diff options
author | Wladimir J. van der Laan <laanwj@gmail.com> | 2015-01-12 11:05:04 +0100 |
---|---|---|
committer | Wladimir J. van der Laan <laanwj@gmail.com> | 2015-01-12 11:05:04 +0100 |
commit | f19dded6e4bf6b5a345de899863310281846eb61 (patch) | |
tree | a4d634f2d1b44633baa39edd1a0b0d0f683d8264 | |
parent | 91e1332011ca647362f95f34ae6c530640bfef98 (diff) |
Improve robustness of DER recoding code
Add some defensive programming on top of #5634.
This copies the respective OpenSSL code in ECDSA_verify in
OpenSSL pre-1.0.1k (e.g. https://github.com/openssl/openssl/blob/OpenSSL_1_0_1j/crypto/ecdsa/ecs_vrf.c#L89)
more closely.
As reported by @sergiodemianlerner.
Github-Pull: #5640
Rebased-From: c6b7b29f232c651f898eeffb93f36c8f537c56d2
-rw-r--r-- | src/key.cpp | 13 |
1 files changed, 12 insertions, 1 deletions
diff --git a/src/key.cpp b/src/key.cpp index 7fcb17d574..2b25308fe5 100644 --- a/src/key.cpp +++ b/src/key.cpp @@ -383,7 +383,18 @@ bool CKey::Verify(uint256 hash, const std::vector<unsigned char>& vchSig) unsigned char *norm_der = NULL; ECDSA_SIG *norm_sig = ECDSA_SIG_new(); const unsigned char* sigptr = &vchSig[0]; - d2i_ECDSA_SIG(&norm_sig, &sigptr, vchSig.size()); + assert(norm_sig); + if (d2i_ECDSA_SIG(&norm_sig, &sigptr, vchSig.size()) == NULL) + { + /* As of OpenSSL 1.0.0p d2i_ECDSA_SIG frees and nulls the pointer on + * error. But OpenSSL's own use of this function redundantly frees the + * result. As ECDSA_SIG_free(NULL) is a no-op, and in the absence of a + * clear contract for the function behaving the same way is more + * conservative. + */ + ECDSA_SIG_free(norm_sig); + return false; + } int derlen = i2d_ECDSA_SIG(norm_sig, &norm_der); ECDSA_SIG_free(norm_sig); if (derlen <= 0) |