Bash程序  |  236行  |  5.1 KB

#!/bin/bash

# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.

# Script to generate padding.c containing PKCS 1.5 padding byte arrays for
# various combinations of RSA key lengths and message digest algorithms. 

Pad_Preamble="0x00,0x01"

SHA1_digestinfo="0x30,0x21,0x30,0x09,0x06,0x05,0x2b,0x0e,0x03,0x02,0x1a,0x05"\
",0x00,0x04,0x14"
SHA256_digestinfo="0x30,0x31,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03"\
",0x04,0x02,0x01,0x05,0x00,0x04,0x20"
SHA512_digestinfo="0x30,0x51,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03"\
",0x04,0x02,0x03,0x05,0x00,0x04,0x40"

RSA1024_Len=128
RSA2048_Len=256
RSA4096_Len=512
RSA8192_Len=1024

SHA1_T_Len=35
SHA256_T_Len=51
SHA512_T_Len=83

HashAlgos=( SHA1 SHA256 SHA512 )
RSAAlgos=( RSA1024 RSA2048 RSA4096 RSA8192 ) 

function genFFOctets {
  count=$1
  while [ $count -gt 0 ]; do
    echo -n "0xff,"
    let count=count-1
  done
}


cat <<EOF
/*
 * DO NOT MODIFY THIS FILE DIRECTLY.
 *
 * This file is automatically generated by genpadding.sh and contains padding
 * arrays corresponding to various combinations of algorithms for RSA signatures.
 */

EOF


echo '#include "cryptolib.h"'
echo
echo
cat <<EOF 
/*
 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard)
 *
 * Depending on the RSA key size and hash function, the padding is calculated
 * as follows:
 *
 * 0x00 || 0x01 || PS || 0x00 || T
 *
 * T: DER Encoded DigestInfo value which depends on the hash function used.
 *
 * SHA-1:   (0x)30 21 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 || H.
 * SHA-256: (0x)30 31 30 0d 06 09 60 86 48 01 65 03 04 02 01 05 00 04 20 || H.
 * SHA-512: (0x)30 51 30 0d 06 09 60 86 48 01 65 03 04 02 03 05 00 04 40 || H.
 *
 * Length(T) = 35 octets for SHA-1
 * Length(T) = 51 octets for SHA-256
 * Length(T) = 83 octets for SHA-512
 *
 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
 *
 */
EOF
echo
echo


# Generate padding arrays.
algorithmcounter=0

for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo "/* Algorithm Type $algorithmcounter */"
    let algorithmcounter=algorithmcounter+1
    eval rsalen=${rsaalgo}_Len
    eval hashlen=${hashalgo}_T_Len
    let nums=rsalen-hashlen-3 
    echo "const uint8_t padding${rsaalgo}_${hashalgo}[${rsaalgo}NUMBYTES - ${hashalgo}_DIGEST_SIZE] = {"
    echo -n $Pad_Preamble,
    genFFOctets $nums
    echo -n "0x00,"
    eval digestinfo=\$${hashalgo}_digestinfo
    echo $digestinfo
    echo "};"
    echo
  done
done

echo "const int kNumAlgorithms = $algorithmcounter;";
echo "#define NUMALGORITHMS $algorithmcounter"
echo

# Output DigestInfo field lengths.
cat <<EOF
#define SHA1_DIGESTINFO_LEN 15
#define SHA256_DIGESTINFO_LEN 19
#define SHA512_DIGESTINFO_LEN 19
EOF


# Generate DigestInfo arrays.
for hashalgo in ${HashAlgos[@]}
do
  echo "const uint8_t ${hashalgo}_digestinfo[] = {"
  eval digestinfo=\$${hashalgo}_digestinfo
  echo $digestinfo
  echo "};"
  echo
done

# Generate DigestInfo to size map.
echo "const int digestinfo_size_map[] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo ${hashalgo}_DIGESTINFO_LEN,
  done
done
echo "};"
echo

# Generate algorithm signature length map.
echo "const int siglen_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo ${rsaalgo}NUMBYTES,
  done
done
echo "};"
echo

# Generate algorithm padding array map.
echo "const uint8_t* padding_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
     echo padding${rsaalgo}_${hashalgo},
  done
done
echo "};"
echo

# Generate algorithm padding size map.
echo "const int padding_size_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo ${rsaalgo}NUMBYTES - ${hashalgo}_DIGEST_SIZE,
  done
done
echo "};"
echo

# Generate signature algorithm to messge digest algorithm map.
echo "const int hash_type_map[] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo ${hashalgo}_DIGEST_ALGORITHM,
  done
done
echo "};"
echo

# Generate algorithm to message digest's output size map.
echo "const int hash_size_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo ${hashalgo}_DIGEST_SIZE,
  done
done
echo "};"
echo

# Generate algorithm to message digest's input block size map.
echo "const int hash_blocksize_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo ${hashalgo}_BLOCK_SIZE,
  done
done
echo "};"
echo

# Generate algorithm to message's digest ASN.1 DigestInfo map.
echo "const uint8_t* hash_digestinfo_map[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo ${hashalgo}_digestinfo,
  done
done
echo "};"
echo


# Generate algorithm description strings.
echo "const char* algo_strings[NUMALGORITHMS] = {"
for rsaalgo in ${RSAAlgos[@]}
do
  for hashalgo in ${HashAlgos[@]}
  do
    echo \"${rsaalgo} ${hashalgo}\",
  done
done
echo "};"
echo

#echo "#endif  /* VBOOT_REFERENCE_PADDING_H_ */"