Print this page
first pass

*** 313,329 **** crypto_data_t *, crypto_data_t *); static int rsa_verify_common(rsa_mech_type_t, crypto_key_t *, crypto_data_t *, crypto_data_t *); static int compare_data(crypto_data_t *, uchar_t *); - /* EXPORT DELETE START */ - static int core_rsa_encrypt(crypto_key_t *, uchar_t *, int, uchar_t *, int); static int core_rsa_decrypt(crypto_key_t *, uchar_t *, int, uchar_t *); - /* EXPORT DELETE END */ - static crypto_kcf_provider_handle_t rsa_prov_handle = NULL; int _init(void) { --- 313,325 ----
*** 371,382 **** static int check_mech_and_key(crypto_mechanism_t *mechanism, crypto_key_t *key) { int rv = CRYPTO_FAILED; - /* EXPORT DELETE START */ - uchar_t *modulus; ssize_t modulus_len; /* In bytes */ if (!RSA_VALID_MECH(mechanism)) return (CRYPTO_MECHANISM_INVALID); --- 367,376 ----
*** 395,406 **** } if (modulus_len < MIN_RSA_KEYLENGTH_IN_BYTES || modulus_len > MAX_RSA_KEYLENGTH_IN_BYTES) return (CRYPTO_KEY_SIZE_RANGE); - /* EXPORT DELETE END */ - return (rv); } void kmemset(uint8_t *buf, char pattern, size_t len) --- 389,398 ----
*** 596,607 **** rsa_encrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext) { int rv = CRYPTO_FAILED; - /* EXPORT DELETE START */ - int plen; uchar_t *ptptr; uchar_t *modulus; ssize_t modulus_len; uchar_t tmp_data[MAX_RSA_KEYLENGTH_IN_BYTES]; --- 588,597 ----
*** 654,670 **** return (rv); ciphertext->cd_length = modulus_len; } - /* EXPORT DELETE END */ - return (rv); } - /* EXPORT DELETE START */ - static int core_rsa_encrypt(crypto_key_t *key, uchar_t *in, int in_len, uchar_t *out, int is_public) { int rv; --- 644,656 ----
*** 702,713 **** rv = rsa_encrypt(&k, in, in_len, out); return (rv); } - /* EXPORT DELETE END */ - /* ARGSUSED */ static int rsaprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) { --- 688,697 ----
*** 750,761 **** rsa_decrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext) { int rv = CRYPTO_FAILED; - /* EXPORT DELETE START */ - size_t plain_len; uchar_t *ctptr; uchar_t *modulus; ssize_t modulus_len; uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES]; --- 734,743 ----
*** 800,816 **** return (rv); plaintext->cd_length = plain_len; } - /* EXPORT DELETE END */ - return (rv); } - /* EXPORT DELETE START */ - static int core_rsa_decrypt(crypto_key_t *key, uchar_t *in, int in_len, uchar_t *out) { int rv; uchar_t *modulus, *prime1, *prime2, *expo1, *expo2, *coef; --- 782,794 ----
*** 861,872 **** rv = rsa_decrypt(&k, in, in_len, out); return (rv); } - /* EXPORT DELETE END */ - /* ARGSUSED */ static int rsa_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) --- 839,848 ----
*** 959,970 **** rsa_digest_svrfy_common(digest_rsa_ctx_t *ctxp, crypto_data_t *data, crypto_data_t *signature, uchar_t flag) { int rv = CRYPTO_FAILED; - /* EXPORT DELETE START */ - uchar_t digest[SHA512_DIGEST_LENGTH]; /* The der_data size is enough for MD5 also */ uchar_t der_data[SHA512_DIGEST_LENGTH + SHA2_DER_PREFIX_Len]; ulong_t der_data_len; crypto_data_t der_cd; --- 935,944 ----
*** 1066,1088 **** signature); else rv = rsa_verify_common(mech_type, ctxp->key, &der_cd, signature); - /* EXPORT DELETE END */ - return (rv); } static int rsa_sign_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature) { int rv = CRYPTO_FAILED; - /* EXPORT DELETE START */ - int dlen; uchar_t *dataptr, *modulus; ssize_t modulus_len; uchar_t tmp_data[MAX_RSA_KEYLENGTH_IN_BYTES]; uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES]; --- 1040,1058 ----
*** 1147,1158 **** return (rv); signature->cd_length = modulus_len; } - /* EXPORT DELETE END */ - return (rv); } /* ARGSUSED */ static int --- 1117,1126 ----
*** 1295,1306 **** rsa_verify_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature) { int rv = CRYPTO_FAILED; - /* EXPORT DELETE START */ - uchar_t *sigptr, *modulus; ssize_t modulus_len; uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES]; uchar_t tmp_data[MAX_RSA_KEYLENGTH_IN_BYTES]; --- 1263,1272 ----
*** 1344,1355 **** if (compare_data(data, (plain_data + modulus_len - data_len)) != 0) rv = CRYPTO_SIGNATURE_INVALID; } - /* EXPORT DELETE END */ - return (rv); } /* ARGSUSED */ static int --- 1310,1319 ----
*** 1501,1512 **** rsa_verify_recover_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data) { int rv = CRYPTO_FAILED; - /* EXPORT DELETE START */ - size_t data_len; uchar_t *sigptr, *modulus; ssize_t modulus_len; uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES]; uchar_t tmp_data[MAX_RSA_KEYLENGTH_IN_BYTES]; --- 1465,1474 ----
*** 1549,1560 **** if ((rv = crypto_put_output_data(plain_data + modulus_len - data_len, data, data_len)) != CRYPTO_SUCCESS) return (rv); data->cd_length = data_len; - /* EXPORT DELETE END */ - return (rv); } /* ARGSUSED */ static int --- 1511,1520 ----