mirror of
https://github.com/openssl/openssl.git
synced 2025-03-31 20:10:45 +08:00
DH_check_pub_key() should not fail when setting result code
The semantics of ossl_ffc_validate_public_key() and ossl_ffc_validate_public_key_partial() needs to be changed to not return error on non-fatal problems. Fixes #22287 Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22291)
This commit is contained in:
parent
715242b1ca
commit
eaee1765a4
@ -259,7 +259,8 @@ int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, int *ret)
|
||||
*/
|
||||
int ossl_dh_check_pub_key_partial(const DH *dh, const BIGNUM *pub_key, int *ret)
|
||||
{
|
||||
return ossl_ffc_validate_public_key_partial(&dh->params, pub_key, ret);
|
||||
return ossl_ffc_validate_public_key_partial(&dh->params, pub_key, ret)
|
||||
&& *ret == 0;
|
||||
}
|
||||
|
||||
int ossl_dh_check_priv_key(const DH *dh, const BIGNUM *priv_key, int *ret)
|
||||
|
@ -39,7 +39,8 @@ int ossl_dsa_check_params(const DSA *dsa, int checktype, int *ret)
|
||||
*/
|
||||
int ossl_dsa_check_pub_key(const DSA *dsa, const BIGNUM *pub_key, int *ret)
|
||||
{
|
||||
return ossl_ffc_validate_public_key(&dsa->params, pub_key, ret);
|
||||
return ossl_ffc_validate_public_key(&dsa->params, pub_key, ret)
|
||||
&& *ret == 0;
|
||||
}
|
||||
|
||||
/*
|
||||
@ -49,7 +50,8 @@ int ossl_dsa_check_pub_key(const DSA *dsa, const BIGNUM *pub_key, int *ret)
|
||||
*/
|
||||
int ossl_dsa_check_pub_key_partial(const DSA *dsa, const BIGNUM *pub_key, int *ret)
|
||||
{
|
||||
return ossl_ffc_validate_public_key_partial(&dsa->params, pub_key, ret);
|
||||
return ossl_ffc_validate_public_key_partial(&dsa->params, pub_key, ret)
|
||||
&& *ret == 0;
|
||||
}
|
||||
|
||||
int ossl_dsa_check_priv_key(const DSA *dsa, const BIGNUM *priv_key, int *ret)
|
||||
|
@ -26,7 +26,7 @@ int ossl_ffc_validate_public_key_partial(const FFC_PARAMS *params,
|
||||
*ret = 0;
|
||||
if (params == NULL || pub_key == NULL || params->p == NULL) {
|
||||
*ret = FFC_ERROR_PASSED_NULL_PARAM;
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
ctx = BN_CTX_new_ex(NULL);
|
||||
@ -39,18 +39,14 @@ int ossl_ffc_validate_public_key_partial(const FFC_PARAMS *params,
|
||||
if (tmp == NULL
|
||||
|| !BN_set_word(tmp, 1))
|
||||
goto err;
|
||||
if (BN_cmp(pub_key, tmp) <= 0) {
|
||||
if (BN_cmp(pub_key, tmp) <= 0)
|
||||
*ret |= FFC_ERROR_PUBKEY_TOO_SMALL;
|
||||
goto err;
|
||||
}
|
||||
/* Step(1): Verify pub_key <= p-2 */
|
||||
if (BN_copy(tmp, params->p) == NULL
|
||||
|| !BN_sub_word(tmp, 1))
|
||||
goto err;
|
||||
if (BN_cmp(pub_key, tmp) >= 0) {
|
||||
if (BN_cmp(pub_key, tmp) >= 0)
|
||||
*ret |= FFC_ERROR_PUBKEY_TOO_LARGE;
|
||||
goto err;
|
||||
}
|
||||
ok = 1;
|
||||
err:
|
||||
if (ctx != NULL) {
|
||||
@ -73,7 +69,7 @@ int ossl_ffc_validate_public_key(const FFC_PARAMS *params,
|
||||
if (!ossl_ffc_validate_public_key_partial(params, pub_key, ret))
|
||||
return 0;
|
||||
|
||||
if (params->q != NULL) {
|
||||
if (*ret == 0 && params->q != NULL) {
|
||||
ctx = BN_CTX_new_ex(NULL);
|
||||
if (ctx == NULL)
|
||||
goto err;
|
||||
@ -84,10 +80,8 @@ int ossl_ffc_validate_public_key(const FFC_PARAMS *params,
|
||||
if (tmp == NULL
|
||||
|| !BN_mod_exp(tmp, pub_key, params->q, params->p, ctx))
|
||||
goto err;
|
||||
if (!BN_is_one(tmp)) {
|
||||
if (!BN_is_one(tmp))
|
||||
*ret |= FFC_ERROR_PUBKEY_INVALID;
|
||||
goto err;
|
||||
}
|
||||
}
|
||||
|
||||
ok = 1;
|
||||
|
@ -392,7 +392,7 @@ static int dh_validate_public(const DH *dh, int checktype)
|
||||
&& ossl_dh_is_named_safe_prime_group(dh))
|
||||
return ossl_dh_check_pub_key_partial(dh, pub_key, &res);
|
||||
|
||||
return DH_check_pub_key(dh, pub_key, &res);
|
||||
return DH_check_pub_key_ex(dh, pub_key);
|
||||
}
|
||||
|
||||
static int dh_validate_private(const DH *dh)
|
||||
|
@ -455,22 +455,20 @@ static int ffc_public_validate_test(void)
|
||||
if (!TEST_true(BN_set_word(pub, 1)))
|
||||
goto err;
|
||||
BN_set_negative(pub, 1);
|
||||
/* Fail if public key is negative */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
/* Check must succeed but set res if public key is negative */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PUBKEY_TOO_SMALL, res))
|
||||
goto err;
|
||||
if (!TEST_true(BN_set_word(pub, 0)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PUBKEY_TOO_SMALL, res))
|
||||
goto err;
|
||||
/* Fail if public key is zero */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
/* Check must succeed but set res if public key is zero */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PUBKEY_TOO_SMALL, res))
|
||||
goto err;
|
||||
/* Fail if public key is 1 */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(params, BN_value_one(), &res)))
|
||||
/* Check must succeed but set res if public key is 1 */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, BN_value_one(), &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PUBKEY_TOO_SMALL, res))
|
||||
goto err;
|
||||
@ -482,24 +480,24 @@ static int ffc_public_validate_test(void)
|
||||
|
||||
if (!TEST_ptr(BN_copy(pub, params->p)))
|
||||
goto err;
|
||||
/* Fail if public key = p */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
/* Check must succeed but set res if public key = p */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PUBKEY_TOO_LARGE, res))
|
||||
goto err;
|
||||
|
||||
if (!TEST_true(BN_sub_word(pub, 1)))
|
||||
goto err;
|
||||
/* Fail if public key = p - 1 */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
/* Check must succeed but set res if public key = p - 1 */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PUBKEY_TOO_LARGE, res))
|
||||
goto err;
|
||||
|
||||
if (!TEST_true(BN_sub_word(pub, 1)))
|
||||
goto err;
|
||||
/* Fail if public key is not related to p & q */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
/* Check must succeed but set res if public key is not related to p & q */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PUBKEY_INVALID, res))
|
||||
goto err;
|
||||
@ -510,14 +508,14 @@ static int ffc_public_validate_test(void)
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
goto err;
|
||||
|
||||
/* Fail if params is NULL */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(NULL, pub, &res)))
|
||||
/* Check must succeed but set res if params is NULL */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(NULL, pub, &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PASSED_NULL_PARAM, res))
|
||||
goto err;
|
||||
res = -1;
|
||||
/* Fail if pubkey is NULL */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(params, NULL, &res)))
|
||||
/* Check must succeed but set res if pubkey is NULL */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, NULL, &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PASSED_NULL_PARAM, res))
|
||||
goto err;
|
||||
@ -525,8 +523,8 @@ static int ffc_public_validate_test(void)
|
||||
|
||||
BN_free(params->p);
|
||||
params->p = NULL;
|
||||
/* Fail if params->p is NULL */
|
||||
if (!TEST_false(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
/* Check must succeed but set res if params->p is NULL */
|
||||
if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
|
||||
goto err;
|
||||
if (!TEST_int_eq(FFC_ERROR_PASSED_NULL_PARAM, res))
|
||||
goto err;
|
||||
|
Loading…
x
Reference in New Issue
Block a user