diff options
Diffstat (limited to 'src/lib/libcrypto/dsa')
-rw-r--r-- | src/lib/libcrypto/dsa/dsa.h | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/dsa/dsa_err.c | 2 | ||||
-rw-r--r-- | src/lib/libcrypto/dsa/dsa_ossl.c | 12 |
3 files changed, 18 insertions, 0 deletions
diff --git a/src/lib/libcrypto/dsa/dsa.h b/src/lib/libcrypto/dsa/dsa.h index 851e3f0445..aa0669eb7a 100644 --- a/src/lib/libcrypto/dsa/dsa.h +++ b/src/lib/libcrypto/dsa/dsa.h | |||
@@ -79,6 +79,8 @@ | |||
79 | # include <openssl/dh.h> | 79 | # include <openssl/dh.h> |
80 | #endif | 80 | #endif |
81 | 81 | ||
82 | #define OPENSSL_DSA_MAX_MODULUS_BITS 3072 | ||
83 | |||
82 | #define DSA_FLAG_CACHE_MONT_P 0x01 | 84 | #define DSA_FLAG_CACHE_MONT_P 0x01 |
83 | #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA | 85 | #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA |
84 | * implementation now uses constant time | 86 | * implementation now uses constant time |
@@ -259,8 +261,10 @@ void ERR_load_DSA_strings(void); | |||
259 | #define DSA_F_SIG_CB 114 | 261 | #define DSA_F_SIG_CB 114 |
260 | 262 | ||
261 | /* Reason codes. */ | 263 | /* Reason codes. */ |
264 | #define DSA_R_BAD_Q_VALUE 102 | ||
262 | #define DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 100 | 265 | #define DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 100 |
263 | #define DSA_R_MISSING_PARAMETERS 101 | 266 | #define DSA_R_MISSING_PARAMETERS 101 |
267 | #define DSA_R_MODULUS_TOO_LARGE 103 | ||
264 | 268 | ||
265 | #ifdef __cplusplus | 269 | #ifdef __cplusplus |
266 | } | 270 | } |
diff --git a/src/lib/libcrypto/dsa/dsa_err.c b/src/lib/libcrypto/dsa/dsa_err.c index fd42053572..d7fac69154 100644 --- a/src/lib/libcrypto/dsa/dsa_err.c +++ b/src/lib/libcrypto/dsa/dsa_err.c | |||
@@ -89,8 +89,10 @@ static ERR_STRING_DATA DSA_str_functs[]= | |||
89 | 89 | ||
90 | static ERR_STRING_DATA DSA_str_reasons[]= | 90 | static ERR_STRING_DATA DSA_str_reasons[]= |
91 | { | 91 | { |
92 | {ERR_REASON(DSA_R_BAD_Q_VALUE) ,"bad q value"}, | ||
92 | {ERR_REASON(DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),"data too large for key size"}, | 93 | {ERR_REASON(DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),"data too large for key size"}, |
93 | {ERR_REASON(DSA_R_MISSING_PARAMETERS) ,"missing parameters"}, | 94 | {ERR_REASON(DSA_R_MISSING_PARAMETERS) ,"missing parameters"}, |
95 | {ERR_REASON(DSA_R_MODULUS_TOO_LARGE) ,"modulus too large"}, | ||
94 | {0,NULL} | 96 | {0,NULL} |
95 | }; | 97 | }; |
96 | 98 | ||
diff --git a/src/lib/libcrypto/dsa/dsa_ossl.c b/src/lib/libcrypto/dsa/dsa_ossl.c index 12509a7083..5de5fc7e91 100644 --- a/src/lib/libcrypto/dsa/dsa_ossl.c +++ b/src/lib/libcrypto/dsa/dsa_ossl.c | |||
@@ -274,6 +274,18 @@ static int dsa_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, | |||
274 | return -1; | 274 | return -1; |
275 | } | 275 | } |
276 | 276 | ||
277 | if (BN_num_bits(dsa->q) != 160) | ||
278 | { | ||
279 | DSAerr(DSA_F_DSA_DO_VERIFY,DSA_R_BAD_Q_VALUE); | ||
280 | return -1; | ||
281 | } | ||
282 | |||
283 | if (BN_num_bits(dsa->p) > OPENSSL_DSA_MAX_MODULUS_BITS) | ||
284 | { | ||
285 | DSAerr(DSA_F_DSA_DO_VERIFY,DSA_R_MODULUS_TOO_LARGE); | ||
286 | return -1; | ||
287 | } | ||
288 | |||
277 | BN_init(&u1); | 289 | BN_init(&u1); |
278 | BN_init(&u2); | 290 | BN_init(&u2); |
279 | BN_init(&t1); | 291 | BN_init(&t1); |