2020-04-16 01:06:41 +01:00
|
|
|
/*
|
2020-07-03 10:31:22 +01:00
|
|
|
* rsa.c
|
2020-04-16 01:06:41 +01:00
|
|
|
*
|
2020-07-03 10:31:22 +01:00
|
|
|
* Copyright (c) 2018-2019, SciresM.
|
|
|
|
* Copyright (c) 2018-2019, The-4n.
|
2022-03-17 12:58:40 +00:00
|
|
|
* Copyright (c) 2020-2022, DarkMatterCore <pabloacurielz@gmail.com>.
|
2020-07-03 10:31:22 +01:00
|
|
|
*
|
|
|
|
* This file is part of nxdumptool (https://github.com/DarkMatterCore/nxdumptool).
|
|
|
|
*
|
2021-03-25 19:26:58 +00:00
|
|
|
* nxdumptool is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
2020-04-16 01:06:41 +01:00
|
|
|
*
|
2021-03-25 19:26:58 +00:00
|
|
|
* nxdumptool is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
2020-04-16 01:06:41 +01:00
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2021-03-25 19:26:58 +00:00
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
2020-04-16 01:06:41 +01:00
|
|
|
*/
|
|
|
|
|
2021-03-26 04:35:14 +00:00
|
|
|
#include "nxdt_utils.h"
|
2020-07-03 10:31:22 +01:00
|
|
|
#include "rsa.h"
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
#include <mbedtls/rsa.h>
|
2020-04-11 06:28:26 +01:00
|
|
|
#include <mbedtls/entropy.h>
|
|
|
|
#include <mbedtls/ctr_drbg.h>
|
2021-05-21 14:34:43 +01:00
|
|
|
#include <mbedtls/pk.h>
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2020-04-15 21:50:07 +01:00
|
|
|
/* Global variables. */
|
|
|
|
|
|
|
|
/// Self-generated private key.
|
2020-10-08 19:31:09 +01:00
|
|
|
static const char g_rsa2048CustomPrivateKey[] = "-----BEGIN RSA PRIVATE KEY-----\r\n"
|
2020-04-11 06:28:26 +01:00
|
|
|
"MIIEowIBAAKCAQEAvVRzt+8mE7oE4RkmSh3ws4CGlBj7uhHkfwCpPFsn4TNVdLRo\r\n"
|
|
|
|
"YYY17jQYWTtcOYPMcHxwUpgJyspGN8QGXEkJqY8jILv2eO0jBGtg7Br2afUBp6/x\r\n"
|
|
|
|
"BOMT2RlYVX6H4a1UA19Hzmcn+T1hdDwS6oBYpi8rJSm0+q+yB34dueNkVsk4eKbj\r\n"
|
|
|
|
"CNNKFi+XgyNBi41d57SPCrkcm/9tkagRorE8vLcFPcXcYOjdXH3L4XTXq7sxxytA\r\n"
|
|
|
|
"I66erfSc4XunkoLifcbfMOB3gjGCoQs6GfaiAU3TwxewQ7hdoqvj5Gm9VyHqzeDF\r\n"
|
|
|
|
"5mUTlmed2I6m4ELxbV1b0lUguR5ZEzwXwiVWxwIDAQABAoIBADvLYkijFOmCBGx7\r\n"
|
|
|
|
"HualkhF+9AHt6gKYCAw8Tzaqq2uqZMDZAWZblsjGVzJHVxcrEvQruOW88srDG24d\r\n"
|
|
|
|
"UMzwnEaa2ENMWclTS43nw9KNqWlJYd5t6LbcaLZWFNnbflq9/RybiPgdCDjlM9Qb\r\n"
|
|
|
|
"7PV214iUuRGhnHDX8GgBYq4ErPnjQ7+Gv1ducpMYjZencLWCl4fFX86U0/MU0+Qf\r\n"
|
|
|
|
"jKGegQTnk52aaeScbDOjjx5h+m0hkDNSfsmXTlvJt2c8wy/Yx+leVgCPjMC1nbft\r\n"
|
|
|
|
"Ob1TlpjuEAKBOGt4+DkWwVmIlxilmx9wCTZnwvPKd7A0e0FGsdHnQienPrMqlgbl\r\n"
|
|
|
|
"JPYwJuECgYEA6yLZHTfX3ebpzcdQQqmuHZtbOcs+EGRy24gAzd+9vCGKf0VtKSl9\r\n"
|
|
|
|
"3oA3XBOe2C2TgSgbWFZ7v/2efWRjgwJta0BQlpkzkh6NUQa2LI2M3zgZwHCZ7Ihr\r\n"
|
|
|
|
"skG73qZsMHOOv7VQz/wDp6AZNasfz21Mcyh4uFzpkb3NKLXqsJ9LeG8CgYEAziEb\r\n"
|
|
|
|
"yBCuhCKq7YZt/cHlbCbi7HbCYbub0isOCUtV0qPsX+kVZdPS+oGLPq1905JKdAe9\r\n"
|
|
|
|
"O+4SltCw6qn9RgYnCCVQ47SGHg7KO8Z5vdcNUiDvsQ+jNFlmM5QBuf1UV/Y+DV/Q\r\n"
|
|
|
|
"fZdA06OeYxkfPuBMtjdS9qMKwm3OsCkiQasWQykCgYAqALieAoq6JfSgALmyntLu\r\n"
|
|
|
|
"kQDzyv2UOg1Wb+4M2KnxAGDYKVO9pZ7Jb0f0V8DpRwLxcHOqDRDgE/MK3TL1hSp8\r\n"
|
|
|
|
"nSmILWfL8081KSjDvqlqeoAHI1YrrZbnadyggkQTR6E5V69O5+rTN8MpFh+Bkzmz\r\n"
|
|
|
|
"3IfsDxTeJvSOECkTUfFOWwKBgQDG/id3yMLxRRaGH5TnuNvmwNOpPC0DdL5E8tOm\r\n"
|
|
|
|
"HVhI9X8oSDgkCY5Pz+fBJnOmYEAIK8B/rqG7ftSMdnbPtvjPYFbqvEgNlHGfq0e0\r\n"
|
|
|
|
"AXwWoT1ETbhcvUFw4Z2ZE/rswAe/mZQI6o/mwLoTKRmE9byY3Gf3OgcVFDTI060C\r\n"
|
|
|
|
"gEwJoQKBgHpOmtGum3JuLpPc+PTXZOe29tdWndkFWktjPoow60d+NO2jpTFuEpmW\r\n"
|
|
|
|
"XRW35vXI8PqMCmHOQ8YU59aMN9juAnsJmPUxbAW5fZfvVwWUo0cTOenfT6syrEYO\r\n"
|
|
|
|
"n5NEG+mY4WZaOFRNiZu8+4aJI1yycXMyA22iKcU8+nN/sMAJs3Nx\r\n"
|
|
|
|
"-----END RSA PRIVATE KEY-----\r\n";
|
|
|
|
|
2020-04-15 21:50:07 +01:00
|
|
|
/// Self-generated public key.
|
2020-10-08 19:31:09 +01:00
|
|
|
/// Used to verify signatures generated with g_rsa2048CustomPrivateKey.
|
|
|
|
static const u8 g_rsa2048CustomPublicKey[] = {
|
2020-04-11 06:28:26 +01:00
|
|
|
0xBD, 0x54, 0x73, 0xB7, 0xEF, 0x26, 0x13, 0xBA, 0x04, 0xE1, 0x19, 0x26, 0x4A, 0x1D, 0xF0, 0xB3,
|
|
|
|
0x80, 0x86, 0x94, 0x18, 0xFB, 0xBA, 0x11, 0xE4, 0x7F, 0x00, 0xA9, 0x3C, 0x5B, 0x27, 0xE1, 0x33,
|
|
|
|
0x55, 0x74, 0xB4, 0x68, 0x61, 0x86, 0x35, 0xEE, 0x34, 0x18, 0x59, 0x3B, 0x5C, 0x39, 0x83, 0xCC,
|
|
|
|
0x70, 0x7C, 0x70, 0x52, 0x98, 0x09, 0xCA, 0xCA, 0x46, 0x37, 0xC4, 0x06, 0x5C, 0x49, 0x09, 0xA9,
|
|
|
|
0x8F, 0x23, 0x20, 0xBB, 0xF6, 0x78, 0xED, 0x23, 0x04, 0x6B, 0x60, 0xEC, 0x1A, 0xF6, 0x69, 0xF5,
|
|
|
|
0x01, 0xA7, 0xAF, 0xF1, 0x04, 0xE3, 0x13, 0xD9, 0x19, 0x58, 0x55, 0x7E, 0x87, 0xE1, 0xAD, 0x54,
|
|
|
|
0x03, 0x5F, 0x47, 0xCE, 0x67, 0x27, 0xF9, 0x3D, 0x61, 0x74, 0x3C, 0x12, 0xEA, 0x80, 0x58, 0xA6,
|
|
|
|
0x2F, 0x2B, 0x25, 0x29, 0xB4, 0xFA, 0xAF, 0xB2, 0x07, 0x7E, 0x1D, 0xB9, 0xE3, 0x64, 0x56, 0xC9,
|
|
|
|
0x38, 0x78, 0xA6, 0xE3, 0x08, 0xD3, 0x4A, 0x16, 0x2F, 0x97, 0x83, 0x23, 0x41, 0x8B, 0x8D, 0x5D,
|
|
|
|
0xE7, 0xB4, 0x8F, 0x0A, 0xB9, 0x1C, 0x9B, 0xFF, 0x6D, 0x91, 0xA8, 0x11, 0xA2, 0xB1, 0x3C, 0xBC,
|
|
|
|
0xB7, 0x05, 0x3D, 0xC5, 0xDC, 0x60, 0xE8, 0xDD, 0x5C, 0x7D, 0xCB, 0xE1, 0x74, 0xD7, 0xAB, 0xBB,
|
|
|
|
0x31, 0xC7, 0x2B, 0x40, 0x23, 0xAE, 0x9E, 0xAD, 0xF4, 0x9C, 0xE1, 0x7B, 0xA7, 0x92, 0x82, 0xE2,
|
|
|
|
0x7D, 0xC6, 0xDF, 0x30, 0xE0, 0x77, 0x82, 0x31, 0x82, 0xA1, 0x0B, 0x3A, 0x19, 0xF6, 0xA2, 0x01,
|
|
|
|
0x4D, 0xD3, 0xC3, 0x17, 0xB0, 0x43, 0xB8, 0x5D, 0xA2, 0xAB, 0xE3, 0xE4, 0x69, 0xBD, 0x57, 0x21,
|
|
|
|
0xEA, 0xCD, 0xE0, 0xC5, 0xE6, 0x65, 0x13, 0x96, 0x67, 0x9D, 0xD8, 0x8E, 0xA6, 0xE0, 0x42, 0xF1,
|
|
|
|
0x6D, 0x5D, 0x5B, 0xD2, 0x55, 0x20, 0xB9, 0x1E, 0x59, 0x13, 0x3C, 0x17, 0xC2, 0x25, 0x56, 0xC7
|
|
|
|
};
|
|
|
|
|
2020-04-15 21:50:07 +01:00
|
|
|
/* Function prototypes. */
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
const u8 *rsa2048GetCustomPublicKey(void)
|
|
|
|
{
|
|
|
|
return g_rsa2048CustomPublicKey;
|
|
|
|
}
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
bool rsa2048VerifySha256BasedPssSignature(const void *data, size_t data_size, const void *signature, const void *modulus, const void *public_exponent, size_t public_exponent_size)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
if (!data || !data_size || !signature || !modulus || !public_exponent || !public_exponent_size)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-03-07 23:22:49 +00:00
|
|
|
LOG_MSG("Invalid parameters!");
|
2020-04-11 06:28:26 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
int mbedtls_ret = 0;
|
|
|
|
mbedtls_rsa_context rsa;
|
2020-10-22 05:38:14 +01:00
|
|
|
u8 hash[SHA256_HASH_SIZE] = {0};
|
2021-05-21 14:34:43 +01:00
|
|
|
bool ret = false;
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
/* Initialize RSA context. */
|
|
|
|
mbedtls_rsa_init(&rsa, MBEDTLS_RSA_PKCS_V21, MBEDTLS_MD_SHA256);
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
/* Import RSA parameters. */
|
|
|
|
mbedtls_ret = mbedtls_rsa_import_raw(&rsa, (const u8*)modulus, RSA2048_BYTES, NULL, 0, NULL, 0, NULL, 0, (const u8*)public_exponent, public_exponent_size);
|
|
|
|
if (mbedtls_ret != 0)
|
|
|
|
{
|
|
|
|
LOG_MSG("mbedtls_rsa_import_raw failed! (%d).", mbedtls_ret);
|
|
|
|
goto end;
|
|
|
|
}
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
/* Calculate SHA-256 checksum for the input data. */
|
|
|
|
sha256CalculateHash(hash, data, data_size);
|
|
|
|
|
|
|
|
/* Verify signature. */
|
|
|
|
mbedtls_ret = mbedtls_rsa_rsassa_pss_verify(&rsa, NULL, NULL, MBEDTLS_RSA_PUBLIC, MBEDTLS_MD_SHA256, SHA256_HASH_SIZE, hash, (const u8*)signature);
|
|
|
|
if (mbedtls_ret != 0)
|
|
|
|
{
|
|
|
|
LOG_MSG("mbedtls_rsa_rsassa_pss_verify failed! (%d).", mbedtls_ret);
|
|
|
|
goto end;
|
|
|
|
}
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
ret = true;
|
|
|
|
|
|
|
|
end:
|
|
|
|
mbedtls_rsa_free(&rsa);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool rsa2048GenerateSha256BasedPssSignature(void *dst, const void *src, size_t size)
|
|
|
|
{
|
|
|
|
if (!dst || !src || !size)
|
|
|
|
{
|
|
|
|
LOG_MSG("Invalid parameters!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
mbedtls_entropy_context entropy;
|
|
|
|
mbedtls_ctr_drbg_context ctr_drbg;
|
2020-04-11 06:28:26 +01:00
|
|
|
mbedtls_pk_context pk;
|
2021-05-21 14:34:43 +01:00
|
|
|
|
|
|
|
size_t olen = 0;
|
|
|
|
int mbedtls_ret = 0;
|
|
|
|
const char *pers = __func__;
|
|
|
|
u8 hash[SHA256_HASH_SIZE] = {0}, buf[MBEDTLS_MPI_MAX_SIZE] = {0};
|
|
|
|
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
/* Initialize contexts. */
|
|
|
|
mbedtls_entropy_init(&entropy);
|
|
|
|
mbedtls_ctr_drbg_init(&ctr_drbg);
|
2020-04-11 06:28:26 +01:00
|
|
|
mbedtls_pk_init(&pk);
|
|
|
|
|
2020-07-06 01:10:07 +01:00
|
|
|
/* Calculate SHA-256 checksum for the input data. */
|
2020-04-11 06:28:26 +01:00
|
|
|
sha256CalculateHash(hash, src, size);
|
|
|
|
|
2020-07-06 01:10:07 +01:00
|
|
|
/* Seed the random number generator. */
|
2021-05-21 14:34:43 +01:00
|
|
|
mbedtls_ret = mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy, (const u8*)pers, strlen(pers));
|
|
|
|
if (mbedtls_ret != 0)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
LOG_MSG("mbedtls_ctr_drbg_seed failed! (%d).", mbedtls_ret);
|
2020-07-13 07:36:17 +01:00
|
|
|
goto end;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|
|
|
|
|
2020-07-06 01:10:07 +01:00
|
|
|
/* Parse private key. */
|
2021-05-21 14:34:43 +01:00
|
|
|
mbedtls_ret = mbedtls_pk_parse_key(&pk, (const u8*)g_rsa2048CustomPrivateKey, strlen(g_rsa2048CustomPrivateKey) + 1, NULL, 0);
|
|
|
|
if (mbedtls_ret != 0)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
LOG_MSG("mbedtls_pk_parse_key failed! (%d).", mbedtls_ret);
|
2020-07-13 07:36:17 +01:00
|
|
|
goto end;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|
|
|
|
|
2020-07-06 01:10:07 +01:00
|
|
|
/* Set RSA padding. */
|
2020-04-11 06:28:26 +01:00
|
|
|
mbedtls_rsa_set_padding(mbedtls_pk_rsa(pk), MBEDTLS_RSA_PKCS_V21, MBEDTLS_MD_SHA256);
|
|
|
|
|
2020-07-06 01:10:07 +01:00
|
|
|
/* Calculate hash signature. */
|
2021-05-21 14:34:43 +01:00
|
|
|
mbedtls_ret = mbedtls_pk_sign(&pk, MBEDTLS_MD_SHA256, hash, 0, buf, &olen, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
|
|
if (mbedtls_ret != 0 || olen < RSA2048_SIG_SIZE)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
LOG_MSG("mbedtls_pk_sign failed! (%d, %lu).", mbedtls_ret, olen);
|
2020-07-13 07:36:17 +01:00
|
|
|
goto end;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|
|
|
|
|
2020-07-06 01:10:07 +01:00
|
|
|
/* Copy signature to output buffer. */
|
|
|
|
memcpy(dst, buf, RSA2048_SIG_SIZE);
|
2021-05-21 14:34:43 +01:00
|
|
|
ret = true;
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
end:
|
2020-04-11 06:28:26 +01:00
|
|
|
mbedtls_pk_free(&pk);
|
|
|
|
mbedtls_ctr_drbg_free(&ctr_drbg);
|
2021-05-21 14:34:43 +01:00
|
|
|
mbedtls_entropy_free(&entropy);
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
return ret;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
bool rsa2048OaepDecrypt(void *dst, size_t dst_size, const void *signature, const void *modulus, const void *public_exponent, size_t public_exponent_size, const void *private_exponent, \
|
|
|
|
size_t private_exponent_size, const void *label, size_t label_size, size_t *out_size)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
