rsa_import.c 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081
  1. /* LibTomCrypt, modular cryptographic library -- Tom St Denis
  2. *
  3. * LibTomCrypt is a library that provides various cryptographic
  4. * algorithms in a highly modular and flexible manner.
  5. *
  6. * The library is free for all purposes without any express
  7. * guarantee it works.
  8. *
  9. * Tom St Denis, [email protected], http://libtomcrypt.org
  10. */
  11. #include "mycrypt.h"
  12. #ifdef MRSA
  13. int rsa_import(const unsigned char *in, unsigned long inlen, rsa_key *key)
  14. {
  15. unsigned long x, y;
  16. int err;
  17. _ARGCHK(in != NULL);
  18. _ARGCHK(key != NULL);
  19. /* check length */
  20. if (inlen < (1+PACKET_SIZE)) {
  21. return CRYPT_INVALID_PACKET;
  22. }
  23. /* test packet header */
  24. if ((err = packet_valid_header((unsigned char *)in, PACKET_SECT_RSA, PACKET_SUB_KEY)) != CRYPT_OK) {
  25. return err;
  26. }
  27. /* init key */
  28. if ((err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP,
  29. &key->pQ, &key->p, &key->q, NULL)) != MP_OKAY) {
  30. return mpi_to_ltc_error(err);
  31. }
  32. /* get key type */
  33. y = PACKET_SIZE;
  34. key->type = (int)in[y++];
  35. /* load the modulus */
  36. INPUT_BIGNUM(&key->N, in, x, y, inlen);
  37. /* load public exponent */
  38. INPUT_BIGNUM(&key->e, in, x, y, inlen);
  39. /* get private exponent */
  40. if (key->type == PK_PRIVATE || key->type == PK_PRIVATE_OPTIMIZED) {
  41. INPUT_BIGNUM(&key->d, in, x, y, inlen);
  42. }
  43. /* get CRT private data if required */
  44. if (key->type == PK_PRIVATE_OPTIMIZED) {
  45. INPUT_BIGNUM(&key->dQ, in, x, y, inlen);
  46. INPUT_BIGNUM(&key->dP, in, x, y, inlen);
  47. INPUT_BIGNUM(&key->pQ, in, x, y, inlen);
  48. INPUT_BIGNUM(&key->qP, in, x, y, inlen);
  49. INPUT_BIGNUM(&key->p, in, x, y, inlen);
  50. INPUT_BIGNUM(&key->q, in, x, y, inlen);
  51. }
  52. /* free up ram not required */
  53. if (key->type != PK_PRIVATE_OPTIMIZED) {
  54. mp_clear_multi(&key->dQ, &key->dP, &key->pQ, &key->qP, &key->p, &key->q, NULL);
  55. }
  56. if (key->type != PK_PRIVATE && key->type != PK_PRIVATE_OPTIMIZED) {
  57. mp_clear(&key->d);
  58. }
  59. return CRYPT_OK;
  60. error:
  61. mp_clear_multi(&key->d, &key->e, &key->N, &key->dQ, &key->dP,
  62. &key->pQ, &key->qP, &key->p, &key->q, NULL);
  63. return err;
  64. }
  65. #endif /* MRSA */