slimbootloader/BootloaderCommonPkg/Library/IppCryptoLib/auth/pcprsa_pss_preproc.h

83 lines
3.0 KiB
C

/*******************************************************************************
* Copyright 2019-2020 Intel Corporation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*******************************************************************************/
#include "owncp.h"
#include "pcphash_rmf.h"
// Check all the ippsRSASign_PSS_rmf parameters and align pPrvKey, pPubKey pointers
__INLINE IppStatus SingleSignPssRmfPreproc(const Ipp8u* pMsg, int msgLen,
const Ipp8u* pSalt, int saltLen,
Ipp8u* pSign,
const IppsRSAPrivateKeyState** pPrvKey,
const IppsRSAPublicKeyState** pPubKey,
const IppsHashMethod* pMethod,
Ipp8u* pScratchBuffer)
{
/* test message length */
IPP_BADARG_RET((msgLen < 0), ippStsLengthErr);
/* test message pointer */
IPP_BADARG_RET((msgLen && !pMsg), ippStsNullPtrErr);
/* test data pointer */
IPP_BAD_PTR2_RET(pSign, pMethod);
/* test salt length and salt pointer */
IPP_BADARG_RET(saltLen < 0, ippStsLengthErr);
IPP_BADARG_RET((saltLen && !pSalt), ippStsNullPtrErr);
/* test private key context */
IPP_BAD_PTR2_RET(*pPrvKey, pScratchBuffer);
*pPrvKey = (IppsRSAPrivateKeyState*)(IPP_ALIGNED_PTR(*pPrvKey, RSA_PRIVATE_KEY_ALIGNMENT));
IPP_BADARG_RET(!RSA_PRV_KEY_VALID_ID(*pPrvKey), ippStsContextMatchErr);
IPP_BADARG_RET(!RSA_PRV_KEY_IS_SET(*pPrvKey), ippStsIncompleteContextErr);
/* use aligned public key context if defined */
if (*pPubKey) {
*pPubKey = (IppsRSAPublicKeyState*)(IPP_ALIGNED_PTR(*pPubKey, RSA_PUBLIC_KEY_ALIGNMENT));
IPP_BADARG_RET(!RSA_PUB_KEY_VALID_ID(*pPubKey), ippStsContextMatchErr);
IPP_BADARG_RET(!RSA_PUB_KEY_IS_SET(*pPubKey), ippStsIncompleteContextErr);
}
return ippStsNoErr;
}
// Check all the ippsRSAVerify_PSS_rmf parameters, set valid=0, align pKey pointer
__INLINE IppStatus SingleVerifyPssRmfPreproc(const Ipp8u* pMsg, int msgLen,
const Ipp8u* pSign,
int* pIsValid,
const IppsRSAPublicKeyState** pKey,
const IppsHashMethod* pMethod,
Ipp8u* pScratchBuffer)
{
/* test message length */
IPP_BADARG_RET((msgLen < 0), ippStsLengthErr);
/* test message pointer */
IPP_BADARG_RET((msgLen && !pMsg), ippStsNullPtrErr);
/* test data pointer */
IPP_BAD_PTR3_RET(pSign, pIsValid, pMethod);
/* test public key context */
IPP_BAD_PTR2_RET(*pKey, pScratchBuffer);
*pKey = (IppsRSAPublicKeyState*)(IPP_ALIGNED_PTR(*pKey, RSA_PUBLIC_KEY_ALIGNMENT));
IPP_BADARG_RET(!RSA_PUB_KEY_VALID_ID(*pKey), ippStsContextMatchErr);
IPP_BADARG_RET(!RSA_PUB_KEY_IS_SET(*pKey), ippStsIncompleteContextErr);
*pIsValid = 0;
return ippStsNoErr;
}