Smuzhiyun if (bt == 0x00 && *in == 0)
198*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
199*4882a593Smuzhiyun
200*4882a593Smuzhiyun peb = out;
201*4882a593Smuzhiyun
202*4882a593Smuzhiyun /* first byte is 0x00 */
203*4882a593Smuzhiyun *(peb++) = 0;
204*4882a593Smuzhiyun
205*4882a593Smuzhiyun /* Private Key BT (Block Type) */
206*4882a593Smuzhiyun *(peb++) = bt;
207*4882a593Smuzhiyun
208*4882a593Smuzhiyun /* The padding string PS shall consist of k-3-||D|| octets */
209*4882a593Smuzhiyun plen = key_len - 3 - in_len;
210*4882a593Smuzhiyun switch (bt) {
211*4882a593Smuzhiyun case 0x00: {
212*4882a593Smuzhiyun /* For block type 00, the octets shall have value 00 */
213*4882a593Smuzhiyun memset(peb, 0x00, plen);
214*4882a593Smuzhiyun break;
215*4882a593Smuzhiyun }
216*4882a593Smuzhiyun case 0x01: {
217*4882a593Smuzhiyun /* for block type 01, they shall have value FF */
218*4882a593Smuzhiyun memset(peb, 0xFF, plen);
219*4882a593Smuzhiyun break;
220*4882a593Smuzhiyun }
221*4882a593Smuzhiyun case 0x02: {
222*4882a593Smuzhiyun RK_RES res;
223*4882a593Smuzhiyun uint32_t i = 0;
224*4882a593Smuzhiyun
225*4882a593Smuzhiyun /* for block type 02, they shall be pseudorandomly generated and nonzero. */
226*4882a593Smuzhiyun res = rk_get_random(peb, plen);
227*4882a593Smuzhiyun if (res)
228*4882a593Smuzhiyun return res;
229*4882a593Smuzhiyun
230*4882a593Smuzhiyun /* make sure nonzero */
231*4882a593Smuzhiyun for (i = 0; i < plen; i++) {
232*4882a593Smuzhiyun if (peb[i] == 0x00)
233*4882a593Smuzhiyun peb[i] = 0x01;
234*4882a593Smuzhiyun }
235*4882a593Smuzhiyun break;
236*4882a593Smuzhiyun }
237*4882a593Smuzhiyun default: {
238*4882a593Smuzhiyun E_TRACE("BT(0x%x) is invalid.\n", plen);
239*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
240*4882a593Smuzhiyun }
241*4882a593Smuzhiyun }
242*4882a593Smuzhiyun
243*4882a593Smuzhiyun /* skip the padding string */
244*4882a593Smuzhiyun peb += plen;
245*4882a593Smuzhiyun
246*4882a593Smuzhiyun /* set 0x00 follow PS */
247*4882a593Smuzhiyun *(peb++) = 0x00;
248*4882a593Smuzhiyun
249*4882a593Smuzhiyun /* input data */
250*4882a593Smuzhiyun memcpy(peb, in, in_len);
251*4882a593Smuzhiyun
252*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
253*4882a593Smuzhiyun }
254*4882a593Smuzhiyun
255*4882a593Smuzhiyun /* PKCS #1: block type 0,1,2 message padding */
256*4882a593Smuzhiyun /*************************************************
257*4882a593Smuzhiyun * EB = 00 || BT || PS || 00 || D
258*4882a593Smuzhiyun *
259*4882a593Smuzhiyun *PS_LEN >= 8, mlen < key_len - 11
260*4882a593Smuzhiyun *************************************************/
rsa_padding_check_pkcs1_type(uint32_t key_len,uint8_t bt,const uint8_t * in,uint8_t * out,uint32_t * outlen)261*4882a593Smuzhiyun static RK_RES rsa_padding_check_pkcs1_type(uint32_t key_len, uint8_t bt,
262*4882a593Smuzhiyun const uint8_t *in, uint8_t *out, uint32_t *outlen)
263*4882a593Smuzhiyun {
264*4882a593Smuzhiyun const uint8_t *peb = NULL;
265*4882a593Smuzhiyun uint32_t inlen = key_len;
266*4882a593Smuzhiyun
267*4882a593Smuzhiyun *outlen = 0x00;
268*4882a593Smuzhiyun peb = in;
269*4882a593Smuzhiyun
270*4882a593Smuzhiyun /* first byte must be 0x00 */
271*4882a593Smuzhiyun if (*peb != 0x00) {
272*4882a593Smuzhiyun E_TRACE("EB[0] != 0x00.\n");
273*4882a593Smuzhiyun goto error;
274*4882a593Smuzhiyun }
275*4882a593Smuzhiyun peb++;
276*4882a593Smuzhiyun
277*4882a593Smuzhiyun /* Private Key BT (Block Type) */
278*4882a593Smuzhiyun if (*peb != bt) {
279*4882a593Smuzhiyun E_TRACE("EB[1] != BT(0x%x).\n", bt);
280*4882a593Smuzhiyun goto error;
281*4882a593Smuzhiyun }
282*4882a593Smuzhiyun peb++;
283*4882a593Smuzhiyun
284*4882a593Smuzhiyun switch (bt) {
285*4882a593Smuzhiyun case 0x00:
286*4882a593Smuzhiyun /* For block type 00, the octets shall have value 00 */
287*4882a593Smuzhiyun for (; peb < in + inlen - 1; peb++) {
288*4882a593Smuzhiyun if ((*peb == 0x00) && (*(peb + 1) != 0))
289*4882a593Smuzhiyun break;
290*4882a593Smuzhiyun }
291*4882a593Smuzhiyun break;
292*4882a593Smuzhiyun case 0x01:
293*4882a593Smuzhiyun /* For block type 0x01 the octets shall have value 0xFF */
294*4882a593Smuzhiyun for (; peb < in + inlen - 1; peb++) {
295*4882a593Smuzhiyun if (*peb == 0xFF)
296*4882a593Smuzhiyun continue;
297*4882a593Smuzhiyun
298*4882a593Smuzhiyun if (*peb == 0x00)
299*4882a593Smuzhiyun break;
300*4882a593Smuzhiyun
301*4882a593Smuzhiyun peb = in + inlen - 1;
302*4882a593Smuzhiyun break;
303*4882a593Smuzhiyun }
304*4882a593Smuzhiyun break;
305*4882a593Smuzhiyun case 0x02:
306*4882a593Smuzhiyun /* for block type 02, they shall be pseudorandomly generated and nonzero. */
307*4882a593Smuzhiyun for (; peb < in + inlen - 1; peb++) {
308*4882a593Smuzhiyun if (*peb == 0x00)
309*4882a593Smuzhiyun break;
310*4882a593Smuzhiyun }
311*4882a593Smuzhiyun break;
312*4882a593Smuzhiyun default:
313*4882a593Smuzhiyun E_TRACE("BT(0x%x) is invalid.\n", bt);
314*4882a593Smuzhiyun goto error;
315*4882a593Smuzhiyun }
316*4882a593Smuzhiyun
317*4882a593Smuzhiyun if (peb >= (in + inlen - 1)) {
318*4882a593Smuzhiyun E_TRACE("PS Error.\n");
319*4882a593Smuzhiyun goto error;
320*4882a593Smuzhiyun }
321*4882a593Smuzhiyun
322*4882a593Smuzhiyun /* skip 0x00 after PS */
323*4882a593Smuzhiyun peb++;
324*4882a593Smuzhiyun
325*4882a593Smuzhiyun /* get payload data */
326*4882a593Smuzhiyun *outlen = in + key_len - peb;
327*4882a593Smuzhiyun memcpy(out, peb, *outlen);
328*4882a593Smuzhiyun
329*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
330*4882a593Smuzhiyun error:
331*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
332*4882a593Smuzhiyun }
333*4882a593Smuzhiyun
334*4882a593Smuzhiyun /*
335*4882a593Smuzhiyun * Implementation of the PKCS#1 v2.1 RSAES-PKCS1-V1_5-ENCRYPT function
336*4882a593Smuzhiyun * 00 (01/02) [a bunch of non-zero random bytes] 00 [the message]
337*4882a593Smuzhiyun */
rsa_padding_add_pkcs15_type(uint16_t key_len,bool is_priv_key,const uint8_t * in,uint32_t in_len,uint8_t * out)338*4882a593Smuzhiyun RK_RES rsa_padding_add_pkcs15_type(uint16_t key_len, bool is_priv_key,
339*4882a593Smuzhiyun const uint8_t *in, uint32_t in_len, uint8_t *out)
340*4882a593Smuzhiyun {
341*4882a593Smuzhiyun uint32_t nb_pad, olen;
342*4882a593Smuzhiyun RK_RES res;
343*4882a593Smuzhiyun uint8_t *p = out;
344*4882a593Smuzhiyun
345*4882a593Smuzhiyun // We don't check p_rng because it won't be dereferenced here
346*4882a593Smuzhiyun if (in == NULL || out == NULL)
347*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
348*4882a593Smuzhiyun
349*4882a593Smuzhiyun olen = key_len;
350*4882a593Smuzhiyun
351*4882a593Smuzhiyun /* first comparison checks for overflow */
352*4882a593Smuzhiyun if (in_len + 11 < in_len || olen < in_len + 11)
353*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING_OVERFLOW;
354*4882a593Smuzhiyun
355*4882a593Smuzhiyun nb_pad = olen - 3 - in_len;
356*4882a593Smuzhiyun
357*4882a593Smuzhiyun *p++ = 0;
358*4882a593Smuzhiyun if (!is_priv_key) {
359*4882a593Smuzhiyun *p++ = MBEDTLS_RSA_CRYPT;
360*4882a593Smuzhiyun
361*4882a593Smuzhiyun while (nb_pad-- > 0) {
362*4882a593Smuzhiyun int rng_dl = 100;
363*4882a593Smuzhiyun
364*4882a593Smuzhiyun do {
365*4882a593Smuzhiyun res = rk_get_random(p, 1);
366*4882a593Smuzhiyun } while (*p == 0 && --rng_dl && res == 0);
367*4882a593Smuzhiyun
368*4882a593Smuzhiyun /* Check if RNG failed to generate data */
369*4882a593Smuzhiyun if (rng_dl == 0 || res != 0)
370*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
371*4882a593Smuzhiyun
372*4882a593Smuzhiyun p++;
373*4882a593Smuzhiyun }
374*4882a593Smuzhiyun } else {
375*4882a593Smuzhiyun *p++ = MBEDTLS_RSA_SIGN;
376*4882a593Smuzhiyun
377*4882a593Smuzhiyun while (nb_pad-- > 0)
378*4882a593Smuzhiyun *p++ = 0xFF;
379*4882a593Smuzhiyun }
380*4882a593Smuzhiyun
381*4882a593Smuzhiyun *p++ = 0;
382*4882a593Smuzhiyun memcpy(p, in, in_len);
383*4882a593Smuzhiyun
384*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
385*4882a593Smuzhiyun }
386*4882a593Smuzhiyun /*
387*4882a593Smuzhiyun * Implementation of the PKCS#1 v2.1 RSAES-PKCS1-V1_5-DECRYPT function
388*4882a593Smuzhiyun */
rsa_padding_check_pkcs15_type(uint16_t key_len,bool is_priv_key,const uint8_t * in,uint8_t * out,uint32_t * out_len)389*4882a593Smuzhiyun static RK_RES rsa_padding_check_pkcs15_type(uint16_t key_len, bool is_priv_key,
390*4882a593Smuzhiyun const uint8_t *in, uint8_t *out, uint32_t *out_len)
391*4882a593Smuzhiyun {
392*4882a593Smuzhiyun uint32_t ilen, pad_count = 0, i;
393*4882a593Smuzhiyun const uint8_t *p;
394*4882a593Smuzhiyun uint8_t bad, pad_done = 0;
395*4882a593Smuzhiyun
396*4882a593Smuzhiyun ilen = key_len;
397*4882a593Smuzhiyun p = in;
398*4882a593Smuzhiyun bad = 0;
399*4882a593Smuzhiyun
400*4882a593Smuzhiyun /*
401*4882a593Smuzhiyun * Check and get padding len in "constant-time"
402*4882a593Smuzhiyun */
403*4882a593Smuzhiyun bad |= *p++; /* First byte must be 0 */
404*4882a593Smuzhiyun
405*4882a593Smuzhiyun /* This test does not depend on secret data */
406*4882a593Smuzhiyun if (is_priv_key) {
407*4882a593Smuzhiyun bad |= *p++ ^ MBEDTLS_RSA_CRYPT;
408*4882a593Smuzhiyun
409*4882a593Smuzhiyun /* Get padding len, but always read till end of buffer
410*4882a593Smuzhiyun * (minus one, for the 00 byte)
411*4882a593Smuzhiyun */
412*4882a593Smuzhiyun for (i = 0; i < ilen - 3; i++) {
413*4882a593Smuzhiyun pad_done |= ((p[i] | (uint8_t)-p[i]) >> 7) ^ 1;
414*4882a593Smuzhiyun pad_count += ((pad_done | (uint8_t)-pad_done) >> 7) ^ 1;
415*4882a593Smuzhiyun }
416*4882a593Smuzhiyun
417*4882a593Smuzhiyun p += pad_count;
418*4882a593Smuzhiyun bad |= *p++; /* Must be zero */
419*4882a593Smuzhiyun } else {
420*4882a593Smuzhiyun bad |= *p++ ^ MBEDTLS_RSA_SIGN;
421*4882a593Smuzhiyun
422*4882a593Smuzhiyun /* Get padding len, but always read till end of buffer
423*4882a593Smuzhiyun * (minus one, for the 00 byte)
424*4882a593Smuzhiyun */
425*4882a593Smuzhiyun for (i = 0; i < ilen - 3; i++) {
426*4882a593Smuzhiyun pad_done |= (p[i] != 0xFF);
427*4882a593Smuzhiyun pad_count += (pad_done == 0);
428*4882a593Smuzhiyun }
429*4882a593Smuzhiyun
430*4882a593Smuzhiyun p += pad_count;
431*4882a593Smuzhiyun bad |= *p++; /* Must be zero */
432*4882a593Smuzhiyun }
433*4882a593Smuzhiyun
434*4882a593Smuzhiyun bad |= (pad_count < 8);
435*4882a593Smuzhiyun
436*4882a593Smuzhiyun if (bad)
437*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
438*4882a593Smuzhiyun
439*4882a593Smuzhiyun *out_len = ilen - (p - in);
440*4882a593Smuzhiyun memcpy(out, p, *out_len);
441*4882a593Smuzhiyun
442*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
443*4882a593Smuzhiyun }
444*4882a593Smuzhiyun
get_hash_algo_from_padding(uint32_t padding,uint32_t * hlen,uint32_t * hash_algo)445*4882a593Smuzhiyun static RK_RES get_hash_algo_from_padding(uint32_t padding,
446*4882a593Smuzhiyun uint32_t *hlen, uint32_t *hash_algo)
447*4882a593Smuzhiyun {
448*4882a593Smuzhiyun uint32_t shaalgo = RK_ALGO_SHA1;
449*4882a593Smuzhiyun
450*4882a593Smuzhiyun switch (padding) {
451*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA1:
452*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA1:
453*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA1:
454*4882a593Smuzhiyun *hlen = SHA1_HASH_SIZE;
455*4882a593Smuzhiyun shaalgo = RK_ALGO_SHA1;
456*4882a593Smuzhiyun break;
457*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA224:
458*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA224:
459*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA224:
460*4882a593Smuzhiyun *hlen = SHA224_HASH_SIZE;
461*4882a593Smuzhiyun shaalgo = RK_ALGO_SHA224;
462*4882a593Smuzhiyun break;
463*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA256:
464*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA256:
465*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA256:
466*4882a593Smuzhiyun *hlen = SHA256_HASH_SIZE;
467*4882a593Smuzhiyun shaalgo = RK_ALGO_SHA256;
468*4882a593Smuzhiyun break;
469*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA384:
470*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA384:
471*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA384:
472*4882a593Smuzhiyun *hlen = SHA384_HASH_SIZE;
473*4882a593Smuzhiyun shaalgo = RK_ALGO_SHA384;
474*4882a593Smuzhiyun break;
475*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA512:
476*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA512:
477*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA512:
478*4882a593Smuzhiyun *hlen = SHA512_HASH_SIZE;
479*4882a593Smuzhiyun shaalgo = RK_ALGO_SHA512;
480*4882a593Smuzhiyun break;
481*4882a593Smuzhiyun default:
482*4882a593Smuzhiyun D_TRACE("unknown padding %x", padding);
483*4882a593Smuzhiyun *hlen = 0;
484*4882a593Smuzhiyun shaalgo = 0;
485*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
486*4882a593Smuzhiyun }
487*4882a593Smuzhiyun
488*4882a593Smuzhiyun *hash_algo = shaalgo;
489*4882a593Smuzhiyun
490*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
491*4882a593Smuzhiyun }
492*4882a593Smuzhiyun
calc_padding_digest(uint32_t algo,const uint8_t * data,uint32_t data_len,uint8_t * digest)493*4882a593Smuzhiyun static RK_RES calc_padding_digest(uint32_t algo, const uint8_t *data, uint32_t data_len,
494*4882a593Smuzhiyun uint8_t *digest)
495*4882a593Smuzhiyun {
496*4882a593Smuzhiyun RK_RES res;
497*4882a593Smuzhiyun rk_hash_config hash_cfg;
498*4882a593Smuzhiyun rk_handle hash_hdl = 0;
499*4882a593Smuzhiyun
500*4882a593Smuzhiyun memset(&hash_cfg, 0x00, sizeof(hash_cfg));
501*4882a593Smuzhiyun
502*4882a593Smuzhiyun hash_cfg.algo = algo;
503*4882a593Smuzhiyun
504*4882a593Smuzhiyun res = rk_hash_init(&hash_cfg, &hash_hdl);
505*4882a593Smuzhiyun if (res)
506*4882a593Smuzhiyun goto exit;
507*4882a593Smuzhiyun
508*4882a593Smuzhiyun if (data && data_len != 0) {
509*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, data, data_len);
510*4882a593Smuzhiyun if (res) {
511*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
512*4882a593Smuzhiyun goto exit;
513*4882a593Smuzhiyun }
514*4882a593Smuzhiyun }
515*4882a593Smuzhiyun
516*4882a593Smuzhiyun res = rk_hash_final(hash_hdl, digest);
517*4882a593Smuzhiyun exit:
518*4882a593Smuzhiyun if (res)
519*4882a593Smuzhiyun D_TRACE("digest error.");
520*4882a593Smuzhiyun
521*4882a593Smuzhiyun return res;
522*4882a593Smuzhiyun }
523*4882a593Smuzhiyun
524*4882a593Smuzhiyun /**
525*4882a593Smuzhiyun * Generate and apply the MGF1 operation (from PKCS#1 v2.1) to a buffer.
