13053eadb0
- Added nss-bmo1930797.patch to fix failing tests in testsuite - update to NSS 3.106 * bmo#1925975 - NSS 3.106 should be distributed with NSPR 4.36. * bmo#1923767 - pk12util: improve error handling in p12U_ReadPKCS12File. * bmo#1899402 - Correctly destroy bulkkey in error scenario. * bmo#1919997 - PKCS7 fuzz target, r=djackson,nss-reviewers. * bmo#1923002 - Extract certificates with handshake collection script. * bmo#1923006 - Specify len_control for fuzz targets. * bmo#1923280 - Fix memory leak in dumpCertificatePEM. * bmo#1102981 - Fix UBSan errors for SECU_PrintCertificate and SECU_PrintCertificateBasicInfo. * bmo#1921528 - add new error codes to mozilla::pkix for Firefox to use. * bmo#1921768 - allow null phKey in NSC_DeriveKey. * bmo#1921801 - Only create seed corpus zip from existing corpus. * bmo#1826035 - Use explicit allowlist for for KDF PRFS. * bmo#1920138 - Increase optimization level for fuzz builds. * bmo#1920470 - Remove incorrect assert. * bmo#1914870 - Use libFuzzer options from fuzz/options/\*.options in CI. * bmo#1920945 - Polish corpus collection for automation. * bmo#1917572 - Detect new and unfuzzed SSL options. * bmo#1804646 - PKCS12 fuzzing target. - requires NSPR 4.36 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=465
53 lines
1.4 KiB
Diff
53 lines
1.4 KiB
Diff
commit 3ab80b72e85583bd727730bc5b57f91e07b89710
|
|
Author: Hans Petter Jansson <hpj@cl.no>
|
|
Date: Fri Sep 4 13:41:34 2020 +0200
|
|
|
|
Patch 38: nss-fips-stricter-dh.patch
|
|
|
|
Index: nss/lib/freebl/dh.c
|
|
===================================================================
|
|
--- nss.orig/lib/freebl/dh.c
|
|
+++ nss/lib/freebl/dh.c
|
|
@@ -449,7 +449,7 @@ cleanup:
|
|
PRBool
|
|
KEA_Verify(SECItem *Y, SECItem *prime, SECItem *subPrime)
|
|
{
|
|
- mp_int p, q, y, r;
|
|
+ mp_int p, q, y, r, psub1;
|
|
mp_err err;
|
|
int cmp = 1; /* default is false */
|
|
if (!Y || !prime || !subPrime) {
|
|
@@ -460,13 +460,24 @@ KEA_Verify(SECItem *Y, SECItem *prime, S
|
|
MP_DIGITS(&q) = 0;
|
|
MP_DIGITS(&y) = 0;
|
|
MP_DIGITS(&r) = 0;
|
|
+ MP_DIGITS(&psub1) = 0;
|
|
CHECK_MPI_OK(mp_init(&p));
|
|
CHECK_MPI_OK(mp_init(&q));
|
|
CHECK_MPI_OK(mp_init(&y));
|
|
CHECK_MPI_OK(mp_init(&r));
|
|
+ CHECK_MPI_OK(mp_init(&psub1));
|
|
SECITEM_TO_MPINT(*prime, &p);
|
|
SECITEM_TO_MPINT(*subPrime, &q);
|
|
SECITEM_TO_MPINT(*Y, &y);
|
|
+
|
|
+ CHECK_MPI_OK(mp_sub_d(&p, 1, &psub1));
|
|
+
|
|
+ if (mp_cmp_d(&y, 1) <= 0 ||
|
|
+ mp_cmp(&y, &psub1) >= 0) {
|
|
+ err = MP_BADARG;
|
|
+ goto cleanup;
|
|
+ }
|
|
+
|
|
/* compute r = y**q mod p */
|
|
CHECK_MPI_OK(mp_exptmod(&y, &q, &p, &r));
|
|
/* compare to 1 */
|
|
@@ -476,6 +487,7 @@ cleanup:
|
|
mp_clear(&q);
|
|
mp_clear(&y);
|
|
mp_clear(&r);
|
|
+ mp_clear(&psub1);
|
|
if (err) {
|
|
MP_TO_SEC_ERROR(err);
|
|
return PR_FALSE;
|