mbedtls: Update to upstream version 2.16.3
(cherry picked from commit a3d77be53b
)
This commit is contained in:
parent
699b087296
commit
1b7a2e7284
|
@ -285,14 +285,19 @@ Godot build configurations, check them out when updating.
|
||||||
## mbedtls
|
## mbedtls
|
||||||
|
|
||||||
- Upstream: https://tls.mbed.org/
|
- Upstream: https://tls.mbed.org/
|
||||||
- Version: 2.16.2
|
- Version: 2.16.3
|
||||||
- License: Apache 2.0
|
- License: Apache 2.0
|
||||||
|
|
||||||
File extracted from upstream release tarball (`-apache.tgz` variant):
|
File extracted from upstream release tarball (`-apache.tgz` variant):
|
||||||
- All `*.h` from `include/mbedtls/` to `thirdparty/mbedtls/include/mbedtls/`
|
- All `*.h` from `include/mbedtls/` to `thirdparty/mbedtls/include/mbedtls/`
|
||||||
- All `*.c` from `library/` to `thirdparty/mbedtls/library/`
|
- All `*.c` from `library/` to `thirdparty/mbedtls/library/`
|
||||||
- Applied the patch in `thirdparty/mbedtls/1453.diff` (PR 1453). Soon to be merged upstream. Check it out at next update.
|
- LICENSE and apache-2.0.txt files
|
||||||
- Applied the patch in `thirdparty/mbedtls/padlock.diff`. This disables VIA padlock support which defines a symbol `unsupported` which clashses with a symbol in libwebsockets.
|
- Applied the patch in `thirdparty/mbedtls/patches/1453.diff` (PR 1453).
|
||||||
|
Soon to be merged upstream. Check it out at next update.
|
||||||
|
- Applied the patch in `thirdparty/mbedtls/patches/padlock.diff`. This disables VIA
|
||||||
|
padlock support which defines a symbol `unsupported` which clashes with
|
||||||
|
a symbol in libwebsockets.
|
||||||
|
|
||||||
|
|
||||||
## miniupnpc
|
## miniupnpc
|
||||||
|
|
||||||
|
|
|
@ -642,7 +642,8 @@
|
||||||
"r6", "r7", "r8", "r9", "cc" \
|
"r6", "r7", "r8", "r9", "cc" \
|
||||||
);
|
);
|
||||||
|
|
||||||
#elif defined (__ARM_FEATURE_DSP) && (__ARM_FEATURE_DSP == 1)
|
#elif (__ARM_ARCH >= 6) && \
|
||||||
|
defined (__ARM_FEATURE_DSP) && (__ARM_FEATURE_DSP == 1)
|
||||||
|
|
||||||
#define MULADDC_INIT \
|
#define MULADDC_INIT \
|
||||||
asm(
|
asm(
|
||||||
|
|
|
@ -123,7 +123,7 @@
|
||||||
#error "MBEDTLS_ECDSA_DETERMINISTIC defined, but not all prerequisites"
|
#error "MBEDTLS_ECDSA_DETERMINISTIC defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECP_C) && ( !defined(MBEDTLS_BIGNUM_C) || ( \
|
#if defined(MBEDTLS_ECP_C) && ( !defined(MBEDTLS_BIGNUM_C) || ( \
|
||||||
!defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) && \
|
!defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) && \
|
||||||
!defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) && \
|
!defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) && \
|
||||||
!defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) && \
|
!defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) && \
|
||||||
|
@ -134,7 +134,9 @@
|
||||||
!defined(MBEDTLS_ECP_DP_BP512R1_ENABLED) && \
|
!defined(MBEDTLS_ECP_DP_BP512R1_ENABLED) && \
|
||||||
!defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) && \
|
!defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) && \
|
||||||
!defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) && \
|
!defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) && \
|
||||||
!defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) ) )
|
!defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) && \
|
||||||
|
!defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) && \
|
||||||
|
!defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) ) )
|
||||||
#error "MBEDTLS_ECP_C defined, but not all prerequisites"
|
#error "MBEDTLS_ECP_C defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@ -691,7 +693,7 @@
|
||||||
/*
|
/*
|
||||||
* Avoid warning from -pedantic. This is a convenient place for this
|
* Avoid warning from -pedantic. This is a convenient place for this
|
||||||
* workaround since this is included by every single file before the
|
* workaround since this is included by every single file before the
|
||||||
* #if defined(MBEDTLS_xxx_C) that results in emtpy translation units.
|
* #if defined(MBEDTLS_xxx_C) that results in empty translation units.
|
||||||
*/
|
*/
|
||||||
typedef int mbedtls_iso_c_forbids_empty_translation_units;
|
typedef int mbedtls_iso_c_forbids_empty_translation_units;
|
||||||
|
|
||||||
|
|
|
@ -139,7 +139,7 @@
|
||||||
*
|
*
|
||||||
* System has time.h, time(), and an implementation for
|
* System has time.h, time(), and an implementation for
|
||||||
* mbedtls_platform_gmtime_r() (see below).
|
* mbedtls_platform_gmtime_r() (see below).
|
||||||
* The time needs to be correct (not necesarily very accurate, but at least
|
* The time needs to be correct (not necessarily very accurate, but at least
|
||||||
* the date should be correct). This is used to verify the validity period of
|
* the date should be correct). This is used to verify the validity period of
|
||||||
* X.509 certificates.
|
* X.509 certificates.
|
||||||
*
|
*
|
||||||
|
@ -276,28 +276,52 @@
|
||||||
* For example, when a function accepts as input a pointer to a buffer that may
|
* For example, when a function accepts as input a pointer to a buffer that may
|
||||||
* contain untrusted data, and its documentation mentions that this pointer
|
* contain untrusted data, and its documentation mentions that this pointer
|
||||||
* must not be NULL:
|
* must not be NULL:
|
||||||
* - the pointer is checked to be non-NULL only if this option is enabled
|
* - The pointer is checked to be non-NULL only if this option is enabled.
|
||||||
* - the content of the buffer is always validated
|
* - The content of the buffer is always validated.
|
||||||
*
|
*
|
||||||
* When this flag is defined, if a library function receives a parameter that
|
* When this flag is defined, if a library function receives a parameter that
|
||||||
* is invalid, it will:
|
* is invalid:
|
||||||
* - invoke the macro MBEDTLS_PARAM_FAILED() which by default expands to a
|
* 1. The function will invoke the macro MBEDTLS_PARAM_FAILED().
|
||||||
* call to the function mbedtls_param_failed()
|
* 2. If MBEDTLS_PARAM_FAILED() did not terminate the program, the function
|
||||||
* - immediately return (with a specific error code unless the function
|
* will immediately return. If the function returns an Mbed TLS error code,
|
||||||
* returns void and can't communicate an error).
|
* the error code in this case is MBEDTLS_ERR_xxx_BAD_INPUT_DATA.
|
||||||
*
|
*
|
||||||
* When defining this flag, you also need to:
|
* When defining this flag, you also need to arrange a definition for
|
||||||
* - either provide a definition of the function mbedtls_param_failed() in
|
* MBEDTLS_PARAM_FAILED(). You can do this by any of the following methods:
|
||||||
* your application (see platform_util.h for its prototype) as the library
|
* - By default, the library defines MBEDTLS_PARAM_FAILED() to call a
|
||||||
* calls that function, but does not provide a default definition for it,
|
* function mbedtls_param_failed(), but the library does not define this
|
||||||
* - or provide a different definition of the macro MBEDTLS_PARAM_FAILED()
|
* function. If you do not make any other arrangements, you must provide
|
||||||
* below if the above mechanism is not flexible enough to suit your needs.
|
* the function mbedtls_param_failed() in your application.
|
||||||
* See the documentation of this macro later in this file.
|
* See `platform_util.h` for its prototype.
|
||||||
|
* - If you enable the macro #MBEDTLS_CHECK_PARAMS_ASSERT, then the
|
||||||
|
* library defines #MBEDTLS_PARAM_FAILED(\c cond) to be `assert(cond)`.
|
||||||
|
* You can still supply an alternative definition of
|
||||||
|
* MBEDTLS_PARAM_FAILED(), which may call `assert`.
|
||||||
|
* - If you define a macro MBEDTLS_PARAM_FAILED() before including `config.h`
|
||||||
|
* or you uncomment the definition of MBEDTLS_PARAM_FAILED() in `config.h`,
|
||||||
|
* the library will call the macro that you defined and will not supply
|
||||||
|
* its own version. Note that if MBEDTLS_PARAM_FAILED() calls `assert`,
|
||||||
|
* you need to enable #MBEDTLS_CHECK_PARAMS_ASSERT so that library source
|
||||||
|
* files include `<assert.h>`.
|
||||||
*
|
*
|
||||||
* Uncomment to enable validation of application-controlled parameters.
|
* Uncomment to enable validation of application-controlled parameters.
|
||||||
*/
|
*/
|
||||||
//#define MBEDTLS_CHECK_PARAMS
|
//#define MBEDTLS_CHECK_PARAMS
|
||||||
|
|
||||||
|
/**
|
||||||
|
* \def MBEDTLS_CHECK_PARAMS_ASSERT
|
||||||
|
*
|
||||||
|
* Allow MBEDTLS_PARAM_FAILED() to call `assert`, and make it default to
|
||||||
|
* `assert`. This macro is only used if #MBEDTLS_CHECK_PARAMS is defined.
|
||||||
|
*
|
||||||
|
* If this macro is not defined, then MBEDTLS_PARAM_FAILED() defaults to
|
||||||
|
* calling a function mbedtls_param_failed(). See the documentation of
|
||||||
|
* #MBEDTLS_CHECK_PARAMS for details.
|
||||||
|
*
|
||||||
|
* Uncomment to allow MBEDTLS_PARAM_FAILED() to call `assert`.
|
||||||
|
*/
|
||||||
|
//#define MBEDTLS_CHECK_PARAMS_ASSERT
|
||||||
|
|
||||||
/* \} name SECTION: System support */
|
/* \} name SECTION: System support */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -401,7 +425,7 @@
|
||||||
* \note Because of a signature change, the core AES encryption and decryption routines are
|
* \note Because of a signature change, the core AES encryption and decryption routines are
|
||||||
* currently named mbedtls_aes_internal_encrypt and mbedtls_aes_internal_decrypt,
|
* currently named mbedtls_aes_internal_encrypt and mbedtls_aes_internal_decrypt,
|
||||||
* respectively. When setting up alternative implementations, these functions should
|
* respectively. When setting up alternative implementations, these functions should
|
||||||
* be overriden, but the wrapper functions mbedtls_aes_decrypt and mbedtls_aes_encrypt
|
* be overridden, but the wrapper functions mbedtls_aes_decrypt and mbedtls_aes_encrypt
|
||||||
* must stay untouched.
|
* must stay untouched.
|
||||||
*
|
*
|
||||||
* \note If you use the AES_xxx_ALT macros, then is is recommended to also set
|
* \note If you use the AES_xxx_ALT macros, then is is recommended to also set
|
||||||
|
@ -416,6 +440,16 @@
|
||||||
* dependencies on them, and considering stronger message digests
|
* dependencies on them, and considering stronger message digests
|
||||||
* and ciphers instead.
|
* and ciphers instead.
|
||||||
*
|
*
|
||||||
|
* \warning If both MBEDTLS_ECDSA_SIGN_ALT and MBEDTLS_ECDSA_DETERMINISTIC are
|
||||||
|
* enabled, then the deterministic ECDH signature functions pass the
|
||||||
|
* the static HMAC-DRBG as RNG to mbedtls_ecdsa_sign(). Therefore
|
||||||
|
* alternative implementations should use the RNG only for generating
|
||||||
|
* the ephemeral key and nothing else. If this is not possible, then
|
||||||
|
* MBEDTLS_ECDSA_DETERMINISTIC should be disabled and an alternative
|
||||||
|
* implementation should be provided for mbedtls_ecdsa_sign_det_ext()
|
||||||
|
* (and for mbedtls_ecdsa_sign_det() too if backward compatibility is
|
||||||
|
* desirable).
|
||||||
|
*
|
||||||
*/
|
*/
|
||||||
//#define MBEDTLS_MD2_PROCESS_ALT
|
//#define MBEDTLS_MD2_PROCESS_ALT
|
||||||
//#define MBEDTLS_MD4_PROCESS_ALT
|
//#define MBEDTLS_MD4_PROCESS_ALT
|
||||||
|
@ -1558,7 +1592,7 @@
|
||||||
* \def MBEDTLS_SSL_SESSION_TICKETS
|
* \def MBEDTLS_SSL_SESSION_TICKETS
|
||||||
*
|
*
|
||||||
* Enable support for RFC 5077 session tickets in SSL.
|
* Enable support for RFC 5077 session tickets in SSL.
|
||||||
* Client-side, provides full support for session tickets (maintainance of a
|
* Client-side, provides full support for session tickets (maintenance of a
|
||||||
* session store remains the responsibility of the application, though).
|
* session store remains the responsibility of the application, though).
|
||||||
* Server-side, you also need to provide callbacks for writing and parsing
|
* Server-side, you also need to provide callbacks for writing and parsing
|
||||||
* tickets, including authenticated encryption and key management. Example
|
* tickets, including authenticated encryption and key management. Example
|
||||||
|
@ -1642,9 +1676,7 @@
|
||||||
*
|
*
|
||||||
* Uncomment this to enable pthread mutexes.
|
* Uncomment this to enable pthread mutexes.
|
||||||
*/
|
*/
|
||||||
// -- GODOT start --
|
|
||||||
//#define MBEDTLS_THREADING_PTHREAD
|
//#define MBEDTLS_THREADING_PTHREAD
|
||||||
// -- GODOT end --
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_VERSION_FEATURES
|
* \def MBEDTLS_VERSION_FEATURES
|
||||||
|
@ -1726,7 +1758,7 @@
|
||||||
*
|
*
|
||||||
* \warning TLS-level compression MAY REDUCE SECURITY! See for example the
|
* \warning TLS-level compression MAY REDUCE SECURITY! See for example the
|
||||||
* CRIME attack. Before enabling this option, you should examine with care if
|
* CRIME attack. Before enabling this option, you should examine with care if
|
||||||
* CRIME or similar exploits may be a applicable to your use case.
|
* CRIME or similar exploits may be applicable to your use case.
|
||||||
*
|
*
|
||||||
* \note Currently compression can't be used with DTLS.
|
* \note Currently compression can't be used with DTLS.
|
||||||
*
|
*
|
||||||
|
@ -2838,9 +2870,7 @@
|
||||||
*
|
*
|
||||||
* Enable this layer to allow use of mutexes within mbed TLS
|
* Enable this layer to allow use of mutexes within mbed TLS
|
||||||
*/
|
*/
|
||||||
// -- GODOT start --
|
|
||||||
//#define MBEDTLS_THREADING_C
|
//#define MBEDTLS_THREADING_C
|
||||||
// -- GODOT end --
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_TIMING_C
|
* \def MBEDTLS_TIMING_C
|
||||||
|
@ -3042,7 +3072,7 @@
|
||||||
//#define MBEDTLS_PLATFORM_STD_TIME time /**< Default time to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */
|
//#define MBEDTLS_PLATFORM_STD_TIME time /**< Default time to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */
|
||||||
//#define MBEDTLS_PLATFORM_STD_FPRINTF fprintf /**< Default fprintf to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_STD_FPRINTF fprintf /**< Default fprintf to use, can be undefined */
|
||||||
//#define MBEDTLS_PLATFORM_STD_PRINTF printf /**< Default printf to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_STD_PRINTF printf /**< Default printf to use, can be undefined */
|
||||||
/* Note: your snprintf must correclty zero-terminate the buffer! */
|
/* Note: your snprintf must correctly zero-terminate the buffer! */
|
||||||
//#define MBEDTLS_PLATFORM_STD_SNPRINTF snprintf /**< Default snprintf to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_STD_SNPRINTF snprintf /**< Default snprintf to use, can be undefined */
|
||||||
//#define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS 0 /**< Default exit value to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS 0 /**< Default exit value to use, can be undefined */
|
||||||
//#define MBEDTLS_PLATFORM_STD_EXIT_FAILURE 1 /**< Default exit value to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_STD_EXIT_FAILURE 1 /**< Default exit value to use, can be undefined */
|
||||||
|
@ -3059,20 +3089,23 @@
|
||||||
//#define MBEDTLS_PLATFORM_TIME_TYPE_MACRO time_t /**< Default time macro to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */
|
//#define MBEDTLS_PLATFORM_TIME_TYPE_MACRO time_t /**< Default time macro to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */
|
||||||
//#define MBEDTLS_PLATFORM_FPRINTF_MACRO fprintf /**< Default fprintf macro to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_FPRINTF_MACRO fprintf /**< Default fprintf macro to use, can be undefined */
|
||||||
//#define MBEDTLS_PLATFORM_PRINTF_MACRO printf /**< Default printf macro to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_PRINTF_MACRO printf /**< Default printf macro to use, can be undefined */
|
||||||
/* Note: your snprintf must correclty zero-terminate the buffer! */
|
/* Note: your snprintf must correctly zero-terminate the buffer! */
|
||||||
//#define MBEDTLS_PLATFORM_SNPRINTF_MACRO snprintf /**< Default snprintf macro to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_SNPRINTF_MACRO snprintf /**< Default snprintf macro to use, can be undefined */
|
||||||
//#define MBEDTLS_PLATFORM_NV_SEED_READ_MACRO mbedtls_platform_std_nv_seed_read /**< Default nv_seed_read function to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_NV_SEED_READ_MACRO mbedtls_platform_std_nv_seed_read /**< Default nv_seed_read function to use, can be undefined */
|
||||||
//#define MBEDTLS_PLATFORM_NV_SEED_WRITE_MACRO mbedtls_platform_std_nv_seed_write /**< Default nv_seed_write function to use, can be undefined */
|
//#define MBEDTLS_PLATFORM_NV_SEED_WRITE_MACRO mbedtls_platform_std_nv_seed_write /**< Default nv_seed_write function to use, can be undefined */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief This macro is invoked by the library when an invalid parameter
|
* \brief This macro is invoked by the library when an invalid parameter
|
||||||
* is detected that is only checked with MBEDTLS_CHECK_PARAMS
|
* is detected that is only checked with #MBEDTLS_CHECK_PARAMS
|
||||||
* (see the documentation of that option for context).
|
* (see the documentation of that option for context).
|
||||||
*
|
*
|
||||||
* When you leave this undefined here, a default definition is
|
* When you leave this undefined here, the library provides
|
||||||
* provided that invokes the function mbedtls_param_failed(),
|
* a default definition. If the macro #MBEDTLS_CHECK_PARAMS_ASSERT
|
||||||
* which is declared in platform_util.h for the benefit of the
|
* is defined, the default definition is `assert(cond)`,
|
||||||
* library, but that you need to define in your application.
|
* otherwise the default definition calls a function
|
||||||
|
* mbedtls_param_failed(). This function is declared in
|
||||||
|
* `platform_util.h` for the benefit of the library, but
|
||||||
|
* you need to define in your application.
|
||||||
*
|
*
|
||||||
* When you define this here, this replaces the default
|
* When you define this here, this replaces the default
|
||||||
* definition in platform_util.h (which no longer declares the
|
* definition in platform_util.h (which no longer declares the
|
||||||
|
@ -3081,6 +3114,9 @@
|
||||||
* particular, that all the necessary declarations are visible
|
* particular, that all the necessary declarations are visible
|
||||||
* from within the library - you can ensure that by providing
|
* from within the library - you can ensure that by providing
|
||||||
* them in this file next to the macro definition).
|
* them in this file next to the macro definition).
|
||||||
|
* If you define this macro to call `assert`, also define
|
||||||
|
* #MBEDTLS_CHECK_PARAMS_ASSERT so that library source files
|
||||||
|
* include `<assert.h>`.
|
||||||
*
|
*
|
||||||
* Note that you may define this macro to expand to nothing, in
|
* Note that you may define this macro to expand to nothing, in
|
||||||
* which case you don't have to worry about declarations or
|
* which case you don't have to worry about declarations or
|
||||||
|
|
|
@ -175,6 +175,19 @@ int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
|
||||||
* (SECG): SEC1 Elliptic Curve Cryptography</em>, section
|
* (SECG): SEC1 Elliptic Curve Cryptography</em>, section
|
||||||
* 4.1.3, step 5.
|
* 4.1.3, step 5.
|
||||||
*
|
*
|
||||||
|
* \warning Since the output of the internal RNG is always the same for
|
||||||
|
* the same key and message, this limits the efficiency of
|
||||||
|
* blinding and leaks information through side channels. For
|
||||||
|
* secure behavior use mbedtls_ecdsa_sign_det_ext() instead.
|
||||||
|
*
|
||||||
|
* (Optimally the blinding is a random value that is different
|
||||||
|
* on every execution. In this case the blinding is still
|
||||||
|
* random from the attackers perspective, but is the same on
|
||||||
|
* each execution. This means that this blinding does not
|
||||||
|
* prevent attackers from recovering secrets by combining
|
||||||
|
* several measurement traces, but may prevent some attacks
|
||||||
|
* that exploit relationships between secret data.)
|
||||||
|
*
|
||||||
* \see ecp.h
|
* \see ecp.h
|
||||||
*
|
*
|
||||||
* \param grp The context for the elliptic curve to use.
|
* \param grp The context for the elliptic curve to use.
|
||||||
|
@ -200,6 +213,52 @@ int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r,
|
||||||
mbedtls_mpi *s, const mbedtls_mpi *d,
|
mbedtls_mpi *s, const mbedtls_mpi *d,
|
||||||
const unsigned char *buf, size_t blen,
|
const unsigned char *buf, size_t blen,
|
||||||
mbedtls_md_type_t md_alg );
|
mbedtls_md_type_t md_alg );
|
||||||
|
/**
|
||||||
|
* \brief This function computes the ECDSA signature of a
|
||||||
|
* previously-hashed message, deterministic version.
|
||||||
|
*
|
||||||
|
* For more information, see <em>RFC-6979: Deterministic
|
||||||
|
* Usage of the Digital Signature Algorithm (DSA) and Elliptic
|
||||||
|
* Curve Digital Signature Algorithm (ECDSA)</em>.
|
||||||
|
*
|
||||||
|
* \note If the bitlength of the message hash is larger than the
|
||||||
|
* bitlength of the group order, then the hash is truncated as
|
||||||
|
* defined in <em>Standards for Efficient Cryptography Group
|
||||||
|
* (SECG): SEC1 Elliptic Curve Cryptography</em>, section
|
||||||
|
* 4.1.3, step 5.
|
||||||
|
*
|
||||||
|
* \see ecp.h
|
||||||
|
*
|
||||||
|
* \param grp The context for the elliptic curve to use.
|
||||||
|
* This must be initialized and have group parameters
|
||||||
|
* set, for example through mbedtls_ecp_group_load().
|
||||||
|
* \param r The MPI context in which to store the first part
|
||||||
|
* the signature. This must be initialized.
|
||||||
|
* \param s The MPI context in which to store the second part
|
||||||
|
* the signature. This must be initialized.
|
||||||
|
* \param d The private signing key. This must be initialized
|
||||||
|
* and setup, for example through mbedtls_ecp_gen_privkey().
|
||||||
|
* \param buf The hashed content to be signed. This must be a readable
|
||||||
|
* buffer of length \p blen Bytes. It may be \c NULL if
|
||||||
|
* \p blen is zero.
|
||||||
|
* \param blen The length of \p buf in Bytes.
|
||||||
|
* \param md_alg The hash algorithm used to hash the original data.
|
||||||
|
* \param f_rng_blind The RNG function used for blinding. This must not be
|
||||||
|
* \c NULL.
|
||||||
|
* \param p_rng_blind The RNG context to be passed to \p f_rng. This may be
|
||||||
|
* \c NULL if \p f_rng doesn't need a context parameter.
|
||||||
|
*
|
||||||
|
* \return \c 0 on success.
|
||||||
|
* \return An \c MBEDTLS_ERR_ECP_XXX or \c MBEDTLS_MPI_XXX
|
||||||
|
* error code on failure.
|
||||||
|
*/
|
||||||
|
int mbedtls_ecdsa_sign_det_ext( mbedtls_ecp_group *grp, mbedtls_mpi *r,
|
||||||
|
mbedtls_mpi *s, const mbedtls_mpi *d,
|
||||||
|
const unsigned char *buf, size_t blen,
|
||||||
|
mbedtls_md_type_t md_alg,
|
||||||
|
int (*f_rng_blind)(void *, unsigned char *,
|
||||||
|
size_t),
|
||||||
|
void *p_rng_blind );
|
||||||
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -7,22 +7,22 @@
|
||||||
* specified by RFC 5869.
|
* specified by RFC 5869.
|
||||||
*/
|
*/
|
||||||
/*
|
/*
|
||||||
* Copyright (C) 2016-2018, ARM Limited, All Rights Reserved
|
* Copyright (C) 2016-2019, ARM Limited, All Rights Reserved
|
||||||
* SPDX-License-Identifier: Apache-2.0
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
* not use this file except in compliance with the License.
|
* not use this file except in compliance with the License.
|
||||||
* You may obtain a copy of the License at
|
* You may obtain a copy of the License at
|
||||||
*
|
*
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
*
|
*
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
* See the License for the specific language governing permissions and
|
* See the License for the specific language governing permissions and
|
||||||
* limitations under the License.
|
* limitations under the License.
|
||||||
*
|
*
|
||||||
* This file is part of mbed TLS (https://tls.mbed.org)
|
* This file is part of mbed TLS (https://tls.mbed.org)
|
||||||
*/
|
*/
|
||||||
#ifndef MBEDTLS_HKDF_H
|
#ifndef MBEDTLS_HKDF_H
|
||||||
#define MBEDTLS_HKDF_H
|
#define MBEDTLS_HKDF_H
|
||||||
|
|
|
@ -82,7 +82,7 @@ extern "C" {
|
||||||
*/
|
*/
|
||||||
typedef struct mbedtls_hmac_drbg_context
|
typedef struct mbedtls_hmac_drbg_context
|
||||||
{
|
{
|
||||||
/* Working state: the key K is not stored explicitely,
|
/* Working state: the key K is not stored explicitly,
|
||||||
* but is implied by the HMAC context */
|
* but is implied by the HMAC context */
|
||||||
mbedtls_md_context_t md_ctx; /*!< HMAC context (inc. K) */
|
mbedtls_md_context_t md_ctx; /*!< HMAC context (inc. K) */
|
||||||
unsigned char V[MBEDTLS_MD_MAX_SIZE]; /*!< V in the spec */
|
unsigned char V[MBEDTLS_MD_MAX_SIZE]; /*!< V in the spec */
|
||||||
|
|
|
@ -416,6 +416,10 @@ int mbedtls_pk_verify_ext( mbedtls_pk_type_t type, const void *options,
|
||||||
*
|
*
|
||||||
* \note For RSA, md_alg may be MBEDTLS_MD_NONE if hash_len != 0.
|
* \note For RSA, md_alg may be MBEDTLS_MD_NONE if hash_len != 0.
|
||||||
* For ECDSA, md_alg may never be MBEDTLS_MD_NONE.
|
* For ECDSA, md_alg may never be MBEDTLS_MD_NONE.
|
||||||
|
*
|
||||||
|
* \note In order to ensure enough space for the signature, the
|
||||||
|
* \p sig buffer size must be of at least
|
||||||
|
* `max(MBEDTLS_ECDSA_MAX_LEN, MBEDTLS_MPI_MAX_SIZE)` bytes.
|
||||||
*/
|
*/
|
||||||
int mbedtls_pk_sign( mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg,
|
int mbedtls_pk_sign( mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg,
|
||||||
const unsigned char *hash, size_t hash_len,
|
const unsigned char *hash, size_t hash_len,
|
||||||
|
@ -430,6 +434,10 @@ int mbedtls_pk_sign( mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg,
|
||||||
* \c mbedtls_ecp_set_max_ops() to reduce blocking for ECC
|
* \c mbedtls_ecp_set_max_ops() to reduce blocking for ECC
|
||||||
* operations. For RSA, same as \c mbedtls_pk_sign().
|
* operations. For RSA, same as \c mbedtls_pk_sign().
|
||||||
*
|
*
|
||||||
|
* \note In order to ensure enough space for the signature, the
|
||||||
|
* \p sig buffer size must be of at least
|
||||||
|
* `max(MBEDTLS_ECDSA_MAX_LEN, MBEDTLS_MPI_MAX_SIZE)` bytes.
|
||||||
|
*
|
||||||
* \param ctx The PK context to use. It must have been set up
|
* \param ctx The PK context to use. It must have been set up
|
||||||
* with a private key.
|
* with a private key.
|
||||||
* \param md_alg Hash algorithm used (see notes)
|
* \param md_alg Hash algorithm used (see notes)
|
||||||
|
|
|
@ -43,6 +43,12 @@ extern "C" {
|
||||||
|
|
||||||
#if defined(MBEDTLS_CHECK_PARAMS)
|
#if defined(MBEDTLS_CHECK_PARAMS)
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CHECK_PARAMS_ASSERT)
|
||||||
|
/* Allow the user to define MBEDTLS_PARAM_FAILED to something like assert
|
||||||
|
* (which is what our config.h suggests). */
|
||||||
|
#include <assert.h>
|
||||||
|
#endif /* MBEDTLS_CHECK_PARAMS_ASSERT */
|
||||||
|
|
||||||
#if defined(MBEDTLS_PARAM_FAILED)
|
#if defined(MBEDTLS_PARAM_FAILED)
|
||||||
/** An alternative definition of MBEDTLS_PARAM_FAILED has been set in config.h.
|
/** An alternative definition of MBEDTLS_PARAM_FAILED has been set in config.h.
|
||||||
*
|
*
|
||||||
|
@ -50,6 +56,11 @@ extern "C" {
|
||||||
* MBEDTLS_PARAM_FAILED() will expand to a call to mbedtls_param_failed().
|
* MBEDTLS_PARAM_FAILED() will expand to a call to mbedtls_param_failed().
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_PARAM_FAILED_ALT
|
#define MBEDTLS_PARAM_FAILED_ALT
|
||||||
|
|
||||||
|
#elif defined(MBEDTLS_CHECK_PARAMS_ASSERT)
|
||||||
|
#define MBEDTLS_PARAM_FAILED( cond ) assert( cond )
|
||||||
|
#define MBEDTLS_PARAM_FAILED_ALT
|
||||||
|
|
||||||
#else /* MBEDTLS_PARAM_FAILED */
|
#else /* MBEDTLS_PARAM_FAILED */
|
||||||
#define MBEDTLS_PARAM_FAILED( cond ) \
|
#define MBEDTLS_PARAM_FAILED( cond ) \
|
||||||
mbedtls_param_failed( #cond, __FILE__, __LINE__ )
|
mbedtls_param_failed( #cond, __FILE__, __LINE__ )
|
||||||
|
|
|
@ -150,13 +150,13 @@ mbedtls_rsa_context;
|
||||||
* \note The choice of padding mode is strictly enforced for private key
|
* \note The choice of padding mode is strictly enforced for private key
|
||||||
* operations, since there might be security concerns in
|
* operations, since there might be security concerns in
|
||||||
* mixing padding modes. For public key operations it is
|
* mixing padding modes. For public key operations it is
|
||||||
* a default value, which can be overriden by calling specific
|
* a default value, which can be overridden by calling specific
|
||||||
* \c rsa_rsaes_xxx or \c rsa_rsassa_xxx functions.
|
* \c rsa_rsaes_xxx or \c rsa_rsassa_xxx functions.
|
||||||
*
|
*
|
||||||
* \note The hash selected in \p hash_id is always used for OEAP
|
* \note The hash selected in \p hash_id is always used for OEAP
|
||||||
* encryption. For PSS signatures, it is always used for
|
* encryption. For PSS signatures, it is always used for
|
||||||
* making signatures, but can be overriden for verifying them.
|
* making signatures, but can be overridden for verifying them.
|
||||||
* If set to #MBEDTLS_MD_NONE, it is always overriden.
|
* If set to #MBEDTLS_MD_NONE, it is always overridden.
|
||||||
*
|
*
|
||||||
* \param ctx The RSA context to initialize. This must not be \c NULL.
|
* \param ctx The RSA context to initialize. This must not be \c NULL.
|
||||||
* \param padding The padding mode to use. This must be either
|
* \param padding The padding mode to use. This must be either
|
||||||
|
@ -904,7 +904,8 @@ int mbedtls_rsa_rsaes_oaep_decrypt( mbedtls_rsa_context *ctx,
|
||||||
* the size of the hash corresponding to \p md_alg.
|
* the size of the hash corresponding to \p md_alg.
|
||||||
* \param sig The buffer to hold the signature. This must be a writable
|
* \param sig The buffer to hold the signature. This must be a writable
|
||||||
* buffer of length \c ctx->len Bytes. For example, \c 256 Bytes
|
* buffer of length \c ctx->len Bytes. For example, \c 256 Bytes
|
||||||
* for an 2048-bit RSA modulus.
|
* for an 2048-bit RSA modulus. A buffer length of
|
||||||
|
* #MBEDTLS_MPI_MAX_SIZE is always safe.
|
||||||
*
|
*
|
||||||
* \return \c 0 if the signing operation was successful.
|
* \return \c 0 if the signing operation was successful.
|
||||||
* \return An \c MBEDTLS_ERR_RSA_XXX error code on failure.
|
* \return An \c MBEDTLS_ERR_RSA_XXX error code on failure.
|
||||||
|
@ -951,7 +952,8 @@ int mbedtls_rsa_pkcs1_sign( mbedtls_rsa_context *ctx,
|
||||||
* the size of the hash corresponding to \p md_alg.
|
* the size of the hash corresponding to \p md_alg.
|
||||||
* \param sig The buffer to hold the signature. This must be a writable
|
* \param sig The buffer to hold the signature. This must be a writable
|
||||||
* buffer of length \c ctx->len Bytes. For example, \c 256 Bytes
|
* buffer of length \c ctx->len Bytes. For example, \c 256 Bytes
|
||||||
* for an 2048-bit RSA modulus.
|
* for an 2048-bit RSA modulus. A buffer length of
|
||||||
|
* #MBEDTLS_MPI_MAX_SIZE is always safe.
|
||||||
*
|
*
|
||||||
* \return \c 0 if the signing operation was successful.
|
* \return \c 0 if the signing operation was successful.
|
||||||
* \return An \c MBEDTLS_ERR_RSA_XXX error code on failure.
|
* \return An \c MBEDTLS_ERR_RSA_XXX error code on failure.
|
||||||
|
@ -1012,7 +1014,8 @@ int mbedtls_rsa_rsassa_pkcs1_v15_sign( mbedtls_rsa_context *ctx,
|
||||||
* the size of the hash corresponding to \p md_alg.
|
* the size of the hash corresponding to \p md_alg.
|
||||||
* \param sig The buffer to hold the signature. This must be a writable
|
* \param sig The buffer to hold the signature. This must be a writable
|
||||||
* buffer of length \c ctx->len Bytes. For example, \c 256 Bytes
|
* buffer of length \c ctx->len Bytes. For example, \c 256 Bytes
|
||||||
* for an 2048-bit RSA modulus.
|
* for an 2048-bit RSA modulus. A buffer length of
|
||||||
|
* #MBEDTLS_MPI_MAX_SIZE is always safe.
|
||||||
*
|
*
|
||||||
* \return \c 0 if the signing operation was successful.
|
* \return \c 0 if the signing operation was successful.
|
||||||
* \return An \c MBEDTLS_ERR_RSA_XXX error code on failure.
|
* \return An \c MBEDTLS_ERR_RSA_XXX error code on failure.
|
||||||
|
|
|
@ -2033,7 +2033,7 @@ void mbedtls_ssl_conf_ca_chain( mbedtls_ssl_config *conf,
|
||||||
* provision more than one cert/key pair (eg one ECDSA, one
|
* provision more than one cert/key pair (eg one ECDSA, one
|
||||||
* RSA with SHA-256, one RSA with SHA-1). An adequate
|
* RSA with SHA-256, one RSA with SHA-1). An adequate
|
||||||
* certificate will be selected according to the client's
|
* certificate will be selected according to the client's
|
||||||
* advertised capabilities. In case mutliple certificates are
|
* advertised capabilities. In case multiple certificates are
|
||||||
* adequate, preference is given to the one set by the first
|
* adequate, preference is given to the one set by the first
|
||||||
* call to this function, then second, etc.
|
* call to this function, then second, etc.