526*4882a593Smuzhiyun *
527*4882a593Smuzhiyun * \param dst buffer to mask
528*4882a593Smuzhiyun * \param dlen length of destination buffer
529*4882a593Smuzhiyun * \param src source of the mask generation
530*4882a593Smuzhiyun * \param slen length of the source buffer
531*4882a593Smuzhiyun * \param md_ctx message digest context to use
532*4882a593Smuzhiyun */
mgf_mask(uint8_t * dst,uint32_t dlen,uint8_t * src,uint32_t slen,uint32_t hash_algo,uint32_t hash_len)533*4882a593Smuzhiyun static RK_RES mgf_mask(uint8_t *dst, uint32_t dlen, uint8_t *src, uint32_t slen,
534*4882a593Smuzhiyun uint32_t hash_algo, uint32_t hash_len)
535*4882a593Smuzhiyun {
536*4882a593Smuzhiyun uint8_t mask[SHA512_HASH_SIZE];
537*4882a593Smuzhiyun uint8_t counter[4];
538*4882a593Smuzhiyun uint8_t *p;
539*4882a593Smuzhiyun uint32_t i, use_len;
540*4882a593Smuzhiyun RK_RES res = 0;
541*4882a593Smuzhiyun rk_handle hash_hdl;
542*4882a593Smuzhiyun rk_hash_config hash_cfg;
543*4882a593Smuzhiyun
544*4882a593Smuzhiyun
545*4882a593Smuzhiyun memset(&hash_cfg, 0x00, sizeof(hash_cfg));
546*4882a593Smuzhiyun hash_cfg.algo = hash_algo;
547*4882a593Smuzhiyun
548*4882a593Smuzhiyun memset(mask, 0, sizeof(mask));
549*4882a593Smuzhiyun memset(counter, 0, sizeof(counter));
550*4882a593Smuzhiyun
551*4882a593Smuzhiyun /* Generate and apply dbMask */
552*4882a593Smuzhiyun p = dst;
553*4882a593Smuzhiyun
554*4882a593Smuzhiyun while (dlen > 0) {
555*4882a593Smuzhiyun use_len = hash_len;
556*4882a593Smuzhiyun if (dlen < hash_len)
557*4882a593Smuzhiyun use_len = dlen;
558*4882a593Smuzhiyun
559*4882a593Smuzhiyun res = rk_hash_init(&hash_cfg, &hash_hdl);
560*4882a593Smuzhiyun if (res)
561*4882a593Smuzhiyun goto cleanup;
562*4882a593Smuzhiyun
563*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, src, slen);
564*4882a593Smuzhiyun if (res) {
565*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
566*4882a593Smuzhiyun goto cleanup;
567*4882a593Smuzhiyun }
568*4882a593Smuzhiyun
569*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, counter, 4);
570*4882a593Smuzhiyun if (res) {
571*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
572*4882a593Smuzhiyun goto cleanup;
573*4882a593Smuzhiyun }
574*4882a593Smuzhiyun
575*4882a593Smuzhiyun res = rk_hash_final(hash_hdl, mask);
576*4882a593Smuzhiyun if (res)
577*4882a593Smuzhiyun goto cleanup;
578*4882a593Smuzhiyun
579*4882a593Smuzhiyun for (i = 0; i < use_len; ++i)
580*4882a593Smuzhiyun *p++ ^= mask[i];
581*4882a593Smuzhiyun
582*4882a593Smuzhiyun counter[3]++;
583*4882a593Smuzhiyun
584*4882a593Smuzhiyun dlen -= use_len;
585*4882a593Smuzhiyun }
586*4882a593Smuzhiyun
587*4882a593Smuzhiyun cleanup:
588*4882a593Smuzhiyun memset(mask, 0x00, sizeof(mask));
589*4882a593Smuzhiyun
590*4882a593Smuzhiyun return res;
591*4882a593Smuzhiyun }
592*4882a593Smuzhiyun
593*4882a593Smuzhiyun /*
594*4882a593Smuzhiyun * Implementation of the PKCS#1 v2.1 RSAES-OAEP-ENCRYPT function
595*4882a593Smuzhiyun */
rsa_padding_add_oaep_type(enum RK_RSA_CRYPT_PADDING padding,uint16_t key_len,const uint8_t * label,uint32_t label_len,const uint8_t * in,uint32_t in_len,uint8_t * out)596*4882a593Smuzhiyun static RK_RES rsa_padding_add_oaep_type(enum RK_RSA_CRYPT_PADDING padding, uint16_t key_len,
597*4882a593Smuzhiyun const uint8_t *label, uint32_t label_len,
598*4882a593Smuzhiyun const uint8_t *in, uint32_t in_len, uint8_t *out)
599*4882a593Smuzhiyun {
600*4882a593Smuzhiyun uint32_t olen;
601*4882a593Smuzhiyun RK_RES res;
602*4882a593Smuzhiyun uint8_t *p = out;
603*4882a593Smuzhiyun uint32_t hlen;
604*4882a593Smuzhiyun uint32_t hash_algo;
605*4882a593Smuzhiyun
606*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!out);
607*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!in);
608*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(label_len != 0 || label);
609*4882a593Smuzhiyun
610*4882a593Smuzhiyun olen = key_len;
611*4882a593Smuzhiyun res = get_hash_algo_from_padding(padding, &hlen, &hash_algo);
612*4882a593Smuzhiyun if (res)
613*4882a593Smuzhiyun goto error;
614*4882a593Smuzhiyun
615*4882a593Smuzhiyun /* first comparison checks for overflow */
616*4882a593Smuzhiyun if (in_len + 2 * hlen + 2 < in_len || olen < in_len + 2 * hlen + 2) {
617*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PADDING_OVERFLOW;
618*4882a593Smuzhiyun goto error;
619*4882a593Smuzhiyun }
620*4882a593Smuzhiyun
621*4882a593Smuzhiyun memset(out, 0, olen);
622*4882a593Smuzhiyun
623*4882a593Smuzhiyun *p++ = 0;
624*4882a593Smuzhiyun
625*4882a593Smuzhiyun /* Generate a random octet string seed */
626*4882a593Smuzhiyun res = rk_get_random(p, hlen);
627*4882a593Smuzhiyun if (res)
628*4882a593Smuzhiyun goto error;
629*4882a593Smuzhiyun
630*4882a593Smuzhiyun p += hlen;
631*4882a593Smuzhiyun
632*4882a593Smuzhiyun /* Construct DB */
633*4882a593Smuzhiyun res = calc_padding_digest(hash_algo, label, label_len, p);
634*4882a593Smuzhiyun if (res)
635*4882a593Smuzhiyun goto error;
636*4882a593Smuzhiyun
637*4882a593Smuzhiyun p += hlen;
638*4882a593Smuzhiyun p += olen - 2 * hlen - 2 - in_len;
639*4882a593Smuzhiyun *p++ = 1;
640*4882a593Smuzhiyun memcpy(p, in, in_len);
641*4882a593Smuzhiyun
642*4882a593Smuzhiyun /* maskedDB: Apply dbMask to DB */
643*4882a593Smuzhiyun res = mgf_mask(out + hlen + 1, olen - hlen - 1, out + 1, hlen, hash_algo, hlen);
644*4882a593Smuzhiyun if (res)
645*4882a593Smuzhiyun goto error;
646*4882a593Smuzhiyun
647*4882a593Smuzhiyun /* maskedSeed: Apply seedMask to seed */
648*4882a593Smuzhiyun res = mgf_mask(out + 1, hlen, out + hlen + 1, olen - hlen - 1, hash_algo, hlen);
649*4882a593Smuzhiyun if (res)
650*4882a593Smuzhiyun goto error;
651*4882a593Smuzhiyun
652*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
653*4882a593Smuzhiyun
654*4882a593Smuzhiyun error:
655*4882a593Smuzhiyun return res;
656*4882a593Smuzhiyun }
657*4882a593Smuzhiyun
658*4882a593Smuzhiyun /*
659*4882a593Smuzhiyun * Implementation of the PKCS#1 v2.1 RSAES-OAEP-DECRYPT function
660*4882a593Smuzhiyun */
rsa_padding_check_oaep_type(enum RK_RSA_CRYPT_PADDING padding,uint16_t key_len,const uint8_t * label,size_t label_len,const uint8_t * in,uint8_t * out,uint32_t * out_len)661*4882a593Smuzhiyun RK_RES rsa_padding_check_oaep_type(enum RK_RSA_CRYPT_PADDING padding, uint16_t key_len,
662*4882a593Smuzhiyun const uint8_t *label, size_t label_len,
663*4882a593Smuzhiyun const uint8_t *in, uint8_t *out, uint32_t *out_len)
664*4882a593Smuzhiyun {
665*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_ERR_PADDING;
666*4882a593Smuzhiyun uint32_t ilen, i, pad_len;
667*4882a593Smuzhiyun uint8_t *p, bad, pad_done;
668*4882a593Smuzhiyun uint8_t *buf = NULL;
669*4882a593Smuzhiyun uint8_t lhash[SHA512_HASH_SIZE];
670*4882a593Smuzhiyun uint32_t hlen;
671*4882a593Smuzhiyun uint32_t hash_algo;
672*4882a593Smuzhiyun
673*4882a593Smuzhiyun ilen = key_len;
674*4882a593Smuzhiyun res = get_hash_algo_from_padding(padding, &hlen, &hash_algo);
675*4882a593Smuzhiyun if (res)
676*4882a593Smuzhiyun return res;
677*4882a593Smuzhiyun
678*4882a593Smuzhiyun buf = malloc(ilen);
679*4882a593Smuzhiyun if (!buf)
680*4882a593Smuzhiyun return RK_CRYPTO_ERR_OUT_OF_MEMORY;
681*4882a593Smuzhiyun
682*4882a593Smuzhiyun memcpy(buf, in, ilen);
683*4882a593Smuzhiyun
684*4882a593Smuzhiyun // checking for integer underflow
685*4882a593Smuzhiyun if (2 * hlen + 2 > ilen) {
686*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PADDING;
687*4882a593Smuzhiyun goto exit;
688*4882a593Smuzhiyun }
689*4882a593Smuzhiyun
690*4882a593Smuzhiyun /*
691*4882a593Smuzhiyun * Unmask data and generate lHash
692*4882a593Smuzhiyun */
693*4882a593Smuzhiyun res = calc_padding_digest(hash_algo, label, label_len, lhash);
694*4882a593Smuzhiyun if (res)
695*4882a593Smuzhiyun goto exit;
696*4882a593Smuzhiyun
697*4882a593Smuzhiyun /* seed: Apply seedMask to maskedSeed */
698*4882a593Smuzhiyun res = mgf_mask(buf + 1, hlen, buf + hlen + 1, ilen - hlen - 1, hash_algo, hlen);
699*4882a593Smuzhiyun if (res)
700*4882a593Smuzhiyun goto exit;
701*4882a593Smuzhiyun
702*4882a593Smuzhiyun /* DB: Apply dbMask to maskedDB */
703*4882a593Smuzhiyun res = mgf_mask(buf + hlen + 1, ilen - hlen - 1, buf + 1, hlen, hash_algo, hlen);
704*4882a593Smuzhiyun if (res)
705*4882a593Smuzhiyun goto exit;
706*4882a593Smuzhiyun
707*4882a593Smuzhiyun /*
708*4882a593Smuzhiyun * Check contents, in "constant-time"
709*4882a593Smuzhiyun */
710*4882a593Smuzhiyun p = buf;
711*4882a593Smuzhiyun bad = 0;
712*4882a593Smuzhiyun
713*4882a593Smuzhiyun bad |= *p++; /* First byte must be 0 */
714*4882a593Smuzhiyun
715*4882a593Smuzhiyun p += hlen; /* Skip seed */
716*4882a593Smuzhiyun
717*4882a593Smuzhiyun /* Check lHash */
718*4882a593Smuzhiyun for (i = 0; i < hlen; i++)
719*4882a593Smuzhiyun bad |= lhash[i] ^ *p++;
720*4882a593Smuzhiyun
721*4882a593Smuzhiyun /* Get zero-padding len, but always read till end of buffer
722*4882a593Smuzhiyun * (minus one, for the 01 byte)
723*4882a593Smuzhiyun */
724*4882a593Smuzhiyun pad_len = 0;
725*4882a593Smuzhiyun pad_done = 0;
726*4882a593Smuzhiyun for (i = 0; i < ilen - 2 * hlen - 2; i++) {
727*4882a593Smuzhiyun pad_done |= p[i];
728*4882a593Smuzhiyun pad_len += ((pad_done | (uint8_t)-pad_done) >> 7) ^ 1;
729*4882a593Smuzhiyun }
730*4882a593Smuzhiyun
731*4882a593Smuzhiyun p += pad_len;
732*4882a593Smuzhiyun bad |= *p++ ^ 0x01;
733*4882a593Smuzhiyun
734*4882a593Smuzhiyun /*
735*4882a593Smuzhiyun * The only information "leaked" is whether the padding was correct or not
736*4882a593Smuzhiyun * (eg, no data is copied if it was not correct). This meets the
737*4882a593Smuzhiyun * recommendations in PKCS#1 v2.2: an opponent cannot distinguish between
738*4882a593Smuzhiyun * the different error conditions.
739*4882a593Smuzhiyun */
740*4882a593Smuzhiyun if (bad != 0) {
741*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PADDING;
742*4882a593Smuzhiyun goto exit;
743*4882a593Smuzhiyun }
744*4882a593Smuzhiyun
745*4882a593Smuzhiyun if (ilen - (p - buf) > key_len) {
746*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PADDING;
747*4882a593Smuzhiyun goto exit;
748*4882a593Smuzhiyun }
749*4882a593Smuzhiyun
750*4882a593Smuzhiyun *out_len = ilen - (p - buf);
751*4882a593Smuzhiyun memcpy(out, p, *out_len);
752*4882a593Smuzhiyun
753*4882a593Smuzhiyun res = RK_CRYPTO_SUCCESS;
754*4882a593Smuzhiyun exit:
755*4882a593Smuzhiyun if (buf)
756*4882a593Smuzhiyun free(buf);
757*4882a593Smuzhiyun
758*4882a593Smuzhiyun return res;
759*4882a593Smuzhiyun }
760*4882a593Smuzhiyun
761*4882a593Smuzhiyun /*
762*4882a593Smuzhiyun * Implementation of the PKCS#1 v2.1 RSASSA-PKCS1-V1_5-SIGN function
763*4882a593Smuzhiyun * Construct a PKCS v1.5 encoding of a hashed message
764*4882a593Smuzhiyun */
rsa_padding_add_pkcs15_sign_type(uint32_t hash_algo,uint16_t key_len,const uint8_t * hash,uint8_t hash_len,uint8_t * out)765*4882a593Smuzhiyun static int rsa_padding_add_pkcs15_sign_type(uint32_t hash_algo, uint16_t key_len,
766*4882a593Smuzhiyun const uint8_t *hash, uint8_t hash_len, uint8_t *out)
767*4882a593Smuzhiyun {
768*4882a593Smuzhiyun RK_RES res;
769*4882a593Smuzhiyun uint32_t oid_size = 0;
770*4882a593Smuzhiyun uint32_t nb_pad = key_len;
771*4882a593Smuzhiyun uint8_t *p = out;
772*4882a593Smuzhiyun const uint8_t *oid = NULL;
773*4882a593Smuzhiyun
774*4882a593Smuzhiyun /* Gather length of hash to sign */
775*4882a593Smuzhiyun res = get_oid_by_md(hash_algo, &oid, &oid_size);
776*4882a593Smuzhiyun if (res)
777*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
778*4882a593Smuzhiyun
779*4882a593Smuzhiyun /* Double-check that 8 + hash_len + oid_size can be used as a
780*4882a593Smuzhiyun * 1-byte ASN.1 length encoding and that there's no overflow.
781*4882a593Smuzhiyun */
782*4882a593Smuzhiyun if (8 + hash_len + oid_size >= 0x80 ||
783*4882a593Smuzhiyun 10 + hash_len < hash_len ||
784*4882a593Smuzhiyun 10 + hash_len + oid_size < 10 + hash_len)
785*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING_OVERFLOW;
786*4882a593Smuzhiyun
787*4882a593Smuzhiyun /*
788*4882a593Smuzhiyun * Static bounds check:
789*4882a593Smuzhiyun * - Need 10 bytes for five tag-length pairs.
790*4882a593Smuzhiyun * (Insist on 1-byte length encodings to protect against variants of
791*4882a593Smuzhiyun * Bleichenbacher's forgery attack against lax PKCS#1v1.5 verification)
792*4882a593Smuzhiyun * - Need hash_len bytes for hash
793*4882a593Smuzhiyun * - Need oid_size bytes for hash alg OID.
794*4882a593Smuzhiyun */
795*4882a593Smuzhiyun if (nb_pad < 10 + hash_len + oid_size)
796*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING_OVERFLOW;
797*4882a593Smuzhiyun
798*4882a593Smuzhiyun nb_pad -= 10 + hash_len + oid_size;
799*4882a593Smuzhiyun
800*4882a593Smuzhiyun /* Need space for signature header and padding delimiter (3 bytes),
801*4882a593Smuzhiyun * and 8 bytes for the minimal padding
802*4882a593Smuzhiyun */
803*4882a593Smuzhiyun if (nb_pad < 3 + 8)
804*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING_OVERFLOW;
805*4882a593Smuzhiyun
806*4882a593Smuzhiyun nb_pad -= 3;
807*4882a593Smuzhiyun
808*4882a593Smuzhiyun /* Now nb_pad is the amount of memory to be filled
809*4882a593Smuzhiyun * with padding, and at least 8 bytes long.
810*4882a593Smuzhiyun */
811*4882a593Smuzhiyun
812*4882a593Smuzhiyun /* Write signature header and padding */
813*4882a593Smuzhiyun *p++ = 0;
814*4882a593Smuzhiyun *p++ = MBEDTLS_RSA_SIGN;
815*4882a593Smuzhiyun memset(p, 0xFF, nb_pad);
816*4882a593Smuzhiyun p += nb_pad;
817*4882a593Smuzhiyun *p++ = 0;
818*4882a593Smuzhiyun
819*4882a593Smuzhiyun /* Signing hashed data, add corresponding ASN.1 structure
820*4882a593Smuzhiyun *
821*4882a593Smuzhiyun * DigestInfo ::= SEQUENCE {
822*4882a593Smuzhiyun * digestAlgorithm DigestAlgorithmIdentifier,
823*4882a593Smuzhiyun * digest Digest }
824*4882a593Smuzhiyun * DigestAlgorithmIdentifier ::= AlgorithmIdentifier
825*4882a593Smuzhiyun * Digest ::= OCTET STRING
826*4882a593Smuzhiyun *
827*4882a593Smuzhiyun * Schematic:
828*4882a593Smuzhiyun * TAG-SEQ + LEN [ TAG-SEQ + LEN [ TAG-OID + LEN [ OID ]
829*4882a593Smuzhiyun * TAG-NULL + LEN [ NULL ] ]
830*4882a593Smuzhiyun * TAG-OCTET + LEN [ HASH ] ]
831*4882a593Smuzhiyun */
832*4882a593Smuzhiyun *p++ = ASN1_SEQUENCE;
833*4882a593Smuzhiyun *p++ = (uint8_t)(0x08 + oid_size + hash_len);
834*4882a593Smuzhiyun *p++ = ASN1_SEQUENCE;
835*4882a593Smuzhiyun *p++ = (uint8_t)(0x04 + oid_size);
836*4882a593Smuzhiyun *p++ = ASN1_OBJ_IDENTIFIER;
837*4882a593Smuzhiyun *p++ = (uint8_t)oid_size;
838*4882a593Smuzhiyun memcpy(p, oid, oid_size);
839*4882a593Smuzhiyun p += oid_size;
840*4882a593Smuzhiyun *p++ = ASN1_NULL;
841*4882a593Smuzhiyun *p++ = 0x00;
842*4882a593Smuzhiyun *p++ = ASN1_OCT_STRING;
843*4882a593Smuzhiyun *p++ = (uint8_t)hash_len;
844*4882a593Smuzhiyun memcpy(p, hash, hash_len);
845*4882a593Smuzhiyun p += hash_len;
846*4882a593Smuzhiyun
847*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
848*4882a593Smuzhiyun }
849*4882a593Smuzhiyun
850*4882a593Smuzhiyun /*
851*4882a593Smuzhiyun * Implementation of the PKCS#1 v2.1 RSASSA-PSS-SIGN function
852*4882a593Smuzhiyun */
rsa_padding_add_pss_type(uint16_t key_len,uint16_t n_bits,uint32_t hash_algo,const uint8_t * hash,uint32_t hash_len,uint8_t * out)853*4882a593Smuzhiyun RK_RES rsa_padding_add_pss_type(uint16_t key_len, uint16_t n_bits,
854*4882a593Smuzhiyun uint32_t hash_algo, const uint8_t *hash,
855*4882a593Smuzhiyun uint32_t hash_len, uint8_t *out)
856*4882a593Smuzhiyun {
857*4882a593Smuzhiyun uint32_t olen;
858*4882a593Smuzhiyun uint8_t *p = out;
859*4882a593Smuzhiyun uint8_t salt[SHA512_HASH_SIZE];
860*4882a593Smuzhiyun uint32_t slen, hlen, min_slen, offset = 0;
861*4882a593Smuzhiyun RK_RES res;
862*4882a593Smuzhiyun uint32_t msb, ps_len;
863*4882a593Smuzhiyun rk_hash_config hash_cfg;
864*4882a593Smuzhiyun rk_handle hash_hdl;
865*4882a593Smuzhiyun
866*4882a593Smuzhiyun olen = key_len;
867*4882a593Smuzhiyun hlen = hash_len;
868*4882a593Smuzhiyun slen = hlen;
869*4882a593Smuzhiyun
870*4882a593Smuzhiyun /* Calculate the largest possible salt length. Normally this is the hash
871*4882a593Smuzhiyun * length, which is the maximum length the salt can have. If there is not
872*4882a593Smuzhiyun * enough room, use the maximum salt length that fits. The constraint is
873*4882a593Smuzhiyun * that the hash length plus the salt length plus 2 bytes must be at most
874*4882a593Smuzhiyun * the key length. This complies with FIPS 186-4.5.5 (e) and RFC 8017
875*4882a593Smuzhiyun * (PKCS#1 v2.2) 9.1.1 step 3.
876*4882a593Smuzhiyun */
877*4882a593Smuzhiyun min_slen = hlen - 2;
878*4882a593Smuzhiyun if (olen < hlen + min_slen + 2)
879*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING_OVERFLOW;
880*4882a593Smuzhiyun else if (olen >= hlen + hlen + 2)
881*4882a593Smuzhiyun slen = hlen;
882*4882a593Smuzhiyun else
883*4882a593Smuzhiyun slen = olen - hlen - 2;
884*4882a593Smuzhiyun
885*4882a593Smuzhiyun if (olen < hlen * 2 + 2)
886*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING_OVERFLOW;
887*4882a593Smuzhiyun
888*4882a593Smuzhiyun ps_len = olen - hlen * 2 - 2;
889*4882a593Smuzhiyun
890*4882a593Smuzhiyun if (olen < ps_len + 1 + slen + hlen)
891*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING_OVERFLOW;
892*4882a593Smuzhiyun
893*4882a593Smuzhiyun memset(out, 0, olen);
894*4882a593Smuzhiyun
895*4882a593Smuzhiyun /* Generate salt of length slen */
896*4882a593Smuzhiyun res = rk_get_random(salt, slen);
897*4882a593Smuzhiyun if (res)
898*4882a593Smuzhiyun return res;
899*4882a593Smuzhiyun
900*4882a593Smuzhiyun /* Note: EMSA-PSS encoding is over the length of N - 1 bits */
901*4882a593Smuzhiyun msb = n_bits - 1;
902*4882a593Smuzhiyun p += ps_len;
903*4882a593Smuzhiyun *p++ = 0x01;
904*4882a593Smuzhiyun memcpy(p, salt, slen);
905*4882a593Smuzhiyun p += slen;
906*4882a593Smuzhiyun
907*4882a593Smuzhiyun /* Generate H = Hash( M' ) */
908*4882a593Smuzhiyun memset(&hash_cfg, 0x00, sizeof(hash_cfg));
909*4882a593Smuzhiyun hash_cfg.algo = hash_algo;
910*4882a593Smuzhiyun
911*4882a593Smuzhiyun res = rk_hash_init(&hash_cfg, &hash_hdl);
912*4882a593Smuzhiyun if (res)
913*4882a593Smuzhiyun goto exit;
914*4882a593Smuzhiyun
915*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, p, 8);
916*4882a593Smuzhiyun if (res) {
917*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
918*4882a593Smuzhiyun goto exit;
919*4882a593Smuzhiyun }
920*4882a593Smuzhiyun
921*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, hash, hash_len);
922*4882a593Smuzhiyun if (res) {
923*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
924*4882a593Smuzhiyun goto exit;
925*4882a593Smuzhiyun }
926*4882a593Smuzhiyun
927*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, salt, slen);
928*4882a593Smuzhiyun if (res) {
929*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
930*4882a593Smuzhiyun goto exit;
931*4882a593Smuzhiyun }
932*4882a593Smuzhiyun
933*4882a593Smuzhiyun res = rk_hash_final(hash_hdl, p);
934*4882a593Smuzhiyun if (res)
935*4882a593Smuzhiyun goto exit;
936*4882a593Smuzhiyun
937*4882a593Smuzhiyun /* Compensate for boundary condition when applying mask */
938*4882a593Smuzhiyun if (msb % 8 == 0)
939*4882a593Smuzhiyun offset = 1;
940*4882a593Smuzhiyun
941*4882a593Smuzhiyun /* maskedDB: Apply dbMask to DB */
942*4882a593Smuzhiyun res = mgf_mask(out + offset, olen - hlen - 1 - offset, p, hlen, hash_algo, hash_len);
943*4882a593Smuzhiyun if (res)
944*4882a593Smuzhiyun goto exit;
945*4882a593Smuzhiyun
946*4882a593Smuzhiyun msb = n_bits - 1;
947*4882a593Smuzhiyun out[0] &= 0xFF >> (olen * 8 - msb);
948*4882a593Smuzhiyun
949*4882a593Smuzhiyun p += hlen;
950*4882a593Smuzhiyun *p++ = 0xBC;
951*4882a593Smuzhiyun
952*4882a593Smuzhiyun exit:
953*4882a593Smuzhiyun return res;
954*4882a593Smuzhiyun }
955*4882a593Smuzhiyun
956*4882a593Smuzhiyun /*
957*4882a593Smuzhiyun * Implementation of the PKCS#1 v2.1 RSASSA-PSS-VERIFY function
958*4882a593Smuzhiyun */
rk_rsa_padding_check_pss_type(uint16_t key_len,uint16_t n_bits,uint32_t hash_algo,uint32_t hash_len,const uint8_t * hash,const uint8_t * dec)959*4882a593Smuzhiyun RK_RES rk_rsa_padding_check_pss_type(uint16_t key_len, uint16_t n_bits,
960*4882a593Smuzhiyun uint32_t hash_algo, uint32_t hash_len,
961*4882a593Smuzhiyun const uint8_t *hash, const uint8_t *dec)
962*4882a593Smuzhiyun {
963*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_ERR_PADDING;
964*4882a593Smuzhiyun uint32_t siglen;
965*4882a593Smuzhiyun uint8_t *p;
966*4882a593Smuzhiyun uint8_t *buf = NULL;
967*4882a593Smuzhiyun uint8_t result[SHA512_HASH_SIZE];
968*4882a593Smuzhiyun uint8_t zeros[8];
969*4882a593Smuzhiyun uint32_t hlen;
970*4882a593Smuzhiyun uint32_t slen, msb;
971*4882a593Smuzhiyun rk_hash_config hash_cfg;
972*4882a593Smuzhiyun rk_handle hash_hdl;
973*4882a593Smuzhiyun
974*4882a593Smuzhiyun buf = malloc(key_len);
975*4882a593Smuzhiyun if (!buf)
976*4882a593Smuzhiyun return RK_CRYPTO_ERR_OUT_OF_MEMORY;
977*4882a593Smuzhiyun
978*4882a593Smuzhiyun memcpy(buf, dec, key_len);
979*4882a593Smuzhiyun
980*4882a593Smuzhiyun siglen = key_len;
981*4882a593Smuzhiyun
982*4882a593Smuzhiyun if (siglen < 16) {
983*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PADDING;
984*4882a593Smuzhiyun goto error;
985*4882a593Smuzhiyun }
986*4882a593Smuzhiyun
987*4882a593Smuzhiyun p = buf;
988*4882a593Smuzhiyun
989*4882a593Smuzhiyun if (buf[siglen - 1] != 0xBC) {
990*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PADDING;
991*4882a593Smuzhiyun goto error;
992*4882a593Smuzhiyun }
993*4882a593Smuzhiyun
994*4882a593Smuzhiyun hlen = hash_len;
995*4882a593Smuzhiyun slen = siglen - hlen - 1; /* Currently length of salt + padding */
996*4882a593Smuzhiyun
997*4882a593Smuzhiyun memset(zeros, 0, 8);
998*4882a593Smuzhiyun
999*4882a593Smuzhiyun /*
1000*4882a593Smuzhiyun * Note: EMSA-PSS verification is over the length of N - 1 bits
1001*4882a593Smuzhiyun */
1002*4882a593Smuzhiyun msb = n_bits - 1;
1003*4882a593Smuzhiyun
1004*4882a593Smuzhiyun /* Compensate for boundary condition when applying mask */
1005*4882a593Smuzhiyun if (msb % 8 == 0) {
1006*4882a593Smuzhiyun p++;
1007*4882a593Smuzhiyun siglen -= 1;
1008*4882a593Smuzhiyun }
1009*4882a593Smuzhiyun if (buf[0] >> (8 - siglen * 8 + msb)) {
1010*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PADDING;
1011*4882a593Smuzhiyun goto error;
1012*4882a593Smuzhiyun }
1013*4882a593Smuzhiyun
1014*4882a593Smuzhiyun res = mgf_mask(p, siglen - hlen - 1, p + siglen - hlen - 1, hlen, hash_algo, hash_len);
1015*4882a593Smuzhiyun if (res)
1016*4882a593Smuzhiyun goto error;
1017*4882a593Smuzhiyun
1018*4882a593Smuzhiyun buf[0] &= 0xFF >> (siglen * 8 - msb);
1019*4882a593Smuzhiyun
1020*4882a593Smuzhiyun while (p < buf + siglen && *p == 0)
1021*4882a593Smuzhiyun p++;
1022*4882a593Smuzhiyun
1023*4882a593Smuzhiyun if (p == buf + siglen || *p++ != 0x01) {
1024*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PADDING;
1025*4882a593Smuzhiyun goto error;
1026*4882a593Smuzhiyun }
1027*4882a593Smuzhiyun
1028*4882a593Smuzhiyun /* Actual salt len */
1029*4882a593Smuzhiyun slen -= p - buf;
1030*4882a593Smuzhiyun
1031*4882a593Smuzhiyun /*
1032*4882a593Smuzhiyun * Generate H = Hash( M' )
1033*4882a593Smuzhiyun */
1034*4882a593Smuzhiyun
1035*4882a593Smuzhiyun memset(&hash_cfg, 0x00, sizeof(hash_cfg));
1036*4882a593Smuzhiyun hash_cfg.algo = hash_algo;
1037*4882a593Smuzhiyun
1038*4882a593Smuzhiyun res = rk_hash_init(&hash_cfg, &hash_hdl);
1039*4882a593Smuzhiyun if (res)
1040*4882a593Smuzhiyun goto error;
1041*4882a593Smuzhiyun
1042*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, zeros, 8);
1043*4882a593Smuzhiyun if (res) {
1044*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
1045*4882a593Smuzhiyun goto error;
1046*4882a593Smuzhiyun }
1047*4882a593Smuzhiyun
1048*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, hash, hash_len);
1049*4882a593Smuzhiyun if (res) {
1050*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
1051*4882a593Smuzhiyun goto error;
1052*4882a593Smuzhiyun }
1053*4882a593Smuzhiyun
1054*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, p, slen);
1055*4882a593Smuzhiyun if (res) {
1056*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
1057*4882a593Smuzhiyun goto error;
1058*4882a593Smuzhiyun }
1059*4882a593Smuzhiyun
1060*4882a593Smuzhiyun res = rk_hash_final(hash_hdl, result);
1061*4882a593Smuzhiyun if (res)
1062*4882a593Smuzhiyun goto error;
1063*4882a593Smuzhiyun
1064*4882a593Smuzhiyun free(buf);
1065*4882a593Smuzhiyun
1066*4882a593Smuzhiyun if (memcmp(p + slen, result, hlen) == 0)
1067*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
1068*4882a593Smuzhiyun else
1069*4882a593Smuzhiyun return RK_CRYPTO_ERR_VERIFY;
1070*4882a593Smuzhiyun
1071*4882a593Smuzhiyun error:
1072*4882a593Smuzhiyun if (buf)
1073*4882a593Smuzhiyun free(buf);
1074*4882a593Smuzhiyun
1075*4882a593Smuzhiyun return RK_CRYPTO_ERR_PADDING;
1076*4882a593Smuzhiyun }
1077*4882a593Smuzhiyun
rk_rsa_pubkey_encode(rk_rsa_pub_key_pack * pub,uint8_t * asn1_key,uint16_t * asn1_key_len,uint16_t * key_bits)1078*4882a593Smuzhiyun RK_RES rk_rsa_pubkey_encode(rk_rsa_pub_key_pack *pub,
1079*4882a593Smuzhiyun uint8_t *asn1_key, uint16_t *asn1_key_len, uint16_t *key_bits)
1080*4882a593Smuzhiyun {
1081*4882a593Smuzhiyun RK_RES res;
1082*4882a593Smuzhiyun rk_rsa_pub_key *rsa_key = &pub->key;
1083*4882a593Smuzhiyun uint8_t tmp_field[8];
1084*4882a593Smuzhiyun uint32_t total_len = 0, tmp_len = 0, out_max;
1085*4882a593Smuzhiyun
1086*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!asn1_key || !asn1_key_len || !pub || !key_bits);
1087*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!rsa_key->n || rsa_key->n_len == 0);
1088*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!rsa_key->e || rsa_key->e_len == 0);
1089*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(rsa_key->n_len != 1024 / 8 &&
1090*4882a593Smuzhiyun rsa_key->n_len != 2048 / 8 &&
1091*4882a593Smuzhiyun rsa_key->n_len != 3072 / 8 &&
1092*4882a593Smuzhiyun rsa_key->n_len != 4096 / 8);
1093*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(pub->key_type != RK_RSA_KEY_TYPE_PLAIN);
1094*4882a593Smuzhiyun
1095*4882a593Smuzhiyun out_max = *asn1_key_len;
1096*4882a593Smuzhiyun
1097*4882a593Smuzhiyun //padding n
1098*4882a593Smuzhiyun res = asn1_set_object(rsa_key->n, rsa_key->n_len, ASN1_INTEGER, 1,
1099*4882a593Smuzhiyun asn1_key + total_len, out_max, &tmp_len);
1100*4882a593Smuzhiyun if (res != RK_CRYPTO_SUCCESS) {
1101*4882a593Smuzhiyun D_TRACE("set rsa_key->n object error!");
1102*4882a593Smuzhiyun goto exit;
1103*4882a593Smuzhiyun }
1104*4882a593Smuzhiyun
1105*4882a593Smuzhiyun total_len += tmp_len;
1106*4882a593Smuzhiyun out_max -= tmp_len;
1107*4882a593Smuzhiyun
1108*4882a593Smuzhiyun //padding e
1109*4882a593Smuzhiyun res = asn1_set_object(rsa_key->e, rsa_key->e_len, ASN1_INTEGER, 0,
1110*4882a593Smuzhiyun asn1_key + total_len, out_max, &tmp_len);
1111*4882a593Smuzhiyun if (res != RK_CRYPTO_SUCCESS) {
1112*4882a593Smuzhiyun D_TRACE("set rsa_key->e object error!");
1113*4882a593Smuzhiyun goto exit;
1114*4882a593Smuzhiyun }
1115*4882a593Smuzhiyun total_len += tmp_len;
1116*4882a593Smuzhiyun out_max -= tmp_len;
1117*4882a593Smuzhiyun
1118*4882a593Smuzhiyun //add SEQUENCE info in head
1119*4882a593Smuzhiyun res = asn1_compose_len(total_len, tmp_field, &tmp_len);
1120*4882a593Smuzhiyun if (res != RK_CRYPTO_SUCCESS) {
1121*4882a593Smuzhiyun D_TRACE("set asn1_compose_len error!");
1122*4882a593Smuzhiyun goto exit;
1123*4882a593Smuzhiyun }
1124*4882a593Smuzhiyun
1125*4882a593Smuzhiyun if (out_max < tmp_len + 1) {
1126*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
1127*4882a593Smuzhiyun goto exit;
1128*4882a593Smuzhiyun }
1129*4882a593Smuzhiyun
1130*4882a593Smuzhiyun memmove(asn1_key + tmp_len + 1, asn1_key, total_len);
1131*4882a593Smuzhiyun *asn1_key = ASN1_SEQUENCE;
1132*4882a593Smuzhiyun total_len++;
1133*4882a593Smuzhiyun memmove(asn1_key + 1, tmp_field, tmp_len);
1134*4882a593Smuzhiyun total_len += tmp_len;
1135*4882a593Smuzhiyun
1136*4882a593Smuzhiyun *asn1_key_len = total_len;
1137*4882a593Smuzhiyun *key_bits = rsa_key->n_len * 8;
1138*4882a593Smuzhiyun exit:
1139*4882a593Smuzhiyun return res;
1140*4882a593Smuzhiyun }
1141*4882a593Smuzhiyun
rk_rsa_privkey_encode(rk_rsa_priv_key_pack * priv,uint8_t * asn1_key,uint16_t * asn1_key_len,uint16_t * key_bits)1142*4882a593Smuzhiyun RK_RES rk_rsa_privkey_encode(rk_rsa_priv_key_pack *priv,
1143*4882a593Smuzhiyun uint8_t *asn1_key, uint16_t *asn1_key_len, uint16_t *key_bits)
1144*4882a593Smuzhiyun {
1145*4882a593Smuzhiyun RK_RES res;
1146*4882a593Smuzhiyun uint8_t *empty_data = NULL;
1147*4882a593Smuzhiyun uint8_t tmp_field[5];
1148*4882a593Smuzhiyun uint32_t total_len = 0, tmp_len = 0;
1149*4882a593Smuzhiyun uint8_t version[1] = {0};
1150*4882a593Smuzhiyun uint16_t ver_len = 1;
