xref: /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/rsa.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun  *  The RSA public-key cryptosystem
3*4882a593Smuzhiyun  *
4*4882a593Smuzhiyun  *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
5*4882a593Smuzhiyun  *  SPDX-License-Identifier: Apache-2.0
6*4882a593Smuzhiyun  *
7*4882a593Smuzhiyun  *  Licensed under the Apache License, Version 2.0 (the "License"); you may
8*4882a593Smuzhiyun  *  not use this file except in compliance with the License.
9*4882a593Smuzhiyun  *  You may obtain a copy of the License at
10*4882a593Smuzhiyun  *
11*4882a593Smuzhiyun  *  http://www.apache.org/licenses/LICENSE-2.0
12*4882a593Smuzhiyun  *
13*4882a593Smuzhiyun  *  Unless required by applicable law or agreed to in writing, software
14*4882a593Smuzhiyun  *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15*4882a593Smuzhiyun  *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16*4882a593Smuzhiyun  *  See the License for the specific language governing permissions and
17*4882a593Smuzhiyun  *  limitations under the License.
18*4882a593Smuzhiyun  *
19*4882a593Smuzhiyun  *  This file is part of mbed TLS (https://tls.mbed.org)
20*4882a593Smuzhiyun  */
21*4882a593Smuzhiyun /*
22*4882a593Smuzhiyun  *  The following sources were referenced in the design of this implementation
23*4882a593Smuzhiyun  *  of the RSA algorithm:
24*4882a593Smuzhiyun  *
25*4882a593Smuzhiyun  *  [1] A method for obtaining digital signatures and public-key cryptosystems
26*4882a593Smuzhiyun  *      R Rivest, A Shamir, and L Adleman
27*4882a593Smuzhiyun  *      http://people.csail.mit.edu/rivest/pubs.html#RSA78
28*4882a593Smuzhiyun  *
29*4882a593Smuzhiyun  *  [2] Handbook of Applied Cryptography - 1997, Chapter 8
30*4882a593Smuzhiyun  *      Menezes, van Oorschot and Vanstone
31*4882a593Smuzhiyun  *
32*4882a593Smuzhiyun  */
33*4882a593Smuzhiyun 
34*4882a593Smuzhiyun 
35*4882a593Smuzhiyun //#include "oid.h"
36*4882a593Smuzhiyun 
37*4882a593Smuzhiyun #include <string.h>
38*4882a593Smuzhiyun #include "rsa.h"
39*4882a593Smuzhiyun #include "config.h"
40*4882a593Smuzhiyun #include "mbed_rsa_key.h"
41*4882a593Smuzhiyun #if defined(MBEDTLS_GENPRIME)
42*4882a593Smuzhiyun 
43*4882a593Smuzhiyun /*
44*4882a593Smuzhiyun  * Generate an RSA keypair
45*4882a593Smuzhiyun  */
mbedtls_rsa_gen_key(mbedtls_rsa_context * ctx,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng,unsigned int nbits,int exponent)46*4882a593Smuzhiyun int mbedtls_rsa_gen_key( mbedtls_rsa_context *ctx,
47*4882a593Smuzhiyun                  int (*f_rng)(void *, unsigned char *, size_t),
48*4882a593Smuzhiyun                  void *p_rng,
49*4882a593Smuzhiyun                  unsigned int nbits, int exponent )
50*4882a593Smuzhiyun {
51*4882a593Smuzhiyun     int ret;
52*4882a593Smuzhiyun     mbedtls_mpi P1, Q1, H, G;
53*4882a593Smuzhiyun 
54*4882a593Smuzhiyun     if( f_rng == NULL || nbits < 128 || exponent < 3 )
55*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_BAD_INPUT_DATA );
56*4882a593Smuzhiyun 
57*4882a593Smuzhiyun     if( nbits % 2 )
58*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_BAD_INPUT_DATA );
59*4882a593Smuzhiyun 
60*4882a593Smuzhiyun     mbedtls_mpi_init( &P1 ); mbedtls_mpi_init( &Q1 );
61*4882a593Smuzhiyun     mbedtls_mpi_init( &H ); mbedtls_mpi_init( &G );
62*4882a593Smuzhiyun 
63*4882a593Smuzhiyun     /*
64*4882a593Smuzhiyun      * find primes P and Q with Q < P so that:
65*4882a593Smuzhiyun      * GCD( E, (P-1)*(Q-1) ) == 1
66*4882a593Smuzhiyun      */
67*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &ctx->E, exponent ) );
68*4882a593Smuzhiyun 
69*4882a593Smuzhiyun     do
70*4882a593Smuzhiyun     {
71*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_gen_prime( &ctx->P, nbits >> 1, 0,
72*4882a593Smuzhiyun                                 f_rng, p_rng ) );
73*4882a593Smuzhiyun 
74*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_gen_prime( &ctx->Q, nbits >> 1, 0,
75*4882a593Smuzhiyun                                 f_rng, p_rng ) );
76*4882a593Smuzhiyun 
77*4882a593Smuzhiyun         if( mbedtls_mpi_cmp_mpi( &ctx->P, &ctx->Q ) == 0 )
78*4882a593Smuzhiyun             continue;
79*4882a593Smuzhiyun 
80*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &ctx->N, &ctx->P, &ctx->Q ) );
81*4882a593Smuzhiyun         if( mbedtls_mpi_bitlen( &ctx->N ) != nbits )
82*4882a593Smuzhiyun             continue;
83*4882a593Smuzhiyun 
84*4882a593Smuzhiyun         if( mbedtls_mpi_cmp_mpi( &ctx->P, &ctx->Q ) < 0 )
85*4882a593Smuzhiyun                                 mbedtls_mpi_swap( &ctx->P, &ctx->Q );
86*4882a593Smuzhiyun 
87*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &P1, &ctx->P, 1 ) );
88*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &Q1, &ctx->Q, 1 ) );
89*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &H, &P1, &Q1 ) );
90*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_gcd( &G, &ctx->E, &H  ) );
91*4882a593Smuzhiyun     }
92*4882a593Smuzhiyun     while( mbedtls_mpi_cmp_int( &G, 1 ) != 0 );
93*4882a593Smuzhiyun 
94*4882a593Smuzhiyun     /*
95*4882a593Smuzhiyun      * D  = E^-1 mod ((P-1)*(Q-1))
96*4882a593Smuzhiyun      * DP = D mod (P - 1)
97*4882a593Smuzhiyun      * DQ = D mod (Q - 1)
98*4882a593Smuzhiyun      * QP = Q^-1 mod P
99*4882a593Smuzhiyun      */
100*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &ctx->D , &ctx->E, &H  ) );
101*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->DP, &ctx->D, &P1 ) );
102*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->DQ, &ctx->D, &Q1 ) );
103*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &ctx->QP, &ctx->Q, &ctx->P ) );
104*4882a593Smuzhiyun 
105*4882a593Smuzhiyun     ctx->len = ( mbedtls_mpi_bitlen( &ctx->N ) + 7 ) >> 3;
106*4882a593Smuzhiyun 
107*4882a593Smuzhiyun cleanup:
108*4882a593Smuzhiyun 
109*4882a593Smuzhiyun     mbedtls_mpi_free( &P1 ); mbedtls_mpi_free( &Q1 ); mbedtls_mpi_free( &H ); mbedtls_mpi_free( &G );
110*4882a593Smuzhiyun 
111*4882a593Smuzhiyun     if( ret != 0 )
112*4882a593Smuzhiyun     {
113*4882a593Smuzhiyun         mbedtls_rsa_free( ctx );
114*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_GEN_FAILED + ret );
115*4882a593Smuzhiyun     }
116*4882a593Smuzhiyun 
117*4882a593Smuzhiyun     return( 0 );
118*4882a593Smuzhiyun }
119*4882a593Smuzhiyun 
120*4882a593Smuzhiyun #endif /* MBEDTLS_GENPRIME */
121*4882a593Smuzhiyun 
122*4882a593Smuzhiyun /*
123*4882a593Smuzhiyun  * Initialize an RSA context
124*4882a593Smuzhiyun  */
mbedtls_rsa_init(mbedtls_rsa_context * ctx)125*4882a593Smuzhiyun void mbedtls_rsa_init( mbedtls_rsa_context *ctx)
126*4882a593Smuzhiyun {
127*4882a593Smuzhiyun     memset( ctx, 0, sizeof( mbedtls_rsa_context ) );
128*4882a593Smuzhiyun }
129*4882a593Smuzhiyun 
130*4882a593Smuzhiyun 
131*4882a593Smuzhiyun /*
132*4882a593Smuzhiyun  * Check a public RSA key
133*4882a593Smuzhiyun  */
mbedtls_rsa_check_pubkey(const mbedtls_rsa_context * ctx)134*4882a593Smuzhiyun int mbedtls_rsa_check_pubkey( const mbedtls_rsa_context *ctx )
135*4882a593Smuzhiyun {
136*4882a593Smuzhiyun     if( !ctx->N.p || !ctx->E.p )
137*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_CHECK_FAILED );
138*4882a593Smuzhiyun 
139*4882a593Smuzhiyun     if( ( ctx->N.p[0] & 1 ) == 0 ||
140*4882a593Smuzhiyun         ( ctx->E.p[0] & 1 ) == 0 )
141*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_CHECK_FAILED );
142*4882a593Smuzhiyun     if( mbedtls_mpi_bitlen( &ctx->N ) < 128 ||
143*4882a593Smuzhiyun         mbedtls_mpi_bitlen( &ctx->N ) > MBEDTLS_MPI_MAX_BITS )
144*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_CHECK_FAILED );
145*4882a593Smuzhiyun 
146*4882a593Smuzhiyun     if( mbedtls_mpi_bitlen( &ctx->E ) < 2 ||
147*4882a593Smuzhiyun         mbedtls_mpi_cmp_mpi( &ctx->E, &ctx->N ) >= 0 )
148*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_CHECK_FAILED );
149*4882a593Smuzhiyun 
150*4882a593Smuzhiyun     return( 0 );
151*4882a593Smuzhiyun }
152*4882a593Smuzhiyun 
153*4882a593Smuzhiyun /*
154*4882a593Smuzhiyun  * Check a private RSA key
155*4882a593Smuzhiyun  */
mbedtls_rsa_check_privkey(const mbedtls_rsa_context * ctx)156*4882a593Smuzhiyun int mbedtls_rsa_check_privkey( const mbedtls_rsa_context *ctx )
157*4882a593Smuzhiyun {
158*4882a593Smuzhiyun     int ret;
159*4882a593Smuzhiyun     mbedtls_mpi PQ, DE, P1, Q1, H, I, G, G2, L1, L2, DP, DQ, QP;
160*4882a593Smuzhiyun 
161*4882a593Smuzhiyun     if( ( ret = mbedtls_rsa_check_pubkey( ctx ) ) != 0 )
162*4882a593Smuzhiyun         return( ret );
163*4882a593Smuzhiyun 
164*4882a593Smuzhiyun     if( !ctx->P.p || !ctx->Q.p || !ctx->D.p )
165*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_CHECK_FAILED );
166*4882a593Smuzhiyun 
167*4882a593Smuzhiyun     mbedtls_mpi_init( &PQ ); mbedtls_mpi_init( &DE ); mbedtls_mpi_init( &P1 ); mbedtls_mpi_init( &Q1 );
168*4882a593Smuzhiyun     mbedtls_mpi_init( &H  ); mbedtls_mpi_init( &I  ); mbedtls_mpi_init( &G  ); mbedtls_mpi_init( &G2 );
169*4882a593Smuzhiyun     mbedtls_mpi_init( &L1 ); mbedtls_mpi_init( &L2 ); mbedtls_mpi_init( &DP ); mbedtls_mpi_init( &DQ );
170*4882a593Smuzhiyun     mbedtls_mpi_init( &QP );
171*4882a593Smuzhiyun 
172*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &PQ, &ctx->P, &ctx->Q ) );
173*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &DE, &ctx->D, &ctx->E ) );
174*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &P1, &ctx->P, 1 ) );
175*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &Q1, &ctx->Q, 1 ) );
176*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &H, &P1, &Q1 ) );
177*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_gcd( &G, &ctx->E, &H  ) );
178*4882a593Smuzhiyun 
179*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_gcd( &G2, &P1, &Q1 ) );
180*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_div_mpi( &L1, &L2, &H, &G2 ) );
181*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &I, &DE, &L1  ) );
182*4882a593Smuzhiyun 
183*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &DP, &ctx->D, &P1 ) );
184*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &DQ, &ctx->D, &Q1 ) );
185*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &QP, &ctx->Q, &ctx->P ) );
186*4882a593Smuzhiyun     /*
187*4882a593Smuzhiyun      * Check for a valid PKCS1v2 private key
188*4882a593Smuzhiyun      */
189*4882a593Smuzhiyun     if( mbedtls_mpi_cmp_mpi( &PQ, &ctx->N ) != 0 ||
190*4882a593Smuzhiyun         mbedtls_mpi_cmp_mpi( &DP, &ctx->DP ) != 0 ||
191*4882a593Smuzhiyun         mbedtls_mpi_cmp_mpi( &DQ, &ctx->DQ ) != 0 ||
192*4882a593Smuzhiyun         mbedtls_mpi_cmp_mpi( &QP, &ctx->QP ) != 0 ||
193*4882a593Smuzhiyun         mbedtls_mpi_cmp_int( &L2, 0 ) != 0 ||
194*4882a593Smuzhiyun         mbedtls_mpi_cmp_int( &I, 1 ) != 0 ||
195*4882a593Smuzhiyun         mbedtls_mpi_cmp_int( &G, 1 ) != 0
196*4882a593Smuzhiyun 	 )
197*4882a593Smuzhiyun     {
198*4882a593Smuzhiyun 		ret = MBEDTLS_ERR_RSA_KEY_CHECK_FAILED;
199*4882a593Smuzhiyun     }
200*4882a593Smuzhiyun 
201*4882a593Smuzhiyun cleanup:
202*4882a593Smuzhiyun     mbedtls_mpi_free( &PQ ); mbedtls_mpi_free( &DE ); mbedtls_mpi_free( &P1 ); mbedtls_mpi_free( &Q1 );
203*4882a593Smuzhiyun     mbedtls_mpi_free( &H  ); mbedtls_mpi_free( &I  ); mbedtls_mpi_free( &G  ); mbedtls_mpi_free( &G2 );
204*4882a593Smuzhiyun     mbedtls_mpi_free( &L1 ); mbedtls_mpi_free( &L2 ); mbedtls_mpi_free( &DP ); mbedtls_mpi_free( &DQ );
205*4882a593Smuzhiyun     mbedtls_mpi_free( &QP );
206*4882a593Smuzhiyun 
207*4882a593Smuzhiyun     if( ret == MBEDTLS_ERR_RSA_KEY_CHECK_FAILED )
208*4882a593Smuzhiyun         return( ret );
209*4882a593Smuzhiyun 
210*4882a593Smuzhiyun     if( ret != 0 )
211*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_CHECK_FAILED + ret );
212*4882a593Smuzhiyun 
213*4882a593Smuzhiyun     return( 0 );
214*4882a593Smuzhiyun }
215*4882a593Smuzhiyun 
216*4882a593Smuzhiyun /*
217*4882a593Smuzhiyun  * Check if contexts holding a public and private key match
218*4882a593Smuzhiyun  */
mbedtls_rsa_check_pub_priv(const mbedtls_rsa_context * pub,const mbedtls_rsa_context * prv)219*4882a593Smuzhiyun int mbedtls_rsa_check_pub_priv( const mbedtls_rsa_context *pub, const mbedtls_rsa_context *prv )
220*4882a593Smuzhiyun {
221*4882a593Smuzhiyun     if( mbedtls_rsa_check_pubkey( pub ) != 0 ||
222*4882a593Smuzhiyun         mbedtls_rsa_check_privkey( prv ) != 0 )
223*4882a593Smuzhiyun     {
224*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_CHECK_FAILED );
225*4882a593Smuzhiyun     }
226*4882a593Smuzhiyun 
227*4882a593Smuzhiyun     if( mbedtls_mpi_cmp_mpi( &pub->N, &prv->N ) != 0 ||
228*4882a593Smuzhiyun         mbedtls_mpi_cmp_mpi( &pub->E, &prv->E ) != 0 )
229*4882a593Smuzhiyun     {
230*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_KEY_CHECK_FAILED );
231*4882a593Smuzhiyun     }
232*4882a593Smuzhiyun 
233*4882a593Smuzhiyun     return( 0 );
234*4882a593Smuzhiyun }
235*4882a593Smuzhiyun 
236*4882a593Smuzhiyun /*
237*4882a593Smuzhiyun  * Do an RSA public key operation
238*4882a593Smuzhiyun  */
mbedtls_rsa_public(mbedtls_rsa_context * ctx,const unsigned char * input,unsigned char * output)239*4882a593Smuzhiyun int mbedtls_rsa_public( mbedtls_rsa_context *ctx,
240*4882a593Smuzhiyun                 const unsigned char *input,
241*4882a593Smuzhiyun                 unsigned char *output )
242*4882a593Smuzhiyun {
243*4882a593Smuzhiyun     int ret;
244*4882a593Smuzhiyun     size_t olen;
245*4882a593Smuzhiyun     mbedtls_mpi T;
246*4882a593Smuzhiyun 
247*4882a593Smuzhiyun     mbedtls_mpi_init( &T );
248*4882a593Smuzhiyun 
249*4882a593Smuzhiyun #if defined(MBEDTLS_THREADING_C)
250*4882a593Smuzhiyun     if( ( ret = mbedtls_mutex_lock( &ctx->mutex ) ) != 0 )
251*4882a593Smuzhiyun         return( ret );
252*4882a593Smuzhiyun #endif
253*4882a593Smuzhiyun 
254*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &T, input, ctx->len ) );
255*4882a593Smuzhiyun 
256*4882a593Smuzhiyun     if( mbedtls_mpi_cmp_mpi( &T, &ctx->N ) >= 0 )
257*4882a593Smuzhiyun     {
258*4882a593Smuzhiyun         ret = MBEDTLS_ERR_MPI_BAD_INPUT_DATA;
259*4882a593Smuzhiyun         goto cleanup;
260*4882a593Smuzhiyun     }
261*4882a593Smuzhiyun 
262*4882a593Smuzhiyun     olen = ctx->len;
263*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &T, &T, &ctx->E, &ctx->N, &ctx->RN ) );
264*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &T, output, olen ) );
265*4882a593Smuzhiyun 
266*4882a593Smuzhiyun cleanup:
267*4882a593Smuzhiyun #if defined(MBEDTLS_THREADING_C)
268*4882a593Smuzhiyun     if( mbedtls_mutex_unlock( &ctx->mutex ) != 0 )
269*4882a593Smuzhiyun         return( MBEDTLS_ERR_THREADING_MUTEX_ERROR );
270*4882a593Smuzhiyun #endif
271*4882a593Smuzhiyun 
272*4882a593Smuzhiyun     mbedtls_mpi_free( &T );
273*4882a593Smuzhiyun 
274*4882a593Smuzhiyun     if( ret != 0 )
275*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_PUBLIC_FAILED + ret );
276*4882a593Smuzhiyun 
277*4882a593Smuzhiyun     return( 0 );
278*4882a593Smuzhiyun }
279*4882a593Smuzhiyun 
280*4882a593Smuzhiyun /*
281*4882a593Smuzhiyun  * Generate or update blinding values, see section 10 of:
282*4882a593Smuzhiyun  *  KOCHER, Paul C. Timing attacks on implementations of Diffie-Hellman, RSA,
283*4882a593Smuzhiyun  *  DSS, and other systems. In : Advances in Cryptology-CRYPTO'96. Springer
284*4882a593Smuzhiyun  *  Berlin Heidelberg, 1996. p. 104-113.
285*4882a593Smuzhiyun  */
rsa_prepare_blinding(mbedtls_rsa_context * ctx,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)286*4882a593Smuzhiyun static int rsa_prepare_blinding( mbedtls_rsa_context *ctx,
287*4882a593Smuzhiyun                  int (*f_rng)(void *, unsigned char *, size_t), void *p_rng )
288*4882a593Smuzhiyun {
289*4882a593Smuzhiyun     int ret, count = 0;
290*4882a593Smuzhiyun 
291*4882a593Smuzhiyun     if( ctx->Vf.p != NULL )
292*4882a593Smuzhiyun     {
293*4882a593Smuzhiyun         /* We already have blinding values, just update them by squaring */
294*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &ctx->Vi, &ctx->Vi, &ctx->Vi ) );
295*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vi, &ctx->Vi, &ctx->N ) );
296*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &ctx->Vf, &ctx->Vf, &ctx->Vf ) );
297*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vf, &ctx->Vf, &ctx->N ) );
298*4882a593Smuzhiyun 
299*4882a593Smuzhiyun         goto cleanup;
300*4882a593Smuzhiyun     }
301*4882a593Smuzhiyun 
302*4882a593Smuzhiyun     /* Unblinding value: Vf = random number, invertible mod N */
303*4882a593Smuzhiyun     do {
304*4882a593Smuzhiyun         if( count++ > 10 )
305*4882a593Smuzhiyun             return( MBEDTLS_ERR_RSA_RNG_FAILED );
306*4882a593Smuzhiyun 
307*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &ctx->Vf, ctx->len - 1, f_rng, p_rng ) );
308*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_gcd( &ctx->Vi, &ctx->Vf, &ctx->N ) );
309*4882a593Smuzhiyun     } while( mbedtls_mpi_cmp_int( &ctx->Vi, 1 ) != 0 );
310*4882a593Smuzhiyun 
311*4882a593Smuzhiyun     /* Blinding value: Vi =  Vf^(-e) mod N */
