2016-05-17 21:38:18 +00:00
|
|
|
/*
|
2016-05-23 19:02:34 +00:00
|
|
|
* Generated by util/mkerr.pl DO NOT EDIT
|
2016-05-17 21:38:18 +00:00
|
|
|
* Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
|
1999-04-24 00:15:18 +00:00
|
|
|
*
|
2016-05-17 21:38:18 +00:00
|
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
1998-12-21 10:52:47 +00:00
|
|
|
*/
|
1999-04-24 00:15:18 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
#include <stdio.h>
|
1999-04-23 22:13:45 +00:00
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/rsa.h>
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
/* BEGIN ERROR CODES */
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_ERR
|
2005-04-12 16:15:22 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
# define ERR_FUNC(func) ERR_PACK(ERR_LIB_RSA,func,0)
|
|
|
|
# define ERR_REASON(reason) ERR_PACK(ERR_LIB_RSA,0,reason)
|
2005-04-12 16:15:22 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
static ERR_STRING_DATA RSA_str_functs[] = {
|
2015-11-03 14:09:18 +00:00
|
|
|
{ERR_FUNC(RSA_F_CHECK_PADDING_MD), "check_padding_md"},
|
Implement RSASSA-PKCS1-v1_5 as specified.
RFC 3447, section 8.2.2, steps 3 and 4 states that verifiers must encode
the DigestInfo struct and then compare the result against the public key
operation result. This implies that one and only one encoding is legal.
OpenSSL instead parses with crypto/asn1, then checks that the encoding
round-trips, and allows some variations for the parameter. Sufficient
laxness in this area can allow signature forgeries, as described in
https://www.imperialviolet.org/2014/09/26/pkcs1.html
Although there aren't known attacks against OpenSSL's current scheme,
this change makes OpenSSL implement the algorithm as specified. This
avoids the uncertainty and, more importantly, helps grow a healthy
ecosystem. Laxness beyond the spec, particularly in implementations
which enjoy wide use, risks harm to the ecosystem for all. A signature
producer which only tests against OpenSSL may not notice bugs and
accidentally become widely deployed. Thus implementations have a
responsibility to honor the specification as tightly as is practical.
In some cases, the damage is permanent and the spec deviation and
security risk becomes a tax all implementors must forever pay, but not
here. Both BoringSSL and Go successfully implemented and deployed
RSASSA-PKCS1-v1_5 as specified since their respective beginnings, so
this change should be compatible enough to pin down in future OpenSSL
releases.
See also https://tools.ietf.org/html/draft-thomson-postel-was-wrong-00
As a bonus, by not having to deal with sign/verify differences, this
version is also somewhat clearer. It also more consistently enforces
digest lengths in the verify_recover codepath. The NID_md5_sha1 codepath
wasn't quite doing this right.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Rich Salz <rsalz@openssl.org>
GH: #1474
2016-08-20 17:35:17 +00:00
|
|
|
{ERR_FUNC(RSA_F_ENCODE_PKCS1), "encode_pkcs1"},
|
2015-11-03 14:09:18 +00:00
|
|
|
{ERR_FUNC(RSA_F_INT_RSA_VERIFY), "int_rsa_verify"},
|
|
|
|
{ERR_FUNC(RSA_F_OLD_RSA_PRIV_DECODE), "old_rsa_priv_decode"},
|
|
|
|
{ERR_FUNC(RSA_F_PKEY_RSA_CTRL), "pkey_rsa_ctrl"},
|
|
|
|
{ERR_FUNC(RSA_F_PKEY_RSA_CTRL_STR), "pkey_rsa_ctrl_str"},
|
|
|
|
{ERR_FUNC(RSA_F_PKEY_RSA_SIGN), "pkey_rsa_sign"},
|
2016-12-08 12:16:02 +00:00
|
|
|
{ERR_FUNC(RSA_F_PKEY_RSA_VERIFY), "pkey_rsa_verify"},
|
2015-11-03 14:09:18 +00:00
|
|
|
