summaryrefslogtreecommitdiffstats
path: root/libtomcrypt/pk/pkcs1/pkcs_1_v1_5_encode.c
blob: 0261b7b3067c7395f145e2654ef9cea72e6b3169 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
/* LibTomCrypt, modular cryptographic library -- Tom St Denis
 *
 * LibTomCrypt is a library that provides various cryptographic
 * algorithms in a highly modular and flexible manner.
 *
 * The library is free for all purposes without any express
 * guarantee it works.
 *
 * Tom St Denis, tomstdenis@gmail.com, http://libtom.org
 */
#include "tomcrypt.h"

/*! \file pkcs_1_v1_5_encode.c
 *
 *  LTC_PKCS #1 v1.5 Padding (Andreas Lange)
 */

#ifdef LTC_PKCS_1

/*! \brief LTC_PKCS #1 v1.5 encode.
 *
 *  \param msg              The data to encode
 *  \param msglen           The length of the data to encode (octets)
 *  \param block_type       Block type to use in padding (\sa ltc_pkcs_1_v1_5_blocks)
 *  \param modulus_bitlen   The bit length of the RSA modulus
 *  \param out              [out] The destination for the encoded data
 *  \param outlen           [in/out] The max size and resulting size of the encoded data
 *
 *  \return CRYPT_OK if successful
 */
int pkcs_1_v1_5_encode(const unsigned char *msg,
		       unsigned long msglen,
		       int block_type,
		       unsigned long modulus_bitlen,
		       unsigned char *out, unsigned long *outlen)
{
	unsigned long modulus_len, ps_len, i;
	unsigned char *ps;
	int result;

	/* valid block_type? */
	if ((block_type != LTC_LTC_PKCS_1_EMSA) &&
	    (block_type != LTC_LTC_PKCS_1_EME)) {
		return CRYPT_PK_INVALID_PADDING;
	}

	modulus_len = (modulus_bitlen >> 3) + (modulus_bitlen & 7 ? 1 : 0);

	/* test message size */
	if ((msglen + 11) > modulus_len) {
		return CRYPT_PK_INVALID_SIZE;
	}

	if (*outlen < modulus_len) {
		*outlen = modulus_len;
		result = CRYPT_BUFFER_OVERFLOW;
		goto bail;
	}

	/* generate an octets string PS */
	ps = &out[2];
	ps_len = modulus_len - msglen - 3;

	if (block_type == LTC_LTC_PKCS_1_EME) {
		/* now choose a random ps */
		get_random_bytes(ps, ps_len);

		/* transform zero bytes (if any) to non-zero random bytes */
		for (i = 0; i < ps_len; i++) {
			while (ps[i] == 0) {
				get_random_bytes(&ps[i], 1);
			}
		}
	} else {
		XMEMSET(ps, 0xFF, ps_len);
	}

	/* create string of length modulus_len */
	out[0] = 0x00;
	out[1] = (unsigned char)block_type;	/* block_type 1 or 2 */
	out[2 + ps_len] = 0x00;
	XMEMCPY(&out[2 + ps_len + 1], msg, msglen);
	*outlen = modulus_len;

	result = CRYPT_OK;
bail:
	return result;
}				/* pkcs_1_v1_5_encode */

#endif /* #ifdef LTC_PKCS_1 */

/* $Source: /cvs/libtom/libtomcrypt/src/pk/pkcs1/pkcs_1_v1_5_encode.c,v $ */
/* $Revision: 1.4 $ */
/* $Date: 2007/05/12 14:32:35 $ */