1151*4882a593Smuzhiyun rk_rsa_priv_key *rsa_key = &priv->key;
1152*4882a593Smuzhiyun uint32_t i, out_max, empty_data_len;
1153*4882a593Smuzhiyun asn1_object_t object_list[] = {
1154*4882a593Smuzhiyun {version, &ver_len, ASN1_INTEGER, 0},
1155*4882a593Smuzhiyun {rsa_key->n, &rsa_key->n_len, ASN1_INTEGER, 1},
1156*4882a593Smuzhiyun {rsa_key->e, &rsa_key->e_len, ASN1_INTEGER, 0},
1157*4882a593Smuzhiyun {rsa_key->d, &rsa_key->d_len, ASN1_INTEGER, 1},
1158*4882a593Smuzhiyun {rsa_key->p, &rsa_key->p_len, ASN1_INTEGER, 1},
1159*4882a593Smuzhiyun {rsa_key->q, &rsa_key->q_len, ASN1_INTEGER, 1},
1160*4882a593Smuzhiyun {rsa_key->dp, &rsa_key->dp_len, ASN1_INTEGER, 1},
1161*4882a593Smuzhiyun {rsa_key->dq, &rsa_key->dq_len, ASN1_INTEGER, 1},
1162*4882a593Smuzhiyun {rsa_key->qp, &rsa_key->qp_len, ASN1_INTEGER, 1},
1163*4882a593Smuzhiyun };
1164*4882a593Smuzhiyun
1165*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!asn1_key || !asn1_key_len || !priv || !key_bits);
1166*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!rsa_key->n || rsa_key->n_len == 0);
1167*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!rsa_key->e || rsa_key->e_len == 0);
1168*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(rsa_key->n_len != 1024 / 8 &&
1169*4882a593Smuzhiyun rsa_key->n_len != 2048 / 8 &&
1170*4882a593Smuzhiyun rsa_key->n_len != 3072 / 8 &&
1171*4882a593Smuzhiyun rsa_key->n_len != 4096 / 8);
1172*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(!rsa_key->d || rsa_key->d_len == 0);
1173*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(rsa_key->n_len != rsa_key->d_len);
1174*4882a593Smuzhiyun
1175*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(priv->key_type != RK_RSA_KEY_TYPE_PLAIN);
1176*4882a593Smuzhiyun
1177*4882a593Smuzhiyun out_max = *asn1_key_len;
1178*4882a593Smuzhiyun
1179*4882a593Smuzhiyun empty_data_len = rsa_key->n_len / 2;
1180*4882a593Smuzhiyun empty_data = malloc(empty_data_len);
1181*4882a593Smuzhiyun if (!empty_data)
1182*4882a593Smuzhiyun return RK_CRYPTO_ERR_OUT_OF_MEMORY;
1183*4882a593Smuzhiyun
1184*4882a593Smuzhiyun memset(empty_data, 0xff, empty_data_len);
1185*4882a593Smuzhiyun
1186*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(object_list); i++) {
1187*4882a593Smuzhiyun const uint8_t *data = object_list[i].data;
1188*4882a593Smuzhiyun uint32_t data_len = *(object_list[i].data_len);
1189*4882a593Smuzhiyun
1190*4882a593Smuzhiyun data = data ? data : empty_data;
1191*4882a593Smuzhiyun data_len = data ? data_len : empty_data_len;
1192*4882a593Smuzhiyun
1193*4882a593Smuzhiyun res = asn1_set_object(data, data_len,
1194*4882a593Smuzhiyun object_list[i].tag,
1195*4882a593Smuzhiyun object_list[i].need_plus,
1196*4882a593Smuzhiyun asn1_key + total_len, out_max, &tmp_len);
1197*4882a593Smuzhiyun if (res != RK_CRYPTO_SUCCESS) {
1198*4882a593Smuzhiyun D_TRACE("set %d object error!", i);
1199*4882a593Smuzhiyun goto exit;
1200*4882a593Smuzhiyun }
1201*4882a593Smuzhiyun
1202*4882a593Smuzhiyun total_len += tmp_len;
1203*4882a593Smuzhiyun out_max -= tmp_len;
1204*4882a593Smuzhiyun }
1205*4882a593Smuzhiyun
1206*4882a593Smuzhiyun res = asn1_compose_len(total_len, tmp_field, &tmp_len);
1207*4882a593Smuzhiyun if (res != RK_CRYPTO_SUCCESS) {
1208*4882a593Smuzhiyun D_TRACE("set asn1_compose_len error!");
1209*4882a593Smuzhiyun goto exit;
1210*4882a593Smuzhiyun }
1211*4882a593Smuzhiyun
1212*4882a593Smuzhiyun if (out_max < tmp_len + 1) {
1213*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
1214*4882a593Smuzhiyun goto exit;
1215*4882a593Smuzhiyun }
1216*4882a593Smuzhiyun
1217*4882a593Smuzhiyun memmove(asn1_key + tmp_len + 1, asn1_key, total_len);
1218*4882a593Smuzhiyun *asn1_key = ASN1_SEQUENCE;
1219*4882a593Smuzhiyun total_len++;
1220*4882a593Smuzhiyun memmove(asn1_key + 1, tmp_field, tmp_len);
1221*4882a593Smuzhiyun total_len += tmp_len;
1222*4882a593Smuzhiyun
1223*4882a593Smuzhiyun *asn1_key_len = total_len;
1224*4882a593Smuzhiyun *key_bits = rsa_key->n_len * 8;
1225*4882a593Smuzhiyun exit:
1226*4882a593Smuzhiyun if (empty_data)
1227*4882a593Smuzhiyun free(empty_data);
1228*4882a593Smuzhiyun
1229*4882a593Smuzhiyun return res;
1230*4882a593Smuzhiyun }
1231*4882a593Smuzhiyun
rk_rsa_crypt_do_padding(enum RK_RSA_CRYPT_PADDING padding,uint16_t key_len,bool is_priv_key,const uint8_t * data,uint32_t data_len,uint8_t * pad,uint32_t * pad_len)1232*4882a593Smuzhiyun RK_RES rk_rsa_crypt_do_padding(enum RK_RSA_CRYPT_PADDING padding,
1233*4882a593Smuzhiyun uint16_t key_len, bool is_priv_key,
1234*4882a593Smuzhiyun const uint8_t *data, uint32_t data_len,
1235*4882a593Smuzhiyun uint8_t *pad, uint32_t *pad_len)
1236*4882a593Smuzhiyun {
1237*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_SUCCESS;
1238*4882a593Smuzhiyun
1239*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(key_len * 8 != RSA_BITS_1024 &&
1240*4882a593Smuzhiyun key_len * 8 != RSA_BITS_2048 &&
1241*4882a593Smuzhiyun key_len * 8 != RSA_BITS_3072 &&
1242*4882a593Smuzhiyun key_len * 8 != RSA_BITS_4096);
1243*4882a593Smuzhiyun
1244*4882a593Smuzhiyun switch (padding) {
1245*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_NONE:
1246*4882a593Smuzhiyun if (data_len != key_len) {
1247*4882a593Smuzhiyun D_TRACE("length not match %u != %u", data_len, key_len);
1248*4882a593Smuzhiyun return RK_CRYPTO_ERR_PARAMETER;
1249*4882a593Smuzhiyun }
1250*4882a593Smuzhiyun
1251*4882a593Smuzhiyun memcpy(pad, data, data_len);
1252*4882a593Smuzhiyun break;
1253*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_0:
1254*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_1:
1255*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_2: {
1256*4882a593Smuzhiyun uint8_t bt = (uint8_t)(padding - RK_RSA_CRYPT_PADDING_BLOCK_TYPE_0);
1257*4882a593Smuzhiyun
1258*4882a593Smuzhiyun res = rsa_padding_add_pkcs1_type(key_len, bt, data, data_len, pad);
1259*4882a593Smuzhiyun break;
1260*4882a593Smuzhiyun }
1261*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA1:
1262*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA224:
1263*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA256:
1264*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA384:
1265*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA512:
1266*4882a593Smuzhiyun res = rsa_padding_add_oaep_type(padding, key_len, NULL, 0, data, data_len, pad);
1267*4882a593Smuzhiyun break;
1268*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_PKCS1_V1_5:
1269*4882a593Smuzhiyun res = rsa_padding_add_pkcs15_type(key_len, is_priv_key, data, data_len, pad);
1270*4882a593Smuzhiyun break;
1271*4882a593Smuzhiyun default:
1272*4882a593Smuzhiyun D_TRACE("unknown padding %d", padding);
1273*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PARAMETER;
1274*4882a593Smuzhiyun break;
1275*4882a593Smuzhiyun }
1276*4882a593Smuzhiyun
1277*4882a593Smuzhiyun *pad_len = key_len;
1278*4882a593Smuzhiyun
1279*4882a593Smuzhiyun return res;
1280*4882a593Smuzhiyun }
1281*4882a593Smuzhiyun
rk_rsa_crypt_undo_padding(enum RK_RSA_CRYPT_PADDING padding,uint16_t key_len,bool is_priv_key,const uint8_t * pad,uint32_t pad_len,uint8_t * data,uint32_t * data_len)1282*4882a593Smuzhiyun RK_RES rk_rsa_crypt_undo_padding(enum RK_RSA_CRYPT_PADDING padding,
1283*4882a593Smuzhiyun uint16_t key_len, bool is_priv_key,
1284*4882a593Smuzhiyun const uint8_t *pad, uint32_t pad_len,
1285*4882a593Smuzhiyun uint8_t *data, uint32_t *data_len)
1286*4882a593Smuzhiyun {
1287*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_SUCCESS;
1288*4882a593Smuzhiyun
1289*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(key_len * 8 != RSA_BITS_1024 &&
1290*4882a593Smuzhiyun key_len * 8 != RSA_BITS_2048 &&
1291*4882a593Smuzhiyun key_len * 8 != RSA_BITS_3072 &&
1292*4882a593Smuzhiyun key_len * 8 != RSA_BITS_4096);
