Fix build against OpenSSL 1.1

Closes: #3196
This commit is contained in:
Nicholas Guriev 2017-11-11 22:22:23 +03:00 committed by John Preston
parent 64e9958585
commit 93809ec404
3 changed files with 62 additions and 14 deletions

View File

@ -55,8 +55,7 @@ private:
class BigNum { class BigNum {
public: public:
BigNum() { BigNum() : _data(BN_new()) {
BN_init(raw());
} }
BigNum(const BigNum &other) : BigNum() { BigNum(const BigNum &other) : BigNum() {
*this = other; *this = other;
@ -176,10 +175,10 @@ public:
} }
BIGNUM *raw() { BIGNUM *raw() {
return &_data; return _data;
} }
const BIGNUM *raw() const { const BIGNUM *raw() const {
return &_data; return _data;
} }
bool failed() const { bool failed() const {
@ -193,7 +192,7 @@ public:
} }
private: private:
BIGNUM _data; BIGNUM *_data = nullptr;
mutable bool _failed = false; mutable bool _failed = false;
}; };

View File

@ -21,6 +21,9 @@ Copyright (c) 2014-2017 John Preston, https://desktop.telegram.org
#include "mtproto/auth_key.h" #include "mtproto/auth_key.h"
#include <openssl/aes.h> #include <openssl/aes.h>
extern "C" {
#include <openssl/modes.h>
}
namespace MTP { namespace MTP {
@ -109,7 +112,7 @@ void aesCtrEncrypt(void *data, uint32 len, const void *key, CTRState *state) {
static_assert(CTRState::IvecSize == AES_BLOCK_SIZE, "Wrong size of ctr ivec!"); static_assert(CTRState::IvecSize == AES_BLOCK_SIZE, "Wrong size of ctr ivec!");
static_assert(CTRState::EcountSize == AES_BLOCK_SIZE, "Wrong size of ctr ecount!"); static_assert(CTRState::EcountSize == AES_BLOCK_SIZE, "Wrong size of ctr ecount!");
AES_ctr128_encrypt(static_cast<const uchar*>(data), static_cast<uchar*>(data), len, &aes, state->ivec, state->ecount, &state->num); CRYPTO_ctr128_encrypt(static_cast<const uchar*>(data), static_cast<uchar*>(data), len, &aes, state->ivec, state->ecount, &state->num, (block128_f) AES_encrypt);
} }
} // namespace MTP } // namespace MTP

View File

@ -29,6 +29,45 @@ Copyright (c) 2014-2017 John Preston, https://desktop.telegram.org
using std::string; using std::string;
namespace MTP { namespace MTP {
namespace {
#if OPENSSL_VERSION_NUMBER < 0x10100000L
// This is a key setter for compatibility with OpenSSL 1.0
int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) {
if ((r->n == nullptr && n == nullptr) || (r->e == nullptr && e == nullptr)) {
return false;
}
if (n != nullptr) {
BN_free(r->n);
r->n = n;
}
if (e != nullptr) {
BN_free(r->e);
r->e = e;
}
if (d != nullptr) {
BN_free(r->d);
r->d = d;
}
return true;
}
// This is a key getter for compatibility with OpenSSL 1.0
void RSA_get0_key(const RSA *r, const BIGNUM **n, const BIGNUM **e, const BIGNUM **d) {
if (n != nullptr) {
*n = r->n;
}
if (e != nullptr) {
*e = r->e;
}
if (d != nullptr) {
*d = r->d;
}
}
#endif
}
namespace internal { namespace internal {
class RSAPublicKey::Private { class RSAPublicKey::Private {
@ -40,9 +79,10 @@ public:
} }
Private(base::const_byte_span nBytes, base::const_byte_span eBytes) : _rsa(RSA_new()) { Private(base::const_byte_span nBytes, base::const_byte_span eBytes) : _rsa(RSA_new()) {
if (_rsa) { if (_rsa) {
_rsa->n = BN_dup(openssl::BigNum(nBytes).raw()); BIGNUM *n = BN_dup(openssl::BigNum(nBytes).raw());
_rsa->e = BN_dup(openssl::BigNum(eBytes).raw()); BIGNUM *e = BN_dup(openssl::BigNum(eBytes).raw());
if (!_rsa->n || !_rsa->e) { RSA_set0_key(_rsa, n, e, nullptr);
if (!n || !e) {
RSA_free(base::take(_rsa)); RSA_free(base::take(_rsa));
} else { } else {
computeFingerprint(); computeFingerprint();
@ -51,11 +91,15 @@ public:
} }
base::byte_vector getN() const { base::byte_vector getN() const {
Expects(isValid()); Expects(isValid());
return toBytes(_rsa->n); const BIGNUM *n;
RSA_get0_key(_rsa, &n, nullptr, nullptr);
return toBytes(n);
} }
base::byte_vector getE() const { base::byte_vector getE() const {
Expects(isValid()); Expects(isValid());
return toBytes(_rsa->e); const BIGNUM *e;
RSA_get0_key(_rsa, nullptr, &e, nullptr);
return toBytes(e);
} }
uint64 getFingerPrint() const { uint64 getFingerPrint() const {
return _fingerprint; return _fingerprint;
@ -105,14 +149,16 @@ private:
void computeFingerprint() { void computeFingerprint() {
Expects(isValid()); Expects(isValid());
const BIGNUM *n, *e;
mtpBuffer string; mtpBuffer string;
MTP_bytes(toBytes(_rsa->n)).write(string); RSA_get0_key(_rsa, &n, &e, nullptr);
MTP_bytes(toBytes(_rsa->e)).write(string); MTP_bytes(toBytes(n)).write(string);
MTP_bytes(toBytes(e)).write(string);
uchar sha1Buffer[20]; uchar sha1Buffer[20];
_fingerprint = *(uint64*)(hashSha1(&string[0], string.size() * sizeof(mtpPrime), sha1Buffer) + 3); _fingerprint = *(uint64*)(hashSha1(&string[0], string.size() * sizeof(mtpPrime), sha1Buffer) + 3);
} }
static base::byte_vector toBytes(BIGNUM *number) { static base::byte_vector toBytes(const BIGNUM *number) {
auto size = BN_num_bytes(number); auto size = BN_num_bytes(number);
auto result = base::byte_vector(size, gsl::byte {}); auto result = base::byte_vector(size, gsl::byte {});
BN_bn2bin(number, reinterpret_cast<unsigned char*>(result.data())); BN_bn2bin(number, reinterpret_cast<unsigned char*>(result.data()));