|
||||||
*
|
*
|
||||||
|
@ -3206,7 +3206,7 @@ void mbedtls_ssl_free( mbedtls_ssl_context *ssl );
|
||||||
* mbedtls_ssl_config_defaults() or mbedtls_ssl_config_free().
|
* mbedtls_ssl_config_defaults() or mbedtls_ssl_config_free().
|
||||||
*
|
*
|
||||||
* \note You need to call mbedtls_ssl_config_defaults() unless you
|
* \note You need to call mbedtls_ssl_config_defaults() unless you
|
||||||
* manually set all of the relevent fields yourself.
|
* manually set all of the relevant fields yourself.
|
||||||
*
|
*
|
||||||
* \param conf SSL configuration context
|
* \param conf SSL configuration context
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -117,14 +117,14 @@ int mbedtls_ssl_ticket_setup( mbedtls_ssl_ticket_context *ctx,
|
||||||
/**
|
/**
|
||||||
* \brief Implementation of the ticket write callback
|
* \brief Implementation of the ticket write callback
|
||||||
*
|
*
|
||||||
* \note See \c mbedlts_ssl_ticket_write_t for description
|
* \note See \c mbedtls_ssl_ticket_write_t for description
|
||||||
*/
|
*/
|
||||||
mbedtls_ssl_ticket_write_t mbedtls_ssl_ticket_write;
|
mbedtls_ssl_ticket_write_t mbedtls_ssl_ticket_write;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Implementation of the ticket parse callback
|
* \brief Implementation of the ticket parse callback
|
||||||
*
|
*
|
||||||
* \note See \c mbedlts_ssl_ticket_parse_t for description
|
* \note See \c mbedtls_ssl_ticket_parse_t for description
|
||||||
*/
|
*/
|
||||||
mbedtls_ssl_ticket_parse_t mbedtls_ssl_ticket_parse;
|
mbedtls_ssl_ticket_parse_t mbedtls_ssl_ticket_parse;
|
||||||
|
|
||||||
|
|
|
@ -40,16 +40,16 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_VERSION_MAJOR 2
|
#define MBEDTLS_VERSION_MAJOR 2
|
||||||
#define MBEDTLS_VERSION_MINOR 16
|
#define MBEDTLS_VERSION_MINOR 16
|
||||||
#define MBEDTLS_VERSION_PATCH 2
|
#define MBEDTLS_VERSION_PATCH 3
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The single version number has the following structure:
|
* The single version number has the following structure:
|
||||||
* MMNNPP00
|
* MMNNPP00
|
||||||
* Major version | Minor version | Patch version
|
* Major version | Minor version | Patch version
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_VERSION_NUMBER 0x02100200
|
#define MBEDTLS_VERSION_NUMBER 0x02100300
|
||||||
#define MBEDTLS_VERSION_STRING "2.16.2"
|
#define MBEDTLS_VERSION_STRING "2.16.3"
|
||||||
#define MBEDTLS_VERSION_STRING_FULL "mbed TLS 2.16.2"
|
#define MBEDTLS_VERSION_STRING_FULL "mbed TLS 2.16.3"
|
||||||
|
|
||||||
#if defined(MBEDTLS_VERSION_C)
|
#if defined(MBEDTLS_VERSION_C)
|
||||||
|
|
||||||
|
|
|
@ -77,7 +77,7 @@
|
||||||
#define MBEDTLS_ERR_X509_ALLOC_FAILED -0x2880 /**< Allocation of memory failed. */
|
#define MBEDTLS_ERR_X509_ALLOC_FAILED -0x2880 /**< Allocation of memory failed. */
|
||||||
#define MBEDTLS_ERR_X509_FILE_IO_ERROR -0x2900 /**< Read/write of file failed. */
|
#define MBEDTLS_ERR_X509_FILE_IO_ERROR -0x2900 /**< Read/write of file failed. */
|
||||||
#define MBEDTLS_ERR_X509_BUFFER_TOO_SMALL -0x2980 /**< Destination buffer is too small. */
|
#define MBEDTLS_ERR_X509_BUFFER_TOO_SMALL -0x2980 /**< Destination buffer is too small. */
|
||||||
#define MBEDTLS_ERR_X509_FATAL_ERROR -0x3000 /**< A fatal error occured, eg the chain is too long or the vrfy callback failed. */
|
#define MBEDTLS_ERR_X509_FATAL_ERROR -0x3000 /**< A fatal error occurred, eg the chain is too long or the vrfy callback failed. */
|
||||||
/* \} name */
|
/* \} name */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -250,7 +250,7 @@ int mbedtls_x509_serial_gets( char *buf, size_t size, const mbedtls_x509_buf *se
|
||||||
*
|
*
|
||||||
* \param to mbedtls_x509_time to check
|
* \param to mbedtls_x509_time to check
|
||||||
*
|
*
|
||||||
* \return 1 if the given time is in the past or an error occured,
|
* \return 1 if the given time is in the past or an error occurred,
|
||||||
* 0 otherwise.
|
* 0 otherwise.
|
||||||
*/
|
*/
|
||||||
int mbedtls_x509_time_is_past( const mbedtls_x509_time *to );
|
int mbedtls_x509_time_is_past( const mbedtls_x509_time *to );
|
||||||
|
@ -264,7 +264,7 @@ int mbedtls_x509_time_is_past( const mbedtls_x509_time *to );
|
||||||
*
|
*
|
||||||
* \param from mbedtls_x509_time to check
|
* \param from mbedtls_x509_time to check
|
||||||
*
|
*
|
||||||
* \return 1 if the given time is in the future or an error occured,
|
* \return 1 if the given time is in the future or an error occurred,
|
||||||
* 0 otherwise.
|
* 0 otherwise.
|
||||||
*/
|
*/
|
||||||
int mbedtls_x509_time_is_future( const mbedtls_x509_time *from );
|
int mbedtls_x509_time_is_future( const mbedtls_x509_time *from );
|
||||||
|
|
|
@ -111,7 +111,7 @@ int mbedtls_x509_crl_parse_der( mbedtls_x509_crl *chain,
|
||||||
/**
|
/**
|
||||||
* \brief Parse one or more CRLs and append them to the chained list
|
* \brief Parse one or more CRLs and append them to the chained list
|
||||||
*
|
*
|
||||||
* \note Mutliple CRLs are accepted only if using PEM format
|
* \note Multiple CRLs are accepted only if using PEM format
|
||||||
*
|
*
|
||||||
* \param chain points to the start of the chain
|
* \param chain points to the start of the chain
|
||||||
* \param buf buffer holding the CRL data in PEM or DER format
|
* \param buf buffer holding the CRL data in PEM or DER format
|
||||||
|
@ -126,7 +126,7 @@ int mbedtls_x509_crl_parse( mbedtls_x509_crl *chain, const unsigned char *buf, s
|
||||||
/**
|
/**
|
||||||
* \brief Load one or more CRLs and append them to the chained list
|
* \brief Load one or more CRLs and append them to the chained list
|
||||||
*
|
*
|
||||||
* \note Mutliple CRLs are accepted only if using PEM format
|
* \note Multiple CRLs are accepted only if using PEM format
|
||||||
*
|
*
|
||||||
* \param chain points to the start of the chain
|
* \param chain points to the start of the chain
|
||||||
* \param path filename to read the CRLs from (in PEM or DER encoding)
|
* \param path filename to read the CRLs from (in PEM or DER encoding)
|
||||||
|
|
|
@ -742,10 +742,15 @@ cleanup:
|
||||||
static mbedtls_mpi_uint mpi_uint_bigendian_to_host_c( mbedtls_mpi_uint x )
|
static mbedtls_mpi_uint mpi_uint_bigendian_to_host_c( mbedtls_mpi_uint x )
|
||||||
{
|
{
|
||||||
uint8_t i;
|
uint8_t i;
|
||||||
|
unsigned char *x_ptr;
|
||||||
mbedtls_mpi_uint tmp = 0;
|
mbedtls_mpi_uint tmp = 0;
|
||||||
/* This works regardless of the endianness. */
|
|
||||||
for( i = 0; i < ciL; i++, x >>= 8 )
|
for( i = 0, x_ptr = (unsigned char*) &x; i < ciL; i++, x_ptr++ )
|
||||||
tmp |= ( x & 0xFF ) << ( ( ciL - 1 - i ) << 3 );
|
{
|
||||||
|
tmp <<= CHAR_BIT;
|
||||||
|
tmp |= (mbedtls_mpi_uint) *x_ptr;
|
||||||
|
}
|
||||||
|
|
||||||
return( tmp );
|
return( tmp );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2351,7 +2356,8 @@ static int mpi_miller_rabin( const mbedtls_mpi *X, size_t rounds,
|
||||||
}
|
}
|
||||||
|
|
||||||
if (count++ > 30) {
|
if (count++ > 30) {
|
||||||
return MBEDTLS_ERR_MPI_NOT_ACCEPTABLE;
|
ret = MBEDTLS_ERR_MPI_NOT_ACCEPTABLE;
|
||||||
|
goto cleanup;
|
||||||
}
|
}
|
||||||
|
|
||||||
} while ( mbedtls_mpi_cmp_mpi( &A, &W ) >= 0 ||
|
} while ( mbedtls_mpi_cmp_mpi( &A, &W ) >= 0 ||
|
||||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -172,11 +172,11 @@ static void ecdsa_restart_det_free( mbedtls_ecdsa_restart_det_ctx *ctx )
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
||||||
|
|
||||||
#define ECDSA_RS_ECP &rs_ctx->ecp
|
#define ECDSA_RS_ECP ( rs_ctx == NULL ? NULL : &rs_ctx->ecp )
|
||||||
|
|
||||||
/* Utility macro for checking and updating ops budget */
|
/* Utility macro for checking and updating ops budget */
|
||||||
#define ECDSA_BUDGET( ops ) \
|
#define ECDSA_BUDGET( ops ) \
|
||||||
MBEDTLS_MPI_CHK( mbedtls_ecp_check_budget( grp, &rs_ctx->ecp, ops ) );
|
MBEDTLS_MPI_CHK( mbedtls_ecp_check_budget( grp, ECDSA_RS_ECP, ops ) );
|
||||||
|
|
||||||
/* Call this when entering a function that needs its own sub-context */
|
/* Call this when entering a function that needs its own sub-context */
|
||||||
#define ECDSA_RS_ENTER( SUB ) do { \
|
#define ECDSA_RS_ENTER( SUB ) do { \
|
||||||
|
@ -254,6 +254,8 @@ static int ecdsa_sign_restartable( mbedtls_ecp_group *grp,
|
||||||
mbedtls_mpi *r, mbedtls_mpi *s,
|
mbedtls_mpi *r, mbedtls_mpi *s,
|
||||||
const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
|
const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
|
||||||
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
|
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
|
||||||
|
int (*f_rng_blind)(void *, unsigned char *, size_t),
|
||||||
|
void *p_rng_blind,
|
||||||
mbedtls_ecdsa_restart_ctx *rs_ctx )
|
mbedtls_ecdsa_restart_ctx *rs_ctx )
|
||||||
{
|
{
|
||||||
int ret, key_tries, sign_tries;
|
int ret, key_tries, sign_tries;
|
||||||
|
@ -323,7 +325,9 @@ static int ecdsa_sign_restartable( mbedtls_ecp_group *grp,
|
||||||
mul:
|
mul:
|
||||||
#endif
|
#endif
|
||||||
MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, &R, pk, &grp->G,
|
MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, &R, pk, &grp->G,
|
||||||
f_rng, p_rng, ECDSA_RS_ECP ) );
|
f_rng_blind,
|
||||||
|
p_rng_blind,
|
||||||
|
ECDSA_RS_ECP ) );
|
||||||
MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( pr, &R.X, &grp->N ) );
|
MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( pr, &R.X, &grp->N ) );
|
||||||
}
|
}
|
||||||
while( mbedtls_mpi_cmp_int( pr, 0 ) == 0 );
|
while( mbedtls_mpi_cmp_int( pr, 0 ) == 0 );
|
||||||
|
@ -349,7 +353,8 @@ modn:
|
||||||
* Generate a random value to blind inv_mod in next step,
|
* Generate a random value to blind inv_mod in next step,
|
||||||
* avoiding a potential timing leak.
|
* avoiding a potential timing leak.
|
||||||
*/
|
*/
|
||||||
MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, &t, f_rng, p_rng ) );
|
MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, &t, f_rng_blind,
|
||||||
|
p_rng_blind ) );
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Step 6: compute s = (e + r * d) / k = t (e + rd) / (kt) mod n
|
* Step 6: compute s = (e + r * d) / k = t (e + rd) / (kt) mod n
|
||||||
|
@ -392,8 +397,9 @@ int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
|
||||||
ECDSA_VALIDATE_RET( f_rng != NULL );
|
ECDSA_VALIDATE_RET( f_rng != NULL );
|
||||||
ECDSA_VALIDATE_RET( buf != NULL || blen == 0 );
|
ECDSA_VALIDATE_RET( buf != NULL || blen == 0 );
|
||||||
|
|
||||||
|
/* Use the same RNG for both blinding and ephemeral key generation */
|
||||||
return( ecdsa_sign_restartable( grp, r, s, d, buf, blen,
|
return( ecdsa_sign_restartable( grp, r, s, d, buf, blen,
|
||||||
f_rng, p_rng, NULL ) );
|
f_rng, p_rng, f_rng, p_rng, NULL ) );
|
||||||
}
|
}
|
||||||
#endif /* !MBEDTLS_ECDSA_SIGN_ALT */
|
#endif /* !MBEDTLS_ECDSA_SIGN_ALT */
|
||||||
|
|
||||||
|
@ -405,6 +411,8 @@ static int ecdsa_sign_det_restartable( mbedtls_ecp_group *grp,
|
||||||
mbedtls_mpi *r, mbedtls_mpi *s,
|
mbedtls_mpi *r, mbedtls_mpi *s,
|
||||||
const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
|
const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
|
||||||
mbedtls_md_type_t md_alg,
|
mbedtls_md_type_t md_alg,
|
||||||
|
int (*f_rng_blind)(void *, unsigned char *, size_t),
|
||||||
|
void *p_rng_blind,
|
||||||
mbedtls_ecdsa_restart_ctx *rs_ctx )
|
mbedtls_ecdsa_restart_ctx *rs_ctx )
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
|
@ -451,8 +459,70 @@ sign:
|
||||||
ret = mbedtls_ecdsa_sign( grp, r, s, d, buf, blen,
|
ret = mbedtls_ecdsa_sign( grp, r, s, d, buf, blen,
|
||||||
mbedtls_hmac_drbg_random, p_rng );
|
mbedtls_hmac_drbg_random, p_rng );
|
||||||
#else
|
#else
|
||||||
ret = ecdsa_sign_restartable( grp, r, s, d, buf, blen,
|
if( f_rng_blind != NULL )
|
||||||
mbedtls_hmac_drbg_random, p_rng, rs_ctx );
|
ret = ecdsa_sign_restartable( grp, r, s, d, buf, blen,
|
||||||
|
mbedtls_hmac_drbg_random, p_rng,
|
||||||
|
f_rng_blind, p_rng_blind, rs_ctx );
|
||||||
|
else
|
||||||
|
{
|
||||||
|
mbedtls_hmac_drbg_context *p_rng_blind_det;
|
||||||
|
|
||||||
|
#if !defined(MBEDTLS_ECP_RESTARTABLE)
|
||||||
|
/*
|
||||||
|
* To avoid reusing rng_ctx and risking incorrect behavior we seed a
|
||||||
|
* second HMAC-DRBG with the same seed. We also apply a label to avoid
|
||||||
|
* reusing the bits of the ephemeral key for blinding and eliminate the
|
||||||
|
* risk that they leak this way.
|
||||||
|
*/
|
||||||
|
const char* blind_label = "BLINDING CONTEXT";
|
||||||
|
mbedtls_hmac_drbg_context rng_ctx_blind;
|
||||||
|
|
||||||
|
mbedtls_hmac_drbg_init( &rng_ctx_blind );
|
||||||
|
p_rng_blind_det = &rng_ctx_blind;
|
||||||
|
|
||||||
|
mbedtls_hmac_drbg_seed_buf( p_rng_blind_det, md_info,
|
||||||
|
data, 2 * grp_len );
|
||||||
|
ret = mbedtls_hmac_drbg_update_ret( p_rng_blind_det,
|
||||||
|
(const unsigned char*) blind_label,
|
||||||
|
strlen( blind_label ) );
|
||||||
|
if( ret != 0 )
|
||||||
|
{
|
||||||
|
mbedtls_hmac_drbg_free( &rng_ctx_blind );
|
||||||
|
goto cleanup;
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
/*
|
||||||
|
* In the case of restartable computations we would either need to store
|
||||||
|
* the second RNG in the restart context too or set it up at every
|
||||||
|
* restart. The first option would penalize the correct application of
|
||||||
|
* the function and the second would defeat the purpose of the
|
||||||
|
* restartable feature.
|
||||||
|
*
|
||||||
|
* Therefore in this case we reuse the original RNG. This comes with the
|
||||||
|
* price that the resulting signature might not be a valid deterministic
|
||||||
|
* ECDSA signature with a very low probability (same magnitude as
|
||||||
|
* successfully guessing the private key). However even then it is still
|
||||||
|
* a valid ECDSA signature.
|
||||||
|
*/
|
||||||
|
p_rng_blind_det = p_rng;
|
||||||
|
#endif /* MBEDTLS_ECP_RESTARTABLE */
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Since the output of the RNGs is always the same for the same key and
|
||||||
|
* message, this limits the efficiency of blinding and leaks information
|
||||||
|
* through side channels. After mbedtls_ecdsa_sign_det() is removed NULL
|
||||||
|
* won't be a valid value for f_rng_blind anymore. Therefore it should
|
||||||
|
* be checked by the caller and this branch and check can be removed.
|
||||||
|
*/
|
||||||
|
ret = ecdsa_sign_restartable( grp, r, s, d, buf, blen,
|
||||||
|
mbedtls_hmac_drbg_random, p_rng,
|
||||||
|
mbedtls_hmac_drbg_random, p_rng_blind_det,
|
||||||
|
rs_ctx );
|
||||||
|
|
||||||
|
#if !defined(MBEDTLS_ECP_RESTARTABLE)
|
||||||
|
mbedtls_hmac_drbg_free( &rng_ctx_blind );
|
||||||
|
#endif
|
||||||
|
}
|
||||||
#endif /* MBEDTLS_ECDSA_SIGN_ALT */
|
#endif /* MBEDTLS_ECDSA_SIGN_ALT */
|
||||||
|
|
||||||
cleanup:
|
cleanup:
|
||||||
|
@ -465,11 +535,12 @@ cleanup:
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Deterministic signature wrapper
|
* Deterministic signature wrappers
|
||||||
*/
|
*/
|
||||||
int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
|
int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r,
|
||||||
const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
|
mbedtls_mpi *s, const mbedtls_mpi *d,
|
||||||
mbedtls_md_type_t md_alg )
|
const unsigned char *buf, size_t blen,
|
||||||
|
mbedtls_md_type_t md_alg )
|
||||||
{
|
{
|
||||||
ECDSA_VALIDATE_RET( grp != NULL );
|
ECDSA_VALIDATE_RET( grp != NULL );
|
||||||
ECDSA_VALIDATE_RET( r != NULL );
|
ECDSA_VALIDATE_RET( r != NULL );
|
||||||
|
@ -477,7 +548,27 @@ int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi
|
||||||
ECDSA_VALIDATE_RET( d != NULL );
|
ECDSA_VALIDATE_RET( d != NULL );
|
||||||
ECDSA_VALIDATE_RET( buf != NULL || blen == 0 );
|
ECDSA_VALIDATE_RET( buf != NULL || blen == 0 );
|
||||||
|
|
||||||
return( ecdsa_sign_det_restartable( grp, r, s, d, buf, blen, md_alg, NULL ) );
|
return( ecdsa_sign_det_restartable( grp, r, s, d, buf, blen, md_alg,
|
||||||
|
NULL, NULL, NULL ) );
|
||||||
|
}
|
||||||
|
|
||||||
|
int mbedtls_ecdsa_sign_det_ext( mbedtls_ecp_group *grp, mbedtls_mpi *r,
|
||||||
|
mbedtls_mpi *s, const mbedtls_mpi *d,
|
||||||
|
const unsigned char *buf, size_t blen,
|
||||||
|
mbedtls_md_type_t md_alg,
|
||||||
|
int (*f_rng_blind)(void *, unsigned char *,
|
||||||
|
size_t),
|
||||||
|
void *p_rng_blind )
|
||||||
|
{
|
||||||
|
ECDSA_VALIDATE_RET( grp != NULL );
|
||||||
|
ECDSA_VALIDATE_RET( r != NULL );
|
||||||
|
ECDSA_VALIDATE_RET( s != NULL );
|
||||||
|
ECDSA_VALIDATE_RET( d != NULL );
|
||||||
|
ECDSA_VALIDATE_RET( buf != NULL || blen == 0 );
|
||||||
|
ECDSA_VALIDATE_RET( f_rng_blind != NULL );
|
||||||
|
|
||||||
|
return( ecdsa_sign_det_restartable( grp, r, s, d, buf, blen, md_alg,
|
||||||
|
f_rng_blind, p_rng_blind, NULL ) );
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
||||||
|
|
||||||
|
@ -656,11 +747,9 @@ int mbedtls_ecdsa_write_signature_restartable( mbedtls_ecdsa_context *ctx,
|
||||||
mbedtls_mpi_init( &s );
|
mbedtls_mpi_init( &s );
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
|
#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
|
||||||
(void) f_rng;
|
|
||||||
(void) p_rng;
|
|
||||||
|
|
||||||
MBEDTLS_MPI_CHK( ecdsa_sign_det_restartable( &ctx->grp, &r, &s, &ctx->d,
|
MBEDTLS_MPI_CHK( ecdsa_sign_det_restartable( &ctx->grp, &r, &s, &ctx->d,
|
||||||
hash, hlen, md_alg, rs_ctx ) );
|
hash, hlen, md_alg, f_rng,
|
||||||
|
p_rng, rs_ctx ) );
|
||||||
#else
|
#else
|
||||||
(void) md_alg;
|
(void) md_alg;
|
||||||
|
|
||||||
|
@ -668,8 +757,10 @@ int mbedtls_ecdsa_write_signature_restartable( mbedtls_ecdsa_context *ctx,
|
||||||
MBEDTLS_MPI_CHK( mbedtls_ecdsa_sign( &ctx->grp, &r, &s, &ctx->d,
|
MBEDTLS_MPI_CHK( mbedtls_ecdsa_sign( &ctx->grp, &r, &s, &ctx->d,
|
||||||
hash, hlen, f_rng, p_rng ) );
|
hash, hlen, f_rng, p_rng ) );
|
||||||
#else
|
#else
|
||||||
|
/* Use the same RNG for both blinding and ephemeral key generation */
|
||||||
MBEDTLS_MPI_CHK( ecdsa_sign_restartable( &ctx->grp, &r, &s, &ctx->d,
|
MBEDTLS_MPI_CHK( ecdsa_sign_restartable( &ctx->grp, &r, &s, &ctx->d,
|
||||||
hash, hlen, f_rng, p_rng, rs_ctx ) );
|
hash, hlen, f_rng, p_rng, f_rng,
|
||||||
|
p_rng, rs_ctx ) );
|
||||||
#endif /* MBEDTLS_ECDSA_SIGN_ALT */
|
#endif /* MBEDTLS_ECDSA_SIGN_ALT */
|
||||||
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
||||||
|
|
||||||
|
|
|
@ -226,7 +226,7 @@ static int ecjpake_hash( const mbedtls_md_info_t *md_info,
|
||||||
p += id_len;
|
p += id_len;
|
||||||
|
|
||||||
/* Compute hash */
|
/* Compute hash */
|
||||||
mbedtls_md( md_info, buf, p - buf, hash );
|
MBEDTLS_MPI_CHK( mbedtls_md( md_info, buf, p - buf, hash ) );
|
||||||
|
|
||||||
/* Turn it into an integer mod n */
|
/* Turn it into an integer mod n */
|
||||||
MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( h, hash,
|
MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( h, hash,
|
||||||
|
@ -951,7 +951,7 @@ static const unsigned char ecjpake_test_pms[] = {
|
||||||
0xb4, 0x38, 0xf7, 0x19, 0xd3, 0xc4, 0xf3, 0x51
|
0xb4, 0x38, 0xf7, 0x19, 0xd3, 0xc4, 0xf3, 0x51
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Load my private keys and generate the correponding public keys */
|
/* Load my private keys and generate the corresponding public keys */
|
||||||
static int ecjpake_test_load( mbedtls_ecjpake_context *ctx,
|
static int ecjpake_test_load( mbedtls_ecjpake_context *ctx,
|
||||||
const unsigned char *xm1, size_t len1,
|
const unsigned char *xm1, size_t len1,
|
||||||
const unsigned char *xm2, size_t len2 )
|
const unsigned char *xm2, size_t len2 )
|
||||||
|
|
|
@ -61,28 +61,43 @@
|
||||||
#define _WIN32_WINNT 0x0400
|
#define _WIN32_WINNT 0x0400
|
||||||
#endif
|
#endif
|
||||||
#include <windows.h>
|
#include <windows.h>
|
||||||
#include <wincrypt.h>
|
#include <bcrypt.h>
|
||||||
|
#if defined(_MSC_VER) && _MSC_VER <= 1600
|
||||||
|
/* Visual Studio 2010 and earlier issue a warning when both <stdint.h> and
|
||||||
|
* <intsafe.h> are included, as they redefine a number of <TYPE>_MAX constants.
