25개 이상의 토픽을 선택하실 수 없습니다. Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

462 lines
13 KiB

  1. /* ====================================================================
  2. * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions
  6. * are met:
  7. *
  8. * 1. Redistributions of source code must retain the above copyright
  9. * notice, this list of conditions and the following disclaimer.
  10. *
  11. * 2. Redistributions in binary form must reproduce the above copyright
  12. * notice, this list of conditions and the following disclaimer in
  13. * the documentation and/or other materials provided with the
  14. * distribution.
  15. *
  16. * 3. All advertising materials mentioning features or use of this
  17. * software must display the following acknowledgment:
  18. * "This product includes software developed by the OpenSSL Project
  19. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  20. *
  21. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  22. * endorse or promote products derived from this software without
  23. * prior written permission. For written permission, please contact
  24. * openssl-core@openssl.org.
  25. *
  26. * 5. Products derived from this software may not be called "OpenSSL"
  27. * nor may "OpenSSL" appear in their names without prior written
  28. * permission of the OpenSSL Project.
  29. *
  30. * 6. Redistributions of any form whatsoever must retain the following
  31. * acknowledgment:
  32. * "This product includes software developed by the OpenSSL Project
  33. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  34. *
  35. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  36. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  37. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  38. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  39. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  40. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  41. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  42. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  43. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  44. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  45. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  46. * OF THE POSSIBILITY OF SUCH DAMAGE.
  47. * ====================================================================
  48. *
  49. * This product includes cryptographic software written by Eric Young
  50. * (eay@cryptsoft.com). This product includes software written by Tim
  51. * Hudson (tjh@cryptsoft.com).
  52. *
  53. * Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  54. * All rights reserved.
  55. *
  56. * This package is an SSL implementation written
  57. * by Eric Young (eay@cryptsoft.com).
  58. * The implementation was written so as to conform with Netscapes SSL.
  59. *
  60. * This library is free for commercial and non-commercial use as long as
  61. * the following conditions are aheared to. The following conditions
  62. * apply to all code found in this distribution, be it the RC4, RSA,
  63. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  64. * included with this distribution is covered by the same copyright terms
  65. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  66. *
  67. * Copyright remains Eric Young's, and as such any Copyright notices in
  68. * the code are not to be removed.
  69. * If this package is used in a product, Eric Young should be given attribution
  70. * as the author of the parts of the library used.
  71. * This can be in the form of a textual message at program startup or
  72. * in documentation (online or textual) provided with the package.
  73. *
  74. * Redistribution and use in source and binary forms, with or without
  75. * modification, are permitted provided that the following conditions
  76. * are met:
  77. * 1. Redistributions of source code must retain the copyright
  78. * notice, this list of conditions and the following disclaimer.
  79. * 2. Redistributions in binary form must reproduce the above copyright
  80. * notice, this list of conditions and the following disclaimer in the
  81. * documentation and/or other materials provided with the distribution.
  82. * 3. All advertising materials mentioning features or use of this software
  83. * must display the following acknowledgement:
  84. * "This product includes cryptographic software written by
  85. * Eric Young (eay@cryptsoft.com)"
  86. * The word 'cryptographic' can be left out if the rouines from the library
  87. * being used are not cryptographic related :-).
  88. * 4. If you include any Windows specific code (or a derivative thereof) from
  89. * the apps directory (application code) you must include an acknowledgement:
  90. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  91. *
  92. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  93. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  94. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  95. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  96. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  97. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  98. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  99. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  100. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  101. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  102. * SUCH DAMAGE.
  103. *
  104. * The licence and distribution terms for any publically available version or
  105. * derivative of this code cannot be changed. i.e. this code cannot simply be
  106. * copied and put under another distribution licence
  107. * [including the GNU Public Licence.] */
  108. #include <openssl/rsa.h>
  109. #include <string.h>
  110. #include <openssl/bn.h>
  111. #include <openssl/mem.h>
  112. #include <openssl/err.h>
  113. #include <openssl/thread.h>
  114. #include "internal.h"
  115. #define BN_BLINDING_COUNTER 32
  116. struct bn_blinding_st {
  117. BIGNUM *A;
  118. BIGNUM *Ai;
  119. BIGNUM *e;
  120. BIGNUM *mod; /* just a reference */
  121. int counter;
  122. unsigned long flags;
  123. BN_MONT_CTX *m_ctx;
  124. int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
  125. const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx);
  126. };
  127. BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod) {
  128. BN_BLINDING *ret = NULL;
  129. ret = (BN_BLINDING*) OPENSSL_malloc(sizeof(BN_BLINDING));
  130. if (ret == NULL) {
  131. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_new, ERR_R_MALLOC_FAILURE);
  132. return NULL;
  133. }
  134. memset(ret, 0, sizeof(BN_BLINDING));
  135. if (A != NULL) {
  136. ret->A = BN_dup(A);
  137. if (ret->A == NULL) {
  138. goto err;
  139. }
  140. }
  141. if (Ai != NULL) {
  142. ret->Ai = BN_dup(Ai);
  143. if (ret->Ai == NULL) {
  144. goto err;
  145. }
  146. }
  147. /* save a copy of mod in the BN_BLINDING structure */
  148. ret->mod = BN_dup(mod);
  149. if (ret->mod == NULL) {
  150. goto err;
  151. }
  152. if (BN_get_flags(mod, BN_FLG_CONSTTIME) != 0) {
  153. BN_set_flags(ret->mod, BN_FLG_CONSTTIME);
  154. }
  155. /* Set the counter to the special value -1
  156. * to indicate that this is never-used fresh blinding
  157. * that does not need updating before first use. */
  158. ret->counter = -1;
  159. return ret;
  160. err:
  161. BN_BLINDING_free(ret);
  162. return NULL;
  163. }
  164. void BN_BLINDING_free(BN_BLINDING *r) {
  165. if (r == NULL) {
  166. return;
  167. }
  168. BN_free(r->A);
  169. BN_free(r->Ai);
  170. BN_free(r->e);
  171. BN_free(r->mod);
  172. OPENSSL_free(r);
  173. }
  174. int BN_BLINDING_update(BN_BLINDING *b, BN_CTX *ctx) {
  175. int ret = 0;
  176. if (b->A == NULL || b->Ai == NULL) {
  177. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_update, RSA_R_BN_NOT_INITIALIZED);
  178. goto err;
  179. }
  180. if (b->counter == -1) {
  181. b->counter = 0;
  182. }
  183. if (++b->counter == BN_BLINDING_COUNTER && b->e != NULL &&
  184. !(b->flags & BN_BLINDING_NO_RECREATE)) {
  185. /* re-create blinding parameters */
  186. if (!BN_BLINDING_create_param(b, NULL, NULL, ctx, NULL, NULL)) {
  187. goto err;
  188. }
  189. } else if (!(b->flags & BN_BLINDING_NO_UPDATE)) {
  190. if (!BN_mod_mul(b->A, b->A, b->A, b->mod, ctx)) {
  191. goto err;
  192. }
  193. if (!BN_mod_mul(b->Ai, b->Ai, b->Ai, b->mod, ctx)) {
  194. goto err;
  195. }
  196. }
  197. ret = 1;
  198. err:
  199. if (b->counter == BN_BLINDING_COUNTER) {
  200. b->counter = 0;
  201. }
  202. return ret;
  203. }
  204. int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx) {
  205. return BN_BLINDING_convert_ex(n, NULL, b, ctx);
  206. }
  207. int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, BN_CTX *ctx) {
  208. int ret = 1;
  209. if (b->A == NULL || b->Ai == NULL) {
  210. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_convert_ex, RSA_R_BN_NOT_INITIALIZED);
  211. return 0;
  212. }
  213. if (b->counter == -1) {
  214. /* Fresh blinding, doesn't need updating. */
  215. b->counter = 0;
  216. } else if (!BN_BLINDING_update(b, ctx)) {
  217. return 0;
  218. }
  219. if (r != NULL) {
  220. if (!BN_copy(r, b->Ai)) {
  221. ret = 0;
  222. }
  223. }
  224. if (!BN_mod_mul(n, n, b->A, b->mod, ctx)) {
  225. ret = 0;
  226. }
  227. return ret;
  228. }
  229. int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx) {
  230. return BN_BLINDING_invert_ex(n, NULL, b, ctx);
  231. }
  232. int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b,
  233. BN_CTX *ctx) {
  234. int ret;
  235. if (r != NULL) {
  236. ret = BN_mod_mul(n, n, r, b->mod, ctx);
  237. } else {
  238. if (b->Ai == NULL) {
  239. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_invert_ex, RSA_R_BN_NOT_INITIALIZED);
  240. return 0;
  241. }
  242. ret = BN_mod_mul(n, n, b->Ai, b->mod, ctx);
  243. }
  244. return ret;
  245. }
  246. unsigned long BN_BLINDING_get_flags(const BN_BLINDING *b) { return b->flags; }
  247. void BN_BLINDING_set_flags(BN_BLINDING *b, unsigned long flags) {
  248. b->flags = flags;
  249. }
  250. BN_BLINDING *BN_BLINDING_create_param(
  251. BN_BLINDING *b, const BIGNUM *e, BIGNUM *m, BN_CTX *ctx,
  252. int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
  253. const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx),
  254. BN_MONT_CTX *m_ctx) {
  255. int retry_counter = 32;
  256. BN_BLINDING *ret = NULL;
  257. if (b == NULL) {
  258. ret = BN_BLINDING_new(NULL, NULL, m);
  259. } else {
  260. ret = b;
  261. }
  262. if (ret == NULL) {
  263. goto err;
  264. }
  265. if (ret->A == NULL && (ret->A = BN_new()) == NULL) {
  266. goto err;
  267. }
  268. if (ret->Ai == NULL && (ret->Ai = BN_new()) == NULL) {
  269. goto err;
  270. }
  271. if (e != NULL) {
  272. BN_free(ret->e);
  273. ret->e = BN_dup(e);
  274. }
  275. if (ret->e == NULL) {
  276. goto err;
  277. }
  278. if (bn_mod_exp != NULL) {
  279. ret->bn_mod_exp = bn_mod_exp;
  280. }
  281. if (m_ctx != NULL) {
  282. ret->m_ctx = m_ctx;
  283. }
  284. do {
  285. if (!BN_rand_range(ret->A, ret->mod)) {
  286. goto err;
  287. }
  288. if (BN_mod_inverse(ret->Ai, ret->A, ret->mod, ctx) == NULL) {
  289. /* this should almost never happen for good RSA keys */
  290. uint32_t error = ERR_peek_last_error();
  291. if (ERR_GET_REASON(error) == BN_R_NO_INVERSE) {
  292. if (retry_counter-- == 0) {
  293. OPENSSL_PUT_ERROR(RSA, BN_BLINDING_create_param,
  294. RSA_R_TOO_MANY_ITERATIONS);
  295. goto err;
  296. }
  297. ERR_clear_error();
  298. } else {
  299. goto err;
  300. }
  301. } else {
  302. break;
  303. }
  304. } while (1);
  305. if (ret->bn_mod_exp != NULL && ret->m_ctx != NULL) {
  306. if (!ret->bn_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx, ret->m_ctx)) {
  307. goto err;
  308. }
  309. } else {
  310. if (!BN_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx)) {
  311. goto err;
  312. }
  313. }
  314. return ret;
  315. err:
  316. if (b == NULL) {
  317. BN_BLINDING_free(ret);
  318. ret = NULL;
  319. }
  320. return ret;
  321. }
  322. static BIGNUM *rsa_get_public_exp(const BIGNUM *d, const BIGNUM *p,
  323. const BIGNUM *q, BN_CTX *ctx) {
  324. BIGNUM *ret = NULL, *r0, *r1, *r2;
  325. if (d == NULL || p == NULL || q == NULL) {
  326. return NULL;
  327. }
  328. BN_CTX_start(ctx);
  329. r0 = BN_CTX_get(ctx);
  330. r1 = BN_CTX_get(ctx);
  331. r2 = BN_CTX_get(ctx);
  332. if (r2 == NULL) {
  333. goto err;
  334. }
  335. if (!BN_sub(r1, p, BN_value_one())) {
  336. goto err;
  337. }
  338. if (!BN_sub(r2, q, BN_value_one())) {
  339. goto err;
  340. }
  341. if (!BN_mul(r0, r1, r2, ctx)) {
  342. goto err;
  343. }
  344. ret = BN_mod_inverse(NULL, d, r0, ctx);
  345. err:
  346. BN_CTX_end(ctx);
  347. return ret;
  348. }
  349. BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx) {
  350. BIGNUM local_n;
  351. BIGNUM *e, *n;
  352. BN_CTX *ctx;
  353. BN_BLINDING *ret = NULL;
  354. BN_MONT_CTX *mont_ctx = NULL;
  355. if (in_ctx == NULL) {
  356. ctx = BN_CTX_new();
  357. if (ctx == NULL) {
  358. return 0;
  359. }
  360. } else {
  361. ctx = in_ctx;
  362. }
  363. BN_CTX_start(ctx);
  364. e = BN_CTX_get(ctx);
  365. if (e == NULL) {
  366. OPENSSL_PUT_ERROR(RSA, rsa_setup_blinding, ERR_R_MALLOC_FAILURE);
  367. goto err;
  368. }
  369. if (rsa->e == NULL) {
  370. e = rsa_get_public_exp(rsa->d, rsa->p, rsa->q, ctx);
  371. if (e == NULL) {
  372. OPENSSL_PUT_ERROR(RSA, rsa_setup_blinding, RSA_R_NO_PUBLIC_EXPONENT);
  373. goto err;
  374. }
  375. } else {
  376. e = rsa->e;
  377. }
  378. n = &local_n;
  379. BN_with_flags(n, rsa->n, BN_FLG_CONSTTIME);
  380. if (rsa->flags & RSA_FLAG_CACHE_PUBLIC) {
  381. mont_ctx =
  382. BN_MONT_CTX_set_locked(&rsa->_method_mod_n, &rsa->lock, rsa->n, ctx);
  383. if (mont_ctx == NULL) {
  384. goto err;
  385. }
  386. }
  387. ret = BN_BLINDING_create_param(NULL, e, n, ctx, rsa->meth->bn_mod_exp,
  388. mont_ctx);
  389. if (ret == NULL) {
  390. OPENSSL_PUT_ERROR(RSA, rsa_setup_blinding, ERR_R_BN_LIB);
  391. goto err;
  392. }
  393. err:
  394. BN_CTX_end(ctx);
  395. if (in_ctx == NULL) {
  396. BN_CTX_free(ctx);
  397. }
  398. if (rsa->e == NULL) {
  399. BN_free(e);
  400. }
  401. return ret;
  402. }