]>
git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/rsa/rsa_lib.c
2 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include <openssl/crypto.h>
12 #include "internal/cryptlib.h"
13 #include <openssl/lhash.h>
14 #include "internal/bn_int.h"
15 #include <openssl/rand.h>
16 #include <openssl/engine.h>
19 static const RSA_METHOD
*default_RSA_meth
= NULL
;
23 RSA
*r
= RSA_new_method(NULL
);
28 void RSA_set_default_method(const RSA_METHOD
*meth
)
30 default_RSA_meth
= meth
;
33 const RSA_METHOD
*RSA_get_default_method(void)
35 if (default_RSA_meth
== NULL
) {
37 default_RSA_meth
= RSA_null_method();
39 default_RSA_meth
= RSA_PKCS1_OpenSSL();
43 return default_RSA_meth
;
46 const RSA_METHOD
*RSA_get_method(const RSA
*rsa
)
51 int RSA_set_method(RSA
*rsa
, const RSA_METHOD
*meth
)
54 * NB: The caller is specifically setting a method, so it's not up to us
55 * to deal with which ENGINE it comes from.
57 const RSA_METHOD
*mtmp
;
61 #ifndef OPENSSL_NO_ENGINE
62 ENGINE_finish(rsa
->engine
);
71 RSA
*RSA_new_method(ENGINE
*engine
)
73 RSA
*ret
= OPENSSL_zalloc(sizeof(*ret
));
76 RSAerr(RSA_F_RSA_NEW_METHOD
, ERR_R_MALLOC_FAILURE
);
81 ret
->lock
= CRYPTO_THREAD_lock_new();
82 if (ret
->lock
== NULL
) {
83 RSAerr(RSA_F_RSA_NEW_METHOD
, ERR_R_MALLOC_FAILURE
);
88 ret
->meth
= RSA_get_default_method();
89 #ifndef OPENSSL_NO_ENGINE
90 ret
->flags
= ret
->meth
->flags
& ~RSA_FLAG_NON_FIPS_ALLOW
;
92 if (!ENGINE_init(engine
)) {
93 RSAerr(RSA_F_RSA_NEW_METHOD
, ERR_R_ENGINE_LIB
);
98 ret
->engine
= ENGINE_get_default_RSA();
100 ret
->meth
= ENGINE_get_RSA(ret
->engine
);
101 if (ret
->meth
== NULL
) {
102 RSAerr(RSA_F_RSA_NEW_METHOD
, ERR_R_ENGINE_LIB
);
108 ret
->flags
= ret
->meth
->flags
& ~RSA_FLAG_NON_FIPS_ALLOW
;
109 if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_RSA
, ret
, &ret
->ex_data
)) {
113 if ((ret
->meth
->init
!= NULL
) && !ret
->meth
->init(ret
)) {
114 RSAerr(RSA_F_RSA_NEW_METHOD
, ERR_R_INIT_FAIL
);
125 void RSA_free(RSA
*r
)
132 CRYPTO_atomic_add(&r
->references
, -1, &i
, r
->lock
);
133 REF_PRINT_COUNT("RSA", r
);
136 REF_ASSERT_ISNT(i
< 0);
140 #ifndef OPENSSL_NO_ENGINE
141 ENGINE_finish(r
->engine
);
144 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_RSA
, r
, &r
->ex_data
);
146 CRYPTO_THREAD_lock_free(r
->lock
);
153 BN_clear_free(r
->dmp1
);
154 BN_clear_free(r
->dmq1
);
155 BN_clear_free(r
->iqmp
);
156 BN_BLINDING_free(r
->blinding
);
157 BN_BLINDING_free(r
->mt_blinding
);
158 OPENSSL_free(r
->bignum_data
);
162 int RSA_up_ref(RSA
*r
)
166 if (CRYPTO_atomic_add(&r
->references
, 1, &i
, r
->lock
) <= 0)
169 REF_PRINT_COUNT("RSA", r
);
170 REF_ASSERT_ISNT(i
< 2);
171 return ((i
> 1) ? 1 : 0);
174 int RSA_set_ex_data(RSA
*r
, int idx
, void *arg
)
176 return (CRYPTO_set_ex_data(&r
->ex_data
, idx
, arg
));
179 void *RSA_get_ex_data(const RSA
*r
, int idx
)
181 return (CRYPTO_get_ex_data(&r
->ex_data
, idx
));
184 int RSA_memory_lock(RSA
*r
)
188 BIGNUM
*bn
, **t
[6], *b
;
199 k
= bn_sizeof_BIGNUM() * 6;
200 off
= k
/ sizeof(BN_ULONG
) + 1;
202 for (i
= 0; i
< 6; i
++)
203 j
+= bn_get_top(*t
[i
]);
204 if ((p
= OPENSSL_malloc((off
+ j
) * sizeof(*p
))) == NULL
) {
205 RSAerr(RSA_F_RSA_MEMORY_LOCK
, ERR_R_MALLOC_FAILURE
);
208 memset(p
, 0, sizeof(*p
) * (off
+ j
));
210 ul
= (BN_ULONG
*)&(p
[off
]);
211 for (i
= 0; i
< 6; i
++) {
213 *(t
[i
]) = bn_array_el(bn
, i
);
214 memcpy(bn_array_el(bn
, i
), b
, bn_sizeof_BIGNUM());
215 memcpy(ul
, bn_get_words(b
), sizeof(*ul
) * bn_get_top(b
));
216 bn_set_static_words(bn_array_el(bn
, i
), ul
, bn_get_top(b
));
221 /* I should fix this so it can still be done */
222 r
->flags
&= ~(RSA_FLAG_CACHE_PRIVATE
| RSA_FLAG_CACHE_PUBLIC
);
228 int RSA_security_bits(const RSA
*rsa
)
230 return BN_security_bits(BN_num_bits(rsa
->n
), -1);
233 int RSA_set0_key(RSA
*r
, BIGNUM
*n
, BIGNUM
*e
, BIGNUM
*d
)
235 /* If the fields n and e in r are NULL, the corresponding input
236 * parameters MUST be non-NULL for n and e. d may be
237 * left NULL (in case only the public key is used).
239 if ((r
->n
== NULL
&& n
== NULL
)
240 || (r
->e
== NULL
&& e
== NULL
))
259 int RSA_set0_factors(RSA
*r
, BIGNUM
*p
, BIGNUM
*q
)
261 /* If the fields p and q in r are NULL, the corresponding input
262 * parameters MUST be non-NULL.
264 if ((r
->p
== NULL
&& p
== NULL
)
265 || (r
->q
== NULL
&& q
== NULL
))
280 int RSA_set0_crt_params(RSA
*r
, BIGNUM
*dmp1
, BIGNUM
*dmq1
, BIGNUM
*iqmp
)
282 /* If the fields dmp1, dmq1 and iqmp in r are NULL, the corresponding input
283 * parameters MUST be non-NULL.
285 if ((r
->dmp1
== NULL
&& dmp1
== NULL
)
286 || (r
->dmq1
== NULL
&& dmq1
== NULL
)
287 || (r
->iqmp
== NULL
&& iqmp
== NULL
))
306 void RSA_get0_key(const RSA
*r
,
307 const BIGNUM
**n
, const BIGNUM
**e
, const BIGNUM
**d
)
317 void RSA_get0_factors(const RSA
*r
, const BIGNUM
**p
, const BIGNUM
**q
)
325 void RSA_get0_crt_params(const RSA
*r
,
326 const BIGNUM
**dmp1
, const BIGNUM
**dmq1
,
337 void RSA_clear_flags(RSA
*r
, int flags
)
342 int RSA_test_flags(const RSA
*r
, int flags
)
344 return r
->flags
& flags
;
347 void RSA_set_flags(RSA
*r
, int flags
)
352 ENGINE
*RSA_get0_engine(RSA
*r
)