You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

236 lines
5.1 KiB

#!/bin/bash
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
# Script to generate padding.c containing PKCS 1.5 padding byte arrays for
# various combinations of RSA key lengths and message digest algorithms.
Pad_Preamble="0x00,0x01"
SHA1_digestinfo="0x30,0x21,0x30,0x09,0x06,0x05,0x2b,0x0e,0x03,0x02,0x1a,0x05"\
",0x00,0x04,0x14"
SHA256_digestinfo="0x30,0x31,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03"\
",0x04,0x02,0x01,0x05,0x00,0x04,0x20"
SHA512_digestinfo="0x30,0x51,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03"\
",0x04,0x02,0x03,0x05,0x00,0x04,0x40"
RSA1024_Len=128
RSA2048_Len=256
RSA4096_Len=512
RSA8192_Len=1024
SHA1_T_Len=35
SHA256_T_Len=51
SHA512_T_Len=83
HashAlgos=( SHA1 SHA256 SHA512 )
RSAAlgos=( RSA1024 RSA2048 RSA4096 RSA8192 )
function genFFOctets {
count=$1
while [ $count -gt 0 ]; do
echo -n "0xff,"
let count=count-1
done
}
cat <<EOF
/*
* DO NOT MODIFY THIS FILE DIRECTLY.
*
* This file is automatically generated by genpadding.sh and contains padding
* arrays corresponding to various combinations of algorithms for RSA signatures.
*/
EOF
echo '#include "cryptolib.h"'
echo
echo
cat <<EOF
/*
* PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard)
*
* Depending on the RSA key size and hash function, the padding is calculated
* as follows:
*
* 0x00 || 0x01 || PS || 0x00 || T
*
* T: DER Encoded DigestInfo value which depends on the hash function used.
*
* SHA-1: (0x)30 21 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 || H.
* SHA-256: (0x)30 31 30 0d 06 09 60 86 48 01 65 03 04 02 01 05 00 04 20 || H.
* SHA-512: (0x)30 51 30 0d 06 09 60 86 48 01 65 03 04 02 03 05 00 04 40 || H.
*
* Length(T) = 35 octets for SHA-1
* Length(T) = 51 octets for SHA-256
* Length(T) = 83 octets for SHA-512
*
* PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
*
*/
EOF
echo
echo
# Generate padding arrays.
algorithmcounter=0
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo "/* Algorithm Type $algorithmcounter */"
let algorithmcounter=algorithmcounter+1
eval rsalen=${rsaalgo}_Len
eval hashlen=${hashalgo}_T_Len
let nums=rsalen-hashlen-3
echo "const uint8_t padding${rsaalgo}_${hashalgo}[${rsaalgo}NUMBYTES - ${hashalgo}_DIGEST_SIZE] = {"
echo -n $Pad_Preamble,
genFFOctets $nums
echo -n "0x00,"
eval digestinfo=\$${hashalgo}_digestinfo
echo $digestinfo
echo "};"
echo
done
done
echo "const int kNumAlgorithms = $algorithmcounter;";
echo "#define NUMALGORITHMS $algorithmcounter"
echo
# Output DigestInfo field lengths.
cat <<EOF
#define SHA1_DIGESTINFO_LEN 15
#define SHA256_DIGESTINFO_LEN 19
#define SHA512_DIGESTINFO_LEN 19
EOF
# Generate DigestInfo arrays.
for hashalgo in ${HashAlgos[@]}
do
echo "const uint8_t ${hashalgo}_digestinfo[] = {"
eval digestinfo=\$${hashalgo}_digestinfo
echo $digestinfo
echo "};"
echo
done
# Generate DigestInfo to size map.
echo "const int digestinfo_size_map[] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo ${hashalgo}_DIGESTINFO_LEN,
done
done
echo "};"
echo
# Generate algorithm signature length map.
echo "const int siglen_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo ${rsaalgo}NUMBYTES,
done
done
echo "};"
echo
# Generate algorithm padding array map.
echo "const uint8_t* padding_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo padding${rsaalgo}_${hashalgo},
done
done
echo "};"
echo
# Generate algorithm padding size map.
echo "const int padding_size_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo ${rsaalgo}NUMBYTES - ${hashalgo}_DIGEST_SIZE,
done
done
echo "};"
echo
# Generate signature algorithm to messge digest algorithm map.
echo "const int hash_type_map[] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo ${hashalgo}_DIGEST_ALGORITHM,
done
done
echo "};"
echo
# Generate algorithm to message digest's output size map.
echo "const int hash_size_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo ${hashalgo}_DIGEST_SIZE,
done
done
echo "};"
echo
# Generate algorithm to message digest's input block size map.
echo "const int hash_blocksize_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo ${hashalgo}_BLOCK_SIZE,
done
done
echo "};"
echo
# Generate algorithm to message's digest ASN.1 DigestInfo map.
echo "const uint8_t* hash_digestinfo_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo ${hashalgo}_digestinfo,
done
done
echo "};"
echo
# Generate algorithm description strings.
echo "const char* algo_strings[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
for hashalgo in ${HashAlgos[@]}
do
echo \"${rsaalgo} ${hashalgo}\",
done
done
echo "};"
echo
#echo "#endif /* VBOOT_REFERENCE_PADDING_H_ */"