Bonjour,

Le 02/04/2012 13:21, Tamir Khason via RT a écrit :
> There is a bug in ASN.1 DER serializer used to generate RSA private
> keys. It trims trailing zeros despite the DER specification. Please
> see the full info and reproduction steps in my blog
> http://khason.net/dev/openssl-bug-or-why-some-private-keys-cannot-be-used-for-net/#comments
>

You're wrong. You're mixing things, length encoding and value encoding 
(as in TLV).

In DER, there's no "indefinite length" objects, because the purpose of 
DER is to have the only one non ambiguous representation of an object. 
Since an "indefinite length" (i.e. not known in advance) object can also 
be represented by its "definite length" counterpart by rewriting it once 
the object length is known, then an "indefinite length" can't be the 
only one representation of this object.

Next, when writing a DER object, its serialization needs to be unique. A 
set of rules are applied to enforce this. For integers, these rules tell 
us that the lowest number of bytes need to be used, also ensuring that 
negative numbers are expressed in 2s complement form (highest bit set to 
1). Therefore, while you can express the number 0x32 as the following 
serialization forms all representing the same number:
   32
   0032
   000032
only the first representation is a DER one. The others encode the same 
value, but with useless leading bytes.

Negative numbers cannot have a heading 00 octet, because the highest 
order bit would then be equal to 0, and the number considered positive.

Therefore, the number 0x92 can be serialized as:
   92
   0092
   000092
only the second form is a DER one. The first has its highest order bit 
set to 1, the number considered negative, its value is then -0x6E. The 
third form has an unnecessary leading 00 octet.

Of course, adding trailing 00 octets are forbidden, this would 
completely change the encoded number. Like writing "70" is not the same 
as writing "7".

In your "bad" example key, exponent2's length is smaller than 
exponent1's and coefficient's ones. They're not guaranteed to be of the 
same length. Exponent{1,2} and coefficient are results of calculations 
("d mod (p-1)", "d mod (q-1)", "q^-1 mod p" respectively), and their 
magnitude can vary.
Any "a mod b" number cannot be the same size of "b" (consider for 
example "2^32+1 mod 2^32", it's not a 32 bits integer).

If your "bad" key cannot be used in .NET, there's another reason.

-- 
Erwann ABALEA
-----
podoclaste: casse-pieds


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to