312*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &ctx->Vi, &ctx->Vf, &ctx->N ) );
313*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->Vi, &ctx->Vi, &ctx->E, &ctx->N, &ctx->RN ) );
314*4882a593Smuzhiyun 
315*4882a593Smuzhiyun 
316*4882a593Smuzhiyun cleanup:
317*4882a593Smuzhiyun     return( ret );
318*4882a593Smuzhiyun }
319*4882a593Smuzhiyun 
320*4882a593Smuzhiyun /*
321*4882a593Smuzhiyun  * Do an RSA private key operation
322*4882a593Smuzhiyun  */
mbedtls_rsa_private(mbedtls_rsa_context * ctx,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng,const unsigned char * input,unsigned char * output)323*4882a593Smuzhiyun int mbedtls_rsa_private( mbedtls_rsa_context *ctx,
324*4882a593Smuzhiyun                  int (*f_rng)(void *, unsigned char *, size_t),
325*4882a593Smuzhiyun                  void *p_rng,
326*4882a593Smuzhiyun                  const unsigned char *input,
327*4882a593Smuzhiyun                  unsigned char *output )
328*4882a593Smuzhiyun {
329*4882a593Smuzhiyun     int ret;
330*4882a593Smuzhiyun     size_t olen;
331*4882a593Smuzhiyun     mbedtls_mpi T, T1, T2;
332*4882a593Smuzhiyun 
333*4882a593Smuzhiyun     /* Make sure we have private key info, prevent possible misuse */
334*4882a593Smuzhiyun     if( ctx->P.p == NULL || ctx->Q.p == NULL || ctx->D.p == NULL )
335*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_BAD_INPUT_DATA );
336*4882a593Smuzhiyun 
337*4882a593Smuzhiyun     mbedtls_mpi_init( &T ); mbedtls_mpi_init( &T1 ); mbedtls_mpi_init( &T2 );
338*4882a593Smuzhiyun 
339*4882a593Smuzhiyun #if defined(MBEDTLS_THREADING_C)
340*4882a593Smuzhiyun     if( ( ret = mbedtls_mutex_lock( &ctx->mutex ) ) != 0 )
341*4882a593Smuzhiyun         return( ret );
342*4882a593Smuzhiyun #endif
343*4882a593Smuzhiyun 
344*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &T, input, ctx->len ) );
345*4882a593Smuzhiyun     if( mbedtls_mpi_cmp_mpi( &T, &ctx->N ) >= 0 )
346*4882a593Smuzhiyun     {
347*4882a593Smuzhiyun         ret = MBEDTLS_ERR_MPI_BAD_INPUT_DATA;
348*4882a593Smuzhiyun         goto cleanup;
349*4882a593Smuzhiyun     }
350*4882a593Smuzhiyun 
351*4882a593Smuzhiyun     if( f_rng != NULL )
352*4882a593Smuzhiyun     {
353*4882a593Smuzhiyun         /*
354*4882a593Smuzhiyun          * Blinding
355*4882a593Smuzhiyun          * T = T * Vi mod N
356*4882a593Smuzhiyun          */
357*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( rsa_prepare_blinding( ctx, f_rng, p_rng ) );
358*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &T, &T, &ctx->Vi ) );
359*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &T, &T, &ctx->N ) );
360*4882a593Smuzhiyun     }
361*4882a593Smuzhiyun 
362*4882a593Smuzhiyun #if defined(MBEDTLS_RSA_NO_CRT)
363*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &T, &T, &ctx->D, &ctx->N, &ctx->RN ) );
364*4882a593Smuzhiyun #else
365*4882a593Smuzhiyun     /*
366*4882a593Smuzhiyun      * faster decryption using the CRT
367*4882a593Smuzhiyun      *
368*4882a593Smuzhiyun      * T1 = input ^ dP mod P
369*4882a593Smuzhiyun      * T2 = input ^ dQ mod Q
370*4882a593Smuzhiyun      */
371*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &T1, &T, &ctx->DP, &ctx->P, &ctx->RP ) );
372*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &T2, &T, &ctx->DQ, &ctx->Q, &ctx->RQ ) );
373*4882a593Smuzhiyun 
374*4882a593Smuzhiyun     /*
375*4882a593Smuzhiyun      * T = (T1 - T2) * (Q^-1 mod P) mod P
