rsa: Verify RSA padding programatically
Padding verification was done against static SHA/RSA pair arrays which take up a lot of static memory, are mostly 0xff, and cannot be reused for additional SHA/RSA pairings. The padding can be easily computed according to PKCS#1v2.1 as: EM = 0x00 || 0x01 || PS || 0x00 || T where PS is (emLen - tLen - 3) octets of 0xff and T is DER encoding of the hash. Store DER prefix in checksum_algo and create rsa_verify_padding function to handle verification of a message for any SHA/RSA pairing. Signed-off-by:Andrew Duda <aduda@meraki.com> Signed-off-by:
aduda <aduda@meraki.com> Reviewed-by:
Simon Glass <sjg@chromium.org>
Showing
- common/image-sig.c 6 additions, 3 deletionscommon/image-sig.c
- include/image.h 2 additions, 1 deletioninclude/image.h
- include/u-boot/rsa-checksum.h 0 additions, 4 deletionsinclude/u-boot/rsa-checksum.h
- include/u-boot/sha1.h 3 additions, 0 deletionsinclude/u-boot/sha1.h
- include/u-boot/sha256.h 3 additions, 0 deletionsinclude/u-boot/sha256.h
- lib/rsa/rsa-checksum.c 0 additions, 121 deletionslib/rsa/rsa-checksum.c
- lib/rsa/rsa-verify.c 36 additions, 2 deletionslib/rsa/rsa-verify.c
- lib/sha1.c 5 additions, 0 deletionslib/sha1.c
- lib/sha256.c 6 additions, 0 deletionslib/sha256.c
Loading
Please register or sign in to comment