xref: /OK3568_Linux_fs/external/security/librkcrypto/src/rkcrypto_rsa_helper.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun  * Copyright (c) 2022 Rockchip Electronics Co. Ltd.
3*4882a593Smuzhiyun  */
4*4882a593Smuzhiyun 
5*4882a593Smuzhiyun #include <stdlib.h>
6*4882a593Smuzhiyun #include <string.h>
7*4882a593Smuzhiyun 
8*4882a593Smuzhiyun #include "rkcrypto_core.h"
9*4882a593Smuzhiyun #include "rkcrypto_trace.h"
10*4882a593Smuzhiyun #include "rkcrypto_random.h"
11*4882a593Smuzhiyun 
12*4882a593Smuzhiyun #ifndef ARRAY_SIZE
13*4882a593Smuzhiyun #define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
14*4882a593Smuzhiyun #endif
15*4882a593Smuzhiyun 
16*4882a593Smuzhiyun #define RSA_PKCS1_TYPE_MIN_PAD_LEN	(11)
17*4882a593Smuzhiyun 
18*4882a593Smuzhiyun /**< Identifier for RSA signature operations. */
19*4882a593Smuzhiyun #define MBEDTLS_RSA_SIGN		1
20*4882a593Smuzhiyun 
21*4882a593Smuzhiyun /**< Identifier for RSA encryption and decryption operations. */
22*4882a593Smuzhiyun #define MBEDTLS_RSA_CRYPT		2
23*4882a593Smuzhiyun 
24*4882a593Smuzhiyun #define ASN1_INTEGER			((uint8_t)0x02)
25*4882a593Smuzhiyun #define ASN1_BIT_STRING			((uint8_t)0x03)
26*4882a593Smuzhiyun #define ASN1_OCT_STRING			((uint8_t)0x04)
27*4882a593Smuzhiyun #define ASN1_NULL			((uint8_t)0x05)
28*4882a593Smuzhiyun #define ASN1_OBJ_IDENTIFIER		((uint8_t)0x06)
29*4882a593Smuzhiyun #define ASN1_SEQUENCE			((uint8_t)0x30)
30*4882a593Smuzhiyun #define ASN1_CONTEXT0			((uint8_t)0xA0)
31*4882a593Smuzhiyun #define ASN1_CONTEXT1			((uint8_t)0xA1)
32*4882a593Smuzhiyun 
33*4882a593Smuzhiyun typedef struct {
34*4882a593Smuzhiyun 	const uint8_t	*data;		//the buffer of data
35*4882a593Smuzhiyun 	uint16_t	*data_len;	//valid length of data
36*4882a593Smuzhiyun 	uint8_t		tag;		//ASN1 data type
37*4882a593Smuzhiyun 	uint8_t		need_plus;	//to identify weather the data is a positive number
38*4882a593Smuzhiyun } asn1_object_t;
39*4882a593Smuzhiyun 
40*4882a593Smuzhiyun struct hash_oid_item {
41*4882a593Smuzhiyun 	uint32_t	hash_algo;
42*4882a593Smuzhiyun 	const uint8_t	*oid;
43*4882a593Smuzhiyun 	uint32_t	oid_size;
44*4882a593Smuzhiyun };
45*4882a593Smuzhiyun 
46*4882a593Smuzhiyun static const uint8_t sha1_oid[]   = {0x2b, 0x0e, 0x03, 0x02, 0x1a};
47*4882a593Smuzhiyun static const uint8_t sha224_oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04};
48*4882a593Smuzhiyun static const uint8_t sha256_oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01};
49*4882a593Smuzhiyun static const uint8_t sha384_oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02};
50*4882a593Smuzhiyun static const uint8_t sha512_oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03};
51*4882a593Smuzhiyun 
52*4882a593Smuzhiyun struct hash_oid_item hash_oid_tbl[] = {
53*4882a593Smuzhiyun 	{RK_ALGO_SHA1,   sha1_oid,   sizeof(sha1_oid)},
54*4882a593Smuzhiyun 	{RK_ALGO_SHA224, sha224_oid, sizeof(sha224_oid)},
55*4882a593Smuzhiyun 	{RK_ALGO_SHA256, sha256_oid, sizeof(sha256_oid)},
56*4882a593Smuzhiyun 	{RK_ALGO_SHA384, sha384_oid, sizeof(sha384_oid)},
57*4882a593Smuzhiyun 	{RK_ALGO_SHA512, sha512_oid, sizeof(sha512_oid)},
58*4882a593Smuzhiyun };
59*4882a593Smuzhiyun 
get_oid_by_md(uint32_t hash_algo,const uint8_t ** oid,uint32_t * old_len)60*4882a593Smuzhiyun static RK_RES get_oid_by_md(uint32_t hash_algo, const uint8_t **oid, uint32_t *old_len)
61*4882a593Smuzhiyun {
62*4882a593Smuzhiyun 	uint32_t i;
63*4882a593Smuzhiyun 
64*4882a593Smuzhiyun 	for (i = 0; i < ARRAY_SIZE(hash_oid_tbl); i++) {
65*4882a593Smuzhiyun 		if (hash_oid_tbl[i].hash_algo == hash_algo) {
66*4882a593Smuzhiyun 			*oid     = hash_oid_tbl[i].oid;
67*4882a593Smuzhiyun 			*old_len = hash_oid_tbl[i].oid_size;
68*4882a593Smuzhiyun 			return RK_CRYPTO_SUCCESS;
69*4882a593Smuzhiyun 		}
70*4882a593Smuzhiyun 	}
71*4882a593Smuzhiyun 
72*4882a593Smuzhiyun 	return RK_CRYPTO_ERR_PARAMETER;
73*4882a593Smuzhiyun }
74*4882a593Smuzhiyun 
asn1_compose_len(uint32_t len,uint8_t * field,uint32_t * field_len)75*4882a593Smuzhiyun static RK_RES asn1_compose_len(uint32_t len, uint8_t *field, uint32_t *field_len)
76*4882a593Smuzhiyun {
77*4882a593Smuzhiyun 	uint8_t tmp_field[4];
78*4882a593Smuzhiyun 
79*4882a593Smuzhiyun 	if (field == NULL || field_len == NULL)
80*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PARAMETER;
81*4882a593Smuzhiyun 
82*4882a593Smuzhiyun 	if (len < 0x80) {
83*4882a593Smuzhiyun 		*field     = len;
84*4882a593Smuzhiyun 		*field_len = 1;
85*4882a593Smuzhiyun 	} else {
86*4882a593Smuzhiyun 		uint32_t i, j;
87*4882a593Smuzhiyun 
88*4882a593Smuzhiyun 		tmp_field[0] = (len >> 24) & 0xff;
89*4882a593Smuzhiyun 		tmp_field[1] = (len >> 16) & 0xff;
90*4882a593Smuzhiyun 		tmp_field[2] = (len >> 8) & 0xff;
91*4882a593Smuzhiyun 		tmp_field[3] = len & 0xff;
92*4882a593Smuzhiyun 
93*4882a593Smuzhiyun 		for (i = 0; i < sizeof(tmp_field); i++) {
94*4882a593Smuzhiyun 			if (tmp_field[i] == 0x00)
95*4882a593Smuzhiyun 				continue;
96*4882a593Smuzhiyun 
97*4882a593Smuzhiyun 			for (j = 0; j < sizeof(tmp_field) - i; j++)
98*4882a593Smuzhiyun 				field[j + 1] = tmp_field[j + i];
99*4882a593Smuzhiyun 
100*4882a593Smuzhiyun 			break;
101*4882a593Smuzhiyun 		}
102*4882a593Smuzhiyun 		field[0]   = 0X80 + sizeof(tmp_field) - i;
103*4882a593Smuzhiyun 		*field_len = sizeof(tmp_field) - i + 1;
104*4882a593Smuzhiyun 	}
105*4882a593Smuzhiyun 
106*4882a593Smuzhiyun 	return RK_CRYPTO_SUCCESS;
107*4882a593Smuzhiyun }
108*4882a593Smuzhiyun 
asn1_set_object(const uint8_t * in,uint32_t in_len,uint8_t tag,uint8_t need_plus,uint8_t * out,uint32_t out_max,uint32_t * out_len)109*4882a593Smuzhiyun static RK_RES asn1_set_object(const uint8_t *in, uint32_t in_len, uint8_t tag, uint8_t need_plus,
110*4882a593Smuzhiyun 			      uint8_t *out, uint32_t out_max, uint32_t *out_len)
111*4882a593Smuzhiyun {
112*4882a593Smuzhiyun 	RK_RES res;
113*4882a593Smuzhiyun 	uint8_t *pout = out;
114*4882a593Smuzhiyun 	uint32_t field_len;
115*4882a593Smuzhiyun 	uint8_t tmp_field[5];
116*4882a593Smuzhiyun 
117*4882a593Smuzhiyun 	if (in == NULL || out == NULL || out_len == NULL)
118*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PARAMETER;
119*4882a593Smuzhiyun 
120*4882a593Smuzhiyun 	*out_len = 0;
121*4882a593Smuzhiyun 
122*4882a593Smuzhiyun 	//padding tag field
123*4882a593Smuzhiyun 	if (out_max < 1) {
124*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
125*4882a593Smuzhiyun 		goto exit;
126*4882a593Smuzhiyun 	}
127*4882a593Smuzhiyun 
128*4882a593Smuzhiyun 	*pout = tag;
129*4882a593Smuzhiyun 	pout++;
130*4882a593Smuzhiyun 	out_max--;
131*4882a593Smuzhiyun 
132*4882a593Smuzhiyun 	//padding length field
133*4882a593Smuzhiyun 	if (need_plus && *in >= 0x80)
134*4882a593Smuzhiyun 		res = asn1_compose_len(in_len + 1, tmp_field, &field_len);
135*4882a593Smuzhiyun 	else
136*4882a593Smuzhiyun 		res = asn1_compose_len(in_len, tmp_field, &field_len);
137*4882a593Smuzhiyun 
138*4882a593Smuzhiyun 	if (res != RK_CRYPTO_SUCCESS) {
139*4882a593Smuzhiyun 		D_TRACE("asn1_compose_len error");
140*4882a593Smuzhiyun 		return res;
141*4882a593Smuzhiyun 	}
142*4882a593Smuzhiyun 
143*4882a593Smuzhiyun 	if (out_max < field_len) {
144*4882a593Smuzhiyun 		D_TRACE("out_max = %d, field_len = %d", out_max, field_len);
145*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
146*4882a593Smuzhiyun 		goto exit;
147*4882a593Smuzhiyun 	}
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun 	memmove(pout, tmp_field, field_len);
150*4882a593Smuzhiyun 	pout    += field_len;
151*4882a593Smuzhiyun 	out_max -= field_len;
152*4882a593Smuzhiyun 
153*4882a593Smuzhiyun 	//padding value field
154*4882a593Smuzhiyun 	if (need_plus && *in >= 0x80) {
155*4882a593Smuzhiyun 		if (out_max < 1) {
156*4882a593Smuzhiyun 			res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
157*4882a593Smuzhiyun 			goto exit;
158*4882a593Smuzhiyun 		}
159*4882a593Smuzhiyun 
160*4882a593Smuzhiyun 		*pout = 0x00;
161*4882a593Smuzhiyun 		pout++;
162*4882a593Smuzhiyun 		out_max--;
163*4882a593Smuzhiyun 	}
164*4882a593Smuzhiyun 
165*4882a593Smuzhiyun 	if (out_max < in_len) {
166*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
167*4882a593Smuzhiyun 		goto exit;
168*4882a593Smuzhiyun 	}
169*4882a593Smuzhiyun 
170*4882a593Smuzhiyun 	memmove(pout, in, in_len);
171*4882a593Smuzhiyun 	pout += in_len;
172*4882a593Smuzhiyun 
173*4882a593Smuzhiyun 	*out_len = pout-out;
174*4882a593Smuzhiyun 
175*4882a593Smuzhiyun exit:
176*4882a593Smuzhiyun 	return res;
177*4882a593Smuzhiyun }
178*4882a593Smuzhiyun 
179*4882a593Smuzhiyun /* PKCS #1: block type 0,1,2 message padding */
180*4882a593Smuzhiyun /*************************************************
181*4882a593Smuzhiyun  *EB = 00 || BT || PS || 00 || D
182*4882a593Smuzhiyun  *
183*4882a593Smuzhiyun  *PS_LEN >= 8, mlen < key_len - 11
184*4882a593Smuzhiyun  ************************************************/
rsa_padding_add_pkcs1_type(uint16_t key_len,uint8_t bt,const uint8_t * in,uint8_t in_len,uint8_t * out)185*4882a593Smuzhiyun static RK_RES rsa_padding_add_pkcs1_type(uint16_t key_len, uint8_t bt,
186*4882a593Smuzhiyun 					 const uint8_t *in, uint8_t in_len, uint8_t *out)
187*4882a593Smuzhiyun {
188*4882a593Smuzhiyun 	uint32_t plen = 0;
189*4882a593Smuzhiyun 	uint8_t *peb = NULL;
190*4882a593Smuzhiyun 
191*4882a593Smuzhiyun 	if (in_len > key_len - RSA_PKCS1_TYPE_MIN_PAD_LEN) {
192*4882a593Smuzhiyun 		E_TRACE("key_len is invalid.\n");
193*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING_OVERFLOW;
194*4882a593Smuzhiyun 	}
195*4882a593Smuzhiyun 
196*4882a593Smuzhiyun 	/* block type 0 first input data can't be zero */
197*4882a593Smuzhiyun 	if (bt == 0x00 && *in == 0)
198*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING;
199*4882a593Smuzhiyun 
200*4882a593Smuzhiyun 	peb = out;
201*4882a593Smuzhiyun 
202*4882a593Smuzhiyun 	/* first byte is 0x00 */
203*4882a593Smuzhiyun 	*(peb++) = 0;
204*4882a593Smuzhiyun 
205*4882a593Smuzhiyun 	/* Private Key BT (Block Type) */
206*4882a593Smuzhiyun 	*(peb++) = bt;
207*4882a593Smuzhiyun 
208*4882a593Smuzhiyun 	/* The padding string PS shall consist of k-3-||D|| octets */
209*4882a593Smuzhiyun 	plen = key_len - 3 - in_len;
210*4882a593Smuzhiyun 	switch (bt) {
211*4882a593Smuzhiyun 	case 0x00: {
212*4882a593Smuzhiyun 		/* For block type 00, the octets shall have	value 00 */
213*4882a593Smuzhiyun 		memset(peb, 0x00, plen);
214*4882a593Smuzhiyun 		break;
215*4882a593Smuzhiyun 	}
216*4882a593Smuzhiyun 	case 0x01: {
217*4882a593Smuzhiyun 		/* for block type 01, they shall have value	FF */
218*4882a593Smuzhiyun 		memset(peb, 0xFF, plen);
219*4882a593Smuzhiyun 		break;
220*4882a593Smuzhiyun 	}
221*4882a593Smuzhiyun 	case 0x02: {
222*4882a593Smuzhiyun 		RK_RES res;
223*4882a593Smuzhiyun 		uint32_t i = 0;
224*4882a593Smuzhiyun 
225*4882a593Smuzhiyun 		/* for block type 02, they shall be pseudorandomly generated and nonzero. */
226*4882a593Smuzhiyun 		res = rk_get_random(peb, plen);
227*4882a593Smuzhiyun 		if (res)
228*4882a593Smuzhiyun 			return res;
229*4882a593Smuzhiyun 
230*4882a593Smuzhiyun 		/* make sure nonzero */
231*4882a593Smuzhiyun 		for (i = 0; i < plen; i++) {
232*4882a593Smuzhiyun 			if (peb[i] == 0x00)
233*4882a593Smuzhiyun 				peb[i] = 0x01;
234*4882a593Smuzhiyun 		}
235*4882a593Smuzhiyun 		break;
236*4882a593Smuzhiyun 	}
237*4882a593Smuzhiyun 	default: {
238*4882a593Smuzhiyun 		E_TRACE("BT(0x%x) is invalid.\n", plen);
239*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING;
240*4882a593Smuzhiyun 	}
241*4882a593Smuzhiyun 	}
242*4882a593Smuzhiyun 
243*4882a593Smuzhiyun 	/* skip the padding string */
244*4882a593Smuzhiyun 	peb += plen;
245*4882a593Smuzhiyun 
246*4882a593Smuzhiyun 	/* set 0x00 follow PS */
247*4882a593Smuzhiyun 	*(peb++) = 0x00;
248*4882a593Smuzhiyun 
249*4882a593Smuzhiyun 	/* input data */
250*4882a593Smuzhiyun 	memcpy(peb, in, in_len);
251*4882a593Smuzhiyun 
252*4882a593Smuzhiyun 	return RK_CRYPTO_SUCCESS;
253*4882a593Smuzhiyun }
254*4882a593Smuzhiyun 
255*4882a593Smuzhiyun /* PKCS #1: block type 0,1,2 message padding */
256*4882a593Smuzhiyun /*************************************************
257*4882a593Smuzhiyun  * EB = 00 || BT || PS || 00 || D
258*4882a593Smuzhiyun  *
259*4882a593Smuzhiyun  *PS_LEN >= 8, mlen < key_len - 11
260*4882a593Smuzhiyun  *************************************************/
rsa_padding_check_pkcs1_type(uint32_t key_len,uint8_t bt,const uint8_t * in,uint8_t * out,uint32_t * outlen)261*4882a593Smuzhiyun static RK_RES rsa_padding_check_pkcs1_type(uint32_t key_len, uint8_t bt,
262*4882a593Smuzhiyun 					   const uint8_t *in, uint8_t *out, uint32_t *outlen)
263*4882a593Smuzhiyun {
264*4882a593Smuzhiyun 	const uint8_t *peb = NULL;
265*4882a593Smuzhiyun 	uint32_t inlen = key_len;
266*4882a593Smuzhiyun 
267*4882a593Smuzhiyun 	*outlen = 0x00;
268*4882a593Smuzhiyun 	peb     = in;
269*4882a593Smuzhiyun 
270*4882a593Smuzhiyun 	/* first byte must be 0x00 */
271*4882a593Smuzhiyun 	if (*peb != 0x00) {
272*4882a593Smuzhiyun 		E_TRACE("EB[0] != 0x00.\n");
273*4882a593Smuzhiyun 		goto error;
274*4882a593Smuzhiyun 	}
275*4882a593Smuzhiyun 	peb++;
276*4882a593Smuzhiyun 
277*4882a593Smuzhiyun 	/* Private Key BT (Block Type) */
278*4882a593Smuzhiyun 	if (*peb != bt) {
279*4882a593Smuzhiyun 		E_TRACE("EB[1] != BT(0x%x).\n",	bt);
280*4882a593Smuzhiyun 		goto error;
281*4882a593Smuzhiyun 	}
282*4882a593Smuzhiyun 	peb++;
283*4882a593Smuzhiyun 
284*4882a593Smuzhiyun 	switch (bt) {
285*4882a593Smuzhiyun 	case 0x00:
286*4882a593Smuzhiyun 		/* For block type 00, the octets shall have value 00 */
287*4882a593Smuzhiyun 		for (; peb < in + inlen - 1; peb++) {
288*4882a593Smuzhiyun 			if ((*peb == 0x00) && (*(peb + 1) != 0))
289*4882a593Smuzhiyun 				break;
290*4882a593Smuzhiyun 		}
291*4882a593Smuzhiyun 		break;
292*4882a593Smuzhiyun 	case 0x01:
293*4882a593Smuzhiyun 		/* For block type 0x01 the octets shall have value 0xFF */
294*4882a593Smuzhiyun 		for (; peb < in + inlen - 1; peb++) {
295*4882a593Smuzhiyun 			if (*peb == 0xFF)
296*4882a593Smuzhiyun 				continue;
297*4882a593Smuzhiyun 
298*4882a593Smuzhiyun 			if (*peb == 0x00)
299*4882a593Smuzhiyun 				break;
300*4882a593Smuzhiyun 
301*4882a593Smuzhiyun 			peb = in + inlen - 1;
302*4882a593Smuzhiyun 			break;
303*4882a593Smuzhiyun 		}
304*4882a593Smuzhiyun 		break;
305*4882a593Smuzhiyun 	case 0x02:
306*4882a593Smuzhiyun 		/* for block type 02, they shall be pseudorandomly generated and nonzero. */
307*4882a593Smuzhiyun 		for (; peb < in + inlen - 1; peb++) {
308*4882a593Smuzhiyun 			if (*peb == 0x00)
309*4882a593Smuzhiyun 				break;
310*4882a593Smuzhiyun 		}
311*4882a593Smuzhiyun 		break;
312*4882a593Smuzhiyun 	default:
313*4882a593Smuzhiyun 		E_TRACE("BT(0x%x) is invalid.\n", bt);
314*4882a593Smuzhiyun 		goto error;
315*4882a593Smuzhiyun 	}
316*4882a593Smuzhiyun 
317*4882a593Smuzhiyun 	if (peb >= (in + inlen - 1)) {
318*4882a593Smuzhiyun 		E_TRACE("PS Error.\n");
319*4882a593Smuzhiyun 		goto error;
320*4882a593Smuzhiyun 	}
321*4882a593Smuzhiyun 
322*4882a593Smuzhiyun 	/* skip 0x00 after PS */
323*4882a593Smuzhiyun 	peb++;
324*4882a593Smuzhiyun 
325*4882a593Smuzhiyun 	/* get payload data */
326*4882a593Smuzhiyun 	*outlen = in + key_len - peb;
327*4882a593Smuzhiyun 	memcpy(out, peb, *outlen);
328*4882a593Smuzhiyun 
329*4882a593Smuzhiyun 	return RK_CRYPTO_SUCCESS;
330*4882a593Smuzhiyun error:
331*4882a593Smuzhiyun 	return RK_CRYPTO_ERR_PADDING;
332*4882a593Smuzhiyun }
333*4882a593Smuzhiyun 
334*4882a593Smuzhiyun /*
335*4882a593Smuzhiyun  * Implementation of the PKCS#1 v2.1 RSAES-PKCS1-V1_5-ENCRYPT function
336*4882a593Smuzhiyun  * 00 (01/02) [a bunch of non-zero random bytes] 00 [the message]
337*4882a593Smuzhiyun  */
rsa_padding_add_pkcs15_type(uint16_t key_len,bool is_priv_key,const uint8_t * in,uint32_t in_len,uint8_t * out)338*4882a593Smuzhiyun RK_RES rsa_padding_add_pkcs15_type(uint16_t key_len, bool is_priv_key,
339*4882a593Smuzhiyun 				  const uint8_t *in, uint32_t in_len, uint8_t *out)
340*4882a593Smuzhiyun {
341*4882a593Smuzhiyun 	uint32_t nb_pad, olen;
342*4882a593Smuzhiyun 	RK_RES res;
343*4882a593Smuzhiyun 	uint8_t *p = out;
344*4882a593Smuzhiyun 
345*4882a593Smuzhiyun 	// We don't check p_rng because it won't be dereferenced here
346*4882a593Smuzhiyun 	if (in == NULL || out == NULL)
347*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING;
348*4882a593Smuzhiyun 
349*4882a593Smuzhiyun 	olen = key_len;
350*4882a593Smuzhiyun 
351*4882a593Smuzhiyun 	/* first comparison checks for overflow */
352*4882a593Smuzhiyun 	if (in_len + 11 < in_len || olen < in_len + 11)
353*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING_OVERFLOW;
354*4882a593Smuzhiyun 
355*4882a593Smuzhiyun 	nb_pad = olen - 3 - in_len;
356*4882a593Smuzhiyun 
357*4882a593Smuzhiyun 	*p++ = 0;
358*4882a593Smuzhiyun 	if (!is_priv_key) {
359*4882a593Smuzhiyun 		*p++ = MBEDTLS_RSA_CRYPT;
360*4882a593Smuzhiyun 
361*4882a593Smuzhiyun 		while (nb_pad-- > 0) {
362*4882a593Smuzhiyun 			int rng_dl = 100;
363*4882a593Smuzhiyun 
364*4882a593Smuzhiyun 			do {
365*4882a593Smuzhiyun 				res = rk_get_random(p, 1);
366*4882a593Smuzhiyun 			} while (*p == 0 && --rng_dl && res == 0);
367*4882a593Smuzhiyun 
368*4882a593Smuzhiyun 			/* Check if RNG failed to generate data */
369*4882a593Smuzhiyun 			if (rng_dl == 0 || res != 0)
370*4882a593Smuzhiyun 				return RK_CRYPTO_ERR_PADDING;
371*4882a593Smuzhiyun 
372*4882a593Smuzhiyun 			p++;
373*4882a593Smuzhiyun 		}
374*4882a593Smuzhiyun 	} else {
375*4882a593Smuzhiyun 		*p++ = MBEDTLS_RSA_SIGN;
376*4882a593Smuzhiyun 
377*4882a593Smuzhiyun 		while (nb_pad-- > 0)
378*4882a593Smuzhiyun 			*p++ = 0xFF;
379*4882a593Smuzhiyun 	}
380*4882a593Smuzhiyun 
381*4882a593Smuzhiyun 	*p++ = 0;
382*4882a593Smuzhiyun 	memcpy(p, in, in_len);
383*4882a593Smuzhiyun 
384*4882a593Smuzhiyun 	return RK_CRYPTO_SUCCESS;
385*4882a593Smuzhiyun }
386*4882a593Smuzhiyun /*
387*4882a593Smuzhiyun  * Implementation of the PKCS#1 v2.1 RSAES-PKCS1-V1_5-DECRYPT function
388*4882a593Smuzhiyun  */
rsa_padding_check_pkcs15_type(uint16_t key_len,bool is_priv_key,const uint8_t * in,uint8_t * out,uint32_t * out_len)389*4882a593Smuzhiyun static RK_RES rsa_padding_check_pkcs15_type(uint16_t key_len, bool is_priv_key,
390*4882a593Smuzhiyun 					   const uint8_t *in, uint8_t *out, uint32_t *out_len)
391*4882a593Smuzhiyun {
392*4882a593Smuzhiyun 	uint32_t ilen, pad_count = 0, i;
393*4882a593Smuzhiyun 	const uint8_t *p;
394*4882a593Smuzhiyun 	uint8_t bad, pad_done = 0;
395*4882a593Smuzhiyun 
396*4882a593Smuzhiyun 	ilen = key_len;
397*4882a593Smuzhiyun 	p    = in;
398*4882a593Smuzhiyun 	bad  = 0;
399*4882a593Smuzhiyun 
400*4882a593Smuzhiyun 	/*
401*4882a593Smuzhiyun 	 * Check and get padding len in "constant-time"
402*4882a593Smuzhiyun 	 */
403*4882a593Smuzhiyun 	bad |= *p++; /* First byte must be 0 */
404*4882a593Smuzhiyun 
405*4882a593Smuzhiyun 	/* This test does not depend on secret data */
406*4882a593Smuzhiyun 	if (is_priv_key) {
407*4882a593Smuzhiyun 		bad |= *p++ ^ MBEDTLS_RSA_CRYPT;
408*4882a593Smuzhiyun 
409*4882a593Smuzhiyun 		/* Get padding len, but always read till end of buffer
410*4882a593Smuzhiyun 		 * (minus one, for the 00 byte)
411*4882a593Smuzhiyun 		 */
412*4882a593Smuzhiyun 		for (i = 0; i < ilen - 3; i++) {
413*4882a593Smuzhiyun 			pad_done  |= ((p[i] | (uint8_t)-p[i]) >> 7) ^ 1;
414*4882a593Smuzhiyun 			pad_count += ((pad_done | (uint8_t)-pad_done) >> 7) ^ 1;
415*4882a593Smuzhiyun 		}
416*4882a593Smuzhiyun 
417*4882a593Smuzhiyun 		p += pad_count;
418*4882a593Smuzhiyun 		bad |= *p++; /* Must be zero */
419*4882a593Smuzhiyun 	} else {
420*4882a593Smuzhiyun 		bad |= *p++ ^ MBEDTLS_RSA_SIGN;
421*4882a593Smuzhiyun 
422*4882a593Smuzhiyun 		/* Get padding len, but always read till end of buffer
423*4882a593Smuzhiyun 		 * (minus one, for the 00 byte)
424*4882a593Smuzhiyun 		 */
425*4882a593Smuzhiyun 		for (i = 0; i < ilen - 3; i++) {
426*4882a593Smuzhiyun 			pad_done |= (p[i] != 0xFF);
427*4882a593Smuzhiyun 			pad_count += (pad_done == 0);
428*4882a593Smuzhiyun 		}
429*4882a593Smuzhiyun 
430*4882a593Smuzhiyun 		p   += pad_count;
431*4882a593Smuzhiyun 		bad |= *p++; /* Must be zero */
432*4882a593Smuzhiyun 	}
433*4882a593Smuzhiyun 
434*4882a593Smuzhiyun 	bad |= (pad_count < 8);
435*4882a593Smuzhiyun 
436*4882a593Smuzhiyun 	if (bad)
437*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING;
438*4882a593Smuzhiyun 
439*4882a593Smuzhiyun 	*out_len = ilen - (p - in);
440*4882a593Smuzhiyun 	memcpy(out, p, *out_len);
441*4882a593Smuzhiyun 
442*4882a593Smuzhiyun 	return RK_CRYPTO_SUCCESS;
443*4882a593Smuzhiyun }
444*4882a593Smuzhiyun 
get_hash_algo_from_padding(uint32_t padding,uint32_t * hlen,uint32_t * hash_algo)445*4882a593Smuzhiyun static RK_RES get_hash_algo_from_padding(uint32_t padding,
446*4882a593Smuzhiyun 				       uint32_t *hlen, uint32_t *hash_algo)
447*4882a593Smuzhiyun {
448*4882a593Smuzhiyun 	uint32_t shaalgo = RK_ALGO_SHA1;
449*4882a593Smuzhiyun 
450*4882a593Smuzhiyun 	switch (padding) {
451*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA1:
452*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA1:
453*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA1:
454*4882a593Smuzhiyun 		*hlen = SHA1_HASH_SIZE;
455*4882a593Smuzhiyun 		shaalgo = RK_ALGO_SHA1;
456*4882a593Smuzhiyun 		break;
457*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA224:
458*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA224:
459*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA224:
460*4882a593Smuzhiyun 		*hlen = SHA224_HASH_SIZE;
461*4882a593Smuzhiyun 		shaalgo = RK_ALGO_SHA224;
462*4882a593Smuzhiyun 		break;
463*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA256:
464*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA256:
465*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA256:
466*4882a593Smuzhiyun 		*hlen = SHA256_HASH_SIZE;
467*4882a593Smuzhiyun 		shaalgo = RK_ALGO_SHA256;
468*4882a593Smuzhiyun 		break;
469*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA384:
470*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA384:
471*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA384:
472*4882a593Smuzhiyun 		*hlen = SHA384_HASH_SIZE;
473*4882a593Smuzhiyun 		shaalgo = RK_ALGO_SHA384;
474*4882a593Smuzhiyun 		break;
475*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA512:
476*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA512:
477*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA512:
478*4882a593Smuzhiyun 		*hlen = SHA512_HASH_SIZE;
479*4882a593Smuzhiyun 		shaalgo = RK_ALGO_SHA512;
480*4882a593Smuzhiyun 		break;
481*4882a593Smuzhiyun 	default:
482*4882a593Smuzhiyun 		D_TRACE("unknown padding %x", padding);
483*4882a593Smuzhiyun 		*hlen = 0;
484*4882a593Smuzhiyun 		shaalgo = 0;
485*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING;
486*4882a593Smuzhiyun 	}
487*4882a593Smuzhiyun 
488*4882a593Smuzhiyun 	*hash_algo = shaalgo;
489*4882a593Smuzhiyun 
490*4882a593Smuzhiyun 	return RK_CRYPTO_SUCCESS;
491*4882a593Smuzhiyun }
492*4882a593Smuzhiyun 
calc_padding_digest(uint32_t algo,const uint8_t * data,uint32_t data_len,uint8_t * digest)493*4882a593Smuzhiyun static RK_RES calc_padding_digest(uint32_t algo, const uint8_t *data, uint32_t data_len,
494*4882a593Smuzhiyun 				  uint8_t *digest)
495*4882a593Smuzhiyun {
496*4882a593Smuzhiyun 	RK_RES res;
497*4882a593Smuzhiyun 	rk_hash_config hash_cfg;
498*4882a593Smuzhiyun 	rk_handle hash_hdl = 0;
499*4882a593Smuzhiyun 
500*4882a593Smuzhiyun 	memset(&hash_cfg, 0x00, sizeof(hash_cfg));
501*4882a593Smuzhiyun 
502*4882a593Smuzhiyun 	hash_cfg.algo = algo;
503*4882a593Smuzhiyun 
504*4882a593Smuzhiyun 	res = rk_hash_init(&hash_cfg, &hash_hdl);
505*4882a593Smuzhiyun 	if (res)
506*4882a593Smuzhiyun 		goto exit;
507*4882a593Smuzhiyun 
508*4882a593Smuzhiyun 	if (data && data_len != 0) {
509*4882a593Smuzhiyun 		res = rk_hash_update_virt(hash_hdl, data, data_len);
510*4882a593Smuzhiyun 		if (res) {
511*4882a593Smuzhiyun 			rk_hash_final(hash_hdl, NULL);
512*4882a593Smuzhiyun 			goto exit;
513*4882a593Smuzhiyun 		}
514*4882a593Smuzhiyun 	}
515*4882a593Smuzhiyun 
516*4882a593Smuzhiyun 	res = rk_hash_final(hash_hdl, digest);
517*4882a593Smuzhiyun exit:
518*4882a593Smuzhiyun 	if (res)
519*4882a593Smuzhiyun 		D_TRACE("digest error.");
520*4882a593Smuzhiyun 
521*4882a593Smuzhiyun 	return res;
522*4882a593Smuzhiyun }
523*4882a593Smuzhiyun 
524*4882a593Smuzhiyun /**
525*4882a593Smuzhiyun  * Generate and apply the MGF1 operation (from PKCS#1 v2.1) to a buffer.
526*4882a593Smuzhiyun  *
527*4882a593Smuzhiyun  * \param dst       buffer to mask
528*4882a593Smuzhiyun  * \param dlen      length of destination buffer
529*4882a593Smuzhiyun  * \param src       source of the mask generation
530*4882a593Smuzhiyun  * \param slen      length of the source buffer
531*4882a593Smuzhiyun  * \param md_ctx    message digest context to use
532*4882a593Smuzhiyun  */
mgf_mask(uint8_t * dst,uint32_t dlen,uint8_t * src,uint32_t slen,uint32_t hash_algo,uint32_t hash_len)533*4882a593Smuzhiyun static RK_RES mgf_mask(uint8_t *dst, uint32_t dlen, uint8_t *src, uint32_t slen,
534*4882a593Smuzhiyun 		       uint32_t hash_algo, uint32_t hash_len)
535*4882a593Smuzhiyun {
536*4882a593Smuzhiyun 	uint8_t mask[SHA512_HASH_SIZE];
537*4882a593Smuzhiyun 	uint8_t counter[4];
538*4882a593Smuzhiyun 	uint8_t *p;
539*4882a593Smuzhiyun 	uint32_t i, use_len;
540*4882a593Smuzhiyun 	RK_RES res = 0;
541*4882a593Smuzhiyun 	rk_handle hash_hdl;
542*4882a593Smuzhiyun 	rk_hash_config hash_cfg;
543*4882a593Smuzhiyun 
544*4882a593Smuzhiyun 
545*4882a593Smuzhiyun 	memset(&hash_cfg, 0x00, sizeof(hash_cfg));
546*4882a593Smuzhiyun 	hash_cfg.algo = hash_algo;
547*4882a593Smuzhiyun 
548*4882a593Smuzhiyun 	memset(mask, 0, sizeof(mask));
549*4882a593Smuzhiyun 	memset(counter, 0, sizeof(counter));
550*4882a593Smuzhiyun 
551*4882a593Smuzhiyun 	/* Generate and apply dbMask */
552*4882a593Smuzhiyun 	p = dst;
553*4882a593Smuzhiyun 
554*4882a593Smuzhiyun 	while (dlen > 0) {
555*4882a593Smuzhiyun 		use_len = hash_len;
556*4882a593Smuzhiyun 		if (dlen < hash_len)
557*4882a593Smuzhiyun 			use_len = dlen;
558*4882a593Smuzhiyun 
559*4882a593Smuzhiyun 		res = rk_hash_init(&hash_cfg, &hash_hdl);
560*4882a593Smuzhiyun 		if (res)
561*4882a593Smuzhiyun 			goto cleanup;
562*4882a593Smuzhiyun 
563*4882a593Smuzhiyun 		res = rk_hash_update_virt(hash_hdl, src, slen);
564*4882a593Smuzhiyun 		if (res) {
565*4882a593Smuzhiyun 			rk_hash_final(hash_hdl, NULL);
566*4882a593Smuzhiyun 			goto cleanup;
567*4882a593Smuzhiyun 		}
568*4882a593Smuzhiyun 
569*4882a593Smuzhiyun 		res = rk_hash_update_virt(hash_hdl, counter, 4);
570*4882a593Smuzhiyun 		if (res) {
571*4882a593Smuzhiyun 			rk_hash_final(hash_hdl, NULL);
572*4882a593Smuzhiyun 			goto cleanup;
573*4882a593Smuzhiyun 		}
574*4882a593Smuzhiyun 
575*4882a593Smuzhiyun 		res = rk_hash_final(hash_hdl, mask);
576*4882a593Smuzhiyun 		if (res)
577*4882a593Smuzhiyun 			goto cleanup;
578*4882a593Smuzhiyun 
579*4882a593Smuzhiyun 		for (i = 0; i < use_len; ++i)
580*4882a593Smuzhiyun 			*p++ ^= mask[i];
581*4882a593Smuzhiyun 
582*4882a593Smuzhiyun 		counter[3]++;
583*4882a593Smuzhiyun 
584*4882a593Smuzhiyun 		dlen -= use_len;
585*4882a593Smuzhiyun 	}
586*4882a593Smuzhiyun 
587*4882a593Smuzhiyun cleanup:
588*4882a593Smuzhiyun 	memset(mask, 0x00, sizeof(mask));
589*4882a593Smuzhiyun 
590*4882a593Smuzhiyun 	return res;
591*4882a593Smuzhiyun }
592*4882a593Smuzhiyun 
593*4882a593Smuzhiyun /*
594*4882a593Smuzhiyun  * Implementation of the PKCS#1 v2.1 RSAES-OAEP-ENCRYPT function
595*4882a593Smuzhiyun  */
rsa_padding_add_oaep_type(enum RK_RSA_CRYPT_PADDING padding,uint16_t key_len,const uint8_t * label,uint32_t label_len,const uint8_t * in,uint32_t in_len,uint8_t * out)596*4882a593Smuzhiyun static RK_RES rsa_padding_add_oaep_type(enum RK_RSA_CRYPT_PADDING padding, uint16_t key_len,
597*4882a593Smuzhiyun 					const uint8_t *label, uint32_t label_len,
598*4882a593Smuzhiyun 					const uint8_t *in, uint32_t in_len, uint8_t *out)
599*4882a593Smuzhiyun {
600*4882a593Smuzhiyun 	uint32_t olen;
601*4882a593Smuzhiyun 	RK_RES res;
602*4882a593Smuzhiyun 	uint8_t *p = out;
603*4882a593Smuzhiyun 	uint32_t hlen;
604*4882a593Smuzhiyun 	uint32_t hash_algo;
605*4882a593Smuzhiyun 
606*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!out);
607*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!in);
608*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(label_len != 0 || label);
609*4882a593Smuzhiyun 
610*4882a593Smuzhiyun 	olen = key_len;
611*4882a593Smuzhiyun 	res = get_hash_algo_from_padding(padding, &hlen, &hash_algo);
612*4882a593Smuzhiyun 	if (res)
613*4882a593Smuzhiyun 		goto error;
614*4882a593Smuzhiyun 
615*4882a593Smuzhiyun 	/* first comparison checks for overflow */
616*4882a593Smuzhiyun 	if (in_len + 2 * hlen + 2 < in_len || olen < in_len + 2 * hlen + 2) {
617*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PADDING_OVERFLOW;
618*4882a593Smuzhiyun 		goto error;
619*4882a593Smuzhiyun 	}
620*4882a593Smuzhiyun 
621*4882a593Smuzhiyun 	memset(out, 0, olen);
622*4882a593Smuzhiyun 
623*4882a593Smuzhiyun 	*p++ = 0;
624*4882a593Smuzhiyun 
625*4882a593Smuzhiyun 	/* Generate a random octet string seed */
626*4882a593Smuzhiyun 	res = rk_get_random(p, hlen);
627*4882a593Smuzhiyun 	if (res)
628*4882a593Smuzhiyun 		goto error;
629*4882a593Smuzhiyun 
630*4882a593Smuzhiyun 	p += hlen;
631*4882a593Smuzhiyun 
632*4882a593Smuzhiyun 	/* Construct DB */
633*4882a593Smuzhiyun 	res = calc_padding_digest(hash_algo, label, label_len, p);
634*4882a593Smuzhiyun 	if (res)
635*4882a593Smuzhiyun 		goto error;
636*4882a593Smuzhiyun 
637*4882a593Smuzhiyun 	p += hlen;
638*4882a593Smuzhiyun 	p += olen - 2 * hlen - 2 - in_len;
639*4882a593Smuzhiyun 	*p++ = 1;
640*4882a593Smuzhiyun 	memcpy(p, in, in_len);
641*4882a593Smuzhiyun 
642*4882a593Smuzhiyun 	/* maskedDB: Apply dbMask to DB */
643*4882a593Smuzhiyun 	res = mgf_mask(out + hlen + 1, olen - hlen - 1, out + 1, hlen, hash_algo, hlen);
644*4882a593Smuzhiyun 	if (res)
645*4882a593Smuzhiyun 		goto error;
646*4882a593Smuzhiyun 
647*4882a593Smuzhiyun 	/* maskedSeed: Apply seedMask to seed */
648*4882a593Smuzhiyun 	res = mgf_mask(out + 1, hlen, out + hlen + 1, olen - hlen - 1, hash_algo, hlen);
649*4882a593Smuzhiyun 	if (res)
650*4882a593Smuzhiyun 		goto error;
651*4882a593Smuzhiyun 
652*4882a593Smuzhiyun 	return RK_CRYPTO_SUCCESS;
653*4882a593Smuzhiyun 
654*4882a593Smuzhiyun error:
655*4882a593Smuzhiyun 	return res;
656*4882a593Smuzhiyun }
657*4882a593Smuzhiyun 
658*4882a593Smuzhiyun /*
659*4882a593Smuzhiyun  * Implementation of the PKCS#1 v2.1 RSAES-OAEP-DECRYPT function
660*4882a593Smuzhiyun  */
rsa_padding_check_oaep_type(enum RK_RSA_CRYPT_PADDING padding,uint16_t key_len,const uint8_t * label,size_t label_len,const uint8_t * in,uint8_t * out,uint32_t * out_len)661*4882a593Smuzhiyun RK_RES rsa_padding_check_oaep_type(enum RK_RSA_CRYPT_PADDING padding, uint16_t key_len,
662*4882a593Smuzhiyun 				   const uint8_t *label, size_t label_len,
663*4882a593Smuzhiyun 				   const uint8_t *in, uint8_t *out, uint32_t *out_len)
664*4882a593Smuzhiyun {
665*4882a593Smuzhiyun 	RK_RES res = RK_CRYPTO_ERR_PADDING;
666*4882a593Smuzhiyun 	uint32_t ilen, i, pad_len;
667*4882a593Smuzhiyun 	uint8_t *p, bad, pad_done;
668*4882a593Smuzhiyun 	uint8_t *buf = NULL;
669*4882a593Smuzhiyun 	uint8_t lhash[SHA512_HASH_SIZE];
670*4882a593Smuzhiyun 	uint32_t hlen;
671*4882a593Smuzhiyun 	uint32_t hash_algo;
672*4882a593Smuzhiyun 
673*4882a593Smuzhiyun 	ilen = key_len;
674*4882a593Smuzhiyun 	res = get_hash_algo_from_padding(padding, &hlen, &hash_algo);
675*4882a593Smuzhiyun 	if (res)
676*4882a593Smuzhiyun 		return res;
677*4882a593Smuzhiyun 
678*4882a593Smuzhiyun 	buf = malloc(ilen);
679*4882a593Smuzhiyun 	if (!buf)
680*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_OUT_OF_MEMORY;
681*4882a593Smuzhiyun 
682*4882a593Smuzhiyun 	memcpy(buf, in, ilen);
683*4882a593Smuzhiyun 
684*4882a593Smuzhiyun 	// checking for integer underflow
685*4882a593Smuzhiyun 	if (2 * hlen + 2 > ilen) {
686*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PADDING;
687*4882a593Smuzhiyun 		goto exit;
688*4882a593Smuzhiyun 	}
689*4882a593Smuzhiyun 
690*4882a593Smuzhiyun 	/*
691*4882a593Smuzhiyun 	 * Unmask data and generate lHash
692*4882a593Smuzhiyun 	 */
693*4882a593Smuzhiyun 	res = calc_padding_digest(hash_algo, label, label_len, lhash);
694*4882a593Smuzhiyun 	if (res)
695*4882a593Smuzhiyun 		goto exit;
696*4882a593Smuzhiyun 
697*4882a593Smuzhiyun 	/* seed: Apply seedMask to maskedSeed */
698*4882a593Smuzhiyun 	res = mgf_mask(buf + 1, hlen, buf + hlen + 1, ilen - hlen - 1, hash_algo, hlen);
699*4882a593Smuzhiyun 	if (res)
700*4882a593Smuzhiyun 		goto exit;
701*4882a593Smuzhiyun 
702*4882a593Smuzhiyun 	/* DB: Apply dbMask to maskedDB */
703*4882a593Smuzhiyun 	res = mgf_mask(buf + hlen + 1, ilen - hlen - 1, buf + 1, hlen, hash_algo, hlen);
704*4882a593Smuzhiyun 	if (res)
705*4882a593Smuzhiyun 		goto exit;
706*4882a593Smuzhiyun 
707*4882a593Smuzhiyun 	/*
708*4882a593Smuzhiyun 	 * Check contents, in "constant-time"
709*4882a593Smuzhiyun 	 */
710*4882a593Smuzhiyun 	p = buf;
711*4882a593Smuzhiyun 	bad = 0;
712*4882a593Smuzhiyun 
713*4882a593Smuzhiyun 	bad |= *p++; /* First byte must be 0 */
714*4882a593Smuzhiyun 
715*4882a593Smuzhiyun 	p += hlen; /* Skip seed */
716*4882a593Smuzhiyun 
717*4882a593Smuzhiyun 	/* Check lHash */
718*4882a593Smuzhiyun 	for (i = 0; i < hlen; i++)
719*4882a593Smuzhiyun 		bad |= lhash[i] ^ *p++;
720*4882a593Smuzhiyun 
721*4882a593Smuzhiyun 	/* Get zero-padding len, but always read till end of buffer
722*4882a593Smuzhiyun 	 * (minus one, for the 01 byte)
723*4882a593Smuzhiyun 	 */
724*4882a593Smuzhiyun 	pad_len = 0;
725*4882a593Smuzhiyun 	pad_done = 0;
726*4882a593Smuzhiyun 	for (i = 0; i < ilen - 2 * hlen - 2; i++) {
727*4882a593Smuzhiyun 		pad_done |= p[i];
728*4882a593Smuzhiyun 		pad_len += ((pad_done | (uint8_t)-pad_done) >> 7) ^ 1;
729*4882a593Smuzhiyun 	}
730*4882a593Smuzhiyun 
731*4882a593Smuzhiyun 	p += pad_len;
732*4882a593Smuzhiyun 	bad |= *p++ ^ 0x01;
733*4882a593Smuzhiyun 
734*4882a593Smuzhiyun 	/*
735*4882a593Smuzhiyun 	 * The only information "leaked" is whether the padding was correct or not
736*4882a593Smuzhiyun 	 * (eg, no data is copied if it was not correct). This meets the
737*4882a593Smuzhiyun 	 * recommendations in PKCS#1 v2.2: an opponent cannot distinguish between
738*4882a593Smuzhiyun 	 * the different error conditions.
