bn_blind.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410
  1. /* crypto/bn/bn_blind.c */
  2. /* ====================================================================
  3. * Copyright (c) 1998-2018 The OpenSSL Project. All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions
  7. * are met:
  8. *
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, this list of conditions and the following disclaimer.
  11. *
  12. * 2. Redistributions in binary form must reproduce the above copyright
  13. * notice, this list of conditions and the following disclaimer in
  14. * the documentation and/or other materials provided with the
  15. * distribution.
  16. *
  17. * 3. All advertising materials mentioning features or use of this
  18. * software must display the following acknowledgment:
  19. * "This product includes software developed by the OpenSSL Project
  20. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  21. *
  22. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  23. * endorse or promote products derived from this software without
  24. * prior written permission. For written permission, please contact
  25. * [email protected].
  26. *
  27. * 5. Products derived from this software may not be called "OpenSSL"
  28. * nor may "OpenSSL" appear in their names without prior written
  29. * permission of the OpenSSL Project.
  30. *
  31. * 6. Redistributions of any form whatsoever must retain the following
  32. * acknowledgment:
  33. * "This product includes software developed by the OpenSSL Project
  34. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  35. *
  36. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  37. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  38. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  39. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  40. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  41. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  42. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  43. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  44. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  45. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  46. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  47. * OF THE POSSIBILITY OF SUCH DAMAGE.
  48. * ====================================================================
  49. *
  50. * This product includes cryptographic software written by Eric Young
  51. * ([email protected]). This product includes software written by Tim
  52. * Hudson ([email protected]).
  53. *
  54. */
  55. /* Copyright (C) 1995-1998 Eric Young ([email protected])
  56. * All rights reserved.
  57. *
  58. * This package is an SSL implementation written
  59. * by Eric Young ([email protected]).
  60. * The implementation was written so as to conform with Netscapes SSL.
  61. *
  62. * This library is free for commercial and non-commercial use as long as
  63. * the following conditions are aheared to. The following conditions
  64. * apply to all code found in this distribution, be it the RC4, RSA,
  65. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  66. * included with this distribution is covered by the same copyright terms
  67. * except that the holder is Tim Hudson ([email protected]).
  68. *
  69. * Copyright remains Eric Young's, and as such any Copyright notices in
  70. * the code are not to be removed.
  71. * If this package is used in a product, Eric Young should be given attribution
  72. * as the author of the parts of the library used.
  73. * This can be in the form of a textual message at program startup or
  74. * in documentation (online or textual) provided with the package.
  75. *
  76. * Redistribution and use in source and binary forms, with or without
  77. * modification, are permitted provided that the following conditions
  78. * are met:
  79. * 1. Redistributions of source code must retain the copyright
  80. * notice, this list of conditions and the following disclaimer.
  81. * 2. Redistributions in binary form must reproduce the above copyright
  82. * notice, this list of conditions and the following disclaimer in the
  83. * documentation and/or other materials provided with the distribution.
  84. * 3. All advertising materials mentioning features or use of this software
  85. * must display the following acknowledgement:
  86. * "This product includes cryptographic software written by
  87. * Eric Young ([email protected])"
  88. * The word 'cryptographic' can be left out if the rouines from the library
  89. * being used are not cryptographic related :-).
  90. * 4. If you include any Windows specific code (or a derivative thereof) from
  91. * the apps directory (application code) you must include an acknowledgement:
  92. * "This product includes software written by Tim Hudson ([email protected])"
  93. *
  94. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  95. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  96. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  97. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  98. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  99. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  100. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  101. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  102. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  103. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  104. * SUCH DAMAGE.
  105. *
  106. * The licence and distribution terms for any publically available version or
  107. * derivative of this code cannot be changed. i.e. this code cannot simply be
  108. * copied and put under another distribution licence
  109. * [including the GNU Public Licence.]
  110. */
  111. #include <stdio.h>
  112. #include "cryptlib.h"
  113. #include "bn_lcl.h"
  114. #define BN_BLINDING_COUNTER 32
  115. struct bn_blinding_st {
  116. BIGNUM *A;
  117. BIGNUM *Ai;
  118. BIGNUM *e;
  119. BIGNUM *mod; /* just a reference */
  120. #ifndef OPENSSL_NO_DEPRECATED
  121. unsigned long thread_id; /* added in OpenSSL 0.9.6j and 0.9.7b; used
  122. * only by crypto/rsa/rsa_eay.c, rsa_lib.c */
  123. #endif
  124. CRYPTO_THREADID tid;
  125. int counter;
  126. unsigned long flags;
  127. BN_MONT_CTX *m_ctx;
  128. int (*bn_mod_exp) (BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
  129. const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx);
  130. };
  131. BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod)
  132. {
  133. BN_BLINDING *ret = NULL;
  134. bn_check_top(mod);
  135. if ((ret = (BN_BLINDING *)OPENSSL_malloc(sizeof(BN_BLINDING))) == NULL) {
  136. BNerr(BN_F_BN_BLINDING_NEW, ERR_R_MALLOC_FAILURE);
  137. return (NULL);
  138. }
  139. memset(ret, 0, sizeof(BN_BLINDING));
  140. if (A != NULL) {
  141. if ((ret->A = BN_dup(A)) == NULL)
  142. goto err;
  143. }
  144. if (Ai != NULL) {
  145. if ((ret->Ai = BN_dup(Ai)) == NULL)
  146. goto err;
  147. }
  148. /* save a copy of mod in the BN_BLINDING structure */
  149. if ((ret->mod = BN_dup(mod)) == NULL)
  150. goto err;
  151. if (BN_get_flags(mod, BN_FLG_CONSTTIME) != 0)
  152. BN_set_flags(ret->mod, BN_FLG_CONSTTIME);
  153. /*
  154. * Set the counter to the special value -1 to indicate that this is
  155. * never-used fresh blinding that does not need updating before first
  156. * use.
  157. */
  158. ret->counter = -1;
  159. CRYPTO_THREADID_current(&ret->tid);
  160. return (ret);
  161. err:
  162. if (ret != NULL)
  163. BN_BLINDING_free(ret);
  164. return (NULL);
  165. }
  166. void BN_BLINDING_free(BN_BLINDING *r)
  167. {
  168. if (r == NULL)
  169. return;
  170. if (r->A != NULL)
  171. BN_free(r->A);
  172. if (r->Ai != NULL)
  173. BN_free(r->Ai);
  174. if (r->e != NULL)
  175. BN_free(r->e);
  176. if (r->mod != NULL)
  177. BN_free(r->mod);
  178. OPENSSL_free(r);
  179. }
  180. int BN_BLINDING_update(BN_BLINDING *b, BN_CTX *ctx)
  181. {
  182. int ret = 0;
  183. if ((b->A == NULL) || (b->Ai == NULL)) {
  184. BNerr(BN_F_BN_BLINDING_UPDATE, BN_R_NOT_INITIALIZED);
  185. goto err;
  186. }
  187. if (b->counter == -1)
  188. b->counter = 0;
  189. if (++b->counter == BN_BLINDING_COUNTER && b->e != NULL &&
  190. !(b->flags & BN_BLINDING_NO_RECREATE)) {
  191. /* re-create blinding parameters */
  192. if (!BN_BLINDING_create_param(b, NULL, NULL, ctx, NULL, NULL))
  193. goto err;
  194. } else if (!(b->flags & BN_BLINDING_NO_UPDATE)) {
  195. if (b->m_ctx != NULL) {
  196. if (!bn_mul_mont_fixed_top(b->Ai, b->Ai, b->Ai, b->m_ctx, ctx)
  197. || !bn_mul_mont_fixed_top(b->A, b->A, b->A, b->m_ctx, ctx))
  198. goto err;
  199. } else {
  200. if (!BN_mod_mul(b->Ai, b->Ai, b->Ai, b->mod, ctx)
  201. || !BN_mod_mul(b->A, b->A, b->A, b->mod, ctx))
  202. goto err;
  203. }
  204. }
  205. ret = 1;
  206. err:
  207. if (b->counter == BN_BLINDING_COUNTER)
  208. b->counter = 0;
  209. return (ret);
  210. }
  211. int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx)
  212. {
  213. return BN_BLINDING_convert_ex(n, NULL, b, ctx);
  214. }
  215. int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, BN_CTX *ctx)
  216. {
  217. int ret = 1;
  218. bn_check_top(n);
  219. if ((b->A == NULL) || (b->Ai == NULL)) {
  220. BNerr(BN_F_BN_BLINDING_CONVERT_EX, BN_R_NOT_INITIALIZED);
  221. return (0);
  222. }
  223. if (b->counter == -1)
  224. /* Fresh blinding, doesn't need updating. */
  225. b->counter = 0;
  226. else if (!BN_BLINDING_update(b, ctx))
  227. return (0);
  228. if (r != NULL && (BN_copy(r, b->Ai) == NULL))
  229. return 0;
  230. if (b->m_ctx != NULL)
  231. ret = BN_mod_mul_montgomery(n, n, b->A, b->m_ctx, ctx);
  232. else
  233. ret = BN_mod_mul(n, n, b->A, b->mod, ctx);
  234. return ret;
  235. }
  236. int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx)
  237. {
  238. return BN_BLINDING_invert_ex(n, NULL, b, ctx);
  239. }
  240. int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b,
  241. BN_CTX *ctx)
  242. {
  243. int ret;
  244. bn_check_top(n);
  245. if (r == NULL && (r = b->Ai) == NULL) {
  246. BNerr(BN_F_BN_BLINDING_INVERT_EX, BN_R_NOT_INITIALIZED);
  247. return 0;
  248. }
  249. if (b->m_ctx != NULL) {
  250. /* ensure that BN_mod_mul_montgomery takes pre-defined path */
  251. if (n->dmax >= r->top) {
  252. size_t i, rtop = r->top, ntop = n->top;
  253. BN_ULONG mask;
  254. for (i = 0; i < rtop; i++) {
  255. mask = (BN_ULONG)0 - ((i - ntop) >> (8 * sizeof(i) - 1));
  256. n->d[i] &= mask;
  257. }
