mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-28 15:24:43 +02:00
8320597: RSA signature verification fails on signed data that does not encode params correctly
Reviewed-by: mullan, valeriep
This commit is contained in:
parent
354ea4c28f
commit
11e4a925be
3 changed files with 76 additions and 23 deletions
|
@ -217,8 +217,17 @@ abstract class RSASignature extends SignatureSpi {
|
|||
byte[] decrypted = RSACore.rsa(sigBytes, publicKey);
|
||||
|
||||
byte[] digest = getDigestValue();
|
||||
|
||||
byte[] encoded = RSAUtil.encodeSignature(digestOID, digest);
|
||||
byte[] padded = padding.pad(encoded);
|
||||
if (MessageDigest.isEqual(padded, decrypted)) {
|
||||
return true;
|
||||
}
|
||||
|
||||
// Some vendors might omit the NULL params in digest algorithm
|
||||
// identifier. Try again.
|
||||
encoded = RSAUtil.encodeSignatureWithoutNULL(digestOID, digest);
|
||||
padded = padding.pad(encoded);
|
||||
return MessageDigest.isEqual(padded, decrypted);
|
||||
} catch (javax.crypto.BadPaddingException e) {
|
||||
return false;
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Copyright (c) 2018, 2022, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2018, 2023, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
|
@ -180,28 +180,15 @@ public class RSAUtil {
|
|||
}
|
||||
|
||||
/**
|
||||
* Decode the signature data. Verify that the object identifier matches
|
||||
* and return the message digest.
|
||||
* Encode the digest without the NULL params, return the to-be-signed data.
|
||||
* This is only used by SunRsaSign.
|
||||
*/
|
||||
public static byte[] decodeSignature(ObjectIdentifier oid, byte[] sig)
|
||||
throws IOException {
|
||||
// Enforce strict DER checking for signatures
|
||||
DerInputStream in = new DerInputStream(sig, 0, sig.length, false);
|
||||
DerValue[] values = in.getSequence(2);
|
||||
if ((values.length != 2) || (in.available() != 0)) {
|
||||
throw new IOException("SEQUENCE length error");
|
||||
}
|
||||
AlgorithmId algId = AlgorithmId.parse(values[0]);
|
||||
if (!algId.getOID().equals(oid)) {
|
||||
throw new IOException("ObjectIdentifier mismatch: "
|
||||
+ algId.getOID());
|
||||
}
|
||||
if (algId.getEncodedParams() != null) {
|
||||
throw new IOException("Unexpected AlgorithmId parameters");
|
||||
}
|
||||
if (values[1].isConstructed()) {
|
||||
throw new IOException("Unexpected constructed digest value");
|
||||
}
|
||||
return values[1].getOctetString();
|
||||
static byte[] encodeSignatureWithoutNULL(ObjectIdentifier oid, byte[] digest) {
|
||||
DerOutputStream out = new DerOutputStream();
|
||||
out.write(DerValue.tag_Sequence, new DerOutputStream().putOID(oid));
|
||||
out.putOctetString(digest);
|
||||
DerValue result =
|
||||
new DerValue(DerValue.tag_Sequence, out.toByteArray());
|
||||
return result.toByteArray();
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue