blob: c2c313ac1a7944962508618752764b6b463d220d [file] [log] [blame]
Paul Bakker7bc05ff2011-08-09 10:30:36 +00001/*
2 * RSA simple decryption program
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00005 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Paul Bakker7bc05ff2011-08-09 10:30:36 +00006 */
7
Felix Conway998760a2025-03-24 11:37:33 +00008#define MBEDTLS_DECLARE_PRIVATE_IDENTIFIERS
9
Bence Szépkútic662b362021-05-27 11:25:03 +020010#include "mbedtls/build_info.h"
Paul Bakker7bc05ff2011-08-09 10:30:36 +000011
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000012#include "mbedtls/platform.h"
Rich Evansf90016a2015-01-19 14:26:37 +000013
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020014#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_RSA_C) && \
15 defined(MBEDTLS_FS_IO) && defined(MBEDTLS_ENTROPY_C) && \
16 defined(MBEDTLS_CTR_DRBG_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000017#include "mbedtls/rsa.h"
18#include "mbedtls/entropy.h"
19#include "mbedtls/ctr_drbg.h"
Paul Bakker7bc05ff2011-08-09 10:30:36 +000020
Rich Evans18b78c72015-02-11 14:06:19 +000021#include <string.h>
Simon Butcher6b46c622016-04-12 13:25:08 +010022
Rich Evans18b78c72015-02-11 14:06:19 +000023#endif
24
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020025#if !defined(MBEDTLS_BIGNUM_C) || !defined(MBEDTLS_RSA_C) || \
26 !defined(MBEDTLS_FS_IO) || !defined(MBEDTLS_ENTROPY_C) || \
27 !defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010028int main(void)
Paul Bakker7bc05ff2011-08-09 10:30:36 +000029{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020030 mbedtls_printf("MBEDTLS_BIGNUM_C and/or MBEDTLS_RSA_C and/or "
Gilles Peskine449bd832023-01-11 14:50:10 +010031 "MBEDTLS_FS_IO and/or MBEDTLS_ENTROPY_C and/or "
32 "MBEDTLS_CTR_DRBG_C not defined.\n");
33 mbedtls_exit(0);
Paul Bakker7bc05ff2011-08-09 10:30:36 +000034}
35#else
Simon Butcher63cb97e2018-12-06 17:43:31 +000036
Simon Butcher63cb97e2018-12-06 17:43:31 +000037
Gilles Peskine449bd832023-01-11 14:50:10 +010038int main(int argc, char *argv[])
Paul Bakker7bc05ff2011-08-09 10:30:36 +000039{
40 FILE *f;
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +010041 int ret = 1;
42 int exit_code = MBEDTLS_EXIT_FAILURE;
Gilles Peskinea5fc9392020-04-14 19:34:19 +020043 unsigned c;
Paul Bakker7bc05ff2011-08-09 10:30:36 +000044 size_t i;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020045 mbedtls_rsa_context rsa;
Hanno Beckerccef18c2017-08-23 06:46:45 +010046 mbedtls_mpi N, P, Q, D, E, DP, DQ, QP;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020047 mbedtls_entropy_context entropy;
48 mbedtls_ctr_drbg_context ctr_drbg;
Paul Bakker7bc05ff2011-08-09 10:30:36 +000049 unsigned char result[1024];
50 unsigned char buf[512];
Paul Bakker548957d2013-08-30 10:30:02 +020051 const char *pers = "rsa_decrypt";
Paul Bakker7bc05ff2011-08-09 10:30:36 +000052 ((void) argv);
53
Gilles Peskine449bd832023-01-11 14:50:10 +010054 memset(result, 0, sizeof(result));
Paul Bakker310c25e2011-12-04 17:06:56 +000055
Gilles Peskine449bd832023-01-11 14:50:10 +010056 if (argc != 1) {
57 mbedtls_printf("usage: rsa_decrypt\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +000058
Paul Bakkercce9d772011-11-18 14:26:47 +000059#if defined(_WIN32)
Gilles Peskine449bd832023-01-11 14:50:10 +010060 mbedtls_printf("\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +000061#endif
62
Gilles Peskine449bd832023-01-11 14:50:10 +010063 mbedtls_exit(exit_code);
Paul Bakker7bc05ff2011-08-09 10:30:36 +000064 }
65
Gilles Peskine449bd832023-01-11 14:50:10 +010066 mbedtls_printf("\n . Seeding the random number generator...");
67 fflush(stdout);
Paul Bakker548957d2013-08-30 10:30:02 +020068
Gilles Peskine449bd832023-01-11 14:50:10 +010069 mbedtls_rsa_init(&rsa);
70 mbedtls_ctr_drbg_init(&ctr_drbg);
71 mbedtls_entropy_init(&entropy);
72 mbedtls_mpi_init(&N); mbedtls_mpi_init(&P); mbedtls_mpi_init(&Q);
73 mbedtls_mpi_init(&D); mbedtls_mpi_init(&E); mbedtls_mpi_init(&DP);
74 mbedtls_mpi_init(&DQ); mbedtls_mpi_init(&QP);
Simon Butcher6b46c622016-04-12 13:25:08 +010075
Gilles Peskine449bd832023-01-11 14:50:10 +010076 ret = mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func,
77 &entropy, (const unsigned char *) pers,
78 strlen(pers));
79 if (ret != 0) {
80 mbedtls_printf(" failed\n ! mbedtls_ctr_drbg_seed returned %d\n",
81 ret);
Paul Bakker548957d2013-08-30 10:30:02 +020082 goto exit;
83 }
84
Gilles Peskine449bd832023-01-11 14:50:10 +010085 mbedtls_printf("\n . Reading private key from rsa_priv.txt");
86 fflush(stdout);
Paul Bakker7bc05ff2011-08-09 10:30:36 +000087
Gilles Peskine449bd832023-01-11 14:50:10 +010088 if ((f = fopen("rsa_priv.txt", "rb")) == NULL) {
89 mbedtls_printf(" failed\n ! Could not open rsa_priv.txt\n" \
90 " ! Please run rsa_genkey first\n\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +000091 goto exit;
92 }
93
Gilles Peskine449bd832023-01-11 14:50:10 +010094 if ((ret = mbedtls_mpi_read_file(&N, 16, f)) != 0 ||
95 (ret = mbedtls_mpi_read_file(&E, 16, f)) != 0 ||
96 (ret = mbedtls_mpi_read_file(&D, 16, f)) != 0 ||
97 (ret = mbedtls_mpi_read_file(&P, 16, f)) != 0 ||
98 (ret = mbedtls_mpi_read_file(&Q, 16, f)) != 0 ||
99 (ret = mbedtls_mpi_read_file(&DP, 16, f)) != 0 ||
100 (ret = mbedtls_mpi_read_file(&DQ, 16, f)) != 0 ||
101 (ret = mbedtls_mpi_read_file(&QP, 16, f)) != 0) {
102 mbedtls_printf(" failed\n ! mbedtls_mpi_read_file returned %d\n\n",
103 ret);
104 fclose(f);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000105 goto exit;
106 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100107 fclose(f);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000108
Gilles Peskine449bd832023-01-11 14:50:10 +0100109 if ((ret = mbedtls_rsa_import(&rsa, &N, &P, &Q, &D, &E)) != 0) {
110 mbedtls_printf(" failed\n ! mbedtls_rsa_import returned %d\n\n",
111 ret);
Hanno Beckerccef18c2017-08-23 06:46:45 +0100112 goto exit;
113 }
114
Gilles Peskine449bd832023-01-11 14:50:10 +0100115 if ((ret = mbedtls_rsa_complete(&rsa)) != 0) {
116 mbedtls_printf(" failed\n ! mbedtls_rsa_complete returned %d\n\n",
117 ret);
Hanno Beckerccef18c2017-08-23 06:46:45 +0100118 goto exit;
119 }
120
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000121 /*
122 * Extract the RSA encrypted value from the text file
123 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100124 if ((f = fopen("result-enc.txt", "rb")) == NULL) {
125 mbedtls_printf("\n ! Could not open %s\n\n", "result-enc.txt");
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000126 goto exit;
127 }
128
129 i = 0;
130
Gilles Peskine449bd832023-01-11 14:50:10 +0100131 while (fscanf(f, "%02X", (unsigned int *) &c) > 0 &&
132 i < (int) sizeof(buf)) {
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000133 buf[i++] = (unsigned char) c;
Gilles Peskine449bd832023-01-11 14:50:10 +0100134 }
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000135
Gilles Peskine449bd832023-01-11 14:50:10 +0100136 fclose(f);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000137
Minos Galanakisee757d32024-01-12 15:06:20 +0000138 if (i != mbedtls_rsa_get_len(&rsa)) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100139 mbedtls_printf("\n ! Invalid RSA signature format\n\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000140 goto exit;
141 }
142
143 /*
144 * Decrypt the encrypted RSA data and print the result.
145 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100146 mbedtls_printf("\n . Decrypting the encrypted data");
147 fflush(stdout);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000148
Gilles Peskine449bd832023-01-11 14:50:10 +0100149 ret = mbedtls_rsa_pkcs1_decrypt(&rsa, mbedtls_ctr_drbg_random,
150 &ctr_drbg, &i,
151 buf, result, 1024);
152 if (ret != 0) {
153 mbedtls_printf(" failed\n ! mbedtls_rsa_pkcs1_decrypt returned %d\n\n",
154 ret);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000155 goto exit;
156 }
157
Gilles Peskine449bd832023-01-11 14:50:10 +0100158 mbedtls_printf("\n . OK\n\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000159
Gilles Peskine449bd832023-01-11 14:50:10 +0100160 mbedtls_printf("The decrypted result is: '%s'\n\n", result);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000161
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100162 exit_code = MBEDTLS_EXIT_SUCCESS;
163
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000164exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100165 mbedtls_ctr_drbg_free(&ctr_drbg);
166 mbedtls_entropy_free(&entropy);
167 mbedtls_rsa_free(&rsa);
168 mbedtls_mpi_free(&N); mbedtls_mpi_free(&P); mbedtls_mpi_free(&Q);
169 mbedtls_mpi_free(&D); mbedtls_mpi_free(&E); mbedtls_mpi_free(&DP);
170 mbedtls_mpi_free(&DQ); mbedtls_mpi_free(&QP);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000171
Gilles Peskine449bd832023-01-11 14:50:10 +0100172 mbedtls_exit(exit_code);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000173}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200174#endif /* MBEDTLS_BIGNUM_C && MBEDTLS_RSA_C && MBEDTLS_FS_IO */