mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-02 22:46:30 +02:00
gpg: Fix the encrypt+sign hash algo preference selection for ECDSA.
* g10/keydb.h (pref_hint): Change from union to struct and add field
'exact'. Adjust callers.
* g10/pkclist.c (algo_available): Take care of the exact hint.
* g10/sign.c (sign_file): Rework the hash detection from
recipient prefs.
--
This fixes a encrypt+sign case like: One recipient key has SHA512 as
highest ranked hash preference but the the signing key is a 256 bit
curve. Because we don't want to use a truncated hash with ECDSA, we
need to have an exact match - this is in particular important for
smartcard which check that the hash matches the curves.
Signed-off-by: Werner Koch <wk@gnupg.org>
Ported-from-stable: aeed0b93ff
This commit is contained in:
parent
e546cc78b7
commit
e37c2e1844
4 changed files with 58 additions and 35 deletions
63
g10/sign.c
63
g10/sign.c
|
@ -997,13 +997,14 @@ write_signature_packets (ctrl_t ctrl,
|
|||
|
||||
|
||||
/*
|
||||
* Sign the files whose names are in FILENAME.
|
||||
* If DETACHED has the value true,
|
||||
* make a detached signature. If FILENAMES->d is NULL read from stdin
|
||||
* and ignore the detached mode. Sign the file with all secret keys
|
||||
* which can be taken from LOCUSR, if this is NULL, use the default one
|
||||
* Sign the files whose names are in FILENAME usingall secret keys
|
||||
* which can be taken from LOCUSR, if this is NULL, use the default
|
||||
* secret key.
|
||||
* If DETACHED has the value true, make a detached signature.
|
||||
* If ENCRYPTFLAG is true, use REMUSER (or ask if it is NULL) to encrypt the
|
||||
* signed data for these users.
|
||||
* signed data for these users. If ENCRYPTFLAG is 2 symmetric encryption
|
||||
* is also used.
|
||||
* If FILENAMES->d is NULL read from stdin and ignore the detached mode.
|
||||
* If OUTFILE is not NULL; this file is used for output and the function
|
||||
* does not ask for overwrite permission; output is then always
|
||||
* uncompressed, non-armored and in binary mode.
|
||||
|
@ -1151,8 +1152,8 @@ sign_file (ctrl_t ctrl, strlist_t filenames, int detached, strlist_t locusr,
|
|||
else
|
||||
{
|
||||
int algo;
|
||||
int smartcard=0;
|
||||
union pref_hint hint;
|
||||
int conflict = 0;
|
||||
struct pref_hint hint = { 0 };
|
||||
|
||||
hint.digest_length = 0;
|
||||
|
||||
|
@ -1180,29 +1181,39 @@ sign_file (ctrl_t ctrl, strlist_t filenames, int detached, strlist_t locusr,
|
|||
int temp_hashlen = gcry_mpi_get_nbits (sk_rover->pk->pkey[1]);
|
||||
|
||||
if (sk_rover->pk->pubkey_algo == PUBKEY_ALGO_ECDSA)
|
||||
temp_hashlen = ecdsa_qbits_from_Q (temp_hashlen);
|
||||
{
|
||||
temp_hashlen = ecdsa_qbits_from_Q (temp_hashlen);
|
||||
if (!temp_hashlen)
|
||||
conflict = 1; /* Better don't use the prefs. */
|
||||
temp_hashlen = (temp_hashlen+7)/8;
|
||||
/* Fixup for that funny nistp521 (yes, 521) were
|
||||
* we need to use a 512 bit hash algo. */
|
||||
if (temp_hashlen == 66)
|
||||
temp_hashlen = 64;
|
||||
}
|
||||
else
|
||||
temp_hashlen = (temp_hashlen+7)/8;
|
||||
|
||||
temp_hashlen = (temp_hashlen+7)/8;
|
||||
|
||||
/* Pick a hash that is large enough for our largest Q */
|
||||
/* Pick a hash that is large enough for our largest
|
||||
* Q or matches our Q. If there are several of them
|
||||
* we run into a conflict and don't use the
|
||||
* preferences. */
|
||||
if (hint.digest_length < temp_hashlen)
|
||||
hint.digest_length = temp_hashlen;
|
||||
{
|
||||
if (sk_rover->pk->pubkey_algo == PUBKEY_ALGO_ECDSA)
|
||||
{
|
||||
if (hint.exact)
|
||||
conflict = 1;
|
||||
hint.exact = 1;
|
||||
}
|
||||
hint.digest_length = temp_hashlen;
|
||||
}
|
||||
}
|
||||
/* FIXME: need to check gpg-agent for this. */
|
||||
/* else if (sk_rover->pk->is_protected */
|
||||
/* && sk_rover->pk->protect.s2k.mode == 1002) */
|
||||
/* smartcard = 1; */
|
||||
}
|
||||
|
||||
/* Current smartcards only do 160-bit hashes. If we have
|
||||
* to have a >160-bit hash, then we can't use the
|
||||
* recipient prefs as we'd need both =160 and >160 at the
|
||||
* same time and recipient prefs currently require a
|
||||
* single hash for all signatures. All this may well have
|
||||
* to change as the cards add algorithms. */
|
||||
if ((!smartcard || (smartcard && hint.digest_length==20))
|
||||
&& ((algo = select_algo_from_prefs (pk_list, PREFTYPE_HASH,
|
||||
-1, &hint)) > 0))
|
||||
if (!conflict
|
||||
&& (algo = select_algo_from_prefs (pk_list, PREFTYPE_HASH,
|
||||
-1, &hint)) > 0)
|
||||
{
|
||||
/* Note that we later check that the algo is not weak. */
|
||||
recipient_digest_algo = algo;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue