blob: 783f3ca5492923a8707247350aff7741cf9a5861 [file] [log] [blame]
Paul Bakker7bc05ff2011-08-09 10:30:36 +00001/*
2 * RSA simple decryption program
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Paul Bakker7bc05ff2011-08-09 10:30:36 +000018 */
19
Bence Szépkútic662b362021-05-27 11:25:03 +020020#include "mbedtls/build_info.h"
Paul Bakker7bc05ff2011-08-09 10:30:36 +000021
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000022#include "mbedtls/platform.h"
Rich Evansf90016a2015-01-19 14:26:37 +000023
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020024#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_RSA_C) && \
25 defined(MBEDTLS_FS_IO) && defined(MBEDTLS_ENTROPY_C) && \
26 defined(MBEDTLS_CTR_DRBG_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000027#include "mbedtls/rsa.h"
28#include "mbedtls/entropy.h"
29#include "mbedtls/ctr_drbg.h"
Paul Bakker7bc05ff2011-08-09 10:30:36 +000030
Rich Evans18b78c72015-02-11 14:06:19 +000031#include <string.h>
Simon Butcher6b46c622016-04-12 13:25:08 +010032
Rich Evans18b78c72015-02-11 14:06:19 +000033#endif
34
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020035#if !defined(MBEDTLS_BIGNUM_C) || !defined(MBEDTLS_RSA_C) || \
36 !defined(MBEDTLS_FS_IO) || !defined(MBEDTLS_ENTROPY_C) || \
37 !defined(MBEDTLS_CTR_DRBG_C)
Rich Evans85b05ec2015-02-12 11:37:29 +000038int main( void )
Paul Bakker7bc05ff2011-08-09 10:30:36 +000039{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020040 mbedtls_printf("MBEDTLS_BIGNUM_C and/or MBEDTLS_RSA_C and/or "
41 "MBEDTLS_FS_IO and/or MBEDTLS_ENTROPY_C and/or "
42 "MBEDTLS_CTR_DRBG_C not defined.\n");
Krzysztof Stachowiak5e1b1952019-04-24 14:24:46 +020043 mbedtls_exit( 0 );
Paul Bakker7bc05ff2011-08-09 10:30:36 +000044}
45#else
Simon Butcher63cb97e2018-12-06 17:43:31 +000046
Simon Butcher63cb97e2018-12-06 17:43:31 +000047
Paul Bakker7bc05ff2011-08-09 10:30:36 +000048int main( int argc, char *argv[] )
49{
50 FILE *f;
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +010051 int ret = 1;
52 int exit_code = MBEDTLS_EXIT_FAILURE;
Gilles Peskinea5fc9392020-04-14 19:34:19 +020053 unsigned c;
Paul Bakker7bc05ff2011-08-09 10:30:36 +000054 size_t i;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055 mbedtls_rsa_context rsa;
Hanno Beckerccef18c2017-08-23 06:46:45 +010056 mbedtls_mpi N, P, Q, D, E, DP, DQ, QP;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020057 mbedtls_entropy_context entropy;
58 mbedtls_ctr_drbg_context ctr_drbg;
Paul Bakker7bc05ff2011-08-09 10:30:36 +000059 unsigned char result[1024];
60 unsigned char buf[512];
Paul Bakker548957d2013-08-30 10:30:02 +020061 const char *pers = "rsa_decrypt";
Paul Bakker7bc05ff2011-08-09 10:30:36 +000062 ((void) argv);
63
Paul Bakker310c25e2011-12-04 17:06:56 +000064 memset(result, 0, sizeof( result ) );
Paul Bakker310c25e2011-12-04 17:06:56 +000065
Paul Bakker7bc05ff2011-08-09 10:30:36 +000066 if( argc != 1 )
67 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020068 mbedtls_printf( "usage: rsa_decrypt\n" );
Paul Bakker7bc05ff2011-08-09 10:30:36 +000069
Paul Bakkercce9d772011-11-18 14:26:47 +000070#if defined(_WIN32)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020071 mbedtls_printf( "\n" );
Paul Bakker7bc05ff2011-08-09 10:30:36 +000072#endif
73
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +010074 mbedtls_exit( exit_code );
Paul Bakker7bc05ff2011-08-09 10:30:36 +000075 }
76
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020077 mbedtls_printf( "\n . Seeding the random number generator..." );
Paul Bakker548957d2013-08-30 10:30:02 +020078 fflush( stdout );
79
Ronald Cronc1905a12021-06-05 11:11:14 +020080 mbedtls_rsa_init( &rsa );
Simon Butcher6b46c622016-04-12 13:25:08 +010081 mbedtls_ctr_drbg_init( &ctr_drbg );
82 mbedtls_entropy_init( &entropy );
Hanno Beckerccef18c2017-08-23 06:46:45 +010083 mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P ); mbedtls_mpi_init( &Q );
84 mbedtls_mpi_init( &D ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &DP );
85 mbedtls_mpi_init( &DQ ); mbedtls_mpi_init( &QP );
Simon Butcher6b46c622016-04-12 13:25:08 +010086
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +010087 ret = mbedtls_ctr_drbg_seed( &ctr_drbg, mbedtls_entropy_func,
Simon Butcher6b46c622016-04-12 13:25:08 +010088 &entropy, (const unsigned char *) pers,
89 strlen( pers ) );
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +010090 if( ret != 0 )
Paul Bakker548957d2013-08-30 10:30:02 +020091 {
Simon Butcher6b46c622016-04-12 13:25:08 +010092 mbedtls_printf( " failed\n ! mbedtls_ctr_drbg_seed returned %d\n",
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +010093 ret );
Paul Bakker548957d2013-08-30 10:30:02 +020094 goto exit;
95 }
96
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020097 mbedtls_printf( "\n . Reading private key from rsa_priv.txt" );
Paul Bakker7bc05ff2011-08-09 10:30:36 +000098 fflush( stdout );
99
Paul Bakkerd246ed32011-10-06 13:18:27 +0000100 if( ( f = fopen( "rsa_priv.txt", "rb" ) ) == NULL )
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000101 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200102 mbedtls_printf( " failed\n ! Could not open rsa_priv.txt\n" \
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000103 " ! Please run rsa_genkey first\n\n" );
104 goto exit;
105 }
106
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100107 if( ( ret = mbedtls_mpi_read_file( &N , 16, f ) ) != 0 ||
108 ( ret = mbedtls_mpi_read_file( &E , 16, f ) ) != 0 ||
109 ( ret = mbedtls_mpi_read_file( &D , 16, f ) ) != 0 ||
110 ( ret = mbedtls_mpi_read_file( &P , 16, f ) ) != 0 ||
111 ( ret = mbedtls_mpi_read_file( &Q , 16, f ) ) != 0 ||
112 ( ret = mbedtls_mpi_read_file( &DP , 16, f ) ) != 0 ||
113 ( ret = mbedtls_mpi_read_file( &DQ , 16, f ) ) != 0 ||
114 ( ret = mbedtls_mpi_read_file( &QP , 16, f ) ) != 0 )
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000115 {
Simon Butcher6b46c622016-04-12 13:25:08 +0100116 mbedtls_printf( " failed\n ! mbedtls_mpi_read_file returned %d\n\n",
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100117 ret );
Janos Follath98e28a72016-05-31 14:03:54 +0100118 fclose( f );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000119 goto exit;
120 }
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000121 fclose( f );
122
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100123 if( ( ret = mbedtls_rsa_import( &rsa, &N, &P, &Q, &D, &E ) ) != 0 )
Hanno Beckerccef18c2017-08-23 06:46:45 +0100124 {
125 mbedtls_printf( " failed\n ! mbedtls_rsa_import returned %d\n\n",
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100126 ret );
Hanno Beckerccef18c2017-08-23 06:46:45 +0100127 goto exit;
128 }
129
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100130 if( ( ret = mbedtls_rsa_complete( &rsa ) ) != 0 )
Hanno Beckerccef18c2017-08-23 06:46:45 +0100131 {
132 mbedtls_printf( " failed\n ! mbedtls_rsa_complete returned %d\n\n",
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100133 ret );
Hanno Beckerccef18c2017-08-23 06:46:45 +0100134 goto exit;
135 }
136
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000137 /*
138 * Extract the RSA encrypted value from the text file
139 */
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000140 if( ( f = fopen( "result-enc.txt", "rb" ) ) == NULL )
141 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200142 mbedtls_printf( "\n ! Could not open %s\n\n", "result-enc.txt" );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000143 goto exit;
144 }
145
146 i = 0;
147
Kenneth Soerensen518d4352020-04-01 17:22:45 +0200148 while( fscanf( f, "%02X", (unsigned int*) &c ) > 0 &&
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000149 i < (int) sizeof( buf ) )
150 buf[i++] = (unsigned char) c;
151
152 fclose( f );
153
Mateusz Starzyk5dd4f6e2021-05-19 19:35:35 +0200154 if( i != rsa.MBEDTLS_PRIVATE(len) )
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000155 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200156 mbedtls_printf( "\n ! Invalid RSA signature format\n\n" );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000157 goto exit;
158 }
159
160 /*
161 * Decrypt the encrypted RSA data and print the result.
162 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200163 mbedtls_printf( "\n . Decrypting the encrypted data" );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000164 fflush( stdout );
165
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100166 ret = mbedtls_rsa_pkcs1_decrypt( &rsa, mbedtls_ctr_drbg_random,
Thomas Daubneyc7feaf32021-05-07 14:02:43 +0100167 &ctr_drbg, &i,
Simon Butcher6b46c622016-04-12 13:25:08 +0100168 buf, result, 1024 );
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100169 if( ret != 0 )
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000170 {
Simon Butcher6b46c622016-04-12 13:25:08 +0100171 mbedtls_printf( " failed\n ! mbedtls_rsa_pkcs1_decrypt returned %d\n\n",
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100172 ret );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000173 goto exit;
174 }
175
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200176 mbedtls_printf( "\n . OK\n\n" );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000177
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200178 mbedtls_printf( "The decrypted result is: '%s'\n\n", result );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000179
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100180 exit_code = MBEDTLS_EXIT_SUCCESS;
181
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000182exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200183 mbedtls_ctr_drbg_free( &ctr_drbg );
184 mbedtls_entropy_free( &entropy );
Janos Follathf713b0a2016-03-17 15:21:39 +0000185 mbedtls_rsa_free( &rsa );
Hanno Beckerccef18c2017-08-23 06:46:45 +0100186 mbedtls_mpi_free( &N ); mbedtls_mpi_free( &P ); mbedtls_mpi_free( &Q );
187 mbedtls_mpi_free( &D ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &DP );
188 mbedtls_mpi_free( &DQ ); mbedtls_mpi_free( &QP );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000189
Krzysztof Stachowiak5e1b1952019-04-24 14:24:46 +0200190 mbedtls_exit( exit_code );
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000191}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200192#endif /* MBEDTLS_BIGNUM_C && MBEDTLS_RSA_C && MBEDTLS_FS_IO */