summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dh
diff options
context:
space:
mode:
authortb <>2018-11-06 02:14:39 +0000
committertb <>2018-11-06 02:14:39 +0000
commit011adf78027bced403e1190e496f00d941510468 (patch)
tree1393e16c882df0479eb41f25b6cca95143877b0b /src/lib/libcrypto/dh
parent18a8420ea8e51c199239c2ef68a9188965089aad (diff)
downloadopenbsd-011adf78027bced403e1190e496f00d941510468.tar.gz
openbsd-011adf78027bced403e1190e496f00d941510468.tar.bz2
openbsd-011adf78027bced403e1190e496f00d941510468.zip
revert use of bn_rand_interval due to failures with ECDHE and TLS
Diffstat (limited to 'src/lib/libcrypto/dh')
-rw-r--r--src/lib/libcrypto/dh/dh_key.c15
1 files changed, 6 insertions, 9 deletions
diff --git a/src/lib/libcrypto/dh/dh_key.c b/src/lib/libcrypto/dh/dh_key.c
index 17df620ec5..3da2413666 100644
--- a/src/lib/libcrypto/dh/dh_key.c
+++ b/src/lib/libcrypto/dh/dh_key.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: dh_key.c,v 1.32 2018/11/05 23:54:27 tb Exp $ */ 1/* $OpenBSD: dh_key.c,v 1.33 2018/11/06 02:14:39 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -106,7 +106,7 @@ generate_key(DH *dh)
106 unsigned l; 106 unsigned l;
107 BN_CTX *ctx; 107 BN_CTX *ctx;
108 BN_MONT_CTX *mont = NULL; 108 BN_MONT_CTX *mont = NULL;
109 BIGNUM *pub_key = dh->pub_key, *priv_key = dh->priv_key, *two = NULL; 109 BIGNUM *pub_key = dh->pub_key, *priv_key = dh->priv_key;
110 110
111 if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) { 111 if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) {
112 DHerror(DH_R_MODULUS_TOO_LARGE); 112 DHerror(DH_R_MODULUS_TOO_LARGE);
@@ -137,12 +137,10 @@ generate_key(DH *dh)
137 137
138 if (generate_new_key) { 138 if (generate_new_key) {
139 if (dh->q) { 139 if (dh->q) {
140 if ((two = BN_new()) == NULL) 140 do {
141 goto err; 141 if (!BN_rand_range(priv_key, dh->q))
142 if (!BN_add(two, BN_value_one(), BN_value_one())) 142 goto err;
143 goto err; 143 } while (BN_is_zero(priv_key) || BN_is_one(priv_key));
144 if (!bn_rand_interval(priv_key, two, dh->q))
145 goto err;
146 } else { 144 } else {
147 /* secret exponent length */ 145 /* secret exponent length */
148 l = dh->length ? dh->length : BN_num_bits(dh->p) - 1; 146 l = dh->length ? dh->length : BN_num_bits(dh->p) - 1;
@@ -167,7 +165,6 @@ generate_key(DH *dh)
167 if (dh->priv_key == NULL) 165 if (dh->priv_key == NULL)
168 BN_free(priv_key); 166 BN_free(priv_key);
169 BN_CTX_free(ctx); 167 BN_CTX_free(ctx);
170 BN_free(two);
171 return ok; 168 return ok;
172} 169}
173 170