diff options
-rw-r--r-- | src/lib/libcrypto/ec/ec2_mult.c | 6 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec2_oct.c | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec2_smpl.c | 34 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_ameth.c | 50 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_asn1.c | 28 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_check.c | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_curve.c | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_key.c | 46 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_lib.c | 60 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_mult.c | 14 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_pmeth.c | 22 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ec_print.c | 18 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/eck_prn.c | 18 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ecp_mont.c | 10 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ecp_nist.c | 8 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ecp_nistp224.c | 28 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ecp_nistp256.c | 32 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ecp_nistp521.c | 30 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ecp_oct.c | 14 | ||||
-rw-r--r-- | src/lib/libcrypto/ec/ecp_smpl.c | 56 |
20 files changed, 243 insertions, 243 deletions
diff --git a/src/lib/libcrypto/ec/ec2_mult.c b/src/lib/libcrypto/ec/ec2_mult.c index 3e5d1dca85..c44ac5c3db 100644 --- a/src/lib/libcrypto/ec/ec2_mult.c +++ b/src/lib/libcrypto/ec/ec2_mult.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec2_mult.c,v 1.13 2018/07/23 18:24:22 tb Exp $ */ | 1 | /* $OpenBSD: ec2_mult.c,v 1.14 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | 3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. |
4 | * | 4 | * |
@@ -441,13 +441,13 @@ ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, | |||
441 | * because ec_GF2m_simple_mul() uses ec_wNAF_mul() if appropriate */ | 441 | * because ec_GF2m_simple_mul() uses ec_wNAF_mul() if appropriate */ |
442 | 442 | ||
443 | int | 443 | int |
444 | ec_GF2m_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | 444 | ec_GF2m_precompute_mult(EC_GROUP *group, BN_CTX *ctx) |
445 | { | 445 | { |
446 | return ec_wNAF_precompute_mult(group, ctx); | 446 | return ec_wNAF_precompute_mult(group, ctx); |
447 | } | 447 | } |
448 | 448 | ||
449 | int | 449 | int |
450 | ec_GF2m_have_precompute_mult(const EC_GROUP * group) | 450 | ec_GF2m_have_precompute_mult(const EC_GROUP *group) |
451 | { | 451 | { |
452 | return ec_wNAF_have_precompute_mult(group); | 452 | return ec_wNAF_have_precompute_mult(group); |
453 | } | 453 | } |
diff --git a/src/lib/libcrypto/ec/ec2_oct.c b/src/lib/libcrypto/ec/ec2_oct.c index b25084ef58..be29203292 100644 --- a/src/lib/libcrypto/ec/ec2_oct.c +++ b/src/lib/libcrypto/ec/ec2_oct.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec2_oct.c,v 1.17 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec2_oct.c,v 1.18 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | 3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. |
4 | * | 4 | * |
@@ -175,7 +175,7 @@ ec_GF2m_simple_set_compressed_coordinates(const EC_GROUP *group, EC_POINT *point | |||
175 | size_t | 175 | size_t |
176 | ec_GF2m_simple_point2oct(const EC_GROUP *group, const EC_POINT *point, | 176 | ec_GF2m_simple_point2oct(const EC_GROUP *group, const EC_POINT *point, |
177 | point_conversion_form_t form, | 177 | point_conversion_form_t form, |
178 | unsigned char *buf, size_t len, BN_CTX * ctx) | 178 | unsigned char *buf, size_t len, BN_CTX *ctx) |
179 | { | 179 | { |
180 | size_t ret; | 180 | size_t ret; |
181 | BN_CTX *new_ctx = NULL; | 181 | BN_CTX *new_ctx = NULL; |
diff --git a/src/lib/libcrypto/ec/ec2_smpl.c b/src/lib/libcrypto/ec/ec2_smpl.c index 17664d0426..b3030edeee 100644 --- a/src/lib/libcrypto/ec/ec2_smpl.c +++ b/src/lib/libcrypto/ec/ec2_smpl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec2_smpl.c,v 1.24 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec2_smpl.c,v 1.25 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | 3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. |
4 | * | 4 | * |
@@ -127,7 +127,7 @@ EC_GF2m_simple_method(void) | |||
127 | * Note that all other members are handled by EC_GROUP_new. | 127 | * Note that all other members are handled by EC_GROUP_new. |
128 | */ | 128 | */ |
129 | int | 129 | int |
130 | ec_GF2m_simple_group_init(EC_GROUP * group) | 130 | ec_GF2m_simple_group_init(EC_GROUP *group) |
131 | { | 131 | { |
132 | BN_init(&group->field); | 132 | BN_init(&group->field); |
133 | BN_init(&group->a); | 133 | BN_init(&group->a); |
@@ -140,7 +140,7 @@ ec_GF2m_simple_group_init(EC_GROUP * group) | |||
140 | * Note that all other members are handled by EC_GROUP_free. | 140 | * Note that all other members are handled by EC_GROUP_free. |
141 | */ | 141 | */ |
142 | void | 142 | void |
143 | ec_GF2m_simple_group_finish(EC_GROUP * group) | 143 | ec_GF2m_simple_group_finish(EC_GROUP *group) |
144 | { | 144 | { |
145 | BN_free(&group->field); | 145 | BN_free(&group->field); |
146 | BN_free(&group->a); | 146 | BN_free(&group->a); |
@@ -152,7 +152,7 @@ ec_GF2m_simple_group_finish(EC_GROUP * group) | |||
152 | * Note that all other members are handled by EC_GROUP_clear_free. | 152 | * Note that all other members are handled by EC_GROUP_clear_free. |
153 | */ | 153 | */ |
154 | void | 154 | void |
155 | ec_GF2m_simple_group_clear_finish(EC_GROUP * group) | 155 | ec_GF2m_simple_group_clear_finish(EC_GROUP *group) |
156 | { | 156 | { |
157 | BN_clear_free(&group->field); | 157 | BN_clear_free(&group->field); |
158 | BN_clear_free(&group->a); | 158 | BN_clear_free(&group->a); |
@@ -170,7 +170,7 @@ ec_GF2m_simple_group_clear_finish(EC_GROUP * group) | |||
170 | * Note that all other members are handled by EC_GROUP_copy. | 170 | * Note that all other members are handled by EC_GROUP_copy. |
171 | */ | 171 | */ |
172 | int | 172 | int |
173 | ec_GF2m_simple_group_copy(EC_GROUP * dest, const EC_GROUP * src) | 173 | ec_GF2m_simple_group_copy(EC_GROUP *dest, const EC_GROUP *src) |
174 | { | 174 | { |
175 | int i; | 175 | int i; |
176 | 176 | ||
@@ -200,8 +200,8 @@ ec_GF2m_simple_group_copy(EC_GROUP * dest, const EC_GROUP * src) | |||
200 | 200 | ||
201 | /* Set the curve parameters of an EC_GROUP structure. */ | 201 | /* Set the curve parameters of an EC_GROUP structure. */ |
202 | int | 202 | int |
203 | ec_GF2m_simple_group_set_curve(EC_GROUP * group, | 203 | ec_GF2m_simple_group_set_curve(EC_GROUP *group, |
204 | const BIGNUM * p, const BIGNUM * a, const BIGNUM * b, BN_CTX * ctx) | 204 | const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) |
205 | { | 205 | { |
206 | int ret = 0, i; | 206 | int ret = 0, i; |
207 | 207 | ||
@@ -265,7 +265,7 @@ ec_GF2m_simple_group_get_curve(const EC_GROUP *group, | |||
265 | 265 | ||
266 | /* Gets the degree of the field. For a curve over GF(2^m) this is the value m. */ | 266 | /* Gets the degree of the field. For a curve over GF(2^m) this is the value m. */ |
267 | int | 267 | int |
268 | ec_GF2m_simple_group_get_degree(const EC_GROUP * group) | 268 | ec_GF2m_simple_group_get_degree(const EC_GROUP *group) |
269 | { | 269 | { |
270 | return BN_num_bits(&group->field) - 1; | 270 | return BN_num_bits(&group->field) - 1; |
271 | } | 271 | } |
@@ -275,7 +275,7 @@ ec_GF2m_simple_group_get_degree(const EC_GROUP * group) | |||
275 | * y^2 + x*y = x^3 + a*x^2 + b is an elliptic curve <=> b != 0 (mod p) | 275 | * y^2 + x*y = x^3 + a*x^2 + b is an elliptic curve <=> b != 0 (mod p) |
276 | */ | 276 | */ |
277 | int | 277 | int |
278 | ec_GF2m_simple_group_check_discriminant(const EC_GROUP * group, BN_CTX * ctx) | 278 | ec_GF2m_simple_group_check_discriminant(const EC_GROUP *group, BN_CTX *ctx) |
279 | { | 279 | { |
280 | int ret = 0; | 280 | int ret = 0; |
281 | BIGNUM *b; | 281 | BIGNUM *b; |
@@ -314,7 +314,7 @@ ec_GF2m_simple_group_check_discriminant(const EC_GROUP * group, BN_CTX * ctx) | |||
314 | 314 | ||
315 | /* Initializes an EC_POINT. */ | 315 | /* Initializes an EC_POINT. */ |
316 | int | 316 | int |
317 | ec_GF2m_simple_point_init(EC_POINT * point) | 317 | ec_GF2m_simple_point_init(EC_POINT *point) |
318 | { | 318 | { |
319 | BN_init(&point->X); | 319 | BN_init(&point->X); |
320 | BN_init(&point->Y); | 320 | BN_init(&point->Y); |
@@ -325,7 +325,7 @@ ec_GF2m_simple_point_init(EC_POINT * point) | |||
325 | 325 | ||
326 | /* Frees an EC_POINT. */ | 326 | /* Frees an EC_POINT. */ |
327 | void | 327 | void |
328 | ec_GF2m_simple_point_finish(EC_POINT * point) | 328 | ec_GF2m_simple_point_finish(EC_POINT *point) |
329 | { | 329 | { |
330 | BN_free(&point->X); | 330 | BN_free(&point->X); |
331 | BN_free(&point->Y); | 331 | BN_free(&point->Y); |
@@ -335,7 +335,7 @@ ec_GF2m_simple_point_finish(EC_POINT * point) | |||
335 | 335 | ||
336 | /* Clears and frees an EC_POINT. */ | 336 | /* Clears and frees an EC_POINT. */ |
337 | void | 337 | void |
338 | ec_GF2m_simple_point_clear_finish(EC_POINT * point) | 338 | ec_GF2m_simple_point_clear_finish(EC_POINT *point) |
339 | { | 339 | { |
340 | BN_clear_free(&point->X); | 340 | BN_clear_free(&point->X); |
341 | BN_clear_free(&point->Y); | 341 | BN_clear_free(&point->Y); |
@@ -346,7 +346,7 @@ ec_GF2m_simple_point_clear_finish(EC_POINT * point) | |||
346 | 346 | ||
347 | /* Copy the contents of one EC_POINT into another. Assumes dest is initialized. */ | 347 | /* Copy the contents of one EC_POINT into another. Assumes dest is initialized. */ |
348 | int | 348 | int |
349 | ec_GF2m_simple_point_copy(EC_POINT * dest, const EC_POINT * src) | 349 | ec_GF2m_simple_point_copy(EC_POINT *dest, const EC_POINT *src) |
350 | { | 350 | { |
351 | if (!BN_copy(&dest->X, &src->X)) | 351 | if (!BN_copy(&dest->X, &src->X)) |
352 | return 0; | 352 | return 0; |
@@ -364,7 +364,7 @@ ec_GF2m_simple_point_copy(EC_POINT * dest, const EC_POINT * src) | |||
364 | * A point at infinity is represented by having Z=0. | 364 | * A point at infinity is represented by having Z=0. |
365 | */ | 365 | */ |
366 | int | 366 | int |
367 | ec_GF2m_simple_point_set_to_infinity(const EC_GROUP * group, EC_POINT * point) | 367 | ec_GF2m_simple_point_set_to_infinity(const EC_GROUP *group, EC_POINT *point) |
368 | { | 368 | { |
369 | point->Z_is_one = 0; | 369 | point->Z_is_one = 0; |
370 | BN_zero(&point->Z); | 370 | BN_zero(&point->Z); |
@@ -376,8 +376,8 @@ ec_GF2m_simple_point_set_to_infinity(const EC_GROUP * group, EC_POINT * point) | |||
376 | * Note that the simple implementation only uses affine coordinates. | 376 | * Note that the simple implementation only uses affine coordinates. |
377 | */ | 377 | */ |
378 | int | 378 | int |
379 | ec_GF2m_simple_point_set_affine_coordinates(const EC_GROUP * group, EC_POINT * point, | 379 | ec_GF2m_simple_point_set_affine_coordinates(const EC_GROUP *group, EC_POINT *point, |
380 | const BIGNUM * x, const BIGNUM * y, BN_CTX * ctx) | 380 | const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx) |
381 | { | 381 | { |
382 | int ret = 0; | 382 | int ret = 0; |
383 | if (x == NULL || y == NULL) { | 383 | if (x == NULL || y == NULL) { |
@@ -701,7 +701,7 @@ ec_GF2m_simple_cmp(const EC_GROUP *group, const EC_POINT *a, | |||
701 | 701 | ||
702 | /* Forces the given EC_POINT to internally use affine coordinates. */ | 702 | /* Forces the given EC_POINT to internally use affine coordinates. */ |
703 | int | 703 | int |
704 | ec_GF2m_simple_make_affine(const EC_GROUP * group, EC_POINT * point, BN_CTX * ctx) | 704 | ec_GF2m_simple_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx) |
705 | { | 705 | { |
706 | BN_CTX *new_ctx = NULL; | 706 | BN_CTX *new_ctx = NULL; |
707 | BIGNUM *x, *y; | 707 | BIGNUM *x, *y; |
diff --git a/src/lib/libcrypto/ec/ec_ameth.c b/src/lib/libcrypto/ec/ec_ameth.c index ee931a93c6..b6f21ade63 100644 --- a/src/lib/libcrypto/ec/ec_ameth.c +++ b/src/lib/libcrypto/ec/ec_ameth.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_ameth.c,v 1.34 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec_ameth.c,v 1.35 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2006. | 3 | * project 2006. |
4 | */ | 4 | */ |
@@ -76,7 +76,7 @@ static int ecdh_cms_encrypt(CMS_RecipientInfo *ri); | |||
76 | #endif | 76 | #endif |
77 | 77 | ||
78 | static int | 78 | static int |
79 | eckey_param2type(int *pptype, void **ppval, EC_KEY * ec_key) | 79 | eckey_param2type(int *pptype, void **ppval, EC_KEY *ec_key) |
80 | { | 80 | { |
81 | const EC_GROUP *group; | 81 | const EC_GROUP *group; |