739*4882a593Smuzhiyun 	 */
740*4882a593Smuzhiyun 	if (bad != 0) {
741*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PADDING;
742*4882a593Smuzhiyun 		goto exit;
743*4882a593Smuzhiyun 	}
744*4882a593Smuzhiyun 
745*4882a593Smuzhiyun 	if (ilen - (p - buf) > key_len) {
746*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PADDING;
747*4882a593Smuzhiyun 		goto exit;
748*4882a593Smuzhiyun 	}
749*4882a593Smuzhiyun 
750*4882a593Smuzhiyun 	*out_len = ilen - (p - buf);
751*4882a593Smuzhiyun 	memcpy(out, p, *out_len);
752*4882a593Smuzhiyun 
753*4882a593Smuzhiyun 	res = RK_CRYPTO_SUCCESS;
754*4882a593Smuzhiyun exit:
755*4882a593Smuzhiyun 	if (buf)
756*4882a593Smuzhiyun 		free(buf);
757*4882a593Smuzhiyun 
758*4882a593Smuzhiyun 	return res;
759*4882a593Smuzhiyun }
760*4882a593Smuzhiyun 
761*4882a593Smuzhiyun /*
762*4882a593Smuzhiyun  * Implementation of the PKCS#1 v2.1 RSASSA-PKCS1-V1_5-SIGN function
763*4882a593Smuzhiyun  * Construct a PKCS v1.5 encoding of a hashed message
764*4882a593Smuzhiyun  */
rsa_padding_add_pkcs15_sign_type(uint32_t hash_algo,uint16_t key_len,const uint8_t * hash,uint8_t hash_len,uint8_t * out)765*4882a593Smuzhiyun static int rsa_padding_add_pkcs15_sign_type(uint32_t hash_algo, uint16_t key_len,
766*4882a593Smuzhiyun 					    const uint8_t *hash, uint8_t hash_len, uint8_t *out)
767*4882a593Smuzhiyun {
768*4882a593Smuzhiyun 	RK_RES res;
769*4882a593Smuzhiyun 	uint32_t oid_size  = 0;
770*4882a593Smuzhiyun 	uint32_t nb_pad    = key_len;
771*4882a593Smuzhiyun 	uint8_t *p = out;
772*4882a593Smuzhiyun 	const uint8_t *oid  = NULL;
773*4882a593Smuzhiyun 
774*4882a593Smuzhiyun 	/* Gather length of hash to sign */
775*4882a593Smuzhiyun 	res = get_oid_by_md(hash_algo, &oid, &oid_size);
776*4882a593Smuzhiyun 	if (res)
777*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING;
778*4882a593Smuzhiyun 
779*4882a593Smuzhiyun 	/* Double-check that 8 + hash_len + oid_size can be used as a
780*4882a593Smuzhiyun 	 * 1-byte ASN.1 length encoding and that there's no overflow.
781*4882a593Smuzhiyun 	 */
782*4882a593Smuzhiyun 	if (8 + hash_len + oid_size >= 0x80 ||
783*4882a593Smuzhiyun 	    10 + hash_len < hash_len ||
784*4882a593Smuzhiyun 	    10 + hash_len + oid_size < 10 + hash_len)
785*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING_OVERFLOW;
786*4882a593Smuzhiyun 
787*4882a593Smuzhiyun 	/*
788*4882a593Smuzhiyun 	 * Static bounds check:
789*4882a593Smuzhiyun 	 * - Need 10 bytes for five tag-length pairs.
790*4882a593Smuzhiyun 	 *   (Insist on 1-byte length encodings to protect against variants of
791*4882a593Smuzhiyun 	 *    Bleichenbacher's forgery attack against lax PKCS#1v1.5 verification)
792*4882a593Smuzhiyun 	 * - Need hash_len bytes for hash
793*4882a593Smuzhiyun 	 * - Need oid_size bytes for hash alg OID.
794*4882a593Smuzhiyun 	 */
795*4882a593Smuzhiyun 	if (nb_pad < 10 + hash_len + oid_size)
796*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING_OVERFLOW;
797*4882a593Smuzhiyun 
798*4882a593Smuzhiyun 	nb_pad -= 10 + hash_len + oid_size;
799*4882a593Smuzhiyun 
800*4882a593Smuzhiyun 	/* Need space for signature header and padding delimiter (3 bytes),
801*4882a593Smuzhiyun 	 * and 8 bytes for the minimal padding
802*4882a593Smuzhiyun 	 */
803*4882a593Smuzhiyun 	if (nb_pad < 3 + 8)
804*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING_OVERFLOW;
805*4882a593Smuzhiyun 
806*4882a593Smuzhiyun 	nb_pad -= 3;
807*4882a593Smuzhiyun 
808*4882a593Smuzhiyun 	/* Now nb_pad is the amount of memory to be filled
809*4882a593Smuzhiyun 	 * with padding, and at least 8 bytes long.
810*4882a593Smuzhiyun 	 */
811*4882a593Smuzhiyun 
812*4882a593Smuzhiyun 	/* Write signature header and padding */
813*4882a593Smuzhiyun 	*p++ = 0;
814*4882a593Smuzhiyun 	*p++ = MBEDTLS_RSA_SIGN;
815*4882a593Smuzhiyun 	memset(p, 0xFF, nb_pad);
816*4882a593Smuzhiyun 	p += nb_pad;
817*4882a593Smuzhiyun 	*p++ = 0;
818*4882a593Smuzhiyun 
819*4882a593Smuzhiyun 	/* Signing hashed data, add corresponding ASN.1 structure
820*4882a593Smuzhiyun 	 *
821*4882a593Smuzhiyun 	 * DigestInfo ::= SEQUENCE {
822*4882a593Smuzhiyun 	 *	 digestAlgorithm DigestAlgorithmIdentifier,
823*4882a593Smuzhiyun 	 *	 digest Digest }
824*4882a593Smuzhiyun 	 * DigestAlgorithmIdentifier ::= AlgorithmIdentifier
825*4882a593Smuzhiyun 	 * Digest ::= OCTET STRING
826*4882a593Smuzhiyun 	 *
827*4882a593Smuzhiyun 	 * Schematic:
828*4882a593Smuzhiyun 	 * TAG-SEQ + LEN [ TAG-SEQ + LEN [ TAG-OID + LEN [ OID  ]
829*4882a593Smuzhiyun 	 *                                 TAG-NULL + LEN [ NULL ] ]
830*4882a593Smuzhiyun 	 *                 TAG-OCTET + LEN [ HASH ] ]
831*4882a593Smuzhiyun 	 */
832*4882a593Smuzhiyun 	*p++ = ASN1_SEQUENCE;
833*4882a593Smuzhiyun 	*p++ = (uint8_t)(0x08 + oid_size + hash_len);
834*4882a593Smuzhiyun 	*p++ = ASN1_SEQUENCE;
835*4882a593Smuzhiyun 	*p++ = (uint8_t)(0x04 + oid_size);
836*4882a593Smuzhiyun 	*p++ = ASN1_OBJ_IDENTIFIER;
837*4882a593Smuzhiyun 	*p++ = (uint8_t)oid_size;
838*4882a593Smuzhiyun 	memcpy(p, oid, oid_size);
839*4882a593Smuzhiyun 	p += oid_size;
840*4882a593Smuzhiyun 	*p++ = ASN1_NULL;
841*4882a593Smuzhiyun 	*p++ = 0x00;
842*4882a593Smuzhiyun 	*p++ = ASN1_OCT_STRING;
843*4882a593Smuzhiyun 	*p++ = (uint8_t)hash_len;
844*4882a593Smuzhiyun 	memcpy(p, hash, hash_len);
845*4882a593Smuzhiyun 	p += hash_len;
846*4882a593Smuzhiyun 
847*4882a593Smuzhiyun 	return RK_CRYPTO_SUCCESS;
848*4882a593Smuzhiyun }
849*4882a593Smuzhiyun 
850*4882a593Smuzhiyun /*
851*4882a593Smuzhiyun  * Implementation of the PKCS#1 v2.1 RSASSA-PSS-SIGN function
852*4882a593Smuzhiyun  */
rsa_padding_add_pss_type(uint16_t key_len,uint16_t n_bits,uint32_t hash_algo,const uint8_t * hash,uint32_t hash_len,uint8_t * out)853*4882a593Smuzhiyun RK_RES rsa_padding_add_pss_type(uint16_t key_len, uint16_t n_bits,
854*4882a593Smuzhiyun 				uint32_t hash_algo, const uint8_t *hash,
855*4882a593Smuzhiyun 				uint32_t hash_len, uint8_t *out)
856*4882a593Smuzhiyun {
857*4882a593Smuzhiyun 	uint32_t olen;
858*4882a593Smuzhiyun 	uint8_t *p = out;
859*4882a593Smuzhiyun 	uint8_t salt[SHA512_HASH_SIZE];
860*4882a593Smuzhiyun 	uint32_t slen, hlen, min_slen, offset = 0;
861*4882a593Smuzhiyun 	RK_RES res;
862*4882a593Smuzhiyun 	uint32_t msb, ps_len;
863*4882a593Smuzhiyun 	rk_hash_config hash_cfg;
864*4882a593Smuzhiyun 	rk_handle hash_hdl;
865*4882a593Smuzhiyun 
866*4882a593Smuzhiyun 	olen = key_len;
867*4882a593Smuzhiyun 	hlen = hash_len;
868*4882a593Smuzhiyun 	slen = hlen;
869*4882a593Smuzhiyun 
870*4882a593Smuzhiyun 	/* Calculate the largest possible salt length. Normally this is the hash
871*4882a593Smuzhiyun 	 * length, which is the maximum length the salt can have. If there is not
872*4882a593Smuzhiyun 	 * enough room, use the maximum salt length that fits. The constraint is
873*4882a593Smuzhiyun 	 * that the hash length plus the salt length plus 2 bytes must be at most
874*4882a593Smuzhiyun 	 * the key length. This complies with FIPS 186-4.5.5 (e) and RFC 8017
875*4882a593Smuzhiyun 	 * (PKCS#1 v2.2) 9.1.1 step 3.
876*4882a593Smuzhiyun 	 */
877*4882a593Smuzhiyun 	min_slen = hlen - 2;
878*4882a593Smuzhiyun 	if (olen < hlen + min_slen + 2)
879*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING_OVERFLOW;
880*4882a593Smuzhiyun 	else if (olen >= hlen + hlen + 2)
881*4882a593Smuzhiyun 		slen = hlen;
882*4882a593Smuzhiyun 	else
883*4882a593Smuzhiyun 		slen = olen - hlen - 2;
884*4882a593Smuzhiyun 
885*4882a593Smuzhiyun 	if (olen < hlen * 2 + 2)
886*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING_OVERFLOW;
887*4882a593Smuzhiyun 
888*4882a593Smuzhiyun 	ps_len = olen - hlen * 2 - 2;
889*4882a593Smuzhiyun 
890*4882a593Smuzhiyun 	if (olen < ps_len + 1 + slen + hlen)
891*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_PADDING_OVERFLOW;
892*4882a593Smuzhiyun 
893*4882a593Smuzhiyun 	memset(out, 0, olen);
894*4882a593Smuzhiyun 
895*4882a593Smuzhiyun 	/* Generate salt of length slen */
896*4882a593Smuzhiyun 	res = rk_get_random(salt, slen);
897*4882a593Smuzhiyun 	if (res)
898*4882a593Smuzhiyun 		return res;
899*4882a593Smuzhiyun 
900*4882a593Smuzhiyun 	/* Note: EMSA-PSS encoding is over the length of N - 1 bits */
901*4882a593Smuzhiyun 	msb = n_bits - 1;
902*4882a593Smuzhiyun 	p += ps_len;
903*4882a593Smuzhiyun 	*p++ = 0x01;
904*4882a593Smuzhiyun 	memcpy(p, salt, slen);
905*4882a593Smuzhiyun 	p += slen;
906*4882a593Smuzhiyun 
907*4882a593Smuzhiyun 	/* Generate H = Hash( M' ) */
908*4882a593Smuzhiyun 	memset(&hash_cfg, 0x00, sizeof(hash_cfg));
909*4882a593Smuzhiyun 	hash_cfg.algo = hash_algo;
910*4882a593Smuzhiyun 
911*4882a593Smuzhiyun 	res = rk_hash_init(&hash_cfg, &hash_hdl);
912*4882a593Smuzhiyun 	if (res)
913*4882a593Smuzhiyun 		goto exit;
914*4882a593Smuzhiyun 
915*4882a593Smuzhiyun 	res = rk_hash_update_virt(hash_hdl, p, 8);
916*4882a593Smuzhiyun 	if (res) {
917*4882a593Smuzhiyun 		rk_hash_final(hash_hdl, NULL);
918*4882a593Smuzhiyun 		goto exit;
919*4882a593Smuzhiyun 	}
920*4882a593Smuzhiyun 
921*4882a593Smuzhiyun 	res = rk_hash_update_virt(hash_hdl, hash, hash_len);
922*4882a593Smuzhiyun 	if (res) {
923*4882a593Smuzhiyun 		rk_hash_final(hash_hdl, NULL);
924*4882a593Smuzhiyun 		goto exit;
925*4882a593Smuzhiyun 	}
926*4882a593Smuzhiyun 
927*4882a593Smuzhiyun 	res = rk_hash_update_virt(hash_hdl, salt, slen);
928*4882a593Smuzhiyun 	if (res) {
929*4882a593Smuzhiyun 		rk_hash_final(hash_hdl, NULL);
930*4882a593Smuzhiyun 		goto exit;
931*4882a593Smuzhiyun 	}
932*4882a593Smuzhiyun 
933*4882a593Smuzhiyun 	res = rk_hash_final(hash_hdl, p);
934*4882a593Smuzhiyun 	if (res)
935*4882a593Smuzhiyun 		goto exit;
936*4882a593Smuzhiyun 
937*4882a593Smuzhiyun 	/* Compensate for boundary condition when applying mask */
938*4882a593Smuzhiyun 	if (msb % 8 == 0)
939*4882a593Smuzhiyun 		offset = 1;
940*4882a593Smuzhiyun 
941*4882a593Smuzhiyun 	/* maskedDB: Apply dbMask to DB */
942*4882a593Smuzhiyun 	res = mgf_mask(out + offset, olen - hlen - 1 - offset, p, hlen, hash_algo, hash_len);
943*4882a593Smuzhiyun 	if (res)
944*4882a593Smuzhiyun 		goto exit;
945*4882a593Smuzhiyun 
946*4882a593Smuzhiyun 	msb = n_bits - 1;
947*4882a593Smuzhiyun 	out[0] &= 0xFF >> (olen * 8 - msb);
948*4882a593Smuzhiyun 
949*4882a593Smuzhiyun 	p += hlen;
950*4882a593Smuzhiyun 	*p++ = 0xBC;
951*4882a593Smuzhiyun 
952*4882a593Smuzhiyun exit:
953*4882a593Smuzhiyun 	return res;
954*4882a593Smuzhiyun }
955*4882a593Smuzhiyun 
956*4882a593Smuzhiyun /*
957*4882a593Smuzhiyun  * Implementation of the PKCS#1 v2.1 RSASSA-PSS-VERIFY function
958*4882a593Smuzhiyun  */
rk_rsa_padding_check_pss_type(uint16_t key_len,uint16_t n_bits,uint32_t hash_algo,uint32_t hash_len,const uint8_t * hash,const uint8_t * dec)959*4882a593Smuzhiyun RK_RES rk_rsa_padding_check_pss_type(uint16_t key_len, uint16_t n_bits,
960*4882a593Smuzhiyun 				     uint32_t hash_algo, uint32_t hash_len,
961*4882a593Smuzhiyun 				     const uint8_t *hash, const uint8_t *dec)
962*4882a593Smuzhiyun {
963*4882a593Smuzhiyun 	RK_RES res = RK_CRYPTO_ERR_PADDING;
964*4882a593Smuzhiyun 	uint32_t siglen;
965*4882a593Smuzhiyun 	uint8_t *p;
966*4882a593Smuzhiyun 	uint8_t *buf = NULL;
967*4882a593Smuzhiyun 	uint8_t result[SHA512_HASH_SIZE];
968*4882a593Smuzhiyun 	uint8_t zeros[8];
969*4882a593Smuzhiyun 	uint32_t hlen;
970*4882a593Smuzhiyun 	uint32_t slen, msb;
971*4882a593Smuzhiyun 	rk_hash_config hash_cfg;
972*4882a593Smuzhiyun 	rk_handle hash_hdl;
973*4882a593Smuzhiyun 
974*4882a593Smuzhiyun 	buf = malloc(key_len);
975*4882a593Smuzhiyun 	if (!buf)
976*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_OUT_OF_MEMORY;
977*4882a593Smuzhiyun 
978*4882a593Smuzhiyun 	memcpy(buf, dec, key_len);
979*4882a593Smuzhiyun 
980*4882a593Smuzhiyun 	siglen = key_len;
981*4882a593Smuzhiyun 
982*4882a593Smuzhiyun 	if (siglen < 16) {
983*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PADDING;
984*4882a593Smuzhiyun 		goto error;
985*4882a593Smuzhiyun 	}
986*4882a593Smuzhiyun 
987*4882a593Smuzhiyun 	p = buf;
988*4882a593Smuzhiyun 
989*4882a593Smuzhiyun 	if (buf[siglen - 1] != 0xBC) {
990*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PADDING;
991*4882a593Smuzhiyun 		goto error;
992*4882a593Smuzhiyun 	}
993*4882a593Smuzhiyun 
994*4882a593Smuzhiyun 	hlen = hash_len;
995*4882a593Smuzhiyun 	slen = siglen - hlen - 1; /* Currently length of salt + padding */
996*4882a593Smuzhiyun 
997*4882a593Smuzhiyun 	memset(zeros, 0, 8);
998*4882a593Smuzhiyun 
999*4882a593Smuzhiyun 	/*
1000*4882a593Smuzhiyun 	 * Note: EMSA-PSS verification is over the length of N - 1 bits
1001*4882a593Smuzhiyun 	 */
1002*4882a593Smuzhiyun 	msb = n_bits - 1;
1003*4882a593Smuzhiyun 
1004*4882a593Smuzhiyun 	/* Compensate for boundary condition when applying mask */
1005*4882a593Smuzhiyun 	if (msb % 8 == 0) {
1006*4882a593Smuzhiyun 		p++;
1007*4882a593Smuzhiyun 		siglen -= 1;
1008*4882a593Smuzhiyun 	}
1009*4882a593Smuzhiyun 	if (buf[0] >> (8 - siglen * 8 + msb)) {
1010*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PADDING;
1011*4882a593Smuzhiyun 		goto error;
1012*4882a593Smuzhiyun 	}
1013*4882a593Smuzhiyun 
1014*4882a593Smuzhiyun 	res = mgf_mask(p, siglen - hlen - 1, p + siglen - hlen - 1, hlen, hash_algo, hash_len);
1015*4882a593Smuzhiyun 	if (res)
1016*4882a593Smuzhiyun 		goto error;
1017*4882a593Smuzhiyun 
1018*4882a593Smuzhiyun 	buf[0] &= 0xFF >> (siglen * 8 - msb);
1019*4882a593Smuzhiyun 
1020*4882a593Smuzhiyun 	while (p < buf + siglen && *p == 0)
1021*4882a593Smuzhiyun 		p++;
1022*4882a593Smuzhiyun 
1023*4882a593Smuzhiyun 	if (p == buf + siglen || *p++ != 0x01) {
1024*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PADDING;
1025*4882a593Smuzhiyun 		goto error;
1026*4882a593Smuzhiyun 	}
1027*4882a593Smuzhiyun 
1028*4882a593Smuzhiyun 	/* Actual salt len */
1029*4882a593Smuzhiyun 	slen -= p - buf;
1030*4882a593Smuzhiyun 
1031*4882a593Smuzhiyun 	/*
1032*4882a593Smuzhiyun 	 * Generate H = Hash( M' )
1033*4882a593Smuzhiyun 	 */
1034*4882a593Smuzhiyun 
1035*4882a593Smuzhiyun 	memset(&hash_cfg, 0x00, sizeof(hash_cfg));
1036*4882a593Smuzhiyun 	hash_cfg.algo = hash_algo;
1037*4882a593Smuzhiyun 
1038*4882a593Smuzhiyun 	res = rk_hash_init(&hash_cfg, &hash_hdl);
1039*4882a593Smuzhiyun 	if (res)
1040*4882a593Smuzhiyun 		goto error;
1041*4882a593Smuzhiyun 
1042*4882a593Smuzhiyun 	res = rk_hash_update_virt(hash_hdl, zeros, 8);
1043*4882a593Smuzhiyun 	if (res) {
1044*4882a593Smuzhiyun 		rk_hash_final(hash_hdl, NULL);
1045*4882a593Smuzhiyun 		goto error;
1046*4882a593Smuzhiyun 	}
1047*4882a593Smuzhiyun 
1048*4882a593Smuzhiyun 	res = rk_hash_update_virt(hash_hdl, hash, hash_len);
1049*4882a593Smuzhiyun 	if (res) {
1050*4882a593Smuzhiyun 		rk_hash_final(hash_hdl, NULL);
1051*4882a593Smuzhiyun 		goto error;
1052*4882a593Smuzhiyun 	}
1053*4882a593Smuzhiyun 
1054*4882a593Smuzhiyun 	res = rk_hash_update_virt(hash_hdl, p, slen);
1055*4882a593Smuzhiyun 	if (res) {
1056*4882a593Smuzhiyun 		rk_hash_final(hash_hdl, NULL);
1057*4882a593Smuzhiyun 		goto error;
1058*4882a593Smuzhiyun 	}
1059*4882a593Smuzhiyun 
1060*4882a593Smuzhiyun 	res = rk_hash_final(hash_hdl, result);
1061*4882a593Smuzhiyun 	if (res)
1062*4882a593Smuzhiyun 		goto error;
1063*4882a593Smuzhiyun 
1064*4882a593Smuzhiyun 	free(buf);
1065*4882a593Smuzhiyun 
1066*4882a593Smuzhiyun 	if (memcmp(p + slen, result, hlen) == 0)
1067*4882a593Smuzhiyun 		return RK_CRYPTO_SUCCESS;
1068*4882a593Smuzhiyun 	else
1069*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_VERIFY;
1070*4882a593Smuzhiyun 
1071*4882a593Smuzhiyun error:
1072*4882a593Smuzhiyun 	if (buf)
1073*4882a593Smuzhiyun 		free(buf);
1074*4882a593Smuzhiyun 
1075*4882a593Smuzhiyun 	return RK_CRYPTO_ERR_PADDING;
1076*4882a593Smuzhiyun }
1077*4882a593Smuzhiyun 
rk_rsa_pubkey_encode(rk_rsa_pub_key_pack * pub,uint8_t * asn1_key,uint16_t * asn1_key_len,uint16_t * key_bits)1078*4882a593Smuzhiyun RK_RES rk_rsa_pubkey_encode(rk_rsa_pub_key_pack *pub,
1079*4882a593Smuzhiyun 			    uint8_t *asn1_key, uint16_t *asn1_key_len, uint16_t *key_bits)
1080*4882a593Smuzhiyun {
1081*4882a593Smuzhiyun 	RK_RES res;
1082*4882a593Smuzhiyun 	rk_rsa_pub_key *rsa_key = &pub->key;
1083*4882a593Smuzhiyun 	uint8_t tmp_field[8];
1084*4882a593Smuzhiyun 	uint32_t total_len = 0, tmp_len = 0, out_max;
1085*4882a593Smuzhiyun 
1086*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!asn1_key || !asn1_key_len || !pub || !key_bits);
1087*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!rsa_key->n || rsa_key->n_len == 0);
1088*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!rsa_key->e || rsa_key->e_len == 0);
1089*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(rsa_key->n_len != 1024 / 8 &&
1090*4882a593Smuzhiyun 			      rsa_key->n_len != 2048 / 8 &&
1091*4882a593Smuzhiyun 			      rsa_key->n_len != 3072 / 8 &&
1092*4882a593Smuzhiyun 			      rsa_key->n_len != 4096 / 8);
1093*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(pub->key_type != RK_RSA_KEY_TYPE_PLAIN);
1094*4882a593Smuzhiyun 
1095*4882a593Smuzhiyun 	out_max = *asn1_key_len;
1096*4882a593Smuzhiyun 
1097*4882a593Smuzhiyun 	//padding n
1098*4882a593Smuzhiyun 	res = asn1_set_object(rsa_key->n, rsa_key->n_len, ASN1_INTEGER, 1,
1099*4882a593Smuzhiyun 			      asn1_key + total_len, out_max, &tmp_len);
1100*4882a593Smuzhiyun 	if (res != RK_CRYPTO_SUCCESS) {
1101*4882a593Smuzhiyun 		D_TRACE("set rsa_key->n object error!");
1102*4882a593Smuzhiyun 		goto exit;
1103*4882a593Smuzhiyun 	}
1104*4882a593Smuzhiyun 
1105*4882a593Smuzhiyun 	total_len += tmp_len;
1106*4882a593Smuzhiyun 	out_max -= tmp_len;
1107*4882a593Smuzhiyun 
1108*4882a593Smuzhiyun 	//padding e
1109*4882a593Smuzhiyun 	res = asn1_set_object(rsa_key->e, rsa_key->e_len, ASN1_INTEGER, 0,
1110*4882a593Smuzhiyun 			      asn1_key + total_len, out_max, &tmp_len);
1111*4882a593Smuzhiyun 	if (res != RK_CRYPTO_SUCCESS) {
1112*4882a593Smuzhiyun 		D_TRACE("set rsa_key->e object error!");
1113*4882a593Smuzhiyun 		goto exit;
1114*4882a593Smuzhiyun 	}
1115*4882a593Smuzhiyun 	total_len += tmp_len;
1116*4882a593Smuzhiyun 	out_max   -= tmp_len;
1117*4882a593Smuzhiyun 
1118*4882a593Smuzhiyun 	//add SEQUENCE info in head
1119*4882a593Smuzhiyun 	res = asn1_compose_len(total_len, tmp_field, &tmp_len);
1120*4882a593Smuzhiyun 	if (res != RK_CRYPTO_SUCCESS) {
1121*4882a593Smuzhiyun 		D_TRACE("set asn1_compose_len error!");
1122*4882a593Smuzhiyun 		goto exit;
1123*4882a593Smuzhiyun 	}
1124*4882a593Smuzhiyun 
1125*4882a593Smuzhiyun 	if (out_max < tmp_len + 1) {
1126*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
1127*4882a593Smuzhiyun 		goto exit;
1128*4882a593Smuzhiyun 	}
1129*4882a593Smuzhiyun 
1130*4882a593Smuzhiyun 	memmove(asn1_key + tmp_len + 1, asn1_key, total_len);
1131*4882a593Smuzhiyun 	*asn1_key = ASN1_SEQUENCE;
1132*4882a593Smuzhiyun 	total_len++;
1133*4882a593Smuzhiyun 	memmove(asn1_key + 1, tmp_field, tmp_len);
1134*4882a593Smuzhiyun 	total_len += tmp_len;
1135*4882a593Smuzhiyun 
1136*4882a593Smuzhiyun 	*asn1_key_len = total_len;
1137*4882a593Smuzhiyun 	*key_bits = rsa_key->n_len * 8;
1138*4882a593Smuzhiyun exit:
1139*4882a593Smuzhiyun 	return res;
1140*4882a593Smuzhiyun }
1141*4882a593Smuzhiyun 
rk_rsa_privkey_encode(rk_rsa_priv_key_pack * priv,uint8_t * asn1_key,uint16_t * asn1_key_len,uint16_t * key_bits)1142*4882a593Smuzhiyun RK_RES rk_rsa_privkey_encode(rk_rsa_priv_key_pack *priv,
1143*4882a593Smuzhiyun 			     uint8_t *asn1_key, uint16_t *asn1_key_len, uint16_t *key_bits)
1144*4882a593Smuzhiyun {
1145*4882a593Smuzhiyun 	RK_RES res;
1146*4882a593Smuzhiyun 	uint8_t *empty_data = NULL;
1147*4882a593Smuzhiyun 	uint8_t tmp_field[5];
1148*4882a593Smuzhiyun 	uint32_t total_len = 0, tmp_len = 0;
1149*4882a593Smuzhiyun 	uint8_t version[1] = {0};
1150*4882a593Smuzhiyun 	uint16_t ver_len = 1;
1151*4882a593Smuzhiyun 	rk_rsa_priv_key *rsa_key = &priv->key;
1152*4882a593Smuzhiyun 	uint32_t i, out_max, empty_data_len;
1153*4882a593Smuzhiyun 	asn1_object_t object_list[] = {
1154*4882a593Smuzhiyun 		{version,     &ver_len,          ASN1_INTEGER, 0},
1155*4882a593Smuzhiyun 		{rsa_key->n,  &rsa_key->n_len,   ASN1_INTEGER, 1},
1156*4882a593Smuzhiyun 		{rsa_key->e,  &rsa_key->e_len,   ASN1_INTEGER, 0},
1157*4882a593Smuzhiyun 		{rsa_key->d,  &rsa_key->d_len,   ASN1_INTEGER, 1},
1158*4882a593Smuzhiyun 		{rsa_key->p,  &rsa_key->p_len,   ASN1_INTEGER, 1},
1159*4882a593Smuzhiyun 		{rsa_key->q,  &rsa_key->q_len,   ASN1_INTEGER, 1},
1160*4882a593Smuzhiyun 		{rsa_key->dp, &rsa_key->dp_len,  ASN1_INTEGER, 1},
1161*4882a593Smuzhiyun 		{rsa_key->dq, &rsa_key->dq_len,  ASN1_INTEGER, 1},
1162*4882a593Smuzhiyun 		{rsa_key->qp, &rsa_key->qp_len,  ASN1_INTEGER, 1},
1163*4882a593Smuzhiyun 	};
1164*4882a593Smuzhiyun 
1165*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!asn1_key || !asn1_key_len || !priv || !key_bits);
1166*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!rsa_key->n || rsa_key->n_len == 0);
1167*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!rsa_key->e || rsa_key->e_len == 0);
1168*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(rsa_key->n_len != 1024 / 8 &&
1169*4882a593Smuzhiyun 			      rsa_key->n_len != 2048 / 8 &&
1170*4882a593Smuzhiyun 			      rsa_key->n_len != 3072 / 8 &&
1171*4882a593Smuzhiyun 			      rsa_key->n_len != 4096 / 8);
1172*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(!rsa_key->d || rsa_key->d_len == 0);
1173*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(rsa_key->n_len != rsa_key->d_len);
1174*4882a593Smuzhiyun 
1175*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(priv->key_type != RK_RSA_KEY_TYPE_PLAIN);
1176*4882a593Smuzhiyun 
1177*4882a593Smuzhiyun 	out_max = *asn1_key_len;
1178*4882a593Smuzhiyun 
1179*4882a593Smuzhiyun 	empty_data_len = rsa_key->n_len / 2;
1180*4882a593Smuzhiyun 	empty_data = malloc(empty_data_len);
1181*4882a593Smuzhiyun 	if (!empty_data)
1182*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_OUT_OF_MEMORY;
1183*4882a593Smuzhiyun 
1184*4882a593Smuzhiyun 	memset(empty_data, 0xff, empty_data_len);
1185*4882a593Smuzhiyun 
1186*4882a593Smuzhiyun 	for (i = 0; i < ARRAY_SIZE(object_list); i++) {
1187*4882a593Smuzhiyun 		const uint8_t *data = object_list[i].data;
1188*4882a593Smuzhiyun 		uint32_t data_len = *(object_list[i].data_len);
1189*4882a593Smuzhiyun 
1190*4882a593Smuzhiyun 		data     = data ? data : empty_data;
1191*4882a593Smuzhiyun 		data_len = data ? data_len : empty_data_len;
1192*4882a593Smuzhiyun 
1193*4882a593Smuzhiyun 		res = asn1_set_object(data, data_len,
1194*4882a593Smuzhiyun 				      object_list[i].tag,
1195*4882a593Smuzhiyun 				      object_list[i].need_plus,
1196*4882a593Smuzhiyun 				      asn1_key + total_len, out_max, &tmp_len);
1197*4882a593Smuzhiyun 		if (res != RK_CRYPTO_SUCCESS) {
1198*4882a593Smuzhiyun 			D_TRACE("set %d object error!", i);
1199*4882a593Smuzhiyun 			goto exit;
1200*4882a593Smuzhiyun 		}
1201*4882a593Smuzhiyun 
1202*4882a593Smuzhiyun 		total_len += tmp_len;
1203*4882a593Smuzhiyun 		out_max   -= tmp_len;
1204*4882a593Smuzhiyun 	}
1205*4882a593Smuzhiyun 
1206*4882a593Smuzhiyun 	res = asn1_compose_len(total_len, tmp_field, &tmp_len);
1207*4882a593Smuzhiyun 	if (res != RK_CRYPTO_SUCCESS) {
1208*4882a593Smuzhiyun 		D_TRACE("set asn1_compose_len error!");
1209*4882a593Smuzhiyun 		goto exit;
1210*4882a593Smuzhiyun 	}
1211*4882a593Smuzhiyun 
1212*4882a593Smuzhiyun 	if (out_max < tmp_len + 1) {
1213*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
1214*4882a593Smuzhiyun 		goto exit;
1215*4882a593Smuzhiyun 	}
1216*4882a593Smuzhiyun 
1217*4882a593Smuzhiyun 	memmove(asn1_key + tmp_len + 1, asn1_key, total_len);
1218*4882a593Smuzhiyun 	*asn1_key = ASN1_SEQUENCE;
1219*4882a593Smuzhiyun 	total_len++;
1220*4882a593Smuzhiyun 	memmove(asn1_key + 1, tmp_field, tmp_len);
1221*4882a593Smuzhiyun 	total_len += tmp_len;
1222*4882a593Smuzhiyun 
1223*4882a593Smuzhiyun 	*asn1_key_len = total_len;
1224*4882a593Smuzhiyun 	*key_bits = rsa_key->n_len * 8;
1225*4882a593Smuzhiyun exit:
1226*4882a593Smuzhiyun 	if (empty_data)
1227*4882a593Smuzhiyun 		free(empty_data);
1228*4882a593Smuzhiyun 
1229*4882a593Smuzhiyun 	return res;
1230*4882a593Smuzhiyun }
1231*4882a593Smuzhiyun 
rk_rsa_crypt_do_padding(enum RK_RSA_CRYPT_PADDING padding,uint16_t key_len,bool is_priv_key,const uint8_t * data,uint32_t data_len,uint8_t * pad,uint32_t * pad_len)1232*4882a593Smuzhiyun RK_RES rk_rsa_crypt_do_padding(enum RK_RSA_CRYPT_PADDING padding,
1233*4882a593Smuzhiyun 			       uint16_t key_len, bool is_priv_key,
1234*4882a593Smuzhiyun 			       const uint8_t *data, uint32_t data_len,
1235*4882a593Smuzhiyun 			       uint8_t *pad, uint32_t *pad_len)
1236*4882a593Smuzhiyun {
1237*4882a593Smuzhiyun 	RK_RES res = RK_CRYPTO_SUCCESS;
1238*4882a593Smuzhiyun 
1239*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(key_len * 8 != RSA_BITS_1024 &&
1240*4882a593Smuzhiyun 			      key_len * 8 != RSA_BITS_2048 &&
1241*4882a593Smuzhiyun 			      key_len * 8 != RSA_BITS_3072 &&
1242*4882a593Smuzhiyun 			      key_len * 8 != RSA_BITS_4096);
1243*4882a593Smuzhiyun 
1244*4882a593Smuzhiyun 	switch (padding) {
1245*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_NONE:
1246*4882a593Smuzhiyun 		if (data_len != key_len) {
1247*4882a593Smuzhiyun 			D_TRACE("length not match %u != %u", data_len, key_len);
1248*4882a593Smuzhiyun 			return RK_CRYPTO_ERR_PARAMETER;
1249*4882a593Smuzhiyun 		}
1250*4882a593Smuzhiyun 
1251*4882a593Smuzhiyun 		memcpy(pad, data, data_len);
1252*4882a593Smuzhiyun 		break;
1253*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_0:
1254*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_1:
1255*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_2: {
1256*4882a593Smuzhiyun 		uint8_t bt = (uint8_t)(padding - RK_RSA_CRYPT_PADDING_BLOCK_TYPE_0);
1257*4882a593Smuzhiyun 
1258*4882a593Smuzhiyun 		res = rsa_padding_add_pkcs1_type(key_len, bt, data, data_len, pad);
1259*4882a593Smuzhiyun 		break;
1260*4882a593Smuzhiyun 	}
1261*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA1:
1262*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA224:
1263*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA256:
1264*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA384:
1265*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA512:
1266*4882a593Smuzhiyun 		res = rsa_padding_add_oaep_type(padding, key_len, NULL, 0, data, data_len, pad);
1267*4882a593Smuzhiyun 		break;
1268*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_PKCS1_V1_5:
1269*4882a593Smuzhiyun 		res = rsa_padding_add_pkcs15_type(key_len, is_priv_key, data, data_len, pad);
1270*4882a593Smuzhiyun 		break;
1271*4882a593Smuzhiyun 	default:
1272*4882a593Smuzhiyun 		D_TRACE("unknown padding %d", padding);
1273*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PARAMETER;
1274*4882a593Smuzhiyun 		break;
1275*4882a593Smuzhiyun 	}
1276*4882a593Smuzhiyun 
1277*4882a593Smuzhiyun 	*pad_len = key_len;
1278*4882a593Smuzhiyun 
1279*4882a593Smuzhiyun 	return res;
1280*4882a593Smuzhiyun }
1281*4882a593Smuzhiyun 
rk_rsa_crypt_undo_padding(enum RK_RSA_CRYPT_PADDING padding,uint16_t key_len,bool is_priv_key,const uint8_t * pad,uint32_t pad_len,uint8_t * data,uint32_t * data_len)1282*4882a593Smuzhiyun RK_RES rk_rsa_crypt_undo_padding(enum RK_RSA_CRYPT_PADDING padding,
1283*4882a593Smuzhiyun 				 uint16_t key_len, bool is_priv_key,
1284*4882a593Smuzhiyun 				 const uint8_t *pad, uint32_t pad_len,
1285*4882a593Smuzhiyun 				 uint8_t *data, uint32_t *data_len)
1286*4882a593Smuzhiyun {
1287*4882a593Smuzhiyun 	RK_RES res = RK_CRYPTO_SUCCESS;
1288*4882a593Smuzhiyun 
1289*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(key_len * 8 != RSA_BITS_1024 &&
1290*4882a593Smuzhiyun 			      key_len * 8 != RSA_BITS_2048 &&
1291*4882a593Smuzhiyun 			      key_len * 8 != RSA_BITS_3072 &&
1292*4882a593Smuzhiyun 			      key_len * 8 != RSA_BITS_4096);
1293*4882a593Smuzhiyun 	RK_CRYPTO_CHECK_PARAM(key_len != pad_len);
1294*4882a593Smuzhiyun 
1295*4882a593Smuzhiyun 	switch (padding) {
1296*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_NONE:
1297*4882a593Smuzhiyun 		if (pad_len != key_len) {
1298*4882a593Smuzhiyun 			D_TRACE("length not match %u != %u", pad_len, key_len);
1299*4882a593Smuzhiyun 			return RK_CRYPTO_ERR_PARAMETER;
1300*4882a593Smuzhiyun 		}
1301*4882a593Smuzhiyun 
1302*4882a593Smuzhiyun 		memcpy(data, pad, pad_len);
1303*4882a593Smuzhiyun 		*data_len = key_len;
1304*4882a593Smuzhiyun 		break;
1305*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_0:
1306*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_1:
1307*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_BLOCK_TYPE_2: {
1308*4882a593Smuzhiyun 		uint8_t bt = (uint8_t)(padding - RK_RSA_CRYPT_PADDING_BLOCK_TYPE_0);
1309*4882a593Smuzhiyun 
1310*4882a593Smuzhiyun 		res = rsa_padding_check_pkcs1_type(key_len, bt, pad, data, data_len);
1311*4882a593Smuzhiyun 		break;
1312*4882a593Smuzhiyun 	}
1313*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA1:
1314*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA224:
1315*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA256:
1316*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA384:
1317*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_OAEP_SHA512:
1318*4882a593Smuzhiyun 		res = rsa_padding_check_oaep_type(padding,  key_len, NULL, 0, pad, data, data_len);
1319*4882a593Smuzhiyun 		break;
1320*4882a593Smuzhiyun 	case RK_RSA_CRYPT_PADDING_PKCS1_V1_5:
1321*4882a593Smuzhiyun 		res = rsa_padding_check_pkcs15_type(key_len, is_priv_key, pad, data, data_len);
1322*4882a593Smuzhiyun 		break;
1323*4882a593Smuzhiyun 	default:
1324*4882a593Smuzhiyun 		D_TRACE("unknown padding %d", padding);
1325*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PARAMETER;
1326*4882a593Smuzhiyun 		break;
1327*4882a593Smuzhiyun 	}
1328*4882a593Smuzhiyun 
1329*4882a593Smuzhiyun 	return res;
1330*4882a593Smuzhiyun }
1331*4882a593Smuzhiyun 
rk_rsa_sign_do_padding(enum RK_RSA_SIGN_PADDING padding,uint16_t key_len,uint16_t n_bits,const uint8_t * data,uint32_t data_len,const uint8_t * hash,uint8_t * pad,uint32_t * pad_len)1332*4882a593Smuzhiyun RK_RES rk_rsa_sign_do_padding(enum RK_RSA_SIGN_PADDING padding, uint16_t key_len, uint16_t n_bits,
1333*4882a593Smuzhiyun 			      const uint8_t *data, uint32_t data_len, const uint8_t *hash,
1334*4882a593Smuzhiyun 			      uint8_t *pad, uint32_t *pad_len)
1335*4882a593Smuzhiyun {
1336*4882a593Smuzhiyun 	RK_RES res = RK_CRYPTO_SUCCESS;
1337*4882a593Smuzhiyun 	uint32_t hash_len, hash_algo;
1338*4882a593Smuzhiyun 	uint8_t tmp_hash[SHA512_HASH_SIZE];
1339*4882a593Smuzhiyun 
1340*4882a593Smuzhiyun 	res = get_hash_algo_from_padding(padding, &hash_len, &hash_algo);
1341*4882a593Smuzhiyun 	if (res)
1342*4882a593Smuzhiyun 		return res;
1343*4882a593Smuzhiyun 
1344*4882a593Smuzhiyun 	memset(tmp_hash, 0x00, sizeof(tmp_hash));
1345*4882a593Smuzhiyun 
1346*4882a593Smuzhiyun 	if (hash) {
1347*4882a593Smuzhiyun 		memcpy(tmp_hash, hash, hash_len);
1348*4882a593Smuzhiyun 	} else {
1349*4882a593Smuzhiyun 		res = calc_padding_digest(hash_algo, data, data_len, tmp_hash);
1350*4882a593Smuzhiyun 		if (res)
1351*4882a593Smuzhiyun 			return res;
1352*4882a593Smuzhiyun 	}
1353*4882a593Smuzhiyun 
1354*4882a593Smuzhiyun 	switch (padding) {
1355*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA1:
1356*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA224:
1357*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA256:
1358*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA384:
1359*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA512:
1360*4882a593Smuzhiyun 		res = rsa_padding_add_pkcs15_sign_type(hash_algo, key_len, tmp_hash, hash_len, pad);
1361*4882a593Smuzhiyun 		break;
1362*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA1:
1363*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA224:
1364*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA256:
1365*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA384:
1366*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA512:
1367*4882a593Smuzhiyun 		res = rsa_padding_add_pss_type(key_len, n_bits, hash_algo, tmp_hash, hash_len, pad);
1368*4882a593Smuzhiyun 		break;
1369*4882a593Smuzhiyun 	default:
1370*4882a593Smuzhiyun 		D_TRACE("unknown padding %d", padding);
1371*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PARAMETER;
1372*4882a593Smuzhiyun 		break;
1373*4882a593Smuzhiyun 	}
1374*4882a593Smuzhiyun 
1375*4882a593Smuzhiyun 	*pad_len = key_len;
1376*4882a593Smuzhiyun 
1377*4882a593Smuzhiyun 	return res;
1378*4882a593Smuzhiyun }
1379*4882a593Smuzhiyun 
rk_rsa_sign_undo_padding(enum RK_RSA_SIGN_PADDING padding,uint16_t key_len,uint16_t n_bits,const uint8_t * data,uint32_t data_len,const uint8_t * hash,const uint8_t * dec)1380*4882a593Smuzhiyun RK_RES rk_rsa_sign_undo_padding(enum RK_RSA_SIGN_PADDING padding, uint16_t key_len, uint16_t n_bits,
1381*4882a593Smuzhiyun 				const uint8_t *data, uint32_t data_len,
1382*4882a593Smuzhiyun 				const uint8_t *hash, const uint8_t *dec)
1383*4882a593Smuzhiyun {
1384*4882a593Smuzhiyun 	RK_RES res = RK_CRYPTO_SUCCESS;
1385*4882a593Smuzhiyun 	uint32_t hash_len, hash_algo;
1386*4882a593Smuzhiyun 	uint8_t tmp_hash[SHA512_HASH_SIZE];
1387*4882a593Smuzhiyun 	uint8_t *pad = NULL;
1388*4882a593Smuzhiyun 
1389*4882a593Smuzhiyun 	res = get_hash_algo_from_padding(padding, &hash_len, &hash_algo);
1390*4882a593Smuzhiyun 	if (res)
1391*4882a593Smuzhiyun 		return res;
1392*4882a593Smuzhiyun 
1393*4882a593Smuzhiyun 	memset(tmp_hash, 0x00, sizeof(tmp_hash));
1394*4882a593Smuzhiyun 
1395*4882a593Smuzhiyun 	if (hash) {
1396*4882a593Smuzhiyun 		memcpy(tmp_hash, hash, hash_len);
1397*4882a593Smuzhiyun 	} else {
1398*4882a593Smuzhiyun 		res = calc_padding_digest(hash_algo, data, data_len, tmp_hash);
1399*4882a593Smuzhiyun 		if (res)
1400*4882a593Smuzhiyun 			goto exit;
1401*4882a593Smuzhiyun 	}
1402*4882a593Smuzhiyun 
1403*4882a593Smuzhiyun 	pad = malloc(key_len);
1404*4882a593Smuzhiyun 	if (!pad)
1405*4882a593Smuzhiyun 		return RK_CRYPTO_ERR_OUT_OF_MEMORY;
1406*4882a593Smuzhiyun 
1407*4882a593Smuzhiyun 	switch (padding) {
1408*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA1:
1409*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA224:
1410*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA256:
1411*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA384:
1412*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_V15_SHA512:
1413*4882a593Smuzhiyun 		res = rsa_padding_add_pkcs15_sign_type(hash_algo, key_len, tmp_hash, hash_len, pad);
1414*4882a593Smuzhiyun 		if (res) {
1415*4882a593Smuzhiyun 			D_TRACE("check pkcs V1.5 error.");
1416*4882a593Smuzhiyun 			goto exit;
1417*4882a593Smuzhiyun 		}
1418*4882a593Smuzhiyun 
1419*4882a593Smuzhiyun 		if (memcmp(pad, dec, key_len))
1420*4882a593Smuzhiyun 			res = RK_CRYPTO_ERR_VERIFY;
1421*4882a593Smuzhiyun 
1422*4882a593Smuzhiyun 		break;
1423*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA1:
1424*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA224:
1425*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA256:
1426*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA384:
1427*4882a593Smuzhiyun 	case RK_RSA_SIGN_PADDING_PKCS1_PSS_SHA512:
1428*4882a593Smuzhiyun 		res = rk_rsa_padding_check_pss_type(key_len, n_bits, hash_algo,
1429*4882a593Smuzhiyun 						    hash_len, tmp_hash, dec);
1430*4882a593Smuzhiyun 		break;
1431*4882a593Smuzhiyun 	default:
1432*4882a593Smuzhiyun 		D_TRACE("unknown padding %d", padding);
1433*4882a593Smuzhiyun 		res = RK_CRYPTO_ERR_PARAMETER;
1434*4882a593Smuzhiyun 		break;
1435*4882a593Smuzhiyun 	}
1436*4882a593Smuzhiyun 
1437*4882a593Smuzhiyun exit:
1438*4882a593Smuzhiyun 	if (pad)
1439*4882a593Smuzhiyun 		free(pad);
1440*4882a593Smuzhiyun 
1441*4882a593Smuzhiyun 	return res;
1442*4882a593Smuzhiyun }
1443*4882a593Smuzhiyun 
1444