83 lines
3.0 KiB
C
83 lines
3.0 KiB
C
/*******************************************************************************
|
|
* Copyright 2019-2020 Intel Corporation
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*******************************************************************************/
|
|
|
|
#include "owncp.h"
|
|
#include "pcphash_rmf.h"
|
|
|
|
// Check all the ippsRSASign_PSS_rmf parameters and align pPrvKey, pPubKey pointers
|
|
__INLINE IppStatus SingleSignPssRmfPreproc(const Ipp8u* pMsg, int msgLen,
|
|
const Ipp8u* pSalt, int saltLen,
|
|
Ipp8u* pSign,
|
|
const IppsRSAPrivateKeyState** pPrvKey,
|
|
const IppsRSAPublicKeyState** pPubKey,
|
|
const IppsHashMethod* pMethod,
|
|
Ipp8u* pScratchBuffer)
|
|
{
|
|
/* test message length */
|
|
IPP_BADARG_RET((msgLen < 0), ippStsLengthErr);
|
|
/* test message pointer */
|
|
IPP_BADARG_RET((msgLen && !pMsg), ippStsNullPtrErr);
|
|
|
|
/* test data pointer */
|
|
IPP_BAD_PTR2_RET(pSign, pMethod);
|
|
|
|
/* test salt length and salt pointer */
|
|
IPP_BADARG_RET(saltLen < 0, ippStsLengthErr);
|
|
IPP_BADARG_RET((saltLen && !pSalt), ippStsNullPtrErr);
|
|
|
|
/* test private key context */
|
|
IPP_BAD_PTR2_RET(*pPrvKey, pScratchBuffer);
|
|
*pPrvKey = (IppsRSAPrivateKeyState*)(IPP_ALIGNED_PTR(*pPrvKey, RSA_PRIVATE_KEY_ALIGNMENT));
|
|
IPP_BADARG_RET(!RSA_PRV_KEY_VALID_ID(*pPrvKey), ippStsContextMatchErr);
|
|
IPP_BADARG_RET(!RSA_PRV_KEY_IS_SET(*pPrvKey), ippStsIncompleteContextErr);
|
|
|
|
/* use aligned public key context if defined */
|
|
if (*pPubKey) {
|
|
*pPubKey = (IppsRSAPublicKeyState*)(IPP_ALIGNED_PTR(*pPubKey, RSA_PUBLIC_KEY_ALIGNMENT));
|
|
IPP_BADARG_RET(!RSA_PUB_KEY_VALID_ID(*pPubKey), ippStsContextMatchErr);
|
|
IPP_BADARG_RET(!RSA_PUB_KEY_IS_SET(*pPubKey), ippStsIncompleteContextErr);
|
|
}
|
|
|
|
return ippStsNoErr;
|
|
}
|
|
|
|
// Check all the ippsRSAVerify_PSS_rmf parameters, set valid=0, align pKey pointer
|
|
__INLINE IppStatus SingleVerifyPssRmfPreproc(const Ipp8u* pMsg, int msgLen,
|
|
const Ipp8u* pSign,
|
|
int* pIsValid,
|
|
const IppsRSAPublicKeyState** pKey,
|
|
const IppsHashMethod* pMethod,
|
|
Ipp8u* pScratchBuffer)
|
|
{
|
|
/* test message length */
|
|
IPP_BADARG_RET((msgLen < 0), ippStsLengthErr);
|
|
/* test message pointer */
|
|
IPP_BADARG_RET((msgLen && !pMsg), ippStsNullPtrErr);
|
|
|
|
/* test data pointer */
|
|
IPP_BAD_PTR3_RET(pSign, pIsValid, pMethod);
|
|
|
|
/* test public key context */
|
|
IPP_BAD_PTR2_RET(*pKey, pScratchBuffer);
|
|
*pKey = (IppsRSAPublicKeyState*)(IPP_ALIGNED_PTR(*pKey, RSA_PUBLIC_KEY_ALIGNMENT));
|
|
IPP_BADARG_RET(!RSA_PUB_KEY_VALID_ID(*pKey), ippStsContextMatchErr);
|
|
IPP_BADARG_RET(!RSA_PUB_KEY_IS_SET(*pKey), ippStsIncompleteContextErr);
|
|
|
|
*pIsValid = 0;
|
|
|
|
return ippStsNoErr;
|
|
}
|