Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-cw
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-cw
Commits
cc3fc9a4
Commit
cc3fc9a4
authored
Sep 29, 2022
by
Paul Gofman
Committed by
Alexandre Julliard
Sep 30, 2022
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
crypt32: Set correct exponent length in decoded BCRYPT_RSAKEY_BLOB.
parent
46d084ac
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
33 additions
and
18 deletions
+33
-18
decode.c
dlls/crypt32/decode.c
+23
-8
encode.c
dlls/crypt32/tests/encode.c
+10
-10
No files found.
dlls/crypt32/decode.c
View file @
cc3fc9a4
...
...
@@ -3874,7 +3874,7 @@ static BOOL WINAPI CRYPT_AsnDecodeCertPolicyConstraints(
struct
DECODED_RSA_PUB_KEY
{
DWORD
pubexp
;
CRYPT_INTEGER_BLOB
pubexp
;
CRYPT_INTEGER_BLOB
modulus
;
};
...
...
@@ -3893,12 +3893,23 @@ static BOOL CRYPT_raw_decode_rsa_pub_key(struct DECODED_RSA_PUB_KEY **decodedKey
FALSE
,
TRUE
,
offsetof
(
struct
DECODED_RSA_PUB_KEY
,
modulus
.
pbData
),
0
},
{
ASN_INTEGER
,
offsetof
(
struct
DECODED_RSA_PUB_KEY
,
pubexp
),
CRYPT_AsnDecodeIntInternal
,
sizeof
(
DWORD
),
FALSE
,
FALSE
,
0
,
0
},
CRYPT_AsnDecodeUnsignedIntegerInternal
,
sizeof
(
CRYPT_INTEGER_BLOB
),
FALSE
,
TRUE
,
offsetof
(
struct
DECODED_RSA_PUB_KEY
,
pubexp
.
pbData
),
0
},
};
ret
=
CRYPT_AsnDecodeSequence
(
items
,
ARRAY_SIZE
(
items
),
pbEncoded
,
cbEncoded
,
CRYPT_DECODE_ALLOC_FLAG
,
NULL
,
decodedKey
,
size
,
NULL
,
NULL
);
if
(
ret
&&
(
*
decodedKey
)
->
pubexp
.
cbData
>
sizeof
(
DWORD
))
{
WARN
(
"Unexpected exponent length %lu.
\n
"
,
(
*
decodedKey
)
->
pubexp
.
cbData
);
LocalFree
(
*
decodedKey
);
SetLastError
(
CRYPT_E_ASN1_LARGE
);
ret
=
FALSE
;
}
return
ret
;
}
...
...
@@ -3920,7 +3931,7 @@ static BOOL WINAPI CRYPT_AsnDecodeRsaPubKey_Bcrypt(DWORD dwCertEncodingType,
if
(
ret
)
{
/* Header, exponent, and modulus */
DWORD
bytesNeeded
=
sizeof
(
BCRYPT_RSAKEY_BLOB
)
+
sizeof
(
DWORD
)
+
DWORD
bytesNeeded
=
sizeof
(
BCRYPT_RSAKEY_BLOB
)
+
decodedKey
->
pubexp
.
cbData
+
decodedKey
->
modulus
.
cbData
;
if
(
!
pvStructInfo
)
...
...
@@ -3939,7 +3950,7 @@ static BOOL WINAPI CRYPT_AsnDecodeRsaPubKey_Bcrypt(DWORD dwCertEncodingType,
hdr
=
pvStructInfo
;
hdr
->
Magic
=
BCRYPT_RSAPUBLIC_MAGIC
;
hdr
->
BitLength
=
decodedKey
->
modulus
.
cbData
*
8
;
hdr
->
cbPublicExp
=
sizeof
(
DWORD
)
;
hdr
->
cbPublicExp
=
decodedKey
->
pubexp
.
cbData
;
hdr
->
cbModulus
=
decodedKey
->
modulus
.
cbData
;
hdr
->
cbPrime1
=
0
;
hdr
->
cbPrime2
=
0
;
...
...
@@ -3947,9 +3958,9 @@ static BOOL WINAPI CRYPT_AsnDecodeRsaPubKey_Bcrypt(DWORD dwCertEncodingType,
* in big-endian format, so we need to convert from little-endian
*/
CRYPT_CopyReversed
((
BYTE
*
)
pvStructInfo
+
sizeof
(
BCRYPT_RSAKEY_BLOB
),
(
BYTE
*
)
&
decodedKey
->
pubexp
,
sizeof
(
DWORD
)
);
decodedKey
->
pubexp
.
pbData
,
hdr
->
cbPublicExp
);
CRYPT_CopyReversed
((
BYTE
*
)
pvStructInfo
+
sizeof
(
BCRYPT_RSAKEY_BLOB
)
+
sizeof
(
DWORD
)
,
decodedKey
->
modulus
.
pbData
,
hdr
->
cbPublicExp
,
decodedKey
->
modulus
.
pbData
,
decodedKey
->
modulus
.
cbData
);
}
LocalFree
(
decodedKey
);
...
...
@@ -3984,13 +3995,13 @@ static BOOL WINAPI CRYPT_AsnDecodeRsaPubKey(DWORD dwCertEncodingType,
if
(
!
pvStructInfo
)
{
*
pcbStructInfo
=
bytesNeeded
;
ret
=
TRUE
;
}
else
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
)))
{
BLOBHEADER
*
hdr
;
RSAPUBKEY
*
rsaPubKey
;
unsigned
int
i
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
...
...
@@ -4002,7 +4013,11 @@ static BOOL WINAPI CRYPT_AsnDecodeRsaPubKey(DWORD dwCertEncodingType,
rsaPubKey
=
(
RSAPUBKEY
*
)((
BYTE
*
)
pvStructInfo
+
sizeof
(
BLOBHEADER
));
rsaPubKey
->
magic
=
RSA1_MAGIC
;
rsaPubKey
->
pubexp
=
decodedKey
->
pubexp
;
rsaPubKey
->
pubexp
=
0
;
assert
(
decodedKey
->
pubexp
.
cbData
<=
sizeof
(
rsaPubKey
->
pubexp
));
for
(
i
=
0
;
i
<
decodedKey
->
pubexp
.
cbData
;
++
i
)
rsaPubKey
->
pubexp
|=
decodedKey
->
pubexp
.
pbData
[
i
]
<<
(
i
*
8
);
rsaPubKey
->
bitlen
=
decodedKey
->
modulus
.
cbData
*
8
;
memcpy
((
BYTE
*
)
pvStructInfo
+
sizeof
(
BLOBHEADER
)
+
sizeof
(
RSAPUBKEY
),
decodedKey
->
modulus
.
pbData
,
...
...
dlls/crypt32/tests/encode.c
View file @
cc3fc9a4
...
...
@@ -2315,10 +2315,10 @@ static const BYTE modulus1[] = { 0,0,0,1,1,1,1,1 };
static
const
BYTE
modulus2
[]
=
{
1
,
1
,
1
,
1
,
1
,
0
,
0
,
0
};
static
const
BYTE
modulus3
[]
=
{
0x80
,
1
,
1
,
1
,
1
,
0
,
0
,
0
};
static
const
BYTE
modulus4
[]
=
{
1
,
1
,
1
,
1
,
1
,
0
,
0
,
0x80
};
static
const
BYTE
mod1_encoded
[]
=
{
0x30
,
0x0f
,
0x02
,
0x08
,
0x01
,
0x01
,
0x01
,
0x01
,
0x01
,
0x00
,
0x00
,
0x00
,
0x02
,
0x03
,
0x0
1
,
0x00
,
0x01
};
static
const
BYTE
mod2_encoded
[]
=
{
0x30
,
0x0c
,
0x02
,
0x05
,
0x01
,
0x01
,
0x01
,
0x01
,
0x01
,
0x02
,
0x03
,
0x0
1
,
0x00
,
0x01
};
static
const
BYTE
mod3_encoded
[]
=
{
0x30
,
0x0c
,
0x02
,
0x05
,
0x01
,
0x01
,
0x01
,
0x01
,
0x80
,
0x02
,
0x03
,
0x0
1
,
0x00
,
0x01
};
static
const
BYTE
mod4_encoded
[]
=
{
0x30
,
0x10
,
0x02
,
0x09
,
0x00
,
0x80
,
0x00
,
0x00
,
0x01
,
0x01
,
0x01
,
0x01
,
0x01
,
0x02
,
0x03
,
0x0
1
,
0x00
,
0x01
};
static
const
BYTE
mod1_encoded
[]
=
{
0x30
,
0x0f
,
0x02
,
0x08
,
0x01
,
0x01
,
0x01
,
0x01
,
0x01
,
0x00
,
0x00
,
0x00
,
0x02
,
0x03
,
0x0
2
,
0x00
,
0x01
};
static
const
BYTE
mod2_encoded
[]
=
{
0x30
,
0x0c
,
0x02
,
0x05
,
0x01
,
0x01
,
0x01
,
0x01
,
0x01
,
0x02
,
0x03
,
0x0
2
,
0x00
,
0x01
};
static
const
BYTE
mod3_encoded
[]
=
{
0x30
,
0x0c
,
0x02
,
0x05
,
0x01
,
0x01
,
0x01
,
0x01
,
0x80
,
0x02
,
0x03
,
0x0
2
,
0x00
,
0x01
};
static
const
BYTE
mod4_encoded
[]
=
{
0x30
,
0x10
,
0x02
,
0x09
,
0x00
,
0x80
,
0x00
,
0x00
,
0x01
,
0x01
,
0x01
,
0x01
,
0x01
,
0x02
,
0x03
,
0x0
2
,
0x00
,
0x01
};
struct
EncodedRSAPubKey
{
...
