mirror of
				https://git.proxmox.com/git/mirror_edk2
				synced 2025-11-04 03:57:26 +00:00 
			
		
		
		
	REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3314 This patch uses Openssl's EVP API's to perform RSASSA-PSS verification of a binary blob. Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jian J Wang <jian.j.wang@intel.com> Cc: Xiaoyu Lu <xiaoyux.lu@intel.com> Cc: Guomin Jiang <guomin.jiang@intel.com> Signed-off-by: Sachin Agrawal <sachin.agrawal@intel.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
		
			
				
	
	
		
			175 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			175 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/** @file
 | 
						|
  RSA PSS Asymmetric Cipher Wrapper Implementation over OpenSSL.
 | 
						|
 | 
						|
  This file implements following APIs which provide basic capabilities for RSA:
 | 
						|
  1) RsaPssSign
 | 
						|
 | 
						|
Copyright (c) 2021, Intel Corporation. All rights reserved.<BR>
 | 
						|
SPDX-License-Identifier: BSD-2-Clause-Patent
 | 
						|
 | 
						|
**/
 | 
						|
 | 
						|
#include "InternalCryptLib.h"
 | 
						|
 | 
						|
#include <openssl/bn.h>
 | 
						|
#include <openssl/rsa.h>
 | 
						|
#include <openssl/objects.h>
 | 
						|
#include <openssl/evp.h>
 | 
						|
 | 
						|
 | 
						|
/**
 | 
						|
  Retrieve a pointer to EVP message digest object.
 | 
						|
 | 
						|
  @param[in]  DigestLen   Length of the message digest.
 | 
						|
 | 
						|
**/
 | 
						|
STATIC
 | 
						|
const
 | 
						|
EVP_MD*
 | 
						|
GetEvpMD (
 | 
						|
  IN UINT16 DigestLen
 | 
						|
  )
 | 
						|
{
 | 
						|
  switch (DigestLen){
 | 
						|
    case SHA256_DIGEST_SIZE:
 | 
						|
      return EVP_sha256();
 | 
						|
      break;
 | 
						|
    case SHA384_DIGEST_SIZE:
 | 
						|
      return EVP_sha384();
 | 
						|
      break;
 | 
						|
    case SHA512_DIGEST_SIZE:
 | 
						|
      return EVP_sha512();
 | 
						|
      break;
 | 
						|
    default:
 | 
						|
      return NULL;
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/**
 | 
						|
  Carries out the RSA-SSA signature generation with EMSA-PSS encoding scheme.
 | 
						|
 | 
						|
  This function carries out the RSA-SSA signature generation with EMSA-PSS encoding scheme defined in
 | 
						|
  RFC 8017.
 | 
						|
  Mask generation function is the same as the message digest algorithm.
 | 
						|
  If the Signature buffer is too small to hold the contents of signature, FALSE
 | 
						|
  is returned and SigSize is set to the required buffer size to obtain the signature.
 | 
						|
 | 
						|
  If RsaContext is NULL, then return FALSE.
 | 
						|
  If Message is NULL, then return FALSE.
 | 
						|
  If MsgSize is zero or > INT_MAX, then return FALSE.
 | 
						|
  If DigestLen is NOT 32, 48 or 64, return FALSE.
 | 
						|
  If SaltLen is < DigestLen, then return FALSE.
 | 
						|
  If SigSize is large enough but Signature is NULL, then return FALSE.
 | 
						|
  If this interface is not supported, then return FALSE.
 | 
						|
 | 
						|
  @param[in]      RsaContext   Pointer to RSA context for signature generation.
 | 
						|
  @param[in]      Message      Pointer to octet message to be signed.
 | 
						|
  @param[in]      MsgSize      Size of the message in bytes.
 | 
						|
  @param[in]      DigestLen    Length of the digest in bytes to be used for RSA signature operation.
 | 
						|
  @param[in]      SaltLen      Length of the salt in bytes to be used for PSS encoding.
 | 
						|
  @param[out]     Signature    Pointer to buffer to receive RSA PSS signature.
 | 
						|
  @param[in, out] SigSize      On input, the size of Signature buffer in bytes.
 | 
						|
                               On output, the size of data returned in Signature buffer in bytes.
 | 
						|
 | 
						|
  @retval  TRUE   Signature successfully generated in RSASSA-PSS.
 | 
						|
  @retval  FALSE  Signature generation failed.
 | 
						|
  @retval  FALSE  SigSize is too small.
 | 
						|
  @retval  FALSE  This interface is not supported.
 | 
						|
 | 
						|
**/
 | 
						|
BOOLEAN
 | 
						|
EFIAPI
 | 
						|
RsaPssSign (
 | 
						|
  IN      VOID         *RsaContext,
 | 
						|
  IN      CONST UINT8  *Message,
 | 
						|
  IN      UINTN        MsgSize,
 | 
						|
  IN      UINT16       DigestLen,
 | 
						|
  IN      UINT16       SaltLen,
 | 
						|
  OUT     UINT8        *Signature,
 | 
						|
  IN OUT  UINTN        *SigSize
 | 
						|
  )
 | 
						|
{
 | 
						|
  BOOLEAN               Result;
 | 
						|
  UINTN                 RsaSigSize;
 | 
						|
  EVP_PKEY              *EvpRsaKey;
 | 
						|
  EVP_MD_CTX            *EvpVerifyCtx;
 | 
						|
  EVP_PKEY_CTX          *KeyCtx;
 | 
						|
  CONST EVP_MD          *HashAlg;
 | 
						|
 | 
						|
  EvpRsaKey = NULL;
 | 
						|
  EvpVerifyCtx = NULL;
 | 
						|
  KeyCtx = NULL;
 | 
						|
  HashAlg = NULL;
 | 
						|
 | 
						|
  if (RsaContext == NULL) {
 | 
						|
    return FALSE;
 | 
						|
  }
 | 
						|
  if (Message == NULL || MsgSize == 0 || MsgSize > INT_MAX) {
 | 
						|
    return FALSE;
 | 
						|
  }
 | 
						|
 | 
						|
  RsaSigSize = RSA_size (RsaContext);
 | 
						|
  if (*SigSize < RsaSigSize) {
 | 
						|
    *SigSize = RsaSigSize;
 | 
						|
    return FALSE;
 | 
						|
  }
 | 
						|
 | 
						|
  if (Signature == NULL) {
 | 
						|
    return FALSE;
 | 
						|
  }
 | 
						|
 | 
						|
  if (SaltLen < DigestLen) {
 | 
						|
    return FALSE;
 | 
						|
  }
 | 
						|
 | 
						|
  HashAlg = GetEvpMD(DigestLen);
 | 
						|
 | 
						|
  if (HashAlg == NULL) {
 | 
						|
    return FALSE;
 | 
						|
  }
 | 
						|
 | 
						|
  EvpRsaKey = EVP_PKEY_new();
 | 
						|
  if (EvpRsaKey == NULL) {
 | 
						|
    goto _Exit;
 | 
						|
  }
 | 
						|
 | 
						|
  EVP_PKEY_set1_RSA(EvpRsaKey, RsaContext);
 | 
						|
 | 
						|
  EvpVerifyCtx = EVP_MD_CTX_create();
 | 
						|
  if (EvpVerifyCtx == NULL) {
 | 
						|
    goto _Exit;
 | 
						|
  }
 | 
						|
 | 
						|
  Result = EVP_DigestSignInit(EvpVerifyCtx, &KeyCtx, HashAlg, NULL, EvpRsaKey) > 0;
 | 
						|
  if (KeyCtx == NULL) {
 | 
						|
    goto _Exit;
 | 
						|
  }
 | 
						|
 | 
						|
  if (Result) {
 | 
						|
    Result = EVP_PKEY_CTX_set_rsa_padding(KeyCtx, RSA_PKCS1_PSS_PADDING) > 0;
 | 
						|
  }
 | 
						|
  if (Result) {
 | 
						|
    Result = EVP_PKEY_CTX_set_rsa_pss_saltlen(KeyCtx, SaltLen) > 0;
 | 
						|
  }
 | 
						|
  if (Result) {
 | 
						|
    Result = EVP_PKEY_CTX_set_rsa_mgf1_md(KeyCtx, HashAlg) > 0;
 | 
						|
  }
 | 
						|
  if (Result) {
 | 
						|
    Result = EVP_DigestSignUpdate(EvpVerifyCtx, Message, (UINT32)MsgSize) > 0;
 | 
						|
  }
 | 
						|
  if (Result) {
 | 
						|
    Result = EVP_DigestSignFinal(EvpVerifyCtx, Signature, SigSize) > 0;
 | 
						|
  }
 | 
						|
 | 
						|
_Exit :
 | 
						|
  if (EvpRsaKey != NULL) {
 | 
						|
    EVP_PKEY_free(EvpRsaKey);
 | 
						|
  }
 | 
						|
  if (EvpVerifyCtx != NULL) {
 | 
						|
    EVP_MD_CTX_destroy(EvpVerifyCtx);
 | 
						|
  }
 | 
						|
 | 
						|
  return Result;
 | 
						|
}
 |