|
||||||
|
* These constants are guaranteed to be the same, though, so we suppress the
|
||||||
|
* warning when including intsafe.h.
|
||||||
|
*/
|
||||||
|
#pragma warning( push )
|
||||||
|
#pragma warning( disable : 4005 )
|
||||||
|
#endif
|
||||||
|
#include <intsafe.h>
|
||||||
|
#if defined(_MSC_VER) && _MSC_VER <= 1600
|
||||||
|
#pragma warning( pop )
|
||||||
|
#endif
|
||||||
|
|
||||||
int mbedtls_platform_entropy_poll( void *data, unsigned char *output, size_t len,
|
int mbedtls_platform_entropy_poll( void *data, unsigned char *output, size_t len,
|
||||||
size_t *olen )
|
size_t *olen )
|
||||||
{
|
{
|
||||||
HCRYPTPROV provider;
|
ULONG len_as_ulong = 0;
|
||||||
((void) data);
|
((void) data);
|
||||||
*olen = 0;
|
*olen = 0;
|
||||||
|
|
||||||
if( CryptAcquireContext( &provider, NULL, NULL,
|
/*
|
||||||
PROV_RSA_FULL, CRYPT_VERIFYCONTEXT ) == FALSE )
|
* BCryptGenRandom takes ULONG for size, which is smaller than size_t on
|
||||||
|
* 64-bit Windows platforms. Ensure len's value can be safely converted into
|
||||||
|
* a ULONG.
|
||||||
|
*/
|
||||||
|
if ( FAILED( SizeTToULong( len, &len_as_ulong ) ) )
|
||||||
{
|
{
|
||||||
return( MBEDTLS_ERR_ENTROPY_SOURCE_FAILED );
|
return( MBEDTLS_ERR_ENTROPY_SOURCE_FAILED );
|
||||||
}
|
}
|
||||||
|
|
||||||
if( CryptGenRandom( provider, (DWORD) len, output ) == FALSE )
|
if ( !BCRYPT_SUCCESS( BCryptGenRandom( NULL, output, len_as_ulong, BCRYPT_USE_SYSTEM_PREFERRED_RNG ) ) )
|
||||||
{
|
{
|
||||||
CryptReleaseContext( provider, 0 );
|
|
||||||
return( MBEDTLS_ERR_ENTROPY_SOURCE_FAILED );
|
return( MBEDTLS_ERR_ENTROPY_SOURCE_FAILED );
|
||||||
}
|
}
|
||||||
|
|
||||||
CryptReleaseContext( provider, 0 );
|
|
||||||
*olen = len;
|
*olen = len;
|
||||||
|
|
||||||
return( 0 );
|
return( 0 );
|
||||||
|
|
|
@ -567,7 +567,7 @@ void mbedtls_strerror( int ret, char *buf, size_t buflen )
|
||||||
if( use_ret == -(MBEDTLS_ERR_X509_BUFFER_TOO_SMALL) )
|
if( use_ret == -(MBEDTLS_ERR_X509_BUFFER_TOO_SMALL) )
|
||||||
mbedtls_snprintf( buf, buflen, "X509 - Destination buffer is too small" );
|
mbedtls_snprintf( buf, buflen, "X509 - Destination buffer is too small" );
|
||||||
if( use_ret == -(MBEDTLS_ERR_X509_FATAL_ERROR) )
|
if( use_ret == -(MBEDTLS_ERR_X509_FATAL_ERROR) )
|
||||||
mbedtls_snprintf( buf, buflen, "X509 - A fatal error occured, eg the chain is too long or the vrfy callback failed" );
|
mbedtls_snprintf( buf, buflen, "X509 - A fatal error occurred, eg the chain is too long or the vrfy callback failed" );
|
||||||
#endif /* MBEDTLS_X509_USE_C || MBEDTLS_X509_CREATE_C */
|
#endif /* MBEDTLS_X509_USE_C || MBEDTLS_X509_CREATE_C */
|
||||||
// END generated code
|
// END generated code
|
||||||
|
|
||||||
|
|
|
@ -38,8 +38,19 @@
|
||||||
#include "mbedtls/timing.h"
|
#include "mbedtls/timing.h"
|
||||||
#include "mbedtls/platform_util.h"
|
#include "mbedtls/platform_util.h"
|
||||||
|
|
||||||
|
#include <limits.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
|
/* If int isn't capable of storing 2^32 distinct values, the code of this
|
||||||
|
* module may cause a processor trap or a miscalculation. If int is more
|
||||||
|
* than 32 bits, the code may not calculate the intended values. */
|
||||||
|
#if INT_MIN + 1 != -0x7fffffff
|
||||||
|
#error "The HAVEGE module requires int to be exactly 32 bits, with INT_MIN = -2^31."
|
||||||
|
#endif
|
||||||
|
#if UINT_MAX != 0xffffffff
|
||||||
|
#error "The HAVEGE module requires unsigned to be exactly 32 bits."
|
||||||
|
#endif
|
||||||
|
|
||||||
/* ------------------------------------------------------------------------
|
/* ------------------------------------------------------------------------
|
||||||
* On average, one iteration accesses two 8-word blocks in the havege WALK
|
* On average, one iteration accesses two 8-word blocks in the havege WALK
|
||||||
* table, and generates 16 words in the RES array.
|
* table, and generates 16 words in the RES array.
|
||||||
|
@ -54,7 +65,7 @@
|
||||||
* ------------------------------------------------------------------------
|
* ------------------------------------------------------------------------
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#define SWAP(X,Y) { int *T = (X); (X) = (Y); (Y) = T; }
|
#define SWAP(X,Y) { unsigned *T = (X); (X) = (Y); (Y) = T; }
|
||||||
|
|
||||||
#define TST1_ENTER if( PTEST & 1 ) { PTEST ^= 3; PTEST >>= 1;
|
#define TST1_ENTER if( PTEST & 1 ) { PTEST ^= 3; PTEST >>= 1;
|
||||||
#define TST2_ENTER if( PTEST & 1 ) { PTEST ^= 3; PTEST >>= 1;
|
#define TST2_ENTER if( PTEST & 1 ) { PTEST ^= 3; PTEST >>= 1;
|
||||||
|
@ -77,7 +88,7 @@
|
||||||
PTX = (PT1 >> 18) & 7; \
|
PTX = (PT1 >> 18) & 7; \
|
||||||
PT1 &= 0x1FFF; \
|
PT1 &= 0x1FFF; \
|
||||||
PT2 &= 0x1FFF; \
|
PT2 &= 0x1FFF; \
|
||||||
CLK = (int) mbedtls_timing_hardclock(); \
|
CLK = (unsigned) mbedtls_timing_hardclock(); \
|
||||||
\
|
\
|
||||||
i = 0; \
|
i = 0; \
|
||||||
A = &WALK[PT1 ]; RES[i++] ^= *A; \
|
A = &WALK[PT1 ]; RES[i++] ^= *A; \
|
||||||
|
@ -100,7 +111,7 @@
|
||||||
\
|
\
|
||||||
IN = (*A >> (5)) ^ (*A << (27)) ^ CLK; \
|
IN = (*A >> (5)) ^ (*A << (27)) ^ CLK; \
|
||||||
*A = (*B >> (6)) ^ (*B << (26)) ^ CLK; \
|
*A = (*B >> (6)) ^ (*B << (26)) ^ CLK; \
|
||||||
*B = IN; CLK = (int) mbedtls_timing_hardclock(); \
|
*B = IN; CLK = (unsigned) mbedtls_timing_hardclock(); \
|
||||||
*C = (*C >> (7)) ^ (*C << (25)) ^ CLK; \
|
*C = (*C >> (7)) ^ (*C << (25)) ^ CLK; \
|
||||||
*D = (*D >> (8)) ^ (*D << (24)) ^ CLK; \
|
*D = (*D >> (8)) ^ (*D << (24)) ^ CLK; \
|
||||||
\
|
\
|
||||||
|
@ -151,19 +162,20 @@
|
||||||
PT1 ^= (PT2 ^ 0x10) & 0x10; \
|
PT1 ^= (PT2 ^ 0x10) & 0x10; \
|
||||||
\
|
\
|
||||||
for( n++, i = 0; i < 16; i++ ) \
|
for( n++, i = 0; i < 16; i++ ) \
|
||||||
hs->pool[n % MBEDTLS_HAVEGE_COLLECT_SIZE] ^= RES[i];
|
POOL[n % MBEDTLS_HAVEGE_COLLECT_SIZE] ^= RES[i];
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Entropy gathering function
|
* Entropy gathering function
|
||||||
*/
|
*/
|
||||||
static void havege_fill( mbedtls_havege_state *hs )
|
static void havege_fill( mbedtls_havege_state *hs )
|
||||||
{
|
{
|
||||||
int i, n = 0;
|
unsigned i, n = 0;
|
||||||
int U1, U2, *A, *B, *C, *D;
|
unsigned U1, U2, *A, *B, *C, *D;
|
||||||
int PT1, PT2, *WALK, RES[16];
|
unsigned PT1, PT2, *WALK, *POOL, RES[16];
|
||||||
int PTX, PTY, CLK, PTEST, IN;
|
unsigned PTX, PTY, CLK, PTEST, IN;
|
||||||
|
|
||||||
WALK = hs->WALK;
|
WALK = (unsigned *) hs->WALK;
|
||||||
|
POOL = (unsigned *) hs->pool;
|
||||||
PT1 = hs->PT1;
|
PT1 = hs->PT1;
|
||||||
PT2 = hs->PT2;
|
PT2 = hs->PT2;
|
||||||
|
|
||||||
|
|
|
@ -149,20 +149,32 @@ int mbedtls_hmac_drbg_seed_buf( mbedtls_hmac_drbg_context *ctx,
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* HMAC_DRBG reseeding: 10.1.2.4 (arabic) + 9.2 (Roman)
|
* Internal function used both for seeding and reseeding the DRBG.
|
||||||
|
* Comments starting with arabic numbers refer to section 10.1.2.4
|
||||||
|
* of SP800-90A, while roman numbers refer to section 9.2.
|
||||||
*/
|
*/
|
||||||
int mbedtls_hmac_drbg_reseed( mbedtls_hmac_drbg_context *ctx,
|
static int hmac_drbg_reseed_core( mbedtls_hmac_drbg_context *ctx,
|
||||||
const unsigned char *additional, size_t len )
|
const unsigned char *additional, size_t len,
|
||||||
|
int use_nonce )
|
||||||
{
|
{
|
||||||
unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT];
|
unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT];
|
||||||
size_t seedlen;
|
size_t seedlen = 0;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
/* III. Check input length */
|
|
||||||
if( len > MBEDTLS_HMAC_DRBG_MAX_INPUT ||
|
|
||||||
ctx->entropy_len + len > MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT )
|
|
||||||
{
|
{
|
||||||
return( MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG );
|
size_t total_entropy_len;
|
||||||
|
|
||||||
|
if( use_nonce == 0 )
|
||||||
|
total_entropy_len = ctx->entropy_len;
|
||||||
|
else
|
||||||
|
total_entropy_len = ctx->entropy_len * 3 / 2;
|
||||||
|
|
||||||
|
/* III. Check input length */
|
||||||
|
if( len > MBEDTLS_HMAC_DRBG_MAX_INPUT ||
|
||||||
|
total_entropy_len + len > MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT )
|
||||||
|
{
|
||||||
|
return( MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG );
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
memset( seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT );
|
memset( seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT );
|
||||||
|
@ -170,9 +182,32 @@ int mbedtls_hmac_drbg_reseed( mbedtls_hmac_drbg_context *ctx,
|
||||||
/* IV. Gather entropy_len bytes of entropy for the seed */
|
/* IV. Gather entropy_len bytes of entropy for the seed */
|
||||||
if( ( ret = ctx->f_entropy( ctx->p_entropy,
|
if( ( ret = ctx->f_entropy( ctx->p_entropy,
|
||||||
seed, ctx->entropy_len ) ) != 0 )
|
seed, ctx->entropy_len ) ) != 0 )
|
||||||
|
{
|
||||||
return( MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED );
|
return( MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED );
|
||||||
|
}
|
||||||
|
seedlen += ctx->entropy_len;
|
||||||
|
|
||||||
|
/* For initial seeding, allow adding of nonce generated
|
||||||
|
* from the entropy source. See Sect 8.6.7 in SP800-90A. */
|
||||||
|
if( use_nonce )
|
||||||
|
{
|
||||||
|
/* Note: We don't merge the two calls to f_entropy() in order
|
||||||
|
* to avoid requesting too much entropy from f_entropy()
|
||||||
|
* at once. Specifically, if the underlying digest is not
|
||||||
|
* SHA-1, 3 / 2 * entropy_len is at least 36 Bytes, which
|
||||||
|
* is larger than the maximum of 32 Bytes that our own
|
||||||
|
* entropy source implementation can emit in a single
|
||||||
|
* call in configurations disabling SHA-512. */
|
||||||
|
if( ( ret = ctx->f_entropy( ctx->p_entropy,
|
||||||
|
seed + seedlen,
|
||||||
|
ctx->entropy_len / 2 ) ) != 0 )
|
||||||
|
{
|
||||||
|
return( MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED );
|
||||||
|
}
|
||||||
|
|
||||||
|
seedlen += ctx->entropy_len / 2;
|
||||||
|
}
|
||||||
|
|
||||||
seedlen = ctx->entropy_len;
|
|
||||||
|
|
||||||
/* 1. Concatenate entropy and additional data if any */
|
/* 1. Concatenate entropy and additional data if any */
|
||||||
if( additional != NULL && len != 0 )
|
if( additional != NULL && len != 0 )
|
||||||
|
@ -194,8 +229,20 @@ exit:
|
||||||
return( ret );
|
return( ret );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* HMAC_DRBG reseeding: 10.1.2.4 + 9.2
|
||||||
|
*/
|
||||||
|
int mbedtls_hmac_drbg_reseed( mbedtls_hmac_drbg_context *ctx,
|
||||||
|
const unsigned char *additional, size_t len )
|
||||||
|
{
|
||||||
|
return( hmac_drbg_reseed_core( ctx, additional, len, 0 ) );
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* HMAC_DRBG initialisation (10.1.2.3 + 9.1)
|
* HMAC_DRBG initialisation (10.1.2.3 + 9.1)
|
||||||
|
*
|
||||||
|
* The nonce is not passed as a separate parameter but extracted
|
||||||
|
* from the entropy source as suggested in 8.6.7.
|
||||||
*/
|
*/
|
||||||
int mbedtls_hmac_drbg_seed( mbedtls_hmac_drbg_context *ctx,
|
int mbedtls_hmac_drbg_seed( mbedtls_hmac_drbg_context *ctx,
|
||||||
const mbedtls_md_info_t * md_info,
|
const mbedtls_md_info_t * md_info,
|
||||||
|
@ -205,7 +252,7 @@ int mbedtls_hmac_drbg_seed( mbedtls_hmac_drbg_context *ctx,
|
||||||
size_t len )
|
size_t len )
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
size_t entropy_len, md_size;
|
size_t md_size;
|
||||||
|
|
||||||
if( ( ret = mbedtls_md_setup( &ctx->md_ctx, md_info, 1 ) ) != 0 )
|
if( ( ret = mbedtls_md_setup( &ctx->md_ctx, md_info, 1 ) ) != 0 )
|
||||||
return( ret );
|
return( ret );
|
||||||
|
@ -233,20 +280,15 @@ int mbedtls_hmac_drbg_seed( mbedtls_hmac_drbg_context *ctx,
|
||||||
*
|
*
|
||||||
* (This also matches the sizes used in the NIST test vectors.)
|
* (This also matches the sizes used in the NIST test vectors.)
|
||||||
*/
|
*/
|
||||||
entropy_len = md_size <= 20 ? 16 : /* 160-bits hash -> 128 bits */
|
ctx->entropy_len = md_size <= 20 ? 16 : /* 160-bits hash -> 128 bits */
|
||||||
md_size <= 28 ? 24 : /* 224-bits hash -> 192 bits */
|
md_size <= 28 ? 24 : /* 224-bits hash -> 192 bits */
|
||||||
32; /* better (256+) -> 256 bits */
|
32; /* better (256+) -> 256 bits */
|
||||||
|
|
||||||
/*
|
if( ( ret = hmac_drbg_reseed_core( ctx, custom, len,
|
||||||
* For initialisation, use more entropy to emulate a nonce
|
1 /* add nonce */ ) ) != 0 )
|
||||||
* (Again, matches test vectors.)
|
{
|
||||||
*/
|
|
||||||
ctx->entropy_len = entropy_len * 3 / 2;
|
|
||||||
|
|
||||||
if( ( ret = mbedtls_hmac_drbg_reseed( ctx, custom, len ) ) != 0 )
|
|
||||||
return( ret );
|
return( ret );
|
||||||
|
}
|
||||||
ctx->entropy_len = entropy_len;
|
|
||||||
|
|
||||||
return( 0 );
|
return( 0 );
|
||||||
}
|
}
|
||||||
|
|
|
@ -284,7 +284,7 @@ static int net_would_block( const mbedtls_net_context *ctx )
|
||||||
int err = errno;
|
int err = errno;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Never return 'WOULD BLOCK' on a non-blocking socket
|
* Never return 'WOULD BLOCK' on a blocking socket
|
||||||
*/
|
*/
|
||||||
if( ( fcntl( ctx->fd, F_GETFL ) & O_NONBLOCK ) != O_NONBLOCK )
|
if( ( fcntl( ctx->fd, F_GETFL ) & O_NONBLOCK ) != O_NONBLOCK )
|
||||||
{
|
{
|
||||||
|
|
|
@ -38,7 +38,9 @@
|
||||||
#include "mbedtls/rsa.h"
|
#include "mbedtls/rsa.h"
|
||||||
#endif
|
#endif
|
||||||
#if defined(MBEDTLS_ECP_C)
|
#if defined(MBEDTLS_ECP_C)
|
||||||
|
#include "mbedtls/bignum.h"
|
||||||
#include "mbedtls/ecp.h"
|
#include "mbedtls/ecp.h"
|
||||||
|
#include "mbedtls/platform_util.h"
|
||||||
#endif
|
#endif
|
||||||
#if defined(MBEDTLS_ECDSA_C)
|
#if defined(MBEDTLS_ECDSA_C)
|
||||||
#include "mbedtls/ecdsa.h"
|
#include "mbedtls/ecdsa.h"
|
||||||
|
@ -150,6 +152,26 @@ static int pk_write_ec_param( unsigned char **p, unsigned char *start,
|
||||||
|
|
||||||
return( (int) len );
|
return( (int) len );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* privateKey OCTET STRING -- always of length ceil(log2(n)/8)
|
||||||
|
*/
|
||||||
|
static int pk_write_ec_private( unsigned char **p, unsigned char *start,
|
||||||
|
mbedtls_ecp_keypair *ec )
|
||||||
|
{
|
||||||
|
int ret;
|
||||||
|
size_t byte_length = ( ec->grp.pbits + 7 ) / 8;
|
||||||
|
unsigned char tmp[MBEDTLS_ECP_MAX_BYTES];
|
||||||
|
|
||||||
|
ret = mbedtls_mpi_write_binary( &ec->d, tmp, byte_length );
|
||||||
|
if( ret != 0 )
|
||||||
|
goto exit;
|
||||||
|
ret = mbedtls_asn1_write_octet_string( p, start, tmp, byte_length );
|
||||||
|
|
||||||
|
exit:
|
||||||
|
mbedtls_platform_zeroize( tmp, byte_length );
|
||||||
|
return( ret );
|
||||||
|
}
|
||||||
#endif /* MBEDTLS_ECP_C */
|
#endif /* MBEDTLS_ECP_C */
|
||||||
|
|
||||||
int mbedtls_pk_write_pubkey( unsigned char **p, unsigned char *start,
|
int mbedtls_pk_write_pubkey( unsigned char **p, unsigned char *start,
|
||||||
|
@ -364,9 +386,8 @@ int mbedtls_pk_write_key_der( mbedtls_pk_context *key, unsigned char *buf, size_
|
||||||
MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | 0 ) );
|
MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | 0 ) );
|
||||||
len += par_len;
|
len += par_len;
|
||||||
|
|
||||||
/* privateKey: write as MPI then fix tag */
|
/* privateKey */
|
||||||
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_mpi( &c, buf, &ec->d ) );
|
MBEDTLS_ASN1_CHK_ADD( len, pk_write_ec_private( &c, buf, ec ) );
|
||||||
*c = MBEDTLS_ASN1_OCTET_STRING;
|
|
||||||
|
|
||||||
/* version */
|
/* version */
|
||||||
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_int( &c, buf, 1 ) );
|
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_int( &c, buf, 1 ) );
|
||||||
|
|
|
@ -72,7 +72,10 @@ static void * (* const volatile memset_func)( void *, int, size_t ) = memset;
|
||||||
|
|
||||||
void mbedtls_platform_zeroize( void *buf, size_t len )
|
void mbedtls_platform_zeroize( void *buf, size_t len )
|
||||||
{
|
{
|
||||||
memset_func( buf, 0, len );
|
MBEDTLS_INTERNAL_VALIDATE( len == 0 || buf != NULL );
|
||||||
|
|
||||||
|
if( len > 0 )
|
||||||
|
memset_func( buf, 0, len );
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_PLATFORM_ZEROIZE_ALT */
|
#endif /* MBEDTLS_PLATFORM_ZEROIZE_ALT */
|
||||||
|
|
||||||
|
|
|
@ -1449,7 +1449,7 @@ read_record_header:
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Minimal length (with everything empty and extensions ommitted) is
|
* Minimal length (with everything empty and extensions omitted) is
|
||||||
* 2 + 32 + 1 + 2 + 1 = 38 bytes. Check that first, so that we can
|
* 2 + 32 + 1 + 2 + 1 = 38 bytes. Check that first, so that we can
|
||||||
* read at least up to session id length without worrying.
|
* read at least up to session id length without worrying.
