Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
126fe085
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
126fe085
编写于
12月 19, 2000
作者:
B
Bodo Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Don't hold CRYPTO_LOCK_RSA during time-consuming operations.
上级
123d24d6
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
70 addition
and
61 deletion
+70
-61
CHANGES
CHANGES
+3
-3
crypto/rsa/rsa_eay.c
crypto/rsa/rsa_eay.c
+67
-58
未找到文件。
CHANGES
浏览文件 @
126fe085
...
...
@@ -9,13 +9,13 @@
[Bodo Moeller; problem reported by Eric Day <eday@concentric.net>]
*) In RSA_eay_public_{en,ed}crypt and RSA_eay_mod_exp (rsa_eay.c),
obtain lock CRYPTO_LOCK_RSA before creating BN_MONT_CTX
structures and setting rsa->_method_mod_{n,p,q}.
obtain lock CRYPTO_LOCK_RSA before setting rsa->_method_mod_{n,p,q}.
(RSA objects have a reference count access to which is protected
by CRYPTO_LOCK_RSA [see rsa_lib.c, s3_srvr.c, ssl_cert.c, ssl_rsa.c],
so they are meant to be shared between threads.)
[patch submitted by "Reddie, Steven" <Steven.Reddie@ca.com>]
[Bodo Moeller, Geoff Thorpe; original patch submitted by
"Reddie, Steven" <Steven.Reddie@ca.com>]
*) Make mkdef.pl parse some of the ASN1 macros and add apropriate
entries for variables.
...
...
crypto/rsa/rsa_eay.c
浏览文件 @
126fe085
...
...
@@ -141,26 +141,28 @@ static int RSA_eay_public_encrypt(int flen, const unsigned char *from,
if
((
rsa
->
_method_mod_n
==
NULL
)
&&
(
rsa
->
flags
&
RSA_FLAG_CACHE_PUBLIC
))
{
CRYPTO_w_lock
(
CRYPTO_LOCK_RSA
);
if
(
rsa
->
_method_mod_n
==
NULL
)
BN_MONT_CTX
*
bn_mont_ctx
;
if
((
bn_mont_ctx
=
BN_MONT_CTX_new
())
==
NULL
)
goto
err
;
if
(
!
BN_MONT_CTX_set
(
bn_mont_ctx
,
rsa
->
n
,
ctx
))
{
BN_MONT_CTX
*
bn_mont_ctx
;
if
((
bn_mont_ctx
=
BN_MONT_CTX_new
())
==
NULL
)
{
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
goto
err
;
}
if
(
!
BN_MONT_CTX_set
(
bn_mont_ctx
,
rsa
->
n
,
ctx
)
)
BN_MONT_CTX
_free
(
bn_mont_ctx
)
;
goto
err
;
}
if
(
rsa
->
_method_mod_n
==
NULL
)
/* other thread may have finished first */
{
CRYPTO_w_lock
(
CRYPTO_LOCK_RSA
);
if
(
rsa
->
_method_mod_n
==
NULL
)
{
BN_MONT_CTX_free
(
bn_mont_ctx
);
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
goto
err
;
rsa
->
_method_mod_n
=
bn_mont_ctx
;
bn_mont_ctx
=
NULL
;
}
rsa
->
_method_mod_n
=
bn_mont_ctx
;
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
)
;
}
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
if
(
bn_mont_ctx
)
BN_MONT_CTX_free
(
bn_mont_ctx
);
}
if
(
!
meth
->
bn_mod_exp
(
&
ret
,
&
f
,
rsa
->
e
,
rsa
->
n
,
ctx
,
rsa
->
_method_mod_n
))
goto
err
;
...
...
@@ -393,26 +395,28 @@ static int RSA_eay_public_decrypt(int flen, const unsigned char *from,
/* do the decrypt */
if
((
rsa
->
_method_mod_n
==
NULL
)
&&
(
rsa
->
flags
&
RSA_FLAG_CACHE_PUBLIC
))
{
CRYPTO_w_lock
(
CRYPTO_LOCK_RSA
);
if
(
rsa
->
_method_mod_n
==
NULL
)
BN_MONT_CTX
*
bn_mont_ctx
;
if
((
bn_mont_ctx
=
BN_MONT_CTX_new
())
==
NULL
)
goto
err
;
if
(
!
BN_MONT_CTX_set
(
bn_mont_ctx
,
rsa
->
n
,
ctx
))
{
BN_MONT_CTX
*
bn_mont_ctx
;
if
((
bn_mont_ctx
=
BN_MONT_CTX_new
())
==
NULL
)
{
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
goto
err
;
}
if
(
!
