Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell8_jdk
提交
1d823628
D
dragonwell8_jdk
项目概览
openanolis
/
dragonwell8_jdk
通知
4
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell8_jdk
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
1d823628
编写于
11月 23, 2016
作者:
I
igerasim
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
8161571: Verifying ECDSA signatures permits trailing bytes
Reviewed-by: xuelei
上级
8f094066
变更
4
隐藏空白更改
内联
并排
Showing
4 changed file
with
124 addition
and
3 deletion
+124
-3
src/share/classes/sun/security/ec/ECDSASignature.java
src/share/classes/sun/security/ec/ECDSASignature.java
+7
-1
src/share/classes/sun/security/pkcs11/P11Signature.java
src/share/classes/sun/security/pkcs11/P11Signature.java
+11
-1
src/share/classes/sun/security/provider/DSA.java
src/share/classes/sun/security/provider/DSA.java
+5
-1
test/java/security/Signature/SignatureLength.java
test/java/security/Signature/SignatureLength.java
+101
-0
未找到文件。
src/share/classes/sun/security/ec/ECDSASignature.java
浏览文件 @
1d823628
/*
* Copyright (c) 2009, 201
3
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2009, 201
6
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -25,6 +25,7 @@
package
sun.security.ec
;
import
java.io.IOException
;
import
java.nio.ByteBuffer
;
import
java.math.BigInteger
;
...
...
@@ -370,6 +371,11 @@ abstract class ECDSASignature extends SignatureSpi {
DerValue
[]
values
=
in
.
getSequence
(
2
);
BigInteger
r
=
values
[
0
].
getPositiveBigInteger
();
BigInteger
s
=
values
[
1
].
getPositiveBigInteger
();
// Check for trailing signature data
if
(
in
.
available
()
!=
0
)
{
throw
new
IOException
(
"Incorrect signature length"
);
}
// trim leading zeroes
byte
[]
rBytes
=
trimZeroes
(
r
.
toByteArray
());
byte
[]
sBytes
=
trimZeroes
(
s
.
toByteArray
());
...
...
src/share/classes/sun/security/pkcs11/P11Signature.java
浏览文件 @
1d823628
/*
* Copyright (c) 2003, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2003, 201
6
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -711,6 +711,11 @@ final class P11Signature extends SignatureSpi {
DerValue
[]
values
=
in
.
getSequence
(
2
);
BigInteger
r
=
values
[
0
].
getPositiveBigInteger
();
BigInteger
s
=
values
[
1
].
getPositiveBigInteger
();
// Check for trailing signature data
if
(
in
.
available
()
!=
0
)
{
throw
new
IOException
(
"Incorrect signature length"
);
}
byte
[]
br
=
toByteArray
(
r
,
20
);
byte
[]
bs
=
toByteArray
(
s
,
20
);
if
((
br
==
null
)
||
(
bs
==
null
))
{
...
...
@@ -730,6 +735,11 @@ final class P11Signature extends SignatureSpi {
DerValue
[]
values
=
in
.
getSequence
(
2
);
BigInteger
r
=
values
[
0
].
getPositiveBigInteger
();
BigInteger
s
=
values
[
1
].
getPositiveBigInteger
();
// Check for trailing signature data
if
(
in
.
available
()
!=
0
)
{
throw
new
IOException
(
"Incorrect signature length"
);
}
// trim leading zeroes
byte
[]
br
=
KeyUtil
.
trimZeroes
(
r
.
toByteArray
());
byte
[]
bs
=
KeyUtil
.
trimZeroes
(
s
.
toByteArray
());
...
...
src/share/classes/sun/security/provider/DSA.java
浏览文件 @
1d823628
/*
* Copyright (c) 1996, 201
5
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 1996, 201
6
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -273,6 +273,10 @@ abstract class DSA extends SignatureSpi {
r
=
values
[
0
].
getBigInteger
();
s
=
values
[
1
].
getBigInteger
();
// Check for trailing signature data
if
(
in
.
available
()
!=
0
)
{
throw
new
IOException
(
"Incorrect signature length"
);
}
}
catch
(
IOException
e
)
{
throw
new
SignatureException
(
"invalid encoding for signature"
);
}
...
