Skip to content

Fixes brainpool sign/verify bug. Closing issue #854#948

Merged
twiss merged 2 commits intoopenpgpjs:masterfrom
chesnokovilya:brainpool-bug
Aug 23, 2019
Merged

Fixes brainpool sign/verify bug. Closing issue #854#948
twiss merged 2 commits intoopenpgpjs:masterfrom
chesnokovilya:brainpool-bug

Conversation

@chesnokovilya
Copy link
Copy Markdown
Contributor

@chesnokovilya chesnokovilya commented Aug 16, 2019

Update elliptic to the version with correct signature creation and verification in the case of leading zero in hash.
Closing issue #854

@larabr
Copy link
Copy Markdown
Collaborator

larabr commented Oct 6, 2023

For future ref, the fixes are in openpgpjs/elliptic#2 and openpgpjs/elliptic#3 .

larabr added a commit to larabr/openpgpjs that referenced this pull request Oct 6, 2023
… by old lib bug

At some point we used to generate invalid ECDSA sigs with the js (non-native) elliptic lib,
if the signature digest had leading zeros: openpgpjs#948 .

Brainpool curves are the most likely to have been affected by the bug, since they do not
have WebCrypto support (unlike NIST curves).
This commit reintroduces support on web to verify such invalid signatures
(support for this was previously built-in in the indutny-elliptic library).
It also expands the fix to work in Node.
larabr added a commit to larabr/openpgpjs that referenced this pull request Oct 23, 2023
… by old lib bug

At some point we used to generate invalid ECDSA sigs with the js (non-native) elliptic lib,
if the signature digest had leading zeros: openpgpjs#948 .

Brainpool curves are the most likely to have been affected by the bug, since they do not
have WebCrypto support (unlike NIST curves).
This commit reintroduces support on web to verify such invalid signatures
(support for this was previously built-in in the indutny-elliptic library).
It also expands the fix to work in Node.
larabr added a commit that referenced this pull request Oct 23, 2023
… by old lib bug

At some point we used to generate invalid ECDSA sigs with the js (non-native) elliptic lib,
if the signature digest had leading zeros: #948 .

Brainpool curves are the most likely to have been affected by the bug, since they do not
have WebCrypto support (unlike NIST curves).
This commit reintroduces support on web to verify such invalid signatures
(support for this was previously built-in in the indutny-elliptic library).
It also expands the fix to work in Node.
larabr added a commit that referenced this pull request Oct 24, 2023
… by old lib bug

At some point we used to generate invalid ECDSA sigs with the js (non-native) elliptic lib,
if the signature digest had leading zeros: #948 .

Brainpool curves are the most likely to have been affected by the bug, since they do not
have WebCrypto support (unlike NIST curves).
This commit reintroduces support on web to verify such invalid signatures
(support for this was previously built-in in the indutny-elliptic library).
It also expands the fix to work in Node.
larabr added a commit that referenced this pull request Oct 25, 2023
… by old lib bug

At some point we used to generate invalid ECDSA sigs with the js (non-native) elliptic lib,
if the signature digest had leading zeros: #948 .

Brainpool curves are the most likely to have been affected by the bug, since they do not
have WebCrypto support (unlike NIST curves).
This commit reintroduces support on web to verify such invalid signatures
(support for this was previously built-in in the indutny-elliptic library).
It also expands the fix to work in Node.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants