Skip to content

Commit 5bba078

Browse files
JLHwungaduh95
authored andcommitted
crypto: reject dh,x25519,x448 in {Sign,Verify}Final
Fixes: #53742 PR-URL: #53774 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Tobias Nießen <tniessen@tnie.de>
1 parent 82c08ef commit 5bba078

File tree

5 files changed

+69
-13
lines changed

5 files changed

+69
-13
lines changed

src/crypto/crypto_sig.cc

+20-13
Original file line numberDiff line numberDiff line change
@@ -92,12 +92,15 @@ std::unique_ptr<BackingStore> Node_SignFinal(Environment* env,
9292
sig = ArrayBuffer::NewBackingStore(env->isolate(), sig_len);
9393
}
9494
EVPKeyCtxPointer pkctx(EVP_PKEY_CTX_new(pkey.get(), nullptr));
95-
if (pkctx &&
96-
EVP_PKEY_sign_init(pkctx.get()) &&
95+
if (pkctx && EVP_PKEY_sign_init(pkctx.get()) > 0 &&
9796
ApplyRSAOptions(pkey, pkctx.get(), padding, pss_salt_len) &&
98-
EVP_PKEY_CTX_set_signature_md(pkctx.get(), EVP_MD_CTX_md(mdctx.get())) &&
99-
EVP_PKEY_sign(pkctx.get(), static_cast<unsigned char*>(sig->Data()),
100-
&sig_len, m, m_len)) {
97+
EVP_PKEY_CTX_set_signature_md(pkctx.get(), EVP_MD_CTX_md(mdctx.get())) >
98+
0 &&
99+
EVP_PKEY_sign(pkctx.get(),
100+
static_cast<unsigned char*>(sig->Data()),
101+
&sig_len,
102+
m,
103+
m_len) > 0) {
101104
CHECK_LE(sig_len, sig->ByteLength());
102105
if (sig_len == 0) {
103106
sig = ArrayBuffer::NewBackingStore(env->isolate(), 0);
@@ -527,14 +530,18 @@ SignBase::Error Verify::VerifyFinal(const ManagedEVPPKey& pkey,
527530
return kSignPublicKey;
528531

529532
EVPKeyCtxPointer pkctx(EVP_PKEY_CTX_new(pkey.get(), nullptr));
530-
if (pkctx &&
531-
EVP_PKEY_verify_init(pkctx.get()) > 0 &&
532-
ApplyRSAOptions(pkey, pkctx.get(), padding, saltlen) &&
533-
EVP_PKEY_CTX_set_signature_md(pkctx.get(),
534-
EVP_MD_CTX_md(mdctx.get())) > 0) {
535-
const unsigned char* s = sig.data<unsigned char>();
536-
const int r = EVP_PKEY_verify(pkctx.get(), s, sig.size(), m, m_len);
537-
*verify_result = r == 1;
533+
if (pkctx) {
534+
const int init_ret = EVP_PKEY_verify_init(pkctx.get());
535+
if (init_ret == -2) {
536+
return kSignPublicKey;
537+
}
538+
if (init_ret > 0 && ApplyRSAOptions(pkey, pkctx.get(), padding, saltlen) &&
539+
EVP_PKEY_CTX_set_signature_md(pkctx.get(), EVP_MD_CTX_md(mdctx.get())) >
540+
0) {
541+
const unsigned char* s = sig.data<unsigned char>();
542+
const int r = EVP_PKEY_verify(pkctx.get(), s, sig.size(), m, m_len);
543+
*verify_result = r == 1;
544+
}
538545
}
539546

540547
return kSignOk;

test/fixtures/keys/Makefile

+8
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ all: \
2525
dh1024.pem \
2626
dh2048.pem \
2727
dherror.pem \
28+
dh_private.pem \
29+
dh_public.pem \
2830
dsa_params.pem \
2931
dsa_private.pem \
3032
dsa_private_encrypted.pem \
@@ -597,6 +599,12 @@ dh2048.pem:
597599
dherror.pem: dh1024.pem
598600
sed 's/^[^-].*/AAAAAAAAAA/g' dh1024.pem > dherror.pem
599601

602+
dh_private.pem:
603+
openssl genpkey -algorithm dh -out dh_private.pem -pkeyopt dh_param:ffdhe2048
604+
605+
dh_public.pem: dh_private.pem
606+
openssl pkey -in dh_private.pem -pubout -out dh_public.pem
607+
600608
dsa_params.pem:
601609
openssl dsaparam -out dsa_params.pem 2048
602610

test/fixtures/keys/dh_private.pem

+9
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
-----BEGIN PRIVATE KEY-----
2+
MIIBPgIBADCCARcGCSqGSIb3DQEDATCCAQgCggEBAP//////////rfhUWKK7Spqv
3+
3FYgJz088di5xYPOLTaVqeE2QRRkM/vMk53OJJs++X0v42NjDHXY9oGyAq7EYXrT
4+
3x7V1f1lYSQz9R9fBm7QhWNlVT3tGvO1VxNef1fJNZhPDHDg5ot34qaJ2vPv6HId
5+
8VihNq3nNTCsyk9IOnl6vAqxgrMk+2HRCKlLssjj+7lq2rdg1/RoHU9Co945TfSu
6+
Vu3nY3K7GQsHp8juCm1wngL84c334uzANATNKDQvYZFy/pzphYP/jk8SMu7ygYPD
7+
/jsbTG+tczu1/LwuwiAFxY7xg30Wg7LG80omwbLv+ohrQjhhKFyX//////////8C
8+
AQIEHgIcKNGyhQRxIhVXoyktdymwbN6MgXv85vPax+8eqQ==
9+
-----END PRIVATE KEY-----

test/fixtures/keys/dh_public.pem

+14
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
-----BEGIN PUBLIC KEY-----
2+
MIICJTCCARcGCSqGSIb3DQEDATCCAQgCggEBAP//////////rfhUWKK7Spqv3FYg
3+
Jz088di5xYPOLTaVqeE2QRRkM/vMk53OJJs++X0v42NjDHXY9oGyAq7EYXrT3x7V
4+
1f1lYSQz9R9fBm7QhWNlVT3tGvO1VxNef1fJNZhPDHDg5ot34qaJ2vPv6HId8Vih
5+
Nq3nNTCsyk9IOnl6vAqxgrMk+2HRCKlLssjj+7lq2rdg1/RoHU9Co945TfSuVu3n
6+
Y3K7GQsHp8juCm1wngL84c334uzANATNKDQvYZFy/pzphYP/jk8SMu7ygYPD/jsb
7+
TG+tczu1/LwuwiAFxY7xg30Wg7LG80omwbLv+ohrQjhhKFyX//////////8CAQID
8+
ggEGAAKCAQEA2whDVdYtNbr/isSFdw7rOSdbmcWrxiX6ppqDZ6yp8XjUj3/CEf/P
9+
60X7HndX+nXD7YaPtVZxktkIpArI7C+AH7fZxBduuv2eLnvYwK82jFHKe7zvfdMr
10+
26akMCV0kBA3ktgcftHlqYsIj52BaJlG37FRha3SDOL2yJOij3hNQhHCXTWLg7tP
11+
GtXmD202OoZ6Ll+LxBzBCFnxVauiKnzBGeawy4gDycUEHmq5oDRR68I2gmxmsLg5
12+
MQVAP5ljp+FEu4+TZm6hR4wQ5PRjCQ+teq+VqMro7EbbvZpn+X9kAgKSl2WDu0fT
13+
FbUnBn3HPBmUa/Fv/ooXrlckTUDjLkbWZQ==
14+
-----END PUBLIC KEY-----

test/parallel/test-crypto-sign-verify.js

+18
Original file line numberDiff line numberDiff line change
@@ -793,3 +793,21 @@ assert.throws(
793793
}, { code: 'ERR_CRYPTO_UNSUPPORTED_OPERATION', message: 'Unsupported crypto operation' });
794794
}
795795
}
796+
797+
{
798+
// Dh, x25519 and x448 should not be used for signing/verifying
799+
// https://github.com/nodejs/node/issues/53742
800+
for (const algo of ['dh', 'x25519', 'x448']) {
801+
const privateKey = fixtures.readKey(`${algo}_private.pem`, 'ascii');
802+
const publicKey = fixtures.readKey(`${algo}_public.pem`, 'ascii');
803+
assert.throws(() => {
804+
crypto.createSign('SHA256').update('Test123').sign(privateKey);
805+
}, { code: 'ERR_OSSL_EVP_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE', message: /operation not supported for this keytype/ });
806+
assert.throws(() => {
807+
crypto.createVerify('SHA256').update('Test123').verify(privateKey, 'sig');
808+
}, { code: 'ERR_OSSL_EVP_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE', message: /operation not supported for this keytype/ });
809+
assert.throws(() => {
810+
crypto.createVerify('SHA256').update('Test123').verify(publicKey, 'sig');
811+
}, { code: 'ERR_OSSL_EVP_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE', message: /operation not supported for this keytype/ });
812+
}
813+
}

0 commit comments

Comments
 (0)