bn_blind.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359
  1. /* crypto/bn/bn_blind.c */
  2. /* ====================================================================
  3. * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions
  7. * are met:
  8. *
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, this list of conditions and the following disclaimer.
  11. *
  12. * 2. Redistributions in binary form must reproduce the above copyright
  13. * notice, this list of conditions and the following disclaimer in
  14. * the documentation and/or other materials provided with the
  15. * distribution.
  16. *
  17. * 3. All advertising materials mentioning features or use of this
  18. * software must display the following acknowledgment:
  19. * "This product includes software developed by the OpenSSL Project
  20. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  21. *
  22. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  23. * endorse or promote products derived from this software without
  24. * prior written permission. For written permission, please contact
  25. * openssl-core@openssl.org.
  26. *
  27. * 5. Products derived from this software may not be called "OpenSSL"
  28. * nor may "OpenSSL" appear in their names without prior written
  29. * permission of the OpenSSL Project.
  30. *
  31. * 6. Redistributions of any form whatsoever must retain the following
  32. * acknowledgment:
  33. * "This product includes software developed by the OpenSSL Project
  34. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  35. *
  36. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  37. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  38. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  39. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  40. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  41. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  42. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  43. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  44. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  45. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  46. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  47. * OF THE POSSIBILITY OF SUCH DAMAGE.
  48. * ====================================================================
  49. *
  50. * This product includes cryptographic software written by Eric Young
  51. * (eay@cryptsoft.com). This product includes software written by Tim
  52. * Hudson (tjh@cryptsoft.com).
  53. *
  54. */
  55. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  56. * All rights reserved.
  57. *
  58. * This package is an SSL implementation written
  59. * by Eric Young (eay@cryptsoft.com).
  60. * The implementation was written so as to conform with Netscapes SSL.
  61. *
  62. * This library is free for commercial and non-commercial use as long as
  63. * the following conditions are aheared to. The following conditions
  64. * apply to all code found in this distribution, be it the RC4, RSA,
  65. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  66. * included with this distribution is covered by the same copyright terms
  67. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  68. *
  69. * Copyright remains Eric Young's, and as such any Copyright notices in
  70. * the code are not to be removed.
  71. * If this package is used in a product, Eric Young should be given attribution
  72. * as the author of the parts of the library used.
  73. * This can be in the form of a textual message at program startup or
  74. * in documentation (online or textual) provided with the package.
  75. *
  76. * Redistribution and use in source and binary forms, with or without
  77. * modification, are permitted provided that the following conditions
  78. * are met:
  79. * 1. Redistributions of source code must retain the copyright
  80. * notice, this list of conditions and the following disclaimer.
  81. * 2. Redistributions in binary form must reproduce the above copyright
  82. * notice, this list of conditions and the following disclaimer in the
  83. * documentation and/or other materials provided with the distribution.
  84. * 3. All advertising materials mentioning features or use of this software
  85. * must display the following acknowledgement:
  86. * "This product includes cryptographic software written by
  87. * Eric Young (eay@cryptsoft.com)"
  88. * The word 'cryptographic' can be left out if the rouines from the library
  89. * being used are not cryptographic related :-).
  90. * 4. If you include any Windows specific code (or a derivative thereof) from
  91. * the apps directory (application code) you must include an acknowledgement:
  92. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  93. *
  94. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  95. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  96. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  97. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  98. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  99. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  100. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  101. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  102. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  103. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  104. * SUCH DAMAGE.
  105. *
  106. * The licence and distribution terms for any publically available version or
  107. * derivative of this code cannot be changed. i.e. this code cannot simply be
  108. * copied and put under another distribution licence
  109. * [including the GNU Public Licence.]
  110. */
  111. #include <stdio.h>
  112. #include "cryptlib.h"
  113. #include "bn_lcl.h"
  114. #define BN_BLINDING_COUNTER 32
  115. struct bn_blinding_st
  116. {
  117. BIGNUM *A;
  118. BIGNUM *Ai;
  119. BIGNUM *e;
  120. BIGNUM *mod; /* just a reference */
  121. unsigned long thread_id; /* added in OpenSSL 0.9.6j and 0.9.7b;
  122. * used only by crypto/rsa/rsa_eay.c, rsa_lib.c */
  123. unsigned int counter;
  124. unsigned long flags;
  125. BN_MONT_CTX *m_ctx;
  126. int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
  127. const BIGNUM *m, BN_CTX *ctx,
  128. BN_MONT_CTX *m_ctx);
  129. };
  130. BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod)
  131. {
  132. BN_BLINDING *ret=NULL;
  133. bn_check_top(mod);
  134. if ((ret=(BN_BLINDING *)OPENSSL_malloc(sizeof(BN_BLINDING))) == NULL)
  135. {
  136. BNerr(BN_F_BN_BLINDING_NEW,ERR_R_MALLOC_FAILURE);
  137. return(NULL);
  138. }
  139. memset(ret,0,sizeof(BN_BLINDING));
  140. if (A != NULL)
  141. {
  142. if ((ret->A = BN_dup(A)) == NULL) goto err;
  143. }
  144. if (Ai != NULL)
  145. {
  146. if ((ret->Ai = BN_dup(Ai)) == NULL) goto err;
  147. }
  148. ret->mod = mod;
  149. ret->counter = BN_BLINDING_COUNTER;
  150. return(ret);
  151. err:
  152. if (ret != NULL) BN_BLINDING_free(ret);
  153. return(NULL);
  154. }
  155. void BN_BLINDING_free(BN_BLINDING *r)
  156. {
  157. if(r == NULL)
  158. return;
  159. if (r->A != NULL) BN_free(r->A );
  160. if (r->Ai != NULL) BN_free(r->Ai);
  161. if (r->e != NULL) BN_free(r->e );
  162. OPENSSL_free(r);
  163. }
  164. int BN_BLINDING_update(BN_BLINDING *b, BN_CTX *ctx)
  165. {
  166. int ret=0;
  167. if ((b->A == NULL) || (b->Ai == NULL))
  168. {
  169. BNerr(BN_F_BN_BLINDING_UPDATE,BN_R_NOT_INITIALIZED);
  170. goto err;
  171. }
  172. if (--(b->counter) == 0 && b->e != NULL &&
  173. !(b->flags & BN_BLINDING_NO_RECREATE))
  174. {
  175. /* re-create blinding parameters */
  176. if (!BN_BLINDING_create_param(b, NULL, NULL, ctx, NULL, NULL))
  177. goto err;
  178. }
  179. else if (!(b->flags & BN_BLINDING_NO_UPDATE))
  180. {
  181. if (!BN_mod_mul(b->A,b->A,b->A,b->mod,ctx)) goto err;
  182. if (!BN_mod_mul(b->Ai,b->Ai,b->Ai,b->mod,ctx)) goto err;
  183. }
  184. ret=1;
  185. err:
  186. if (b->counter == 0)
  187. b->counter = BN_BLINDING_COUNTER;
  188. return(ret);
  189. }
  190. int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx)
  191. {
  192. return BN_BLINDING_convert_ex(n, NULL, b, ctx);
  193. }
  194. int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, BN_CTX *ctx)
  195. {
  196. int ret = 1;
  197. bn_check_top(n);
  198. if ((b->A == NULL) || (b->Ai == NULL))
  199. {
  200. BNerr(BN_F_BN_BLINDING_CONVERT_EX,BN_R_NOT_INITIALIZED);
  201. return(0);
  202. }
  203. if (r != NULL)
  204. {
  205. if (!BN_copy(r, b->Ai)) ret=0;
  206. }
  207. if (!BN_mod_mul(n,n,b->A,b->mod,ctx)) ret=0;
  208. return ret;
  209. }
  210. int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx)
  211. {
  212. return BN_BLINDING_invert_ex(n, NULL, b, ctx);
  213. }
  214. int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b, BN_CTX *ctx)
  215. {
  216. int ret;
  217. bn_check_top(n);
  218. if ((b->A == NULL) || (b->Ai == NULL))
  219. {
  220. BNerr(BN_F_BN_BLINDING_INVERT_EX,BN_R_NOT_INITIALIZED);
  221. return(0);
  222. }
  223. if (r != NULL)
  224. ret = BN_mod_mul(n, n, r, b->mod, ctx);
  225. else
  226. ret = BN_mod_mul(n, n, b->Ai, b->mod, ctx);
  227. if (ret >= 0)
  228. {
  229. if (!BN_BLINDING_update(b,ctx))
  230. return(0);
  231. }
  232. bn_check_top(n);
  233. return(ret);
  234. }
  235. unsigned long BN_BLINDING_get_thread_id(const BN_BLINDING *b)
  236. {
  237. return b->thread_id;
  238. }
  239. void BN_BLINDING_set_thread_id(BN_BLINDING *b, unsigned long n)
  240. {
  241. b->thread_id = n;
  242. }
  243. unsigned long BN_BLINDING_get_flags(const BN_BLINDING *b)
  244. {
  245. return b->flags;
  246. }
  247. void BN_BLINDING_set_flags(BN_BLINDING *b, unsigned long flags)
  248. {
  249. b->flags = flags;
  250. }
  251. BN_BLINDING *BN_BLINDING_create_param(BN_BLINDING *b,
  252. const BIGNUM *e, BIGNUM *m, BN_CTX *ctx,
  253. int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
  254. const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx),
  255. BN_MONT_CTX *m_ctx)
  256. {
  257. int retry_counter = 32;
  258. BN_BLINDING *ret = NULL;
  259. if (b == NULL)
  260. ret = BN_BLINDING_new(NULL, NULL, m);
  261. else
  262. ret = b;
  263. if (ret == NULL)
  264. goto err;
  265. if (ret->A == NULL && (ret->A = BN_new()) == NULL)
  266. goto err;
  267. if (ret->Ai == NULL && (ret->Ai = BN_new()) == NULL)
  268. goto err;
  269. if (e != NULL)
  270. {
  271. if (ret->e != NULL)
  272. BN_free(ret->e);
  273. ret->e = BN_dup(e);
  274. }
  275. if (ret->e == NULL)
  276. goto err;
  277. if (bn_mod_exp != NULL)
  278. ret->bn_mod_exp = bn_mod_exp;
  279. if (m_ctx != NULL)
  280. ret->m_ctx = m_ctx;
  281. do {
  282. if (!BN_rand_range(ret->A, ret->mod)) goto err;
  283. if (BN_mod_inverse(ret->Ai, ret->A, ret->mod, ctx) == NULL)
  284. {
  285. /* this should almost never happen for good RSA keys */
  286. unsigned long error = ERR_peek_last_error();
  287. if (ERR_GET_REASON(error) == BN_R_NO_INVERSE)
  288. {
  289. if (retry_counter-- == 0)
  290. {
  291. BNerr(BN_F_BN_BLINDING_CREATE_PARAM,
  292. BN_R_TOO_MANY_ITERATIONS);
  293. goto err;
  294. }
  295. ERR_clear_error();
  296. }
  297. else
  298. goto err;
  299. }
  300. else
  301. break;
  302. } while (1);
  303. if (ret->bn_mod_exp != NULL && ret->m_ctx != NULL)
  304. {
  305. if (!ret->bn_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx, ret->m_ctx))
  306. goto err;
  307. }
  308. else
  309. {
  310. if (!BN_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx))
  311. goto err;
  312. }
  313. return ret;
  314. err:
  315. if (b == NULL && ret != NULL)
  316. {
  317. BN_BLINDING_free(ret);
  318. ret = NULL;
  319. }
  320. return ret;
  321. }