Skip to content

Commit 8040aa0

Browse files
committedMay 23, 2022
8286908: ECDSA signature should not return parameters
Reviewed-by: ascarpino, hchao, valeriep
1 parent 689f80c commit 8040aa0

File tree

4 files changed

+73
-49
lines changed

4 files changed

+73
-49
lines changed
 

‎src/java.base/share/classes/sun/security/util/SignatureUtil.java

+4-11
Original file line numberDiff line numberDiff line change
@@ -151,17 +151,10 @@ public static AlgorithmParameterSpec getParamSpec(String sigName,
151151
createAlgorithmParameters(sigName, paramBytes);
152152
paramSpec = RSAUtil.getParamSpec(params);
153153
} else if (sigName.contains("ECDSA")) {
154-
try {
155-
Provider p = Signature.getInstance(sigName).getProvider();
156-
paramSpec = ECUtil.getECParameterSpec(p, paramBytes);
157-
} catch (Exception e) {
158-
throw new ProviderException("Error handling EC parameters", e);
159-
}
160-
// ECUtil discards exception and returns null, so we need to check
161-
// the returned value
162-
if (paramSpec == null) {
163-
throw new ProviderException("Error handling EC parameters");
164-
}
154+
// Some certificates have params in an ECDSA algorithmID.
155+
// According to RFC 3279 2.2.3 and RFC 5758 3.2,
156+
// they are useless and should be ignored.
157+
return null;
165158
} else {
166159
throw new ProviderException
167160
("Unrecognized algorithm for signature parameters " +

‎src/java.base/share/classes/sun/security/x509/AlgorithmId.java

+6
Original file line numberDiff line numberDiff line change
@@ -213,10 +213,14 @@ public void derEncode (OutputStream out) throws IOException {
213213
|| algid.equals(ed25519_oid)
214214
|| algid.equals(x448_oid)
215215
|| algid.equals(x25519_oid)
216+
|| algid.equals(SHA1withECDSA_oid)
216217
|| algid.equals(SHA224withECDSA_oid)
217218
|| algid.equals(SHA256withECDSA_oid)
218219
|| algid.equals(SHA384withECDSA_oid)
219220
|| algid.equals(SHA512withECDSA_oid)) {
221+
// RFC 3279 2.2.3: When the ecdsa-with-SHA1 algorithm identifier
222+
// appears as the algorithm field in an AlgorithmIdentifier,
223+
// the encoding MUST omit the parameters field.
220224
// RFC 4055 3.3: when an RSASSA-PSS key does not require
221225
// parameter validation, field is absent.
222226
// RFC 8410 3: for id-X25519, id-X448, id-Ed25519, and
@@ -692,6 +696,8 @@ private static ConcurrentHashMap<String, String> collectOIDAliases() {
692696
public static final ObjectIdentifier x448_oid =
693697
ObjectIdentifier.of(KnownOIDs.X448);
694698

699+
public static final ObjectIdentifier SHA1withECDSA_oid =
700+
ObjectIdentifier.of(KnownOIDs.SHA1withECDSA);
695701
public static final ObjectIdentifier SHA224withECDSA_oid =
696702
ObjectIdentifier.of(KnownOIDs.SHA224withECDSA);
697703
public static final ObjectIdentifier SHA256withECDSA_oid =

‎src/jdk.crypto.ec/share/classes/sun/security/ec/ECDSASignature.java

+15-38
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2009, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2009, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -80,9 +80,6 @@ abstract class ECDSASignature extends SignatureSpi {
8080
// public key, if initialized for verifying
8181
private ECPublicKey publicKey;
8282

83-
// signature parameters
84-
private ECParameterSpec sigParams = null;
85-
8683
// The format. true for the IEEE P1363 format. false (default) for ASN.1
8784
private final boolean p1363Format;
8885

@@ -347,10 +344,6 @@ public SHA3_512inP1363Format() {
347344
protected void engineInitVerify(PublicKey publicKey)
348345
throws InvalidKeyException {
349346
ECPublicKey key = (ECPublicKey) ECKeyFactory.toECKey(publicKey);
350-
if (!isCompatible(this.sigParams, key.getParams())) {
351-
throw new InvalidKeyException("Key params does not match signature params");
352-
}
353-
354347
// Should check that the supplied key is appropriate for signature
355348
// algorithm (e.g. P-256 for SHA256withECDSA)
356349
this.publicKey = key;
@@ -370,10 +363,6 @@ protected void engineInitSign(PrivateKey privateKey)
370363
protected void engineInitSign(PrivateKey privateKey, SecureRandom random)
371364
throws InvalidKeyException {
372365
ECPrivateKey key = (ECPrivateKey) ECKeyFactory.toECKey(privateKey);
373-
if (!isCompatible(this.sigParams, key.getParams())) {
374-
throw new InvalidKeyException("Key params does not match signature params");
375-
}
376-
377366
ECUtil.checkPrivateKey(key);
378367
// Should check that the supplied key is appropriate for signature
379368
// algorithm (e.g. P-256 for SHA256withECDSA)
@@ -430,15 +419,6 @@ protected void engineUpdate(ByteBuffer byteBuffer) {
430419
needsReset = true;
431420
}
432421

