Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-26325

Hitting OpenSSL 3.0.7 EC export bug with 3rd party HSM provider

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: Normal Normal
    • None
    • rhel-9.3.0
    • openssl
    • None
    • None
    • 1
    • rhel-sst-security-crypto
    • ssg_security
    • 0.5
    • False
    • Hide

      None

      Show
      None
    • None
    • Red Hat Enterprise Linux
    • Crypto24Q2
    • None
    • None
    • x86_64
    • None

      What were you trying to do that didn't work?

      Use 3rd party HSM provider for private keys with the OpenSSL 3.0.7

      Please provide the package NVR for which bug is seen:

      openssl-3.0.7-25

      How reproducible:

      always

      Steps to reproduce

      1. openssl s_server -cert APemFile -key pkcs11:type=private;object=APrivateKey
      2. use libsofthsm2.so as HSM and pkcs11-provider as 3rd party provider
      3.  

      Expected results

      s_server willl load

      Actual results

      s_server fails to load: the public key from the cert is passed to pkcs11-provider to verify consistency with the private key. Ths export is compressed by the metadata claims uncompressed to the 3rd party provider receives a corrupt data stream.

       

      This is fixed in 3.0.8

      • Our provider implementations of `OSSL_FUNC_KEYMGMT_EXPORT` and `OSSL_FUNC_KEYMGMT_GET_PARAMS` for EC and SM2 keys now honor `OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT` as set (and default to `POINT_CONVERSION_UNCOMPRESSED`) when exporting `OSSL_PKEY_PARAM_PUB_KEY`, instead of unconditionally using `POINT_CONVERSION_COMPRESSED` as in previous 3.x releases. For symmetry, our implementation of `EVP_PKEY_ASN1_METHOD->export_to` for legacy EC and SM2 keys is also changed similarly to honor the equivalent conversion format flag as specified in the underlying `EC_KEY` object being exported to a provider, when this function is called through `EVP_PKEY_export()`.r

       

              cllang@redhat.com Clemens Lang
              beaver6675 Richard Chan (Inactive)
              Dmitry Belyavskiy Dmitry Belyavskiy
              SSG Security QE SSG Security QE
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: