diff options
116 files changed, 4130 insertions, 2104 deletions
diff --git a/src/lib/libcrypto/aes/aes_cbc.c b/src/lib/libcrypto/aes/aes_cbc.c index d2ba6bcdb4..373864cd4b 100644 --- a/src/lib/libcrypto/aes/aes_cbc.c +++ b/src/lib/libcrypto/aes/aes_cbc.c | |||
@@ -59,6 +59,7 @@ | |||
59 | #include <openssl/aes.h> | 59 | #include <openssl/aes.h> |
60 | #include "aes_locl.h" | 60 | #include "aes_locl.h" |
61 | 61 | ||
62 | #if !defined(OPENSSL_FIPS_AES_ASM) | ||
62 | void AES_cbc_encrypt(const unsigned char *in, unsigned char *out, | 63 | void AES_cbc_encrypt(const unsigned char *in, unsigned char *out, |
63 | const unsigned long length, const AES_KEY *key, | 64 | const unsigned long length, const AES_KEY *key, |
64 | unsigned char *ivec, const int enc) { | 65 | unsigned char *ivec, const int enc) { |
@@ -129,3 +130,4 @@ void AES_cbc_encrypt(const unsigned char *in, unsigned char *out, | |||
129 | } | 130 | } |
130 | } | 131 | } |
131 | } | 132 | } |
133 | #endif | ||
diff --git a/src/lib/libcrypto/asn1/asn1.h b/src/lib/libcrypto/asn1/asn1.h index ceaeb4cbe3..0184b475a7 100644 --- a/src/lib/libcrypto/asn1/asn1.h +++ b/src/lib/libcrypto/asn1/asn1.h | |||
@@ -962,6 +962,7 @@ void ERR_load_ASN1_strings(void); | |||
962 | #define ASN1_F_ASN1_DUP 111 | 962 | #define ASN1_F_ASN1_DUP 111 |
963 | #define ASN1_F_ASN1_ENUMERATED_SET 112 | 963 | #define ASN1_F_ASN1_ENUMERATED_SET 112 |
964 | #define ASN1_F_ASN1_ENUMERATED_TO_BN 113 | 964 | #define ASN1_F_ASN1_ENUMERATED_TO_BN 113 |
965 | #define ASN1_F_ASN1_FIND_END 182 | ||
965 | #define ASN1_F_ASN1_GENERALIZEDTIME_SET 178 | 966 | #define ASN1_F_ASN1_GENERALIZEDTIME_SET 178 |
966 | #define ASN1_F_ASN1_GET_OBJECT 114 | 967 | #define ASN1_F_ASN1_GET_OBJECT 114 |
967 | #define ASN1_F_ASN1_HEADER_NEW 115 | 968 | #define ASN1_F_ASN1_HEADER_NEW 115 |
@@ -1075,6 +1076,7 @@ void ERR_load_ASN1_strings(void); | |||
1075 | #define ASN1_R_MISSING_SECOND_NUMBER 138 | 1076 | #define ASN1_R_MISSING_SECOND_NUMBER 138 |
1076 | #define ASN1_R_MSTRING_NOT_UNIVERSAL 139 | 1077 | #define ASN1_R_MSTRING_NOT_UNIVERSAL 139 |
1077 | #define ASN1_R_MSTRING_WRONG_TAG 140 | 1078 | #define ASN1_R_MSTRING_WRONG_TAG 140 |
1079 | #define ASN1_R_NESTED_ASN1_STRING 174 | ||
1078 | #define ASN1_R_NON_HEX_CHARACTERS 141 | 1080 | #define ASN1_R_NON_HEX_CHARACTERS 141 |
1079 | #define ASN1_R_NOT_ENOUGH_DATA 142 | 1081 | #define ASN1_R_NOT_ENOUGH_DATA 142 |
1080 | #define ASN1_R_NO_MATCHING_CHOICE_TYPE 143 | 1082 | #define ASN1_R_NO_MATCHING_CHOICE_TYPE 143 |
diff --git a/src/lib/libcrypto/asn1/asn1_err.c b/src/lib/libcrypto/asn1/asn1_err.c index 3b57c8fbae..315d0a0807 100644 --- a/src/lib/libcrypto/asn1/asn1_err.c +++ b/src/lib/libcrypto/asn1/asn1_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/asn1/asn1_err.c */ | 1 | /* crypto/asn1/asn1_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2004 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,169 +64,175 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_ASN1,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_ASN1,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA ASN1_str_functs[]= | 71 | static ERR_STRING_DATA ASN1_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,ASN1_F_A2D_ASN1_OBJECT,0), "a2d_ASN1_OBJECT"}, | 73 | {ERR_FUNC(ASN1_F_A2D_ASN1_OBJECT), "a2d_ASN1_OBJECT"}, |
70 | {ERR_PACK(0,ASN1_F_A2I_ASN1_ENUMERATED,0), "a2i_ASN1_ENUMERATED"}, | 74 | {ERR_FUNC(ASN1_F_A2I_ASN1_ENUMERATED), "a2i_ASN1_ENUMERATED"}, |
71 | {ERR_PACK(0,ASN1_F_A2I_ASN1_INTEGER,0), "a2i_ASN1_INTEGER"}, | 75 | {ERR_FUNC(ASN1_F_A2I_ASN1_INTEGER), "a2i_ASN1_INTEGER"}, |
72 | {ERR_PACK(0,ASN1_F_A2I_ASN1_STRING,0), "a2i_ASN1_STRING"}, | 76 | {ERR_FUNC(ASN1_F_A2I_ASN1_STRING), "a2i_ASN1_STRING"}, |
73 | {ERR_PACK(0,ASN1_F_ASN1_BIT_STRING_SET_BIT,0), "ASN1_BIT_STRING_set_bit"}, | 77 | {ERR_FUNC(ASN1_F_ASN1_BIT_STRING_SET_BIT), "ASN1_BIT_STRING_set_bit"}, |
74 | {ERR_PACK(0,ASN1_F_ASN1_CHECK_TLEN,0), "ASN1_CHECK_TLEN"}, | 78 | {ERR_FUNC(ASN1_F_ASN1_CHECK_TLEN), "ASN1_CHECK_TLEN"}, |
75 | {ERR_PACK(0,ASN1_F_ASN1_COLLATE_PRIMITIVE,0), "ASN1_COLLATE_PRIMITIVE"}, | 79 | {ERR_FUNC(ASN1_F_ASN1_COLLATE_PRIMITIVE), "ASN1_COLLATE_PRIMITIVE"}, |
76 | {ERR_PACK(0,ASN1_F_ASN1_COLLECT,0), "ASN1_COLLECT"}, | 80 | {ERR_FUNC(ASN1_F_ASN1_COLLECT), "ASN1_COLLECT"}, |
77 | {ERR_PACK(0,ASN1_F_ASN1_D2I_BIO,0), "ASN1_d2i_bio"}, | 81 | {ERR_FUNC(ASN1_F_ASN1_D2I_BIO), "ASN1_d2i_bio"}, |
78 | {ERR_PACK(0,ASN1_F_ASN1_D2I_EX_PRIMITIVE,0), "ASN1_D2I_EX_PRIMITIVE"}, | 82 | {ERR_FUNC(ASN1_F_ASN1_D2I_EX_PRIMITIVE), "ASN1_D2I_EX_PRIMITIVE"}, |
79 | {ERR_PACK(0,ASN1_F_ASN1_D2I_FP,0), "ASN1_d2i_fp"}, | 83 | {ERR_FUNC(ASN1_F_ASN1_D2I_FP), "ASN1_d2i_fp"}, |
80 | {ERR_PACK(0,ASN1_F_ASN1_DIGEST,0), "ASN1_digest"}, | 84 | {ERR_FUNC(ASN1_F_ASN1_DIGEST), "ASN1_digest"}, |
81 | {ERR_PACK(0,ASN1_F_ASN1_DO_ADB,0), "ASN1_DO_ADB"}, | 85 | {ERR_FUNC(ASN1_F_ASN1_DO_ADB), "ASN1_DO_ADB"}, |
82 | {ERR_PACK(0,ASN1_F_ASN1_DUP,0), "ASN1_dup"}, | 86 | {ERR_FUNC(ASN1_F_ASN1_DUP), "ASN1_dup"}, |
83 | {ERR_PACK(0,ASN1_F_ASN1_ENUMERATED_SET,0), "ASN1_ENUMERATED_set"}, | 87 | {ERR_FUNC(ASN1_F_ASN1_ENUMERATED_SET), "ASN1_ENUMERATED_set"}, |
84 | {ERR_PACK(0,ASN1_F_ASN1_ENUMERATED_TO_BN,0), "ASN1_ENUMERATED_to_BN"}, | 88 | {ERR_FUNC(ASN1_F_ASN1_ENUMERATED_TO_BN), "ASN1_ENUMERATED_to_BN"}, |
85 | {ERR_PACK(0,ASN1_F_ASN1_GENERALIZEDTIME_SET,0), "ASN1_GENERALIZEDTIME_set"}, | 89 | {ERR_FUNC(ASN1_F_ASN1_FIND_END), "ASN1_FIND_END"}, |
86 | {ERR_PACK(0,ASN1_F_ASN1_GET_OBJECT,0), "ASN1_get_object"}, | 90 | {ERR_FUNC(ASN1_F_ASN1_GENERALIZEDTIME_SET), "ASN1_GENERALIZEDTIME_set"}, |
87 | {ERR_PACK(0,ASN1_F_ASN1_HEADER_NEW,0), "ASN1_HEADER_new"}, | 91 | {ERR_FUNC(ASN1_F_ASN1_GET_OBJECT), "ASN1_get_object"}, |
88 | {ERR_PACK(0,ASN1_F_ASN1_I2D_BIO,0), "ASN1_i2d_bio"}, | 92 | {ERR_FUNC(ASN1_F_ASN1_HEADER_NEW), "ASN1_HEADER_new"}, |
89 | {ERR_PACK(0,ASN1_F_ASN1_I2D_FP,0), "ASN1_i2d_fp"}, | 93 | {ERR_FUNC(ASN1_F_ASN1_I2D_BIO), "ASN1_i2d_bio"}, |
90 | {ERR_PACK(0,ASN1_F_ASN1_INTEGER_SET,0), "ASN1_INTEGER_set"}, | 94 | {ERR_FUNC(ASN1_F_ASN1_I2D_FP), "ASN1_i2d_fp"}, |
91 | {ERR_PACK(0,ASN1_F_ASN1_INTEGER_TO_BN,0), "ASN1_INTEGER_to_BN"}, | 95 | {ERR_FUNC(ASN1_F_ASN1_INTEGER_SET), "ASN1_INTEGER_set"}, |
92 | {ERR_PACK(0,ASN1_F_ASN1_ITEM_EX_D2I,0), "ASN1_ITEM_EX_D2I"}, | 96 | {ERR_FUNC(ASN1_F_ASN1_INTEGER_TO_BN), "ASN1_INTEGER_to_BN"}, |
93 | {ERR_PACK(0,ASN1_F_ASN1_ITEM_NEW,0), "ASN1_item_new"}, | 97 | {ERR_FUNC(ASN1_F_ASN1_ITEM_EX_D2I), "ASN1_ITEM_EX_D2I"}, |
94 | {ERR_PACK(0,ASN1_F_ASN1_MBSTRING_COPY,0), "ASN1_mbstring_copy"}, | 98 | {ERR_FUNC(ASN1_F_ASN1_ITEM_NEW), "ASN1_item_new"}, |
95 | {ERR_PACK(0,ASN1_F_ASN1_OBJECT_NEW,0), "ASN1_OBJECT_new"}, | 99 | {ERR_FUNC(ASN1_F_ASN1_MBSTRING_COPY), "ASN1_mbstring_copy"}, |
96 | {ERR_PACK(0,ASN1_F_ASN1_PACK_STRING,0), "ASN1_pack_string"}, | 100 | {ERR_FUNC(ASN1_F_ASN1_OBJECT_NEW), "ASN1_OBJECT_new"}, |
97 | {ERR_PACK(0,ASN1_F_ASN1_PBE_SET,0), "ASN1_PBE_SET"}, | 101 | {ERR_FUNC(ASN1_F_ASN1_PACK_STRING), "ASN1_pack_string"}, |
98 | {ERR_PACK(0,ASN1_F_ASN1_SEQ_PACK,0), "ASN1_seq_pack"}, | 102 | {ERR_FUNC(ASN1_F_ASN1_PBE_SET), "ASN1_PBE_SET"}, |
99 | {ERR_PACK(0,ASN1_F_ASN1_SEQ_UNPACK,0), "ASN1_seq_unpack"}, | 103 | {ERR_FUNC(ASN1_F_ASN1_SEQ_PACK), "ASN1_seq_pack"}, |
100 | {ERR_PACK(0,ASN1_F_ASN1_SIGN,0), "ASN1_sign"}, | 104 | {ERR_FUNC(ASN1_F_ASN1_SEQ_UNPACK), "ASN1_seq_unpack"}, |
101 | {ERR_PACK(0,ASN1_F_ASN1_STRING_SET,0), "ASN1_STRING_set"}, | 105 | {ERR_FUNC(ASN1_F_ASN1_SIGN), "ASN1_sign"}, |
102 | {ERR_PACK(0,ASN1_F_ASN1_STRING_TABLE_ADD,0), "ASN1_STRING_TABLE_add"}, | 106 | {ERR_FUNC(ASN1_F_ASN1_STRING_SET), "ASN1_STRING_set"}, |
103 | {ERR_PACK(0,ASN1_F_ASN1_STRING_TYPE_NEW,0), "ASN1_STRING_type_new"}, | 107 | {ERR_FUNC(ASN1_F_ASN1_STRING_TABLE_ADD), "ASN1_STRING_TABLE_add"}, |
104 | {ERR_PACK(0,ASN1_F_ASN1_TEMPLATE_D2I,0), "ASN1_TEMPLATE_D2I"}, | 108 | {ERR_FUNC(ASN1_F_ASN1_STRING_TYPE_NEW), "ASN1_STRING_type_new"}, |
105 | {ERR_PACK(0,ASN1_F_ASN1_TEMPLATE_EX_D2I,0), "ASN1_TEMPLATE_EX_D2I"}, | 109 | {ERR_FUNC(ASN1_F_ASN1_TEMPLATE_D2I), "ASN1_TEMPLATE_D2I"}, |
106 | {ERR_PACK(0,ASN1_F_ASN1_TEMPLATE_NEW,0), "ASN1_TEMPLATE_NEW"}, | 110 | {ERR_FUNC(ASN1_F_ASN1_TEMPLATE_EX_D2I), "ASN1_TEMPLATE_EX_D2I"}, |
107 | {ERR_PACK(0,ASN1_F_ASN1_TIME_SET,0), "ASN1_TIME_set"}, | 111 | {ERR_FUNC(ASN1_F_ASN1_TEMPLATE_NEW), "ASN1_TEMPLATE_NEW"}, |
108 | {ERR_PACK(0,ASN1_F_ASN1_TYPE_GET_INT_OCTETSTRING,0), "ASN1_TYPE_get_int_octetstring"}, | 112 | {ERR_FUNC(ASN1_F_ASN1_TIME_SET), "ASN1_TIME_set"}, |
109 | {ERR_PACK(0,ASN1_F_ASN1_TYPE_GET_OCTETSTRING,0), "ASN1_TYPE_get_octetstring"}, | 113 | {ERR_FUNC(ASN1_F_ASN1_TYPE_GET_INT_OCTETSTRING), "ASN1_TYPE_get_int_octetstring"}, |
110 | {ERR_PACK(0,ASN1_F_ASN1_UNPACK_STRING,0), "ASN1_unpack_string"}, | 114 | {ERR_FUNC(ASN1_F_ASN1_TYPE_GET_OCTETSTRING), "ASN1_TYPE_get_octetstring"}, |
111 | {ERR_PACK(0,ASN1_F_ASN1_UTCTIME_SET,0), "ASN1_UTCTIME_set"}, | 115 | {ERR_FUNC(ASN1_F_ASN1_UNPACK_STRING), "ASN1_unpack_string"}, |
112 | {ERR_PACK(0,ASN1_F_ASN1_VERIFY,0), "ASN1_verify"}, | 116 | {ERR_FUNC(ASN1_F_ASN1_UTCTIME_SET), "ASN1_UTCTIME_set"}, |
113 | {ERR_PACK(0,ASN1_F_BN_TO_ASN1_ENUMERATED,0), "BN_to_ASN1_ENUMERATED"}, | 117 | {ERR_FUNC(ASN1_F_ASN1_VERIFY), "ASN1_verify"}, |
114 | {ERR_PACK(0,ASN1_F_BN_TO_ASN1_INTEGER,0), "BN_to_ASN1_INTEGER"}, | 118 | {ERR_FUNC(ASN1_F_BN_TO_ASN1_ENUMERATED), "BN_to_ASN1_ENUMERATED"}, |
115 | {ERR_PACK(0,ASN1_F_COLLECT_DATA,0), "COLLECT_DATA"}, | 119 | {ERR_FUNC(ASN1_F_BN_TO_ASN1_INTEGER), "BN_to_ASN1_INTEGER"}, |
116 | {ERR_PACK(0,ASN1_F_D2I_ASN1_BIT_STRING,0), "D2I_ASN1_BIT_STRING"}, | 120 | {ERR_FUNC(ASN1_F_COLLECT_DATA), "COLLECT_DATA"}, |
117 | {ERR_PACK(0,ASN1_F_D2I_ASN1_BOOLEAN,0), "d2i_ASN1_BOOLEAN"}, | 121 | {ERR_FUNC(ASN1_F_D2I_ASN1_BIT_STRING), "D2I_ASN1_BIT_STRING"}, |
118 | {ERR_PACK(0,ASN1_F_D2I_ASN1_BYTES,0), "d2i_ASN1_bytes"}, | 122 | {ERR_FUNC(ASN1_F_D2I_ASN1_BOOLEAN), "d2i_ASN1_BOOLEAN"}, |
119 | {ERR_PACK(0,ASN1_F_D2I_ASN1_GENERALIZEDTIME,0), "D2I_ASN1_GENERALIZEDTIME"}, | 123 | {ERR_FUNC(ASN1_F_D2I_ASN1_BYTES), "d2i_ASN1_bytes"}, |
120 | {ERR_PACK(0,ASN1_F_D2I_ASN1_HEADER,0), "d2i_ASN1_HEADER"}, | 124 | {ERR_FUNC(ASN1_F_D2I_ASN1_GENERALIZEDTIME), "D2I_ASN1_GENERALIZEDTIME"}, |
121 | {ERR_PACK(0,ASN1_F_D2I_ASN1_INTEGER,0), "D2I_ASN1_INTEGER"}, | 125 | {ERR_FUNC(ASN1_F_D2I_ASN1_HEADER), "d2i_ASN1_HEADER"}, |
122 | {ERR_PACK(0,ASN1_F_D2I_ASN1_OBJECT,0), "d2i_ASN1_OBJECT"}, | 126 | {ERR_FUNC(ASN1_F_D2I_ASN1_INTEGER), "D2I_ASN1_INTEGER"}, |
123 | {ERR_PACK(0,ASN1_F_D2I_ASN1_SET,0), "d2i_ASN1_SET"}, | 127 | {ERR_FUNC(ASN1_F_D2I_ASN1_OBJECT), "d2i_ASN1_OBJECT"}, |
124 | {ERR_PACK(0,ASN1_F_D2I_ASN1_TYPE_BYTES,0), "d2i_ASN1_type_bytes"}, | 128 | {ERR_FUNC(ASN1_F_D2I_ASN1_SET), "d2i_ASN1_SET"}, |
125 | {ERR_PACK(0,ASN1_F_D2I_ASN1_UINTEGER,0), "d2i_ASN1_UINTEGER"}, | 129 | {ERR_FUNC(ASN1_F_D2I_ASN1_TYPE_BYTES), "d2i_ASN1_type_bytes"}, |
126 | {ERR_PACK(0,ASN1_F_D2I_ASN1_UTCTIME,0), "D2I_ASN1_UTCTIME"}, | 130 | {ERR_FUNC(ASN1_F_D2I_ASN1_UINTEGER), "d2i_ASN1_UINTEGER"}, |
127 | {ERR_PACK(0,ASN1_F_D2I_NETSCAPE_RSA,0), "d2i_Netscape_RSA"}, | 131 | {ERR_FUNC(ASN1_F_D2I_ASN1_UTCTIME), "D2I_ASN1_UTCTIME"}, |
128 | {ERR_PACK(0,ASN1_F_D2I_NETSCAPE_RSA_2,0), "D2I_NETSCAPE_RSA_2"}, | 132 | {ERR_FUNC(ASN1_F_D2I_NETSCAPE_RSA), "d2i_Netscape_RSA"}, |
129 | {ERR_PACK(0,ASN1_F_D2I_PRIVATEKEY,0), "d2i_PrivateKey"}, | 133 | {ERR_FUNC(ASN1_F_D2I_NETSCAPE_RSA_2), "D2I_NETSCAPE_RSA_2"}, |
130 | {ERR_PACK(0,ASN1_F_D2I_PUBLICKEY,0), "d2i_PublicKey"}, | 134 | {ERR_FUNC(ASN1_F_D2I_PRIVATEKEY), "d2i_PrivateKey"}, |
131 | {ERR_PACK(0,ASN1_F_D2I_X509,0), "D2I_X509"}, | 135 | {ERR_FUNC(ASN1_F_D2I_PUBLICKEY), "d2i_PublicKey"}, |
132 | {ERR_PACK(0,ASN1_F_D2I_X509_CINF,0), "D2I_X509_CINF"}, | 136 | {ERR_FUNC(ASN1_F_D2I_X509), "D2I_X509"}, |
133 | {ERR_PACK(0,ASN1_F_D2I_X509_NAME,0), "D2I_X509_NAME"}, | 137 | {ERR_FUNC(ASN1_F_D2I_X509_CINF), "D2I_X509_CINF"}, |
134 | {ERR_PACK(0,ASN1_F_D2I_X509_PKEY,0), "d2i_X509_PKEY"}, | 138 | {ERR_FUNC(ASN1_F_D2I_X509_NAME), "D2I_X509_NAME"}, |
135 | {ERR_PACK(0,ASN1_F_I2D_ASN1_SET,0), "i2d_ASN1_SET"}, | 139 | {ERR_FUNC(ASN1_F_D2I_X509_PKEY), "d2i_X509_PKEY"}, |
136 | {ERR_PACK(0,ASN1_F_I2D_ASN1_TIME,0), "I2D_ASN1_TIME"}, | 140 | {ERR_FUNC(ASN1_F_I2D_ASN1_SET), "i2d_ASN1_SET"}, |
137 | {ERR_PACK(0,ASN1_F_I2D_DSA_PUBKEY,0), "i2d_DSA_PUBKEY"}, | 141 | {ERR_FUNC(ASN1_F_I2D_ASN1_TIME), "I2D_ASN1_TIME"}, |
138 | {ERR_PACK(0,ASN1_F_I2D_NETSCAPE_RSA,0), "i2d_Netscape_RSA"}, | 142 | {ERR_FUNC(ASN1_F_I2D_DSA_PUBKEY), "i2d_DSA_PUBKEY"}, |
139 | {ERR_PACK(0,ASN1_F_I2D_PRIVATEKEY,0), "i2d_PrivateKey"}, | 143 | {ERR_FUNC(ASN1_F_I2D_NETSCAPE_RSA), "i2d_Netscape_RSA"}, |
140 | {ERR_PACK(0,ASN1_F_I2D_PUBLICKEY,0), "i2d_PublicKey"}, | 144 | {ERR_FUNC(ASN1_F_I2D_PRIVATEKEY), "i2d_PrivateKey"}, |
141 | {ERR_PACK(0,ASN1_F_I2D_RSA_PUBKEY,0), "i2d_RSA_PUBKEY"}, | 145 | {ERR_FUNC(ASN1_F_I2D_PUBLICKEY), "i2d_PublicKey"}, |
142 | {ERR_PACK(0,ASN1_F_LONG_C2I,0), "LONG_C2I"}, | 146 | {ERR_FUNC(ASN1_F_I2D_RSA_PUBKEY), "i2d_RSA_PUBKEY"}, |
143 | {ERR_PACK(0,ASN1_F_OID_MODULE_INIT,0), "OID_MODULE_INIT"}, | 147 | {ERR_FUNC(ASN1_F_LONG_C2I), "LONG_C2I"}, |
144 | {ERR_PACK(0,ASN1_F_PKCS5_PBE2_SET,0), "PKCS5_pbe2_set"}, | 148 | {ERR_FUNC(ASN1_F_OID_MODULE_INIT), "OID_MODULE_INIT"}, |
145 | {ERR_PACK(0,ASN1_F_X509_CINF_NEW,0), "X509_CINF_NEW"}, | 149 | {ERR_FUNC(ASN1_F_PKCS5_PBE2_SET), "PKCS5_pbe2_set"}, |
146 | {ERR_PACK(0,ASN1_F_X509_CRL_ADD0_REVOKED,0), "X509_CRL_add0_revoked"}, | 150 | {ERR_FUNC(ASN1_F_X509_CINF_NEW), "X509_CINF_NEW"}, |
147 | {ERR_PACK(0,ASN1_F_X509_INFO_NEW,0), "X509_INFO_new"}, | 151 | {ERR_FUNC(ASN1_F_X509_CRL_ADD0_REVOKED), "X509_CRL_add0_revoked"}, |
148 | {ERR_PACK(0,ASN1_F_X509_NAME_NEW,0), "X509_NAME_NEW"}, | 152 | {ERR_FUNC(ASN1_F_X509_INFO_NEW), "X509_INFO_new"}, |
149 | {ERR_PACK(0,ASN1_F_X509_NEW,0), "X509_NEW"}, | 153 | {ERR_FUNC(ASN1_F_X509_NAME_NEW), "X509_NAME_NEW"}, |
150 | {ERR_PACK(0,ASN1_F_X509_PKEY_NEW,0), "X509_PKEY_new"}, | 154 | {ERR_FUNC(ASN1_F_X509_NEW), "X509_NEW"}, |
155 | {ERR_FUNC(ASN1_F_X509_PKEY_NEW), "X509_PKEY_new"}, | ||
151 | {0,NULL} | 156 | {0,NULL} |
152 | }; | 157 | }; |
153 | 158 | ||
154 | static ERR_STRING_DATA ASN1_str_reasons[]= | 159 | static ERR_STRING_DATA ASN1_str_reasons[]= |
155 | { | 160 | { |
156 | {ASN1_R_ADDING_OBJECT ,"adding object"}, | 161 | {ERR_REASON(ASN1_R_ADDING_OBJECT) ,"adding object"}, |
157 | {ASN1_R_AUX_ERROR ,"aux error"}, | 162 | {ERR_REASON(ASN1_R_AUX_ERROR) ,"aux error"}, |
158 | {ASN1_R_BAD_CLASS ,"bad class"}, | 163 | {ERR_REASON(ASN1_R_BAD_CLASS) ,"bad class"}, |
159 | {ASN1_R_BAD_OBJECT_HEADER ,"bad object header"}, | 164 | {ERR_REASON(ASN1_R_BAD_OBJECT_HEADER) ,"bad object header"}, |
160 | {ASN1_R_BAD_PASSWORD_READ ,"bad password read"}, | 165 | {ERR_REASON(ASN1_R_BAD_PASSWORD_READ) ,"bad password read"}, |
161 | {ASN1_R_BAD_TAG ,"bad tag"}, | 166 | {ERR_REASON(ASN1_R_BAD_TAG) ,"bad tag"}, |
162 | {ASN1_R_BN_LIB ,"bn lib"}, | 167 | {ERR_REASON(ASN1_R_BN_LIB) ,"bn lib"}, |
163 | {ASN1_R_BOOLEAN_IS_WRONG_LENGTH ,"boolean is wrong length"}, | 168 | {ERR_REASON(ASN1_R_BOOLEAN_IS_WRONG_LENGTH),"boolean is wrong length"}, |
164 | {ASN1_R_BUFFER_TOO_SMALL ,"buffer too small"}, | 169 | {ERR_REASON(ASN1_R_BUFFER_TOO_SMALL) ,"buffer too small"}, |
165 | {ASN1_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER ,"cipher has no object identifier"}, | 170 | {ERR_REASON(ASN1_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER),"cipher has no object identifier"}, |
166 | {ASN1_R_DATA_IS_WRONG ,"data is wrong"}, | 171 | {ERR_REASON(ASN1_R_DATA_IS_WRONG) ,"data is wrong"}, |
167 | {ASN1_R_DECODE_ERROR ,"decode error"}, | 172 | {ERR_REASON(ASN1_R_DECODE_ERROR) ,"decode error"}, |
168 | {ASN1_R_DECODING_ERROR ,"decoding error"}, | 173 | {ERR_REASON(ASN1_R_DECODING_ERROR) ,"decoding error"}, |
169 | {ASN1_R_ENCODE_ERROR ,"encode error"}, | 174 | {ERR_REASON(ASN1_R_ENCODE_ERROR) ,"encode error"}, |
170 | {ASN1_R_ERROR_GETTING_TIME ,"error getting time"}, | 175 | {ERR_REASON(ASN1_R_ERROR_GETTING_TIME) ,"error getting time"}, |
171 | {ASN1_R_ERROR_LOADING_SECTION ,"error loading section"}, | 176 | {ERR_REASON(ASN1_R_ERROR_LOADING_SECTION),"error loading section"}, |
172 | {ASN1_R_ERROR_PARSING_SET_ELEMENT ,"error parsing set element"}, | 177 | {ERR_REASON(ASN1_R_ERROR_PARSING_SET_ELEMENT),"error parsing set element"}, |
173 | {ASN1_R_ERROR_SETTING_CIPHER_PARAMS ,"error setting cipher params"}, | 178 | {ERR_REASON(ASN1_R_ERROR_SETTING_CIPHER_PARAMS),"error setting cipher params"}, |
174 | {ASN1_R_EXPECTING_AN_INTEGER ,"expecting an integer"}, | 179 | {ERR_REASON(ASN1_R_EXPECTING_AN_INTEGER) ,"expecting an integer"}, |
175 | {ASN1_R_EXPECTING_AN_OBJECT ,"expecting an object"}, | 180 | {ERR_REASON(ASN1_R_EXPECTING_AN_OBJECT) ,"expecting an object"}, |
176 | {ASN1_R_EXPECTING_A_BOOLEAN ,"expecting a boolean"}, | 181 | {ERR_REASON(ASN1_R_EXPECTING_A_BOOLEAN) ,"expecting a boolean"}, |
177 | {ASN1_R_EXPECTING_A_TIME ,"expecting a time"}, | 182 | {ERR_REASON(ASN1_R_EXPECTING_A_TIME) ,"expecting a time"}, |
178 | {ASN1_R_EXPLICIT_LENGTH_MISMATCH ,"explicit length mismatch"}, | 183 | {ERR_REASON(ASN1_R_EXPLICIT_LENGTH_MISMATCH),"explicit length mismatch"}, |
179 | {ASN1_R_EXPLICIT_TAG_NOT_CONSTRUCTED ,"explicit tag not constructed"}, | 184 | {ERR_REASON(ASN1_R_EXPLICIT_TAG_NOT_CONSTRUCTED),"explicit tag not constructed"}, |
180 | {ASN1_R_FIELD_MISSING ,"field missing"}, | 185 | {ERR_REASON(ASN1_R_FIELD_MISSING) ,"field missing"}, |
181 | {ASN1_R_FIRST_NUM_TOO_LARGE ,"first num too large"}, | 186 | {ERR_REASON(ASN1_R_FIRST_NUM_TOO_LARGE) ,"first num too large"}, |
182 | {ASN1_R_HEADER_TOO_LONG ,"header too long"}, | 187 | {ERR_REASON(ASN1_R_HEADER_TOO_LONG) ,"header too long"}, |
183 | {ASN1_R_ILLEGAL_CHARACTERS ,"illegal characters"}, | 188 | {ERR_REASON(ASN1_R_ILLEGAL_CHARACTERS) ,"illegal characters"}, |
184 | {ASN1_R_ILLEGAL_NULL ,"illegal null"}, | 189 | {ERR_REASON(ASN1_R_ILLEGAL_NULL) ,"illegal null"}, |
185 | {ASN1_R_ILLEGAL_OPTIONAL_ANY ,"illegal optional any"}, | 190 | {ERR_REASON(ASN1_R_ILLEGAL_OPTIONAL_ANY) ,"illegal optional any"}, |
186 | {ASN1_R_ILLEGAL_OPTIONS_ON_ITEM_TEMPLATE ,"illegal options on item template"}, | 191 | {ERR_REASON(ASN1_R_ILLEGAL_OPTIONS_ON_ITEM_TEMPLATE),"illegal options on item template"}, |
187 | {ASN1_R_ILLEGAL_TAGGED_ANY ,"illegal tagged any"}, | 192 | {ERR_REASON(ASN1_R_ILLEGAL_TAGGED_ANY) ,"illegal tagged any"}, |
188 | {ASN1_R_INTEGER_TOO_LARGE_FOR_LONG ,"integer too large for long"}, | 193 | {ERR_REASON(ASN1_R_INTEGER_TOO_LARGE_FOR_LONG),"integer too large for long"}, |
189 | {ASN1_R_INVALID_BMPSTRING_LENGTH ,"invalid bmpstring length"}, | 194 | {ERR_REASON(ASN1_R_INVALID_BMPSTRING_LENGTH),"invalid bmpstring length"}, |
190 | {ASN1_R_INVALID_DIGIT ,"invalid digit"}, | 195 | {ERR_REASON(ASN1_R_INVALID_DIGIT) ,"invalid digit"}, |
191 | {ASN1_R_INVALID_SEPARATOR ,"invalid separator"}, | 196 | {ERR_REASON(ASN1_R_INVALID_SEPARATOR) ,"invalid separator"}, |
192 | {ASN1_R_INVALID_TIME_FORMAT ,"invalid time format"}, | 197 | {ERR_REASON(ASN1_R_INVALID_TIME_FORMAT) ,"invalid time format"}, |
193 | {ASN1_R_INVALID_UNIVERSALSTRING_LENGTH ,"invalid universalstring length"}, | 198 | {ERR_REASON(ASN1_R_INVALID_UNIVERSALSTRING_LENGTH),"invalid universalstring length"}, |
194 | {ASN1_R_INVALID_UTF8STRING ,"invalid utf8string"}, | 199 | {ERR_REASON(ASN1_R_INVALID_UTF8STRING) ,"invalid utf8string"}, |
195 | {ASN1_R_IV_TOO_LARGE ,"iv too large"}, | 200 | {ERR_REASON(ASN1_R_IV_TOO_LARGE) ,"iv too large"}, |
196 | {ASN1_R_LENGTH_ERROR ,"length error"}, | 201 | {ERR_REASON(ASN1_R_LENGTH_ERROR) ,"length error"}, |
197 | {ASN1_R_MISSING_EOC ,"missing eoc"}, | 202 | {ERR_REASON(ASN1_R_MISSING_EOC) ,"missing eoc"}, |
198 | {ASN1_R_MISSING_SECOND_NUMBER ,"missing second number"}, | 203 | {ERR_REASON(ASN1_R_MISSING_SECOND_NUMBER),"missing second number"}, |
199 | {ASN1_R_MSTRING_NOT_UNIVERSAL ,"mstring not universal"}, | 204 | {ERR_REASON(ASN1_R_MSTRING_NOT_UNIVERSAL),"mstring not universal"}, |
200 | {ASN1_R_MSTRING_WRONG_TAG ,"mstring wrong tag"}, | 205 | {ERR_REASON(ASN1_R_MSTRING_WRONG_TAG) ,"mstring wrong tag"}, |
201 | {ASN1_R_NON_HEX_CHARACTERS ,"non hex characters"}, | 206 | {ERR_REASON(ASN1_R_NESTED_ASN1_STRING) ,"nested asn1 string"}, |
202 | {ASN1_R_NOT_ENOUGH_DATA ,"not enough data"}, | 207 | {ERR_REASON(ASN1_R_NON_HEX_CHARACTERS) ,"non hex characters"}, |
203 | {ASN1_R_NO_MATCHING_CHOICE_TYPE ,"no matching choice type"}, | 208 | {ERR_REASON(ASN1_R_NOT_ENOUGH_DATA) ,"not enough data"}, |
204 | {ASN1_R_NULL_IS_WRONG_LENGTH ,"null is wrong length"}, | 209 | {ERR_REASON(ASN1_R_NO_MATCHING_CHOICE_TYPE),"no matching choice type"}, |
205 | {ASN1_R_ODD_NUMBER_OF_CHARS ,"odd number of chars"}, | 210 | {ERR_REASON(ASN1_R_NULL_IS_WRONG_LENGTH) ,"null is wrong length"}, |
206 | {ASN1_R_PRIVATE_KEY_HEADER_MISSING ,"private key header missing"}, | 211 | {ERR_REASON(ASN1_R_ODD_NUMBER_OF_CHARS) ,"odd number of chars"}, |
207 | {ASN1_R_SECOND_NUMBER_TOO_LARGE ,"second number too large"}, | 212 | {ERR_REASON(ASN1_R_PRIVATE_KEY_HEADER_MISSING),"private key header missing"}, |
208 | {ASN1_R_SEQUENCE_LENGTH_MISMATCH ,"sequence length mismatch"}, | 213 | {ERR_REASON(ASN1_R_SECOND_NUMBER_TOO_LARGE),"second number too large"}, |
209 | {ASN1_R_SEQUENCE_NOT_CONSTRUCTED ,"sequence not constructed"}, | 214 | {ERR_REASON(ASN1_R_SEQUENCE_LENGTH_MISMATCH),"sequence length mismatch"}, |
210 | {ASN1_R_SHORT_LINE ,"short line"}, | 215 | {ERR_REASON(ASN1_R_SEQUENCE_NOT_CONSTRUCTED),"sequence not constructed"}, |
211 | {ASN1_R_STRING_TOO_LONG ,"string too long"}, | 216 | {ERR_REASON(ASN1_R_SHORT_LINE) ,"short line"}, |
212 | {ASN1_R_STRING_TOO_SHORT ,"string too short"}, | 217 | {ERR_REASON(ASN1_R_STRING_TOO_LONG) ,"string too long"}, |
213 | {ASN1_R_TAG_VALUE_TOO_HIGH ,"tag value too high"}, | 218 | {ERR_REASON(ASN1_R_STRING_TOO_SHORT) ,"string too short"}, |
214 | {ASN1_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD,"the asn1 object identifier is not known for this md"}, | 219 | {ERR_REASON(ASN1_R_TAG_VALUE_TOO_HIGH) ,"tag value too high"}, |
215 | {ASN1_R_TOO_LONG ,"too long"}, | 220 | {ERR_REASON(ASN1_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD),"the asn1 object identifier is not known for this md"}, |
216 | {ASN1_R_TYPE_NOT_CONSTRUCTED ,"type not constructed"}, | 221 | {ERR_REASON(ASN1_R_TOO_LONG) ,"too long"}, |
217 | {ASN1_R_UNABLE_TO_DECODE_RSA_KEY ,"unable to decode rsa key"}, | 222 | {ERR_REASON(ASN1_R_TYPE_NOT_CONSTRUCTED) ,"type not constructed"}, |
218 | {ASN1_R_UNABLE_TO_DECODE_RSA_PRIVATE_KEY ,"unable to decode rsa private key"}, | 223 | {ERR_REASON(ASN1_R_UNABLE_TO_DECODE_RSA_KEY),"unable to decode rsa key"}, |
219 | {ASN1_R_UNEXPECTED_EOC ,"unexpected eoc"}, | 224 | {ERR_REASON(ASN1_R_UNABLE_TO_DECODE_RSA_PRIVATE_KEY),"unable to decode rsa private key"}, |
220 | {ASN1_R_UNKNOWN_FORMAT ,"unknown format"}, | 225 | {ERR_REASON(ASN1_R_UNEXPECTED_EOC) ,"unexpected eoc"}, |
221 | {ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM ,"unknown message digest algorithm"}, | 226 | {ERR_REASON(ASN1_R_UNKNOWN_FORMAT) ,"unknown format"}, |
222 | {ASN1_R_UNKNOWN_OBJECT_TYPE ,"unknown object type"}, | 227 | {ERR_REASON(ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM),"unknown message digest algorithm"}, |
223 | {ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE ,"unknown public key type"}, | 228 | {ERR_REASON(ASN1_R_UNKNOWN_OBJECT_TYPE) ,"unknown object type"}, |
224 | {ASN1_R_UNSUPPORTED_ANY_DEFINED_BY_TYPE ,"unsupported any defined by type"}, | 229 | {ERR_REASON(ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE),"unknown public key type"}, |
225 | {ASN1_R_UNSUPPORTED_CIPHER ,"unsupported cipher"}, | 230 | {ERR_REASON(ASN1_R_UNSUPPORTED_ANY_DEFINED_BY_TYPE),"unsupported any defined by type"}, |
226 | {ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM ,"unsupported encryption algorithm"}, | 231 | {ERR_REASON(ASN1_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"}, |
227 | {ASN1_R_UNSUPPORTED_PUBLIC_KEY_TYPE ,"unsupported public key type"}, | 232 | {ERR_REASON(ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM),"unsupported encryption algorithm"}, |
228 | {ASN1_R_WRONG_TAG ,"wrong tag"}, | 233 | {ERR_REASON(ASN1_R_UNSUPPORTED_PUBLIC_KEY_TYPE),"unsupported public key type"}, |
229 | {ASN1_R_WRONG_TYPE ,"wrong type"}, | 234 | {ERR_REASON(ASN1_R_WRONG_TAG) ,"wrong tag"}, |
235 | {ERR_REASON(ASN1_R_WRONG_TYPE) ,"wrong type"}, | ||
230 | {0,NULL} | 236 | {0,NULL} |
231 | }; | 237 | }; |
232 | 238 | ||
@@ -240,8 +246,8 @@ void ERR_load_ASN1_strings(void) | |||
240 | { | 246 | { |
241 | init=0; | 247 | init=0; |
242 | #ifndef OPENSSL_NO_ERR | 248 | #ifndef OPENSSL_NO_ERR |
243 | ERR_load_strings(ERR_LIB_ASN1,ASN1_str_functs); | 249 | ERR_load_strings(0,ASN1_str_functs); |
244 | ERR_load_strings(ERR_LIB_ASN1,ASN1_str_reasons); | 250 | ERR_load_strings(0,ASN1_str_reasons); |
245 | #endif | 251 | #endif |
246 | 252 | ||
247 | } | 253 | } |
diff --git a/src/lib/libcrypto/asn1/tasn_dec.c b/src/lib/libcrypto/asn1/tasn_dec.c index 2426cb6253..c22501fc63 100644 --- a/src/lib/libcrypto/asn1/tasn_dec.c +++ b/src/lib/libcrypto/asn1/tasn_dec.c | |||
@@ -66,6 +66,7 @@ | |||
66 | #include <openssl/err.h> | 66 | #include <openssl/err.h> |
67 | 67 | ||
68 | static int asn1_check_eoc(unsigned char **in, long len); | 68 | static int asn1_check_eoc(unsigned char **in, long len); |
69 | static int asn1_find_end(unsigned char **in, long len, char inf); | ||
69 | static int asn1_collect(BUF_MEM *buf, unsigned char **in, long len, char inf, int tag, int aclass); | 70 | static int asn1_collect(BUF_MEM *buf, unsigned char **in, long len, char inf, int tag, int aclass); |
70 | static int collect_data(BUF_MEM *buf, unsigned char **p, long plen); | 71 | static int collect_data(BUF_MEM *buf, unsigned char **p, long plen); |
71 | static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass, char *inf, char *cst, | 72 | static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass, char *inf, char *cst, |
@@ -644,7 +645,7 @@ static int asn1_d2i_ex_primitive(ASN1_VALUE **pval, unsigned char **in, long inl | |||
644 | cont = *in; | 645 | cont = *in; |
645 | /* If indefinite length constructed find the real end */ | 646 | /* If indefinite length constructed find the real end */ |
646 | if(inf) { | 647 | if(inf) { |
647 | if(!asn1_collect(NULL, &p, plen, inf, -1, -1)) goto err; | 648 | if(!asn1_find_end(&p, plen, inf)) goto err; |
648 | len = p - cont; | 649 | len = p - cont; |
649 | } else { | 650 | } else { |
650 | len = p - cont + plen; | 651 | len = p - cont + plen; |
@@ -807,12 +808,66 @@ int asn1_ex_c2i(ASN1_VALUE **pval, unsigned char *cont, int len, int utype, char | |||
807 | return ret; | 808 | return ret; |
808 | } | 809 | } |
809 | 810 | ||
811 | /* This function finds the end of an ASN1 structure when passed its maximum | ||
812 | * length, whether it is indefinite length and a pointer to the content. | ||
813 | * This is more efficient than calling asn1_collect because it does not | ||
814 | * recurse on each indefinite length header. | ||
815 | */ | ||
816 | |||
817 | static int asn1_find_end(unsigned char **in, long len, char inf) | ||
818 | { | ||
819 | int expected_eoc; | ||
820 | long plen; | ||
821 | unsigned char *p = *in, *q; | ||
822 | /* If not indefinite length constructed just add length */ | ||
823 | if (inf == 0) | ||
824 | { | ||
825 | *in += len; | ||
826 | return 1; | ||
827 | } | ||
828 | expected_eoc = 1; | ||
829 | /* Indefinite length constructed form. Find the end when enough EOCs | ||
830 | * are found. If more indefinite length constructed headers | ||
831 | * are encountered increment the expected eoc count otherwise justi | ||
832 | * skip to the end of the data. | ||
833 | */ | ||
834 | while (len > 0) | ||
835 | { | ||
836 | if(asn1_check_eoc(&p, len)) | ||
837 | { | ||
838 | expected_eoc--; | ||
839 | if (expected_eoc == 0) | ||
840 | break; | ||
841 | len -= 2; | ||
842 | continue; | ||
843 | } | ||
844 | q = p; | ||
845 | /* Just read in a header: only care about the length */ | ||
846 | if(!asn1_check_tlen(&plen, NULL, NULL, &inf, NULL, &p, len, | ||
847 | -1, 0, 0, NULL)) | ||
848 | { | ||
849 | ASN1err(ASN1_F_ASN1_FIND_END, ERR_R_NESTED_ASN1_ERROR); | ||
850 | return 0; | ||
851 | } | ||
852 | if (inf) | ||
853 | expected_eoc++; | ||
854 | else | ||
855 | p += plen; | ||
856 | len -= p - q; | ||
857 | } | ||
858 | if (expected_eoc) | ||
859 | { | ||
860 | ASN1err(ASN1_F_ASN1_FIND_END, ASN1_R_MISSING_EOC); | ||
861 | return 0; | ||
862 | } | ||
863 | *in = p; | ||
864 | return 1; | ||
865 | } | ||
866 | |||
810 | /* This function collects the asn1 data from a constructred string | 867 | /* This function collects the asn1 data from a constructred string |
811 | * type into a buffer. The values of 'in' and 'len' should refer | 868 | * type into a buffer. The values of 'in' and 'len' should refer |
812 | * to the contents of the constructed type and 'inf' should be set | 869 | * to the contents of the constructed type and 'inf' should be set |
813 | * if it is indefinite length. If 'buf' is NULL then we just want | 870 | * if it is indefinite length. |
814 | * to find the end of the current structure: useful for indefinite | ||
815 | * length constructed stuff. | ||
816 | */ | 871 | */ |
817 | 872 | ||
818 | static int asn1_collect(BUF_MEM *buf, unsigned char **in, long len, char inf, int tag, int aclass) | 873 | static int asn1_collect(BUF_MEM *buf, unsigned char **in, long len, char inf, int tag, int aclass) |
@@ -822,11 +877,6 @@ static int asn1_collect(BUF_MEM *buf, unsigned char **in, long len, char inf, in | |||
822 | char cst, ininf; | 877 | char cst, ininf; |
823 | p = *in; | 878 | p = *in; |
824 | inf &= 1; | 879 | inf &= 1; |
825 | /* If no buffer and not indefinite length constructed just pass over the encoded data */ | ||
826 | if(!buf && !inf) { | ||
827 | *in += len; | ||
828 | return 1; | ||
829 | } | ||
830 | while(len > 0) { | 880 | while(len > 0) { |
831 | q = p; | 881 | q = p; |
832 | /* Check for EOC */ | 882 | /* Check for EOC */ |
@@ -845,9 +895,15 @@ static int asn1_collect(BUF_MEM *buf, unsigned char **in, long len, char inf, in | |||
845 | } | 895 | } |
846 | /* If indefinite length constructed update max length */ | 896 | /* If indefinite length constructed update max length */ |
847 | if(cst) { | 897 | if(cst) { |
848 | if(!asn1_collect(buf, &p, plen, ininf, tag, aclass)) return 0; | 898 | #ifdef OPENSSL_ALLOW_NESTED_ASN1_STRINGS |
899 | if (!asn1_collect(buf, &p, plen, ininf, tag, aclass)) | ||
900 | return 0; | ||
901 | #else | ||
902 | ASN1err(ASN1_F_ASN1_COLLECT, ASN1_R_NESTED_ASN1_STRING); | ||
903 | return 0; | ||
904 | #endif | ||
849 | } else { | 905 | } else { |
850 | if(!collect_data(buf, &p, plen)) return 0; | 906 | if(plen && !collect_data(buf, &p, plen)) return 0; |
851 | } | 907 | } |
852 | len -= p - q; | 908 | len -= p - q; |
853 | } | 909 | } |
diff --git a/src/lib/libcrypto/asn1/tasn_enc.c b/src/lib/libcrypto/asn1/tasn_enc.c index f6c8ddef0a..c675c3c832 100644 --- a/src/lib/libcrypto/asn1/tasn_enc.c +++ b/src/lib/libcrypto/asn1/tasn_enc.c | |||
@@ -445,9 +445,12 @@ int asn1_ex_i2c(ASN1_VALUE **pval, unsigned char *cout, int *putype, const ASN1_ | |||
445 | case V_ASN1_BOOLEAN: | 445 | case V_ASN1_BOOLEAN: |
446 | tbool = (ASN1_BOOLEAN *)pval; | 446 | tbool = (ASN1_BOOLEAN *)pval; |
447 | if(*tbool == -1) return -1; | 447 | if(*tbool == -1) return -1; |
448 | /* Default handling if value == size field then omit */ | 448 | if (it->utype != V_ASN1_ANY) |
449 | if(*tbool && (it->size > 0)) return -1; | 449 | { |
450 | if(!*tbool && !it->size) return -1; | 450 | /* Default handling if value == size field then omit */ |
451 | if(*tbool && (it->size > 0)) return -1; | ||
452 | if(!*tbool && !it->size) return -1; | ||
453 | } | ||
451 | c = (unsigned char)*tbool; | 454 | c = (unsigned char)*tbool; |
452 | cont = &c; | 455 | cont = &c; |
453 | len = 1; | 456 | len = 1; |
diff --git a/src/lib/libcrypto/bf/bf_skey.c b/src/lib/libcrypto/bf/bf_skey.c index fc5bebefce..1931aba83f 100644 --- a/src/lib/libcrypto/bf/bf_skey.c +++ b/src/lib/libcrypto/bf/bf_skey.c | |||
@@ -60,6 +60,7 @@ | |||
60 | #include <string.h> | 60 | #include <string.h> |
61 | #include <openssl/crypto.h> | 61 | #include <openssl/crypto.h> |
62 | #include <openssl/blowfish.h> | 62 | #include <openssl/blowfish.h> |
63 | #include <openssl/fips.h> | ||
63 | #include "bf_locl.h" | 64 | #include "bf_locl.h" |
64 | #include "bf_pi.h" | 65 | #include "bf_pi.h" |
65 | 66 | ||
diff --git a/src/lib/libcrypto/bio/b_print.c b/src/lib/libcrypto/bio/b_print.c index c2bb357b4c..165f046295 100644 --- a/src/lib/libcrypto/bio/b_print.c +++ b/src/lib/libcrypto/bio/b_print.c | |||
@@ -576,7 +576,7 @@ abs_val(LDOUBLE value) | |||
576 | } | 576 | } |
577 | 577 | ||
578 | static LDOUBLE | 578 | static LDOUBLE |
579 | pow10(int in_exp) | 579 | pow_10(int in_exp) |
580 | { | 580 | { |
581 | LDOUBLE result = 1; | 581 | LDOUBLE result = 1; |
582 | while (in_exp) { | 582 | while (in_exp) { |
@@ -639,11 +639,11 @@ fmtfp( | |||
639 | 639 | ||
640 | /* we "cheat" by converting the fractional part to integer by | 640 | /* we "cheat" by converting the fractional part to integer by |
641 | multiplying by a factor of 10 */ | 641 | multiplying by a factor of 10 */ |
642 | fracpart = roundv((pow10(max)) * (ufvalue - intpart)); | 642 | fracpart = roundv((pow_10(max)) * (ufvalue - intpart)); |
643 | 643 | ||
644 | if (fracpart >= (long)pow10(max)) { | 644 | if (fracpart >= (long)pow_10(max)) { |
645 | intpart++; | 645 | intpart++; |
646 | fracpart -= (long)pow10(max); | 646 | fracpart -= (long)pow_10(max); |
647 | } | 647 | } |
648 | 648 | ||
649 | /* convert integer part */ | 649 | /* convert integer part */ |
diff --git a/src/lib/libcrypto/bio/bio_err.c b/src/lib/libcrypto/bio/bio_err.c index 68a119d895..8859a58ae4 100644 --- a/src/lib/libcrypto/bio/bio_err.c +++ b/src/lib/libcrypto/bio/bio_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/bio/bio_err.c */ | 1 | /* crypto/bio/bio_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,73 +64,77 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_BIO,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_BIO,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA BIO_str_functs[]= | 71 | static ERR_STRING_DATA BIO_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,BIO_F_ACPT_STATE,0), "ACPT_STATE"}, | 73 | {ERR_FUNC(BIO_F_ACPT_STATE), "ACPT_STATE"}, |
70 | {ERR_PACK(0,BIO_F_BIO_ACCEPT,0), "BIO_accept"}, | 74 | {ERR_FUNC(BIO_F_BIO_ACCEPT), "BIO_accept"}, |
71 | {ERR_PACK(0,BIO_F_BIO_BER_GET_HEADER,0), "BIO_BER_GET_HEADER"}, | 75 | {ERR_FUNC(BIO_F_BIO_BER_GET_HEADER), "BIO_BER_GET_HEADER"}, |
72 | {ERR_PACK(0,BIO_F_BIO_CTRL,0), "BIO_ctrl"}, | 76 | {ERR_FUNC(BIO_F_BIO_CTRL), "BIO_ctrl"}, |
73 | {ERR_PACK(0,BIO_F_BIO_GETHOSTBYNAME,0), "BIO_gethostbyname"}, | 77 | {ERR_FUNC(BIO_F_BIO_GETHOSTBYNAME), "BIO_gethostbyname"}, |
74 | {ERR_PACK(0,BIO_F_BIO_GETS,0), "BIO_gets"}, | 78 | {ERR_FUNC(BIO_F_BIO_GETS), "BIO_gets"}, |
75 | {ERR_PACK(0,BIO_F_BIO_GET_ACCEPT_SOCKET,0), "BIO_get_accept_socket"}, | 79 | {ERR_FUNC(BIO_F_BIO_GET_ACCEPT_SOCKET), "BIO_get_accept_socket"}, |
76 | {ERR_PACK(0,BIO_F_BIO_GET_HOST_IP,0), "BIO_get_host_ip"}, | 80 | {ERR_FUNC(BIO_F_BIO_GET_HOST_IP), "BIO_get_host_ip"}, |
77 | {ERR_PACK(0,BIO_F_BIO_GET_PORT,0), "BIO_get_port"}, | 81 | {ERR_FUNC(BIO_F_BIO_GET_PORT), "BIO_get_port"}, |
78 | {ERR_PACK(0,BIO_F_BIO_MAKE_PAIR,0), "BIO_MAKE_PAIR"}, | 82 | {ERR_FUNC(BIO_F_BIO_MAKE_PAIR), "BIO_MAKE_PAIR"}, |
79 | {ERR_PACK(0,BIO_F_BIO_NEW,0), "BIO_new"}, | 83 | {ERR_FUNC(BIO_F_BIO_NEW), "BIO_new"}, |
80 | {ERR_PACK(0,BIO_F_BIO_NEW_FILE,0), "BIO_new_file"}, | 84 | {ERR_FUNC(BIO_F_BIO_NEW_FILE), "BIO_new_file"}, |
81 | {ERR_PACK(0,BIO_F_BIO_NEW_MEM_BUF,0), "BIO_new_mem_buf"}, | 85 | {ERR_FUNC(BIO_F_BIO_NEW_MEM_BUF), "BIO_new_mem_buf"}, |
82 | {ERR_PACK(0,BIO_F_BIO_NREAD,0), "BIO_nread"}, | 86 | {ERR_FUNC(BIO_F_BIO_NREAD), "BIO_nread"}, |
83 | {ERR_PACK(0,BIO_F_BIO_NREAD0,0), "BIO_nread0"}, | 87 | {ERR_FUNC(BIO_F_BIO_NREAD0), "BIO_nread0"}, |
84 | {ERR_PACK(0,BIO_F_BIO_NWRITE,0), "BIO_nwrite"}, | 88 | {ERR_FUNC(BIO_F_BIO_NWRITE), "BIO_nwrite"}, |
85 | {ERR_PACK(0,BIO_F_BIO_NWRITE0,0), "BIO_nwrite0"}, | 89 | {ERR_FUNC(BIO_F_BIO_NWRITE0), "BIO_nwrite0"}, |
86 | {ERR_PACK(0,BIO_F_BIO_PUTS,0), "BIO_puts"}, | 90 | {ERR_FUNC(BIO_F_BIO_PUTS), "BIO_puts"}, |
87 | {ERR_PACK(0,BIO_F_BIO_READ,0), "BIO_read"}, | 91 | {ERR_FUNC(BIO_F_BIO_READ), "BIO_read"}, |
88 | {ERR_PACK(0,BIO_F_BIO_SOCK_INIT,0), "BIO_sock_init"}, | 92 | {ERR_FUNC(BIO_F_BIO_SOCK_INIT), "BIO_sock_init"}, |
89 | {ERR_PACK(0,BIO_F_BIO_WRITE,0), "BIO_write"}, | 93 | {ERR_FUNC(BIO_F_BIO_WRITE), "BIO_write"}, |
90 | {ERR_PACK(0,BIO_F_BUFFER_CTRL,0), "BUFFER_CTRL"}, | 94 | {ERR_FUNC(BIO_F_BUFFER_CTRL), "BUFFER_CTRL"}, |
91 | {ERR_PACK(0,BIO_F_CONN_CTRL,0), "CONN_CTRL"}, | 95 | {ERR_FUNC(BIO_F_CONN_CTRL), "CONN_CTRL"}, |
92 | {ERR_PACK(0,BIO_F_CONN_STATE,0), "CONN_STATE"}, | 96 | {ERR_FUNC(BIO_F_CONN_STATE), "CONN_STATE"}, |
93 | {ERR_PACK(0,BIO_F_FILE_CTRL,0), "FILE_CTRL"}, | 97 | {ERR_FUNC(BIO_F_FILE_CTRL), "FILE_CTRL"}, |
94 | {ERR_PACK(0,BIO_F_FILE_READ,0), "FILE_READ"}, | 98 | {ERR_FUNC(BIO_F_FILE_READ), "FILE_READ"}, |
95 | {ERR_PACK(0,BIO_F_LINEBUFFER_CTRL,0), "LINEBUFFER_CTRL"}, | 99 | {ERR_FUNC(BIO_F_LINEBUFFER_CTRL), "LINEBUFFER_CTRL"}, |
96 | {ERR_PACK(0,BIO_F_MEM_READ,0), "MEM_READ"}, | 100 | {ERR_FUNC(BIO_F_MEM_READ), "MEM_READ"}, |
97 | {ERR_PACK(0,BIO_F_MEM_WRITE,0), "MEM_WRITE"}, | 101 | {ERR_FUNC(BIO_F_MEM_WRITE), "MEM_WRITE"}, |
98 | {ERR_PACK(0,BIO_F_SSL_NEW,0), "SSL_new"}, | 102 | {ERR_FUNC(BIO_F_SSL_NEW), "SSL_new"}, |
99 | {ERR_PACK(0,BIO_F_WSASTARTUP,0), "WSASTARTUP"}, | 103 | {ERR_FUNC(BIO_F_WSASTARTUP), "WSASTARTUP"}, |
100 | {0,NULL} | 104 | {0,NULL} |
101 | }; | 105 | }; |
102 | 106 | ||
103 | static ERR_STRING_DATA BIO_str_reasons[]= | 107 | static ERR_STRING_DATA BIO_str_reasons[]= |
104 | { | 108 | { |
105 | {BIO_R_ACCEPT_ERROR ,"accept error"}, | 109 | {ERR_REASON(BIO_R_ACCEPT_ERROR) ,"accept error"}, |
106 | {BIO_R_BAD_FOPEN_MODE ,"bad fopen mode"}, | 110 | {ERR_REASON(BIO_R_BAD_FOPEN_MODE) ,"bad fopen mode"}, |
107 | {BIO_R_BAD_HOSTNAME_LOOKUP ,"bad hostname lookup"}, | 111 | {ERR_REASON(BIO_R_BAD_HOSTNAME_LOOKUP) ,"bad hostname lookup"}, |
108 | {BIO_R_BROKEN_PIPE ,"broken pipe"}, | 112 | {ERR_REASON(BIO_R_BROKEN_PIPE) ,"broken pipe"}, |
109 | {BIO_R_CONNECT_ERROR ,"connect error"}, | 113 | {ERR_REASON(BIO_R_CONNECT_ERROR) ,"connect error"}, |
110 | {BIO_R_EOF_ON_MEMORY_BIO ,"EOF on memory BIO"}, | 114 | {ERR_REASON(BIO_R_EOF_ON_MEMORY_BIO) ,"EOF on memory BIO"}, |
111 | {BIO_R_ERROR_SETTING_NBIO ,"error setting nbio"}, | 115 | {ERR_REASON(BIO_R_ERROR_SETTING_NBIO) ,"error setting nbio"}, |
112 | {BIO_R_ERROR_SETTING_NBIO_ON_ACCEPTED_SOCKET,"error setting nbio on accepted socket"}, | 116 | {ERR_REASON(BIO_R_ERROR_SETTING_NBIO_ON_ACCEPTED_SOCKET),"error setting nbio on accepted socket"}, |
113 | {BIO_R_ERROR_SETTING_NBIO_ON_ACCEPT_SOCKET,"error setting nbio on accept socket"}, | 117 | {ERR_REASON(BIO_R_ERROR_SETTING_NBIO_ON_ACCEPT_SOCKET),"error setting nbio on accept socket"}, |
114 | {BIO_R_GETHOSTBYNAME_ADDR_IS_NOT_AF_INET ,"gethostbyname addr is not af inet"}, | 118 | {ERR_REASON(BIO_R_GETHOSTBYNAME_ADDR_IS_NOT_AF_INET),"gethostbyname addr is not af inet"}, |
115 | {BIO_R_INVALID_ARGUMENT ,"invalid argument"}, | 119 | {ERR_REASON(BIO_R_INVALID_ARGUMENT) ,"invalid argument"}, |
116 | {BIO_R_INVALID_IP_ADDRESS ,"invalid ip address"}, | 120 | {ERR_REASON(BIO_R_INVALID_IP_ADDRESS) ,"invalid ip address"}, |
117 | {BIO_R_IN_USE ,"in use"}, | 121 | {ERR_REASON(BIO_R_IN_USE) ,"in use"}, |
118 | {BIO_R_KEEPALIVE ,"keepalive"}, | 122 | {ERR_REASON(BIO_R_KEEPALIVE) ,"keepalive"}, |
119 | {BIO_R_NBIO_CONNECT_ERROR ,"nbio connect error"}, | 123 | {ERR_REASON(BIO_R_NBIO_CONNECT_ERROR) ,"nbio connect error"}, |
120 | {BIO_R_NO_ACCEPT_PORT_SPECIFIED ,"no accept port specified"}, | 124 | {ERR_REASON(BIO_R_NO_ACCEPT_PORT_SPECIFIED),"no accept port specified"}, |
121 | {BIO_R_NO_HOSTNAME_SPECIFIED ,"no hostname specified"}, | 125 | {ERR_REASON(BIO_R_NO_HOSTNAME_SPECIFIED) ,"no hostname specified"}, |
122 | {BIO_R_NO_PORT_DEFINED ,"no port defined"}, | 126 | {ERR_REASON(BIO_R_NO_PORT_DEFINED) ,"no port defined"}, |
123 | {BIO_R_NO_PORT_SPECIFIED ,"no port specified"}, | 127 | {ERR_REASON(BIO_R_NO_PORT_SPECIFIED) ,"no port specified"}, |
124 | {BIO_R_NO_SUCH_FILE ,"no such file"}, | 128 | {ERR_REASON(BIO_R_NO_SUCH_FILE) ,"no such file"}, |
125 | {BIO_R_NULL_PARAMETER ,"null parameter"}, | 129 | {ERR_REASON(BIO_R_NULL_PARAMETER) ,"null parameter"}, |
126 | {BIO_R_TAG_MISMATCH ,"tag mismatch"}, | 130 | {ERR_REASON(BIO_R_TAG_MISMATCH) ,"tag mismatch"}, |
127 | {BIO_R_UNABLE_TO_BIND_SOCKET ,"unable to bind socket"}, | 131 | {ERR_REASON(BIO_R_UNABLE_TO_BIND_SOCKET) ,"unable to bind socket"}, |
128 | {BIO_R_UNABLE_TO_CREATE_SOCKET ,"unable to create socket"}, | 132 | {ERR_REASON(BIO_R_UNABLE_TO_CREATE_SOCKET),"unable to create socket"}, |
129 | {BIO_R_UNABLE_TO_LISTEN_SOCKET ,"unable to listen socket"}, | 133 | {ERR_REASON(BIO_R_UNABLE_TO_LISTEN_SOCKET),"unable to listen socket"}, |
130 | {BIO_R_UNINITIALIZED ,"uninitialized"}, | 134 | {ERR_REASON(BIO_R_UNINITIALIZED) ,"uninitialized"}, |
131 | {BIO_R_UNSUPPORTED_METHOD ,"unsupported method"}, | 135 | {ERR_REASON(BIO_R_UNSUPPORTED_METHOD) ,"unsupported method"}, |
132 | {BIO_R_WRITE_TO_READ_ONLY_BIO ,"write to read only BIO"}, | 136 | {ERR_REASON(BIO_R_WRITE_TO_READ_ONLY_BIO),"write to read only BIO"}, |
133 | {BIO_R_WSASTARTUP ,"WSAStartup"}, | 137 | {ERR_REASON(BIO_R_WSASTARTUP) ,"WSAStartup"}, |
134 | {0,NULL} | 138 | {0,NULL} |
135 | }; | 139 | }; |
136 | 140 | ||
@@ -144,8 +148,8 @@ void ERR_load_BIO_strings(void) | |||
144 | { | 148 | { |
145 | init=0; | 149 | init=0; |
146 | #ifndef OPENSSL_NO_ERR | 150 | #ifndef OPENSSL_NO_ERR |
147 | ERR_load_strings(ERR_LIB_BIO,BIO_str_functs); | 151 | ERR_load_strings(0,BIO_str_functs); |
148 | ERR_load_strings(ERR_LIB_BIO,BIO_str_reasons); | 152 | ERR_load_strings(0,BIO_str_reasons); |
149 | #endif | 153 | #endif |
150 | 154 | ||
151 | } | 155 | } |
diff --git a/src/lib/libcrypto/bio/bss_conn.c b/src/lib/libcrypto/bio/bss_conn.c index f5d0e759e2..216780ed5e 100644 --- a/src/lib/libcrypto/bio/bss_conn.c +++ b/src/lib/libcrypto/bio/bss_conn.c | |||
@@ -469,7 +469,7 @@ static long conn_ctrl(BIO *b, int cmd, long num, void *ptr) | |||
469 | break; | 469 | break; |
470 | case BIO_C_DO_STATE_MACHINE: | 470 | case BIO_C_DO_STATE_MACHINE: |
471 | /* use this one to start the connection */ | 471 | /* use this one to start the connection */ |
472 | if (!data->state != BIO_CONN_S_OK) | 472 | if (data->state != BIO_CONN_S_OK) |
473 | ret=(long)conn_state(b,data); | 473 | ret=(long)conn_state(b,data); |
474 | else | 474 | else |
475 | ret=1; | 475 | ret=1; |
diff --git a/src/lib/libcrypto/bn/asm/ppc.pl b/src/lib/libcrypto/bn/asm/ppc.pl index 307c7ccb35..08e0053473 100644 --- a/src/lib/libcrypto/bn/asm/ppc.pl +++ b/src/lib/libcrypto/bn/asm/ppc.pl | |||
@@ -116,7 +116,7 @@ if ($opf =~ /32\.s/) { | |||
116 | $UDIV= "divwu"; # unsigned divide | 116 | $UDIV= "divwu"; # unsigned divide |
117 | $UCMPI= "cmplwi"; # unsigned compare with immediate | 117 | $UCMPI= "cmplwi"; # unsigned compare with immediate |
118 | $UCMP= "cmplw"; # unsigned compare | 118 | $UCMP= "cmplw"; # unsigned compare |
119 | $COUNTZ="cntlzw"; # count leading zeros | 119 | $CNTLZ= "cntlzw"; # count leading zeros |
120 | $SHL= "slw"; # shift left | 120 | $SHL= "slw"; # shift left |
121 | $SHR= "srw"; # unsigned shift right | 121 | $SHR= "srw"; # unsigned shift right |
122 | $SHRI= "srwi"; # unsigned shift right by immediate | 122 | $SHRI= "srwi"; # unsigned shift right by immediate |
@@ -124,6 +124,7 @@ if ($opf =~ /32\.s/) { | |||
124 | $CLRU= "clrlwi"; # clear upper bits | 124 | $CLRU= "clrlwi"; # clear upper bits |
125 | $INSR= "insrwi"; # insert right | 125 | $INSR= "insrwi"; # insert right |
126 | $ROTL= "rotlwi"; # rotate left by immediate | 126 | $ROTL= "rotlwi"; # rotate left by immediate |
127 | $TR= "tw"; # conditional trap | ||
127 | } elsif ($opf =~ /64\.s/) { | 128 | } elsif ($opf =~ /64\.s/) { |
128 | $BITS= 64; | 129 | $BITS= 64; |
129 | $BNSZ= $BITS/8; | 130 | $BNSZ= $BITS/8; |
@@ -139,7 +140,7 @@ if ($opf =~ /32\.s/) { | |||
139 | $UDIV= "divdu"; # unsigned divide | 140 | $UDIV= "divdu"; # unsigned divide |
140 | $UCMPI= "cmpldi"; # unsigned compare with immediate | 141 | $UCMPI= "cmpldi"; # unsigned compare with immediate |
141 | $UCMP= "cmpld"; # unsigned compare | 142 | $UCMP= "cmpld"; # unsigned compare |
142 | $COUNTZ="cntlzd"; # count leading zeros | 143 | $CNTLZ= "cntlzd"; # count leading zeros |
143 | $SHL= "sld"; # shift left | 144 | $SHL= "sld"; # shift left |
144 | $SHR= "srd"; # unsigned shift right | 145 | $SHR= "srd"; # unsigned shift right |
145 | $SHRI= "srdi"; # unsigned shift right by immediate | 146 | $SHRI= "srdi"; # unsigned shift right by immediate |
@@ -147,6 +148,7 @@ if ($opf =~ /32\.s/) { | |||
147 | $CLRU= "clrldi"; # clear upper bits | 148 | $CLRU= "clrldi"; # clear upper bits |
148 | $INSR= "insrdi"; # insert right | 149 | $INSR= "insrdi"; # insert right |
149 | $ROTL= "rotldi"; # rotate left by immediate | 150 | $ROTL= "rotldi"; # rotate left by immediate |
151 | $TR= "td"; # conditional trap | ||
150 | } else { die "nonsense $opf"; } | 152 | } else { die "nonsense $opf"; } |
151 | 153 | ||
152 | ( defined shift || open STDOUT,">$opf" ) || die "can't open $opf: $!"; | 154 | ( defined shift || open STDOUT,">$opf" ) || die "can't open $opf: $!"; |
@@ -1710,17 +1712,12 @@ Lppcasm_add_adios: | |||
1710 | bclr BO_ALWAYS,CR0_LT | 1712 | bclr BO_ALWAYS,CR0_LT |
1711 | Lppcasm_div1: | 1713 | Lppcasm_div1: |
1712 | xor r0,r0,r0 #r0=0 | 1714 | xor r0,r0,r0 #r0=0 |
1713 | $COUNTZ r7,r5 #r7 = num leading 0s in d. | 1715 | li r8,$BITS |
1714 | subfic r8,r7,$BITS #r8 = BN_num_bits_word(d) | 1716 | $CNTLZ. r7,r5 #r7 = num leading 0s in d. |
1715 | cmpi 0,0,r8,$BITS # | 1717 | bc BO_IF,CR0_EQ,Lppcasm_div2 #proceed if no leading zeros |
1716 | bc BO_IF,CR0_EQ,Lppcasm_div2 #proceed if (r8==$BITS) | 1718 | subf r8,r7,r8 #r8 = BN_num_bits_word(d) |
1717 | li r9,1 # r9=1 | 1719 | $SHR. r9,r3,r8 #are there any bits above r8'th? |
1718 | $SHL r10,r9,r8 # r9<<=r8 | 1720 | $TR 16,r9,r0 #if there're, signal to dump core... |
1719 | $UCMP 0,r3,r10 # | ||
1720 | bc BO_IF,CR0_GT,Lppcasm_div2 #or if (h > (1<<r8)) | ||
1721 | $UDIV r3,r3,r0 #if not assert(0) divide by 0! | ||
1722 | #that's how we signal overflow | ||
1723 | bclr BO_ALWAYS,CR0_LT #return. NEVER REACHED. | ||
1724 | Lppcasm_div2: | 1721 | Lppcasm_div2: |
1725 | $UCMP 0,r3,r5 #h>=d? | 1722 | $UCMP 0,r3,r5 #h>=d? |
1726 | bc BO_IF,CR0_LT,Lppcasm_div3 #goto Lppcasm_div3 if not | 1723 | bc BO_IF,CR0_LT,Lppcasm_div3 #goto Lppcasm_div3 if not |
diff --git a/src/lib/libcrypto/bn/asm/sparcv8plus.S b/src/lib/libcrypto/bn/asm/sparcv8plus.S index 0074dfdb75..8c56e2e7e7 100644 --- a/src/lib/libcrypto/bn/asm/sparcv8plus.S +++ b/src/lib/libcrypto/bn/asm/sparcv8plus.S | |||
@@ -162,10 +162,14 @@ | |||
162 | * BN_ULONG w; | 162 | * BN_ULONG w; |
163 | */ | 163 | */ |
164 | bn_mul_add_words: | 164 | bn_mul_add_words: |
165 | sra %o2,%g0,%o2 ! signx %o2 | ||
165 | brgz,a %o2,.L_bn_mul_add_words_proceed | 166 | brgz,a %o2,.L_bn_mul_add_words_proceed |
166 | lduw [%o1],%g2 | 167 | lduw [%o1],%g2 |
167 | retl | 168 | retl |
168 | clr %o0 | 169 | clr %o0 |
170 | nop | ||
171 | nop | ||
172 | nop | ||
169 | 173 | ||
170 | .L_bn_mul_add_words_proceed: | 174 | .L_bn_mul_add_words_proceed: |
171 | srl %o3,%g0,%o3 ! clruw %o3 | 175 | srl %o3,%g0,%o3 ! clruw %o3 |
@@ -260,10 +264,14 @@ bn_mul_add_words: | |||
260 | * BN_ULONG w; | 264 | * BN_ULONG w; |
261 | */ | 265 | */ |
262 | bn_mul_words: | 266 | bn_mul_words: |
267 | sra %o2,%g0,%o2 ! signx %o2 | ||
263 | brgz,a %o2,.L_bn_mul_words_proceeed | 268 | brgz,a %o2,.L_bn_mul_words_proceeed |
264 | lduw [%o1],%g2 | 269 | lduw [%o1],%g2 |
265 | retl | 270 | retl |
266 | clr %o0 | 271 | clr %o0 |
272 | nop | ||
273 | nop | ||
274 | nop | ||
267 | 275 | ||
268 | .L_bn_mul_words_proceeed: | 276 | .L_bn_mul_words_proceeed: |
269 | srl %o3,%g0,%o3 ! clruw %o3 | 277 | srl %o3,%g0,%o3 ! clruw %o3 |
@@ -344,10 +352,14 @@ bn_mul_words: | |||
344 | * int n; | 352 | * int n; |
345 | */ | 353 | */ |
346 | bn_sqr_words: | 354 | bn_sqr_words: |
355 | sra %o2,%g0,%o2 ! signx %o2 | ||
347 | brgz,a %o2,.L_bn_sqr_words_proceeed | 356 | brgz,a %o2,.L_bn_sqr_words_proceeed |
348 | lduw [%o1],%g2 | 357 | lduw [%o1],%g2 |
349 | retl | 358 | retl |
350 | clr %o0 | 359 | clr %o0 |
360 | nop | ||
361 | nop | ||
362 | nop | ||
351 | 363 | ||
352 | .L_bn_sqr_words_proceeed: | 364 | .L_bn_sqr_words_proceeed: |
353 | andcc %o2,-4,%g0 | 365 | andcc %o2,-4,%g0 |
@@ -445,6 +457,7 @@ bn_div_words: | |||
445 | * int n; | 457 | * int n; |
446 | */ | 458 | */ |
447 | bn_add_words: | 459 | bn_add_words: |
460 | sra %o3,%g0,%o3 ! signx %o3 | ||
448 | brgz,a %o3,.L_bn_add_words_proceed | 461 | brgz,a %o3,.L_bn_add_words_proceed |
449 | lduw [%o1],%o4 | 462 | lduw [%o1],%o4 |
450 | retl | 463 | retl |
@@ -454,7 +467,6 @@ bn_add_words: | |||
454 | andcc %o3,-4,%g0 | 467 | andcc %o3,-4,%g0 |
455 | bz,pn %icc,.L_bn_add_words_tail | 468 | bz,pn %icc,.L_bn_add_words_tail |
456 | addcc %g0,0,%g0 ! clear carry flag | 469 | addcc %g0,0,%g0 ! clear carry flag |
457 | nop | ||
458 | 470 | ||
459 | .L_bn_add_words_loop: ! wow! 32 aligned! | 471 | .L_bn_add_words_loop: ! wow! 32 aligned! |
460 | dec 4,%o3 | 472 | dec 4,%o3 |
@@ -523,6 +535,7 @@ bn_add_words: | |||
523 | * int n; | 535 | * int n; |
524 | */ | 536 | */ |
525 | bn_sub_words: | 537 | bn_sub_words: |
538 | sra %o3,%g0,%o3 ! signx %o3 | ||
526 | brgz,a %o3,.L_bn_sub_words_proceed | 539 | brgz,a %o3,.L_bn_sub_words_proceed |
527 | lduw [%o1],%o4 | 540 | lduw [%o1],%o4 |
528 | retl | 541 | retl |
@@ -532,7 +545,6 @@ bn_sub_words: | |||
532 | andcc %o3,-4,%g0 | 545 | andcc %o3,-4,%g0 |
533 | bz,pn %icc,.L_bn_sub_words_tail | 546 | bz,pn %icc,.L_bn_sub_words_tail |
534 | addcc %g0,0,%g0 ! clear carry flag | 547 | addcc %g0,0,%g0 ! clear carry flag |
535 | nop | ||
536 | 548 | ||
537 | .L_bn_sub_words_loop: ! wow! 32 aligned! | 549 | .L_bn_sub_words_loop: ! wow! 32 aligned! |
538 | dec 4,%o3 | 550 | dec 4,%o3 |
diff --git a/src/lib/libcrypto/bn/bn.h b/src/lib/libcrypto/bn/bn.h index 3da6d8ced9..1251521c54 100644 --- a/src/lib/libcrypto/bn/bn.h +++ b/src/lib/libcrypto/bn/bn.h | |||
@@ -225,10 +225,23 @@ extern "C" { | |||
225 | 225 | ||
226 | #define BN_FLG_MALLOCED 0x01 | 226 | #define BN_FLG_MALLOCED 0x01 |
227 | #define BN_FLG_STATIC_DATA 0x02 | 227 | #define BN_FLG_STATIC_DATA 0x02 |
228 | #define BN_FLG_EXP_CONSTTIME 0x04 /* avoid leaking exponent information through timings | ||
229 | * (BN_mod_exp_mont() will call BN_mod_exp_mont_consttime) */ | ||
228 | #define BN_FLG_FREE 0x8000 /* used for debuging */ | 230 | #define BN_FLG_FREE 0x8000 /* used for debuging */ |
229 | #define BN_set_flags(b,n) ((b)->flags|=(n)) | 231 | #define BN_set_flags(b,n) ((b)->flags|=(n)) |
230 | #define BN_get_flags(b,n) ((b)->flags&(n)) | 232 | #define BN_get_flags(b,n) ((b)->flags&(n)) |
231 | 233 | ||
234 | /* get a clone of a BIGNUM with changed flags, for *temporary* use only | ||
235 | * (the two BIGNUMs cannot not be used in parallel!) */ | ||
236 | #define BN_with_flags(dest,b,n) ((dest)->d=(b)->d, \ | ||
237 | (dest)->top=(b)->top, \ | ||
238 | (dest)->dmax=(b)->dmax, \ | ||
239 | (dest)->neg=(b)->neg, \ | ||
240 | (dest)->flags=(((dest)->flags & BN_FLG_MALLOCED) \ | ||
241 | | ((b)->flags & ~BN_FLG_MALLOCED) \ | ||
242 | | BN_FLG_STATIC_DATA \ | ||
243 | | (n))) | ||
244 | |||
232 | typedef struct bignum_st | 245 | typedef struct bignum_st |
233 | { | 246 | { |
234 | BN_ULONG *d; /* Pointer to an array of 'BN_BITS2' bit chunks. */ | 247 | BN_ULONG *d; /* Pointer to an array of 'BN_BITS2' bit chunks. */ |
@@ -378,6 +391,8 @@ int BN_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | |||
378 | const BIGNUM *m,BN_CTX *ctx); | 391 | const BIGNUM *m,BN_CTX *ctx); |
379 | int BN_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | 392 | int BN_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
380 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); | 393 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); |
394 | int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, | ||
395 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont); | ||
381 | int BN_mod_exp_mont_word(BIGNUM *r, BN_ULONG a, const BIGNUM *p, | 396 | int BN_mod_exp_mont_word(BIGNUM *r, BN_ULONG a, const BIGNUM *p, |
382 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); | 397 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); |
383 | int BN_mod_exp2_mont(BIGNUM *r, const BIGNUM *a1, const BIGNUM *p1, | 398 | int BN_mod_exp2_mont(BIGNUM *r, const BIGNUM *a1, const BIGNUM *p1, |
@@ -423,6 +438,19 @@ int BN_is_prime_fasttest(const BIGNUM *p,int nchecks, | |||
423 | void (*callback)(int,int,void *),BN_CTX *ctx,void *cb_arg, | 438 | void (*callback)(int,int,void *),BN_CTX *ctx,void *cb_arg, |
424 | int do_trial_division); | 439 | int do_trial_division); |
425 | 440 | ||
441 | #ifdef OPENSSL_FIPS | ||
442 | int BN_X931_derive_prime(BIGNUM *p, BIGNUM *p1, BIGNUM *p2, | ||
443 | void (*cb)(int, int, void *), void *cb_arg, | ||
444 | const BIGNUM *Xp, const BIGNUM *Xp1, const BIGNUM *Xp2, | ||
445 | const BIGNUM *e, BN_CTX *ctx); | ||
446 | int BN_X931_generate_Xpq(BIGNUM *Xp, BIGNUM *Xq, int nbits, BN_CTX *ctx); | ||
447 | int BN_X931_generate_prime(BIGNUM *p, BIGNUM *p1, BIGNUM *p2, | ||
448 | BIGNUM *Xp1, BIGNUM *Xp2, | ||
449 | const BIGNUM *Xp, | ||
450 | const BIGNUM *e, BN_CTX *ctx, | ||
451 | void (*cb)(int, int, void *), void *cb_arg); | ||
452 | #endif | ||
453 | |||
426 | BN_MONT_CTX *BN_MONT_CTX_new(void ); | 454 | BN_MONT_CTX *BN_MONT_CTX_new(void ); |
427 | void BN_MONT_CTX_init(BN_MONT_CTX *ctx); | 455 | void BN_MONT_CTX_init(BN_MONT_CTX *ctx); |
428 | int BN_mod_mul_montgomery(BIGNUM *r,const BIGNUM *a,const BIGNUM *b, | 456 | int BN_mod_mul_montgomery(BIGNUM *r,const BIGNUM *a,const BIGNUM *b, |
@@ -434,6 +462,8 @@ int BN_from_montgomery(BIGNUM *r,const BIGNUM *a, | |||
434 | void BN_MONT_CTX_free(BN_MONT_CTX *mont); | 462 | void BN_MONT_CTX_free(BN_MONT_CTX *mont); |
435 | int BN_MONT_CTX_set(BN_MONT_CTX *mont,const BIGNUM *mod,BN_CTX *ctx); | 463 | int BN_MONT_CTX_set(BN_MONT_CTX *mont,const BIGNUM *mod,BN_CTX *ctx); |
436 | BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to,BN_MONT_CTX *from); | 464 | BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to,BN_MONT_CTX *from); |
465 | BN_MONT_CTX *BN_MONT_CTX_set_locked(BN_MONT_CTX **pmont, int lock, | ||
466 | const BIGNUM *mod, BN_CTX *ctx); | ||
437 | 467 | ||
438 | BN_BLINDING *BN_BLINDING_new(BIGNUM *A,BIGNUM *Ai,BIGNUM *mod); | 468 | BN_BLINDING *BN_BLINDING_new(BIGNUM *A,BIGNUM *Ai,BIGNUM *mod); |
439 | void BN_BLINDING_free(BN_BLINDING *b); | 469 | void BN_BLINDING_free(BN_BLINDING *b); |
@@ -510,11 +540,15 @@ void ERR_load_BN_strings(void); | |||
510 | #define BN_F_BN_CTX_GET 116 | 540 | #define BN_F_BN_CTX_GET 116 |
511 | #define BN_F_BN_CTX_NEW 106 | 541 | #define BN_F_BN_CTX_NEW 106 |
512 | #define BN_F_BN_DIV 107 | 542 | #define BN_F_BN_DIV 107 |
543 | #define BN_F_BN_EXP 123 | ||
513 | #define BN_F_BN_EXPAND2 108 | 544 | #define BN_F_BN_EXPAND2 108 |
514 | #define BN_F_BN_EXPAND_INTERNAL 120 | 545 | #define BN_F_BN_EXPAND_INTERNAL 120 |
515 | #define BN_F_BN_MOD_EXP2_MONT 118 | 546 | #define BN_F_BN_MOD_EXP2_MONT 118 |
516 | #define BN_F_BN_MOD_EXP_MONT 109 | 547 | #define BN_F_BN_MOD_EXP_MONT 109 |
548 | #define BN_F_BN_MOD_EXP_MONT_CONSTTIME 124 | ||
517 | #define BN_F_BN_MOD_EXP_MONT_WORD 117 | 549 | #define BN_F_BN_MOD_EXP_MONT_WORD 117 |
550 | #define BN_F_BN_MOD_EXP_RECP 125 | ||
551 | #define BN_F_BN_MOD_EXP_SIMPLE 126 | ||
518 | #define BN_F_BN_MOD_INVERSE 110 | 552 | #define BN_F_BN_MOD_INVERSE 110 |
519 | #define BN_F_BN_MOD_LSHIFT_QUICK 119 | 553 | #define BN_F_BN_MOD_LSHIFT_QUICK 119 |
520 | #define BN_F_BN_MOD_MUL_RECIPROCAL 111 | 554 | #define BN_F_BN_MOD_MUL_RECIPROCAL 111 |
diff --git a/src/lib/libcrypto/bn/bn_asm.c b/src/lib/libcrypto/bn/bn_asm.c index be8aa3ffc5..19978085b2 100644 --- a/src/lib/libcrypto/bn/bn_asm.c +++ b/src/lib/libcrypto/bn/bn_asm.c | |||
@@ -237,7 +237,7 @@ BN_ULONG bn_div_words(BN_ULONG h, BN_ULONG l, BN_ULONG d) | |||
237 | if (d == 0) return(BN_MASK2); | 237 | if (d == 0) return(BN_MASK2); |
238 | 238 | ||
239 | i=BN_num_bits_word(d); | 239 | i=BN_num_bits_word(d); |
240 | assert((i == BN_BITS2) || (h > (BN_ULONG)1<<i)); | 240 | assert((i == BN_BITS2) || (h <= (BN_ULONG)1<<i)); |
241 | 241 | ||
242 | i=BN_BITS2-i; | 242 | i=BN_BITS2-i; |
243 | if (h >= d) h-=d; | 243 | if (h >= d) h-=d; |
diff --git a/src/lib/libcrypto/bn/bn_err.c b/src/lib/libcrypto/bn/bn_err.c index fb84ee96d8..5dfac00c88 100644 --- a/src/lib/libcrypto/bn/bn_err.c +++ b/src/lib/libcrypto/bn/bn_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/bn/bn_err.c */ | 1 | /* crypto/bn/bn_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,52 +64,60 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_BN,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_BN,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA BN_str_functs[]= | 71 | static ERR_STRING_DATA BN_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,BN_F_BN_BLINDING_CONVERT,0), "BN_BLINDING_convert"}, | 73 | {ERR_FUNC(BN_F_BN_BLINDING_CONVERT), "BN_BLINDING_convert"}, |
70 | {ERR_PACK(0,BN_F_BN_BLINDING_INVERT,0), "BN_BLINDING_invert"}, | 74 | {ERR_FUNC(BN_F_BN_BLINDING_INVERT), "BN_BLINDING_invert"}, |
71 | {ERR_PACK(0,BN_F_BN_BLINDING_NEW,0), "BN_BLINDING_new"}, | 75 | {ERR_FUNC(BN_F_BN_BLINDING_NEW), "BN_BLINDING_new"}, |
72 | {ERR_PACK(0,BN_F_BN_BLINDING_UPDATE,0), "BN_BLINDING_update"}, | 76 | {ERR_FUNC(BN_F_BN_BLINDING_UPDATE), "BN_BLINDING_update"}, |
73 | {ERR_PACK(0,BN_F_BN_BN2DEC,0), "BN_bn2dec"}, | 77 | {ERR_FUNC(BN_F_BN_BN2DEC), "BN_bn2dec"}, |
74 | {ERR_PACK(0,BN_F_BN_BN2HEX,0), "BN_bn2hex"}, | 78 | {ERR_FUNC(BN_F_BN_BN2HEX), "BN_bn2hex"}, |
75 | {ERR_PACK(0,BN_F_BN_CTX_GET,0), "BN_CTX_get"}, | 79 | {ERR_FUNC(BN_F_BN_CTX_GET), "BN_CTX_get"}, |
76 | {ERR_PACK(0,BN_F_BN_CTX_NEW,0), "BN_CTX_new"}, | 80 | {ERR_FUNC(BN_F_BN_CTX_NEW), "BN_CTX_new"}, |
77 | {ERR_PACK(0,BN_F_BN_DIV,0), "BN_div"}, | 81 | {ERR_FUNC(BN_F_BN_DIV), "BN_div"}, |
78 | {ERR_PACK(0,BN_F_BN_EXPAND2,0), "bn_expand2"}, | 82 | {ERR_FUNC(BN_F_BN_EXP), "BN_exp"}, |
79 | {ERR_PACK(0,BN_F_BN_EXPAND_INTERNAL,0), "BN_EXPAND_INTERNAL"}, | 83 | {ERR_FUNC(BN_F_BN_EXPAND2), "bn_expand2"}, |
80 | {ERR_PACK(0,BN_F_BN_MOD_EXP2_MONT,0), "BN_mod_exp2_mont"}, | 84 | {ERR_FUNC(BN_F_BN_EXPAND_INTERNAL), "BN_EXPAND_INTERNAL"}, |
81 | {ERR_PACK(0,BN_F_BN_MOD_EXP_MONT,0), "BN_mod_exp_mont"}, | 85 | {ERR_FUNC(BN_F_BN_MOD_EXP2_MONT), "BN_mod_exp2_mont"}, |
82 | {ERR_PACK(0,BN_F_BN_MOD_EXP_MONT_WORD,0), "BN_mod_exp_mont_word"}, | 86 | {ERR_FUNC(BN_F_BN_MOD_EXP_MONT), "BN_mod_exp_mont"}, |
83 | {ERR_PACK(0,BN_F_BN_MOD_INVERSE,0), "BN_mod_inverse"}, | 87 | {ERR_FUNC(BN_F_BN_MOD_EXP_MONT_CONSTTIME), "BN_mod_exp_mont_consttime"}, |
84 | {ERR_PACK(0,BN_F_BN_MOD_LSHIFT_QUICK,0), "BN_mod_lshift_quick"}, | 88 | {ERR_FUNC(BN_F_BN_MOD_EXP_MONT_WORD), "BN_mod_exp_mont_word"}, |
85 | {ERR_PACK(0,BN_F_BN_MOD_MUL_RECIPROCAL,0), "BN_mod_mul_reciprocal"}, | 89 | {ERR_FUNC(BN_F_BN_MOD_EXP_RECP), "BN_mod_exp_recp"}, |
86 | {ERR_PACK(0,BN_F_BN_MOD_SQRT,0), "BN_mod_sqrt"}, | 90 | {ERR_FUNC(BN_F_BN_MOD_EXP_SIMPLE), "BN_mod_exp_simple"}, |
87 | {ERR_PACK(0,BN_F_BN_MPI2BN,0), "BN_mpi2bn"}, | 91 | {ERR_FUNC(BN_F_BN_MOD_INVERSE), "BN_mod_inverse"}, |
88 | {ERR_PACK(0,BN_F_BN_NEW,0), "BN_new"}, | 92 | {ERR_FUNC(BN_F_BN_MOD_LSHIFT_QUICK), "BN_mod_lshift_quick"}, |
89 | {ERR_PACK(0,BN_F_BN_RAND,0), "BN_rand"}, | 93 | {ERR_FUNC(BN_F_BN_MOD_MUL_RECIPROCAL), "BN_mod_mul_reciprocal"}, |
90 | {ERR_PACK(0,BN_F_BN_RAND_RANGE,0), "BN_rand_range"}, | 94 | {ERR_FUNC(BN_F_BN_MOD_SQRT), "BN_mod_sqrt"}, |
91 | {ERR_PACK(0,BN_F_BN_USUB,0), "BN_usub"}, | 95 | {ERR_FUNC(BN_F_BN_MPI2BN), "BN_mpi2bn"}, |
96 | {ERR_FUNC(BN_F_BN_NEW), "BN_new"}, | ||
97 | {ERR_FUNC(BN_F_BN_RAND), "BN_rand"}, | ||
98 | {ERR_FUNC(BN_F_BN_RAND_RANGE), "BN_rand_range"}, | ||
99 | {ERR_FUNC(BN_F_BN_USUB), "BN_usub"}, | ||
92 | {0,NULL} | 100 | {0,NULL} |
93 | }; | 101 | }; |
94 | 102 | ||
95 | static ERR_STRING_DATA BN_str_reasons[]= | 103 | static ERR_STRING_DATA BN_str_reasons[]= |
96 | { | 104 | { |
97 | {BN_R_ARG2_LT_ARG3 ,"arg2 lt arg3"}, | 105 | {ERR_REASON(BN_R_ARG2_LT_ARG3) ,"arg2 lt arg3"}, |
98 | {BN_R_BAD_RECIPROCAL ,"bad reciprocal"}, | 106 | {ERR_REASON(BN_R_BAD_RECIPROCAL) ,"bad reciprocal"}, |
99 | {BN_R_BIGNUM_TOO_LONG ,"bignum too long"}, | 107 | {ERR_REASON(BN_R_BIGNUM_TOO_LONG) ,"bignum too long"}, |
100 | {BN_R_CALLED_WITH_EVEN_MODULUS ,"called with even modulus"}, | 108 | {ERR_REASON(BN_R_CALLED_WITH_EVEN_MODULUS),"called with even modulus"}, |
101 | {BN_R_DIV_BY_ZERO ,"div by zero"}, | 109 | {ERR_REASON(BN_R_DIV_BY_ZERO) ,"div by zero"}, |
102 | {BN_R_ENCODING_ERROR ,"encoding error"}, | 110 | {ERR_REASON(BN_R_ENCODING_ERROR) ,"encoding error"}, |
103 | {BN_R_EXPAND_ON_STATIC_BIGNUM_DATA ,"expand on static bignum data"}, | 111 | {ERR_REASON(BN_R_EXPAND_ON_STATIC_BIGNUM_DATA),"expand on static bignum data"}, |
104 | {BN_R_INPUT_NOT_REDUCED ,"input not reduced"}, | 112 | {ERR_REASON(BN_R_INPUT_NOT_REDUCED) ,"input not reduced"}, |
105 | {BN_R_INVALID_LENGTH ,"invalid length"}, | 113 | {ERR_REASON(BN_R_INVALID_LENGTH) ,"invalid length"}, |
106 | {BN_R_INVALID_RANGE ,"invalid range"}, | 114 | {ERR_REASON(BN_R_INVALID_RANGE) ,"invalid range"}, |
107 | {BN_R_NOT_A_SQUARE ,"not a square"}, | 115 | {ERR_REASON(BN_R_NOT_A_SQUARE) ,"not a square"}, |
108 | {BN_R_NOT_INITIALIZED ,"not initialized"}, | 116 | {ERR_REASON(BN_R_NOT_INITIALIZED) ,"not initialized"}, |
109 | {BN_R_NO_INVERSE ,"no inverse"}, | 117 | {ERR_REASON(BN_R_NO_INVERSE) ,"no inverse"}, |
110 | {BN_R_P_IS_NOT_PRIME ,"p is not prime"}, | 118 | {ERR_REASON(BN_R_P_IS_NOT_PRIME) ,"p is not prime"}, |
111 | {BN_R_TOO_MANY_ITERATIONS ,"too many iterations"}, | 119 | {ERR_REASON(BN_R_TOO_MANY_ITERATIONS) ,"too many iterations"}, |
112 | {BN_R_TOO_MANY_TEMPORARY_VARIABLES ,"too many temporary variables"}, | 120 | {ERR_REASON(BN_R_TOO_MANY_TEMPORARY_VARIABLES),"too many temporary variables"}, |
113 | {0,NULL} | 121 | {0,NULL} |
114 | }; | 122 | }; |
115 | 123 | ||
@@ -123,8 +131,8 @@ void ERR_load_BN_strings(void) | |||
123 | { | 131 | { |
124 | init=0; | 132 | init=0; |
125 | #ifndef OPENSSL_NO_ERR | 133 | #ifndef OPENSSL_NO_ERR |
126 | ERR_load_strings(ERR_LIB_BN,BN_str_functs); | 134 | ERR_load_strings(0,BN_str_functs); |
127 | ERR_load_strings(ERR_LIB_BN,BN_str_reasons); | 135 | ERR_load_strings(0,BN_str_reasons); |
128 | #endif | 136 | #endif |
129 | 137 | ||
130 | } | 138 | } |
diff --git a/src/lib/libcrypto/bn/bn_exp.c b/src/lib/libcrypto/bn/bn_exp.c index afdfd580fb..9e1e88abe8 100644 --- a/src/lib/libcrypto/bn/bn_exp.c +++ b/src/lib/libcrypto/bn/bn_exp.c | |||
@@ -56,7 +56,7 @@ | |||
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | /* ==================================================================== | 58 | /* ==================================================================== |
59 | * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. | 59 | * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. |
60 | * | 60 | * |
61 | * Redistribution and use in source and binary forms, with or without | 61 | * Redistribution and use in source and binary forms, with or without |
62 | * modification, are permitted provided that the following conditions | 62 | * modification, are permitted provided that the following conditions |
@@ -113,6 +113,7 @@ | |||
113 | #include "cryptlib.h" | 113 | #include "cryptlib.h" |
114 | #include "bn_lcl.h" | 114 | #include "bn_lcl.h" |
115 | 115 | ||
116 | /* maximum precomputation table size for *variable* sliding windows */ | ||
116 | #define TABLE_SIZE 32 | 117 | #define TABLE_SIZE 32 |
117 | 118 | ||
118 | /* this one works - simple but works */ | 119 | /* this one works - simple but works */ |
@@ -121,6 +122,13 @@ int BN_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) | |||
121 | int i,bits,ret=0; | 122 | int i,bits,ret=0; |
122 | BIGNUM *v,*rr; | 123 | BIGNUM *v,*rr; |
123 | 124 | ||
125 | if (BN_get_flags(p, BN_FLG_EXP_CONSTTIME) != 0) | ||
126 | { | ||
127 | /* BN_FLG_EXP_CONSTTIME only supported by BN_mod_exp_mont() */ | ||
128 | BNerr(BN_F_BN_EXP,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
129 | return -1; | ||
130 | } | ||
131 | |||
124 | BN_CTX_start(ctx); | 132 | BN_CTX_start(ctx); |
125 | if ((r == a) || (r == p)) | 133 | if ((r == a) || (r == p)) |
126 | rr = BN_CTX_get(ctx); | 134 | rr = BN_CTX_get(ctx); |
@@ -204,7 +212,7 @@ int BN_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, | |||
204 | if (BN_is_odd(m)) | 212 | if (BN_is_odd(m)) |
205 | { | 213 | { |
206 | # ifdef MONT_EXP_WORD | 214 | # ifdef MONT_EXP_WORD |
207 | if (a->top == 1 && !a->neg) | 215 | if (a->top == 1 && !a->neg && (BN_get_flags(p, BN_FLG_EXP_CONSTTIME) == 0)) |
208 | { | 216 | { |
209 | BN_ULONG A = a->d[0]; | 217 | BN_ULONG A = a->d[0]; |
210 | ret=BN_mod_exp_mont_word(r,A,p,m,ctx,NULL); | 218 | ret=BN_mod_exp_mont_word(r,A,p,m,ctx,NULL); |
@@ -234,6 +242,13 @@ int BN_mod_exp_recp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | |||
234 | BIGNUM val[TABLE_SIZE]; | 242 | BIGNUM val[TABLE_SIZE]; |
235 | BN_RECP_CTX recp; | 243 | BN_RECP_CTX recp; |
236 | 244 | ||
245 | if (BN_get_flags(p, BN_FLG_EXP_CONSTTIME) != 0) | ||
246 | { | ||
247 | /* BN_FLG_EXP_CONSTTIME only supported by BN_mod_exp_mont() */ | ||
248 | BNerr(BN_F_BN_MOD_EXP_RECP,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
249 | return -1; | ||
250 | } | ||
251 | |||
237 | bits=BN_num_bits(p); | 252 | bits=BN_num_bits(p); |
238 | 253 | ||
239 | if (bits == 0) | 254 | if (bits == 0) |
@@ -361,6 +376,11 @@ int BN_mod_exp_mont(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, | |||
361 | BIGNUM val[TABLE_SIZE]; | 376 | BIGNUM val[TABLE_SIZE]; |
362 | BN_MONT_CTX *mont=NULL; | 377 | BN_MONT_CTX *mont=NULL; |
363 | 378 | ||
379 | if (BN_get_flags(p, BN_FLG_EXP_CONSTTIME) != 0) | ||
380 | { | ||
381 | return BN_mod_exp_mont_consttime(rr, a, p, m, ctx, in_mont); | ||
382 | } | ||
383 | |||
364 | bn_check_top(a); | 384 | bn_check_top(a); |
365 | bn_check_top(p); | 385 | bn_check_top(p); |
366 | bn_check_top(m); | 386 | bn_check_top(m); |
@@ -493,6 +513,212 @@ err: | |||
493 | return(ret); | 513 | return(ret); |
494 | } | 514 | } |
495 | 515 | ||
516 | |||
517 | /* BN_mod_exp_mont_consttime() stores the precomputed powers in a specific layout | ||
518 | * so that accessing any of these table values shows the same access pattern as far | ||
519 | * as cache lines are concerned. The following functions are used to transfer a BIGNUM | ||
520 | * from/to that table. */ | ||
521 | |||
522 | static int MOD_EXP_CTIME_COPY_TO_PREBUF(BIGNUM *b, int top, unsigned char *buf, int idx, int width) | ||
523 | { | ||
524 | size_t i, j; | ||
525 | |||
526 | if (bn_wexpand(b, top) == NULL) | ||
527 | return 0; | ||
528 | while (b->top < top) | ||
529 | { | ||
530 | b->d[b->top++] = 0; | ||
531 | } | ||
532 | |||
533 | for (i = 0, j=idx; i < top * sizeof b->d[0]; i++, j+=width) | ||
534 | { | ||
535 | buf[j] = ((unsigned char*)b->d)[i]; | ||
536 | } | ||
537 | |||
538 | bn_fix_top(b); | ||
539 | return 1; | ||
540 | } | ||
541 | |||
542 | static int MOD_EXP_CTIME_COPY_FROM_PREBUF(BIGNUM *b, int top, unsigned char *buf, int idx, int width) | ||
543 | { | ||
544 | size_t i, j; | ||
545 | |||
546 | if (bn_wexpand(b, top) == NULL) | ||
547 | return 0; | ||
548 | |||
549 | for (i=0, j=idx; i < top * sizeof b->d[0]; i++, j+=width) | ||
550 | { | ||
551 | ((unsigned char*)b->d)[i] = buf[j]; | ||
552 | } | ||
553 | |||
554 | b->top = top; | ||
555 | bn_fix_top(b); | ||
556 | return 1; | ||
557 | } | ||
558 | |||
559 | /* Given a pointer value, compute the next address that is a cache line multiple. */ | ||
560 | #define MOD_EXP_CTIME_ALIGN(x_) \ | ||
561 | ((unsigned char*)(x_) + (MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH - (((BN_ULONG)(x_)) & (MOD_EXP_CTIME_MIN_CACHE_LINE_MASK)))) | ||
562 | |||
563 | /* This variant of BN_mod_exp_mont() uses fixed windows and the special | ||
564 | * precomputation memory layout to limit data-dependency to a minimum | ||
565 | * to protect secret exponents (cf. the hyper-threading timing attacks | ||
566 | * pointed out by Colin Percival, | ||
567 | * http://www.daemonology.net/hyperthreading-considered-harmful/) | ||
568 | */ | ||
569 | int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, | ||
570 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) | ||
571 | { | ||
572 | int i,bits,ret=0,idx,window,wvalue; | ||
573 | int top; | ||
574 | BIGNUM *r; | ||
575 | const BIGNUM *aa; | ||
576 | BN_MONT_CTX *mont=NULL; | ||
577 | |||
578 | int numPowers; | ||
579 | unsigned char *powerbufFree=NULL; | ||
580 | int powerbufLen = 0; | ||
581 | unsigned char *powerbuf=NULL; | ||
582 | BIGNUM *computeTemp=NULL, *am=NULL; | ||
583 | |||
584 | bn_check_top(a); | ||
585 | bn_check_top(p); | ||
586 | bn_check_top(m); | ||
587 | |||
588 | top = m->top; | ||
589 | |||
590 | if (!(m->d[0] & 1)) | ||
591 | { | ||
592 | BNerr(BN_F_BN_MOD_EXP_MONT_CONSTTIME,BN_R_CALLED_WITH_EVEN_MODULUS); | ||
593 | return(0); | ||
594 | } | ||
595 | bits=BN_num_bits(p); | ||
596 | if (bits == 0) | ||
597 | { | ||
598 | ret = BN_one(rr); | ||
599 | return ret; | ||
600 | } | ||
601 | |||
602 | /* Initialize BIGNUM context and allocate intermediate result */ | ||
603 | BN_CTX_start(ctx); | ||
604 | r = BN_CTX_get(ctx); | ||
605 | if (r == NULL) goto err; | ||
606 | |||
607 | /* Allocate a montgomery context if it was not supplied by the caller. | ||
608 | * If this is not done, things will break in the montgomery part. | ||
609 | */ | ||
610 | if (in_mont != NULL) | ||
611 | mont=in_mont; | ||
612 | else | ||
613 | { | ||
614 | if ((mont=BN_MONT_CTX_new()) == NULL) goto err; | ||
615 | if (!BN_MONT_CTX_set(mont,m,ctx)) goto err; | ||
616 | } | ||
617 | |||
618 | /* Get the window size to use with size of p. */ | ||
619 | window = BN_window_bits_for_ctime_exponent_size(bits); | ||
620 | |||
621 | /* Allocate a buffer large enough to hold all of the pre-computed | ||
622 | * powers of a. | ||
623 | */ | ||
624 | numPowers = 1 << window; | ||
625 | powerbufLen = sizeof(m->d[0])*top*numPowers; | ||
626 | if ((powerbufFree=(unsigned char*)OPENSSL_malloc(powerbufLen+MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH)) == NULL) | ||
627 | goto err; | ||
628 | |||
629 | powerbuf = MOD_EXP_CTIME_ALIGN(powerbufFree); | ||
630 | memset(powerbuf, 0, powerbufLen); | ||
631 | |||
632 | /* Initialize the intermediate result. Do this early to save double conversion, | ||
633 | * once each for a^0 and intermediate result. | ||
634 | */ | ||
635 | if (!BN_to_montgomery(r,BN_value_one(),mont,ctx)) goto err; | ||
636 | if (!MOD_EXP_CTIME_COPY_TO_PREBUF(r, top, powerbuf, 0, numPowers)) goto err; | ||
637 | |||
638 | /* Initialize computeTemp as a^1 with montgomery precalcs */ | ||
639 | computeTemp = BN_CTX_get(ctx); | ||
640 | am = BN_CTX_get(ctx); | ||
641 | if (computeTemp==NULL || am==NULL) goto err; | ||
642 | |||
643 | if (a->neg || BN_ucmp(a,m) >= 0) | ||
644 | { | ||
645 | if (!BN_mod(am,a,m,ctx)) | ||
646 | goto err; | ||
647 | aa= am; | ||
648 | } | ||
649 | else | ||
650 | aa=a; | ||
651 | if (!BN_to_montgomery(am,aa,mont,ctx)) goto err; | ||
652 | if (!BN_copy(computeTemp, am)) goto err; | ||
653 | if (!MOD_EXP_CTIME_COPY_TO_PREBUF(am, top, powerbuf, 1, numPowers)) goto err; | ||
654 | |||
655 | /* If the window size is greater than 1, then calculate | ||
656 | * val[i=2..2^winsize-1]. Powers are computed as a*a^(i-1) | ||
657 | * (even powers could instead be computed as (a^(i/2))^2 | ||
658 | * to use the slight performance advantage of sqr over mul). | ||
659 | */ | ||
660 | if (window > 1) | ||
661 | { | ||
662 | for (i=2; i<numPowers; i++) | ||
663 | { | ||
664 | /* Calculate a^i = a^(i-1) * a */ | ||
665 | if (!BN_mod_mul_montgomery(computeTemp,am,computeTemp,mont,ctx)) | ||
666 | goto err; | ||
667 | if (!MOD_EXP_CTIME_COPY_TO_PREBUF(computeTemp, top, powerbuf, i, numPowers)) goto err; | ||
668 | } | ||
669 | } | ||
670 | |||
671 | /* Adjust the number of bits up to a multiple of the window size. | ||
672 | * If the exponent length is not a multiple of the window size, then | ||
673 | * this pads the most significant bits with zeros to normalize the | ||
674 | * scanning loop to there's no special cases. | ||
675 | * | ||
676 | * * NOTE: Making the window size a power of two less than the native | ||
677 | * * word size ensures that the padded bits won't go past the last | ||
678 | * * word in the internal BIGNUM structure. Going past the end will | ||
679 | * * still produce the correct result, but causes a different branch | ||
680 | * * to be taken in the BN_is_bit_set function. | ||
681 | */ | ||
682 | bits = ((bits+window-1)/window)*window; | ||
683 | idx=bits-1; /* The top bit of the window */ | ||
684 | |||
685 | /* Scan the exponent one window at a time starting from the most | ||
686 | * significant bits. | ||
687 | */ | ||
688 | while (idx >= 0) | ||
689 | { | ||
690 | wvalue=0; /* The 'value' of the window */ | ||
691 | |||
692 | /* Scan the window, squaring the result as we go */ | ||
693 | for (i=0; i<window; i++,idx--) | ||
694 | { | ||
695 | if (!BN_mod_mul_montgomery(r,r,r,mont,ctx)) goto err; | ||
696 | wvalue = (wvalue<<1)+BN_is_bit_set(p,idx); | ||
697 | } | ||
698 | |||
699 | /* Fetch the appropriate pre-computed value from the pre-buf */ | ||
700 | if (!MOD_EXP_CTIME_COPY_FROM_PREBUF(computeTemp, top, powerbuf, wvalue, numPowers)) goto err; | ||
701 | |||
702 | /* Multiply the result into the intermediate result */ | ||
703 | if (!BN_mod_mul_montgomery(r,r,computeTemp,mont,ctx)) goto err; | ||
704 | } | ||
705 | |||
706 | /* Convert the final result from montgomery to standard format */ | ||
707 | if (!BN_from_montgomery(rr,r,mont,ctx)) goto err; | ||
708 | ret=1; | ||
709 | err: | ||
710 | if ((in_mont == NULL) && (mont != NULL)) BN_MONT_CTX_free(mont); | ||
711 | if (powerbuf!=NULL) | ||
712 | { | ||
713 | OPENSSL_cleanse(powerbuf,powerbufLen); | ||
714 | OPENSSL_free(powerbufFree); | ||
715 | } | ||
716 | if (am!=NULL) BN_clear(am); | ||
717 | if (computeTemp!=NULL) BN_clear(computeTemp); | ||
718 | BN_CTX_end(ctx); | ||
719 | return(ret); | ||
720 | } | ||
721 | |||
496 | int BN_mod_exp_mont_word(BIGNUM *rr, BN_ULONG a, const BIGNUM *p, | 722 | int BN_mod_exp_mont_word(BIGNUM *rr, BN_ULONG a, const BIGNUM *p, |
497 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) | 723 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) |
498 | { | 724 | { |
@@ -517,6 +743,13 @@ int BN_mod_exp_mont_word(BIGNUM *rr, BN_ULONG a, const BIGNUM *p, | |||
517 | #define BN_TO_MONTGOMERY_WORD(r, w, mont) \ | 743 | #define BN_TO_MONTGOMERY_WORD(r, w, mont) \ |
518 | (BN_set_word(r, (w)) && BN_to_montgomery(r, r, (mont), ctx)) | 744 | (BN_set_word(r, (w)) && BN_to_montgomery(r, r, (mont), ctx)) |
519 | 745 | ||
746 | if (BN_get_flags(p, BN_FLG_EXP_CONSTTIME) != 0) | ||
747 | { | ||
748 | /* BN_FLG_EXP_CONSTTIME only supported by BN_mod_exp_mont() */ | ||
749 | BNerr(BN_F_BN_MOD_EXP_MONT_WORD,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
750 | return -1; | ||
751 | } | ||
752 | |||
520 | bn_check_top(p); | 753 | bn_check_top(p); |
521 | bn_check_top(m); | 754 | bn_check_top(m); |
522 | 755 | ||
@@ -644,6 +877,13 @@ int BN_mod_exp_simple(BIGNUM *r, | |||
644 | BIGNUM *d; | 877 | BIGNUM *d; |
645 | BIGNUM val[TABLE_SIZE]; | 878 | BIGNUM val[TABLE_SIZE]; |
646 | 879 | ||
880 | if (BN_get_flags(p, BN_FLG_EXP_CONSTTIME) != 0) | ||
881 | { | ||
882 | /* BN_FLG_EXP_CONSTTIME only supported by BN_mod_exp_mont() */ | ||
883 | BNerr(BN_F_BN_MOD_EXP_SIMPLE,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
884 | return -1; | ||
885 | } | ||
886 | |||
647 | bits=BN_num_bits(p); | 887 | bits=BN_num_bits(p); |
648 | 888 | ||
649 | if (bits == 0) | 889 | if (bits == 0) |
diff --git a/src/lib/libcrypto/bn/bn_lcl.h b/src/lib/libcrypto/bn/bn_lcl.h index 253e195e23..a84998f2bd 100644 --- a/src/lib/libcrypto/bn/bn_lcl.h +++ b/src/lib/libcrypto/bn/bn_lcl.h | |||
@@ -177,6 +177,45 @@ struct bignum_ctx | |||
177 | 177 | ||
178 | 178 | ||
179 | 179 | ||
180 | /* BN_mod_exp_mont_conttime is based on the assumption that the | ||
181 | * L1 data cache line width of the target processor is at least | ||
182 | * the following value. | ||
183 | */ | ||
184 | #define MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH ( 64 ) | ||
185 | #define MOD_EXP_CTIME_MIN_CACHE_LINE_MASK (MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH - 1) | ||
186 | |||
187 | /* Window sizes optimized for fixed window size modular exponentiation | ||
188 | * algorithm (BN_mod_exp_mont_consttime). | ||
189 | * | ||
190 | * To achieve the security goals of BN_mode_exp_mont_consttime, the | ||
191 | * maximum size of the window must not exceed | ||
192 | * log_2(MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH). | ||
193 | * | ||
194 | * Window size thresholds are defined for cache line sizes of 32 and 64, | ||
195 | * cache line sizes where log_2(32)=5 and log_2(64)=6 respectively. A | ||
196 | * window size of 7 should only be used on processors that have a 128 | ||
197 | * byte or greater cache line size. | ||
198 | */ | ||
199 | #if MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH == 64 | ||
200 | |||
201 | # define BN_window_bits_for_ctime_exponent_size(b) \ | ||
202 | ((b) > 937 ? 6 : \ | ||
203 | (b) > 306 ? 5 : \ | ||
204 | (b) > 89 ? 4 : \ | ||
205 | (b) > 22 ? 3 : 1) | ||
206 | # define BN_MAX_WINDOW_BITS_FOR_CTIME_EXPONENT_SIZE (6) | ||
207 | |||
208 | #elif MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH == 32 | ||
209 | |||
210 | # define BN_window_bits_for_ctime_exponent_size(b) \ | ||
211 | ((b) > 306 ? 5 : \ | ||
212 | (b) > 89 ? 4 : \ | ||
213 | (b) > 22 ? 3 : 1) | ||
214 | # define BN_MAX_WINDOW_BITS_FOR_CTIME_EXPONENT_SIZE (5) | ||
215 | |||
216 | #endif | ||
217 | |||
218 | |||
180 | /* Pentium pro 16,16,16,32,64 */ | 219 | /* Pentium pro 16,16,16,32,64 */ |
181 | /* Alpha 16,16,16,16.64 */ | 220 | /* Alpha 16,16,16,16.64 */ |
182 | #define BN_MULL_SIZE_NORMAL (16) /* 32 */ | 221 | #define BN_MULL_SIZE_NORMAL (16) /* 32 */ |
diff --git a/src/lib/libcrypto/bn/bn_mont.c b/src/lib/libcrypto/bn/bn_mont.c index b79b1b60da..3572e5a690 100644 --- a/src/lib/libcrypto/bn/bn_mont.c +++ b/src/lib/libcrypto/bn/bn_mont.c | |||
@@ -347,3 +347,23 @@ BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to, BN_MONT_CTX *from) | |||
347 | return(to); | 347 | return(to); |
348 | } | 348 | } |
349 | 349 | ||
350 | BN_MONT_CTX *BN_MONT_CTX_set_locked(BN_MONT_CTX **pmont, int lock, | ||
351 | const BIGNUM *mod, BN_CTX *ctx) | ||
352 | { | ||
353 | if (*pmont) | ||
354 | return *pmont; | ||
355 | CRYPTO_w_lock(lock); | ||
356 | if (!*pmont) | ||
357 | { | ||
358 | *pmont = BN_MONT_CTX_new(); | ||
359 | if (*pmont && !BN_MONT_CTX_set(*pmont, mod, ctx)) | ||
360 | { | ||
361 | BN_MONT_CTX_free(*pmont); | ||
362 | *pmont = NULL; | ||
363 | } | ||
364 | } | ||
365 | CRYPTO_w_unlock(lock); | ||
366 | return *pmont; | ||
367 | } | ||
368 | |||
369 | |||
diff --git a/src/lib/libcrypto/bn/bn_x931p.c b/src/lib/libcrypto/bn/bn_x931p.c new file mode 100644 index 0000000000..c64410dd3a --- /dev/null +++ b/src/lib/libcrypto/bn/bn_x931p.c | |||
@@ -0,0 +1,282 @@ | |||
1 | /* bn_x931p.c */ | ||
2 | /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL | ||
3 | * project 2005. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 2005 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * licensing@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #include <stdio.h> | ||
60 | #include <openssl/bn.h> | ||
61 | |||
62 | #ifdef OPENSSL_FIPS | ||
63 | |||
64 | /* X9.31 routines for prime derivation */ | ||
65 | |||
66 | |||
67 | /* X9.31 prime derivation. This is used to generate the primes pi | ||
68 | * (p1, p2, q1, q2) from a parameter Xpi by checking successive odd | ||
69 | * integers. | ||
70 | */ | ||
71 | |||
72 | static int bn_x931_derive_pi(BIGNUM *pi, const BIGNUM *Xpi, BN_CTX *ctx, | ||
73 | void (*cb)(int, int, void *), void *cb_arg) | ||
74 | { | ||
75 | int i = 0; | ||
76 | if (!BN_copy(pi, Xpi)) | ||
77 | return 0; | ||
78 | if (!BN_is_odd(pi) && !BN_add_word(pi, 1)) | ||
79 | return 0; | ||
80 | for(;;) | ||
81 | { | ||
82 | i++; | ||
83 | if (cb) | ||
84 | cb(0, i, cb_arg); | ||
85 | /* NB 27 MR is specificed in X9.31 */ | ||
86 | if (BN_is_prime_fasttest(pi, 27, cb, ctx, cb_arg, 1)) | ||
87 | break; | ||
88 | if (!BN_add_word(pi, 2)) | ||
89 | return 0; | ||
90 | } | ||
91 | if (cb) | ||
92 | cb(2, i, cb_arg); | ||
93 | return 1; | ||
94 | } | ||
95 | |||
96 | /* This is the main X9.31 prime derivation function. From parameters | ||
97 | * Xp1, Xp2 and Xp derive the prime p. If the parameters p1 or p2 are | ||
98 | * not NULL they will be returned too: this is needed for testing. | ||
99 | */ | ||
100 | |||
101 | int BN_X931_derive_prime(BIGNUM *p, BIGNUM *p1, BIGNUM *p2, | ||
102 | void (*cb)(int, int, void *), void *cb_arg, | ||
103 | const BIGNUM *Xp, const BIGNUM *Xp1, const BIGNUM *Xp2, | ||
104 | const BIGNUM *e, BN_CTX *ctx) | ||
105 | { | ||
106 | int ret = 0; | ||
107 | |||
108 | BIGNUM *t, *p1p2, *pm1; | ||
109 | |||
110 | /* Only even e supported */ | ||
111 | if (!BN_is_odd(e)) | ||
112 | return 0; | ||
113 | |||
114 | BN_CTX_start(ctx); | ||
115 | if (!p1) | ||
116 | p1 = BN_CTX_get(ctx); | ||
117 | |||
118 | if (!p2) | ||
119 | p2 = BN_CTX_get(ctx); | ||
120 | |||
121 | t = BN_CTX_get(ctx); | ||
122 | |||
123 | p1p2 = BN_CTX_get(ctx); | ||
124 | |||
125 | pm1 = BN_CTX_get(ctx); | ||
126 | |||
127 | if (!bn_x931_derive_pi(p1, Xp1, ctx, cb, cb_arg)) | ||
128 | goto err; | ||
129 | |||
130 | if (!bn_x931_derive_pi(p2, Xp2, ctx, cb, cb_arg)) | ||
131 | goto err; | ||
132 | |||
133 | if (!BN_mul(p1p2, p1, p2, ctx)) | ||
134 | goto err; | ||
135 | |||
136 | /* First set p to value of Rp */ | ||
137 | |||
138 | if (!BN_mod_inverse(p, p2, p1, ctx)) | ||
139 | goto err; | ||
140 | |||
141 | if (!BN_mul(p, p, p2, ctx)) | ||
142 | goto err; | ||
143 | |||
144 | if (!BN_mod_inverse(t, p1, p2, ctx)) | ||
145 | goto err; | ||
146 | |||
147 | if (!BN_mul(t, t, p1, ctx)) | ||
148 | goto err; | ||
149 | |||
150 | if (!BN_sub(p, p, t)) | ||
151 | goto err; | ||
152 | |||
153 | if (p->neg && !BN_add(p, p, p1p2)) | ||
154 | goto err; | ||
155 | |||
156 | /* p now equals Rp */ | ||
157 | |||
158 | if (!BN_mod_sub(p, p, Xp, p1p2, ctx)) | ||
159 | goto err; | ||
160 | |||
161 | if (!BN_add(p, p, Xp)) | ||
162 | goto err; | ||
163 | |||
164 | /* p now equals Yp0 */ | ||
165 | |||
166 | for (;;) | ||
167 | { | ||
168 | int i = 1; | ||
169 | if (cb) | ||
170 | cb(0, i++, cb_arg); | ||
171 | if (!BN_copy(pm1, p)) | ||
172 | goto err; | ||
173 | if (!BN_sub_word(pm1, 1)) | ||
174 | goto err; | ||
175 | if (!BN_gcd(t, pm1, e, ctx)) | ||
176 | goto err; | ||
177 | if (BN_is_one(t) | ||
178 | /* X9.31 specifies 8 MR and 1 Lucas test or any prime test | ||
179 | * offering similar or better guarantees 50 MR is considerably | ||
180 | * better. | ||
181 | */ | ||
182 | && BN_is_prime_fasttest(p, 50, cb, ctx, cb_arg, 1)) | ||
183 | break; | ||
184 | if (!BN_add(p, p, p1p2)) | ||
185 | goto err; | ||
186 | } | ||
187 | |||
188 | if (cb) | ||
189 | cb(3, 0, cb_arg); | ||
190 | |||
191 | ret = 1; | ||
192 | |||
193 | err: | ||
194 | |||
195 | BN_CTX_end(ctx); | ||
196 | |||
197 | return ret; | ||
198 | } | ||
199 | |||
200 | /* Generate pair of paramters Xp, Xq for X9.31 prime generation. | ||
201 | * Note: nbits paramter is sum of number of bits in both. | ||
202 | */ | ||
203 | |||
204 | int BN_X931_generate_Xpq(BIGNUM *Xp, BIGNUM *Xq, int nbits, BN_CTX *ctx) | ||
205 | { | ||
206 | BIGNUM *t; | ||
207 | int i; | ||
208 | /* Number of bits for each prime is of the form | ||
209 | * 512+128s for s = 0, 1, ... | ||
210 | */ | ||
211 | if ((nbits < 1024) || (nbits & 0xff)) | ||
212 | return 0; | ||
213 | nbits >>= 1; | ||
214 | /* The random value Xp must be between sqrt(2) * 2^(nbits-1) and | ||
215 | * 2^nbits - 1. By setting the top two bits we ensure that the lower | ||
216 | * bound is exceeded. | ||
217 | */ | ||
218 | if (!BN_rand(Xp, nbits, 1, 0)) | ||
219 | return 0; | ||
220 | |||
221 | BN_CTX_start(ctx); | ||
222 | t = BN_CTX_get(ctx); | ||
223 | |||
224 | for (i = 0; i < 1000; i++) | ||
225 | { | ||
226 | if (!BN_rand(Xq, nbits, 1, 0)) | ||
227 | return 0; | ||
228 | /* Check that |Xp - Xq| > 2^(nbits - 100) */ | ||
229 | BN_sub(t, Xp, Xq); | ||
230 | if (BN_num_bits(t) > (nbits - 100)) | ||
231 | break; | ||
232 | } | ||
233 | |||
234 | BN_CTX_end(ctx); | ||
235 | |||
236 | if (i < 1000) | ||
237 | return 1; | ||
238 | |||
239 | return 0; | ||
240 | |||
241 | } | ||
242 | |||
243 | /* Generate primes using X9.31 algorithm. Of the values p, p1, p2, Xp1 | ||
244 | * and Xp2 only 'p' needs to be non-NULL. If any of the others are not NULL | ||
245 | * the relevant parameter will be stored in it. | ||
246 | * | ||
247 | * Due to the fact that |Xp - Xq| > 2^(nbits - 100) must be satisfied Xp and Xq | ||
248 | * are generated using the previous function and supplied as input. | ||
249 | */ | ||
250 | |||
251 | int BN_X931_generate_prime(BIGNUM *p, BIGNUM *p1, BIGNUM *p2, | ||
252 | BIGNUM *Xp1, BIGNUM *Xp2, | ||
253 | const BIGNUM *Xp, | ||
254 | const BIGNUM *e, BN_CTX *ctx, | ||
255 | void (*cb)(int, int, void *), void *cb_arg) | ||
256 | { | ||
257 | int ret = 0; | ||
258 | |||
259 | BN_CTX_start(ctx); | ||
260 | if (!Xp1) | ||
261 | Xp1 = BN_CTX_get(ctx); | ||
262 | if (!Xp2) | ||
263 | Xp2 = BN_CTX_get(ctx); | ||
264 | |||
265 | if (!BN_rand(Xp1, 101, 0, 0)) | ||
266 | goto error; | ||
267 | if (!BN_rand(Xp2, 101, 0, 0)) | ||
268 | goto error; | ||
269 | if (!BN_X931_derive_prime(p, p1, p2, cb, cb_arg, | ||
270 | Xp, Xp1, Xp2, e, ctx)) | ||
271 | goto error; | ||
272 | |||
273 | ret = 1; | ||
274 | |||
275 | error: | ||
276 | BN_CTX_end(ctx); | ||
277 | |||
278 | return ret; | ||
279 | |||
280 | } | ||
281 | |||
282 | #endif | ||
diff --git a/src/lib/libcrypto/buffer/buf_err.c b/src/lib/libcrypto/buffer/buf_err.c index 5eee653e14..1fc32a6861 100644 --- a/src/lib/libcrypto/buffer/buf_err.c +++ b/src/lib/libcrypto/buffer/buf_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/buffer/buf_err.c */ | 1 | /* crypto/buffer/buf_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,11 +64,15 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_BUF,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_BUF,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA BUF_str_functs[]= | 71 | static ERR_STRING_DATA BUF_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,BUF_F_BUF_MEM_GROW,0), "BUF_MEM_grow"}, | 73 | {ERR_FUNC(BUF_F_BUF_MEM_GROW), "BUF_MEM_grow"}, |
70 | {ERR_PACK(0,BUF_F_BUF_MEM_NEW,0), "BUF_MEM_new"}, | 74 | {ERR_FUNC(BUF_F_BUF_MEM_NEW), "BUF_MEM_new"}, |
71 | {ERR_PACK(0,BUF_F_BUF_STRDUP,0), "BUF_strdup"}, | 75 | {ERR_FUNC(BUF_F_BUF_STRDUP), "BUF_strdup"}, |
72 | {0,NULL} | 76 | {0,NULL} |
73 | }; | 77 | }; |
74 | 78 | ||
@@ -87,8 +91,8 @@ void ERR_load_BUF_strings(void) | |||
87 | { | 91 | { |
88 | init=0; | 92 | init=0; |
89 | #ifndef OPENSSL_NO_ERR | 93 | #ifndef OPENSSL_NO_ERR |
90 | ERR_load_strings(ERR_LIB_BUF,BUF_str_functs); | 94 | ERR_load_strings(0,BUF_str_functs); |
91 | ERR_load_strings(ERR_LIB_BUF,BUF_str_reasons); | 95 | ERR_load_strings(0,BUF_str_reasons); |
92 | #endif | 96 | #endif |
93 | 97 | ||
94 | } | 98 | } |
diff --git a/src/lib/libcrypto/cast/c_skey.c b/src/lib/libcrypto/cast/c_skey.c index dc4791a8cf..db9b7573e0 100644 --- a/src/lib/libcrypto/cast/c_skey.c +++ b/src/lib/libcrypto/cast/c_skey.c | |||
@@ -57,6 +57,7 @@ | |||
57 | */ | 57 | */ |
58 | 58 | ||
59 | #include <openssl/crypto.h> | 59 | #include <openssl/crypto.h> |
60 | #include <openssl/fips.h> | ||
60 | #include <openssl/cast.h> | 61 | #include <openssl/cast.h> |
61 | 62 | ||
62 | #include "cast_lcl.h" | 63 | #include "cast_lcl.h" |
diff --git a/src/lib/libcrypto/cast/cast_lcl.h b/src/lib/libcrypto/cast/cast_lcl.h index 37f41cc6a4..e756021a33 100644 --- a/src/lib/libcrypto/cast/cast_lcl.h +++ b/src/lib/libcrypto/cast/cast_lcl.h | |||
@@ -64,11 +64,6 @@ | |||
64 | #endif | 64 | #endif |
65 | 65 | ||
66 | 66 | ||
67 | #ifdef OPENSSL_BUILD_SHLIBCRYPTO | ||
68 | # undef OPENSSL_EXTERN | ||
69 | # define OPENSSL_EXTERN OPENSSL_EXPORT | ||
70 | #endif | ||
71 | |||
72 | #undef c2l | 67 | #undef c2l |
73 | #define c2l(c,l) (l =((unsigned long)(*((c)++))) , \ | 68 | #define c2l(c,l) (l =((unsigned long)(*((c)++))) , \ |
74 | l|=((unsigned long)(*((c)++)))<< 8L, \ | 69 | l|=((unsigned long)(*((c)++)))<< 8L, \ |
@@ -222,11 +217,11 @@ | |||
222 | } | 217 | } |
223 | #endif | 218 | #endif |
224 | 219 | ||
225 | OPENSSL_EXTERN const CAST_LONG CAST_S_table0[256]; | 220 | extern const CAST_LONG CAST_S_table0[256]; |
226 | OPENSSL_EXTERN const CAST_LONG CAST_S_table1[256]; | 221 | extern const CAST_LONG CAST_S_table1[256]; |
227 | OPENSSL_EXTERN const CAST_LONG CAST_S_table2[256]; | 222 | extern const CAST_LONG CAST_S_table2[256]; |
228 | OPENSSL_EXTERN const CAST_LONG CAST_S_table3[256]; | 223 | extern const CAST_LONG CAST_S_table3[256]; |
229 | OPENSSL_EXTERN const CAST_LONG CAST_S_table4[256]; | 224 | extern const CAST_LONG CAST_S_table4[256]; |
230 | OPENSSL_EXTERN const CAST_LONG CAST_S_table5[256]; | 225 | extern const CAST_LONG CAST_S_table5[256]; |
231 | OPENSSL_EXTERN const CAST_LONG CAST_S_table6[256]; | 226 | extern const CAST_LONG CAST_S_table6[256]; |
232 | OPENSSL_EXTERN const CAST_LONG CAST_S_table7[256]; | 227 | extern const CAST_LONG CAST_S_table7[256]; |
diff --git a/src/lib/libcrypto/comp/c_zlib.c b/src/lib/libcrypto/comp/c_zlib.c index 1bd2850d15..5fcb521ffb 100644 --- a/src/lib/libcrypto/comp/c_zlib.c +++ b/src/lib/libcrypto/comp/c_zlib.c | |||
@@ -51,30 +51,17 @@ static COMP_METHOD zlib_method={ | |||
51 | */ | 51 | */ |
52 | #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) | 52 | #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) |
53 | # include <windows.h> | 53 | # include <windows.h> |
54 | |||
55 | # define Z_CALLCONV _stdcall | ||
56 | # define ZLIB_SHARED | ||
57 | #else | ||
58 | # define Z_CALLCONV | ||
59 | #endif /* !(OPENSSL_SYS_WINDOWS || OPENSSL_SYS_WIN32) */ | 54 | #endif /* !(OPENSSL_SYS_WINDOWS || OPENSSL_SYS_WIN32) */ |
60 | 55 | ||
61 | #ifdef ZLIB_SHARED | 56 | #ifdef ZLIB_SHARED |
62 | #include <openssl/dso.h> | 57 | #include <openssl/dso.h> |
63 | 58 | ||
64 | /* Prototypes for built in stubs */ | ||
65 | static int stub_compress(Bytef *dest,uLongf *destLen, | ||
66 | const Bytef *source, uLong sourceLen); | ||
67 | static int stub_inflateEnd(z_streamp strm); | ||
68 | static int stub_inflate(z_streamp strm, int flush); | ||
69 | static int stub_inflateInit_(z_streamp strm, const char * version, | ||
70 | int stream_size); | ||
71 | |||
72 | /* Function pointers */ | 59 | /* Function pointers */ |
73 | typedef int (Z_CALLCONV *compress_ft)(Bytef *dest,uLongf *destLen, | 60 | typedef int (*compress_ft)(Bytef *dest,uLongf *destLen, |
74 | const Bytef *source, uLong sourceLen); | 61 | const Bytef *source, uLong sourceLen); |
75 | typedef int (Z_CALLCONV *inflateEnd_ft)(z_streamp strm); | 62 | typedef int (*inflateEnd_ft)(z_streamp strm); |
76 | typedef int (Z_CALLCONV *inflate_ft)(z_streamp strm, int flush); | 63 | typedef int (*inflate_ft)(z_streamp strm, int flush); |
77 | typedef int (Z_CALLCONV *inflateInit__ft)(z_streamp strm, | 64 | typedef int (*inflateInit__ft)(z_streamp strm, |
78 | const char * version, int stream_size); | 65 | const char * version, int stream_size); |
79 | static compress_ft p_compress=NULL; | 66 | static compress_ft p_compress=NULL; |
80 | static inflateEnd_ft p_inflateEnd=NULL; | 67 | static inflateEnd_ft p_inflateEnd=NULL; |
@@ -84,10 +71,10 @@ static inflateInit__ft p_inflateInit_=NULL; | |||
84 | static int zlib_loaded = 0; /* only attempt to init func pts once */ | 71 | static int zlib_loaded = 0; /* only attempt to init func pts once */ |
85 | static DSO *zlib_dso = NULL; | 72 | static DSO *zlib_dso = NULL; |
86 | 73 | ||
87 | #define compress stub_compress | 74 | #define compress p_compress |
88 | #define inflateEnd stub_inflateEnd | 75 | #define inflateEnd p_inflateEnd |
89 | #define inflate stub_inflate | 76 | #define inflate p_inflate |
90 | #define inflateInit_ stub_inflateInit_ | 77 | #define inflateInit_ p_inflateInit_ |
91 | #endif /* ZLIB_SHARED */ | 78 | #endif /* ZLIB_SHARED */ |
92 | 79 | ||
93 | static int zlib_compress_block(COMP_CTX *ctx, unsigned char *out, | 80 | static int zlib_compress_block(COMP_CTX *ctx, unsigned char *out, |
@@ -191,16 +178,6 @@ COMP_METHOD *COMP_zlib(void) | |||
191 | { | 178 | { |
192 | #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) | 179 | #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) |
193 | zlib_dso = DSO_load(NULL, "ZLIB1", NULL, 0); | 180 | zlib_dso = DSO_load(NULL, "ZLIB1", NULL, 0); |
194 | if (!zlib_dso) | ||
195 | { | ||
196 | zlib_dso = DSO_load(NULL, "ZLIB", NULL, 0); | ||
197 | if (zlib_dso) | ||
198 | { | ||
199 | /* Clear the errors from the first failed | ||
200 | DSO_load() */ | ||
201 | ERR_clear_error(); | ||
202 | } | ||
203 | } | ||
204 | #else | 181 | #else |
205 | zlib_dso = DSO_load(NULL, "z", NULL, 0); | 182 | zlib_dso = DSO_load(NULL, "z", NULL, 0); |
206 | #endif | 183 | #endif |
@@ -218,54 +195,21 @@ COMP_METHOD *COMP_zlib(void) | |||
218 | p_inflateInit_ | 195 | p_inflateInit_ |
219 | = (inflateInit__ft) DSO_bind_func(zlib_dso, | 196 | = (inflateInit__ft) DSO_bind_func(zlib_dso, |
220 | "inflateInit_"); | 197 | "inflateInit_"); |
221 | zlib_loaded++; | 198 | |
199 | if (p_compress && p_inflateEnd && p_inflate | ||
200 | && p_inflateInit_) | ||
201 | zlib_loaded++; | ||
222 | } | 202 | } |
223 | } | 203 | } |
224 | 204 | ||
225 | #endif | 205 | #endif |
206 | #ifdef ZLIB_SHARED | ||
207 | if (zlib_loaded) | ||
208 | #endif | ||
226 | #if defined(ZLIB) || defined(ZLIB_SHARED) | 209 | #if defined(ZLIB) || defined(ZLIB_SHARED) |
227 | meth = &zlib_method; | 210 | meth = &zlib_method; |
228 | #endif | 211 | #endif |
229 | 212 | ||
230 | return(meth); | 213 | return(meth); |
231 | } | 214 | } |
232 | 215 | ||
233 | #ifdef ZLIB_SHARED | ||
234 | /* Stubs for each function to be dynamicly loaded */ | ||
235 | static int | ||
236 | stub_compress(Bytef *dest,uLongf *destLen,const Bytef *source, uLong sourceLen) | ||
237 | { | ||
238 | if (p_compress) | ||
239 | return(p_compress(dest,destLen,source,sourceLen)); | ||
240 | else | ||
241 | return(Z_MEM_ERROR); | ||
242 | } | ||
243 | |||
244 | static int | ||
245 | stub_inflateEnd(z_streamp strm) | ||
246 | { | ||
247 | if ( p_inflateEnd ) | ||
248 | return(p_inflateEnd(strm)); | ||
249 | else | ||
250 | return(Z_MEM_ERROR); | ||
251 | } | ||
252 | |||
253 | static int | ||
254 | stub_inflate(z_streamp strm, int flush) | ||
255 | { | ||
256 | if ( p_inflate ) | ||
257 | return(p_inflate(strm,flush)); | ||
258 | else | ||
259 | return(Z_MEM_ERROR); | ||
260 | } | ||
261 | |||
262 | static int | ||
263 | stub_inflateInit_(z_streamp strm, const char * version, int stream_size) | ||
264 | { | ||
265 | if ( p_inflateInit_ ) | ||
266 | return(p_inflateInit_(strm,version,stream_size)); | ||
267 | else | ||
268 | return(Z_MEM_ERROR); | ||
269 | } | ||
270 | |||
271 | #endif /* ZLIB_SHARED */ | ||
diff --git a/src/lib/libcrypto/conf/conf_def.c b/src/lib/libcrypto/conf/conf_def.c index b5a876ae68..2464f8ed90 100644 --- a/src/lib/libcrypto/conf/conf_def.c +++ b/src/lib/libcrypto/conf/conf_def.c | |||
@@ -613,13 +613,13 @@ static int str_copy(CONF *conf, char *section, char **pto, char *from) | |||
613 | e++; | 613 | e++; |
614 | } | 614 | } |
615 | /* So at this point we have | 615 | /* So at this point we have |
616 | * ns which is the start of the name string which is | 616 | * np which is the start of the name string which is |
617 | * '\0' terminated. | 617 | * '\0' terminated. |
618 | * cs which is the start of the section string which is | 618 | * cp which is the start of the section string which is |
619 | * '\0' terminated. | 619 | * '\0' terminated. |
620 | * e is the 'next point after'. | 620 | * e is the 'next point after'. |
621 | * r and s are the chars replaced by the '\0' | 621 | * r and rr are the chars replaced by the '\0' |
622 | * rp and sp is where 'r' and 's' came from. | 622 | * rp and rrp is where 'r' and 'rr' came from. |
623 | */ | 623 | */ |
624 | p=_CONF_get_string(conf,cp,np); | 624 | p=_CONF_get_string(conf,cp,np); |
625 | if (rrp != NULL) *rrp=rr; | 625 | if (rrp != NULL) *rrp=rr; |
@@ -638,6 +638,11 @@ static int str_copy(CONF *conf, char *section, char **pto, char *from) | |||
638 | points at. /RL */ | 638 | points at. /RL */ |
639 | len -= e-from; | 639 | len -= e-from; |
640 | from=e; | 640 | from=e; |
641 | |||
642 | /* In case there were no braces or parenthesis around | ||
643 | the variable reference, we have to put back the | ||
644 | character that was replaced with a '\0'. /RL */ | ||
645 | *rp = r; | ||
641 | } | 646 | } |
642 | else | 647 | else |
643 | buf->data[to++]= *(from++); | 648 | buf->data[to++]= *(from++); |
diff --git a/src/lib/libcrypto/conf/conf_err.c b/src/lib/libcrypto/conf/conf_err.c index ee07bfe9d9..f5e2ca4bf0 100644 --- a/src/lib/libcrypto/conf/conf_err.c +++ b/src/lib/libcrypto/conf/conf_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/conf/conf_err.c */ | 1 | /* crypto/conf/conf_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,47 +64,51 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_CONF,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_CONF,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA CONF_str_functs[]= | 71 | static ERR_STRING_DATA CONF_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,CONF_F_CONF_DUMP_FP,0), "CONF_dump_fp"}, | 73 | {ERR_FUNC(CONF_F_CONF_DUMP_FP), "CONF_dump_fp"}, |
70 | {ERR_PACK(0,CONF_F_CONF_LOAD,0), "CONF_load"}, | 74 | {ERR_FUNC(CONF_F_CONF_LOAD), "CONF_load"}, |
71 | {ERR_PACK(0,CONF_F_CONF_LOAD_BIO,0), "CONF_load_bio"}, | 75 | {ERR_FUNC(CONF_F_CONF_LOAD_BIO), "CONF_load_bio"}, |
72 | {ERR_PACK(0,CONF_F_CONF_LOAD_FP,0), "CONF_load_fp"}, | 76 | {ERR_FUNC(CONF_F_CONF_LOAD_FP), "CONF_load_fp"}, |
73 | {ERR_PACK(0,CONF_F_CONF_MODULES_LOAD,0), "CONF_modules_load"}, | 77 | {ERR_FUNC(CONF_F_CONF_MODULES_LOAD), "CONF_modules_load"}, |
74 | {ERR_PACK(0,CONF_F_MODULE_INIT,0), "MODULE_INIT"}, | 78 | {ERR_FUNC(CONF_F_MODULE_INIT), "MODULE_INIT"}, |
75 | {ERR_PACK(0,CONF_F_MODULE_LOAD_DSO,0), "MODULE_LOAD_DSO"}, | 79 | {ERR_FUNC(CONF_F_MODULE_LOAD_DSO), "MODULE_LOAD_DSO"}, |
76 | {ERR_PACK(0,CONF_F_MODULE_RUN,0), "MODULE_RUN"}, | 80 | {ERR_FUNC(CONF_F_MODULE_RUN), "MODULE_RUN"}, |
77 | {ERR_PACK(0,CONF_F_NCONF_DUMP_BIO,0), "NCONF_dump_bio"}, | 81 | {ERR_FUNC(CONF_F_NCONF_DUMP_BIO), "NCONF_dump_bio"}, |
78 | {ERR_PACK(0,CONF_F_NCONF_DUMP_FP,0), "NCONF_dump_fp"}, | 82 | {ERR_FUNC(CONF_F_NCONF_DUMP_FP), "NCONF_dump_fp"}, |
79 | {ERR_PACK(0,CONF_F_NCONF_GET_NUMBER,0), "NCONF_get_number"}, | 83 | {ERR_FUNC(CONF_F_NCONF_GET_NUMBER), "NCONF_get_number"}, |
80 | {ERR_PACK(0,CONF_F_NCONF_GET_NUMBER_E,0), "NCONF_get_number_e"}, | 84 | {ERR_FUNC(CONF_F_NCONF_GET_NUMBER_E), "NCONF_get_number_e"}, |
81 | {ERR_PACK(0,CONF_F_NCONF_GET_SECTION,0), "NCONF_get_section"}, | 85 | {ERR_FUNC(CONF_F_NCONF_GET_SECTION), "NCONF_get_section"}, |
82 | {ERR_PACK(0,CONF_F_NCONF_GET_STRING,0), "NCONF_get_string"}, | 86 | {ERR_FUNC(CONF_F_NCONF_GET_STRING), "NCONF_get_string"}, |
83 | {ERR_PACK(0,CONF_F_NCONF_LOAD,0), "NCONF_load"}, | 87 | {ERR_FUNC(CONF_F_NCONF_LOAD), "NCONF_load"}, |
84 | {ERR_PACK(0,CONF_F_NCONF_LOAD_BIO,0), "NCONF_load_bio"}, | 88 | {ERR_FUNC(CONF_F_NCONF_LOAD_BIO), "NCONF_load_bio"}, |
85 | {ERR_PACK(0,CONF_F_NCONF_LOAD_FP,0), "NCONF_load_fp"}, | 89 | {ERR_FUNC(CONF_F_NCONF_LOAD_FP), "NCONF_load_fp"}, |
86 | {ERR_PACK(0,CONF_F_NCONF_NEW,0), "NCONF_new"}, | 90 | {ERR_FUNC(CONF_F_NCONF_NEW), "NCONF_new"}, |
87 | {ERR_PACK(0,CONF_F_STR_COPY,0), "STR_COPY"}, | 91 | {ERR_FUNC(CONF_F_STR_COPY), "STR_COPY"}, |
88 | {0,NULL} | 92 | {0,NULL} |
89 | }; | 93 | }; |
90 | 94 | ||
91 | static ERR_STRING_DATA CONF_str_reasons[]= | 95 | static ERR_STRING_DATA CONF_str_reasons[]= |
92 | { | 96 | { |
93 | {CONF_R_ERROR_LOADING_DSO ,"error loading dso"}, | 97 | {ERR_REASON(CONF_R_ERROR_LOADING_DSO) ,"error loading dso"}, |
94 | {CONF_R_MISSING_CLOSE_SQUARE_BRACKET ,"missing close square bracket"}, | 98 | {ERR_REASON(CONF_R_MISSING_CLOSE_SQUARE_BRACKET),"missing close square bracket"}, |
95 | {CONF_R_MISSING_EQUAL_SIGN ,"missing equal sign"}, | 99 | {ERR_REASON(CONF_R_MISSING_EQUAL_SIGN) ,"missing equal sign"}, |
96 | {CONF_R_MISSING_FINISH_FUNCTION ,"missing finish function"}, | 100 | {ERR_REASON(CONF_R_MISSING_FINISH_FUNCTION),"missing finish function"}, |
97 | {CONF_R_MISSING_INIT_FUNCTION ,"missing init function"}, | 101 | {ERR_REASON(CONF_R_MISSING_INIT_FUNCTION),"missing init function"}, |
98 | {CONF_R_MODULE_INITIALIZATION_ERROR ,"module initialization error"}, | 102 | {ERR_REASON(CONF_R_MODULE_INITIALIZATION_ERROR),"module initialization error"}, |
99 | {CONF_R_NO_CLOSE_BRACE ,"no close brace"}, | 103 | {ERR_REASON(CONF_R_NO_CLOSE_BRACE) ,"no close brace"}, |
100 | {CONF_R_NO_CONF ,"no conf"}, | 104 | {ERR_REASON(CONF_R_NO_CONF) ,"no conf"}, |
101 | {CONF_R_NO_CONF_OR_ENVIRONMENT_VARIABLE ,"no conf or environment variable"}, | 105 | {ERR_REASON(CONF_R_NO_CONF_OR_ENVIRONMENT_VARIABLE),"no conf or environment variable"}, |
102 | {CONF_R_NO_SECTION ,"no section"}, | 106 | {ERR_REASON(CONF_R_NO_SECTION) ,"no section"}, |
103 | {CONF_R_NO_SUCH_FILE ,"no such file"}, | 107 | {ERR_REASON(CONF_R_NO_SUCH_FILE) ,"no such file"}, |
104 | {CONF_R_NO_VALUE ,"no value"}, | 108 | {ERR_REASON(CONF_R_NO_VALUE) ,"no value"}, |
105 | {CONF_R_UNABLE_TO_CREATE_NEW_SECTION ,"unable to create new section"}, | 109 | {ERR_REASON(CONF_R_UNABLE_TO_CREATE_NEW_SECTION),"unable to create new section"}, |
106 | {CONF_R_UNKNOWN_MODULE_NAME ,"unknown module name"}, | 110 | {ERR_REASON(CONF_R_UNKNOWN_MODULE_NAME) ,"unknown module name"}, |
107 | {CONF_R_VARIABLE_HAS_NO_VALUE ,"variable has no value"}, | 111 | {ERR_REASON(CONF_R_VARIABLE_HAS_NO_VALUE),"variable has no value"}, |
108 | {0,NULL} | 112 | {0,NULL} |
109 | }; | 113 | }; |
110 | 114 | ||
@@ -118,8 +122,8 @@ void ERR_load_CONF_strings(void) | |||
118 | { | 122 | { |
119 | init=0; | 123 | init=0; |
120 | #ifndef OPENSSL_NO_ERR | 124 | #ifndef OPENSSL_NO_ERR |
121 | ERR_load_strings(ERR_LIB_CONF,CONF_str_functs); | 125 | ERR_load_strings(0,CONF_str_functs); |
122 | ERR_load_strings(ERR_LIB_CONF,CONF_str_reasons); | 126 | ERR_load_strings(0,CONF_str_reasons); |
123 | #endif | 127 | #endif |
124 | 128 | ||
125 | } | 129 | } |
diff --git a/src/lib/libcrypto/cpt_err.c b/src/lib/libcrypto/cpt_err.c index 1b4a1cb4d4..06a6109cce 100644 --- a/src/lib/libcrypto/cpt_err.c +++ b/src/lib/libcrypto/cpt_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/cpt_err.c */ | 1 | /* crypto/cpt_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,23 +64,27 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_CRYPTO,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_CRYPTO,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA CRYPTO_str_functs[]= | 71 | static ERR_STRING_DATA CRYPTO_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,CRYPTO_F_CRYPTO_GET_EX_NEW_INDEX,0), "CRYPTO_get_ex_new_index"}, | 73 | {ERR_FUNC(CRYPTO_F_CRYPTO_GET_EX_NEW_INDEX), "CRYPTO_get_ex_new_index"}, |
70 | {ERR_PACK(0,CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,0), "CRYPTO_get_new_dynlockid"}, | 74 | {ERR_FUNC(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID), "CRYPTO_get_new_dynlockid"}, |
71 | {ERR_PACK(0,CRYPTO_F_CRYPTO_GET_NEW_LOCKID,0), "CRYPTO_get_new_lockid"}, | 75 | {ERR_FUNC(CRYPTO_F_CRYPTO_GET_NEW_LOCKID), "CRYPTO_get_new_lockid"}, |
72 | {ERR_PACK(0,CRYPTO_F_CRYPTO_SET_EX_DATA,0), "CRYPTO_set_ex_data"}, | 76 | {ERR_FUNC(CRYPTO_F_CRYPTO_SET_EX_DATA), "CRYPTO_set_ex_data"}, |
73 | {ERR_PACK(0,CRYPTO_F_DEF_ADD_INDEX,0), "DEF_ADD_INDEX"}, | 77 | {ERR_FUNC(CRYPTO_F_DEF_ADD_INDEX), "DEF_ADD_INDEX"}, |
74 | {ERR_PACK(0,CRYPTO_F_DEF_GET_CLASS,0), "DEF_GET_CLASS"}, | 78 | {ERR_FUNC(CRYPTO_F_DEF_GET_CLASS), "DEF_GET_CLASS"}, |
75 | {ERR_PACK(0,CRYPTO_F_INT_DUP_EX_DATA,0), "INT_DUP_EX_DATA"}, | 79 | {ERR_FUNC(CRYPTO_F_INT_DUP_EX_DATA), "INT_DUP_EX_DATA"}, |
76 | {ERR_PACK(0,CRYPTO_F_INT_FREE_EX_DATA,0), "INT_FREE_EX_DATA"}, | 80 | {ERR_FUNC(CRYPTO_F_INT_FREE_EX_DATA), "INT_FREE_EX_DATA"}, |
77 | {ERR_PACK(0,CRYPTO_F_INT_NEW_EX_DATA,0), "INT_NEW_EX_DATA"}, | 81 | {ERR_FUNC(CRYPTO_F_INT_NEW_EX_DATA), "INT_NEW_EX_DATA"}, |
78 | {0,NULL} | 82 | {0,NULL} |
79 | }; | 83 | }; |
80 | 84 | ||
81 | static ERR_STRING_DATA CRYPTO_str_reasons[]= | 85 | static ERR_STRING_DATA CRYPTO_str_reasons[]= |
82 | { | 86 | { |
83 | {CRYPTO_R_NO_DYNLOCK_CREATE_CALLBACK ,"no dynlock create callback"}, | 87 | {ERR_REASON(CRYPTO_R_NO_DYNLOCK_CREATE_CALLBACK),"no dynlock create callback"}, |
84 | {0,NULL} | 88 | {0,NULL} |
85 | }; | 89 | }; |
86 | 90 | ||
@@ -94,8 +98,8 @@ void ERR_load_CRYPTO_strings(void) | |||
94 | { | 98 | { |
95 | init=0; | 99 | init=0; |
96 | #ifndef OPENSSL_NO_ERR | 100 | #ifndef OPENSSL_NO_ERR |
97 | ERR_load_strings(ERR_LIB_CRYPTO,CRYPTO_str_functs); | 101 | ERR_load_strings(0,CRYPTO_str_functs); |
98 | ERR_load_strings(ERR_LIB_CRYPTO,CRYPTO_str_reasons); | 102 | ERR_load_strings(0,CRYPTO_str_reasons); |
99 | #endif | 103 | #endif |
100 | 104 | ||
101 | } | 105 | } |
diff --git a/src/lib/libcrypto/cryptlib.c b/src/lib/libcrypto/cryptlib.c index fef0afb29f..e63bbe8dba 100644 --- a/src/lib/libcrypto/cryptlib.c +++ b/src/lib/libcrypto/cryptlib.c | |||
@@ -480,6 +480,8 @@ const char *CRYPTO_get_lock_name(int type) | |||
480 | return(sk_value(app_locks,type-CRYPTO_NUM_LOCKS)); | 480 | return(sk_value(app_locks,type-CRYPTO_NUM_LOCKS)); |
481 | } | 481 | } |
482 | 482 | ||
483 | int OPENSSL_NONPIC_relocated=0; | ||
484 | |||
483 | #if defined(_WIN32) && defined(_WINDLL) | 485 | #if defined(_WIN32) && defined(_WINDLL) |
484 | 486 | ||
485 | /* All we really need to do is remove the 'error' state when a thread | 487 | /* All we really need to do is remove the 'error' state when a thread |
@@ -491,6 +493,21 @@ BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, | |||
491 | switch(fdwReason) | 493 | switch(fdwReason) |
492 | { | 494 | { |
493 | case DLL_PROCESS_ATTACH: | 495 | case DLL_PROCESS_ATTACH: |
496 | #if defined(_WIN32_WINNT) | ||
497 | { | ||
498 | IMAGE_DOS_HEADER *dos_header = (IMAGE_DOS_HEADER *)hinstDLL; | ||
499 | IMAGE_NT_HEADERS *nt_headers; | ||
500 | |||
501 | if (dos_header->e_magic==IMAGE_DOS_SIGNATURE) | ||
502 | { | ||
503 | nt_headers = (IMAGE_NT_HEADERS *)((char *)dos_header | ||
504 | + dos_header->e_lfanew); | ||
505 | if (nt_headers->Signature==IMAGE_NT_SIGNATURE && | ||
506 | hinstDLL!=(HINSTANCE)(nt_headers->OptionalHeader.ImageBase)) | ||
507 | OPENSSL_NONPIC_relocated=1; | ||
508 | } | ||
509 | } | ||
510 | #endif | ||
494 | break; | 511 | break; |
495 | case DLL_THREAD_ATTACH: | 512 | case DLL_THREAD_ATTACH: |
496 | break; | 513 | break; |
@@ -504,18 +521,160 @@ BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, | |||
504 | } | 521 | } |
505 | #endif | 522 | #endif |
506 | 523 | ||
524 | #if defined(_WIN32) | ||
525 | #include <tchar.h> | ||
526 | |||
527 | #if defined(_WIN32_WINNT) && _WIN32_WINNT>=0x0333 | ||
528 | static int IsService(void) | ||
529 | { HWINSTA h; | ||
530 | DWORD len; | ||
531 | WCHAR *name; | ||
532 | |||
533 | (void)GetDesktopWindow(); /* return value is ignored */ | ||
534 | |||
535 | h = GetProcessWindowStation(); | ||
536 | if (h==NULL) return -1; | ||
537 | |||
538 | if (GetUserObjectInformationW (h,UOI_NAME,NULL,0,&len) || | ||
539 | GetLastError() != ERROR_INSUFFICIENT_BUFFER) | ||
540 | return -1; | ||
541 | |||
542 | if (len>512) return -1; /* paranoia */ | ||
543 | len++,len&=~1; /* paranoia */ | ||
544 | #ifdef _MSC_VER | ||
545 | name=(WCHAR *)_alloca(len+sizeof(WCHAR)); | ||
546 | #else | ||
547 | name=(WCHAR *)alloca(len+sizeof(WCHAR)); | ||
548 | #endif | ||
549 | if (!GetUserObjectInformationW (h,UOI_NAME,name,len,&len)) | ||
550 | return -1; | ||
551 | |||
552 | len++,len&=~1; /* paranoia */ | ||
553 | name[len/sizeof(WCHAR)]=L'\0'; /* paranoia */ | ||
554 | #if 1 | ||
555 | /* This doesn't cover "interactive" services [working with real | ||
556 | * WinSta0's] nor programs started non-interactively by Task | ||
557 | * Scheduler [those are working with SAWinSta]. */ | ||
558 | if (wcsstr(name,L"Service-0x")) return 1; | ||
559 | #else | ||
560 | /* This covers all non-interactive programs such as services. */ | ||
561 | if (!wcsstr(name,L"WinSta0")) return 1; | ||
562 | #endif | ||
563 | else return 0; | ||
564 | } | ||
565 | #endif | ||
566 | |||
567 | void OPENSSL_showfatal (const char *fmta,...) | ||
568 | { va_list ap; | ||
569 | TCHAR buf[256]; | ||
570 | const TCHAR *fmt; | ||
571 | HANDLE h; | ||
572 | |||
573 | if ((h=GetStdHandle(STD_ERROR_HANDLE)) != NULL && | ||
574 | GetFileType(h)!=FILE_TYPE_UNKNOWN) | ||
575 | { /* must be console application */ | ||
576 | va_start (ap,fmta); | ||
577 | vfprintf (stderr,fmta,ap); | ||
578 | va_end (ap); | ||
579 | return; | ||
580 | } | ||
581 | |||
582 | if (sizeof(TCHAR)==sizeof(char)) | ||
583 | fmt=(const TCHAR *)fmta; | ||
584 | else do | ||
585 | { int keepgoing; | ||
586 | size_t len_0=strlen(fmta)+1,i; | ||
587 | WCHAR *fmtw; | ||
588 | |||
589 | #ifdef _MSC_VER | ||
590 | fmtw = (WCHAR *)_alloca (len_0*sizeof(WCHAR)); | ||
591 | #else | ||
592 | fmtw = (WCHAR *)alloca (len_0*sizeof(WCHAR)); | ||
593 | #endif | ||
594 | if (fmtw == NULL) { fmt=(const TCHAR *)L"no stack?"; break; } | ||
595 | |||
596 | #ifndef OPENSSL_NO_MULTIBYTE | ||
597 | if (!MultiByteToWideChar(CP_ACP,0,fmta,len_0,fmtw,len_0)) | ||
598 | #endif | ||
599 | for (i=0;i<len_0;i++) fmtw[i]=(WCHAR)fmta[i]; | ||
600 | |||
601 | for (i=0;i<len_0;i++) | ||
602 | { if (fmtw[i]==L'%') do | ||
603 | { keepgoing=0; | ||
604 | switch (fmtw[i+1]) | ||
605 | { case L'0': case L'1': case L'2': case L'3': case L'4': | ||
606 | case L'5': case L'6': case L'7': case L'8': case L'9': | ||
607 | case L'.': case L'*': | ||
608 | case L'-': i++; keepgoing=1; break; | ||
609 | case L's': fmtw[i+1]=L'S'; break; | ||
610 | case L'S': fmtw[i+1]=L's'; break; | ||
611 | case L'c': fmtw[i+1]=L'C'; break; | ||
612 | case L'C': fmtw[i+1]=L'c'; break; | ||
613 | } | ||
614 | } while (keepgoing); | ||
615 | } | ||
616 | fmt = (const TCHAR *)fmtw; | ||
617 | } while (0); | ||
618 | |||
619 | va_start (ap,fmta); | ||
620 | _vsntprintf (buf,sizeof(buf)/sizeof(TCHAR)-1,fmt,ap); | ||
621 | buf [sizeof(buf)/sizeof(TCHAR)-1] = _T('\0'); | ||
622 | va_end (ap); | ||
623 | |||
624 | #if defined(_WIN32_WINNT) && _WIN32_WINNT>=0x0333 | ||
625 | /* this -------------v--- guards NT-specific calls */ | ||
626 | if (GetVersion() < 0x80000000 && IsService()) | ||
627 | { HANDLE h = RegisterEventSource(0,_T("OPENSSL")); | ||
628 | const TCHAR *pmsg=buf; | ||
629 | ReportEvent(h,EVENTLOG_ERROR_TYPE,0,0,0,1,0,&pmsg,0); | ||
630 | DeregisterEventSource(h); | ||
631 | } | ||
632 | else | ||
633 | #endif | ||
634 | { MSGBOXPARAMS m; | ||
635 | |||
636 | m.cbSize = sizeof(m); | ||
637 | m.hwndOwner = NULL; | ||
638 | m.lpszCaption = _T("OpenSSL: FATAL"); | ||
639 | m.dwStyle = MB_OK; | ||
640 | m.hInstance = NULL; | ||
641 | m.lpszIcon = IDI_ERROR; | ||
642 | m.dwContextHelpId = 0; | ||
643 | m.lpfnMsgBoxCallback = NULL; | ||
644 | m.dwLanguageId = MAKELANGID(LANG_ENGLISH,SUBLANG_ENGLISH_US); | ||
645 | m.lpszText = buf; | ||
646 | |||
647 | MessageBoxIndirect (&m); | ||
648 | } | ||
649 | } | ||
650 | #else | ||
651 | void OPENSSL_showfatal (const char *fmta,...) | ||
652 | { va_list ap; | ||
653 | |||
654 | va_start (ap,fmta); | ||
655 | vfprintf (stderr,fmta,ap); | ||
656 | va_end (ap); | ||
657 | } | ||
658 | #endif | ||
659 | |||
507 | void OpenSSLDie(const char *file,int line,const char *assertion) | 660 | void OpenSSLDie(const char *file,int line,const char *assertion) |
508 | { | 661 | { |
509 | fprintf(stderr, | 662 | OPENSSL_showfatal( |
510 | "%s(%d): OpenSSL internal error, assertion failed: %s\n", | 663 | "%s(%d): OpenSSL internal error, assertion failed: %s\n", |
511 | file,line,assertion); | 664 | file,line,assertion); |
512 | abort(); | 665 | abort(); |
513 | } | 666 | } |
514 | 667 | ||
668 | void *OPENSSL_stderr(void) { return stderr; } | ||
669 | |||
515 | #ifdef OPENSSL_FIPS | 670 | #ifdef OPENSSL_FIPS |
671 | |||
672 | void fips_w_lock(void) { CRYPTO_w_lock(CRYPTO_LOCK_FIPS); } | ||
673 | void fips_w_unlock(void) { CRYPTO_w_unlock(CRYPTO_LOCK_FIPS); } | ||
674 | void fips_r_lock(void) { CRYPTO_r_lock(CRYPTO_LOCK_FIPS); } | ||
675 | void fips_r_unlock(void) { CRYPTO_r_unlock(CRYPTO_LOCK_FIPS); } | ||
676 | |||
516 | static int fips_started = 0; | 677 | static int fips_started = 0; |
517 | static int fips_mode = 0; | ||
518 | static void *fips_rand_check = 0; | ||
519 | static unsigned long fips_thread = 0; | 678 | static unsigned long fips_thread = 0; |
520 | 679 | ||
521 | void fips_set_started(void) | 680 | void fips_set_started(void) |
@@ -576,57 +735,10 @@ int fips_clear_owning_thread(void) | |||
576 | return ret; | 735 | return ret; |
577 | } | 736 | } |
578 | 737 | ||
579 | void fips_set_mode(int onoff) | 738 | unsigned char *fips_signature_witness(void) |
580 | { | ||
581 | int owning_thread = fips_is_owning_thread(); | ||
582 | |||
583 | if (fips_is_started()) | ||
584 | { | ||
585 | if (!owning_thread) CRYPTO_w_lock(CRYPTO_LOCK_FIPS); | ||
586 | fips_mode = onoff; | ||
587 | if (!owning_thread) CRYPTO_w_unlock(CRYPTO_LOCK_FIPS); | ||
588 | } | ||
589 | } | ||
590 | |||
591 | void fips_set_rand_check(void *rand_check) | ||
592 | { | ||
593 | int owning_thread = fips_is_owning_thread(); | ||
594 | |||
595 | if (fips_is_started()) | ||
596 | { | ||
597 | if (!owning_thread) CRYPTO_w_lock(CRYPTO_LOCK_FIPS); | ||
598 | fips_rand_check = rand_check; | ||
599 | if (!owning_thread) CRYPTO_w_unlock(CRYPTO_LOCK_FIPS); | ||
600 | } | ||
601 | } | ||
602 | |||
603 | int FIPS_mode(void) | ||
604 | { | ||
605 | int ret = 0; | ||
606 | int owning_thread = fips_is_owning_thread(); | ||
607 | |||
608 | if (fips_is_started()) | ||
609 | { | ||
610 | if (!owning_thread) CRYPTO_r_lock(CRYPTO_LOCK_FIPS); | ||
611 | ret = fips_mode; | ||
612 | if (!owning_thread) CRYPTO_r_unlock(CRYPTO_LOCK_FIPS); | ||
613 | } | ||
614 | return ret; | ||
615 | } | ||
616 | |||
617 | void *FIPS_rand_check(void) | ||
618 | { | 739 | { |
619 | void *ret = 0; | 740 | extern unsigned char FIPS_signature[]; |
620 | int owning_thread = fips_is_owning_thread(); | 741 | return FIPS_signature; |
621 | |||
622 | if (fips_is_started()) | ||
623 | { | ||
624 | if (!owning_thread) CRYPTO_r_lock(CRYPTO_LOCK_FIPS); | ||
625 | ret = fips_rand_check; | ||
626 | if (!owning_thread) CRYPTO_r_unlock(CRYPTO_LOCK_FIPS); | ||
627 | } | ||
628 | return ret; | ||
629 | } | 742 | } |
630 | |||
631 | #endif /* OPENSSL_FIPS */ | 743 | #endif /* OPENSSL_FIPS */ |
632 | 744 | ||
diff --git a/src/lib/libcrypto/cryptlib.h b/src/lib/libcrypto/cryptlib.h index 0d6b9d59f0..6f59e08ca6 100644 --- a/src/lib/libcrypto/cryptlib.h +++ b/src/lib/libcrypto/cryptlib.h | |||
@@ -93,6 +93,10 @@ extern "C" { | |||
93 | #define DECIMAL_SIZE(type) ((sizeof(type)*8+2)/3+1) | 93 | #define DECIMAL_SIZE(type) ((sizeof(type)*8+2)/3+1) |
94 | #define HEX_SIZE(type) (sizeof(type)*2) | 94 | #define HEX_SIZE(type) (sizeof(type)*2) |
95 | 95 | ||
96 | void OPENSSL_showfatal(const char *,...); | ||
97 | void *OPENSSL_stderr(void); | ||
98 | extern int OPENSSL_NONPIC_relocated; | ||
99 | |||
96 | #ifdef __cplusplus | 100 | #ifdef __cplusplus |
97 | } | 101 | } |
98 | #endif | 102 | #endif |
diff --git a/src/lib/libcrypto/crypto.h b/src/lib/libcrypto/crypto.h index 4d1dfac7f1..22fd939e65 100644 --- a/src/lib/libcrypto/crypto.h +++ b/src/lib/libcrypto/crypto.h | |||
@@ -434,12 +434,9 @@ void CRYPTO_mem_leaks_cb(CRYPTO_MEM_LEAK_CB *cb); | |||
434 | 434 | ||
435 | /* die if we have to */ | 435 | /* die if we have to */ |
436 | void OpenSSLDie(const char *file,int line,const char *assertion); | 436 | void OpenSSLDie(const char *file,int line,const char *assertion); |
437 | #define OPENSSL_assert(e) ((e) ? (void)0 : OpenSSLDie(__FILE__, __LINE__, #e)) | 437 | #define OPENSSL_assert(e) (void)((e) ? 0 : (OpenSSLDie(__FILE__, __LINE__, #e),1)) |
438 | 438 | ||
439 | #ifdef OPENSSL_FIPS | 439 | #ifdef OPENSSL_FIPS |
440 | int FIPS_mode(void); | ||
441 | void *FIPS_rand_check(void); | ||
442 | |||
443 | #define FIPS_ERROR_IGNORED(alg) OpenSSLDie(__FILE__, __LINE__, \ | 440 | #define FIPS_ERROR_IGNORED(alg) OpenSSLDie(__FILE__, __LINE__, \ |
444 | alg " previous FIPS forbidden algorithm error ignored"); | 441 | alg " previous FIPS forbidden algorithm error ignored"); |
445 | 442 | ||
diff --git a/src/lib/libcrypto/des/des_locl.h b/src/lib/libcrypto/des/des_locl.h index e44e8e98b2..8f04b18c50 100644 --- a/src/lib/libcrypto/des/des_locl.h +++ b/src/lib/libcrypto/des/des_locl.h | |||
@@ -421,7 +421,7 @@ | |||
421 | PERM_OP(l,r,tt, 4,0x0f0f0f0fL); \ | 421 | PERM_OP(l,r,tt, 4,0x0f0f0f0fL); \ |
422 | } | 422 | } |
423 | 423 | ||
424 | OPENSSL_EXTERN const DES_LONG DES_SPtrans[8][64]; | 424 | extern const DES_LONG DES_SPtrans[8][64]; |
425 | 425 | ||
426 | void fcrypt_body(DES_LONG *out,DES_key_schedule *ks, | 426 | void fcrypt_body(DES_LONG *out,DES_key_schedule *ks, |
427 | DES_LONG Eswap0, DES_LONG Eswap1); | 427 | DES_LONG Eswap0, DES_LONG Eswap1); |
diff --git a/src/lib/libcrypto/dh/dh.h b/src/lib/libcrypto/dh/dh.h index 05851f8429..92c7481e10 100644 --- a/src/lib/libcrypto/dh/dh.h +++ b/src/lib/libcrypto/dh/dh.h | |||
@@ -70,7 +70,14 @@ | |||
70 | #include <openssl/crypto.h> | 70 | #include <openssl/crypto.h> |
71 | #include <openssl/ossl_typ.h> | 71 | #include <openssl/ossl_typ.h> |
72 | 72 | ||
73 | #define DH_FLAG_CACHE_MONT_P 0x01 | 73 | #define DH_FLAG_CACHE_MONT_P 0x01 |
74 | #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH | ||
75 | * implementation now uses constant time | ||
76 | * modular exponentiation for secret exponents | ||
77 | * by default. This flag causes the | ||
78 | * faster variable sliding window method to | ||
79 | * be used for all exponents. | ||
80 | */ | ||
74 | 81 | ||
75 | #ifdef __cplusplus | 82 | #ifdef __cplusplus |
76 | extern "C" { | 83 | extern "C" { |
diff --git a/src/lib/libcrypto/dh/dh_err.c b/src/lib/libcrypto/dh/dh_err.c index c2715044c9..83ccb41221 100644 --- a/src/lib/libcrypto/dh/dh_err.c +++ b/src/lib/libcrypto/dh/dh_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/dh/dh_err.c */ | 1 | /* crypto/dh/dh_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2003 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,21 +64,25 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_DH,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_DH,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA DH_str_functs[]= | 71 | static ERR_STRING_DATA DH_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,DH_F_DHPARAMS_PRINT,0), "DHparams_print"}, | 73 | {ERR_FUNC(DH_F_DHPARAMS_PRINT), "DHparams_print"}, |
70 | {ERR_PACK(0,DH_F_DHPARAMS_PRINT_FP,0), "DHparams_print_fp"}, | 74 | {ERR_FUNC(DH_F_DHPARAMS_PRINT_FP), "DHparams_print_fp"}, |
71 | {ERR_PACK(0,DH_F_DH_COMPUTE_KEY,0), "DH_compute_key"}, | 75 | {ERR_FUNC(DH_F_DH_COMPUTE_KEY), "DH_compute_key"}, |
72 | {ERR_PACK(0,DH_F_DH_GENERATE_KEY,0), "DH_generate_key"}, | 76 | {ERR_FUNC(DH_F_DH_GENERATE_KEY), "DH_generate_key"}, |
73 | {ERR_PACK(0,DH_F_DH_GENERATE_PARAMETERS,0), "DH_generate_parameters"}, | 77 | {ERR_FUNC(DH_F_DH_GENERATE_PARAMETERS), "DH_generate_parameters"}, |
74 | {ERR_PACK(0,DH_F_DH_NEW_METHOD,0), "DH_new_method"}, | 78 | {ERR_FUNC(DH_F_DH_NEW_METHOD), "DH_new_method"}, |
75 | {0,NULL} | 79 | {0,NULL} |
76 | }; | 80 | }; |
77 | 81 | ||
78 | static ERR_STRING_DATA DH_str_reasons[]= | 82 | static ERR_STRING_DATA DH_str_reasons[]= |
79 | { | 83 | { |
80 | {DH_R_BAD_GENERATOR ,"bad generator"}, | 84 | {ERR_REASON(DH_R_BAD_GENERATOR) ,"bad generator"}, |
81 | {DH_R_NO_PRIVATE_VALUE ,"no private value"}, | 85 | {ERR_REASON(DH_R_NO_PRIVATE_VALUE) ,"no private value"}, |
82 | {0,NULL} | 86 | {0,NULL} |
83 | }; | 87 | }; |
84 | 88 | ||
@@ -92,8 +96,8 @@ void ERR_load_DH_strings(void) | |||
92 | { | 96 | { |
93 | init=0; | 97 | init=0; |
94 | #ifndef OPENSSL_NO_ERR | 98 | #ifndef OPENSSL_NO_ERR |
95 | ERR_load_strings(ERR_LIB_DH,DH_str_functs); | 99 | ERR_load_strings(0,DH_str_functs); |
96 | ERR_load_strings(ERR_LIB_DH,DH_str_reasons); | 100 | ERR_load_strings(0,DH_str_reasons); |
97 | #endif | 101 | #endif |
98 | 102 | ||
99 | } | 103 | } |
diff --git a/src/lib/libcrypto/dh/dh_key.c b/src/lib/libcrypto/dh/dh_key.c index ff125c2296..3a39f7c8ca 100644 --- a/src/lib/libcrypto/dh/dh_key.c +++ b/src/lib/libcrypto/dh/dh_key.c | |||
@@ -105,7 +105,7 @@ static int generate_key(DH *dh) | |||
105 | int generate_new_key=0; | 105 | int generate_new_key=0; |
106 | unsigned l; | 106 | unsigned l; |
107 | BN_CTX *ctx; | 107 | BN_CTX *ctx; |
108 | BN_MONT_CTX *mont; | 108 | BN_MONT_CTX *mont=NULL; |
109 | BIGNUM *pub_key=NULL,*priv_key=NULL; | 109 | BIGNUM *pub_key=NULL,*priv_key=NULL; |
110 | 110 | ||
111 | ctx = BN_CTX_new(); | 111 | ctx = BN_CTX_new(); |
@@ -128,21 +128,37 @@ static int generate_key(DH *dh) | |||
128 | else | 128 | else |
129 | pub_key=dh->pub_key; | 129 | pub_key=dh->pub_key; |
130 | 130 | ||
131 | if ((dh->method_mont_p == NULL) && (dh->flags & DH_FLAG_CACHE_MONT_P)) | 131 | |
132 | if (dh->flags & DH_FLAG_CACHE_MONT_P) | ||
132 | { | 133 | { |
133 | if ((dh->method_mont_p=(char *)BN_MONT_CTX_new()) != NULL) | 134 | mont = BN_MONT_CTX_set_locked( |
134 | if (!BN_MONT_CTX_set((BN_MONT_CTX *)dh->method_mont_p, | 135 | (BN_MONT_CTX **)&dh->method_mont_p, |
135 | dh->p,ctx)) goto err; | 136 | CRYPTO_LOCK_DH, dh->p, ctx); |
137 | if (!mont) | ||
138 | goto err; | ||
136 | } | 139 | } |
137 | mont=(BN_MONT_CTX *)dh->method_mont_p; | ||
138 | 140 | ||
139 | if (generate_new_key) | 141 | if (generate_new_key) |
140 | { | 142 | { |
141 | l = dh->length ? dh->length : BN_num_bits(dh->p)-1; /* secret exponent length */ | 143 | l = dh->length ? dh->length : BN_num_bits(dh->p)-1; /* secret exponent length */ |
142 | if (!BN_rand(priv_key, l, 0, 0)) goto err; | 144 | if (!BN_rand(priv_key, l, 0, 0)) goto err; |
143 | } | 145 | } |
144 | if (!dh->meth->bn_mod_exp(dh, pub_key, dh->g, priv_key,dh->p,ctx,mont)) | 146 | |
145 | goto err; | 147 | { |
148 | BIGNUM local_prk; | ||
149 | BIGNUM *prk; | ||
150 | |||
151 | if ((dh->flags & DH_FLAG_NO_EXP_CONSTTIME) == 0) | ||
152 | { | ||
153 | BN_init(&local_prk); | ||
154 | prk = &local_prk; | ||
155 | BN_with_flags(prk, priv_key, BN_FLG_EXP_CONSTTIME); | ||
156 | } | ||
157 | else | ||
158 | prk = priv_key; | ||
159 | |||
160 | if (!dh->meth->bn_mod_exp(dh, pub_key, dh->g, prk, dh->p, ctx, mont)) goto err; | ||
161 | } | ||
146 | 162 | ||
147 | dh->pub_key=pub_key; | 163 | dh->pub_key=pub_key; |
148 | dh->priv_key=priv_key; | 164 | dh->priv_key=priv_key; |
@@ -160,7 +176,7 @@ err: | |||
160 | static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh) | 176 | static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh) |
161 | { | 177 | { |
162 | BN_CTX *ctx; | 178 | BN_CTX *ctx; |
163 | BN_MONT_CTX *mont; | 179 | BN_MONT_CTX *mont=NULL; |
164 | BIGNUM *tmp; | 180 | BIGNUM *tmp; |
165 | int ret= -1; | 181 | int ret= -1; |
166 | 182 | ||
@@ -174,14 +190,21 @@ static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh) | |||
174 | DHerr(DH_F_DH_COMPUTE_KEY,DH_R_NO_PRIVATE_VALUE); | 190 | DHerr(DH_F_DH_COMPUTE_KEY,DH_R_NO_PRIVATE_VALUE); |
175 | goto err; | 191 | goto err; |
176 | } | 192 | } |
177 | if ((dh->method_mont_p == NULL) && (dh->flags & DH_FLAG_CACHE_MONT_P)) | 193 | |
194 | if (dh->flags & DH_FLAG_CACHE_MONT_P) | ||
178 | { | 195 | { |
179 | if ((dh->method_mont_p=(char *)BN_MONT_CTX_new()) != NULL) | 196 | mont = BN_MONT_CTX_set_locked( |
180 | if (!BN_MONT_CTX_set((BN_MONT_CTX *)dh->method_mont_p, | 197 | (BN_MONT_CTX **)&dh->method_mont_p, |
181 | dh->p,ctx)) goto err; | 198 | CRYPTO_LOCK_DH, dh->p, ctx); |
199 | if ((dh->flags & DH_FLAG_NO_EXP_CONSTTIME) == 0) | ||
200 | { | ||
201 | /* XXX */ | ||
202 | BN_set_flags(dh->priv_key, BN_FLG_EXP_CONSTTIME); | ||
203 | } | ||
204 | if (!mont) | ||
205 | goto err; | ||
182 | } | 206 | } |
183 | 207 | ||
184 | mont=(BN_MONT_CTX *)dh->method_mont_p; | ||
185 | if (!dh->meth->bn_mod_exp(dh, tmp, pub_key, dh->priv_key,dh->p,ctx,mont)) | 208 | if (!dh->meth->bn_mod_exp(dh, tmp, pub_key, dh->priv_key,dh->p,ctx,mont)) |
186 | { | 209 | { |
187 | DHerr(DH_F_DH_COMPUTE_KEY,ERR_R_BN_LIB); | 210 | DHerr(DH_F_DH_COMPUTE_KEY,ERR_R_BN_LIB); |
@@ -190,8 +213,11 @@ static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh) | |||
190 | 213 | ||
191 | ret=BN_bn2bin(tmp,key); | 214 | ret=BN_bn2bin(tmp,key); |
192 | err: | 215 | err: |
193 | BN_CTX_end(ctx); | 216 | if (ctx != NULL) |
194 | BN_CTX_free(ctx); | 217 | { |
218 | BN_CTX_end(ctx); | ||
219 | BN_CTX_free(ctx); | ||
220 | } | ||
195 | return(ret); | 221 | return(ret); |
196 | } | 222 | } |
197 | 223 | ||
@@ -200,7 +226,10 @@ static int dh_bn_mod_exp(const DH *dh, BIGNUM *r, | |||
200 | const BIGNUM *m, BN_CTX *ctx, | 226 | const BIGNUM *m, BN_CTX *ctx, |
201 | BN_MONT_CTX *m_ctx) | 227 | BN_MONT_CTX *m_ctx) |
202 | { | 228 | { |
203 | if (a->top == 1) | 229 | /* If a is only one word long and constant time is false, use the faster |
230 | * exponenentiation function. | ||
231 | */ | ||
232 | if (a->top == 1 && ((dh->flags & DH_FLAG_NO_EXP_CONSTTIME) != 0)) | ||
204 | { | 233 | { |
205 | BN_ULONG A = a->d[0]; | 234 | BN_ULONG A = a->d[0]; |
206 | return BN_mod_exp_mont_word(r,A,p,m,ctx,m_ctx); | 235 | return BN_mod_exp_mont_word(r,A,p,m,ctx,m_ctx); |
diff --git a/src/lib/libcrypto/doc/EVP_EncryptInit.pod b/src/lib/libcrypto/doc/EVP_EncryptInit.pod index 40e525dd56..8271d3dfc4 100644 --- a/src/lib/libcrypto/doc/EVP_EncryptInit.pod +++ b/src/lib/libcrypto/doc/EVP_EncryptInit.pod | |||
@@ -22,7 +22,7 @@ EVP_CIPHER_CTX_set_padding - EVP cipher routines | |||
22 | 22 | ||
23 | #include <openssl/evp.h> | 23 | #include <openssl/evp.h> |
24 | 24 | ||
25 | int EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a); | 25 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a); |
26 | 26 | ||
27 | int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, | 27 | int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, |
28 | ENGINE *impl, unsigned char *key, unsigned char *iv); | 28 | ENGINE *impl, unsigned char *key, unsigned char *iv); |
@@ -236,8 +236,8 @@ RC5 can be set. | |||
236 | 236 | ||
237 | =head1 RETURN VALUES | 237 | =head1 RETURN VALUES |
238 | 238 | ||
239 | EVP_CIPHER_CTX_init, EVP_EncryptInit_ex(), EVP_EncryptUpdate() and | 239 | EVP_EncryptInit_ex(), EVP_EncryptUpdate() and EVP_EncryptFinal_ex() |
240 | EVP_EncryptFinal_ex() return 1 for success and 0 for failure. | 240 | return 1 for success and 0 for failure. |
241 | 241 | ||
242 | EVP_DecryptInit_ex() and EVP_DecryptUpdate() return 1 for success and 0 for failure. | 242 | EVP_DecryptInit_ex() and EVP_DecryptUpdate() return 1 for success and 0 for failure. |
243 | EVP_DecryptFinal_ex() returns 0 if the decrypt failed or 1 for success. | 243 | EVP_DecryptFinal_ex() returns 0 if the decrypt failed or 1 for success. |
diff --git a/src/lib/libcrypto/doc/OPENSSL_config.pod b/src/lib/libcrypto/doc/OPENSSL_config.pod index 16600620cc..e7bba2aaca 100644 --- a/src/lib/libcrypto/doc/OPENSSL_config.pod +++ b/src/lib/libcrypto/doc/OPENSSL_config.pod | |||
@@ -35,7 +35,7 @@ calls OPENSSL_add_all_algorithms() by compiling an application with the | |||
35 | preprocessor symbol B<OPENSSL_LOAD_CONF> #define'd. In this way configuration | 35 | preprocessor symbol B<OPENSSL_LOAD_CONF> #define'd. In this way configuration |
36 | can be added without source changes. | 36 | can be added without source changes. |
37 | 37 | ||
38 | The environment variable B<OPENSSL_CONFIG> can be set to specify the location | 38 | The environment variable B<OPENSSL_CONF> can be set to specify the location |
39 | of the configuration file. | 39 | of the configuration file. |
40 | 40 | ||
41 | Currently ASN1 OBJECTs and ENGINE configuration can be performed future | 41 | Currently ASN1 OBJECTs and ENGINE configuration can be performed future |
diff --git a/src/lib/libcrypto/doc/PKCS7_verify.pod b/src/lib/libcrypto/doc/PKCS7_verify.pod index 07c9fdad40..3490b5dc82 100644 --- a/src/lib/libcrypto/doc/PKCS7_verify.pod +++ b/src/lib/libcrypto/doc/PKCS7_verify.pod | |||
@@ -8,7 +8,7 @@ PKCS7_verify - verify a PKCS#7 signedData structure | |||
8 | 8 | ||
9 | int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, BIO *indata, BIO *out, int flags); | 9 | int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, BIO *indata, BIO *out, int flags); |
10 | 10 | ||
11 | int PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); | 11 | STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); |
12 | 12 | ||
13 | =head1 DESCRIPTION | 13 | =head1 DESCRIPTION |
14 | 14 | ||
diff --git a/src/lib/libcrypto/dsa/dsa.h b/src/lib/libcrypto/dsa/dsa.h index 225ff391f9..851e3f0445 100644 --- a/src/lib/libcrypto/dsa/dsa.h +++ b/src/lib/libcrypto/dsa/dsa.h | |||
@@ -80,6 +80,20 @@ | |||
80 | #endif | 80 | #endif |
81 | 81 | ||
82 | #define DSA_FLAG_CACHE_MONT_P 0x01 | 82 | #define DSA_FLAG_CACHE_MONT_P 0x01 |
83 | #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA | ||
84 | * implementation now uses constant time | ||
85 | * modular exponentiation for secret exponents | ||
86 | * by default. This flag causes the | ||
87 | * faster variable sliding window method to | ||
88 | * be used for all exponents. | ||
89 | */ | ||
90 | |||
91 | /* If this flag is set external DSA_METHOD callbacks are allowed in FIPS mode | ||
92 | * it is then the applications responsibility to ensure the external method | ||
93 | * is compliant. | ||
94 | */ | ||
95 | |||
96 | #define DSA_FLAG_FIPS_EXTERNAL_METHOD_ALLOW 0x04 | ||
83 | 97 | ||
84 | #if defined(OPENSSL_FIPS) | 98 | #if defined(OPENSSL_FIPS) |
85 | #define FIPS_DSA_SIZE_T int | 99 | #define FIPS_DSA_SIZE_T int |
diff --git a/src/lib/libcrypto/dsa/dsa_err.c b/src/lib/libcrypto/dsa/dsa_err.c index 79aa4ff526..fd42053572 100644 --- a/src/lib/libcrypto/dsa/dsa_err.c +++ b/src/lib/libcrypto/dsa/dsa_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/dsa/dsa_err.c */ | 1 | /* crypto/dsa/dsa_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,29 +64,33 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_DSA,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_DSA,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA DSA_str_functs[]= | 71 | static ERR_STRING_DATA DSA_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,DSA_F_D2I_DSA_SIG,0), "d2i_DSA_SIG"}, | 73 | {ERR_FUNC(DSA_F_D2I_DSA_SIG), "d2i_DSA_SIG"}, |
70 | {ERR_PACK(0,DSA_F_DSAPARAMS_PRINT,0), "DSAparams_print"}, | 74 | {ERR_FUNC(DSA_F_DSAPARAMS_PRINT), "DSAparams_print"}, |
71 | {ERR_PACK(0,DSA_F_DSAPARAMS_PRINT_FP,0), "DSAparams_print_fp"}, | 75 | {ERR_FUNC(DSA_F_DSAPARAMS_PRINT_FP), "DSAparams_print_fp"}, |
72 | {ERR_PACK(0,DSA_F_DSA_DO_SIGN,0), "DSA_do_sign"}, | 76 | {ERR_FUNC(DSA_F_DSA_DO_SIGN), "DSA_do_sign"}, |
73 | {ERR_PACK(0,DSA_F_DSA_DO_VERIFY,0), "DSA_do_verify"}, | 77 | {ERR_FUNC(DSA_F_DSA_DO_VERIFY), "DSA_do_verify"}, |
74 | {ERR_PACK(0,DSA_F_DSA_NEW_METHOD,0), "DSA_new_method"}, | 78 | {ERR_FUNC(DSA_F_DSA_NEW_METHOD), "DSA_new_method"}, |
75 | {ERR_PACK(0,DSA_F_DSA_PRINT,0), "DSA_print"}, | 79 | {ERR_FUNC(DSA_F_DSA_PRINT), "DSA_print"}, |
76 | {ERR_PACK(0,DSA_F_DSA_PRINT_FP,0), "DSA_print_fp"}, | 80 | {ERR_FUNC(DSA_F_DSA_PRINT_FP), "DSA_print_fp"}, |
77 | {ERR_PACK(0,DSA_F_DSA_SIGN,0), "DSA_sign"}, | 81 | {ERR_FUNC(DSA_F_DSA_SIGN), "DSA_sign"}, |
78 | {ERR_PACK(0,DSA_F_DSA_SIGN_SETUP,0), "DSA_sign_setup"}, | 82 | {ERR_FUNC(DSA_F_DSA_SIGN_SETUP), "DSA_sign_setup"}, |
79 | {ERR_PACK(0,DSA_F_DSA_SIG_NEW,0), "DSA_SIG_new"}, | 83 | {ERR_FUNC(DSA_F_DSA_SIG_NEW), "DSA_SIG_new"}, |
80 | {ERR_PACK(0,DSA_F_DSA_VERIFY,0), "DSA_verify"}, | 84 | {ERR_FUNC(DSA_F_DSA_VERIFY), "DSA_verify"}, |
81 | {ERR_PACK(0,DSA_F_I2D_DSA_SIG,0), "i2d_DSA_SIG"}, | 85 | {ERR_FUNC(DSA_F_I2D_DSA_SIG), "i2d_DSA_SIG"}, |
82 | {ERR_PACK(0,DSA_F_SIG_CB,0), "SIG_CB"}, | 86 | {ERR_FUNC(DSA_F_SIG_CB), "SIG_CB"}, |
83 | {0,NULL} | 87 | {0,NULL} |
84 | }; | 88 | }; |
85 | 89 | ||
86 | static ERR_STRING_DATA DSA_str_reasons[]= | 90 | static ERR_STRING_DATA DSA_str_reasons[]= |
87 | { | 91 | { |
88 | {DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE ,"data too large for key size"}, | 92 | {ERR_REASON(DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),"data too large for key size"}, |
89 | {DSA_R_MISSING_PARAMETERS ,"missing parameters"}, | 93 | {ERR_REASON(DSA_R_MISSING_PARAMETERS) ,"missing parameters"}, |
90 | {0,NULL} | 94 | {0,NULL} |
91 | }; | 95 | }; |
92 | 96 | ||
@@ -100,8 +104,8 @@ void ERR_load_DSA_strings(void) | |||
100 | { | 104 | { |
101 | init=0; | 105 | init=0; |
102 | #ifndef OPENSSL_NO_ERR | 106 | #ifndef OPENSSL_NO_ERR |
103 | ERR_load_strings(ERR_LIB_DSA,DSA_str_functs); | 107 | ERR_load_strings(0,DSA_str_functs); |
104 | ERR_load_strings(ERR_LIB_DSA,DSA_str_reasons); | 108 | ERR_load_strings(0,DSA_str_reasons); |
105 | #endif | 109 | #endif |
106 | 110 | ||
107 | } | 111 | } |
diff --git a/src/lib/libcrypto/dsa/dsa_key.c b/src/lib/libcrypto/dsa/dsa_key.c index 30607ca579..980b6dc2d3 100644 --- a/src/lib/libcrypto/dsa/dsa_key.c +++ b/src/lib/libcrypto/dsa/dsa_key.c | |||
@@ -90,8 +90,22 @@ int DSA_generate_key(DSA *dsa) | |||
90 | } | 90 | } |
91 | else | 91 | else |
92 | pub_key=dsa->pub_key; | 92 | pub_key=dsa->pub_key; |
93 | |||
94 | { | ||
95 | BIGNUM local_prk; | ||
96 | BIGNUM *prk; | ||
97 | |||
98 | if ((dsa->flags & DSA_FLAG_NO_EXP_CONSTTIME) == 0) | ||
99 | { | ||
100 | BN_init(&local_prk); | ||
101 | prk = &local_prk; | ||
102 | BN_with_flags(prk, priv_key, BN_FLG_EXP_CONSTTIME); | ||
103 | } | ||
104 | else | ||
105 | prk = priv_key; | ||
93 | 106 | ||
94 | if (!BN_mod_exp(pub_key,dsa->g,priv_key,dsa->p,ctx)) goto err; | 107 | if (!BN_mod_exp(pub_key,dsa->g,prk,dsa->p,ctx)) goto err; |
108 | } | ||
95 | 109 | ||
96 | dsa->priv_key=priv_key; | 110 | dsa->priv_key=priv_key; |
97 | dsa->pub_key=pub_key; | 111 | dsa->pub_key=pub_key; |
diff --git a/src/lib/libcrypto/dsa/dsa_ossl.c b/src/lib/libcrypto/dsa/dsa_ossl.c index f1a85afcde..12509a7083 100644 --- a/src/lib/libcrypto/dsa/dsa_ossl.c +++ b/src/lib/libcrypto/dsa/dsa_ossl.c | |||
@@ -172,7 +172,7 @@ err: | |||
172 | static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) | 172 | static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) |
173 | { | 173 | { |
174 | BN_CTX *ctx; | 174 | BN_CTX *ctx; |
175 | BIGNUM k,*kinv=NULL,*r=NULL; | 175 | BIGNUM k,kq,*K,*kinv=NULL,*r=NULL; |
176 | int ret=0; | 176 | int ret=0; |
177 | 177 | ||
178 | if (!dsa->p || !dsa->q || !dsa->g) | 178 | if (!dsa->p || !dsa->q || !dsa->g) |
@@ -182,6 +182,7 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) | |||
182 | } | 182 | } |
183 | 183 | ||
184 | BN_init(&k); | 184 | BN_init(&k); |
185 | BN_init(&kq); | ||
185 | 186 | ||
186 | if (ctx_in == NULL) | 187 | if (ctx_in == NULL) |
187 | { | 188 | { |
@@ -191,22 +192,49 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) | |||
191 | ctx=ctx_in; | 192 | ctx=ctx_in; |
192 | 193 | ||
193 | if ((r=BN_new()) == NULL) goto err; | 194 | if ((r=BN_new()) == NULL) goto err; |
194 | kinv=NULL; | ||
195 | 195 | ||
196 | /* Get random k */ | 196 | /* Get random k */ |
197 | do | 197 | do |
198 | if (!BN_rand_range(&k, dsa->q)) goto err; | 198 | if (!BN_rand_range(&k, dsa->q)) goto err; |
199 | while (BN_is_zero(&k)); | 199 | while (BN_is_zero(&k)); |
200 | if ((dsa->flags & DSA_FLAG_NO_EXP_CONSTTIME) == 0) | ||
201 | { | ||
202 | BN_set_flags(&k, BN_FLG_EXP_CONSTTIME); | ||
203 | } | ||
200 | 204 | ||
201 | if ((dsa->method_mont_p == NULL) && (dsa->flags & DSA_FLAG_CACHE_MONT_P)) | 205 | if (dsa->flags & DSA_FLAG_CACHE_MONT_P) |
202 | { | 206 | { |
203 | if ((dsa->method_mont_p=(char *)BN_MONT_CTX_new()) != NULL) | 207 | if (!BN_MONT_CTX_set_locked((BN_MONT_CTX **)&dsa->method_mont_p, |
204 | if (!BN_MONT_CTX_set((BN_MONT_CTX *)dsa->method_mont_p, | 208 | CRYPTO_LOCK_DSA, |
205 | dsa->p,ctx)) goto err; | 209 | dsa->p, ctx)) |
210 | goto err; | ||
206 | } | 211 | } |
207 | 212 | ||
208 | /* Compute r = (g^k mod p) mod q */ | 213 | /* Compute r = (g^k mod p) mod q */ |
209 | if (!dsa->meth->bn_mod_exp(dsa, r,dsa->g,&k,dsa->p,ctx, | 214 | |
215 | if ((dsa->flags & DSA_FLAG_NO_EXP_CONSTTIME) == 0) | ||
216 | { | ||
217 | if (!BN_copy(&kq, &k)) goto err; | ||
218 | |||
219 | /* We do not want timing information to leak the length of k, | ||
220 | * so we compute g^k using an equivalent exponent of fixed length. | ||
221 | * | ||
222 | * (This is a kludge that we need because the BN_mod_exp_mont() | ||
223 | * does not let us specify the desired timing behaviour.) */ | ||
224 | |||
225 | if (!BN_add(&kq, &kq, dsa->q)) goto err; | ||
226 | if (BN_num_bits(&kq) <= BN_num_bits(dsa->q)) | ||
227 | { | ||
228 | if (!BN_add(&kq, &kq, dsa->q)) goto err; | ||
229 | } | ||
230 | |||
231 | K = &kq; | ||
232 | } | ||
233 | else | ||
234 | { | ||
235 | K = &k; | ||
236 | } | ||
237 | if (!dsa->meth->bn_mod_exp(dsa, r,dsa->g,K,dsa->p,ctx, | ||
210 | (BN_MONT_CTX *)dsa->method_mont_p)) goto err; | 238 | (BN_MONT_CTX *)dsa->method_mont_p)) goto err; |
211 | if (!BN_mod(r,r,dsa->q,ctx)) goto err; | 239 | if (!BN_mod(r,r,dsa->q,ctx)) goto err; |
212 | 240 | ||
@@ -229,6 +257,7 @@ err: | |||
229 | if (ctx_in == NULL) BN_CTX_free(ctx); | 257 | if (ctx_in == NULL) BN_CTX_free(ctx); |
230 | if (kinv != NULL) BN_clear_free(kinv); | 258 | if (kinv != NULL) BN_clear_free(kinv); |
231 | BN_clear_free(&k); | 259 | BN_clear_free(&k); |
260 | BN_clear_free(&kq); | ||
232 | return(ret); | 261 | return(ret); |
233 | } | 262 | } |
234 | 263 | ||
@@ -275,13 +304,15 @@ static int dsa_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, | |||
275 | /* u2 = r * w mod q */ | 304 | /* u2 = r * w mod q */ |
276 | if (!BN_mod_mul(&u2,sig->r,&u2,dsa->q,ctx)) goto err; | 305 | if (!BN_mod_mul(&u2,sig->r,&u2,dsa->q,ctx)) goto err; |
277 | 306 | ||
278 | if ((dsa->method_mont_p == NULL) && (dsa->flags & DSA_FLAG_CACHE_MONT_P)) | 307 | |
308 | if (dsa->flags & DSA_FLAG_CACHE_MONT_P) | ||
279 | { | 309 | { |
280 | if ((dsa->method_mont_p=(char *)BN_MONT_CTX_new()) != NULL) | 310 | mont = BN_MONT_CTX_set_locked( |
281 | if (!BN_MONT_CTX_set((BN_MONT_CTX *)dsa->method_mont_p, | 311 | (BN_MONT_CTX **)&dsa->method_mont_p, |
282 | dsa->p,ctx)) goto err; | 312 | CRYPTO_LOCK_DSA, dsa->p, ctx); |
313 | if (!mont) | ||
314 | goto err; | ||
283 | } | 315 | } |
284 | mont=(BN_MONT_CTX *)dsa->method_mont_p; | ||
285 | 316 | ||
286 | #if 0 | 317 | #if 0 |
287 | { | 318 | { |
diff --git a/src/lib/libcrypto/dsa/dsa_sign.c b/src/lib/libcrypto/dsa/dsa_sign.c index 3c9753bac3..37c65efb20 100644 --- a/src/lib/libcrypto/dsa/dsa_sign.c +++ b/src/lib/libcrypto/dsa/dsa_sign.c | |||
@@ -72,7 +72,8 @@ | |||
72 | DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) | 72 | DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) |
73 | { | 73 | { |
74 | #ifdef OPENSSL_FIPS | 74 | #ifdef OPENSSL_FIPS |
75 | if(FIPS_mode() && !FIPS_dsa_check(dsa)) | 75 | if(FIPS_mode() && !(dsa->flags & DSA_FLAG_FIPS_EXTERNAL_METHOD_ALLOW) |
76 | && !FIPS_dsa_check(dsa)) | ||
76 | return NULL; | 77 | return NULL; |
77 | #endif | 78 | #endif |
78 | return dsa->meth->dsa_do_sign(dgst, dlen, dsa); | 79 | return dsa->meth->dsa_do_sign(dgst, dlen, dsa); |
@@ -96,7 +97,8 @@ int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, | |||
96 | int DSA_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) | 97 | int DSA_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) |
97 | { | 98 | { |
98 | #ifdef OPENSSL_FIPS | 99 | #ifdef OPENSSL_FIPS |
99 | if(FIPS_mode() && !FIPS_dsa_check(dsa)) | 100 | if(FIPS_mode() && !(dsa->flags & DSA_FLAG_FIPS_EXTERNAL_METHOD_ALLOW) |
101 | && !FIPS_dsa_check(dsa)) | ||
100 | return 0; | 102 | return 0; |
101 | #endif | 103 | #endif |
102 | return dsa->meth->dsa_sign_setup(dsa, ctx_in, kinvp, rp); | 104 | return dsa->meth->dsa_sign_setup(dsa, ctx_in, kinvp, rp); |
diff --git a/src/lib/libcrypto/dsa/dsa_vrf.c b/src/lib/libcrypto/dsa/dsa_vrf.c index 8ef0c45025..c9784bed48 100644 --- a/src/lib/libcrypto/dsa/dsa_vrf.c +++ b/src/lib/libcrypto/dsa/dsa_vrf.c | |||
@@ -74,7 +74,8 @@ int DSA_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, | |||
74 | DSA *dsa) | 74 | DSA *dsa) |
75 | { | 75 | { |
76 | #ifdef OPENSSL_FIPS | 76 | #ifdef OPENSSL_FIPS |
77 | if(FIPS_mode() && !FIPS_dsa_check(dsa)) | 77 | if(FIPS_mode() && !(dsa->flags & DSA_FLAG_FIPS_EXTERNAL_METHOD_ALLOW) |
78 | && !FIPS_dsa_check(dsa)) | ||
78 | return -1; | 79 | return -1; |
79 | #endif | 80 | #endif |
80 | return dsa->meth->dsa_do_verify(dgst, dgst_len, sig, dsa); | 81 | return dsa->meth->dsa_do_verify(dgst, dgst_len, sig, dsa); |
diff --git a/src/lib/libcrypto/dso/dso_dlfcn.c b/src/lib/libcrypto/dso/dso_dlfcn.c index 9d49ebc253..0422a4859a 100644 --- a/src/lib/libcrypto/dso/dso_dlfcn.c +++ b/src/lib/libcrypto/dso/dso_dlfcn.c | |||
@@ -56,6 +56,10 @@ | |||
56 | * | 56 | * |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #ifdef __linux | ||
60 | #define _GNU_SOURCE | ||
61 | #endif | ||
62 | |||
59 | #include <stdio.h> | 63 | #include <stdio.h> |
60 | #include "cryptlib.h" | 64 | #include "cryptlib.h" |
61 | #include <openssl/dso.h> | 65 | #include <openssl/dso.h> |
@@ -228,7 +232,7 @@ static void *dlfcn_bind_var(DSO *dso, const char *symname) | |||
228 | static DSO_FUNC_TYPE dlfcn_bind_func(DSO *dso, const char *symname) | 232 | static DSO_FUNC_TYPE dlfcn_bind_func(DSO *dso, const char *symname) |
229 | { | 233 | { |
230 | void *ptr; | 234 | void *ptr; |
231 | DSO_FUNC_TYPE sym; | 235 | DSO_FUNC_TYPE sym, *tsym = &sym; |
232 | 236 | ||
233 | if((dso == NULL) || (symname == NULL)) | 237 | if((dso == NULL) || (symname == NULL)) |
234 | { | 238 | { |
@@ -246,7 +250,7 @@ static DSO_FUNC_TYPE dlfcn_bind_func(DSO *dso, const char *symname) | |||
246 | DSOerr(DSO_F_DLFCN_BIND_FUNC,DSO_R_NULL_HANDLE); | 250 | DSOerr(DSO_F_DLFCN_BIND_FUNC,DSO_R_NULL_HANDLE); |
247 | return(NULL); | 251 | return(NULL); |
248 | } | 252 | } |
249 | sym = (DSO_FUNC_TYPE)dlsym(ptr, symname); | 253 | *(void**)(tsym) = dlsym(ptr, symname); |
250 | if(sym == NULL) | 254 | if(sym == NULL) |
251 | { | 255 | { |
252 | DSOerr(DSO_F_DLFCN_BIND_FUNC,DSO_R_SYM_FAILURE); | 256 | DSOerr(DSO_F_DLFCN_BIND_FUNC,DSO_R_SYM_FAILURE); |
@@ -290,4 +294,32 @@ static char *dlfcn_name_converter(DSO *dso, const char *filename) | |||
290 | return(translated); | 294 | return(translated); |
291 | } | 295 | } |
292 | 296 | ||
297 | #ifdef OPENSSL_FIPS | ||
298 | static void dlfcn_ref_point(){} | ||
299 | |||
300 | int DSO_pathbyaddr(void *addr,char *path,int sz) | ||
301 | { | ||
302 | Dl_info dli; | ||
303 | int len; | ||
304 | |||
305 | if (addr == NULL) | ||
306 | { | ||
307 | union { void(*f)(void); void *p; } t = { dlfcn_ref_point }; | ||
308 | addr = t.p; | ||
309 | } | ||
310 | |||
311 | if (dladdr(addr,&dli)) | ||
312 | { | ||
313 | len = (int)strlen(dli.dli_fname); | ||
314 | if (sz <= 0) return len+1; | ||
315 | if (len >= sz) len=sz-1; | ||
316 | memcpy(path,dli.dli_fname,len); | ||
317 | path[len++]=0; | ||
318 | return len; | ||
319 | } | ||
320 | |||
321 | ERR_add_error_data(4, "dlfcn_pathbyaddr(): ", dlerror()); | ||
322 | return -1; | ||
323 | } | ||
324 | #endif | ||
293 | #endif /* DSO_DLFCN */ | 325 | #endif /* DSO_DLFCN */ |
diff --git a/src/lib/libcrypto/dso/dso_err.c b/src/lib/libcrypto/dso/dso_err.c index cf452de1aa..581677cc36 100644 --- a/src/lib/libcrypto/dso/dso_err.c +++ b/src/lib/libcrypto/dso/dso_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/dso/dso_err.c */ | 1 | /* crypto/dso/dso_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,56 +64,60 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_DSO,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_DSO,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA DSO_str_functs[]= | 71 | static ERR_STRING_DATA DSO_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,DSO_F_DLFCN_BIND_FUNC,0), "DLFCN_BIND_FUNC"}, | 73 | {ERR_FUNC(DSO_F_DLFCN_BIND_FUNC), "DLFCN_BIND_FUNC"}, |
70 | {ERR_PACK(0,DSO_F_DLFCN_BIND_VAR,0), "DLFCN_BIND_VAR"}, | 74 | {ERR_FUNC(DSO_F_DLFCN_BIND_VAR), "DLFCN_BIND_VAR"}, |
71 | {ERR_PACK(0,DSO_F_DLFCN_LOAD,0), "DLFCN_LOAD"}, | 75 | {ERR_FUNC(DSO_F_DLFCN_LOAD), "DLFCN_LOAD"}, |
72 | {ERR_PACK(0,DSO_F_DLFCN_NAME_CONVERTER,0), "DLFCN_NAME_CONVERTER"}, | 76 | {ERR_FUNC(DSO_F_DLFCN_NAME_CONVERTER), "DLFCN_NAME_CONVERTER"}, |
73 | {ERR_PACK(0,DSO_F_DLFCN_UNLOAD,0), "DLFCN_UNLOAD"}, | 77 | {ERR_FUNC(DSO_F_DLFCN_UNLOAD), "DLFCN_UNLOAD"}, |
74 | {ERR_PACK(0,DSO_F_DL_BIND_FUNC,0), "DL_BIND_FUNC"}, | 78 | {ERR_FUNC(DSO_F_DL_BIND_FUNC), "DL_BIND_FUNC"}, |
75 | {ERR_PACK(0,DSO_F_DL_BIND_VAR,0), "DL_BIND_VAR"}, | 79 | {ERR_FUNC(DSO_F_DL_BIND_VAR), "DL_BIND_VAR"}, |
76 | {ERR_PACK(0,DSO_F_DL_LOAD,0), "DL_LOAD"}, | 80 | {ERR_FUNC(DSO_F_DL_LOAD), "DL_LOAD"}, |
77 | {ERR_PACK(0,DSO_F_DL_NAME_CONVERTER,0), "DL_NAME_CONVERTER"}, | 81 | {ERR_FUNC(DSO_F_DL_NAME_CONVERTER), "DL_NAME_CONVERTER"}, |
78 | {ERR_PACK(0,DSO_F_DL_UNLOAD,0), "DL_UNLOAD"}, | 82 | {ERR_FUNC(DSO_F_DL_UNLOAD), "DL_UNLOAD"}, |
79 | {ERR_PACK(0,DSO_F_DSO_BIND_FUNC,0), "DSO_bind_func"}, | 83 | {ERR_FUNC(DSO_F_DSO_BIND_FUNC), "DSO_bind_func"}, |
80 | {ERR_PACK(0,DSO_F_DSO_BIND_VAR,0), "DSO_bind_var"}, | 84 | {ERR_FUNC(DSO_F_DSO_BIND_VAR), "DSO_bind_var"}, |
81 | {ERR_PACK(0,DSO_F_DSO_CONVERT_FILENAME,0), "DSO_convert_filename"}, | 85 | {ERR_FUNC(DSO_F_DSO_CONVERT_FILENAME), "DSO_convert_filename"}, |
82 | {ERR_PACK(0,DSO_F_DSO_CTRL,0), "DSO_ctrl"}, | 86 | {ERR_FUNC(DSO_F_DSO_CTRL), "DSO_ctrl"}, |
83 | {ERR_PACK(0,DSO_F_DSO_FREE,0), "DSO_free"}, | 87 | {ERR_FUNC(DSO_F_DSO_FREE), "DSO_free"}, |
84 | {ERR_PACK(0,DSO_F_DSO_GET_FILENAME,0), "DSO_get_filename"}, | 88 | {ERR_FUNC(DSO_F_DSO_GET_FILENAME), "DSO_get_filename"}, |
85 | {ERR_PACK(0,DSO_F_DSO_GET_LOADED_FILENAME,0), "DSO_get_loaded_filename"}, | 89 | {ERR_FUNC(DSO_F_DSO_GET_LOADED_FILENAME), "DSO_get_loaded_filename"}, |
86 | {ERR_PACK(0,DSO_F_DSO_LOAD,0), "DSO_load"}, | 90 | {ERR_FUNC(DSO_F_DSO_LOAD), "DSO_load"}, |
87 | {ERR_PACK(0,DSO_F_DSO_NEW_METHOD,0), "DSO_new_method"}, | 91 | {ERR_FUNC(DSO_F_DSO_NEW_METHOD), "DSO_new_method"}, |
88 | {ERR_PACK(0,DSO_F_DSO_SET_FILENAME,0), "DSO_set_filename"}, | 92 | {ERR_FUNC(DSO_F_DSO_SET_FILENAME), "DSO_set_filename"}, |
89 | {ERR_PACK(0,DSO_F_DSO_SET_NAME_CONVERTER,0), "DSO_set_name_converter"}, | 93 | {ERR_FUNC(DSO_F_DSO_SET_NAME_CONVERTER), "DSO_set_name_converter"}, |
90 | {ERR_PACK(0,DSO_F_DSO_UP_REF,0), "DSO_up_ref"}, | 94 | {ERR_FUNC(DSO_F_DSO_UP_REF), "DSO_up_ref"}, |
91 | {ERR_PACK(0,DSO_F_VMS_BIND_VAR,0), "VMS_BIND_VAR"}, | 95 | {ERR_FUNC(DSO_F_VMS_BIND_VAR), "VMS_BIND_VAR"}, |
92 | {ERR_PACK(0,DSO_F_VMS_LOAD,0), "VMS_LOAD"}, | 96 | {ERR_FUNC(DSO_F_VMS_LOAD), "VMS_LOAD"}, |
93 | {ERR_PACK(0,DSO_F_VMS_UNLOAD,0), "VMS_UNLOAD"}, | 97 | {ERR_FUNC(DSO_F_VMS_UNLOAD), "VMS_UNLOAD"}, |
94 | {ERR_PACK(0,DSO_F_WIN32_BIND_FUNC,0), "WIN32_BIND_FUNC"}, | 98 | {ERR_FUNC(DSO_F_WIN32_BIND_FUNC), "WIN32_BIND_FUNC"}, |
95 | {ERR_PACK(0,DSO_F_WIN32_BIND_VAR,0), "WIN32_BIND_VAR"}, | 99 | {ERR_FUNC(DSO_F_WIN32_BIND_VAR), "WIN32_BIND_VAR"}, |
96 | {ERR_PACK(0,DSO_F_WIN32_LOAD,0), "WIN32_LOAD"}, | 100 | {ERR_FUNC(DSO_F_WIN32_LOAD), "WIN32_LOAD"}, |
97 | {ERR_PACK(0,DSO_F_WIN32_NAME_CONVERTER,0), "WIN32_NAME_CONVERTER"}, | 101 | {ERR_FUNC(DSO_F_WIN32_NAME_CONVERTER), "WIN32_NAME_CONVERTER"}, |
98 | {ERR_PACK(0,DSO_F_WIN32_UNLOAD,0), "WIN32_UNLOAD"}, | 102 | {ERR_FUNC(DSO_F_WIN32_UNLOAD), "WIN32_UNLOAD"}, |
99 | {0,NULL} | 103 | {0,NULL} |
100 | }; | 104 | }; |
101 | 105 | ||
102 | static ERR_STRING_DATA DSO_str_reasons[]= | 106 | static ERR_STRING_DATA DSO_str_reasons[]= |
103 | { | 107 | { |
104 | {DSO_R_CTRL_FAILED ,"control command failed"}, | 108 | {ERR_REASON(DSO_R_CTRL_FAILED) ,"control command failed"}, |
105 | {DSO_R_DSO_ALREADY_LOADED ,"dso already loaded"}, | 109 | {ERR_REASON(DSO_R_DSO_ALREADY_LOADED) ,"dso already loaded"}, |
106 | {DSO_R_FILENAME_TOO_BIG ,"filename too big"}, | 110 | {ERR_REASON(DSO_R_FILENAME_TOO_BIG) ,"filename too big"}, |
107 | {DSO_R_FINISH_FAILED ,"cleanup method function failed"}, | 111 | {ERR_REASON(DSO_R_FINISH_FAILED) ,"cleanup method function failed"}, |
108 | {DSO_R_LOAD_FAILED ,"could not load the shared library"}, | 112 | {ERR_REASON(DSO_R_LOAD_FAILED) ,"could not load the shared library"}, |
109 | {DSO_R_NAME_TRANSLATION_FAILED ,"name translation failed"}, | 113 | {ERR_REASON(DSO_R_NAME_TRANSLATION_FAILED),"name translation failed"}, |
110 | {DSO_R_NO_FILENAME ,"no filename"}, | 114 | {ERR_REASON(DSO_R_NO_FILENAME) ,"no filename"}, |
111 | {DSO_R_NULL_HANDLE ,"a null shared library handle was used"}, | 115 | {ERR_REASON(DSO_R_NULL_HANDLE) ,"a null shared library handle was used"}, |
112 | {DSO_R_SET_FILENAME_FAILED ,"set filename failed"}, | 116 | {ERR_REASON(DSO_R_SET_FILENAME_FAILED) ,"set filename failed"}, |
113 | {DSO_R_STACK_ERROR ,"the meth_data stack is corrupt"}, | 117 | {ERR_REASON(DSO_R_STACK_ERROR) ,"the meth_data stack is corrupt"}, |
114 | {DSO_R_SYM_FAILURE ,"could not bind to the requested symbol name"}, | 118 | {ERR_REASON(DSO_R_SYM_FAILURE) ,"could not bind to the requested symbol name"}, |
115 | {DSO_R_UNLOAD_FAILED ,"could not unload the shared library"}, | 119 | {ERR_REASON(DSO_R_UNLOAD_FAILED) ,"could not unload the shared library"}, |
116 | {DSO_R_UNSUPPORTED ,"functionality not supported"}, | 120 | {ERR_REASON(DSO_R_UNSUPPORTED) ,"functionality not supported"}, |
117 | {0,NULL} | 121 | {0,NULL} |
118 | }; | 122 | }; |
119 | 123 | ||
@@ -127,8 +131,8 @@ void ERR_load_DSO_strings(void) | |||
127 | { | 131 | { |
128 | init=0; | 132 | init=0; |
129 | #ifndef OPENSSL_NO_ERR | 133 | #ifndef OPENSSL_NO_ERR |
130 | ERR_load_strings(ERR_LIB_DSO,DSO_str_functs); | 134 | ERR_load_strings(0,DSO_str_functs); |
131 | ERR_load_strings(ERR_LIB_DSO,DSO_str_reasons); | 135 | ERR_load_strings(0,DSO_str_reasons); |
132 | #endif | 136 | #endif |
133 | 137 | ||
134 | } | 138 | } |
diff --git a/src/lib/libcrypto/ec/ec_err.c b/src/lib/libcrypto/ec/ec_err.c index d37b6aba87..5b70f94382 100644 --- a/src/lib/libcrypto/ec/ec_err.c +++ b/src/lib/libcrypto/ec/ec_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/ec/ec_err.c */ | 1 | /* crypto/ec/ec_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,70 +64,74 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_EC,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_EC,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA EC_str_functs[]= | 71 | static ERR_STRING_DATA EC_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,EC_F_COMPUTE_WNAF,0), "COMPUTE_WNAF"}, | 73 | {ERR_FUNC(EC_F_COMPUTE_WNAF), "COMPUTE_WNAF"}, |
70 | {ERR_PACK(0,EC_F_EC_GFP_MONT_FIELD_DECODE,0), "ec_GFp_mont_field_decode"}, | 74 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_DECODE), "ec_GFp_mont_field_decode"}, |
71 | {ERR_PACK(0,EC_F_EC_GFP_MONT_FIELD_ENCODE,0), "ec_GFp_mont_field_encode"}, | 75 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_ENCODE), "ec_GFp_mont_field_encode"}, |
72 | {ERR_PACK(0,EC_F_EC_GFP_MONT_FIELD_MUL,0), "ec_GFp_mont_field_mul"}, | 76 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_MUL), "ec_GFp_mont_field_mul"}, |
73 | {ERR_PACK(0,EC_F_EC_GFP_MONT_FIELD_SQR,0), "ec_GFp_mont_field_sqr"}, | 77 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_SQR), "ec_GFp_mont_field_sqr"}, |
74 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE_GFP,0), "ec_GFp_simple_group_set_curve_GFp"}, | 78 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE_GFP), "ec_GFp_simple_group_set_curve_GFp"}, |
75 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_GROUP_SET_GENERATOR,0), "ec_GFp_simple_group_set_generator"}, | 79 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_GROUP_SET_GENERATOR), "ec_GFp_simple_group_set_generator"}, |
76 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_MAKE_AFFINE,0), "ec_GFp_simple_make_affine"}, | 80 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_MAKE_AFFINE), "ec_GFp_simple_make_affine"}, |
77 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_OCT2POINT,0), "ec_GFp_simple_oct2point"}, | 81 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_OCT2POINT), "ec_GFp_simple_oct2point"}, |
78 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_POINT2OCT,0), "ec_GFp_simple_point2oct"}, | 82 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINT2OCT), "ec_GFp_simple_point2oct"}, |
79 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_POINTS_MAKE_AFFINE,0), "ec_GFp_simple_points_make_affine"}, | 83 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINTS_MAKE_AFFINE), "ec_GFp_simple_points_make_affine"}, |
80 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES_GFP,0), "ec_GFp_simple_point_get_affine_coordinates_GFp"}, | 84 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES_GFP), "ec_GFp_simple_point_get_affine_coordinates_GFp"}, |
81 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES_GFP,0), "ec_GFp_simple_point_set_affine_coordinates_GFp"}, | 85 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES_GFP), "ec_GFp_simple_point_set_affine_coordinates_GFp"}, |
82 | {ERR_PACK(0,EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES_GFP,0), "ec_GFp_simple_set_compressed_coordinates_GFp"}, | 86 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES_GFP), "ec_GFp_simple_set_compressed_coordinates_GFp"}, |
83 | {ERR_PACK(0,EC_F_EC_GROUP_COPY,0), "EC_GROUP_copy"}, | 87 | {ERR_FUNC(EC_F_EC_GROUP_COPY), "EC_GROUP_copy"}, |
84 | {ERR_PACK(0,EC_F_EC_GROUP_GET0_GENERATOR,0), "EC_GROUP_get0_generator"}, | 88 | {ERR_FUNC(EC_F_EC_GROUP_GET0_GENERATOR), "EC_GROUP_get0_generator"}, |
85 | {ERR_PACK(0,EC_F_EC_GROUP_GET_COFACTOR,0), "EC_GROUP_get_cofactor"}, | 89 | {ERR_FUNC(EC_F_EC_GROUP_GET_COFACTOR), "EC_GROUP_get_cofactor"}, |
86 | {ERR_PACK(0,EC_F_EC_GROUP_GET_CURVE_GFP,0), "EC_GROUP_get_curve_GFp"}, | 90 | {ERR_FUNC(EC_F_EC_GROUP_GET_CURVE_GFP), "EC_GROUP_get_curve_GFp"}, |
87 | {ERR_PACK(0,EC_F_EC_GROUP_GET_ORDER,0), "EC_GROUP_get_order"}, | 91 | {ERR_FUNC(EC_F_EC_GROUP_GET_ORDER), "EC_GROUP_get_order"}, |
88 | {ERR_PACK(0,EC_F_EC_GROUP_NEW,0), "EC_GROUP_new"}, | 92 | {ERR_FUNC(EC_F_EC_GROUP_NEW), "EC_GROUP_new"}, |
89 | {ERR_PACK(0,EC_F_EC_GROUP_PRECOMPUTE_MULT,0), "EC_GROUP_precompute_mult"}, | 93 | {ERR_FUNC(EC_F_EC_GROUP_PRECOMPUTE_MULT), "EC_GROUP_precompute_mult"}, |
90 | {ERR_PACK(0,EC_F_EC_GROUP_SET_CURVE_GFP,0), "EC_GROUP_set_curve_GFp"}, | 94 | {ERR_FUNC(EC_F_EC_GROUP_SET_CURVE_GFP), "EC_GROUP_set_curve_GFp"}, |
91 | {ERR_PACK(0,EC_F_EC_GROUP_SET_EXTRA_DATA,0), "EC_GROUP_set_extra_data"}, | 95 | {ERR_FUNC(EC_F_EC_GROUP_SET_EXTRA_DATA), "EC_GROUP_set_extra_data"}, |
92 | {ERR_PACK(0,EC_F_EC_GROUP_SET_GENERATOR,0), "EC_GROUP_set_generator"}, | 96 | {ERR_FUNC(EC_F_EC_GROUP_SET_GENERATOR), "EC_GROUP_set_generator"}, |
93 | {ERR_PACK(0,EC_F_EC_POINTS_MAKE_AFFINE,0), "EC_POINTs_make_affine"}, | 97 | {ERR_FUNC(EC_F_EC_POINTS_MAKE_AFFINE), "EC_POINTs_make_affine"}, |
94 | {ERR_PACK(0,EC_F_EC_POINTS_MUL,0), "EC_POINTs_mul"}, | 98 | {ERR_FUNC(EC_F_EC_POINTS_MUL), "EC_POINTs_mul"}, |
95 | {ERR_PACK(0,EC_F_EC_POINT_ADD,0), "EC_POINT_add"}, | 99 | {ERR_FUNC(EC_F_EC_POINT_ADD), "EC_POINT_add"}, |
96 | {ERR_PACK(0,EC_F_EC_POINT_CMP,0), "EC_POINT_cmp"}, | 100 | {ERR_FUNC(EC_F_EC_POINT_CMP), "EC_POINT_cmp"}, |
97 | {ERR_PACK(0,EC_F_EC_POINT_COPY,0), "EC_POINT_copy"}, | 101 | {ERR_FUNC(EC_F_EC_POINT_COPY), "EC_POINT_copy"}, |
98 | {ERR_PACK(0,EC_F_EC_POINT_DBL,0), "EC_POINT_dbl"}, | 102 | {ERR_FUNC(EC_F_EC_POINT_DBL), "EC_POINT_dbl"}, |
99 | {ERR_PACK(0,EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP,0), "EC_POINT_get_affine_coordinates_GFp"}, | 103 | {ERR_FUNC(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP), "EC_POINT_get_affine_coordinates_GFp"}, |
100 | {ERR_PACK(0,EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP,0), "EC_POINT_get_Jprojective_coordinates_GFp"}, | 104 | {ERR_FUNC(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP), "EC_POINT_get_Jprojective_coordinates_GFp"}, |
101 | {ERR_PACK(0,EC_F_EC_POINT_IS_AT_INFINITY,0), "EC_POINT_is_at_infinity"}, | 105 | {ERR_FUNC(EC_F_EC_POINT_IS_AT_INFINITY), "EC_POINT_is_at_infinity"}, |
102 | {ERR_PACK(0,EC_F_EC_POINT_IS_ON_CURVE,0), "EC_POINT_is_on_curve"}, | 106 | {ERR_FUNC(EC_F_EC_POINT_IS_ON_CURVE), "EC_POINT_is_on_curve"}, |
103 | {ERR_PACK(0,EC_F_EC_POINT_MAKE_AFFINE,0), "EC_POINT_make_affine"}, | 107 | {ERR_FUNC(EC_F_EC_POINT_MAKE_AFFINE), "EC_POINT_make_affine"}, |
104 | {ERR_PACK(0,EC_F_EC_POINT_NEW,0), "EC_POINT_new"}, | 108 | {ERR_FUNC(EC_F_EC_POINT_NEW), "EC_POINT_new"}, |
105 | {ERR_PACK(0,EC_F_EC_POINT_OCT2POINT,0), "EC_POINT_oct2point"}, | 109 | {ERR_FUNC(EC_F_EC_POINT_OCT2POINT), "EC_POINT_oct2point"}, |
106 | {ERR_PACK(0,EC_F_EC_POINT_POINT2OCT,0), "EC_POINT_point2oct"}, | 110 | {ERR_FUNC(EC_F_EC_POINT_POINT2OCT), "EC_POINT_point2oct"}, |
107 | {ERR_PACK(0,EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP,0), "EC_POINT_set_affine_coordinates_GFp"}, | 111 | {ERR_FUNC(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP), "EC_POINT_set_affine_coordinates_GFp"}, |
108 | {ERR_PACK(0,EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GFP,0), "EC_POINT_set_compressed_coordinates_GFp"}, | 112 | {ERR_FUNC(EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GFP), "EC_POINT_set_compressed_coordinates_GFp"}, |
109 | {ERR_PACK(0,EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP,0), "EC_POINT_set_Jprojective_coordinates_GFp"}, | 113 | {ERR_FUNC(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP), "EC_POINT_set_Jprojective_coordinates_GFp"}, |
110 | {ERR_PACK(0,EC_F_EC_POINT_SET_TO_INFINITY,0), "EC_POINT_set_to_infinity"}, | 114 | {ERR_FUNC(EC_F_EC_POINT_SET_TO_INFINITY), "EC_POINT_set_to_infinity"}, |
111 | {ERR_PACK(0,EC_F_GFP_MONT_GROUP_SET_CURVE_GFP,0), "GFP_MONT_GROUP_SET_CURVE_GFP"}, | 115 | {ERR_FUNC(EC_F_GFP_MONT_GROUP_SET_CURVE_GFP), "GFP_MONT_GROUP_SET_CURVE_GFP"}, |
112 | {0,NULL} | 116 | {0,NULL} |
113 | }; | 117 | }; |
114 | 118 | ||
115 | static ERR_STRING_DATA EC_str_reasons[]= | 119 | static ERR_STRING_DATA EC_str_reasons[]= |
116 | { | 120 | { |
117 | {EC_R_BUFFER_TOO_SMALL ,"buffer too small"}, | 121 | {ERR_REASON(EC_R_BUFFER_TOO_SMALL) ,"buffer too small"}, |
118 | {EC_R_INCOMPATIBLE_OBJECTS ,"incompatible objects"}, | 122 | {ERR_REASON(EC_R_INCOMPATIBLE_OBJECTS) ,"incompatible objects"}, |
119 | {EC_R_INVALID_ARGUMENT ,"invalid argument"}, | 123 | {ERR_REASON(EC_R_INVALID_ARGUMENT) ,"invalid argument"}, |
120 | {EC_R_INVALID_COMPRESSED_POINT ,"invalid compressed point"}, | 124 | {ERR_REASON(EC_R_INVALID_COMPRESSED_POINT),"invalid compressed point"}, |
121 | {EC_R_INVALID_COMPRESSION_BIT ,"invalid compression bit"}, | 125 | {ERR_REASON(EC_R_INVALID_COMPRESSION_BIT),"invalid compression bit"}, |
122 | {EC_R_INVALID_ENCODING ,"invalid encoding"}, | 126 | {ERR_REASON(EC_R_INVALID_ENCODING) ,"invalid encoding"}, |
123 | {EC_R_INVALID_FIELD ,"invalid field"}, | 127 | {ERR_REASON(EC_R_INVALID_FIELD) ,"invalid field"}, |
124 | {EC_R_INVALID_FORM ,"invalid form"}, | 128 | {ERR_REASON(EC_R_INVALID_FORM) ,"invalid form"}, |
125 | {EC_R_NOT_INITIALIZED ,"not initialized"}, | 129 | {ERR_REASON(EC_R_NOT_INITIALIZED) ,"not initialized"}, |
126 | {EC_R_POINT_AT_INFINITY ,"point at infinity"}, | 130 | {ERR_REASON(EC_R_POINT_AT_INFINITY) ,"point at infinity"}, |
127 | {EC_R_POINT_IS_NOT_ON_CURVE ,"point is not on curve"}, | 131 | {ERR_REASON(EC_R_POINT_IS_NOT_ON_CURVE) ,"point is not on curve"}, |
128 | {EC_R_SLOT_FULL ,"slot full"}, | 132 | {ERR_REASON(EC_R_SLOT_FULL) ,"slot full"}, |
129 | {EC_R_UNDEFINED_GENERATOR ,"undefined generator"}, | 133 | {ERR_REASON(EC_R_UNDEFINED_GENERATOR) ,"undefined generator"}, |
130 | {EC_R_UNKNOWN_ORDER ,"unknown order"}, | 134 | {ERR_REASON(EC_R_UNKNOWN_ORDER) ,"unknown order"}, |
131 | {0,NULL} | 135 | {0,NULL} |
132 | }; | 136 | }; |
133 | 137 | ||
@@ -141,8 +145,8 @@ void ERR_load_EC_strings(void) | |||
141 | { | 145 | { |
142 | init=0; | 146 | init=0; |
143 | #ifndef OPENSSL_NO_ERR | 147 | #ifndef OPENSSL_NO_ERR |
144 | ERR_load_strings(ERR_LIB_EC,EC_str_functs); | 148 | ERR_load_strings(0,EC_str_functs); |
145 | ERR_load_strings(ERR_LIB_EC,EC_str_reasons); | 149 | ERR_load_strings(0,EC_str_reasons); |
146 | #endif | 150 | #endif |
147 | 151 | ||
148 | } | 152 | } |
diff --git a/src/lib/libcrypto/engine/eng_cnf.c b/src/lib/libcrypto/engine/eng_cnf.c index cdf670901a..4225760af1 100644 --- a/src/lib/libcrypto/engine/eng_cnf.c +++ b/src/lib/libcrypto/engine/eng_cnf.c | |||
@@ -158,7 +158,7 @@ static int int_engine_configure(char *name, char *value, const CONF *cnf) | |||
158 | */ | 158 | */ |
159 | if (!strcmp(ctrlvalue, "EMPTY")) | 159 | if (!strcmp(ctrlvalue, "EMPTY")) |
160 | ctrlvalue = NULL; | 160 | ctrlvalue = NULL; |
161 | else if (!strcmp(ctrlname, "init")) | 161 | if (!strcmp(ctrlname, "init")) |
162 | { | 162 | { |
163 | if (!NCONF_get_number_e(cnf, value, "init", &do_init)) | 163 | if (!NCONF_get_number_e(cnf, value, "init", &do_init)) |
164 | goto err; | 164 | goto err; |
diff --git a/src/lib/libcrypto/engine/eng_err.c b/src/lib/libcrypto/engine/eng_err.c index 814d95ee32..fdc0e7be0f 100644 --- a/src/lib/libcrypto/engine/eng_err.c +++ b/src/lib/libcrypto/engine/eng_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/engine/eng_err.c */ | 1 | /* crypto/engine/eng_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2002 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,87 +64,91 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_ENGINE,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_ENGINE,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA ENGINE_str_functs[]= | 71 | static ERR_STRING_DATA ENGINE_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,ENGINE_F_DYNAMIC_CTRL,0), "DYNAMIC_CTRL"}, | 73 | {ERR_FUNC(ENGINE_F_DYNAMIC_CTRL), "DYNAMIC_CTRL"}, |
70 | {ERR_PACK(0,ENGINE_F_DYNAMIC_GET_DATA_CTX,0), "DYNAMIC_GET_DATA_CTX"}, | 74 | {ERR_FUNC(ENGINE_F_DYNAMIC_GET_DATA_CTX), "DYNAMIC_GET_DATA_CTX"}, |
71 | {ERR_PACK(0,ENGINE_F_DYNAMIC_LOAD,0), "DYNAMIC_LOAD"}, | 75 | {ERR_FUNC(ENGINE_F_DYNAMIC_LOAD), "DYNAMIC_LOAD"}, |
72 | {ERR_PACK(0,ENGINE_F_ENGINE_ADD,0), "ENGINE_add"}, | 76 | {ERR_FUNC(ENGINE_F_ENGINE_ADD), "ENGINE_add"}, |
73 | {ERR_PACK(0,ENGINE_F_ENGINE_BY_ID,0), "ENGINE_by_id"}, | 77 | {ERR_FUNC(ENGINE_F_ENGINE_BY_ID), "ENGINE_by_id"}, |
74 | {ERR_PACK(0,ENGINE_F_ENGINE_CMD_IS_EXECUTABLE,0), "ENGINE_cmd_is_executable"}, | 78 | {ERR_FUNC(ENGINE_F_ENGINE_CMD_IS_EXECUTABLE), "ENGINE_cmd_is_executable"}, |
75 | {ERR_PACK(0,ENGINE_F_ENGINE_CTRL,0), "ENGINE_ctrl"}, | 79 | {ERR_FUNC(ENGINE_F_ENGINE_CTRL), "ENGINE_ctrl"}, |
76 | {ERR_PACK(0,ENGINE_F_ENGINE_CTRL_CMD,0), "ENGINE_ctrl_cmd"}, | 80 | {ERR_FUNC(ENGINE_F_ENGINE_CTRL_CMD), "ENGINE_ctrl_cmd"}, |
77 | {ERR_PACK(0,ENGINE_F_ENGINE_CTRL_CMD_STRING,0), "ENGINE_ctrl_cmd_string"}, | 81 | {ERR_FUNC(ENGINE_F_ENGINE_CTRL_CMD_STRING), "ENGINE_ctrl_cmd_string"}, |
78 | {ERR_PACK(0,ENGINE_F_ENGINE_FINISH,0), "ENGINE_finish"}, | 82 | {ERR_FUNC(ENGINE_F_ENGINE_FINISH), "ENGINE_finish"}, |
79 | {ERR_PACK(0,ENGINE_F_ENGINE_FREE,0), "ENGINE_free"}, | 83 | {ERR_FUNC(ENGINE_F_ENGINE_FREE), "ENGINE_free"}, |
80 | {ERR_PACK(0,ENGINE_F_ENGINE_GET_CIPHER,0), "ENGINE_get_cipher"}, | 84 | {ERR_FUNC(ENGINE_F_ENGINE_GET_CIPHER), "ENGINE_get_cipher"}, |
81 | {ERR_PACK(0,ENGINE_F_ENGINE_GET_DEFAULT_TYPE,0), "ENGINE_GET_DEFAULT_TYPE"}, | 85 | {ERR_FUNC(ENGINE_F_ENGINE_GET_DEFAULT_TYPE), "ENGINE_GET_DEFAULT_TYPE"}, |
82 | {ERR_PACK(0,ENGINE_F_ENGINE_GET_DIGEST,0), "ENGINE_get_digest"}, | 86 | {ERR_FUNC(ENGINE_F_ENGINE_GET_DIGEST), "ENGINE_get_digest"}, |
83 | {ERR_PACK(0,ENGINE_F_ENGINE_GET_NEXT,0), "ENGINE_get_next"}, | 87 | {ERR_FUNC(ENGINE_F_ENGINE_GET_NEXT), "ENGINE_get_next"}, |
84 | {ERR_PACK(0,ENGINE_F_ENGINE_GET_PREV,0), "ENGINE_get_prev"}, | 88 | {ERR_FUNC(ENGINE_F_ENGINE_GET_PREV), "ENGINE_get_prev"}, |
85 | {ERR_PACK(0,ENGINE_F_ENGINE_INIT,0), "ENGINE_init"}, | 89 | {ERR_FUNC(ENGINE_F_ENGINE_INIT), "ENGINE_init"}, |
86 | {ERR_PACK(0,ENGINE_F_ENGINE_LIST_ADD,0), "ENGINE_LIST_ADD"}, | 90 | {ERR_FUNC(ENGINE_F_ENGINE_LIST_ADD), "ENGINE_LIST_ADD"}, |
87 | {ERR_PACK(0,ENGINE_F_ENGINE_LIST_REMOVE,0), "ENGINE_LIST_REMOVE"}, | 91 | {ERR_FUNC(ENGINE_F_ENGINE_LIST_REMOVE), "ENGINE_LIST_REMOVE"}, |
88 | {ERR_PACK(0,ENGINE_F_ENGINE_LOAD_PRIVATE_KEY,0), "ENGINE_load_private_key"}, | 92 | {ERR_FUNC(ENGINE_F_ENGINE_LOAD_PRIVATE_KEY), "ENGINE_load_private_key"}, |
89 | {ERR_PACK(0,ENGINE_F_ENGINE_LOAD_PUBLIC_KEY,0), "ENGINE_load_public_key"}, | 93 | {ERR_FUNC(ENGINE_F_ENGINE_LOAD_PUBLIC_KEY), "ENGINE_load_public_key"}, |
90 | {ERR_PACK(0,ENGINE_F_ENGINE_MODULE_INIT,0), "ENGINE_MODULE_INIT"}, | 94 | {ERR_FUNC(ENGINE_F_ENGINE_MODULE_INIT), "ENGINE_MODULE_INIT"}, |
91 | {ERR_PACK(0,ENGINE_F_ENGINE_NEW,0), "ENGINE_new"}, | 95 | {ERR_FUNC(ENGINE_F_ENGINE_NEW), "ENGINE_new"}, |
92 | {ERR_PACK(0,ENGINE_F_ENGINE_REMOVE,0), "ENGINE_remove"}, | 96 | {ERR_FUNC(ENGINE_F_ENGINE_REMOVE), "ENGINE_remove"}, |
93 | {ERR_PACK(0,ENGINE_F_ENGINE_SET_DEFAULT_STRING,0), "ENGINE_set_default_string"}, | 97 | {ERR_FUNC(ENGINE_F_ENGINE_SET_DEFAULT_STRING), "ENGINE_set_default_string"}, |
94 | {ERR_PACK(0,ENGINE_F_ENGINE_SET_DEFAULT_TYPE,0), "ENGINE_SET_DEFAULT_TYPE"}, | 98 | {ERR_FUNC(ENGINE_F_ENGINE_SET_DEFAULT_TYPE), "ENGINE_SET_DEFAULT_TYPE"}, |
95 | {ERR_PACK(0,ENGINE_F_ENGINE_SET_ID,0), "ENGINE_set_id"}, | 99 | {ERR_FUNC(ENGINE_F_ENGINE_SET_ID), "ENGINE_set_id"}, |
96 | {ERR_PACK(0,ENGINE_F_ENGINE_SET_NAME,0), "ENGINE_set_name"}, | 100 | {ERR_FUNC(ENGINE_F_ENGINE_SET_NAME), "ENGINE_set_name"}, |
97 | {ERR_PACK(0,ENGINE_F_ENGINE_TABLE_REGISTER,0), "ENGINE_TABLE_REGISTER"}, | 101 | {ERR_FUNC(ENGINE_F_ENGINE_TABLE_REGISTER), "ENGINE_TABLE_REGISTER"}, |
98 | {ERR_PACK(0,ENGINE_F_ENGINE_UNLOAD_KEY,0), "ENGINE_UNLOAD_KEY"}, | 102 | {ERR_FUNC(ENGINE_F_ENGINE_UNLOAD_KEY), "ENGINE_UNLOAD_KEY"}, |
99 | {ERR_PACK(0,ENGINE_F_ENGINE_UP_REF,0), "ENGINE_up_ref"}, | 103 | {ERR_FUNC(ENGINE_F_ENGINE_UP_REF), "ENGINE_up_ref"}, |
100 | {ERR_PACK(0,ENGINE_F_INT_CTRL_HELPER,0), "INT_CTRL_HELPER"}, | 104 | {ERR_FUNC(ENGINE_F_INT_CTRL_HELPER), "INT_CTRL_HELPER"}, |
101 | {ERR_PACK(0,ENGINE_F_INT_ENGINE_CONFIGURE,0), "INT_ENGINE_CONFIGURE"}, | 105 | {ERR_FUNC(ENGINE_F_INT_ENGINE_CONFIGURE), "INT_ENGINE_CONFIGURE"}, |
102 | {ERR_PACK(0,ENGINE_F_LOG_MESSAGE,0), "LOG_MESSAGE"}, | 106 | {ERR_FUNC(ENGINE_F_LOG_MESSAGE), "LOG_MESSAGE"}, |
103 | {ERR_PACK(0,ENGINE_F_SET_DATA_CTX,0), "SET_DATA_CTX"}, | 107 | {ERR_FUNC(ENGINE_F_SET_DATA_CTX), "SET_DATA_CTX"}, |
104 | {0,NULL} | 108 | {0,NULL} |
105 | }; | 109 | }; |
106 | 110 | ||
107 | static ERR_STRING_DATA ENGINE_str_reasons[]= | 111 | static ERR_STRING_DATA ENGINE_str_reasons[]= |
108 | { | 112 | { |
109 | {ENGINE_R_ALREADY_LOADED ,"already loaded"}, | 113 | {ERR_REASON(ENGINE_R_ALREADY_LOADED) ,"already loaded"}, |
110 | {ENGINE_R_ARGUMENT_IS_NOT_A_NUMBER ,"argument is not a number"}, | 114 | {ERR_REASON(ENGINE_R_ARGUMENT_IS_NOT_A_NUMBER),"argument is not a number"}, |
111 | {ENGINE_R_CMD_NOT_EXECUTABLE ,"cmd not executable"}, | 115 | {ERR_REASON(ENGINE_R_CMD_NOT_EXECUTABLE) ,"cmd not executable"}, |
112 | {ENGINE_R_COMMAND_TAKES_INPUT ,"command takes input"}, | 116 | {ERR_REASON(ENGINE_R_COMMAND_TAKES_INPUT),"command takes input"}, |
113 | {ENGINE_R_COMMAND_TAKES_NO_INPUT ,"command takes no input"}, | 117 | {ERR_REASON(ENGINE_R_COMMAND_TAKES_NO_INPUT),"command takes no input"}, |
114 | {ENGINE_R_CONFLICTING_ENGINE_ID ,"conflicting engine id"}, | 118 | {ERR_REASON(ENGINE_R_CONFLICTING_ENGINE_ID),"conflicting engine id"}, |
115 | {ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED ,"ctrl command not implemented"}, | 119 | {ERR_REASON(ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED),"ctrl command not implemented"}, |
116 | {ENGINE_R_DH_NOT_IMPLEMENTED ,"dh not implemented"}, | 120 | {ERR_REASON(ENGINE_R_DH_NOT_IMPLEMENTED) ,"dh not implemented"}, |
117 | {ENGINE_R_DSA_NOT_IMPLEMENTED ,"dsa not implemented"}, | 121 | {ERR_REASON(ENGINE_R_DSA_NOT_IMPLEMENTED),"dsa not implemented"}, |
118 | {ENGINE_R_DSO_FAILURE ,"DSO failure"}, | 122 | {ERR_REASON(ENGINE_R_DSO_FAILURE) ,"DSO failure"}, |
119 | {ENGINE_R_DSO_NOT_FOUND ,"dso not found"}, | 123 | {ERR_REASON(ENGINE_R_DSO_NOT_FOUND) ,"dso not found"}, |
120 | {ENGINE_R_ENGINES_SECTION_ERROR ,"engines section error"}, | 124 | {ERR_REASON(ENGINE_R_ENGINES_SECTION_ERROR),"engines section error"}, |
121 | {ENGINE_R_ENGINE_IS_NOT_IN_LIST ,"engine is not in the list"}, | 125 | {ERR_REASON(ENGINE_R_ENGINE_IS_NOT_IN_LIST),"engine is not in the list"}, |
122 | {ENGINE_R_ENGINE_SECTION_ERROR ,"engine section error"}, | 126 | {ERR_REASON(ENGINE_R_ENGINE_SECTION_ERROR),"engine section error"}, |
123 | {ENGINE_R_FAILED_LOADING_PRIVATE_KEY ,"failed loading private key"}, | 127 | {ERR_REASON(ENGINE_R_FAILED_LOADING_PRIVATE_KEY),"failed loading private key"}, |
124 | {ENGINE_R_FAILED_LOADING_PUBLIC_KEY ,"failed loading public key"}, | 128 | {ERR_REASON(ENGINE_R_FAILED_LOADING_PUBLIC_KEY),"failed loading public key"}, |
125 | {ENGINE_R_FINISH_FAILED ,"finish failed"}, | 129 | {ERR_REASON(ENGINE_R_FINISH_FAILED) ,"finish failed"}, |
126 | {ENGINE_R_GET_HANDLE_FAILED ,"could not obtain hardware handle"}, | 130 | {ERR_REASON(ENGINE_R_GET_HANDLE_FAILED) ,"could not obtain hardware handle"}, |
127 | {ENGINE_R_ID_OR_NAME_MISSING ,"'id' or 'name' missing"}, | 131 | {ERR_REASON(ENGINE_R_ID_OR_NAME_MISSING) ,"'id' or 'name' missing"}, |
128 | {ENGINE_R_INIT_FAILED ,"init failed"}, | 132 | {ERR_REASON(ENGINE_R_INIT_FAILED) ,"init failed"}, |
129 | {ENGINE_R_INTERNAL_LIST_ERROR ,"internal list error"}, | 133 | {ERR_REASON(ENGINE_R_INTERNAL_LIST_ERROR),"internal list error"}, |
130 | {ENGINE_R_INVALID_ARGUMENT ,"invalid argument"}, | 134 | {ERR_REASON(ENGINE_R_INVALID_ARGUMENT) ,"invalid argument"}, |
131 | {ENGINE_R_INVALID_CMD_NAME ,"invalid cmd name"}, | 135 | {ERR_REASON(ENGINE_R_INVALID_CMD_NAME) ,"invalid cmd name"}, |
132 | {ENGINE_R_INVALID_CMD_NUMBER ,"invalid cmd number"}, | 136 | {ERR_REASON(ENGINE_R_INVALID_CMD_NUMBER) ,"invalid cmd number"}, |
133 | {ENGINE_R_INVALID_INIT_VALUE ,"invalid init value"}, | 137 | {ERR_REASON(ENGINE_R_INVALID_INIT_VALUE) ,"invalid init value"}, |
134 | {ENGINE_R_INVALID_STRING ,"invalid string"}, | 138 | {ERR_REASON(ENGINE_R_INVALID_STRING) ,"invalid string"}, |
135 | {ENGINE_R_NOT_INITIALISED ,"not initialised"}, | 139 | {ERR_REASON(ENGINE_R_NOT_INITIALISED) ,"not initialised"}, |
136 | {ENGINE_R_NOT_LOADED ,"not loaded"}, | 140 | {ERR_REASON(ENGINE_R_NOT_LOADED) ,"not loaded"}, |
137 | {ENGINE_R_NO_CONTROL_FUNCTION ,"no control function"}, | 141 | {ERR_REASON(ENGINE_R_NO_CONTROL_FUNCTION),"no control function"}, |
138 | {ENGINE_R_NO_INDEX ,"no index"}, | 142 | {ERR_REASON(ENGINE_R_NO_INDEX) ,"no index"}, |
139 | {ENGINE_R_NO_LOAD_FUNCTION ,"no load function"}, | 143 | {ERR_REASON(ENGINE_R_NO_LOAD_FUNCTION) ,"no load function"}, |
140 | {ENGINE_R_NO_REFERENCE ,"no reference"}, | 144 | {ERR_REASON(ENGINE_R_NO_REFERENCE) ,"no reference"}, |
141 | {ENGINE_R_NO_SUCH_ENGINE ,"no such engine"}, | 145 | {ERR_REASON(ENGINE_R_NO_SUCH_ENGINE) ,"no such engine"}, |
142 | {ENGINE_R_NO_UNLOAD_FUNCTION ,"no unload function"}, | 146 | {ERR_REASON(ENGINE_R_NO_UNLOAD_FUNCTION) ,"no unload function"}, |
143 | {ENGINE_R_PROVIDE_PARAMETERS ,"provide parameters"}, | 147 | {ERR_REASON(ENGINE_R_PROVIDE_PARAMETERS) ,"provide parameters"}, |
144 | {ENGINE_R_RSA_NOT_IMPLEMENTED ,"rsa not implemented"}, | 148 | {ERR_REASON(ENGINE_R_RSA_NOT_IMPLEMENTED),"rsa not implemented"}, |
145 | {ENGINE_R_UNIMPLEMENTED_CIPHER ,"unimplemented cipher"}, | 149 | {ERR_REASON(ENGINE_R_UNIMPLEMENTED_CIPHER),"unimplemented cipher"}, |
146 | {ENGINE_R_UNIMPLEMENTED_DIGEST ,"unimplemented digest"}, | 150 | {ERR_REASON(ENGINE_R_UNIMPLEMENTED_DIGEST),"unimplemented digest"}, |
147 | {ENGINE_R_VERSION_INCOMPATIBILITY ,"version incompatibility"}, | 151 | {ERR_REASON(ENGINE_R_VERSION_INCOMPATIBILITY),"version incompatibility"}, |
148 | {0,NULL} | 152 | {0,NULL} |
149 | }; | 153 | }; |
150 | 154 | ||
@@ -158,8 +162,8 @@ void ERR_load_ENGINE_strings(void) | |||
158 | { | 162 | { |
159 | init=0; | 163 | init=0; |
160 | #ifndef OPENSSL_NO_ERR | 164 | #ifndef OPENSSL_NO_ERR |
161 | ERR_load_strings(ERR_LIB_ENGINE,ENGINE_str_functs); | 165 | ERR_load_strings(0,ENGINE_str_functs); |
162 | ERR_load_strings(ERR_LIB_ENGINE,ENGINE_str_reasons); | 166 | ERR_load_strings(0,ENGINE_str_reasons); |
163 | #endif | 167 | #endif |
164 | 168 | ||
165 | } | 169 | } |
diff --git a/src/lib/libcrypto/engine/tb_dsa.c b/src/lib/libcrypto/engine/tb_dsa.c index 80170591f2..7efe181927 100644 --- a/src/lib/libcrypto/engine/tb_dsa.c +++ b/src/lib/libcrypto/engine/tb_dsa.c | |||
@@ -94,7 +94,7 @@ int ENGINE_set_default_DSA(ENGINE *e) | |||
94 | { | 94 | { |
95 | if(e->dsa_meth) | 95 | if(e->dsa_meth) |
96 | return engine_table_register(&dsa_table, | 96 | return engine_table_register(&dsa_table, |
97 | engine_unregister_all_DSA, e, &dummy_nid, 1, 0); | 97 | engine_unregister_all_DSA, e, &dummy_nid, 1, 1); |
98 | return 1; | 98 | return 1; |
99 | } | 99 | } |
100 | 100 | ||
diff --git a/src/lib/libcrypto/err/err.c b/src/lib/libcrypto/err/err.c index c78790a54c..53687d79ab 100644 --- a/src/lib/libcrypto/err/err.c +++ b/src/lib/libcrypto/err/err.c | |||
@@ -621,7 +621,8 @@ static void err_load_strings(int lib, ERR_STRING_DATA *str) | |||
621 | { | 621 | { |
622 | while (str->error) | 622 | while (str->error) |
623 | { | 623 | { |
624 | str->error|=ERR_PACK(lib,0,0); | 624 | if (lib) |
625 | str->error|=ERR_PACK(lib,0,0); | ||
625 | ERRFN(err_set_item)(str); | 626 | ERRFN(err_set_item)(str); |
626 | str++; | 627 | str++; |
627 | } | 628 | } |
@@ -637,7 +638,8 @@ void ERR_unload_strings(int lib, ERR_STRING_DATA *str) | |||
637 | { | 638 | { |
638 | while (str->error) | 639 | while (str->error) |
639 | { | 640 | { |
640 | str->error|=ERR_PACK(lib,0,0); | 641 | if (lib) |
642 | str->error|=ERR_PACK(lib,0,0); | ||
641 | ERRFN(err_del_item)(str); | 643 | ERRFN(err_del_item)(str); |
642 | str++; | 644 | str++; |
643 | } | 645 | } |
diff --git a/src/lib/libcrypto/err/openssl.ec b/src/lib/libcrypto/err/openssl.ec index 447a7f87ed..f8cd6937e7 100644 --- a/src/lib/libcrypto/err/openssl.ec +++ b/src/lib/libcrypto/err/openssl.ec | |||
@@ -27,7 +27,7 @@ L DSO crypto/dso/dso.h crypto/dso/dso_err.c | |||
27 | L ENGINE crypto/engine/engine.h crypto/engine/eng_err.c | 27 | L ENGINE crypto/engine/engine.h crypto/engine/eng_err.c |
28 | L OCSP crypto/ocsp/ocsp.h crypto/ocsp/ocsp_err.c | 28 | L OCSP crypto/ocsp/ocsp.h crypto/ocsp/ocsp_err.c |
29 | L UI crypto/ui/ui.h crypto/ui/ui_err.c | 29 | L UI crypto/ui/ui.h crypto/ui/ui_err.c |
30 | L FIPS fips/fips.h fips/fips_err.h | 30 | L FIPS fips-1.0/fips.h fips-1.0/fips_err.h |
31 | 31 | ||
32 | # additional header files to be scanned for function names | 32 | # additional header files to be scanned for function names |
33 | L NONE crypto/x509/x509_vfy.h NONE | 33 | L NONE crypto/x509/x509_vfy.h NONE |
diff --git a/src/lib/libcrypto/evp/bio_enc.c b/src/lib/libcrypto/evp/bio_enc.c index ab81851503..b8cda1a9f0 100644 --- a/src/lib/libcrypto/evp/bio_enc.c +++ b/src/lib/libcrypto/evp/bio_enc.c | |||
@@ -71,7 +71,7 @@ static int enc_new(BIO *h); | |||
71 | static int enc_free(BIO *data); | 71 | static int enc_free(BIO *data); |
72 | static long enc_callback_ctrl(BIO *h, int cmd, bio_info_cb *fps); | 72 | static long enc_callback_ctrl(BIO *h, int cmd, bio_info_cb *fps); |
73 | #define ENC_BLOCK_SIZE (1024*4) | 73 | #define ENC_BLOCK_SIZE (1024*4) |
74 | #define BUF_OFFSET EVP_MAX_BLOCK_LENGTH | 74 | #define BUF_OFFSET (EVP_MAX_BLOCK_LENGTH*2) |
75 | 75 | ||
76 | typedef struct enc_struct | 76 | typedef struct enc_struct |
77 | { | 77 | { |
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index f35036c9d7..7b67984fa1 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
@@ -86,9 +86,9 @@ IMPLEMENT_BLOCK_CIPHER(aes_256, ks, AES, EVP_AES_KEY, | |||
86 | 86 | ||
87 | #define IMPLEMENT_AES_CFBR(ksize,cbits,flags) IMPLEMENT_CFBR(aes,AES,EVP_AES_KEY,ks,ksize,cbits,16,flags) | 87 | #define IMPLEMENT_AES_CFBR(ksize,cbits,flags) IMPLEMENT_CFBR(aes,AES,EVP_AES_KEY,ks,ksize,cbits,16,flags) |
88 | 88 | ||
89 | IMPLEMENT_AES_CFBR(128,1,0) | 89 | IMPLEMENT_AES_CFBR(128,1,EVP_CIPH_FLAG_FIPS) |
90 | IMPLEMENT_AES_CFBR(192,1,0) | 90 | IMPLEMENT_AES_CFBR(192,1,EVP_CIPH_FLAG_FIPS) |
91 | IMPLEMENT_AES_CFBR(256,1,0) | 91 | IMPLEMENT_AES_CFBR(256,1,EVP_CIPH_FLAG_FIPS) |
92 | 92 | ||
93 | IMPLEMENT_AES_CFBR(128,8,EVP_CIPH_FLAG_FIPS) | 93 | IMPLEMENT_AES_CFBR(128,8,EVP_CIPH_FLAG_FIPS) |
94 | IMPLEMENT_AES_CFBR(192,8,EVP_CIPH_FLAG_FIPS) | 94 | IMPLEMENT_AES_CFBR(192,8,EVP_CIPH_FLAG_FIPS) |
diff --git a/src/lib/libcrypto/evp/encode.c b/src/lib/libcrypto/evp/encode.c index 08209357ce..33e540087d 100644 --- a/src/lib/libcrypto/evp/encode.c +++ b/src/lib/libcrypto/evp/encode.c | |||
@@ -313,7 +313,7 @@ int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | |||
313 | /* There will never be more than two '=' */ | 313 | /* There will never be more than two '=' */ |
314 | } | 314 | } |
315 | 315 | ||
316 | if ((v == B64_EOF) || (n >= 64)) | 316 | if ((v == B64_EOF && (n&3) == 0) || (n >= 64)) |
317 | { | 317 | { |
318 | /* This is needed to work correctly on 64 byte input | 318 | /* This is needed to work correctly on 64 byte input |
319 | * lines. We process the line and then need to | 319 | * lines. We process the line and then need to |
diff --git a/src/lib/libcrypto/evp/evp.h b/src/lib/libcrypto/evp/evp.h index 5cde88ae76..56eec23fef 100644 --- a/src/lib/libcrypto/evp/evp.h +++ b/src/lib/libcrypto/evp/evp.h | |||
@@ -84,7 +84,11 @@ | |||
84 | #include <openssl/md5.h> | 84 | #include <openssl/md5.h> |
85 | #endif | 85 | #endif |
86 | #ifndef OPENSSL_NO_SHA | 86 | #ifndef OPENSSL_NO_SHA |
87 | #ifndef OPENSSL_FIPS | ||
87 | #include <openssl/sha.h> | 88 | #include <openssl/sha.h> |
89 | #else | ||
90 | #include <openssl/fips_sha.h> | ||
91 | #endif | ||
88 | #endif | 92 | #endif |
89 | #ifndef OPENSSL_NO_RIPEMD | 93 | #ifndef OPENSSL_NO_RIPEMD |
90 | #include <openssl/ripemd.h> | 94 | #include <openssl/ripemd.h> |
@@ -128,7 +132,11 @@ | |||
128 | #define EVP_CAST5_KEY_SIZE 16 | 132 | #define EVP_CAST5_KEY_SIZE 16 |
129 | #define EVP_RC5_32_12_16_KEY_SIZE 16 | 133 | #define EVP_RC5_32_12_16_KEY_SIZE 16 |
130 | */ | 134 | */ |
131 | #define EVP_MAX_MD_SIZE (16+20) /* The SSLv3 md5+sha1 type */ | 135 | #ifdef OPENSSL_FIPS |
136 | #define EVP_MAX_MD_SIZE 64 /* longest known SHA512 */ | ||
137 | #else | ||
138 | #define EVP_MAX_MD_SIZE (16+20) /* The SSLv3 md5+sha1 type */ | ||
139 | #endif | ||
132 | #define EVP_MAX_KEY_LENGTH 32 | 140 | #define EVP_MAX_KEY_LENGTH 32 |
133 | #define EVP_MAX_IV_LENGTH 16 | 141 | #define EVP_MAX_IV_LENGTH 16 |
134 | #define EVP_MAX_BLOCK_LENGTH 32 | 142 | #define EVP_MAX_BLOCK_LENGTH 32 |
@@ -642,6 +650,16 @@ const EVP_MD *EVP_sha(void); | |||
642 | const EVP_MD *EVP_sha1(void); | 650 | const EVP_MD *EVP_sha1(void); |
643 | const EVP_MD *EVP_dss(void); | 651 | const EVP_MD *EVP_dss(void); |
644 | const EVP_MD *EVP_dss1(void); | 652 | const EVP_MD *EVP_dss1(void); |
653 | #ifdef OPENSSL_FIPS | ||
654 | #ifndef OPENSSL_NO_SHA256 | ||
655 | const EVP_MD *EVP_sha224(void); | ||
656 | const EVP_MD *EVP_sha256(void); | ||
657 | #endif | ||
658 | #ifndef OPENSSL_NO_SHA512 | ||
659 | const EVP_MD *EVP_sha384(void); | ||
660 | const EVP_MD *EVP_sha512(void); | ||
661 | #endif | ||
662 | #endif | ||
645 | #endif | 663 | #endif |
646 | #ifndef OPENSSL_NO_MDC2 | 664 | #ifndef OPENSSL_NO_MDC2 |
647 | const EVP_MD *EVP_mdc2(void); | 665 | const EVP_MD *EVP_mdc2(void); |
diff --git a/src/lib/libcrypto/evp/evp_err.c b/src/lib/libcrypto/evp/evp_err.c index 40135d0729..77eee070d3 100644 --- a/src/lib/libcrypto/evp/evp_err.c +++ b/src/lib/libcrypto/evp/evp_err.c | |||
@@ -64,88 +64,92 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_EVP,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_EVP,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA EVP_str_functs[]= | 71 | static ERR_STRING_DATA EVP_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,EVP_F_AES_INIT_KEY,0), "AES_INIT_KEY"}, | 73 | {ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"}, |
70 | {ERR_PACK(0,EVP_F_D2I_PKEY,0), "D2I_PKEY"}, | 74 | {ERR_FUNC(EVP_F_D2I_PKEY), "D2I_PKEY"}, |
71 | {ERR_PACK(0,EVP_F_EVP_ADD_CIPHER,0), "EVP_add_cipher"}, | 75 | {ERR_FUNC(EVP_F_EVP_ADD_CIPHER), "EVP_add_cipher"}, |
72 | {ERR_PACK(0,EVP_F_EVP_ADD_DIGEST,0), "EVP_add_digest"}, | 76 | {ERR_FUNC(EVP_F_EVP_ADD_DIGEST), "EVP_add_digest"}, |
73 | {ERR_PACK(0,EVP_F_EVP_CIPHERINIT,0), "EVP_CipherInit"}, | 77 | {ERR_FUNC(EVP_F_EVP_CIPHERINIT), "EVP_CipherInit"}, |
74 | {ERR_PACK(0,EVP_F_EVP_CIPHER_CTX_CTRL,0), "EVP_CIPHER_CTX_ctrl"}, | 78 | {ERR_FUNC(EVP_F_EVP_CIPHER_CTX_CTRL), "EVP_CIPHER_CTX_ctrl"}, |
75 | {ERR_PACK(0,EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH,0), "EVP_CIPHER_CTX_set_key_length"}, | 79 | {ERR_FUNC(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH), "EVP_CIPHER_CTX_set_key_length"}, |
76 | {ERR_PACK(0,EVP_F_EVP_DECRYPTFINAL,0), "EVP_DecryptFinal"}, | 80 | {ERR_FUNC(EVP_F_EVP_DECRYPTFINAL), "EVP_DecryptFinal"}, |
77 | {ERR_PACK(0,EVP_F_EVP_DIGESTINIT,0), "EVP_DigestInit"}, | 81 | {ERR_FUNC(EVP_F_EVP_DIGESTINIT), "EVP_DigestInit"}, |
78 | {ERR_PACK(0,EVP_F_EVP_ENCRYPTFINAL,0), "EVP_EncryptFinal"}, | 82 | {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL), "EVP_EncryptFinal"}, |
79 | {ERR_PACK(0,EVP_F_EVP_GET_CIPHERBYNAME,0), "EVP_get_cipherbyname"}, | 83 | {ERR_FUNC(EVP_F_EVP_GET_CIPHERBYNAME), "EVP_get_cipherbyname"}, |
80 | {ERR_PACK(0,EVP_F_EVP_GET_DIGESTBYNAME,0), "EVP_get_digestbyname"}, | 84 | {ERR_FUNC(EVP_F_EVP_GET_DIGESTBYNAME), "EVP_get_digestbyname"}, |
81 | {ERR_PACK(0,EVP_F_EVP_MD_CTX_COPY,0), "EVP_MD_CTX_copy"}, | 85 | {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY), "EVP_MD_CTX_copy"}, |
82 | {ERR_PACK(0,EVP_F_EVP_OPENINIT,0), "EVP_OpenInit"}, | 86 | {ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"}, |
83 | {ERR_PACK(0,EVP_F_EVP_PBE_ALG_ADD,0), "EVP_PBE_alg_add"}, | 87 | {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD), "EVP_PBE_alg_add"}, |
84 | {ERR_PACK(0,EVP_F_EVP_PBE_CIPHERINIT,0), "EVP_PBE_CipherInit"}, | 88 | {ERR_FUNC(EVP_F_EVP_PBE_CIPHERINIT), "EVP_PBE_CipherInit"}, |
85 | {ERR_PACK(0,EVP_F_EVP_PKCS82PKEY,0), "EVP_PKCS82PKEY"}, | 89 | {ERR_FUNC(EVP_F_EVP_PKCS82PKEY), "EVP_PKCS82PKEY"}, |
86 | {ERR_PACK(0,EVP_F_EVP_PKCS8_SET_BROKEN,0), "EVP_PKCS8_SET_BROKEN"}, | 90 | {ERR_FUNC(EVP_F_EVP_PKCS8_SET_BROKEN), "EVP_PKCS8_SET_BROKEN"}, |
87 | {ERR_PACK(0,EVP_F_EVP_PKEY2PKCS8,0), "EVP_PKEY2PKCS8"}, | 91 | {ERR_FUNC(EVP_F_EVP_PKEY2PKCS8), "EVP_PKEY2PKCS8"}, |
88 | {ERR_PACK(0,EVP_F_EVP_PKEY_COPY_PARAMETERS,0), "EVP_PKEY_copy_parameters"}, | 92 | {ERR_FUNC(EVP_F_EVP_PKEY_COPY_PARAMETERS), "EVP_PKEY_copy_parameters"}, |
89 | {ERR_PACK(0,EVP_F_EVP_PKEY_DECRYPT,0), "EVP_PKEY_decrypt"}, | 93 | {ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT), "EVP_PKEY_decrypt"}, |
90 | {ERR_PACK(0,EVP_F_EVP_PKEY_ENCRYPT,0), "EVP_PKEY_encrypt"}, | 94 | {ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT), "EVP_PKEY_encrypt"}, |
91 | {ERR_PACK(0,EVP_F_EVP_PKEY_GET1_DH,0), "EVP_PKEY_get1_DH"}, | 95 | {ERR_FUNC(EVP_F_EVP_PKEY_GET1_DH), "EVP_PKEY_get1_DH"}, |
92 | {ERR_PACK(0,EVP_F_EVP_PKEY_GET1_DSA,0), "EVP_PKEY_get1_DSA"}, | 96 | {ERR_FUNC(EVP_F_EVP_PKEY_GET1_DSA), "EVP_PKEY_get1_DSA"}, |
93 | {ERR_PACK(0,EVP_F_EVP_PKEY_GET1_RSA,0), "EVP_PKEY_get1_RSA"}, | 97 | {ERR_FUNC(EVP_F_EVP_PKEY_GET1_RSA), "EVP_PKEY_get1_RSA"}, |
94 | {ERR_PACK(0,EVP_F_EVP_PKEY_NEW,0), "EVP_PKEY_new"}, | 98 | {ERR_FUNC(EVP_F_EVP_PKEY_NEW), "EVP_PKEY_new"}, |
95 | {ERR_PACK(0,EVP_F_EVP_RIJNDAEL,0), "EVP_RIJNDAEL"}, | 99 | {ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"}, |
96 | {ERR_PACK(0,EVP_F_EVP_SIGNFINAL,0), "EVP_SignFinal"}, | 100 | {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"}, |
97 | {ERR_PACK(0,EVP_F_EVP_VERIFYFINAL,0), "EVP_VerifyFinal"}, | 101 | {ERR_FUNC(EVP_F_EVP_VERIFYFINAL), "EVP_VerifyFinal"}, |
98 | {ERR_PACK(0,EVP_F_PKCS5_PBE_KEYIVGEN,0), "PKCS5_PBE_keyivgen"}, | 102 | {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN), "PKCS5_PBE_keyivgen"}, |
99 | {ERR_PACK(0,EVP_F_PKCS5_V2_PBE_KEYIVGEN,0), "PKCS5_v2_PBE_keyivgen"}, | 103 | {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"}, |
100 | {ERR_PACK(0,EVP_F_RC2_MAGIC_TO_METH,0), "RC2_MAGIC_TO_METH"}, | 104 | {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH), "RC2_MAGIC_TO_METH"}, |
101 | {ERR_PACK(0,EVP_F_RC5_CTRL,0), "RC5_CTRL"}, | 105 | {ERR_FUNC(EVP_F_RC5_CTRL), "RC5_CTRL"}, |
102 | {0,NULL} | 106 | {0,NULL} |
103 | }; | 107 | }; |
104 | 108 | ||
105 | static ERR_STRING_DATA EVP_str_reasons[]= | 109 | static ERR_STRING_DATA EVP_str_reasons[]= |
106 | { | 110 | { |
107 | {EVP_R_AES_KEY_SETUP_FAILED ,"aes key setup failed"}, | 111 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) ,"aes key setup failed"}, |
108 | {EVP_R_BAD_BLOCK_LENGTH ,"bad block length"}, | 112 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) ,"bad block length"}, |
109 | {EVP_R_BAD_DECRYPT ,"bad decrypt"}, | 113 | {ERR_REASON(EVP_R_BAD_DECRYPT) ,"bad decrypt"}, |
110 | {EVP_R_BAD_KEY_LENGTH ,"bad key length"}, | 114 | {ERR_REASON(EVP_R_BAD_KEY_LENGTH) ,"bad key length"}, |
111 | {EVP_R_BN_DECODE_ERROR ,"bn decode error"}, | 115 | {ERR_REASON(EVP_R_BN_DECODE_ERROR) ,"bn decode error"}, |
112 | {EVP_R_BN_PUBKEY_ERROR ,"bn pubkey error"}, | 116 | {ERR_REASON(EVP_R_BN_PUBKEY_ERROR) ,"bn pubkey error"}, |
113 | {EVP_R_CIPHER_PARAMETER_ERROR ,"cipher parameter error"}, | 117 | {ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR),"cipher parameter error"}, |
114 | {EVP_R_CTRL_NOT_IMPLEMENTED ,"ctrl not implemented"}, | 118 | {ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED) ,"ctrl not implemented"}, |
115 | {EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED ,"ctrl operation not implemented"}, | 119 | {ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED),"ctrl operation not implemented"}, |
116 | {EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH ,"data not multiple of block length"}, | 120 | {ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH),"data not multiple of block length"}, |
117 | {EVP_R_DECODE_ERROR ,"decode error"}, | 121 | {ERR_REASON(EVP_R_DECODE_ERROR) ,"decode error"}, |
118 | {EVP_R_DIFFERENT_KEY_TYPES ,"different key types"}, | 122 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) ,"different key types"}, |
119 | {EVP_R_DISABLED_FOR_FIPS ,"disabled for fips"}, | 123 | {ERR_REASON(EVP_R_DISABLED_FOR_FIPS) ,"disabled for fips"}, |
120 | {EVP_R_ENCODE_ERROR ,"encode error"}, | 124 | {ERR_REASON(EVP_R_ENCODE_ERROR) ,"encode error"}, |
121 | {EVP_R_EVP_PBE_CIPHERINIT_ERROR ,"evp pbe cipherinit error"}, | 125 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"}, |
122 | {EVP_R_EXPECTING_AN_RSA_KEY ,"expecting an rsa key"}, | 126 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) ,"expecting an rsa key"}, |
123 | {EVP_R_EXPECTING_A_DH_KEY ,"expecting a dh key"}, | 127 | {ERR_REASON(EVP_R_EXPECTING_A_DH_KEY) ,"expecting a dh key"}, |
124 | {EVP_R_EXPECTING_A_DSA_KEY ,"expecting a dsa key"}, | 128 | {ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY) ,"expecting a dsa key"}, |
125 | {EVP_R_INITIALIZATION_ERROR ,"initialization error"}, | 129 | {ERR_REASON(EVP_R_INITIALIZATION_ERROR) ,"initialization error"}, |
126 | {EVP_R_INPUT_NOT_INITIALIZED ,"input not initialized"}, | 130 | {ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) ,"input not initialized"}, |
127 | {EVP_R_INVALID_KEY_LENGTH ,"invalid key length"}, | 131 | {ERR_REASON(EVP_R_INVALID_KEY_LENGTH) ,"invalid key length"}, |
128 | {EVP_R_IV_TOO_LARGE ,"iv too large"}, | 132 | {ERR_REASON(EVP_R_IV_TOO_LARGE) ,"iv too large"}, |
129 | {EVP_R_KEYGEN_FAILURE ,"keygen failure"}, | 133 | {ERR_REASON(EVP_R_KEYGEN_FAILURE) ,"keygen failure"}, |
130 | {EVP_R_MISSING_PARAMETERS ,"missing parameters"}, | 134 | {ERR_REASON(EVP_R_MISSING_PARAMETERS) ,"missing parameters"}, |
131 | {EVP_R_NO_CIPHER_SET ,"no cipher set"}, | 135 | {ERR_REASON(EVP_R_NO_CIPHER_SET) ,"no cipher set"}, |
132 | {EVP_R_NO_DIGEST_SET ,"no digest set"}, | 136 | {ERR_REASON(EVP_R_NO_DIGEST_SET) ,"no digest set"}, |
133 | {EVP_R_NO_DSA_PARAMETERS ,"no dsa parameters"}, | 137 | {ERR_REASON(EVP_R_NO_DSA_PARAMETERS) ,"no dsa parameters"}, |
134 | {EVP_R_NO_SIGN_FUNCTION_CONFIGURED ,"no sign function configured"}, | 138 | {ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED),"no sign function configured"}, |
135 | {EVP_R_NO_VERIFY_FUNCTION_CONFIGURED ,"no verify function configured"}, | 139 | {ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED),"no verify function configured"}, |
136 | {EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE ,"pkcs8 unknown broken type"}, | 140 | {ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE),"pkcs8 unknown broken type"}, |
137 | {EVP_R_PUBLIC_KEY_NOT_RSA ,"public key not rsa"}, | 141 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, |
138 | {EVP_R_UNKNOWN_PBE_ALGORITHM ,"unknown pbe algorithm"}, | 142 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"}, |
139 | {EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS ,"unsuported number of rounds"}, | 143 | {ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS),"unsuported number of rounds"}, |
140 | {EVP_R_UNSUPPORTED_CIPHER ,"unsupported cipher"}, | 144 | {ERR_REASON(EVP_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"}, |
141 | {EVP_R_UNSUPPORTED_KEYLENGTH ,"unsupported keylength"}, | 145 | {ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) ,"unsupported keylength"}, |
142 | {EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION,"unsupported key derivation function"}, | 146 | {ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION),"unsupported key derivation function"}, |
143 | {EVP_R_UNSUPPORTED_KEY_SIZE ,"unsupported key size"}, | 147 | {ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE) ,"unsupported key size"}, |
144 | {EVP_R_UNSUPPORTED_PRF ,"unsupported prf"}, | 148 | {ERR_REASON(EVP_R_UNSUPPORTED_PRF) ,"unsupported prf"}, |
145 | {EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM ,"unsupported private key algorithm"}, | 149 | {ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM),"unsupported private key algorithm"}, |
146 | {EVP_R_UNSUPPORTED_SALT_TYPE ,"unsupported salt type"}, | 150 | {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) ,"unsupported salt type"}, |
147 | {EVP_R_WRONG_FINAL_BLOCK_LENGTH ,"wrong final block length"}, | 151 | {ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH),"wrong final block length"}, |
148 | {EVP_R_WRONG_PUBLIC_KEY_TYPE ,"wrong public key type"}, | 152 | {ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) ,"wrong public key type"}, |
149 | {0,NULL} | 153 | {0,NULL} |
150 | }; | 154 | }; |
151 | 155 | ||
@@ -159,8 +163,8 @@ void ERR_load_EVP_strings(void) | |||
159 | { | 163 | { |
160 | init=0; | 164 | init=0; |
161 | #ifndef OPENSSL_NO_ERR | 165 | #ifndef OPENSSL_NO_ERR |
162 | ERR_load_strings(ERR_LIB_EVP,EVP_str_functs); | 166 | ERR_load_strings(0,EVP_str_functs); |
163 | ERR_load_strings(ERR_LIB_EVP,EVP_str_reasons); | 167 | ERR_load_strings(0,EVP_str_reasons); |
164 | #endif | 168 | #endif |
165 | 169 | ||
166 | } | 170 | } |
diff --git a/src/lib/libcrypto/evp/evp_key.c b/src/lib/libcrypto/evp/evp_key.c index 5f387a94d3..f8650d5df6 100644 --- a/src/lib/libcrypto/evp/evp_key.c +++ b/src/lib/libcrypto/evp/evp_key.c | |||
@@ -126,7 +126,8 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
126 | EVP_MD_CTX_init(&c); | 126 | EVP_MD_CTX_init(&c); |
127 | for (;;) | 127 | for (;;) |
128 | { | 128 | { |
129 | EVP_DigestInit_ex(&c,md, NULL); | 129 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
130 | return 0; | ||
130 | if (addmd++) | 131 | if (addmd++) |
131 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 132 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); |
132 | EVP_DigestUpdate(&c,data,datal); | 133 | EVP_DigestUpdate(&c,data,datal); |
diff --git a/src/lib/libcrypto/evp/m_dss1.c b/src/lib/libcrypto/evp/m_dss1.c index f5668ebda0..23b90d0538 100644 --- a/src/lib/libcrypto/evp/m_dss1.c +++ b/src/lib/libcrypto/evp/m_dss1.c | |||
@@ -67,7 +67,14 @@ static int init(EVP_MD_CTX *ctx) | |||
67 | { return SHA1_Init(ctx->md_data); } | 67 | { return SHA1_Init(ctx->md_data); } |
68 | 68 | ||
69 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | 69 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) |
70 | #ifndef OPENSSL_FIPS | ||
70 | { return SHA1_Update(ctx->md_data,data,count); } | 71 | { return SHA1_Update(ctx->md_data,data,count); } |
72 | #else | ||
73 | { | ||
74 | OPENSSL_assert(sizeof(count)<=sizeof(size_t)); | ||
75 | return SHA1_Update(ctx->md_data,data,count); | ||
76 | } | ||
77 | #endif | ||
71 | 78 | ||
72 | static int final(EVP_MD_CTX *ctx,unsigned char *md) | 79 | static int final(EVP_MD_CTX *ctx,unsigned char *md) |
73 | { return SHA1_Final(md,ctx->md_data); } | 80 | { return SHA1_Final(md,ctx->md_data); } |
@@ -77,7 +84,7 @@ static const EVP_MD dss1_md= | |||
77 | NID_dsa, | 84 | NID_dsa, |
78 | NID_dsaWithSHA1, | 85 | NID_dsaWithSHA1, |
79 | SHA_DIGEST_LENGTH, | 86 | SHA_DIGEST_LENGTH, |
80 | 0, | 87 | EVP_MD_FLAG_FIPS, |
81 | init, | 88 | init, |
82 | update, | 89 | update, |
83 | final, | 90 | final, |
diff --git a/src/lib/libcrypto/evp/m_sha1.c b/src/lib/libcrypto/evp/m_sha1.c index fe4402389a..60da93873c 100644 --- a/src/lib/libcrypto/evp/m_sha1.c +++ b/src/lib/libcrypto/evp/m_sha1.c | |||
@@ -67,7 +67,14 @@ static int init(EVP_MD_CTX *ctx) | |||
67 | { return SHA1_Init(ctx->md_data); } | 67 | { return SHA1_Init(ctx->md_data); } |
68 | 68 | ||
69 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) | 69 | static int update(EVP_MD_CTX *ctx,const void *data,unsigned long count) |
70 | #ifndef OPENSSL_FIPS | ||
70 | { return SHA1_Update(ctx->md_data,data,count); } | 71 | { return SHA1_Update(ctx->md_data,data,count); } |
72 | #else | ||
73 | { | ||
74 | OPENSSL_assert(sizeof(count)<=sizeof(size_t)); | ||
75 | return SHA1_Update(ctx->md_data,data,count); | ||
76 | } | ||
77 | #endif | ||
71 | 78 | ||
72 | static int final(EVP_MD_CTX *ctx,unsigned char *md) | 79 | static int final(EVP_MD_CTX *ctx,unsigned char *md) |
73 | { return SHA1_Final(md,ctx->md_data); } | 80 | { return SHA1_Final(md,ctx->md_data); } |
@@ -93,3 +100,115 @@ const EVP_MD *EVP_sha1(void) | |||
93 | return(&sha1_md); | 100 | return(&sha1_md); |
94 | } | 101 | } |
95 | #endif | 102 | #endif |
103 | |||
104 | #ifdef OPENSSL_FIPS | ||
105 | #ifndef OPENSSL_NO_SHA256 | ||
106 | static int init224(EVP_MD_CTX *ctx) | ||
107 | { return SHA224_Init(ctx->md_data); } | ||
108 | static int init256(EVP_MD_CTX *ctx) | ||
109 | { return SHA256_Init(ctx->md_data); } | ||
110 | /* | ||
111 | * Even though there're separate SHA224_[Update|Final], we call | ||
112 | * SHA256 functions even in SHA224 context. This is what happens | ||
113 | * there anyway, so we can spare few CPU cycles:-) | ||
114 | */ | ||
115 | static int update256(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
116 | { | ||
117 | OPENSSL_assert(sizeof(count)<=sizeof(size_t)); | ||
118 | return SHA256_Update(ctx->md_data,data,count); | ||
119 | } | ||
120 | static int final256(EVP_MD_CTX *ctx,unsigned char *md) | ||
121 | { return SHA256_Final(md,ctx->md_data); } | ||
122 | |||
123 | static const EVP_MD sha224_md= | ||
124 | { | ||
125 | NID_sha224, | ||
126 | NID_sha224WithRSAEncryption, | ||
127 | SHA224_DIGEST_LENGTH, | ||
128 | EVP_MD_FLAG_FIPS, | ||
129 | init224, | ||
130 | update256, | ||
131 | final256, | ||
132 | NULL, | ||
133 | NULL, | ||
134 | EVP_PKEY_RSA_method, | ||
135 | SHA256_CBLOCK, | ||
136 | sizeof(EVP_MD *)+sizeof(SHA256_CTX), | ||
137 | }; | ||
138 | |||
139 | const EVP_MD *EVP_sha224(void) | ||
140 | { return(&sha224_md); } | ||
141 | |||
142 | static const EVP_MD sha256_md= | ||
143 | { | ||
144 | NID_sha256, | ||
145 | NID_sha256WithRSAEncryption, | ||
146 | SHA256_DIGEST_LENGTH, | ||
147 | EVP_MD_FLAG_FIPS, | ||
148 | init256, | ||
149 | update256, | ||
150 | final256, | ||
151 | NULL, | ||
152 | NULL, | ||
153 | EVP_PKEY_RSA_method, | ||
154 | SHA256_CBLOCK, | ||
155 | sizeof(EVP_MD *)+sizeof(SHA256_CTX), | ||
156 | }; | ||
157 | |||
158 | const EVP_MD *EVP_sha256(void) | ||
159 | { return(&sha256_md); } | ||
160 | #endif /* ifndef OPENSSL_NO_SHA256 */ | ||
161 | |||
162 | #ifndef OPENSSL_NO_SHA512 | ||
163 | static int init384(EVP_MD_CTX *ctx) | ||
164 | { return SHA384_Init(ctx->md_data); } | ||
165 | static int init512(EVP_MD_CTX *ctx) | ||
166 | { return SHA512_Init(ctx->md_data); } | ||
167 | /* See comment in SHA224/256 section */ | ||
168 | static int update512(EVP_MD_CTX *ctx,const void *data,unsigned long count) | ||
169 | { | ||
170 | OPENSSL_assert(sizeof(count)<=sizeof(size_t)); | ||
171 | return SHA512_Update(ctx->md_data,data,count); | ||
172 | } | ||
173 | static int final512(EVP_MD_CTX *ctx,unsigned char *md) | ||
174 | { return SHA512_Final(md,ctx->md_data); } | ||
175 | |||
176 | static const EVP_MD sha384_md= | ||
177 | { | ||
178 | NID_sha384, | ||
179 | NID_sha384WithRSAEncryption, | ||
180 | SHA384_DIGEST_LENGTH, | ||
181 | EVP_MD_FLAG_FIPS, | ||
182 | init384, | ||
183 | update512, | ||
184 | final512, | ||
185 | NULL, | ||
186 | NULL, | ||
187 | EVP_PKEY_RSA_method, | ||
188 | SHA512_CBLOCK, | ||
189 | sizeof(EVP_MD *)+sizeof(SHA512_CTX), | ||
190 | }; | ||
191 | |||
192 | const EVP_MD *EVP_sha384(void) | ||
193 | { return(&sha384_md); } | ||
194 | |||
195 | static const EVP_MD sha512_md= | ||
196 | { | ||
197 | NID_sha512, | ||
198 | NID_sha512WithRSAEncryption, | ||
199 | SHA512_DIGEST_LENGTH, | ||
200 | EVP_MD_FLAG_FIPS, | ||
201 | init512, | ||
202 | update512, | ||
203 | final512, | ||
204 | NULL, | ||
205 | NULL, | ||
206 | EVP_PKEY_RSA_method, | ||
207 | SHA512_CBLOCK, | ||
208 | sizeof(EVP_MD *)+sizeof(SHA512_CTX), | ||
209 | }; | ||
210 | |||
211 | const EVP_MD *EVP_sha512(void) | ||
212 | { return(&sha512_md); } | ||
213 | #endif /* ifndef OPENSSL_NO_SHA512 */ | ||
214 | #endif /* ifdef OPENSSL_FIPS */ | ||
diff --git a/src/lib/libcrypto/evp/p5_crpt2.c b/src/lib/libcrypto/evp/p5_crpt2.c index 1f94e1ef88..1d5fabc4b2 100644 --- a/src/lib/libcrypto/evp/p5_crpt2.c +++ b/src/lib/libcrypto/evp/p5_crpt2.c | |||
@@ -194,11 +194,16 @@ int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
194 | 194 | ||
195 | /* Now decode key derivation function */ | 195 | /* Now decode key derivation function */ |
196 | 196 | ||
197 | if(!pbe2->keyfunc->parameter || | ||
198 | (pbe2->keyfunc->parameter->type != V_ASN1_SEQUENCE)) | ||
199 | { | ||
200 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | ||
201 | goto err; | ||
202 | } | ||
203 | |||
197 | pbuf = pbe2->keyfunc->parameter->value.sequence->data; | 204 | pbuf = pbe2->keyfunc->parameter->value.sequence->data; |
198 | plen = pbe2->keyfunc->parameter->value.sequence->length; | 205 | plen = pbe2->keyfunc->parameter->value.sequence->length; |
199 | if(!pbe2->keyfunc->parameter || | 206 | if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { |
200 | (pbe2->keyfunc->parameter->type != V_ASN1_SEQUENCE) || | ||
201 | !(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { | ||
202 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); | 207 | EVPerr(EVP_F_PKCS5_V2_PBE_KEYIVGEN,EVP_R_DECODE_ERROR); |
203 | goto err; | 208 | goto err; |
204 | } | 209 | } |
diff --git a/src/lib/libcrypto/hmac/hmac.c b/src/lib/libcrypto/hmac/hmac.c index 06ee80761f..6c110bd52b 100644 --- a/src/lib/libcrypto/hmac/hmac.c +++ b/src/lib/libcrypto/hmac/hmac.c | |||
@@ -61,6 +61,8 @@ | |||
61 | #include <openssl/hmac.h> | 61 | #include <openssl/hmac.h> |
62 | #include "cryptlib.h" | 62 | #include "cryptlib.h" |
63 | 63 | ||
64 | #ifndef OPENSSL_FIPS | ||
65 | |||
64 | void HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, | 66 | void HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, |
65 | const EVP_MD *md, ENGINE *impl) | 67 | const EVP_MD *md, ENGINE *impl) |
66 | { | 68 | { |
@@ -77,15 +79,6 @@ void HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, | |||
77 | 79 | ||
78 | if (key != NULL) | 80 | if (key != NULL) |
79 | { | 81 | { |
80 | #ifdef OPENSSL_FIPS | ||
81 | if (FIPS_mode() && !(md->flags & EVP_MD_FLAG_FIPS) | ||
82 | && (!(ctx->md_ctx.flags & EVP_MD_CTX_FLAG_NON_FIPS_ALLOW) | ||
83 | || !(ctx->i_ctx.flags & EVP_MD_CTX_FLAG_NON_FIPS_ALLOW) | ||
84 | || !(ctx->o_ctx.flags & EVP_MD_CTX_FLAG_NON_FIPS_ALLOW))) | ||
85 | OpenSSLDie(__FILE__,__LINE__, | ||
86 | "HMAC: digest not allowed in FIPS mode"); | ||
87 | #endif | ||
88 | |||
89 | reset=1; | 82 | reset=1; |
90 | j=EVP_MD_block_size(md); | 83 | j=EVP_MD_block_size(md); |
91 | OPENSSL_assert(j <= sizeof ctx->key); | 84 | OPENSSL_assert(j <= sizeof ctx->key); |
@@ -187,3 +180,4 @@ void HMAC_CTX_set_flags(HMAC_CTX *ctx, unsigned long flags) | |||
187 | EVP_MD_CTX_set_flags(&ctx->md_ctx, flags); | 180 | EVP_MD_CTX_set_flags(&ctx->md_ctx, flags); |
188 | } | 181 | } |
189 | 182 | ||
183 | #endif | ||
diff --git a/src/lib/libcrypto/hmac/hmac.h b/src/lib/libcrypto/hmac/hmac.h index 294ab3b36a..c6489c04c8 100644 --- a/src/lib/libcrypto/hmac/hmac.h +++ b/src/lib/libcrypto/hmac/hmac.h | |||
@@ -64,7 +64,11 @@ | |||
64 | 64 | ||
65 | #include <openssl/evp.h> | 65 | #include <openssl/evp.h> |
66 | 66 | ||
67 | #ifdef OPENSSL_FIPS | ||
68 | #define HMAC_MAX_MD_CBLOCK 128 | ||
69 | #else | ||
67 | #define HMAC_MAX_MD_CBLOCK 64 | 70 | #define HMAC_MAX_MD_CBLOCK 64 |
71 | #endif | ||
68 | 72 | ||
69 | #ifdef __cplusplus | 73 | #ifdef __cplusplus |
70 | extern "C" { | 74 | extern "C" { |
diff --git a/src/lib/libcrypto/md4/md4_one.c b/src/lib/libcrypto/md4/md4_one.c index 00565507e4..50f79352f6 100644 --- a/src/lib/libcrypto/md4/md4_one.c +++ b/src/lib/libcrypto/md4/md4_one.c | |||
@@ -71,7 +71,8 @@ unsigned char *MD4(const unsigned char *d, unsigned long n, unsigned char *md) | |||
71 | static unsigned char m[MD4_DIGEST_LENGTH]; | 71 | static unsigned char m[MD4_DIGEST_LENGTH]; |
72 | 72 | ||
73 | if (md == NULL) md=m; | 73 | if (md == NULL) md=m; |
74 | MD4_Init(&c); | 74 | if (!MD4_Init(&c)) |
75 | return NULL; | ||
75 | #ifndef CHARSET_EBCDIC | 76 | #ifndef CHARSET_EBCDIC |
76 | MD4_Update(&c,d,n); | 77 | MD4_Update(&c,d,n); |
77 | #else | 78 | #else |
diff --git a/src/lib/libcrypto/md5/md5_one.c b/src/lib/libcrypto/md5/md5_one.c index c5dd2d81db..44c6c455d1 100644 --- a/src/lib/libcrypto/md5/md5_one.c +++ b/src/lib/libcrypto/md5/md5_one.c | |||
@@ -71,7 +71,8 @@ unsigned char *MD5(const unsigned char *d, unsigned long n, unsigned char *md) | |||
71 | static unsigned char m[MD5_DIGEST_LENGTH]; | 71 | static unsigned char m[MD5_DIGEST_LENGTH]; |
72 | 72 | ||
73 | if (md == NULL) md=m; | 73 | if (md == NULL) md=m; |
74 | MD5_Init(&c); | 74 | if (!MD5_Init(&c)) |
75 | return NULL; | ||
75 | #ifndef CHARSET_EBCDIC | 76 | #ifndef CHARSET_EBCDIC |
76 | MD5_Update(&c,d,n); | 77 | MD5_Update(&c,d,n); |
77 | #else | 78 | #else |
diff --git a/src/lib/libcrypto/objects/obj_err.c b/src/lib/libcrypto/objects/obj_err.c index 2b5f43e3cc..0682979b38 100644 --- a/src/lib/libcrypto/objects/obj_err.c +++ b/src/lib/libcrypto/objects/obj_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/objects/obj_err.c */ | 1 | /* crypto/objects/obj_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2004 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,22 +64,26 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_OBJ,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_OBJ,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA OBJ_str_functs[]= | 71 | static ERR_STRING_DATA OBJ_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,OBJ_F_OBJ_ADD_OBJECT,0), "OBJ_add_object"}, | 73 | {ERR_FUNC(OBJ_F_OBJ_ADD_OBJECT), "OBJ_add_object"}, |
70 | {ERR_PACK(0,OBJ_F_OBJ_CREATE,0), "OBJ_create"}, | 74 | {ERR_FUNC(OBJ_F_OBJ_CREATE), "OBJ_create"}, |
71 | {ERR_PACK(0,OBJ_F_OBJ_DUP,0), "OBJ_dup"}, | 75 | {ERR_FUNC(OBJ_F_OBJ_DUP), "OBJ_dup"}, |
72 | {ERR_PACK(0,OBJ_F_OBJ_NAME_NEW_INDEX,0), "OBJ_NAME_new_index"}, | 76 | {ERR_FUNC(OBJ_F_OBJ_NAME_NEW_INDEX), "OBJ_NAME_new_index"}, |
73 | {ERR_PACK(0,OBJ_F_OBJ_NID2LN,0), "OBJ_nid2ln"}, | 77 | {ERR_FUNC(OBJ_F_OBJ_NID2LN), "OBJ_nid2ln"}, |
74 | {ERR_PACK(0,OBJ_F_OBJ_NID2OBJ,0), "OBJ_nid2obj"}, | 78 | {ERR_FUNC(OBJ_F_OBJ_NID2OBJ), "OBJ_nid2obj"}, |
75 | {ERR_PACK(0,OBJ_F_OBJ_NID2SN,0), "OBJ_nid2sn"}, | 79 | {ERR_FUNC(OBJ_F_OBJ_NID2SN), "OBJ_nid2sn"}, |
76 | {0,NULL} | 80 | {0,NULL} |
77 | }; | 81 | }; |
78 | 82 | ||
79 | static ERR_STRING_DATA OBJ_str_reasons[]= | 83 | static ERR_STRING_DATA OBJ_str_reasons[]= |
80 | { | 84 | { |
81 | {OBJ_R_MALLOC_FAILURE ,"malloc failure"}, | 85 | {ERR_REASON(OBJ_R_MALLOC_FAILURE) ,"malloc failure"}, |
82 | {OBJ_R_UNKNOWN_NID ,"unknown nid"}, | 86 | {ERR_REASON(OBJ_R_UNKNOWN_NID) ,"unknown nid"}, |
83 | {0,NULL} | 87 | {0,NULL} |
84 | }; | 88 | }; |
85 | 89 | ||
@@ -93,8 +97,8 @@ void ERR_load_OBJ_strings(void) | |||
93 | { | 97 | { |
94 | init=0; | 98 | init=0; |
95 | #ifndef OPENSSL_NO_ERR | 99 | #ifndef OPENSSL_NO_ERR |
96 | ERR_load_strings(ERR_LIB_OBJ,OBJ_str_functs); | 100 | ERR_load_strings(0,OBJ_str_functs); |
97 | ERR_load_strings(ERR_LIB_OBJ,OBJ_str_reasons); | 101 | ERR_load_strings(0,OBJ_str_reasons); |
98 | #endif | 102 | #endif |
99 | 103 | ||
100 | } | 104 | } |
diff --git a/src/lib/libcrypto/objects/obj_mac.num b/src/lib/libcrypto/objects/obj_mac.num index 0e64a929ba..84555d936e 100644 --- a/src/lib/libcrypto/objects/obj_mac.num +++ b/src/lib/libcrypto/objects/obj_mac.num | |||
@@ -287,9 +287,9 @@ qcStatements 286 | |||
287 | ac_auditEntity 287 | 287 | ac_auditEntity 287 |
288 | ac_targeting 288 | 288 | ac_targeting 288 |
289 | aaControls 289 | 289 | aaControls 289 |
290 | sbqp_ipAddrBlock 290 | 290 | sbgp_ipAddrBlock 290 |
291 | sbqp_autonomousSysNum 291 | 291 | sbgp_autonomousSysNum 291 |
292 | sbqp_routerIdentifier 292 | 292 | sbgp_routerIdentifier 292 |
293 | textNotice 293 | 293 | textNotice 293 |
294 | ipsecEndSystem 294 | 294 | ipsecEndSystem 294 |
295 | ipsecTunnel 295 | 295 | ipsecTunnel 295 |
@@ -663,5 +663,13 @@ id_ppl 662 | |||
663 | proxyCertInfo 663 | 663 | proxyCertInfo 663 |
664 | id_ppl_anyLanguage 664 | 664 | id_ppl_anyLanguage 664 |
665 | id_ppl_inheritAll 665 | 665 | id_ppl_inheritAll 665 |
666 | id_ppl_independent 666 | 666 | name_constraints 666 |
667 | Independent 667 | 667 | Independent 667 |
668 | sha256WithRSAEncryption 668 | ||
669 | sha384WithRSAEncryption 669 | ||
670 | sha512WithRSAEncryption 670 | ||
671 | sha224WithRSAEncryption 671 | ||
672 | sha256 672 | ||
673 | sha384 673 | ||
674 | sha512 674 | ||
675 | sha224 675 | ||
diff --git a/src/lib/libcrypto/objects/objects.txt b/src/lib/libcrypto/objects/objects.txt index 50e9031e61..2635c4e667 100644 --- a/src/lib/libcrypto/objects/objects.txt +++ b/src/lib/libcrypto/objects/objects.txt | |||
@@ -63,6 +63,11 @@ pkcs1 2 : RSA-MD2 : md2WithRSAEncryption | |||
63 | pkcs1 3 : RSA-MD4 : md4WithRSAEncryption | 63 | pkcs1 3 : RSA-MD4 : md4WithRSAEncryption |
64 | pkcs1 4 : RSA-MD5 : md5WithRSAEncryption | 64 | pkcs1 4 : RSA-MD5 : md5WithRSAEncryption |
65 | pkcs1 5 : RSA-SHA1 : sha1WithRSAEncryption | 65 | pkcs1 5 : RSA-SHA1 : sha1WithRSAEncryption |
66 | # According to PKCS #1 version 2.1 | ||
67 | pkcs1 11 : RSA-SHA256 : sha256WithRSAEncryption | ||
68 | pkcs1 12 : RSA-SHA384 : sha384WithRSAEncryption | ||
69 | pkcs1 13 : RSA-SHA512 : sha512WithRSAEncryption | ||
70 | pkcs1 14 : RSA-SHA224 : sha224WithRSAEncryption | ||
66 | 71 | ||
67 | pkcs 3 : pkcs3 | 72 | pkcs 3 : pkcs3 |
68 | pkcs3 1 : : dhKeyAgreement | 73 | pkcs3 1 : : dhKeyAgreement |
@@ -341,9 +346,9 @@ id-pe 3 : qcStatements | |||
341 | id-pe 4 : ac-auditEntity | 346 | id-pe 4 : ac-auditEntity |
342 | id-pe 5 : ac-targeting | 347 | id-pe 5 : ac-targeting |
343 | id-pe 6 : aaControls | 348 | id-pe 6 : aaControls |
344 | id-pe 7 : sbqp-ipAddrBlock | 349 | id-pe 7 : sbgp-ipAddrBlock |
345 | id-pe 8 : sbqp-autonomousSysNum | 350 | id-pe 8 : sbgp-autonomousSysNum |
346 | id-pe 9 : sbqp-routerIdentifier | 351 | id-pe 9 : sbgp-routerIdentifier |
347 | id-pe 10 : ac-proxying | 352 | id-pe 10 : ac-proxying |
348 | !Cname sinfo-access | 353 | !Cname sinfo-access |
349 | id-pe 11 : subjectInfoAccess : Subject Information Access | 354 | id-pe 11 : subjectInfoAccess : Subject Information Access |
@@ -584,6 +589,8 @@ id-ce 21 : CRLReason : X509v3 CRL Reason Code | |||
584 | id-ce 24 : invalidityDate : Invalidity Date | 589 | id-ce 24 : invalidityDate : Invalidity Date |
585 | !Cname delta-crl | 590 | !Cname delta-crl |
586 | id-ce 27 : deltaCRL : X509v3 Delta CRL Indicator | 591 | id-ce 27 : deltaCRL : X509v3 Delta CRL Indicator |
592 | !Cname name-constraints | ||
593 | id-ce 30 : nameConstraints : X509v3 Name Constraints | ||
587 | !Cname crl-distribution-points | 594 | !Cname crl-distribution-points |
588 | id-ce 31 : crlDistributionPoints : X509v3 CRL Distribution Points | 595 | id-ce 31 : crlDistributionPoints : X509v3 CRL Distribution Points |
589 | !Cname certificate-policies | 596 | !Cname certificate-policies |
@@ -703,6 +710,13 @@ aes 44 : AES-256-CFB : aes-256-cfb | |||
703 | : DES-EDE3-CFB1 : des-ede3-cfb1 | 710 | : DES-EDE3-CFB1 : des-ede3-cfb1 |
704 | : DES-EDE3-CFB8 : des-ede3-cfb8 | 711 | : DES-EDE3-CFB8 : des-ede3-cfb8 |
705 | 712 | ||
713 | # OIDs for SHA224, SHA256, SHA385 and SHA512, according to x9.84. | ||
714 | !Alias nist_hashalgs nistAlgorithms 2 | ||
715 | nist_hashalgs 1 : SHA256 : sha256 | ||
716 | nist_hashalgs 2 : SHA384 : sha384 | ||
717 | nist_hashalgs 3 : SHA512 : sha512 | ||
718 | nist_hashalgs 4 : SHA224 : sha224 | ||
719 | |||
706 | # Hold instruction CRL entry extension | 720 | # Hold instruction CRL entry extension |
707 | !Cname hold-instruction-code | 721 | !Cname hold-instruction-code |
708 | id-ce 23 : holdInstructionCode : Hold Instruction Code | 722 | id-ce 23 : holdInstructionCode : Hold Instruction Code |
diff --git a/src/lib/libcrypto/ocsp/ocsp_err.c b/src/lib/libcrypto/ocsp/ocsp_err.c index 4c4d8306f8..65e6093fbc 100644 --- a/src/lib/libcrypto/ocsp/ocsp_err.c +++ b/src/lib/libcrypto/ocsp/ocsp_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/ocsp/ocsp_err.c */ | 1 | /* crypto/ocsp/ocsp_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,60 +64,64 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_OCSP,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_OCSP,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA OCSP_str_functs[]= | 71 | static ERR_STRING_DATA OCSP_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,OCSP_F_ASN1_STRING_ENCODE,0), "ASN1_STRING_encode"}, | 73 | {ERR_FUNC(OCSP_F_ASN1_STRING_ENCODE), "ASN1_STRING_encode"}, |
70 | {ERR_PACK(0,OCSP_F_CERT_ID_NEW,0), "CERT_ID_NEW"}, | 74 | {ERR_FUNC(OCSP_F_CERT_ID_NEW), "CERT_ID_NEW"}, |
71 | {ERR_PACK(0,OCSP_F_D2I_OCSP_NONCE,0), "D2I_OCSP_NONCE"}, | 75 | {ERR_FUNC(OCSP_F_D2I_OCSP_NONCE), "D2I_OCSP_NONCE"}, |
72 | {ERR_PACK(0,OCSP_F_OCSP_BASIC_ADD1_STATUS,0), "OCSP_basic_add1_status"}, | 76 | {ERR_FUNC(OCSP_F_OCSP_BASIC_ADD1_STATUS), "OCSP_basic_add1_status"}, |
73 | {ERR_PACK(0,OCSP_F_OCSP_BASIC_SIGN,0), "OCSP_basic_sign"}, | 77 | {ERR_FUNC(OCSP_F_OCSP_BASIC_SIGN), "OCSP_basic_sign"}, |
74 | {ERR_PACK(0,OCSP_F_OCSP_BASIC_VERIFY,0), "OCSP_basic_verify"}, | 78 | {ERR_FUNC(OCSP_F_OCSP_BASIC_VERIFY), "OCSP_basic_verify"}, |
75 | {ERR_PACK(0,OCSP_F_OCSP_CHECK_DELEGATED,0), "OCSP_CHECK_DELEGATED"}, | 79 | {ERR_FUNC(OCSP_F_OCSP_CHECK_DELEGATED), "OCSP_CHECK_DELEGATED"}, |
76 | {ERR_PACK(0,OCSP_F_OCSP_CHECK_IDS,0), "OCSP_CHECK_IDS"}, | 80 | {ERR_FUNC(OCSP_F_OCSP_CHECK_IDS), "OCSP_CHECK_IDS"}, |
77 | {ERR_PACK(0,OCSP_F_OCSP_CHECK_ISSUER,0), "OCSP_CHECK_ISSUER"}, | 81 | {ERR_FUNC(OCSP_F_OCSP_CHECK_ISSUER), "OCSP_CHECK_ISSUER"}, |
78 | {ERR_PACK(0,OCSP_F_OCSP_CHECK_VALIDITY,0), "OCSP_check_validity"}, | 82 | {ERR_FUNC(OCSP_F_OCSP_CHECK_VALIDITY), "OCSP_check_validity"}, |
79 | {ERR_PACK(0,OCSP_F_OCSP_MATCH_ISSUERID,0), "OCSP_MATCH_ISSUERID"}, | 83 | {ERR_FUNC(OCSP_F_OCSP_MATCH_ISSUERID), "OCSP_MATCH_ISSUERID"}, |
80 | {ERR_PACK(0,OCSP_F_OCSP_PARSE_URL,0), "OCSP_parse_url"}, | 84 | {ERR_FUNC(OCSP_F_OCSP_PARSE_URL), "OCSP_parse_url"}, |
81 | {ERR_PACK(0,OCSP_F_OCSP_REQUEST_SIGN,0), "OCSP_request_sign"}, | 85 | {ERR_FUNC(OCSP_F_OCSP_REQUEST_SIGN), "OCSP_request_sign"}, |
82 | {ERR_PACK(0,OCSP_F_OCSP_REQUEST_VERIFY,0), "OCSP_request_verify"}, | 86 | {ERR_FUNC(OCSP_F_OCSP_REQUEST_VERIFY), "OCSP_request_verify"}, |
83 | {ERR_PACK(0,OCSP_F_OCSP_RESPONSE_GET1_BASIC,0), "OCSP_response_get1_basic"}, | 87 | {ERR_FUNC(OCSP_F_OCSP_RESPONSE_GET1_BASIC), "OCSP_response_get1_basic"}, |
84 | {ERR_PACK(0,OCSP_F_OCSP_SENDREQ_BIO,0), "OCSP_sendreq_bio"}, | 88 | {ERR_FUNC(OCSP_F_OCSP_SENDREQ_BIO), "OCSP_sendreq_bio"}, |
85 | {ERR_PACK(0,OCSP_F_REQUEST_VERIFY,0), "REQUEST_VERIFY"}, | 89 | {ERR_FUNC(OCSP_F_REQUEST_VERIFY), "REQUEST_VERIFY"}, |
86 | {0,NULL} | 90 | {0,NULL} |
87 | }; | 91 | }; |
88 | 92 | ||
89 | static ERR_STRING_DATA OCSP_str_reasons[]= | 93 | static ERR_STRING_DATA OCSP_str_reasons[]= |
90 | { | 94 | { |
91 | {OCSP_R_BAD_DATA ,"bad data"}, | 95 | {ERR_REASON(OCSP_R_BAD_DATA) ,"bad data"}, |
92 | {OCSP_R_CERTIFICATE_VERIFY_ERROR ,"certificate verify error"}, | 96 | {ERR_REASON(OCSP_R_CERTIFICATE_VERIFY_ERROR),"certificate verify error"}, |
93 | {OCSP_R_DIGEST_ERR ,"digest err"}, | 97 | {ERR_REASON(OCSP_R_DIGEST_ERR) ,"digest err"}, |
94 | {OCSP_R_ERROR_IN_NEXTUPDATE_FIELD ,"error in nextupdate field"}, | 98 | {ERR_REASON(OCSP_R_ERROR_IN_NEXTUPDATE_FIELD),"error in nextupdate field"}, |
95 | {OCSP_R_ERROR_IN_THISUPDATE_FIELD ,"error in thisupdate field"}, | 99 | {ERR_REASON(OCSP_R_ERROR_IN_THISUPDATE_FIELD),"error in thisupdate field"}, |
96 | {OCSP_R_ERROR_PARSING_URL ,"error parsing url"}, | 100 | {ERR_REASON(OCSP_R_ERROR_PARSING_URL) ,"error parsing url"}, |
97 | {OCSP_R_MISSING_OCSPSIGNING_USAGE ,"missing ocspsigning usage"}, | 101 | {ERR_REASON(OCSP_R_MISSING_OCSPSIGNING_USAGE),"missing ocspsigning usage"}, |
98 | {OCSP_R_NEXTUPDATE_BEFORE_THISUPDATE ,"nextupdate before thisupdate"}, | 102 | {ERR_REASON(OCSP_R_NEXTUPDATE_BEFORE_THISUPDATE),"nextupdate before thisupdate"}, |
99 | {OCSP_R_NOT_BASIC_RESPONSE ,"not basic response"}, | 103 | {ERR_REASON(OCSP_R_NOT_BASIC_RESPONSE) ,"not basic response"}, |
100 | {OCSP_R_NO_CERTIFICATES_IN_CHAIN ,"no certificates in chain"}, | 104 | {ERR_REASON(OCSP_R_NO_CERTIFICATES_IN_CHAIN),"no certificates in chain"}, |
101 | {OCSP_R_NO_CONTENT ,"no content"}, | 105 | {ERR_REASON(OCSP_R_NO_CONTENT) ,"no content"}, |
102 | {OCSP_R_NO_PUBLIC_KEY ,"no public key"}, | 106 | {ERR_REASON(OCSP_R_NO_PUBLIC_KEY) ,"no public key"}, |
103 | {OCSP_R_NO_RESPONSE_DATA ,"no response data"}, | 107 | {ERR_REASON(OCSP_R_NO_RESPONSE_DATA) ,"no response data"}, |
104 | {OCSP_R_NO_REVOKED_TIME ,"no revoked time"}, | 108 | {ERR_REASON(OCSP_R_NO_REVOKED_TIME) ,"no revoked time"}, |
105 | {OCSP_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE,"private key does not match certificate"}, | 109 | {ERR_REASON(OCSP_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE),"private key does not match certificate"}, |
106 | {OCSP_R_REQUEST_NOT_SIGNED ,"request not signed"}, | 110 | {ERR_REASON(OCSP_R_REQUEST_NOT_SIGNED) ,"request not signed"}, |
107 | {OCSP_R_RESPONSE_CONTAINS_NO_REVOCATION_DATA,"response contains no revocation data"}, | 111 | {ERR_REASON(OCSP_R_RESPONSE_CONTAINS_NO_REVOCATION_DATA),"response contains no revocation data"}, |
108 | {OCSP_R_ROOT_CA_NOT_TRUSTED ,"root ca not trusted"}, | 112 | {ERR_REASON(OCSP_R_ROOT_CA_NOT_TRUSTED) ,"root ca not trusted"}, |
109 | {OCSP_R_SERVER_READ_ERROR ,"server read error"}, | 113 | {ERR_REASON(OCSP_R_SERVER_READ_ERROR) ,"server read error"}, |
110 | {OCSP_R_SERVER_RESPONSE_ERROR ,"server response error"}, | 114 | {ERR_REASON(OCSP_R_SERVER_RESPONSE_ERROR),"server response error"}, |
111 | {OCSP_R_SERVER_RESPONSE_PARSE_ERROR ,"server response parse error"}, | 115 | {ERR_REASON(OCSP_R_SERVER_RESPONSE_PARSE_ERROR),"server response parse error"}, |
112 | {OCSP_R_SERVER_WRITE_ERROR ,"server write error"}, | 116 | {ERR_REASON(OCSP_R_SERVER_WRITE_ERROR) ,"server write error"}, |
113 | {OCSP_R_SIGNATURE_FAILURE ,"signature failure"}, | 117 | {ERR_REASON(OCSP_R_SIGNATURE_FAILURE) ,"signature failure"}, |
114 | {OCSP_R_SIGNER_CERTIFICATE_NOT_FOUND ,"signer certificate not found"}, | 118 | {ERR_REASON(OCSP_R_SIGNER_CERTIFICATE_NOT_FOUND),"signer certificate not found"}, |
115 | {OCSP_R_STATUS_EXPIRED ,"status expired"}, | 119 | {ERR_REASON(OCSP_R_STATUS_EXPIRED) ,"status expired"}, |
116 | {OCSP_R_STATUS_NOT_YET_VALID ,"status not yet valid"}, | 120 | {ERR_REASON(OCSP_R_STATUS_NOT_YET_VALID) ,"status not yet valid"}, |
117 | {OCSP_R_STATUS_TOO_OLD ,"status too old"}, | 121 | {ERR_REASON(OCSP_R_STATUS_TOO_OLD) ,"status too old"}, |
118 | {OCSP_R_UNKNOWN_MESSAGE_DIGEST ,"unknown message digest"}, | 122 | {ERR_REASON(OCSP_R_UNKNOWN_MESSAGE_DIGEST),"unknown message digest"}, |
119 | {OCSP_R_UNKNOWN_NID ,"unknown nid"}, | 123 | {ERR_REASON(OCSP_R_UNKNOWN_NID) ,"unknown nid"}, |
120 | {OCSP_R_UNSUPPORTED_REQUESTORNAME_TYPE ,"unsupported requestorname type"}, | 124 | {ERR_REASON(OCSP_R_UNSUPPORTED_REQUESTORNAME_TYPE),"unsupported requestorname type"}, |
121 | {0,NULL} | 125 | {0,NULL} |
122 | }; | 126 | }; |
123 | 127 | ||
@@ -131,8 +135,8 @@ void ERR_load_OCSP_strings(void) | |||
131 | { | 135 | { |
132 | init=0; | 136 | init=0; |
133 | #ifndef OPENSSL_NO_ERR | 137 | #ifndef OPENSSL_NO_ERR |
134 | ERR_load_strings(ERR_LIB_OCSP,OCSP_str_functs); | 138 | ERR_load_strings(0,OCSP_str_functs); |
135 | ERR_load_strings(ERR_LIB_OCSP,OCSP_str_reasons); | 139 | ERR_load_strings(0,OCSP_str_reasons); |
136 | #endif | 140 | #endif |
137 | 141 | ||
138 | } | 142 | } |
diff --git a/src/lib/libcrypto/opensslv.h b/src/lib/libcrypto/opensslv.h index 5d5f688edd..e50c1baf00 100644 --- a/src/lib/libcrypto/opensslv.h +++ b/src/lib/libcrypto/opensslv.h | |||
@@ -25,11 +25,11 @@ | |||
25 | * (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for | 25 | * (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for |
26 | * major minor fix final patch/beta) | 26 | * major minor fix final patch/beta) |
27 | */ | 27 | */ |
28 | #define OPENSSL_VERSION_NUMBER 0x0090707fL | 28 | #define OPENSSL_VERSION_NUMBER 0x009070afL |
29 | #ifdef OPENSSL_FIPS | 29 | #ifdef OPENSSL_FIPS |
30 | #define OPENSSL_VERSION_TEXT "OpenSSL 0.9.7g-fips 11 Apr 2005" | 30 | #define OPENSSL_VERSION_TEXT "OpenSSL 0.9.7j-fips 04 May 2006" |
31 | #else | 31 | #else |
32 | #define OPENSSL_VERSION_TEXT "OpenSSL 0.9.7g 11 Apr 2005" | 32 | #define OPENSSL_VERSION_TEXT "OpenSSL 0.9.7j 04 May 2006" |
33 | #endif | 33 | #endif |
34 | #define OPENSSL_VERSION_PTEXT " part of " OPENSSL_VERSION_TEXT | 34 | #define OPENSSL_VERSION_PTEXT " part of " OPENSSL_VERSION_TEXT |
35 | 35 | ||
diff --git a/src/lib/libcrypto/pem/pem_err.c b/src/lib/libcrypto/pem/pem_err.c index 3b39b84d66..8527028ebc 100644 --- a/src/lib/libcrypto/pem/pem_err.c +++ b/src/lib/libcrypto/pem/pem_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/pem/pem_err.c */ | 1 | /* crypto/pem/pem_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,52 +64,56 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_PEM,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_PEM,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA PEM_str_functs[]= | 71 | static ERR_STRING_DATA PEM_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,PEM_F_D2I_PKCS8PRIVATEKEY_BIO,0), "d2i_PKCS8PrivateKey_bio"}, | 73 | {ERR_FUNC(PEM_F_D2I_PKCS8PRIVATEKEY_BIO), "d2i_PKCS8PrivateKey_bio"}, |
70 | {ERR_PACK(0,PEM_F_D2I_PKCS8PRIVATEKEY_FP,0), "d2i_PKCS8PrivateKey_fp"}, | 74 | {ERR_FUNC(PEM_F_D2I_PKCS8PRIVATEKEY_FP), "d2i_PKCS8PrivateKey_fp"}, |
71 | {ERR_PACK(0,PEM_F_DEF_CALLBACK,0), "DEF_CALLBACK"}, | 75 | {ERR_FUNC(PEM_F_DEF_CALLBACK), "DEF_CALLBACK"}, |
72 | {ERR_PACK(0,PEM_F_LOAD_IV,0), "LOAD_IV"}, | 76 | {ERR_FUNC(PEM_F_LOAD_IV), "LOAD_IV"}, |
73 | {ERR_PACK(0,PEM_F_PEM_ASN1_READ,0), "PEM_ASN1_read"}, | 77 | {ERR_FUNC(PEM_F_PEM_ASN1_READ), "PEM_ASN1_read"}, |
74 | {ERR_PACK(0,PEM_F_PEM_ASN1_READ_BIO,0), "PEM_ASN1_read_bio"}, | 78 | {ERR_FUNC(PEM_F_PEM_ASN1_READ_BIO), "PEM_ASN1_read_bio"}, |
75 | {ERR_PACK(0,PEM_F_PEM_ASN1_WRITE,0), "PEM_ASN1_write"}, | 79 | {ERR_FUNC(PEM_F_PEM_ASN1_WRITE), "PEM_ASN1_write"}, |
76 | {ERR_PACK(0,PEM_F_PEM_ASN1_WRITE_BIO,0), "PEM_ASN1_write_bio"}, | 80 | {ERR_FUNC(PEM_F_PEM_ASN1_WRITE_BIO), "PEM_ASN1_write_bio"}, |
77 | {ERR_PACK(0,PEM_F_PEM_DO_HEADER,0), "PEM_do_header"}, | 81 | {ERR_FUNC(PEM_F_PEM_DO_HEADER), "PEM_do_header"}, |
78 | {ERR_PACK(0,PEM_F_PEM_F_DO_PK8KEY_FP,0), "PEM_F_DO_PK8KEY_FP"}, | 82 | {ERR_FUNC(PEM_F_PEM_F_DO_PK8KEY_FP), "PEM_F_DO_PK8KEY_FP"}, |
79 | {ERR_PACK(0,PEM_F_PEM_F_PEM_WRITE_PKCS8PRIVATEKEY,0), "PEM_F_PEM_WRITE_PKCS8PRIVATEKEY"}, | 83 | {ERR_FUNC(PEM_F_PEM_F_PEM_WRITE_PKCS8PRIVATEKEY), "PEM_F_PEM_WRITE_PKCS8PRIVATEKEY"}, |
80 | {ERR_PACK(0,PEM_F_PEM_GET_EVP_CIPHER_INFO,0), "PEM_get_EVP_CIPHER_INFO"}, | 84 | {ERR_FUNC(PEM_F_PEM_GET_EVP_CIPHER_INFO), "PEM_get_EVP_CIPHER_INFO"}, |
81 | {ERR_PACK(0,PEM_F_PEM_READ,0), "PEM_read"}, | 85 | {ERR_FUNC(PEM_F_PEM_READ), "PEM_read"}, |
82 | {ERR_PACK(0,PEM_F_PEM_READ_BIO,0), "PEM_read_bio"}, | 86 | {ERR_FUNC(PEM_F_PEM_READ_BIO), "PEM_read_bio"}, |
83 | {ERR_PACK(0,PEM_F_PEM_SEALFINAL,0), "PEM_SealFinal"}, | 87 | {ERR_FUNC(PEM_F_PEM_SEALFINAL), "PEM_SealFinal"}, |
84 | {ERR_PACK(0,PEM_F_PEM_SEALINIT,0), "PEM_SealInit"}, | 88 | {ERR_FUNC(PEM_F_PEM_SEALINIT), "PEM_SealInit"}, |
85 | {ERR_PACK(0,PEM_F_PEM_SIGNFINAL,0), "PEM_SignFinal"}, | 89 | {ERR_FUNC(PEM_F_PEM_SIGNFINAL), "PEM_SignFinal"}, |
86 | {ERR_PACK(0,PEM_F_PEM_WRITE,0), "PEM_write"}, | 90 | {ERR_FUNC(PEM_F_PEM_WRITE), "PEM_write"}, |
87 | {ERR_PACK(0,PEM_F_PEM_WRITE_BIO,0), "PEM_write_bio"}, | 91 | {ERR_FUNC(PEM_F_PEM_WRITE_BIO), "PEM_write_bio"}, |
88 | {ERR_PACK(0,PEM_F_PEM_WRITE_BIO_PKCS8PRIVATEKEY,0), "PEM_write_bio_PKCS8PrivateKey"}, | 92 | {ERR_FUNC(PEM_F_PEM_WRITE_BIO_PKCS8PRIVATEKEY), "PEM_write_bio_PKCS8PrivateKey"}, |
89 | {ERR_PACK(0,PEM_F_PEM_X509_INFO_READ,0), "PEM_X509_INFO_read"}, | 93 | {ERR_FUNC(PEM_F_PEM_X509_INFO_READ), "PEM_X509_INFO_read"}, |
90 | {ERR_PACK(0,PEM_F_PEM_X509_INFO_READ_BIO,0), "PEM_X509_INFO_read_bio"}, | 94 | {ERR_FUNC(PEM_F_PEM_X509_INFO_READ_BIO), "PEM_X509_INFO_read_bio"}, |
91 | {ERR_PACK(0,PEM_F_PEM_X509_INFO_WRITE_BIO,0), "PEM_X509_INFO_write_bio"}, | 95 | {ERR_FUNC(PEM_F_PEM_X509_INFO_WRITE_BIO), "PEM_X509_INFO_write_bio"}, |
92 | {0,NULL} | 96 | {0,NULL} |
93 | }; | 97 | }; |
94 | 98 | ||
95 | static ERR_STRING_DATA PEM_str_reasons[]= | 99 | static ERR_STRING_DATA PEM_str_reasons[]= |
96 | { | 100 | { |
97 | {PEM_R_BAD_BASE64_DECODE ,"bad base64 decode"}, | 101 | {ERR_REASON(PEM_R_BAD_BASE64_DECODE) ,"bad base64 decode"}, |
98 | {PEM_R_BAD_DECRYPT ,"bad decrypt"}, | 102 | {ERR_REASON(PEM_R_BAD_DECRYPT) ,"bad decrypt"}, |
99 | {PEM_R_BAD_END_LINE ,"bad end line"}, | 103 | {ERR_REASON(PEM_R_BAD_END_LINE) ,"bad end line"}, |
100 | {PEM_R_BAD_IV_CHARS ,"bad iv chars"}, | 104 | {ERR_REASON(PEM_R_BAD_IV_CHARS) ,"bad iv chars"}, |
101 | {PEM_R_BAD_PASSWORD_READ ,"bad password read"}, | 105 | {ERR_REASON(PEM_R_BAD_PASSWORD_READ) ,"bad password read"}, |
102 | {PEM_R_ERROR_CONVERTING_PRIVATE_KEY ,"error converting private key"}, | 106 | {ERR_REASON(PEM_R_ERROR_CONVERTING_PRIVATE_KEY),"error converting private key"}, |
103 | {PEM_R_NOT_DEK_INFO ,"not dek info"}, | 107 | {ERR_REASON(PEM_R_NOT_DEK_INFO) ,"not dek info"}, |
104 | {PEM_R_NOT_ENCRYPTED ,"not encrypted"}, | 108 | {ERR_REASON(PEM_R_NOT_ENCRYPTED) ,"not encrypted"}, |
105 | {PEM_R_NOT_PROC_TYPE ,"not proc type"}, | 109 | {ERR_REASON(PEM_R_NOT_PROC_TYPE) ,"not proc type"}, |
106 | {PEM_R_NO_START_LINE ,"no start line"}, | 110 | {ERR_REASON(PEM_R_NO_START_LINE) ,"no start line"}, |
107 | {PEM_R_PROBLEMS_GETTING_PASSWORD ,"problems getting password"}, | 111 | {ERR_REASON(PEM_R_PROBLEMS_GETTING_PASSWORD),"problems getting password"}, |
108 | {PEM_R_PUBLIC_KEY_NO_RSA ,"public key no rsa"}, | 112 | {ERR_REASON(PEM_R_PUBLIC_KEY_NO_RSA) ,"public key no rsa"}, |
109 | {PEM_R_READ_KEY ,"read key"}, | 113 | {ERR_REASON(PEM_R_READ_KEY) ,"read key"}, |
110 | {PEM_R_SHORT_HEADER ,"short header"}, | 114 | {ERR_REASON(PEM_R_SHORT_HEADER) ,"short header"}, |
111 | {PEM_R_UNSUPPORTED_CIPHER ,"unsupported cipher"}, | 115 | {ERR_REASON(PEM_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"}, |
112 | {PEM_R_UNSUPPORTED_ENCRYPTION ,"unsupported encryption"}, | 116 | {ERR_REASON(PEM_R_UNSUPPORTED_ENCRYPTION),"unsupported encryption"}, |
113 | {0,NULL} | 117 | {0,NULL} |
114 | }; | 118 | }; |
115 | 119 | ||
@@ -123,8 +127,8 @@ void ERR_load_PEM_strings(void) | |||
123 | { | 127 | { |
124 | init=0; | 128 | init=0; |
125 | #ifndef OPENSSL_NO_ERR | 129 | #ifndef OPENSSL_NO_ERR |
126 | ERR_load_strings(ERR_LIB_PEM,PEM_str_functs); | 130 | ERR_load_strings(0,PEM_str_functs); |
127 | ERR_load_strings(ERR_LIB_PEM,PEM_str_reasons); | 131 | ERR_load_strings(0,PEM_str_reasons); |
128 | #endif | 132 | #endif |
129 | 133 | ||
130 | } | 134 | } |
diff --git a/src/lib/libcrypto/perlasm/x86asm.pl b/src/lib/libcrypto/perlasm/x86asm.pl index bef2667079..ea54a1edc5 100644 --- a/src/lib/libcrypto/perlasm/x86asm.pl +++ b/src/lib/libcrypto/perlasm/x86asm.pl | |||
@@ -90,7 +90,7 @@ $tmp | |||
90 | #ifdef OUT | 90 | #ifdef OUT |
91 | #define OK 1 | 91 | #define OK 1 |
92 | #define ALIGN 4 | 92 | #define ALIGN 4 |
93 | #if defined(__CYGWIN__) || defined(__DJGPP__) | 93 | #if defined(__CYGWIN__) || defined(__DJGPP__) || defined(__MINGW32__) |
94 | #undef SIZE | 94 | #undef SIZE |
95 | #undef TYPE | 95 | #undef TYPE |
96 | #define SIZE(a,b) | 96 | #define SIZE(a,b) |
diff --git a/src/lib/libcrypto/pkcs12/p12_add.c b/src/lib/libcrypto/pkcs12/p12_add.c index 1909f28506..27015dd8c3 100644 --- a/src/lib/libcrypto/pkcs12/p12_add.c +++ b/src/lib/libcrypto/pkcs12/p12_add.c | |||
@@ -148,7 +148,11 @@ PKCS7 *PKCS12_pack_p7data(STACK_OF(PKCS12_SAFEBAG) *sk) | |||
148 | /* Unpack SAFEBAGS from PKCS#7 data ContentInfo */ | 148 | /* Unpack SAFEBAGS from PKCS#7 data ContentInfo */ |
149 | STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7data(PKCS7 *p7) | 149 | STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7data(PKCS7 *p7) |
150 | { | 150 | { |
151 | if(!PKCS7_type_is_data(p7)) return NULL; | 151 | if(!PKCS7_type_is_data(p7)) |
152 | { | ||
153 | PKCS12err(PKCS12_F_PKCS12_UNPACK_P7DATA,PKCS12_R_CONTENT_TYPE_NOT_DATA); | ||
154 | return NULL; | ||
155 | } | ||
152 | return ASN1_item_unpack(p7->d.data, ASN1_ITEM_rptr(PKCS12_SAFEBAGS)); | 156 | return ASN1_item_unpack(p7->d.data, ASN1_ITEM_rptr(PKCS12_SAFEBAGS)); |
153 | } | 157 | } |
154 | 158 | ||
@@ -211,5 +215,10 @@ int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) | |||
211 | 215 | ||
212 | STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) | 216 | STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) |
213 | { | 217 | { |
218 | if (!PKCS7_type_is_data(p12->authsafes)) | ||
219 | { | ||
220 | PKCS12err(PKCS12_F_PKCS12_UNPACK_AUTHSAFES,PKCS12_R_CONTENT_TYPE_NOT_DATA); | ||
221 | return NULL; | ||
222 | } | ||
214 | return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES)); | 223 | return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES)); |
215 | } | 224 | } |
diff --git a/src/lib/libcrypto/pkcs12/p12_crt.c b/src/lib/libcrypto/pkcs12/p12_crt.c index 4c36c643ce..40340a7bef 100644 --- a/src/lib/libcrypto/pkcs12/p12_crt.c +++ b/src/lib/libcrypto/pkcs12/p12_crt.c | |||
@@ -76,7 +76,15 @@ PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, | |||
76 | unsigned int keyidlen; | 76 | unsigned int keyidlen; |
77 | 77 | ||
78 | /* Set defaults */ | 78 | /* Set defaults */ |
79 | if(!nid_cert) nid_cert = NID_pbe_WithSHA1And40BitRC2_CBC; | 79 | if(!nid_cert) |
80 | { | ||
81 | #ifdef OPENSSL_FIPS | ||
82 | if (FIPS_mode()) | ||
83 | nid_cert = NID_pbe_WithSHA1And3_Key_TripleDES_CBC; | ||
84 | else | ||
85 | #endif | ||
86 | nid_cert = NID_pbe_WithSHA1And40BitRC2_CBC; | ||
87 | } | ||
80 | if(!nid_key) nid_key = NID_pbe_WithSHA1And3_Key_TripleDES_CBC; | 88 | if(!nid_key) nid_key = NID_pbe_WithSHA1And3_Key_TripleDES_CBC; |
81 | if(!iter) iter = PKCS12_DEFAULT_ITER; | 89 | if(!iter) iter = PKCS12_DEFAULT_ITER; |
82 | if(!mac_iter) mac_iter = 1; | 90 | if(!mac_iter) mac_iter = 1; |
diff --git a/src/lib/libcrypto/pkcs12/p12_mutl.c b/src/lib/libcrypto/pkcs12/p12_mutl.c index 4886b9b289..140d21155e 100644 --- a/src/lib/libcrypto/pkcs12/p12_mutl.c +++ b/src/lib/libcrypto/pkcs12/p12_mutl.c | |||
@@ -72,6 +72,12 @@ int PKCS12_gen_mac (PKCS12 *p12, const char *pass, int passlen, | |||
72 | unsigned char key[PKCS12_MAC_KEY_LENGTH], *salt; | 72 | unsigned char key[PKCS12_MAC_KEY_LENGTH], *salt; |
73 | int saltlen, iter; | 73 | int saltlen, iter; |
74 | 74 | ||
75 | if (!PKCS7_type_is_data(p12->authsafes)) | ||
76 | { | ||
77 | PKCS12err(PKCS12_F_PKCS12_GEN_MAC,PKCS12_R_CONTENT_TYPE_NOT_DATA); | ||
78 | return 0; | ||
79 | } | ||
80 | |||
75 | salt = p12->mac->salt->data; | 81 | salt = p12->mac->salt->data; |
76 | saltlen = p12->mac->salt->length; | 82 | saltlen = p12->mac->salt->length; |
77 | if (!p12->mac->iter) iter = 1; | 83 | if (!p12->mac->iter) iter = 1; |
diff --git a/src/lib/libcrypto/pkcs12/pk12err.c b/src/lib/libcrypto/pkcs12/pk12err.c index 10ab80502c..a33b37b1c7 100644 --- a/src/lib/libcrypto/pkcs12/pk12err.c +++ b/src/lib/libcrypto/pkcs12/pk12err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/pkcs12/pk12err.c */ | 1 | /* crypto/pkcs12/pk12err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,60 +64,67 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_PKCS12,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_PKCS12,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA PKCS12_str_functs[]= | 71 | static ERR_STRING_DATA PKCS12_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,PKCS12_F_PARSE_BAGS,0), "PARSE_BAGS"}, | 73 | {ERR_FUNC(PKCS12_F_PARSE_BAGS), "PARSE_BAGS"}, |
70 | {ERR_PACK(0,PKCS12_F_PKCS12_ADD_FRIENDLYNAME,0), "PKCS12_ADD_FRIENDLYNAME"}, | 74 | {ERR_FUNC(PKCS12_F_PKCS12_ADD_FRIENDLYNAME), "PKCS12_ADD_FRIENDLYNAME"}, |
71 | {ERR_PACK(0,PKCS12_F_PKCS12_ADD_FRIENDLYNAME_ASC,0), "PKCS12_add_friendlyname_asc"}, | 75 | {ERR_FUNC(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_ASC), "PKCS12_add_friendlyname_asc"}, |
72 | {ERR_PACK(0,PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,0), "PKCS12_add_friendlyname_uni"}, | 76 | {ERR_FUNC(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI), "PKCS12_add_friendlyname_uni"}, |
73 | {ERR_PACK(0,PKCS12_F_PKCS12_ADD_LOCALKEYID,0), "PKCS12_add_localkeyid"}, | 77 | {ERR_FUNC(PKCS12_F_PKCS12_ADD_LOCALKEYID), "PKCS12_add_localkeyid"}, |
74 | {ERR_PACK(0,PKCS12_F_PKCS12_CREATE,0), "PKCS12_create"}, | 78 | {ERR_FUNC(PKCS12_F_PKCS12_CREATE), "PKCS12_create"}, |
75 | {ERR_PACK(0,PKCS12_F_PKCS12_DECRYPT_D2I,0), "PKCS12_decrypt_d2i"}, | 79 | {ERR_FUNC(PKCS12_F_PKCS12_DECRYPT_D2I), "PKCS12_DECRYPT_D2I"}, |
76 | {ERR_PACK(0,PKCS12_F_PKCS12_GEN_MAC,0), "PKCS12_gen_mac"}, | 80 | {ERR_FUNC(PKCS12_F_PKCS12_GEN_MAC), "PKCS12_gen_mac"}, |
77 | {ERR_PACK(0,PKCS12_F_PKCS12_I2D_ENCRYPT,0), "PKCS12_i2d_encrypt"}, | 81 | {ERR_FUNC(PKCS12_F_PKCS12_I2D_ENCRYPT), "PKCS12_I2D_ENCRYPT"}, |
78 | {ERR_PACK(0,PKCS12_F_PKCS12_INIT,0), "PKCS12_init"}, | 82 | {ERR_FUNC(PKCS12_F_PKCS12_INIT), "PKCS12_init"}, |
79 | {ERR_PACK(0,PKCS12_F_PKCS12_KEY_GEN_ASC,0), "PKCS12_key_gen_asc"}, | 83 | {ERR_FUNC(PKCS12_F_PKCS12_KEY_GEN_ASC), "PKCS12_key_gen_asc"}, |
80 | {ERR_PACK(0,PKCS12_F_PKCS12_KEY_GEN_UNI,0), "PKCS12_key_gen_uni"}, | 84 | {ERR_FUNC(PKCS12_F_PKCS12_KEY_GEN_UNI), "PKCS12_key_gen_uni"}, |
81 | {ERR_PACK(0,PKCS12_F_PKCS12_MAKE_KEYBAG,0), "PKCS12_MAKE_KEYBAG"}, | 85 | {ERR_FUNC(PKCS12_F_PKCS12_MAKE_KEYBAG), "PKCS12_MAKE_KEYBAG"}, |
82 | {ERR_PACK(0,PKCS12_F_PKCS12_MAKE_SHKEYBAG,0), "PKCS12_MAKE_SHKEYBAG"}, | 86 | {ERR_FUNC(PKCS12_F_PKCS12_MAKE_SHKEYBAG), "PKCS12_MAKE_SHKEYBAG"}, |
83 | {ERR_PACK(0,PKCS12_F_PKCS12_NEWPASS,0), "PKCS12_newpass"}, | 87 | {ERR_FUNC(PKCS12_F_PKCS12_NEWPASS), "PKCS12_newpass"}, |
84 | {ERR_PACK(0,PKCS12_F_PKCS12_PACK_P7DATA,0), "PKCS12_pack_p7data"}, | 88 | {ERR_FUNC(PKCS12_F_PKCS12_PACK_P7DATA), "PKCS12_pack_p7data"}, |
85 | {ERR_PACK(0,PKCS12_F_PKCS12_PACK_P7ENCDATA,0), "PKCS12_pack_p7encdata"}, | 89 | {ERR_FUNC(PKCS12_F_PKCS12_PACK_P7ENCDATA), "PKCS12_pack_p7encdata"}, |
86 | {ERR_PACK(0,PKCS12_F_PKCS12_PACK_SAFEBAG,0), "PKCS12_pack_safebag"}, | 90 | {ERR_FUNC(PKCS12_F_PKCS12_PACK_SAFEBAG), "PKCS12_PACK_SAFEBAG"}, |
87 | {ERR_PACK(0,PKCS12_F_PKCS12_PARSE,0), "PKCS12_parse"}, | 91 | {ERR_FUNC(PKCS12_F_PKCS12_PARSE), "PKCS12_parse"}, |
88 | {ERR_PACK(0,PKCS12_F_PKCS12_PBE_CRYPT,0), "PKCS12_pbe_crypt"}, | 92 | {ERR_FUNC(PKCS12_F_PKCS12_PBE_CRYPT), "PKCS12_pbe_crypt"}, |
89 | {ERR_PACK(0,PKCS12_F_PKCS12_PBE_KEYIVGEN,0), "PKCS12_PBE_keyivgen"}, | 93 | {ERR_FUNC(PKCS12_F_PKCS12_PBE_KEYIVGEN), "PKCS12_PBE_keyivgen"}, |
90 | {ERR_PACK(0,PKCS12_F_PKCS12_SETUP_MAC,0), "PKCS12_setup_mac"}, | 94 | {ERR_FUNC(PKCS12_F_PKCS12_SETUP_MAC), "PKCS12_setup_mac"}, |
91 | {ERR_PACK(0,PKCS12_F_PKCS12_SET_MAC,0), "PKCS12_set_mac"}, | 95 | {ERR_FUNC(PKCS12_F_PKCS12_SET_MAC), "PKCS12_set_mac"}, |
92 | {ERR_PACK(0,PKCS12_F_PKCS8_ADD_KEYUSAGE,0), "PKCS8_add_keyusage"}, | 96 | {ERR_FUNC(PKCS12_F_PKCS12_UNPACK_AUTHSAFES), "PKCS12_unpack_authsafes"}, |
93 | {ERR_PACK(0,PKCS12_F_PKCS8_ENCRYPT,0), "PKCS8_encrypt"}, | 97 | {ERR_FUNC(PKCS12_F_PKCS12_UNPACK_P7DATA), "PKCS12_unpack_p7data"}, |
94 | {ERR_PACK(0,PKCS12_F_VERIFY_MAC,0), "VERIFY_MAC"}, | 98 | {ERR_FUNC(PKCS12_F_PKCS8_ADD_KEYUSAGE), "PKCS8_add_keyusage"}, |
99 | {ERR_FUNC(PKCS12_F_PKCS8_ENCRYPT), "PKCS8_encrypt"}, | ||
100 | {ERR_FUNC(PKCS12_F_VERIFY_MAC), "VERIFY_MAC"}, | ||
95 | {0,NULL} | 101 | {0,NULL} |
96 | }; | 102 | }; |
97 | 103 | ||
98 | static ERR_STRING_DATA PKCS12_str_reasons[]= | 104 | static ERR_STRING_DATA PKCS12_str_reasons[]= |
99 | { | 105 | { |
100 | {PKCS12_R_CANT_PACK_STRUCTURE ,"cant pack structure"}, | 106 | {ERR_REASON(PKCS12_R_CANT_PACK_STRUCTURE),"cant pack structure"}, |
101 | {PKCS12_R_DECODE_ERROR ,"decode error"}, | 107 | {ERR_REASON(PKCS12_R_CONTENT_TYPE_NOT_DATA),"content type not data"}, |
102 | {PKCS12_R_ENCODE_ERROR ,"encode error"}, | 108 | {ERR_REASON(PKCS12_R_DECODE_ERROR) ,"decode error"}, |
103 | {PKCS12_R_ENCRYPT_ERROR ,"encrypt error"}, | 109 | {ERR_REASON(PKCS12_R_ENCODE_ERROR) ,"encode error"}, |
104 | {PKCS12_R_ERROR_SETTING_ENCRYPTED_DATA_TYPE,"error setting encrypted data type"}, | 110 | {ERR_REASON(PKCS12_R_ENCRYPT_ERROR) ,"encrypt error"}, |
105 | {PKCS12_R_INVALID_NULL_ARGUMENT ,"invalid null argument"}, | 111 | {ERR_REASON(PKCS12_R_ERROR_SETTING_ENCRYPTED_DATA_TYPE),"error setting encrypted data type"}, |
106 | {PKCS12_R_INVALID_NULL_PKCS12_POINTER ,"invalid null pkcs12 pointer"}, | 112 | {ERR_REASON(PKCS12_R_INVALID_NULL_ARGUMENT),"invalid null argument"}, |
107 | {PKCS12_R_IV_GEN_ERROR ,"iv gen error"}, | 113 | {ERR_REASON(PKCS12_R_INVALID_NULL_PKCS12_POINTER),"invalid null pkcs12 pointer"}, |
108 | {PKCS12_R_KEY_GEN_ERROR ,"key gen error"}, | 114 | {ERR_REASON(PKCS12_R_IV_GEN_ERROR) ,"iv gen error"}, |
109 | {PKCS12_R_MAC_ABSENT ,"mac absent"}, | 115 | {ERR_REASON(PKCS12_R_KEY_GEN_ERROR) ,"key gen error"}, |
110 | {PKCS12_R_MAC_GENERATION_ERROR ,"mac generation error"}, | 116 | {ERR_REASON(PKCS12_R_MAC_ABSENT) ,"mac absent"}, |
111 | {PKCS12_R_MAC_SETUP_ERROR ,"mac setup error"}, | 117 | {ERR_REASON(PKCS12_R_MAC_GENERATION_ERROR),"mac generation error"}, |
112 | {PKCS12_R_MAC_STRING_SET_ERROR ,"mac string set error"}, | 118 | {ERR_REASON(PKCS12_R_MAC_SETUP_ERROR) ,"mac setup error"}, |
113 | {PKCS12_R_MAC_VERIFY_ERROR ,"mac verify error"}, | 119 | {ERR_REASON(PKCS12_R_MAC_STRING_SET_ERROR),"mac string set error"}, |
114 | {PKCS12_R_MAC_VERIFY_FAILURE ,"mac verify failure"}, | 120 | {ERR_REASON(PKCS12_R_MAC_VERIFY_ERROR) ,"mac verify error"}, |
115 | {PKCS12_R_PARSE_ERROR ,"parse error"}, | 121 | {ERR_REASON(PKCS12_R_MAC_VERIFY_FAILURE) ,"mac verify failure"}, |
116 | {PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR ,"pkcs12 algor cipherinit error"}, | 122 | {ERR_REASON(PKCS12_R_PARSE_ERROR) ,"parse error"}, |
117 | {PKCS12_R_PKCS12_CIPHERFINAL_ERROR ,"pkcs12 cipherfinal error"}, | 123 | {ERR_REASON(PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR),"pkcs12 algor cipherinit error"}, |
118 | {PKCS12_R_PKCS12_PBE_CRYPT_ERROR ,"pkcs12 pbe crypt error"}, | 124 | {ERR_REASON(PKCS12_R_PKCS12_CIPHERFINAL_ERROR),"pkcs12 cipherfinal error"}, |
119 | {PKCS12_R_UNKNOWN_DIGEST_ALGORITHM ,"unknown digest algorithm"}, | 125 | {ERR_REASON(PKCS12_R_PKCS12_PBE_CRYPT_ERROR),"pkcs12 pbe crypt error"}, |
120 | {PKCS12_R_UNSUPPORTED_PKCS12_MODE ,"unsupported pkcs12 mode"}, | 126 | {ERR_REASON(PKCS12_R_UNKNOWN_DIGEST_ALGORITHM),"unknown digest algorithm"}, |
127 | {ERR_REASON(PKCS12_R_UNSUPPORTED_PKCS12_MODE),"unsupported pkcs12 mode"}, | ||
121 | {0,NULL} | 128 | {0,NULL} |
122 | }; | 129 | }; |
123 | 130 | ||
@@ -131,8 +138,8 @@ void ERR_load_PKCS12_strings(void) | |||
131 | { | 138 | { |
132 | init=0; | 139 | init=0; |
133 | #ifndef OPENSSL_NO_ERR | 140 | #ifndef OPENSSL_NO_ERR |
134 | ERR_load_strings(ERR_LIB_PKCS12,PKCS12_str_functs); | 141 | ERR_load_strings(0,PKCS12_str_functs); |
135 | ERR_load_strings(ERR_LIB_PKCS12,PKCS12_str_reasons); | 142 | ERR_load_strings(0,PKCS12_str_reasons); |
136 | #endif | 143 | #endif |
137 | 144 | ||
138 | } | 145 | } |
diff --git a/src/lib/libcrypto/pkcs12/pkcs12.h b/src/lib/libcrypto/pkcs12/pkcs12.h index dd338f266c..fb8af82d4f 100644 --- a/src/lib/libcrypto/pkcs12/pkcs12.h +++ b/src/lib/libcrypto/pkcs12/pkcs12.h | |||
@@ -287,12 +287,15 @@ void ERR_load_PKCS12_strings(void); | |||
287 | #define PKCS12_F_PKCS12_PBE_KEYIVGEN 120 | 287 | #define PKCS12_F_PKCS12_PBE_KEYIVGEN 120 |
288 | #define PKCS12_F_PKCS12_SETUP_MAC 122 | 288 | #define PKCS12_F_PKCS12_SETUP_MAC 122 |
289 | #define PKCS12_F_PKCS12_SET_MAC 123 | 289 | #define PKCS12_F_PKCS12_SET_MAC 123 |
290 | #define PKCS12_F_PKCS12_UNPACK_AUTHSAFES 129 | ||
291 | #define PKCS12_F_PKCS12_UNPACK_P7DATA 130 | ||
290 | #define PKCS12_F_PKCS8_ADD_KEYUSAGE 124 | 292 | #define PKCS12_F_PKCS8_ADD_KEYUSAGE 124 |
291 | #define PKCS12_F_PKCS8_ENCRYPT 125 | 293 | #define PKCS12_F_PKCS8_ENCRYPT 125 |
292 | #define PKCS12_F_VERIFY_MAC 126 | 294 | #define PKCS12_F_VERIFY_MAC 126 |
293 | 295 | ||
294 | /* Reason codes. */ | 296 | /* Reason codes. */ |
295 | #define PKCS12_R_CANT_PACK_STRUCTURE 100 | 297 | #define PKCS12_R_CANT_PACK_STRUCTURE 100 |
298 | #define PKCS12_R_CONTENT_TYPE_NOT_DATA 121 | ||
296 | #define PKCS12_R_DECODE_ERROR 101 | 299 | #define PKCS12_R_DECODE_ERROR 101 |
297 | #define PKCS12_R_ENCODE_ERROR 102 | 300 | #define PKCS12_R_ENCODE_ERROR 102 |
298 | #define PKCS12_R_ENCRYPT_ERROR 103 | 301 | #define PKCS12_R_ENCRYPT_ERROR 103 |
diff --git a/src/lib/libcrypto/pkcs7/pk7_mime.c b/src/lib/libcrypto/pkcs7/pk7_mime.c index 5d2a97839d..927b88c3e7 100644 --- a/src/lib/libcrypto/pkcs7/pk7_mime.c +++ b/src/lib/libcrypto/pkcs7/pk7_mime.c | |||
@@ -3,7 +3,7 @@ | |||
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
5 | /* ==================================================================== | 5 | /* ==================================================================== |
6 | * Copyright (c) 1999-2003 The OpenSSL Project. All rights reserved. | 6 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
7 | * | 7 | * |
8 | * Redistribution and use in source and binary forms, with or without | 8 | * Redistribution and use in source and binary forms, with or without |
9 | * modification, are permitted provided that the following conditions | 9 | * modification, are permitted provided that the following conditions |
@@ -152,11 +152,12 @@ int SMIME_write_PKCS7(BIO *bio, PKCS7 *p7, BIO *data, int flags) | |||
152 | { | 152 | { |
153 | char bound[33], c; | 153 | char bound[33], c; |
154 | int i; | 154 | int i; |
155 | char *mime_prefix, *mime_eol; | 155 | char *mime_prefix, *mime_eol, *msg_type=NULL; |
156 | if (flags & PKCS7_NOOLDMIMETYPE) | 156 | if (flags & PKCS7_NOOLDMIMETYPE) |
157 | mime_prefix = "application/pkcs7-"; | 157 | mime_prefix = "application/pkcs7-"; |
158 | else | 158 | else |
159 | mime_prefix = "application/x-pkcs7-"; | 159 | mime_prefix = "application/x-pkcs7-"; |
160 | |||
160 | if (flags & PKCS7_CRLFEOL) | 161 | if (flags & PKCS7_CRLFEOL) |
161 | mime_eol = "\r\n"; | 162 | mime_eol = "\r\n"; |
162 | else | 163 | else |
@@ -198,11 +199,30 @@ int SMIME_write_PKCS7(BIO *bio, PKCS7 *p7, BIO *data, int flags) | |||
198 | mime_eol, mime_eol); | 199 | mime_eol, mime_eol); |
199 | return 1; | 200 | return 1; |
200 | } | 201 | } |
202 | |||
203 | /* Determine smime-type header */ | ||
204 | |||
205 | if (PKCS7_type_is_enveloped(p7)) | ||
206 | msg_type = "enveloped-data"; | ||
207 | else if (PKCS7_type_is_signed(p7)) | ||
208 | { | ||
209 | /* If we have any signers it is signed-data othewise | ||
210 | * certs-only. | ||
211 | */ | ||
212 | STACK_OF(PKCS7_SIGNER_INFO) *sinfos; | ||
213 | sinfos = PKCS7_get_signer_info(p7); | ||
214 | if (sk_PKCS7_SIGNER_INFO_num(sinfos) > 0) | ||
215 | msg_type = "signed-data"; | ||
216 | else | ||
217 | msg_type = "certs-only"; | ||
218 | } | ||
201 | /* MIME headers */ | 219 | /* MIME headers */ |
202 | BIO_printf(bio, "MIME-Version: 1.0%s", mime_eol); | 220 | BIO_printf(bio, "MIME-Version: 1.0%s", mime_eol); |
203 | BIO_printf(bio, "Content-Disposition: attachment;"); | 221 | BIO_printf(bio, "Content-Disposition: attachment;"); |
204 | BIO_printf(bio, " filename=\"smime.p7m\"%s", mime_eol); | 222 | BIO_printf(bio, " filename=\"smime.p7m\"%s", mime_eol); |
205 | BIO_printf(bio, "Content-Type: %smime;", mime_prefix); | 223 | BIO_printf(bio, "Content-Type: %smime;", mime_prefix); |
224 | if (msg_type) | ||
225 | BIO_printf(bio, " smime-type=%s;", msg_type); | ||
206 | BIO_printf(bio, " name=\"smime.p7m\"%s", mime_eol); | 226 | BIO_printf(bio, " name=\"smime.p7m\"%s", mime_eol); |
207 | BIO_printf(bio, "Content-Transfer-Encoding: base64%s%s", | 227 | BIO_printf(bio, "Content-Transfer-Encoding: base64%s%s", |
208 | mime_eol, mime_eol); | 228 | mime_eol, mime_eol); |
diff --git a/src/lib/libcrypto/pkcs7/pk7_smime.c b/src/lib/libcrypto/pkcs7/pk7_smime.c index a852b49235..99a0d63f38 100644 --- a/src/lib/libcrypto/pkcs7/pk7_smime.c +++ b/src/lib/libcrypto/pkcs7/pk7_smime.c | |||
@@ -296,11 +296,9 @@ int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, | |||
296 | 296 | ||
297 | if (tmpin == indata) | 297 | if (tmpin == indata) |
298 | { | 298 | { |
299 | if(indata) BIO_pop(p7bio); | 299 | if (indata) BIO_pop(p7bio); |
300 | BIO_free_all(p7bio); | ||
301 | } | 300 | } |
302 | else | 301 | BIO_free_all(p7bio); |
303 | BIO_free_all(tmpin); | ||
304 | 302 | ||
305 | sk_X509_free(signers); | 303 | sk_X509_free(signers); |
306 | 304 | ||
diff --git a/src/lib/libcrypto/pkcs7/pkcs7err.c b/src/lib/libcrypto/pkcs7/pkcs7err.c index 5e51527a40..19894c80a4 100644 --- a/src/lib/libcrypto/pkcs7/pkcs7err.c +++ b/src/lib/libcrypto/pkcs7/pkcs7err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/pkcs7/pkcs7err.c */ | 1 | /* crypto/pkcs7/pkcs7err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,81 +64,85 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_PKCS7,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_PKCS7,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA PKCS7_str_functs[]= | 71 | static ERR_STRING_DATA PKCS7_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,PKCS7_F_B64_READ_PKCS7,0), "B64_READ_PKCS7"}, | 73 | {ERR_FUNC(PKCS7_F_B64_READ_PKCS7), "B64_READ_PKCS7"}, |
70 | {ERR_PACK(0,PKCS7_F_B64_WRITE_PKCS7,0), "B64_WRITE_PKCS7"}, | 74 | {ERR_FUNC(PKCS7_F_B64_WRITE_PKCS7), "B64_WRITE_PKCS7"}, |
71 | {ERR_PACK(0,PKCS7_F_PKCS7_ADD_ATTRIB_SMIMECAP,0), "PKCS7_add_attrib_smimecap"}, | 75 | {ERR_FUNC(PKCS7_F_PKCS7_ADD_ATTRIB_SMIMECAP), "PKCS7_add_attrib_smimecap"}, |
72 | {ERR_PACK(0,PKCS7_F_PKCS7_ADD_CERTIFICATE,0), "PKCS7_add_certificate"}, | 76 | {ERR_FUNC(PKCS7_F_PKCS7_ADD_CERTIFICATE), "PKCS7_add_certificate"}, |
73 | {ERR_PACK(0,PKCS7_F_PKCS7_ADD_CRL,0), "PKCS7_add_crl"}, | 77 | {ERR_FUNC(PKCS7_F_PKCS7_ADD_CRL), "PKCS7_add_crl"}, |
74 | {ERR_PACK(0,PKCS7_F_PKCS7_ADD_RECIPIENT_INFO,0), "PKCS7_add_recipient_info"}, | 78 | {ERR_FUNC(PKCS7_F_PKCS7_ADD_RECIPIENT_INFO), "PKCS7_add_recipient_info"}, |
75 | {ERR_PACK(0,PKCS7_F_PKCS7_ADD_SIGNER,0), "PKCS7_add_signer"}, | 79 | {ERR_FUNC(PKCS7_F_PKCS7_ADD_SIGNER), "PKCS7_add_signer"}, |
76 | {ERR_PACK(0,PKCS7_F_PKCS7_CTRL,0), "PKCS7_ctrl"}, | 80 | {ERR_FUNC(PKCS7_F_PKCS7_CTRL), "PKCS7_ctrl"}, |
77 | {ERR_PACK(0,PKCS7_F_PKCS7_DATADECODE,0), "PKCS7_dataDecode"}, | 81 | {ERR_FUNC(PKCS7_F_PKCS7_DATADECODE), "PKCS7_dataDecode"}, |
78 | {ERR_PACK(0,PKCS7_F_PKCS7_DATAINIT,0), "PKCS7_dataInit"}, | 82 | {ERR_FUNC(PKCS7_F_PKCS7_DATAINIT), "PKCS7_dataInit"}, |
79 | {ERR_PACK(0,PKCS7_F_PKCS7_DATASIGN,0), "PKCS7_DATASIGN"}, | 83 | {ERR_FUNC(PKCS7_F_PKCS7_DATASIGN), "PKCS7_DATASIGN"}, |
80 | {ERR_PACK(0,PKCS7_F_PKCS7_DATAVERIFY,0), "PKCS7_dataVerify"}, | 84 | {ERR_FUNC(PKCS7_F_PKCS7_DATAVERIFY), "PKCS7_dataVerify"}, |
81 | {ERR_PACK(0,PKCS7_F_PKCS7_DECRYPT,0), "PKCS7_decrypt"}, | 85 | {ERR_FUNC(PKCS7_F_PKCS7_DECRYPT), "PKCS7_decrypt"}, |
82 | {ERR_PACK(0,PKCS7_F_PKCS7_ENCRYPT,0), "PKCS7_encrypt"}, | 86 | {ERR_FUNC(PKCS7_F_PKCS7_ENCRYPT), "PKCS7_encrypt"}, |
83 | {ERR_PACK(0,PKCS7_F_PKCS7_GET0_SIGNERS,0), "PKCS7_get0_signers"}, | 87 | {ERR_FUNC(PKCS7_F_PKCS7_GET0_SIGNERS), "PKCS7_get0_signers"}, |
84 | {ERR_PACK(0,PKCS7_F_PKCS7_SET_CIPHER,0), "PKCS7_set_cipher"}, | 88 | {ERR_FUNC(PKCS7_F_PKCS7_SET_CIPHER), "PKCS7_set_cipher"}, |
85 | {ERR_PACK(0,PKCS7_F_PKCS7_SET_CONTENT,0), "PKCS7_set_content"}, | 89 | {ERR_FUNC(PKCS7_F_PKCS7_SET_CONTENT), "PKCS7_set_content"}, |
86 | {ERR_PACK(0,PKCS7_F_PKCS7_SET_TYPE,0), "PKCS7_set_type"}, | 90 | {ERR_FUNC(PKCS7_F_PKCS7_SET_TYPE), "PKCS7_set_type"}, |
87 | {ERR_PACK(0,PKCS7_F_PKCS7_SIGN,0), "PKCS7_sign"}, | 91 | {ERR_FUNC(PKCS7_F_PKCS7_SIGN), "PKCS7_sign"}, |
88 | {ERR_PACK(0,PKCS7_F_PKCS7_SIGNATUREVERIFY,0), "PKCS7_signatureVerify"}, | 92 | {ERR_FUNC(PKCS7_F_PKCS7_SIGNATUREVERIFY), "PKCS7_signatureVerify"}, |
89 | {ERR_PACK(0,PKCS7_F_PKCS7_SIMPLE_SMIMECAP,0), "PKCS7_simple_smimecap"}, | 93 | {ERR_FUNC(PKCS7_F_PKCS7_SIMPLE_SMIMECAP), "PKCS7_simple_smimecap"}, |
90 | {ERR_PACK(0,PKCS7_F_PKCS7_VERIFY,0), "PKCS7_verify"}, | 94 | {ERR_FUNC(PKCS7_F_PKCS7_VERIFY), "PKCS7_verify"}, |
91 | {ERR_PACK(0,PKCS7_F_SMIME_READ_PKCS7,0), "SMIME_read_PKCS7"}, | 95 | {ERR_FUNC(PKCS7_F_SMIME_READ_PKCS7), "SMIME_read_PKCS7"}, |
92 | {ERR_PACK(0,PKCS7_F_SMIME_TEXT,0), "SMIME_text"}, | 96 | {ERR_FUNC(PKCS7_F_SMIME_TEXT), "SMIME_text"}, |
93 | {0,NULL} | 97 | {0,NULL} |
94 | }; | 98 | }; |
95 | 99 | ||
96 | static ERR_STRING_DATA PKCS7_str_reasons[]= | 100 | static ERR_STRING_DATA PKCS7_str_reasons[]= |
97 | { | 101 | { |
98 | {PKCS7_R_CERTIFICATE_VERIFY_ERROR ,"certificate verify error"}, | 102 | {ERR_REASON(PKCS7_R_CERTIFICATE_VERIFY_ERROR),"certificate verify error"}, |
99 | {PKCS7_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER ,"cipher has no object identifier"}, | 103 | {ERR_REASON(PKCS7_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER),"cipher has no object identifier"}, |
100 | {PKCS7_R_CIPHER_NOT_INITIALIZED ,"cipher not initialized"}, | 104 | {ERR_REASON(PKCS7_R_CIPHER_NOT_INITIALIZED),"cipher not initialized"}, |
101 | {PKCS7_R_CONTENT_AND_DATA_PRESENT ,"content and data present"}, | 105 | {ERR_REASON(PKCS7_R_CONTENT_AND_DATA_PRESENT),"content and data present"}, |
102 | {PKCS7_R_DECODE_ERROR ,"decode error"}, | 106 | {ERR_REASON(PKCS7_R_DECODE_ERROR) ,"decode error"}, |
103 | {PKCS7_R_DECRYPTED_KEY_IS_WRONG_LENGTH ,"decrypted key is wrong length"}, | 107 | {ERR_REASON(PKCS7_R_DECRYPTED_KEY_IS_WRONG_LENGTH),"decrypted key is wrong length"}, |
104 | {PKCS7_R_DECRYPT_ERROR ,"decrypt error"}, | 108 | {ERR_REASON(PKCS7_R_DECRYPT_ERROR) ,"decrypt error"}, |
105 | {PKCS7_R_DIGEST_FAILURE ,"digest failure"}, | 109 | {ERR_REASON(PKCS7_R_DIGEST_FAILURE) ,"digest failure"}, |
106 | {PKCS7_R_ERROR_ADDING_RECIPIENT ,"error adding recipient"}, | 110 | {ERR_REASON(PKCS7_R_ERROR_ADDING_RECIPIENT),"error adding recipient"}, |
107 | {PKCS7_R_ERROR_SETTING_CIPHER ,"error setting cipher"}, | 111 | {ERR_REASON(PKCS7_R_ERROR_SETTING_CIPHER),"error setting cipher"}, |
108 | {PKCS7_R_INVALID_MIME_TYPE ,"invalid mime type"}, | 112 | {ERR_REASON(PKCS7_R_INVALID_MIME_TYPE) ,"invalid mime type"}, |
109 | {PKCS7_R_INVALID_NULL_POINTER ,"invalid null pointer"}, | 113 | {ERR_REASON(PKCS7_R_INVALID_NULL_POINTER),"invalid null pointer"}, |
110 | {PKCS7_R_MIME_NO_CONTENT_TYPE ,"mime no content type"}, | 114 | {ERR_REASON(PKCS7_R_MIME_NO_CONTENT_TYPE),"mime no content type"}, |
111 | {PKCS7_R_MIME_PARSE_ERROR ,"mime parse error"}, | 115 | {ERR_REASON(PKCS7_R_MIME_PARSE_ERROR) ,"mime parse error"}, |
112 | {PKCS7_R_MIME_SIG_PARSE_ERROR ,"mime sig parse error"}, | 116 | {ERR_REASON(PKCS7_R_MIME_SIG_PARSE_ERROR),"mime sig parse error"}, |
113 | {PKCS7_R_MISSING_CERIPEND_INFO ,"missing ceripend info"}, | 117 | {ERR_REASON(PKCS7_R_MISSING_CERIPEND_INFO),"missing ceripend info"}, |
114 | {PKCS7_R_NO_CONTENT ,"no content"}, | 118 | {ERR_REASON(PKCS7_R_NO_CONTENT) ,"no content"}, |
115 | {PKCS7_R_NO_CONTENT_TYPE ,"no content type"}, | 119 | {ERR_REASON(PKCS7_R_NO_CONTENT_TYPE) ,"no content type"}, |
116 | {PKCS7_R_NO_MULTIPART_BODY_FAILURE ,"no multipart body failure"}, | 120 | {ERR_REASON(PKCS7_R_NO_MULTIPART_BODY_FAILURE),"no multipart body failure"}, |
117 | {PKCS7_R_NO_MULTIPART_BOUNDARY ,"no multipart boundary"}, | 121 | {ERR_REASON(PKCS7_R_NO_MULTIPART_BOUNDARY),"no multipart boundary"}, |
118 | {PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE,"no recipient matches certificate"}, | 122 | {ERR_REASON(PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE),"no recipient matches certificate"}, |
119 | {PKCS7_R_NO_SIGNATURES_ON_DATA ,"no signatures on data"}, | 123 | {ERR_REASON(PKCS7_R_NO_SIGNATURES_ON_DATA),"no signatures on data"}, |
120 | {PKCS7_R_NO_SIGNERS ,"no signers"}, | 124 | {ERR_REASON(PKCS7_R_NO_SIGNERS) ,"no signers"}, |
121 | {PKCS7_R_NO_SIG_CONTENT_TYPE ,"no sig content type"}, | 125 | {ERR_REASON(PKCS7_R_NO_SIG_CONTENT_TYPE) ,"no sig content type"}, |
122 | {PKCS7_R_OPERATION_NOT_SUPPORTED_ON_THIS_TYPE,"operation not supported on this type"}, | 126 | {ERR_REASON(PKCS7_R_OPERATION_NOT_SUPPORTED_ON_THIS_TYPE),"operation not supported on this type"}, |
123 | {PKCS7_R_PKCS7_ADD_SIGNATURE_ERROR ,"pkcs7 add signature error"}, | 127 | {ERR_REASON(PKCS7_R_PKCS7_ADD_SIGNATURE_ERROR),"pkcs7 add signature error"}, |
124 | {PKCS7_R_PKCS7_DATAFINAL_ERROR ,"pkcs7 datafinal error"}, | 128 | {ERR_REASON(PKCS7_R_PKCS7_DATAFINAL_ERROR),"pkcs7 datafinal error"}, |
125 | {PKCS7_R_PKCS7_DATASIGN ,"pkcs7 datasign"}, | 129 | {ERR_REASON(PKCS7_R_PKCS7_DATASIGN) ,"pkcs7 datasign"}, |
126 | {PKCS7_R_PKCS7_PARSE_ERROR ,"pkcs7 parse error"}, | 130 | {ERR_REASON(PKCS7_R_PKCS7_PARSE_ERROR) ,"pkcs7 parse error"}, |
127 | {PKCS7_R_PKCS7_SIG_PARSE_ERROR ,"pkcs7 sig parse error"}, | 131 | {ERR_REASON(PKCS7_R_PKCS7_SIG_PARSE_ERROR),"pkcs7 sig parse error"}, |
128 | {PKCS7_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE,"private key does not match certificate"}, | 132 | {ERR_REASON(PKCS7_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE),"private key does not match certificate"}, |
129 | {PKCS7_R_SIGNATURE_FAILURE ,"signature failure"}, | 133 | {ERR_REASON(PKCS7_R_SIGNATURE_FAILURE) ,"signature failure"}, |
130 | {PKCS7_R_SIGNER_CERTIFICATE_NOT_FOUND ,"signer certificate not found"}, | 134 | {ERR_REASON(PKCS7_R_SIGNER_CERTIFICATE_NOT_FOUND),"signer certificate not found"}, |
131 | {PKCS7_R_SIG_INVALID_MIME_TYPE ,"sig invalid mime type"}, | 135 | {ERR_REASON(PKCS7_R_SIG_INVALID_MIME_TYPE),"sig invalid mime type"}, |
132 | {PKCS7_R_SMIME_TEXT_ERROR ,"smime text error"}, | 136 | {ERR_REASON(PKCS7_R_SMIME_TEXT_ERROR) ,"smime text error"}, |
133 | {PKCS7_R_UNABLE_TO_FIND_CERTIFICATE ,"unable to find certificate"}, | 137 | {ERR_REASON(PKCS7_R_UNABLE_TO_FIND_CERTIFICATE),"unable to find certificate"}, |
134 | {PKCS7_R_UNABLE_TO_FIND_MEM_BIO ,"unable to find mem bio"}, | 138 | {ERR_REASON(PKCS7_R_UNABLE_TO_FIND_MEM_BIO),"unable to find mem bio"}, |
135 | {PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST ,"unable to find message digest"}, | 139 | {ERR_REASON(PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST),"unable to find message digest"}, |
136 | {PKCS7_R_UNKNOWN_DIGEST_TYPE ,"unknown digest type"}, | 140 | {ERR_REASON(PKCS7_R_UNKNOWN_DIGEST_TYPE) ,"unknown digest type"}, |
137 | {PKCS7_R_UNKNOWN_OPERATION ,"unknown operation"}, | 141 | {ERR_REASON(PKCS7_R_UNKNOWN_OPERATION) ,"unknown operation"}, |
138 | {PKCS7_R_UNSUPPORTED_CIPHER_TYPE ,"unsupported cipher type"}, | 142 | {ERR_REASON(PKCS7_R_UNSUPPORTED_CIPHER_TYPE),"unsupported cipher type"}, |
139 | {PKCS7_R_UNSUPPORTED_CONTENT_TYPE ,"unsupported content type"}, | 143 | {ERR_REASON(PKCS7_R_UNSUPPORTED_CONTENT_TYPE),"unsupported content type"}, |
140 | {PKCS7_R_WRONG_CONTENT_TYPE ,"wrong content type"}, | 144 | {ERR_REASON(PKCS7_R_WRONG_CONTENT_TYPE) ,"wrong content type"}, |
141 | {PKCS7_R_WRONG_PKCS7_TYPE ,"wrong pkcs7 type"}, | 145 | {ERR_REASON(PKCS7_R_WRONG_PKCS7_TYPE) ,"wrong pkcs7 type"}, |
142 | {0,NULL} | 146 | {0,NULL} |
143 | }; | 147 | }; |
144 | 148 | ||
@@ -152,8 +156,8 @@ void ERR_load_PKCS7_strings(void) | |||
152 | { | 156 | { |
153 | init=0; | 157 | init=0; |
154 | #ifndef OPENSSL_NO_ERR | 158 | #ifndef OPENSSL_NO_ERR |
155 | ERR_load_strings(ERR_LIB_PKCS7,PKCS7_str_functs); | 159 | ERR_load_strings(0,PKCS7_str_functs); |
156 | ERR_load_strings(ERR_LIB_PKCS7,PKCS7_str_reasons); | 160 | ERR_load_strings(0,PKCS7_str_reasons); |
157 | #endif | 161 | #endif |
158 | 162 | ||
159 | } | 163 | } |
diff --git a/src/lib/libcrypto/rand/rand_err.c b/src/lib/libcrypto/rand/rand_err.c index 95574659ac..97f96e1aee 100644 --- a/src/lib/libcrypto/rand/rand_err.c +++ b/src/lib/libcrypto/rand/rand_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/rand/rand_err.c */ | 1 | /* crypto/rand/rand_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2003 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,22 +64,26 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_RAND,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_RAND,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA RAND_str_functs[]= | 71 | static ERR_STRING_DATA RAND_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,RAND_F_FIPS_RAND_BYTES,0), "FIPS_RAND_BYTES"}, | 73 | {ERR_FUNC(RAND_F_FIPS_RAND_BYTES), "FIPS_RAND_BYTES"}, |
70 | {ERR_PACK(0,RAND_F_RAND_GET_RAND_METHOD,0), "RAND_get_rand_method"}, | 74 | {ERR_FUNC(RAND_F_RAND_GET_RAND_METHOD), "RAND_get_rand_method"}, |
71 | {ERR_PACK(0,RAND_F_SSLEAY_RAND_BYTES,0), "SSLEAY_RAND_BYTES"}, | 75 | {ERR_FUNC(RAND_F_SSLEAY_RAND_BYTES), "SSLEAY_RAND_BYTES"}, |
72 | {0,NULL} | 76 | {0,NULL} |
73 | }; | 77 | }; |
74 | 78 | ||
75 | static ERR_STRING_DATA RAND_str_reasons[]= | 79 | static ERR_STRING_DATA RAND_str_reasons[]= |
76 | { | 80 | { |
77 | {RAND_R_NON_FIPS_METHOD ,"non fips method"}, | 81 | {ERR_REASON(RAND_R_NON_FIPS_METHOD) ,"non fips method"}, |
78 | {RAND_R_PRNG_ASKING_FOR_TOO_MUCH ,"prng asking for too much"}, | 82 | {ERR_REASON(RAND_R_PRNG_ASKING_FOR_TOO_MUCH),"prng asking for too much"}, |
79 | {RAND_R_PRNG_NOT_REKEYED ,"prng not rekeyed"}, | 83 | {ERR_REASON(RAND_R_PRNG_NOT_REKEYED) ,"prng not rekeyed"}, |
80 | {RAND_R_PRNG_NOT_RESEEDED ,"prng not reseeded"}, | 84 | {ERR_REASON(RAND_R_PRNG_NOT_RESEEDED) ,"prng not reseeded"}, |
81 | {RAND_R_PRNG_NOT_SEEDED ,"PRNG not seeded"}, | 85 | {ERR_REASON(RAND_R_PRNG_NOT_SEEDED) ,"PRNG not seeded"}, |
82 | {RAND_R_PRNG_STUCK ,"prng stuck"}, | 86 | {ERR_REASON(RAND_R_PRNG_STUCK) ,"prng stuck"}, |
83 | {0,NULL} | 87 | {0,NULL} |
84 | }; | 88 | }; |
85 | 89 | ||
@@ -93,8 +97,8 @@ void ERR_load_RAND_strings(void) | |||
93 | { | 97 | { |
94 | init=0; | 98 | init=0; |
95 | #ifndef OPENSSL_NO_ERR | 99 | #ifndef OPENSSL_NO_ERR |
96 | ERR_load_strings(ERR_LIB_RAND,RAND_str_functs); | 100 | ERR_load_strings(0,RAND_str_functs); |
97 | ERR_load_strings(ERR_LIB_RAND,RAND_str_reasons); | 101 | ERR_load_strings(0,RAND_str_reasons); |
98 | #endif | 102 | #endif |
99 | 103 | ||
100 | } | 104 | } |
diff --git a/src/lib/libcrypto/rand/rand_lib.c b/src/lib/libcrypto/rand/rand_lib.c index 88f1b56d91..a21bde79de 100644 --- a/src/lib/libcrypto/rand/rand_lib.c +++ b/src/lib/libcrypto/rand/rand_lib.c | |||
@@ -87,16 +87,6 @@ int RAND_set_rand_method(const RAND_METHOD *meth) | |||
87 | 87 | ||
88 | const RAND_METHOD *RAND_get_rand_method(void) | 88 | const RAND_METHOD *RAND_get_rand_method(void) |
89 | { | 89 | { |
90 | #ifdef OPENSSL_FIPS | ||
91 | if(FIPS_mode() | ||
92 | && default_RAND_meth != FIPS_rand_check()) | ||
93 | { | ||
94 | RANDerr(RAND_F_RAND_GET_RAND_METHOD,RAND_R_NON_FIPS_METHOD); | ||
95 | return 0; | ||
96 | } | ||
97 | #endif | ||
98 | |||
99 | |||
100 | if (!default_RAND_meth) | 90 | if (!default_RAND_meth) |
101 | { | 91 | { |
102 | #ifndef OPENSSL_NO_ENGINE | 92 | #ifndef OPENSSL_NO_ENGINE |
@@ -114,8 +104,22 @@ const RAND_METHOD *RAND_get_rand_method(void) | |||
114 | funct_ref = e; | 104 | funct_ref = e; |
115 | else | 105 | else |
116 | #endif | 106 | #endif |
117 | default_RAND_meth = RAND_SSLeay(); | 107 | #ifdef OPENSSL_FIPS |
108 | if(FIPS_mode()) | ||
109 | default_RAND_meth=FIPS_rand_method(); | ||
110 | else | ||
111 | #endif | ||
112 | default_RAND_meth = RAND_SSLeay(); | ||
118 | } | 113 | } |
114 | |||
115 | #ifdef OPENSSL_FIPS | ||
116 | if(FIPS_mode() | ||
117 | && default_RAND_meth != FIPS_rand_check()) | ||
118 | { | ||
119 | RANDerr(RAND_F_RAND_GET_RAND_METHOD,RAND_R_NON_FIPS_METHOD); | ||
120 | return 0; | ||
121 | } | ||
122 | #endif | ||
119 | return default_RAND_meth; | 123 | return default_RAND_meth; |
120 | } | 124 | } |
121 | 125 | ||
diff --git a/src/lib/libcrypto/rand/randfile.c b/src/lib/libcrypto/rand/randfile.c index c7fba496a8..7183fa32e4 100644 --- a/src/lib/libcrypto/rand/randfile.c +++ b/src/lib/libcrypto/rand/randfile.c | |||
@@ -57,7 +57,7 @@ | |||
57 | */ | 57 | */ |
58 | 58 | ||
59 | /* We need to define this to get macros like S_IFBLK and S_IFCHR */ | 59 | /* We need to define this to get macros like S_IFBLK and S_IFCHR */ |
60 | #define _XOPEN_SOURCE 1 | 60 | #define _XOPEN_SOURCE 500 |
61 | 61 | ||
62 | #include <errno.h> | 62 | #include <errno.h> |
63 | #include <stdio.h> | 63 | #include <stdio.h> |
diff --git a/src/lib/libcrypto/rc2/rc2_skey.c b/src/lib/libcrypto/rc2/rc2_skey.c index 22f372f85c..9652865188 100644 --- a/src/lib/libcrypto/rc2/rc2_skey.c +++ b/src/lib/libcrypto/rc2/rc2_skey.c | |||
@@ -58,6 +58,7 @@ | |||
58 | 58 | ||
59 | #include <openssl/rc2.h> | 59 | #include <openssl/rc2.h> |
60 | #include <openssl/crypto.h> | 60 | #include <openssl/crypto.h> |
61 | #include <openssl/fips.h> | ||
61 | #include "rc2_locl.h" | 62 | #include "rc2_locl.h" |
62 | 63 | ||
63 | static unsigned char key_table[256]={ | 64 | static unsigned char key_table[256]={ |
diff --git a/src/lib/libcrypto/rc4/asm/rc4-x86_64.pl b/src/lib/libcrypto/rc4/asm/rc4-x86_64.pl new file mode 100755 index 0000000000..b628daca70 --- /dev/null +++ b/src/lib/libcrypto/rc4/asm/rc4-x86_64.pl | |||
@@ -0,0 +1,150 @@ | |||
1 | #!/usr/bin/env perl | ||
2 | # | ||
3 | # ==================================================================== | ||
4 | # Written by Andy Polyakov <appro@fy.chalmers.se> for the OpenSSL | ||
5 | # project. Rights for redistribution and usage in source and binary | ||
6 | # forms are granted according to the OpenSSL license. | ||
7 | # ==================================================================== | ||
8 | # | ||
9 | # Unlike 0.9.7f this code expects RC4_CHAR back in config line! See | ||
10 | # commentary section in corresponding script in development branch | ||
11 | # for background information about this option carousel. For those | ||
12 | # who don't have energy to figure out these gory details, here is | ||
13 | # basis in form of performance matrix relative to the original | ||
14 | # 0.9.7e C code-base: | ||
15 | # | ||
16 | # 0.9.7e 0.9.7f this | ||
17 | # AMD64 1x 3.3x 2.4x | ||
18 | # EM64T 1x 0.8x 1.5x | ||
19 | # | ||
20 | # In other words idea is to trade -25% AMD64 performance to compensate | ||
21 | # for deterioration and gain +90% on EM64T core. Development branch | ||
22 | # maintains best performance for either target, i.e. 3.3x for AMD64 | ||
23 | # and 1.5x for EM64T. | ||
24 | |||
25 | $output=shift; | ||
26 | |||
27 | open STDOUT,">$output" || die "can't open $output: $!"; | ||
28 | |||
29 | $dat="%rdi"; # arg1 | ||
30 | $len="%rsi"; # arg2 | ||
31 | $inp="%rdx"; # arg3 | ||
32 | $out="%rcx"; # arg4 | ||
33 | |||
34 | @XX=("%r8","%r10"); | ||
35 | @TX=("%r9","%r11"); | ||
36 | $YY="%r12"; | ||
37 | $TY="%r13"; | ||
38 | |||
39 | $code=<<___;; | ||
40 | .text | ||
41 | |||
42 | .globl RC4 | ||
43 | .type RC4,\@function | ||
44 | .align 16 | ||
45 | RC4: or $len,$len | ||
46 | jne .Lentry | ||
47 | repret | ||
48 | .Lentry: | ||
49 | push %r12 | ||
50 | push %r13 | ||
51 | |||
52 | add \$2,$dat | ||
53 | movzb -2($dat),$XX[0]#d | ||
54 | movzb -1($dat),$YY#d | ||
55 | |||
56 | add \$1,$XX[0]#b | ||
57 | movzb ($dat,$XX[0]),$TX[0]#d | ||
58 | test \$-8,$len | ||
59 | jz .Lcloop1 | ||
60 | push %rbx | ||
61 | .align 16 # incidentally aligned already | ||
62 | .Lcloop8: | ||
63 | mov ($inp),%eax | ||
64 | mov 4($inp),%ebx | ||
65 | ___ | ||
66 | # unroll 2x4-wise, because 64-bit rotates kill Intel P4... | ||
67 | for ($i=0;$i<4;$i++) { | ||
68 | $code.=<<___; | ||
69 | add $TX[0]#b,$YY#b | ||
70 | lea 1($XX[0]),$XX[1] | ||
71 | movzb ($dat,$YY),$TY#d | ||
72 | movzb $XX[1]#b,$XX[1]#d | ||
73 | movzb ($dat,$XX[1]),$TX[1]#d | ||
74 | movb $TX[0]#b,($dat,$YY) | ||
75 | cmp $XX[1],$YY | ||
76 | movb $TY#b,($dat,$XX[0]) | ||
77 | jne .Lcmov$i # Intel cmov is sloooow... | ||
78 | mov $TX[0],$TX[1] | ||
79 | .Lcmov$i: | ||
80 | add $TX[0]#b,$TY#b | ||
81 | xor ($dat,$TY),%al | ||
82 | ror \$8,%eax | ||
83 | ___ | ||
84 | push(@TX,shift(@TX)); push(@XX,shift(@XX)); # "rotate" registers | ||
85 | } | ||
86 | for ($i=4;$i<8;$i++) { | ||
87 | $code.=<<___; | ||
88 | add $TX[0]#b,$YY#b | ||
89 | lea 1($XX[0]),$XX[1] | ||
90 | movzb ($dat,$YY),$TY#d | ||
91 | movzb $XX[1]#b,$XX[1]#d | ||
92 | movzb ($dat,$XX[1]),$TX[1]#d | ||
93 | movb $TX[0]#b,($dat,$YY) | ||
94 | cmp $XX[1],$YY | ||
95 | movb $TY#b,($dat,$XX[0]) | ||
96 | jne .Lcmov$i # Intel cmov is sloooow... | ||
97 | mov $TX[0],$TX[1] | ||
98 | .Lcmov$i: | ||
99 | add $TX[0]#b,$TY#b | ||
100 | xor ($dat,$TY),%bl | ||
101 | ror \$8,%ebx | ||
102 | ___ | ||
103 | push(@TX,shift(@TX)); push(@XX,shift(@XX)); # "rotate" registers | ||
104 | } | ||
105 | $code.=<<___; | ||
106 | lea -8($len),$len | ||
107 | mov %eax,($out) | ||
108 | lea 8($inp),$inp | ||
109 | mov %ebx,4($out) | ||
110 | lea 8($out),$out | ||
111 | |||
112 | test \$-8,$len | ||
113 | jnz .Lcloop8 | ||
114 | pop %rbx | ||
115 | cmp \$0,$len | ||
116 | jne .Lcloop1 | ||
117 | .Lexit: | ||
118 | sub \$1,$XX[0]#b | ||
119 | movb $XX[0]#b,-2($dat) | ||
120 | movb $YY#b,-1($dat) | ||
121 | |||
122 | pop %r13 | ||
123 | pop %r12 | ||
124 | repret | ||
125 | |||
126 | .align 16 | ||
127 | .Lcloop1: | ||
128 | add $TX[0]#b,$YY#b | ||
129 | movzb ($dat,$YY),$TY#d | ||
130 | movb $TX[0]#b,($dat,$YY) | ||
131 | movb $TY#b,($dat,$XX[0]) | ||
132 | add $TX[0]#b,$TY#b | ||
133 | add \$1,$XX[0]#b | ||
134 | movzb ($dat,$TY),$TY#d | ||
135 | movzb ($dat,$XX[0]),$TX[0]#d | ||
136 | xorb ($inp),$TY#b | ||
137 | lea 1($inp),$inp | ||
138 | movb $TY#b,($out) | ||
139 | lea 1($out),$out | ||
140 | sub \$1,$len | ||
141 | jnz .Lcloop1 | ||
142 | jmp .Lexit | ||
143 | .size RC4,.-RC4 | ||
144 | ___ | ||
145 | |||
146 | $code =~ s/#([bwd])/$1/gm; | ||
147 | |||
148 | $code =~ s/repret/.byte\t0xF3,0xC3/gm; | ||
149 | |||
150 | print $code; | ||
diff --git a/src/lib/libcrypto/rc4/rc4.h b/src/lib/libcrypto/rc4/rc4.h index dd90d9fde0..ae0cea75b8 100644 --- a/src/lib/libcrypto/rc4/rc4.h +++ b/src/lib/libcrypto/rc4/rc4.h | |||
@@ -73,10 +73,6 @@ typedef struct rc4_key_st | |||
73 | { | 73 | { |
74 | RC4_INT x,y; | 74 | RC4_INT x,y; |
75 | RC4_INT data[256]; | 75 | RC4_INT data[256]; |
76 | #if defined(__ia64) || defined(__ia64__) || defined(_M_IA64) | ||
77 | /* see crypto/rc4/asm/rc4-ia64.S for further details... */ | ||
78 | RC4_INT pad[512-256-2]; | ||
79 | #endif | ||
80 | } RC4_KEY; | 76 | } RC4_KEY; |
81 | 77 | ||
82 | 78 | ||
diff --git a/src/lib/libcrypto/rc4/rc4_enc.c b/src/lib/libcrypto/rc4/rc4_enc.c index 81a97ea3b7..d5f18a3a70 100644 --- a/src/lib/libcrypto/rc4/rc4_enc.c +++ b/src/lib/libcrypto/rc4/rc4_enc.c | |||
@@ -77,10 +77,6 @@ void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata, | |||
77 | x=key->x; | 77 | x=key->x; |
78 | y=key->y; | 78 | y=key->y; |
79 | d=key->data; | 79 | d=key->data; |
80 | #if defined(__ia64) || defined(__ia64__) || defined(_M_IA64) | ||
81 | /* see crypto/rc4/asm/rc4-ia64.S for further details... */ | ||
82 | d=(RC4_INT *)(((size_t)(d+255))&~(sizeof(key->data)-1)); | ||
83 | #endif | ||
84 | 80 | ||
85 | #if defined(RC4_CHUNK) | 81 | #if defined(RC4_CHUNK) |
86 | /* | 82 | /* |
diff --git a/src/lib/libcrypto/rc4/rc4_skey.c b/src/lib/libcrypto/rc4/rc4_skey.c index 07234f061a..60510624fd 100644 --- a/src/lib/libcrypto/rc4/rc4_skey.c +++ b/src/lib/libcrypto/rc4/rc4_skey.c | |||
@@ -58,6 +58,7 @@ | |||
58 | 58 | ||
59 | #include <openssl/rc4.h> | 59 | #include <openssl/rc4.h> |
60 | #include <openssl/crypto.h> | 60 | #include <openssl/crypto.h> |
61 | #include <openssl/fips.h> | ||
61 | #include "rc4_locl.h" | 62 | #include "rc4_locl.h" |
62 | #include <openssl/opensslv.h> | 63 | #include <openssl/opensslv.h> |
63 | 64 | ||
@@ -94,10 +95,6 @@ FIPS_NON_FIPS_VCIPHER_Init(RC4) | |||
94 | unsigned int i; | 95 | unsigned int i; |
95 | 96 | ||
96 | d= &(key->data[0]); | 97 | d= &(key->data[0]); |
97 | #if defined(__ia64) || defined(__ia64__) || defined(_M_IA64) | ||
98 | /* see crypto/rc4/asm/rc4-ia64.S for further details... */ | ||
99 | d=(RC4_INT *)(((size_t)(d+255))&~(sizeof(key->data)-1)); | ||
100 | #endif | ||
101 | 98 | ||
102 | for (i=0; i<256; i++) | 99 | for (i=0; i<256; i++) |
103 | d[i]=i; | 100 | d[i]=i; |
diff --git a/src/lib/libcrypto/ripemd/rmd_one.c b/src/lib/libcrypto/ripemd/rmd_one.c index f8b580c33a..b88446b267 100644 --- a/src/lib/libcrypto/ripemd/rmd_one.c +++ b/src/lib/libcrypto/ripemd/rmd_one.c | |||
@@ -68,7 +68,8 @@ unsigned char *RIPEMD160(const unsigned char *d, unsigned long n, | |||
68 | static unsigned char m[RIPEMD160_DIGEST_LENGTH]; | 68 | static unsigned char m[RIPEMD160_DIGEST_LENGTH]; |
69 | 69 | ||
70 | if (md == NULL) md=m; | 70 | if (md == NULL) md=m; |
71 | RIPEMD160_Init(&c); | 71 | if (!RIPEMD160_Init(&c)) |
72 | return NULL; | ||
72 | RIPEMD160_Update(&c,d,n); | 73 | RIPEMD160_Update(&c,d,n); |
73 | RIPEMD160_Final(md,&c); | 74 | RIPEMD160_Final(md,&c); |
74 | OPENSSL_cleanse(&c,sizeof(c)); /* security consideration */ | 75 | OPENSSL_cleanse(&c,sizeof(c)); /* security consideration */ |
diff --git a/src/lib/libcrypto/rsa/rsa.h b/src/lib/libcrypto/rsa/rsa.h index fc3bb5f86d..0b639cd37f 100644 --- a/src/lib/libcrypto/rsa/rsa.h +++ b/src/lib/libcrypto/rsa/rsa.h | |||
@@ -157,33 +157,41 @@ struct rsa_st | |||
157 | #define RSA_3 0x3L | 157 | #define RSA_3 0x3L |
158 | #define RSA_F4 0x10001L | 158 | #define RSA_F4 0x10001L |
159 | 159 | ||
160 | #define RSA_METHOD_FLAG_NO_CHECK 0x01 /* don't check pub/private match */ | 160 | #define RSA_METHOD_FLAG_NO_CHECK 0x0001 /* don't check pub/private match */ |
161 | 161 | ||
162 | #define RSA_FLAG_CACHE_PUBLIC 0x02 | 162 | #define RSA_FLAG_CACHE_PUBLIC 0x0002 |
163 | #define RSA_FLAG_CACHE_PRIVATE 0x04 | 163 | #define RSA_FLAG_CACHE_PRIVATE 0x0004 |
164 | #define RSA_FLAG_BLINDING 0x08 | 164 | #define RSA_FLAG_BLINDING 0x0008 |
165 | #define RSA_FLAG_THREAD_SAFE 0x10 | 165 | #define RSA_FLAG_THREAD_SAFE 0x0010 |
166 | /* This flag means the private key operations will be handled by rsa_mod_exp | 166 | /* This flag means the private key operations will be handled by rsa_mod_exp |
167 | * and that they do not depend on the private key components being present: | 167 | * and that they do not depend on the private key components being present: |
168 | * for example a key stored in external hardware. Without this flag bn_mod_exp | 168 | * for example a key stored in external hardware. Without this flag bn_mod_exp |
169 | * gets called when private key components are absent. | 169 | * gets called when private key components are absent. |
170 | */ | 170 | */ |
171 | #define RSA_FLAG_EXT_PKEY 0x20 | 171 | #define RSA_FLAG_EXT_PKEY 0x0020 |
172 | 172 | ||
173 | /* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions. | 173 | /* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions. |
174 | */ | 174 | */ |
175 | #define RSA_FLAG_SIGN_VER 0x40 | 175 | #define RSA_FLAG_SIGN_VER 0x0040 |
176 | 176 | ||
177 | #define RSA_FLAG_NO_BLINDING 0x80 /* new with 0.9.6j and 0.9.7b; the built-in | 177 | #define RSA_FLAG_NO_BLINDING 0x0080 /* new with 0.9.6j and 0.9.7b; the built-in |
178 | * RSA implementation now uses blinding by | 178 | * RSA implementation now uses blinding by |
179 | * default (ignoring RSA_FLAG_BLINDING), | 179 | * default (ignoring RSA_FLAG_BLINDING), |
180 | * but other engines might not need it | 180 | * but other engines might not need it |
181 | */ | 181 | */ |
182 | #define RSA_FLAG_NO_EXP_CONSTTIME 0x0100 /* new with 0.9.7h; the built-in RSA | ||
183 | * implementation now uses constant time | ||
184 | * modular exponentiation for secret exponents | ||
185 | * by default. This flag causes the | ||
186 | * faster variable sliding window method to | ||
187 | * be used for all exponents. | ||
188 | */ | ||
182 | 189 | ||
183 | #define RSA_PKCS1_PADDING 1 | 190 | #define RSA_PKCS1_PADDING 1 |
184 | #define RSA_SSLV23_PADDING 2 | 191 | #define RSA_SSLV23_PADDING 2 |
185 | #define RSA_NO_PADDING 3 | 192 | #define RSA_NO_PADDING 3 |
186 | #define RSA_PKCS1_OAEP_PADDING 4 | 193 | #define RSA_PKCS1_OAEP_PADDING 4 |
194 | #define RSA_X931_PADDING 5 | ||
187 | 195 | ||
188 | #define RSA_PKCS1_PADDING_SIZE 11 | 196 | #define RSA_PKCS1_PADDING_SIZE 11 |
189 | 197 | ||
@@ -196,6 +204,15 @@ int RSA_size(const RSA *); | |||
196 | RSA * RSA_generate_key(int bits, unsigned long e,void | 204 | RSA * RSA_generate_key(int bits, unsigned long e,void |
197 | (*callback)(int,int,void *),void *cb_arg); | 205 | (*callback)(int,int,void *),void *cb_arg); |
198 | int RSA_check_key(const RSA *); | 206 | int RSA_check_key(const RSA *); |
207 | #ifdef OPENSSL_FIPS | ||
208 | int RSA_X931_derive(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, BIGNUM *q2, | ||
209 | void (*cb)(int, int, void *), void *cb_arg, | ||
210 | const BIGNUM *Xp1, const BIGNUM *Xp2, const BIGNUM *Xp, | ||
211 | const BIGNUM *Xq1, const BIGNUM *Xq2, const BIGNUM *Xq, | ||
212 | const BIGNUM *e); | ||
213 | RSA *RSA_X931_generate_key(int bits, const BIGNUM *e, | ||
214 | void (*cb)(int,int,void *), void *cb_arg); | ||
215 | #endif | ||
199 | /* next 4 return -1 on error */ | 216 | /* next 4 return -1 on error */ |
200 | int RSA_public_encrypt(int flen, const unsigned char *from, | 217 | int RSA_public_encrypt(int flen, const unsigned char *from, |
201 | unsigned char *to, RSA *rsa,int padding); | 218 | unsigned char *to, RSA *rsa,int padding); |
@@ -268,6 +285,8 @@ int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen, | |||
268 | const unsigned char *f,int fl); | 285 | const unsigned char *f,int fl); |
269 | int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, | 286 | int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, |
270 | const unsigned char *f,int fl,int rsa_len); | 287 | const unsigned char *f,int fl,int rsa_len); |
288 | int PKCS1_MGF1(unsigned char *mask, long len, | ||
289 | const unsigned char *seed, long seedlen, const EVP_MD *dgst); | ||
271 | int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, | 290 | int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, |
272 | const unsigned char *f,int fl, | 291 | const unsigned char *f,int fl, |
273 | const unsigned char *p,int pl); | 292 | const unsigned char *p,int pl); |
@@ -282,6 +301,17 @@ int RSA_padding_add_none(unsigned char *to,int tlen, | |||
282 | const unsigned char *f,int fl); | 301 | const unsigned char *f,int fl); |
283 | int RSA_padding_check_none(unsigned char *to,int tlen, | 302 | int RSA_padding_check_none(unsigned char *to,int tlen, |
284 | const unsigned char *f,int fl,int rsa_len); | 303 | const unsigned char *f,int fl,int rsa_len); |
304 | int RSA_padding_add_X931(unsigned char *to,int tlen, | ||
305 | const unsigned char *f,int fl); | ||
306 | int RSA_padding_check_X931(unsigned char *to,int tlen, | ||
307 | const unsigned char *f,int fl,int rsa_len); | ||
308 | int RSA_X931_hash_id(int nid); | ||
309 | |||
310 | int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, | ||
311 | const EVP_MD *Hash, const unsigned char *EM, int sLen); | ||
312 | int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, | ||
313 | const unsigned char *mHash, | ||
314 | const EVP_MD *Hash, int sLen); | ||
285 | 315 | ||
286 | int RSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 316 | int RSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
287 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); | 317 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); |
@@ -311,20 +341,24 @@ void ERR_load_RSA_strings(void); | |||
311 | #define RSA_F_RSA_NULL 124 | 341 | #define RSA_F_RSA_NULL 124 |
312 | #define RSA_F_RSA_PADDING_ADD_NONE 107 | 342 | #define RSA_F_RSA_PADDING_ADD_NONE 107 |
313 | #define RSA_F_RSA_PADDING_ADD_PKCS1_OAEP 121 | 343 | #define RSA_F_RSA_PADDING_ADD_PKCS1_OAEP 121 |
344 | #define RSA_F_RSA_PADDING_ADD_PKCS1_PSS 125 | ||
314 | #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1 108 | 345 | #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1 108 |
315 | #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2 109 | 346 | #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2 109 |
316 | #define RSA_F_RSA_PADDING_ADD_SSLV23 110 | 347 | #define RSA_F_RSA_PADDING_ADD_SSLV23 110 |
348 | #define RSA_F_RSA_PADDING_ADD_X931 127 | ||
317 | #define RSA_F_RSA_PADDING_CHECK_NONE 111 | 349 | #define RSA_F_RSA_PADDING_CHECK_NONE 111 |
318 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 | 350 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 |
319 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 | 351 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 |
320 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 | 352 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 |
321 | #define RSA_F_RSA_PADDING_CHECK_SSLV23 114 | 353 | #define RSA_F_RSA_PADDING_CHECK_SSLV23 114 |
354 | #define RSA_F_RSA_PADDING_CHECK_X931 128 | ||
322 | #define RSA_F_RSA_PRINT 115 | 355 | #define RSA_F_RSA_PRINT 115 |
323 | #define RSA_F_RSA_PRINT_FP 116 | 356 | #define RSA_F_RSA_PRINT_FP 116 |
324 | #define RSA_F_RSA_SIGN 117 | 357 | #define RSA_F_RSA_SIGN 117 |
325 | #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 | 358 | #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 |
326 | #define RSA_F_RSA_VERIFY 119 | 359 | #define RSA_F_RSA_VERIFY 119 |
327 | #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 | 360 | #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 |
361 | #define RSA_F_RSA_VERIFY_PKCS1_PSS 126 | ||
328 | 362 | ||
329 | /* Reason codes. */ | 363 | /* Reason codes. */ |
330 | #define RSA_R_ALGORITHM_MISMATCH 100 | 364 | #define RSA_R_ALGORITHM_MISMATCH 100 |
@@ -344,9 +378,14 @@ void ERR_load_RSA_strings(void); | |||
344 | #define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 | 378 | #define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 |
345 | #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 | 379 | #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 |
346 | #define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 | 380 | #define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 |
381 | #define RSA_R_FIRST_OCTET_INVALID 133 | ||
382 | #define RSA_R_INVALID_HEADER 137 | ||
347 | #define RSA_R_INVALID_MESSAGE_LENGTH 131 | 383 | #define RSA_R_INVALID_MESSAGE_LENGTH 131 |
384 | #define RSA_R_INVALID_PADDING 138 | ||
385 | #define RSA_R_INVALID_TRAILER 139 | ||
348 | #define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 | 386 | #define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 |
349 | #define RSA_R_KEY_SIZE_TOO_SMALL 120 | 387 | #define RSA_R_KEY_SIZE_TOO_SMALL 120 |
388 | #define RSA_R_LAST_OCTET_INVALID 134 | ||
350 | #define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 | 389 | #define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 |
351 | #define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 | 390 | #define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 |
352 | #define RSA_R_OAEP_DECODING_ERROR 121 | 391 | #define RSA_R_OAEP_DECODING_ERROR 121 |
@@ -354,6 +393,8 @@ void ERR_load_RSA_strings(void); | |||
354 | #define RSA_R_P_NOT_PRIME 128 | 393 | #define RSA_R_P_NOT_PRIME 128 |
355 | #define RSA_R_Q_NOT_PRIME 129 | 394 | #define RSA_R_Q_NOT_PRIME 129 |
356 | #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 | 395 | #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 |
396 | #define RSA_R_SLEN_CHECK_FAILED 136 | ||
397 | #define RSA_R_SLEN_RECOVERY_FAILED 135 | ||
357 | #define RSA_R_SSLV3_ROLLBACK_ATTACK 115 | 398 | #define RSA_R_SSLV3_ROLLBACK_ATTACK 115 |
358 | #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 | 399 | #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 |
359 | #define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 | 400 | #define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 |
diff --git a/src/lib/libcrypto/rsa/rsa_eay.c b/src/lib/libcrypto/rsa/rsa_eay.c index d4caab3f95..be4ac96ce3 100644 --- a/src/lib/libcrypto/rsa/rsa_eay.c +++ b/src/lib/libcrypto/rsa/rsa_eay.c | |||
@@ -55,6 +55,59 @@ | |||
55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | /* ==================================================================== | ||
59 | * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. | ||
60 | * | ||
61 | * Redistribution and use in source and binary forms, with or without | ||
62 | * modification, are permitted provided that the following conditions | ||
63 | * are met: | ||
64 | * | ||
65 | * 1. Redistributions of source code must retain the above copyright | ||
66 | * notice, this list of conditions and the following disclaimer. | ||
67 | * | ||
68 | * 2. Redistributions in binary form must reproduce the above copyright | ||
69 | * notice, this list of conditions and the following disclaimer in | ||
70 | * the documentation and/or other materials provided with the | ||
71 | * distribution. | ||
72 | * | ||
73 | * 3. All advertising materials mentioning features or use of this | ||
74 | * software must display the following acknowledgment: | ||
75 | * "This product includes software developed by the OpenSSL Project | ||
76 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
77 | * | ||
78 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
79 | * endorse or promote products derived from this software without | ||
80 | * prior written permission. For written permission, please contact | ||
81 | * openssl-core@openssl.org. | ||
82 | * | ||
83 | * 5. Products derived from this software may not be called "OpenSSL" | ||
84 | * nor may "OpenSSL" appear in their names without prior written | ||
85 | * permission of the OpenSSL Project. | ||
86 | * | ||
87 | * 6. Redistributions of any form whatsoever must retain the following | ||
88 | * acknowledgment: | ||
89 | * "This product includes software developed by the OpenSSL Project | ||
90 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
91 | * | ||
92 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
93 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
94 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
95 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
96 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
97 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
98 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
99 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
100 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
101 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
102 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
103 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
104 | * ==================================================================== | ||
105 | * | ||
106 | * This product includes cryptographic software written by Eric Young | ||
107 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
108 | * Hudson (tjh@cryptsoft.com). | ||
109 | * | ||
110 | */ | ||
58 | 111 | ||
59 | #include <stdio.h> | 112 | #include <stdio.h> |
60 | #include "cryptlib.h" | 113 | #include "cryptlib.h" |
@@ -145,30 +198,13 @@ static int RSA_eay_public_encrypt(int flen, const unsigned char *from, | |||
145 | goto err; | 198 | goto err; |
146 | } | 199 | } |
147 | 200 | ||
148 | if ((rsa->_method_mod_n == NULL) && (rsa->flags & RSA_FLAG_CACHE_PUBLIC)) | 201 | if (rsa->flags & RSA_FLAG_CACHE_PUBLIC) |
149 | { | 202 | { |
150 | BN_MONT_CTX* bn_mont_ctx; | 203 | if (!BN_MONT_CTX_set_locked(&rsa->_method_mod_n, |
151 | if ((bn_mont_ctx=BN_MONT_CTX_new()) == NULL) | 204 | CRYPTO_LOCK_RSA, rsa->n, ctx)) |
152 | goto err; | ||
153 | if (!BN_MONT_CTX_set(bn_mont_ctx,rsa->n,ctx)) | ||
154 | { | ||
155 | BN_MONT_CTX_free(bn_mont_ctx); | ||
156 | goto err; | 205 | goto err; |
157 | } | ||
158 | if (rsa->_method_mod_n == NULL) /* other thread may have finished first */ | ||
159 | { | ||
160 | CRYPTO_w_lock(CRYPTO_LOCK_RSA); | ||
161 | if (rsa->_method_mod_n == NULL) | ||
162 | { | ||
163 | rsa->_method_mod_n = bn_mont_ctx; | ||
164 | bn_mont_ctx = NULL; | ||
165 | } | ||
166 | CRYPTO_w_unlock(CRYPTO_LOCK_RSA); | ||
167 | } | ||
168 | if (bn_mont_ctx) | ||
169 | BN_MONT_CTX_free(bn_mont_ctx); | ||
170 | } | 206 | } |
171 | 207 | ||
172 | if (!rsa->meth->bn_mod_exp(&ret,&f,rsa->e,rsa->n,ctx, | 208 | if (!rsa->meth->bn_mod_exp(&ret,&f,rsa->e,rsa->n,ctx, |
173 | rsa->_method_mod_n)) goto err; | 209 | rsa->_method_mod_n)) goto err; |
174 | 210 | ||
@@ -249,7 +285,7 @@ err: | |||
249 | static int RSA_eay_private_encrypt(int flen, const unsigned char *from, | 285 | static int RSA_eay_private_encrypt(int flen, const unsigned char *from, |
250 | unsigned char *to, RSA *rsa, int padding) | 286 | unsigned char *to, RSA *rsa, int padding) |
251 | { | 287 | { |
252 | BIGNUM f,ret; | 288 | BIGNUM f,ret, *res; |
253 | int i,j,k,num=0,r= -1; | 289 | int i,j,k,num=0,r= -1; |
254 | unsigned char *buf=NULL; | 290 | unsigned char *buf=NULL; |
255 | BN_CTX *ctx=NULL; | 291 | BN_CTX *ctx=NULL; |
@@ -331,19 +367,43 @@ static int RSA_eay_private_encrypt(int flen, const unsigned char *from, | |||
331 | (rsa->dmp1 != NULL) && | 367 | (rsa->dmp1 != NULL) && |
332 | (rsa->dmq1 != NULL) && | 368 | (rsa->dmq1 != NULL) && |
333 | (rsa->iqmp != NULL)) ) | 369 | (rsa->iqmp != NULL)) ) |
334 | { if (!rsa->meth->rsa_mod_exp(&ret,&f,rsa)) goto err; } | 370 | { |
371 | if (!rsa->meth->rsa_mod_exp(&ret,&f,rsa)) goto err; | ||
372 | } | ||
335 | else | 373 | else |
336 | { | 374 | { |
337 | if (!rsa->meth->bn_mod_exp(&ret,&f,rsa->d,rsa->n,ctx,NULL)) goto err; | 375 | BIGNUM local_d; |
376 | BIGNUM *d = NULL; | ||
377 | |||
378 | if (!(rsa->flags & RSA_FLAG_NO_EXP_CONSTTIME)) | ||
379 | { | ||
380 | BN_init(&local_d); | ||
381 | d = &local_d; | ||
382 | BN_with_flags(d, rsa->d, BN_FLG_EXP_CONSTTIME); | ||
383 | } | ||
384 | else | ||
385 | d = rsa->d; | ||
386 | if (!rsa->meth->bn_mod_exp(&ret,&f,d,rsa->n,ctx,NULL)) goto err; | ||
338 | } | 387 | } |
339 | 388 | ||
340 | if (blinding) | 389 | if (blinding) |
341 | if (!BN_BLINDING_invert(&ret, blinding, ctx)) goto err; | 390 | if (!BN_BLINDING_invert(&ret, blinding, ctx)) goto err; |
342 | 391 | ||
392 | if (padding == RSA_X931_PADDING) | ||
393 | { | ||
394 | BN_sub(&f, rsa->n, &ret); | ||
395 | if (BN_cmp(&ret, &f)) | ||
396 | res = &f; | ||
397 | else | ||
398 | res = &ret; | ||
399 | } | ||
400 | else | ||
401 | res = &ret; | ||
402 | |||
343 | /* put in leading 0 bytes if the number is less than the | 403 | /* put in leading 0 bytes if the number is less than the |
344 | * length of the modulus */ | 404 | * length of the modulus */ |
345 | j=BN_num_bytes(&ret); | 405 | j=BN_num_bytes(res); |
346 | i=BN_bn2bin(&ret,&(to[num-j])); | 406 | i=BN_bn2bin(res,&(to[num-j])); |
347 | for (k=0; k<(num-i); k++) | 407 | for (k=0; k<(num-i); k++) |
348 | to[k]=0; | 408 | to[k]=0; |
349 | 409 | ||
@@ -444,10 +504,22 @@ static int RSA_eay_private_decrypt(int flen, const unsigned char *from, | |||
444 | (rsa->dmp1 != NULL) && | 504 | (rsa->dmp1 != NULL) && |
445 | (rsa->dmq1 != NULL) && | 505 | (rsa->dmq1 != NULL) && |
446 | (rsa->iqmp != NULL)) ) | 506 | (rsa->iqmp != NULL)) ) |
447 | { if (!rsa->meth->rsa_mod_exp(&ret,&f,rsa)) goto err; } | 507 | { |
508 | if (!rsa->meth->rsa_mod_exp(&ret,&f,rsa)) goto err; | ||
509 | } | ||
448 | else | 510 | else |
449 | { | 511 | { |
450 | if (!rsa->meth->bn_mod_exp(&ret,&f,rsa->d,rsa->n,ctx,NULL)) | 512 | BIGNUM local_d; |
513 | BIGNUM *d = NULL; | ||
514 | |||
515 | if (!(rsa->flags & RSA_FLAG_NO_EXP_CONSTTIME)) | ||
516 | { | ||
517 | d = &local_d; | ||
518 | BN_with_flags(d, rsa->d, BN_FLG_EXP_CONSTTIME); | ||
519 | } | ||
520 | else | ||
521 | d = rsa->d; | ||
522 | if (!rsa->meth->bn_mod_exp(&ret,&f,d,rsa->n,ctx,NULL)) | ||
451 | goto err; | 523 | goto err; |
452 | } | 524 | } |
453 | 525 | ||
@@ -534,33 +606,20 @@ static int RSA_eay_public_decrypt(int flen, const unsigned char *from, | |||
534 | } | 606 | } |
535 | 607 | ||
536 | /* do the decrypt */ | 608 | /* do the decrypt */ |
537 | if ((rsa->_method_mod_n == NULL) && (rsa->flags & RSA_FLAG_CACHE_PUBLIC)) | 609 | |
610 | if (rsa->flags & RSA_FLAG_CACHE_PUBLIC) | ||
538 | { | 611 | { |
539 | BN_MONT_CTX* bn_mont_ctx; | 612 | if (!BN_MONT_CTX_set_locked(&rsa->_method_mod_n, |
540 | if ((bn_mont_ctx=BN_MONT_CTX_new()) == NULL) | 613 | CRYPTO_LOCK_RSA, rsa->n, ctx)) |
541 | goto err; | ||
542 | if (!BN_MONT_CTX_set(bn_mont_ctx,rsa->n,ctx)) | ||
543 | { | ||
544 | BN_MONT_CTX_free(bn_mont_ctx); | ||
545 | goto err; | 614 | goto err; |
546 | } | ||
547 | if (rsa->_method_mod_n == NULL) /* other thread may have finished first */ | ||
548 | { | ||
549 | CRYPTO_w_lock(CRYPTO_LOCK_RSA); | ||
550 | if (rsa->_method_mod_n == NULL) | ||
551 | { | ||
552 | rsa->_method_mod_n = bn_mont_ctx; | ||
553 | bn_mont_ctx = NULL; | ||
554 | } | ||
555 | CRYPTO_w_unlock(CRYPTO_LOCK_RSA); | ||
556 | } | ||
557 | if (bn_mont_ctx) | ||
558 | BN_MONT_CTX_free(bn_mont_ctx); | ||
559 | } | 615 | } |
560 | 616 | ||
561 | if (!rsa->meth->bn_mod_exp(&ret,&f,rsa->e,rsa->n,ctx, | 617 | if (!rsa->meth->bn_mod_exp(&ret,&f,rsa->e,rsa->n,ctx, |
562 | rsa->_method_mod_n)) goto err; | 618 | rsa->_method_mod_n)) goto err; |
563 | 619 | ||
620 | if ((padding == RSA_X931_PADDING) && ((ret.d[0] & 0xf) != 12)) | ||
621 | BN_sub(&ret, rsa->n, &ret); | ||
622 | |||
564 | p=buf; | 623 | p=buf; |
565 | i=BN_bn2bin(&ret,p); | 624 | i=BN_bn2bin(&ret,p); |
566 | 625 | ||
@@ -594,6 +653,8 @@ err: | |||
594 | static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa) | 653 | static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa) |
595 | { | 654 | { |
596 | BIGNUM r1,m1,vrfy; | 655 | BIGNUM r1,m1,vrfy; |
656 | BIGNUM local_dmp1, local_dmq1; | ||
657 | BIGNUM *dmp1, *dmq1; | ||
597 | int ret=0; | 658 | int ret=0; |
598 | BN_CTX *ctx; | 659 | BN_CTX *ctx; |
599 | 660 | ||
@@ -604,61 +665,34 @@ static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa) | |||
604 | 665 | ||
605 | if (rsa->flags & RSA_FLAG_CACHE_PRIVATE) | 666 | if (rsa->flags & RSA_FLAG_CACHE_PRIVATE) |
606 | { | 667 | { |
607 | if (rsa->_method_mod_p == NULL) | 668 | if (!BN_MONT_CTX_set_locked(&rsa->_method_mod_p, |
608 | { | 669 | CRYPTO_LOCK_RSA, rsa->p, ctx)) |
609 | BN_MONT_CTX* bn_mont_ctx; | 670 | goto err; |
610 | if ((bn_mont_ctx=BN_MONT_CTX_new()) == NULL) | 671 | if (!BN_MONT_CTX_set_locked(&rsa->_method_mod_q, |
611 | goto err; | 672 | CRYPTO_LOCK_RSA, rsa->q, ctx)) |
612 | if (!BN_MONT_CTX_set(bn_mont_ctx,rsa->p,ctx)) | 673 | goto err; |
613 | { | ||
614 | BN_MONT_CTX_free(bn_mont_ctx); | ||
615 | goto err; | ||
616 | } | ||
617 | if (rsa->_method_mod_p == NULL) /* other thread may have finished first */ | ||
618 | { | ||
619 | CRYPTO_w_lock(CRYPTO_LOCK_RSA); | ||
620 | if (rsa->_method_mod_p == NULL) | ||
621 | { | ||
622 | rsa->_method_mod_p = bn_mont_ctx; | ||
623 | bn_mont_ctx = NULL; | ||
624 | } | ||
625 | CRYPTO_w_unlock(CRYPTO_LOCK_RSA); | ||
626 | } | ||
627 | if (bn_mont_ctx) | ||
628 | BN_MONT_CTX_free(bn_mont_ctx); | ||
629 | } | ||
630 | |||
631 | if (rsa->_method_mod_q == NULL) | ||
632 | { | ||
633 | BN_MONT_CTX* bn_mont_ctx; | ||
634 | if ((bn_mont_ctx=BN_MONT_CTX_new()) == NULL) | ||
635 | goto err; | ||
636 | if (!BN_MONT_CTX_set(bn_mont_ctx,rsa->q,ctx)) | ||
637 | { | ||
638 | BN_MONT_CTX_free(bn_mont_ctx); | ||
639 | goto err; | ||
640 | } | ||
641 | if (rsa->_method_mod_q == NULL) /* other thread may have finished first */ | ||
642 | { | ||
643 | CRYPTO_w_lock(CRYPTO_LOCK_RSA); | ||
644 | if (rsa->_method_mod_q == NULL) | ||
645 | { | ||
646 | rsa->_method_mod_q = bn_mont_ctx; | ||
647 | bn_mont_ctx = NULL; | ||
648 | } | ||
649 | CRYPTO_w_unlock(CRYPTO_LOCK_RSA); | ||
650 | } | ||
651 | if (bn_mont_ctx) | ||
652 | BN_MONT_CTX_free(bn_mont_ctx); | ||
653 | } | ||
654 | } | 674 | } |
655 | 675 | ||
656 | if (!BN_mod(&r1,I,rsa->q,ctx)) goto err; | 676 | if (!BN_mod(&r1,I,rsa->q,ctx)) goto err; |
657 | if (!rsa->meth->bn_mod_exp(&m1,&r1,rsa->dmq1,rsa->q,ctx, | 677 | if (!(rsa->flags & RSA_FLAG_NO_EXP_CONSTTIME)) |
678 | { | ||
679 | dmq1 = &local_dmq1; | ||
680 | BN_with_flags(dmq1, rsa->dmq1, BN_FLG_EXP_CONSTTIME); | ||
681 | } | ||
682 | else | ||
683 | dmq1 = rsa->dmq1; | ||
684 | if (!rsa->meth->bn_mod_exp(&m1,&r1,dmq1,rsa->q,ctx, | ||
658 | rsa->_method_mod_q)) goto err; | 685 | rsa->_method_mod_q)) goto err; |
659 | 686 | ||
660 | if (!BN_mod(&r1,I,rsa->p,ctx)) goto err; | 687 | if (!BN_mod(&r1,I,rsa->p,ctx)) goto err; |
661 | if (!rsa->meth->bn_mod_exp(r0,&r1,rsa->dmp1,rsa->p,ctx, | 688 | if (!(rsa->flags & RSA_FLAG_NO_EXP_CONSTTIME)) |
689 | { | ||
690 | dmp1 = &local_dmp1; | ||
691 | BN_with_flags(dmp1, rsa->dmp1, BN_FLG_EXP_CONSTTIME); | ||
692 | } | ||
693 | else | ||
694 | dmp1 = rsa->dmp1; | ||
695 | if (!rsa->meth->bn_mod_exp(r0,&r1,dmp1,rsa->p,ctx, | ||
662 | rsa->_method_mod_p)) goto err; | 696 | rsa->_method_mod_p)) goto err; |
663 | 697 | ||
664 | if (!BN_sub(r0,r0,&m1)) goto err; | 698 | if (!BN_sub(r0,r0,&m1)) goto err; |
@@ -693,10 +727,23 @@ static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa) | |||
693 | if (vrfy.neg) | 727 | if (vrfy.neg) |
694 | if (!BN_add(&vrfy, &vrfy, rsa->n)) goto err; | 728 | if (!BN_add(&vrfy, &vrfy, rsa->n)) goto err; |
695 | if (!BN_is_zero(&vrfy)) | 729 | if (!BN_is_zero(&vrfy)) |
730 | { | ||
696 | /* 'I' and 'vrfy' aren't congruent mod n. Don't leak | 731 | /* 'I' and 'vrfy' aren't congruent mod n. Don't leak |
697 | * miscalculated CRT output, just do a raw (slower) | 732 | * miscalculated CRT output, just do a raw (slower) |
698 | * mod_exp and return that instead. */ | 733 | * mod_exp and return that instead. */ |
699 | if (!rsa->meth->bn_mod_exp(r0,I,rsa->d,rsa->n,ctx,NULL)) goto err; | 734 | |
735 | BIGNUM local_d; | ||
736 | BIGNUM *d = NULL; | ||
737 | |||
738 | if (!(rsa->flags & RSA_FLAG_NO_EXP_CONSTTIME)) | ||
739 | { | ||
740 | d = &local_d; | ||
741 | BN_with_flags(d, rsa->d, BN_FLG_EXP_CONSTTIME); | ||
742 | } | ||
743 | else | ||
744 | d = rsa->d; | ||
745 | if (!rsa->meth->bn_mod_exp(r0,I,d,rsa->n,ctx,NULL)) goto err; | ||
746 | } | ||
700 | } | 747 | } |
701 | ret=1; | 748 | ret=1; |
702 | err: | 749 | err: |
diff --git a/src/lib/libcrypto/rsa/rsa_err.c b/src/lib/libcrypto/rsa/rsa_err.c index a7766c3b76..2ec4b30ff7 100644 --- a/src/lib/libcrypto/rsa/rsa_err.c +++ b/src/lib/libcrypto/rsa/rsa_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/rsa/rsa_err.c */ | 1 | /* crypto/rsa/rsa_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,70 +64,85 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_RSA,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_RSA,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA RSA_str_functs[]= | 71 | static ERR_STRING_DATA RSA_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,RSA_F_MEMORY_LOCK,0), "MEMORY_LOCK"}, | 73 | {ERR_FUNC(RSA_F_MEMORY_LOCK), "MEMORY_LOCK"}, |
70 | {ERR_PACK(0,RSA_F_RSA_CHECK_KEY,0), "RSA_check_key"}, | 74 | {ERR_FUNC(RSA_F_RSA_CHECK_KEY), "RSA_check_key"}, |
71 | {ERR_PACK(0,RSA_F_RSA_EAY_PRIVATE_DECRYPT,0), "RSA_EAY_PRIVATE_DECRYPT"}, | 75 | {ERR_FUNC(RSA_F_RSA_EAY_PRIVATE_DECRYPT), "RSA_EAY_PRIVATE_DECRYPT"}, |
72 | {ERR_PACK(0,RSA_F_RSA_EAY_PRIVATE_ENCRYPT,0), "RSA_EAY_PRIVATE_ENCRYPT"}, | 76 | {ERR_FUNC(RSA_F_RSA_EAY_PRIVATE_ENCRYPT), "RSA_EAY_PRIVATE_ENCRYPT"}, |
73 | {ERR_PACK(0,RSA_F_RSA_EAY_PUBLIC_DECRYPT,0), "RSA_EAY_PUBLIC_DECRYPT"}, | 77 | {ERR_FUNC(RSA_F_RSA_EAY_PUBLIC_DECRYPT), "RSA_EAY_PUBLIC_DECRYPT"}, |
74 | {ERR_PACK(0,RSA_F_RSA_EAY_PUBLIC_ENCRYPT,0), "RSA_EAY_PUBLIC_ENCRYPT"}, | 78 | {ERR_FUNC(RSA_F_RSA_EAY_PUBLIC_ENCRYPT), "RSA_EAY_PUBLIC_ENCRYPT"}, |
75 | {ERR_PACK(0,RSA_F_RSA_GENERATE_KEY,0), "RSA_generate_key"}, | 79 | {ERR_FUNC(RSA_F_RSA_GENERATE_KEY), "RSA_generate_key"}, |
76 | {ERR_PACK(0,RSA_F_RSA_NEW_METHOD,0), "RSA_new_method"}, | 80 | {ERR_FUNC(RSA_F_RSA_NEW_METHOD), "RSA_new_method"}, |
77 | {ERR_PACK(0,RSA_F_RSA_NULL,0), "RSA_NULL"}, | 81 | {ERR_FUNC(RSA_F_RSA_NULL), "RSA_NULL"}, |
78 | {ERR_PACK(0,RSA_F_RSA_PADDING_ADD_NONE,0), "RSA_padding_add_none"}, | 82 | {ERR_FUNC(RSA_F_RSA_PADDING_ADD_NONE), "RSA_padding_add_none"}, |
79 | {ERR_PACK(0,RSA_F_RSA_PADDING_ADD_PKCS1_OAEP,0), "RSA_padding_add_PKCS1_OAEP"}, | 83 | {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_OAEP), "RSA_padding_add_PKCS1_OAEP"}, |
80 | {ERR_PACK(0,RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1,0), "RSA_padding_add_PKCS1_type_1"}, | 84 | {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_PSS), "RSA_padding_add_PKCS1_PSS"}, |
81 | {ERR_PACK(0,RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2,0), "RSA_padding_add_PKCS1_type_2"}, | 85 | {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1), "RSA_padding_add_PKCS1_type_1"}, |
82 | {ERR_PACK(0,RSA_F_RSA_PADDING_ADD_SSLV23,0), "RSA_padding_add_SSLv23"}, | 86 | {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2), "RSA_padding_add_PKCS1_type_2"}, |
83 | {ERR_PACK(0,RSA_F_RSA_PADDING_CHECK_NONE,0), "RSA_padding_check_none"}, | 87 | {ERR_FUNC(RSA_F_RSA_PADDING_ADD_SSLV23), "RSA_padding_add_SSLv23"}, |
84 | {ERR_PACK(0,RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP,0), "RSA_padding_check_PKCS1_OAEP"}, | 88 | {ERR_FUNC(RSA_F_RSA_PADDING_ADD_X931), "RSA_padding_add_X931"}, |
85 | {ERR_PACK(0,RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1,0), "RSA_padding_check_PKCS1_type_1"}, | 89 | {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_NONE), "RSA_padding_check_none"}, |
86 | {ERR_PACK(0,RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2,0), "RSA_padding_check_PKCS1_type_2"}, | 90 | {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP), "RSA_padding_check_PKCS1_OAEP"}, |
87 | {ERR_PACK(0,RSA_F_RSA_PADDING_CHECK_SSLV23,0), "RSA_padding_check_SSLv23"}, | 91 | {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1), "RSA_padding_check_PKCS1_type_1"}, |
88 | {ERR_PACK(0,RSA_F_RSA_PRINT,0), "RSA_print"}, | 92 | {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2), "RSA_padding_check_PKCS1_type_2"}, |
89 | {ERR_PACK(0,RSA_F_RSA_PRINT_FP,0), "RSA_print_fp"}, | 93 | {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_SSLV23), "RSA_padding_check_SSLv23"}, |
90 | {ERR_PACK(0,RSA_F_RSA_SIGN,0), "RSA_sign"}, | 94 | {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_X931), "RSA_padding_check_X931"}, |
91 | {ERR_PACK(0,RSA_F_RSA_SIGN_ASN1_OCTET_STRING,0), "RSA_sign_ASN1_OCTET_STRING"}, | 95 | {ERR_FUNC(RSA_F_RSA_PRINT), "RSA_print"}, |
92 | {ERR_PACK(0,RSA_F_RSA_VERIFY,0), "RSA_verify"}, | 96 | {ERR_FUNC(RSA_F_RSA_PRINT_FP), "RSA_print_fp"}, |
93 | {ERR_PACK(0,RSA_F_RSA_VERIFY_ASN1_OCTET_STRING,0), "RSA_verify_ASN1_OCTET_STRING"}, | 97 | {ERR_FUNC(RSA_F_RSA_SIGN), "RSA_sign"}, |
98 | {ERR_FUNC(RSA_F_RSA_SIGN_ASN1_OCTET_STRING), "RSA_sign_ASN1_OCTET_STRING"}, | ||
99 | {ERR_FUNC(RSA_F_RSA_VERIFY), "RSA_verify"}, | ||
100 | {ERR_FUNC(RSA_F_RSA_VERIFY_ASN1_OCTET_STRING), "RSA_verify_ASN1_OCTET_STRING"}, | ||
101 | {ERR_FUNC(RSA_F_RSA_VERIFY_PKCS1_PSS), "RSA_verify_PKCS1_PSS"}, | ||
94 | {0,NULL} | 102 | {0,NULL} |
95 | }; | 103 | }; |
96 | 104 | ||
97 | static ERR_STRING_DATA RSA_str_reasons[]= | 105 | static ERR_STRING_DATA RSA_str_reasons[]= |
98 | { | 106 | { |
99 | {RSA_R_ALGORITHM_MISMATCH ,"algorithm mismatch"}, | 107 | {ERR_REASON(RSA_R_ALGORITHM_MISMATCH) ,"algorithm mismatch"}, |
100 | {RSA_R_BAD_E_VALUE ,"bad e value"}, | 108 | {ERR_REASON(RSA_R_BAD_E_VALUE) ,"bad e value"}, |
101 | {RSA_R_BAD_FIXED_HEADER_DECRYPT ,"bad fixed header decrypt"}, | 109 | {ERR_REASON(RSA_R_BAD_FIXED_HEADER_DECRYPT),"bad fixed header decrypt"}, |
102 | {RSA_R_BAD_PAD_BYTE_COUNT ,"bad pad byte count"}, | 110 | {ERR_REASON(RSA_R_BAD_PAD_BYTE_COUNT) ,"bad pad byte count"}, |
103 | {RSA_R_BAD_SIGNATURE ,"bad signature"}, | 111 | {ERR_REASON(RSA_R_BAD_SIGNATURE) ,"bad signature"}, |
104 | {RSA_R_BLOCK_TYPE_IS_NOT_01 ,"block type is not 01"}, | 112 | {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_01) ,"block type is not 01"}, |
105 | {RSA_R_BLOCK_TYPE_IS_NOT_02 ,"block type is not 02"}, | 113 | {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_02) ,"block type is not 02"}, |
106 | {RSA_R_DATA_GREATER_THAN_MOD_LEN ,"data greater than mod len"}, | 114 | {ERR_REASON(RSA_R_DATA_GREATER_THAN_MOD_LEN),"data greater than mod len"}, |
107 | {RSA_R_DATA_TOO_LARGE ,"data too large"}, | 115 | {ERR_REASON(RSA_R_DATA_TOO_LARGE) ,"data too large"}, |
108 | {RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE ,"data too large for key size"}, | 116 | {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),"data too large for key size"}, |
109 | {RSA_R_DATA_TOO_LARGE_FOR_MODULUS ,"data too large for modulus"}, | 117 | {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_MODULUS),"data too large for modulus"}, |
110 | {RSA_R_DATA_TOO_SMALL ,"data too small"}, | 118 | {ERR_REASON(RSA_R_DATA_TOO_SMALL) ,"data too small"}, |
111 | {RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE ,"data too small for key size"}, | 119 | {ERR_REASON(RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE),"data too small for key size"}, |
112 | {RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY ,"digest too big for rsa key"}, | 120 | {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY),"digest too big for rsa key"}, |
113 | {RSA_R_DMP1_NOT_CONGRUENT_TO_D ,"dmp1 not congruent to d"}, | 121 | {ERR_REASON(RSA_R_DMP1_NOT_CONGRUENT_TO_D),"dmp1 not congruent to d"}, |
114 | {RSA_R_DMQ1_NOT_CONGRUENT_TO_D ,"dmq1 not congruent to d"}, | 122 | {ERR_REASON(RSA_R_DMQ1_NOT_CONGRUENT_TO_D),"dmq1 not congruent to d"}, |
115 | {RSA_R_D_E_NOT_CONGRUENT_TO_1 ,"d e not congruent to 1"}, | 123 | {ERR_REASON(RSA_R_D_E_NOT_CONGRUENT_TO_1),"d e not congruent to 1"}, |
116 | {RSA_R_INVALID_MESSAGE_LENGTH ,"invalid message length"}, | 124 | {ERR_REASON(RSA_R_FIRST_OCTET_INVALID) ,"first octet invalid"}, |
117 | {RSA_R_IQMP_NOT_INVERSE_OF_Q ,"iqmp not inverse of q"}, | 125 | {ERR_REASON(RSA_R_INVALID_HEADER) ,"invalid header"}, |
118 | {RSA_R_KEY_SIZE_TOO_SMALL ,"key size too small"}, | 126 | {ERR_REASON(RSA_R_INVALID_MESSAGE_LENGTH),"invalid message length"}, |
119 | {RSA_R_NULL_BEFORE_BLOCK_MISSING ,"null before block missing"}, | 127 | {ERR_REASON(RSA_R_INVALID_PADDING) ,"invalid padding"}, |
120 | {RSA_R_N_DOES_NOT_EQUAL_P_Q ,"n does not equal p q"}, | 128 | {ERR_REASON(RSA_R_INVALID_TRAILER) ,"invalid trailer"}, |
121 | {RSA_R_OAEP_DECODING_ERROR ,"oaep decoding error"}, | 129 | {ERR_REASON(RSA_R_IQMP_NOT_INVERSE_OF_Q) ,"iqmp not inverse of q"}, |
122 | {RSA_R_PADDING_CHECK_FAILED ,"padding check failed"}, | 130 | {ERR_REASON(RSA_R_KEY_SIZE_TOO_SMALL) ,"key size too small"}, |
123 | {RSA_R_P_NOT_PRIME ,"p not prime"}, | 131 | {ERR_REASON(RSA_R_LAST_OCTET_INVALID) ,"last octet invalid"}, |
124 | {RSA_R_Q_NOT_PRIME ,"q not prime"}, | 132 | {ERR_REASON(RSA_R_NULL_BEFORE_BLOCK_MISSING),"null before block missing"}, |
125 | {RSA_R_RSA_OPERATIONS_NOT_SUPPORTED ,"rsa operations not supported"}, | 133 | {ERR_REASON(RSA_R_N_DOES_NOT_EQUAL_P_Q) ,"n does not equal p q"}, |
126 | {RSA_R_SSLV3_ROLLBACK_ATTACK ,"sslv3 rollback attack"}, | 134 | {ERR_REASON(RSA_R_OAEP_DECODING_ERROR) ,"oaep decoding error"}, |
127 | {RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD,"the asn1 object identifier is not known for this md"}, | 135 | {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"}, |
128 | {RSA_R_UNKNOWN_ALGORITHM_TYPE ,"unknown algorithm type"}, | 136 | {ERR_REASON(RSA_R_PADDING_CHECK_FAILED) ,"padding check failed"}, |
129 | {RSA_R_UNKNOWN_PADDING_TYPE ,"unknown padding type"}, | 137 | {ERR_REASON(RSA_R_P_NOT_PRIME) ,"p not prime"}, |
130 | {RSA_R_WRONG_SIGNATURE_LENGTH ,"wrong signature length"}, | 138 | {ERR_REASON(RSA_R_Q_NOT_PRIME) ,"q not prime"}, |
139 | {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),"rsa operations not supported"}, | ||
140 | {ERR_REASON(RSA_R_SSLV3_ROLLBACK_ATTACK) ,"sslv3 rollback attack"}, | ||
141 | {ERR_REASON(RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD),"the asn1 object identifier is not known for this md"}, | ||
142 | {ERR_REASON(RSA_R_UNKNOWN_ALGORITHM_TYPE),"unknown algorithm type"}, | ||
143 | {ERR_REASON(RSA_R_UNKNOWN_PADDING_TYPE) ,"unknown padding type"}, | ||
144 | {ERR_REASON(RSA_R_WRONG_SIGNATURE_LENGTH),"wrong signature length"}, | ||
145 | {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"}, | ||
131 | {0,NULL} | 146 | {0,NULL} |
132 | }; | 147 | }; |
133 | 148 | ||
@@ -141,8 +156,8 @@ void ERR_load_RSA_strings(void) | |||
141 | { | 156 | { |
142 | init=0; | 157 | init=0; |
143 | #ifndef OPENSSL_NO_ERR | 158 | #ifndef OPENSSL_NO_ERR |
144 | ERR_load_strings(ERR_LIB_RSA,RSA_str_functs); | 159 | ERR_load_strings(0,RSA_str_functs); |
145 | ERR_load_strings(ERR_LIB_RSA,RSA_str_reasons); | 160 | ERR_load_strings(0,RSA_str_reasons); |
146 | #endif | 161 | #endif |
147 | 162 | ||
148 | } | 163 | } |
diff --git a/src/lib/libcrypto/rsa/rsa_gen.c b/src/lib/libcrypto/rsa/rsa_gen.c index adb5e34da5..dd1422cc98 100644 --- a/src/lib/libcrypto/rsa/rsa_gen.c +++ b/src/lib/libcrypto/rsa/rsa_gen.c | |||
@@ -184,7 +184,8 @@ err: | |||
184 | RSAerr(RSA_F_RSA_GENERATE_KEY,ERR_LIB_BN); | 184 | RSAerr(RSA_F_RSA_GENERATE_KEY,ERR_LIB_BN); |
185 | ok=0; | 185 | ok=0; |
186 | } | 186 | } |
187 | BN_CTX_end(ctx); | 187 | if (ctx != NULL) |
188 | BN_CTX_end(ctx); | ||
188 | BN_CTX_free(ctx); | 189 | BN_CTX_free(ctx); |
189 | BN_CTX_free(ctx2); | 190 | BN_CTX_free(ctx2); |
190 | 191 | ||
diff --git a/src/lib/libcrypto/rsa/rsa_oaep.c b/src/lib/libcrypto/rsa/rsa_oaep.c index e3f7c608ec..d43ecaca63 100644 --- a/src/lib/libcrypto/rsa/rsa_oaep.c +++ b/src/lib/libcrypto/rsa/rsa_oaep.c | |||
@@ -28,9 +28,6 @@ | |||
28 | #include <openssl/rand.h> | 28 | #include <openssl/rand.h> |
29 | #include <openssl/sha.h> | 29 | #include <openssl/sha.h> |
30 | 30 | ||
31 | int MGF1(unsigned char *mask, long len, | ||
32 | const unsigned char *seed, long seedlen); | ||
33 | |||
34 | int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, | 31 | int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, |
35 | const unsigned char *from, int flen, | 32 | const unsigned char *from, int flen, |
36 | const unsigned char *param, int plen) | 33 | const unsigned char *param, int plen) |
@@ -76,11 +73,13 @@ int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, | |||
76 | 20); | 73 | 20); |
77 | #endif | 74 | #endif |
78 | 75 | ||
79 | MGF1(dbmask, emlen - SHA_DIGEST_LENGTH, seed, SHA_DIGEST_LENGTH); | 76 | PKCS1_MGF1(dbmask, emlen - SHA_DIGEST_LENGTH, seed, SHA_DIGEST_LENGTH, |
77 | EVP_sha1()); | ||
80 | for (i = 0; i < emlen - SHA_DIGEST_LENGTH; i++) | 78 | for (i = 0; i < emlen - SHA_DIGEST_LENGTH; i++) |
81 | db[i] ^= dbmask[i]; | 79 | db[i] ^= dbmask[i]; |
82 | 80 | ||
83 | MGF1(seedmask, SHA_DIGEST_LENGTH, db, emlen - SHA_DIGEST_LENGTH); | 81 | PKCS1_MGF1(seedmask, SHA_DIGEST_LENGTH, db, emlen - SHA_DIGEST_LENGTH, |
82 | EVP_sha1()); | ||
84 | for (i = 0; i < SHA_DIGEST_LENGTH; i++) | 83 | for (i = 0; i < SHA_DIGEST_LENGTH; i++) |
85 | seed[i] ^= seedmask[i]; | 84 | seed[i] ^= seedmask[i]; |
86 | 85 | ||
@@ -126,11 +125,11 @@ int RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, | |||
126 | return -1; | 125 | return -1; |
127 | } | 126 | } |
128 | 127 | ||
129 | MGF1(seed, SHA_DIGEST_LENGTH, maskeddb, dblen); | 128 | PKCS1_MGF1(seed, SHA_DIGEST_LENGTH, maskeddb, dblen, EVP_sha1()); |
130 | for (i = lzero; i < SHA_DIGEST_LENGTH; i++) | 129 | for (i = lzero; i < SHA_DIGEST_LENGTH; i++) |
131 | seed[i] ^= from[i - lzero]; | 130 | seed[i] ^= from[i - lzero]; |
132 | 131 | ||
133 | MGF1(db, dblen, seed, SHA_DIGEST_LENGTH); | 132 | PKCS1_MGF1(db, dblen, seed, SHA_DIGEST_LENGTH, EVP_sha1()); |
134 | for (i = 0; i < dblen; i++) | 133 | for (i = 0; i < dblen; i++) |
135 | db[i] ^= maskeddb[i]; | 134 | db[i] ^= maskeddb[i]; |
136 | 135 | ||
@@ -170,28 +169,30 @@ decoding_err: | |||
170 | return -1; | 169 | return -1; |
171 | } | 170 | } |
172 | 171 | ||
173 | int MGF1(unsigned char *mask, long len, | 172 | int PKCS1_MGF1(unsigned char *mask, long len, |
174 | const unsigned char *seed, long seedlen) | 173 | const unsigned char *seed, long seedlen, const EVP_MD *dgst) |
175 | { | 174 | { |
176 | long i, outlen = 0; | 175 | long i, outlen = 0; |
177 | unsigned char cnt[4]; | 176 | unsigned char cnt[4]; |
178 | EVP_MD_CTX c; | 177 | EVP_MD_CTX c; |
179 | unsigned char md[SHA_DIGEST_LENGTH]; | 178 | unsigned char md[EVP_MAX_MD_SIZE]; |
179 | int mdlen; | ||
180 | 180 | ||
181 | EVP_MD_CTX_init(&c); | 181 | EVP_MD_CTX_init(&c); |
182 | mdlen = EVP_MD_size(dgst); | ||
182 | for (i = 0; outlen < len; i++) | 183 | for (i = 0; outlen < len; i++) |
183 | { | 184 | { |
184 | cnt[0] = (unsigned char)((i >> 24) & 255); | 185 | cnt[0] = (unsigned char)((i >> 24) & 255); |
185 | cnt[1] = (unsigned char)((i >> 16) & 255); | 186 | cnt[1] = (unsigned char)((i >> 16) & 255); |
186 | cnt[2] = (unsigned char)((i >> 8)) & 255; | 187 | cnt[2] = (unsigned char)((i >> 8)) & 255; |
187 | cnt[3] = (unsigned char)(i & 255); | 188 | cnt[3] = (unsigned char)(i & 255); |
188 | EVP_DigestInit_ex(&c,EVP_sha1(), NULL); | 189 | EVP_DigestInit_ex(&c,dgst, NULL); |
189 | EVP_DigestUpdate(&c, seed, seedlen); | 190 | EVP_DigestUpdate(&c, seed, seedlen); |
190 | EVP_DigestUpdate(&c, cnt, 4); | 191 | EVP_DigestUpdate(&c, cnt, 4); |
191 | if (outlen + SHA_DIGEST_LENGTH <= len) | 192 | if (outlen + mdlen <= len) |
192 | { | 193 | { |
193 | EVP_DigestFinal_ex(&c, mask + outlen, NULL); | 194 | EVP_DigestFinal_ex(&c, mask + outlen, NULL); |
194 | outlen += SHA_DIGEST_LENGTH; | 195 | outlen += mdlen; |
195 | } | 196 | } |
196 | else | 197 | else |
197 | { | 198 | { |
@@ -203,4 +204,9 @@ int MGF1(unsigned char *mask, long len, | |||
203 | EVP_MD_CTX_cleanup(&c); | 204 | EVP_MD_CTX_cleanup(&c); |
204 | return 0; | 205 | return 0; |
205 | } | 206 | } |
207 | |||
208 | int MGF1(unsigned char *mask, long len, const unsigned char *seed, long seedlen) | ||
209 | { | ||
210 | return PKCS1_MGF1(mask, len, seed, seedlen, EVP_sha1()); | ||
211 | } | ||
206 | #endif | 212 | #endif |
diff --git a/src/lib/libcrypto/rsa/rsa_pss.c b/src/lib/libcrypto/rsa/rsa_pss.c new file mode 100644 index 0000000000..2815628f5f --- /dev/null +++ b/src/lib/libcrypto/rsa/rsa_pss.c | |||
@@ -0,0 +1,261 @@ | |||
1 | /* rsa_pss.c */ | ||
2 | /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL | ||
3 | * project 2005. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 2005 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * licensing@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #include <stdio.h> | ||
60 | #include "cryptlib.h" | ||
61 | #include <openssl/bn.h> | ||
62 | #include <openssl/rsa.h> | ||
63 | #include <openssl/evp.h> | ||
64 | #include <openssl/rand.h> | ||
65 | #include <openssl/sha.h> | ||
66 | |||
67 | const static unsigned char zeroes[] = {0,0,0,0,0,0,0,0}; | ||
68 | |||
69 | int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, | ||
70 | const EVP_MD *Hash, const unsigned char *EM, int sLen) | ||
71 | { | ||
72 | int i; | ||
73 | int ret = 0; | ||
74 | int hLen, maskedDBLen, MSBits, emLen; | ||
75 | const unsigned char *H; | ||
76 | unsigned char *DB = NULL; | ||
77 | EVP_MD_CTX ctx; | ||
78 | unsigned char H_[EVP_MAX_MD_SIZE]; | ||
79 | |||
80 | hLen = EVP_MD_size(Hash); | ||
81 | /* | ||
82 | * Negative sLen has special meanings: | ||
83 | * -1 sLen == hLen | ||
84 | * -2 salt length is autorecovered from signature | ||
85 | * -N reserved | ||
86 | */ | ||
87 | if (sLen == -1) sLen = hLen; | ||
88 | else if (sLen == -2) sLen = -2; | ||
89 | else if (sLen < -2) | ||
90 | { | ||
91 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS, RSA_R_SLEN_CHECK_FAILED); | ||
92 | goto err; | ||
93 | } | ||
94 | |||
95 | MSBits = (BN_num_bits(rsa->n) - 1) & 0x7; | ||
96 | emLen = RSA_size(rsa); | ||
97 | if (EM[0] & (0xFF << MSBits)) | ||
98 | { | ||
99 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS, RSA_R_FIRST_OCTET_INVALID); | ||
100 | goto err; | ||
101 | } | ||
102 | if (MSBits == 0) | ||
103 | { | ||
104 | EM++; | ||
105 | emLen--; | ||
106 | } | ||
107 | if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */ | ||
108 | { | ||
109 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS, RSA_R_DATA_TOO_LARGE); | ||
110 | goto err; | ||
111 | } | ||
112 | if (EM[emLen - 1] != 0xbc) | ||
113 | { | ||
114 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS, RSA_R_LAST_OCTET_INVALID); | ||
115 | goto err; | ||
116 | } | ||
117 | maskedDBLen = emLen - hLen - 1; | ||
118 | H = EM + maskedDBLen; | ||
119 | DB = OPENSSL_malloc(maskedDBLen); | ||
120 | if (!DB) | ||
121 | { | ||
122 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS, ERR_R_MALLOC_FAILURE); | ||
123 | goto err; | ||
124 | } | ||
125 | PKCS1_MGF1(DB, maskedDBLen, H, hLen, Hash); | ||
126 | for (i = 0; i < maskedDBLen; i++) | ||
127 | DB[i] ^= EM[i]; | ||
128 | if (MSBits) | ||
129 | DB[0] &= 0xFF >> (8 - MSBits); | ||
130 | for (i = 0; DB[i] == 0 && i < (maskedDBLen-1); i++) ; | ||
131 | if (DB[i++] != 0x1) | ||
132 | { | ||
133 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS, RSA_R_SLEN_RECOVERY_FAILED); | ||
134 | goto err; | ||
135 | } | ||
136 | if (sLen >= 0 && (maskedDBLen - i) != sLen) | ||
137 | { | ||
138 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS, RSA_R_SLEN_CHECK_FAILED); | ||
139 | goto err; | ||
140 | } | ||
141 | EVP_MD_CTX_init(&ctx); | ||
142 | EVP_DigestInit_ex(&ctx, Hash, NULL); | ||
143 | EVP_DigestUpdate(&ctx, zeroes, sizeof zeroes); | ||
144 | EVP_DigestUpdate(&ctx, mHash, hLen); | ||
145 | if (maskedDBLen - i) | ||
146 | EVP_DigestUpdate(&ctx, DB + i, maskedDBLen - i); | ||
147 | EVP_DigestFinal(&ctx, H_, NULL); | ||
148 | EVP_MD_CTX_cleanup(&ctx); | ||
149 | if (memcmp(H_, H, hLen)) | ||
150 | { | ||
151 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS, RSA_R_BAD_SIGNATURE); | ||
152 | ret = 0; | ||
153 | } | ||
154 | else | ||
155 | ret = 1; | ||
156 | |||
157 | err: | ||
158 | if (DB) | ||
159 | OPENSSL_free(DB); | ||
160 | |||
161 | return ret; | ||
162 | |||
163 | } | ||
164 | |||
165 | int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, | ||
166 | const unsigned char *mHash, | ||
167 | const EVP_MD *Hash, int sLen) | ||
168 | { | ||
169 | int i; | ||
170 | int ret = 0; | ||
171 | int hLen, maskedDBLen, MSBits, emLen; | ||
172 | unsigned char *H, *salt = NULL, *p; | ||
173 | EVP_MD_CTX ctx; | ||
174 | |||
175 | hLen = EVP_MD_size(Hash); | ||
176 | /* | ||
177 | * Negative sLen has special meanings: | ||
178 | * -1 sLen == hLen | ||
179 | * -2 salt length is maximized | ||
180 | * -N reserved | ||
181 | */ | ||
182 | if (sLen == -1) sLen = hLen; | ||
183 | else if (sLen == -2) sLen = -2; | ||
184 | else if (sLen < -2) | ||
185 | { | ||
186 | RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS, RSA_R_SLEN_CHECK_FAILED); | ||
187 | goto err; | ||
188 | } | ||
189 | |||
190 | MSBits = (BN_num_bits(rsa->n) - 1) & 0x7; | ||
191 | emLen = RSA_size(rsa); | ||
192 | if (MSBits == 0) | ||
193 | { | ||
194 | *EM++ = 0; | ||
195 | emLen--; | ||
196 | } | ||
197 | if (sLen == -2) | ||
198 | { | ||
199 | sLen = emLen - hLen - 2; | ||
200 | } | ||
201 | else if (emLen < (hLen + sLen + 2)) | ||
202 | { | ||
203 | RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS, | ||
204 | RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); | ||
205 | goto err; | ||
206 | } | ||
207 | if (sLen > 0) | ||
208 | { | ||
209 | salt = OPENSSL_malloc(sLen); | ||
210 | if (!salt) | ||
211 | { | ||
212 | RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS, | ||
213 | ERR_R_MALLOC_FAILURE); | ||
214 | goto err; | ||
215 | } | ||
216 | if (!RAND_bytes(salt, sLen)) | ||
217 | goto err; | ||
218 | } | ||
219 | maskedDBLen = emLen - hLen - 1; | ||
220 | H = EM + maskedDBLen; | ||
221 | EVP_MD_CTX_init(&ctx); | ||
222 | EVP_DigestInit_ex(&ctx, Hash, NULL); | ||
223 | EVP_DigestUpdate(&ctx, zeroes, sizeof zeroes); | ||
224 | EVP_DigestUpdate(&ctx, mHash, hLen); | ||
225 | if (sLen) | ||
226 | EVP_DigestUpdate(&ctx, salt, sLen); | ||
227 | EVP_DigestFinal(&ctx, H, NULL); | ||
228 | EVP_MD_CTX_cleanup(&ctx); | ||
229 | |||
230 | /* Generate dbMask in place then perform XOR on it */ | ||
231 | PKCS1_MGF1(EM, maskedDBLen, H, hLen, Hash); | ||
232 | |||
233 | p = EM; | ||
234 | |||
235 | /* Initial PS XORs with all zeroes which is a NOP so just update | ||
236 | * pointer. Note from a test above this value is guaranteed to | ||
237 | * be non-negative. | ||
238 | */ | ||
239 | p += emLen - sLen - hLen - 2; | ||
240 | *p++ ^= 0x1; | ||
241 | if (sLen > 0) | ||
242 | { | ||
243 | for (i = 0; i < sLen; i++) | ||
244 | *p++ ^= salt[i]; | ||
245 | } | ||
246 | if (MSBits) | ||
247 | EM[0] &= 0xFF >> (8 - MSBits); | ||
248 | |||
249 | /* H is already in place so just set final 0xbc */ | ||
250 | |||
251 | EM[emLen - 1] = 0xbc; | ||
252 | |||
253 | ret = 1; | ||
254 | |||
255 | err: | ||
256 | if (salt) | ||
257 | OPENSSL_free(salt); | ||
258 | |||
259 | return ret; | ||
260 | |||
261 | } | ||
diff --git a/src/lib/libcrypto/rsa/rsa_x931.c b/src/lib/libcrypto/rsa/rsa_x931.c new file mode 100644 index 0000000000..df3c45f802 --- /dev/null +++ b/src/lib/libcrypto/rsa/rsa_x931.c | |||
@@ -0,0 +1,177 @@ | |||
1 | /* rsa_x931.c */ | ||
2 | /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL | ||
3 | * project 2005. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 2005 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * licensing@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #include <stdio.h> | ||
60 | #include "cryptlib.h" | ||
61 | #include <openssl/bn.h> | ||
62 | #include <openssl/rsa.h> | ||
63 | #include <openssl/rand.h> | ||
64 | #include <openssl/objects.h> | ||
65 | |||
66 | int RSA_padding_add_X931(unsigned char *to, int tlen, | ||
67 | const unsigned char *from, int flen) | ||
68 | { | ||
69 | int j; | ||
70 | unsigned char *p; | ||
71 | |||
72 | /* Absolute minimum amount of padding is 1 header nibble, 1 padding | ||
73 | * nibble and 2 trailer bytes: but 1 hash if is already in 'from'. | ||
74 | */ | ||
75 | |||
76 | j = tlen - flen - 2; | ||
77 | |||
78 | if (j < 0) | ||
79 | { | ||
80 | RSAerr(RSA_F_RSA_PADDING_ADD_X931,RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); | ||
81 | return -1; | ||
82 | } | ||
83 | |||
84 | p=(unsigned char *)to; | ||
85 | |||
86 | /* If no padding start and end nibbles are in one byte */ | ||
87 | if (j == 0) | ||
88 | *p++ = 0x6A; | ||
89 | else | ||
90 | { | ||
91 | *p++ = 0x6B; | ||
92 | if (j > 1) | ||
93 | { | ||
94 | memset(p, 0xBB, j - 1); | ||
95 | p += j - 1; | ||
96 | } | ||
97 | *p++ = 0xBA; | ||
98 | } | ||
99 | memcpy(p,from,(unsigned int)flen); | ||
100 | p += flen; | ||
101 | *p = 0xCC; | ||
102 | return(1); | ||
103 | } | ||
104 | |||
105 | int RSA_padding_check_X931(unsigned char *to, int tlen, | ||
106 | const unsigned char *from, int flen, int num) | ||
107 | { | ||
108 | int i,j; | ||
109 | const unsigned char *p; | ||
110 | |||
111 | p=from; | ||
112 | if ((num != flen) || ((*p != 0x6A) && (*p != 0x6B))) | ||
113 | { | ||
114 | RSAerr(RSA_F_RSA_PADDING_CHECK_X931,RSA_R_INVALID_HEADER); | ||
115 | return -1; | ||
116 | } | ||
117 | |||
118 | if (*p++ == 0x6B) | ||
119 | { | ||
120 | j=flen-3; | ||
121 | for (i = 0; i < j; i++) | ||
122 | { | ||
123 | unsigned char c = *p++; | ||
124 | if (c == 0xBA) | ||
125 | break; | ||
126 | if (c != 0xBB) | ||
127 | { | ||
128 | RSAerr(RSA_F_RSA_PADDING_CHECK_X931, | ||
129 | RSA_R_INVALID_PADDING); | ||
130 | return -1; | ||
131 | } | ||
132 | } | ||
133 | |||
134 | j -= i; | ||
135 | |||
136 | if (i == 0) | ||
137 | { | ||
138 | RSAerr(RSA_F_RSA_PADDING_CHECK_X931, RSA_R_INVALID_PADDING); | ||
139 | return -1; | ||
140 | } | ||
141 | |||
142 | } | ||
143 | else j = flen - 2; | ||
144 | |||
145 | if (p[j] != 0xCC) | ||
146 | { | ||
147 | RSAerr(RSA_F_RSA_PADDING_CHECK_X931, RSA_R_INVALID_TRAILER); | ||
148 | return -1; | ||
149 | } | ||
150 | |||
151 | memcpy(to,p,(unsigned int)j); | ||
152 | |||
153 | return(j); | ||
154 | } | ||
155 | |||
156 | /* Translate between X931 hash ids and NIDs */ | ||
157 | |||
158 | int RSA_X931_hash_id(int nid) | ||
159 | { | ||
160 | switch (nid) | ||
161 | { | ||
162 | case NID_sha1: | ||
163 | return 0x33; | ||
164 | |||
165 | case NID_sha256: | ||
166 | return 0x34; | ||
167 | |||
168 | case NID_sha384: | ||
169 | return 0x36; | ||
170 | |||
171 | case NID_sha512: | ||
172 | return 0x35; | ||
173 | |||
174 | } | ||
175 | return -1; | ||
176 | } | ||
177 | |||
diff --git a/src/lib/libcrypto/sha/sha1_one.c b/src/lib/libcrypto/sha/sha1_one.c index 20e660c71d..f4694b701b 100644 --- a/src/lib/libcrypto/sha/sha1_one.c +++ b/src/lib/libcrypto/sha/sha1_one.c | |||
@@ -61,14 +61,15 @@ | |||
61 | #include <openssl/sha.h> | 61 | #include <openssl/sha.h> |
62 | #include <openssl/crypto.h> | 62 | #include <openssl/crypto.h> |
63 | 63 | ||
64 | #ifndef OPENSSL_NO_SHA1 | 64 | #if !defined(OPENSSL_NO_SHA1) && !defined(OPENSSL_FIPS) |
65 | unsigned char *SHA1(const unsigned char *d, unsigned long n, unsigned char *md) | 65 | unsigned char *SHA1(const unsigned char *d, unsigned long n, unsigned char *md) |
66 | { | 66 | { |
67 | SHA_CTX c; | 67 | SHA_CTX c; |
68 | static unsigned char m[SHA_DIGEST_LENGTH]; | 68 | static unsigned char m[SHA_DIGEST_LENGTH]; |
69 | 69 | ||
70 | if (md == NULL) md=m; | 70 | if (md == NULL) md=m; |
71 | SHA1_Init(&c); | 71 | if (!SHA1_Init(&c)) |
72 | return NULL; | ||
72 | SHA1_Update(&c,d,n); | 73 | SHA1_Update(&c,d,n); |
73 | SHA1_Final(md,&c); | 74 | SHA1_Final(md,&c); |
74 | OPENSSL_cleanse(&c,sizeof(c)); | 75 | OPENSSL_cleanse(&c,sizeof(c)); |
diff --git a/src/lib/libcrypto/stack/safestack.h b/src/lib/libcrypto/stack/safestack.h index bd1121c279..6010b7f122 100644 --- a/src/lib/libcrypto/stack/safestack.h +++ b/src/lib/libcrypto/stack/safestack.h | |||
@@ -55,6 +55,9 @@ | |||
55 | #ifndef HEADER_SAFESTACK_H | 55 | #ifndef HEADER_SAFESTACK_H |
56 | #define HEADER_SAFESTACK_H | 56 | #define HEADER_SAFESTACK_H |
57 | 57 | ||
58 | typedef void (*openssl_fptr)(void); | ||
59 | #define openssl_fcast(f) ((openssl_fptr)f) | ||
60 | |||
58 | #include <openssl/stack.h> | 61 | #include <openssl/stack.h> |
59 | 62 | ||
60 | #ifdef DEBUG_SAFESTACK | 63 | #ifdef DEBUG_SAFESTACK |
@@ -73,74 +76,74 @@ STACK_OF(type) \ | |||
73 | /* SKM_sk_... stack macros are internal to safestack.h: | 76 | /* SKM_sk_... stack macros are internal to safestack.h: |
74 | * never use them directly, use sk_<type>_... instead */ | 77 | * never use them directly, use sk_<type>_... instead */ |
75 | #define SKM_sk_new(type, cmp) \ | 78 | #define SKM_sk_new(type, cmp) \ |
76 | ((STACK_OF(type) * (*)(int (*)(const type * const *, const type * const *)))sk_new)(cmp) | 79 | ((STACK_OF(type) * (*)(int (*)(const type * const *, const type * const *)))openssl_fcast(sk_new))(cmp) |
77 | #define SKM_sk_new_null(type) \ | 80 | #define SKM_sk_new_null(type) \ |
78 | ((STACK_OF(type) * (*)(void))sk_new_null)() | 81 | ((STACK_OF(type) * (*)(void))openssl_fcast(sk_new_null))() |
79 | #define SKM_sk_free(type, st) \ | 82 | #define SKM_sk_free(type, st) \ |
80 | ((void (*)(STACK_OF(type) *))sk_free)(st) | 83 | ((void (*)(STACK_OF(type) *))openssl_fcast(sk_free))(st) |
81 | #define SKM_sk_num(type, st) \ | 84 | #define SKM_sk_num(type, st) \ |
82 | ((int (*)(const STACK_OF(type) *))sk_num)(st) | 85 | ((int (*)(const STACK_OF(type) *))openssl_fcast(sk_num))(st) |
83 | #define SKM_sk_value(type, st,i) \ | 86 | #define SKM_sk_value(type, st,i) \ |
84 | ((type * (*)(const STACK_OF(type) *, int))sk_value)(st, i) | 87 | ((type * (*)(const STACK_OF(type) *, int))openssl_fcast(sk_value))(st, i) |
85 | #define SKM_sk_set(type, st,i,val) \ | 88 | #define SKM_sk_set(type, st,i,val) \ |
86 | ((type * (*)(STACK_OF(type) *, int, type *))sk_set)(st, i, val) | 89 | ((type * (*)(STACK_OF(type) *, int, type *))openssl_fcast(sk_set))(st, i, val) |
87 | #define SKM_sk_zero(type, st) \ | 90 | #define SKM_sk_zero(type, st) \ |
88 | ((void (*)(STACK_OF(type) *))sk_zero)(st) | 91 | ((void (*)(STACK_OF(type) *))openssl_fcast(sk_zero))(st) |
89 | #define SKM_sk_push(type, st,val) \ | 92 | #define SKM_sk_push(type, st,val) \ |
90 | ((int (*)(STACK_OF(type) *, type *))sk_push)(st, val) | 93 | ((int (*)(STACK_OF(type) *, type *))openssl_fcast(sk_push))(st, val) |
91 | #define SKM_sk_unshift(type, st,val) \ | 94 | #define SKM_sk_unshift(type, st,val) \ |
92 | ((int (*)(STACK_OF(type) *, type *))sk_unshift)(st, val) | 95 | ((int (*)(STACK_OF(type) *, type *))openssl_fcast(sk_unshift))(st, val) |
93 | #define SKM_sk_find(type, st,val) \ | 96 | #define SKM_sk_find(type, st,val) \ |
94 | ((int (*)(STACK_OF(type) *, type *))sk_find)(st, val) | 97 | ((int (*)(STACK_OF(type) *, type *))openssl_fcast(sk_find))(st, val) |
95 | #define SKM_sk_delete(type, st,i) \ | 98 | #define SKM_sk_delete(type, st,i) \ |
96 | ((type * (*)(STACK_OF(type) *, int))sk_delete)(st, i) | 99 | ((type * (*)(STACK_OF(type) *, int))openssl_fcast(sk_delete))(st, i) |
97 | #define SKM_sk_delete_ptr(type, st,ptr) \ | 100 | #define SKM_sk_delete_ptr(type, st,ptr) \ |
98 | ((type * (*)(STACK_OF(type) *, type *))sk_delete_ptr)(st, ptr) | 101 | ((type * (*)(STACK_OF(type) *, type *))openssl_fcast(sk_delete_ptr))(st, ptr) |
99 | #define SKM_sk_insert(type, st,val,i) \ | 102 | #define SKM_sk_insert(type, st,val,i) \ |
100 | ((int (*)(STACK_OF(type) *, type *, int))sk_insert)(st, val, i) | 103 | ((int (*)(STACK_OF(type) *, type *, int))openssl_fcast(sk_insert))(st, val, i) |
101 | #define SKM_sk_set_cmp_func(type, st,cmp) \ | 104 | #define SKM_sk_set_cmp_func(type, st,cmp) \ |
102 | ((int (*(*)(STACK_OF(type) *, int (*)(const type * const *, const type * const *))) \ | 105 | ((int (*(*)(STACK_OF(type) *, int (*)(const type * const *, const type * const *))) \ |
103 | (const type * const *, const type * const *))sk_set_cmp_func)\ | 106 | (const type * const *, const type * const *))openssl_fcast(sk_set_cmp_func))\ |
104 | (st, cmp) | 107 | (st, cmp) |
105 | #define SKM_sk_dup(type, st) \ | 108 | #define SKM_sk_dup(type, st) \ |
106 | ((STACK_OF(type) *(*)(STACK_OF(type) *))sk_dup)(st) | 109 | ((STACK_OF(type) *(*)(STACK_OF(type) *))openssl_fcast(sk_dup))(st) |
107 | #define SKM_sk_pop_free(type, st,free_func) \ | 110 | #define SKM_sk_pop_free(type, st,free_func) \ |
108 | ((void (*)(STACK_OF(type) *, void (*)(type *)))sk_pop_free)\ | 111 | ((void (*)(STACK_OF(type) *, void (*)(type *)))openssl_fcast(sk_pop_free))\ |
109 | (st, free_func) | 112 | (st, free_func) |
110 | #define SKM_sk_shift(type, st) \ | 113 | #define SKM_sk_shift(type, st) \ |
111 | ((type * (*)(STACK_OF(type) *))sk_shift)(st) | 114 | ((type * (*)(STACK_OF(type) *))openssl_fcast(sk_shift))(st) |
112 | #define SKM_sk_pop(type, st) \ | 115 | #define SKM_sk_pop(type, st) \ |
113 | ((type * (*)(STACK_OF(type) *))sk_pop)(st) | 116 | ((type * (*)(STACK_OF(type) *))openssl_fcast(sk_pop))(st) |
114 | #define SKM_sk_sort(type, st) \ | 117 | #define SKM_sk_sort(type, st) \ |
115 | ((void (*)(STACK_OF(type) *))sk_sort)(st) | 118 | ((void (*)(STACK_OF(type) *))openssl_fcast(sk_sort))(st) |
116 | #define SKM_sk_is_sorted(type, st) \ | 119 | #define SKM_sk_is_sorted(type, st) \ |
117 | ((int (*)(const STACK_OF(type) *))sk_is_sorted)(st) | 120 | ((int (*)(const STACK_OF(type) *))openssl_fcast(sk_is_sorted))(st) |
118 | 121 | ||
119 | #define SKM_ASN1_SET_OF_d2i(type, st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ | 122 | #define SKM_ASN1_SET_OF_d2i(type, st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ |
120 | ((STACK_OF(type) * (*) (STACK_OF(type) **,unsigned char **, long , \ | 123 | ((STACK_OF(type) * (*) (STACK_OF(type) **,unsigned char **, long , \ |
121 | type *(*)(type **, unsigned char **,long), \ | 124 | type *(*)(type **, unsigned char **,long), \ |
122 | void (*)(type *), int ,int )) d2i_ASN1_SET) \ | 125 | void (*)(type *), int ,int )) openssl_fcast(d2i_ASN1_SET)) \ |
123 | (st,pp,length, d2i_func, free_func, ex_tag,ex_class) | 126 | (st,pp,length, d2i_func, free_func, ex_tag,ex_class) |
124 | #define SKM_ASN1_SET_OF_i2d(type, st, pp, i2d_func, ex_tag, ex_class, is_set) \ | 127 | #define SKM_ASN1_SET_OF_i2d(type, st, pp, i2d_func, ex_tag, ex_class, is_set) \ |
125 | ((int (*)(STACK_OF(type) *,unsigned char **, \ | 128 | ((int (*)(STACK_OF(type) *,unsigned char **, \ |
126 | int (*)(type *,unsigned char **), int , int , int)) i2d_ASN1_SET) \ | 129 | int (*)(type *,unsigned char **), int , int , int)) openssl_fcast(i2d_ASN1_SET)) \ |
127 | (st,pp,i2d_func,ex_tag,ex_class,is_set) | 130 | (st,pp,i2d_func,ex_tag,ex_class,is_set) |
128 | 131 | ||
129 | #define SKM_ASN1_seq_pack(type, st, i2d_func, buf, len) \ | 132 | #define SKM_ASN1_seq_pack(type, st, i2d_func, buf, len) \ |
130 | ((unsigned char *(*)(STACK_OF(type) *, \ | 133 | ((unsigned char *(*)(STACK_OF(type) *, \ |
131 | int (*)(type *,unsigned char **), unsigned char **,int *)) ASN1_seq_pack) \ | 134 | int (*)(type *,unsigned char **), unsigned char **,int *)) openssl_fcast(ASN1_seq_pack)) \ |
132 | (st, i2d_func, buf, len) | 135 | (st, i2d_func, buf, len) |
133 | #define SKM_ASN1_seq_unpack(type, buf, len, d2i_func, free_func) \ | 136 | #define SKM_ASN1_seq_unpack(type, buf, len, d2i_func, free_func) \ |
134 | ((STACK_OF(type) * (*)(unsigned char *,int, \ | 137 | ((STACK_OF(type) * (*)(unsigned char *,int, \ |
135 | type *(*)(type **,unsigned char **, long), \ | 138 | type *(*)(type **,unsigned char **, long), \ |
136 | void (*)(type *)))ASN1_seq_unpack) \ | 139 | void (*)(type *)))openssl_fcast(ASN1_seq_unpack)) \ |
137 | (buf,len,d2i_func, free_func) | 140 | (buf,len,d2i_func, free_func) |
138 | 141 | ||
139 | #define SKM_PKCS12_decrypt_d2i(type, algor, d2i_func, free_func, pass, passlen, oct, seq) \ | 142 | #define SKM_PKCS12_decrypt_d2i(type, algor, d2i_func, free_func, pass, passlen, oct, seq) \ |
140 | ((STACK_OF(type) * (*)(X509_ALGOR *, \ | 143 | ((STACK_OF(type) * (*)(X509_ALGOR *, \ |
141 | type *(*)(type **, unsigned char **, long), void (*)(type *), \ | 144 | type *(*)(type **, unsigned char **, long), void (*)(type *), \ |
142 | const char *, int, \ | 145 | const char *, int, \ |
143 | ASN1_STRING *, int))PKCS12_decrypt_d2i) \ | 146 | ASN1_STRING *, int))openssl_fcast(PKCS12_decrypt_d2i)) \ |
144 | (algor,d2i_func,free_func,pass,passlen,oct,seq) | 147 | (algor,d2i_func,free_func,pass,passlen,oct,seq) |
145 | 148 | ||
146 | #else | 149 | #else |
diff --git a/src/lib/libcrypto/ui/ui_err.c b/src/lib/libcrypto/ui/ui_err.c index 39a62ae737..d983cdd66f 100644 --- a/src/lib/libcrypto/ui/ui_err.c +++ b/src/lib/libcrypto/ui/ui_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/ui/ui_err.c */ | 1 | /* crypto/ui/ui_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,32 +64,36 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_UI,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_UI,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA UI_str_functs[]= | 71 | static ERR_STRING_DATA UI_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,UI_F_GENERAL_ALLOCATE_BOOLEAN,0), "GENERAL_ALLOCATE_BOOLEAN"}, | 73 | {ERR_FUNC(UI_F_GENERAL_ALLOCATE_BOOLEAN), "GENERAL_ALLOCATE_BOOLEAN"}, |
70 | {ERR_PACK(0,UI_F_GENERAL_ALLOCATE_PROMPT,0), "GENERAL_ALLOCATE_PROMPT"}, | 74 | {ERR_FUNC(UI_F_GENERAL_ALLOCATE_PROMPT), "GENERAL_ALLOCATE_PROMPT"}, |
71 | {ERR_PACK(0,UI_F_GENERAL_ALLOCATE_STRING,0), "GENERAL_ALLOCATE_STRING"}, | 75 | {ERR_FUNC(UI_F_GENERAL_ALLOCATE_STRING), "GENERAL_ALLOCATE_STRING"}, |
72 | {ERR_PACK(0,UI_F_UI_CTRL,0), "UI_ctrl"}, | 76 | {ERR_FUNC(UI_F_UI_CTRL), "UI_ctrl"}, |
73 | {ERR_PACK(0,UI_F_UI_DUP_ERROR_STRING,0), "UI_dup_error_string"}, | 77 | {ERR_FUNC(UI_F_UI_DUP_ERROR_STRING), "UI_dup_error_string"}, |
74 | {ERR_PACK(0,UI_F_UI_DUP_INFO_STRING,0), "UI_dup_info_string"}, | 78 | {ERR_FUNC(UI_F_UI_DUP_INFO_STRING), "UI_dup_info_string"}, |
75 | {ERR_PACK(0,UI_F_UI_DUP_INPUT_BOOLEAN,0), "UI_dup_input_boolean"}, | 79 | {ERR_FUNC(UI_F_UI_DUP_INPUT_BOOLEAN), "UI_dup_input_boolean"}, |
76 | {ERR_PACK(0,UI_F_UI_DUP_INPUT_STRING,0), "UI_dup_input_string"}, | 80 | {ERR_FUNC(UI_F_UI_DUP_INPUT_STRING), "UI_dup_input_string"}, |
77 | {ERR_PACK(0,UI_F_UI_DUP_VERIFY_STRING,0), "UI_dup_verify_string"}, | 81 | {ERR_FUNC(UI_F_UI_DUP_VERIFY_STRING), "UI_dup_verify_string"}, |
78 | {ERR_PACK(0,UI_F_UI_GET0_RESULT,0), "UI_get0_result"}, | 82 | {ERR_FUNC(UI_F_UI_GET0_RESULT), "UI_get0_result"}, |
79 | {ERR_PACK(0,UI_F_UI_NEW_METHOD,0), "UI_new_method"}, | 83 | {ERR_FUNC(UI_F_UI_NEW_METHOD), "UI_new_method"}, |
80 | {ERR_PACK(0,UI_F_UI_SET_RESULT,0), "UI_set_result"}, | 84 | {ERR_FUNC(UI_F_UI_SET_RESULT), "UI_set_result"}, |
81 | {0,NULL} | 85 | {0,NULL} |
82 | }; | 86 | }; |
83 | 87 | ||
84 | static ERR_STRING_DATA UI_str_reasons[]= | 88 | static ERR_STRING_DATA UI_str_reasons[]= |
85 | { | 89 | { |
86 | {UI_R_COMMON_OK_AND_CANCEL_CHARACTERS ,"common ok and cancel characters"}, | 90 | {ERR_REASON(UI_R_COMMON_OK_AND_CANCEL_CHARACTERS),"common ok and cancel characters"}, |
87 | {UI_R_INDEX_TOO_LARGE ,"index too large"}, | 91 | {ERR_REASON(UI_R_INDEX_TOO_LARGE) ,"index too large"}, |
88 | {UI_R_INDEX_TOO_SMALL ,"index too small"}, | 92 | {ERR_REASON(UI_R_INDEX_TOO_SMALL) ,"index too small"}, |
89 | {UI_R_NO_RESULT_BUFFER ,"no result buffer"}, | 93 | {ERR_REASON(UI_R_NO_RESULT_BUFFER) ,"no result buffer"}, |
90 | {UI_R_RESULT_TOO_LARGE ,"result too large"}, | 94 | {ERR_REASON(UI_R_RESULT_TOO_LARGE) ,"result too large"}, |
91 | {UI_R_RESULT_TOO_SMALL ,"result too small"}, | 95 | {ERR_REASON(UI_R_RESULT_TOO_SMALL) ,"result too small"}, |
92 | {UI_R_UNKNOWN_CONTROL_COMMAND ,"unknown control command"}, | 96 | {ERR_REASON(UI_R_UNKNOWN_CONTROL_COMMAND),"unknown control command"}, |
93 | {0,NULL} | 97 | {0,NULL} |
94 | }; | 98 | }; |
95 | 99 | ||
@@ -103,8 +107,8 @@ void ERR_load_UI_strings(void) | |||
103 | { | 107 | { |
104 | init=0; | 108 | init=0; |
105 | #ifndef OPENSSL_NO_ERR | 109 | #ifndef OPENSSL_NO_ERR |
106 | ERR_load_strings(ERR_LIB_UI,UI_str_functs); | 110 | ERR_load_strings(0,UI_str_functs); |
107 | ERR_load_strings(ERR_LIB_UI,UI_str_reasons); | 111 | ERR_load_strings(0,UI_str_reasons); |
108 | #endif | 112 | #endif |
109 | 113 | ||
110 | } | 114 | } |
diff --git a/src/lib/libcrypto/util/mkerr.pl b/src/lib/libcrypto/util/mkerr.pl index 60e534807e..9678514604 100644 --- a/src/lib/libcrypto/util/mkerr.pl +++ b/src/lib/libcrypto/util/mkerr.pl | |||
@@ -9,6 +9,9 @@ my $reindex = 0; | |||
9 | my $dowrite = 0; | 9 | my $dowrite = 0; |
10 | my $staticloader = ""; | 10 | my $staticloader = ""; |
11 | 11 | ||
12 | my $pack_errcode; | ||
13 | my $load_errcode; | ||
14 | |||
12 | while (@ARGV) { | 15 | while (@ARGV) { |
13 | my $arg = $ARGV[0]; | 16 | my $arg = $ARGV[0]; |
14 | if($arg eq "-conf") { | 17 | if($arg eq "-conf") { |
@@ -41,8 +44,8 @@ while (@ARGV) { | |||
41 | } | 44 | } |
42 | 45 | ||
43 | if($recurse) { | 46 | if($recurse) { |
44 | @source = (<crypto/*.c>, <crypto/*/*.c>, <ssl/*.c>, <fips/*.c>, | 47 | @source = (<crypto/*.c>, <crypto/*/*.c>, <ssl/*.c>, <fips-1.0/*.c>, |
45 | <fips/*/*.c>); | 48 | <fips-1.0/*/*.c>); |
46 | } else { | 49 | } else { |
47 | @source = @ARGV; | 50 | @source = @ARGV; |
48 | } | 51 | } |
@@ -399,6 +402,20 @@ EOF | |||
399 | $hincf = "\"$hfile\""; | 402 | $hincf = "\"$hfile\""; |
400 | } | 403 | } |
401 | 404 | ||
405 | # If static we know the error code at compile time so use it | ||
406 | # in error definitions. | ||
407 | |||
408 | if ($static) | ||
409 | { | ||
410 | $pack_errcode = "ERR_LIB_${lib}"; | ||
411 | $load_errcode = "0"; | ||
412 | } | ||
413 | else | ||
414 | { | ||
415 | $pack_errcode = "0"; | ||
416 | $load_errcode = "ERR_LIB_${lib}"; | ||
417 | } | ||
418 | |||
402 | 419 | ||
403 | open (OUT,">$cfile") || die "Can't open $cfile for writing"; | 420 | open (OUT,">$cfile") || die "Can't open $cfile for writing"; |
404 | 421 | ||
@@ -469,6 +486,10 @@ EOF | |||
469 | 486 | ||
470 | /* BEGIN ERROR CODES */ | 487 | /* BEGIN ERROR CODES */ |
471 | #ifndef OPENSSL_NO_ERR | 488 | #ifndef OPENSSL_NO_ERR |
489 | |||
490 | #define ERR_FUNC(func) ERR_PACK($pack_errcode,func,0) | ||
491 | #define ERR_REASON(reason) ERR_PACK($pack_errcode,0,reason) | ||
492 | |||
472 | static ERR_STRING_DATA ${lib}_str_functs[]= | 493 | static ERR_STRING_DATA ${lib}_str_functs[]= |
473 | { | 494 | { |
474 | EOF | 495 | EOF |
@@ -480,7 +501,8 @@ EOF | |||
480 | if(exists $ftrans{$fn}) { | 501 | if(exists $ftrans{$fn}) { |
481 | $fn = $ftrans{$fn}; | 502 | $fn = $ftrans{$fn}; |
482 | } | 503 | } |
483 | print OUT "{ERR_PACK(0,$i,0),\t\"$fn\"},\n"; | 504 | # print OUT "{ERR_PACK($pack_errcode,$i,0),\t\"$fn\"},\n"; |
505 | print OUT "{ERR_FUNC($i),\t\"$fn\"},\n"; | ||
484 | } | 506 | } |
485 | print OUT <<"EOF"; | 507 | print OUT <<"EOF"; |
486 | {0,NULL} | 508 | {0,NULL} |
@@ -492,6 +514,7 @@ EOF | |||
492 | # Add each reason code. | 514 | # Add each reason code. |
493 | foreach $i (@reasons) { | 515 | foreach $i (@reasons) { |
494 | my $rn; | 516 | my $rn; |
517 | my $rstr = "ERR_REASON($i)"; | ||
495 | my $nspc = 0; | 518 | my $nspc = 0; |
496 | if (exists $err_reason_strings{$i}) { | 519 | if (exists $err_reason_strings{$i}) { |
497 | $rn = $err_reason_strings{$i}; | 520 | $rn = $err_reason_strings{$i}; |
@@ -500,9 +523,9 @@ EOF | |||
500 | $rn = $1; | 523 | $rn = $1; |
501 | $rn =~ tr/_[A-Z]/ [a-z]/; | 524 | $rn =~ tr/_[A-Z]/ [a-z]/; |
502 | } | 525 | } |
503 | $nspc = 40 - length($i) unless length($i) > 40; | 526 | $nspc = 40 - length($rstr) unless length($rstr) > 40; |
504 | $nspc = " " x $nspc; | 527 | $nspc = " " x $nspc; |
505 | print OUT "{${i}${nspc},\"$rn\"},\n"; | 528 | print OUT "{${rstr}${nspc},\"$rn\"},\n"; |
506 | } | 529 | } |
507 | if($static) { | 530 | if($static) { |
508 | print OUT <<"EOF"; | 531 | print OUT <<"EOF"; |
@@ -519,8 +542,8 @@ ${staticloader}void ERR_load_${lib}_strings(void) | |||
519 | { | 542 | { |
520 | init=0; | 543 | init=0; |
521 | #ifndef OPENSSL_NO_ERR | 544 | #ifndef OPENSSL_NO_ERR |
522 | ERR_load_strings(ERR_LIB_${lib},${lib}_str_functs); | 545 | ERR_load_strings($load_errcode,${lib}_str_functs); |
523 | ERR_load_strings(ERR_LIB_${lib},${lib}_str_reasons); | 546 | ERR_load_strings($load_errcode,${lib}_str_reasons); |
524 | #endif | 547 | #endif |
525 | 548 | ||
526 | } | 549 | } |
diff --git a/src/lib/libcrypto/x509/by_dir.c b/src/lib/libcrypto/x509/by_dir.c index 6207340472..ea689aed1a 100644 --- a/src/lib/libcrypto/x509/by_dir.c +++ b/src/lib/libcrypto/x509/by_dir.c | |||
@@ -114,7 +114,7 @@ static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, | |||
114 | { | 114 | { |
115 | int ret=0; | 115 | int ret=0; |
116 | BY_DIR *ld; | 116 | BY_DIR *ld; |
117 | char *dir; | 117 | char *dir = NULL; |
118 | 118 | ||
119 | ld=(BY_DIR *)ctx->method_data; | 119 | ld=(BY_DIR *)ctx->method_data; |
120 | 120 | ||
@@ -123,17 +123,16 @@ static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, | |||
123 | case X509_L_ADD_DIR: | 123 | case X509_L_ADD_DIR: |
124 | if (argl == X509_FILETYPE_DEFAULT) | 124 | if (argl == X509_FILETYPE_DEFAULT) |
125 | { | 125 | { |
126 | ret=add_cert_dir(ld,X509_get_default_cert_dir(), | 126 | dir=(char *)Getenv(X509_get_default_cert_dir_env()); |
127 | X509_FILETYPE_PEM); | 127 | if (dir) |
128 | ret=add_cert_dir(ld,dir,X509_FILETYPE_PEM); | ||
129 | else | ||
130 | ret=add_cert_dir(ld,X509_get_default_cert_dir(), | ||
131 | X509_FILETYPE_PEM); | ||
128 | if (!ret) | 132 | if (!ret) |
129 | { | 133 | { |
130 | X509err(X509_F_DIR_CTRL,X509_R_LOADING_CERT_DIR); | 134 | X509err(X509_F_DIR_CTRL,X509_R_LOADING_CERT_DIR); |
131 | } | 135 | } |
132 | else | ||
133 | { | ||
134 | dir=(char *)Getenv(X509_get_default_cert_dir_env()); | ||
135 | ret=add_cert_dir(ld,dir,X509_FILETYPE_PEM); | ||
136 | } | ||
137 | } | 136 | } |
138 | else | 137 | else |
139 | ret=add_cert_dir(ld,argp,(int)argl); | 138 | ret=add_cert_dir(ld,argp,(int)argl); |
diff --git a/src/lib/libcrypto/x509/x509_err.c b/src/lib/libcrypto/x509/x509_err.c index 5bbf4acf76..d44d046027 100644 --- a/src/lib/libcrypto/x509/x509_err.c +++ b/src/lib/libcrypto/x509/x509_err.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* crypto/x509/x509_err.c */ | 1 | /* crypto/x509/x509_err.c */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
5 | * Redistribution and use in source and binary forms, with or without | 5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions | 6 | * modification, are permitted provided that the following conditions |
@@ -64,77 +64,81 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_X509,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_X509,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA X509_str_functs[]= | 71 | static ERR_STRING_DATA X509_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,X509_F_ADD_CERT_DIR,0), "ADD_CERT_DIR"}, | 73 | {ERR_FUNC(X509_F_ADD_CERT_DIR), "ADD_CERT_DIR"}, |
70 | {ERR_PACK(0,X509_F_BY_FILE_CTRL,0), "BY_FILE_CTRL"}, | 74 | {ERR_FUNC(X509_F_BY_FILE_CTRL), "BY_FILE_CTRL"}, |
71 | {ERR_PACK(0,X509_F_DIR_CTRL,0), "DIR_CTRL"}, | 75 | {ERR_FUNC(X509_F_DIR_CTRL), "DIR_CTRL"}, |
72 | {ERR_PACK(0,X509_F_GET_CERT_BY_SUBJECT,0), "GET_CERT_BY_SUBJECT"}, | 76 | {ERR_FUNC(X509_F_GET_CERT_BY_SUBJECT), "GET_CERT_BY_SUBJECT"}, |
73 | {ERR_PACK(0,X509_F_NETSCAPE_SPKI_B64_DECODE,0), "NETSCAPE_SPKI_b64_decode"}, | 77 | {ERR_FUNC(X509_F_NETSCAPE_SPKI_B64_DECODE), "NETSCAPE_SPKI_b64_decode"}, |
74 | {ERR_PACK(0,X509_F_NETSCAPE_SPKI_B64_ENCODE,0), "NETSCAPE_SPKI_b64_encode"}, | 78 | {ERR_FUNC(X509_F_NETSCAPE_SPKI_B64_ENCODE), "NETSCAPE_SPKI_b64_encode"}, |
75 | {ERR_PACK(0,X509_F_X509V3_ADD_EXT,0), "X509v3_add_ext"}, | 79 | {ERR_FUNC(X509_F_X509V3_ADD_EXT), "X509v3_add_ext"}, |
76 | {ERR_PACK(0,X509_F_X509_ADD_ATTR,0), "X509_ADD_ATTR"}, | 80 | {ERR_FUNC(X509_F_X509_ADD_ATTR), "X509_ADD_ATTR"}, |
77 | {ERR_PACK(0,X509_F_X509_ATTRIBUTE_CREATE_BY_NID,0), "X509_ATTRIBUTE_create_by_NID"}, | 81 | {ERR_FUNC(X509_F_X509_ATTRIBUTE_CREATE_BY_NID), "X509_ATTRIBUTE_create_by_NID"}, |
78 | {ERR_PACK(0,X509_F_X509_ATTRIBUTE_CREATE_BY_OBJ,0), "X509_ATTRIBUTE_create_by_OBJ"}, | 82 | {ERR_FUNC(X509_F_X509_ATTRIBUTE_CREATE_BY_OBJ), "X509_ATTRIBUTE_create_by_OBJ"}, |
79 | {ERR_PACK(0,X509_F_X509_ATTRIBUTE_CREATE_BY_TXT,0), "X509_ATTRIBUTE_create_by_txt"}, | 83 | {ERR_FUNC(X509_F_X509_ATTRIBUTE_CREATE_BY_TXT), "X509_ATTRIBUTE_create_by_txt"}, |
80 | {ERR_PACK(0,X509_F_X509_ATTRIBUTE_GET0_DATA,0), "X509_ATTRIBUTE_get0_data"}, | 84 | {ERR_FUNC(X509_F_X509_ATTRIBUTE_GET0_DATA), "X509_ATTRIBUTE_get0_data"}, |
81 | {ERR_PACK(0,X509_F_X509_ATTRIBUTE_SET1_DATA,0), "X509_ATTRIBUTE_set1_data"}, | 85 | {ERR_FUNC(X509_F_X509_ATTRIBUTE_SET1_DATA), "X509_ATTRIBUTE_set1_data"}, |
82 | {ERR_PACK(0,X509_F_X509_CHECK_PRIVATE_KEY,0), "X509_check_private_key"}, | 86 | {ERR_FUNC(X509_F_X509_CHECK_PRIVATE_KEY), "X509_check_private_key"}, |
83 | {ERR_PACK(0,X509_F_X509_EXTENSION_CREATE_BY_NID,0), "X509_EXTENSION_create_by_NID"}, | 87 | {ERR_FUNC(X509_F_X509_EXTENSION_CREATE_BY_NID), "X509_EXTENSION_create_by_NID"}, |
84 | {ERR_PACK(0,X509_F_X509_EXTENSION_CREATE_BY_OBJ,0), "X509_EXTENSION_create_by_OBJ"}, | 88 | {ERR_FUNC(X509_F_X509_EXTENSION_CREATE_BY_OBJ), "X509_EXTENSION_create_by_OBJ"}, |
85 | {ERR_PACK(0,X509_F_X509_GET_PUBKEY_PARAMETERS,0), "X509_get_pubkey_parameters"}, | 89 | {ERR_FUNC(X509_F_X509_GET_PUBKEY_PARAMETERS), "X509_get_pubkey_parameters"}, |
86 | {ERR_PACK(0,X509_F_X509_LOAD_CERT_CRL_FILE,0), "X509_load_cert_crl_file"}, | 90 | {ERR_FUNC(X509_F_X509_LOAD_CERT_CRL_FILE), "X509_load_cert_crl_file"}, |
87 | {ERR_PACK(0,X509_F_X509_LOAD_CERT_FILE,0), "X509_load_cert_file"}, | 91 | {ERR_FUNC(X509_F_X509_LOAD_CERT_FILE), "X509_load_cert_file"}, |
88 | {ERR_PACK(0,X509_F_X509_LOAD_CRL_FILE,0), "X509_load_crl_file"}, | 92 | {ERR_FUNC(X509_F_X509_LOAD_CRL_FILE), "X509_load_crl_file"}, |
89 | {ERR_PACK(0,X509_F_X509_NAME_ADD_ENTRY,0), "X509_NAME_add_entry"}, | 93 | {ERR_FUNC(X509_F_X509_NAME_ADD_ENTRY), "X509_NAME_add_entry"}, |
90 | {ERR_PACK(0,X509_F_X509_NAME_ENTRY_CREATE_BY_NID,0), "X509_NAME_ENTRY_create_by_NID"}, | 94 | {ERR_FUNC(X509_F_X509_NAME_ENTRY_CREATE_BY_NID), "X509_NAME_ENTRY_create_by_NID"}, |
91 | {ERR_PACK(0,X509_F_X509_NAME_ENTRY_CREATE_BY_TXT,0), "X509_NAME_ENTRY_create_by_txt"}, | 95 | {ERR_FUNC(X509_F_X509_NAME_ENTRY_CREATE_BY_TXT), "X509_NAME_ENTRY_create_by_txt"}, |
92 | {ERR_PACK(0,X509_F_X509_NAME_ENTRY_SET_OBJECT,0), "X509_NAME_ENTRY_set_object"}, | 96 | {ERR_FUNC(X509_F_X509_NAME_ENTRY_SET_OBJECT), "X509_NAME_ENTRY_set_object"}, |
93 | {ERR_PACK(0,X509_F_X509_NAME_ONELINE,0), "X509_NAME_oneline"}, | 97 | {ERR_FUNC(X509_F_X509_NAME_ONELINE), "X509_NAME_oneline"}, |
94 | {ERR_PACK(0,X509_F_X509_NAME_PRINT,0), "X509_NAME_print"}, | 98 | {ERR_FUNC(X509_F_X509_NAME_PRINT), "X509_NAME_print"}, |
95 | {ERR_PACK(0,X509_F_X509_PRINT_FP,0), "X509_print_fp"}, | 99 | {ERR_FUNC(X509_F_X509_PRINT_FP), "X509_print_fp"}, |
96 | {ERR_PACK(0,X509_F_X509_PUBKEY_GET,0), "X509_PUBKEY_get"}, | 100 | {ERR_FUNC(X509_F_X509_PUBKEY_GET), "X509_PUBKEY_get"}, |
97 | {ERR_PACK(0,X509_F_X509_PUBKEY_SET,0), "X509_PUBKEY_set"}, | 101 | {ERR_FUNC(X509_F_X509_PUBKEY_SET), "X509_PUBKEY_set"}, |
98 | {ERR_PACK(0,X509_F_X509_REQ_PRINT,0), "X509_REQ_print"}, | 102 | {ERR_FUNC(X509_F_X509_REQ_PRINT), "X509_REQ_print"}, |
99 | {ERR_PACK(0,X509_F_X509_REQ_PRINT_FP,0), "X509_REQ_print_fp"}, | 103 | {ERR_FUNC(X509_F_X509_REQ_PRINT_FP), "X509_REQ_print_fp"}, |
100 | {ERR_PACK(0,X509_F_X509_REQ_TO_X509,0), "X509_REQ_to_X509"}, | 104 | {ERR_FUNC(X509_F_X509_REQ_TO_X509), "X509_REQ_to_X509"}, |
101 | {ERR_PACK(0,X509_F_X509_STORE_ADD_CERT,0), "X509_STORE_add_cert"}, | 105 | {ERR_FUNC(X509_F_X509_STORE_ADD_CERT), "X509_STORE_add_cert"}, |
102 | {ERR_PACK(0,X509_F_X509_STORE_ADD_CRL,0), "X509_STORE_add_crl"}, | 106 | {ERR_FUNC(X509_F_X509_STORE_ADD_CRL), "X509_STORE_add_crl"}, |
103 | {ERR_PACK(0,X509_F_X509_STORE_CTX_INIT,0), "X509_STORE_CTX_init"}, | 107 | {ERR_FUNC(X509_F_X509_STORE_CTX_INIT), "X509_STORE_CTX_init"}, |
104 | {ERR_PACK(0,X509_F_X509_STORE_CTX_NEW,0), "X509_STORE_CTX_new"}, | 108 | {ERR_FUNC(X509_F_X509_STORE_CTX_NEW), "X509_STORE_CTX_new"}, |
105 | {ERR_PACK(0,X509_F_X509_STORE_CTX_PURPOSE_INHERIT,0), "X509_STORE_CTX_purpose_inherit"}, | 109 | {ERR_FUNC(X509_F_X509_STORE_CTX_PURPOSE_INHERIT), "X509_STORE_CTX_purpose_inherit"}, |
106 | {ERR_PACK(0,X509_F_X509_TO_X509_REQ,0), "X509_to_X509_REQ"}, | 110 | {ERR_FUNC(X509_F_X509_TO_X509_REQ), "X509_to_X509_REQ"}, |
107 | {ERR_PACK(0,X509_F_X509_TRUST_ADD,0), "X509_TRUST_add"}, | 111 | {ERR_FUNC(X509_F_X509_TRUST_ADD), "X509_TRUST_add"}, |
108 | {ERR_PACK(0,X509_F_X509_TRUST_SET,0), "X509_TRUST_set"}, | 112 | {ERR_FUNC(X509_F_X509_TRUST_SET), "X509_TRUST_set"}, |
109 | {ERR_PACK(0,X509_F_X509_VERIFY_CERT,0), "X509_verify_cert"}, | 113 | {ERR_FUNC(X509_F_X509_VERIFY_CERT), "X509_verify_cert"}, |
110 | {0,NULL} | 114 | {0,NULL} |
111 | }; | 115 | }; |
112 | 116 | ||
113 | static ERR_STRING_DATA X509_str_reasons[]= | 117 | static ERR_STRING_DATA X509_str_reasons[]= |
114 | { | 118 | { |
115 | {X509_R_BAD_X509_FILETYPE ,"bad x509 filetype"}, | 119 | {ERR_REASON(X509_R_BAD_X509_FILETYPE) ,"bad x509 filetype"}, |
116 | {X509_R_BASE64_DECODE_ERROR ,"base64 decode error"}, | 120 | {ERR_REASON(X509_R_BASE64_DECODE_ERROR) ,"base64 decode error"}, |
117 | {X509_R_CANT_CHECK_DH_KEY ,"cant check dh key"}, | 121 | {ERR_REASON(X509_R_CANT_CHECK_DH_KEY) ,"cant check dh key"}, |
118 | {X509_R_CERT_ALREADY_IN_HASH_TABLE ,"cert already in hash table"}, | 122 | {ERR_REASON(X509_R_CERT_ALREADY_IN_HASH_TABLE),"cert already in hash table"}, |
119 | {X509_R_ERR_ASN1_LIB ,"err asn1 lib"}, | 123 | {ERR_REASON(X509_R_ERR_ASN1_LIB) ,"err asn1 lib"}, |
120 | {X509_R_INVALID_DIRECTORY ,"invalid directory"}, | 124 | {ERR_REASON(X509_R_INVALID_DIRECTORY) ,"invalid directory"}, |
121 | {X509_R_INVALID_FIELD_NAME ,"invalid field name"}, | 125 | {ERR_REASON(X509_R_INVALID_FIELD_NAME) ,"invalid field name"}, |
122 | {X509_R_INVALID_TRUST ,"invalid trust"}, | 126 | {ERR_REASON(X509_R_INVALID_TRUST) ,"invalid trust"}, |
123 | {X509_R_KEY_TYPE_MISMATCH ,"key type mismatch"}, | 127 | {ERR_REASON(X509_R_KEY_TYPE_MISMATCH) ,"key type mismatch"}, |
124 | {X509_R_KEY_VALUES_MISMATCH ,"key values mismatch"}, | 128 | {ERR_REASON(X509_R_KEY_VALUES_MISMATCH) ,"key values mismatch"}, |
125 | {X509_R_LOADING_CERT_DIR ,"loading cert dir"}, | 129 | {ERR_REASON(X509_R_LOADING_CERT_DIR) ,"loading cert dir"}, |
126 | {X509_R_LOADING_DEFAULTS ,"loading defaults"}, | 130 | {ERR_REASON(X509_R_LOADING_DEFAULTS) ,"loading defaults"}, |
127 | {X509_R_NO_CERT_SET_FOR_US_TO_VERIFY ,"no cert set for us to verify"}, | 131 | {ERR_REASON(X509_R_NO_CERT_SET_FOR_US_TO_VERIFY),"no cert set for us to verify"}, |
128 | {X509_R_SHOULD_RETRY ,"should retry"}, | 132 | {ERR_REASON(X509_R_SHOULD_RETRY) ,"should retry"}, |
129 | {X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN,"unable to find parameters in chain"}, | 133 | {ERR_REASON(X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN),"unable to find parameters in chain"}, |
130 | {X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY ,"unable to get certs public key"}, | 134 | {ERR_REASON(X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY),"unable to get certs public key"}, |
131 | {X509_R_UNKNOWN_KEY_TYPE ,"unknown key type"}, | 135 | {ERR_REASON(X509_R_UNKNOWN_KEY_TYPE) ,"unknown key type"}, |
132 | {X509_R_UNKNOWN_NID ,"unknown nid"}, | 136 | {ERR_REASON(X509_R_UNKNOWN_NID) ,"unknown nid"}, |
133 | {X509_R_UNKNOWN_PURPOSE_ID ,"unknown purpose id"}, | 137 | {ERR_REASON(X509_R_UNKNOWN_PURPOSE_ID) ,"unknown purpose id"}, |
134 | {X509_R_UNKNOWN_TRUST_ID ,"unknown trust id"}, | 138 | {ERR_REASON(X509_R_UNKNOWN_TRUST_ID) ,"unknown trust id"}, |
135 | {X509_R_UNSUPPORTED_ALGORITHM ,"unsupported algorithm"}, | 139 | {ERR_REASON(X509_R_UNSUPPORTED_ALGORITHM),"unsupported algorithm"}, |
136 | {X509_R_WRONG_LOOKUP_TYPE ,"wrong lookup type"}, | 140 | {ERR_REASON(X509_R_WRONG_LOOKUP_TYPE) ,"wrong lookup type"}, |
137 | {X509_R_WRONG_TYPE ,"wrong type"}, | 141 | {ERR_REASON(X509_R_WRONG_TYPE) ,"wrong type"}, |
138 | {0,NULL} | 142 | {0,NULL} |
139 | }; | 143 | }; |
140 | 144 | ||
@@ -148,8 +152,8 @@ void ERR_load_X509_strings(void) | |||
148 | { | 152 | { |
149 | init=0; | 153 | init=0; |
150 | #ifndef OPENSSL_NO_ERR | 154 | #ifndef OPENSSL_NO_ERR |
151 | ERR_load_strings(ERR_LIB_X509,X509_str_functs); | 155 | ERR_load_strings(0,X509_str_functs); |
152 | ERR_load_strings(ERR_LIB_X509,X509_str_reasons); | 156 | ERR_load_strings(0,X509_str_reasons); |
153 | #endif | 157 | #endif |
154 | 158 | ||
155 | } | 159 | } |
diff --git a/src/lib/libcrypto/x509/x509_vfy.c b/src/lib/libcrypto/x509/x509_vfy.c index e43c861ee7..383e082aba 100644 --- a/src/lib/libcrypto/x509/x509_vfy.c +++ b/src/lib/libcrypto/x509/x509_vfy.c | |||
@@ -944,7 +944,7 @@ int X509_cmp_time(ASN1_TIME *ctm, time_t *cmp_time) | |||
944 | offset=0; | 944 | offset=0; |
945 | else | 945 | else |
946 | { | 946 | { |
947 | if ((*str != '+') && (str[5] != '-')) | 947 | if ((*str != '+') && (*str != '-')) |
948 | return 0; | 948 | return 0; |
949 | offset=((str[1]-'0')*10+(str[2]-'0'))*60; | 949 | offset=((str[1]-'0')*10+(str[2]-'0'))*60; |
950 | offset+=(str[3]-'0')*10+(str[4]-'0'); | 950 | offset+=(str[3]-'0')*10+(str[4]-'0'); |
diff --git a/src/lib/libcrypto/x509v3/v3_cpols.c b/src/lib/libcrypto/x509v3/v3_cpols.c index 0d554f3a2c..867525f336 100644 --- a/src/lib/libcrypto/x509v3/v3_cpols.c +++ b/src/lib/libcrypto/x509v3/v3_cpols.c | |||
@@ -137,7 +137,15 @@ static STACK_OF(POLICYINFO) *r2i_certpol(X509V3_EXT_METHOD *method, | |||
137 | CONF_VALUE *cnf; | 137 | CONF_VALUE *cnf; |
138 | int i, ia5org; | 138 | int i, ia5org; |
139 | pols = sk_POLICYINFO_new_null(); | 139 | pols = sk_POLICYINFO_new_null(); |
140 | if (pols == NULL) { | ||
141 | X509V3err(X509V3_F_R2I_CERTPOL, ERR_R_MALLOC_FAILURE); | ||
142 | return NULL; | ||
143 | } | ||
140 | vals = X509V3_parse_list(value); | 144 | vals = X509V3_parse_list(value); |
145 | if (vals == NULL) { | ||
146 | X509V3err(X509V3_F_R2I_CERTPOL, ERR_R_X509V3_LIB); | ||
147 | goto err; | ||
148 | } | ||
141 | ia5org = 0; | 149 | ia5org = 0; |
142 | for(i = 0; i < sk_CONF_VALUE_num(vals); i++) { | 150 | for(i = 0; i < sk_CONF_VALUE_num(vals); i++) { |
143 | cnf = sk_CONF_VALUE_value(vals, i); | 151 | cnf = sk_CONF_VALUE_value(vals, i); |
@@ -176,6 +184,7 @@ static STACK_OF(POLICYINFO) *r2i_certpol(X509V3_EXT_METHOD *method, | |||
176 | sk_CONF_VALUE_pop_free(vals, X509V3_conf_free); | 184 | sk_CONF_VALUE_pop_free(vals, X509V3_conf_free); |
177 | return pols; | 185 | return pols; |
178 | err: | 186 | err: |
187 | sk_CONF_VALUE_pop_free(vals, X509V3_conf_free); | ||
179 | sk_POLICYINFO_pop_free(pols, POLICYINFO_free); | 188 | sk_POLICYINFO_pop_free(pols, POLICYINFO_free); |
180 | return NULL; | 189 | return NULL; |
181 | } | 190 | } |
diff --git a/src/lib/libcrypto/x509v3/v3err.c b/src/lib/libcrypto/x509v3/v3err.c index 2df0c3ef01..e1edaf5248 100644 --- a/src/lib/libcrypto/x509v3/v3err.c +++ b/src/lib/libcrypto/x509v3/v3err.c | |||
@@ -64,114 +64,118 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_X509V3,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_X509V3,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA X509V3_str_functs[]= | 71 | static ERR_STRING_DATA X509V3_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,X509V3_F_COPY_EMAIL,0), "COPY_EMAIL"}, | 73 | {ERR_FUNC(X509V3_F_COPY_EMAIL), "COPY_EMAIL"}, |
70 | {ERR_PACK(0,X509V3_F_COPY_ISSUER,0), "COPY_ISSUER"}, | 74 | {ERR_FUNC(X509V3_F_COPY_ISSUER), "COPY_ISSUER"}, |
71 | {ERR_PACK(0,X509V3_F_DO_EXT_CONF,0), "DO_EXT_CONF"}, | 75 | {ERR_FUNC(X509V3_F_DO_EXT_CONF), "DO_EXT_CONF"}, |
72 | {ERR_PACK(0,X509V3_F_DO_EXT_I2D,0), "DO_EXT_I2D"}, | 76 | {ERR_FUNC(X509V3_F_DO_EXT_I2D), "DO_EXT_I2D"}, |
73 | {ERR_PACK(0,X509V3_F_HEX_TO_STRING,0), "hex_to_string"}, | 77 | {ERR_FUNC(X509V3_F_HEX_TO_STRING), "hex_to_string"}, |
74 | {ERR_PACK(0,X509V3_F_I2S_ASN1_ENUMERATED,0), "i2s_ASN1_ENUMERATED"}, | 78 | {ERR_FUNC(X509V3_F_I2S_ASN1_ENUMERATED), "i2s_ASN1_ENUMERATED"}, |
75 | {ERR_PACK(0,X509V3_F_I2S_ASN1_IA5STRING,0), "I2S_ASN1_IA5STRING"}, | 79 | {ERR_FUNC(X509V3_F_I2S_ASN1_IA5STRING), "I2S_ASN1_IA5STRING"}, |
76 | {ERR_PACK(0,X509V3_F_I2S_ASN1_INTEGER,0), "i2s_ASN1_INTEGER"}, | 80 | {ERR_FUNC(X509V3_F_I2S_ASN1_INTEGER), "i2s_ASN1_INTEGER"}, |
77 | {ERR_PACK(0,X509V3_F_I2V_AUTHORITY_INFO_ACCESS,0), "I2V_AUTHORITY_INFO_ACCESS"}, | 81 | {ERR_FUNC(X509V3_F_I2V_AUTHORITY_INFO_ACCESS), "I2V_AUTHORITY_INFO_ACCESS"}, |
78 | {ERR_PACK(0,X509V3_F_NOTICE_SECTION,0), "NOTICE_SECTION"}, | 82 | {ERR_FUNC(X509V3_F_NOTICE_SECTION), "NOTICE_SECTION"}, |
79 | {ERR_PACK(0,X509V3_F_NREF_NOS,0), "NREF_NOS"}, | 83 | {ERR_FUNC(X509V3_F_NREF_NOS), "NREF_NOS"}, |
80 | {ERR_PACK(0,X509V3_F_POLICY_SECTION,0), "POLICY_SECTION"}, | 84 | {ERR_FUNC(X509V3_F_POLICY_SECTION), "POLICY_SECTION"}, |
81 | {ERR_PACK(0,X509V3_F_R2I_CERTPOL,0), "R2I_CERTPOL"}, | 85 | {ERR_FUNC(X509V3_F_R2I_CERTPOL), "R2I_CERTPOL"}, |
82 | {ERR_PACK(0,X509V3_F_R2I_PCI,0), "R2I_PCI"}, | 86 | {ERR_FUNC(X509V3_F_R2I_PCI), "R2I_PCI"}, |
83 | {ERR_PACK(0,X509V3_F_S2I_ASN1_IA5STRING,0), "S2I_ASN1_IA5STRING"}, | 87 | {ERR_FUNC(X509V3_F_S2I_ASN1_IA5STRING), "S2I_ASN1_IA5STRING"}, |
84 | {ERR_PACK(0,X509V3_F_S2I_ASN1_INTEGER,0), "s2i_ASN1_INTEGER"}, | 88 | {ERR_FUNC(X509V3_F_S2I_ASN1_INTEGER), "s2i_ASN1_INTEGER"}, |
85 | {ERR_PACK(0,X509V3_F_S2I_ASN1_OCTET_STRING,0), "s2i_ASN1_OCTET_STRING"}, | 89 | {ERR_FUNC(X509V3_F_S2I_ASN1_OCTET_STRING), "s2i_ASN1_OCTET_STRING"}, |
86 | {ERR_PACK(0,X509V3_F_S2I_ASN1_SKEY_ID,0), "S2I_ASN1_SKEY_ID"}, | 90 | {ERR_FUNC(X509V3_F_S2I_ASN1_SKEY_ID), "S2I_ASN1_SKEY_ID"}, |
87 | {ERR_PACK(0,X509V3_F_S2I_S2I_SKEY_ID,0), "S2I_S2I_SKEY_ID"}, | 91 | {ERR_FUNC(X509V3_F_S2I_S2I_SKEY_ID), "S2I_S2I_SKEY_ID"}, |
88 | {ERR_PACK(0,X509V3_F_STRING_TO_HEX,0), "string_to_hex"}, | 92 | {ERR_FUNC(X509V3_F_STRING_TO_HEX), "string_to_hex"}, |
89 | {ERR_PACK(0,X509V3_F_SXNET_ADD_ASC,0), "SXNET_ADD_ASC"}, | 93 | {ERR_FUNC(X509V3_F_SXNET_ADD_ASC), "SXNET_ADD_ASC"}, |
90 | {ERR_PACK(0,X509V3_F_SXNET_ADD_ID_INTEGER,0), "SXNET_add_id_INTEGER"}, | 94 | {ERR_FUNC(X509V3_F_SXNET_ADD_ID_INTEGER), "SXNET_add_id_INTEGER"}, |
91 | {ERR_PACK(0,X509V3_F_SXNET_ADD_ID_ULONG,0), "SXNET_add_id_ulong"}, | 95 | {ERR_FUNC(X509V3_F_SXNET_ADD_ID_ULONG), "SXNET_add_id_ulong"}, |
92 | {ERR_PACK(0,X509V3_F_SXNET_GET_ID_ASC,0), "SXNET_get_id_asc"}, | 96 | {ERR_FUNC(X509V3_F_SXNET_GET_ID_ASC), "SXNET_get_id_asc"}, |
93 | {ERR_PACK(0,X509V3_F_SXNET_GET_ID_ULONG,0), "SXNET_get_id_ulong"}, | 97 | {ERR_FUNC(X509V3_F_SXNET_GET_ID_ULONG), "SXNET_get_id_ulong"}, |
94 | {ERR_PACK(0,X509V3_F_V2I_ACCESS_DESCRIPTION,0), "V2I_ACCESS_DESCRIPTION"}, | 98 | {ERR_FUNC(X509V3_F_V2I_ACCESS_DESCRIPTION), "V2I_ACCESS_DESCRIPTION"}, |
95 | {ERR_PACK(0,X509V3_F_V2I_ASN1_BIT_STRING,0), "V2I_ASN1_BIT_STRING"}, | 99 | {ERR_FUNC(X509V3_F_V2I_ASN1_BIT_STRING), "V2I_ASN1_BIT_STRING"}, |
96 | {ERR_PACK(0,X509V3_F_V2I_AUTHORITY_KEYID,0), "V2I_AUTHORITY_KEYID"}, | 100 | {ERR_FUNC(X509V3_F_V2I_AUTHORITY_KEYID), "V2I_AUTHORITY_KEYID"}, |
97 | {ERR_PACK(0,X509V3_F_V2I_BASIC_CONSTRAINTS,0), "V2I_BASIC_CONSTRAINTS"}, | 101 | {ERR_FUNC(X509V3_F_V2I_BASIC_CONSTRAINTS), "V2I_BASIC_CONSTRAINTS"}, |
98 | {ERR_PACK(0,X509V3_F_V2I_CRLD,0), "V2I_CRLD"}, | 102 | {ERR_FUNC(X509V3_F_V2I_CRLD), "V2I_CRLD"}, |
99 | {ERR_PACK(0,X509V3_F_V2I_EXT_KU,0), "V2I_EXT_KU"}, | 103 | {ERR_FUNC(X509V3_F_V2I_EXT_KU), "V2I_EXT_KU"}, |
100 | {ERR_PACK(0,X509V3_F_V2I_GENERAL_NAME,0), "v2i_GENERAL_NAME"}, | 104 | {ERR_FUNC(X509V3_F_V2I_GENERAL_NAME), "v2i_GENERAL_NAME"}, |
101 | {ERR_PACK(0,X509V3_F_V2I_GENERAL_NAMES,0), "v2i_GENERAL_NAMES"}, | 105 | {ERR_FUNC(X509V3_F_V2I_GENERAL_NAMES), "v2i_GENERAL_NAMES"}, |
102 | {ERR_PACK(0,X509V3_F_V3_GENERIC_EXTENSION,0), "V3_GENERIC_EXTENSION"}, | 106 | {ERR_FUNC(X509V3_F_V3_GENERIC_EXTENSION), "V3_GENERIC_EXTENSION"}, |
103 | {ERR_PACK(0,X509V3_F_X509V3_ADD_I2D,0), "X509V3_ADD_I2D"}, | 107 | {ERR_FUNC(X509V3_F_X509V3_ADD_I2D), "X509V3_ADD_I2D"}, |
104 | {ERR_PACK(0,X509V3_F_X509V3_ADD_VALUE,0), "X509V3_add_value"}, | 108 | {ERR_FUNC(X509V3_F_X509V3_ADD_VALUE), "X509V3_add_value"}, |
105 | {ERR_PACK(0,X509V3_F_X509V3_EXT_ADD,0), "X509V3_EXT_add"}, | 109 | {ERR_FUNC(X509V3_F_X509V3_EXT_ADD), "X509V3_EXT_add"}, |
106 | {ERR_PACK(0,X509V3_F_X509V3_EXT_ADD_ALIAS,0), "X509V3_EXT_add_alias"}, | 110 | {ERR_FUNC(X509V3_F_X509V3_EXT_ADD_ALIAS), "X509V3_EXT_add_alias"}, |
107 | {ERR_PACK(0,X509V3_F_X509V3_EXT_CONF,0), "X509V3_EXT_conf"}, | 111 | {ERR_FUNC(X509V3_F_X509V3_EXT_CONF), "X509V3_EXT_conf"}, |
108 | {ERR_PACK(0,X509V3_F_X509V3_EXT_I2D,0), "X509V3_EXT_i2d"}, | 112 | {ERR_FUNC(X509V3_F_X509V3_EXT_I2D), "X509V3_EXT_i2d"}, |
109 | {ERR_PACK(0,X509V3_F_X509V3_GET_VALUE_BOOL,0), "X509V3_get_value_bool"}, | 113 | {ERR_FUNC(X509V3_F_X509V3_GET_VALUE_BOOL), "X509V3_get_value_bool"}, |
110 | {ERR_PACK(0,X509V3_F_X509V3_PARSE_LIST,0), "X509V3_parse_list"}, | 114 | {ERR_FUNC(X509V3_F_X509V3_PARSE_LIST), "X509V3_parse_list"}, |
111 | {ERR_PACK(0,X509V3_F_X509_PURPOSE_ADD,0), "X509_PURPOSE_add"}, | 115 | {ERR_FUNC(X509V3_F_X509_PURPOSE_ADD), "X509_PURPOSE_add"}, |
112 | {ERR_PACK(0,X509V3_F_X509_PURPOSE_SET,0), "X509_PURPOSE_set"}, | 116 | {ERR_FUNC(X509V3_F_X509_PURPOSE_SET), "X509_PURPOSE_set"}, |
113 | {0,NULL} | 117 | {0,NULL} |
114 | }; | 118 | }; |
115 | 119 | ||
116 | static ERR_STRING_DATA X509V3_str_reasons[]= | 120 | static ERR_STRING_DATA X509V3_str_reasons[]= |
117 | { | 121 | { |
118 | {X509V3_R_BAD_IP_ADDRESS ,"bad ip address"}, | 122 | {ERR_REASON(X509V3_R_BAD_IP_ADDRESS) ,"bad ip address"}, |
119 | {X509V3_R_BAD_OBJECT ,"bad object"}, | 123 | {ERR_REASON(X509V3_R_BAD_OBJECT) ,"bad object"}, |
120 | {X509V3_R_BN_DEC2BN_ERROR ,"bn dec2bn error"}, | 124 | {ERR_REASON(X509V3_R_BN_DEC2BN_ERROR) ,"bn dec2bn error"}, |
121 | {X509V3_R_BN_TO_ASN1_INTEGER_ERROR ,"bn to asn1 integer error"}, | 125 | {ERR_REASON(X509V3_R_BN_TO_ASN1_INTEGER_ERROR),"bn to asn1 integer error"}, |
122 | {X509V3_R_DUPLICATE_ZONE_ID ,"duplicate zone id"}, | 126 | {ERR_REASON(X509V3_R_DUPLICATE_ZONE_ID) ,"duplicate zone id"}, |
123 | {X509V3_R_ERROR_CONVERTING_ZONE ,"error converting zone"}, | 127 | {ERR_REASON(X509V3_R_ERROR_CONVERTING_ZONE),"error converting zone"}, |
124 | {X509V3_R_ERROR_CREATING_EXTENSION ,"error creating extension"}, | 128 | {ERR_REASON(X509V3_R_ERROR_CREATING_EXTENSION),"error creating extension"}, |
125 | {X509V3_R_ERROR_IN_EXTENSION ,"error in extension"}, | 129 | {ERR_REASON(X509V3_R_ERROR_IN_EXTENSION) ,"error in extension"}, |
126 | {X509V3_R_EXPECTED_A_SECTION_NAME ,"expected a section name"}, | 130 | {ERR_REASON(X509V3_R_EXPECTED_A_SECTION_NAME),"expected a section name"}, |
127 | {X509V3_R_EXTENSION_EXISTS ,"extension exists"}, | 131 | {ERR_REASON(X509V3_R_EXTENSION_EXISTS) ,"extension exists"}, |
128 | {X509V3_R_EXTENSION_NAME_ERROR ,"extension name error"}, | 132 | {ERR_REASON(X509V3_R_EXTENSION_NAME_ERROR),"extension name error"}, |
129 | {X509V3_R_EXTENSION_NOT_FOUND ,"extension not found"}, | 133 | {ERR_REASON(X509V3_R_EXTENSION_NOT_FOUND),"extension not found"}, |
130 | {X509V3_R_EXTENSION_SETTING_NOT_SUPPORTED,"extension setting not supported"}, | 134 | {ERR_REASON(X509V3_R_EXTENSION_SETTING_NOT_SUPPORTED),"extension setting not supported"}, |
131 | {X509V3_R_EXTENSION_VALUE_ERROR ,"extension value error"}, | 135 | {ERR_REASON(X509V3_R_EXTENSION_VALUE_ERROR),"extension value error"}, |
132 | {X509V3_R_ILLEGAL_HEX_DIGIT ,"illegal hex digit"}, | 136 | {ERR_REASON(X509V3_R_ILLEGAL_HEX_DIGIT) ,"illegal hex digit"}, |
133 | {X509V3_R_INCORRECT_POLICY_SYNTAX_TAG ,"incorrect policy syntax tag"}, | 137 | {ERR_REASON(X509V3_R_INCORRECT_POLICY_SYNTAX_TAG),"incorrect policy syntax tag"}, |
134 | {X509V3_R_INVALID_BOOLEAN_STRING ,"invalid boolean string"}, | 138 | {ERR_REASON(X509V3_R_INVALID_BOOLEAN_STRING),"invalid boolean string"}, |
135 | {X509V3_R_INVALID_EXTENSION_STRING ,"invalid extension string"}, | 139 | {ERR_REASON(X509V3_R_INVALID_EXTENSION_STRING),"invalid extension string"}, |
136 | {X509V3_R_INVALID_NAME ,"invalid name"}, | 140 | {ERR_REASON(X509V3_R_INVALID_NAME) ,"invalid name"}, |
137 | {X509V3_R_INVALID_NULL_ARGUMENT ,"invalid null argument"}, | 141 | {ERR_REASON(X509V3_R_INVALID_NULL_ARGUMENT),"invalid null argument"}, |
138 | {X509V3_R_INVALID_NULL_NAME ,"invalid null name"}, | 142 | {ERR_REASON(X509V3_R_INVALID_NULL_NAME) ,"invalid null name"}, |
139 | {X509V3_R_INVALID_NULL_VALUE ,"invalid null value"}, | 143 | {ERR_REASON(X509V3_R_INVALID_NULL_VALUE) ,"invalid null value"}, |
140 | {X509V3_R_INVALID_NUMBER ,"invalid number"}, | 144 | {ERR_REASON(X509V3_R_INVALID_NUMBER) ,"invalid number"}, |
141 | {X509V3_R_INVALID_NUMBERS ,"invalid numbers"}, | 145 | {ERR_REASON(X509V3_R_INVALID_NUMBERS) ,"invalid numbers"}, |
142 | {X509V3_R_INVALID_OBJECT_IDENTIFIER ,"invalid object identifier"}, | 146 | {ERR_REASON(X509V3_R_INVALID_OBJECT_IDENTIFIER),"invalid object identifier"}, |
143 | {X509V3_R_INVALID_OPTION ,"invalid option"}, | 147 | {ERR_REASON(X509V3_R_INVALID_OPTION) ,"invalid option"}, |
144 | {X509V3_R_INVALID_POLICY_IDENTIFIER ,"invalid policy identifier"}, | 148 | {ERR_REASON(X509V3_R_INVALID_POLICY_IDENTIFIER),"invalid policy identifier"}, |
145 | {X509V3_R_INVALID_PROXY_POLICY_IDENTIFIER,"invalid proxy policy identifier"}, | 149 | {ERR_REASON(X509V3_R_INVALID_PROXY_POLICY_IDENTIFIER),"invalid proxy policy identifier"}, |
146 | {X509V3_R_INVALID_PROXY_POLICY_SETTING ,"invalid proxy policy setting"}, | 150 | {ERR_REASON(X509V3_R_INVALID_PROXY_POLICY_SETTING),"invalid proxy policy setting"}, |
147 | {X509V3_R_INVALID_PURPOSE ,"invalid purpose"}, | 151 | {ERR_REASON(X509V3_R_INVALID_PURPOSE) ,"invalid purpose"}, |
148 | {X509V3_R_INVALID_SECTION ,"invalid section"}, | 152 | {ERR_REASON(X509V3_R_INVALID_SECTION) ,"invalid section"}, |
149 | {X509V3_R_INVALID_SYNTAX ,"invalid syntax"}, | 153 | {ERR_REASON(X509V3_R_INVALID_SYNTAX) ,"invalid syntax"}, |
150 | {X509V3_R_ISSUER_DECODE_ERROR ,"issuer decode error"}, | 154 | {ERR_REASON(X509V3_R_ISSUER_DECODE_ERROR),"issuer decode error"}, |
151 | {X509V3_R_MISSING_VALUE ,"missing value"}, | 155 | {ERR_REASON(X509V3_R_MISSING_VALUE) ,"missing value"}, |
152 | {X509V3_R_NEED_ORGANIZATION_AND_NUMBERS ,"need organization and numbers"}, | 156 | {ERR_REASON(X509V3_R_NEED_ORGANIZATION_AND_NUMBERS),"need organization and numbers"}, |
153 | {X509V3_R_NO_CONFIG_DATABASE ,"no config database"}, | 157 | {ERR_REASON(X509V3_R_NO_CONFIG_DATABASE) ,"no config database"}, |
154 | {X509V3_R_NO_ISSUER_CERTIFICATE ,"no issuer certificate"}, | 158 | {ERR_REASON(X509V3_R_NO_ISSUER_CERTIFICATE),"no issuer certificate"}, |
155 | {X509V3_R_NO_ISSUER_DETAILS ,"no issuer details"}, | 159 | {ERR_REASON(X509V3_R_NO_ISSUER_DETAILS) ,"no issuer details"}, |
156 | {X509V3_R_NO_POLICY_IDENTIFIER ,"no policy identifier"}, | 160 | {ERR_REASON(X509V3_R_NO_POLICY_IDENTIFIER),"no policy identifier"}, |
157 | {X509V3_R_NO_PROXY_CERT_POLICY_LANGUAGE_DEFINED,"no proxy cert policy language defined"}, | 161 | {ERR_REASON(X509V3_R_NO_PROXY_CERT_POLICY_LANGUAGE_DEFINED),"no proxy cert policy language defined"}, |
158 | {X509V3_R_NO_PUBLIC_KEY ,"no public key"}, | 162 | {ERR_REASON(X509V3_R_NO_PUBLIC_KEY) ,"no public key"}, |
159 | {X509V3_R_NO_SUBJECT_DETAILS ,"no subject details"}, | 163 | {ERR_REASON(X509V3_R_NO_SUBJECT_DETAILS) ,"no subject details"}, |
160 | {X509V3_R_ODD_NUMBER_OF_DIGITS ,"odd number of digits"}, | 164 | {ERR_REASON(X509V3_R_ODD_NUMBER_OF_DIGITS),"odd number of digits"}, |
161 | {X509V3_R_POLICY_LANGUAGE_ALREADTY_DEFINED,"policy language alreadty defined"}, | 165 | {ERR_REASON(X509V3_R_POLICY_LANGUAGE_ALREADTY_DEFINED),"policy language alreadty defined"}, |
162 | {X509V3_R_POLICY_PATH_LENGTH ,"policy path length"}, | 166 | {ERR_REASON(X509V3_R_POLICY_PATH_LENGTH) ,"policy path length"}, |
163 | {X509V3_R_POLICY_PATH_LENGTH_ALREADTY_DEFINED,"policy path length alreadty defined"}, | 167 | {ERR_REASON(X509V3_R_POLICY_PATH_LENGTH_ALREADTY_DEFINED),"policy path length alreadty defined"}, |
164 | {X509V3_R_POLICY_SYNTAX_NOT ,"policy syntax not"}, | 168 | {ERR_REASON(X509V3_R_POLICY_SYNTAX_NOT) ,"policy syntax not"}, |
165 | {X509V3_R_POLICY_SYNTAX_NOT_CURRENTLY_SUPPORTED,"policy syntax not currently supported"}, | 169 | {ERR_REASON(X509V3_R_POLICY_SYNTAX_NOT_CURRENTLY_SUPPORTED),"policy syntax not currently supported"}, |
166 | {X509V3_R_POLICY_WHEN_PROXY_LANGUAGE_REQUIRES_NO_POLICY,"policy when proxy language requires no policy"}, | 170 | {ERR_REASON(X509V3_R_POLICY_WHEN_PROXY_LANGUAGE_REQUIRES_NO_POLICY),"policy when proxy language requires no policy"}, |
167 | {X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS ,"unable to get issuer details"}, | 171 | {ERR_REASON(X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS),"unable to get issuer details"}, |
168 | {X509V3_R_UNABLE_TO_GET_ISSUER_KEYID ,"unable to get issuer keyid"}, | 172 | {ERR_REASON(X509V3_R_UNABLE_TO_GET_ISSUER_KEYID),"unable to get issuer keyid"}, |
169 | {X509V3_R_UNKNOWN_BIT_STRING_ARGUMENT ,"unknown bit string argument"}, | 173 | {ERR_REASON(X509V3_R_UNKNOWN_BIT_STRING_ARGUMENT),"unknown bit string argument"}, |
170 | {X509V3_R_UNKNOWN_EXTENSION ,"unknown extension"}, | 174 | {ERR_REASON(X509V3_R_UNKNOWN_EXTENSION) ,"unknown extension"}, |
171 | {X509V3_R_UNKNOWN_EXTENSION_NAME ,"unknown extension name"}, | 175 | {ERR_REASON(X509V3_R_UNKNOWN_EXTENSION_NAME),"unknown extension name"}, |
172 | {X509V3_R_UNKNOWN_OPTION ,"unknown option"}, | 176 | {ERR_REASON(X509V3_R_UNKNOWN_OPTION) ,"unknown option"}, |
173 | {X509V3_R_UNSUPPORTED_OPTION ,"unsupported option"}, | 177 | {ERR_REASON(X509V3_R_UNSUPPORTED_OPTION) ,"unsupported option"}, |
174 | {X509V3_R_USER_TOO_LONG ,"user too long"}, | 178 | {ERR_REASON(X509V3_R_USER_TOO_LONG) ,"user too long"}, |
175 | {0,NULL} | 179 | {0,NULL} |
176 | }; | 180 | }; |
177 | 181 | ||
@@ -185,8 +189,8 @@ void ERR_load_X509V3_strings(void) | |||
185 | { | 189 | { |
186 | init=0; | 190 | init=0; |
187 | #ifndef OPENSSL_NO_ERR | 191 | #ifndef OPENSSL_NO_ERR |
188 | ERR_load_strings(ERR_LIB_X509V3,X509V3_str_functs); | 192 | ERR_load_strings(0,X509V3_str_functs); |
189 | ERR_load_strings(ERR_LIB_X509V3,X509V3_str_reasons); | 193 | ERR_load_strings(0,X509V3_str_reasons); |
190 | #endif | 194 | #endif |
191 | 195 | ||
192 | } | 196 | } |
diff --git a/src/lib/libssl/LICENSE b/src/lib/libssl/LICENSE index 40277883a5..e6afecc724 100644 --- a/src/lib/libssl/LICENSE +++ b/src/lib/libssl/LICENSE | |||
@@ -12,7 +12,7 @@ | |||
12 | --------------- | 12 | --------------- |
13 | 13 | ||
14 | /* ==================================================================== | 14 | /* ==================================================================== |
15 | * Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved. | 15 | * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. |
16 | * | 16 | * |
17 | * Redistribution and use in source and binary forms, with or without | 17 | * Redistribution and use in source and binary forms, with or without |
18 | * modification, are permitted provided that the following conditions | 18 | * modification, are permitted provided that the following conditions |
diff --git a/src/lib/libssl/s23_clnt.c b/src/lib/libssl/s23_clnt.c index 779e94a35c..86356731ea 100644 --- a/src/lib/libssl/s23_clnt.c +++ b/src/lib/libssl/s23_clnt.c | |||
@@ -106,7 +106,7 @@ SSL_METHOD *SSLv23_client_method(void) | |||
106 | int ssl23_connect(SSL *s) | 106 | int ssl23_connect(SSL *s) |
107 | { | 107 | { |
108 | BUF_MEM *buf=NULL; | 108 | BUF_MEM *buf=NULL; |
109 | unsigned long Time=time(NULL); | 109 | unsigned long Time=(unsigned long)time(NULL); |
110 | void (*cb)(const SSL *ssl,int type,int val)=NULL; | 110 | void (*cb)(const SSL *ssl,int type,int val)=NULL; |
111 | int ret= -1; | 111 | int ret= -1; |
112 | int new_state,state; | 112 | int new_state,state; |
@@ -220,9 +220,28 @@ static int ssl23_client_hello(SSL *s) | |||
220 | { | 220 | { |
221 | unsigned char *buf; | 221 | unsigned char *buf; |
222 | unsigned char *p,*d; | 222 | unsigned char *p,*d; |
223 | int i,ch_len; | 223 | int i,j,ch_len; |
224 | unsigned long Time,l; | ||
225 | int ssl2_compat; | ||
226 | int version = 0, version_major, version_minor; | ||
227 | SSL_COMP *comp; | ||
224 | int ret; | 228 | int ret; |
225 | 229 | ||
230 | ssl2_compat = (s->options & SSL_OP_NO_SSLv2) ? 0 : 1; | ||
231 | |||
232 | if (!(s->options & SSL_OP_NO_TLSv1)) | ||
233 | { | ||
234 | version = TLS1_VERSION; | ||
235 | } | ||
236 | else if (!(s->options & SSL_OP_NO_SSLv3)) | ||
237 | { | ||
238 | version = SSL3_VERSION; | ||
239 | } | ||
240 | else if (!(s->options & SSL_OP_NO_SSLv2)) | ||
241 | { | ||
242 | version = SSL2_VERSION; | ||
243 | } | ||
244 | |||
226 | buf=(unsigned char *)s->init_buf->data; | 245 | buf=(unsigned char *)s->init_buf->data; |
227 | if (s->state == SSL23_ST_CW_CLNT_HELLO_A) | 246 | if (s->state == SSL23_ST_CW_CLNT_HELLO_A) |
228 | { | 247 | { |
@@ -235,19 +254,15 @@ static int ssl23_client_hello(SSL *s) | |||
235 | #endif | 254 | #endif |
236 | 255 | ||
237 | p=s->s3->client_random; | 256 | p=s->s3->client_random; |
238 | if(RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE) <= 0) | 257 | Time=(unsigned long)time(NULL); /* Time */ |
239 | return -1; | 258 | l2n(Time,p); |
240 | 259 | if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) | |
241 | /* Do the message type and length last */ | 260 | return -1; |
242 | d= &(buf[2]); | ||
243 | p=d+9; | ||
244 | 261 | ||
245 | *(d++)=SSL2_MT_CLIENT_HELLO; | 262 | if (version == TLS1_VERSION) |
246 | if (!(s->options & SSL_OP_NO_TLSv1)) | ||
247 | { | 263 | { |
248 | *(d++)=TLS1_VERSION_MAJOR; | 264 | version_major = TLS1_VERSION_MAJOR; |
249 | *(d++)=TLS1_VERSION_MINOR; | 265 | version_minor = TLS1_VERSION_MINOR; |
250 | s->client_version=TLS1_VERSION; | ||
251 | } | 266 | } |
252 | #ifdef OPENSSL_FIPS | 267 | #ifdef OPENSSL_FIPS |
253 | else if(FIPS_mode()) | 268 | else if(FIPS_mode()) |
@@ -257,17 +272,15 @@ static int ssl23_client_hello(SSL *s) | |||
257 | return -1; | 272 | return -1; |
258 | } | 273 | } |
259 | #endif | 274 | #endif |
260 | else if (!(s->options & SSL_OP_NO_SSLv3)) | 275 | else if (version == SSL3_VERSION) |
261 | { | 276 | { |
262 | *(d++)=SSL3_VERSION_MAJOR; | 277 | version_major = SSL3_VERSION_MAJOR; |
263 | *(d++)=SSL3_VERSION_MINOR; | 278 | version_minor = SSL3_VERSION_MINOR; |
264 | s->client_version=SSL3_VERSION; | ||
265 | } | 279 | } |
266 | else if (!(s->options & SSL_OP_NO_SSLv2)) | 280 | else if (version == SSL2_VERSION) |
267 | { | 281 | { |
268 | *(d++)=SSL2_VERSION_MAJOR; | 282 | version_major = SSL2_VERSION_MAJOR; |
269 | *(d++)=SSL2_VERSION_MINOR; | 283 | version_minor = SSL2_VERSION_MINOR; |
270 | s->client_version=SSL2_VERSION; | ||
271 | } | 284 | } |
272 | else | 285 | else |
273 | { | 286 | { |
@@ -275,59 +288,153 @@ static int ssl23_client_hello(SSL *s) | |||
275 | return(-1); | 288 | return(-1); |
276 | } | 289 | } |
277 | 290 | ||
278 | /* Ciphers supported */ | 291 | s->client_version = version; |
279 | i=ssl_cipher_list_to_bytes(s,SSL_get_ciphers(s),p); | 292 | |
280 | if (i == 0) | 293 | if (ssl2_compat) |
281 | { | 294 | { |
282 | /* no ciphers */ | 295 | /* create SSL 2.0 compatible Client Hello */ |
283 | SSLerr(SSL_F_SSL23_CLIENT_HELLO,SSL_R_NO_CIPHERS_AVAILABLE); | 296 | |
284 | return(-1); | 297 | /* two byte record header will be written last */ |
285 | } | 298 | d = &(buf[2]); |
286 | s2n(i,d); | 299 | p = d + 9; /* leave space for message type, version, individual length fields */ |
287 | p+=i; | ||
288 | 300 | ||
289 | /* put in the session-id, zero since there is no | 301 | *(d++) = SSL2_MT_CLIENT_HELLO; |
290 | * reuse. */ | 302 | *(d++) = version_major; |
303 | *(d++) = version_minor; | ||
304 | |||
305 | /* Ciphers supported */ | ||
306 | i=ssl_cipher_list_to_bytes(s,SSL_get_ciphers(s),p,0); | ||
307 | if (i == 0) | ||
308 | { | ||
309 | /* no ciphers */ | ||
310 | SSLerr(SSL_F_SSL23_CLIENT_HELLO,SSL_R_NO_CIPHERS_AVAILABLE); | ||
311 | return -1; | ||
312 | } | ||
313 | s2n(i,d); | ||
314 | p+=i; | ||
315 | |||
316 | /* put in the session-id length (zero since there is no reuse) */ | ||
291 | #if 0 | 317 | #if 0 |
292 | s->session->session_id_length=0; | 318 | s->session->session_id_length=0; |
293 | #endif | 319 | #endif |
294 | s2n(0,d); | 320 | s2n(0,d); |
295 | 321 | ||
296 | if (s->options & SSL_OP_NETSCAPE_CHALLENGE_BUG) | 322 | if (s->options & SSL_OP_NETSCAPE_CHALLENGE_BUG) |
297 | ch_len=SSL2_CHALLENGE_LENGTH; | 323 | ch_len=SSL2_CHALLENGE_LENGTH; |
324 | else | ||
325 | ch_len=SSL2_MAX_CHALLENGE_LENGTH; | ||
326 | |||
327 | /* write out sslv2 challenge */ | ||
328 | if (SSL3_RANDOM_SIZE < ch_len) | ||
329 | i=SSL3_RANDOM_SIZE; | ||
330 | else | ||
331 | i=ch_len; | ||
332 | s2n(i,d); | ||
333 | memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); | ||
334 | if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) | ||
335 | return -1; | ||
336 | |||
337 | memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); | ||
338 | p+=i; | ||
339 | |||
340 | i= p- &(buf[2]); | ||
341 | buf[0]=((i>>8)&0xff)|0x80; | ||
342 | buf[1]=(i&0xff); | ||
343 | |||
344 | /* number of bytes to write */ | ||
345 | s->init_num=i+2; | ||
346 | s->init_off=0; | ||
347 | |||
348 | ssl3_finish_mac(s,&(buf[2]),i); | ||
349 | } | ||
298 | else | 350 | else |
299 | ch_len=SSL2_MAX_CHALLENGE_LENGTH; | 351 | { |
352 | /* create Client Hello in SSL 3.0/TLS 1.0 format */ | ||
300 | 353 | ||
301 | /* write out sslv2 challenge */ | 354 | /* do the record header (5 bytes) and handshake message header (4 bytes) last */ |
302 | if (SSL3_RANDOM_SIZE < ch_len) | 355 | d = p = &(buf[9]); |
303 | i=SSL3_RANDOM_SIZE; | 356 | |
304 | else | 357 | *(p++) = version_major; |
305 | i=ch_len; | 358 | *(p++) = version_minor; |
306 | s2n(i,d); | 359 | |
307 | memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); | 360 | /* Random stuff */ |
308 | if(RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) | 361 | memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); |
309 | return -1; | 362 | p += SSL3_RANDOM_SIZE; |
363 | |||
364 | /* Session ID (zero since there is no reuse) */ | ||
365 | *(p++) = 0; | ||
366 | |||
367 | /* Ciphers supported (using SSL 3.0/TLS 1.0 format) */ | ||
368 | i=ssl_cipher_list_to_bytes(s,SSL_get_ciphers(s),&(p[2]),ssl3_put_cipher_by_char); | ||
369 | if (i == 0) | ||
370 | { | ||
371 | SSLerr(SSL_F_SSL23_CLIENT_HELLO,SSL_R_NO_CIPHERS_AVAILABLE); | ||
372 | return -1; | ||
373 | } | ||
374 | s2n(i,p); | ||
375 | p+=i; | ||
376 | |||
377 | /* COMPRESSION */ | ||
378 | if (s->ctx->comp_methods == NULL) | ||
379 | j=0; | ||
380 | else | ||
381 | j=sk_SSL_COMP_num(s->ctx->comp_methods); | ||
382 | *(p++)=1+j; | ||
383 | for (i=0; i<j; i++) | ||
384 | { | ||
385 | comp=sk_SSL_COMP_value(s->ctx->comp_methods,i); | ||
386 | *(p++)=comp->id; | ||
387 | } | ||
388 | *(p++)=0; /* Add the NULL method */ | ||
389 | |||
390 | l = p-d; | ||
391 | *p = 42; | ||
310 | 392 | ||
311 | memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); | 393 | /* fill in 4-byte handshake header */ |
312 | p+=i; | 394 | d=&(buf[5]); |
395 | *(d++)=SSL3_MT_CLIENT_HELLO; | ||
396 | l2n3(l,d); | ||
313 | 397 | ||
314 | i= p- &(buf[2]); | 398 | l += 4; |
315 | buf[0]=((i>>8)&0xff)|0x80; | 399 | |
316 | buf[1]=(i&0xff); | 400 | if (l > SSL3_RT_MAX_PLAIN_LENGTH) |
401 | { | ||
402 | SSLerr(SSL_F_SSL23_CLIENT_HELLO,ERR_R_INTERNAL_ERROR); | ||
403 | return -1; | ||
404 | } | ||
405 | |||
406 | /* fill in 5-byte record header */ | ||
407 | d=buf; | ||
408 | *(d++) = SSL3_RT_HANDSHAKE; | ||
409 | *(d++) = version_major; | ||
410 | *(d++) = version_minor; /* arguably we should send the *lowest* suported version here | ||
411 | * (indicating, e.g., TLS 1.0 in "SSL 3.0 format") */ | ||
412 | s2n((int)l,d); | ||
413 | |||
414 | /* number of bytes to write */ | ||
415 | s->init_num=p-buf; | ||
416 | s->init_off=0; | ||
417 | |||
418 | ssl3_finish_mac(s,&(buf[5]), s->init_num - 5); | ||
419 | } | ||
317 | 420 | ||
318 | s->state=SSL23_ST_CW_CLNT_HELLO_B; | 421 | s->state=SSL23_ST_CW_CLNT_HELLO_B; |
319 | /* number of bytes to write */ | ||
320 | s->init_num=i+2; | ||
321 | s->init_off=0; | 422 | s->init_off=0; |
322 | |||
323 | ssl3_finish_mac(s,&(buf[2]),i); | ||
324 | } | 423 | } |
325 | 424 | ||
326 | /* SSL3_ST_CW_CLNT_HELLO_B */ | 425 | /* SSL3_ST_CW_CLNT_HELLO_B */ |
327 | ret = ssl23_write_bytes(s); | 426 | ret = ssl23_write_bytes(s); |
328 | if (ret >= 2) | 427 | |
329 | if (s->msg_callback) | 428 | if ((ret >= 2) && s->msg_callback) |
330 | s->msg_callback(1, SSL2_VERSION, 0, s->init_buf->data+2, ret-2, s, s->msg_callback_arg); /* CLIENT-HELLO */ | 429 | { |
430 | /* Client Hello has been sent; tell msg_callback */ | ||
431 | |||
432 | if (ssl2_compat) | ||
433 | s->msg_callback(1, SSL2_VERSION, 0, s->init_buf->data+2, ret-2, s, s->msg_callback_arg); | ||
434 | else | ||
435 | s->msg_callback(1, version, SSL3_RT_HANDSHAKE, s->init_buf->data+5, ret-5, s, s->msg_callback_arg); | ||
436 | } | ||
437 | |||
331 | return ret; | 438 | return ret; |
332 | } | 439 | } |
333 | 440 | ||
diff --git a/src/lib/libssl/s23_srvr.c b/src/lib/libssl/s23_srvr.c index 92f3391f60..b73abc448f 100644 --- a/src/lib/libssl/s23_srvr.c +++ b/src/lib/libssl/s23_srvr.c | |||
@@ -158,7 +158,7 @@ SSL_METHOD *SSLv23_server_method(void) | |||
158 | int ssl23_accept(SSL *s) | 158 | int ssl23_accept(SSL *s) |
159 | { | 159 | { |
160 | BUF_MEM *buf; | 160 | BUF_MEM *buf; |
161 | unsigned long Time=time(NULL); | 161 | unsigned long Time=(unsigned long)time(NULL); |
162 | void (*cb)(const SSL *ssl,int type,int val)=NULL; | 162 | void (*cb)(const SSL *ssl,int type,int val)=NULL; |
163 | int ret= -1; | 163 | int ret= -1; |
164 | int new_state,state; | 164 | int new_state,state; |
@@ -268,9 +268,6 @@ int ssl23_get_client_hello(SSL *s) | |||
268 | int n=0,j; | 268 | int n=0,j; |
269 | int type=0; | 269 | int type=0; |
270 | int v[2]; | 270 | int v[2]; |
271 | #ifndef OPENSSL_NO_RSA | ||
272 | int use_sslv2_strong=0; | ||
273 | #endif | ||
274 | 271 | ||
275 | if (s->state == SSL23_ST_SR_CLNT_HELLO_A) | 272 | if (s->state == SSL23_ST_SR_CLNT_HELLO_A) |
276 | { | 273 | { |
@@ -528,9 +525,7 @@ int ssl23_get_client_hello(SSL *s) | |||
528 | } | 525 | } |
529 | 526 | ||
530 | s->state=SSL2_ST_GET_CLIENT_HELLO_A; | 527 | s->state=SSL2_ST_GET_CLIENT_HELLO_A; |
531 | if ((s->options & SSL_OP_MSIE_SSLV2_RSA_PADDING) || | 528 | if (s->options & SSL_OP_NO_TLSv1 && s->options & SSL_OP_NO_SSLv3) |
532 | use_sslv2_strong || | ||
533 | (s->options & SSL_OP_NO_TLSv1 && s->options & SSL_OP_NO_SSLv3)) | ||
534 | s->s2->ssl2_rollback=0; | 529 | s->s2->ssl2_rollback=0; |
535 | else | 530 | else |
536 | /* reject SSL 2.0 session if client supports SSL 3.0 or TLS 1.0 | 531 | /* reject SSL 2.0 session if client supports SSL 3.0 or TLS 1.0 |
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c index 0969476b25..05194fdb31 100644 --- a/src/lib/libssl/s3_clnt.c +++ b/src/lib/libssl/s3_clnt.c | |||
@@ -165,7 +165,7 @@ SSL_METHOD *SSLv3_client_method(void) | |||
165 | int ssl3_connect(SSL *s) | 165 | int ssl3_connect(SSL *s) |
166 | { | 166 | { |
167 | BUF_MEM *buf=NULL; | 167 | BUF_MEM *buf=NULL; |
168 | unsigned long Time=time(NULL),l; | 168 | unsigned long Time=(unsigned long)time(NULL),l; |
169 | long num1; | 169 | long num1; |
170 | void (*cb)(const SSL *ssl,int type,int val)=NULL; | 170 | void (*cb)(const SSL *ssl,int type,int val)=NULL; |
171 | int ret= -1; | 171 | int ret= -1; |
@@ -533,7 +533,7 @@ static int ssl3_client_hello(SSL *s) | |||
533 | /* else use the pre-loaded session */ | 533 | /* else use the pre-loaded session */ |
534 | 534 | ||
535 | p=s->s3->client_random; | 535 | p=s->s3->client_random; |
536 | Time=time(NULL); /* Time */ | 536 | Time=(unsigned long)time(NULL); /* Time */ |
537 | l2n(Time,p); | 537 | l2n(Time,p); |
538 | if(RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) | 538 | if(RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) |
539 | goto err; | 539 | goto err; |
@@ -567,7 +567,7 @@ static int ssl3_client_hello(SSL *s) | |||
567 | } | 567 | } |
568 | 568 | ||
569 | /* Ciphers supported */ | 569 | /* Ciphers supported */ |
570 | i=ssl_cipher_list_to_bytes(s,SSL_get_ciphers(s),&(p[2])); | 570 | i=ssl_cipher_list_to_bytes(s,SSL_get_ciphers(s),&(p[2]),0); |
571 | if (i == 0) | 571 | if (i == 0) |
572 | { | 572 | { |
573 | SSLerr(SSL_F_SSL3_CLIENT_HELLO,SSL_R_NO_CIPHERS_AVAILABLE); | 573 | SSLerr(SSL_F_SSL3_CLIENT_HELLO,SSL_R_NO_CIPHERS_AVAILABLE); |
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 9bf1dbec06..a77588e725 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
@@ -835,7 +835,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={ | |||
835 | TLS1_TXT_RSA_WITH_AES_128_SHA, | 835 | TLS1_TXT_RSA_WITH_AES_128_SHA, |
836 | TLS1_CK_RSA_WITH_AES_128_SHA, | 836 | TLS1_CK_RSA_WITH_AES_128_SHA, |
837 | SSL_kRSA|SSL_aRSA|SSL_AES|SSL_SHA |SSL_TLSV1, | 837 | SSL_kRSA|SSL_aRSA|SSL_AES|SSL_SHA |SSL_TLSV1, |
838 | SSL_NOT_EXP|SSL_MEDIUM|SSL_FIPS, | 838 | SSL_NOT_EXP|SSL_HIGH|SSL_FIPS, |
839 | 0, | 839 | 0, |
840 | 128, | 840 | 128, |
841 | 128, | 841 | 128, |
@@ -848,7 +848,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={ | |||
848 | TLS1_TXT_DH_DSS_WITH_AES_128_SHA, | 848 | TLS1_TXT_DH_DSS_WITH_AES_128_SHA, |
849 | TLS1_CK_DH_DSS_WITH_AES_128_SHA, | 849 | TLS1_CK_DH_DSS_WITH_AES_128_SHA, |
850 | SSL_kDHd|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1, | 850 | SSL_kDHd|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1, |
851 | SSL_NOT_EXP|SSL_MEDIUM|SSL_FIPS, | 851 | SSL_NOT_EXP|SSL_HIGH|SSL_FIPS, |
852 | 0, | 852 | 0, |
853 | 128, | 853 | 128, |
854 | 128, | 854 | 128, |
@@ -861,7 +861,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={ | |||
861 | TLS1_TXT_DH_RSA_WITH_AES_128_SHA, | 861 | TLS1_TXT_DH_RSA_WITH_AES_128_SHA, |
862 | TLS1_CK_DH_RSA_WITH_AES_128_SHA, | 862 | TLS1_CK_DH_RSA_WITH_AES_128_SHA, |
863 | SSL_kDHr|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1, | 863 | SSL_kDHr|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1, |
864 | SSL_NOT_EXP|SSL_MEDIUM|SSL_FIPS, | 864 | SSL_NOT_EXP|SSL_HIGH|SSL_FIPS, |
865 | 0, | 865 | 0, |
866 | 128, | 866 | 128, |
867 | 128, | 867 | 128, |
@@ -874,7 +874,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={ | |||
874 | TLS1_TXT_DHE_DSS_WITH_AES_128_SHA, | 874 | TLS1_TXT_DHE_DSS_WITH_AES_128_SHA, |
875 | TLS1_CK_DHE_DSS_WITH_AES_128_SHA, | 875 | TLS1_CK_DHE_DSS_WITH_AES_128_SHA, |
876 | SSL_kEDH|SSL_aDSS|SSL_AES|SSL_SHA|SSL_TLSV1, | 876 | SSL_kEDH|SSL_aDSS|SSL_AES|SSL_SHA|SSL_TLSV1, |
877 | SSL_NOT_EXP|SSL_MEDIUM|SSL_FIPS, | 877 | SSL_NOT_EXP|SSL_HIGH|SSL_FIPS, |
878 | 0, | 878 | 0, |
879 | 128, | 879 | 128, |
880 | 128, | 880 | 128, |
@@ -887,7 +887,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={ | |||
887 | TLS1_TXT_DHE_RSA_WITH_AES_128_SHA, | 887 | TLS1_TXT_DHE_RSA_WITH_AES_128_SHA, |
888 | TLS1_CK_DHE_RSA_WITH_AES_128_SHA, | 888 | TLS1_CK_DHE_RSA_WITH_AES_128_SHA, |
889 | SSL_kEDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1, | 889 | SSL_kEDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1, |
890 | SSL_NOT_EXP|SSL_MEDIUM|SSL_FIPS, | 890 | SSL_NOT_EXP|SSL_HIGH|SSL_FIPS, |
891 | 0, | 891 | 0, |
892 | 128, | 892 | 128, |
893 | 128, | 893 | 128, |
@@ -900,7 +900,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={ | |||
900 | TLS1_TXT_ADH_WITH_AES_128_SHA, | 900 | TLS1_TXT_ADH_WITH_AES_128_SHA, |
901 | TLS1_CK_ADH_WITH_AES_128_SHA, | 901 | TLS1_CK_ADH_WITH_AES_128_SHA, |
902 | SSL_kEDH|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1, | 902 | SSL_kEDH|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1, |
903 | SSL_NOT_EXP|SSL_MEDIUM|SSL_FIPS, | 903 | SSL_NOT_EXP|SSL_HIGH|SSL_FIPS, |
904 | 0, | 904 | 0, |
905 | 128, | 905 | 128, |
906 | 128, | 906 | 128, |
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index c4a1a71523..36fc39d7f8 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
@@ -173,7 +173,7 @@ SSL_METHOD *SSLv3_server_method(void) | |||
173 | int ssl3_accept(SSL *s) | 173 | int ssl3_accept(SSL *s) |
174 | { | 174 | { |
175 | BUF_MEM *buf; | 175 | BUF_MEM *buf; |
176 | unsigned long l,Time=time(NULL); | 176 | unsigned long l,Time=(unsigned long)time(NULL); |
177 | void (*cb)(const SSL *ssl,int type,int val)=NULL; | 177 | void (*cb)(const SSL *ssl,int type,int val)=NULL; |
178 | long num1; | 178 | long num1; |
179 | int ret= -1; | 179 | int ret= -1; |
@@ -954,7 +954,7 @@ static int ssl3_send_server_hello(SSL *s) | |||
954 | { | 954 | { |
955 | buf=(unsigned char *)s->init_buf->data; | 955 | buf=(unsigned char *)s->init_buf->data; |
956 | p=s->s3->server_random; | 956 | p=s->s3->server_random; |
957 | Time=time(NULL); /* Time */ | 957 | Time=(unsigned long)time(NULL); /* Time */ |
958 | l2n(Time,p); | 958 | l2n(Time,p); |
959 | if(RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) | 959 | if(RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) |
960 | return -1; | 960 | return -1; |
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 3161f532cf..99e188086b 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
@@ -467,7 +467,7 @@ typedef struct ssl_session_st | |||
467 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L | 467 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L |
468 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x00000010L | 468 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x00000010L |
469 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L | 469 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L |
470 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x00000040L | 470 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x00000040L /* no effect since 0.9.7h and 0.9.8b */ |
471 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L | 471 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L |
472 | #define SSL_OP_TLS_D5_BUG 0x00000100L | 472 | #define SSL_OP_TLS_D5_BUG 0x00000100L |
473 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L | 473 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L |
@@ -1567,6 +1567,7 @@ void ERR_load_SSL_strings(void); | |||
1567 | #define SSL_F_SSL_CTRL 232 | 1567 | #define SSL_F_SSL_CTRL 232 |
1568 | #define SSL_F_SSL_CTX_CHECK_PRIVATE_KEY 168 | 1568 | #define SSL_F_SSL_CTX_CHECK_PRIVATE_KEY 168 |
1569 | #define SSL_F_SSL_CTX_NEW 169 | 1569 | #define SSL_F_SSL_CTX_NEW 169 |
1570 | #define SSL_F_SSL_CTX_SET_CIPHER_LIST 269 | ||
1570 | #define SSL_F_SSL_CTX_SET_PURPOSE 226 | 1571 | #define SSL_F_SSL_CTX_SET_PURPOSE 226 |
1571 | #define SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT 219 | 1572 | #define SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT 219 |
1572 | #define SSL_F_SSL_CTX_SET_SSL_VERSION 170 | 1573 | #define SSL_F_SSL_CTX_SET_SSL_VERSION 170 |
@@ -1596,6 +1597,7 @@ void ERR_load_SSL_strings(void); | |||
1596 | #define SSL_F_SSL_SESSION_PRINT_FP 190 | 1597 | #define SSL_F_SSL_SESSION_PRINT_FP 190 |
1597 | #define SSL_F_SSL_SESS_CERT_NEW 225 | 1598 | #define SSL_F_SSL_SESS_CERT_NEW 225 |
1598 | #define SSL_F_SSL_SET_CERT 191 | 1599 | #define SSL_F_SSL_SET_CERT 191 |
1600 | #define SSL_F_SSL_SET_CIPHER_LIST 271 | ||
1599 | #define SSL_F_SSL_SET_FD 192 | 1601 | #define SSL_F_SSL_SET_FD 192 |
1600 | #define SSL_F_SSL_SET_PKEY 193 | 1602 | #define SSL_F_SSL_SET_PKEY 193 |
1601 | #define SSL_F_SSL_SET_PURPOSE 227 | 1603 | #define SSL_F_SSL_SET_PURPOSE 227 |
@@ -1674,40 +1676,39 @@ void ERR_load_SSL_strings(void); | |||
1674 | #define SSL_R_DATA_BETWEEN_CCS_AND_FINISHED 145 | 1676 | #define SSL_R_DATA_BETWEEN_CCS_AND_FINISHED 145 |
1675 | #define SSL_R_DATA_LENGTH_TOO_LONG 146 | 1677 | #define SSL_R_DATA_LENGTH_TOO_LONG 146 |
1676 | #define SSL_R_DECRYPTION_FAILED 147 | 1678 | #define SSL_R_DECRYPTION_FAILED 147 |
1677 | #define SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC 1109 | 1679 | #define SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC 281 |
1678 | #define SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG 148 | 1680 | #define SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG 148 |
1679 | #define SSL_R_DIGEST_CHECK_FAILED 149 | 1681 | #define SSL_R_DIGEST_CHECK_FAILED 149 |
1680 | #define SSL_R_ENCRYPTED_LENGTH_TOO_LONG 150 | 1682 | #define SSL_R_ENCRYPTED_LENGTH_TOO_LONG 150 |
1681 | #define SSL_R_ERROR_GENERATING_TMP_RSA_KEY 1092 | 1683 | #define SSL_R_ERROR_GENERATING_TMP_RSA_KEY 282 |
1682 | #define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST 151 | 1684 | #define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST 151 |
1683 | #define SSL_R_EXCESSIVE_MESSAGE_SIZE 152 | 1685 | #define SSL_R_EXCESSIVE_MESSAGE_SIZE 152 |
1684 | #define SSL_R_EXTRA_DATA_IN_MESSAGE 153 | 1686 | #define SSL_R_EXTRA_DATA_IN_MESSAGE 153 |
1685 | #define SSL_R_GOT_A_FIN_BEFORE_A_CCS 154 | 1687 | #define SSL_R_GOT_A_FIN_BEFORE_A_CCS 154 |
1686 | #define SSL_R_HTTPS_PROXY_REQUEST 155 | 1688 | #define SSL_R_HTTPS_PROXY_REQUEST 155 |
1687 | #define SSL_R_HTTP_REQUEST 156 | 1689 | #define SSL_R_HTTP_REQUEST 156 |
1688 | #define SSL_R_ILLEGAL_PADDING 1110 | 1690 | #define SSL_R_ILLEGAL_PADDING 283 |
1689 | #define SSL_R_INVALID_CHALLENGE_LENGTH 158 | 1691 | #define SSL_R_INVALID_CHALLENGE_LENGTH 158 |
1690 | #define SSL_R_INVALID_COMMAND 280 | 1692 | #define SSL_R_INVALID_COMMAND 280 |
1691 | #define SSL_R_INVALID_PURPOSE 278 | 1693 | #define SSL_R_INVALID_PURPOSE 278 |
1692 | #define SSL_R_INVALID_TRUST 279 | 1694 | #define SSL_R_INVALID_TRUST 279 |
1693 | #define SSL_R_KEY_ARG_TOO_LONG 1112 | 1695 | #define SSL_R_KEY_ARG_TOO_LONG 284 |
1694 | #define SSL_R_KRB5 1104 | 1696 | #define SSL_R_KRB5 285 |
1695 | #define SSL_R_KRB5_C_CC_PRINC 1094 | 1697 | #define SSL_R_KRB5_C_CC_PRINC 286 |
1696 | #define SSL_R_KRB5_C_GET_CRED 1095 | 1698 | #define SSL_R_KRB5_C_GET_CRED 287 |
1697 | #define SSL_R_KRB5_C_INIT 1096 | 1699 | #define SSL_R_KRB5_C_INIT 288 |
1698 | #define SSL_R_KRB5_C_MK_REQ 1097 | 1700 | #define SSL_R_KRB5_C_MK_REQ 289 |
1699 | #define SSL_R_KRB5_S_BAD_TICKET 1098 | 1701 | #define SSL_R_KRB5_S_BAD_TICKET 290 |
1700 | #define SSL_R_KRB5_S_INIT 1099 | 1702 | #define SSL_R_KRB5_S_INIT 291 |
1701 | #define SSL_R_KRB5_S_RD_REQ 1108 | 1703 | #define SSL_R_KRB5_S_RD_REQ 292 |
1702 | #define SSL_R_KRB5_S_TKT_EXPIRED 1105 | 1704 | #define SSL_R_KRB5_S_TKT_EXPIRED 293 |
1703 | #define SSL_R_KRB5_S_TKT_NYV 1106 | 1705 | #define SSL_R_KRB5_S_TKT_NYV 294 |
1704 | #define SSL_R_KRB5_S_TKT_SKEW 1107 | 1706 | #define SSL_R_KRB5_S_TKT_SKEW 295 |
1705 | #define SSL_R_LENGTH_MISMATCH 159 | 1707 | #define SSL_R_LENGTH_MISMATCH 159 |
1706 | #define SSL_R_LENGTH_TOO_SHORT 160 | 1708 | #define SSL_R_LENGTH_TOO_SHORT 160 |
1707 | #define SSL_R_LIBRARY_BUG 274 | 1709 | #define SSL_R_LIBRARY_BUG 274 |
1708 | #define SSL_R_LIBRARY_HAS_NO_CIPHERS 161 | 1710 | #define SSL_R_LIBRARY_HAS_NO_CIPHERS 161 |
1709 | #define SSL_R_MASTER_KEY_TOO_LONG 1112 | 1711 | #define SSL_R_MESSAGE_TOO_LONG 296 |
1710 | #define SSL_R_MESSAGE_TOO_LONG 1111 | ||
1711 | #define SSL_R_MISSING_DH_DSA_CERT 162 | 1712 | #define SSL_R_MISSING_DH_DSA_CERT 162 |
1712 | #define SSL_R_MISSING_DH_KEY 163 | 1713 | #define SSL_R_MISSING_DH_KEY 163 |
1713 | #define SSL_R_MISSING_DH_RSA_CERT 164 | 1714 | #define SSL_R_MISSING_DH_RSA_CERT 164 |
@@ -1744,7 +1745,7 @@ void ERR_load_SSL_strings(void); | |||
1744 | #define SSL_R_NULL_SSL_CTX 195 | 1745 | #define SSL_R_NULL_SSL_CTX 195 |
1745 | #define SSL_R_NULL_SSL_METHOD_PASSED 196 | 1746 | #define SSL_R_NULL_SSL_METHOD_PASSED 196 |
1746 | #define SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED 197 | 1747 | #define SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED 197 |
1747 | #define SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE 1115 | 1748 | #define SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE 297 |
1748 | #define SSL_R_PACKET_LENGTH_TOO_LONG 198 | 1749 | #define SSL_R_PACKET_LENGTH_TOO_LONG 198 |
1749 | #define SSL_R_PATH_TOO_LONG 270 | 1750 | #define SSL_R_PATH_TOO_LONG 270 |
1750 | #define SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE 199 | 1751 | #define SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE 199 |
@@ -1763,7 +1764,7 @@ void ERR_load_SSL_strings(void); | |||
1763 | #define SSL_R_READ_WRONG_PACKET_TYPE 212 | 1764 | #define SSL_R_READ_WRONG_PACKET_TYPE 212 |
1764 | #define SSL_R_RECORD_LENGTH_MISMATCH 213 | 1765 | #define SSL_R_RECORD_LENGTH_MISMATCH 213 |
1765 | #define SSL_R_RECORD_TOO_LARGE 214 | 1766 | #define SSL_R_RECORD_TOO_LARGE 214 |
1766 | #define SSL_R_RECORD_TOO_SMALL 1093 | 1767 | #define SSL_R_RECORD_TOO_SMALL 298 |
1767 | #define SSL_R_REQUIRED_CIPHER_MISSING 215 | 1768 | #define SSL_R_REQUIRED_CIPHER_MISSING 215 |
1768 | #define SSL_R_REUSE_CERT_LENGTH_NOT_ZERO 216 | 1769 | #define SSL_R_REUSE_CERT_LENGTH_NOT_ZERO 216 |
1769 | #define SSL_R_REUSE_CERT_TYPE_NOT_ZERO 217 | 1770 | #define SSL_R_REUSE_CERT_TYPE_NOT_ZERO 217 |
@@ -1772,8 +1773,8 @@ void ERR_load_SSL_strings(void); | |||
1772 | #define SSL_R_SHORT_READ 219 | 1773 | #define SSL_R_SHORT_READ 219 |
1773 | #define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220 | 1774 | #define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220 |
1774 | #define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221 | 1775 | #define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221 |
1775 | #define SSL_R_SSL2_CONNECTION_ID_TOO_LONG 1114 | 1776 | #define SSL_R_SSL2_CONNECTION_ID_TOO_LONG 299 |
1776 | #define SSL_R_SSL3_SESSION_ID_TOO_LONG 1113 | 1777 | #define SSL_R_SSL3_SESSION_ID_TOO_LONG 300 |
1777 | #define SSL_R_SSL3_SESSION_ID_TOO_SHORT 222 | 1778 | #define SSL_R_SSL3_SESSION_ID_TOO_SHORT 222 |
1778 | #define SSL_R_SSLV3_ALERT_BAD_CERTIFICATE 1042 | 1779 | #define SSL_R_SSLV3_ALERT_BAD_CERTIFICATE 1042 |
1779 | #define SSL_R_SSLV3_ALERT_BAD_RECORD_MAC 1020 | 1780 | #define SSL_R_SSLV3_ALERT_BAD_RECORD_MAC 1020 |
@@ -1784,20 +1785,15 @@ void ERR_load_SSL_strings(void); | |||
1784 | #define SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE 1040 | 1785 | #define SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE 1040 |
1785 | #define SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER 1047 | 1786 | #define SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER 1047 |
1786 | #define SSL_R_SSLV3_ALERT_NO_CERTIFICATE 1041 | 1787 | #define SSL_R_SSLV3_ALERT_NO_CERTIFICATE 1041 |
1787 | #define SSL_R_SSLV3_ALERT_PEER_ERROR_CERTIFICATE 223 | ||
1788 | #define SSL_R_SSLV3_ALERT_PEER_ERROR_NO_CERTIFICATE 224 | ||
1789 | #define SSL_R_SSLV3_ALERT_PEER_ERROR_NO_CIPHER 225 | ||
1790 | #define SSL_R_SSLV3_ALERT_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE 226 | ||
1791 | #define SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE 1010 | 1788 | #define SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE 1010 |
1792 | #define SSL_R_SSLV3_ALERT_UNKNOWN_REMOTE_ERROR_TYPE 227 | ||
1793 | #define SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE 1043 | 1789 | #define SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE 1043 |
1794 | #define SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION 228 | 1790 | #define SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION 228 |
1795 | #define SSL_R_SSL_HANDSHAKE_FAILURE 229 | 1791 | #define SSL_R_SSL_HANDSHAKE_FAILURE 229 |
1796 | #define SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS 230 | 1792 | #define SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS 230 |
1797 | #define SSL_R_SSL_SESSION_ID_CALLBACK_FAILED 1102 | 1793 | #define SSL_R_SSL_SESSION_ID_CALLBACK_FAILED 301 |
1798 | #define SSL_R_SSL_SESSION_ID_CONFLICT 1103 | 1794 | #define SSL_R_SSL_SESSION_ID_CONFLICT 302 |
1799 | #define SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG 273 | 1795 | #define SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG 273 |
1800 | #define SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH 1101 | 1796 | #define SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH 303 |
1801 | #define SSL_R_SSL_SESSION_ID_IS_DIFFERENT 231 | 1797 | #define SSL_R_SSL_SESSION_ID_IS_DIFFERENT 231 |
1802 | #define SSL_R_TLSV1_ALERT_ACCESS_DENIED 1049 | 1798 | #define SSL_R_TLSV1_ALERT_ACCESS_DENIED 1049 |
1803 | #define SSL_R_TLSV1_ALERT_DECODE_ERROR 1050 | 1799 | #define SSL_R_TLSV1_ALERT_DECODE_ERROR 1050 |
@@ -1838,7 +1834,6 @@ void ERR_load_SSL_strings(void); | |||
1838 | #define SSL_R_UNKNOWN_STATE 255 | 1834 | #define SSL_R_UNKNOWN_STATE 255 |
1839 | #define SSL_R_UNSUPPORTED_CIPHER 256 | 1835 | #define SSL_R_UNSUPPORTED_CIPHER 256 |
1840 | #define SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM 257 | 1836 | #define SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM 257 |
1841 | #define SSL_R_UNSUPPORTED_OPTION 1091 | ||
1842 | #define SSL_R_UNSUPPORTED_PROTOCOL 258 | 1837 | #define SSL_R_UNSUPPORTED_PROTOCOL 258 |
1843 | #define SSL_R_UNSUPPORTED_SSL_VERSION 259 | 1838 | #define SSL_R_UNSUPPORTED_SSL_VERSION 259 |
1844 | #define SSL_R_WRITE_BIO_NOT_SET 260 | 1839 | #define SSL_R_WRITE_BIO_NOT_SET 260 |
diff --git a/src/lib/libssl/ssl_asn1.c b/src/lib/libssl/ssl_asn1.c index 4d5900ad2f..fc5fcce108 100644 --- a/src/lib/libssl/ssl_asn1.c +++ b/src/lib/libssl/ssl_asn1.c | |||
@@ -344,7 +344,7 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char * const *pp, | |||
344 | OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; | 344 | OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; |
345 | } | 345 | } |
346 | else | 346 | else |
347 | ret->time=time(NULL); | 347 | ret->time=(unsigned long)time(NULL); |
348 | 348 | ||
349 | ai.length=0; | 349 | ai.length=0; |
350 | M_ASN1_D2I_get_EXP_opt(aip,d2i_ASN1_INTEGER,2); | 350 | M_ASN1_D2I_get_EXP_opt(aip,d2i_ASN1_INTEGER,2); |
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c index b8b9bc2390..b779e6bb4d 100644 --- a/src/lib/libssl/ssl_cert.c +++ b/src/lib/libssl/ssl_cert.c | |||
@@ -616,14 +616,13 @@ STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file) | |||
616 | BIO *in; | 616 | BIO *in; |
617 | X509 *x=NULL; | 617 | X509 *x=NULL; |
618 | X509_NAME *xn=NULL; | 618 | X509_NAME *xn=NULL; |
619 | STACK_OF(X509_NAME) *ret,*sk; | 619 | STACK_OF(X509_NAME) *ret = NULL,*sk; |
620 | 620 | ||
621 | ret=sk_X509_NAME_new_null(); | ||
622 | sk=sk_X509_NAME_new(xname_cmp); | 621 | sk=sk_X509_NAME_new(xname_cmp); |
623 | 622 | ||
624 | in=BIO_new(BIO_s_file_internal()); | 623 | in=BIO_new(BIO_s_file_internal()); |
625 | 624 | ||
626 | if ((ret == NULL) || (sk == NULL) || (in == NULL)) | 625 | if ((sk == NULL) || (in == NULL)) |
627 | { | 626 | { |
628 | SSLerr(SSL_F_SSL_LOAD_CLIENT_CA_FILE,ERR_R_MALLOC_FAILURE); | 627 | SSLerr(SSL_F_SSL_LOAD_CLIENT_CA_FILE,ERR_R_MALLOC_FAILURE); |
629 | goto err; | 628 | goto err; |
@@ -636,6 +635,15 @@ STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file) | |||
636 | { | 635 | { |
637 | if (PEM_read_bio_X509(in,&x,NULL,NULL) == NULL) | 636 | if (PEM_read_bio_X509(in,&x,NULL,NULL) == NULL) |
638 | break; | 637 | break; |
638 | if (ret == NULL) | ||
639 | { | ||
640 | ret = sk_X509_NAME_new_null(); | ||
641 | if (ret == NULL) | ||
642 | { | ||
643 | SSLerr(SSL_F_SSL_LOAD_CLIENT_CA_FILE,ERR_R_MALLOC_FAILURE); | ||
644 | goto err; | ||
645 | } | ||
646 | } | ||
639 | if ((xn=X509_get_subject_name(x)) == NULL) goto err; | 647 | if ((xn=X509_get_subject_name(x)) == NULL) goto err; |
640 | /* check for duplicates */ | 648 | /* check for duplicates */ |
641 | xn=X509_NAME_dup(xn); | 649 | xn=X509_NAME_dup(xn); |
@@ -658,6 +666,8 @@ err: | |||
658 | if (sk != NULL) sk_X509_NAME_free(sk); | 666 | if (sk != NULL) sk_X509_NAME_free(sk); |
659 | if (in != NULL) BIO_free(in); | 667 | if (in != NULL) BIO_free(in); |
660 | if (x != NULL) X509_free(x); | 668 | if (x != NULL) X509_free(x); |
669 | if (ret != NULL) | ||
670 | ERR_clear_error(); | ||
661 | return(ret); | 671 | return(ret); |
662 | } | 672 | } |
663 | #endif | 673 | #endif |
diff --git a/src/lib/libssl/ssl_ciph.c b/src/lib/libssl/ssl_ciph.c index b68ed81e52..3df5e2fa80 100644 --- a/src/lib/libssl/ssl_ciph.c +++ b/src/lib/libssl/ssl_ciph.c | |||
@@ -700,9 +700,18 @@ static int ssl_cipher_process_rulestr(const char *rule_str, | |||
700 | if (!found) | 700 | if (!found) |
701 | break; /* ignore this entry */ | 701 | break; /* ignore this entry */ |
702 | 702 | ||
703 | algorithms |= ca_list[j]->algorithms; | 703 | /* New algorithms: |
704 | * 1 - any old restrictions apply outside new mask | ||
705 | * 2 - any new restrictions apply outside old mask | ||
706 | * 3 - enforce old & new where masks intersect | ||
707 | */ | ||
708 | algorithms = (algorithms & ~ca_list[j]->mask) | /* 1 */ | ||
709 | (ca_list[j]->algorithms & ~mask) | /* 2 */ | ||
710 | (algorithms & ca_list[j]->algorithms); /* 3 */ | ||
704 | mask |= ca_list[j]->mask; | 711 | mask |= ca_list[j]->mask; |
705 | algo_strength |= ca_list[j]->algo_strength; | 712 | algo_strength = (algo_strength & ~ca_list[j]->mask_strength) | |
713 | (ca_list[j]->algo_strength & ~mask_strength) | | ||
714 | (algo_strength & ca_list[j]->algo_strength); | ||
706 | mask_strength |= ca_list[j]->mask_strength; | 715 | mask_strength |= ca_list[j]->mask_strength; |
707 | 716 | ||
708 | if (!multi) break; | 717 | if (!multi) break; |
@@ -756,7 +765,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *ssl_method, | |||
756 | { | 765 | { |
757 | int ok, num_of_ciphers, num_of_alias_max, num_of_group_aliases; | 766 | int ok, num_of_ciphers, num_of_alias_max, num_of_group_aliases; |
758 | unsigned long disabled_mask; | 767 | unsigned long disabled_mask; |
759 | STACK_OF(SSL_CIPHER) *cipherstack; | 768 | STACK_OF(SSL_CIPHER) *cipherstack, *tmp_cipher_list; |
760 | const char *rule_p; | 769 | const char *rule_p; |
761 | CIPHER_ORDER *co_list = NULL, *head = NULL, *tail = NULL, *curr; | 770 | CIPHER_ORDER *co_list = NULL, *head = NULL, *tail = NULL, *curr; |
762 | SSL_CIPHER **ca_list = NULL; | 771 | SSL_CIPHER **ca_list = NULL; |
@@ -764,7 +773,8 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *ssl_method, | |||
764 | /* | 773 | /* |
765 | * Return with error if nothing to do. | 774 | * Return with error if nothing to do. |
766 | */ | 775 | */ |
767 | if (rule_str == NULL) return(NULL); | 776 | if (rule_str == NULL || cipher_list == NULL || cipher_list_by_id == NULL) |
777 | return NULL; | ||
768 | 778 | ||
769 | if (init_ciphers) | 779 | if (init_ciphers) |
770 | { | 780 | { |
@@ -875,46 +885,18 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *ssl_method, | |||
875 | } | 885 | } |
876 | OPENSSL_free(co_list); /* Not needed any longer */ | 886 | OPENSSL_free(co_list); /* Not needed any longer */ |
877 | 887 | ||
878 | /* | 888 | tmp_cipher_list = sk_SSL_CIPHER_dup(cipherstack); |
879 | * The following passage is a little bit odd. If pointer variables | 889 | if (tmp_cipher_list == NULL) |
880 | * were supplied to hold STACK_OF(SSL_CIPHER) return information, | ||
881 | * the old memory pointed to is free()ed. Then, however, the | ||
882 | * cipher_list entry will be assigned just a copy of the returned | ||
883 | * cipher stack. For cipher_list_by_id a copy of the cipher stack | ||
884 | * will be created. See next comment... | ||
885 | */ | ||
886 | if (cipher_list != NULL) | ||
887 | { | ||
888 | if (*cipher_list != NULL) | ||
889 | sk_SSL_CIPHER_free(*cipher_list); | ||
890 | *cipher_list = cipherstack; | ||
891 | } | ||
892 | |||
893 | if (cipher_list_by_id != NULL) | ||
894 | { | ||
895 | if (*cipher_list_by_id != NULL) | ||
896 | sk_SSL_CIPHER_free(*cipher_list_by_id); | ||
897 | *cipher_list_by_id = sk_SSL_CIPHER_dup(cipherstack); | ||
898 | } | ||
899 | |||
900 | /* | ||
901 | * Now it is getting really strange. If something failed during | ||
902 | * the previous pointer assignment or if one of the pointers was | ||
903 | * not requested, the error condition is met. That might be | ||
904 | * discussable. The strange thing is however that in this case | ||
905 | * the memory "ret" pointed to is "free()ed" and hence the pointer | ||
906 | * cipher_list becomes wild. The memory reserved for | ||
907 | * cipher_list_by_id however is not "free()ed" and stays intact. | ||
908 | */ | ||
909 | if ( (cipher_list_by_id == NULL) || | ||
910 | (*cipher_list_by_id == NULL) || | ||
911 | (cipher_list == NULL) || | ||
912 | (*cipher_list == NULL)) | ||
913 | { | 890 | { |
914 | sk_SSL_CIPHER_free(cipherstack); | 891 | sk_SSL_CIPHER_free(cipherstack); |
915 | return(NULL); | 892 | return NULL; |
916 | } | 893 | } |
917 | 894 | if (*cipher_list != NULL) | |
895 | sk_SSL_CIPHER_free(*cipher_list); | ||
896 | *cipher_list = cipherstack; | ||
897 | if (*cipher_list_by_id != NULL) | ||
898 | sk_SSL_CIPHER_free(*cipher_list_by_id); | ||
899 | *cipher_list_by_id = tmp_cipher_list; | ||
918 | sk_SSL_CIPHER_set_cmp_func(*cipher_list_by_id,ssl_cipher_ptr_id_cmp); | 900 | sk_SSL_CIPHER_set_cmp_func(*cipher_list_by_id,ssl_cipher_ptr_id_cmp); |
919 | 901 | ||
920 | return(cipherstack); | 902 | return(cipherstack); |
diff --git a/src/lib/libssl/ssl_err.c b/src/lib/libssl/ssl_err.c index 29b8ff4788..4bcf591298 100644 --- a/src/lib/libssl/ssl_err.c +++ b/src/lib/libssl/ssl_err.c | |||
@@ -64,384 +64,383 @@ | |||
64 | 64 | ||
65 | /* BEGIN ERROR CODES */ | 65 | /* BEGIN ERROR CODES */ |
66 | #ifndef OPENSSL_NO_ERR | 66 | #ifndef OPENSSL_NO_ERR |
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_SSL,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_SSL,0,reason) | ||
70 | |||
67 | static ERR_STRING_DATA SSL_str_functs[]= | 71 | static ERR_STRING_DATA SSL_str_functs[]= |
68 | { | 72 | { |
69 | {ERR_PACK(0,SSL_F_CLIENT_CERTIFICATE,0), "CLIENT_CERTIFICATE"}, | 73 | {ERR_FUNC(SSL_F_CLIENT_CERTIFICATE), "CLIENT_CERTIFICATE"}, |
70 | {ERR_PACK(0,SSL_F_CLIENT_FINISHED,0), "CLIENT_FINISHED"}, | 74 | {ERR_FUNC(SSL_F_CLIENT_FINISHED), "CLIENT_FINISHED"}, |
71 | {ERR_PACK(0,SSL_F_CLIENT_HELLO,0), "CLIENT_HELLO"}, | 75 | {ERR_FUNC(SSL_F_CLIENT_HELLO), "CLIENT_HELLO"}, |
72 | {ERR_PACK(0,SSL_F_CLIENT_MASTER_KEY,0), "CLIENT_MASTER_KEY"}, | 76 | {ERR_FUNC(SSL_F_CLIENT_MASTER_KEY), "CLIENT_MASTER_KEY"}, |
73 | {ERR_PACK(0,SSL_F_D2I_SSL_SESSION,0), "d2i_SSL_SESSION"}, | 77 | {ERR_FUNC(SSL_F_D2I_SSL_SESSION), "d2i_SSL_SESSION"}, |
74 | {ERR_PACK(0,SSL_F_DO_SSL3_WRITE,0), "DO_SSL3_WRITE"}, | 78 | {ERR_FUNC(SSL_F_DO_SSL3_WRITE), "DO_SSL3_WRITE"}, |
75 | {ERR_PACK(0,SSL_F_GET_CLIENT_FINISHED,0), "GET_CLIENT_FINISHED"}, | 79 | {ERR_FUNC(SSL_F_GET_CLIENT_FINISHED), "GET_CLIENT_FINISHED"}, |
76 | {ERR_PACK(0,SSL_F_GET_CLIENT_HELLO,0), "GET_CLIENT_HELLO"}, | 80 | {ERR_FUNC(SSL_F_GET_CLIENT_HELLO), "GET_CLIENT_HELLO"}, |
77 | {ERR_PACK(0,SSL_F_GET_CLIENT_MASTER_KEY,0), "GET_CLIENT_MASTER_KEY"}, | 81 | {ERR_FUNC(SSL_F_GET_CLIENT_MASTER_KEY), "GET_CLIENT_MASTER_KEY"}, |
78 | {ERR_PACK(0,SSL_F_GET_SERVER_FINISHED,0), "GET_SERVER_FINISHED"}, | 82 | {ERR_FUNC(SSL_F_GET_SERVER_FINISHED), "GET_SERVER_FINISHED"}, |
79 | {ERR_PACK(0,SSL_F_GET_SERVER_HELLO,0), "GET_SERVER_HELLO"}, | 83 | {ERR_FUNC(SSL_F_GET_SERVER_HELLO), "GET_SERVER_HELLO"}, |
80 | {ERR_PACK(0,SSL_F_GET_SERVER_VERIFY,0), "GET_SERVER_VERIFY"}, | 84 | {ERR_FUNC(SSL_F_GET_SERVER_VERIFY), "GET_SERVER_VERIFY"}, |
81 | {ERR_PACK(0,SSL_F_I2D_SSL_SESSION,0), "i2d_SSL_SESSION"}, | 85 | {ERR_FUNC(SSL_F_I2D_SSL_SESSION), "i2d_SSL_SESSION"}, |
82 | {ERR_PACK(0,SSL_F_READ_N,0), "READ_N"}, | 86 | {ERR_FUNC(SSL_F_READ_N), "READ_N"}, |
83 | {ERR_PACK(0,SSL_F_REQUEST_CERTIFICATE,0), "REQUEST_CERTIFICATE"}, | 87 | {ERR_FUNC(SSL_F_REQUEST_CERTIFICATE), "REQUEST_CERTIFICATE"}, |
84 | {ERR_PACK(0,SSL_F_SERVER_FINISH,0), "SERVER_FINISH"}, | 88 | {ERR_FUNC(SSL_F_SERVER_FINISH), "SERVER_FINISH"}, |
85 | {ERR_PACK(0,SSL_F_SERVER_HELLO,0), "SERVER_HELLO"}, | 89 | {ERR_FUNC(SSL_F_SERVER_HELLO), "SERVER_HELLO"}, |
86 | {ERR_PACK(0,SSL_F_SERVER_VERIFY,0), "SERVER_VERIFY"}, | 90 | {ERR_FUNC(SSL_F_SERVER_VERIFY), "SERVER_VERIFY"}, |
87 | {ERR_PACK(0,SSL_F_SSL23_ACCEPT,0), "SSL23_ACCEPT"}, | 91 | {ERR_FUNC(SSL_F_SSL23_ACCEPT), "SSL23_ACCEPT"}, |
88 | {ERR_PACK(0,SSL_F_SSL23_CLIENT_HELLO,0), "SSL23_CLIENT_HELLO"}, | 92 | {ERR_FUNC(SSL_F_SSL23_CLIENT_HELLO), "SSL23_CLIENT_HELLO"}, |
89 | {ERR_PACK(0,SSL_F_SSL23_CONNECT,0), "SSL23_CONNECT"}, | 93 | {ERR_FUNC(SSL_F_SSL23_CONNECT), "SSL23_CONNECT"}, |
90 | {ERR_PACK(0,SSL_F_SSL23_GET_CLIENT_HELLO,0), "SSL23_GET_CLIENT_HELLO"}, | 94 | {ERR_FUNC(SSL_F_SSL23_GET_CLIENT_HELLO), "SSL23_GET_CLIENT_HELLO"}, |
91 | {ERR_PACK(0,SSL_F_SSL23_GET_SERVER_HELLO,0), "SSL23_GET_SERVER_HELLO"}, | 95 | {ERR_FUNC(SSL_F_SSL23_GET_SERVER_HELLO), "SSL23_GET_SERVER_HELLO"}, |
92 | {ERR_PACK(0,SSL_F_SSL23_PEEK,0), "SSL23_PEEK"}, | 96 | {ERR_FUNC(SSL_F_SSL23_PEEK), "SSL23_PEEK"}, |
93 | {ERR_PACK(0,SSL_F_SSL23_READ,0), "SSL23_READ"}, | 97 | {ERR_FUNC(SSL_F_SSL23_READ), "SSL23_READ"}, |
94 | {ERR_PACK(0,SSL_F_SSL23_WRITE,0), "SSL23_WRITE"}, | 98 | {ERR_FUNC(SSL_F_SSL23_WRITE), "SSL23_WRITE"}, |
95 | {ERR_PACK(0,SSL_F_SSL2_ACCEPT,0), "SSL2_ACCEPT"}, | 99 | {ERR_FUNC(SSL_F_SSL2_ACCEPT), "SSL2_ACCEPT"}, |
96 | {ERR_PACK(0,SSL_F_SSL2_CONNECT,0), "SSL2_CONNECT"}, | 100 | {ERR_FUNC(SSL_F_SSL2_CONNECT), "SSL2_CONNECT"}, |
97 | {ERR_PACK(0,SSL_F_SSL2_ENC_INIT,0), "SSL2_ENC_INIT"}, | 101 | {ERR_FUNC(SSL_F_SSL2_ENC_INIT), "SSL2_ENC_INIT"}, |
98 | {ERR_PACK(0,SSL_F_SSL2_GENERATE_KEY_MATERIAL,0), "SSL2_GENERATE_KEY_MATERIAL"}, | 102 | {ERR_FUNC(SSL_F_SSL2_GENERATE_KEY_MATERIAL), "SSL2_GENERATE_KEY_MATERIAL"}, |
99 | {ERR_PACK(0,SSL_F_SSL2_PEEK,0), "SSL2_PEEK"}, | 103 | {ERR_FUNC(SSL_F_SSL2_PEEK), "SSL2_PEEK"}, |
100 | {ERR_PACK(0,SSL_F_SSL2_READ,0), "SSL2_READ"}, | 104 | {ERR_FUNC(SSL_F_SSL2_READ), "SSL2_READ"}, |
101 | {ERR_PACK(0,SSL_F_SSL2_READ_INTERNAL,0), "SSL2_READ_INTERNAL"}, | 105 | {ERR_FUNC(SSL_F_SSL2_READ_INTERNAL), "SSL2_READ_INTERNAL"}, |
102 | {ERR_PACK(0,SSL_F_SSL2_SET_CERTIFICATE,0), "SSL2_SET_CERTIFICATE"}, | 106 | {ERR_FUNC(SSL_F_SSL2_SET_CERTIFICATE), "SSL2_SET_CERTIFICATE"}, |