if (!dst || !dst_size || !signature || !modulus || !public_exponent || !public_exponent_size || !private_exponent || !private_exponent_size || (!label && label_size) || (label && !label_size) || \
|
|
|
|
!out_size)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-03-07 23:22:49 +00:00
|
|
|
LOG_MSG("Invalid parameters!");
|
2020-04-11 06:28:26 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
mbedtls_entropy_context entropy;
|
|
|
|
mbedtls_ctr_drbg_context ctr_drbg;
|
|
|
|
mbedtls_rsa_context rsa;
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
const char *pers = __func__;
|
|
|
|
int mbedtls_ret = 0;
|
|
|
|
bool ret = false;
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
/* Initialize contexts. */
|
|
|
|
mbedtls_entropy_init(&entropy);
|
|
|
|
mbedtls_ctr_drbg_init(&ctr_drbg);
|
|
|
|
mbedtls_rsa_init(&rsa, MBEDTLS_RSA_PKCS_V21, MBEDTLS_MD_SHA256);
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
/* Seed the random number generator. */
|
|
|
|
mbedtls_ret = mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy, (const u8*)pers, strlen(pers));
|
|
|
|
if (mbedtls_ret != 0)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
LOG_MSG("mbedtls_ctr_drbg_seed failed! (%d).", mbedtls_ret);
|
|
|
|
goto end;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
/* Import RSA parameters. */
|
|
|
|
mbedtls_ret = mbedtls_rsa_import_raw(&rsa, (const u8*)modulus, RSA2048_BYTES, NULL, 0, NULL, 0, (const u8*)private_exponent, private_exponent_size, (const u8*)public_exponent, public_exponent_size);
|
|
|
|
if (mbedtls_ret != 0)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
LOG_MSG("mbedtls_rsa_import_raw failed! (%d).", mbedtls_ret);
|
|
|
|
goto end;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
/* Derive RSA prime factors. */
|
|
|
|
mbedtls_ret = mbedtls_rsa_complete(&rsa);
|
|
|
|
if (mbedtls_ret != 0)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
LOG_MSG("mbedtls_rsa_complete failed! (%d).", mbedtls_ret);
|
|
|
|
goto end;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
/* Perform RSA-OAEP decryption. */
|
|
|
|
mbedtls_ret = mbedtls_rsa_rsaes_oaep_decrypt(&rsa, mbedtls_ctr_drbg_random, &ctr_drbg, MBEDTLS_RSA_PRIVATE, (const u8*)label, label_size, out_size, (const u8*)signature, (u8*)dst, dst_size);
|
|
|
|
if (mbedtls_ret != 0)
|
2020-04-11 06:28:26 +01:00
|
|
|
{
|
2021-05-21 14:34:43 +01:00
|
|
|
LOG_MSG("mbedtls_rsa_rsaes_oaep_decrypt failed! (%d).", mbedtls_ret);
|
|
|
|
goto end;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
ret = true;
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
end:
|
|
|
|
mbedtls_rsa_free(&rsa);
|
|
|
|
mbedtls_ctr_drbg_free(&ctr_drbg);
|
|
|
|
mbedtls_entropy_free(&entropy);
|
2020-04-11 06:28:26 +01:00
|
|
|
|
2021-05-21 14:34:43 +01:00
|
|
|
return ret;
|
2020-04-11 06:28:26 +01:00
|
|
|
}
|