blob: 0462ba697385ce39c5b1d39e5e37d4641e02e108 [file] [log] [blame]
Paul Bakker7bc05ff2011-08-09 10:30:36 +00001/*
2 * RSA simple decryption program
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Paul Bakker7bc05ff2011-08-09 10:30:36 +000018 */
19
Bence Szépkútic662b362021-05-27 11:25:03 +020020#include "mbedtls/build_info.h"
Paul Bakker7bc05ff2011-08-09 10:30:36 +000021
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000022#include "mbedtls/platform.h"
Rich Evansf90016a2015-01-19 14:26:37 +000023
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020024#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_RSA_C) && \
25 defined(MBEDTLS_FS_IO) && defined(MBEDTLS_ENTROPY_C) && \
26 defined(MBEDTLS_CTR_DRBG_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000027#include "mbedtls/rsa.h"
28#include "mbedtls/entropy.h"
29#include "mbedtls/ctr_drbg.h"
Paul Bakker7bc05ff2011-08-09 10:30:36 +000030
Rich Evans18b78c72015-02-11 14:06:19 +000031#include <string.h>
Simon Butcher6b46c622016-04-12 13:25:08 +010032
Rich Evans18b78c72015-02-11 14:06:19 +000033#endif
34
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020035#if !defined(MBEDTLS_BIGNUM_C) || !defined(MBEDTLS_RSA_C) || \
36 !defined(MBEDTLS_FS_IO) || !defined(MBEDTLS_ENTROPY_C) || \
37 !defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010038int main(void)
Paul Bakker7bc05ff2011-08-09 10:30:36 +000039{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020040 mbedtls_printf("MBEDTLS_BIGNUM_C and/or MBEDTLS_RSA_C and/or "
Gilles Peskine449bd832023-01-11 14:50:10 +010041 "MBEDTLS_FS_IO and/or MBEDTLS_ENTROPY_C and/or "
42 "MBEDTLS_CTR_DRBG_C not defined.\n");
43 mbedtls_exit(0);
Paul Bakker7bc05ff2011-08-09 10:30:36 +000044}
45#else
Simon Butcher63cb97e2018-12-06 17:43:31 +000046
Simon Butcher63cb97e2018-12-06 17:43:31 +000047
Gilles Peskine449bd832023-01-11 14:50:10 +010048int main(int argc, char *argv[])
Paul Bakker7bc05ff2011-08-09 10:30:36 +000049{
50 FILE *f;
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +010051 int ret = 1;
52 int exit_code = MBEDTLS_EXIT_FAILURE;
Gilles Peskinea5fc9392020-04-14 19:34:19 +020053 unsigned c;
Paul Bakker7bc05ff2011-08-09 10:30:36 +000054 size_t i;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055 mbedtls_rsa_context rsa;
Hanno Beckerccef18c2017-08-23 06:46:45 +010056 mbedtls_mpi N, P, Q, D, E, DP, DQ, QP;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020057 mbedtls_entropy_context entropy;
58 mbedtls_ctr_drbg_context ctr_drbg;
Paul Bakker7bc05ff2011-08-09 10:30:36 +000059 unsigned char result[1024];
60 unsigned char buf[512];
Paul Bakker548957d2013-08-30 10:30:02 +020061 const char *pers = "rsa_decrypt";
Paul Bakker7bc05ff2011-08-09 10:30:36 +000062 ((void) argv);
63
Gilles Peskine449bd832023-01-11 14:50:10 +010064 memset(result, 0, sizeof(result));
Paul Bakker310c25e2011-12-04 17:06:56 +000065
Gilles Peskine449bd832023-01-11 14:50:10 +010066 if (argc != 1) {
67 mbedtls_printf("usage: rsa_decrypt\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +000068
Paul Bakkercce9d772011-11-18 14:26:47 +000069#if defined(_WIN32)
Gilles Peskine449bd832023-01-11 14:50:10 +010070 mbedtls_printf("\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +000071#endif
72
Gilles Peskine449bd832023-01-11 14:50:10 +010073 mbedtls_exit(exit_code);
Paul Bakker7bc05ff2011-08-09 10:30:36 +000074 }
75
Gilles Peskine449bd832023-01-11 14:50:10 +010076 mbedtls_printf("\n . Seeding the random number generator...");
77 fflush(stdout);
Paul Bakker548957d2013-08-30 10:30:02 +020078
Gilles Peskine449bd832023-01-11 14:50:10 +010079 mbedtls_rsa_init(&rsa);
80 mbedtls_ctr_drbg_init(&ctr_drbg);
81 mbedtls_entropy_init(&entropy);
82 mbedtls_mpi_init(&N); mbedtls_mpi_init(&P); mbedtls_mpi_init(&Q);
83 mbedtls_mpi_init(&D); mbedtls_mpi_init(&E); mbedtls_mpi_init(&DP);
84 mbedtls_mpi_init(&DQ); mbedtls_mpi_init(&QP);
Simon Butcher6b46c622016-04-12 13:25:08 +010085
Gilles Peskine449bd832023-01-11 14:50:10 +010086 ret = mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func,
87 &entropy, (const unsigned char *) pers,
88 strlen(pers));
89 if (ret != 0) {
90 mbedtls_printf(" failed\n ! mbedtls_ctr_drbg_seed returned %d\n",
91 ret);
Paul Bakker548957d2013-08-30 10:30:02 +020092 goto exit;
93 }
94
Gilles Peskine449bd832023-01-11 14:50:10 +010095 mbedtls_printf("\n . Reading private key from rsa_priv.txt");
96 fflush(stdout);
Paul Bakker7bc05ff2011-08-09 10:30:36 +000097
Gilles Peskine449bd832023-01-11 14:50:10 +010098 if ((f = fopen("rsa_priv.txt", "rb")) == NULL) {
99 mbedtls_printf(" failed\n ! Could not open rsa_priv.txt\n" \
100 " ! Please run rsa_genkey first\n\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000101 goto exit;
102 }
103
Gilles Peskine449bd832023-01-11 14:50:10 +0100104 if ((ret = mbedtls_mpi_read_file(&N, 16, f)) != 0 ||
105 (ret = mbedtls_mpi_read_file(&E, 16, f)) != 0 ||
106 (ret = mbedtls_mpi_read_file(&D, 16, f)) != 0 ||
107 (ret = mbedtls_mpi_read_file(&P, 16, f)) != 0 ||
108 (ret = mbedtls_mpi_read_file(&Q, 16, f)) != 0 ||
109 (ret = mbedtls_mpi_read_file(&DP, 16, f)) != 0 ||
110 (ret = mbedtls_mpi_read_file(&DQ, 16, f)) != 0 ||
111 (ret = mbedtls_mpi_read_file(&QP, 16, f)) != 0) {
112 mbedtls_printf(" failed\n ! mbedtls_mpi_read_file returned %d\n\n",
113 ret);
114 fclose(f);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000115 goto exit;
116 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100117 fclose(f);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000118
Gilles Peskine449bd832023-01-11 14:50:10 +0100119 if ((ret = mbedtls_rsa_import(&rsa, &N, &P, &Q, &D, &E)) != 0) {
120 mbedtls_printf(" failed\n ! mbedtls_rsa_import returned %d\n\n",
121 ret);
Hanno Beckerccef18c2017-08-23 06:46:45 +0100122 goto exit;
123 }
124
Gilles Peskine449bd832023-01-11 14:50:10 +0100125 if ((ret = mbedtls_rsa_complete(&rsa)) != 0) {
126 mbedtls_printf(" failed\n ! mbedtls_rsa_complete returned %d\n\n",
127 ret);
Hanno Beckerccef18c2017-08-23 06:46:45 +0100128 goto exit;
129 }
130
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000131 /*
132 * Extract the RSA encrypted value from the text file
133 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100134 if ((f = fopen("result-enc.txt", "rb")) == NULL) {
135 mbedtls_printf("\n ! Could not open %s\n\n", "result-enc.txt");
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000136 goto exit;
137 }
138
139 i = 0;
140
Gilles Peskine449bd832023-01-11 14:50:10 +0100141 while (fscanf(f, "%02X", (unsigned int *) &c) > 0 &&
142 i < (int) sizeof(buf)) {
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000143 buf[i++] = (unsigned char) c;
Gilles Peskine449bd832023-01-11 14:50:10 +0100144 }
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000145
Gilles Peskine449bd832023-01-11 14:50:10 +0100146 fclose(f);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000147
Gilles Peskine449bd832023-01-11 14:50:10 +0100148 if (i != rsa.MBEDTLS_PRIVATE(len)) {
149 mbedtls_printf("\n ! Invalid RSA signature format\n\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000150 goto exit;
151 }
152
153 /*
154 * Decrypt the encrypted RSA data and print the result.
155 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100156 mbedtls_printf("\n . Decrypting the encrypted data");
157 fflush(stdout);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000158
Gilles Peskine449bd832023-01-11 14:50:10 +0100159 ret = mbedtls_rsa_pkcs1_decrypt(&rsa, mbedtls_ctr_drbg_random,
160 &ctr_drbg, &i,
161 buf, result, 1024);
162 if (ret != 0) {
163 mbedtls_printf(" failed\n ! mbedtls_rsa_pkcs1_decrypt returned %d\n\n",
164 ret);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000165 goto exit;
166 }
167
Gilles Peskine449bd832023-01-11 14:50:10 +0100168 mbedtls_printf("\n . OK\n\n");
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000169
Gilles Peskine449bd832023-01-11 14:50:10 +0100170 mbedtls_printf("The decrypted result is: '%s'\n\n", result);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000171
Andres Amaya Garcia7fe4edf2018-04-30 22:07:15 +0100172 exit_code = MBEDTLS_EXIT_SUCCESS;
173
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000174exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100175 mbedtls_ctr_drbg_free(&ctr_drbg);
176 mbedtls_entropy_free(&entropy);
177 mbedtls_rsa_free(&rsa);
178 mbedtls_mpi_free(&N); mbedtls_mpi_free(&P); mbedtls_mpi_free(&Q);
179 mbedtls_mpi_free(&D); mbedtls_mpi_free(&E); mbedtls_mpi_free(&DP);
180 mbedtls_mpi_free(&DQ); mbedtls_mpi_free(&QP);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000181
Gilles Peskine449bd832023-01-11 14:50:10 +0100182 mbedtls_exit(exit_code);
Paul Bakker7bc05ff2011-08-09 10:30:36 +0000183}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200184#endif /* MBEDTLS_BIGNUM_C && MBEDTLS_RSA_C && MBEDTLS_FS_IO */