On Fri Jun 7, 2024 at 1:58 PM EEST, Herbert Xu wrote:
> On Wed, May 29, 2024 at 12:08:09AM +0300, Jarkko Sakkinen wrote:
> >
> > +/*
> > + * Sign operation is an encryption using the TPM's private key. With RSA 
> > the
> > + * only difference between encryption and decryption is where the padding 
> > goes.
> > + * Since own padding can be used, TPM2_RSA_Decrypt can be repurposed to do
> > + * encryption.
> > + */
> > +static int tpm2_key_rsa_sign(struct tpm_chip *chip, struct tpm2_key *key,
> > +                        struct kernel_pkey_params *params,
> > +                        const void *in, void *out)
> > +{
> > +   const off_t o = key->priv_len + 2 + sizeof(*key->desc);
> > +   const struct tpm2_rsa_parms *p =
> > +           (const struct tpm2_rsa_parms *)&key->data[o];
> > +   const u16 mod_size = be16_to_cpu(p->modulus_size);
> > +   const struct rsa_asn1_template *asn1;
> > +   u32 in_len = params->in_len;
> > +   void *asn1_wrapped = NULL;
> > +   u8 *padded;
> > +   int ret;
> > +
> > +   if (strcmp(params->encoding, "pkcs1") != 0) {
> > +           ret = -ENOPKG;
> > +           goto err;
> > +   }
> > +
> > +   if (params->hash_algo) {
> > +           asn1 = rsa_lookup_asn1(params->hash_algo);
>
> Could you please explain why this can't be done through pkcs1pad
> instead of going to raw RSA?

Sorry was away couple of weeks from here. I replace this with TPM2_Sign
as is done already in the ECDSA module, so I guess that is a "yes".

BR, Jarkko

Reply via email to