summaryrefslogtreecommitdiff
path: root/lib/libcrypto/dsa
diff options
context:
space:
mode:
authorTheo Buehler <tb@cvs.openbsd.org>2023-03-11 15:29:04 +0000
committerTheo Buehler <tb@cvs.openbsd.org>2023-03-11 15:29:04 +0000
commit57c815c8dcfe47595dc401bf0e72f25c0f752d2a (patch)
tree5a9cc599a0cda38ab08b5856119cba8fd651717b /lib/libcrypto/dsa
parent9b8245fc3a5383e3758568cd1d4a549a5ad57d33 (diff)
Fix an off-by-one in dsa_check_key()
The private key is a random number in [1, q-1], so 1 must be allowed. Since q is at least an 160-bit prime and 2^159 + 1 is not prime (159 is not a power of 2), the probability that this is hit is < 2^-159, but a tiny little bit wrong is still wrong. Found while investigating a report by bluhm ok jsing
Diffstat (limited to 'lib/libcrypto/dsa')
-rw-r--r--lib/libcrypto/dsa/dsa_lib.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/lib/libcrypto/dsa/dsa_lib.c b/lib/libcrypto/dsa/dsa_lib.c
index 1a6ca54da12..6986f9ad6ba 100644
--- a/lib/libcrypto/dsa/dsa_lib.c
+++ b/lib/libcrypto/dsa/dsa_lib.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: dsa_lib.c,v 1.41 2023/03/07 09:27:10 jsing Exp $ */
+/* $OpenBSD: dsa_lib.c,v 1.42 2023/03/11 15:29:03 tb Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -487,7 +487,7 @@ dsa_check_key(const DSA *dsa)
/* The private key must be nonzero and in GF(q). */
if (dsa->priv_key != NULL) {
- if (BN_cmp(dsa->priv_key, BN_value_one()) <= 0 ||
+ if (BN_cmp(dsa->priv_key, BN_value_one()) < 0 ||
BN_cmp(dsa->priv_key, dsa->q) >= 0) {
DSAerror(DSA_R_INVALID_PARAMETERS);
return 0;