BN_MONT_CTX_set
(
bn_mont_ctx
,
rsa
->
n
,
ctx
)
)
BN_MONT_CTX
_free
(
bn_mont_ctx
)
;
goto
err
;
}
if
(
rsa
->
_method_mod_n
==
NULL
)
/* other thread may have finished first */
{
CRYPTO_w_lock
(
CRYPTO_LOCK_RSA
);
if
(
rsa
->
_method_mod_n
==
NULL
)
{
BN_MONT_CTX_free
(
bn_mont_ctx
);
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
goto
err
;
rsa
->
_method_mod_n
=
bn_mont_ctx
;
bn_mont_ctx
=
NULL
;
}
rsa
->
_method_mod_n
=
bn_mont_ctx
;
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
)
;
}
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
if
(
bn_mont_ctx
)
BN_MONT_CTX_free
(
bn_mont_ctx
);
}
if
(
!
meth
->
bn_mod_exp
(
&
ret
,
&
f
,
rsa
->
e
,
rsa
->
n
,
ctx
,
rsa
->
_method_mod_n
))
goto
err
;
...
...
@@ -462,48 +466,53 @@ static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa)
{
if
(
rsa
->
_method_mod_p
==
NULL
)
{
CRYPTO_w_lock
(
CRYPTO_LOCK_RSA
);
if
(
rsa
->
_method_mod_p
==
NULL
)
BN_MONT_CTX
*
bn_mont_ctx
;
if
((
bn_mont_ctx
=
BN_MONT_CTX_new
())
==
NULL
)
goto
err
;
if
(
!
BN_MONT_CTX_set
(
bn_mont_ctx
,
rsa
->
p
,
ctx
))
{
BN_MONT_CTX
*
bn_mont_ctx
;
if
((
bn_mont_ctx
=
BN_MONT_CTX_new
())
==
NULL
)
{
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
goto
err
;
}
if
(
!
BN_MONT_CTX_set
(
bn_mont_ctx
,
rsa
->
p
,
ctx
)
)
BN_MONT_CTX
_free
(
bn_mont_ctx
)
;
goto
err
;
}
if
(
rsa
->
_method_mod_p
==
NULL
)
/* other thread may have finished first */
{
CRYPTO_w_lock
(
CRYPTO_LOCK_RSA
);
if
(
rsa
->
_method_mod_p
==
NULL
)
{
BN_MONT_CTX_free
(
bn_mont_ctx
);
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
goto
err
;
rsa
->
_method_mod_p
=
bn_mont_ctx
;
bn_mont_ctx
=
NULL
;
}
rsa
->
_method_mod_p
=
bn_mont_ctx
;
}
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
}
if
(
bn_mont_ctx
)
BN_MONT_CTX_free
(
bn_mont_ctx
);
}
if
(
rsa
->
_method_mod_q
==
NULL
)
{
CRYPTO_w_lock
(
CRYPTO_LOCK_RSA
);
if
(
rsa
->
_method_mod_q
==
NULL
)
BN_MONT_CTX
*
bn_mont_ctx
;
if
((
bn_mont_ctx
=
BN_MONT_CTX_new
())
==
NULL
)
goto
err
;
if
(
!
BN_MONT_CTX_set
(
bn_mont_ctx
,
rsa
->
q
,
ctx
))
{
BN_MONT_CTX
*
bn_mont_ctx
;
if
((
bn_mont_ctx
=
BN_MONT_CTX_new
())
==
NULL
)
{
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
BN_MONT_CTX_free
(
bn_mont_ctx
);
goto
err
;
}
if
(
!
BN_MONT_CTX_set
(
bn_mont_ctx
,
rsa
->
q
,
ctx
))
}
if
(
rsa
->
_method_mod_q
==
NULL
)
/* other thread may have finished first */
{
CRYPTO_w_lock
(
CRYPTO_LOCK_RSA
);
if
(
rsa
->
_method_mod_q
==
NULL
)
{
BN_MONT_CTX_free
(
bn_mont_ctx
);
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
goto
err
;
rsa
->
_method_mod_q
=
bn_mont_ctx
;
bn_mont_ctx
=
NULL
;
}
rsa
->
_method_mod_q
=
bn_mont_ctx
;
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
)
;
}
CRYPTO_w_unlock
(
CRYPTO_LOCK_RSA
);
if
(
bn_mont_ctx
)
BN_MONT_CTX_free
(
bn_mont_ctx
);
}
}
if
(
!
BN_mod
(
&
r1
,
I
,
rsa
->
q
,
ctx
))
goto
err
;
if
(
!
meth
->
bn_mod_exp
(
&
m1
,
&
r1
,
rsa
->
dmq1
,
rsa
->
q
,
ctx
,
rsa
->
_method_mod_q
))
goto
err
;
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录