103 | {ERR_PACK(0,SSL_F_SSL2_WRITE,0), "SSL2_WRITE"}, | 107 | {ERR_FUNC(SSL_F_SSL2_WRITE), "SSL2_WRITE"}, |
104 | {ERR_PACK(0,SSL_F_SSL3_ACCEPT,0), "SSL3_ACCEPT"}, | 108 | {ERR_FUNC(SSL_F_SSL3_ACCEPT), "SSL3_ACCEPT"}, |
105 | {ERR_PACK(0,SSL_F_SSL3_CALLBACK_CTRL,0), "SSL3_CALLBACK_CTRL"}, | 109 | {ERR_FUNC(SSL_F_SSL3_CALLBACK_CTRL), "SSL3_CALLBACK_CTRL"}, |
106 | {ERR_PACK(0,SSL_F_SSL3_CHANGE_CIPHER_STATE,0), "SSL3_CHANGE_CIPHER_STATE"}, | 110 | {ERR_FUNC(SSL_F_SSL3_CHANGE_CIPHER_STATE), "SSL3_CHANGE_CIPHER_STATE"}, |
107 | {ERR_PACK(0,SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM,0), "SSL3_CHECK_CERT_AND_ALGORITHM"}, | 111 | {ERR_FUNC(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM), "SSL3_CHECK_CERT_AND_ALGORITHM"}, |
108 | {ERR_PACK(0,SSL_F_SSL3_CLIENT_HELLO,0), "SSL3_CLIENT_HELLO"}, | 112 | {ERR_FUNC(SSL_F_SSL3_CLIENT_HELLO), "SSL3_CLIENT_HELLO"}, |
109 | {ERR_PACK(0,SSL_F_SSL3_CONNECT,0), "SSL3_CONNECT"}, | 113 | {ERR_FUNC(SSL_F_SSL3_CONNECT), "SSL3_CONNECT"}, |
110 | {ERR_PACK(0,SSL_F_SSL3_CTRL,0), "SSL3_CTRL"}, | 114 | {ERR_FUNC(SSL_F_SSL3_CTRL), "SSL3_CTRL"}, |
111 | {ERR_PACK(0,SSL_F_SSL3_CTX_CTRL,0), "SSL3_CTX_CTRL"}, | 115 | {ERR_FUNC(SSL_F_SSL3_CTX_CTRL), "SSL3_CTX_CTRL"}, |
112 | {ERR_PACK(0,SSL_F_SSL3_ENC,0), "SSL3_ENC"}, | 116 | {ERR_FUNC(SSL_F_SSL3_ENC), "SSL3_ENC"}, |
113 | {ERR_PACK(0,SSL_F_SSL3_GENERATE_KEY_BLOCK,0), "SSL3_GENERATE_KEY_BLOCK"}, | 117 | {ERR_FUNC(SSL_F_SSL3_GENERATE_KEY_BLOCK), "SSL3_GENERATE_KEY_BLOCK"}, |
114 | {ERR_PACK(0,SSL_F_SSL3_GET_CERTIFICATE_REQUEST,0), "SSL3_GET_CERTIFICATE_REQUEST"}, | 118 | {ERR_FUNC(SSL_F_SSL3_GET_CERTIFICATE_REQUEST), "SSL3_GET_CERTIFICATE_REQUEST"}, |
115 | {ERR_PACK(0,SSL_F_SSL3_GET_CERT_VERIFY,0), "SSL3_GET_CERT_VERIFY"}, | 119 | {ERR_FUNC(SSL_F_SSL3_GET_CERT_VERIFY), "SSL3_GET_CERT_VERIFY"}, |
116 | {ERR_PACK(0,SSL_F_SSL3_GET_CLIENT_CERTIFICATE,0), "SSL3_GET_CLIENT_CERTIFICATE"}, | 120 | {ERR_FUNC(SSL_F_SSL3_GET_CLIENT_CERTIFICATE), "SSL3_GET_CLIENT_CERTIFICATE"}, |
117 | {ERR_PACK(0,SSL_F_SSL3_GET_CLIENT_HELLO,0), "SSL3_GET_CLIENT_HELLO"}, | 121 | {ERR_FUNC(SSL_F_SSL3_GET_CLIENT_HELLO), "SSL3_GET_CLIENT_HELLO"}, |
118 | {ERR_PACK(0,SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,0), "SSL3_GET_CLIENT_KEY_EXCHANGE"}, | 122 | {ERR_FUNC(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE), "SSL3_GET_CLIENT_KEY_EXCHANGE"}, |
119 | {ERR_PACK(0,SSL_F_SSL3_GET_FINISHED,0), "SSL3_GET_FINISHED"}, | 123 | {ERR_FUNC(SSL_F_SSL3_GET_FINISHED), "SSL3_GET_FINISHED"}, |
120 | {ERR_PACK(0,SSL_F_SSL3_GET_KEY_EXCHANGE,0), "SSL3_GET_KEY_EXCHANGE"}, | 124 | {ERR_FUNC(SSL_F_SSL3_GET_KEY_EXCHANGE), "SSL3_GET_KEY_EXCHANGE"}, |
121 | {ERR_PACK(0,SSL_F_SSL3_GET_MESSAGE,0), "SSL3_GET_MESSAGE"}, | 125 | {ERR_FUNC(SSL_F_SSL3_GET_MESSAGE), "SSL3_GET_MESSAGE"}, |
122 | {ERR_PACK(0,SSL_F_SSL3_GET_RECORD,0), "SSL3_GET_RECORD"}, | 126 | {ERR_FUNC(SSL_F_SSL3_GET_RECORD), "SSL3_GET_RECORD"}, |
123 | {ERR_PACK(0,SSL_F_SSL3_GET_SERVER_CERTIFICATE,0), "SSL3_GET_SERVER_CERTIFICATE"}, | 127 | {ERR_FUNC(SSL_F_SSL3_GET_SERVER_CERTIFICATE), "SSL3_GET_SERVER_CERTIFICATE"}, |
124 | {ERR_PACK(0,SSL_F_SSL3_GET_SERVER_DONE,0), "SSL3_GET_SERVER_DONE"}, | 128 | {ERR_FUNC(SSL_F_SSL3_GET_SERVER_DONE), "SSL3_GET_SERVER_DONE"}, |
125 | {ERR_PACK(0,SSL_F_SSL3_GET_SERVER_HELLO,0), "SSL3_GET_SERVER_HELLO"}, | 129 | {ERR_FUNC(SSL_F_SSL3_GET_SERVER_HELLO), "SSL3_GET_SERVER_HELLO"}, |
126 | {ERR_PACK(0,SSL_F_SSL3_OUTPUT_CERT_CHAIN,0), "SSL3_OUTPUT_CERT_CHAIN"}, | 130 | {ERR_FUNC(SSL_F_SSL3_OUTPUT_CERT_CHAIN), "SSL3_OUTPUT_CERT_CHAIN"}, |
127 | {ERR_PACK(0,SSL_F_SSL3_PEEK,0), "SSL3_PEEK"}, | 131 | {ERR_FUNC(SSL_F_SSL3_PEEK), "SSL3_PEEK"}, |
128 | {ERR_PACK(0,SSL_F_SSL3_READ_BYTES,0), "SSL3_READ_BYTES"}, | 132 | {ERR_FUNC(SSL_F_SSL3_READ_BYTES), "SSL3_READ_BYTES"}, |
129 | {ERR_PACK(0,SSL_F_SSL3_READ_N,0), "SSL3_READ_N"}, | 133 | {ERR_FUNC(SSL_F_SSL3_READ_N), "SSL3_READ_N"}, |
130 | {ERR_PACK(0,SSL_F_SSL3_SEND_CERTIFICATE_REQUEST,0), "SSL3_SEND_CERTIFICATE_REQUEST"}, | 134 | {ERR_FUNC(SSL_F_SSL3_SEND_CERTIFICATE_REQUEST), "SSL3_SEND_CERTIFICATE_REQUEST"}, |
131 | {ERR_PACK(0,SSL_F_SSL3_SEND_CLIENT_CERTIFICATE,0), "SSL3_SEND_CLIENT_CERTIFICATE"}, | 135 | {ERR_FUNC(SSL_F_SSL3_SEND_CLIENT_CERTIFICATE), "SSL3_SEND_CLIENT_CERTIFICATE"}, |
132 | {ERR_PACK(0,SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE,0), "SSL3_SEND_CLIENT_KEY_EXCHANGE"}, | 136 | {ERR_FUNC(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE), "SSL3_SEND_CLIENT_KEY_EXCHANGE"}, |
133 | {ERR_PACK(0,SSL_F_SSL3_SEND_CLIENT_VERIFY,0), "SSL3_SEND_CLIENT_VERIFY"}, | 137 | {ERR_FUNC(SSL_F_SSL3_SEND_CLIENT_VERIFY), "SSL3_SEND_CLIENT_VERIFY"}, |
134 | {ERR_PACK(0,SSL_F_SSL3_SEND_SERVER_CERTIFICATE,0), "SSL3_SEND_SERVER_CERTIFICATE"}, | 138 | {ERR_FUNC(SSL_F_SSL3_SEND_SERVER_CERTIFICATE), "SSL3_SEND_SERVER_CERTIFICATE"}, |
135 | {ERR_PACK(0,SSL_F_SSL3_SEND_SERVER_HELLO,0), "SSL3_SEND_SERVER_HELLO"}, | 139 | {ERR_FUNC(SSL_F_SSL3_SEND_SERVER_HELLO), "SSL3_SEND_SERVER_HELLO"}, |
136 | {ERR_PACK(0,SSL_F_SSL3_SEND_SERVER_KEY_EXCHANGE,0), "SSL3_SEND_SERVER_KEY_EXCHANGE"}, | 140 | {ERR_FUNC(SSL_F_SSL3_SEND_SERVER_KEY_EXCHANGE), "SSL3_SEND_SERVER_KEY_EXCHANGE"}, |
137 | {ERR_PACK(0,SSL_F_SSL3_SETUP_BUFFERS,0), "SSL3_SETUP_BUFFERS"}, | 141 | {ERR_FUNC(SSL_F_SSL3_SETUP_BUFFERS), "SSL3_SETUP_BUFFERS"}, |
138 | {ERR_PACK(0,SSL_F_SSL3_SETUP_KEY_BLOCK,0), "SSL3_SETUP_KEY_BLOCK"}, | 142 | {ERR_FUNC(SSL_F_SSL3_SETUP_KEY_BLOCK), "SSL3_SETUP_KEY_BLOCK"}, |
139 | {ERR_PACK(0,SSL_F_SSL3_WRITE_BYTES,0), "SSL3_WRITE_BYTES"}, | 143 | {ERR_FUNC(SSL_F_SSL3_WRITE_BYTES), "SSL3_WRITE_BYTES"}, |
140 | {ERR_PACK(0,SSL_F_SSL3_WRITE_PENDING,0), "SSL3_WRITE_PENDING"}, | 144 | {ERR_FUNC(SSL_F_SSL3_WRITE_PENDING), "SSL3_WRITE_PENDING"}, |
141 | {ERR_PACK(0,SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK,0), "SSL_add_dir_cert_subjects_to_stack"}, | 145 | {ERR_FUNC(SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK), "SSL_add_dir_cert_subjects_to_stack"}, |
142 | {ERR_PACK(0,SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK,0), "SSL_add_file_cert_subjects_to_stack"}, | 146 | {ERR_FUNC(SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK), "SSL_add_file_cert_subjects_to_stack"}, |
143 | {ERR_PACK(0,SSL_F_SSL_BAD_METHOD,0), "SSL_BAD_METHOD"}, | 147 | {ERR_FUNC(SSL_F_SSL_BAD_METHOD), "SSL_BAD_METHOD"}, |
144 | {ERR_PACK(0,SSL_F_SSL_BYTES_TO_CIPHER_LIST,0), "SSL_BYTES_TO_CIPHER_LIST"}, | 148 | {ERR_FUNC(SSL_F_SSL_BYTES_TO_CIPHER_LIST), "SSL_BYTES_TO_CIPHER_LIST"}, |
145 | {ERR_PACK(0,SSL_F_SSL_CERT_DUP,0), "SSL_CERT_DUP"}, | 149 | {ERR_FUNC(SSL_F_SSL_CERT_DUP), "SSL_CERT_DUP"}, |
146 | {ERR_PACK(0,SSL_F_SSL_CERT_INST,0), "SSL_CERT_INST"}, | 150 | {ERR_FUNC(SSL_F_SSL_CERT_INST), "SSL_CERT_INST"}, |
147 | {ERR_PACK(0,SSL_F_SSL_CERT_INSTANTIATE,0), "SSL_CERT_INSTANTIATE"}, | 151 | {ERR_FUNC(SSL_F_SSL_CERT_INSTANTIATE), "SSL_CERT_INSTANTIATE"}, |
148 | {ERR_PACK(0,SSL_F_SSL_CERT_NEW,0), "SSL_CERT_NEW"}, | 152 | {ERR_FUNC(SSL_F_SSL_CERT_NEW), "SSL_CERT_NEW"}, |
149 | {ERR_PACK(0,SSL_F_SSL_CHECK_PRIVATE_KEY,0), "SSL_check_private_key"}, | 153 | {ERR_FUNC(SSL_F_SSL_CHECK_PRIVATE_KEY), "SSL_check_private_key"}, |
150 | {ERR_PACK(0,SSL_F_SSL_CIPHER_PROCESS_RULESTR,0), "SSL_CIPHER_PROCESS_RULESTR"}, | 154 | {ERR_FUNC(SSL_F_SSL_CIPHER_PROCESS_RULESTR), "SSL_CIPHER_PROCESS_RULESTR"}, |
151 | {ERR_PACK(0,SSL_F_SSL_CIPHER_STRENGTH_SORT,0), "SSL_CIPHER_STRENGTH_SORT"}, | 155 | {ERR_FUNC(SSL_F_SSL_CIPHER_STRENGTH_SORT), "SSL_CIPHER_STRENGTH_SORT"}, |
152 | {ERR_PACK(0,SSL_F_SSL_CLEAR,0), "SSL_clear"}, | 156 | {ERR_FUNC(SSL_F_SSL_CLEAR), "SSL_clear"}, |
153 | {ERR_PACK(0,SSL_F_SSL_COMP_ADD_COMPRESSION_METHOD,0), "SSL_COMP_add_compression_method"}, | 157 | {ERR_FUNC(SSL_F_SSL_COMP_ADD_COMPRESSION_METHOD), "SSL_COMP_add_compression_method"}, |
154 | {ERR_PACK(0,SSL_F_SSL_CREATE_CIPHER_LIST,0), "SSL_CREATE_CIPHER_LIST"}, | 158 | {ERR_FUNC(SSL_F_SSL_CREATE_CIPHER_LIST), "SSL_CREATE_CIPHER_LIST"}, |
155 | {ERR_PACK(0,SSL_F_SSL_CTRL,0), "SSL_ctrl"}, | 159 | {ERR_FUNC(SSL_F_SSL_CTRL), "SSL_ctrl"}, |
156 | {ERR_PACK(0,SSL_F_SSL_CTX_CHECK_PRIVATE_KEY,0), "SSL_CTX_check_private_key"}, | 160 | {ERR_FUNC(SSL_F_SSL_CTX_CHECK_PRIVATE_KEY), "SSL_CTX_check_private_key"}, |
157 | {ERR_PACK(0,SSL_F_SSL_CTX_NEW,0), "SSL_CTX_new"}, | 161 | {ERR_FUNC(SSL_F_SSL_CTX_NEW), "SSL_CTX_new"}, |
158 | {ERR_PACK(0,SSL_F_SSL_CTX_SET_PURPOSE,0), "SSL_CTX_set_purpose"}, | 162 | {ERR_FUNC(SSL_F_SSL_CTX_SET_CIPHER_LIST), "SSL_CTX_set_cipher_list"}, |
159 | {ERR_PACK(0,SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT,0), "SSL_CTX_set_session_id_context"}, | 163 | {ERR_FUNC(SSL_F_SSL_CTX_SET_PURPOSE), "SSL_CTX_set_purpose"}, |
160 | {ERR_PACK(0,SSL_F_SSL_CTX_SET_SSL_VERSION,0), "SSL_CTX_set_ssl_version"}, | 164 | {ERR_FUNC(SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT), "SSL_CTX_set_session_id_context"}, |
161 | {ERR_PACK(0,SSL_F_SSL_CTX_SET_TRUST,0), "SSL_CTX_set_trust"}, | 165 | {ERR_FUNC(SSL_F_SSL_CTX_SET_SSL_VERSION), "SSL_CTX_set_ssl_version"}, |
162 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_CERTIFICATE,0), "SSL_CTX_use_certificate"}, | 166 | {ERR_FUNC(SSL_F_SSL_CTX_SET_TRUST), "SSL_CTX_set_trust"}, |
163 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_CERTIFICATE_ASN1,0), "SSL_CTX_use_certificate_ASN1"}, | 167 | {ERR_FUNC(SSL_F_SSL_CTX_USE_CERTIFICATE), "SSL_CTX_use_certificate"}, |
164 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE,0), "SSL_CTX_use_certificate_chain_file"}, | 168 | {ERR_FUNC(SSL_F_SSL_CTX_USE_CERTIFICATE_ASN1), "SSL_CTX_use_certificate_ASN1"}, |
165 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_CERTIFICATE_FILE,0), "SSL_CTX_use_certificate_file"}, | 169 | {ERR_FUNC(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE), "SSL_CTX_use_certificate_chain_file"}, |
166 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_PRIVATEKEY,0), "SSL_CTX_use_PrivateKey"}, | 170 | {ERR_FUNC(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE), "SSL_CTX_use_certificate_file"}, |
167 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_PRIVATEKEY_ASN1,0), "SSL_CTX_use_PrivateKey_ASN1"}, | 171 | {ERR_FUNC(SSL_F_SSL_CTX_USE_PRIVATEKEY), "SSL_CTX_use_PrivateKey"}, |
168 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE,0), "SSL_CTX_use_PrivateKey_file"}, | 172 | {ERR_FUNC(SSL_F_SSL_CTX_USE_PRIVATEKEY_ASN1), "SSL_CTX_use_PrivateKey_ASN1"}, |
169 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_RSAPRIVATEKEY,0), "SSL_CTX_use_RSAPrivateKey"}, | 173 | {ERR_FUNC(SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE), "SSL_CTX_use_PrivateKey_file"}, |
170 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_ASN1,0), "SSL_CTX_use_RSAPrivateKey_ASN1"}, | 174 | {ERR_FUNC(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY), "SSL_CTX_use_RSAPrivateKey"}, |
171 | {ERR_PACK(0,SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE,0), "SSL_CTX_use_RSAPrivateKey_file"}, | 175 | {ERR_FUNC(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_ASN1), "SSL_CTX_use_RSAPrivateKey_ASN1"}, |
172 | {ERR_PACK(0,SSL_F_SSL_DO_HANDSHAKE,0), "SSL_do_handshake"}, | 176 | {ERR_FUNC(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE), "SSL_CTX_use_RSAPrivateKey_file"}, |
173 | {ERR_PACK(0,SSL_F_SSL_GET_NEW_SESSION,0), "SSL_GET_NEW_SESSION"}, | 177 | {ERR_FUNC(SSL_F_SSL_DO_HANDSHAKE), "SSL_do_handshake"}, |
174 | {ERR_PACK(0,SSL_F_SSL_GET_PREV_SESSION,0), "SSL_GET_PREV_SESSION"}, | 178 | {ERR_FUNC(SSL_F_SSL_GET_NEW_SESSION), "SSL_GET_NEW_SESSION"}, |
175 | {ERR_PACK(0,SSL_F_SSL_GET_SERVER_SEND_CERT,0), "SSL_GET_SERVER_SEND_CERT"}, | 179 | {ERR_FUNC(SSL_F_SSL_GET_PREV_SESSION), "SSL_GET_PREV_SESSION"}, |
176 | {ERR_PACK(0,SSL_F_SSL_GET_SIGN_PKEY,0), "SSL_GET_SIGN_PKEY"}, | 180 | {ERR_FUNC(SSL_F_SSL_GET_SERVER_SEND_CERT), "SSL_GET_SERVER_SEND_CERT"}, |
177 | {ERR_PACK(0,SSL_F_SSL_INIT_WBIO_BUFFER,0), "SSL_INIT_WBIO_BUFFER"}, | 181 | {ERR_FUNC(SSL_F_SSL_GET_SIGN_PKEY), "SSL_GET_SIGN_PKEY"}, |
178 | {ERR_PACK(0,SSL_F_SSL_LOAD_CLIENT_CA_FILE,0), "SSL_load_client_CA_file"}, | 182 | {ERR_FUNC(SSL_F_SSL_INIT_WBIO_BUFFER), "SSL_INIT_WBIO_BUFFER"}, |
179 | {ERR_PACK(0,SSL_F_SSL_NEW,0), "SSL_new"}, | 183 | {ERR_FUNC(SSL_F_SSL_LOAD_CLIENT_CA_FILE), "SSL_load_client_CA_file"}, |
180 | {ERR_PACK(0,SSL_F_SSL_READ,0), "SSL_read"}, | 184 | {ERR_FUNC(SSL_F_SSL_NEW), "SSL_new"}, |
181 | {ERR_PACK(0,SSL_F_SSL_RSA_PRIVATE_DECRYPT,0), "SSL_RSA_PRIVATE_DECRYPT"}, | 185 | {ERR_FUNC(SSL_F_SSL_READ), "SSL_read"}, |
182 | {ERR_PACK(0,SSL_F_SSL_RSA_PUBLIC_ENCRYPT,0), "SSL_RSA_PUBLIC_ENCRYPT"}, | 186 | {ERR_FUNC(SSL_F_SSL_RSA_PRIVATE_DECRYPT), "SSL_RSA_PRIVATE_DECRYPT"}, |
183 | {ERR_PACK(0,SSL_F_SSL_SESSION_NEW,0), "SSL_SESSION_new"}, | 187 | {ERR_FUNC(SSL_F_SSL_RSA_PUBLIC_ENCRYPT), "SSL_RSA_PUBLIC_ENCRYPT"}, |
184 | {ERR_PACK(0,SSL_F_SSL_SESSION_PRINT_FP,0), "SSL_SESSION_print_fp"}, | 188 | {ERR_FUNC(SSL_F_SSL_SESSION_NEW), "SSL_SESSION_new"}, |
185 | {ERR_PACK(0,SSL_F_SSL_SESS_CERT_NEW,0), "SSL_SESS_CERT_NEW"}, | 189 | {ERR_FUNC(SSL_F_SSL_SESSION_PRINT_FP), "SSL_SESSION_print_fp"}, |
186 | {ERR_PACK(0,SSL_F_SSL_SET_CERT,0), "SSL_SET_CERT"}, | 190 | {ERR_FUNC(SSL_F_SSL_SESS_CERT_NEW), "SSL_SESS_CERT_NEW"}, |
187 | {ERR_PACK(0,SSL_F_SSL_SET_FD,0), "SSL_set_fd"}, | 191 | {ERR_FUNC(SSL_F_SSL_SET_CERT), "SSL_SET_CERT"}, |
188 | {ERR_PACK(0,SSL_F_SSL_SET_PKEY,0), "SSL_SET_PKEY"}, | 192 | {ERR_FUNC(SSL_F_SSL_SET_CIPHER_LIST), "SSL_set_cipher_list"}, |
189 | {ERR_PACK(0,SSL_F_SSL_SET_PURPOSE,0), "SSL_set_purpose"}, | 193 | {ERR_FUNC(SSL_F_SSL_SET_FD), "SSL_set_fd"}, |
190 | {ERR_PACK(0,SSL_F_SSL_SET_RFD,0), "SSL_set_rfd"}, | 194 | {ERR_FUNC(SSL_F_SSL_SET_PKEY), "SSL_SET_PKEY"}, |
191 | {ERR_PACK(0,SSL_F_SSL_SET_SESSION,0), "SSL_set_session"}, | 195 | {ERR_FUNC(SSL_F_SSL_SET_PURPOSE), "SSL_set_purpose"}, |
192 | {ERR_PACK(0,SSL_F_SSL_SET_SESSION_ID_CONTEXT,0), "SSL_set_session_id_context"}, | 196 | {ERR_FUNC(SSL_F_SSL_SET_RFD), "SSL_set_rfd"}, |
193 | {ERR_PACK(0,SSL_F_SSL_SET_TRUST,0), "SSL_set_trust"}, | 197 | {ERR_FUNC(SSL_F_SSL_SET_SESSION), "SSL_set_session"}, |
194 | {ERR_PACK(0,SSL_F_SSL_SET_WFD,0), "SSL_set_wfd"}, | 198 | {ERR_FUNC(SSL_F_SSL_SET_SESSION_ID_CONTEXT), "SSL_set_session_id_context"}, |
195 | {ERR_PACK(0,SSL_F_SSL_SHUTDOWN,0), "SSL_shutdown"}, | 199 | {ERR_FUNC(SSL_F_SSL_SET_TRUST), "SSL_set_trust"}, |
196 | {ERR_PACK(0,SSL_F_SSL_UNDEFINED_CONST_FUNCTION,0), "SSL_UNDEFINED_CONST_FUNCTION"}, | 200 | {ERR_FUNC(SSL_F_SSL_SET_WFD), "SSL_set_wfd"}, |
197 | {ERR_PACK(0,SSL_F_SSL_UNDEFINED_FUNCTION,0), "SSL_UNDEFINED_FUNCTION"}, | 201 | {ERR_FUNC(SSL_F_SSL_SHUTDOWN), "SSL_shutdown"}, |
198 | {ERR_PACK(0,SSL_F_SSL_USE_CERTIFICATE,0), "SSL_use_certificate"}, | 202 | {ERR_FUNC(SSL_F_SSL_UNDEFINED_CONST_FUNCTION), "SSL_UNDEFINED_CONST_FUNCTION"}, |
199 | {ERR_PACK(0,SSL_F_SSL_USE_CERTIFICATE_ASN1,0), "SSL_use_certificate_ASN1"}, | 203 | {ERR_FUNC(SSL_F_SSL_UNDEFINED_FUNCTION), "SSL_UNDEFINED_FUNCTION"}, |
200 | {ERR_PACK(0,SSL_F_SSL_USE_CERTIFICATE_FILE,0), "SSL_use_certificate_file"}, | 204 | {ERR_FUNC(SSL_F_SSL_USE_CERTIFICATE), "SSL_use_certificate"}, |
201 | {ERR_PACK(0,SSL_F_SSL_USE_PRIVATEKEY,0), "SSL_use_PrivateKey"}, | 205 | {ERR_FUNC(SSL_F_SSL_USE_CERTIFICATE_ASN1), "SSL_use_certificate_ASN1"}, |
202 | {ERR_PACK(0,SSL_F_SSL_USE_PRIVATEKEY_ASN1,0), "SSL_use_PrivateKey_ASN1"}, | 206 | {ERR_FUNC(SSL_F_SSL_USE_CERTIFICATE_FILE), "SSL_use_certificate_file"}, |
203 | {ERR_PACK(0,SSL_F_SSL_USE_PRIVATEKEY_FILE,0), "SSL_use_PrivateKey_file"}, | 207 | {ERR_FUNC(SSL_F_SSL_USE_PRIVATEKEY), "SSL_use_PrivateKey"}, |
204 | {ERR_PACK(0,SSL_F_SSL_USE_RSAPRIVATEKEY,0), "SSL_use_RSAPrivateKey"}, | 208 | {ERR_FUNC(SSL_F_SSL_USE_PRIVATEKEY_ASN1), "SSL_use_PrivateKey_ASN1"}, |
205 | {ERR_PACK(0,SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1,0), "SSL_use_RSAPrivateKey_ASN1"}, | 209 | {ERR_FUNC(SSL_F_SSL_USE_PRIVATEKEY_FILE), "SSL_use_PrivateKey_file"}, |
206 | {ERR_PACK(0,SSL_F_SSL_USE_RSAPRIVATEKEY_FILE,0), "SSL_use_RSAPrivateKey_file"}, | 210 | {ERR_FUNC(SSL_F_SSL_USE_RSAPRIVATEKEY), "SSL_use_RSAPrivateKey"}, |
207 | {ERR_PACK(0,SSL_F_SSL_VERIFY_CERT_CHAIN,0), "SSL_VERIFY_CERT_CHAIN"}, | 211 | {ERR_FUNC(SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1), "SSL_use_RSAPrivateKey_ASN1"}, |
208 | {ERR_PACK(0,SSL_F_SSL_WRITE,0), "SSL_write"}, | 212 | {ERR_FUNC(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE), "SSL_use_RSAPrivateKey_file"}, |
209 | {ERR_PACK(0,SSL_F_TLS1_CHANGE_CIPHER_STATE,0), "TLS1_CHANGE_CIPHER_STATE"}, | 213 | {ERR_FUNC(SSL_F_SSL_VERIFY_CERT_CHAIN), "SSL_VERIFY_CERT_CHAIN"}, |
210 | {ERR_PACK(0,SSL_F_TLS1_ENC,0), "TLS1_ENC"}, | 214 | {ERR_FUNC(SSL_F_SSL_WRITE), "SSL_write"}, |
211 | {ERR_PACK(0,SSL_F_TLS1_SETUP_KEY_BLOCK,0), "TLS1_SETUP_KEY_BLOCK"}, | 215 | {ERR_FUNC(SSL_F_TLS1_CHANGE_CIPHER_STATE), "TLS1_CHANGE_CIPHER_STATE"}, |
212 | {ERR_PACK(0,SSL_F_WRITE_PENDING,0), "WRITE_PENDING"}, | 216 | {ERR_FUNC(SSL_F_TLS1_ENC), "TLS1_ENC"}, |
217 | {ERR_FUNC(SSL_F_TLS1_SETUP_KEY_BLOCK), "TLS1_SETUP_KEY_BLOCK"}, | ||
218 | {ERR_FUNC(SSL_F_WRITE_PENDING), "WRITE_PENDING"}, | ||
213 | {0,NULL} | 219 | {0,NULL} |
214 | }; | 220 | }; |
215 | 221 | ||
216 | static ERR_STRING_DATA SSL_str_reasons[]= | 222 | static ERR_STRING_DATA SSL_str_reasons[]= |
217 | { | 223 | { |
218 | {SSL_R_APP_DATA_IN_HANDSHAKE ,"app data in handshake"}, | 224 | {ERR_REASON(SSL_R_APP_DATA_IN_HANDSHAKE) ,"app data in handshake"}, |
219 | {SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT,"attempt to reuse session in different context"}, | 225 | {ERR_REASON(SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT),"attempt to reuse session in different context"}, |
220 | {SSL_R_BAD_ALERT_RECORD ,"bad alert record"}, | 226 | {ERR_REASON(SSL_R_BAD_ALERT_RECORD) ,"bad alert record"}, |
221 | {SSL_R_BAD_AUTHENTICATION_TYPE ,"bad authentication type"}, | 227 | {ERR_REASON(SSL_R_BAD_AUTHENTICATION_TYPE),"bad authentication type"}, |
222 | {SSL_R_BAD_CHANGE_CIPHER_SPEC ,"bad change cipher spec"}, | 228 | {ERR_REASON(SSL_R_BAD_CHANGE_CIPHER_SPEC),"bad change cipher spec"}, |
223 | {SSL_R_BAD_CHECKSUM ,"bad checksum"}, | 229 | {ERR_REASON(SSL_R_BAD_CHECKSUM) ,"bad checksum"}, |
224 | {SSL_R_BAD_DATA_RETURNED_BY_CALLBACK ,"bad data returned by callback"}, | 230 | {ERR_REASON(SSL_R_BAD_DATA_RETURNED_BY_CALLBACK),"bad data returned by callback"}, |
225 | {SSL_R_BAD_DECOMPRESSION ,"bad decompression"}, | 231 | {ERR_REASON(SSL_R_BAD_DECOMPRESSION) ,"bad decompression"}, |
226 | {SSL_R_BAD_DH_G_LENGTH ,"bad dh g length"}, | 232 | {ERR_REASON(SSL_R_BAD_DH_G_LENGTH) ,"bad dh g length"}, |
227 | {SSL_R_BAD_DH_PUB_KEY_LENGTH ,"bad dh pub key length"}, | 233 | {ERR_REASON(SSL_R_BAD_DH_PUB_KEY_LENGTH) ,"bad dh pub key length"}, |
228 | {SSL_R_BAD_DH_P_LENGTH ,"bad dh p length"}, | 234 | {ERR_REASON(SSL_R_BAD_DH_P_LENGTH) ,"bad dh p length"}, |
229 | {SSL_R_BAD_DIGEST_LENGTH ,"bad digest length"}, | 235 | {ERR_REASON(SSL_R_BAD_DIGEST_LENGTH) ,"bad digest length"}, |
230 | {SSL_R_BAD_DSA_SIGNATURE ,"bad dsa signature"}, | 236 | {ERR_REASON(SSL_R_BAD_DSA_SIGNATURE) ,"bad dsa signature"}, |
231 | {SSL_R_BAD_HELLO_REQUEST ,"bad hello request"}, | 237 | {ERR_REASON(SSL_R_BAD_HELLO_REQUEST) ,"bad hello request"}, |
232 | {SSL_R_BAD_LENGTH ,"bad length"}, | 238 | {ERR_REASON(SSL_R_BAD_LENGTH) ,"bad length"}, |
233 | {SSL_R_BAD_MAC_DECODE ,"bad mac decode"}, | 239 | {ERR_REASON(SSL_R_BAD_MAC_DECODE) ,"bad mac decode"}, |
234 | {SSL_R_BAD_MESSAGE_TYPE ,"bad message type"}, | 240 | {ERR_REASON(SSL_R_BAD_MESSAGE_TYPE) ,"bad message type"}, |
235 | {SSL_R_BAD_PACKET_LENGTH ,"bad packet length"}, | 241 | {ERR_REASON(SSL_R_BAD_PACKET_LENGTH) ,"bad packet length"}, |
236 | {SSL_R_BAD_PROTOCOL_VERSION_NUMBER ,"bad protocol version number"}, | 242 | {ERR_REASON(SSL_R_BAD_PROTOCOL_VERSION_NUMBER),"bad protocol version number"}, |
237 | {SSL_R_BAD_RESPONSE_ARGUMENT ,"bad response argument"}, | 243 | {ERR_REASON(SSL_R_BAD_RESPONSE_ARGUMENT) ,"bad response argument"}, |
238 | {SSL_R_BAD_RSA_DECRYPT ,"bad rsa decrypt"}, | 244 | {ERR_REASON(SSL_R_BAD_RSA_DECRYPT) ,"bad rsa decrypt"}, |
239 | {SSL_R_BAD_RSA_ENCRYPT ,"bad rsa encrypt"}, | 245 | {ERR_REASON(SSL_R_BAD_RSA_ENCRYPT) ,"bad rsa encrypt"}, |
240 | {SSL_R_BAD_RSA_E_LENGTH ,"bad rsa e length"}, | 246 | {ERR_REASON(SSL_R_BAD_RSA_E_LENGTH) ,"bad rsa e length"}, |
241 | {SSL_R_BAD_RSA_MODULUS_LENGTH ,"bad rsa modulus length"}, | 247 | {ERR_REASON(SSL_R_BAD_RSA_MODULUS_LENGTH),"bad rsa modulus length"}, |
242 | {SSL_R_BAD_RSA_SIGNATURE ,"bad rsa signature"}, | 248 | {ERR_REASON(SSL_R_BAD_RSA_SIGNATURE) ,"bad rsa signature"}, |
243 | {SSL_R_BAD_SIGNATURE ,"bad signature"}, | 249 | {ERR_REASON(SSL_R_BAD_SIGNATURE) ,"bad signature"}, |
244 | {SSL_R_BAD_SSL_FILETYPE ,"bad ssl filetype"}, | 250 | {ERR_REASON(SSL_R_BAD_SSL_FILETYPE) ,"bad ssl filetype"}, |
245 | {SSL_R_BAD_SSL_SESSION_ID_LENGTH ,"bad ssl session id length"}, | 251 | {ERR_REASON(SSL_R_BAD_SSL_SESSION_ID_LENGTH),"bad ssl session id length"}, |
246 | {SSL_R_BAD_STATE ,"bad state"}, | 252 | {ERR_REASON(SSL_R_BAD_STATE) ,"bad state"}, |
247 | {SSL_R_BAD_WRITE_RETRY ,"bad write retry"}, | 253 | {ERR_REASON(SSL_R_BAD_WRITE_RETRY) ,"bad write retry"}, |
248 | {SSL_R_BIO_NOT_SET ,"bio not set"}, | 254 | {ERR_REASON(SSL_R_BIO_NOT_SET) ,"bio not set"}, |
249 | {SSL_R_BLOCK_CIPHER_PAD_IS_WRONG ,"block cipher pad is wrong"}, | 255 | {ERR_REASON(SSL_R_BLOCK_CIPHER_PAD_IS_WRONG),"block cipher pad is wrong"}, |
250 | {SSL_R_BN_LIB ,"bn lib"}, | 256 | {ERR_REASON(SSL_R_BN_LIB) ,"bn lib"}, |
251 | {SSL_R_CA_DN_LENGTH_MISMATCH ,"ca dn length mismatch"}, | 257 | {ERR_REASON(SSL_R_CA_DN_LENGTH_MISMATCH) ,"ca dn length mismatch"}, |
252 | {SSL_R_CA_DN_TOO_LONG ,"ca dn too long"}, | 258 | {ERR_REASON(SSL_R_CA_DN_TOO_LONG) ,"ca dn too long"}, |
253 | {SSL_R_CCS_RECEIVED_EARLY ,"ccs received early"}, | 259 | {ERR_REASON(SSL_R_CCS_RECEIVED_EARLY) ,"ccs received early"}, |
254 | {SSL_R_CERTIFICATE_VERIFY_FAILED ,"certificate verify failed"}, | 260 | {ERR_REASON(SSL_R_CERTIFICATE_VERIFY_FAILED),"certificate verify failed"}, |
255 | {SSL_R_CERT_LENGTH_MISMATCH ,"cert length mismatch"}, | 261 | {ERR_REASON(SSL_R_CERT_LENGTH_MISMATCH) ,"cert length mismatch"}, |
256 | {SSL_R_CHALLENGE_IS_DIFFERENT ,"challenge is different"}, | 262 | {ERR_REASON(SSL_R_CHALLENGE_IS_DIFFERENT),"challenge is different"}, |
257 | {SSL_R_CIPHER_CODE_WRONG_LENGTH ,"cipher code wrong length"}, | 263 | {ERR_REASON(SSL_R_CIPHER_CODE_WRONG_LENGTH),"cipher code wrong length"}, |
258 | {SSL_R_CIPHER_OR_HASH_UNAVAILABLE ,"cipher or hash unavailable"}, | 264 | {ERR_REASON(SSL_R_CIPHER_OR_HASH_UNAVAILABLE),"cipher or hash unavailable"}, |
259 | {SSL_R_CIPHER_TABLE_SRC_ERROR ,"cipher table src error"}, | 265 | {ERR_REASON(SSL_R_CIPHER_TABLE_SRC_ERROR),"cipher table src error"}, |
260 | {SSL_R_COMPRESSED_LENGTH_TOO_LONG ,"compressed length too long"}, | 266 | {ERR_REASON(SSL_R_COMPRESSED_LENGTH_TOO_LONG),"compressed length too long"}, |
261 | {SSL_R_COMPRESSION_FAILURE ,"compression failure"}, | 267 | {ERR_REASON(SSL_R_COMPRESSION_FAILURE) ,"compression failure"}, |
262 | {SSL_R_COMPRESSION_LIBRARY_ERROR ,"compression library error"}, | 268 | {ERR_REASON(SSL_R_COMPRESSION_LIBRARY_ERROR),"compression library error"}, |
263 | {SSL_R_CONNECTION_ID_IS_DIFFERENT ,"connection id is different"}, | 269 | {ERR_REASON(SSL_R_CONNECTION_ID_IS_DIFFERENT),"connection id is different"}, |
264 | {SSL_R_CONNECTION_TYPE_NOT_SET ,"connection type not set"}, | 270 | {ERR_REASON(SSL_R_CONNECTION_TYPE_NOT_SET),"connection type not set"}, |
265 | {SSL_R_DATA_BETWEEN_CCS_AND_FINISHED ,"data between ccs and finished"}, | 271 | {ERR_REASON(SSL_R_DATA_BETWEEN_CCS_AND_FINISHED),"data between ccs and finished"}, |
266 | {SSL_R_DATA_LENGTH_TOO_LONG ,"data length too long"}, | 272 | {ERR_REASON(SSL_R_DATA_LENGTH_TOO_LONG) ,"data length too long"}, |
267 | {SSL_R_DECRYPTION_FAILED ,"decryption failed"}, | 273 | {ERR_REASON(SSL_R_DECRYPTION_FAILED) ,"decryption failed"}, |
268 | {SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC,"decryption failed or bad record mac"}, | 274 | {ERR_REASON(SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC),"decryption failed or bad record mac"}, |
269 | {SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG ,"dh public value length is wrong"}, | 275 | {ERR_REASON(SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG),"dh public value length is wrong"}, |
270 | {SSL_R_DIGEST_CHECK_FAILED ,"digest check failed"}, | 276 | {ERR_REASON(SSL_R_DIGEST_CHECK_FAILED) ,"digest check failed"}, |
271 | {SSL_R_ENCRYPTED_LENGTH_TOO_LONG ,"encrypted length too long"}, | 277 | {ERR_REASON(SSL_R_ENCRYPTED_LENGTH_TOO_LONG),"encrypted length too long"}, |
272 | {SSL_R_ERROR_GENERATING_TMP_RSA_KEY ,"error generating tmp rsa key"}, | 278 | {ERR_REASON(SSL_R_ERROR_GENERATING_TMP_RSA_KEY),"error generating tmp rsa key"}, |
273 | {SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST ,"error in received cipher list"}, | 279 | {ERR_REASON(SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST),"error in received cipher list"}, |
274 | {SSL_R_EXCESSIVE_MESSAGE_SIZE ,"excessive message size"}, | 280 | {ERR_REASON(SSL_R_EXCESSIVE_MESSAGE_SIZE),"excessive message size"}, |
275 | {SSL_R_EXTRA_DATA_IN_MESSAGE ,"extra data in message"}, | 281 | {ERR_REASON(SSL_R_EXTRA_DATA_IN_MESSAGE) ,"extra data in message"}, |
276 | {SSL_R_GOT_A_FIN_BEFORE_A_CCS ,"got a fin before a ccs"}, | 282 | {ERR_REASON(SSL_R_GOT_A_FIN_BEFORE_A_CCS),"got a fin before a ccs"}, |
277 | {SSL_R_HTTPS_PROXY_REQUEST ,"https proxy request"}, | 283 | {ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST) ,"https proxy request"}, |
278 | {SSL_R_HTTP_REQUEST ,"http request"}, | 284 | {ERR_REASON(SSL_R_HTTP_REQUEST) ,"http request"}, |
279 | {SSL_R_ILLEGAL_PADDING ,"illegal padding"}, | 285 | {ERR_REASON(SSL_R_ILLEGAL_PADDING) ,"illegal padding"}, |
280 | {SSL_R_INVALID_CHALLENGE_LENGTH ,"invalid challenge length"}, | 286 | {ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH),"invalid challenge length"}, |
281 | {SSL_R_INVALID_COMMAND ,"invalid command"}, | 287 | {ERR_REASON(SSL_R_INVALID_COMMAND) ,"invalid command"}, |
282 | {SSL_R_INVALID_PURPOSE ,"invalid purpose"}, | 288 | {ERR_REASON(SSL_R_INVALID_PURPOSE) ,"invalid purpose"}, |
283 | {SSL_R_INVALID_TRUST ,"invalid trust"}, | 289 | {ERR_REASON(SSL_R_INVALID_TRUST) ,"invalid trust"}, |
284 | {SSL_R_KEY_ARG_TOO_LONG ,"key arg too long"}, | 290 | {ERR_REASON(SSL_R_KEY_ARG_TOO_LONG) ,"key arg too long"}, |
285 | {SSL_R_KRB5 ,"krb5"}, | 291 | {ERR_REASON(SSL_R_KRB5) ,"krb5"}, |
286 | {SSL_R_KRB5_C_CC_PRINC ,"krb5 client cc principal (no tkt?)"}, | 292 | {ERR_REASON(SSL_R_KRB5_C_CC_PRINC) ,"krb5 client cc principal (no tkt?)"}, |
287 | {SSL_R_KRB5_C_GET_CRED ,"krb5 client get cred"}, | 293 | {ERR_REASON(SSL_R_KRB5_C_GET_CRED) ,"krb5 client get cred"}, |
288 | {SSL_R_KRB5_C_INIT ,"krb5 client init"}, | 294 | {ERR_REASON(SSL_R_KRB5_C_INIT) ,"krb5 client init"}, |
289 | {SSL_R_KRB5_C_MK_REQ ,"krb5 client mk_req (expired tkt?)"}, | 295 | {ERR_REASON(SSL_R_KRB5_C_MK_REQ) ,"krb5 client mk_req (expired tkt?)"}, |
290 | {SSL_R_KRB5_S_BAD_TICKET ,"krb5 server bad ticket"}, | 296 | {ERR_REASON(SSL_R_KRB5_S_BAD_TICKET) ,"krb5 server bad ticket"}, |
291 | {SSL_R_KRB5_S_INIT ,"krb5 server init"}, | 297 | {ERR_REASON(SSL_R_KRB5_S_INIT) ,"krb5 server init"}, |
292 | {SSL_R_KRB5_S_RD_REQ ,"krb5 server rd_req (keytab perms?)"}, | 298 | {ERR_REASON(SSL_R_KRB5_S_RD_REQ) ,"krb5 server rd_req (keytab perms?)"}, |
293 | {SSL_R_KRB5_S_TKT_EXPIRED ,"krb5 server tkt expired"}, | 299 | {ERR_REASON(SSL_R_KRB5_S_TKT_EXPIRED) ,"krb5 server tkt expired"}, |
294 | {SSL_R_KRB5_S_TKT_NYV ,"krb5 server tkt not yet valid"}, | 300 | {ERR_REASON(SSL_R_KRB5_S_TKT_NYV) ,"krb5 server tkt not yet valid"}, |
295 | {SSL_R_KRB5_S_TKT_SKEW ,"krb5 server tkt skew"}, | 301 | {ERR_REASON(SSL_R_KRB5_S_TKT_SKEW) ,"krb5 server tkt skew"}, |
296 | {SSL_R_LENGTH_MISMATCH ,"length mismatch"}, | 302 | {ERR_REASON(SSL_R_LENGTH_MISMATCH) ,"length mismatch"}, |
297 | {SSL_R_LENGTH_TOO_SHORT ,"length too short"}, | 303 | {ERR_REASON(SSL_R_LENGTH_TOO_SHORT) ,"length too short"}, |
298 | {SSL_R_LIBRARY_BUG ,"library bug"}, | 304 | {ERR_REASON(SSL_R_LIBRARY_BUG) ,"library bug"}, |
299 | {SSL_R_LIBRARY_HAS_NO_CIPHERS ,"library has no ciphers"}, | 305 | {ERR_REASON(SSL_R_LIBRARY_HAS_NO_CIPHERS),"library has no ciphers"}, |
300 | {SSL_R_MASTER_KEY_TOO_LONG ,"master key too long"}, | 306 | {ERR_REASON(SSL_R_MESSAGE_TOO_LONG) ,"message too long"}, |
301 | {SSL_R_MESSAGE_TOO_LONG ,"message too long"}, | 307 | {ERR_REASON(SSL_R_MISSING_DH_DSA_CERT) ,"missing dh dsa cert"}, |
302 | {SSL_R_MISSING_DH_DSA_CERT ,"missing dh dsa cert"}, | 308 | {ERR_REASON(SSL_R_MISSING_DH_KEY) ,"missing dh key"}, |
303 | {SSL_R_MISSING_DH_KEY ,"missing dh key"}, | 309 | {ERR_REASON(SSL_R_MISSING_DH_RSA_CERT) ,"missing dh rsa cert"}, |
304 | {SSL_R_MISSING_DH_RSA_CERT ,"missing dh rsa cert"}, | 310 | {ERR_REASON(SSL_R_MISSING_DSA_SIGNING_CERT),"missing dsa signing cert"}, |
305 | {SSL_R_MISSING_DSA_SIGNING_CERT ,"missing dsa signing cert"}, | 311 | {ERR_REASON(SSL_R_MISSING_EXPORT_TMP_DH_KEY),"missing export tmp dh key"}, |
306 | {SSL_R_MISSING_EXPORT_TMP_DH_KEY ,"missing export tmp dh key"}, | 312 | {ERR_REASON(SSL_R_MISSING_EXPORT_TMP_RSA_KEY),"missing export tmp rsa key"}, |
307 | {SSL_R_MISSING_EXPORT_TMP_RSA_KEY ,"missing export tmp rsa key"}, | 313 | {ERR_REASON(SSL_R_MISSING_RSA_CERTIFICATE),"missing rsa certificate"}, |
308 | {SSL_R_MISSING_RSA_CERTIFICATE ,"missing rsa certificate"}, | 314 | {ERR_REASON(SSL_R_MISSING_RSA_ENCRYPTING_CERT),"missing rsa encrypting cert"}, |
309 | {SSL_R_MISSING_RSA_ENCRYPTING_CERT ,"missing rsa encrypting cert"}, | 315 | {ERR_REASON(SSL_R_MISSING_RSA_SIGNING_CERT),"missing rsa signing cert"}, |
310 | {SSL_R_MISSING_RSA_SIGNING_CERT ,"missing rsa signing cert"}, | 316 | {ERR_REASON(SSL_R_MISSING_TMP_DH_KEY) ,"missing tmp dh key"}, |
311 | {SSL_R_MISSING_TMP_DH_KEY ,"missing tmp dh key"}, | 317 | {ERR_REASON(SSL_R_MISSING_TMP_RSA_KEY) ,"missing tmp rsa key"}, |
312 | {SSL_R_MISSING_TMP_RSA_KEY ,"missing tmp rsa key"}, | 318 | {ERR_REASON(SSL_R_MISSING_TMP_RSA_PKEY) ,"missing tmp rsa pkey"}, |
313 | {SSL_R_MISSING_TMP_RSA_PKEY ,"missing tmp rsa pkey"}, | 319 | {ERR_REASON(SSL_R_MISSING_VERIFY_MESSAGE),"missing verify message"}, |
314 | {SSL_R_MISSING_VERIFY_MESSAGE ,"missing verify message"}, | 320 | {ERR_REASON(SSL_R_NON_SSLV2_INITIAL_PACKET),"non sslv2 initial packet"}, |
315 | {SSL_R_NON_SSLV2_INITIAL_PACKET ,"non sslv2 initial packet"}, | 321 | {ERR_REASON(SSL_R_NO_CERTIFICATES_RETURNED),"no certificates returned"}, |
316 | {SSL_R_NO_CERTIFICATES_RETURNED ,"no certificates returned"}, | 322 | {ERR_REASON(SSL_R_NO_CERTIFICATE_ASSIGNED),"no certificate assigned"}, |
317 | {SSL_R_NO_CERTIFICATE_ASSIGNED ,"no certificate assigned"}, | 323 | {ERR_REASON(SSL_R_NO_CERTIFICATE_RETURNED),"no certificate returned"}, |
318 | {SSL_R_NO_CERTIFICATE_RETURNED ,"no certificate returned"}, | 324 | {ERR_REASON(SSL_R_NO_CERTIFICATE_SET) ,"no certificate set"}, |
319 | {SSL_R_NO_CERTIFICATE_SET ,"no certificate set"}, | 325 | {ERR_REASON(SSL_R_NO_CERTIFICATE_SPECIFIED),"no certificate specified"}, |
320 | {SSL_R_NO_CERTIFICATE_SPECIFIED ,"no certificate specified"}, | 326 | {ERR_REASON(SSL_R_NO_CIPHERS_AVAILABLE) ,"no ciphers available"}, |
321 | {SSL_R_NO_CIPHERS_AVAILABLE ,"no ciphers available"}, | 327 | {ERR_REASON(SSL_R_NO_CIPHERS_PASSED) ,"no ciphers passed"}, |
322 | {SSL_R_NO_CIPHERS_PASSED ,"no ciphers passed"}, | 328 | {ERR_REASON(SSL_R_NO_CIPHERS_SPECIFIED) ,"no ciphers specified"}, |
323 | {SSL_R_NO_CIPHERS_SPECIFIED ,"no ciphers specified"}, | 329 | {ERR_REASON(SSL_R_NO_CIPHER_LIST) ,"no cipher list"}, |
324 | {SSL_R_NO_CIPHER_LIST ,"no cipher list"}, | 330 | {ERR_REASON(SSL_R_NO_CIPHER_MATCH) ,"no cipher match"}, |
325 | {SSL_R_NO_CIPHER_MATCH ,"no cipher match"}, | 331 | {ERR_REASON(SSL_R_NO_CLIENT_CERT_RECEIVED),"no client cert received"}, |
326 | {SSL_R_NO_CLIENT_CERT_RECEIVED ,"no client cert received"}, | 332 | {ERR_REASON(SSL_R_NO_COMPRESSION_SPECIFIED),"no compression specified"}, |
327 | {SSL_R_NO_COMPRESSION_SPECIFIED ,"no compression specified"}, | 333 | {ERR_REASON(SSL_R_NO_METHOD_SPECIFIED) ,"no method specified"}, |
328 | {SSL_R_NO_METHOD_SPECIFIED ,"no method specified"}, | 334 | {ERR_REASON(SSL_R_NO_PRIVATEKEY) ,"no privatekey"}, |
329 | {SSL_R_NO_PRIVATEKEY ,"no privatekey"}, | 335 | {ERR_REASON(SSL_R_NO_PRIVATE_KEY_ASSIGNED),"no private key assigned"}, |
330 | {SSL_R_NO_PRIVATE_KEY_ASSIGNED ,"no private key assigned"}, | 336 | {ERR_REASON(SSL_R_NO_PROTOCOLS_AVAILABLE),"no protocols available"}, |
331 | {SSL_R_NO_PROTOCOLS_AVAILABLE ,"no protocols available"}, | 337 | {ERR_REASON(SSL_R_NO_PUBLICKEY) ,"no publickey"}, |
332 | {SSL_R_NO_PUBLICKEY ,"no publickey"}, | 338 | {ERR_REASON(SSL_R_NO_SHARED_CIPHER) ,"no shared cipher"}, |
333 | {SSL_R_NO_SHARED_CIPHER ,"no shared cipher"}, | 339 | {ERR_REASON(SSL_R_NO_VERIFY_CALLBACK) ,"no verify callback"}, |
334 | {SSL_R_NO_VERIFY_CALLBACK ,"no verify callback"}, | 340 | {ERR_REASON(SSL_R_NULL_SSL_CTX) ,"null ssl ctx"}, |
335 | {SSL_R_NULL_SSL_CTX ,"null ssl ctx"}, | 341 | {ERR_REASON(SSL_R_NULL_SSL_METHOD_PASSED),"null ssl method passed"}, |
336 | {SSL_R_NULL_SSL_METHOD_PASSED ,"null ssl method passed"}, | 342 | {ERR_REASON(SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED),"old session cipher not returned"}, |
337 | {SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED ,"old session cipher not returned"}, | 343 | {ERR_REASON(SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE),"only tls allowed in fips mode"}, |
338 | {SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE ,"only tls allowed in fips mode"}, | 344 | {ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG),"packet length too long"}, |
339 | {SSL_R_PACKET_LENGTH_TOO_LONG ,"packet length too long"}, | 345 | {ERR_REASON(SSL_R_PATH_TOO_LONG) ,"path too long"}, |
340 | {SSL_R_PATH_TOO_LONG ,"path too long"}, | 346 | {ERR_REASON(SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE),"peer did not return a certificate"}, |
341 | {SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE ,"peer did not return a certificate"}, | 347 | {ERR_REASON(SSL_R_PEER_ERROR) ,"peer error"}, |
342 | {SSL_R_PEER_ERROR ,"peer error"}, | 348 | {ERR_REASON(SSL_R_PEER_ERROR_CERTIFICATE),"peer error certificate"}, |
343 | {SSL_R_PEER_ERROR_CERTIFICATE ,"peer error certificate"}, | 349 | {ERR_REASON(SSL_R_PEER_ERROR_NO_CERTIFICATE),"peer error no certificate"}, |
344 | {SSL_R_PEER_ERROR_NO_CERTIFICATE ,"peer error no certificate"}, | 350 | {ERR_REASON(SSL_R_PEER_ERROR_NO_CIPHER) ,"peer error no cipher"}, |
345 | {SSL_R_PEER_ERROR_NO_CIPHER ,"peer error no cipher"}, | 351 | {ERR_REASON(SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE),"peer error unsupported certificate type"}, |
346 | {SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE,"peer error unsupported certificate type"}, | 352 | {ERR_REASON(SSL_R_PRE_MAC_LENGTH_TOO_LONG),"pre mac length too long"}, |
347 | {SSL_R_PRE_MAC_LENGTH_TOO_LONG ,"pre mac length too long"}, | 353 | {ERR_REASON(SSL_R_PROBLEMS_MAPPING_CIPHER_FUNCTIONS),"problems mapping cipher functions"}, |
348 | {SSL_R_PROBLEMS_MAPPING_CIPHER_FUNCTIONS ,"problems mapping cipher functions"}, | 354 | {ERR_REASON(SSL_R_PROTOCOL_IS_SHUTDOWN) ,"protocol is shutdown"}, |
349 | {SSL_R_PROTOCOL_IS_SHUTDOWN ,"protocol is shutdown"}, | 355 | {ERR_REASON(SSL_R_PUBLIC_KEY_ENCRYPT_ERROR),"public key encrypt error"}, |
350 | {SSL_R_PUBLIC_KEY_ENCRYPT_ERROR ,"public key encrypt error"}, | 356 | {ERR_REASON(SSL_R_PUBLIC_KEY_IS_NOT_RSA) ,"public key is not rsa"}, |
351 | {SSL_R_PUBLIC_KEY_IS_NOT_RSA ,"public key is not rsa"}, | 357 | {ERR_REASON(SSL_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, |
352 | {SSL_R_PUBLIC_KEY_NOT_RSA ,"public key not rsa"}, | 358 | {ERR_REASON(SSL_R_READ_BIO_NOT_SET) ,"read bio not set"}, |
353 | {SSL_R_READ_BIO_NOT_SET ,"read bio not set"}, | 359 | {ERR_REASON(SSL_R_READ_WRONG_PACKET_TYPE),"read wrong packet type"}, |
354 | {SSL_R_READ_WRONG_PACKET_TYPE ,"read wrong packet type"}, | 360 | {ERR_REASON(SSL_R_RECORD_LENGTH_MISMATCH),"record length mismatch"}, |
355 | {SSL_R_RECORD_LENGTH_MISMATCH ,"record length mismatch"}, | 361 | {ERR_REASON(SSL_R_RECORD_TOO_LARGE) ,"record too large"}, |
356 | {SSL_R_RECORD_TOO_LARGE ,"record too large"}, | 362 | {ERR_REASON(SSL_R_RECORD_TOO_SMALL) ,"record too small"}, |
357 | {SSL_R_RECORD_TOO_SMALL ,"record too small"}, | 363 | {ERR_REASON(SSL_R_REQUIRED_CIPHER_MISSING),"required cipher missing"}, |
358 | {SSL_R_REQUIRED_CIPHER_MISSING ,"required cipher missing"}, | 364 | {ERR_REASON(SSL_R_REUSE_CERT_LENGTH_NOT_ZERO),"reuse cert length not zero"}, |
359 | {SSL_R_REUSE_CERT_LENGTH_NOT_ZERO ,"reuse cert length not zero"}, | 365 | {ERR_REASON(SSL_R_REUSE_CERT_TYPE_NOT_ZERO),"reuse cert type not zero"}, |
360 | {SSL_R_REUSE_CERT_TYPE_NOT_ZERO ,"reuse cert type not zero"}, | 366 | {ERR_REASON(SSL_R_REUSE_CIPHER_LIST_NOT_ZERO),"reuse cipher list not zero"}, |
361 | {SSL_R_REUSE_CIPHER_LIST_NOT_ZERO ,"reuse cipher list not zero"}, | 367 | {ERR_REASON(SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED),"session id context uninitialized"}, |
362 | {SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED ,"session id context uninitialized"}, | 368 | {ERR_REASON(SSL_R_SHORT_READ) ,"short read"}, |
363 | {SSL_R_SHORT_READ ,"short read"}, | 369 | {ERR_REASON(SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE),"signature for non signing certificate"}, |
364 | {SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE,"signature for non signing certificate"}, | 370 | {ERR_REASON(SSL_R_SSL23_DOING_SESSION_ID_REUSE),"ssl23 doing session id reuse"}, |
365 | {SSL_R_SSL23_DOING_SESSION_ID_REUSE ,"ssl23 doing session id reuse"}, | 371 | {ERR_REASON(SSL_R_SSL2_CONNECTION_ID_TOO_LONG),"ssl2 connection id too long"}, |
366 | {SSL_R_SSL2_CONNECTION_ID_TOO_LONG ,"ssl2 connection id too long"}, | 372 | {ERR_REASON(SSL_R_SSL3_SESSION_ID_TOO_LONG),"ssl3 session id too long"}, |
367 | {SSL_R_SSL3_SESSION_ID_TOO_LONG ,"ssl3 session id too long"}, | 373 | {ERR_REASON(SSL_R_SSL3_SESSION_ID_TOO_SHORT),"ssl3 session id too short"}, |
368 | {SSL_R_SSL3_SESSION_ID_TOO_SHORT ,"ssl3 session id too short"}, | 374 | {ERR_REASON(SSL_R_SSLV3_ALERT_BAD_CERTIFICATE),"sslv3 alert bad certificate"}, |
369 | {SSL_R_SSLV3_ALERT_BAD_CERTIFICATE ,"sslv3 alert bad certificate"}, | 375 | {ERR_REASON(SSL_R_SSLV3_ALERT_BAD_RECORD_MAC),"sslv3 alert bad record mac"}, |
370 | {SSL_R_SSLV3_ALERT_BAD_RECORD_MAC ,"sslv3 alert bad record mac"}, | 376 | {ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED),"sslv3 alert certificate expired"}, |
371 | {SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED ,"sslv3 alert certificate expired"}, | 377 | {ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED),"sslv3 alert certificate revoked"}, |
372 | {SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED ,"sslv3 alert certificate revoked"}, | 378 | {ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN),"sslv3 alert certificate unknown"}, |
373 | {SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN ,"sslv3 alert certificate unknown"}, | 379 | {ERR_REASON(SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE),"sslv3 alert decompression failure"}, |
374 | {SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE ,"sslv3 alert decompression failure"}, | 380 | {ERR_REASON(SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE),"sslv3 alert handshake failure"}, |
375 | {SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE ,"sslv3 alert handshake failure"}, | 381 | {ERR_REASON(SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER),"sslv3 alert illegal parameter"}, |
376 | {SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER ,"sslv3 alert illegal parameter"}, | 382 | {ERR_REASON(SSL_R_SSLV3_ALERT_NO_CERTIFICATE),"sslv3 alert no certificate"}, |
377 | {SSL_R_SSLV3_ALERT_NO_CERTIFICATE ,"sslv3 alert no certificate"}, | 383 | {ERR_REASON(SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE),"sslv3 alert unexpected message"}, |
378 | {SSL_R_SSLV3_ALERT_PEER_ERROR_CERTIFICATE,"sslv3 alert peer error certificate"}, | 384 | {ERR_REASON(SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE),"sslv3 alert unsupported certificate"}, |
379 | {SSL_R_SSLV3_ALERT_PEER_ERROR_NO_CERTIFICATE,"sslv3 alert peer error no certificate"}, | 385 | {ERR_REASON(SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION),"ssl ctx has no default ssl version"}, |
380 | {SSL_R_SSLV3_ALERT_PEER_ERROR_NO_CIPHER ,"sslv3 alert peer error no cipher"}, | 386 | {ERR_REASON(SSL_R_SSL_HANDSHAKE_FAILURE) ,"ssl handshake failure"}, |
381 | {SSL_R_SSLV3_ALERT_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE,"sslv3 alert peer error unsupported certificate type"}, | 387 | {ERR_REASON(SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS),"ssl library has no ciphers"}, |
382 | {SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE ,"sslv3 alert unexpected message"}, | 388 | {ERR_REASON(SSL_R_SSL_SESSION_ID_CALLBACK_FAILED),"ssl session id callback failed"}, |
383 | {SSL_R_SSLV3_ALERT_UNKNOWN_REMOTE_ERROR_TYPE,"sslv3 alert unknown remote error type"}, | 389 | {ERR_REASON(SSL_R_SSL_SESSION_ID_CONFLICT),"ssl session id conflict"}, |
384 | {SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE,"sslv3 alert unsupported certificate"}, | 390 | {ERR_REASON(SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG),"ssl session id context too long"}, |
385 | {SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION,"ssl ctx has no default ssl version"}, | 391 | {ERR_REASON(SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH),"ssl session id has bad length"}, |
386 | {SSL_R_SSL_HANDSHAKE_FAILURE ,"ssl handshake failure"}, | 392 | {ERR_REASON(SSL_R_SSL_SESSION_ID_IS_DIFFERENT),"ssl session id is different"}, |
387 | {SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS ,"ssl library has no ciphers"}, | 393 | {ERR_REASON(SSL_R_TLSV1_ALERT_ACCESS_DENIED),"tlsv1 alert access denied"}, |
388 | {SSL_R_SSL_SESSION_ID_CALLBACK_FAILED ,"ssl session id callback failed"}, | 394 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECODE_ERROR),"tlsv1 alert decode error"}, |
389 | {SSL_R_SSL_SESSION_ID_CONFLICT ,"ssl session id conflict"}, | 395 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPTION_FAILED),"tlsv1 alert decryption failed"}, |
390 | {SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG ,"ssl session id context too long"}, | 396 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR),"tlsv1 alert decrypt error"}, |
391 | {SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH ,"ssl session id has bad length"}, | 397 | {ERR_REASON(SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION),"tlsv1 alert export restriction"}, |
392 | {SSL_R_SSL_SESSION_ID_IS_DIFFERENT ,"ssl session id is different"}, | 398 | {ERR_REASON(SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY),"tlsv1 alert insufficient security"}, |
393 | {SSL_R_TLSV1_ALERT_ACCESS_DENIED ,"tlsv1 alert access denied"}, | 399 | {ERR_REASON(SSL_R_TLSV1_ALERT_INTERNAL_ERROR),"tlsv1 alert internal error"}, |
394 | {SSL_R_TLSV1_ALERT_DECODE_ERROR ,"tlsv1 alert decode error"}, | 400 | {ERR_REASON(SSL_R_TLSV1_ALERT_NO_RENEGOTIATION),"tlsv1 alert no renegotiation"}, |
395 | {SSL_R_TLSV1_ALERT_DECRYPTION_FAILED ,"tlsv1 alert decryption failed"}, | 401 | {ERR_REASON(SSL_R_TLSV1_ALERT_PROTOCOL_VERSION),"tlsv1 alert protocol version"}, |
396 | {SSL_R_TLSV1_ALERT_DECRYPT_ERROR ,"tlsv1 alert decrypt error"}, | 402 | {ERR_REASON(SSL_R_TLSV1_ALERT_RECORD_OVERFLOW),"tlsv1 alert record overflow"}, |
397 | {SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION ,"tlsv1 alert export restriction"}, | 403 | {ERR_REASON(SSL_R_TLSV1_ALERT_UNKNOWN_CA),"tlsv1 alert unknown ca"}, |
398 | {SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY ,"tlsv1 alert insufficient security"}, | 404 | {ERR_REASON(SSL_R_TLSV1_ALERT_USER_CANCELLED),"tlsv1 alert user cancelled"}, |
399 | {SSL_R_TLSV1_ALERT_INTERNAL_ERROR ,"tlsv1 alert internal error"}, | 405 | {ERR_REASON(SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER),"tls client cert req with anon cipher"}, |
400 | {SSL_R_TLSV1_ALERT_NO_RENEGOTIATION ,"tlsv1 alert no renegotiation"}, | 406 | {ERR_REASON(SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST),"tls peer did not respond with certificate list"}, |
401 | {SSL_R_TLSV1_ALERT_PROTOCOL_VERSION ,"tlsv1 alert protocol version"}, | 407 | {ERR_REASON(SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG),"tls rsa encrypted value length is wrong"}, |
402 | {SSL_R_TLSV1_ALERT_RECORD_OVERFLOW ,"tlsv1 alert record overflow"}, | 408 | {ERR_REASON(SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER),"tried to use unsupported cipher"}, |
403 | {SSL_R_TLSV1_ALERT_UNKNOWN_CA ,"tlsv1 alert unknown ca"}, | 409 | {ERR_REASON(SSL_R_UNABLE_TO_DECODE_DH_CERTS),"unable to decode dh certs"}, |
404 | {SSL_R_TLSV1_ALERT_USER_CANCELLED ,"tlsv1 alert user cancelled"}, | 410 | {ERR_REASON(SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY),"unable to extract public key"}, |
405 | {SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER,"tls client cert req with anon cipher"}, | 411 | {ERR_REASON(SSL_R_UNABLE_TO_FIND_DH_PARAMETERS),"unable to find dh parameters"}, |
406 | {SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST,"tls peer did not respond with certificate list"}, | 412 | {ERR_REASON(SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS),"unable to find public key parameters"}, |
407 | {SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG,"tls rsa encrypted value length is wrong"}, | 413 | {ERR_REASON(SSL_R_UNABLE_TO_FIND_SSL_METHOD),"unable to find ssl method"}, |
408 | {SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER ,"tried to use unsupported cipher"}, | 414 | {ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL2_MD5_ROUTINES),"unable to load ssl2 md5 routines"}, |
409 | {SSL_R_UNABLE_TO_DECODE_DH_CERTS ,"unable to decode dh certs"}, | 415 | {ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES),"unable to load ssl3 md5 routines"}, |
410 | {SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY ,"unable to extract public key"}, | 416 | {ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES),"unable to load ssl3 sha1 routines"}, |
411 | {SSL_R_UNABLE_TO_FIND_DH_PARAMETERS ,"unable to find dh parameters"}, | 417 | {ERR_REASON(SSL_R_UNEXPECTED_MESSAGE) ,"unexpected message"}, |
412 | {SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS,"unable to find public key parameters"}, | 418 | {ERR_REASON(SSL_R_UNEXPECTED_RECORD) ,"unexpected record"}, |
413 | {SSL_R_UNABLE_TO_FIND_SSL_METHOD ,"unable to find ssl method"}, | 419 | {ERR_REASON(SSL_R_UNINITIALIZED) ,"uninitialized"}, |
414 | {SSL_R_UNABLE_TO_LOAD_SSL2_MD5_ROUTINES ,"unable to load ssl2 md5 routines"}, | 420 | {ERR_REASON(SSL_R_UNKNOWN_ALERT_TYPE) ,"unknown alert type"}, |
415 | {SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES ,"unable to load ssl3 md5 routines"}, | 421 | {ERR_REASON(SSL_R_UNKNOWN_CERTIFICATE_TYPE),"unknown certificate type"}, |
416 | {SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES ,"unable to load ssl3 sha1 routines"}, | 422 | {ERR_REASON(SSL_R_UNKNOWN_CIPHER_RETURNED),"unknown cipher returned"}, |
417 | {SSL_R_UNEXPECTED_MESSAGE ,"unexpected message"}, | 423 | {ERR_REASON(SSL_R_UNKNOWN_CIPHER_TYPE) ,"unknown cipher type"}, |
418 | {SSL_R_UNEXPECTED_RECORD ,"unexpected record"}, | 424 | {ERR_REASON(SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE),"unknown key exchange type"}, |
419 | {SSL_R_UNINITIALIZED ,"uninitialized"}, | 425 | {ERR_REASON(SSL_R_UNKNOWN_PKEY_TYPE) ,"unknown pkey type"}, |
420 | {SSL_R_UNKNOWN_ALERT_TYPE ,"unknown alert type"}, | 426 | {ERR_REASON(SSL_R_UNKNOWN_PROTOCOL) ,"unknown protocol"}, |
421 | {SSL_R_UNKNOWN_CERTIFICATE_TYPE ,"unknown certificate type"}, | 427 | {ERR_REASON(SSL_R_UNKNOWN_REMOTE_ERROR_TYPE),"unknown remote error type"}, |
422 | {SSL_R_UNKNOWN_CIPHER_RETURNED ,"unknown cipher returned"}, | 428 | {ERR_REASON(SSL_R_UNKNOWN_SSL_VERSION) ,"unknown ssl version"}, |
423 | {SSL_R_UNKNOWN_CIPHER_TYPE ,"unknown cipher type"}, | 429 | {ERR_REASON(SSL_R_UNKNOWN_STATE) ,"unknown state"}, |
424 | {SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE ,"unknown key exchange type"}, | 430 | {ERR_REASON(SSL_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"}, |
425 | {SSL_R_UNKNOWN_PKEY_TYPE ,"unknown pkey type"}, | 431 | {ERR_REASON(SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM),"unsupported compression algorithm"}, |
426 | {SSL_R_UNKNOWN_PROTOCOL ,"unknown protocol"}, | 432 | {ERR_REASON(SSL_R_UNSUPPORTED_PROTOCOL) ,"unsupported protocol"}, |
427 | {SSL_R_UNKNOWN_REMOTE_ERROR_TYPE ,"unknown remote error type"}, | 433 | {ERR_REASON(SSL_R_UNSUPPORTED_SSL_VERSION),"unsupported ssl version"}, |
428 | {SSL_R_UNKNOWN_SSL_VERSION ,"unknown ssl version"}, | 434 | {ERR_REASON(SSL_R_WRITE_BIO_NOT_SET) ,"write bio not set"}, |
429 | {SSL_R_UNKNOWN_STATE ,"unknown state"}, | 435 | {ERR_REASON(SSL_R_WRONG_CIPHER_RETURNED) ,"wrong cipher returned"}, |
430 | {SSL_R_UNSUPPORTED_CIPHER ,"unsupported cipher"}, | 436 | {ERR_REASON(SSL_R_WRONG_MESSAGE_TYPE) ,"wrong message type"}, |
431 | {SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM ,"unsupported compression algorithm"}, | 437 | {ERR_REASON(SSL_R_WRONG_NUMBER_OF_KEY_BITS),"wrong number of key bits"}, |
432 | {SSL_R_UNSUPPORTED_OPTION ,"unsupported option"}, | 438 | {ERR_REASON(SSL_R_WRONG_SIGNATURE_LENGTH),"wrong signature length"}, |
433 | {SSL_R_UNSUPPORTED_PROTOCOL ,"unsupported protocol"}, | 439 | {ERR_REASON(SSL_R_WRONG_SIGNATURE_SIZE) ,"wrong signature size"}, |
434 | {SSL_R_UNSUPPORTED_SSL_VERSION ,"unsupported ssl version"}, | 440 | {ERR_REASON(SSL_R_WRONG_SSL_VERSION) ,"wrong ssl version"}, |
435 | {SSL_R_WRITE_BIO_NOT_SET ,"write bio not set"}, | 441 | {ERR_REASON(SSL_R_WRONG_VERSION_NUMBER) ,"wrong version number"}, |
436 | {SSL_R_WRONG_CIPHER_RETURNED ,"wrong cipher returned"}, | 442 | {ERR_REASON(SSL_R_X509_LIB) ,"x509 lib"}, |
437 | {SSL_R_WRONG_MESSAGE_TYPE ,"wrong message type"}, | 443 | {ERR_REASON(SSL_R_X509_VERIFICATION_SETUP_PROBLEMS),"x509 verification setup problems"}, |
438 | {SSL_R_WRONG_NUMBER_OF_KEY_BITS ,"wrong number of key bits"}, | ||
439 | {SSL_R_WRONG_SIGNATURE_LENGTH ,"wrong signature length"}, | ||
440 | {SSL_R_WRONG_SIGNATURE_SIZE ,"wrong signature size"}, | ||
441 | {SSL_R_WRONG_SSL_VERSION ,"wrong ssl version"}, | ||
442 | {SSL_R_WRONG_VERSION_NUMBER ,"wrong version number"}, | ||
443 | {SSL_R_X509_LIB ,"x509 lib"}, | ||
444 | {SSL_R_X509_VERIFICATION_SETUP_PROBLEMS ,"x509 verification setup problems"}, | ||
445 | {0,NULL} | 444 | {0,NULL} |
446 | }; | 445 | }; |
447 | 446 | ||
@@ -455,8 +454,8 @@ void ERR_load_SSL_strings(void) | |||
455 | { | 454 | { |
456 | init=0; | 455 | init=0; |
457 | #ifndef OPENSSL_NO_ERR | 456 | #ifndef OPENSSL_NO_ERR |
458 | ERR_load_strings(ERR_LIB_SSL,SSL_str_functs); | 457 | ERR_load_strings(0,SSL_str_functs); |
459 | ERR_load_strings(ERR_LIB_SSL,SSL_str_reasons); | 458 | ERR_load_strings(0,SSL_str_reasons); |
460 | #endif | 459 | #endif |
461 | 460 | ||
462 | } | 461 | } |
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 631229558f..2bd9a5af86 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
@@ -125,7 +125,7 @@ | |||
125 | 125 | ||
126 | const char *SSL_version_str=OPENSSL_VERSION_TEXT; | 126 | const char *SSL_version_str=OPENSSL_VERSION_TEXT; |
127 | 127 | ||
128 | OPENSSL_GLOBAL SSL3_ENC_METHOD ssl3_undef_enc_method={ | 128 | SSL3_ENC_METHOD ssl3_undef_enc_method={ |
129 | /* evil casts, but these functions are only called if there's a library bug */ | 129 | /* evil casts, but these functions are only called if there's a library bug */ |
130 | (int (*)(SSL *,int))ssl_undefined_function, | 130 | (int (*)(SSL *,int))ssl_undefined_function, |
131 | (int (*)(SSL *, unsigned char *, int))ssl_undefined_function, | 131 | (int (*)(SSL *, unsigned char *, int))ssl_undefined_function, |
@@ -1130,8 +1130,21 @@ int SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str) | |||
1130 | 1130 | ||
1131 | sk=ssl_create_cipher_list(ctx->method,&ctx->cipher_list, | 1131 | sk=ssl_create_cipher_list(ctx->method,&ctx->cipher_list, |
1132 | &ctx->cipher_list_by_id,str); | 1132 | &ctx->cipher_list_by_id,str); |
1133 | /* XXXX */ | 1133 | /* ssl_create_cipher_list may return an empty stack if it |
1134 | return((sk == NULL)?0:1); | 1134 | * was unable to find a cipher matching the given rule string |
1135 | * (for example if the rule string specifies a cipher which | ||
1136 | * has been disabled). This is not an error as far as | ||
1137 | * ssl_create_cipher_list is concerned, and hence | ||
1138 | * ctx->cipher_list and ctx->cipher_list_by_id has been | ||
1139 | * updated. */ | ||
1140 | if (sk == NULL) | ||
1141 | return 0; | ||
1142 | else if (sk_SSL_CIPHER_num(sk) == 0) | ||
1143 | { | ||
1144 | SSLerr(SSL_F_SSL_CTX_SET_CIPHER_LIST, SSL_R_NO_CIPHER_MATCH); | ||
1145 | return 0; | ||
1146 | } | ||
1147 | return 1; | ||
1135 | } | 1148 | } |
1136 | 1149 | ||
1137 | /** specify the ciphers to be used by the SSL */ | 1150 | /** specify the ciphers to be used by the SSL */ |
@@ -1141,8 +1154,15 @@ int SSL_set_cipher_list(SSL *s,const char *str) | |||
1141 | 1154 | ||
1142 | sk=ssl_create_cipher_list(s->ctx->method,&s->cipher_list, | 1155 | sk=ssl_create_cipher_list(s->ctx->method,&s->cipher_list, |
1143 | &s->cipher_list_by_id,str); | 1156 | &s->cipher_list_by_id,str); |
1144 | /* XXXX */ | 1157 | /* see comment in SSL_CTX_set_cipher_list */ |
1145 | return((sk == NULL)?0:1); | 1158 | if (sk == NULL) |
1159 | return 0; | ||
1160 | else if (sk_SSL_CIPHER_num(sk) == 0) | ||
1161 | { | ||
1162 | SSLerr(SSL_F_SSL_SET_CIPHER_LIST, SSL_R_NO_CIPHER_MATCH); | ||
1163 | return 0; | ||
1164 | } | ||
1165 | return 1; | ||
1146 | } | 1166 | } |
1147 | 1167 | ||
1148 | /* works well for SSLv2, not so good for SSLv3 */ | 1168 | /* works well for SSLv2, not so good for SSLv3 */ |
@@ -1181,7 +1201,8 @@ char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len) | |||
1181 | return(buf); | 1201 | return(buf); |
1182 | } | 1202 | } |
1183 | 1203 | ||
1184 | int ssl_cipher_list_to_bytes(SSL *s,STACK_OF(SSL_CIPHER) *sk,unsigned char *p) | 1204 | int ssl_cipher_list_to_bytes(SSL *s,STACK_OF(SSL_CIPHER) *sk,unsigned char *p, |
1205 | int (*put_cb)(const SSL_CIPHER *, unsigned char *)) | ||
1185 | { | 1206 | { |
1186 | int i,j=0; | 1207 | int i,j=0; |
1187 | SSL_CIPHER *c; | 1208 | SSL_CIPHER *c; |
@@ -1200,7 +1221,8 @@ int ssl_cipher_list_to_bytes(SSL *s,STACK_OF(SSL_CIPHER) *sk,unsigned char *p) | |||
1200 | if ((c->algorithms & SSL_KRB5) && nokrb5) | 1221 | if ((c->algorithms & SSL_KRB5) && nokrb5) |
1201 | continue; | 1222 | continue; |
1202 | #endif /* OPENSSL_NO_KRB5 */ | 1223 | #endif /* OPENSSL_NO_KRB5 */ |
1203 | j=ssl_put_cipher_by_char(s,c,p); | 1224 | |
1225 | j = put_cb ? put_cb(c,p) : ssl_put_cipher_by_char(s,c,p); | ||
1204 | p+=j; | 1226 | p+=j; |
1205 | } | 1227 | } |
1206 | return(p-q); | 1228 | return(p-q); |
@@ -1694,7 +1716,7 @@ void ssl_update_cache(SSL *s,int mode) | |||
1694 | ?s->ctx->stats.sess_connect_good | 1716 | ?s->ctx->stats.sess_connect_good |
1695 | :s->ctx->stats.sess_accept_good) & 0xff) == 0xff) | 1717 | :s->ctx->stats.sess_accept_good) & 0xff) == 0xff) |
1696 | { | 1718 | { |
1697 | SSL_CTX_flush_sessions(s->ctx,time(NULL)); | 1719 | SSL_CTX_flush_sessions(s->ctx,(unsigned long)time(NULL)); |
1698 | } | 1720 | } |
1699 | } | 1721 | } |
1700 | } | 1722 | } |
diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h index 25a144a0d0..6a0b7595f4 100644 --- a/src/lib/libssl/ssl_locl.h +++ b/src/lib/libssl/ssl_locl.h | |||
@@ -462,7 +462,7 @@ typedef struct ssl3_comp_st | |||
462 | COMP_METHOD *method; /* The method :-) */ | 462 | COMP_METHOD *method; /* The method :-) */ |
463 | } SSL3_COMP; | 463 | } SSL3_COMP; |
464 | 464 | ||
465 | OPENSSL_EXTERN SSL3_ENC_METHOD ssl3_undef_enc_method; | 465 | extern SSL3_ENC_METHOD ssl3_undef_enc_method; |
466 | OPENSSL_EXTERN SSL_CIPHER ssl2_ciphers[]; | 466 | OPENSSL_EXTERN SSL_CIPHER ssl2_ciphers[]; |
467 | OPENSSL_EXTERN SSL_CIPHER ssl3_ciphers[]; | 467 | OPENSSL_EXTERN SSL_CIPHER ssl3_ciphers[]; |
468 | 468 | ||
@@ -493,7 +493,8 @@ int ssl_cipher_ptr_id_cmp(const SSL_CIPHER * const *ap, | |||
493 | const SSL_CIPHER * const *bp); | 493 | const SSL_CIPHER * const *bp); |
494 | STACK_OF(SSL_CIPHER) *ssl_bytes_to_cipher_list(SSL *s,unsigned char *p,int num, | 494 | STACK_OF(SSL_CIPHER) *ssl_bytes_to_cipher_list(SSL *s,unsigned char *p,int num, |
495 | STACK_OF(SSL_CIPHER) **skp); | 495 | STACK_OF(SSL_CIPHER) **skp); |
496 | int ssl_cipher_list_to_bytes(SSL *s,STACK_OF(SSL_CIPHER) *sk,unsigned char *p); | 496 | int ssl_cipher_list_to_bytes(SSL *s,STACK_OF(SSL_CIPHER) *sk,unsigned char *p, |
497 | int (*put_cb)(const SSL_CIPHER *, unsigned char *)); | ||
497 | STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *meth, | 498 | STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *meth, |
498 | STACK_OF(SSL_CIPHER) **pref, | 499 | STACK_OF(SSL_CIPHER) **pref, |
499 | STACK_OF(SSL_CIPHER) **sorted, | 500 | STACK_OF(SSL_CIPHER) **sorted, |
diff --git a/src/lib/libssl/ssl_sess.c b/src/lib/libssl/ssl_sess.c index 5f12aa361c..2ba8b9612e 100644 --- a/src/lib/libssl/ssl_sess.c +++ b/src/lib/libssl/ssl_sess.c | |||
@@ -118,7 +118,7 @@ SSL_SESSION *SSL_SESSION_new(void) | |||
118 | ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ | 118 | ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ |
119 | ss->references=1; | 119 | ss->references=1; |
120 | ss->timeout=60*5+4; /* 5 minute timeout by default */ | 120 | ss->timeout=60*5+4; /* 5 minute timeout by default */ |
121 | ss->time=time(NULL); | 121 | ss->time=(unsigned long)time(NULL); |
122 | ss->prev=NULL; | 122 | ss->prev=NULL; |
123 | ss->next=NULL; | 123 | ss->next=NULL; |
124 | ss->compress_meth=0; | 124 | ss->compress_meth=0; |
@@ -377,7 +377,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len) | |||
377 | CRYPTO_add(&ret->references,1,CRYPTO_LOCK_SSL_SESSION); | 377 | CRYPTO_add(&ret->references,1,CRYPTO_LOCK_SSL_SESSION); |
378 | #endif | 378 | #endif |
379 | 379 | ||
380 | if ((long)(ret->time+ret->timeout) < (long)time(NULL)) /* timeout */ | 380 | if (ret->timeout < (long)(time(NULL) - ret->time)) /* timeout */ |
381 | { | 381 | { |
382 | s->ctx->stats.sess_timeout++; | 382 | s->ctx->stats.sess_timeout++; |
383 | /* remove it from the cache */ | 383 | /* remove it from the cache */ |