| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081 |
- /* LibTomCrypt, modular cryptographic library -- Tom St Denis
- *
- * LibTomCrypt is a library that provides various cryptographic
- * algorithms in a highly modular and flexible manner.
- *
- * The library is free for all purposes without any express
- * guarantee it works.
- *
- * Tom St Denis, [email protected], http://libtomcrypt.org
- */
- #include "mycrypt.h"
- #ifdef MRSA
- int rsa_import(const unsigned char *in, unsigned long inlen, rsa_key *key)
- {
- unsigned long x, y;
- int err;
- _ARGCHK(in != NULL);
- _ARGCHK(key != NULL);
- /* check length */
- if (inlen < (1+PACKET_SIZE)) {
- return CRYPT_INVALID_PACKET;
- }
- /* test packet header */
- if ((err = packet_valid_header((unsigned char *)in, PACKET_SECT_RSA, PACKET_SUB_KEY)) != CRYPT_OK) {
- return err;
- }
- /* init key */
- if ((err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP,
- &key->pQ, &key->p, &key->q, NULL)) != MP_OKAY) {
- return mpi_to_ltc_error(err);
- }
- /* get key type */
- y = PACKET_SIZE;
- key->type = (int)in[y++];
- /* load the modulus */
- INPUT_BIGNUM(&key->N, in, x, y, inlen);
- /* load public exponent */
- INPUT_BIGNUM(&key->e, in, x, y, inlen);
- /* get private exponent */
- if (key->type == PK_PRIVATE || key->type == PK_PRIVATE_OPTIMIZED) {
- INPUT_BIGNUM(&key->d, in, x, y, inlen);
- }
- /* get CRT private data if required */
- if (key->type == PK_PRIVATE_OPTIMIZED) {
- INPUT_BIGNUM(&key->dQ, in, x, y, inlen);
- INPUT_BIGNUM(&key->dP, in, x, y, inlen);
- INPUT_BIGNUM(&key->pQ, in, x, y, inlen);
- INPUT_BIGNUM(&key->qP, in, x, y, inlen);
- INPUT_BIGNUM(&key->p, in, x, y, inlen);
- INPUT_BIGNUM(&key->q, in, x, y, inlen);
- }
- /* free up ram not required */
- if (key->type != PK_PRIVATE_OPTIMIZED) {
- mp_clear_multi(&key->dQ, &key->dP, &key->pQ, &key->qP, &key->p, &key->q, NULL);
- }
- if (key->type != PK_PRIVATE && key->type != PK_PRIVATE_OPTIMIZED) {
- mp_clear(&key->d);
- }
- return CRYPT_OK;
- error:
- mp_clear_multi(&key->d, &key->e, &key->N, &key->dQ, &key->dP,
- &key->pQ, &key->qP, &key->p, &key->q, NULL);
- return err;
- }
- #endif /* MRSA */
|