82 | int nid; | 82 | int nid; |
@@ -108,7 +108,7 @@ eckey_param2type(int *pptype, void **ppval, EC_KEY * ec_key) | |||
108 | } | 108 | } |
109 | 109 | ||
110 | static int | 110 | static int |
111 | eckey_pub_encode(X509_PUBKEY * pk, const EVP_PKEY * pkey) | 111 | eckey_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) |
112 | { | 112 | { |
113 | EC_KEY *ec_key = pkey->pkey.ec; | 113 | EC_KEY *ec_key = pkey->pkey.ec; |
114 | void *pval = NULL; | 114 | void *pval = NULL; |
@@ -191,7 +191,7 @@ eckey_type2param(int ptype, const void *pval) | |||
191 | } | 191 | } |
192 | 192 | ||
193 | static int | 193 | static int |
194 | eckey_pub_decode(EVP_PKEY * pkey, X509_PUBKEY * pubkey) | 194 | eckey_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) |
195 | { | 195 | { |
196 | const unsigned char *p = NULL; | 196 | const unsigned char *p = NULL; |
197 | const void *pval; | 197 | const void *pval; |
@@ -224,7 +224,7 @@ eckey_pub_decode(EVP_PKEY * pkey, X509_PUBKEY * pubkey) | |||
224 | } | 224 | } |
225 | 225 | ||
226 | static int | 226 | static int |
227 | eckey_pub_cmp(const EVP_PKEY * a, const EVP_PKEY * b) | 227 | eckey_pub_cmp(const EVP_PKEY *a, const EVP_PKEY *b) |
228 | { | 228 | { |
229 | int r; | 229 | int r; |
230 | const EC_GROUP *group = EC_KEY_get0_group(b->pkey.ec); | 230 | const EC_GROUP *group = EC_KEY_get0_group(b->pkey.ec); |
@@ -239,7 +239,7 @@ eckey_pub_cmp(const EVP_PKEY * a, const EVP_PKEY * b) | |||
239 | } | 239 | } |
240 | 240 | ||
241 | static int | 241 | static int |
242 | eckey_priv_decode(EVP_PKEY * pkey, const PKCS8_PRIV_KEY_INFO * p8) | 242 | eckey_priv_decode(EVP_PKEY *pkey, const PKCS8_PRIV_KEY_INFO *p8) |
243 | { | 243 | { |
244 | const unsigned char *p = NULL; | 244 | const unsigned char *p = NULL; |
245 | const void *pval; | 245 | const void *pval; |
@@ -306,7 +306,7 @@ eckey_priv_decode(EVP_PKEY * pkey, const PKCS8_PRIV_KEY_INFO * p8) | |||
306 | } | 306 | } |
307 | 307 | ||
308 | static int | 308 | static int |
309 | eckey_priv_encode(PKCS8_PRIV_KEY_INFO * p8, const EVP_PKEY * pkey) | 309 | eckey_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey) |
310 | { | 310 | { |
311 | EC_KEY *ec_key; | 311 | EC_KEY *ec_key; |
312 | unsigned char *ep, *p; | 312 | unsigned char *ep, *p; |
@@ -359,13 +359,13 @@ eckey_priv_encode(PKCS8_PRIV_KEY_INFO * p8, const EVP_PKEY * pkey) | |||
359 | } | 359 | } |
360 | 360 | ||
361 | static int | 361 | static int |
362 | int_ec_size(const EVP_PKEY * pkey) | 362 | int_ec_size(const EVP_PKEY *pkey) |
363 | { | 363 | { |
364 | return ECDSA_size(pkey->pkey.ec); | 364 | return ECDSA_size(pkey->pkey.ec); |
365 | } | 365 | } |
366 | 366 | ||
367 | static int | 367 | static int |
368 | ec_bits(const EVP_PKEY * pkey) | 368 | ec_bits(const EVP_PKEY *pkey) |
369 | { | 369 | { |
370 | BIGNUM *order = BN_new(); | 370 | BIGNUM *order = BN_new(); |
371 | const EC_GROUP *group; | 371 | const EC_GROUP *group; |
@@ -406,7 +406,7 @@ ec_security_bits(const EVP_PKEY *pkey) | |||
406 | } | 406 | } |
407 | 407 | ||
408 | static int | 408 | static int |
409 | ec_missing_parameters(const EVP_PKEY * pkey) | 409 | ec_missing_parameters(const EVP_PKEY *pkey) |
410 | { | 410 | { |
411 | if (EC_KEY_get0_group(pkey->pkey.ec) == NULL) | 411 | if (EC_KEY_get0_group(pkey->pkey.ec) == NULL) |
412 | return 1; | 412 | return 1; |
@@ -414,13 +414,13 @@ ec_missing_parameters(const EVP_PKEY * pkey) | |||
414 | } | 414 | } |
415 | 415 | ||
416 | static int | 416 | static int |
417 | ec_copy_parameters(EVP_PKEY * to, const EVP_PKEY * from) | 417 | ec_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) |
418 | { | 418 | { |
419 | return EC_KEY_set_group(to->pkey.ec, EC_KEY_get0_group(from->pkey.ec)); | 419 | return EC_KEY_set_group(to->pkey.ec, EC_KEY_get0_group(from->pkey.ec)); |
420 | } | 420 | } |
421 | 421 | ||
422 | static int | 422 | static int |
423 | ec_cmp_parameters(const EVP_PKEY * a, const EVP_PKEY * b) | 423 | ec_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b) |
424 | { | 424 | { |
425 | const EC_GROUP *group_a = EC_KEY_get0_group(a->pkey.ec), *group_b = EC_KEY_get0_group(b->pkey.ec); | 425 | const EC_GROUP *group_a = EC_KEY_get0_group(a->pkey.ec), *group_b = EC_KEY_get0_group(b->pkey.ec); |
426 | if (EC_GROUP_cmp(group_a, group_b, NULL)) | 426 | if (EC_GROUP_cmp(group_a, group_b, NULL)) |
@@ -430,13 +430,13 @@ ec_cmp_parameters(const EVP_PKEY * a, const EVP_PKEY * b) | |||
430 | } | 430 | } |
431 | 431 | ||
432 | static void | 432 | static void |
433 | int_ec_free(EVP_PKEY * pkey) | 433 | int_ec_free(EVP_PKEY *pkey) |
434 | { | 434 | { |
435 | EC_KEY_free(pkey->pkey.ec); | 435 | EC_KEY_free(pkey->pkey.ec); |
436 | } | 436 | } |
437 | 437 | ||
438 | static int | 438 | static int |
439 | do_EC_KEY_print(BIO * bp, const EC_KEY * x, int off, int ktype) | 439 | do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) |
440 | { | 440 | { |
441 | unsigned char *buffer = NULL; | 441 | unsigned char *buffer = NULL; |
442 | const char *ecstr; | 442 | const char *ecstr; |
@@ -520,7 +520,7 @@ do_EC_KEY_print(BIO * bp, const EC_KEY * x, int off, int ktype) | |||
520 | } | 520 | } |
521 | 521 | ||
522 | static int | 522 | static int |
523 | eckey_param_decode(EVP_PKEY * pkey, | 523 | eckey_param_decode(EVP_PKEY *pkey, |
524 | const unsigned char **pder, int derlen) | 524 | const unsigned char **pder, int derlen) |
525 | { | 525 | { |
526 | EC_KEY *eckey; | 526 | EC_KEY *eckey; |
@@ -533,35 +533,35 @@ eckey_param_decode(EVP_PKEY * pkey, | |||
533 | } | 533 | } |
534 | 534 | ||
535 | static int | 535 | static int |
536 | eckey_param_encode(const EVP_PKEY * pkey, unsigned char **pder) | 536 | eckey_param_encode(const EVP_PKEY *pkey, unsigned char **pder) |
537 | { | 537 | { |
538 | return i2d_ECParameters(pkey->pkey.ec, pder); | 538 | return i2d_ECParameters(pkey->pkey.ec, pder); |
539 | } | 539 | } |
540 | 540 | ||
541 | static int | 541 | static int |
542 | eckey_param_print(BIO * bp, const EVP_PKEY * pkey, int indent, | 542 | eckey_param_print(BIO *bp, const EVP_PKEY *pkey, int indent, |
543 | ASN1_PCTX * ctx) | 543 | ASN1_PCTX *ctx) |
544 | { | 544 | { |
545 | return do_EC_KEY_print(bp, pkey->pkey.ec, indent, 0); | 545 | return do_EC_KEY_print(bp, pkey->pkey.ec, indent, 0); |
546 | } | 546 | } |
547 | 547 | ||
548 | static int | 548 | static int |
549 | eckey_pub_print(BIO * bp, const EVP_PKEY * pkey, int indent, | 549 | eckey_pub_print(BIO *bp, const EVP_PKEY *pkey, int indent, |
550 | ASN1_PCTX * ctx) | 550 | ASN1_PCTX *ctx) |
551 | { | 551 | { |
552 | return do_EC_KEY_print(bp, pkey->pkey.ec, indent, 1); | 552 | return do_EC_KEY_print(bp, pkey->pkey.ec, indent, 1); |
553 | } | 553 | } |
554 | 554 | ||
555 | 555 | ||
556 | static int | 556 | static int |
557 | eckey_priv_print(BIO * bp, const EVP_PKEY * pkey, int indent, | 557 | eckey_priv_print(BIO *bp, const EVP_PKEY *pkey, int indent, |
558 | ASN1_PCTX * ctx) | 558 | ASN1_PCTX *ctx) |
559 | { | 559 | { |
560 | return do_EC_KEY_print(bp, pkey->pkey.ec, indent, 2); | 560 | return do_EC_KEY_print(bp, pkey->pkey.ec, indent, 2); |
561 | } | 561 | } |
562 | 562 | ||
563 | static int | 563 | static int |
564 | old_ec_priv_decode(EVP_PKEY * pkey, | 564 | old_ec_priv_decode(EVP_PKEY *pkey, |
565 | const unsigned char **pder, int derlen) | 565 | const unsigned char **pder, int derlen) |
566 | { | 566 | { |
567 | EC_KEY *ec; | 567 | EC_KEY *ec; |
@@ -574,13 +574,13 @@ old_ec_priv_decode(EVP_PKEY * pkey, | |||
574 | } | 574 | } |
575 | 575 | ||
576 | static int | 576 | static int |
577 | old_ec_priv_encode(const EVP_PKEY * pkey, unsigned char **pder) | 577 | old_ec_priv_encode(const EVP_PKEY *pkey, unsigned char **pder) |
578 | { | 578 | { |
579 | return i2d_ECPrivateKey(pkey->pkey.ec, pder); | 579 | return i2d_ECPrivateKey(pkey->pkey.ec, pder); |
580 | } | 580 | } |
581 | 581 | ||
582 | static int | 582 | static int |
583 | ec_pkey_ctrl(EVP_PKEY * pkey, int op, long arg1, void *arg2) | 583 | ec_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2) |
584 | { | 584 | { |
585 | switch (op) { | 585 | switch (op) { |
586 | case ASN1_PKEY_CTRL_PKCS7_SIGN: | 586 | case ASN1_PKEY_CTRL_PKCS7_SIGN: |
diff --git a/src/lib/libcrypto/ec/ec_asn1.c b/src/lib/libcrypto/ec/ec_asn1.c index baa58b5183..974afffe78 100644 --- a/src/lib/libcrypto/ec/ec_asn1.c +++ b/src/lib/libcrypto/ec/ec_asn1.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_asn1.c,v 1.38 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec_asn1.c,v 1.39 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Nils Larsch for the OpenSSL project. | 3 | * Written by Nils Larsch for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -68,7 +68,7 @@ | |||
68 | #include "ec_lcl.h" | 68 | #include "ec_lcl.h" |
69 | 69 | ||
70 | int | 70 | int |
71 | EC_GROUP_get_basis_type(const EC_GROUP * group) | 71 | EC_GROUP_get_basis_type(const EC_GROUP *group) |
72 | { | 72 | { |
73 | int i = 0; | 73 | int i = 0; |
74 | 74 | ||
@@ -91,7 +91,7 @@ EC_GROUP_get_basis_type(const EC_GROUP * group) | |||
91 | 91 | ||
92 | #ifndef OPENSSL_NO_EC2M | 92 | #ifndef OPENSSL_NO_EC2M |
93 | int | 93 | int |
94 | EC_GROUP_get_trinomial_basis(const EC_GROUP * group, unsigned int *k) | 94 | EC_GROUP_get_trinomial_basis(const EC_GROUP *group, unsigned int *k) |
95 | { | 95 | { |
96 | if (group == NULL) | 96 | if (group == NULL) |
97 | return 0; | 97 | return 0; |
@@ -109,7 +109,7 @@ EC_GROUP_get_trinomial_basis(const EC_GROUP * group, unsigned int *k) | |||
109 | } | 109 | } |
110 | 110 | ||
111 | int | 111 | int |
112 | EC_GROUP_get_pentanomial_basis(const EC_GROUP * group, unsigned int *k1, | 112 | EC_GROUP_get_pentanomial_basis(const EC_GROUP *group, unsigned int *k1, |
113 | unsigned int *k2, unsigned int *k3) | 113 | unsigned int *k2, unsigned int *k3) |
114 | { | 114 | { |
115 | if (group == NULL) | 115 | if (group == NULL) |
@@ -683,7 +683,7 @@ static ECPKPARAMETERS *ec_asn1_group2pkparameters(const EC_GROUP *, | |||
683 | /* the function definitions */ | 683 | /* the function definitions */ |
684 | 684 | ||
685 | static int | 685 | static int |
686 | ec_asn1_group2fieldid(const EC_GROUP * group, X9_62_FIELDID * field) | 686 | ec_asn1_group2fieldid(const EC_GROUP *group, X9_62_FIELDID *field) |
687 | { | 687 | { |
688 | int ok = 0, nid; | 688 | int ok = 0, nid; |
689 | BIGNUM *tmp = NULL; | 689 | BIGNUM *tmp = NULL; |
@@ -799,7 +799,7 @@ ec_asn1_group2fieldid(const EC_GROUP * group, X9_62_FIELDID * field) | |||
799 | } | 799 | } |
800 | 800 | ||
801 | static int | 801 | static int |
802 | ec_asn1_group2curve(const EC_GROUP * group, X9_62_CURVE * curve) | 802 | ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) |
803 | { | 803 | { |
804 | BIGNUM *tmp_1 = NULL, *tmp_2 = NULL; | 804 | BIGNUM *tmp_1 = NULL, *tmp_2 = NULL; |
805 | unsigned char *buffer_1 = NULL, *buffer_2 = NULL, *a_buf = NULL, | 805 | unsigned char *buffer_1 = NULL, *buffer_2 = NULL, *a_buf = NULL, |
@@ -894,7 +894,7 @@ ec_asn1_group2curve(const EC_GROUP * group, X9_62_CURVE * curve) | |||
894 | } | 894 | } |
895 | 895 | ||
896 | static ECPARAMETERS * | 896 | static ECPARAMETERS * |
897 | ec_asn1_group2parameters(const EC_GROUP * group, ECPARAMETERS * param) | 897 | ec_asn1_group2parameters(const EC_GROUP *group, ECPARAMETERS *param) |
898 | { | 898 | { |
899 | int ok = 0; | 899 | int ok = 0; |
900 | size_t len = 0; | 900 | size_t len = 0; |
@@ -989,7 +989,7 @@ ec_asn1_group2parameters(const EC_GROUP * group, ECPARAMETERS * param) | |||
989 | } | 989 | } |
990 | 990 | ||
991 | ECPKPARAMETERS * | 991 | ECPKPARAMETERS * |
992 | ec_asn1_group2pkparameters(const EC_GROUP * group, ECPKPARAMETERS * params) | 992 | ec_asn1_group2pkparameters(const EC_GROUP *group, ECPKPARAMETERS *params) |
993 | { | 993 | { |
994 | int ok = 1, tmp; | 994 | int ok = 1, tmp; |
995 | ECPKPARAMETERS *ret = params; | 995 | ECPKPARAMETERS *ret = params; |
@@ -1035,7 +1035,7 @@ ec_asn1_group2pkparameters(const EC_GROUP * group, ECPKPARAMETERS * params) | |||
1035 | } | 1035 | } |
1036 | 1036 | ||
1037 | static EC_GROUP * | 1037 | static EC_GROUP * |
1038 | ec_asn1_parameters2group(const ECPARAMETERS * params) | 1038 | ec_asn1_parameters2group(const ECPARAMETERS *params) |
1039 | { | 1039 | { |
1040 | int ok = 0, tmp; | 1040 | int ok = 0, tmp; |
1041 | EC_GROUP *ret = NULL; | 1041 | EC_GROUP *ret = NULL; |
@@ -1247,7 +1247,7 @@ ec_asn1_parameters2group(const ECPARAMETERS * params) | |||
1247 | } | 1247 | } |
1248 | 1248 | ||
1249 | EC_GROUP * | 1249 | EC_GROUP * |
1250 | ec_asn1_pkparameters2group(const ECPKPARAMETERS * params) | 1250 | ec_asn1_pkparameters2group(const ECPKPARAMETERS *params) |
