tomcrypt/pkcs_1_v15_sa_encode.c
2010-06-16 12:38:13 +02:00

72 lines
1.9 KiB
C

/* LibTomCrypt, modular cryptographic library -- Tom St Denis
*
* LibTomCrypt is a library that provides various cryptographic
* algorithms in a highly modular and flexible manner.
*
* The library is free for all purposes without any express
* guarantee it works.
*
* Tom St Denis, tomstdenis@iahu.ca, http://libtomcrypt.org
*/
#include "mycrypt.h"
/* PKCS #1 v1.5 Signature Padding -- Tom St Denis */
#ifdef PKCS_1
int pkcs_1_v15_sa_encode(const unsigned char *msghash, unsigned long msghashlen,
int hash_idx, unsigned long modulus_bitlen,
unsigned char *out, unsigned long *outlen)
{
unsigned long derlen, modulus_bytelen, x, y;
int err;
_ARGCHK(msghash != NULL)
_ARGCHK(out != NULL);
_ARGCHK(outlen != NULL);
if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
return err;
}
/* hack, to detect any hash without a DER OID */
if (hash_descriptor[hash_idx].DERlen == 0) {
return CRYPT_INVALID_ARG;
}
/* get modulus len */
modulus_bytelen = (modulus_bitlen>>3) + (modulus_bitlen & 7 ? 1 : 0);
/* get der len ok? Forgive my lame German accent.... */
derlen = hash_descriptor[hash_idx].DERlen;
/* valid sizes? */
if (msghashlen + 3 + derlen > modulus_bytelen) {
return CRYPT_PK_INVALID_SIZE;
}
if (*outlen < modulus_bytelen) {
return CRYPT_BUFFER_OVERFLOW;
}
/* packet is 0x00 0x01 PS 0x00 T, where PS == 0xFF repeated modulus_bytelen - 3 - derlen - msghashlen times, T == DER || hash */
x = 0;
out[x++] = 0x00;
out[x++] = 0x01;
for (y = 0; y < (modulus_bytelen - 3 - derlen - msghashlen); y++) {
out[x++] = 0xFF;
}
out[x++] = 0x00;
for (y = 0; y < derlen; y++) {
out[x++] = hash_descriptor[hash_idx].DER[y];
}
for (y = 0; y < msghashlen; y++) {
out[x++] = msghash[y];
}
*outlen = modulus_bytelen;
return CRYPT_OK;
}
#endif /* PKCS_1 */