433-
private static boolean isCompatible(ECParameterSpec sigParams,
434-
ECParameterSpec keyParams) {
435-
if (sigParams == null) {
436-
// no restriction on key param
437-
return true;
438-
}
439-
return ECUtil.equals(sigParams, keyParams);
440-
}
441-
442422
private byte[] signDigestImpl(ECDSAOperations ops, int seedBits,
443423
byte[] digest, ECPrivateKey priv, SecureRandom random)
444424
throws SignatureException {
@@ -528,17 +508,21 @@ protected void engineSetParameter(String param, Object value)
528508

529509
@Override
530510
protected void engineSetParameter(AlgorithmParameterSpec params)
531-
throws InvalidAlgorithmParameterException {
532-
if (params != null && !(params instanceof ECParameterSpec)) {
533-
throw new InvalidAlgorithmParameterException("No parameter accepted");
511+
throws InvalidAlgorithmParameterException {
512+
// Interop: some certificates include parameters in an ECDSA
513+
// algorithm identifier. We only accept one matching the key.
514+
if (params == null) {
515+
return;
516+
}
517+
if (!(params instanceof ECParameterSpec ecparams)) {
518+
throw new InvalidAlgorithmParameterException(
519+
"Parameters must be of type ECParameterSpec");
534520
}
535521
ECKey key = (this.privateKey == null? this.publicKey : this.privateKey);
536-
if ((key != null) && !isCompatible((ECParameterSpec)params, key.getParams())) {
522+
if ((key != null) && !ECUtil.equals(ecparams, key.getParams())) {
537523
throw new InvalidAlgorithmParameterException
538524
("Signature params does not match key params");
539525
}
540-
541-
sigParams = (ECParameterSpec) params;
542526
}
543527

544528
// get parameter, not supported. See JCA doc
@@ -551,16 +535,9 @@ protected Object engineGetParameter(String param)
551535

552536
@Override
553537
protected AlgorithmParameters engineGetParameters() {
554-
if (sigParams == null) {
555-
return null;
556-
}
557-
try {
558-
AlgorithmParameters ap = AlgorithmParameters.getInstance("EC");
559-
ap.init(sigParams);
560-
return ap;
561-
} catch (Exception e) {
562-
// should never happen
563-
throw new ProviderException("Error retrieving EC parameters", e);
564-
}
538+
// Always return null even if setParameter is called before.
539+
// According to RFC 3279 2.2.3 and RFC 5758 3.2, no parameters is
540+
// defined for ECDSA AlgorithmIdentifiers.
541+
return null;
565542
}
566543
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
/*
2+
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved.
3+
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4+
*
5+
* This code is free software; you can redistribute it and/or modify it
6+
* under the terms of the GNU General Public License version 2 only, as
7+
* published by the Free Software Foundation.
8+
*
9+
* This code is distributed in the hope that it will be useful, but WITHOUT
10+
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11+
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12+
* version 2 for more details (a copy is included in the LICENSE file that
13+
* accompanied this code).
14+
*
15+
* You should have received a copy of the GNU General Public License version
16+
* 2 along with this work; if not, write to the Free Software Foundation,
17+
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18+
*
19+
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20+
* or visit www.oracle.com if you need additional information or have any
21+
* questions.
22+
*/
23+
24+
/*
25+
* @test
26+
* @bug 8286908
27+
* @summary ECDSA signature should not return parameters
28+
* @library /test/lib
29+
* @modules jdk.crypto.ec
30+
*/
31+
32+
import jdk.test.lib.Asserts;
33+
34+
import java.security.*;
35+
import java.security.interfaces.ECPrivateKey;
36+
import java.security.spec.ECGenParameterSpec;
37+
38+
public class SignatureParameters {
39+
public static void main(String[] args) throws Exception {
40+
KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC");
41+
kpg.initialize(new ECGenParameterSpec("secp384r1"));
42+
ECPrivateKey key = (ECPrivateKey) kpg.generateKeyPair().getPrivate();
43+
Signature s = Signature.getInstance("SHA384withECDSA");
44+
s.initSign(key);
45+
s.setParameter(key.getParams());
46+
Asserts.assertEQ(s.getParameters(), null);
47+
}
48+
}

0 commit comments

Comments
 (0)
Please sign in to comment.