1251 | { | 1251 | { |
1252 | EC_GROUP *ret = NULL; | 1252 | EC_GROUP *ret = NULL; |
1253 | int tmp = 0; | 1253 | int tmp = 0; |
@@ -1309,7 +1309,7 @@ d2i_ECPKParameters(EC_GROUP ** a, const unsigned char **in, long len) | |||
1309 | } | 1309 | } |
1310 | 1310 | ||
1311 | int | 1311 | int |
1312 | i2d_ECPKParameters(const EC_GROUP * a, unsigned char **out) | 1312 | i2d_ECPKParameters(const EC_GROUP *a, unsigned char **out) |
1313 | { | 1313 | { |
1314 | int ret = 0; | 1314 | int ret = 0; |
1315 | ECPKPARAMETERS *tmp = ec_asn1_group2pkparameters(a, NULL); | 1315 | ECPKPARAMETERS *tmp = ec_asn1_group2pkparameters(a, NULL); |
@@ -1421,7 +1421,7 @@ d2i_ECPrivateKey(EC_KEY ** a, const unsigned char **in, long len) | |||
1421 | } | 1421 | } |
1422 | 1422 | ||
1423 | int | 1423 | int |
1424 | i2d_ECPrivateKey(EC_KEY * a, unsigned char **out) | 1424 | i2d_ECPrivateKey(EC_KEY *a, unsigned char **out) |
1425 | { | 1425 | { |
1426 | int ret = 0, ok = 0; | 1426 | int ret = 0, ok = 0; |
1427 | unsigned char *buffer = NULL; | 1427 | unsigned char *buffer = NULL; |
@@ -1505,7 +1505,7 @@ i2d_ECPrivateKey(EC_KEY * a, unsigned char **out) | |||
1505 | } | 1505 | } |
1506 | 1506 | ||
1507 | int | 1507 | int |
1508 | i2d_ECParameters(EC_KEY * a, unsigned char **out) | 1508 | i2d_ECParameters(EC_KEY *a, unsigned char **out) |
1509 | { | 1509 | { |
1510 | if (a == NULL) { | 1510 | if (a == NULL) { |
1511 | ECerror(ERR_R_PASSED_NULL_PARAMETER); | 1511 | ECerror(ERR_R_PASSED_NULL_PARAMETER); |
@@ -1570,7 +1570,7 @@ o2i_ECPublicKey(EC_KEY ** a, const unsigned char **in, long len) | |||
1570 | } | 1570 | } |
1571 | 1571 | ||
1572 | int | 1572 | int |
1573 | i2o_ECPublicKey(const EC_KEY * a, unsigned char **out) | 1573 | i2o_ECPublicKey(const EC_KEY *a, unsigned char **out) |
1574 | { | 1574 | { |
1575 | size_t buf_len = 0; | 1575 | size_t buf_len = 0; |
1576 | int new_buffer = 0; | 1576 | int new_buffer = 0; |
diff --git a/src/lib/libcrypto/ec/ec_check.c b/src/lib/libcrypto/ec/ec_check.c index 3f6a802374..cc54ded3e7 100644 --- a/src/lib/libcrypto/ec/ec_check.c +++ b/src/lib/libcrypto/ec/ec_check.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_check.c,v 1.10 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec_check.c,v 1.11 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -57,7 +57,7 @@ | |||
57 | #include <openssl/err.h> | 57 | #include <openssl/err.h> |
58 | 58 | ||
59 | int | 59 | int |
60 | EC_GROUP_check(const EC_GROUP * group, BN_CTX * ctx) | 60 | EC_GROUP_check(const EC_GROUP *group, BN_CTX *ctx) |
61 | { | 61 | { |
62 | int ret = 0; | 62 | int ret = 0; |
63 | BIGNUM *order; | 63 | BIGNUM *order; |
diff --git a/src/lib/libcrypto/ec/ec_curve.c b/src/lib/libcrypto/ec/ec_curve.c index 1f69d4f1dc..592a367a82 100644 --- a/src/lib/libcrypto/ec/ec_curve.c +++ b/src/lib/libcrypto/ec/ec_curve.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_curve.c,v 1.23 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec_curve.c,v 1.24 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Nils Larsch for the OpenSSL project. | 3 | * Written by Nils Larsch for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -3434,7 +3434,7 @@ EC_GROUP_new_by_curve_name(int nid) | |||
3434 | } | 3434 | } |
3435 | 3435 | ||
3436 | size_t | 3436 | size_t |
3437 | EC_get_builtin_curves(EC_builtin_curve * r, size_t nitems) | 3437 | EC_get_builtin_curves(EC_builtin_curve *r, size_t nitems) |
3438 | { | 3438 | { |
3439 | size_t i, min; | 3439 | size_t i, min; |
3440 | 3440 | ||
diff --git a/src/lib/libcrypto/ec/ec_key.c b/src/lib/libcrypto/ec/ec_key.c index 3aa6a96eb8..fa8d463220 100644 --- a/src/lib/libcrypto/ec/ec_key.c +++ b/src/lib/libcrypto/ec/ec_key.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_key.c,v 1.27 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec_key.c,v 1.28 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Nils Larsch for the OpenSSL project. | 3 | * Written by Nils Larsch for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -99,7 +99,7 @@ EC_KEY_new_by_curve_name(int nid) | |||
99 | } | 99 | } |
100 | 100 | ||
101 | void | 101 | void |
102 | EC_KEY_free(EC_KEY * r) | 102 | EC_KEY_free(EC_KEY *r) |
103 | { | 103 | { |
104 | int i; | 104 | int i; |
105 | 105 | ||
@@ -128,7 +128,7 @@ EC_KEY_free(EC_KEY * r) | |||
128 | } | 128 | } |
129 | 129 | ||
130 | EC_KEY * | 130 | EC_KEY * |
131 | EC_KEY_copy(EC_KEY * dest, const EC_KEY * src) | 131 | EC_KEY_copy(EC_KEY *dest, const EC_KEY *src) |
132 | { | 132 | { |
133 | EC_EXTRA_DATA *d; | 133 | EC_EXTRA_DATA *d; |
134 | 134 | ||
@@ -215,7 +215,7 @@ EC_KEY_copy(EC_KEY * dest, const EC_KEY * src) | |||
215 | } | 215 | } |
216 | 216 | ||
217 | EC_KEY * | 217 | EC_KEY * |
218 | EC_KEY_dup(const EC_KEY * ec_key) | 218 | EC_KEY_dup(const EC_KEY *ec_key) |
219 | { | 219 | { |
220 | EC_KEY *ret; | 220 | EC_KEY *ret; |
221 | 221 | ||
@@ -229,7 +229,7 @@ EC_KEY_dup(const EC_KEY * ec_key) | |||
229 | } | 229 | } |
230 | 230 | ||
231 | int | 231 | int |
232 | EC_KEY_up_ref(EC_KEY * r) | 232 | EC_KEY_up_ref(EC_KEY *r) |
233 | { | 233 | { |
234 | int i = CRYPTO_add(&r->references, 1, CRYPTO_LOCK_EC); | 234 | int i = CRYPTO_add(&r->references, 1, CRYPTO_LOCK_EC); |
235 | return ((i > 1) ? 1 : 0); | 235 | return ((i > 1) ? 1 : 0); |
@@ -309,7 +309,7 @@ ossl_ec_key_gen(EC_KEY *eckey) | |||
309 | } | 309 | } |
310 | 310 | ||
311 | int | 311 | int |
312 | EC_KEY_check_key(const EC_KEY * eckey) | 312 | EC_KEY_check_key(const EC_KEY *eckey) |
313 | { | 313 | { |
314 | int ok = 0; | 314 | int ok = 0; |
315 | BN_CTX *ctx = NULL; | 315 | BN_CTX *ctx = NULL; |
@@ -376,7 +376,7 @@ EC_KEY_check_key(const EC_KEY * eckey) | |||
376 | } | 376 | } |
377 | 377 | ||
378 | int | 378 | int |
379 | EC_KEY_set_public_key_affine_coordinates(EC_KEY * key, BIGNUM * x, BIGNUM * y) | 379 | EC_KEY_set_public_key_affine_coordinates(EC_KEY *key, BIGNUM *x, BIGNUM *y) |
380 | { | 380 | { |
381 | BN_CTX *ctx = NULL; | 381 | BN_CTX *ctx = NULL; |
382 | BIGNUM *tx, *ty; | 382 | BIGNUM *tx, *ty; |
@@ -429,13 +429,13 @@ EC_KEY_set_public_key_affine_coordinates(EC_KEY * key, BIGNUM * x, BIGNUM * y) | |||
429 | } | 429 | } |
430 | 430 | ||
431 | const EC_GROUP * | 431 | const EC_GROUP * |
432 | EC_KEY_get0_group(const EC_KEY * key) | 432 | EC_KEY_get0_group(const EC_KEY *key) |
433 | { | 433 | { |
434 | return key->group; | 434 | return key->group; |
435 | } | 435 | } |
436 | 436 | ||
437 | int | 437 | int |
438 | EC_KEY_set_group(EC_KEY * key, const EC_GROUP * group) | 438 | EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group) |
439 | { | 439 | { |
440 | if (key->meth->set_group != NULL && | 440 | if (key->meth->set_group != NULL && |
441 | key->meth->set_group(key, group) == 0) | 441 | key->meth->set_group(key, group) == 0) |
@@ -446,13 +446,13 @@ EC_KEY_set_group(EC_KEY * key, const EC_GROUP * group) | |||
446 | } | 446 | } |
447 | 447 | ||
448 | const BIGNUM * | 448 | const BIGNUM * |
449 | EC_KEY_get0_private_key(const EC_KEY * key) | 449 | EC_KEY_get0_private_key(const EC_KEY *key) |
450 | { | 450 | { |
451 | return key->priv_key; | 451 | return key->priv_key; |
452 | } | 452 | } |
453 | 453 | ||
454 | int | 454 | int |
455 | EC_KEY_set_private_key(EC_KEY * key, const BIGNUM * priv_key) | 455 | EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *priv_key) |
456 | { | 456 | { |
457 | if (key->meth->set_private != NULL && | 457 | if (key->meth->set_private != NULL && |
458 | key->meth->set_private(key, priv_key) == 0) | 458 | key->meth->set_private(key, priv_key) == 0) |
@@ -463,13 +463,13 @@ EC_KEY_set_private_key(EC_KEY * key, const BIGNUM * priv_key) | |||
463 | } | 463 | } |
464 | 464 | ||
465 | const EC_POINT * | 465 | const EC_POINT * |
466 | EC_KEY_get0_public_key(const EC_KEY * key) | 466 | EC_KEY_get0_public_key(const EC_KEY *key) |
467 | { | 467 | { |
468 | return key->pub_key; | 468 | return key->pub_key; |
469 | } | 469 | } |
470 | 470 | ||
471 | int | 471 | int |
472 | EC_KEY_set_public_key(EC_KEY * key, const EC_POINT * pub_key) | 472 | EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub_key) |
473 | { | 473 | { |
474 | if (key->meth->set_public != NULL && | 474 | if (key->meth->set_public != NULL && |
475 | key->meth->set_public(key, pub_key) == 0) | 475 | key->meth->set_public(key, pub_key) == 0) |
@@ -480,25 +480,25 @@ EC_KEY_set_public_key(EC_KEY * key, const EC_POINT * pub_key) | |||
480 | } | 480 | } |
481 | 481 | ||
482 | unsigned int | 482 | unsigned int |
483 | EC_KEY_get_enc_flags(const EC_KEY * key) | 483 | EC_KEY_get_enc_flags(const EC_KEY *key) |
484 | { | 484 | { |
485 | return key->enc_flag; | 485 | return key->enc_flag; |
486 | } | 486 | } |
487 | 487 | ||
488 | void | 488 | void |
489 | EC_KEY_set_enc_flags(EC_KEY * key, unsigned int flags) | 489 | EC_KEY_set_enc_flags(EC_KEY *key, unsigned int flags) |
490 | { | 490 | { |
491 | key->enc_flag = flags; | 491 | key->enc_flag = flags; |
492 | } | 492 | } |
493 | 493 | ||
494 | point_conversion_form_t | 494 | point_conversion_form_t |
495 | EC_KEY_get_conv_form(const EC_KEY * key) | 495 | EC_KEY_get_conv_form(const EC_KEY *key) |
496 | { | 496 | { |
497 | return key->conv_form; | 497 | return key->conv_form; |
498 | } | 498 | } |
499 | 499 | ||
500 | void | 500 | void |
501 | EC_KEY_set_conv_form(EC_KEY * key, point_conversion_form_t cform) | 501 | EC_KEY_set_conv_form(EC_KEY *key, point_conversion_form_t cform) |
502 | { | 502 | { |
503 | key->conv_form = cform; | 503 | key->conv_form = cform; |
504 | if (key->group != NULL) | 504 | if (key->group != NULL) |
@@ -521,7 +521,7 @@ EC_KEY_get_key_method_data(EC_KEY *key, | |||
521 | } | 521 | } |
522 | 522 | ||
523 | void * | 523 | void * |
524 | EC_KEY_insert_key_method_data(EC_KEY * key, void *data, | 524 | EC_KEY_insert_key_method_data(EC_KEY *key, void *data, |
525 | void *(*dup_func) (void *), | 525 | void *(*dup_func) (void *), |
526 | void (*free_func) (void *), | 526 | void (*free_func) (void *), |
527 | void (*clear_free_func) (void *)) | 527 | void (*clear_free_func) (void *)) |
@@ -538,14 +538,14 @@ EC_KEY_insert_key_method_data(EC_KEY * key, void *data, | |||
538 | } | 538 | } |
539 | 539 | ||
540 | void | 540 | void |
541 | EC_KEY_set_asn1_flag(EC_KEY * key, int flag) | 541 | EC_KEY_set_asn1_flag(EC_KEY *key, int flag) |
542 | { | 542 | { |
543 | if (key->group != NULL) | 543 | if (key->group != NULL) |
544 | EC_GROUP_set_asn1_flag(key->group, flag); | 544 | EC_GROUP_set_asn1_flag(key->group, flag); |
545 | } | 545 | } |
546 | 546 | ||
547 | int | 547 | int |
548 | EC_KEY_precompute_mult(EC_KEY * key, BN_CTX * ctx) | 548 | EC_KEY_precompute_mult(EC_KEY *key, BN_CTX *ctx) |
549 | { | 549 | { |
550 | if (key->group == NULL) | 550 | if (key->group == NULL) |
551 | return 0; | 551 | return 0; |
@@ -553,19 +553,19 @@ EC_KEY_precompute_mult(EC_KEY * key, BN_CTX * ctx) | |||
553 | } | 553 | } |
554 | 554 | ||
555 | int | 555 | int |
556 | EC_KEY_get_flags(const EC_KEY * key) | 556 | EC_KEY_get_flags(const EC_KEY *key) |
557 | { | 557 | { |
558 | return key->flags; | 558 | return key->flags; |
559 | } | 559 | } |
560 | 560 | ||
561 | void | 561 | void |
562 | EC_KEY_set_flags(EC_KEY * key, int flags) | 562 | EC_KEY_set_flags(EC_KEY *key, int flags) |
563 | { | 563 | { |
564 | key->flags |= flags; | 564 | key->flags |= flags; |
565 | } | 565 | } |
566 | 566 | ||
567 | void | 567 | void |
568 | EC_KEY_clear_flags(EC_KEY * key, int flags) | 568 | EC_KEY_clear_flags(EC_KEY *key, int flags) |
569 | { | 569 | { |
570 | key->flags &= ~flags; | 570 | key->flags &= ~flags; |
571 | } | 571 | } |
diff --git a/src/lib/libcrypto/ec/ec_lib.c b/src/lib/libcrypto/ec/ec_lib.c index 4ec17d5d5d..151e91b36c 100644 --- a/src/lib/libcrypto/ec/ec_lib.c +++ b/src/lib/libcrypto/ec/ec_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_lib.c,v 1.45 2022/04/07 17:37:25 tb Exp $ */ | 1 | /* $OpenBSD: ec_lib.c,v 1.46 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Originally written by Bodo Moeller for the OpenSSL project. | 3 | * Originally written by Bodo Moeller for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -74,7 +74,7 @@ | |||
74 | /* functions for EC_GROUP objects */ | 74 | /* functions for EC_GROUP objects */ |
75 | 75 | ||
76 | EC_GROUP * | 76 | EC_GROUP * |
77 | EC_GROUP_new(const EC_METHOD * meth) | 77 | EC_GROUP_new(const EC_METHOD *meth) |
78 | { | 78 | { |
79 | EC_GROUP *ret; | 79 | EC_GROUP *ret; |
80 | 80 | ||
@@ -115,7 +115,7 @@ EC_GROUP_new(const EC_METHOD * meth) | |||
115 | 115 | ||
116 | 116 | ||
117 | void | 117 | void |
118 | EC_GROUP_free(EC_GROUP * group) | 118 | EC_GROUP_free(EC_GROUP *group) |
119 | { | 119 | { |
120 | if (!group) | 120 | if (!group) |
121 | return; | 121 | return; |
@@ -136,7 +136,7 @@ EC_GROUP_free(EC_GROUP * group) | |||
136 | 136 | ||
137 | 137 | ||
138 | void | 138 | void |
139 | EC_GROUP_clear_free(EC_GROUP * group) | 139 | EC_GROUP_clear_free(EC_GROUP *group) |
140 | { | 140 | { |
141 | if (!group) | 141 | if (!group) |
142 | return; | 142 | return; |
@@ -158,7 +158,7 @@ EC_GROUP_clear_free(EC_GROUP * group) | |||
158 | 158 | ||
159 | 159 | ||
160 | int | 160 | int |
161 | EC_GROUP_copy(EC_GROUP * dest, const EC_GROUP * src) | 161 | EC_GROUP_copy(EC_GROUP *dest, const EC_GROUP *src) |
162 | { | 162 | { |
163 | EC_EXTRA_DATA *d; | 163 | EC_EXTRA_DATA *d; |
164 | 164 | ||
@@ -227,7 +227,7 @@ EC_GROUP_copy(EC_GROUP * dest, const EC_GROUP * src) | |||
227 | 227 | ||
228 | 228 | ||
229 | EC_GROUP * | 229 | EC_GROUP * |
230 | EC_GROUP_dup(const EC_GROUP * a) | 230 | EC_GROUP_dup(const EC_GROUP *a) |
231 | { | 231 | { |
232 | EC_GROUP *t = NULL; | 232 | EC_GROUP *t = NULL; |
233 | 233 | ||
@@ -428,35 +428,35 @@ EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor, BN_CTX *ctx) | |||
428 | 428 | ||
429 | 429 | ||
430 | void | 430 | void |
431 | EC_GROUP_set_curve_name(EC_GROUP * group, int nid) | 431 | EC_GROUP_set_curve_name(EC_GROUP *group, int nid) |
432 | { | 432 | { |
433 | group->curve_name = nid; | 433 | group->curve_name = nid; |
434 | } | 434 | } |
435 | 435 | ||
436 | 436 | ||
437 | int | 437 | int |
438 | EC_GROUP_get_curve_name(const EC_GROUP * group) | 438 | EC_GROUP_get_curve_name(const EC_GROUP *group) |
439 | { | 439 | { |
440 | return group->curve_name; | 440 | return group->curve_name; |
441 | } | 441 | } |
442 | 442 | ||
443 | 443 | ||
444 | void | 444 | void |
445 | EC_GROUP_set_asn1_flag(EC_GROUP * group, int flag) | 445 | EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag) |
446 | { | 446 | { |
447 | group->asn1_flag = flag; | 447 | group->asn1_flag = flag; |
448 | } | 448 | } |
449 | 449 | ||
450 | 450 | ||
451 | int | 451 | int |
452 | EC_GROUP_get_asn1_flag(const EC_GROUP * group) | 452 | EC_GROUP_get_asn1_flag(const EC_GROUP *group) |
453 | { | 453 | { |
454 | return group->asn1_flag; | 454 | return group->asn1_flag; |
455 | } | 455 | } |
456 | 456 | ||
457 | 457 | ||
458 | void | 458 | void |
459 | EC_GROUP_set_point_conversion_form(EC_GROUP * group, | 459 | EC_GROUP_set_point_conversion_form(EC_GROUP *group, |
460 | point_conversion_form_t form) | 460 | point_conversion_form_t form) |
461 | { | 461 | { |
462 | group->asn1_form = form; | 462 | group->asn1_form = form; |
@@ -464,14 +464,14 @@ EC_GROUP_set_point_conversion_form(EC_GROUP * group, | |||
464 | 464 | ||
465 | 465 | ||
466 | point_conversion_form_t | 466 | point_conversion_form_t |
467 | EC_GROUP_get_point_conversion_form(const EC_GROUP * group) | 467 | EC_GROUP_get_point_conversion_form(const EC_GROUP *group) |
468 | { | 468 | { |
469 | return group->asn1_form; | 469 | return group->asn1_form; |
470 | } | 470 | } |
471 | 471 | ||
472 | 472 | ||
473 | size_t | 473 | size_t |
474 | EC_GROUP_set_seed(EC_GROUP * group, const unsigned char *p, size_t len) | 474 | EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len) |
475 | { | 475 | { |
476 | if (group->seed) { | 476 | if (group->seed) { |
477 | free(group->seed); | 477 | free(group->seed); |
@@ -491,14 +491,14 @@ EC_GROUP_set_seed(EC_GROUP * group, const unsigned char *p, size_t len) | |||
491 | 491 | ||
492 | 492 | ||
493 | unsigned char * | 493 | unsigned char * |
494 | EC_GROUP_get0_seed(const EC_GROUP * group) | 494 | EC_GROUP_get0_seed(const EC_GROUP *group) |
495 | { | 495 | { |
496 | return group->seed; | 496 | return group->seed; |
497 | } | 497 | } |
498 | 498 | ||
499 | 499 | ||
500 | size_t | 500 | size_t |
501 | EC_GROUP_get_seed_len(const EC_GROUP * group) | 501 | EC_GROUP_get_seed_len(const EC_GROUP *group) |
502 | { | 502 | { |
503 | return group->seed_len; | 503 | return group->seed_len; |
504 | } | 504 | } |
@@ -556,7 +556,7 @@ EC_GROUP_get_curve_GF2m(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, | |||
556 | #endif | 556 | #endif |
557 | 557 | ||
558 | int | 558 | int |
559 | EC_GROUP_get_degree(const EC_GROUP * group) | 559 | EC_GROUP_get_degree(const EC_GROUP *group) |
560 | { | 560 | { |
561 | if (group->meth->group_get_degree == 0) { | 561 | if (group->meth->group_get_degree == 0) { |
562 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | 562 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
@@ -567,7 +567,7 @@ EC_GROUP_get_degree(const EC_GROUP * group) | |||
567 | 567 | ||
568 | 568 | ||
569 | int | 569 | int |
570 | EC_GROUP_check_discriminant(const EC_GROUP * group, BN_CTX * ctx) | 570 | EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx) |
571 | { | 571 | { |
572 | if (group->meth->group_check_discriminant == 0) { | 572 | if (group->meth->group_check_discriminant == 0) { |
573 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | 573 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
@@ -578,7 +578,7 @@ EC_GROUP_check_discriminant(const EC_GROUP * group, BN_CTX * ctx) | |||
578 | 578 | ||
579 | 579 | ||
580 | int | 580 | int |
581 | EC_GROUP_cmp(const EC_GROUP * a, const EC_GROUP * b, BN_CTX * ctx) | 581 | EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b, BN_CTX *ctx) |
582 | { | 582 | { |
583 | int r = 0; | 583 | int r = 0; |
584 | BIGNUM *a1, *a2, *a3, *b1, *b2, *b3; | 584 | BIGNUM *a1, *a2, *a3, *b1, *b2, *b3; |
@@ -710,7 +710,7 @@ EC_EX_DATA_set_data(EC_EXTRA_DATA ** ex_data, void *data, | |||
710 | 710 | ||
711 | /* this has 'package' visibility */ | 711 | /* this has 'package' visibility */ |
712 | void * | 712 | void * |
713 | EC_EX_DATA_get_data(const EC_EXTRA_DATA * ex_data, | 713 | EC_EX_DATA_get_data(const EC_EXTRA_DATA *ex_data, |
714 | void *(*dup_func) (void *), | 714 | void *(*dup_func) (void *), |
715 | void (*free_func) (void *), | 715 | void (*free_func) (void *), |
716 | void (*clear_free_func) (void *)) | 716 | void (*clear_free_func) (void *)) |
@@ -825,7 +825,7 @@ EC_EX_DATA_clear_free_all_data(EC_EXTRA_DATA ** ex_data) | |||
825 | /* functions for EC_POINT objects */ | 825 | /* functions for EC_POINT objects */ |
826 | 826 | ||
827 | EC_POINT * | 827 | EC_POINT * |
828 | EC_POINT_new(const EC_GROUP * group) | 828 | EC_POINT_new(const EC_GROUP *group) |
829 | { | 829 | { |
830 | EC_POINT *ret; | 830 | EC_POINT *ret; |
831 | 831 | ||
@@ -853,7 +853,7 @@ EC_POINT_new(const EC_GROUP * group) | |||
853 | 853 | ||
854 | 854 | ||
855 | void | 855 | void |
856 | EC_POINT_free(EC_POINT * point) | 856 | EC_POINT_free(EC_POINT *point) |
857 | { | 857 | { |
858 | if (!point) | 858 | if (!point) |
859 | return; | 859 | return; |
@@ -865,7 +865,7 @@ EC_POINT_free(EC_POINT * point) | |||
865 | 865 | ||
866 | 866 | ||
867 | void | 867 | void |
868 | EC_POINT_clear_free(EC_POINT * point) | 868 | EC_POINT_clear_free(EC_POINT *point) |
869 | { | 869 | { |
870 | if (!point) | 870 | if (!point) |
871 | return; | 871 | return; |
@@ -879,7 +879,7 @@ EC_POINT_clear_free(EC_POINT * point) | |||
879 | 879 | ||
880 | 880 | ||
881 | int | 881 | int |
882 | EC_POINT_copy(EC_POINT * dest, const EC_POINT * src) | 882 | EC_POINT_copy(EC_POINT *dest, const EC_POINT *src) |
883 | { | 883 | { |
884 | if (dest->meth->point_copy == 0) { | 884 | if (dest->meth->point_copy == 0) { |
885 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | 885 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
@@ -896,7 +896,7 @@ EC_POINT_copy(EC_POINT * dest, const EC_POINT * src) | |||
896 | 896 | ||
897 | 897 | ||
898 | EC_POINT * | 898 | EC_POINT * |
899 | EC_POINT_dup(const EC_POINT * a, const EC_GROUP * group) | 899 | EC_POINT_dup(const EC_POINT *a, const EC_GROUP *group) |
900 | { | 900 | { |
901 | EC_POINT *t; | 901 | EC_POINT *t; |
902 | int r; | 902 | int r; |
@@ -917,14 +917,14 @@ EC_POINT_dup(const EC_POINT * a, const EC_GROUP * group) | |||
917 | 917 | ||
918 | 918 | ||
919 | const EC_METHOD * | 919 | const EC_METHOD * |
920 | EC_POINT_method_of(const EC_POINT * point) | 920 | EC_POINT_method_of(const EC_POINT *point) |
921 | { | 921 | { |
922 | return point->meth; | 922 | return point->meth; |
923 | } | 923 | } |
924 | 924 | ||
925 | 925 | ||
926 | int | 926 | int |
927 | EC_POINT_set_to_infinity(const EC_GROUP * group, EC_POINT * point) | 927 | EC_POINT_set_to_infinity(const EC_GROUP *group, EC_POINT *point) |
928 | { | 928 | { |
929 | if (group->meth->point_set_to_infinity == 0) { | 929 | if (group->meth->point_set_to_infinity == 0) { |
930 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | 930 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
@@ -1113,7 +1113,7 @@ EC_POINT_is_at_infinity(const EC_GROUP *group, const EC_POINT *point) | |||
1113 | 1113 | ||
1114 | 1114 | ||
1115 | int | 1115 | int |
1116 | EC_POINT_is_on_curve(const EC_GROUP * group, const EC_POINT * point, BN_CTX * ctx) | 1116 | EC_POINT_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_CTX *ctx) |
1117 | { | 1117 | { |
1118 | if (group->meth->is_on_curve == 0) { | 1118 | if (group->meth->is_on_curve == 0) { |
1119 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | 1119 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
@@ -1129,7 +1129,7 @@ EC_POINT_is_on_curve(const EC_GROUP * group, const EC_POINT * point, BN_CTX * ct | |||
1129 | 1129 | ||
1130 | int | 1130 | int |
1131 | EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, | 1131 | EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, |
1132 | BN_CTX * ctx) | 1132 | BN_CTX *ctx) |
1133 | { | 1133 | { |
1134 | if (group->meth->point_cmp == 0) { | 1134 | if (group->meth->point_cmp == 0) { |
1135 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | 1135 | ECerror(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
@@ -1258,7 +1258,7 @@ EC_POINT_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *g_scalar, | |||
1258 | } | 1258 | } |
1259 | 1259 | ||
1260 | int | 1260 | int |
1261 | EC_GROUP_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | 1261 | EC_GROUP_precompute_mult(EC_GROUP *group, BN_CTX *ctx) |
1262 | { | 1262 | { |
1263 | if (group->meth->precompute_mult != 0) | 1263 | if (group->meth->precompute_mult != 0) |
1264 | return group->meth->precompute_mult(group, ctx); | 1264 | return group->meth->precompute_mult(group, ctx); |
@@ -1267,7 +1267,7 @@ EC_GROUP_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | |||
1267 | } | 1267 | } |
1268 | 1268 | ||
1269 | int | 1269 | int |
1270 | EC_GROUP_have_precompute_mult(const EC_GROUP * group) | 1270 | EC_GROUP_have_precompute_mult(const EC_GROUP *group) |
1271 | { | 1271 | { |
1272 | if (group->meth->have_precompute_mult != 0) | 1272 | if (group->meth->have_precompute_mult != 0) |
1273 | return group->meth->have_precompute_mult(group); | 1273 | return group->meth->have_precompute_mult(group); |
diff --git a/src/lib/libcrypto/ec/ec_mult.c b/src/lib/libcrypto/ec/ec_mult.c index 1198a6f6b1..a3da62323a 100644 --- a/src/lib/libcrypto/ec/ec_mult.c +++ b/src/lib/libcrypto/ec/ec_mult.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_mult.c,v 1.25 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec_mult.c,v 1.26 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Originally written by Bodo Moeller and Nils Larsch for the OpenSSL project. | 3 | * Originally written by Bodo Moeller and Nils Larsch for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -98,7 +98,7 @@ static void ec_pre_comp_free(void *); | |||
98 | static void ec_pre_comp_clear_free(void *); | 98 | static void ec_pre_comp_clear_free(void *); |
99 | 99 | ||
100 | static EC_PRE_COMP * | 100 | static EC_PRE_COMP * |
101 | ec_pre_comp_new(const EC_GROUP * group) | 101 | ec_pre_comp_new(const EC_GROUP *group) |
102 | { | 102 | { |
103 | EC_PRE_COMP *ret = NULL; | 103 | EC_PRE_COMP *ret = NULL; |
104 | 104 | ||
@@ -192,7 +192,7 @@ ec_pre_comp_clear_free(void *pre_) | |||
192 | * w-1 zeros away from that next non-zero digit. | 192 | * w-1 zeros away from that next non-zero digit. |
193 | */ | 193 | */ |
194 | static signed char * | 194 | static signed char * |
195 | compute_wNAF(const BIGNUM * scalar, int w, size_t * ret_len) | 195 | compute_wNAF(const BIGNUM *scalar, int w, size_t *ret_len) |
196 | { | 196 | { |
197 | int window_val; | 197 | int window_val; |
198 | int ok = 0; | 198 | int ok = 0; |
@@ -332,8 +332,8 @@ compute_wNAF(const BIGNUM * scalar, int w, size_t * ret_len) | |||
332 | * in the addition if scalar != NULL | 332 | * in the addition if scalar != NULL |
333 | */ | 333 | */ |
334 | int | 334 | int |
335 | ec_wNAF_mul(const EC_GROUP * group, EC_POINT * r, const BIGNUM * scalar, | 335 | ec_wNAF_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, |
336 | size_t num, const EC_POINT * points[], const BIGNUM * scalars[], BN_CTX * ctx) | 336 | size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) |
337 | { | 337 | { |
338 | BN_CTX *new_ctx = NULL; | 338 | BN_CTX *new_ctx = NULL; |
339 | const EC_POINT *generator = NULL; | 339 | const EC_POINT *generator = NULL; |
@@ -722,7 +722,7 @@ ec_wNAF_mul(const EC_GROUP * group, EC_POINT * r, const BIGNUM * scalar, | |||
722 | * points[2^(w-1)*numblocks] = NULL | 722 | * points[2^(w-1)*numblocks] = NULL |
723 | */ | 723 | */ |
724 | int | 724 | int |
725 | ec_wNAF_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | 725 | ec_wNAF_precompute_mult(EC_GROUP *group, BN_CTX *ctx) |
726 | { | 726 | { |
727 | const EC_POINT *generator; | 727 | const EC_POINT *generator; |
728 | EC_POINT *tmp_point = NULL, *base = NULL, **var; | 728 | EC_POINT *tmp_point = NULL, *base = NULL, **var; |
@@ -876,7 +876,7 @@ ec_wNAF_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | |||
876 | 876 | ||
877 | 877 | ||
878 | int | 878 | int |
879 | ec_wNAF_have_precompute_mult(const EC_GROUP * group) | 879 | ec_wNAF_have_precompute_mult(const EC_GROUP *group) |
880 | { | 880 | { |
881 | if (EC_EX_DATA_get_data(group->extra_data, ec_pre_comp_dup, ec_pre_comp_free, ec_pre_comp_clear_free) != NULL) | 881 | if (EC_EX_DATA_get_data(group->extra_data, ec_pre_comp_dup, ec_pre_comp_free, ec_pre_comp_clear_free) != NULL) |
882 | return 1; | 882 | return 1; |
diff --git a/src/lib/libcrypto/ec/ec_pmeth.c b/src/lib/libcrypto/ec/ec_pmeth.c index 3637d6bba6..80c09b1e21 100644 --- a/src/lib/libcrypto/ec/ec_pmeth.c +++ b/src/lib/libcrypto/ec/ec_pmeth.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_pmeth.c,v 1.14 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ec_pmeth.c,v 1.15 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2006. | 3 | * project 2006. |
4 | */ | 4 | */ |
@@ -94,7 +94,7 @@ typedef struct { | |||
94 | } EC_PKEY_CTX; | 94 | } EC_PKEY_CTX; |
95 | 95 | ||
96 | static int | 96 | static int |
97 | pkey_ec_init(EVP_PKEY_CTX * ctx) | 97 | pkey_ec_init(EVP_PKEY_CTX *ctx) |
98 | { | 98 | { |
99 | EC_PKEY_CTX *dctx; | 99 | EC_PKEY_CTX *dctx; |
100 | 100 | ||
@@ -112,7 +112,7 @@ pkey_ec_init(EVP_PKEY_CTX * ctx) | |||
112 | } | 112 | } |
113 | 113 | ||
114 | static int | 114 | static int |
115 | pkey_ec_copy(EVP_PKEY_CTX * dst, EVP_PKEY_CTX * src) | 115 | pkey_ec_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src) |
116 | { | 116 | { |
117 | EC_PKEY_CTX *dctx, *sctx; | 117 | EC_PKEY_CTX *dctx, *sctx; |
118 | if (!pkey_ec_init(dst)) | 118 | if (!pkey_ec_init(dst)) |
@@ -147,7 +147,7 @@ pkey_ec_copy(EVP_PKEY_CTX * dst, EVP_PKEY_CTX * src) | |||
147 | } | 147 | } |
148 | 148 | ||
149 | static void | 149 | static void |
150 | pkey_ec_cleanup(EVP_PKEY_CTX * ctx) | 150 | pkey_ec_cleanup(EVP_PKEY_CTX *ctx) |
151 | { | 151 | { |
152 | EC_PKEY_CTX *dctx = ctx->data; | 152 | EC_PKEY_CTX *dctx = ctx->data; |
153 | 153 | ||
@@ -161,7 +161,7 @@ pkey_ec_cleanup(EVP_PKEY_CTX * ctx) | |||
161 | } | 161 | } |
162 | 162 | ||
163 | static int | 163 | static int |
164 | pkey_ec_sign(EVP_PKEY_CTX * ctx, unsigned char *sig, size_t * siglen, | 164 | pkey_ec_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, |
165 | const unsigned char *tbs, size_t tbslen) | 165 | const unsigned char *tbs, size_t tbslen) |
166 | { | 166 | { |
167 | int ret, type; | 167 | int ret, type; |
@@ -189,7 +189,7 @@ pkey_ec_sign(EVP_PKEY_CTX * ctx, unsigned char *sig, size_t * siglen, | |||
189 | } | 189 | } |
190 | 190 | ||
191 | static int | 191 | static int |
192 | pkey_ec_verify(EVP_PKEY_CTX * ctx, | 192 | pkey_ec_verify(EVP_PKEY_CTX *ctx, |
193 | const unsigned char *sig, size_t siglen, | 193 | const unsigned char *sig, size_t siglen, |
194 | const unsigned char *tbs, size_t tbslen) | 194 | const unsigned char *tbs, size_t tbslen) |
195 | { | 195 | { |
@@ -208,7 +208,7 @@ pkey_ec_verify(EVP_PKEY_CTX * ctx, | |||
208 | } | 208 | } |
209 | 209 | ||
210 | static int | 210 | static int |
211 | pkey_ec_derive(EVP_PKEY_CTX * ctx, unsigned char *key, size_t * keylen) | 211 | pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) |
212 | { | 212 | { |
213 | int ret; | 213 | int ret; |
214 | size_t outlen; | 214 | size_t outlen; |
@@ -284,7 +284,7 @@ pkey_ec_kdf_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) | |||
284 | } | 284 | } |
285 | 285 | ||
286 | static int | 286 | static int |
287 | pkey_ec_ctrl(EVP_PKEY_CTX * ctx, int type, int p1, void *p2) | 287 | pkey_ec_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) |
288 | { | 288 | { |
289 | EC_PKEY_CTX *dctx = ctx->data; | 289 | EC_PKEY_CTX *dctx = ctx->data; |
290 | EC_GROUP *group; | 290 | EC_GROUP *group; |
@@ -411,7 +411,7 @@ pkey_ec_ctrl(EVP_PKEY_CTX * ctx, int type, int p1, void *p2) | |||
411 | } | 411 | } |
412 | 412 | ||
413 | static int | 413 | static int |
414 | pkey_ec_ctrl_str(EVP_PKEY_CTX * ctx, const char *type, const char *value) | 414 | pkey_ec_ctrl_str(EVP_PKEY_CTX *ctx, const char *type, const char *value) |
415 | { | 415 | { |
416 | if (!strcmp(type, "ec_paramgen_curve")) { | 416 | if (!strcmp(type, "ec_paramgen_curve")) { |
417 | int nid; | 417 | int nid; |
@@ -450,7 +450,7 @@ pkey_ec_ctrl_str(EVP_PKEY_CTX * ctx, const char *type, const char *value) | |||
450 | } | 450 | } |
451 | 451 | ||
452 | static int | 452 | static int |
453 | pkey_ec_paramgen(EVP_PKEY_CTX * ctx, EVP_PKEY * pkey) | 453 | pkey_ec_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) |
454 | { | 454 | { |
455 | EC_KEY *ec = NULL; | 455 | EC_KEY *ec = NULL; |
456 | EC_PKEY_CTX *dctx = ctx->data; | 456 | EC_PKEY_CTX *dctx = ctx->data; |
@@ -471,7 +471,7 @@ pkey_ec_paramgen(EVP_PKEY_CTX * ctx, EVP_PKEY * pkey) | |||
471 | } | 471 | } |
472 | 472 | ||
473 | static int | 473 | static int |
474 | pkey_ec_keygen(EVP_PKEY_CTX * ctx, EVP_PKEY * pkey) | 474 | pkey_ec_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) |
475 | { | 475 | { |
476 | EC_KEY *ec = NULL; | 476 | EC_KEY *ec = NULL; |
477 | EC_PKEY_CTX *dctx = ctx->data; | 477 | EC_PKEY_CTX *dctx = ctx->data; |
diff --git a/src/lib/libcrypto/ec/ec_print.c b/src/lib/libcrypto/ec/ec_print.c index af4d1996c0..18d7a7a01f 100644 --- a/src/lib/libcrypto/ec/ec_print.c +++ b/src/lib/libcrypto/ec/ec_print.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_print.c,v 1.7 2014/12/03 19:53:20 deraadt Exp $ */ | 1 | /* $OpenBSD: ec_print.c,v 1.8 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -57,8 +57,8 @@ | |||
57 | #include "ec_lcl.h" | 57 | #include "ec_lcl.h" |
58 | 58 | ||
59 | BIGNUM * | 59 | BIGNUM * |
60 | EC_POINT_point2bn(const EC_GROUP * group, const EC_POINT * point, | 60 | EC_POINT_point2bn(const EC_GROUP *group, const EC_POINT *point, |
61 | point_conversion_form_t form, BIGNUM * ret, BN_CTX * ctx) | 61 | point_conversion_form_t form, BIGNUM *ret, BN_CTX *ctx) |
62 | { | 62 | { |
63 | size_t buf_len = 0; | 63 | size_t buf_len = 0; |
64 | unsigned char *buf; | 64 | unsigned char *buf; |
@@ -83,8 +83,8 @@ EC_POINT_point2bn(const EC_GROUP * group, const EC_POINT * point, | |||
83 | } | 83 | } |
84 | 84 | ||
85 | EC_POINT * | 85 | EC_POINT * |
86 | EC_POINT_bn2point(const EC_GROUP * group, | 86 | EC_POINT_bn2point(const EC_GROUP *group, |
87 | const BIGNUM * bn, EC_POINT * point, BN_CTX * ctx) | 87 | const BIGNUM *bn, EC_POINT *point, BN_CTX *ctx) |
88 | { | 88 | { |
89 | size_t buf_len = 0; | 89 | size_t buf_len = 0; |
90 | unsigned char *buf; | 90 | unsigned char *buf; |
@@ -122,8 +122,8 @@ static const char *HEX_DIGITS = "0123456789ABCDEF"; | |||
122 | 122 | ||
123 | /* the return value must be freed (using free()) */ | 123 | /* the return value must be freed (using free()) */ |
124 | char * | 124 | char * |
125 | EC_POINT_point2hex(const EC_GROUP * group, const EC_POINT * point, | 125 | EC_POINT_point2hex(const EC_GROUP *group, const EC_POINT *point, |
126 | point_conversion_form_t form, BN_CTX * ctx) | 126 | point_conversion_form_t form, BN_CTX *ctx) |
127 | { | 127 | { |
128 | char *ret, *p; | 128 | char *ret, *p; |
129 | size_t buf_len = 0, i; | 129 | size_t buf_len = 0, i; |
@@ -161,8 +161,8 @@ EC_POINT_point2hex(const EC_GROUP * group, const EC_POINT * point, | |||
161 | } | 161 | } |
162 | 162 | ||
163 | EC_POINT * | 163 | EC_POINT * |
164 | EC_POINT_hex2point(const EC_GROUP * group, const char *buf, | 164 | EC_POINT_hex2point(const EC_GROUP *group, const char *buf, |
165 | EC_POINT * point, BN_CTX * ctx) | 165 | EC_POINT *point, BN_CTX *ctx) |
166 | { | 166 | { |
167 | EC_POINT *ret = NULL; | 167 | EC_POINT *ret = NULL; |
168 | BIGNUM *tmp_bn = NULL; | 168 | BIGNUM *tmp_bn = NULL; |
diff --git a/src/lib/libcrypto/ec/eck_prn.c b/src/lib/libcrypto/ec/eck_prn.c index 14185c7605..f7ce8debb0 100644 --- a/src/lib/libcrypto/ec/eck_prn.c +++ b/src/lib/libcrypto/ec/eck_prn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: eck_prn.c,v 1.19 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: eck_prn.c,v 1.20 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Nils Larsch for the OpenSSL project. | 3 | * Written by Nils Larsch for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -70,7 +70,7 @@ | |||
70 | #include <openssl/evp.h> | 70 | #include <openssl/evp.h> |
71 | 71 | ||
72 | int | 72 | int |
73 | ECPKParameters_print_fp(FILE * fp, const EC_GROUP * x, int off) | 73 | ECPKParameters_print_fp(FILE *fp, const EC_GROUP *x, int off) |
74 | { | 74 | { |
75 | BIO *b; | 75 | BIO *b; |
76 | int ret; | 76 | int ret; |
@@ -86,7 +86,7 @@ ECPKParameters_print_fp(FILE * fp, const EC_GROUP * x, int off) | |||
86 | } | 86 | } |
87 | 87 | ||
88 | int | 88 | int |
89 | EC_KEY_print_fp(FILE * fp, const EC_KEY * x, int off) | 89 | EC_KEY_print_fp(FILE *fp, const EC_KEY *x, int off) |
90 | { | 90 | { |
91 | BIO *b; | 91 | BIO *b; |
92 | int ret; | 92 | int ret; |
@@ -102,7 +102,7 @@ EC_KEY_print_fp(FILE * fp, const EC_KEY * x, int off) | |||
102 | } | 102 | } |
103 | 103 | ||
104 | int | 104 | int |
105 | ECParameters_print_fp(FILE * fp, const EC_KEY * x) | 105 | ECParameters_print_fp(FILE *fp, const EC_KEY *x) |
106 | { | 106 | { |
107 | BIO *b; | 107 | BIO *b; |
108 | int ret; | 108 | int ret; |
@@ -118,7 +118,7 @@ ECParameters_print_fp(FILE * fp, const EC_KEY * x) | |||
118 | } | 118 | } |
119 | 119 | ||
120 | int | 120 | int |
121 | EC_KEY_print(BIO * bp, const EC_KEY * x, int off) | 121 | EC_KEY_print(BIO *bp, const EC_KEY *x, int off) |
122 | { | 122 | { |
123 | EVP_PKEY *pk; | 123 | EVP_PKEY *pk; |
124 | int ret = 0; | 124 | int ret = 0; |
@@ -136,7 +136,7 @@ EC_KEY_print(BIO * bp, const EC_KEY * x, int off) | |||
136 | } | 136 | } |
137 | 137 | ||
138 | int | 138 | int |
139 | ECParameters_print(BIO * bp, const EC_KEY * x) | 139 | ECParameters_print(BIO *bp, const EC_KEY *x) |
140 | { | 140 | { |
141 | EVP_PKEY *pk; | 141 | EVP_PKEY *pk; |
142 | int ret = 0; | 142 | int ret = 0; |
@@ -154,11 +154,11 @@ ECParameters_print(BIO * bp, const EC_KEY * x) | |||
154 | } | 154 | } |
155 | 155 | ||
156 | static int | 156 | static int |
157 | print_bin(BIO * fp, const char *str, const unsigned char *num, | 157 | print_bin(BIO *fp, const char *str, const unsigned char *num, |
158 | size_t len, int off); | 158 | size_t len, int off); |
159 | 159 | ||
160 | int | 160 | int |
161 | ECPKParameters_print(BIO * bp, const EC_GROUP * x, int off) | 161 | ECPKParameters_print(BIO *bp, const EC_GROUP *x, int off) |
162 | { | 162 | { |
163 | unsigned char *buffer = NULL; | 163 | unsigned char *buffer = NULL; |
164 | size_t buf_len = 0, i; | 164 | size_t buf_len = 0, i; |
@@ -334,7 +334,7 @@ ECPKParameters_print(BIO * bp, const EC_GROUP * x, int off) | |||
334 | } | 334 | } |
335 | 335 | ||
336 | static int | 336 | static int |
337 | print_bin(BIO * fp, const char *name, const unsigned char *buf, | 337 | print_bin(BIO *fp, const char *name, const unsigned char *buf, |
338 | size_t len, int off) | 338 | size_t len, int off) |
339 | { | 339 | { |
340 | size_t i; | 340 | size_t i; |
diff --git a/src/lib/libcrypto/ec/ecp_mont.c b/src/lib/libcrypto/ec/ecp_mont.c index 0da3083d8e..da6d2f1cf0 100644 --- a/src/lib/libcrypto/ec/ecp_mont.c +++ b/src/lib/libcrypto/ec/ecp_mont.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecp_mont.c,v 1.20 2021/09/08 17:29:21 tb Exp $ */ | 1 | /* $OpenBSD: ecp_mont.c,v 1.21 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Originally written by Bodo Moeller for the OpenSSL project. | 3 | * Originally written by Bodo Moeller for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -119,7 +119,7 @@ EC_GFp_mont_method(void) | |||
119 | 119 | ||
120 | 120 | ||
121 | int | 121 | int |
122 | ec_GFp_mont_group_init(EC_GROUP * group) | 122 | ec_GFp_mont_group_init(EC_GROUP *group) |
123 | { | 123 | { |
124 | int ok; | 124 | int ok; |
125 | 125 | ||
@@ -131,7 +131,7 @@ ec_GFp_mont_group_init(EC_GROUP * group) | |||
131 | 131 | ||
132 | 132 | ||
133 | void | 133 | void |
134 | ec_GFp_mont_group_finish(EC_GROUP * group) | 134 | ec_GFp_mont_group_finish(EC_GROUP *group) |
135 | { | 135 | { |
136 | BN_MONT_CTX_free(group->field_data1); | 136 | BN_MONT_CTX_free(group->field_data1); |
137 | group->field_data1 = NULL; | 137 | group->field_data1 = NULL; |
@@ -142,7 +142,7 @@ ec_GFp_mont_group_finish(EC_GROUP * group) | |||
142 | 142 | ||
143 | 143 | ||
144 | void | 144 | void |
145 | ec_GFp_mont_group_clear_finish(EC_GROUP * group) | 145 | ec_GFp_mont_group_clear_finish(EC_GROUP *group) |
146 | { | 146 | { |
147 | BN_MONT_CTX_free(group->field_data1); | 147 | BN_MONT_CTX_free(group->field_data1); |
148 | group->field_data1 = NULL; | 148 | group->field_data1 = NULL; |
@@ -153,7 +153,7 @@ ec_GFp_mont_group_clear_finish(EC_GROUP * group) | |||
153 | 153 | ||
154 | 154 | ||
155 | int | 155 | int |
156 | ec_GFp_mont_group_copy(EC_GROUP * dest, const EC_GROUP * src) | 156 | ec_GFp_mont_group_copy(EC_GROUP *dest, const EC_GROUP *src) |
157 | { | 157 | { |
158 | BN_MONT_CTX_free(dest->field_data1); | 158 | BN_MONT_CTX_free(dest->field_data1); |
159 | dest->field_data1 = NULL; | 159 | dest->field_data1 = NULL; |
diff --git a/src/lib/libcrypto/ec/ecp_nist.c b/src/lib/libcrypto/ec/ecp_nist.c index b3cea0c4c0..d3cb4f37b7 100644 --- a/src/lib/libcrypto/ec/ecp_nist.c +++ b/src/lib/libcrypto/ec/ecp_nist.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecp_nist.c,v 1.19 2022/06/30 11:14:47 tb Exp $ */ | 1 | /* $OpenBSD: ecp_nist.c,v 1.20 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Nils Larsch for the OpenSSL project. | 3 | * Written by Nils Larsch for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -117,7 +117,7 @@ EC_GFp_nist_method(void) | |||
117 | } | 117 | } |
118 | 118 | ||
119 | int | 119 | int |
120 | ec_GFp_nist_group_copy(EC_GROUP * dest, const EC_GROUP * src) | 120 | ec_GFp_nist_group_copy(EC_GROUP *dest, const EC_GROUP *src) |
121 | { | 121 | { |
122 | dest->field_mod_func = src->field_mod_func; | 122 | dest->field_mod_func = src->field_mod_func; |
123 | 123 | ||
@@ -192,8 +192,8 @@ ec_GFp_nist_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, | |||
192 | 192 | ||
193 | 193 | ||
194 | int | 194 | int |
195 | ec_GFp_nist_field_sqr(const EC_GROUP * group, BIGNUM * r, const BIGNUM * a, | 195 | ec_GFp_nist_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, |
196 | BN_CTX * ctx) | 196 | BN_CTX *ctx) |
197 | { | 197 | { |
198 | int ret = 0; | 198 | int ret = 0; |
199 | BN_CTX *ctx_new = NULL; | 199 | BN_CTX *ctx_new = NULL; |
diff --git a/src/lib/libcrypto/ec/ecp_nistp224.c b/src/lib/libcrypto/ec/ecp_nistp224.c index 9ef9dc3585..70944c463d 100644 --- a/src/lib/libcrypto/ec/ecp_nistp224.c +++ b/src/lib/libcrypto/ec/ecp_nistp224.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecp_nistp224.c,v 1.27 2021/09/08 17:29:21 tb Exp $ */ | 1 | /* $OpenBSD: ecp_nistp224.c,v 1.28 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Emilia Kasper (Google) for the OpenSSL project. | 3 | * Written by Emilia Kasper (Google) for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -302,7 +302,7 @@ felem_to_bin28(u8 out[28], const felem in) | |||
302 | 302 | ||
303 | /* To preserve endianness when using BN_bn2bin and BN_bin2bn */ | 303 | /* To preserve endianness when using BN_bn2bin and BN_bin2bn */ |
304 | static void | 304 | static void |
305 | flip_endian(u8 * out, const u8 * in, unsigned len) | 305 | flip_endian(u8 *out, const u8 *in, unsigned len) |
306 | { | 306 | { |
307 | unsigned i; | 307 | unsigned i; |
308 | for (i = 0; i < len; ++i) | 308 | for (i = 0; i < len; ++i) |
@@ -311,7 +311,7 @@ flip_endian(u8 * out, const u8 * in, unsigned len) | |||
311 | 311 | ||
312 | /* From OpenSSL BIGNUM to internal representation */ | 312 | /* From OpenSSL BIGNUM to internal representation */ |
313 | static int | 313 | static int |
314 | BN_to_felem(felem out, const BIGNUM * bn) | 314 | BN_to_felem(felem out, const BIGNUM *bn) |
315 | { | 315 | { |
316 | felem_bytearray b_in; | 316 | felem_bytearray b_in; |
317 | felem_bytearray b_out; | 317 | felem_bytearray b_out; |
@@ -336,7 +336,7 @@ BN_to_felem(felem out, const BIGNUM * bn) | |||
336 | 336 | ||
337 | /* From internal representation to OpenSSL BIGNUM */ | 337 | /* From internal representation to OpenSSL BIGNUM */ |
338 | static BIGNUM * | 338 | static BIGNUM * |
339 | felem_to_BN(BIGNUM * out, const felem in) | 339 | felem_to_BN(BIGNUM *out, const felem in) |
340 | { | 340 | { |
341 | felem_bytearray b_in, b_out; | 341 | felem_bytearray b_in, b_out; |
342 | felem_to_bin28(b_in, in); | 342 | felem_to_bin28(b_in, in); |
@@ -1249,7 +1249,7 @@ nistp224_pre_comp_clear_free(void *pre_) | |||
1249 | */ | 1249 | */ |
1250 | 1250 | ||
1251 | int | 1251 | int |
1252 | ec_GFp_nistp224_group_init(EC_GROUP * group) | 1252 | ec_GFp_nistp224_group_init(EC_GROUP *group) |
1253 | { | 1253 | { |
1254 | int ret; | 1254 | int ret; |
1255 | ret = ec_GFp_simple_group_init(group); | 1255 | ret = ec_GFp_simple_group_init(group); |
@@ -1258,8 +1258,8 @@ ec_GFp_nistp224_group_init(EC_GROUP * group) | |||
1258 | } | 1258 | } |
1259 | 1259 | ||
1260 | int | 1260 | int |
1261 | ec_GFp_nistp224_group_set_curve(EC_GROUP * group, const BIGNUM * p, | 1261 | ec_GFp_nistp224_group_set_curve(EC_GROUP *group, const BIGNUM *p, |
1262 | const BIGNUM * a, const BIGNUM * b, BN_CTX * ctx) | 1262 | const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) |
1263 | { | 1263 | { |
1264 | int ret = 0; | 1264 | int ret = 0; |
1265 | BN_CTX *new_ctx = NULL; | 1265 | BN_CTX *new_ctx = NULL; |
@@ -1292,8 +1292,8 @@ ec_GFp_nistp224_group_set_curve(EC_GROUP * group, const BIGNUM * p, | |||
1292 | /* Takes the Jacobian coordinates (X, Y, Z) of a point and returns | 1292 | /* Takes the Jacobian coordinates (X, Y, Z) of a point and returns |
1293 | * (X', Y') = (X/Z^2, Y/Z^3) */ | 1293 | * (X', Y') = (X/Z^2, Y/Z^3) */ |
1294 | int | 1294 | int |
1295 | ec_GFp_nistp224_point_get_affine_coordinates(const EC_GROUP * group, | 1295 | ec_GFp_nistp224_point_get_affine_coordinates(const EC_GROUP *group, |
1296 | const EC_POINT * point, BIGNUM * x, BIGNUM * y, BN_CTX * ctx) | 1296 | const EC_POINT *point, BIGNUM *x, BIGNUM *y, BN_CTX *ctx) |
1297 | { | 1297 | { |
1298 | felem z1, z2, x_in, y_in, x_out, y_out; | 1298 | felem z1, z2, x_in, y_in, x_out, y_out; |
1299 | widefelem tmp; | 1299 | widefelem tmp; |
@@ -1355,9 +1355,9 @@ make_points_affine(size_t num, felem points[ /* num */ ][3], felem tmp_felems[ / | |||
1355 | /* Computes scalar*generator + \sum scalars[i]*points[i], ignoring NULL values | 1355 | /* Computes scalar*generator + \sum scalars[i]*points[i], ignoring NULL values |
1356 | * Result is stored in r (r can equal one of the inputs). */ | 1356 | * Result is stored in r (r can equal one of the inputs). */ |
1357 | int | 1357 | int |
1358 | ec_GFp_nistp224_points_mul(const EC_GROUP * group, EC_POINT * r, | 1358 | ec_GFp_nistp224_points_mul(const EC_GROUP *group, EC_POINT *r, |
1359 | const BIGNUM * scalar, size_t num, const EC_POINT * points[], | 1359 | const BIGNUM *scalar, size_t num, const EC_POINT *points[], |
1360 | const BIGNUM * scalars[], BN_CTX * ctx) | 1360 | const BIGNUM *scalars[], BN_CTX *ctx) |
1361 | { | 1361 | { |
1362 | int ret = 0; | 1362 | int ret = 0; |
1363 | int j; | 1363 | int j; |
@@ -1550,7 +1550,7 @@ ec_GFp_nistp224_points_mul(const EC_GROUP * group, EC_POINT * r, | |||
1550 | } | 1550 | } |
1551 | 1551 | ||
1552 | int | 1552 | int |
1553 | ec_GFp_nistp224_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | 1553 | ec_GFp_nistp224_precompute_mult(EC_GROUP *group, BN_CTX *ctx) |
1554 | { | 1554 | { |
1555 | int ret = 0; | 1555 | int ret = 0; |
1556 | NISTP224_PRE_COMP *pre = NULL; | 1556 | NISTP224_PRE_COMP *pre = NULL; |
@@ -1677,7 +1677,7 @@ ec_GFp_nistp224_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | |||
1677 | } | 1677 | } |
1678 | 1678 | ||
1679 | int | 1679 | int |
1680 | ec_GFp_nistp224_have_precompute_mult(const EC_GROUP * group) | 1680 | ec_GFp_nistp224_have_precompute_mult(const EC_GROUP *group) |
1681 | { | 1681 | { |
1682 | if (EC_EX_DATA_get_data(group->extra_data, nistp224_pre_comp_dup, | 1682 | if (EC_EX_DATA_get_data(group->extra_data, nistp224_pre_comp_dup, |
1683 | nistp224_pre_comp_free, nistp224_pre_comp_clear_free) | 1683 | nistp224_pre_comp_free, nistp224_pre_comp_clear_free) |
diff --git a/src/lib/libcrypto/ec/ecp_nistp256.c b/src/lib/libcrypto/ec/ecp_nistp256.c index e13621c7b6..8371ee4827 100644 --- a/src/lib/libcrypto/ec/ecp_nistp256.c +++ b/src/lib/libcrypto/ec/ecp_nistp256.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecp_nistp256.c,v 1.26 2021/09/08 17:29:21 tb Exp $ */ | 1 | /* $OpenBSD: ecp_nistp256.c,v 1.27 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Adam Langley (Google) for the OpenSSL project | 3 | * Written by Adam Langley (Google) for the OpenSSL project |
4 | */ | 4 | */ |
@@ -137,7 +137,7 @@ smallfelem_to_bin32(u8 out[32], const smallfelem in) | |||
137 | 137 | ||
138 | /* To preserve endianness when using BN_bn2bin and BN_bin2bn */ | 138 | /* To preserve endianness when using BN_bn2bin and BN_bin2bn */ |
139 | static void | 139 | static void |
140 | flip_endian(u8 * out, const u8 * in, unsigned len) | 140 | flip_endian(u8 *out, const u8 *in, unsigned len) |
141 | { | 141 | { |
142 | unsigned i; | 142 | unsigned i; |
143 | for (i = 0; i < len; ++i) | 143 | for (i = 0; i < len; ++i) |
@@ -146,7 +146,7 @@ flip_endian(u8 * out, const u8 * in, unsigned len) | |||
146 | 146 | ||
147 | /* BN_to_felem converts an OpenSSL BIGNUM into an felem */ | 147 | /* BN_to_felem converts an OpenSSL BIGNUM into an felem */ |
148 | static int | 148 | static int |
149 | BN_to_felem(felem out, const BIGNUM * bn) | 149 | BN_to_felem(felem out, const BIGNUM *bn) |
150 | { | 150 | { |
151 | felem_bytearray b_in; | 151 | felem_bytearray b_in; |
152 | felem_bytearray b_out; | 152 | felem_bytearray b_out; |
@@ -171,7 +171,7 @@ BN_to_felem(felem out, const BIGNUM * bn) | |||
171 | 171 | ||
172 | /* felem_to_BN converts an felem into an OpenSSL BIGNUM */ | 172 | /* felem_to_BN converts an felem into an OpenSSL BIGNUM */ |
173 | static BIGNUM * | 173 | static BIGNUM * |
174 | smallfelem_to_BN(BIGNUM * out, const smallfelem in) | 174 | smallfelem_to_BN(BIGNUM *out, const smallfelem in) |
175 | { | 175 | { |
176 | felem_bytearray b_in, b_out; | 176 | felem_bytearray b_in, b_out; |
177 | smallfelem_to_bin32(b_in, in); | 177 | smallfelem_to_bin32(b_in, in); |
@@ -833,7 +833,7 @@ felem_reduce_zero105(felem out, const longfelem in) | |||
833 | /* subtract_u64 sets *result = *result - v and *carry to one if the subtraction | 833 | /* subtract_u64 sets *result = *result - v and *carry to one if the subtraction |
834 | * underflowed. */ | 834 | * underflowed. */ |
835 | static void | 835 | static void |
836 | subtract_u64(u64 * result, u64 * carry, u64 v) | 836 | subtract_u64(u64 *result, u64 *carry, u64 v) |
837 | { | 837 | { |
838 | uint128_t r = *result; | 838 | uint128_t r = *result; |
839 | r -= v; | 839 | r -= v; |
@@ -1581,7 +1581,7 @@ get_bit(const felem_bytearray in, int i) | |||
1581 | * Output point (X, Y, Z) is stored in x_out, y_out, z_out */ | 1581 | * Output point (X, Y, Z) is stored in x_out, y_out, z_out */ |
1582 | static void | 1582 | static void |
1583 | batch_mul(felem x_out, felem y_out, felem z_out, | 1583 | batch_mul(felem x_out, felem y_out, felem z_out, |
1584 | const felem_bytearray scalars[], const unsigned num_points, const u8 * g_scalar, | 1584 | const felem_bytearray scalars[], const unsigned num_points, const u8 *g_scalar, |
1585 | const int mixed, const smallfelem pre_comp[][17][3], const smallfelem g_pre_comp[2][16][3]) | 1585 | const int mixed, const smallfelem pre_comp[][17][3], const smallfelem g_pre_comp[2][16][3]) |
1586 | { | 1586 | { |
1587 | int i, skip; | 1587 | int i, skip; |
@@ -1798,7 +1798,7 @@ nistp256_pre_comp_clear_free(void *pre_) | |||
1798 | */ | 1798 | */ |
1799 | 1799 | ||
1800 | int | 1800 | int |
1801 | ec_GFp_nistp256_group_init(EC_GROUP * group) | 1801 | ec_GFp_nistp256_group_init(EC_GROUP *group) |
