Path: blob/main/contrib/bearssl/src/rsa/rsa_i32_pub.c
39488 views
/*1* Copyright (c) 2016 Thomas Pornin <[email protected]>2*3* Permission is hereby granted, free of charge, to any person obtaining4* a copy of this software and associated documentation files (the5* "Software"), to deal in the Software without restriction, including6* without limitation the rights to use, copy, modify, merge, publish,7* distribute, sublicense, and/or sell copies of the Software, and to8* permit persons to whom the Software is furnished to do so, subject to9* the following conditions:10*11* The above copyright notice and this permission notice shall be12* included in all copies or substantial portions of the Software.13*14* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,15* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF16* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND17* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS18* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN19* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN20* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE21* SOFTWARE.22*/2324#include "inner.h"2526/* see bearssl_rsa.h */27uint32_t28br_rsa_i32_public(unsigned char *x, size_t xlen,29const br_rsa_public_key *pk)30{31const unsigned char *n;32size_t nlen;33uint32_t m[1 + (BR_MAX_RSA_SIZE >> 5)];34uint32_t a[1 + (BR_MAX_RSA_SIZE >> 5)];35uint32_t t1[1 + (BR_MAX_RSA_SIZE >> 5)];36uint32_t t2[1 + (BR_MAX_RSA_SIZE >> 5)];37uint32_t m0i, r;3839/*40* Get the actual length of the modulus, and see if it fits within41* our stack buffer. We also check that the length of x[] is valid.42*/43n = pk->n;44nlen = pk->nlen;45while (nlen > 0 && *n == 0) {46n ++;47nlen --;48}49if (nlen == 0 || nlen > (BR_MAX_RSA_SIZE >> 3) || xlen != nlen) {50return 0;51}52br_i32_decode(m, n, nlen);53m0i = br_i32_ninv32(m[1]);5455/*56* Note: if m[] is even, then m0i == 0. Otherwise, m0i must be57* an odd integer.58*/59r = m0i & 1;6061/*62* Decode x[] into a[]; we also check that its value is proper.63*/64r &= br_i32_decode_mod(a, x, xlen, m);6566/*67* Compute the modular exponentiation.68*/69br_i32_modpow(a, pk->e, pk->elen, m, m0i, t1, t2);7071/*72* Encode the result.73*/74br_i32_encode(x, xlen, a);75return r;76}777879