summaryrefslogtreecommitdiffstats
path: root/contrib/ntp/README.rsa
blob: e92eacda1043976afb65250bd4a6e3b5ab87de5e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
If you want to use the RSA stuff for crypto keys:

- Get RSAREF or RSAEURO.
- - Unpack it in the top-level source directory of the NTP distribution
    in a directory named rsaref2 or rsaeuro1, respectively
    (You should see directories like ports, rsaref2, scripts)

Make sure rsa.c has the security patch applied - a copy of it is at the
end of this file.

When you run configure, the Right Thing will happen.

Be advised that the RSA DES code is not quite as portable is one might
wish for.  In particular, DES under NTP will only work between machines
of the same "endianness".

Note that the next release of NTP uses OpenSSL instead of RSAREF.

--- rsa.c.orig	Fri Mar 25 14:01:48 1994
+++ rsaref2/source/rsa.c	Mon Dec 13 13:10:28 1999
@@ -33,6 +33,9 @@
   unsigned char byte, pkcsBlock[MAX_RSA_MODULUS_LEN];
   unsigned int i, modulusLen;
   
+  if (publicKey->bits > MAX_RSA_MODULUS_BITS)
+    return (RE_LEN);
+
   modulusLen = (publicKey->bits + 7) / 8;
   if (inputLen + 11 > modulusLen)
     return (RE_LEN);
@@ -78,6 +81,9 @@
   unsigned char pkcsBlock[MAX_RSA_MODULUS_LEN];
   unsigned int i, modulusLen, pkcsBlockLen;
   
+  if (publicKey->bits > MAX_RSA_MODULUS_BITS)
+    return (RE_LEN);
+
   modulusLen = (publicKey->bits + 7) / 8;
   if (inputLen > modulusLen)
     return (RE_LEN);
@@ -128,6 +134,9 @@
   int status;
   unsigned char pkcsBlock[MAX_RSA_MODULUS_LEN];
   unsigned int i, modulusLen;
+
+  if (privateKey->bits > MAX_RSA_MODULUS_BITS)
+    return (RE_LEN);
   
   modulusLen = (privateKey->bits + 7) / 8;
   if (inputLen + 11 > modulusLen)
@@ -168,6 +177,9 @@
   unsigned char pkcsBlock[MAX_RSA_MODULUS_LEN];
   unsigned int i, modulusLen, pkcsBlockLen;
   
+  if (privateKey->bits > MAX_RSA_MODULUS_BITS)
+    return (RE_LEN);
+
   modulusLen = (privateKey->bits + 7) / 8;
   if (inputLen > modulusLen)
     return (RE_LEN);

--- rsa.c.orig	Sat Sep 28 22:59:40 1996
+++ rsaeuro1/source/rsa.c	Sat Jul  8 00:33:13 2000
@@ -51,6 +51,9 @@ R_RANDOM_STRUCT *randomStruct;  /* rando
 	unsigned char byte, pkcsBlock[MAX_RSA_MODULUS_LEN];
 	unsigned int i, modulusLen;
 
+	if (publicKey->bits > MAX_RSA_MODULUS_BITS)
+	return (RE_LEN);
+
 	modulusLen = (publicKey->bits + 7) / 8;
 
 	if(inputLen + 11 > modulusLen)
@@ -101,6 +104,9 @@ R_RSA_PUBLIC_KEY *publicKey;    /* RSA p
 	unsigned char pkcsBlock[MAX_RSA_MODULUS_LEN];
 	unsigned int i, modulusLen, pkcsBlockLen;
 
+	if (publicKey->bits > MAX_RSA_MODULUS_BITS)
+	return (RE_LEN);
+
 	modulusLen = (publicKey->bits + 7) / 8;
 
 	if(inputLen > modulusLen)
@@ -154,6 +160,9 @@ R_RSA_PRIVATE_KEY *privateKey;  /* RSA p
 	unsigned char pkcsBlock[MAX_RSA_MODULUS_LEN];
 	unsigned int i, modulusLen;
 
+	if (privateKey->bits > MAX_RSA_MODULUS_BITS)
+	return (RE_LEN);
+
 	modulusLen = (privateKey->bits + 7) / 8;
 
 	if(inputLen + 11 > modulusLen)
@@ -193,6 +202,9 @@ R_RSA_PRIVATE_KEY *privateKey;  /* RSA p
 	unsigned char pkcsBlock[MAX_RSA_MODULUS_LEN];
 	unsigned int i, modulusLen, pkcsBlockLen;
 
+	if (privateKey->bits > MAX_RSA_MODULUS_BITS)
+	return (RE_LEN);
+
 	modulusLen = (privateKey->bits + 7) / 8;
 
 	if(inputLen > modulusLen)
OpenPOWER on IntegriCloud