Skip to content

Commit 519e7ae

Browse files
committed
Avoid changing signature of RSA._decrypt() method if possible
1 parent 1aa9dca commit 519e7ae

File tree

7 files changed

+18
-9
lines changed

7 files changed

+18
-9
lines changed

lib/Crypto/Cipher/PKCS1_OAEP.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ def decrypt(self, ciphertext):
168168
# Step 2a (O2SIP)
169169
ct_int = bytes_to_long(ciphertext)
170170
# Step 2b (RSADP) and step 2c (I2OSP)
171-
em = self._key._decrypt(ct_int)
171+
em = self._key._decrypt_to_bytes(ct_int)
172172
# Step 3a
173173
lHash = self._hashObj.new(self._label).digest()
174174
# Step 3b

lib/Crypto/Cipher/PKCS1_v1_5.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ def decrypt(self, ciphertext, sentinel, expected_pt_len=0):
177177
ct_int = bytes_to_long(ciphertext)
178178

179179
# Step 2b (RSADP) and Step 2c (I2OSP)
180-
em = self._key._decrypt(ct_int)
180+
em = self._key._decrypt_to_bytes(ct_int)
181181

182182
# Step 3 (not constant time when the sentinel is not a byte string)
183183
output = bytes(bytearray(k))

lib/Crypto/PublicKey/RSA.py

+6-1
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ def _encrypt(self, plaintext):
181181
raise ValueError("Plaintext too large")
182182
return int(pow(Integer(plaintext), self._e, self._n))
183183

184-
def _decrypt(self, ciphertext):
184+
def _decrypt_to_bytes(self, ciphertext):
185185
if not 0 <= ciphertext < self._n:
186186
raise ValueError("Ciphertext too large")
187187
if not self.has_private():
@@ -206,6 +206,11 @@ def _decrypt(self, ciphertext):
206206
self._n)
207207
return result
208208

209+
def _decrypt(self, ciphertext):
210+
"""Legacy private method"""
211+
212+
return bytes_to_long(self._decrypt_to_bytes(ciphertext))
213+
209214
def has_private(self):
210215
"""Whether this is an RSA private key"""
211216

lib/Crypto/SelfTest/PublicKey/test_RSA.py

+6-2
Original file line numberDiff line numberDiff line change
@@ -214,9 +214,11 @@ def test_raw_rsa_boundary(self):
214214
rsa_obj = self.rsa.generate(1024)
215215

216216
self.assertRaises(ValueError, rsa_obj._decrypt, rsa_obj.n)
217+
self.assertRaises(ValueError, rsa_obj._decrypt_to_bytes, rsa_obj.n)
217218
self.assertRaises(ValueError, rsa_obj._encrypt, rsa_obj.n)
218219

219220
self.assertRaises(ValueError, rsa_obj._decrypt, -1)
221+
self.assertRaises(ValueError, rsa_obj._decrypt_to_bytes, -1)
220222
self.assertRaises(ValueError, rsa_obj._encrypt, -1)
221223

222224
def test_size(self):
@@ -265,6 +267,8 @@ def _check_public_key(self, rsaObj):
265267
# Public keys should not be able to sign or decrypt
266268
self.assertRaises(TypeError, rsaObj._decrypt,
267269
bytes_to_long(ciphertext))
270+
self.assertRaises(TypeError, rsaObj._decrypt_to_bytes,
271+
bytes_to_long(ciphertext))
268272

269273
# Check __eq__ and __ne__
270274
self.assertEqual(rsaObj.public_key() == rsaObj.public_key(),True) # assert_
@@ -279,7 +283,7 @@ def _exercise_primitive(self, rsaObj):
279283
ciphertext = bytes_to_long(a2b_hex(self.ciphertext))
280284

281285
# Test decryption
282-
plaintext = bytes_to_long(rsaObj._decrypt(ciphertext))
286+
plaintext = rsaObj._decrypt(ciphertext)
283287

284288
# Test encryption (2 arguments)
285289
new_ciphertext2 = rsaObj._encrypt(plaintext)
@@ -304,7 +308,7 @@ def _check_decryption(self, rsaObj):
304308
ciphertext = bytes_to_long(a2b_hex(self.ciphertext))
305309

306310
# Test plain decryption
307-
new_plaintext = bytes_to_long(rsaObj._decrypt(ciphertext))
311+
new_plaintext = rsaObj._decrypt(ciphertext)
308312
self.assertEqual(plaintext, new_plaintext)
309313

310314

lib/Crypto/SelfTest/PublicKey/test_import_RSA.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -239,13 +239,13 @@ def testImportKey4bytes(self):
239239
def testImportKey5(self):
240240
"""Verifies that the imported key is still a valid RSA pair"""
241241
key = RSA.importKey(self.rsaKeyPEM)
242-
idem = key._encrypt(bytes_to_long(key._decrypt(89)))
242+
idem = key._encrypt(key._decrypt(89))
243243
self.assertEqual(idem, 89)
244244

245245
def testImportKey6(self):
246246
"""Verifies that the imported key is still a valid RSA pair"""
247247
key = RSA.importKey(self.rsaKeyDER)
248-
idem = key._encrypt(bytes_to_long(key._decrypt(65)))
248+
idem = key._encrypt(key._decrypt(65))
249249
self.assertEqual(idem, 65)
250250

251251
def testImportKey7(self):

lib/Crypto/Signature/pkcs1_15.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ def sign(self, msg_hash):
7878
# Step 2a (OS2IP)
7979
em_int = bytes_to_long(em)
8080
# Step 2b (RSASP1) and Step 2c (I2OSP)
81-
signature = self._key._decrypt(em_int)
81+
signature = self._key._decrypt_to_bytes(em_int)
8282
# Verify no faults occurred
8383
if em_int != pow(bytes_to_long(signature), self._key.e, self._key.n):
8484
raise ValueError("Fault detected in RSA private key operation")

lib/Crypto/Signature/pss.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ def sign(self, msg_hash):
108108
# Step 2a (OS2IP)
109109
em_int = bytes_to_long(em)
110110
# Step 2b (RSASP1) and Step 2c (I2OSP)
111-
signature = self._key._decrypt(em_int)
111+
signature = self._key._decrypt_to_bytes(em_int)
112112
# Verify no faults occurred
113113
if em_int != pow(bytes_to_long(signature), self._key.e, self._key.n):
114114
raise ValueError("Fault detected in RSA private key operation")

0 commit comments

Comments
 (0)