rsaes_oaep.c 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. /* rsa_oaep.c */
  2. /*
  3. This file is part of the ARM-Crypto-Lib.
  4. Copyright (C) 2006-2012 Daniel Otte (daniel.otte@rub.de)
  5. This program is free software: you can redistribute it and/or modify
  6. it under the terms of the GNU General Public License as published by
  7. the Free Software Foundation, either version 3 of the License, or
  8. (at your option) any later version.
  9. This program is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>.
  15. */
  16. #include <stdint.h>
  17. #include <stdlib.h>
  18. #include <string.h>
  19. #include <crypto/memxor.h>
  20. #include <crypto/mgf1.h>
  21. #include <crypto/bigint.h>
  22. #include <crypto/rsa_basic.h>
  23. #include <crypto/rsaes_oaep.h>
  24. #include <crypto/random_dummy.h>
  25. #include <crypto/hfal_sha1.h>
  26. #include "cli.h"
  27. #include "uart_lowlevel.h"
  28. mgf1_parameter_t mgf1_default_parameter = {
  29. &sha1_desc
  30. };
  31. rsa_oaep_parameter_t rsa_oaep_default_parameter = {
  32. mgf1,
  33. &sha1_desc,
  34. &mgf1_default_parameter
  35. };
  36. rsa_label_t rsa_oaep_default_label = {
  37. 0, NULL
  38. };
  39. uint8_t rsa_encrypt_oaep(void* dest, uint16_t* out_length,
  40. const void* src, uint16_t length_B,
  41. const rsa_publickey_t* key, const rsa_oaep_parameter_t *p,
  42. const rsa_label_t* label, const void* seed){
  43. if(!p){
  44. p = &rsa_oaep_default_parameter;
  45. }
  46. if(!label){
  47. label = &rsa_oaep_default_label;
  48. }
  49. uint16_t hv_len = (hfal_hash_getHashsize(p->hf)+7)/8;
  50. if(length_B > bigint_length_B(&key->modulus) - 2*hv_len - 2){
  51. /* message too long */
  52. return 1;
  53. }
  54. uint16_t buffer_len = bigint_length_B(&key->modulus);
  55. /*
  56. cli_putstr("\r\n buffer_len = ");
  57. cli_hexdump_rev(&buffer_len, 2);
  58. cli_putstr("\r\n modulus_len = ");
  59. cli_hexdump_rev(&key->modulus->length_W, 2);
  60. */
  61. uint8_t* buffer = (uint8_t*)dest;
  62. uint8_t off;
  63. /* the following needs some explanation:
  64. * off is the offset which is used for compensating the effect of
  65. * changeendian() when it operates on multi-byte words.
  66. * */
  67. off = (sizeof(bigint_word_t) -(bigint_get_first_set_bit(&key->modulus)/8+1)%(sizeof(bigint_word_t)*8))
  68. % (sizeof(bigint_word_t));
  69. buffer += off;
  70. buffer_len -= off;
  71. // cli_putstr("\r\n off = ");
  72. // cli_hexdump_byte(off);
  73. uint8_t* seed_buffer = buffer + 1;
  74. uint16_t db_len = buffer_len - hv_len - 1;
  75. uint8_t* db = seed_buffer + hv_len;
  76. uint16_t maskbuffer_len = db_len>hv_len?db_len:hv_len;
  77. uint8_t maskbuffer[maskbuffer_len];
  78. bigint_t x;
  79. memset(dest, 0, seed_buffer - buffer + off);
  80. memset(db + hv_len, 0, db_len - hv_len - length_B -1);
  81. hfal_hash_mem(p->hf, db, label->label, label->length_b);
  82. db[db_len - length_B - 1] = 0x01;
  83. memcpy(db+db_len - length_B, src, length_B);
  84. if(seed){
  85. memcpy(seed_buffer, seed, hv_len);
  86. }else{
  87. /* generate random seed */
  88. if(!prng_get_byte){
  89. return 2; /* ERROR: no random generator specified */
  90. }
  91. uint16_t i;
  92. for(i=0; i<hv_len; ++i){
  93. seed_buffer[i] = prng_get_byte();
  94. }
  95. }
  96. // cli_putstr("\r\n msg (raw, pre-feistel):\r\n");
  97. // cli_hexdump_block(dest, bigint_length_B(key->modulus), 4, 16);
  98. p->mgf(maskbuffer, seed_buffer, hv_len, db_len, p->mgf_parameter);
  99. memxor(db, maskbuffer, db_len);
  100. p->mgf(maskbuffer, db, db_len, hv_len, p->mgf_parameter);
  101. memxor(seed_buffer, maskbuffer, hv_len);
  102. // cli_putstr("\r\n msg (raw, post-feistel):\r\n");
  103. // cli_hexdump_block(dest, bigint_length_B(key->modulus), 4, 16);
  104. x.wordv = dest;
  105. bigint_adjust(&x);
  106. rsa_os2ip(&x, NULL, bigint_length_B(&key->modulus));
  107. rsa_enc(&x, key);
  108. rsa_i2osp(NULL, &x, out_length);
  109. return 0;
  110. }
  111. uint8_t rsa_decrypt_oaep(void* dest, uint16_t* out_length,
  112. const void* src, uint16_t length_B,
  113. const rsa_privatekey_t* key, const rsa_oaep_parameter_t *p,
  114. const rsa_label_t* label, void* seed){
  115. // cli_putstr("\r\n -->rsa_decrypt_oaep()"); uart_flush(0);
  116. if(!label){
  117. label = &rsa_oaep_default_label;
  118. }
  119. if(!p){
  120. p = &rsa_oaep_default_parameter;
  121. }
  122. uint16_t x_len, data_len;
  123. bigint_t x;
  124. uint16_t hv_len = hfal_hash_getHashsize(p->hf)/8;
  125. uint8_t label_hv[hv_len];
  126. uint16_t msg_len = bigint_get_first_set_bit(&key->modulus) / 8 + 1;
  127. uint16_t db_len = msg_len - hv_len - 1;
  128. uint8_t maskbuffer[db_len>hv_len?db_len:hv_len];
  129. uint8_t *seed_buffer = dest;
  130. uint8_t *db_buffer = seed_buffer + hv_len;
  131. x_len = bigint_get_first_set_bit(&key->modulus)/8;
  132. memset(dest, 0, bigint_length_B(&key->modulus) - length_B);
  133. memcpy((uint8_t*)dest + bigint_length_B(&key->modulus) - length_B, src, length_B);
  134. // cli_putc('a'); uart_flush(0);
  135. x.wordv = dest;
  136. x.length_W = key->modulus.length_W;
  137. x.info = 0;
  138. bigint_adjust(&x);
  139. // cli_putc('b'); uart_flush(0);
  140. rsa_os2ip(&x, NULL, bigint_length_B(&key->modulus));
  141. // cli_putc('c'); uart_flush(0);
  142. rsa_dec(&x, key);
  143. // cli_putc('d'); uart_flush(0);
  144. rsa_i2osp(NULL, &x, &data_len);
  145. // cli_putstr("\r\n msg (raw, pre-move):\r\n");
  146. // cli_hexdump_block(dest, bigint_length_B(key->modulus), 4, 16);
  147. if(data_len > x_len){
  148. return 7;
  149. }
  150. /*
  151. cli_putstr("\r\n moving some bytes; x_len = ");
  152. cli_hexdump_rev(&x_len, 2);
  153. cli_putstr(" data_len = ");
  154. cli_hexdump_rev(&data_len, 2);
  155. uart_flush(0);
  156. */
  157. if(x_len != data_len){
  158. memmove((uint8_t*)dest + x_len - data_len, dest, data_len);
  159. // cli_putstr(" (oh, not dead yet?!)");
  160. // uart_flush(0);
  161. memset(dest, 0, x_len - data_len);
  162. }
  163. hfal_hash_mem(p->hf, label_hv, label->label, label->length_b);
  164. /*
  165. cli_putstr("\r\n msg (raw, pre-feistel):\r\n");
  166. cli_hexdump_block(seed_buffer, bigint_length_B(key->modulus), 4, 16);
  167. uart_flush(0);
  168. */
  169. p->mgf(maskbuffer, db_buffer, db_len, hv_len, p->mgf_parameter);
  170. memxor(seed_buffer, maskbuffer, hv_len);
  171. p->mgf(maskbuffer, seed_buffer, hv_len, db_len, p->mgf_parameter);
  172. memxor(db_buffer, maskbuffer, db_len);
  173. if(memcmp(label_hv, db_buffer, hv_len)){
  174. // cli_putstr("\r\nDBG: DB:\r\n");
  175. // cli_hexdump_block(db_buffer, db_len, 4, 16);
  176. return 2;
  177. }
  178. uint16_t ps_len=0;
  179. while(db_buffer[hv_len + ps_len++] == 0)
  180. ;
  181. --ps_len;
  182. if(db_buffer[hv_len + ps_len] != 1){
  183. return 3;
  184. }
  185. if(seed){
  186. memcpy(seed, seed_buffer, hv_len);
  187. }
  188. msg_len = db_len - hv_len - 1 - ps_len;
  189. memmove(dest, db_buffer + hv_len + ps_len + 1, msg_len);
  190. *out_length = msg_len;
  191. return 0;
  192. }