Page Menu
Home
FreeBSD
Search
Configure Global Search
Log In
Files
F108616518
D24534.id70884.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Flag For Later
Award Token
Size
2 KB
Referenced Files
None
Subscribers
None
D24534.id70884.diff
View Options
Index: sbin/decryptcore/decryptcore.c
===================================================================
--- sbin/decryptcore/decryptcore.c
+++ sbin/decryptcore/decryptcore.c
@@ -219,6 +219,10 @@
if (RSA_private_decrypt(kdk->kdk_encryptedkeysize,
kdk->kdk_encryptedkey, key, privkey,
+ RSA_PKCS1_OAEP_PADDING) != sizeof(key) &&
+ /* Fallback to deprecated, formerly-used PKCS 1.5 padding. */
+ RSA_private_decrypt(kdk->kdk_encryptedkeysize,
+ kdk->kdk_encryptedkey, key, privkey,
RSA_PKCS1_PADDING) != sizeof(key)) {
pjdlog_error("Unable to decrypt key: %s",
ERR_error_string(ERR_get_error(), NULL));
Index: sbin/dumpon/dumpon.c
===================================================================
--- sbin/dumpon/dumpon.c
+++ sbin/dumpon/dumpon.c
@@ -77,6 +77,7 @@
#ifdef HAVE_CRYPTO
#include <openssl/err.h>
#include <openssl/pem.h>
+#include <openssl/rand.h>
#include <openssl/rsa.h>
#endif
@@ -224,6 +225,18 @@
if (fp == NULL)
err(1, "Unable to open %s", pubkeyfile);
+ /*
+ * Obsolescent OpenSSL only knows about /dev/random, and needs to
+ * pre-seed before entering cap mode. For whatever reason,
+ * RSA_pub_encrypt uses the internal PRNG.
+ */
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
+ {
+ unsigned char c[1];
+ RAND_bytes(c, 1);
+ }
+#endif
+
if (caph_enter() < 0)
err(1, "Unable to enter capability mode");
@@ -286,8 +299,9 @@
arc4random_buf(kdap->kda_key, sizeof(kdap->kda_key));
if (RSA_public_encrypt(sizeof(kdap->kda_key), kdap->kda_key,
kdap->kda_encryptedkey, pubkey,
- RSA_PKCS1_PADDING) != (int)kdap->kda_encryptedkeysize) {
- errx(1, "Unable to encrypt the one-time key.");
+ RSA_PKCS1_OAEP_PADDING) != (int)kdap->kda_encryptedkeysize) {
+ errx(1, "Unable to encrypt the one-time key: %s",
+ ERR_error_string(ERR_get_error(), NULL));
}
RSA_free(pubkey);
}
@@ -470,8 +484,11 @@
usage();
#ifdef HAVE_CRYPTO
- if (cipher != KERNELDUMP_ENC_NONE && pubkeyfile == NULL)
+ if (cipher != KERNELDUMP_ENC_NONE && pubkeyfile == NULL) {
errx(EX_USAGE, "-C option requires a public key file.");
+ } else if (pubkeyfile != NULL) {
+ ERR_load_crypto_strings();
+ }
#else
if (pubkeyfile != NULL)
errx(EX_UNAVAILABLE,"Unable to use the public key."
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Mon, Jan 27, 10:06 PM (8 h, 54 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
16216084
Default Alt Text
D24534.id70884.diff (2 KB)
Attached To
Mode
D24534: EKCD: Preload error strings, PRNG seed; use OAEP padding
Attached
Detach File
Event Timeline
Log In to Comment