1 // SPDX-License-Identifier: BSD-2-Clause
2 /* LibTomCrypt, modular cryptographic library -- Tom St Denis
3  *
4  * LibTomCrypt is a library that provides various cryptographic
5  * algorithms in a highly modular and flexible manner.
6  *
7  * The library is free for all purposes without any express
8  * guarantee it works.
9  */
10 #include "tomcrypt_private.h"
11 
12 
13 #ifdef LTC_MRSA
14 
15 /**
16   Import RSA key from raw numbers
17 
18   @param N       RSA's N
19   @param Nlen    RSA's N's length
20   @param e       RSA's e
21   @param elen    RSA's e's length
22   @param d       RSA's d  (only private key, NULL for public key)
23   @param dlen    RSA's d's length
24   @param key     [out] the destination for the imported key
25   @return CRYPT_OK if successful
26 */
rsa_set_key(const unsigned char * N,unsigned long Nlen,const unsigned char * e,unsigned long elen,const unsigned char * d,unsigned long dlen,rsa_key * key)27 int rsa_set_key(const unsigned char *N,  unsigned long Nlen,
28                 const unsigned char *e,  unsigned long elen,
29                 const unsigned char *d,  unsigned long dlen,
30                 rsa_key *key)
31 {
32    int err;
33 
34    LTC_ARGCHK(key         != NULL);
35    LTC_ARGCHK(N           != NULL);
36    LTC_ARGCHK(e           != NULL);
37    LTC_ARGCHK(ltc_mp.name != NULL);
38 
39    err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q, NULL);
40    if (err != CRYPT_OK) return err;
41 
42    if ((err = mp_read_unsigned_bin(key->N , (unsigned char *)N , Nlen)) != CRYPT_OK)    { goto LBL_ERR; }
43    if ((err = mp_read_unsigned_bin(key->e , (unsigned char *)e , elen)) != CRYPT_OK)    { goto LBL_ERR; }
44    if (d && dlen) {
45       if ((err = mp_read_unsigned_bin(key->d , (unsigned char *)d , dlen)) != CRYPT_OK) { goto LBL_ERR; }
46       key->type = PK_PRIVATE;
47    }
48    else {
49       key->type = PK_PUBLIC;
50    }
51    return CRYPT_OK;
52 
53 LBL_ERR:
54    rsa_free(key);
55    return err;
56 }
57 
58 /**
59   Import factors of an RSA key from raw numbers
60 
61   Only for private keys.
62 
63   @param p       RSA's p
64   @param plen    RSA's p's length
65   @param q       RSA's q
66   @param qlen    RSA's q's length
67   @param key     [out] the destination for the imported key
68   @return CRYPT_OK if successful
69 */
rsa_set_factors(const unsigned char * p,unsigned long plen,const unsigned char * q,unsigned long qlen,rsa_key * key)70 int rsa_set_factors(const unsigned char *p,  unsigned long plen,
71                     const unsigned char *q,  unsigned long qlen,
72                     rsa_key *key)
73 {
74    int err;
75 
76    LTC_ARGCHK(key         != NULL);
77    LTC_ARGCHK(p           != NULL);
78    LTC_ARGCHK(q           != NULL);
79    LTC_ARGCHK(ltc_mp.name != NULL);
80 
81    if (key->type != PK_PRIVATE) return CRYPT_PK_TYPE_MISMATCH;
82 
83    if ((err = mp_read_unsigned_bin(key->p , (unsigned char *)p , plen)) != CRYPT_OK) { goto LBL_ERR; }
84    if ((err = mp_read_unsigned_bin(key->q , (unsigned char *)q , qlen)) != CRYPT_OK) { goto LBL_ERR; }
85    return CRYPT_OK;
86 
87 LBL_ERR:
88    rsa_free(key);
89    return err;
90 }
91 
92 /**
93   Import CRT parameters of an RSA key from raw numbers
94 
95   Only for private keys.
96 
97   @param dP      RSA's dP
98   @param dPlen   RSA's dP's length
99   @param dQ      RSA's dQ
100   @param dQlen   RSA's dQ's length
101   @param qP      RSA's qP
102   @param qPlen   RSA's qP's length
103   @param key     [out] the destination for the imported key
104   @return CRYPT_OK if successful
105 */
rsa_set_crt_params(const unsigned char * dP,unsigned long dPlen,const unsigned char * dQ,unsigned long dQlen,const unsigned char * qP,unsigned long qPlen,rsa_key * key)106 int rsa_set_crt_params(const unsigned char *dP, unsigned long dPlen,
107                        const unsigned char *dQ, unsigned long dQlen,
108                        const unsigned char *qP, unsigned long qPlen,
109                        rsa_key *key)
110 {
111    int err;
112 
113    LTC_ARGCHK(key         != NULL);
114    LTC_ARGCHK(dP          != NULL);
115    LTC_ARGCHK(dQ          != NULL);
116    LTC_ARGCHK(qP          != NULL);
117    LTC_ARGCHK(ltc_mp.name != NULL);
118 
119    if (key->type != PK_PRIVATE) return CRYPT_PK_TYPE_MISMATCH;
120 
121    if ((err = mp_read_unsigned_bin(key->dP, (unsigned char *)dP, dPlen)) != CRYPT_OK) { goto LBL_ERR; }
122    if ((err = mp_read_unsigned_bin(key->dQ, (unsigned char *)dQ, dQlen)) != CRYPT_OK) { goto LBL_ERR; }
123    if ((err = mp_read_unsigned_bin(key->qP, (unsigned char *)qP, qPlen)) != CRYPT_OK) { goto LBL_ERR; }
124    return CRYPT_OK;
125 
126 LBL_ERR:
127    rsa_free(key);
128    return err;
129 }
130 
131 #endif /* LTC_MRSA */
132 
133 /* ref:         $Format:%D$ */
134 /* git commit:  $Format:%H$ */
135 /* commit time: $Format:%ai$ */
136