376*4882a593Smuzhiyun      */
377*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &T, &T1, &T2 ) );
378*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &T1, &T, &ctx->QP ) );
379*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &T, &T1, &ctx->P ) );
380*4882a593Smuzhiyun 
381*4882a593Smuzhiyun     /*
382*4882a593Smuzhiyun      * T = T2 + T * Q
383*4882a593Smuzhiyun      */
384*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &T1, &T, &ctx->Q ) );
385*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &T, &T2, &T1 ) );
386*4882a593Smuzhiyun #endif /* MBEDTLS_RSA_NO_CRT */
387*4882a593Smuzhiyun 
388*4882a593Smuzhiyun     if( f_rng != NULL )
389*4882a593Smuzhiyun     {
390*4882a593Smuzhiyun         /*
391*4882a593Smuzhiyun          * Unblind
392*4882a593Smuzhiyun          * T = T * Vf mod N
393*4882a593Smuzhiyun          */
394*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &T, &T, &ctx->Vf ) );
395*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &T, &T, &ctx->N ) );
396*4882a593Smuzhiyun     }
397*4882a593Smuzhiyun 
398*4882a593Smuzhiyun     olen = ctx->len;
399*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &T, output, olen ) );
400*4882a593Smuzhiyun 
401*4882a593Smuzhiyun cleanup:
402*4882a593Smuzhiyun #if defined(MBEDTLS_THREADING_C)
403*4882a593Smuzhiyun     if( mbedtls_mutex_unlock( &ctx->mutex ) != 0 )
404*4882a593Smuzhiyun         return( MBEDTLS_ERR_THREADING_MUTEX_ERROR );
405*4882a593Smuzhiyun #endif
406*4882a593Smuzhiyun 
407*4882a593Smuzhiyun     mbedtls_mpi_free( &T ); mbedtls_mpi_free( &T1 ); mbedtls_mpi_free( &T2 );
408*4882a593Smuzhiyun 
409*4882a593Smuzhiyun     if( ret != 0 )
410*4882a593Smuzhiyun         return( MBEDTLS_ERR_RSA_PRIVATE_FAILED + ret );
411*4882a593Smuzhiyun 
412*4882a593Smuzhiyun     return( 0 );
413*4882a593Smuzhiyun }
414*4882a593Smuzhiyun 
415*4882a593Smuzhiyun /*
416*4882a593Smuzhiyun  * Free the components of an RSA key
417*4882a593Smuzhiyun  */
mbedtls_rsa_free(mbedtls_rsa_context * ctx)418*4882a593Smuzhiyun void mbedtls_rsa_free( mbedtls_rsa_context *ctx )
419*4882a593Smuzhiyun {
420*4882a593Smuzhiyun     mbedtls_mpi_free( &ctx->Vi ); mbedtls_mpi_free( &ctx->Vf );
421*4882a593Smuzhiyun     mbedtls_mpi_free( &ctx->RQ ); mbedtls_mpi_free( &ctx->RP ); mbedtls_mpi_free( &ctx->RN );
422*4882a593Smuzhiyun     mbedtls_mpi_free( &ctx->QP ); mbedtls_mpi_free( &ctx->DQ ); mbedtls_mpi_free( &ctx->DP );
423*4882a593Smuzhiyun     mbedtls_mpi_free( &ctx->Q  ); mbedtls_mpi_free( &ctx->P  ); mbedtls_mpi_free( &ctx->D );
424*4882a593Smuzhiyun     mbedtls_mpi_free( &ctx->E  ); mbedtls_mpi_free( &ctx->N  );
425*4882a593Smuzhiyun 
426*4882a593Smuzhiyun #if defined(MBEDTLS_THREADING_C)
427*4882a593Smuzhiyun     mbedtls_mutex_free( &ctx->mutex );
428*4882a593Smuzhiyun #endif
429*4882a593Smuzhiyun }
430*4882a593Smuzhiyun 
rk_rsa_private(rsa_key_t * key,const unsigned char * input,unsigned char * output)431*4882a593Smuzhiyun int rk_rsa_private(rsa_key_t *key, const unsigned char *input, unsigned char *output)
432*4882a593Smuzhiyun {
433*4882a593Smuzhiyun     int ret = -1;
434*4882a593Smuzhiyun     mbedtls_rsa_context rsa;
435*4882a593Smuzhiyun 
436*4882a593Smuzhiyun     mbedtls_rsa_init( &rsa);
437*4882a593Smuzhiyun 
438*4882a593Smuzhiyun     rsa.len = key->key_len;
439*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.N , key->n, key->key_len) );
440*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.E , key->e, key->e_len) );
441*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.D , key->d, key->d_len) );
442*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.P , key->p, key->p_len  ) );
443*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.Q , key->q, key->q_len  ) );
444*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.DP, key->dp, key->dp_len  ));
445*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.DQ, key->dq, key->dq_len  ) );
446*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.QP, key->iq, key->iq_len) );
447*4882a593Smuzhiyun 
448*4882a593Smuzhiyun     if(mbedtls_rsa_check_privkey( &rsa ) != 0)
449*4882a593Smuzhiyun     {
450*4882a593Smuzhiyun         return -1;
451*4882a593Smuzhiyun     }
452*4882a593Smuzhiyun 
453*4882a593Smuzhiyun 	ret = mbedtls_rsa_private(&rsa, NULL, NULL, input, output);
454*4882a593Smuzhiyun 
455*4882a593Smuzhiyun 	ret = (ret==0)?0:-1;
456*4882a593Smuzhiyun cleanup:
457*4882a593Smuzhiyun 	mbedtls_rsa_free( &rsa );
458*4882a593Smuzhiyun 	return ret;
459*4882a593Smuzhiyun }
460*4882a593Smuzhiyun 
rk_rsa_public(rsa_key_t * key,const unsigned char * input,unsigned char * output)461*4882a593Smuzhiyun int rk_rsa_public(rsa_key_t *key, const unsigned char *input, unsigned char *output)
462*4882a593Smuzhiyun {
463*4882a593Smuzhiyun     int ret = -1;
464*4882a593Smuzhiyun     mbedtls_rsa_context rsa;
465*4882a593Smuzhiyun 
466*4882a593Smuzhiyun     mbedtls_rsa_init( &rsa);
467*4882a593Smuzhiyun 
468*4882a593Smuzhiyun     rsa.len = key->key_len;
469*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.N , key->n, key->key_len) );
470*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.E , key->e, key->e_len) );
471*4882a593Smuzhiyun 
472*4882a593Smuzhiyun     if(mbedtls_rsa_check_pubkey( &rsa ) != 0)
473*4882a593Smuzhiyun     {
474*4882a593Smuzhiyun         goto cleanup;
475*4882a593Smuzhiyun     }
476*4882a593Smuzhiyun 
477*4882a593Smuzhiyun 	ret = mbedtls_rsa_public(&rsa, input, output);
478*4882a593Smuzhiyun 	ret = (ret==0)?0:-1;
479*4882a593Smuzhiyun cleanup:
480*4882a593Smuzhiyun 	mbedtls_rsa_free( &rsa );
481*4882a593Smuzhiyun     return ret;
482*4882a593Smuzhiyun }
483*4882a593Smuzhiyun 
rk_rsa_public2(const mbed_rsa_key_t * key,const unsigned char * input,unsigned char * output)484*4882a593Smuzhiyun int rk_rsa_public2(const mbed_rsa_key_t *key, const unsigned char *input, unsigned char *output)
485*4882a593Smuzhiyun {
486*4882a593Smuzhiyun     int ret = -1;
487*4882a593Smuzhiyun     mbedtls_rsa_context rsa;
488*4882a593Smuzhiyun 
489*4882a593Smuzhiyun     mbedtls_rsa_init( &rsa);
490*4882a593Smuzhiyun 
491*4882a593Smuzhiyun     rsa.len = key->n_len;
492*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.N , key->n, key->n_len) );
493*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &rsa.E , key->e, key->e_len) );
494*4882a593Smuzhiyun 
495*4882a593Smuzhiyun     if(mbedtls_rsa_check_pubkey( &rsa ) != 0)
496*4882a593Smuzhiyun     {
497*4882a593Smuzhiyun         goto cleanup;
498*4882a593Smuzhiyun     }
499*4882a593Smuzhiyun 
500*4882a593Smuzhiyun 	ret = mbedtls_rsa_public(&rsa, input, output);
501*4882a593Smuzhiyun 	ret = (ret==0)?0:-1;
502*4882a593Smuzhiyun cleanup:
503*4882a593Smuzhiyun 	mbedtls_rsa_free( &rsa );
504*4882a593Smuzhiyun     return ret;
505*4882a593Smuzhiyun }
506*4882a593Smuzhiyun 
507*4882a593Smuzhiyun 
508