diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2013-01-31 17:04:41 +0000 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2013-01-31 17:04:41 +0000 |
commit | 25c93fd2404741582815e097f1a1152442e826a3 (patch) | |
tree | c40d6594f893c9e156b5385f6e014111ed306af8 | |
parent | 428c1064c37d604bdb4cf10bfabf4994e0b5be30 (diff) | |
parent | 81ce0e14e72e8e255ad1bd9c7cfaa47a6291919c (diff) | |
download | openssl-new-25c93fd2404741582815e097f1a1152442e826a3.tar.gz |
Merge branch 'ben/timing-1.0.1' into OpenSSL_1_0_1-stable
-rw-r--r-- | ssl/s3_cbc.c | 51 | ||||
-rw-r--r-- | ssl/ssl_locl.h | 4 | ||||
-rw-r--r-- | ssl/t1_enc.c | 7 | ||||
-rwxr-xr-x | util/libeay.num | 1 |
4 files changed, 63 insertions, 0 deletions
diff --git a/ssl/s3_cbc.c b/ssl/s3_cbc.c index e9b112c1b5..c3305eac06 100644 --- a/ssl/s3_cbc.c +++ b/ssl/s3_cbc.c @@ -368,6 +368,10 @@ static void tls1_sha512_final_raw(void* ctx, unsigned char *md_out) * which ssl3_cbc_digest_record supports. */ char ssl3_cbc_record_digest_supported(const EVP_MD_CTX *ctx) { +#ifdef OPENSSL_FIPS + if (FIPS_mode()) + return 0; +#endif switch (ctx->digest->type) { case NID_md5: @@ -694,3 +698,50 @@ void ssl3_cbc_digest_record( *md_out_size = md_out_size_u; EVP_MD_CTX_cleanup(&md_ctx); } + +#ifndef OPENSSL_FIPS + +/* Due to the need to use EVP in FIPS mode we can't reimplement digests but + * we can ensure the number of blocks processed is equal for all cases + * by digesting additional data. + */ + +void tls_fips_digest_extra( + const EVP_CIPHER_CTX *cipher_ctx, EVP_MD_CTX *mac_ctx, + const unsigned char *data, size_t data_len, size_t orig_len) + { + size_t block_size, digest_pad, blocks_data, blocks_orig; + if (EVP_CIPHER_CTX_mode(cipher_ctx) != EVP_CIPH_CBC_MODE) + return; + block_size = EVP_MD_CTX_block_size(mac_ctx); + /* We are in FIPS mode if we get this far so we know we have only SHA* + * digests and TLS to deal with. + * Minimum digest padding length is 17 for SHA384/SHA512 and 9 + * otherwise. + * Additional header is 13 bytes. To get the number of digest blocks + * processed round up the amount of data plus padding to the nearest + * block length. Block length is 128 for SHA384/SHA512 and 64 otherwise. + * So we have: + * blocks = (payload_len + digest_pad + 13 + block_size - 1)/block_size + * equivalently: + * blocks = (payload_len + digest_pad + 12)/block_size + 1 + * HMAC adds a constant overhead. + * We're ultimately only interested in differences so this becomes + * blocks = (payload_len + 29)/128 + * for SHA384/SHA512 and + * blocks = (payload_len + 21)/64 + * otherwise. + */ + digest_pad = block_size == 64 ? 21 : 29; + blocks_orig = (orig_len + digest_pad)/block_size; + blocks_data = (data_len + digest_pad)/block_size; + /* MAC enough blocks to make up the difference between the original + * and actual lengths plus one extra block to ensure this is never a + * no op. The "data" pointer should always have enough space to + * perform this operation as it is large enough for a maximum + * length TLS buffer. + */ + EVP_DigestSignUpdate(mac_ctx, data, + (blocks_orig - blocks_data + 1) * block_size); + } +#endif diff --git a/ssl/ssl_locl.h b/ssl/ssl_locl.h index dd8388cace..e9430cd3db 100644 --- a/ssl/ssl_locl.h +++ b/ssl/ssl_locl.h @@ -1167,4 +1167,8 @@ void ssl3_cbc_digest_record( unsigned mac_secret_length, char is_sslv3); +void tls_fips_digest_extra( + const EVP_CIPHER_CTX *cipher_ctx, EVP_MD_CTX *mac_ctx, + const unsigned char *data, size_t data_len, size_t orig_len); + #endif diff --git a/ssl/t1_enc.c b/ssl/t1_enc.c index bb46f7f9ba..6fbe2c33aa 100644 --- a/ssl/t1_enc.c +++ b/ssl/t1_enc.c @@ -1025,6 +1025,13 @@ int tls1_mac(SSL *ssl, unsigned char *md, int send) EVP_DigestSignUpdate(mac_ctx,rec->input,rec->length); t=EVP_DigestSignFinal(mac_ctx,md,&md_size); OPENSSL_assert(t > 0); +#ifdef OPENSSL_FIPS + if (!send && FIPS_mode()) + tls_fips_digest_extra( + ssl->enc_read_ctx, + mac_ctx, rec->input, + rec->length, rec->orig_len); +#endif } if (!stream_mac) diff --git a/util/libeay.num b/util/libeay.num index 246469005a..6debdb60a8 100755 --- a/util/libeay.num +++ b/util/libeay.num @@ -3510,6 +3510,7 @@ BIO_get_callback_arg 3902 EXIST::FUNCTION: BIO_set_callback 3903 EXIST::FUNCTION: d2i_ASIdOrRange 3904 EXIST::FUNCTION:RFC3779 i2d_ASIdentifiers 3905 EXIST::FUNCTION:RFC3779 +CRYPTO_memcmp 3906 EXIST::FUNCTION: SEED_decrypt 3908 EXIST::FUNCTION:SEED SEED_encrypt 3909 EXIST::FUNCTION:SEED SEED_cbc_encrypt 3910 EXIST::FUNCTION:SEED |