]> CyberLeo.Net >> Repos - FreeBSD/releng/9.3.git/blob - contrib/bind9/lib/dns/openssldh_link.c
Fix remote denial of service vulnerability when parsing malformed
[FreeBSD/releng/9.3.git] / contrib / bind9 / lib / dns / openssldh_link.c
1 /*
2  * Portions Copyright (C) 2004-2009, 2011-2013  Internet Systems Consortium, Inc. ("ISC")
3  * Portions Copyright (C) 1999-2002  Internet Software Consortium.
4  *
5  * Permission to use, copy, modify, and/or distribute this software for any
6  * purpose with or without fee is hereby granted, provided that the above
7  * copyright notice and this permission notice appear in all copies.
8  *
9  * THE SOFTWARE IS PROVIDED "AS IS" AND ISC AND NETWORK ASSOCIATES DISCLAIMS
10  * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
11  * WARRANTIES OF MERCHANTABILITY AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE
12  * FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR
15  * IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16  *
17  * Portions Copyright (C) 1995-2000 by Network Associates, Inc.
18  *
19  * Permission to use, copy, modify, and/or distribute this software for any
20  * purpose with or without fee is hereby granted, provided that the above
21  * copyright notice and this permission notice appear in all copies.
22  *
23  * THE SOFTWARE IS PROVIDED "AS IS" AND ISC AND NETWORK ASSOCIATES DISCLAIMS
24  * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
25  * WARRANTIES OF MERCHANTABILITY AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE
26  * FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
27  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
28  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR
29  * IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
30  */
31
32 /*
33  * Principal Author: Brian Wellington
34  * $Id: openssldh_link.c,v 1.20 2011/01/11 23:47:13 tbox Exp $
35  */
36
37 #ifdef OPENSSL
38
39 #include <config.h>
40
41 #include <ctype.h>
42
43 #include <isc/mem.h>
44 #include <isc/string.h>
45 #include <isc/util.h>
46
47 #include <dst/result.h>
48
49 #include "dst_internal.h"
50 #include "dst_openssl.h"
51 #include "dst_parse.h"
52
53 #define PRIME768 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088" \
54         "A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25" \
55         "F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A63A3620FFFFFFFFFFFFFFFF"
56
57 #define PRIME1024 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" \
58         "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF2" \
59         "5F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406" \
60         "B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF"
61
62 #define PRIME1536 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
63         "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
64         "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
65         "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
66         "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
67         "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
68         "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
69         "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF"
70
71
72 static isc_result_t openssldh_todns(const dst_key_t *key, isc_buffer_t *data);
73
74 static BIGNUM bn2, bn768, bn1024, bn1536;
75
76 static isc_result_t
77 openssldh_computesecret(const dst_key_t *pub, const dst_key_t *priv,
78                         isc_buffer_t *secret)
79 {
80         DH *dhpub, *dhpriv;
81         int ret;
82         isc_region_t r;
83         unsigned int len;
84
85         REQUIRE(pub->keydata.dh != NULL);
86         REQUIRE(priv->keydata.dh != NULL);
87
88         dhpub = pub->keydata.dh;
89         dhpriv = priv->keydata.dh;
90
91         len = DH_size(dhpriv);
92         isc_buffer_availableregion(secret, &r);
93         if (r.length < len)
94                 return (ISC_R_NOSPACE);
95         ret = DH_compute_key(r.base, dhpub->pub_key, dhpriv);
96         if (ret == 0)
97                 return (dst__openssl_toresult2("DH_compute_key",
98                                                DST_R_COMPUTESECRETFAILURE));
99         isc_buffer_add(secret, len);
100         return (ISC_R_SUCCESS);
101 }
102
103 static isc_boolean_t
104 openssldh_compare(const dst_key_t *key1, const dst_key_t *key2) {
105         int status;
106         DH *dh1, *dh2;
107
108         dh1 = key1->keydata.dh;
109         dh2 = key2->keydata.dh;
110
111         if (dh1 == NULL && dh2 == NULL)
112                 return (ISC_TRUE);
113         else if (dh1 == NULL || dh2 == NULL)
114                 return (ISC_FALSE);
115
116         status = BN_cmp(dh1->p, dh2->p) ||
117                  BN_cmp(dh1->g, dh2->g) ||
118                  BN_cmp(dh1->pub_key, dh2->pub_key);
119
120         if (status != 0)
121                 return (ISC_FALSE);
122
123         if (dh1->priv_key != NULL || dh2->priv_key != NULL) {
124                 if (dh1->priv_key == NULL || dh2->priv_key == NULL)
125                         return (ISC_FALSE);
126                 if (BN_cmp(dh1->priv_key, dh2->priv_key) != 0)
127                         return (ISC_FALSE);
128         }
129         return (ISC_TRUE);
130 }
131
132 static isc_boolean_t
133 openssldh_paramcompare(const dst_key_t *key1, const dst_key_t *key2) {
134         int status;
135         DH *dh1, *dh2;
136
137         dh1 = key1->keydata.dh;
138         dh2 = key2->keydata.dh;
139
140         if (dh1 == NULL && dh2 == NULL)
141                 return (ISC_TRUE);
142         else if (dh1 == NULL || dh2 == NULL)
143                 return (ISC_FALSE);
144
145         status = BN_cmp(dh1->p, dh2->p) ||
146                  BN_cmp(dh1->g, dh2->g);
147
148         if (status != 0)
149                 return (ISC_FALSE);
150         return (ISC_TRUE);
151 }
152
153 #if OPENSSL_VERSION_NUMBER > 0x00908000L
154 static int
155 progress_cb(int p, int n, BN_GENCB *cb)
156 {
157         union {
158                 void *dptr;
159                 void (*fptr)(int);
160         } u;
161
162         UNUSED(n);
163
164         u.dptr = cb->arg;
165         if (u.fptr != NULL)
166                 u.fptr(p);
167         return (1);
168 }
169 #endif
170
171 static isc_result_t
172 openssldh_generate(dst_key_t *key, int generator, void (*callback)(int)) {
173         DH *dh = NULL;
174 #if OPENSSL_VERSION_NUMBER > 0x00908000L
175         BN_GENCB cb;
176         union {
177                 void *dptr;
178                 void (*fptr)(int);
179         } u;
180 #else
181
182         UNUSED(callback);
183 #endif
184
185         if (generator == 0) {
186                 if (key->key_size == 768 ||
187                     key->key_size == 1024 ||
188                     key->key_size == 1536)
189                 {
190                         dh = DH_new();
191                         if (dh == NULL)
192                                 return (dst__openssl_toresult(ISC_R_NOMEMORY));
193                         if (key->key_size == 768)
194                                 dh->p = &bn768;
195                         else if (key->key_size == 1024)
196                                 dh->p = &bn1024;
197                         else
198                                 dh->p = &bn1536;
199                         dh->g = &bn2;
200                 } else
201                         generator = 2;
202         }
203
204         if (generator != 0) {
205 #if OPENSSL_VERSION_NUMBER > 0x00908000L
206                 dh = DH_new();
207                 if (dh == NULL)
208                         return (dst__openssl_toresult(ISC_R_NOMEMORY));
209
210                 if (callback == NULL) {
211                         BN_GENCB_set_old(&cb, NULL, NULL);
212                 } else {
213                         u.fptr = callback;
214                         BN_GENCB_set(&cb, &progress_cb, u.dptr);
215                 }
216
217                 if (!DH_generate_parameters_ex(dh, key->key_size, generator,
218                                                &cb)) {
219                         DH_free(dh);
220                         return (dst__openssl_toresult2(
221                                         "DH_generate_parameters_ex",
222                                         DST_R_OPENSSLFAILURE));
223                 }
224 #else
