From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Rini Date: Mon, 21 Nov 2016 21:55:22 -0500 Subject: [U-Boot] [U-Boot,2/4] rsa: Verify RSA padding programatically In-Reply-To: <010101584549e4bc-5b633e70-c111-41b7-a59e-ace2517755ef-000000@us-west-2.amazonses.com> References: <010101584549e4bc-5b633e70-c111-41b7-a59e-ace2517755ef-000000@us-west-2.amazonses.com> Message-ID: <20161122025522.GC2546@bill-the-cat> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: u-boot@lists.denx.de On Tue, Nov 08, 2016 at 06:53:40PM +0000, aduda wrote: > From: Andrew Duda > > Padding verification was done against static SHA/RSA pair arrays which > take up a lot of static memory, are mostly 0xff, and cannot be reused > for additional SHA/RSA pairings. The padding can be easily computed > according to PKCS#1v2.1 as: > > EM = 0x00 || 0x01 || PS || 0x00 || T > > where PS is (emLen - tLen - 3) octets of 0xff and T is DER encoding > of the hash. > > Store DER prefix in checksum_algo and create rsa_verify_padding > function to handle verification of a message for any SHA/RSA pairing. > > Signed-off-by: Andrew Duda > Signed-off-by: aduda > Reviewed-by: Simon Glass Applied to u-boot/master, thanks! -- Tom -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: Digital signature URL: