You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							294 lines
						
					
					
						
							10 KiB
						
					
					
				
			
		
		
	
	
							294 lines
						
					
					
						
							10 KiB
						
					
					
				/* rsa.c
 | 
						|
**
 | 
						|
** Copyright 2012, The Android Open Source Project
 | 
						|
**
 | 
						|
** Redistribution and use in source and binary forms, with or without
 | 
						|
** modification, are permitted provided that the following conditions are met:
 | 
						|
**     * Redistributions of source code must retain the above copyright
 | 
						|
**       notice, this list of conditions and the following disclaimer.
 | 
						|
**     * Redistributions in binary form must reproduce the above copyright
 | 
						|
**       notice, this list of conditions and the following disclaimer in the
 | 
						|
**       documentation and/or other materials provided with the distribution.
 | 
						|
**     * Neither the name of Google Inc. nor the names of its contributors may
 | 
						|
**       be used to endorse or promote products derived from this software
 | 
						|
**       without specific prior written permission.
 | 
						|
**
 | 
						|
** THIS SOFTWARE IS PROVIDED BY Google Inc. ``AS IS'' AND ANY EXPRESS OR
 | 
						|
** IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 | 
						|
** MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
 | 
						|
** EVENT SHALL Google Inc. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
						|
** SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
 | 
						|
** PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
 | 
						|
** OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
 | 
						|
** WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
 | 
						|
** OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
 | 
						|
** ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
						|
*/
 | 
						|
 | 
						|
#include "rsa.h"
 | 
						|
#include "sha.h"
 | 
						|
 | 
						|
// a[] -= mod
 | 
						|
static void subM(const RSAPublicKey* key,
 | 
						|
                 uint32_t* a) {
 | 
						|
    int64_t A = 0;
 | 
						|
    int i;
 | 
						|
    for (i = 0; i < key->len; ++i) {
 | 
						|
        A += (uint64_t)a[i] - key->n[i];
 | 
						|
        a[i] = (uint32_t)A;
 | 
						|
        A >>= 32;
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
// return a[] >= mod
 | 
						|
static int geM(const RSAPublicKey* key,
 | 
						|
               const uint32_t* a) {
 | 
						|
    int i;
 | 
						|
    for (i = key->len; i;) {
 | 
						|
        --i;
 | 
						|
        if (a[i] < key->n[i]) return 0;
 | 
						|
        if (a[i] > key->n[i]) return 1;
 | 
						|
    }
 | 
						|
    return 1;  // equal
 | 
						|
}
 | 
						|
 | 
						|
// montgomery c[] += a * b[] / R % mod
 | 
						|
static void montMulAdd(const RSAPublicKey* key,
 | 
						|
                       uint32_t* c,
 | 
						|
                       const uint32_t a,
 | 
						|
                       const uint32_t* b) {
 | 
						|
    uint64_t A = (uint64_t)a * b[0] + c[0];
 | 
						|
    uint32_t d0 = (uint32_t)A * key->n0inv;
 | 
						|
    uint64_t B = (uint64_t)d0 * key->n[0] + (uint32_t)A;
 | 
						|
    int i;
 | 
						|
 | 
						|
    for (i = 1; i < key->len; ++i) {
 | 
						|
        A = (A >> 32) + (uint64_t)a * b[i] + c[i];
 | 
						|
        B = (B >> 32) + (uint64_t)d0 * key->n[i] + (uint32_t)A;
 | 
						|
        c[i - 1] = (uint32_t)B;
 | 
						|
    }
 | 
						|
 | 
						|
    A = (A >> 32) + (B >> 32);
 | 
						|
 | 
						|
    c[i - 1] = (uint32_t)A;
 | 
						|
 | 
						|
    if (A >> 32) {
 | 
						|
        subM(key, c);
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
// montgomery c[] = a[] * b[] / R % mod
 | 
						|
static void montMul(const RSAPublicKey* key,
 | 
						|
                    uint32_t* c,
 | 
						|
                    const uint32_t* a,
 | 
						|
                    const uint32_t* b) {
 | 
						|
    int i;
 | 
						|
    for (i = 0; i < key->len; ++i) {
 | 
						|
        c[i] = 0;
 | 
						|
    }
 | 
						|
    for (i = 0; i < key->len; ++i) {
 | 
						|
        montMulAdd(key, c, a[i], b);
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
// In-place public exponentiation.
 | 
						|
// Input and output big-endian byte array in inout.
 | 
						|
static void modpow(const RSAPublicKey* key,
 | 
						|
                   uint8_t* inout) {
 | 
						|
    uint32_t a[RSANUMWORDS];
 | 
						|
    uint32_t aR[RSANUMWORDS];
 | 
						|
    uint32_t aaR[RSANUMWORDS];
 | 
						|
    uint32_t* aaa = 0;
 | 
						|
    int i;
 | 
						|
 | 
						|
    // Convert from big endian byte array to little endian word array.
 | 
						|
    for (i = 0; i < key->len; ++i) {
 | 
						|
        uint32_t tmp =
 | 
						|
            (inout[((key->len - 1 - i) * 4) + 0] << 24) |
 | 
						|
            (inout[((key->len - 1 - i) * 4) + 1] << 16) |
 | 
						|
            (inout[((key->len - 1 - i) * 4) + 2] << 8) |
 | 
						|
            (inout[((key->len - 1 - i) * 4) + 3] << 0);
 | 
						|
        a[i] = tmp;
 | 
						|
    }
 | 
						|
 | 
						|
    if (key->exponent == 65537) {
 | 
						|
        aaa = aaR;  // Re-use location.
 | 
						|
        montMul(key, aR, a, key->rr);  // aR = a * RR / R mod M
 | 
						|
        for (i = 0; i < 16; i += 2) {
 | 
						|
            montMul(key, aaR, aR, aR);  // aaR = aR * aR / R mod M
 | 
						|
            montMul(key, aR, aaR, aaR);  // aR = aaR * aaR / R mod M
 | 
						|
        }
 | 
						|
        montMul(key, aaa, aR, a);  // aaa = aR * a / R mod M
 | 
						|
    } else if (key->exponent == 3) {
 | 
						|
        aaa = aR;  // Re-use location.
 | 
						|
        montMul(key, aR, a, key->rr);  /* aR = a * RR / R mod M   */
 | 
						|
        montMul(key, aaR, aR, aR);     /* aaR = aR * aR / R mod M */
 | 
						|
        montMul(key, aaa, aaR, a);     /* aaa = aaR * a / R mod M */
 | 
						|
    }
 | 
						|
 | 
						|
    // Make sure aaa < mod; aaa is at most 1x mod too large.
 | 
						|
    if (geM(key, aaa)) {
 | 
						|
        subM(key, aaa);
 | 
						|
    }
 | 
						|
 | 
						|
    // Convert to bigendian byte array
 | 
						|
    for (i = key->len - 1; i >= 0; --i) {
 | 
						|
        uint32_t tmp = aaa[i];
 | 
						|
        *inout++ = tmp >> 24;
 | 
						|
        *inout++ = tmp >> 16;
 | 
						|
        *inout++ = tmp >> 8;
 | 
						|
        *inout++ = tmp >> 0;
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
// Expected PKCS1.5 signature padding bytes, for a keytool RSA signature.
 | 
						|
// Has the 0-length optional parameter encoded in the ASN1 (as opposed to the
 | 
						|
// other flavor which omits the optional parameter entirely). This code does not
 | 
						|
// accept signatures without the optional parameter.
 | 
						|
 | 
						|
/*
 | 
						|
static const uint8_t sha_padding[RSANUMBYTES] = {
 | 
						|
    0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0x00, 0x30, 0x21, 0x30,
 | 
						|
    0x09, 0x06, 0x05, 0x2b, 0x0e, 0x03, 0x02, 0x1a,
 | 
						|
    0x05, 0x00, 0x04, 0x14,
 | 
						|
 | 
						|
    // 20 bytes of hash go here.
 | 
						|
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
 | 
						|
};
 | 
						|
*/
 | 
						|
 | 
						|
static const uint8_t sha_padding_1024[RSANUMBYTES] = {
 | 
						|
    0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
 | 
						|
    0xff, 0xff, 0xff, 0x00,
 | 
						|
 | 
						|
    // 20 bytes of hash go here.
 | 
						|
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
 | 
						|
};
 | 
						|
 | 
						|
// SHA-1 of PKCS1.5 signature sha_padding for 2048 bit, as above.
 | 
						|
// At the location of the bytes of the hash all 00 are hashed.
 | 
						|
/*static const uint8_t kExpectedPadShaRsa2048[SHA_DIGEST_SIZE] = {
 | 
						|
    0xdc, 0xbd, 0xbe, 0x42, 0xd5, 0xf5, 0xa7, 0x2e,
 | 
						|
    0x6e, 0xfc, 0xf5, 0x5d, 0xaf, 0x9d, 0xea, 0x68,
 | 
						|
    0x7c, 0xfb, 0xf1, 0x67
 | 
						|
};*/
 | 
						|
 | 
						|
// Verify a 2048-bit RSA PKCS1.5 signature against an expected hash.
 | 
						|
// Both e=3 and e=65537 are supported.  hash_len may be
 | 
						|
// SHA_DIGEST_SIZE (== 20) to indicate a SHA-1 hash, or
 | 
						|
// SHA256_DIGEST_SIZE (== 32) to indicate a SHA-256 hash.  No other
 | 
						|
// values are supported.
 | 
						|
//
 | 
						|
// Returns 1 on successful verification, 0 on failure.
 | 
						|
int RSA_verify(const RSAPublicKey *key,
 | 
						|
               const uint8_t *signature,
 | 
						|
               const int len,
 | 
						|
               const uint8_t *hash,
 | 
						|
               const int hash_len) {
 | 
						|
    uint8_t buf[RSANUMBYTES];
 | 
						|
    int i;
 | 
						|
    //const uint8_t* padding_hash;
 | 
						|
 | 
						|
    if (key->len != RSANUMWORDS) {
 | 
						|
        return 0;  // Wrong key passed in.
 | 
						|
    }
 | 
						|
 | 
						|
    if (len != sizeof(buf)) {
 | 
						|
        return 0;  // Wrong input length.
 | 
						|
    }
 | 
						|
 | 
						|
    if (hash_len != SHA_DIGEST_SIZE) {
 | 
						|
        return 0;  // Unsupported hash.
 | 
						|
    }
 | 
						|
 | 
						|
    if (key->exponent != 3 && key->exponent != 65537) {
 | 
						|
        return 0;  // Unsupported exponent.
 | 
						|
    }
 | 
						|
 | 
						|
    for (i = 0; i < len; ++i) {  // Copy input to local workspace.
 | 
						|
        buf[i] = signature[i];
 | 
						|
    }
 | 
						|
 | 
						|
    modpow(key, buf);  // In-place exponentiation.
 | 
						|
 | 
						|
#ifdef TEST_RSA
 | 
						|
    printf("sig\n");
 | 
						|
    for (i=0;i<len;i++) { if(i!=0 && i%0x10 == 0) printf("\n"); printf("%02X ", signature[i]); } printf("\n");
 | 
						|
    printf("hash\n");
 | 
						|
    for (i=0;i<hash_len;i++) { if(i!=0 && i%0x10 == 0) printf("\n"); printf("%02X ", hash[i]); } printf("\n");
 | 
						|
    printf("out\n");
 | 
						|
    for (i=0;i<RSANUMBYTES;i++) { if(i!=0 && i%0x10 == 0) printf("\n"); printf("%02X ", buf[i]); } printf("\n");
 | 
						|
    printf("target\n");
 | 
						|
    for (i=0;i<RSANUMBYTES;i++) { if(i!=0 && i%0x10 == 0) printf("\n"); printf("%02X ", sha_padding_1024[i]); } printf("\n");
 | 
						|
#endif
 | 
						|
 | 
						|
    // Xor sha portion, so it all becomes 00 iff equal.
 | 
						|
    for (i = len - hash_len; i < len; ++i) {
 | 
						|
        buf[i] ^= *hash++;
 | 
						|
    }
 | 
						|
 | 
						|
    // Hash resulting buf, in-place.
 | 
						|
    /*switch (hash_len) {
 | 
						|
        case SHA_DIGEST_SIZE:
 | 
						|
            padding_hash = kExpectedPadShaRsa2048;
 | 
						|
            SHA_hash(buf, len, buf);
 | 
						|
            break;
 | 
						|
        default:
 | 
						|
            return 0;
 | 
						|
    }
 | 
						|
 | 
						|
 | 
						|
    // Compare against expected hash value.
 | 
						|
    for (i = 0; i < hash_len; ++i) {
 | 
						|
        if (buf[i] != padding_hash[i]) {
 | 
						|
            return 0;
 | 
						|
        }
 | 
						|
    }*/
 | 
						|
 | 
						|
    for (i = 0; i < RSANUMBYTES; ++i) {
 | 
						|
        if (buf[i] != sha_padding_1024[i]) {
 | 
						|
            return 0;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    return 1;  // All checked out OK.
 | 
						|
}
 | 
						|
 |