summaryrefslogtreecommitdiff
path: root/crypto/ec/ecp_oct.c
diff options
context:
space:
mode:
authorEmilia Kasper <emilia@openssl.org>2016-06-03 14:42:04 +0200
committerEmilia Kasper <emilia@openssl.org>2016-06-09 23:58:20 +0200
commit1e2012b7ff4a5f12273446b281775faa5c8a1858 (patch)
tree0eef527bc87b307739f309ae8dadc0b40b393552 /crypto/ec/ecp_oct.c
parent6670d55a847f8f2415842bc085150e838d4aac5d (diff)
downloadopenssl-new-1e2012b7ff4a5f12273446b281775faa5c8a1858.tar.gz
RT 4242: reject invalid EC point coordinates
We already test in EC_POINT_oct2point that points are on the curve. To be on the safe side, move this check to EC_POINT_set_affine_coordinates_* so as to also check point coordinates received through some other method. We do not check projective coordinates, though, as - it's unlikely that applications would be receiving this primarily internal representation from untrusted sources, and - it's possible that the projective setters are used in a setting where performance matters. Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'crypto/ec/ecp_oct.c')
-rw-r--r--crypto/ec/ecp_oct.c10
1 files changed, 4 insertions, 6 deletions
diff --git a/crypto/ec/ecp_oct.c b/crypto/ec/ecp_oct.c
index 299f8c5a49..4d142a4ab9 100644
--- a/crypto/ec/ecp_oct.c
+++ b/crypto/ec/ecp_oct.c
@@ -355,16 +355,14 @@ int ec_GFp_simple_oct2point(const EC_GROUP *group, EC_POINT *point,
}
}
+ /*
+ * EC_POINT_set_affine_coordinates_GFp is responsible for checking that
+ * the point is on the curve.
+ */
if (!EC_POINT_set_affine_coordinates_GFp(group, point, x, y, ctx))
goto err;
}
- /* test required by X9.62 */
- if (EC_POINT_is_on_curve(group, point, ctx) <= 0) {
- ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_POINT_IS_NOT_ON_CURVE);
- goto err;
- }
-
ret = 1;
err: