You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

474 lines
13 KiB

  1. /* ====================================================================
  2. * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions
  6. * are met:
  7. *
  8. * 1. Redistributions of source code must retain the above copyright
  9. * notice, this list of conditions and the following disclaimer.
  10. *
  11. * 2. Redistributions in binary form must reproduce the above copyright
  12. * notice, this list of conditions and the following disclaimer in
  13. * the documentation and/or other materials provided with the
  14. * distribution.
  15. *
  16. * 3. All advertising materials mentioning features or use of this
  17. * software must display the following acknowledgment:
  18. * "This product includes software developed by the OpenSSL Project
  19. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  20. *
  21. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  22. * endorse or promote products derived from this software without
  23. * prior written permission. For written permission, please contact
  24. * openssl-core@openssl.org.
  25. *
  26. * 5. Products derived from this software may not be called "OpenSSL"
  27. * nor may "OpenSSL" appear in their names without prior written
  28. * permission of the OpenSSL Project.
  29. *
  30. * 6. Redistributions of any form whatsoever must retain the following
  31. * acknowledgment:
  32. * "This product includes software developed by the OpenSSL Project
  33. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  34. *
  35. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  36. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  37. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  38. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  39. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  40. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  41. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  42. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  43. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  44. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  45. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  46. * OF THE POSSIBILITY OF SUCH DAMAGE.
  47. * ====================================================================
  48. *
  49. * This product includes cryptographic software written by Eric Young
  50. * (eay@cryptsoft.com). This product includes software written by Tim
  51. * Hudson (tjh@cryptsoft.com).
  52. *
  53. * Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  54. * All rights reserved.
  55. *
  56. * This package is an SSL implementation written
  57. * by Eric Young (eay@cryptsoft.com).
  58. * The implementation was written so as to conform with Netscapes SSL.
  59. *
  60. * This library is free for commercial and non-commercial use as long as
  61. * the following conditions are aheared to. The following conditions
  62. * apply to all code found in this distribution, be it the RC4, RSA,
  63. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  64. * included with this distribution is covered by the same copyright terms
  65. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  66. *
  67. * Copyright remains Eric Young's, and as such any Copyright notices in
  68. * the code are not to be removed.
  69. * If this package is used in a product, Eric Young should be given attribution
  70. * as the author of the parts of the library used.
  71. * This can be in the form of a textual message at program startup or
  72. * in documentation (online or textual) provided with the package.
  73. *
  74. * Redistribution and use in source and binary forms, with or without
  75. * modification, are permitted provided that the following conditions
  76. * are met:
  77. * 1. Redistributions of source code must retain the copyright
  78. * notice, this list of conditions and the following disclaimer.
  79. * 2. Redistributions in binary form must reproduce the above copyright
  80. * notice, this list of conditions and the following disclaimer in the
  81. * documentation and/or other materials provided with the distribution.
  82. * 3. All advertising materials mentioning features or use of this software
  83. * must display the following acknowledgement:
  84. * "This product includes cryptographic software written by
  85. * Eric Young (eay@cryptsoft.com)"
  86. * The word 'cryptographic' can be left out if the rouines from the library
  87. * being used are not cryptographic related :-).
  88. * 4. If you include any Windows specific code (or a derivative thereof) from
  89. * the apps directory (application code) you must include an acknowledgement:
  90. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  91. *
  92. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  93. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  94. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  95. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  96. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  97. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  98. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  99. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  100. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  101. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  102. * SUCH DAMAGE.
  103. *
  104. * The licence and distribution terms for any publically available version or
  105. * derivative of this code cannot be changed. i.e. this code cannot simply be
  106. * copied and put under another distribution licence
  107. * [including the GNU Public Licence.] */
  108. #include <openssl/rsa.h>
  109. #include <string.h>
  110. #include <openssl/bn.h>
  111. #include <openssl/mem.h>
  112. #include <openssl/err.h>
  113. #include <openssl/thread.h>
  114. #include "internal.h"
  115. #define BN_BLINDING_COUNTER 32
  116. struct bn_blinding_st {
  117. BIGNUM *A;
  118. BIGNUM *Ai;
  119. BIGNUM *e;
  120. BIGNUM *mod; /* just a reference */
  121. int counter;
  122. unsigned long flags;
  123. BN_MONT_CTX *m_ctx;
  124. int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
  125. const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx);
  126. };
  127. BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod) {
  128. BN_BLINDING *ret = NULL;
  129. ret = (BN_BLINDING*) OPENSSL_malloc(sizeof(BN_BLINDING));
  130. if (ret == NULL) {
  131. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_new, ERR_R_MALLOC_FAILURE);
  132. return NULL;
  133. }
  134. memset(ret, 0, sizeof(BN_BLINDING));
  135. if (A != NULL) {
  136. ret->A = BN_dup(A);
  137. if (ret->A == NULL) {
  138. goto err;
  139. }
  140. }
  141. if (Ai != NULL) {
  142. ret->Ai = BN_dup(Ai);
  143. if (ret->Ai == NULL) {
  144. goto err;
  145. }
  146. }
  147. /* save a copy of mod in the BN_BLINDING structure */
  148. ret->mod = BN_dup(mod);
  149. if (ret->mod == NULL) {
  150. goto err;
  151. }
  152. if (BN_get_flags(mod, BN_FLG_CONSTTIME) != 0) {
  153. BN_set_flags(ret->mod, BN_FLG_CONSTTIME);
  154. }
  155. /* Set the counter to the special value -1
  156. * to indicate that this is never-used fresh blinding
  157. * that does not need updating before first use. */
  158. ret->counter = -1;
  159. return ret;
  160. err:
  161. if (ret != NULL) {
  162. BN_BLINDING_free(ret);
  163. }
  164. return NULL;
  165. }
  166. void BN_BLINDING_free(BN_BLINDING *r) {
  167. if (r == NULL) {
  168. return;
  169. }
  170. if (r->A != NULL) {
  171. BN_free(r->A);
  172. }
  173. if (r->Ai != NULL) {
  174. BN_free(r->Ai);
  175. }
  176. if (r->e != NULL) {
  177. BN_free(r->e);
  178. }
  179. if (r->mod != NULL) {
  180. BN_free(r->mod);
  181. }
  182. OPENSSL_free(r);
  183. }
  184. int BN_BLINDING_update(BN_BLINDING *b, BN_CTX *ctx) {
  185. int ret = 0;
  186. if (b->A == NULL || b->Ai == NULL) {
  187. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_update, RSA_R_BN_NOT_INITIALIZED);
  188. goto err;
  189. }
  190. if (b->counter == -1) {
  191. b->counter = 0;
  192. }
  193. if (++b->counter == BN_BLINDING_COUNTER && b->e != NULL &&
  194. !(b->flags & BN_BLINDING_NO_RECREATE)) {
  195. /* re-create blinding parameters */
  196. if (!BN_BLINDING_create_param(b, NULL, NULL, ctx, NULL, NULL)) {
  197. goto err;
  198. }
  199. } else if (!(b->flags & BN_BLINDING_NO_UPDATE)) {
  200. if (!BN_mod_mul(b->A, b->A, b->A, b->mod, ctx)) {
  201. goto err;
  202. }
  203. if (!BN_mod_mul(b->Ai, b->Ai, b->Ai, b->mod, ctx)) {
  204. goto err;
  205. }
  206. }
  207. ret = 1;
  208. err:
  209. if (b->counter == BN_BLINDING_COUNTER) {
  210. b->counter = 0;
  211. }
  212. return ret;
  213. }
  214. int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx) {
  215. return BN_BLINDING_convert_ex(n, NULL, b, ctx);
  216. }
  217. int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, BN_CTX *ctx) {
  218. int ret = 1;
  219. if (b->A == NULL || b->Ai == NULL) {
  220. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_convert_ex, RSA_R_BN_NOT_INITIALIZED);
  221. return 0;
  222. }
  223. if (b->counter == -1) {
  224. /* Fresh blinding, doesn't need updating. */
  225. b->counter = 0;
  226. } else if (!BN_BLINDING_update(b, ctx)) {
  227. return 0;
  228. }
  229. if (r != NULL) {
  230. if (!BN_copy(r, b->Ai)) {
  231. ret = 0;
  232. }
  233. }
  234. if (!BN_mod_mul(n, n, b->A, b->mod, ctx)) {
  235. ret = 0;
  236. }
  237. return ret;
  238. }
  239. int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx) {
  240. return BN_BLINDING_invert_ex(n, NULL, b, ctx);
  241. }
  242. int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b,
  243. BN_CTX *ctx) {
  244. int ret;
  245. if (r != NULL) {
  246. ret = BN_mod_mul(n, n, r, b->mod, ctx);
  247. } else {
  248. if (b->Ai == NULL) {
  249. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_invert_ex, RSA_R_BN_NOT_INITIALIZED);
  250. return 0;
  251. }
  252. ret = BN_mod_mul(n, n, b->Ai, b->mod, ctx);
  253. }
  254. return ret;
  255. }
  256. unsigned long BN_BLINDING_get_flags(const BN_BLINDING *b) { return b->flags; }
  257. void BN_BLINDING_set_flags(BN_BLINDING *b, unsigned long flags) {
  258. b->flags = flags;
  259. }
  260. BN_BLINDING *BN_BLINDING_create_param(
  261. BN_BLINDING *b, const BIGNUM *e, BIGNUM *m, BN_CTX *ctx,
  262. int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
  263. const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx),
  264. BN_MONT_CTX *m_ctx) {
  265. int retry_counter = 32;
  266. BN_BLINDING *ret = NULL;
  267. if (b == NULL) {
  268. ret = BN_BLINDING_new(NULL, NULL, m);
  269. } else {
  270. ret = b;
  271. }
  272. if (ret == NULL) {
  273. goto err;
  274. }
  275. if (ret->A == NULL && (ret->A = BN_new()) == NULL) {
  276. goto err;
  277. }
  278. if (ret->Ai == NULL && (ret->Ai = BN_new()) == NULL) {
  279. goto err;
  280. }
  281. if (e != NULL) {
  282. if (ret->e != NULL) {
  283. BN_free(ret->e);
  284. }
  285. ret->e = BN_dup(e);
  286. }
  287. if (ret->e == NULL) {
  288. goto err;
  289. }
  290. if (bn_mod_exp != NULL) {
  291. ret->bn_mod_exp = bn_mod_exp;
  292. }
  293. if (m_ctx != NULL) {
  294. ret->m_ctx = m_ctx;
  295. }
  296. do {
  297. if (!BN_rand_range(ret->A, ret->mod)) {
  298. goto err;
  299. }
  300. if (BN_mod_inverse(ret->Ai, ret->A, ret->mod, ctx) == NULL) {
  301. /* this should almost never happen for good RSA keys */
  302. uint32_t error = ERR_peek_last_error();
  303. if (ERR_GET_REASON(error) == BN_R_NO_INVERSE) {
  304. if (retry_counter-- == 0) {
  305. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_create_param,
  306. RSA_R_TOO_MANY_ITERATIONS);
  307. goto err;
  308. }
  309. ERR_clear_error();
  310. } else {
  311. goto err;
  312. }
  313. } else {
  314. break;
  315. }
  316. } while (1);
  317. if (ret->bn_mod_exp != NULL && ret->m_ctx != NULL) {
  318. if (!ret->bn_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx, ret->m_ctx)) {
  319. goto err;
  320. }
  321. } else {
  322. if (!BN_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx)) {
  323. goto err;
  324. }
  325. }
  326. return ret;
  327. err:
  328. if (b == NULL && ret != NULL) {
  329. BN_BLINDING_free(ret);
  330. ret = NULL;
  331. }
  332. return ret;
  333. }
  334. static BIGNUM *rsa_get_public_exp(const BIGNUM *d, const BIGNUM *p,
  335. const BIGNUM *q, BN_CTX *ctx) {
  336. BIGNUM *ret = NULL, *r0, *r1, *r2;
  337. if (d == NULL || p == NULL || q == NULL) {
  338. return NULL;
  339. }
  340. BN_CTX_start(ctx);
  341. r0 = BN_CTX_get(ctx);
  342. r1 = BN_CTX_get(ctx);
  343. r2 = BN_CTX_get(ctx);
  344. if (r2 == NULL) {
  345. goto err;
  346. }
  347. if (!BN_sub(r1, p, BN_value_one())) {
  348. goto err;
  349. }
  350. if (!BN_sub(r2, q, BN_value_one())) {
  351. goto err;
  352. }
  353. if (!BN_mul(r0, r1, r2, ctx)) {
  354. goto err;
  355. }
  356. ret = BN_mod_inverse(NULL, d, r0, ctx);
  357. err:
  358. BN_CTX_end(ctx);
  359. return ret;
  360. }
  361. BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx) {
  362. BIGNUM local_n;
  363. BIGNUM *e, *n;
  364. BN_CTX *ctx;
  365. BN_BLINDING *ret = NULL;
  366. BN_MONT_CTX *mont_ctx = NULL;
  367. if (in_ctx == NULL) {
  368. ctx = BN_CTX_new();
  369. if (ctx == NULL) {
  370. return 0;
  371. }
  372. } else {
  373. ctx = in_ctx;
  374. }
  375. BN_CTX_start(ctx);
  376. e = BN_CTX_get(ctx);
  377. if (e == NULL) {
  378. OPENSSL_PUT_ERROR(RSA, rsa_setup_blinding, ERR_R_MALLOC_FAILURE);
  379. goto err;
  380. }
  381. if (rsa->e == NULL) {
  382. e = rsa_get_public_exp(rsa->d, rsa->p, rsa->q, ctx);
  383. if (e == NULL) {
  384. OPENSSL_PUT_ERROR(RSA, rsa_setup_blinding, RSA_R_NO_PUBLIC_EXPONENT);
  385. goto err;
  386. }
  387. } else {
  388. e = rsa->e;
  389. }
  390. n = &local_n;
  391. BN_with_flags(n, rsa->n, BN_FLG_CONSTTIME);
  392. if (rsa->flags & RSA_FLAG_CACHE_PUBLIC) {
  393. mont_ctx =
  394. BN_MONT_CTX_set_locked(&rsa->_method_mod_n, &rsa->lock, rsa->n, ctx);
  395. if (mont_ctx == NULL) {
  396. goto err;
  397. }
  398. }
  399. ret = BN_BLINDING_create_param(NULL, e, n, ctx, rsa->meth->bn_mod_exp,
  400. mont_ctx);
  401. if (ret == NULL) {
  402. OPENSSL_PUT_ERROR(RSA, rsa_setup_blinding, ERR_R_BN_LIB);
  403. goto err;
  404. }
  405. err:
  406. BN_CTX_end(ctx);
  407. if (in_ctx == NULL) {
  408. BN_CTX_free(ctx);
  409. }
  410. if (rsa->e == NULL) {
  411. BN_free(e);
  412. }
  413. return ret;
  414. }