mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-26 05:25:38 +01:00
Merge remote-tracking branch 'restricted/IOTSSL-1366/development-restricted' into development-restricted
* restricted/IOTSSL-1366/development-restricted: More length checks in RSA PKCS1v15 verify More length checks in RSA PKCS1v15 verify
This commit is contained in:
commit
a0bf6ecfc3
@ -8,6 +8,8 @@ Security
|
|||||||
option if needed.
|
option if needed.
|
||||||
* Fixed offset in FALLBACK_SCSV parsing that caused TLS server to fail to
|
* Fixed offset in FALLBACK_SCSV parsing that caused TLS server to fail to
|
||||||
detect it sometimes. Reported by Hugo Leisink. #810
|
detect it sometimes. Reported by Hugo Leisink. #810
|
||||||
|
* Tighten ASN.1 parsing of RSA PKCS#1 v1.5 signatures, to avoid a
|
||||||
|
potential Bleichenbacher-style attack.
|
||||||
|
|
||||||
Bugfix
|
Bugfix
|
||||||
* Remove invalid use of size zero arrays in ECJPAKE test suite.
|
* Remove invalid use of size zero arrays in ECJPAKE test suite.
|
||||||
|
@ -1467,7 +1467,7 @@ int mbedtls_rsa_rsassa_pkcs1_v15_verify( mbedtls_rsa_context *ctx,
|
|||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
size_t len, siglen, asn1_len;
|
size_t len, siglen, asn1_len;
|
||||||
unsigned char *p, *end;
|
unsigned char *p, *p0, *end;
|
||||||
mbedtls_md_type_t msg_md_alg;
|
mbedtls_md_type_t msg_md_alg;
|
||||||
const mbedtls_md_info_t *md_info;
|
const mbedtls_md_info_t *md_info;
|
||||||
mbedtls_asn1_buf oid;
|
mbedtls_asn1_buf oid;
|
||||||
@ -1519,24 +1519,29 @@ int mbedtls_rsa_rsassa_pkcs1_v15_verify( mbedtls_rsa_context *ctx,
|
|||||||
end = p + len;
|
end = p + len;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Parse the ASN.1 structure inside the PKCS#1 v1.5 structure
|
* Parse the ASN.1 structure inside the PKCS#1 v1.5 structure.
|
||||||
|
* Insist on 2-byte length tags, to protect against variants of
|
||||||
|
* Bleichenbacher's forgery attack against lax PKCS#1v1.5 verification.
|
||||||
*/
|
*/
|
||||||
|
p0 = p;
|
||||||
if( ( ret = mbedtls_asn1_get_tag( &p, end, &asn1_len,
|
if( ( ret = mbedtls_asn1_get_tag( &p, end, &asn1_len,
|
||||||
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
|
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
|
||||||
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
if( p != p0 + 2 || asn1_len + 2 != len )
|
||||||
if( asn1_len + 2 != len )
|
|
||||||
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
|
||||||
|
p0 = p;
|
||||||
if( ( ret = mbedtls_asn1_get_tag( &p, end, &asn1_len,
|
if( ( ret = mbedtls_asn1_get_tag( &p, end, &asn1_len,
|
||||||
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
|
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
|
||||||
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
if( p != p0 + 2 || asn1_len + 6 + hashlen != len )
|
||||||
if( asn1_len + 6 + hashlen != len )
|
|
||||||
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
|
||||||
|
p0 = p;
|
||||||
if( ( ret = mbedtls_asn1_get_tag( &p, end, &oid.len, MBEDTLS_ASN1_OID ) ) != 0 )
|
if( ( ret = mbedtls_asn1_get_tag( &p, end, &oid.len, MBEDTLS_ASN1_OID ) ) != 0 )
|
||||||
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
if( p != p0 + 2 )
|
||||||
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
|
||||||
oid.p = p;
|
oid.p = p;
|
||||||
p += oid.len;
|
p += oid.len;
|
||||||
@ -1550,13 +1555,16 @@ int mbedtls_rsa_rsassa_pkcs1_v15_verify( mbedtls_rsa_context *ctx,
|
|||||||
/*
|
/*
|
||||||
* assume the algorithm parameters must be NULL
|
* assume the algorithm parameters must be NULL
|
||||||
*/
|
*/
|
||||||
|
p0 = p;
|
||||||
if( ( ret = mbedtls_asn1_get_tag( &p, end, &asn1_len, MBEDTLS_ASN1_NULL ) ) != 0 )
|
if( ( ret = mbedtls_asn1_get_tag( &p, end, &asn1_len, MBEDTLS_ASN1_NULL ) ) != 0 )
|
||||||
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
if( p != p0 + 2 )
|
||||||
if( ( ret = mbedtls_asn1_get_tag( &p, end, &asn1_len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 )
|
|
||||||
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
|
||||||
if( asn1_len != hashlen )
|
p0 = p;
|
||||||
|
if( ( ret = mbedtls_asn1_get_tag( &p, end, &asn1_len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 )
|
||||||
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
if( p != p0 + 2 || asn1_len != hashlen )
|
||||||
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
return( MBEDTLS_ERR_RSA_VERIFY_FAILED );
|
||||||
|
|
||||||
if( memcmp( p, hash, hashlen ) != 0 )
|
if( memcmp( p, hash, hashlen ) != 0 )
|
||||||
|
Loading…
Reference in New Issue
Block a user