summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortb <>2018-11-06 02:14:39 +0000
committertb <>2018-11-06 02:14:39 +0000
commit011adf78027bced403e1190e496f00d941510468 (patch)
tree1393e16c882df0479eb41f25b6cca95143877b0b
parent18a8420ea8e51c199239c2ef68a9188965089aad (diff)
downloadopenbsd-011adf78027bced403e1190e496f00d941510468.tar.gz
openbsd-011adf78027bced403e1190e496f00d941510468.tar.bz2
openbsd-011adf78027bced403e1190e496f00d941510468.zip
revert use of bn_rand_interval due to failures with ECDHE and TLS
-rw-r--r--src/lib/libcrypto/dh/dh_key.c15
-rw-r--r--src/lib/libcrypto/dsa/dsa_key.c8
-rw-r--r--src/lib/libcrypto/dsa/dsa_ossl.c17
-rw-r--r--src/lib/libcrypto/ec/ec_key.c9
-rw-r--r--src/lib/libcrypto/ec/ecp_smpl.c8
5 files changed, 33 insertions, 24 deletions
diff --git a/src/lib/libcrypto/dh/dh_key.c b/src/lib/libcrypto/dh/dh_key.c
index 17df620ec5..3da2413666 100644
--- a/src/lib/libcrypto/dh/dh_key.c
+++ b/src/lib/libcrypto/dh/dh_key.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: dh_key.c,v 1.32 2018/11/05 23:54:27 tb Exp $ */ 1/* $OpenBSD: dh_key.c,v 1.33 2018/11/06 02:14:39 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -106,7 +106,7 @@ generate_key(DH *dh)
106 unsigned l; 106 unsigned l;
107 BN_CTX *ctx; 107 BN_CTX *ctx;
108 BN_MONT_CTX *mont = NULL; 108 BN_MONT_CTX *mont = NULL;
109 BIGNUM *pub_key = dh->pub_key, *priv_key = dh->priv_key, *two = NULL; 109 BIGNUM *pub_key = dh->pub_key, *priv_key = dh->priv_key;
110 110
111 if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) { 111 if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) {
112 DHerror(DH_R_MODULUS_TOO_LARGE); 112 DHerror(DH_R_MODULUS_TOO_LARGE);
@@ -137,12 +137,10 @@ generate_key(DH *dh)
137 137
138 if (generate_new_key) { 138 if (generate_new_key) {
139 if (dh->q) { 139 if (dh->q) {
140 if ((two = BN_new()) == NULL) 140 do {
141 goto err; 141 if (!BN_rand_range(priv_key, dh->q))
142 if (!BN_add(two, BN_value_one(), BN_value_one())) 142 goto err;
143 goto err; 143 } while (BN_is_zero(priv_key) || BN_is_one(priv_key));
144 if (!bn_rand_interval(priv_key, two, dh->q))
145 goto err;
146 } else { 144 } else {
147 /* secret exponent length */ 145 /* secret exponent length */
148 l = dh->length ? dh->length : BN_num_bits(dh->p) - 1; 146 l = dh->length ? dh->length : BN_num_bits(dh->p) - 1;
@@ -167,7 +165,6 @@ generate_key(DH *dh)
167 if (dh->priv_key == NULL) 165 if (dh->priv_key == NULL)
168 BN_free(priv_key); 166 BN_free(priv_key);
169 BN_CTX_free(ctx); 167 BN_CTX_free(ctx);
170 BN_free(two);
171 return ok; 168 return ok;
172} 169}
173 170
diff --git a/src/lib/libcrypto/dsa/dsa_key.c b/src/lib/libcrypto/dsa/dsa_key.c
index 7ead1f30cc..4039fbf407 100644
--- a/src/lib/libcrypto/dsa/dsa_key.c
+++ b/src/lib/libcrypto/dsa/dsa_key.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: dsa_key.c,v 1.26 2018/11/05 23:54:27 tb Exp $ */ 1/* $OpenBSD: dsa_key.c,v 1.27 2018/11/06 02:14:39 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -92,8 +92,10 @@ dsa_builtin_keygen(DSA *dsa)
92 goto err; 92 goto err;
93 } 93 }
94 94
95 if (!bn_rand_interval(priv_key, BN_value_one(), dsa->q)) 95 do {
96 goto err; 96 if (!BN_rand_range(priv_key, dsa->q))
97 goto err;
98 } while (BN_is_zero(priv_key));
97 99
98 if (pub_key == NULL) { 100 if (pub_key == NULL) {
99 if ((pub_key = BN_new()) == NULL) 101 if ((pub_key = BN_new()) == NULL)
diff --git a/src/lib/libcrypto/dsa/dsa_ossl.c b/src/lib/libcrypto/dsa/dsa_ossl.c
index cda750a0ed..6eb391ddeb 100644
--- a/src/lib/libcrypto/dsa/dsa_ossl.c
+++ b/src/lib/libcrypto/dsa/dsa_ossl.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: dsa_ossl.c,v 1.38 2018/11/05 23:54:27 tb Exp $ */ 1/* $OpenBSD: dsa_ossl.c,v 1.39 2018/11/06 02:14:39 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -150,9 +150,13 @@ dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa)
150 * 150 *
151 * s = inv(k)inv(b)(bm + bxr) mod q 151 * s = inv(k)inv(b)(bm + bxr) mod q
152 * 152 *
153 * Where b is a random value in the range [1, q). 153 * Where b is a random value in the range [1, q-1].
154 */ 154 */
155 if (!bn_rand_interval(&b, BN_value_one(), dsa->q)) 155 if (!BN_sub(&bm, dsa->q, BN_value_one()))
156 goto err;
157 if (!BN_rand_range(&b, &bm))
158 goto err;
159 if (!BN_add(&b, &b, BN_value_one()))
156 goto err; 160 goto err;
157 if (BN_mod_inverse_ct(&binv, &b, dsa->q, ctx) == NULL) 161 if (BN_mod_inverse_ct(&binv, &b, dsa->q, ctx) == NULL)
158 goto err; 162 goto err;
@@ -238,8 +242,11 @@ dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp)
238 !BN_set_bit(&m, q_bits)) 242 !BN_set_bit(&m, q_bits))
239 goto err; 243 goto err;
240 244
241 if (!bn_rand_interval(&k, BN_value_one(), dsa->q)) 245 /* Get random k */
242 goto err; 246 do {
247 if (!BN_rand_range(&k, dsa->q))
248 goto err;
249 } while (BN_is_zero(&k));
243 250
244 BN_set_flags(&k, BN_FLG_CONSTTIME); 251 BN_set_flags(&k, BN_FLG_CONSTTIME);
245 252
diff --git a/src/lib/libcrypto/ec/ec_key.c b/src/lib/libcrypto/ec/ec_key.c
index 8c6f3186ca..ca49c7676e 100644
--- a/src/lib/libcrypto/ec/ec_key.c
+++ b/src/lib/libcrypto/ec/ec_key.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ec_key.c,v 1.19 2018/11/05 23:54:27 tb Exp $ */ 1/* $OpenBSD: ec_key.c,v 1.20 2018/11/06 02:14:39 tb Exp $ */
2/* 2/*
3 * Written by Nils Larsch for the OpenSSL project. 3 * Written by Nils Larsch for the OpenSSL project.
4 */ 4 */
@@ -65,7 +65,6 @@
65 65
66#include <openssl/opensslconf.h> 66#include <openssl/opensslconf.h>
67 67
68#include "bn_lcl.h"
69#include "ec_lcl.h" 68#include "ec_lcl.h"
70#include <openssl/err.h> 69#include <openssl/err.h>
71 70
@@ -232,8 +231,10 @@ EC_KEY_generate_key(EC_KEY *eckey)
232 if (!EC_GROUP_get_order(eckey->group, order, ctx)) 231 if (!EC_GROUP_get_order(eckey->group, order, ctx))
233 goto err; 232 goto err;
234 233
235 if (!bn_rand_interval(priv_key, BN_value_one(), order)) 234 do
236 goto err; 235 if (!BN_rand_range(priv_key, order))
236 goto err;
237 while (BN_is_zero(priv_key));
237 238
238 if (pub_key == NULL) { 239 if (pub_key == NULL) {
239 if ((pub_key = EC_POINT_new(eckey->group)) == NULL) 240 if ((pub_key = EC_POINT_new(eckey->group)) == NULL)
diff --git a/src/lib/libcrypto/ec/ecp_smpl.c b/src/lib/libcrypto/ec/ecp_smpl.c
index 96c1e8a278..24054a51c5 100644
--- a/src/lib/libcrypto/ec/ecp_smpl.c
+++ b/src/lib/libcrypto/ec/ecp_smpl.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ecp_smpl.c,v 1.24 2018/11/05 23:54:27 tb Exp $ */ 1/* $OpenBSD: ecp_smpl.c,v 1.25 2018/11/06 02:14:39 tb Exp $ */
2/* Includes code written by Lenka Fibikova <fibikova@exp-math.uni-essen.de> 2/* Includes code written by Lenka Fibikova <fibikova@exp-math.uni-essen.de>
3 * for the OpenSSL project. 3 * for the OpenSSL project.
4 * Includes code written by Bodo Moeller for the OpenSSL project. 4 * Includes code written by Bodo Moeller for the OpenSSL project.
@@ -1434,8 +1434,10 @@ ec_GFp_simple_blind_coordinates(const EC_GROUP *group, EC_POINT *p, BN_CTX *ctx)
1434 goto err; 1434 goto err;
1435 1435
1436 /* Generate lambda in [1, group->field - 1] */ 1436 /* Generate lambda in [1, group->field - 1] */
1437 if (!bn_rand_interval(lambda, BN_value_one(), &group->field)) 1437 do {
1438 goto err; 1438 if (!BN_rand_range(lambda, &group->field))
1439 goto err;
1440 } while (BN_is_zero(lambda));
1439 1441
1440 if (group->meth->field_encode != NULL && 1442 if (group->meth->field_encode != NULL &&
1441 !group->meth->field_encode(group, lambda, lambda, ctx)) 1443 !group->meth->field_encode(group, lambda, lambda, ctx))