summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ec/ec2_oct.c
diff options
context:
space:
mode:
authortb <>2020-12-04 08:55:30 +0000
committertb <>2020-12-04 08:55:30 +0000
commiteba5b622a3ad6c48a28a09d15ca32cdfac91f91b (patch)
treeca443fbe605894704c5097fc9a5a6d9acc5a1b63 /src/lib/libcrypto/ec/ec2_oct.c
parent4dd2176959a6cdcb7f7ea0d8e3883f1ea62b1e55 (diff)
downloadopenbsd-eba5b622a3ad6c48a28a09d15ca32cdfac91f91b.tar.gz
openbsd-eba5b622a3ad6c48a28a09d15ca32cdfac91f91b.tar.bz2
openbsd-eba5b622a3ad6c48a28a09d15ca32cdfac91f91b.zip
Move point-on-curve check to set_affine_coordinates
Bad API design makes it possible to set an EC_KEY public key to a point not on the curve. As a consequence, it was possible to have bogus ECDSA signatures validated. In practice, all software uses either EC_POINT_oct2point*() to unmarshal public keys or issues a call to EC_KEY_check_key() after setting it. This way, a point on curve check is performed and the problem is mitigated. In OpenSSL commit 1e2012b7ff4a5f12273446b281775faa5c8a1858, Emilia Kasper moved the point-on-curve check from EC_POINT_oct2point to EC_POINT_set_affine_coordinates_*, which results in more checking. In addition to this commit, we also check in the currently unused codepath of a user set callback for setting compressed coordinates, just in case this will be used at some point in the future. The documentation of EC_KEY_check_key() is very vague on what it checks and when checks are needed. It could certainly be improved a lot. It's also strange that EC_KEY_set_key() performs no checks, while EC_KEY_set_public_key_affine_coordinates() implicitly calls EC_KEY_check_key(). It's a mess. Issue found and reported by Guido Vranken who also tested an earlier version of this fix. ok jsing
Diffstat (limited to 'src/lib/libcrypto/ec/ec2_oct.c')
-rw-r--r--src/lib/libcrypto/ec/ec2_oct.c15
1 files changed, 9 insertions, 6 deletions
diff --git a/src/lib/libcrypto/ec/ec2_oct.c b/src/lib/libcrypto/ec/ec2_oct.c
index 268eccf471..5f7f7e3c99 100644
--- a/src/lib/libcrypto/ec/ec2_oct.c
+++ b/src/lib/libcrypto/ec/ec2_oct.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ec2_oct.c,v 1.11 2018/07/15 16:27:39 tb Exp $ */ 1/* $OpenBSD: ec2_oct.c,v 1.12 2020/12/04 08:55:30 tb Exp $ */
2/* ==================================================================== 2/* ====================================================================
3 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. 3 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
4 * 4 *
@@ -346,6 +346,10 @@ ec_GF2m_simple_oct2point(const EC_GROUP *group, EC_POINT *point,
346 goto err; 346 goto err;
347 } 347 }
348 if (form == POINT_CONVERSION_COMPRESSED) { 348 if (form == POINT_CONVERSION_COMPRESSED) {
349 /*
350 * EC_POINT_set_compressed_coordinates_GF2m checks that the
351 * point is on the curve as required by X9.62.
352 */
349 if (!EC_POINT_set_compressed_coordinates_GF2m(group, point, x, y_bit, ctx)) 353 if (!EC_POINT_set_compressed_coordinates_GF2m(group, point, x, y_bit, ctx))
350 goto err; 354 goto err;
351 } else { 355 } else {
@@ -363,15 +367,14 @@ ec_GF2m_simple_oct2point(const EC_GROUP *group, EC_POINT *point,
363 goto err; 367 goto err;
364 } 368 }
365 } 369 }
370 /*
371 * EC_POINT_set_affine_coordinates_GF2m checks that the
372 * point is on the curve as required by X9.62.
373 */
366 if (!EC_POINT_set_affine_coordinates_GF2m(group, point, x, y, ctx)) 374 if (!EC_POINT_set_affine_coordinates_GF2m(group, point, x, y, ctx))
367 goto err; 375 goto err;
368 } 376 }
369 377
370 /* test required by X9.62 */
371 if (EC_POINT_is_on_curve(group, point, ctx) <= 0) {
372 ECerror(EC_R_POINT_IS_NOT_ON_CURVE);
373 goto err;
374 }
375 ret = 1; 378 ret = 1;
376 379
377 err: 380 err: