diff options
Diffstat (limited to 'src/lib/libcrypto/rsa/rsa_crpt.c')
| -rw-r--r-- | src/lib/libcrypto/rsa/rsa_crpt.c | 151 |
1 files changed, 78 insertions, 73 deletions
diff --git a/src/lib/libcrypto/rsa/rsa_crpt.c b/src/lib/libcrypto/rsa/rsa_crpt.c index 2122e7baa4..16679cfd14 100644 --- a/src/lib/libcrypto/rsa/rsa_crpt.c +++ b/src/lib/libcrypto/rsa/rsa_crpt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rsa_crpt.c,v 1.4 2014/06/12 15:49:30 deraadt Exp $ */ | 1 | /* $OpenBSD: rsa_crpt.c,v 1.5 2014/07/09 08:20:08 miod Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -67,54 +67,61 @@ | |||
| 67 | #include <openssl/engine.h> | 67 | #include <openssl/engine.h> |
| 68 | #endif | 68 | #endif |
| 69 | 69 | ||
| 70 | int RSA_size(const RSA *r) | 70 | int |
| 71 | { | 71 | RSA_size(const RSA *r) |
| 72 | return(BN_num_bytes(r->n)); | 72 | { |
| 73 | } | 73 | return BN_num_bytes(r->n); |
| 74 | } | ||
| 74 | 75 | ||
| 75 | int RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, | 76 | int |
| 76 | RSA *rsa, int padding) | 77 | RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, |
| 77 | { | 78 | RSA *rsa, int padding) |
| 78 | return(rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding)); | 79 | { |
| 79 | } | 80 | return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); |
| 81 | } | ||
| 80 | 82 | ||
| 81 | int RSA_private_encrypt(int flen, const unsigned char *from, unsigned char *to, | 83 | int |
| 82 | RSA *rsa, int padding) | 84 | RSA_private_encrypt(int flen, const unsigned char *from, unsigned char *to, |
| 83 | { | 85 | RSA *rsa, int padding) |
| 84 | return(rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding)); | 86 | { |
| 85 | } | 87 | return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); |
| 88 | } | ||
| 86 | 89 | ||
| 87 | int RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, | 90 | int |
| 88 | RSA *rsa, int padding) | 91 | RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, |
| 89 | { | 92 | RSA *rsa, int padding) |
| 90 | return(rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding)); | 93 | { |
| 91 | } | 94 | return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); |
| 95 | } | ||
| 92 | 96 | ||
| 93 | int RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, | 97 | int |
| 94 | RSA *rsa, int padding) | 98 | RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, |
| 95 | { | 99 | RSA *rsa, int padding) |
| 96 | return(rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding)); | 100 | { |
| 97 | } | 101 | return rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding); |
| 102 | } | ||
| 98 | 103 | ||
| 99 | int RSA_flags(const RSA *r) | 104 | int |
| 100 | { | 105 | RSA_flags(const RSA *r) |
| 101 | return((r == NULL)?0:r->meth->flags); | 106 | { |
| 102 | } | 107 | return r == NULL ? 0 : r->meth->flags; |
| 108 | } | ||
| 103 | 109 | ||
| 104 | void RSA_blinding_off(RSA *rsa) | 110 | void |
| 105 | { | 111 | RSA_blinding_off(RSA *rsa) |
| 106 | if (rsa->blinding != NULL) | 112 | { |
| 107 | { | 113 | if (rsa->blinding != NULL) { |
| 108 | BN_BLINDING_free(rsa->blinding); | 114 | BN_BLINDING_free(rsa->blinding); |
| 109 | rsa->blinding=NULL; | 115 | rsa->blinding = NULL; |
| 110 | } | 116 | } |
| 111 | rsa->flags &= ~RSA_FLAG_BLINDING; | 117 | rsa->flags &= ~RSA_FLAG_BLINDING; |
| 112 | rsa->flags |= RSA_FLAG_NO_BLINDING; | 118 | rsa->flags |= RSA_FLAG_NO_BLINDING; |
| 113 | } | 119 | } |
| 114 | 120 | ||
| 115 | int RSA_blinding_on(RSA *rsa, BN_CTX *ctx) | 121 | int |
| 116 | { | 122 | RSA_blinding_on(RSA *rsa, BN_CTX *ctx) |
| 117 | int ret=0; | 123 | { |
| 124 | int ret = 0; | ||
| 118 | 125 | ||
| 119 | if (rsa->blinding != NULL) | 126 | if (rsa->blinding != NULL) |
| 120 | RSA_blinding_off(rsa); | 127 | RSA_blinding_off(rsa); |
| @@ -125,13 +132,14 @@ int RSA_blinding_on(RSA *rsa, BN_CTX *ctx) | |||
| 125 | 132 | ||
| 126 | rsa->flags |= RSA_FLAG_BLINDING; | 133 | rsa->flags |= RSA_FLAG_BLINDING; |
| 127 | rsa->flags &= ~RSA_FLAG_NO_BLINDING; | 134 | rsa->flags &= ~RSA_FLAG_NO_BLINDING; |
| 128 | ret=1; | 135 | ret = 1; |
| 129 | err: | 136 | err: |
| 130 | return(ret); | 137 | return(ret); |
| 131 | } | 138 | } |
| 132 | 139 | ||
| 133 | static BIGNUM *rsa_get_public_exp(const BIGNUM *d, const BIGNUM *p, | 140 | static BIGNUM * |
| 134 | const BIGNUM *q, BN_CTX *ctx) | 141 | rsa_get_public_exp(const BIGNUM *d, const BIGNUM *p, const BIGNUM *q, |
| 142 | BN_CTX *ctx) | ||
| 135 | { | 143 | { |
| 136 | BIGNUM *ret = NULL, *r0, *r1, *r2; | 144 | BIGNUM *ret = NULL, *r0, *r1, *r2; |
| 137 | 145 | ||
| @@ -145,9 +153,12 @@ static BIGNUM *rsa_get_public_exp(const BIGNUM *d, const BIGNUM *p, | |||
| 145 | if (r2 == NULL) | 153 | if (r2 == NULL) |
| 146 | goto err; | 154 | goto err; |
| 147 | 155 | ||
| 148 | if (!BN_sub(r1, p, BN_value_one())) goto err; | 156 | if (!BN_sub(r1, p, BN_value_one())) |
| 149 | if (!BN_sub(r2, q, BN_value_one())) goto err; | 157 | goto err; |
| 150 | if (!BN_mul(r0, r1, r2, ctx)) goto err; | 158 | if (!BN_sub(r2, q, BN_value_one())) |
| 159 | goto err; | ||
| 160 | if (!BN_mul(r0, r1, r2, ctx)) | ||
| 161 | goto err; | ||
| 151 | 162 | ||
| 152 | ret = BN_mod_inverse(NULL, d, r0, ctx); | 163 | ret = BN_mod_inverse(NULL, d, r0, ctx); |
| 153 | err: | 164 | err: |
| @@ -155,62 +166,56 @@ err: | |||
| 155 | return ret; | 166 | return ret; |
| 156 | } | 167 | } |
| 157 | 168 | ||
| 158 | BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) | 169 | BN_BLINDING * |
| 170 | RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) | ||
| 159 | { | 171 | { |
| 160 | BIGNUM local_n; | 172 | BIGNUM local_n; |
| 161 | BIGNUM *e,*n; | 173 | BIGNUM *e, *n; |
| 162 | BN_CTX *ctx; | 174 | BN_CTX *ctx; |
| 163 | BN_BLINDING *ret = NULL; | 175 | BN_BLINDING *ret = NULL; |
| 164 | 176 | ||
| 165 | if (in_ctx == NULL) | 177 | if (in_ctx == NULL) { |
| 166 | { | 178 | if ((ctx = BN_CTX_new()) == NULL) |
| 167 | if ((ctx = BN_CTX_new()) == NULL) return 0; | 179 | return 0; |
| 168 | } | 180 | } else |
| 169 | else | ||
| 170 | ctx = in_ctx; | 181 | ctx = in_ctx; |
| 171 | 182 | ||
| 172 | BN_CTX_start(ctx); | 183 | BN_CTX_start(ctx); |
| 173 | e = BN_CTX_get(ctx); | 184 | e = BN_CTX_get(ctx); |
| 174 | if (e == NULL) | 185 | if (e == NULL) { |
| 175 | { | ||
| 176 | RSAerr(RSA_F_RSA_SETUP_BLINDING, ERR_R_MALLOC_FAILURE); | 186 | RSAerr(RSA_F_RSA_SETUP_BLINDING, ERR_R_MALLOC_FAILURE); |
| 177 | goto err; | 187 | goto err; |
| 178 | } | 188 | } |
| 179 | 189 | ||
| 180 | if (rsa->e == NULL) | 190 | if (rsa->e == NULL) { |
| 181 | { | ||
| 182 | e = rsa_get_public_exp(rsa->d, rsa->p, rsa->q, ctx); | 191 | e = rsa_get_public_exp(rsa->d, rsa->p, rsa->q, ctx); |
| 183 | if (e == NULL) | 192 | if (e == NULL) { |
| 184 | { | 193 | RSAerr(RSA_F_RSA_SETUP_BLINDING, |
| 185 | RSAerr(RSA_F_RSA_SETUP_BLINDING, RSA_R_NO_PUBLIC_EXPONENT); | 194 | RSA_R_NO_PUBLIC_EXPONENT); |
| 186 | goto err; | 195 | goto err; |
| 187 | } | ||
| 188 | } | 196 | } |
| 189 | else | 197 | } else |
| 190 | e = rsa->e; | 198 | e = rsa->e; |
| 191 | 199 | ||
| 192 | if (!(rsa->flags & RSA_FLAG_NO_CONSTTIME)) | 200 | if (!(rsa->flags & RSA_FLAG_NO_CONSTTIME)) { |
| 193 | { | ||
| 194 | /* Set BN_FLG_CONSTTIME flag */ | 201 | /* Set BN_FLG_CONSTTIME flag */ |
| 195 | n = &local_n; | 202 | n = &local_n; |
| 196 | BN_with_flags(n, rsa->n, BN_FLG_CONSTTIME); | 203 | BN_with_flags(n, rsa->n, BN_FLG_CONSTTIME); |
| 197 | } | 204 | } else |
| 198 | else | ||
| 199 | n = rsa->n; | 205 | n = rsa->n; |
| 200 | 206 | ||
| 201 | ret = BN_BLINDING_create_param(NULL, e, n, ctx, | 207 | ret = BN_BLINDING_create_param(NULL, e, n, ctx, rsa->meth->bn_mod_exp, |
| 202 | rsa->meth->bn_mod_exp, rsa->_method_mod_n); | 208 | rsa->_method_mod_n); |
| 203 | if (ret == NULL) | 209 | if (ret == NULL) { |
| 204 | { | ||
| 205 | RSAerr(RSA_F_RSA_SETUP_BLINDING, ERR_R_BN_LIB); | 210 | RSAerr(RSA_F_RSA_SETUP_BLINDING, ERR_R_BN_LIB); |
| 206 | goto err; | 211 | goto err; |
| 207 | } | 212 | } |
| 208 | CRYPTO_THREADID_current(BN_BLINDING_thread_id(ret)); | 213 | CRYPTO_THREADID_current(BN_BLINDING_thread_id(ret)); |
| 209 | err: | 214 | err: |
| 210 | BN_CTX_end(ctx); | 215 | BN_CTX_end(ctx); |
| 211 | if (in_ctx == NULL) | 216 | if (in_ctx == NULL) |
| 212 | BN_CTX_free(ctx); | 217 | BN_CTX_free(ctx); |
| 213 | if(rsa->e == NULL) | 218 | if (rsa->e == NULL) |
| 214 | BN_free(e); | 219 | BN_free(e); |
| 215 | 220 | ||
| 216 | return ret; | 221 | return ret; |
