Print this page
first pass
*** 313,329 ****
crypto_data_t *, crypto_data_t *);
static int rsa_verify_common(rsa_mech_type_t, crypto_key_t *,
crypto_data_t *, crypto_data_t *);
static int compare_data(crypto_data_t *, uchar_t *);
- /* EXPORT DELETE START */
-
static int core_rsa_encrypt(crypto_key_t *, uchar_t *, int, uchar_t *, int);
static int core_rsa_decrypt(crypto_key_t *, uchar_t *, int, uchar_t *);
- /* EXPORT DELETE END */
-
static crypto_kcf_provider_handle_t rsa_prov_handle = NULL;
int
_init(void)
{
--- 313,325 ----
*** 371,382 ****
static int
check_mech_and_key(crypto_mechanism_t *mechanism, crypto_key_t *key)
{
int rv = CRYPTO_FAILED;
- /* EXPORT DELETE START */
-
uchar_t *modulus;
ssize_t modulus_len; /* In bytes */
if (!RSA_VALID_MECH(mechanism))
return (CRYPTO_MECHANISM_INVALID);
--- 367,376 ----
*** 395,406 ****
}
if (modulus_len < MIN_RSA_KEYLENGTH_IN_BYTES ||
modulus_len > MAX_RSA_KEYLENGTH_IN_BYTES)
return (CRYPTO_KEY_SIZE_RANGE);
- /* EXPORT DELETE END */
-
return (rv);
}
void
kmemset(uint8_t *buf, char pattern, size_t len)
--- 389,398 ----
*** 596,607 ****
rsa_encrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key,
crypto_data_t *plaintext, crypto_data_t *ciphertext)
{
int rv = CRYPTO_FAILED;
- /* EXPORT DELETE START */
-
int plen;
uchar_t *ptptr;
uchar_t *modulus;
ssize_t modulus_len;
uchar_t tmp_data[MAX_RSA_KEYLENGTH_IN_BYTES];
--- 588,597 ----
*** 654,670 ****
return (rv);
ciphertext->cd_length = modulus_len;
}
- /* EXPORT DELETE END */
-
return (rv);
}
- /* EXPORT DELETE START */
-
static int
core_rsa_encrypt(crypto_key_t *key, uchar_t *in,
int in_len, uchar_t *out, int is_public)
{
int rv;
--- 644,656 ----
*** 702,713 ****
rv = rsa_encrypt(&k, in, in_len, out);
return (rv);
}
- /* EXPORT DELETE END */
-
/* ARGSUSED */
static int
rsaprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
crypto_data_t *plaintext, crypto_req_handle_t req)
{
--- 688,697 ----
*** 750,761 ****
rsa_decrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key,
crypto_data_t *ciphertext, crypto_data_t *plaintext)
{
int rv = CRYPTO_FAILED;
- /* EXPORT DELETE START */
-
size_t plain_len;
uchar_t *ctptr;
uchar_t *modulus;
ssize_t modulus_len;
uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
--- 734,743 ----
*** 800,816 ****
return (rv);
plaintext->cd_length = plain_len;
}
- /* EXPORT DELETE END */
-
return (rv);
}
- /* EXPORT DELETE START */
-
static int
core_rsa_decrypt(crypto_key_t *key, uchar_t *in, int in_len, uchar_t *out)
{
int rv;
uchar_t *modulus, *prime1, *prime2, *expo1, *expo2, *coef;
--- 782,794 ----
*** 861,872 ****
rv = rsa_decrypt(&k, in, in_len, out);
return (rv);
}
- /* EXPORT DELETE END */
-
/* ARGSUSED */
static int
rsa_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
crypto_key_t *key, crypto_spi_ctx_template_t ctx_template,
crypto_req_handle_t req)
--- 839,848 ----
*** 959,970 ****
rsa_digest_svrfy_common(digest_rsa_ctx_t *ctxp, crypto_data_t *data,
crypto_data_t *signature, uchar_t flag)
{
int rv = CRYPTO_FAILED;
- /* EXPORT DELETE START */
-
uchar_t digest[SHA512_DIGEST_LENGTH];
/* The der_data size is enough for MD5 also */
uchar_t der_data[SHA512_DIGEST_LENGTH + SHA2_DER_PREFIX_Len];
ulong_t der_data_len;
crypto_data_t der_cd;
--- 935,944 ----
*** 1066,1088 ****
signature);
else
rv = rsa_verify_common(mech_type, ctxp->key, &der_cd,
signature);
- /* EXPORT DELETE END */
-
return (rv);
}
static int
rsa_sign_common(rsa_mech_type_t mech_type, crypto_key_t *key,
crypto_data_t *data, crypto_data_t *signature)
{
int rv = CRYPTO_FAILED;
- /* EXPORT DELETE START */
-
int dlen;
uchar_t *dataptr, *modulus;
ssize_t modulus_len;
uchar_t tmp_data[MAX_RSA_KEYLENGTH_IN_BYTES];
uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
--- 1040,1058 ----
*** 1147,1158 ****
return (rv);
signature->cd_length = modulus_len;
}
- /* EXPORT DELETE END */
-
return (rv);
}
/* ARGSUSED */
static int
--- 1117,1126 ----
*** 1295,1306 ****
rsa_verify_common(rsa_mech_type_t mech_type, crypto_key_t *key,
crypto_data_t *data, crypto_data_t *signature)
{
int rv = CRYPTO_FAILED;
- /* EXPORT DELETE START */
-
uchar_t *sigptr, *modulus;
ssize_t modulus_len;
uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
uchar_t tmp_data[MAX_RSA_KEYLENGTH_IN_BYTES];
--- 1263,1272 ----
*** 1344,1355 ****
if (compare_data(data, (plain_data + modulus_len
- data_len)) != 0)
rv = CRYPTO_SIGNATURE_INVALID;
}
- /* EXPORT DELETE END */
-
return (rv);
}
/* ARGSUSED */
static int
--- 1310,1319 ----
*** 1501,1512 ****
rsa_verify_recover_common(rsa_mech_type_t mech_type, crypto_key_t *key,
crypto_data_t *signature, crypto_data_t *data)
{
int rv = CRYPTO_FAILED;
- /* EXPORT DELETE START */
-
size_t data_len;
uchar_t *sigptr, *modulus;
ssize_t modulus_len;
uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
uchar_t tmp_data[MAX_RSA_KEYLENGTH_IN_BYTES];
--- 1465,1474 ----
*** 1549,1560 ****
if ((rv = crypto_put_output_data(plain_data + modulus_len - data_len,
data, data_len)) != CRYPTO_SUCCESS)
return (rv);
data->cd_length = data_len;
- /* EXPORT DELETE END */
-
return (rv);
}
/* ARGSUSED */
static int
--- 1511,1520 ----