...
test/java/security/Signature/SignatureLength.java
0 → 100644
浏览文件 @
1d823628
/*
* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
import
java.security.*
;
/*
* @test
* @bug 8161571
* @summary Reject signatures presented for verification that contain extra
* bytes.
* @run main SignatureLength
*/
public
class
SignatureLength
{
public
static
void
main
(
String
[]
args
)
throws
Exception
{
main0
(
"EC"
,
256
,
"SHA256withECDSA"
,
"SunEC"
);
main0
(
"RSA"
,
2048
,
"SHA256withRSA"
,
"SunRsaSign"
);
main0
(
"DSA"
,
2048
,
"SHA256withDSA"
,
"SUN"
);
if
(
System
.
getProperty
(
"os.name"
).
equals
(
"SunOS"
))
{
main0
(
"EC"
,
256
,
"SHA256withECDSA"
,
null
);
main0
(
"RSA"
,
2048
,
"SHA256withRSA"
,
null
);
}
}
private
static
void
main0
(
String
keyAlgorithm
,
int
keysize
,
String
signatureAlgorithm
,
String
provider
)
throws
Exception
{
byte
[]
plaintext
=
"aaa"
.
getBytes
(
"UTF-8"
);
// Generate
KeyPairGenerator
generator
=
provider
==
null
?
(
KeyPairGenerator
)
KeyPairGenerator
.
getInstance
(
keyAlgorithm
)
:
(
KeyPairGenerator
)
KeyPairGenerator
.
getInstance
(
keyAlgorithm
,
provider
);
generator
.
initialize
(
keysize
);
System
.
out
.
println
(
"Generating "
+
keyAlgorithm
+
" keypair using "
+
generator
.
getProvider
().
getName
()
+
" JCE provider"
);
KeyPair
keypair
=
generator
.
generateKeyPair
();
// Sign
Signature
signer
=
provider
==
null
?
Signature
.
getInstance
(
signatureAlgorithm
)
:
Signature
.
getInstance
(
signatureAlgorithm
,
provider
);
signer
.
initSign
(
keypair
.
getPrivate
());
signer
.
update
(
plaintext
);
System
.
out
.
println
(
"Signing using "
+
signer
.
getProvider
().
getName
()
+
" JCE provider"
);
byte
[]
signature
=
signer
.
sign
();
// Invalidate
System
.
out
.
println
(
"Invalidating signature ..."
);
byte
[]
badSignature
=
new
byte
[
signature
.
length
+
5
];
System
.
arraycopy
(
signature
,
0
,
badSignature
,
0
,
signature
.
length
);
badSignature
[
signature
.
length
]
=
0x01
;
badSignature
[
signature
.
length
+
1
]
=
0x01
;
badSignature
[
signature
.
length
+
2
]
=
0x01
;
badSignature
[
signature
.
length
+
3
]
=
0x01
;
badSignature
[
signature
.
length
+
4
]
=
0x01
;
// Verify
Signature
verifier
=
provider
==
null
?
Signature
.
getInstance
(
signatureAlgorithm
)
:
Signature
.
getInstance
(
signatureAlgorithm
,
provider
);
verifier
.
initVerify
(
keypair
.
getPublic
());
verifier
.
update
(
plaintext
);
System
.
out
.
println
(
"Verifying using "
+
verifier
.
getProvider
().
getName
()
+
" JCE provider"
);
try
{
System
.
out
.
println
(
"Valid? "
+
verifier
.
verify
(
badSignature
));
throw
new
Exception
(
"ERROR: expected a SignatureException but none was thrown"
);
}
catch
(
SignatureException
e
)
{
System
.
out
.
println
(
"OK: caught expected exception: "
+
e
);
}
System
.
out
.
println
();
}
}
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录