225                 dh = DH_generate_parameters(key->key_size, generator,
226                                             NULL, NULL);
227 #endif
228         }
229
230         if (dh == NULL)
231                 return (dst__openssl_toresult2("DH_generate_parameters",
232                                                DST_R_OPENSSLFAILURE));
233
234         if (DH_generate_key(dh) == 0) {
235                 DH_free(dh);
236                 return (dst__openssl_toresult2("DH_generate_key",
237                                                DST_R_OPENSSLFAILURE));
238         }
239         dh->flags &= ~DH_FLAG_CACHE_MONT_P;
240
241         key->keydata.dh = dh;
242
243         return (ISC_R_SUCCESS);
244 }
245
246 static isc_boolean_t
247 openssldh_isprivate(const dst_key_t *key) {
248         DH *dh = key->keydata.dh;
249         return (ISC_TF(dh != NULL && dh->priv_key != NULL));
250 }
251
252 static void
253 openssldh_destroy(dst_key_t *key) {
254         DH *dh = key->keydata.dh;
255
256         if (dh == NULL)
257                 return;
258
259         if (dh->p == &bn768 || dh->p == &bn1024 || dh->p == &bn1536)
260                 dh->p = NULL;
261         if (dh->g == &bn2)
262                 dh->g = NULL;
263         DH_free(dh);
264         key->keydata.dh = NULL;
265 }
266
267 static void
268 uint16_toregion(isc_uint16_t val, isc_region_t *region) {
269         *region->base = (val & 0xff00) >> 8;
270         isc_region_consume(region, 1);
271         *region->base = (val & 0x00ff);
272         isc_region_consume(region, 1);
273 }
274
275 static isc_uint16_t
276 uint16_fromregion(isc_region_t *region) {
277         isc_uint16_t val;
278         unsigned char *cp = region->base;
279
280         val = ((unsigned int)(cp[0])) << 8;
281         val |= ((unsigned int)(cp[1]));
282
283         isc_region_consume(region, 2);
284
285         return (val);
286 }
287
288 static isc_result_t
289 openssldh_todns(const dst_key_t *key, isc_buffer_t *data) {
290         DH *dh;
291         isc_region_t r;
292         isc_uint16_t dnslen, plen, glen, publen;
293
294         REQUIRE(key->keydata.dh != NULL);
295
296         dh = key->keydata.dh;
297
298         isc_buffer_availableregion(data, &r);
299
300         if (dh->g == &bn2 &&
301             (dh->p == &bn768 || dh->p == &bn1024 || dh->p == &bn1536)) {
302                 plen = 1;
303                 glen = 0;
304         }
305         else {
306                 plen = BN_num_bytes(dh->p);
307                 glen = BN_num_bytes(dh->g);
308         }
309         publen = BN_num_bytes(dh->pub_key);
310         dnslen = plen + glen + publen + 6;
311         if (r.length < (unsigned int) dnslen)
312                 return (ISC_R_NOSPACE);
313
314         uint16_toregion(plen, &r);
315         if (plen == 1) {
316                 if (dh->p == &bn768)
317                         *r.base = 1;
318                 else if (dh->p == &bn1024)
319                         *r.base = 2;
320                 else
321                         *r.base = 3;
322         }
323         else
324                 BN_bn2bin(dh->p, r.base);
325         isc_region_consume(&r, plen);
326
327         uint16_toregion(glen, &r);
328         if (glen > 0)
329                 BN_bn2bin(dh->g, r.base);
330         isc_region_consume(&r, glen);
331
332         uint16_toregion(publen, &r);
333         BN_bn2bin(dh->pub_key, r.base);
334         isc_region_consume(&r, publen);
335
336         isc_buffer_add(data, dnslen);
337
338         return (ISC_R_SUCCESS);
339 }
340
341 static isc_result_t
342 openssldh_fromdns(dst_key_t *key, isc_buffer_t *data) {
343         DH *dh;
344         isc_region_t r;
345         isc_uint16_t plen, glen, publen;
346         int special = 0;
347
348         isc_buffer_remainingregion(data, &r);
349         if (r.length == 0)
350                 return (ISC_R_SUCCESS);
351
352         dh = DH_new();
353         if (dh == NULL)
354                 return (dst__openssl_toresult(ISC_R_NOMEMORY));
355         dh->flags &= ~DH_FLAG_CACHE_MONT_P;
356
357         /*
358          * Read the prime length.  1 & 2 are table entries, > 16 means a
359          * prime follows, otherwise an error.
