You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1103 lines
35 KiB
1103 lines
35 KiB
/* crypto/engine/hw_cswift.c */ |
|
/* |
|
* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL project |
|
* 2000. |
|
*/ |
|
/* ==================================================================== |
|
* Copyright (c) 1999-2001 The OpenSSL Project. All rights reserved. |
|
* |
|
* Redistribution and use in source and binary forms, with or without |
|
* modification, are permitted provided that the following conditions |
|
* are met: |
|
* |
|
* 1. Redistributions of source code must retain the above copyright |
|
* notice, this list of conditions and the following disclaimer. |
|
* |
|
* 2. Redistributions in binary form must reproduce the above copyright |
|
* notice, this list of conditions and the following disclaimer in |
|
* the documentation and/or other materials provided with the |
|
* distribution. |
|
* |
|
* 3. All advertising materials mentioning features or use of this |
|
* software must display the following acknowledgment: |
|
* "This product includes software developed by the OpenSSL Project |
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
|
* |
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
|
* endorse or promote products derived from this software without |
|
* prior written permission. For written permission, please contact |
|
* licensing@OpenSSL.org. |
|
* |
|
* 5. Products derived from this software may not be called "OpenSSL" |
|
* nor may "OpenSSL" appear in their names without prior written |
|
* permission of the OpenSSL Project. |
|
* |
|
* 6. Redistributions of any form whatsoever must retain the following |
|
* acknowledgment: |
|
* "This product includes software developed by the OpenSSL Project |
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
|
* |
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
|
* OF THE POSSIBILITY OF SUCH DAMAGE. |
|
* ==================================================================== |
|
* |
|
* This product includes cryptographic software written by Eric Young |
|
* (eay@cryptsoft.com). This product includes software written by Tim |
|
* Hudson (tjh@cryptsoft.com). |
|
* |
|
*/ |
|
|
|
#include <stdio.h> |
|
#include <string.h> |
|
#include <openssl/crypto.h> |
|
#include <openssl/buffer.h> |
|
#include <openssl/dso.h> |
|
#include <openssl/engine.h> |
|
#ifndef OPENSSL_NO_RSA |
|
# include <openssl/rsa.h> |
|
#endif |
|
#ifndef OPENSSL_NO_DSA |
|
# include <openssl/dsa.h> |
|
#endif |
|
#ifndef OPENSSL_NO_DH |
|
# include <openssl/dh.h> |
|
#endif |
|
#include <openssl/rand.h> |
|
#include <openssl/bn.h> |
|
|
|
#ifndef OPENSSL_NO_HW |
|
# ifndef OPENSSL_NO_HW_CSWIFT |
|
|
|
/* |
|
* Attribution notice: Rainbow have generously allowed me to reproduce the |
|
* necessary definitions here from their API. This means the support can |
|
* build independently of whether application builders have the API or |
|
* hardware. This will allow developers to easily produce software that has |
|
* latent hardware support for any users that have accelerators installed, |
|
* without the developers themselves needing anything extra. I have only |
|
* clipped the parts from the CryptoSwift header files that are (or seem) |
|
* relevant to the CryptoSwift support code. This is simply to keep the file |
|
* sizes reasonable. [Geoff] |
|
*/ |
|
# ifdef FLAT_INC |
|
# include "cswift.h" |
|
# else |
|
# include "vendor_defns/cswift.h" |
|
# endif |
|
|
|
# define CSWIFT_LIB_NAME "cswift engine" |
|
# include "e_cswift_err.c" |
|
|
|
# define DECIMAL_SIZE(type) ((sizeof(type)*8+2)/3+1) |
|
|
|
static int cswift_destroy(ENGINE *e); |
|
static int cswift_init(ENGINE *e); |
|
static int cswift_finish(ENGINE *e); |
|
static int cswift_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f) (void)); |
|
# ifndef OPENSSL_NO_RSA |
|
static int cswift_bn_32copy(SW_LARGENUMBER *out, const BIGNUM *in); |
|
# endif |
|
|
|
/* BIGNUM stuff */ |
|
static int cswift_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *m, BN_CTX *ctx); |
|
# ifndef OPENSSL_NO_RSA |
|
static int cswift_mod_exp_crt(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *q, const BIGNUM *dmp1, |
|
