65749575ab
```sh git grep -l '^patch_args=-Np0' "srcpkgs/$1*/template" | while read template; do for p in ${template%/template}/patches/*; do sed -i ' \,^[+-][+-][+-] /dev/null,b /^[*-]\+ [0-9]\+\(,[0-9]\+\)\? [*-]\+$/b s,^[*][*][*] ,&a/, /^--- /{ s,\(^--- \)\(./\)*,\1a/, s,[.-][Oo][Rr][Ii][Gg]\([ /]\),\1, s/[.-][Oo][Rr][Ii][Gg]$// s/[.]patched[.]\([^.]\)/.\1/ h } /^+++ -/{ g s/^--- a/+++ b/ b } s,\(^+++ \)\(./\)*,\1b/, ' "$p" done sed -i '/^patch_args=/d' $template done ```
417 lines
10 KiB
Diff
417 lines
10 KiB
Diff
$NetBSD: patch-src_lib_openssl__crypto.c,v 1.1 2020/04/25 12:07:47 nia Exp $
|
|
|
|
Sync with NetBSD src to fix build with OpenSSL 1.1.
|
|
|
|
--- a/src/lib/openssl_crypto.c 2020-04-25 11:54:50.243962468 +0000
|
|
+++ b/src/lib/openssl_crypto.c
|
|
@@ -88,18 +88,144 @@ __COPYRIGHT("@(#) Copyright (c) 2009 The
|
|
#include "netpgpdigest.h"
|
|
#include "packet.h"
|
|
|
|
+static void
|
|
+takeRSA(const RSA *orsa, pgp_rsa_pubkey_t *pk, pgp_rsa_seckey_t *sk)
|
|
+{
|
|
+ const BIGNUM *n, *e, *d, *q, *p;
|
|
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
+ RSA_get0_key(orsa, &n, &e, &d);
|
|
+ RSA_get0_factors(orsa, &q, &p);
|
|
+#else
|
|
+ n = orsa->n;
|
|
+ e = orsa->e;
|
|
+ d = orsa->d;
|
|
+ p = orsa->p;
|
|
+ q = orsa->q;
|
|
+#endif
|
|
+ if (sk) {
|
|
+ sk->d = BN_dup(d);
|
|
+ sk->p = BN_dup(p);
|
|
+ sk->q = BN_dup(q);
|
|
+ }
|
|
+ if (pk) {
|
|
+ pk->n = BN_dup(n);
|
|
+ pk->e = BN_dup(e);
|
|
+ }
|
|
+}
|
|
|
|
-static void
|
|
-test_seckey(const pgp_seckey_t *seckey)
|
|
+static RSA *
|
|
+makeRSA(const pgp_rsa_pubkey_t *pubkey, const pgp_rsa_seckey_t *seckey)
|
|
+{
|
|
+ BIGNUM *n, *e, *d, *p, *q;
|
|
+ RSA *orsa;
|
|
+
|
|
+ orsa = RSA_new();
|
|
+ n = BN_dup(pubkey->n);
|
|
+ e = BN_dup(pubkey->e);
|
|
+
|
|
+ if (seckey) {
|
|
+ d = BN_dup(seckey->d);
|
|
+ p = BN_dup(seckey->p);
|
|
+ q = BN_dup(seckey->q);
|
|
+ } else {
|
|
+ d = p = q = NULL;
|
|
+ }
|
|
+
|
|
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
+ RSA_set0_key(orsa, n, e, d);
|
|
+ RSA_set0_factors(orsa, p, q);
|
|
+#else
|
|
+ BN_free(orsa->n);
|
|
+ BN_free(orsa->e);
|
|
+ orsa->n = n;
|
|
+ orsa->e = e;
|
|
+ if (d) {
|
|
+ BN_free(orsa->d);
|
|
+ orsa->d = d;
|
|
+ }
|
|
+ if (p) {
|
|
+ BN_free(orsa->p);
|
|
+ orsa->p = p;
|
|
+ }
|
|
+ if (q) {
|
|
+ BN_free(orsa->q);
|
|
+ orsa->q = q;
|
|
+ }
|
|
+#endif
|
|
+ return orsa;
|
|
+}
|
|
+
|
|
+static DSA_SIG *
|
|
+makeDSA_SIG(const pgp_dsa_sig_t *sig)
|
|
+{
|
|
+ DSA_SIG *osig;
|
|
+ BIGNUM *r, *s;
|
|
+
|
|
+ osig = DSA_SIG_new();
|
|
+ r = BN_dup(sig->r);
|
|
+ s = BN_dup(sig->s);
|
|
+
|
|
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
+ DSA_SIG_set0(osig, r, s);
|
|
+#else
|
|
+ BN_free(osig->r);
|
|
+ BN_free(osig->s);
|
|
+ osig->r = r;
|
|
+ osig->s = s;
|
|
+#endif
|
|
+
|
|
+ return osig;
|
|
+}
|
|
+
|
|
+static DSA *
|
|
+makeDSA(const pgp_dsa_pubkey_t *dsa, const pgp_dsa_seckey_t *secdsa)
|
|
{
|
|
- RSA *test = RSA_new();
|
|
+ DSA *odsa;
|
|
+ BIGNUM *p, *q, *g, *y, *x;
|
|
|
|
- test->n = BN_dup(seckey->pubkey.key.rsa.n);
|
|
- test->e = BN_dup(seckey->pubkey.key.rsa.e);
|
|
+ odsa = DSA_new();
|
|
|
|
- test->d = BN_dup(seckey->key.rsa.d);
|
|
- test->p = BN_dup(seckey->key.rsa.p);
|
|
- test->q = BN_dup(seckey->key.rsa.q);
|
|
+ p = BN_dup(dsa->p);
|
|
+ q = BN_dup(dsa->q);
|
|
+ g = BN_dup(dsa->g);
|
|
+ y = BN_dup(dsa->y);
|
|
+ x = secdsa ? secdsa->x : NULL;
|
|
+
|
|
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
+ DSA_set0_key(odsa, y, x);
|
|
+#else
|
|
+ BN_free(odsa->p);
|
|
+ BN_free(odsa->q);
|
|
+ BN_free(odsa->g);
|
|
+ BN_free(odsa->pub_key);
|
|
+ odsa->p = p;
|
|
+ odsa->q = q;
|
|
+ odsa->g = g;
|
|
+ odsa->pub_key = y;
|
|
+ if (x) {
|
|
+ BN_free(odsa->priv_key);
|
|
+ odsa->priv_key = x;
|
|
+ }
|
|
+#endif
|
|
+ return odsa;
|
|
+}
|
|
+
|
|
+static void
|
|
+takeDSA(const DSA *odsa, pgp_dsa_seckey_t *sk)
|
|
+{
|
|
+ const BIGNUM *x;
|
|
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
+ DSA_get0_key(odsa, NULL, &x);
|
|
+#else
|
|
+ x = odsa->priv_key;
|
|
+#endif
|
|
+ sk->x = BN_dup(x);
|
|
+}
|
|
+
|
|
+static void
|
|
+test_seckey(const pgp_seckey_t *seckey)
|
|
+{
|
|
+ RSA *test = makeRSA(&seckey->pubkey.key.rsa, &seckey->key.rsa);
|
|
|
|
if (RSA_check_key(test) != 1) {
|
|
(void) fprintf(stderr,
|
|
@@ -434,25 +560,15 @@ pgp_dsa_verify(const uint8_t *hash, size
|
|
const pgp_dsa_pubkey_t *dsa)
|
|
{
|
|
unsigned qlen;
|
|
- DSA_SIG *osig;
|
|
- DSA *odsa;
|
|
+ DSA_SIG *osig = makeDSA_SIG(sig);
|
|
+ DSA *odsa = makeDSA(dsa, NULL);
|
|
int ret;
|
|
|
|
- osig = DSA_SIG_new();
|
|
- osig->r = sig->r;
|
|
- osig->s = sig->s;
|
|
-
|
|
- odsa = DSA_new();
|
|
- odsa->p = dsa->p;
|
|
- odsa->q = dsa->q;
|
|
- odsa->g = dsa->g;
|
|
- odsa->pub_key = dsa->y;
|
|
-
|
|
if (pgp_get_debug_level(__FILE__)) {
|
|
hexdump(stderr, "input hash", hash, hash_length);
|
|
- (void) fprintf(stderr, "Q=%d\n", BN_num_bytes(odsa->q));
|
|
+ (void) fprintf(stderr, "Q=%d\n", BN_num_bytes(dsa->q));
|
|
}
|
|
- if ((qlen = (unsigned)BN_num_bytes(odsa->q)) < hash_length) {
|
|
+ if ((qlen = (unsigned)BN_num_bytes(dsa->q)) < hash_length) {
|
|
hash_length = qlen;
|
|
}
|
|
ret = DSA_do_verify(hash, (int)hash_length, osig, odsa);
|
|
@@ -464,10 +580,7 @@ pgp_dsa_verify(const uint8_t *hash, size
|
|
return 0;
|
|
}
|
|
|
|
- odsa->p = odsa->q = odsa->g = odsa->pub_key = NULL;
|
|
DSA_free(odsa);
|
|
-
|
|
- osig->r = osig->s = NULL;
|
|
DSA_SIG_free(osig);
|
|
|
|
return (unsigned)ret;
|
|
@@ -488,19 +601,14 @@ pgp_rsa_public_decrypt(uint8_t *out,
|
|
size_t length,
|
|
const pgp_rsa_pubkey_t *pubkey)
|
|
{
|
|
- RSA *orsa;
|
|
- int n;
|
|
-
|
|
- orsa = RSA_new();
|
|
- orsa->n = pubkey->n;
|
|
- orsa->e = pubkey->e;
|
|
+ RSA *orsa = makeRSA(pubkey, NULL);
|
|
+ int ret;
|
|
|
|
- n = RSA_public_decrypt((int)length, in, out, orsa, RSA_NO_PADDING);
|
|
+ ret = RSA_public_decrypt((int)length, in, out, orsa, RSA_NO_PADDING);
|
|
|
|
- orsa->n = orsa->e = NULL;
|
|
RSA_free(orsa);
|
|
|
|
- return n;
|
|
+ return ret;
|
|
}
|
|
|
|
/**
|
|
@@ -520,21 +628,10 @@ pgp_rsa_private_encrypt(uint8_t *out,
|
|
const pgp_rsa_seckey_t *seckey,
|
|
const pgp_rsa_pubkey_t *pubkey)
|
|
{
|
|
- RSA *orsa;
|
|
- int n;
|
|
+ RSA *orsa = makeRSA(pubkey, seckey);
|
|
+ int ret;
|
|
|
|
- orsa = RSA_new();
|
|
- orsa->n = BN_dup(pubkey->n);
|
|
- orsa->d = seckey->d;
|
|
- orsa->p = seckey->q; /* p and q are round the other way in openssl */
|
|
- orsa->q = seckey->p;
|
|
-
|
|
- /* debug */
|
|
- orsa->e = BN_dup(pubkey->e);
|
|
- /* If this isn't set, it's very likely that the programmer hasn't */
|
|
- /* decrypted the secret key. RSA_check_key segfaults in that case. */
|
|
- /* Use pgp_decrypt_seckey() to do that. */
|
|
- if (orsa->d == NULL) {
|
|
+ if (seckey->d == NULL) {
|
|
(void) fprintf(stderr, "orsa is not set\n");
|
|
return 0;
|
|
}
|
|
@@ -544,12 +641,11 @@ pgp_rsa_private_encrypt(uint8_t *out,
|
|
}
|
|
/* end debug */
|
|
|
|
- n = RSA_private_encrypt((int)length, in, out, orsa, RSA_NO_PADDING);
|
|
+ ret = RSA_private_encrypt((int)length, in, out, orsa, RSA_NO_PADDING);
|
|
|
|
- orsa->n = orsa->d = orsa->p = orsa->q = NULL;
|
|
RSA_free(orsa);
|
|
|
|
- return n;
|
|
+ return ret;
|
|
}
|
|
|
|
/**
|
|
@@ -569,18 +665,10 @@ pgp_rsa_private_decrypt(uint8_t *out,
|
|
const pgp_rsa_seckey_t *seckey,
|
|
const pgp_rsa_pubkey_t *pubkey)
|
|
{
|
|
- RSA *keypair;
|
|
+ RSA *keypair = makeRSA(pubkey, seckey);
|
|
int n;
|
|
char errbuf[1024];
|
|
|
|
- keypair = RSA_new();
|
|
- keypair->n = pubkey->n; /* XXX: do we need n? */
|
|
- keypair->d = seckey->d;
|
|
- keypair->p = seckey->q;
|
|
- keypair->q = seckey->p;
|
|
-
|
|
- /* debug */
|
|
- keypair->e = pubkey->e;
|
|
if (RSA_check_key(keypair) != 1) {
|
|
(void) fprintf(stderr, "RSA_check_key is not set\n");
|
|
return 0;
|
|
@@ -600,7 +688,6 @@ pgp_rsa_private_decrypt(uint8_t *out,
|
|
ERR_error_string(err, &errbuf[0]);
|
|
(void) fprintf(stderr, "openssl error : %s\n", errbuf);
|
|
}
|
|
- keypair->n = keypair->d = keypair->p = keypair->q = NULL;
|
|
RSA_free(keypair);
|
|
|
|
return n;
|
|
@@ -620,15 +707,11 @@ pgp_rsa_public_encrypt(uint8_t *out,
|
|
size_t length,
|
|
const pgp_rsa_pubkey_t *pubkey)
|
|
{
|
|
- RSA *orsa;
|
|
+ RSA *orsa = makeRSA(pubkey, NULL);
|
|
int n;
|
|
|
|
/* printf("pgp_rsa_public_encrypt: length=%ld\n", length); */
|
|
|
|
- orsa = RSA_new();
|
|
- orsa->n = pubkey->n;
|
|
- orsa->e = pubkey->e;
|
|
-
|
|
/* printf("len: %ld\n", length); */
|
|
/* pgp_print_bn("n: ", orsa->n); */
|
|
/* pgp_print_bn("e: ", orsa->e); */
|
|
@@ -640,7 +723,6 @@ pgp_rsa_public_encrypt(uint8_t *out,
|
|
fd_out = BIO_new_fd(fileno(stderr), BIO_NOCLOSE);
|
|
ERR_print_errors(fd_out);
|
|
}
|
|
- orsa->n = orsa->e = NULL;
|
|
RSA_free(orsa);
|
|
|
|
return n;
|
|
@@ -656,7 +738,9 @@ void
|
|
pgp_crypto_finish(void)
|
|
{
|
|
CRYPTO_cleanup_all_ex_data();
|
|
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
|
|
ERR_remove_state((unsigned long)0);
|
|
+#endif
|
|
}
|
|
|
|
/**
|
|
@@ -692,25 +776,33 @@ rsa_generate_keypair(pgp_key_t *keydata,
|
|
BN_CTX *ctx;
|
|
pgp_output_t *output;
|
|
pgp_memory_t *mem;
|
|
+ BIGNUM *bne;
|
|
+ pgp_rsa_pubkey_t *pk;
|
|
+ pgp_rsa_seckey_t *sk;
|
|
|
|
ctx = BN_CTX_new();
|
|
pgp_keydata_init(keydata, PGP_PTAG_CT_SECRET_KEY);
|
|
seckey = pgp_get_writable_seckey(keydata);
|
|
+ pk = &seckey->pubkey.key.rsa;
|
|
+ sk = &seckey->key.rsa;
|
|
|
|
/* generate the key pair */
|
|
|
|
- rsa = RSA_generate_key(numbits, e, NULL, NULL);
|
|
+ bne = BN_new();
|
|
+ BN_set_word(bne, e);
|
|
+
|
|
+ rsa = RSA_new();
|
|
+ RSA_generate_key_ex(rsa, numbits, bne, NULL);
|
|
+ BN_free(bne);
|
|
|
|
/* populate pgp key from ssl key */
|
|
+ takeRSA(rsa, pk, sk);
|
|
|
|
seckey->pubkey.version = PGP_V4;
|
|
seckey->pubkey.birthtime = time(NULL);
|
|
seckey->pubkey.days_valid = 0;
|
|
seckey->pubkey.alg = PGP_PKA_RSA;
|
|
|
|
- seckey->pubkey.key.rsa.n = BN_dup(rsa->n);
|
|
- seckey->pubkey.key.rsa.e = BN_dup(rsa->e);
|
|
-
|
|
seckey->s2k_usage = PGP_S2KU_ENCRYPTED_AND_HASHED;
|
|
seckey->s2k_specifier = PGP_S2KS_SALTED;
|
|
/* seckey->s2k_specifier=PGP_S2KS_SIMPLE; */
|
|
@@ -721,11 +813,8 @@ rsa_generate_keypair(pgp_key_t *keydata,
|
|
seckey->octetc = 0;
|
|
seckey->checksum = 0;
|
|
|
|
- seckey->key.rsa.d = BN_dup(rsa->d);
|
|
- seckey->key.rsa.p = BN_dup(rsa->p);
|
|
- seckey->key.rsa.q = BN_dup(rsa->q);
|
|
- seckey->key.rsa.u = BN_mod_inverse(NULL, rsa->p, rsa->q, ctx);
|
|
- if (seckey->key.rsa.u == NULL) {
|
|
+ sk->u = BN_mod_inverse(NULL, sk->p, sk->q, ctx);
|
|
+ if (sk->u == NULL) {
|
|
(void) fprintf(stderr, "seckey->key.rsa.u is NULL\n");
|
|
return 0;
|
|
}
|
|
@@ -817,18 +906,10 @@ pgp_dsa_sign(uint8_t *hashbuf,
|
|
const pgp_dsa_pubkey_t *pubdsa)
|
|
{
|
|
DSA_SIG *dsasig;
|
|
- DSA *odsa;
|
|
-
|
|
- odsa = DSA_new();
|
|
- odsa->p = pubdsa->p;
|
|
- odsa->q = pubdsa->q;
|
|
- odsa->g = pubdsa->g;
|
|
- odsa->pub_key = pubdsa->y;
|
|
- odsa->priv_key = secdsa->x;
|
|
+ DSA *odsa = makeDSA(pubdsa, secdsa);
|
|
|
|
dsasig = DSA_do_sign(hashbuf, (int)hashsize, odsa);
|
|
|
|
- odsa->p = odsa->q = odsa->g = odsa->pub_key = odsa->priv_key = NULL;
|
|
DSA_free(odsa);
|
|
|
|
return dsasig;
|
|
@@ -860,15 +941,12 @@ openssl_read_pem_seckey(const char *f, p
|
|
rsa = PEM_read_RSAPrivateKey(fp, NULL, NULL, pass);
|
|
} while (rsa == NULL);
|
|
}
|
|
- key->key.seckey.key.rsa.d = rsa->d;
|
|
- key->key.seckey.key.rsa.p = rsa->p;
|
|
- key->key.seckey.key.rsa.q = rsa->q;
|
|
- key->key.seckey.key.rsa.d = rsa->d;
|
|
+ takeRSA(rsa, NULL, &key->key.seckey.key.rsa);
|
|
} else if (strcmp(type, "ssh-dss") == 0) {
|
|
if ((dsa = PEM_read_DSAPrivateKey(fp, NULL, NULL, NULL)) == NULL) {
|
|
ok = 0;
|
|
} else {
|
|
- key->key.seckey.key.dsa.x = dsa->priv_key;
|
|
+ takeDSA(dsa, &key->key.seckey.key.dsa);
|
|
}
|
|
} else {
|
|
ok = 0;
|