...
@@ -2351,7 +2351,7 @@ static void test_encodeRsaPublicKey(DWORD dwEncoding)
hdr
->
aiKeyAlg
=
CALG_RSA_KEYX
;
rsaPubKey
->
magic
=
0x31415352
;
rsaPubKey
->
bitlen
=
sizeof
(
modulus1
)
*
8
;
rsaPubKey
->
pubexp
=
65537
;
rsaPubKey
->
pubexp
=
131073
;
memcpy
(
toEncode
+
sizeof
(
BLOBHEADER
)
+
sizeof
(
RSAPUBKEY
),
modulus1
,
sizeof
(
modulus1
));
...
...
@@ -2480,7 +2480,7 @@ static void test_decodeRsaPublicKey(DWORD dwEncoding)
"Expected magic RSA1, got %08lx
\n
"
,
rsaPubKey
->
magic
);
ok
(
rsaPubKey
->
bitlen
==
rsaPubKeys
[
i
].
decodedModulusLen
*
8
,
"Wrong bit len %ld
\n
"
,
rsaPubKey
->
bitlen
);
ok
(
rsaPubKey
->
pubexp
==
65537
,
"Expected pubexp 65537
, got %ld
\n
"
,
ok
(
rsaPubKey
->
pubexp
==
131073
,
"Expected pubexp 131073
, got %ld
\n
"
,
rsaPubKey
->
pubexp
);
ok
(
!
memcmp
(
buf
+
sizeof
(
BLOBHEADER
)
+
sizeof
(
RSAPUBKEY
),
rsaPubKeys
[
i
].
modulus
,
rsaPubKeys
[
i
].
decodedModulusLen
),
...
...
@@ -2497,7 +2497,7 @@ static void test_encodeRsaPublicKey_Bcrypt(DWORD dwEncoding)
BOOL
ret
;
BYTE
*
buf
=
NULL
;
DWORD
bufSize
=
0
,
i
;
BYTE
pubexp
[]
=
{
0x01
,
0x00
,
0x0
1
,
0x00
};
/* 65537
*/
BYTE
pubexp
[]
=
{
0x01
,
0x00
,
0x0
2
,
0x00
};
/* 131073
*/
/* Verify that the Magic value doesn't matter */
hdr
->
Magic
=
1
;
...
...
@@ -2568,7 +2568,7 @@ static void test_decodeRsaPublicKey_Bcrypt(DWORD dwEncoding)
if
(
ret
)
{
BCRYPT_RSAKEY_BLOB
*
hdr
=
(
BCRYPT_RSAKEY_BLOB
*
)
buf
;
BYTE
pubexp
[]
=
{
0xff
,
0xff
,
0xff
,
0x
ff
},
pubexp_expected
[]
=
{
0x01
,
0x00
,
0x01
};
BYTE
pubexp
[]
=
{
0xff
,
0xff
,
0xff
,
0x
cc
},
pubexp_expected
[]
=
{
0x01
,
0x00
,
0x02
};
/* CNG_RSA_PUBLIC_KEY_BLOB stores the exponent
* in big-endian format, so we need to convert it to little-endian
*/
...
...
@@ -2584,13 +2584,13 @@ static void test_decodeRsaPublicKey_Bcrypt(DWORD dwEncoding)
/* Windows decodes the exponent to 3 bytes, since it will fit.
* Our implementation currently unconditionally decodes to a DWORD (4 bytes)
*/
todo_wine
ok
(
hdr
->
cbPublicExp
==
3
,
"Expected cbPublicExp 3, got %ld
\n
"
,
hdr
->
cbPublicExp
);
ok
(
hdr
->
cbPublicExp
==
3
,
"Expected cbPublicExp 3, got %ld
\n
"
,
hdr
->
cbPublicExp
);
ok
(
hdr
->
cbModulus
==
rsaPubKeys
[
i
].
decodedModulusLen
,
"Wrong modulus len %ld
\n
"
,
hdr
->
cbModulus
);
ok
(
hdr
->
cbPrime1
==
0
,
"Wrong cbPrime1 %ld
\n
"
,
hdr
->
cbPrime1
);
ok
(
hdr
->
cbPrime2
==
0
,
"Wrong cbPrime2 %ld
\n
"
,
hdr
->
cbPrime2
);
ok
(
!
memcmp
(
pubexp
,
pubexp_expected
,
sizeof
(
pubexp_expected
)),
"Wrong exponent
\n
"
);
todo_wine
ok
(
pubexp
[
3
]
==
0xff
,
"Got %02x
\n
"
,
pubexp
[
3
]);
ok
(
pubexp
[
3
]
==
0xcc
,
"Got %02x
\n
"
,
pubexp
[
3
]);
leModulus
=
malloc
(
hdr
->
cbModulus
);
/*
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment