/* * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the OpenSSL license (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #ifndef OPENSSL_HEADER_RSA_INTERNAL_H #define OPENSSL_HEADER_RSA_INTERNAL_H #include #include #include #include "../../internal.h" #if defined(__cplusplus) extern "C" { #endif typedef struct bn_blinding_st BN_BLINDING; struct rsa_st { RSA_METHOD *meth; BIGNUM *n; BIGNUM *e; BIGNUM *d; BIGNUM *p; BIGNUM *q; BIGNUM *dmp1; BIGNUM *dmq1; BIGNUM *iqmp; // be careful using this if the RSA structure is shared CRYPTO_EX_DATA ex_data; CRYPTO_refcount_t references; int flags; CRYPTO_MUTEX lock; // Used to cache montgomery values. The creation of these values is protected // by |lock|. BN_MONT_CTX *mont_n; BN_MONT_CTX *mont_p; BN_MONT_CTX *mont_q; // The following fields are copies of |d|, |dmp1|, and |dmq1|, respectively, // but with the correct widths to prevent side channels. These must use // separate copies due to threading concerns caused by OpenSSL's API // mistakes. See https://github.com/openssl/openssl/issues/5158 and // the |freeze_private_key| implementation. BIGNUM *d_fixed, *dmp1_fixed, *dmq1_fixed; // iqmp_mont is q^-1 mod p in Montgomery form, using |mont_p|. BIGNUM *iqmp_mont; // num_blindings contains the size of the |blindings| and |blindings_inuse| // arrays. This member and the |blindings_inuse| array are protected by // |lock|. size_t num_blindings; // blindings is an array of BN_BLINDING structures that can be reserved by a // thread by locking |lock| and changing the corresponding element in // |blindings_inuse| from 0 to 1. BN_BLINDING **blindings; unsigned char *blindings_inuse; uint64_t blinding_fork_generation; // private_key_frozen is one if the key has been used for a private key // operation and may no longer be mutated. unsigned private_key_frozen:1; }; #define RSA_PKCS1_PADDING_SIZE 11 // Default implementations of RSA operations. const RSA_METHOD *RSA_default_method(void); size_t rsa_default_size(const RSA *rsa); int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding); int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len); BN_BLINDING *BN_BLINDING_new(void); void BN_BLINDING_free(BN_BLINDING *b); void BN_BLINDING_invalidate(BN_BLINDING *b); int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, const BIGNUM *e, const BN_MONT_CTX *mont_ctx, BN_CTX *ctx); int BN_BLINDING_invert(BIGNUM *n, const BN_BLINDING *b, BN_MONT_CTX *mont_ctx, BN_CTX *ctx); int PKCS1_MGF1(uint8_t *out, size_t len, const uint8_t *seed, size_t seed_len, const EVP_MD *md); int RSA_padding_add_PKCS1_type_1(uint8_t *to, size_t to_len, const uint8_t *from, size_t from_len); int RSA_padding_check_PKCS1_type_1(uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *from, size_t from_len); int RSA_padding_add_none(uint8_t *to, size_t to_len, const uint8_t *from, size_t from_len); // rsa_check_public_key checks that |rsa|'s public modulus and exponent are // within DoS bounds. int rsa_check_public_key(const RSA *rsa); // rsa_private_transform_no_self_test calls either the method-specific // |private_transform| function (if given) or the generic one. See the comment // for |private_transform| in |rsa_meth_st|. int rsa_private_transform_no_self_test(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len); // rsa_private_transform acts the same as |rsa_private_transform_no_self_test| // but, in FIPS mode, performs an RSA self test before calling the default RSA // implementation. int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len); // rsa_invalidate_key is called after |rsa| has been mutated, to invalidate // fields derived from the original structure. This function assumes exclusive // access to |rsa|. In particular, no other thread may be concurrently signing, // etc., with |rsa|. void rsa_invalidate_key(RSA *rsa); // This constant is exported for test purposes. extern const BN_ULONG kBoringSSLRSASqrtTwo[]; extern const size_t kBoringSSLRSASqrtTwoLen; // Functions that avoid self-tests. // // Self-tests need to call functions that don't try and ensure that the // self-tests have passed. These functions, in turn, need to limit themselves // to such functions too. // // These functions are the same as their public versions, but skip the self-test // check. int rsa_verify_no_self_test(int hash_nid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, RSA *rsa); int rsa_verify_raw_no_self_test(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding); int rsa_sign_no_self_test(int hash_nid, const uint8_t *digest, size_t digest_len, uint8_t *out, unsigned *out_len, RSA *rsa); #if defined(__cplusplus) } // extern C #endif #endif // OPENSSL_HEADER_RSA_INTERNAL_H