360          */
361         if (r.length < 2) {
362                 DH_free(dh);
363                 return (DST_R_INVALIDPUBLICKEY);
364         }
365         plen = uint16_fromregion(&r);
366         if (plen < 16 && plen != 1 && plen != 2) {
367                 DH_free(dh);
368                 return (DST_R_INVALIDPUBLICKEY);
369         }
370         if (r.length < plen) {
371                 DH_free(dh);
372                 return (DST_R_INVALIDPUBLICKEY);
373         }
374         if (plen == 1 || plen == 2) {
375                 if (plen == 1) {
376                         special = *r.base;
377                         isc_region_consume(&r, 1);
378                 } else {
379                         special = uint16_fromregion(&r);
380                 }
381                 switch (special) {
382                         case 1:
383                                 dh->p = &bn768;
384                                 break;
385                         case 2:
386                                 dh->p = &bn1024;
387                                 break;
388                         case 3:
389                                 dh->p = &bn1536;
390                                 break;
391                         default:
392                                 DH_free(dh);
393                                 return (DST_R_INVALIDPUBLICKEY);
394                 }
395         } else {
396                 dh->p = BN_bin2bn(r.base, plen, NULL);
397                 isc_region_consume(&r, plen);
398         }
399
400         /*
401          * Read the generator length.  This should be 0 if the prime was
402          * special, but it might not be.  If it's 0 and the prime is not
403          * special, we have a problem.
404          */
405         if (r.length < 2) {
406                 DH_free(dh);
407                 return (DST_R_INVALIDPUBLICKEY);
408         }
409         glen = uint16_fromregion(&r);
410         if (r.length < glen) {
411                 DH_free(dh);
412                 return (DST_R_INVALIDPUBLICKEY);
413         }
414         if (special != 0) {
415                 if (glen == 0)
416                         dh->g = &bn2;
417                 else {
418                         dh->g = BN_bin2bn(r.base, glen, NULL);
419                         if (BN_cmp(dh->g, &bn2) == 0) {
420                                 BN_free(dh->g);
421                                 dh->g = &bn2;
422                         }
423                         else {
424                                 DH_free(dh);
425                                 return (DST_R_INVALIDPUBLICKEY);
426                         }
427                 }
428         } else {
429                 if (glen == 0) {
430                         DH_free(dh);
431                         return (DST_R_INVALIDPUBLICKEY);
432                 }
433                 dh->g = BN_bin2bn(r.base, glen, NULL);
434         }
435         isc_region_consume(&r, glen);
436
437         if (r.length < 2) {
438                 DH_free(dh);
439                 return (DST_R_INVALIDPUBLICKEY);
440         }
441         publen = uint16_fromregion(&r);
442         if (r.length < publen) {
443                 DH_free(dh);
444                 return (DST_R_INVALIDPUBLICKEY);
445         }
446         dh->pub_key = BN_bin2bn(r.base, publen, NULL);
447         isc_region_consume(&r, publen);
448
449         key->key_size = BN_num_bits(dh->p);
450
451         isc_buffer_forward(data, plen + glen + publen + 6);
452
453         key->keydata.dh = dh;
454
455         return (ISC_R_SUCCESS);
456 }
457
458 static isc_result_t
459 openssldh_tofile(const dst_key_t *key, const char *directory) {
460         int i;
461         DH *dh;
462         dst_private_t priv;
463         unsigned char *bufs[4];
464         isc_result_t result;
465
466         if (key->keydata.dh == NULL)
467                 return (DST_R_NULLKEY);
468
469         dh = key->keydata.dh;
470
471         memset(bufs, 0, sizeof(bufs));
472         for (i = 0; i < 4; i++) {
473                 bufs[i] = isc_mem_get(key->mctx, BN_num_bytes(dh->p));
474                 if (bufs[i] == NULL) {
475                         result = ISC_R_NOMEMORY;
476                         goto fail;
477                 }
478         }
479
480         i = 0;
481
482         priv.elements[i].tag = TAG_DH_PRIME;
483         priv.elements[i].length = BN_num_bytes(dh->p);
484         BN_bn2bin(dh->p, bufs[i]);
485         priv.elements[i].data = bufs[i];
486         i++;
487
488         priv.elements[i].tag = TAG_DH_GENERATOR;
489         priv.elements[i].length = BN_num_bytes(dh->g);
490         BN_bn2bin(dh->g, bufs[i]);
491         priv.elements[i].data = bufs[i];
492         i++;
493
494         priv.elements[i].tag = TAG_DH_PRIVATE;
495         priv.elements[i].length = BN_num_bytes(dh->priv_key);
496         BN_bn2bin(dh->priv_key, bufs[i]);
497         priv.elements[i].data = bufs[i];
498         i++;
499
500         priv.elements[i].tag = TAG_DH_PUBLIC;
501         priv.elements[i].length = BN_num_bytes(dh->pub_key);
502         BN_bn2bin(dh->pub_key, bufs[i]);
503         priv.elements[i].data = bufs[i];
504         i++;
505
506         priv.nelements = i;
507         result = dst__privstruct_writefile(key, &priv, directory);
508  fail:
509         for (i = 0; i < 4; i++) {
510                 if (bufs[i] == NULL)
511                         break;
512                 isc_mem_put(key->mctx, bufs[i], BN_num_bytes(dh->p));
513         }
514         return (result);
515 }
516
517 static isc_result_t
518 openssldh_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) {
519         dst_private_t priv;
520         isc_result_t ret;
521         int i;
522         DH *dh = NULL;
523         isc_mem_t *mctx;
524 #define DST_RET(a) {ret = a; goto err;}
525
526         UNUSED(pub);
527         mctx = key->mctx;
528
529         /* read private key file */
530         ret = dst__privstruct_parse(key, DST_ALG_DH, lexer, mctx, &priv);
531         if (ret != ISC_R_SUCCESS)
532                 return (ret);
533
534         dh = DH_new();
535         if (dh == NULL)
536                 DST_RET(ISC_R_NOMEMORY);
537         dh->flags &= ~DH_FLAG_CACHE_MONT_P;
538         key->keydata.dh = dh;
539
540         for (i = 0; i < priv.nelements; i++) {
541                 BIGNUM *bn;
542                 bn = BN_bin2bn(priv.elements[i].data,
543                                priv.elements[i].length, NULL);
544                 if (bn == NULL)
545                         DST_RET(ISC_R_NOMEMORY);
546
547                 switch (priv.elements[i].tag) {
548                         case TAG_DH_PRIME:
549                                 dh->p = bn;
550                                 break;
551                         case TAG_DH_GENERATOR:
552                                 dh->g = bn;
553                                 break;
554                         case TAG_DH_PRIVATE:
555                                 dh->priv_key = bn;
556                                 break;
557                         case TAG_DH_PUBLIC:
558                                 dh->pub_key = bn;
559                                 break;
560                 }
561         }
562         dst__privstruct_free(&priv, mctx);
563
564         key->key_size = BN_num_bits(dh->p);
565
566         if ((key->key_size == 768 ||
567              key->key_size == 1024 ||
568              key->key_size == 1536) &&
