diff --git a/lib/internal/crypto/pbkdf2.js b/lib/internal/crypto/pbkdf2.js index 986ea557d63bf3..a9b5b1590f3b21 100644 --- a/lib/internal/crypto/pbkdf2.js +++ b/lib/internal/crypto/pbkdf2.js @@ -15,6 +15,7 @@ const { const { validateFunction, + validateInt32, validateInteger, validateString, validateUint32, @@ -91,8 +92,10 @@ function check(password, salt, iterations, keylen, digest) { password = getArrayBufferOrView(password, 'password'); salt = getArrayBufferOrView(salt, 'salt'); - validateUint32(iterations, 'iterations', true); - validateUint32(keylen, 'keylen'); + // OpenSSL uses a signed int to represent these values, so we are restricted + // to the 31-bit range here (which is plenty). + validateInt32(iterations, 'iterations', 1); + validateInt32(keylen, 'keylen', 0); return { password, salt, iterations, keylen, digest }; } diff --git a/test/parallel/test-crypto-pbkdf2.js b/test/parallel/test-crypto-pbkdf2.js index c4dbedcb59160f..1f8e6a81f300e7 100644 --- a/test/parallel/test-crypto-pbkdf2.js +++ b/test/parallel/test-crypto-pbkdf2.js @@ -63,7 +63,7 @@ assert.throws( } ); -for (const iterations of [-1, 0]) { +for (const iterations of [-1, 0, 2147483648]) { assert.throws( () => crypto.pbkdf2Sync('password', 'salt', iterations, 20, 'sha1'), { @@ -98,7 +98,7 @@ for (const iterations of [-1, 0]) { }); }); -[-1, 4294967297].forEach((input) => { +[-1, 2147483648, 4294967296].forEach((input) => { assert.throws( () => { crypto.pbkdf2('password', 'salt', 1, input, 'sha256',