1 // SPDX-License-Identifier: BSD-2-Clause
2 /* LibTomCrypt, modular cryptographic library -- Tom St Denis
3 *
4 * LibTomCrypt is a library that provides various cryptographic
5 * algorithms in a highly modular and flexible manner.
6 *
7 * The library is free for all purposes without any express
8 * guarantee it works.
9 */
10 #include "tomcrypt_private.h"
11
12
13 #ifdef LTC_MRSA
14
15 /**
16 Import RSA key from raw numbers
17
18 @param N RSA's N
19 @param Nlen RSA's N's length
20 @param e RSA's e
21 @param elen RSA's e's length
22 @param d RSA's d (only private key, NULL for public key)
23 @param dlen RSA's d's length
24 @param key [out] the destination for the imported key
25 @return CRYPT_OK if successful
26 */
rsa_set_key(const unsigned char * N,unsigned long Nlen,const unsigned char * e,unsigned long elen,const unsigned char * d,unsigned long dlen,rsa_key * key)27 int rsa_set_key(const unsigned char *N, unsigned long Nlen,
28 const unsigned char *e, unsigned long elen,
29 const unsigned char *d, unsigned long dlen,
30 rsa_key *key)
31 {
32 int err;
33
34 LTC_ARGCHK(key != NULL);
35 LTC_ARGCHK(N != NULL);
36 LTC_ARGCHK(e != NULL);
37 LTC_ARGCHK(ltc_mp.name != NULL);
38
39 err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q, NULL);
40 if (err != CRYPT_OK) return err;
41
42 if ((err = mp_read_unsigned_bin(key->N , (unsigned char *)N , Nlen)) != CRYPT_OK) { goto LBL_ERR; }
43 if ((err = mp_read_unsigned_bin(key->e , (unsigned char *)e , elen)) != CRYPT_OK) { goto LBL_ERR; }
44 if (d && dlen) {
45 if ((err = mp_read_unsigned_bin(key->d , (unsigned char *)d , dlen)) != CRYPT_OK) { goto LBL_ERR; }
46 key->type = PK_PRIVATE;
47 }
48 else {
49 key->type = PK_PUBLIC;
50 }
51 return CRYPT_OK;
52
53 LBL_ERR:
54 rsa_free(key);
55 return err;
56 }
57
58 /**
59 Import factors of an RSA key from raw numbers
60
61 Only for private keys.
62
63 @param p RSA's p
64 @param plen RSA's p's length
65 @param q RSA's q
66 @param qlen RSA's q's length
67 @param key [out] the destination for the imported key
68 @return CRYPT_OK if successful
69 */
rsa_set_factors(const unsigned char * p,unsigned long plen,const unsigned char * q,unsigned long qlen,rsa_key * key)70 int rsa_set_factors(const unsigned char *p, unsigned long plen,
71 const unsigned char *q, unsigned long qlen,
72 rsa_key *key)
73 {
74 int err;
75
76 LTC_ARGCHK(key != NULL);
77 LTC_ARGCHK(p != NULL);
78 LTC_ARGCHK(q != NULL);
79 LTC_ARGCHK(ltc_mp.name != NULL);
80
81 if (key->type != PK_PRIVATE) return CRYPT_PK_TYPE_MISMATCH;
82
83 if ((err = mp_read_unsigned_bin(key->p , (unsigned char *)p , plen)) != CRYPT_OK) { goto LBL_ERR; }
84 if ((err = mp_read_unsigned_bin(key->q , (unsigned char *)q , qlen)) != CRYPT_OK) { goto LBL_ERR; }
85 return CRYPT_OK;
86
87 LBL_ERR:
88 rsa_free(key);
89 return err;
90 }
91
92 /**
93 Import CRT parameters of an RSA key from raw numbers
94
95 Only for private keys.
96
97 @param dP RSA's dP
98 @param dPlen RSA's dP's length
99 @param dQ RSA's dQ
100 @param dQlen RSA's dQ's length
101 @param qP RSA's qP
102 @param qPlen RSA's qP's length
103 @param key [out] the destination for the imported key
104 @return CRYPT_OK if successful
105 */
rsa_set_crt_params(const unsigned char * dP,unsigned long dPlen,const unsigned char * dQ,unsigned long dQlen,const unsigned char * qP,unsigned long qPlen,rsa_key * key)106 int rsa_set_crt_params(const unsigned char *dP, unsigned long dPlen,
107 const unsigned char *dQ, unsigned long dQlen,
108 const unsigned char *qP, unsigned long qPlen,
109 rsa_key *key)
110 {
111 int err;
112
113 LTC_ARGCHK(key != NULL);
114 LTC_ARGCHK(dP != NULL);
115 LTC_ARGCHK(dQ != NULL);
116 LTC_ARGCHK(qP != NULL);
117 LTC_ARGCHK(ltc_mp.name != NULL);
118
119 if (key->type != PK_PRIVATE) return CRYPT_PK_TYPE_MISMATCH;
120
121 if ((err = mp_read_unsigned_bin(key->dP, (unsigned char *)dP, dPlen)) != CRYPT_OK) { goto LBL_ERR; }
122 if ((err = mp_read_unsigned_bin(key->dQ, (unsigned char *)dQ, dQlen)) != CRYPT_OK) { goto LBL_ERR; }
123 if ((err = mp_read_unsigned_bin(key->qP, (unsigned char *)qP, qPlen)) != CRYPT_OK) { goto LBL_ERR; }
124 return CRYPT_OK;
125
126 LBL_ERR:
127 rsa_free(key);
128 return err;
129 }
130
131 #endif /* LTC_MRSA */
132
133 /* ref: $Format:%D$ */
134 /* git commit: $Format:%H$ */
135 /* commit time: $Format:%ai$ */
136