  258. mask = (BN_ULONG)0 - ((rtop - ntop) >> (8 * sizeof(ntop) - 1));
  259. /* always true, if (rtop >= ntop) n->top = r->top; */
  260. n->top = (int)(rtop & ~mask) | (ntop & mask);
  261. n->flags |= (BN_FLG_FIXED_TOP & ~mask);
  262. }
  263. ret = BN_mod_mul_montgomery(n, n, r, b->m_ctx, ctx);
  264. } else {
  265. ret = BN_mod_mul(n, n, r, b->mod, ctx);
  266. }
  267. bn_check_top(n);
  268. return (ret);
  269. }
  270. #ifndef OPENSSL_NO_DEPRECATED
  271. unsigned long BN_BLINDING_get_thread_id(const BN_BLINDING *b)
  272. {
  273. return b->thread_id;
  274. }
  275. void BN_BLINDING_set_thread_id(BN_BLINDING *b, unsigned long n)
  276. {
  277. b->thread_id = n;
  278. }
  279. #endif
  280. CRYPTO_THREADID *BN_BLINDING_thread_id(BN_BLINDING *b)
  281. {
  282. return &b->tid;
  283. }
  284. unsigned long BN_BLINDING_get_flags(const BN_BLINDING *b)
  285. {
  286. return b->flags;
  287. }
  288. void BN_BLINDING_set_flags(BN_BLINDING *b, unsigned long flags)
  289. {
  290. b->flags = flags;
  291. }
  292. BN_BLINDING *BN_BLINDING_create_param(BN_BLINDING *b,
  293. const BIGNUM *e, BIGNUM *m, BN_CTX *ctx,
  294. int (*bn_mod_exp) (BIGNUM *r,
  295. const BIGNUM *a,
  296. const BIGNUM *p,
  297. const BIGNUM *m,
  298. BN_CTX *ctx,
  299. BN_MONT_CTX *m_ctx),
  300. BN_MONT_CTX *m_ctx)
  301. {
  302. int retry_counter = 32;
  303. BN_BLINDING *ret = NULL;
  304. if (b == NULL)
  305. ret = BN_BLINDING_new(NULL, NULL, m);
  306. else
  307. ret = b;
  308. if (ret == NULL)
  309. goto err;
  310. if (ret->A == NULL && (ret->A = BN_new()) == NULL)
  311. goto err;
  312. if (ret->Ai == NULL && (ret->Ai = BN_new()) == NULL)
  313. goto err;
  314. if (e != NULL) {
  315. if (ret->e != NULL)
  316. BN_free(ret->e);
  317. ret->e = BN_dup(e);
  318. }
  319. if (ret->e == NULL)
  320. goto err;
  321. if (bn_mod_exp != NULL)
  322. ret->bn_mod_exp = bn_mod_exp;
  323. if (m_ctx != NULL)
  324. ret->m_ctx = m_ctx;
  325. do {
  326. if (!BN_rand_range(ret->A, ret->mod))
  327. goto err;
  328. if (BN_mod_inverse(ret->Ai, ret->A, ret->mod, ctx) == NULL) {
  329. /*
  330. * this should almost never happen for good RSA keys
  331. */
  332. unsigned long error = ERR_peek_last_error();
  333. if (ERR_GET_REASON(error) == BN_R_NO_INVERSE) {
  334. if (retry_counter-- == 0) {
  335. BNerr(BN_F_BN_BLINDING_CREATE_PARAM,
  336. BN_R_TOO_MANY_ITERATIONS);
  337. goto err;
  338. }
  339. ERR_clear_error();
  340. } else
  341. goto err;
  342. } else
  343. break;
  344. } while (1);
  345. if (ret->bn_mod_exp != NULL && ret->m_ctx != NULL) {
  346. if (!ret->bn_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx, ret->m_ctx))
  347. goto err;
  348. } else {
  349. if (!BN_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx))
  350. goto err;
  351. }
  352. if (ret->m_ctx != NULL) {
  353. if (!bn_to_mont_fixed_top(ret->Ai, ret->Ai, ret->m_ctx, ctx)
  354. || !bn_to_mont_fixed_top(ret->A, ret->A, ret->m_ctx, ctx))
  355. goto err;
  356. }
  357. return ret;
  358. err:
  359. if (b == NULL && ret != NULL) {
  360. BN_BLINDING_free(ret);
  361. ret = NULL;
  362. }
  363. return ret;
  364. }