1802 | { | 1802 | { |
1803 | int ret; | 1803 | int ret; |
1804 | ret = ec_GFp_simple_group_init(group); | 1804 | ret = ec_GFp_simple_group_init(group); |
@@ -1807,8 +1807,8 @@ ec_GFp_nistp256_group_init(EC_GROUP * group) | |||
1807 | } | 1807 | } |
1808 | 1808 | ||
1809 | int | 1809 | int |
1810 | ec_GFp_nistp256_group_set_curve(EC_GROUP * group, const BIGNUM * p, | 1810 | ec_GFp_nistp256_group_set_curve(EC_GROUP *group, const BIGNUM *p, |
1811 | const BIGNUM * a, const BIGNUM * b, BN_CTX * ctx) | 1811 | const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) |
1812 | { | 1812 | { |
1813 | int ret = 0; | 1813 | int ret = 0; |
1814 | BN_CTX *new_ctx = NULL; | 1814 | BN_CTX *new_ctx = NULL; |
@@ -1841,8 +1841,8 @@ ec_GFp_nistp256_group_set_curve(EC_GROUP * group, const BIGNUM * p, | |||
1841 | /* Takes the Jacobian coordinates (X, Y, Z) of a point and returns | 1841 | /* Takes the Jacobian coordinates (X, Y, Z) of a point and returns |
1842 | * (X', Y') = (X/Z^2, Y/Z^3) */ | 1842 | * (X', Y') = (X/Z^2, Y/Z^3) */ |
1843 | int | 1843 | int |
1844 | ec_GFp_nistp256_point_get_affine_coordinates(const EC_GROUP * group, | 1844 | ec_GFp_nistp256_point_get_affine_coordinates(const EC_GROUP *group, |
1845 | const EC_POINT * point, BIGNUM * x, BIGNUM * y, BN_CTX * ctx) | 1845 | const EC_POINT *point, BIGNUM *x, BIGNUM *y, BN_CTX *ctx) |
1846 | { | 1846 | { |
1847 | felem z1, z2, x_in, y_in; | 1847 | felem z1, z2, x_in, y_in; |
1848 | smallfelem x_out, y_out; | 1848 | smallfelem x_out, y_out; |
@@ -1905,9 +1905,9 @@ make_points_affine(size_t num, smallfelem points[ /* num */ ][3], smallfelem tmp | |||
1905 | /* Computes scalar*generator + \sum scalars[i]*points[i], ignoring NULL values | 1905 | /* Computes scalar*generator + \sum scalars[i]*points[i], ignoring NULL values |
1906 | * Result is stored in r (r can equal one of the inputs). */ | 1906 | * Result is stored in r (r can equal one of the inputs). */ |
1907 | int | 1907 | int |
1908 | ec_GFp_nistp256_points_mul(const EC_GROUP * group, EC_POINT * r, | 1908 | ec_GFp_nistp256_points_mul(const EC_GROUP *group, EC_POINT *r, |
1909 | const BIGNUM * scalar, size_t num, const EC_POINT * points[], | 1909 | const BIGNUM *scalar, size_t num, const EC_POINT *points[], |
1910 | const BIGNUM * scalars[], BN_CTX * ctx) | 1910 | const BIGNUM *scalars[], BN_CTX *ctx) |
1911 | { | 1911 | { |
1912 | int ret = 0; | 1912 | int ret = 0; |
1913 | int j; | 1913 | int j; |
@@ -2103,7 +2103,7 @@ ec_GFp_nistp256_points_mul(const EC_GROUP * group, EC_POINT * r, | |||
2103 | } | 2103 | } |
2104 | 2104 | ||
2105 | int | 2105 | int |
2106 | ec_GFp_nistp256_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | 2106 | ec_GFp_nistp256_precompute_mult(EC_GROUP *group, BN_CTX *ctx) |
2107 | { | 2107 | { |
2108 | int ret = 0; | 2108 | int ret = 0; |
2109 | NISTP256_PRE_COMP *pre = NULL; | 2109 | NISTP256_PRE_COMP *pre = NULL; |
@@ -2224,7 +2224,7 @@ ec_GFp_nistp256_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | |||
2224 | } | 2224 | } |
2225 | 2225 | ||
2226 | int | 2226 | int |
2227 | ec_GFp_nistp256_have_precompute_mult(const EC_GROUP * group) | 2227 | ec_GFp_nistp256_have_precompute_mult(const EC_GROUP *group) |
2228 | { | 2228 | { |
2229 | if (EC_EX_DATA_get_data(group->extra_data, nistp256_pre_comp_dup, | 2229 | if (EC_EX_DATA_get_data(group->extra_data, nistp256_pre_comp_dup, |
2230 | nistp256_pre_comp_free, nistp256_pre_comp_clear_free) | 2230 | nistp256_pre_comp_free, nistp256_pre_comp_clear_free) |
diff --git a/src/lib/libcrypto/ec/ecp_nistp521.c b/src/lib/libcrypto/ec/ecp_nistp521.c index 994c1039d6..064bf85534 100644 --- a/src/lib/libcrypto/ec/ecp_nistp521.c +++ b/src/lib/libcrypto/ec/ecp_nistp521.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecp_nistp521.c,v 1.27 2021/09/08 17:29:21 tb Exp $ */ | 1 | /* $OpenBSD: ecp_nistp521.c,v 1.28 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Adam Langley (Google) for the OpenSSL project | 3 | * Written by Adam Langley (Google) for the OpenSSL project |
4 | */ | 4 | */ |
@@ -163,7 +163,7 @@ felem_to_bin66(u8 out[66], const felem in) | |||
163 | 163 | ||
164 | /* To preserve endianness when using BN_bn2bin and BN_bin2bn */ | 164 | /* To preserve endianness when using BN_bn2bin and BN_bin2bn */ |
165 | static void | 165 | static void |
166 | flip_endian(u8 * out, const u8 * in, unsigned len) | 166 | flip_endian(u8 *out, const u8 *in, unsigned len) |
167 | { | 167 | { |
168 | unsigned i; | 168 | unsigned i; |
169 | for (i = 0; i < len; ++i) | 169 | for (i = 0; i < len; ++i) |
@@ -172,7 +172,7 @@ flip_endian(u8 * out, const u8 * in, unsigned len) | |||
172 | 172 | ||
173 | /* BN_to_felem converts an OpenSSL BIGNUM into an felem */ | 173 | /* BN_to_felem converts an OpenSSL BIGNUM into an felem */ |
174 | static int | 174 | static int |
175 | BN_to_felem(felem out, const BIGNUM * bn) | 175 | BN_to_felem(felem out, const BIGNUM *bn) |
176 | { | 176 | { |
177 | felem_bytearray b_in; | 177 | felem_bytearray b_in; |
178 | felem_bytearray b_out; | 178 | felem_bytearray b_out; |
@@ -197,7 +197,7 @@ BN_to_felem(felem out, const BIGNUM * bn) | |||
197 | 197 | ||
198 | /* felem_to_BN converts an felem into an OpenSSL BIGNUM */ | 198 | /* felem_to_BN converts an felem into an OpenSSL BIGNUM */ |
199 | static BIGNUM * | 199 | static BIGNUM * |
200 | felem_to_BN(BIGNUM * out, const felem in) | 200 | felem_to_BN(BIGNUM *out, const felem in) |
201 | { | 201 | { |
202 | felem_bytearray b_in, b_out; | 202 | felem_bytearray b_in, b_out; |
203 | felem_to_bin66(b_in, in); | 203 | felem_to_bin66(b_in, in); |
@@ -1487,7 +1487,7 @@ get_bit(const felem_bytearray in, int i) | |||
1487 | * Output point (X, Y, Z) is stored in x_out, y_out, z_out */ | 1487 | * Output point (X, Y, Z) is stored in x_out, y_out, z_out */ |
1488 | static void | 1488 | static void |
1489 | batch_mul(felem x_out, felem y_out, felem z_out, | 1489 | batch_mul(felem x_out, felem y_out, felem z_out, |
1490 | const felem_bytearray scalars[], const unsigned num_points, const u8 * g_scalar, | 1490 | const felem_bytearray scalars[], const unsigned num_points, const u8 *g_scalar, |
1491 | const int mixed, const felem pre_comp[][17][3], const felem g_pre_comp[16][3]) | 1491 | const int mixed, const felem pre_comp[][17][3], const felem g_pre_comp[16][3]) |
1492 | { | 1492 | { |
1493 | int i, skip; | 1493 | int i, skip; |
@@ -1689,7 +1689,7 @@ nistp521_pre_comp_clear_free(void *pre_) | |||
1689 | */ | 1689 | */ |
1690 | 1690 | ||
1691 | int | 1691 | int |
1692 | ec_GFp_nistp521_group_init(EC_GROUP * group) | 1692 | ec_GFp_nistp521_group_init(EC_GROUP *group) |
1693 | { | 1693 | { |
1694 | int ret; | 1694 | int ret; |
1695 | ret = ec_GFp_simple_group_init(group); | 1695 | ret = ec_GFp_simple_group_init(group); |
@@ -1698,8 +1698,8 @@ ec_GFp_nistp521_group_init(EC_GROUP * group) | |||
1698 | } | 1698 | } |
1699 | 1699 | ||
1700 | int | 1700 | int |
1701 | ec_GFp_nistp521_group_set_curve(EC_GROUP * group, const BIGNUM * p, | 1701 | ec_GFp_nistp521_group_set_curve(EC_GROUP *group, const BIGNUM *p, |
1702 | const BIGNUM * a, const BIGNUM * b, BN_CTX * ctx) | 1702 | const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) |
1703 | { | 1703 | { |
1704 | int ret = 0; | 1704 | int ret = 0; |
1705 | BN_CTX *new_ctx = NULL; | 1705 | BN_CTX *new_ctx = NULL; |
@@ -1732,8 +1732,8 @@ ec_GFp_nistp521_group_set_curve(EC_GROUP * group, const BIGNUM * p, | |||
1732 | /* Takes the Jacobian coordinates (X, Y, Z) of a point and returns | 1732 | /* Takes the Jacobian coordinates (X, Y, Z) of a point and returns |
1733 | * (X', Y') = (X/Z^2, Y/Z^3) */ | 1733 | * (X', Y') = (X/Z^2, Y/Z^3) */ |
1734 | int | 1734 | int |
1735 | ec_GFp_nistp521_point_get_affine_coordinates(const EC_GROUP * group, | 1735 | ec_GFp_nistp521_point_get_affine_coordinates(const EC_GROUP *group, |
1736 | const EC_POINT * point, BIGNUM * x, BIGNUM * y, BN_CTX * ctx) | 1736 | const EC_POINT *point, BIGNUM *x, BIGNUM *y, BN_CTX *ctx) |
1737 | { | 1737 | { |
1738 | felem z1, z2, x_in, y_in, x_out, y_out; | 1738 | felem z1, z2, x_in, y_in, x_out, y_out; |
1739 | largefelem tmp; | 1739 | largefelem tmp; |
@@ -1795,9 +1795,9 @@ make_points_affine(size_t num, felem points[ /* num */ ][3], felem tmp_felems[ / | |||
1795 | /* Computes scalar*generator + \sum scalars[i]*points[i], ignoring NULL values | 1795 | /* Computes scalar*generator + \sum scalars[i]*points[i], ignoring NULL values |
1796 | * Result is stored in r (r can equal one of the inputs). */ | 1796 | * Result is stored in r (r can equal one of the inputs). */ |
1797 | int | 1797 | int |
1798 | ec_GFp_nistp521_points_mul(const EC_GROUP * group, EC_POINT * r, | 1798 | ec_GFp_nistp521_points_mul(const EC_GROUP *group, EC_POINT *r, |
1799 | const BIGNUM * scalar, size_t num, const EC_POINT * points[], | 1799 | const BIGNUM *scalar, size_t num, const EC_POINT *points[], |
1800 | const BIGNUM * scalars[], BN_CTX * ctx) | 1800 | const BIGNUM *scalars[], BN_CTX *ctx) |
1801 | { | 1801 | { |
1802 | int ret = 0; | 1802 | int ret = 0; |
1803 | int j; | 1803 | int j; |
@@ -1992,7 +1992,7 @@ ec_GFp_nistp521_points_mul(const EC_GROUP * group, EC_POINT * r, | |||
1992 | } | 1992 | } |
1993 | 1993 | ||
1994 | int | 1994 | int |
1995 | ec_GFp_nistp521_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | 1995 | ec_GFp_nistp521_precompute_mult(EC_GROUP *group, BN_CTX *ctx) |
1996 | { | 1996 | { |
1997 | int ret = 0; | 1997 | int ret = 0; |
1998 | NISTP521_PRE_COMP *pre = NULL; | 1998 | NISTP521_PRE_COMP *pre = NULL; |
@@ -2099,7 +2099,7 @@ ec_GFp_nistp521_precompute_mult(EC_GROUP * group, BN_CTX * ctx) | |||
2099 | } | 2099 | } |
2100 | 2100 | ||
2101 | int | 2101 | int |
2102 | ec_GFp_nistp521_have_precompute_mult(const EC_GROUP * group) | 2102 | ec_GFp_nistp521_have_precompute_mult(const EC_GROUP *group) |
2103 | { | 2103 | { |
2104 | if (EC_EX_DATA_get_data(group->extra_data, nistp521_pre_comp_dup, | 2104 | if (EC_EX_DATA_get_data(group->extra_data, nistp521_pre_comp_dup, |
2105 | nistp521_pre_comp_free, nistp521_pre_comp_clear_free) | 2105 | nistp521_pre_comp_free, nistp521_pre_comp_clear_free) |
diff --git a/src/lib/libcrypto/ec/ecp_oct.c b/src/lib/libcrypto/ec/ecp_oct.c index 1536b3ee90..7c29e7e612 100644 --- a/src/lib/libcrypto/ec/ecp_oct.c +++ b/src/lib/libcrypto/ec/ecp_oct.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecp_oct.c,v 1.15 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ecp_oct.c,v 1.16 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* Includes code written by Lenka Fibikova <fibikova@exp-math.uni-essen.de> | 2 | /* Includes code written by Lenka Fibikova <fibikova@exp-math.uni-essen.de> |
3 | * for the OpenSSL project. | 3 | * for the OpenSSL project. |
4 | * Includes code written by Bodo Moeller for the OpenSSL project. | 4 | * Includes code written by Bodo Moeller for the OpenSSL project. |
@@ -67,8 +67,8 @@ | |||
67 | #include "ec_lcl.h" | 67 | #include "ec_lcl.h" |
68 | 68 | ||
69 | int | 69 | int |
70 | ec_GFp_simple_set_compressed_coordinates(const EC_GROUP * group, | 70 | ec_GFp_simple_set_compressed_coordinates(const EC_GROUP *group, |
71 | EC_POINT * point, const BIGNUM * x_, int y_bit, BN_CTX * ctx) | 71 | EC_POINT *point, const BIGNUM *x_, int y_bit, BN_CTX *ctx) |
72 | { | 72 | { |
73 | BN_CTX *new_ctx = NULL; | 73 | BN_CTX *new_ctx = NULL; |
74 | BIGNUM *tmp1, *tmp2, *x, *y; | 74 | BIGNUM *tmp1, *tmp2, *x, *y; |
@@ -198,8 +198,8 @@ ec_GFp_simple_set_compressed_coordinates(const EC_GROUP * group, | |||
198 | 198 | ||
199 | 199 | ||
200 | size_t | 200 | size_t |
201 | ec_GFp_simple_point2oct(const EC_GROUP * group, const EC_POINT * point, point_conversion_form_t form, | 201 | ec_GFp_simple_point2oct(const EC_GROUP *group, const EC_POINT *point, point_conversion_form_t form, |
202 | unsigned char *buf, size_t len, BN_CTX * ctx) | 202 | unsigned char *buf, size_t len, BN_CTX *ctx) |
203 | { | 203 | { |
204 | size_t ret; | 204 | size_t ret; |
205 | BN_CTX *new_ctx = NULL; | 205 | BN_CTX *new_ctx = NULL; |
@@ -303,8 +303,8 @@ ec_GFp_simple_point2oct(const EC_GROUP * group, const EC_POINT * point, point_co | |||
303 | 303 | ||
304 | 304 | ||
305 | int | 305 | int |
306 | ec_GFp_simple_oct2point(const EC_GROUP * group, EC_POINT * point, | 306 | ec_GFp_simple_oct2point(const EC_GROUP *group, EC_POINT *point, |
307 | const unsigned char *buf, size_t len, BN_CTX * ctx) | 307 | const unsigned char *buf, size_t len, BN_CTX *ctx) |
308 | { | 308 | { |
309 | point_conversion_form_t form; | 309 | point_conversion_form_t form; |
310 | int y_bit; | 310 | int y_bit; |
diff --git a/src/lib/libcrypto/ec/ecp_smpl.c b/src/lib/libcrypto/ec/ecp_smpl.c index c9d73bd629..55fb46869d 100644 --- a/src/lib/libcrypto/ec/ecp_smpl.c +++ b/src/lib/libcrypto/ec/ecp_smpl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecp_smpl.c,v 1.35 2022/11/19 07:00:57 tb Exp $ */ | 1 | /* $OpenBSD: ecp_smpl.c,v 1.36 2022/11/19 07:29:29 tb Exp $ */ |
2 | /* Includes code written by Lenka Fibikova <fibikova@exp-math.uni-essen.de> | 2 | /* Includes code written by Lenka Fibikova <fibikova@exp-math.uni-essen.de> |
3 | * for the OpenSSL project. | 3 | * for the OpenSSL project. |
4 | * Includes code written by Bodo Moeller for the OpenSSL project. | 4 | * Includes code written by Bodo Moeller for the OpenSSL project. |
@@ -131,7 +131,7 @@ EC_GFp_simple_method(void) | |||
131 | 131 | ||
132 | 132 | ||
133 | int | 133 | int |
134 | ec_GFp_simple_group_init(EC_GROUP * group) | 134 | ec_GFp_simple_group_init(EC_GROUP *group) |
135 | { | 135 | { |
136 | BN_init(&group->field); | 136 | BN_init(&group->field); |
137 | BN_init(&group->a); | 137 | BN_init(&group->a); |
@@ -142,7 +142,7 @@ ec_GFp_simple_group_init(EC_GROUP * group) | |||
142 | 142 | ||
143 | 143 | ||
144 | void | 144 | void |
145 | ec_GFp_simple_group_finish(EC_GROUP * group) | 145 | ec_GFp_simple_group_finish(EC_GROUP *group) |
146 | { | 146 | { |
147 | BN_free(&group->field); | 147 | BN_free(&group->field); |
148 | BN_free(&group->a); | 148 | BN_free(&group->a); |
@@ -151,7 +151,7 @@ ec_GFp_simple_group_finish(EC_GROUP * group) | |||
151 | 151 | ||
152 | 152 | ||
153 | void | 153 | void |
154 | ec_GFp_simple_group_clear_finish(EC_GROUP * group) | 154 | ec_GFp_simple_group_clear_finish(EC_GROUP *group) |
155 | { | 155 | { |
156 | BN_clear_free(&group->field); | 156 | BN_clear_free(&group->field); |
157 | BN_clear_free(&group->a); | 157 | BN_clear_free(&group->a); |
@@ -160,7 +160,7 @@ ec_GFp_simple_group_clear_finish(EC_GROUP * group) | |||
160 | 160 | ||
161 | 161 | ||
162 | int | 162 | int |
163 | ec_GFp_simple_group_copy(EC_GROUP * dest, const EC_GROUP * src) | 163 | ec_GFp_simple_group_copy(EC_GROUP *dest, const EC_GROUP *src) |
164 | { | 164 | { |
165 | if (!BN_copy(&dest->field, &src->field)) | 165 | if (!BN_copy(&dest->field, &src->field)) |
166 | return 0; | 166 | return 0; |
@@ -176,8 +176,8 @@ ec_GFp_simple_group_copy(EC_GROUP * dest, const EC_GROUP * src) | |||
176 | 176 | ||
177 | 177 | ||
178 | int | 178 | int |
179 | ec_GFp_simple_group_set_curve(EC_GROUP * group, | 179 | ec_GFp_simple_group_set_curve(EC_GROUP *group, |
180 | const BIGNUM * p, const BIGNUM * a, const BIGNUM * b, BN_CTX * ctx) | 180 | const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) |
181 | { | 181 | { |
182 | int ret = 0; | 182 | int ret = 0; |
183 | BN_CTX *new_ctx = NULL; | 183 | BN_CTX *new_ctx = NULL; |
@@ -233,7 +233,7 @@ ec_GFp_simple_group_set_curve(EC_GROUP * group, | |||
233 | 233 | ||
234 | 234 | ||
235 | int | 235 | int |
236 | ec_GFp_simple_group_get_curve(const EC_GROUP * group, BIGNUM * p, BIGNUM * a, BIGNUM * b, BN_CTX * ctx) | 236 | ec_GFp_simple_group_get_curve(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) |
237 | { | 237 | { |
238 | int ret = 0; | 238 | int ret = 0; |
239 | BN_CTX *new_ctx = NULL; | 239 | BN_CTX *new_ctx = NULL; |
@@ -277,14 +277,14 @@ ec_GFp_simple_group_get_curve(const EC_GROUP * group, BIGNUM * p, BIGNUM * a, BI | |||
277 | 277 | ||
278 | 278 | ||
279 | int | 279 | int |
280 | ec_GFp_simple_group_get_degree(const EC_GROUP * group) | 280 | ec_GFp_simple_group_get_degree(const EC_GROUP *group) |
281 | { | 281 | { |
282 | return BN_num_bits(&group->field); | 282 | return BN_num_bits(&group->field); |
283 | } | 283 | } |
284 | 284 | ||
285 | 285 | ||
286 | int | 286 | int |
287 | ec_GFp_simple_group_check_discriminant(const EC_GROUP * group, BN_CTX * ctx) | 287 | ec_GFp_simple_group_check_discriminant(const EC_GROUP *group, BN_CTX *ctx) |
288 | { | 288 | { |
289 | int ret = 0; | 289 | int ret = 0; |
290 | BIGNUM *a, *b, *order, *tmp_1, *tmp_2; | 290 | BIGNUM *a, *b, *order, *tmp_1, *tmp_2; |
@@ -372,7 +372,7 @@ ec_GFp_simple_point_init(EC_POINT * point) | |||
372 | 372 | ||
373 | 373 | ||
374 | void | 374 | void |
375 | ec_GFp_simple_point_finish(EC_POINT * point) | 375 | ec_GFp_simple_point_finish(EC_POINT *point) |
376 | { | 376 | { |
377 | BN_free(&point->X); | 377 | BN_free(&point->X); |
378 | BN_free(&point->Y); | 378 | BN_free(&point->Y); |
@@ -381,7 +381,7 @@ ec_GFp_simple_point_finish(EC_POINT * point) | |||
381 | 381 | ||
382 | 382 | ||
383 | void | 383 | void |
384 | ec_GFp_simple_point_clear_finish(EC_POINT * point) | 384 | ec_GFp_simple_point_clear_finish(EC_POINT *point) |
385 | { | 385 | { |
386 | BN_clear_free(&point->X); | 386 | BN_clear_free(&point->X); |
387 | BN_clear_free(&point->Y); | 387 | BN_clear_free(&point->Y); |
@@ -391,7 +391,7 @@ ec_GFp_simple_point_clear_finish(EC_POINT * point) | |||
391 | 391 | ||
392 | 392 | ||
393 | int | 393 | int |
394 | ec_GFp_simple_point_copy(EC_POINT * dest, const EC_POINT * src) | 394 | ec_GFp_simple_point_copy(EC_POINT *dest, const EC_POINT *src) |
395 | { | 395 | { |
396 | if (!BN_copy(&dest->X, &src->X)) | 396 | if (!BN_copy(&dest->X, &src->X)) |
397 | return 0; | 397 | return 0; |
@@ -406,7 +406,7 @@ ec_GFp_simple_point_copy(EC_POINT * dest, const EC_POINT * src) | |||
406 | 406 | ||
407 | 407 | ||
408 | int | 408 | int |
409 | ec_GFp_simple_point_set_to_infinity(const EC_GROUP * group, EC_POINT * point) | 409 | ec_GFp_simple_point_set_to_infinity(const EC_GROUP *group, EC_POINT *point) |
410 | { | 410 | { |
411 | point->Z_is_one = 0; | 411 | point->Z_is_one = 0; |
412 | BN_zero(&point->Z); | 412 | BN_zero(&point->Z); |
@@ -515,8 +515,8 @@ ec_GFp_simple_get_Jprojective_coordinates(const EC_GROUP *group, | |||
515 | } | 515 | } |
516 | 516 | ||
517 | int | 517 | int |
518 | ec_GFp_simple_point_set_affine_coordinates(const EC_GROUP * group, EC_POINT * point, | 518 | ec_GFp_simple_point_set_affine_coordinates(const EC_GROUP *group, EC_POINT *point, |
519 | const BIGNUM * x, const BIGNUM * y, BN_CTX * ctx) | 519 | const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx) |
520 | { | 520 | { |
521 | if (x == NULL || y == NULL) { | 521 | if (x == NULL || y == NULL) { |
522 | /* unlike for projective coordinates, we do not tolerate this */ | 522 | /* unlike for projective coordinates, we do not tolerate this */ |
@@ -528,8 +528,8 @@ ec_GFp_simple_point_set_affine_coordinates(const EC_GROUP * group, EC_POINT * po | |||
528 | } | 528 | } |
529 | 529 | ||
530 | int | 530 | int |
531 | ec_GFp_simple_point_get_affine_coordinates(const EC_GROUP * group, const EC_POINT * point, | 531 | ec_GFp_simple_point_get_affine_coordinates(const EC_GROUP *group, const EC_POINT *point, |
532 | BIGNUM * x, BIGNUM * y, BN_CTX * ctx) | 532 | BIGNUM *x, BIGNUM *y, BN_CTX *ctx) |
533 | { | 533 | { |
534 | BN_CTX *new_ctx = NULL; | 534 | BN_CTX *new_ctx = NULL; |
535 | BIGNUM *Z, *Z_1, *Z_2, *Z_3; | 535 | BIGNUM *Z, *Z_1, *Z_2, *Z_3; |
@@ -635,7 +635,7 @@ ec_GFp_simple_point_get_affine_coordinates(const EC_GROUP * group, const EC_POIN | |||
635 | } | 635 | } |
636 | 636 | ||
637 | int | 637 | int |
638 | ec_GFp_simple_add(const EC_GROUP * group, EC_POINT * r, const EC_POINT * a, const EC_POINT * b, BN_CTX * ctx) | 638 | ec_GFp_simple_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx) |
639 | { | 639 | { |
640 | int (*field_mul) (const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); | 640 | int (*field_mul) (const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); |
641 | int (*field_sqr) (const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); | 641 | int (*field_sqr) (const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); |
@@ -824,7 +824,7 @@ ec_GFp_simple_add(const EC_GROUP * group, EC_POINT * r, const EC_POINT * a, cons | |||
824 | 824 | ||
825 | 825 | ||
826 | int | 826 | int |
827 | ec_GFp_simple_dbl(const EC_GROUP * group, EC_POINT * r, const EC_POINT * a, BN_CTX * ctx) | 827 | ec_GFp_simple_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, BN_CTX *ctx) |
828 | { | 828 | { |
829 | int (*field_mul) (const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); | 829 | int (*field_mul) (const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); |
830 | int (*field_sqr) (const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); | 830 | int (*field_sqr) (const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); |
@@ -966,7 +966,7 @@ ec_GFp_simple_dbl(const EC_GROUP * group, EC_POINT * r, const EC_POINT * a, BN_C | |||
966 | 966 | ||
967 | 967 | ||
968 | int | 968 | int |
969 | ec_GFp_simple_invert(const EC_GROUP * group, EC_POINT * point, BN_CTX * ctx) | 969 | ec_GFp_simple_invert(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx) |
970 | { | 970 | { |
971 | if (EC_POINT_is_at_infinity(group, point) > 0 || BN_is_zero(&point->Y)) | 971 | if (EC_POINT_is_at_infinity(group, point) > 0 || BN_is_zero(&point->Y)) |
972 | /* point is its own inverse */ | 972 | /* point is its own inverse */ |
@@ -977,14 +977,14 @@ ec_GFp_simple_invert(const EC_GROUP * group, EC_POINT * point, BN_CTX * ctx) | |||
977 | 977 | ||
978 | 978 | ||
979 | int | 979 | int |
980 | ec_GFp_simple_is_at_infinity(const EC_GROUP * group, const EC_POINT * point) | 980 | ec_GFp_simple_is_at_infinity(const EC_GROUP *group, const EC_POINT *point) |
981 | { | 981 | { |
982 | return BN_is_zero(&point->Z); | 982 | return BN_is_zero(&point->Z); |
983 | } | 983 | } |
984 | 984 | ||
985 | 985 | ||
986 | int | 986 | int |
987 | ec_GFp_simple_is_on_curve(const EC_GROUP * group, const EC_POINT * point, BN_CTX * ctx) | 987 | ec_GFp_simple_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_CTX *ctx) |
988 | { | 988 | { |
989 | int (*field_mul) (const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); | 989 | int (*field_mul) (const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); |
990 | int (*field_sqr) (const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); | 990 | int (*field_sqr) (const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); |
@@ -1087,7 +1087,7 @@ ec_GFp_simple_is_on_curve(const EC_GROUP * group, const EC_POINT * point, BN_CTX | |||
1087 | 1087 | ||
1088 | 1088 | ||
1089 | int | 1089 | int |
1090 | ec_GFp_simple_cmp(const EC_GROUP * group, const EC_POINT * a, const EC_POINT * b, BN_CTX * ctx) | 1090 | ec_GFp_simple_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx) |
1091 | { | 1091 | { |
1092 | /* | 1092 | /* |
1093 | * return values: -1 error 0 equal (in affine coordinates) 1 | 1093 | * return values: -1 error 0 equal (in affine coordinates) 1 |
@@ -1189,7 +1189,7 @@ ec_GFp_simple_cmp(const EC_GROUP * group, const EC_POINT * a, const EC_POINT * b | |||
1189 | 1189 | ||
1190 | 1190 | ||
1191 | int | 1191 | int |
1192 | ec_GFp_simple_make_affine(const EC_GROUP * group, EC_POINT * point, BN_CTX * ctx) | 1192 | ec_GFp_simple_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx) |
1193 | { | 1193 | { |
1194 | BN_CTX *new_ctx = NULL; | 1194 | BN_CTX *new_ctx = NULL; |
1195 | BIGNUM *x, *y; | 1195 | BIGNUM *x, *y; |
@@ -1227,7 +1227,7 @@ ec_GFp_simple_make_affine(const EC_GROUP * group, EC_POINT * point, BN_CTX * ctx | |||
1227 | 1227 | ||
1228 | 1228 | ||
1229 | int | 1229 | int |
1230 | ec_GFp_simple_points_make_affine(const EC_GROUP * group, size_t num, EC_POINT * points[], BN_CTX * ctx) | 1230 | ec_GFp_simple_points_make_affine(const EC_GROUP *group, size_t num, EC_POINT *points[], BN_CTX *ctx) |
1231 | { | 1231 | { |
1232 | BN_CTX *new_ctx = NULL; | 1232 | BN_CTX *new_ctx = NULL; |
1233 | BIGNUM *tmp0, *tmp1; | 1233 | BIGNUM *tmp0, *tmp1; |
@@ -1402,13 +1402,13 @@ ec_GFp_simple_points_make_affine(const EC_GROUP * group, size_t num, EC_POINT * | |||
1402 | 1402 | ||
1403 | 1403 | ||
1404 | int | 1404 | int |
1405 | ec_GFp_simple_field_mul(const EC_GROUP * group, BIGNUM * r, const BIGNUM * a, const BIGNUM * b, BN_CTX * ctx) | 1405 | ec_GFp_simple_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) |
1406 | { | 1406 | { |
1407 | return BN_mod_mul(r, a, b, &group->field, ctx); | 1407 | return BN_mod_mul(r, a, b, &group->field, ctx); |
1408 | } | 1408 | } |
1409 | 1409 | ||
1410 | int | 1410 | int |
1411 | ec_GFp_simple_field_sqr(const EC_GROUP * group, BIGNUM * r, const BIGNUM * a, BN_CTX * ctx) | 1411 | ec_GFp_simple_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, BN_CTX *ctx) |
1412 | { | 1412 | { |
1413 | return BN_mod_sqr(r, a, &group->field, ctx); | 1413 | return BN_mod_sqr(r, a, &group->field, ctx); |
1414 | } | 1414 | } |