1293*4882a593Smuzhiyun RK_CRYPTO_CHECK_PARAM(key_len != pad_len);
1294*4882a593Smuzhiyun
1295*4882a593Smuzhiyun switch (padding) {
1296*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_NONE:
1297*4882a593Smuzhiyun if (pad_len != key_len) {
1298*4882a593Smuzhiyun D_TRACE("length not match %u != %u", pad_len, key_len);
1299*4882a593Smuzhiyun return RK_CRYPTO_ERR_PARAMETER;
1300*4882a593Smuzhiyun }
1301*4882a593Smuzhiyun
1302*4882a593Smuzhiyun memcpy(data, pad, pad_len);
1303*4882a593Smuzhiyun *data_len = key_len;
1304*4882a593Smuzhiyun break;
1305*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_0:
1306*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_1:
1307*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_2: {
1308*4882a593Smuzhiyun uint8_t bt = (uint8_t)(padding - RK_RSA_CRYPT_PADDING_BLOCK_TYPE_0);
1309*4882a593Smuzhiyun
1310*4882a593Smuzhiyun res = rsa_padding_check_pkcs1_type(key_len, bt, pad, data, data_len);
1311*4882a593Smuzhiyun break;
1312*4882a593Smuzhiyun }
1313*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA1:
1314*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA224:
1315*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA256:
1316*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA384:
1317*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_OAEP_SHA512:
1318*4882a593Smuzhiyun res = rsa_padding_check_oaep_type(padding, key_len, NULL, 0, pad, data, data_len);
1319*4882a593Smuzhiyun break;
1320*4882a593Smuzhiyun case RK_RSA_CRYPT_PADDING_PKCS1_V1_5:
1321*4882a593Smuzhiyun res = rsa_padding_check_pkcs15_type(key_len, is_priv_key, pad, data, data_len);
1322*4882a593Smuzhiyun break;
1323*4882a593Smuzhiyun default:
1324*4882a593Smuzhiyun D_TRACE("unknown padding %d", padding);
1325*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PARAMETER;
1326*4882a593Smuzhiyun break;
1327*4882a593Smuzhiyun }
1328*4882a593Smuzhiyun
1329*4882a593Smuzhiyun return res;
1330*4882a593Smuzhiyun }
1331*4882a593Smuzhiyun
rk_rsa_sign_do_padding(enum RK_RSA_SIGN_PADDING padding,uint16_t key_len,uint16_t n_bits,const uint8_t * data,uint32_t data_len,const uint8_t * hash,uint8_t * pad,uint32_t * pad_len)1332*4882a593Smuzhiyun RK_RES rk_rsa_sign_do_padding(enum RK_RSA_SIGN_PADDING padding, uint16_t key_len, uint16_t n_bits,
1333*4882a593Smuzhiyun const uint8_t *data, uint32_t data_len, const uint8_t *hash,
1334*4882a593Smuzhiyun uint8_t *pad, uint32_t *pad_len)
1335*4882a593Smuzhiyun {
1336*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_SUCCESS;
1337*4882a593Smuzhiyun uint32_t hash_len, hash_algo;
1338*4882a593Smuzhiyun uint8_t tmp_hash[SHA512_HASH_SIZE];
1339*4882a593Smuzhiyun
1340*4882a593Smuzhiyun res = get_hash_algo_from_padding(padding, &hash_len, &hash_algo);
1341*4882a593Smuzhiyun if (res)
1342*4882a593Smuzhiyun return res;
1343*4882a593Smuzhiyun
1344*4882a593Smuzhiyun memset(tmp_hash, 0x00, sizeof(tmp_hash));
1345*4882a593Smuzhiyun
1346*4882a593Smuzhiyun if (hash) {
1347*4882a593Smuzhiyun memcpy(tmp_hash, hash, hash_len);
1348*4882a593Smuzhiyun } else {
1349*4882a593Smuzhiyun res = calc_padding_digest(hash_algo, data, data_len, tmp_hash);
1350*4882a593Smuzhiyun if (res)
1351*4882a593Smuzhiyun return res;
1352*4882a593Smuzhiyun }
1353*4882a593Smuzhiyun
1354*4882a593Smuzhiyun switch (padding) {
1355*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA1:
1356*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA224:
1357*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA256:
1358*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA384:
1359*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA512:
1360*4882a593Smuzhiyun res = rsa_padding_add_pkcs15_sign_type(hash_algo, key_len, tmp_hash, hash_len, pad);
1361*4882a593Smuzhiyun break;
1362*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA1:
1363*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA224:
1364*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA256:
1365*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA384:
1366*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA512:
1367*4882a593Smuzhiyun res = rsa_padding_add_pss_type(key_len, n_bits, hash_algo, tmp_hash, hash_len, pad);
1368*4882a593Smuzhiyun break;
1369*4882a593Smuzhiyun default:
1370*4882a593Smuzhiyun D_TRACE("unknown padding %d", padding);
1371*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PARAMETER;
1372*4882a593Smuzhiyun break;
1373*4882a593Smuzhiyun }
1374*4882a593Smuzhiyun
1375*4882a593Smuzhiyun *pad_len = key_len;
1376*4882a593Smuzhiyun
1377*4882a593Smuzhiyun return res;
1378*4882a593Smuzhiyun }
1379*4882a593Smuzhiyun
rk_rsa_sign_undo_padding(enum RK_RSA_SIGN_PADDING padding,uint16_t key_len,uint16_t n_bits,const uint8_t * data,uint32_t data_len,const uint8_t * hash,const uint8_t * dec)1380*4882a593Smuzhiyun RK_RES rk_rsa_sign_undo_padding(enum RK_RSA_SIGN_PADDING padding, uint16_t key_len, uint16_t n_bits,
1381*4882a593Smuzhiyun const uint8_t *data, uint32_t data_len,
1382*4882a593Smuzhiyun const uint8_t *hash, const uint8_t *dec)
1383*4882a593Smuzhiyun {
1384*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_SUCCESS;
1385*4882a593Smuzhiyun uint32_t hash_len, hash_algo;
1386*4882a593Smuzhiyun uint8_t tmp_hash[SHA512_HASH_SIZE];
1387*4882a593Smuzhiyun uint8_t *pad = NULL;
1388*4882a593Smuzhiyun
1389*4882a593Smuzhiyun res = get_hash_algo_from_padding(padding, &hash_len, &hash_algo);
1390*4882a593Smuzhiyun if (res)
1391*4882a593Smuzhiyun return res;
1392*4882a593Smuzhiyun
1393*4882a593Smuzhiyun memset(tmp_hash, 0x00, sizeof(tmp_hash));
1394*4882a593Smuzhiyun
1395*4882a593Smuzhiyun if (hash) {
1396*4882a593Smuzhiyun memcpy(tmp_hash, hash, hash_len);
1397*4882a593Smuzhiyun } else {
1398*4882a593Smuzhiyun res = calc_padding_digest(hash_algo, data, data_len, tmp_hash);
1399*4882a593Smuzhiyun if (res)
1400*4882a593Smuzhiyun goto exit;
1401*4882a593Smuzhiyun }
1402*4882a593Smuzhiyun
1403*4882a593Smuzhiyun pad = malloc(key_len);
1404*4882a593Smuzhiyun if (!pad)
1405*4882a593Smuzhiyun return RK_CRYPTO_ERR_OUT_OF_MEMORY;
1406*4882a593Smuzhiyun
1407*4882a593Smuzhiyun switch (padding) {
1408*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA1:
1409*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA224:
1410*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA256:
1411*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA384:
1412*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA512:
1413*4882a593Smuzhiyun res = rsa_padding_add_pkcs15_sign_type(hash_algo, key_len, tmp_hash, hash_len, pad);
1414*4882a593Smuzhiyun if (res) {
1415*4882a593Smuzhiyun D_TRACE("check pkcs V1.5 error.");
1416*4882a593Smuzhiyun goto exit;
1417*4882a593Smuzhiyun }
1418*4882a593Smuzhiyun
1419*4882a593Smuzhiyun if (memcmp(pad, dec, key_len))
1420*4882a593Smuzhiyun res = RK_CRYPTO_ERR_VERIFY;
1421*4882a593Smuzhiyun
1422*4882a593Smuzhiyun break;
1423*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA1:
1424*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA224:
1425*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA256:
1426*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA384:
1427*4882a593Smuzhiyun case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA512:
1428*4882a593Smuzhiyun res = rk_rsa_padding_check_pss_type(key_len, n_bits, hash_algo,
1429*4882a593Smuzhiyun hash_len, tmp_hash, dec);
1430*4882a593Smuzhiyun break;
1431*4882a593Smuzhiyun default:
1432*4882a593Smuzhiyun D_TRACE("unknown padding %d", padding);
1433*4882a593Smuzhiyun res = RK_CRYPTO_ERR_PARAMETER;
1434*4882a593Smuzhiyun break;
1435*4882a593Smuzhiyun }
1436*4882a593Smuzhiyun
1437*4882a593Smuzhiyun exit:
1438*4882a593Smuzhiyun if (pad)
1439*4882a593Smuzhiyun free(pad);
1440*4882a593Smuzhiyun
1441*4882a593Smuzhiyun return res;
1442*4882a593Smuzhiyun }
1443*4882a593Smuzhiyun
1444