{ERR_FUNC(RSA_F_PKEY_RSA_VERIFYRECOVER), "pkey_rsa_verifyrecover"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_ALGOR_TO_MD), "rsa_algor_to_md"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_BUILTIN_KEYGEN), "rsa_builtin_keygen"},
|
2015-01-22 03:40:55 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_CHECK_KEY), "RSA_check_key"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_CHECK_KEY_EX), "RSA_check_key_ex"},
|
2015-11-03 14:09:18 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_CMS_DECRYPT), "rsa_cms_decrypt"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_ITEM_VERIFY), "rsa_item_verify"},
|
2016-05-17 14:08:43 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_METH_DUP), "RSA_meth_dup"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_METH_NEW), "RSA_meth_new"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_METH_SET1_NAME), "RSA_meth_set1_name"},
|
2015-11-03 14:09:18 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_MGF1_TO_MD), "rsa_mgf1_to_md"},
|
2015-01-22 03:40:55 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_NEW_METHOD), "RSA_new_method"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_NULL), "RSA_NULL"},
|
2015-11-03 14:09:18 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_NULL_PRIVATE_DECRYPT), "RSA_null_private_decrypt"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_NULL_PRIVATE_ENCRYPT), "RSA_null_private_encrypt"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_NULL_PUBLIC_DECRYPT), "RSA_null_public_decrypt"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_NULL_PUBLIC_ENCRYPT), "RSA_null_public_encrypt"},
|
2016-05-17 14:08:43 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_OSSL_PRIVATE_DECRYPT), "rsa_ossl_private_decrypt"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT), "rsa_ossl_private_encrypt"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_OSSL_PUBLIC_DECRYPT), "rsa_ossl_public_decrypt"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_OSSL_PUBLIC_ENCRYPT), "rsa_ossl_public_encrypt"},
|
2015-01-22 03:40:55 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_NONE), "RSA_padding_add_none"},
|
2016-05-23 19:02:34 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_OAEP),
|
|
|
|
"RSA_padding_add_PKCS1_OAEP"},
|
2015-01-22 03:40:55 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_OAEP_MGF1),
|
|
|
|
"RSA_padding_add_PKCS1_OAEP_mgf1"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_PSS), "RSA_padding_add_PKCS1_PSS"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1),
|
|
|
|
"RSA_padding_add_PKCS1_PSS_mgf1"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1),
|
|
|
|
"RSA_padding_add_PKCS1_type_1"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2),
|
|
|
|
"RSA_padding_add_PKCS1_type_2"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_SSLV23), "RSA_padding_add_SSLv23"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_ADD_X931), "RSA_padding_add_X931"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_CHECK_NONE), "RSA_padding_check_none"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP),
|
|
|
|
"RSA_padding_check_PKCS1_OAEP"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP_MGF1),
|
|
|
|
"RSA_padding_check_PKCS1_OAEP_mgf1"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1),
|
|
|
|
"RSA_padding_check_PKCS1_type_1"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2),
|
|
|
|
"RSA_padding_check_PKCS1_type_2"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_CHECK_SSLV23), "RSA_padding_check_SSLv23"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PADDING_CHECK_X931), "RSA_padding_check_X931"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PRINT), "RSA_print"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PRINT_FP), "RSA_print_fp"},
|
2015-11-03 14:09:18 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_PRIV_ENCODE), "rsa_priv_encode"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PSS_TO_CTX), "rsa_pss_to_ctx"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_PUB_DECODE), "rsa_pub_decode"},
|
2015-01-22 03:40:55 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_SETUP_BLINDING), "RSA_setup_blinding"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_SIGN), "RSA_sign"},
|
2016-05-23 19:02:34 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_SIGN_ASN1_OCTET_STRING),
|
|
|
|
"RSA_sign_ASN1_OCTET_STRING"},
|
2015-01-22 03:40:55 +00:00
|
|
|
{ERR_FUNC(RSA_F_RSA_VERIFY), "RSA_verify"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_VERIFY_ASN1_OCTET_STRING),
|
|
|
|
"RSA_verify_ASN1_OCTET_STRING"},
|
|
|
|
{ERR_FUNC(RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1), "RSA_verify_PKCS1_PSS_mgf1"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
static ERR_STRING_DATA RSA_str_reasons[] = {
|
|
|
|
{ERR_REASON(RSA_R_ALGORITHM_MISMATCH), "algorithm mismatch"},
|
|
|
|
{ERR_REASON(RSA_R_BAD_E_VALUE), "bad e value"},
|
|
|
|
{ERR_REASON(RSA_R_BAD_FIXED_HEADER_DECRYPT), "bad fixed header decrypt"},
|
|
|
|
{ERR_REASON(RSA_R_BAD_PAD_BYTE_COUNT), "bad pad byte count"},
|
|
|
|
{ERR_REASON(RSA_R_BAD_SIGNATURE), "bad signature"},
|
|
|
|
{ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_01), "block type is not 01"},
|
|
|
|
{ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_02), "block type is not 02"},
|
2016-05-23 19:02:34 +00:00
|
|
|
{ERR_REASON(RSA_R_DATA_GREATER_THAN_MOD_LEN),
|
|
|
|
"data greater than mod len"},
|
2015-01-22 03:40:55 +00:00
|
|
|
{ERR_REASON(RSA_R_DATA_TOO_LARGE), "data too large"},
|
|
|
|
{ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),
|
|
|
|
"data too large for key size"},
|
|
|
|
{ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_MODULUS),
|
|
|
|
"data too large for modulus"},
|
|
|
|
{ERR_REASON(RSA_R_DATA_TOO_SMALL), "data too small"},
|
|
|
|
{ERR_REASON(RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE),
|
|
|
|
"data too small for key size"},
|
|
|
|
{ERR_REASON(RSA_R_DIGEST_DOES_NOT_MATCH), "digest does not match"},
|
|
|
|
{ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY),
|
|
|
|
"digest too big for rsa key"},
|
|
|
|
{ERR_REASON(RSA_R_DMP1_NOT_CONGRUENT_TO_D), "dmp1 not congruent to d"},
|
|
|
|
{ERR_REASON(RSA_R_DMQ1_NOT_CONGRUENT_TO_D), "dmq1 not congruent to d"},
|
|
|
|
{ERR_REASON(RSA_R_D_E_NOT_CONGRUENT_TO_1), "d e not congruent to 1"},
|
|
|
|
{ERR_REASON(RSA_R_FIRST_OCTET_INVALID), "first octet invalid"},
|
|
|
|
{ERR_REASON(RSA_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE),
|
|
|
|
"illegal or unsupported padding mode"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_DIGEST), "invalid digest"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_DIGEST_LENGTH), "invalid digest length"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_HEADER), "invalid header"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_LABEL), "invalid label"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_MESSAGE_LENGTH), "invalid message length"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_MGF1_MD), "invalid mgf1 md"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_OAEP_PARAMETERS), "invalid oaep parameters"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_PADDING), "invalid padding"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_PADDING_MODE), "invalid padding mode"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_PSS_PARAMETERS), "invalid pss parameters"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_PSS_SALTLEN), "invalid pss saltlen"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_SALT_LENGTH), "invalid salt length"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_TRAILER), "invalid trailer"},
|
|
|
|
{ERR_REASON(RSA_R_INVALID_X931_DIGEST), "invalid x931 digest"},
|
|
|
|
{ERR_REASON(RSA_R_IQMP_NOT_INVERSE_OF_Q), "iqmp not inverse of q"},
|
|
|
|
{ERR_REASON(RSA_R_KEY_SIZE_TOO_SMALL), "key size too small"},
|
|
|
|
{ERR_REASON(RSA_R_LAST_OCTET_INVALID), "last octet invalid"},
|
|
|
|
{ERR_REASON(RSA_R_MODULUS_TOO_LARGE), "modulus too large"},
|
|
|
|
{ERR_REASON(RSA_R_NO_PUBLIC_EXPONENT), "no public exponent"},
|
2016-05-23 19:02:34 +00:00
|
|
|
{ERR_REASON(RSA_R_NULL_BEFORE_BLOCK_MISSING),
|
|
|
|
"null before block missing"},
|
2015-01-22 03:40:55 +00:00
|
|
|
{ERR_REASON(RSA_R_N_DOES_NOT_EQUAL_P_Q), "n does not equal p q"},
|
|
|
|
{ERR_REASON(RSA_R_OAEP_DECODING_ERROR), "oaep decoding error"},
|
|
|
|
{ERR_REASON(RSA_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE),
|
|
|
|
"operation not supported for this keytype"},
|
|
|
|
{ERR_REASON(RSA_R_PADDING_CHECK_FAILED), "padding check failed"},
|
|
|
|
{ERR_REASON(RSA_R_PKCS_DECODING_ERROR), "pkcs decoding error"},
|
|
|
|
{ERR_REASON(RSA_R_P_NOT_PRIME), "p not prime"},
|
|
|
|
{ERR_REASON(RSA_R_Q_NOT_PRIME), "q not prime"},
|
|
|
|
{ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),
|
|
|
|
"rsa operations not supported"},
|
|
|
|
{ERR_REASON(RSA_R_SLEN_CHECK_FAILED), "salt length check failed"},
|
|
|
|
{ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED), "salt length recovery failed"},
|
|
|
|
{ERR_REASON(RSA_R_SSLV3_ROLLBACK_ATTACK), "sslv3 rollback attack"},
|
|
|
|
{ERR_REASON(RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD),
|
|
|
|
"the asn1 object identifier is not known for this md"},
|
|
|
|
{ERR_REASON(RSA_R_UNKNOWN_ALGORITHM_TYPE), "unknown algorithm type"},
|
|
|
|
{ERR_REASON(RSA_R_UNKNOWN_DIGEST), "unknown digest"},
|
|
|
|
{ERR_REASON(RSA_R_UNKNOWN_MASK_DIGEST), "unknown mask digest"},
|
|
|
|
{ERR_REASON(RSA_R_UNKNOWN_PADDING_TYPE), "unknown padding type"},
|
|
|
|
{ERR_REASON(RSA_R_UNSUPPORTED_ENCRYPTION_TYPE),
|
|
|
|
"unsupported encryption type"},
|
|
|
|
{ERR_REASON(RSA_R_UNSUPPORTED_LABEL_SOURCE), "unsupported label source"},
|
|
|
|
{ERR_REASON(RSA_R_UNSUPPORTED_MASK_ALGORITHM),
|
|
|
|
"unsupported mask algorithm"},
|
|
|
|
{ERR_REASON(RSA_R_UNSUPPORTED_MASK_PARAMETER),
|
|
|
|
"unsupported mask parameter"},
|
|
|
|
{ERR_REASON(RSA_R_UNSUPPORTED_SIGNATURE_TYPE),
|
|
|
|
"unsupported signature type"},
|
|
|
|
{ERR_REASON(RSA_R_VALUE_MISSING), "value missing"},
|
|
|
|
{ERR_REASON(RSA_R_WRONG_SIGNATURE_LENGTH), "wrong signature length"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1998-12-21 10:56:39 +00:00
|
|
|
#endif
|
|
|
|
|
2016-07-12 13:50:06 +00:00
|
|
|
int ERR_load_RSA_strings(void)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2006-11-21 21:29:44 +00:00
|
|
|
#ifndef OPENSSL_NO_ERR
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
if (ERR_func_error_string(RSA_str_functs[0].error) == NULL) {
|
|
|
|
ERR_load_strings(0, RSA_str_functs);
|
|
|
|
ERR_load_strings(0, RSA_str_reasons);
|
|
|
|
}
|
2006-11-21 21:29:44 +00:00
|
|
|
#endif
|
2016-07-12 13:50:06 +00:00
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|