569             BN_cmp(dh->g, &bn2) == 0)
570         {
571                 if (key->key_size == 768 && BN_cmp(dh->p, &bn768) == 0) {
572                         BN_free(dh->p);
573                         BN_free(dh->g);
574                         dh->p = &bn768;
575                         dh->g = &bn2;
576                 } else if (key->key_size == 1024 &&
577                            BN_cmp(dh->p, &bn1024) == 0) {
578                         BN_free(dh->p);
579                         BN_free(dh->g);
580                         dh->p = &bn1024;
581                         dh->g = &bn2;
582                 } else if (key->key_size == 1536 &&
583                            BN_cmp(dh->p, &bn1536) == 0) {
584                         BN_free(dh->p);
585                         BN_free(dh->g);
586                         dh->p = &bn1536;
587                         dh->g = &bn2;
588                 }
589         }
590
591         return (ISC_R_SUCCESS);
592
593  err:
594         openssldh_destroy(key);
595         dst__privstruct_free(&priv, mctx);
596         memset(&priv, 0, sizeof(priv));
597         return (ret);
598 }
599
600 static void
601 BN_fromhex(BIGNUM *b, const char *str) {
602         static const char hexdigits[] = "0123456789abcdef";
603         unsigned char data[512];
604         unsigned int i;
605         BIGNUM *out;
606
607         RUNTIME_CHECK(strlen(str) < 1024U && strlen(str) % 2 == 0U);
608         for (i = 0; i < strlen(str); i += 2) {
609                 char *s;
610                 unsigned int high, low;
611
612                 s = strchr(hexdigits, tolower((unsigned char)str[i]));
613                 RUNTIME_CHECK(s != NULL);
614                 high = (unsigned int)(s - hexdigits);
615
616                 s = strchr(hexdigits, tolower((unsigned char)str[i + 1]));
617                 RUNTIME_CHECK(s != NULL);
618                 low = (unsigned int)(s - hexdigits);
619
620                 data[i/2] = (unsigned char)((high << 4) + low);
621         }
622         out = BN_bin2bn(data, strlen(str)/2, b);
623         RUNTIME_CHECK(out != NULL);
624 }
625
626 static void
627 openssldh_cleanup(void) {
628         BN_free(&bn2);
629         BN_free(&bn768);
630         BN_free(&bn1024);
631         BN_free(&bn1536);
632 }
633
634 static dst_func_t openssldh_functions = {
635         NULL, /*%< createctx */
636         NULL, /*%< destroyctx */
637         NULL, /*%< adddata */
638         NULL, /*%< openssldh_sign */
639         NULL, /*%< openssldh_verify */
640         NULL, /*%< openssldh_verify2 */
641         openssldh_computesecret,
642         openssldh_compare,
643         openssldh_paramcompare,
644         openssldh_generate,
645         openssldh_isprivate,
646         openssldh_destroy,
647         openssldh_todns,
648         openssldh_fromdns,
649         openssldh_tofile,
650         openssldh_parse,
651         openssldh_cleanup,
652         NULL, /*%< fromlabel */
653         NULL, /*%< dump */
654         NULL, /*%< restore */
655 };
656
657 isc_result_t
658 dst__openssldh_init(dst_func_t **funcp) {
659         REQUIRE(funcp != NULL);
660         if (*funcp == NULL) {
661                 BN_init(&bn2);
662                 BN_init(&bn768);
663                 BN_init(&bn1024);
664                 BN_init(&bn1536);
665                 BN_set_word(&bn2, 2);
666                 BN_fromhex(&bn768, PRIME768);
667                 BN_fromhex(&bn1024, PRIME1024);
668                 BN_fromhex(&bn1536, PRIME1536);
669                 *funcp = &openssldh_functions;
670         }
671         return (ISC_R_SUCCESS);
672 }
673
674 #else /* OPENSSL */
675
676 #include <isc/util.h>
677
678 EMPTY_TRANSLATION_UNIT
679
680 #endif /* OPENSSL */
681 /*! \file */