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -2606,7 +2606,7 @@ int mbedtls_ssl_fetch_input( mbedtls_ssl_context *ssl, size_t nb_want )
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* A record can't be split accross datagrams. If we need to read but
|
* A record can't be split across datagrams. If we need to read but
|
||||||
* are not at the beginning of a new record, the caller did something
|
* are not at the beginning of a new record, the caller did something
|
||||||
* wrong.
|
* wrong.
|
||||||
*/
|
*/
|
||||||
|
@ -9043,8 +9043,12 @@ static int ssl_preset_suiteb_hashes[] = {
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECP_C)
|
#if defined(MBEDTLS_ECP_C)
|
||||||
static mbedtls_ecp_group_id ssl_preset_suiteb_curves[] = {
|
static mbedtls_ecp_group_id ssl_preset_suiteb_curves[] = {
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
|
||||||
MBEDTLS_ECP_DP_SECP256R1,
|
MBEDTLS_ECP_DP_SECP256R1,
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
|
||||||
MBEDTLS_ECP_DP_SECP384R1,
|
MBEDTLS_ECP_DP_SECP384R1,
|
||||||
|
#endif
|
||||||
MBEDTLS_ECP_DP_NONE
|
MBEDTLS_ECP_DP_NONE
|
||||||
};
|
};
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -51,7 +51,6 @@
|
||||||
#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
|
#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
|
||||||
|
|
||||||
#include <windows.h>
|
#include <windows.h>
|
||||||
#include <winbase.h>
|
|
||||||
#include <process.h>
|
#include <process.h>
|
||||||
|
|
||||||
struct _hr_time
|
struct _hr_time
|
||||||
|
|
|
@ -87,6 +87,9 @@ static const char *features[] = {
|
||||||
#if defined(MBEDTLS_CHECK_PARAMS)
|
#if defined(MBEDTLS_CHECK_PARAMS)
|
||||||
"MBEDTLS_CHECK_PARAMS",
|
"MBEDTLS_CHECK_PARAMS",
|
||||||
#endif /* MBEDTLS_CHECK_PARAMS */
|
#endif /* MBEDTLS_CHECK_PARAMS */
|
||||||
|
#if defined(MBEDTLS_CHECK_PARAMS_ASSERT)
|
||||||
|
"MBEDTLS_CHECK_PARAMS_ASSERT",
|
||||||
|
#endif /* MBEDTLS_CHECK_PARAMS_ASSERT */
|
||||||
#if defined(MBEDTLS_TIMING_ALT)
|
#if defined(MBEDTLS_TIMING_ALT)
|
||||||
"MBEDTLS_TIMING_ALT",
|
"MBEDTLS_TIMING_ALT",
|
||||||
#endif /* MBEDTLS_TIMING_ALT */
|
#endif /* MBEDTLS_TIMING_ALT */
|
||||||
|
|
|
@ -123,7 +123,7 @@ int mbedtls_x509_get_alg_null( unsigned char **p, const unsigned char *end,
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Parse an algorithm identifier with (optional) paramaters
|
* Parse an algorithm identifier with (optional) parameters
|
||||||
*/
|
*/
|
||||||
int mbedtls_x509_get_alg( unsigned char **p, const unsigned char *end,
|
int mbedtls_x509_get_alg( unsigned char **p, const unsigned char *end,
|
||||||
mbedtls_x509_buf *alg, mbedtls_x509_buf *params )
|
mbedtls_x509_buf *alg, mbedtls_x509_buf *params )
|
||||||
|
|
|
@ -65,6 +65,19 @@
|
||||||
|
|
||||||
#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
|
#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
|
||||||
#include <windows.h>
|
#include <windows.h>
|
||||||
|
#if defined(_MSC_VER) && _MSC_VER <= 1600
|
||||||
|
/* Visual Studio 2010 and earlier issue a warning when both <stdint.h> and
|
||||||
|
* <intsafe.h> are included, as they redefine a number of <TYPE>_MAX constants.
|
||||||
|
* These constants are guaranteed to be the same, though, so we suppress the
|
||||||
|
* warning when including intsafe.h.
|
||||||
|
*/
|
||||||
|
#pragma warning( push )
|
||||||
|
#pragma warning( disable : 4005 )
|
||||||
|
#endif
|
||||||
|
#include <intsafe.h>
|
||||||
|
#if defined(_MSC_VER) && _MSC_VER <= 1600
|
||||||
|
#pragma warning( pop )
|
||||||
|
#endif
|
||||||
#else
|
#else
|
||||||
#include <time.h>
|
#include <time.h>
|
||||||
#endif
|
#endif
|
||||||
|
@ -1277,6 +1290,7 @@ int mbedtls_x509_crt_parse_path( mbedtls_x509_crt *chain, const char *path )
|
||||||
char filename[MAX_PATH];
|
char filename[MAX_PATH];
|
||||||
char *p;
|
char *p;
|
||||||
size_t len = strlen( path );
|
size_t len = strlen( path );
|
||||||
|
int lengthAsInt = 0;
|
||||||
|
|
||||||
WIN32_FIND_DATAW file_data;
|
WIN32_FIND_DATAW file_data;
|
||||||
HANDLE hFind;
|
HANDLE hFind;
|
||||||
|
@ -1291,7 +1305,18 @@ int mbedtls_x509_crt_parse_path( mbedtls_x509_crt *chain, const char *path )
|
||||||
p = filename + len;
|
p = filename + len;
|
||||||
filename[len++] = '*';
|
filename[len++] = '*';
|
||||||
|
|
||||||
w_ret = MultiByteToWideChar( CP_ACP, 0, filename, (int)len, szDir,
|
if ( FAILED ( SizeTToInt( len, &lengthAsInt ) ) )
|
||||||
|
return( MBEDTLS_ERR_X509_FILE_IO_ERROR );
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Note this function uses the code page CP_ACP, and assumes the incoming
|
||||||
|
* string is encoded in ANSI, before translating it into Unicode. If the
|
||||||
|
* incoming string were changed to be UTF-8, then the length check needs to
|
||||||
|
* change to check the number of characters, not the number of bytes, in the
|
||||||
|
* incoming string are less than MAX_PATH to avoid a buffer overrun with
|
||||||
|
* MultiByteToWideChar().
|
||||||
|
*/
|
||||||
|
w_ret = MultiByteToWideChar( CP_ACP, 0, filename, lengthAsInt, szDir,
|
||||||
MAX_PATH - 3 );
|
MAX_PATH - 3 );
|
||||||
if( w_ret == 0 )
|
if( w_ret == 0 )
|
||||||
return( MBEDTLS_ERR_X509_BAD_INPUT_DATA );
|
return( MBEDTLS_ERR_X509_BAD_INPUT_DATA );
|
||||||
|
@ -1308,8 +1333,11 @@ int mbedtls_x509_crt_parse_path( mbedtls_x509_crt *chain, const char *path )
|
||||||
if( file_data.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY )
|
if( file_data.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY )
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
|
if ( FAILED( SizeTToInt( wcslen( file_data.cFileName ), &lengthAsInt ) ) )
|
||||||
|
return( MBEDTLS_ERR_X509_FILE_IO_ERROR );
|
||||||
|
|
||||||
w_ret = WideCharToMultiByte( CP_ACP, 0, file_data.cFileName,
|
w_ret = WideCharToMultiByte( CP_ACP, 0, file_data.cFileName,
|
||||||
lstrlenW( file_data.cFileName ),
|
lengthAsInt,
|
||||||
p, (int) len - 1,
|
p, (int) len - 1,
|
||||||
NULL, NULL );
|
NULL, NULL );
|
||||||
if( w_ret == 0 )
|
if( w_ret == 0 )
|
||||||
|
@ -2087,15 +2115,13 @@ check_signature:
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
*r_parent = parent;
|
||||||
|
*r_signature_is_good = signature_is_good;
|
||||||
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
if( parent != NULL )
|
if( parent == NULL )
|
||||||
{
|
|
||||||
*r_parent = parent;
|
|
||||||
*r_signature_is_good = signature_is_good;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
{
|
||||||
*r_parent = fallback_parent;
|
*r_parent = fallback_parent;
|
||||||
*r_signature_is_good = fallback_signature_is_good;
|
*r_signature_is_good = fallback_signature_is_good;
|
||||||
|
@ -2236,7 +2262,7 @@ static int x509_crt_check_ee_locally_trusted(
|
||||||
* Tests for (aspects of) this function should include at least:
|
* Tests for (aspects of) this function should include at least:
|
||||||
* - trusted EE
|
* - trusted EE
|
||||||
* - EE -> trusted root
|
* - EE -> trusted root
|
||||||
* - EE -> intermedate CA -> trusted root
|
* - EE -> intermediate CA -> trusted root
|
||||||
* - if relevant: EE untrusted
|
* - if relevant: EE untrusted
|
||||||
* - if relevant: EE -> intermediate, untrusted
|
* - if relevant: EE -> intermediate, untrusted
|
||||||
* with the aspect under test checked at each relevant level (EE, int, root).
|
* with the aspect under test checked at each relevant level (EE, int, root).
|
||||||
|
|
|
@ -45,6 +45,16 @@
|
||||||
#include "mbedtls/pem.h"
|
#include "mbedtls/pem.h"
|
||||||
#endif /* MBEDTLS_PEM_WRITE_C */
|
#endif /* MBEDTLS_PEM_WRITE_C */
|
||||||
|
|
||||||
|
/*
|
||||||
|
* For the currently used signature algorithms the buffer to store any signature
|
||||||
|
* must be at least of size MAX(MBEDTLS_ECDSA_MAX_LEN, MBEDTLS_MPI_MAX_SIZE)
|
||||||
|
*/
|
||||||
|
#if MBEDTLS_ECDSA_MAX_LEN > MBEDTLS_MPI_MAX_SIZE
|
||||||
|
#define SIGNATURE_MAX_SIZE MBEDTLS_ECDSA_MAX_LEN
|
||||||
|
#else
|
||||||
|
#define SIGNATURE_MAX_SIZE MBEDTLS_MPI_MAX_SIZE
|
||||||
|
#endif
|
||||||
|
|
||||||
void mbedtls_x509write_crt_init( mbedtls_x509write_cert *ctx )
|
void mbedtls_x509write_crt_init( mbedtls_x509write_cert *ctx )
|
||||||
{
|
{
|
||||||
memset( ctx, 0, sizeof( mbedtls_x509write_cert ) );
|
memset( ctx, 0, sizeof( mbedtls_x509write_cert ) );
|
||||||
|
@ -334,7 +344,7 @@ int mbedtls_x509write_crt_der( mbedtls_x509write_cert *ctx, unsigned char *buf,
|
||||||
size_t sig_oid_len = 0;
|
size_t sig_oid_len = 0;
|
||||||
unsigned char *c, *c2;
|
unsigned char *c, *c2;
|
||||||
unsigned char hash[64];
|
unsigned char hash[64];
|
||||||
unsigned char sig[MBEDTLS_MPI_MAX_SIZE];
|
unsigned char sig[SIGNATURE_MAX_SIZE];
|
||||||
unsigned char tmp_buf[2048];
|
unsigned char tmp_buf[2048];
|
||||||
size_t sub_len = 0, pub_len = 0, sig_and_oid_len = 0, sig_len;
|
size_t sub_len = 0, pub_len = 0, sig_and_oid_len = 0, sig_len;
|
||||||
size_t len = 0;
|
size_t len = 0;
|
||||||
|
|
|
@ -44,6 +44,16 @@
|
||||||
#include "mbedtls/pem.h"
|
#include "mbedtls/pem.h"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* For the currently used signature algorithms the buffer to store any signature
|
||||||
|
* must be at least of size MAX(MBEDTLS_ECDSA_MAX_LEN, MBEDTLS_MPI_MAX_SIZE)
|
||||||
|
*/
|
||||||
|
#if MBEDTLS_ECDSA_MAX_LEN > MBEDTLS_MPI_MAX_SIZE
|
||||||
|
#define SIGNATURE_MAX_SIZE MBEDTLS_ECDSA_MAX_LEN
|
||||||
|
#else
|
||||||
|
#define SIGNATURE_MAX_SIZE MBEDTLS_MPI_MAX_SIZE
|
||||||
|
#endif
|
||||||
|
|
||||||
void mbedtls_x509write_csr_init( mbedtls_x509write_csr *ctx )
|
void mbedtls_x509write_csr_init( mbedtls_x509write_csr *ctx )
|
||||||
{
|
{
|
||||||
memset( ctx, 0, sizeof( mbedtls_x509write_csr ) );
|
memset( ctx, 0, sizeof( mbedtls_x509write_csr ) );
|
||||||
|
@ -159,7 +169,7 @@ int mbedtls_x509write_csr_der( mbedtls_x509write_csr *ctx, unsigned char *buf, s
|
||||||
size_t sig_oid_len = 0;
|
size_t sig_oid_len = 0;
|
||||||
unsigned char *c, *c2;
|
unsigned char *c, *c2;
|
||||||
unsigned char hash[64];
|
unsigned char hash[64];
|
||||||
unsigned char sig[MBEDTLS_MPI_MAX_SIZE];
|
unsigned char sig[SIGNATURE_MAX_SIZE];
|
||||||
unsigned char tmp_buf[2048];
|
unsigned char tmp_buf[2048];
|
||||||
size_t pub_len = 0, sig_and_oid_len = 0, sig_len;
|
size_t pub_len = 0, sig_and_oid_len = 0, sig_len;
|
||||||
size_t len = 0;
|
size_t len = 0;
|
||||||
|
|
Loading…
Reference in New Issue