diff options
author | Brian Smith <brian@briansmith.org> | 2016-07-26 05:01:10 +0300 |
---|---|---|
committer | CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> | 2016-07-27 20:19:11 +0300 |
commit | 7241ca5ce4012f0d556ef242131d215ea8d3b238 (patch) | |
tree | 84e685e5f2df8e295b13ed443df7254abecc8321 /crypto | |
parent | 289c843a9a2d382f8f661a065474b3b78bc05ff0 (diff) |
Avoid one |BN_mod_inverse| in |RSA_check_key|.
|BN_mod_inverse| is expensive and leaky. In this case, we can avoid
it completely by taking advantage of the fact that we already have
the two values that are supposed to be inverses of each other.
Change-Id: I2230b4166fb9d89c7445f9f7c045a4c9e4c377b3
Reviewed-on: https://boringssl-review.googlesource.com/8925
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/rsa/rsa.c | 11 |
1 files changed, 6 insertions, 5 deletions
diff --git a/crypto/rsa/rsa.c b/crypto/rsa/rsa.c index e5f98916..8aa9adc7 100644 --- a/crypto/rsa/rsa.c +++ b/crypto/rsa/rsa.c @@ -517,7 +517,7 @@ static void bn_free_and_null(BIGNUM **bn) { } int RSA_check_key(const RSA *key) { - BIGNUM n, pm1, qm1, lcm, gcd, de, dmp1, dmq1, iqmp; + BIGNUM n, pm1, qm1, lcm, gcd, de, dmp1, dmq1, iqmp_times_q; BN_CTX *ctx; int ok = 0, has_crt_values; @@ -556,7 +556,7 @@ int RSA_check_key(const RSA *key) { BN_init(&de); BN_init(&dmp1); BN_init(&dmq1); - BN_init(&iqmp); + BN_init(&iqmp_times_q); if (!BN_mul(&n, key->p, key->q, ctx) || /* lcm = lcm(prime-1, for all primes) */ @@ -617,14 +617,15 @@ int RSA_check_key(const RSA *key) { /* dmq1 = d mod (q-1) */ !BN_mod(&dmq1, key->d, &qm1, ctx) || /* iqmp = q^-1 mod p */ - !BN_mod_inverse(&iqmp, key->q, key->p, ctx)) { + !BN_mod_mul(&iqmp_times_q, key->iqmp, key->q, key->p, ctx)) { OPENSSL_PUT_ERROR(RSA, ERR_LIB_BN); goto out; } if (BN_cmp(&dmp1, key->dmp1) != 0 || BN_cmp(&dmq1, key->dmq1) != 0 || - BN_cmp(&iqmp, key->iqmp) != 0) { + BN_cmp(key->iqmp, key->p) >= 0 || + !BN_is_one(&iqmp_times_q)) { OPENSSL_PUT_ERROR(RSA, RSA_R_CRT_VALUES_INCORRECT); goto out; } @@ -641,7 +642,7 @@ out: BN_free(&de); BN_free(&dmp1); BN_free(&dmq1); - BN_free(&iqmp); + BN_free(&iqmp_times_q); BN_CTX_free(ctx); return ok; |