Fix padding in ssh-dss signature blob encoding
DSA signatures consist of two 160-bit integers called r and s. In ssh-dss signature blobs r and s are stored directly after each other in binary representation, making up a 320-bit (40 byte) string. (See RFC4253 p14.) The crypto wrappers in libssh2 would either pack r and s incorrectly, or fail, when at least one integer was small enough to be stored in 19 bytes or less. The patch ensures that r and s are always stored as two 160 bit numbers.
Этот коммит содержится в:
родитель
7317edab61
Коммит
1aba38cd7d
@ -424,6 +424,8 @@ _libssh2_dsa_sha1_sign(libssh2_dsa_ctx * dsactx,
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
memset(sig, 0, 40);
|
||||||
|
|
||||||
/* Extract R. */
|
/* Extract R. */
|
||||||
|
|
||||||
data = gcry_sexp_find_token(sig_sexp, "r", 0);
|
data = gcry_sexp_find_token(sig_sexp, "r", 0);
|
||||||
@ -433,22 +435,12 @@ _libssh2_dsa_sha1_sign(libssh2_dsa_ctx * dsactx,
|
|||||||
}
|
}
|
||||||
|
|
||||||
tmp = gcry_sexp_nth_data(data, 1, &size);
|
tmp = gcry_sexp_nth_data(data, 1, &size);
|
||||||
if (!tmp) {
|
if (!tmp || size < 1 || size > 20) {
|
||||||
ret = -1;
|
ret = -1;
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (tmp[0] == '\0') {
|
memcpy(sig + (20 - size), tmp, size);
|
||||||
tmp++;
|
|
||||||
size--;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (size != 20) {
|
|
||||||
ret = -1;
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
memcpy(sig, tmp, 20);
|
|
||||||
|
|
||||||
gcry_sexp_release(data);
|
gcry_sexp_release(data);
|
||||||
|
|
||||||
@ -461,22 +453,12 @@ _libssh2_dsa_sha1_sign(libssh2_dsa_ctx * dsactx,
|
|||||||
}
|
}
|
||||||
|
|
||||||
tmp = gcry_sexp_nth_data(data, 1, &size);
|
tmp = gcry_sexp_nth_data(data, 1, &size);
|
||||||
if (!tmp) {
|
if (!tmp || size < 1 || size > 20) {
|
||||||
ret = -1;
|
ret = -1;
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (tmp[0] == '\0') {
|
memcpy(sig + 20 + (20 - size), tmp, size);
|
||||||
tmp++;
|
|
||||||
size--;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (size != 20) {
|
|
||||||
ret = -1;
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
memcpy(sig + 20, tmp, 20);
|
|
||||||
|
|
||||||
ret = 0;
|
ret = 0;
|
||||||
out:
|
out:
|
||||||
|
@ -420,7 +420,7 @@ _libssh2_dsa_sha1_sign(libssh2_dsa_ctx * dsactx,
|
|||||||
unsigned long hash_len, unsigned char *signature)
|
unsigned long hash_len, unsigned char *signature)
|
||||||
{
|
{
|
||||||
DSA_SIG *sig;
|
DSA_SIG *sig;
|
||||||
int r_len, s_len, rs_pad;
|
int r_len, s_len;
|
||||||
(void) hash_len;
|
(void) hash_len;
|
||||||
|
|
||||||
sig = DSA_do_sign(hash, SHA_DIGEST_LENGTH, dsactx);
|
sig = DSA_do_sign(hash, SHA_DIGEST_LENGTH, dsactx);
|
||||||
@ -429,15 +429,20 @@ _libssh2_dsa_sha1_sign(libssh2_dsa_ctx * dsactx,
|
|||||||
}
|
}
|
||||||
|
|
||||||
r_len = BN_num_bytes(sig->r);
|
r_len = BN_num_bytes(sig->r);
|
||||||
|
if (r_len < 1 || r_len > 20) {
|
||||||
|
DSA_SIG_free(sig);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
s_len = BN_num_bytes(sig->s);
|
s_len = BN_num_bytes(sig->s);
|
||||||
rs_pad = (2 * SHA_DIGEST_LENGTH) - (r_len + s_len);
|
if (s_len < 1 || s_len > 20) {
|
||||||
if (rs_pad < 0) {
|
|
||||||
DSA_SIG_free(sig);
|
DSA_SIG_free(sig);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
BN_bn2bin(sig->r, signature + rs_pad);
|
memset(signature, 0, 40);
|
||||||
BN_bn2bin(sig->s, signature + rs_pad + r_len);
|
|
||||||
|
BN_bn2bin(sig->r, signature + (20 - r_len));
|
||||||
|
BN_bn2bin(sig->s, signature + 20 + (20 - s_len));
|
||||||
|
|
||||||
DSA_SIG_free(sig);
|
DSA_SIG_free(sig);
|
||||||
|
|
||||||
|
Загрузка…
x
Ссылка в новой задаче
Block a user