const BIGNUM *dmq1, const BIGNUM *iqmp, |
|
BN_CTX *ctx); |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_RSA |
|
/* RSA stuff */ |
|
static int cswift_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, |
|
BN_CTX *ctx); |
|
/* This function is aliased to mod_exp (with the mont stuff dropped). */ |
|
static int cswift_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *m, BN_CTX *ctx, |
|
BN_MONT_CTX *m_ctx); |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_DSA |
|
/* DSA stuff */ |
|
static DSA_SIG *cswift_dsa_sign(const unsigned char *dgst, int dlen, |
|
DSA *dsa); |
|
static int cswift_dsa_verify(const unsigned char *dgst, int dgst_len, |
|
DSA_SIG *sig, DSA *dsa); |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_DH |
|
/* DH stuff */ |
|
/* This function is alised to mod_exp (with the DH and mont dropped). */ |
|
static int cswift_mod_exp_dh(const DH *dh, BIGNUM *r, |
|
const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *m, BN_CTX *ctx, |
|
BN_MONT_CTX *m_ctx); |
|
# endif |
|
|
|
/* RAND stuff */ |
|
static int cswift_rand_bytes(unsigned char *buf, int num); |
|
static int cswift_rand_status(void); |
|
|
|
/* The definitions for control commands specific to this engine */ |
|
# define CSWIFT_CMD_SO_PATH ENGINE_CMD_BASE |
|
static const ENGINE_CMD_DEFN cswift_cmd_defns[] = { |
|
{CSWIFT_CMD_SO_PATH, |
|
"SO_PATH", |
|
"Specifies the path to the 'cswift' shared library", |
|
ENGINE_CMD_FLAG_STRING}, |
|
{0, NULL, NULL, 0} |
|
}; |
|
|
|
# ifndef OPENSSL_NO_RSA |
|
/* Our internal RSA_METHOD that we provide pointers to */ |
|
static RSA_METHOD cswift_rsa = { |
|
"CryptoSwift RSA method", |
|
NULL, |
|
NULL, |
|
NULL, |
|
NULL, |
|
cswift_rsa_mod_exp, |
|
cswift_mod_exp_mont, |
|
NULL, |
|
NULL, |
|
0, |
|
NULL, |
|
NULL, |
|
NULL, |
|
NULL |
|
}; |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_DSA |
|
/* Our internal DSA_METHOD that we provide pointers to */ |
|
static DSA_METHOD cswift_dsa = { |
|
"CryptoSwift DSA method", |
|
cswift_dsa_sign, |
|
NULL, /* dsa_sign_setup */ |
|
cswift_dsa_verify, |
|
NULL, /* dsa_mod_exp */ |
|
NULL, /* bn_mod_exp */ |
|
NULL, /* init */ |
|
NULL, /* finish */ |
|
0, /* flags */ |
|
NULL, /* app_data */ |
|
NULL, /* dsa_paramgen */ |
|
NULL /* dsa_keygen */ |
|
}; |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_DH |
|
/* Our internal DH_METHOD that we provide pointers to */ |
|
static DH_METHOD cswift_dh = { |
|
"CryptoSwift DH method", |
|
NULL, |
|
NULL, |
|
cswift_mod_exp_dh, |
|
NULL, |
|
NULL, |
|
0, |
|
NULL, |
|
NULL |
|
}; |
|
# endif |
|
|
|
static RAND_METHOD cswift_random = { |
|
/* "CryptoSwift RAND method", */ |
|
NULL, |
|
cswift_rand_bytes, |
|
NULL, |
|
NULL, |
|
cswift_rand_bytes, |
|
cswift_rand_status, |
|
}; |
|
|
|
/* Constants used when creating the ENGINE */ |
|
static const char *engine_cswift_id = "cswift"; |
|
static const char *engine_cswift_name = "CryptoSwift hardware engine support"; |
|
|
|
/* |
|
* This internal function is used by ENGINE_cswift() and possibly by the |
|
* "dynamic" ENGINE support too |
|
*/ |
|
static int bind_helper(ENGINE *e) |
|
{ |
|
# ifndef OPENSSL_NO_RSA |
|
const RSA_METHOD *meth1; |
|
# endif |
|
# ifndef OPENSSL_NO_DH |
|
const DH_METHOD *meth2; |
|
# endif |
|
if (!ENGINE_set_id(e, engine_cswift_id) || |
|
!ENGINE_set_name(e, engine_cswift_name) || |
|
# ifndef OPENSSL_NO_RSA |
|
!ENGINE_set_RSA(e, &cswift_rsa) || |
|
# endif |
|
# ifndef OPENSSL_NO_DSA |
|
!ENGINE_set_DSA(e, &cswift_dsa) || |
|
# endif |
|
# ifndef OPENSSL_NO_DH |
|
!ENGINE_set_DH(e, &cswift_dh) || |
|
# endif |
|
!ENGINE_set_RAND(e, &cswift_random) || |
|
!ENGINE_set_destroy_function(e, cswift_destroy) || |
|
!ENGINE_set_init_function(e, cswift_init) || |
|
!ENGINE_set_finish_function(e, cswift_finish) || |
|
!ENGINE_set_ctrl_function(e, cswift_ctrl) || |
|
!ENGINE_set_cmd_defns(e, cswift_cmd_defns)) |
|
return 0; |
|
|
|
# ifndef OPENSSL_NO_RSA |
|
/* |
|
* We know that the "PKCS1_SSLeay()" functions hook properly to the |
|
* cswift-specific mod_exp and mod_exp_crt so we use those functions. NB: |
|
* We don't use ENGINE_openssl() or anything "more generic" because |
|
* something like the RSAref code may not hook properly, and if you own |
|
* one of these cards then you have the right to do RSA operations on it |
|
* anyway! |
|
*/ |
|
meth1 = RSA_PKCS1_SSLeay(); |
|
cswift_rsa.rsa_pub_enc = meth1->rsa_pub_enc; |
|
cswift_rsa.rsa_pub_dec = meth1->rsa_pub_dec; |
|
cswift_rsa.rsa_priv_enc = meth1->rsa_priv_enc; |
|
cswift_rsa.rsa_priv_dec = meth1->rsa_priv_dec; |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_DH |
|
/* Much the same for Diffie-Hellman */ |
|
meth2 = DH_OpenSSL(); |
|
cswift_dh.generate_key = meth2->generate_key; |
|
cswift_dh.compute_key = meth2->compute_key; |
|
# endif |
|
|
|
/* Ensure the cswift error handling is set up */ |
|
ERR_load_CSWIFT_strings(); |
|
return 1; |
|
} |
|
|
|
# ifdef OPENSSL_NO_DYNAMIC_ENGINE |
|
static ENGINE *engine_cswift(void) |
|
{ |
|
ENGINE *ret = ENGINE_new(); |
|
if (!ret) |
|
return NULL; |
|
if (!bind_helper(ret)) { |
|
ENGINE_free(ret); |
|
return NULL; |
|
} |
|
return ret; |
|
} |
|
|
|
void ENGINE_load_cswift(void) |
|
{ |
|
/* Copied from eng_[openssl|dyn].c */ |
|
ENGINE *toadd = engine_cswift(); |
|
if (!toadd) |
|
return; |
|
ENGINE_add(toadd); |
|
ENGINE_free(toadd); |
|
ERR_clear_error(); |
|
} |
|
# endif |
|
|
|
/* |
|
* This is a process-global DSO handle used for loading and unloading the |
|
* CryptoSwift library. NB: This is only set (or unset) during an init() or |
|
* finish() call (reference counts permitting) and they're operating with |
|
* global locks, so this should be thread-safe implicitly. |
|
*/ |
|
static DSO *cswift_dso = NULL; |
|
|
|
/* |
|
* These are the function pointers that are (un)set when the library has |
|
* successfully (un)loaded. |
|
*/ |
|
t_swAcquireAccContext *p_CSwift_AcquireAccContext = NULL; |
|
t_swAttachKeyParam *p_CSwift_AttachKeyParam = NULL; |
|
t_swSimpleRequest *p_CSwift_SimpleRequest = NULL; |
|
t_swReleaseAccContext *p_CSwift_ReleaseAccContext = NULL; |
|
|
|
/* Used in the DSO operations. */ |
|
static const char *CSWIFT_LIBNAME = NULL; |
|
static const char *get_CSWIFT_LIBNAME(void) |
|
{ |
|
if (CSWIFT_LIBNAME) |
|
return CSWIFT_LIBNAME; |
|
return "swift"; |
|
} |
|
|
|
static void free_CSWIFT_LIBNAME(void) |
|
{ |
|
if (CSWIFT_LIBNAME) |
|
OPENSSL_free((void *)CSWIFT_LIBNAME); |
|
CSWIFT_LIBNAME = NULL; |
|
} |
|
|
|
static long set_CSWIFT_LIBNAME(const char *name) |
|
{ |
|
free_CSWIFT_LIBNAME(); |
|
return (((CSWIFT_LIBNAME = BUF_strdup(name)) != NULL) ? 1 : 0); |
|
} |
|
|
|
static const char *CSWIFT_F1 = "swAcquireAccContext"; |
|
static const char *CSWIFT_F2 = "swAttachKeyParam"; |
|
static const char *CSWIFT_F3 = "swSimpleRequest"; |
|
static const char *CSWIFT_F4 = "swReleaseAccContext"; |
|
|
|
/* |
|
* CryptoSwift library functions and mechanics - these are used by the |
|
* higher-level functions further down. NB: As and where there's no error |
|
* checking, take a look lower down where these functions are called, the |
|
* checking and error handling is probably down there. |
|
*/ |
|
|
|
/* utility function to obtain a context */ |
|
static int get_context(SW_CONTEXT_HANDLE *hac) |
|
{ |
|
SW_STATUS status; |
|
|
|
status = p_CSwift_AcquireAccContext(hac); |
|
if (status != SW_OK) |
|
return 0; |
|
return 1; |
|
} |
|
|
|
/* similarly to release one. */ |
|
static void release_context(SW_CONTEXT_HANDLE hac) |
|
{ |
|
p_CSwift_ReleaseAccContext(hac); |
|
} |
|
|
|
/* Destructor (complements the "ENGINE_cswift()" constructor) */ |
|
static int cswift_destroy(ENGINE *e) |
|
{ |
|
free_CSWIFT_LIBNAME(); |
|
ERR_unload_CSWIFT_strings(); |
|
return 1; |
|
} |
|
|
|
/* (de)initialisation functions. */ |
|
static int cswift_init(ENGINE *e) |
|
{ |
|
SW_CONTEXT_HANDLE hac; |
|
t_swAcquireAccContext *p1; |
|
t_swAttachKeyParam *p2; |
|
t_swSimpleRequest *p3; |
|
t_swReleaseAccContext *p4; |
|
|
|
if (cswift_dso != NULL) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_INIT, CSWIFT_R_ALREADY_LOADED); |
|
goto err; |
|
} |
|
/* Attempt to load libswift.so/swift.dll/whatever. */ |
|
cswift_dso = DSO_load(NULL, get_CSWIFT_LIBNAME(), NULL, 0); |
|
if (cswift_dso == NULL) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_INIT, CSWIFT_R_NOT_LOADED); |
|
goto err; |
|
} |
|
if (!(p1 = (t_swAcquireAccContext *) |
|
DSO_bind_func(cswift_dso, CSWIFT_F1)) || |
|
!(p2 = (t_swAttachKeyParam *) |
|
DSO_bind_func(cswift_dso, CSWIFT_F2)) || |
|
!(p3 = (t_swSimpleRequest *) |
|
DSO_bind_func(cswift_dso, CSWIFT_F3)) || |
|
!(p4 = (t_swReleaseAccContext *) |
|
DSO_bind_func(cswift_dso, CSWIFT_F4))) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_INIT, CSWIFT_R_NOT_LOADED); |
|
goto err; |
|
} |
|
/* Copy the pointers */ |
|
p_CSwift_AcquireAccContext = p1; |
|
p_CSwift_AttachKeyParam = p2; |
|
p_CSwift_SimpleRequest = p3; |
|
p_CSwift_ReleaseAccContext = p4; |
|
/* |
|
* Try and get a context - if not, we may have a DSO but no accelerator! |
|
*/ |
|
if (!get_context(&hac)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_INIT, CSWIFT_R_UNIT_FAILURE); |
|
goto err; |
|
} |
|
release_context(hac); |
|
/* Everything's fine. */ |
|
return 1; |
|
err: |
|
if (cswift_dso) { |
|
DSO_free(cswift_dso); |
|
cswift_dso = NULL; |
|
} |
|
p_CSwift_AcquireAccContext = NULL; |
|
p_CSwift_AttachKeyParam = NULL; |
|
p_CSwift_SimpleRequest = NULL; |
|
p_CSwift_ReleaseAccContext = NULL; |
|
return 0; |
|
} |
|
|
|
static int cswift_finish(ENGINE *e) |
|
{ |
|
free_CSWIFT_LIBNAME(); |
|
if (cswift_dso == NULL) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_FINISH, CSWIFT_R_NOT_LOADED); |
|
return 0; |
|
} |
|
if (!DSO_free(cswift_dso)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_FINISH, CSWIFT_R_UNIT_FAILURE); |
|
return 0; |
|
} |
|
cswift_dso = NULL; |
|
p_CSwift_AcquireAccContext = NULL; |
|
p_CSwift_AttachKeyParam = NULL; |
|
p_CSwift_SimpleRequest = NULL; |
|
p_CSwift_ReleaseAccContext = NULL; |
|
return 1; |
|
} |
|
|
|
static int cswift_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f) (void)) |
|
{ |
|
int initialised = ((cswift_dso == NULL) ? 0 : 1); |
|
switch (cmd) { |
|
case CSWIFT_CMD_SO_PATH: |
|
if (p == NULL) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_CTRL, ERR_R_PASSED_NULL_PARAMETER); |
|
return 0; |
|
} |
|
if (initialised) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_CTRL, CSWIFT_R_ALREADY_LOADED); |
|
return 0; |
|
} |
|
return set_CSWIFT_LIBNAME((const char *)p); |
|
default: |
|
break; |
|
} |
|
CSWIFTerr(CSWIFT_F_CSWIFT_CTRL, CSWIFT_R_CTRL_COMMAND_NOT_IMPLEMENTED); |
|
return 0; |
|
} |
|
|
|
/* Un petit mod_exp */ |
|
static int cswift_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *m, BN_CTX *ctx) |
|
{ |
|
/* |
|
* I need somewhere to store temporary serialised values for use with the |
|
* CryptoSwift API calls. A neat cheat - I'll use BIGNUMs from the BN_CTX |
|
* but access their arrays directly as byte arrays <grin>. This way I |
|
* don't have to clean anything up. |
|
*/ |
|
BIGNUM *modulus; |
|
BIGNUM *exponent; |
|
BIGNUM *argument; |
|
BIGNUM *result; |
|
SW_STATUS sw_status; |
|
SW_LARGENUMBER arg, res; |
|
SW_PARAM sw_param; |
|
SW_CONTEXT_HANDLE hac; |
|
int to_return, acquired; |
|
|
|
modulus = exponent = argument = result = NULL; |
|
to_return = 0; /* expect failure */ |
|
acquired = 0; |
|
|
|
if (!get_context(&hac)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP, CSWIFT_R_UNIT_FAILURE); |
|
goto err; |
|
} |
|
acquired = 1; |
|
/* Prepare the params */ |
|
BN_CTX_start(ctx); |
|
modulus = BN_CTX_get(ctx); |
|
exponent = BN_CTX_get(ctx); |
|
argument = BN_CTX_get(ctx); |
|
result = BN_CTX_get(ctx); |
|
if (!result) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP, CSWIFT_R_BN_CTX_FULL); |
|
goto err; |
|
} |
|
if (!bn_wexpand(modulus, m->top) || !bn_wexpand(exponent, p->top) || |
|
!bn_wexpand(argument, a->top) || !bn_wexpand(result, m->top)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
sw_param.type = SW_ALG_EXP; |
|
sw_param.up.exp.modulus.nbytes = BN_bn2bin(m, |
|
(unsigned char *)modulus->d); |
|
sw_param.up.exp.modulus.value = (unsigned char *)modulus->d; |
|
sw_param.up.exp.exponent.nbytes = BN_bn2bin(p, |
|
(unsigned char *)exponent->d); |
|
sw_param.up.exp.exponent.value = (unsigned char *)exponent->d; |
|
/* Attach the key params */ |
|
sw_status = p_CSwift_AttachKeyParam(hac, &sw_param); |
|
switch (sw_status) { |
|
case SW_OK: |
|
break; |
|
case SW_ERR_INPUT_SIZE: |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP, CSWIFT_R_BAD_KEY_SIZE); |
|
goto err; |
|
default: |
|
{ |
|
char tmpbuf[DECIMAL_SIZE(sw_status) + 1]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", sw_status); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
} |
|
goto err; |
|
} |
|
/* Prepare the argument and response */ |
|
arg.nbytes = BN_bn2bin(a, (unsigned char *)argument->d); |
|
arg.value = (unsigned char *)argument->d; |
|
res.nbytes = BN_num_bytes(m); |
|
memset(result->d, 0, res.nbytes); |
|
res.value = (unsigned char *)result->d; |
|
/* Perform the operation */ |
|
if ((sw_status = p_CSwift_SimpleRequest(hac, SW_CMD_MODEXP, &arg, 1, |
|
&res, 1)) != SW_OK) { |
|
char tmpbuf[DECIMAL_SIZE(sw_status) + 1]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", sw_status); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
goto err; |
|
} |
|
/* Convert the response */ |
|
BN_bin2bn((unsigned char *)result->d, res.nbytes, r); |
|
to_return = 1; |
|
err: |
|
if (acquired) |
|
release_context(hac); |
|
BN_CTX_end(ctx); |
|
return to_return; |
|
} |
|
|
|
# ifndef OPENSSL_NO_RSA |
|
int cswift_bn_32copy(SW_LARGENUMBER *out, const BIGNUM *in) |
|
{ |
|
int mod; |
|
int numbytes = BN_num_bytes(in); |
|
|
|
mod = 0; |
|
while (((out->nbytes = (numbytes + mod)) % 32)) { |
|
mod++; |
|
} |
|
out->value = (unsigned char *)OPENSSL_malloc(out->nbytes); |
|
if (!out->value) { |
|
return 0; |
|
} |
|
BN_bn2bin(in, &out->value[mod]); |
|
if (mod) |
|
memset(out->value, 0, mod); |
|
|
|
return 1; |
|
} |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_RSA |
|
/* Un petit mod_exp chinois */ |
|
static int cswift_mod_exp_crt(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *q, const BIGNUM *dmp1, |
|
const BIGNUM *dmq1, const BIGNUM *iqmp, |
|
BN_CTX *ctx) |
|
{ |
|
SW_STATUS sw_status; |
|
SW_LARGENUMBER arg, res; |
|
SW_PARAM sw_param; |
|
SW_CONTEXT_HANDLE hac; |
|
BIGNUM *result = NULL; |
|
BIGNUM *argument = NULL; |
|
int to_return = 0; /* expect failure */ |
|
int acquired = 0; |
|
|
|
sw_param.up.crt.p.value = NULL; |
|
sw_param.up.crt.q.value = NULL; |
|
sw_param.up.crt.dmp1.value = NULL; |
|
sw_param.up.crt.dmq1.value = NULL; |
|
sw_param.up.crt.iqmp.value = NULL; |
|
|
|
if (!get_context(&hac)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_UNIT_FAILURE); |
|
goto err; |
|
} |
|
acquired = 1; |
|
|
|
/* Prepare the params */ |
|
argument = BN_new(); |
|
result = BN_new(); |
|
if (!result || !argument) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_BN_CTX_FULL); |
|
goto err; |
|
} |
|
|
|
sw_param.type = SW_ALG_CRT; |
|
/************************************************************************/ |
|
/* |
|
* 04/02/2003 |
|
*/ |
|
/* |
|
* Modified by Frederic Giudicelli (deny-all.com) to overcome the |
|
*/ |
|
/* |
|
* limitation of cswift with values not a multiple of 32 |
|
*/ |
|
/************************************************************************/ |
|
if (!cswift_bn_32copy(&sw_param.up.crt.p, p)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
if (!cswift_bn_32copy(&sw_param.up.crt.q, q)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
if (!cswift_bn_32copy(&sw_param.up.crt.dmp1, dmp1)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
if (!cswift_bn_32copy(&sw_param.up.crt.dmq1, dmq1)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
if (!cswift_bn_32copy(&sw_param.up.crt.iqmp, iqmp)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
if (!bn_wexpand(argument, a->top) || !bn_wexpand(result, p->top + q->top)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
|
|
/* Attach the key params */ |
|
sw_status = p_CSwift_AttachKeyParam(hac, &sw_param); |
|
switch (sw_status) { |
|
case SW_OK: |
|
break; |
|
case SW_ERR_INPUT_SIZE: |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_BAD_KEY_SIZE); |
|
goto err; |
|
default: |
|
{ |
|
char tmpbuf[DECIMAL_SIZE(sw_status) + 1]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", sw_status); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
} |
|
goto err; |
|
} |
|
/* Prepare the argument and response */ |
|
arg.nbytes = BN_bn2bin(a, (unsigned char *)argument->d); |
|
arg.value = (unsigned char *)argument->d; |
|
res.nbytes = 2 * BN_num_bytes(p); |
|
memset(result->d, 0, res.nbytes); |
|
res.value = (unsigned char *)result->d; |
|
/* Perform the operation */ |
|
if ((sw_status = p_CSwift_SimpleRequest(hac, SW_CMD_MODEXP_CRT, &arg, 1, |
|
&res, 1)) != SW_OK) { |
|
char tmpbuf[DECIMAL_SIZE(sw_status) + 1]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_MOD_EXP_CRT, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", sw_status); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
goto err; |
|
} |
|
/* Convert the response */ |
|
BN_bin2bn((unsigned char *)result->d, res.nbytes, r); |
|
to_return = 1; |
|
err: |
|
if (sw_param.up.crt.p.value) |
|
OPENSSL_free(sw_param.up.crt.p.value); |
|
if (sw_param.up.crt.q.value) |
|
OPENSSL_free(sw_param.up.crt.q.value); |
|
if (sw_param.up.crt.dmp1.value) |
|
OPENSSL_free(sw_param.up.crt.dmp1.value); |
|
if (sw_param.up.crt.dmq1.value) |
|
OPENSSL_free(sw_param.up.crt.dmq1.value); |
|
if (sw_param.up.crt.iqmp.value) |
|
OPENSSL_free(sw_param.up.crt.iqmp.value); |
|
if (result) |
|
BN_free(result); |
|
if (argument) |
|
BN_free(argument); |
|
if (acquired) |
|
release_context(hac); |
|
return to_return; |
|
} |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_RSA |
|
static int cswift_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, |
|
BN_CTX *ctx) |
|
{ |
|
int to_return = 0; |
|
const RSA_METHOD *def_rsa_method; |
|
|
|
if (!rsa->p || !rsa->q || !rsa->dmp1 || !rsa->dmq1 || !rsa->iqmp) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_RSA_MOD_EXP, |
|
CSWIFT_R_MISSING_KEY_COMPONENTS); |
|
goto err; |
|
} |
|
|
|
/* Try the limits of RSA (2048 bits) */ |
|
if (BN_num_bytes(rsa->p) > 128 || |
|
BN_num_bytes(rsa->q) > 128 || |
|
BN_num_bytes(rsa->dmp1) > 128 || |
|
BN_num_bytes(rsa->dmq1) > 128 || BN_num_bytes(rsa->iqmp) > 128) { |
|
# ifdef RSA_NULL |
|
def_rsa_method = RSA_null_method(); |
|
# else |
|
# if 0 |
|
def_rsa_method = RSA_PKCS1_RSAref(); |
|
# else |
|
def_rsa_method = RSA_PKCS1_SSLeay(); |
|
# endif |
|
# endif |
|
if (def_rsa_method) |
|
return def_rsa_method->rsa_mod_exp(r0, I, rsa, ctx); |
|
} |
|
|
|
to_return = cswift_mod_exp_crt(r0, I, rsa->p, rsa->q, rsa->dmp1, |
|
rsa->dmq1, rsa->iqmp, ctx); |
|
err: |
|
return to_return; |
|
} |
|
|
|
/* This function is aliased to mod_exp (with the mont stuff dropped). */ |
|
static int cswift_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *m, BN_CTX *ctx, |
|
BN_MONT_CTX *m_ctx) |
|
{ |
|
const RSA_METHOD *def_rsa_method; |
|
|
|
/* Try the limits of RSA (2048 bits) */ |
|
if (BN_num_bytes(r) > 256 || |
|
BN_num_bytes(a) > 256 || BN_num_bytes(m) > 256) { |
|
# ifdef RSA_NULL |
|
def_rsa_method = RSA_null_method(); |
|
# else |
|
# if 0 |
|
def_rsa_method = RSA_PKCS1_RSAref(); |
|
# else |
|
def_rsa_method = RSA_PKCS1_SSLeay(); |
|
# endif |
|
# endif |
|
if (def_rsa_method) |
|
return def_rsa_method->bn_mod_exp(r, a, p, m, ctx, m_ctx); |
|
} |
|
|
|
return cswift_mod_exp(r, a, p, m, ctx); |
|
} |
|
# endif /* OPENSSL_NO_RSA */ |
|
|
|
# ifndef OPENSSL_NO_DSA |
|
static DSA_SIG *cswift_dsa_sign(const unsigned char *dgst, int dlen, DSA *dsa) |
|
{ |
|
SW_CONTEXT_HANDLE hac; |
|
SW_PARAM sw_param; |
|
SW_STATUS sw_status; |
|
SW_LARGENUMBER arg, res; |
|
BN_CTX *ctx; |
|
BIGNUM *dsa_p = NULL; |
|
BIGNUM *dsa_q = NULL; |
|
BIGNUM *dsa_g = NULL; |
|
BIGNUM *dsa_key = NULL; |
|
BIGNUM *result = NULL; |
|
DSA_SIG *to_return = NULL; |
|
int acquired = 0; |
|
|
|
if ((ctx = BN_CTX_new()) == NULL) |
|
goto err; |
|
if (!get_context(&hac)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_SIGN, CSWIFT_R_UNIT_FAILURE); |
|
goto err; |
|
} |
|
acquired = 1; |
|
/* Prepare the params */ |
|
BN_CTX_start(ctx); |
|
dsa_p = BN_CTX_get(ctx); |
|
dsa_q = BN_CTX_get(ctx); |
|
dsa_g = BN_CTX_get(ctx); |
|
dsa_key = BN_CTX_get(ctx); |
|
result = BN_CTX_get(ctx); |
|
if (!result) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_SIGN, CSWIFT_R_BN_CTX_FULL); |
|
goto err; |
|
} |
|
if (!bn_wexpand(dsa_p, dsa->p->top) || |
|
!bn_wexpand(dsa_q, dsa->q->top) || |
|
!bn_wexpand(dsa_g, dsa->g->top) || |
|
!bn_wexpand(dsa_key, dsa->priv_key->top) || |
|
!bn_wexpand(result, dsa->p->top)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_SIGN, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
sw_param.type = SW_ALG_DSA; |
|
sw_param.up.dsa.p.nbytes = BN_bn2bin(dsa->p, (unsigned char *)dsa_p->d); |
|
sw_param.up.dsa.p.value = (unsigned char *)dsa_p->d; |
|
sw_param.up.dsa.q.nbytes = BN_bn2bin(dsa->q, (unsigned char *)dsa_q->d); |
|
sw_param.up.dsa.q.value = (unsigned char *)dsa_q->d; |
|
sw_param.up.dsa.g.nbytes = BN_bn2bin(dsa->g, (unsigned char *)dsa_g->d); |
|
sw_param.up.dsa.g.value = (unsigned char *)dsa_g->d; |
|
sw_param.up.dsa.key.nbytes = BN_bn2bin(dsa->priv_key, |
|
(unsigned char *)dsa_key->d); |
|
sw_param.up.dsa.key.value = (unsigned char *)dsa_key->d; |
|
/* Attach the key params */ |
|
sw_status = p_CSwift_AttachKeyParam(hac, &sw_param); |
|
switch (sw_status) { |
|
case SW_OK: |
|
break; |
|
case SW_ERR_INPUT_SIZE: |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_SIGN, CSWIFT_R_BAD_KEY_SIZE); |
|
goto err; |
|
default: |
|
{ |
|
char tmpbuf[DECIMAL_SIZE(sw_status) + 1]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_SIGN, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", sw_status); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
} |
|
goto err; |
|
} |
|
/* Prepare the argument and response */ |
|
arg.nbytes = dlen; |
|
arg.value = (unsigned char *)dgst; |
|
res.nbytes = BN_num_bytes(dsa->p); |
|
memset(result->d, 0, res.nbytes); |
|
res.value = (unsigned char *)result->d; |
|
/* Perform the operation */ |
|
sw_status = p_CSwift_SimpleRequest(hac, SW_CMD_DSS_SIGN, &arg, 1, |
|
&res, 1); |
|
if (sw_status != SW_OK) { |
|
char tmpbuf[DECIMAL_SIZE(sw_status) + 1]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_SIGN, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", sw_status); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
goto err; |
|
} |
|
/* Convert the response */ |
|
if ((to_return = DSA_SIG_new()) == NULL) |
|
goto err; |
|
to_return->r = BN_bin2bn((unsigned char *)result->d, 20, NULL); |
|
to_return->s = BN_bin2bn((unsigned char *)result->d + 20, 20, NULL); |
|
|
|
err: |
|
if (acquired) |
|
release_context(hac); |
|
if (ctx) { |
|
BN_CTX_end(ctx); |
|
BN_CTX_free(ctx); |
|
} |
|
return to_return; |
|
} |
|
|
|
static int cswift_dsa_verify(const unsigned char *dgst, int dgst_len, |
|
DSA_SIG *sig, DSA *dsa) |
|
{ |
|
SW_CONTEXT_HANDLE hac; |
|
SW_PARAM sw_param; |
|
SW_STATUS sw_status; |
|
SW_LARGENUMBER arg[2], res; |
|
unsigned long sig_result; |
|
BN_CTX *ctx; |
|
BIGNUM *dsa_p = NULL; |
|
BIGNUM *dsa_q = NULL; |
|
BIGNUM *dsa_g = NULL; |
|
BIGNUM *dsa_key = NULL; |
|
BIGNUM *argument = NULL; |
|
int to_return = -1; |
|
int acquired = 0; |
|
|
|
if ((ctx = BN_CTX_new()) == NULL) |
|
goto err; |
|
if (!get_context(&hac)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_VERIFY, CSWIFT_R_UNIT_FAILURE); |
|
goto err; |
|
} |
|
acquired = 1; |
|
/* Prepare the params */ |
|
BN_CTX_start(ctx); |
|
dsa_p = BN_CTX_get(ctx); |
|
dsa_q = BN_CTX_get(ctx); |
|
dsa_g = BN_CTX_get(ctx); |
|
dsa_key = BN_CTX_get(ctx); |
|
argument = BN_CTX_get(ctx); |
|
if (!argument) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_VERIFY, CSWIFT_R_BN_CTX_FULL); |
|
goto err; |
|
} |
|
if (!bn_wexpand(dsa_p, dsa->p->top) || |
|
!bn_wexpand(dsa_q, dsa->q->top) || |
|
!bn_wexpand(dsa_g, dsa->g->top) || |
|
!bn_wexpand(dsa_key, dsa->pub_key->top) || |
|
!bn_wexpand(argument, 40)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_VERIFY, CSWIFT_R_BN_EXPAND_FAIL); |
|
goto err; |
|
} |
|
sw_param.type = SW_ALG_DSA; |
|
sw_param.up.dsa.p.nbytes = BN_bn2bin(dsa->p, (unsigned char *)dsa_p->d); |
|
sw_param.up.dsa.p.value = (unsigned char *)dsa_p->d; |
|
sw_param.up.dsa.q.nbytes = BN_bn2bin(dsa->q, (unsigned char *)dsa_q->d); |
|
sw_param.up.dsa.q.value = (unsigned char *)dsa_q->d; |
|
sw_param.up.dsa.g.nbytes = BN_bn2bin(dsa->g, (unsigned char *)dsa_g->d); |
|
sw_param.up.dsa.g.value = (unsigned char *)dsa_g->d; |
|
sw_param.up.dsa.key.nbytes = BN_bn2bin(dsa->pub_key, |
|
(unsigned char *)dsa_key->d); |
|
sw_param.up.dsa.key.value = (unsigned char *)dsa_key->d; |
|
/* Attach the key params */ |
|
sw_status = p_CSwift_AttachKeyParam(hac, &sw_param); |
|
switch (sw_status) { |
|
case SW_OK: |
|
break; |
|
case SW_ERR_INPUT_SIZE: |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_VERIFY, CSWIFT_R_BAD_KEY_SIZE); |
|
goto err; |
|
default: |
|
{ |
|
char tmpbuf[DECIMAL_SIZE(sw_status) + 1]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_VERIFY, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", sw_status); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
} |
|
goto err; |
|
} |
|
/* Prepare the argument and response */ |
|
arg[0].nbytes = dgst_len; |
|
arg[0].value = (unsigned char *)dgst; |
|
arg[1].nbytes = 40; |
|
arg[1].value = (unsigned char *)argument->d; |
|
memset(arg[1].value, 0, 40); |
|
BN_bn2bin(sig->r, arg[1].value + 20 - BN_num_bytes(sig->r)); |
|
BN_bn2bin(sig->s, arg[1].value + 40 - BN_num_bytes(sig->s)); |
|
res.nbytes = 4; /* unsigned long */ |
|
res.value = (unsigned char *)(&sig_result); |
|
/* Perform the operation */ |
|
sw_status = p_CSwift_SimpleRequest(hac, SW_CMD_DSS_VERIFY, arg, 2, |
|
&res, 1); |
|
if (sw_status != SW_OK) { |
|
char tmpbuf[DECIMAL_SIZE(sw_status) + 1]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_DSA_VERIFY, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", sw_status); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
goto err; |
|
} |
|
/* Convert the response */ |
|
to_return = ((sig_result == 0) ? 0 : 1); |
|
|
|
err: |
|
if (acquired) |
|
release_context(hac); |
|
if (ctx) { |
|
BN_CTX_end(ctx); |
|
BN_CTX_free(ctx); |
|
} |
|
return to_return; |
|
} |
|
# endif |
|
|
|
# ifndef OPENSSL_NO_DH |
|
/* This function is aliased to mod_exp (with the dh and mont dropped). */ |
|
static int cswift_mod_exp_dh(const DH *dh, BIGNUM *r, |
|
const BIGNUM *a, const BIGNUM *p, |
|
const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx) |
|
{ |
|
return cswift_mod_exp(r, a, p, m, ctx); |
|
} |
|
# endif |
|
|
|
/* Random bytes are good */ |
|
static int cswift_rand_bytes(unsigned char *buf, int num) |
|
{ |
|
SW_CONTEXT_HANDLE hac; |
|
SW_STATUS swrc; |
|
SW_LARGENUMBER largenum; |
|
int acquired = 0; |
|
int to_return = 0; /* assume failure */ |
|
unsigned char buf32[1024]; |
|
|
|
if (!get_context(&hac)) { |
|
CSWIFTerr(CSWIFT_F_CSWIFT_RAND_BYTES, CSWIFT_R_UNIT_FAILURE); |
|
goto err; |
|
} |
|
acquired = 1; |
|
|
|
/************************************************************************/ |
|
/* |
|
* 04/02/2003 |
|
*/ |
|
/* |
|
* Modified by Frederic Giudicelli (deny-all.com) to overcome the |
|
*/ |
|
/* |
|
* limitation of cswift with values not a multiple of 32 |
|
*/ |
|
/************************************************************************/ |
|
|
|
while (num >= (int)sizeof(buf32)) { |
|
largenum.value = buf; |
|
largenum.nbytes = sizeof(buf32); |
|
/*- |
|
* tell CryptoSwift how many bytes we want and where we want it. |
|
* Note: - CryptoSwift cannot do more than 4096 bytes at a time. |
|
* - CryptoSwift can only do multiple of 32-bits. |
|
*/ |
|
swrc = |
|
p_CSwift_SimpleRequest(hac, SW_CMD_RAND, NULL, 0, &largenum, 1); |
|
if (swrc != SW_OK) { |
|
char tmpbuf[20]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_RAND_BYTES, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", swrc); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
goto err; |
|
} |
|
buf += sizeof(buf32); |
|
num -= sizeof(buf32); |
|
} |
|
if (num) { |
|
largenum.nbytes = sizeof(buf32); |
|
largenum.value = buf32; |
|
swrc = |
|
p_CSwift_SimpleRequest(hac, SW_CMD_RAND, NULL, 0, &largenum, 1); |
|
if (swrc != SW_OK) { |
|
char tmpbuf[20]; |
|
CSWIFTerr(CSWIFT_F_CSWIFT_RAND_BYTES, CSWIFT_R_REQUEST_FAILED); |
|
sprintf(tmpbuf, "%ld", swrc); |
|
ERR_add_error_data(2, "CryptoSwift error number is ", tmpbuf); |
|
goto err; |
|
} |
|
memcpy(buf, largenum.value, num); |
|
} |
|
|
|
to_return = 1; /* success */ |
|
err: |
|
if (acquired) |
|
release_context(hac); |
|
|
|
return to_return; |
|
} |
|
|
|
static int cswift_rand_status(void) |
|
{ |
|
return 1; |
|
} |
|
|
|
/* |
|
* This stuff is needed if this ENGINE is being compiled into a |
|
* self-contained shared-library. |
|
*/ |
|
# ifndef OPENSSL_NO_DYNAMIC_ENGINE |
|
static int bind_fn(ENGINE *e, const char *id) |
|
{ |
|
if (id && (strcmp(id, engine_cswift_id) != 0)) |
|
return 0; |
|
if (!bind_helper(e)) |
|
return 0; |
|
return 1; |
|
} |
|
|
|
IMPLEMENT_DYNAMIC_CHECK_FN() |
|
IMPLEMENT_DYNAMIC_BIND_FN(bind_fn) |
|
# endif /* OPENSSL_NO_DYNAMIC_ENGINE */ |
|
# endif /* !OPENSSL_NO_HW_CSWIFT */ |
|
#endif /* !OPENSSL_NO_HW */
|
|
|