Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/test rsa pkcs1 #48

Merged
merged 32 commits into from Aug 28, 2014
Merged

Feature/test rsa pkcs1 #48

merged 32 commits into from Aug 28, 2014

Conversation

sjaeckel
Copy link
Member

I've added the PKCS#1 test vectors (EMSA, EME, PSS & OAEP) provided by RSA
Applied a bugfix to the PKCS#1 PSS code that was fixed in the OLPC fork
Added a testcase and fixed the Bleichbacher Signature attack for PKCS#1 1.5 EMSA

Any comments?

sjaeckel and others added 30 commits August 28, 2014 13:30
a PRNG that is no PRNG as its output is predefined and can be set
by calling add_entropy()
The existing LTC code for padding meassages for PSS signatures
contained a small error. In particular, the PSS-passing algorithms is
supposed to be given (bitlength of key - 1) as an argument. The LTC
code passes (bitlength of key), and subtracts 1 in the middle of the
PSS-padding. This subtraction unfortunately comes too late: a
calculation using that argument has already been made. Fortunately,
this bug only appeared if the bit-length of the key was 1 mod 8, and
so is unlikely to show up in practice. Still, this patch fixes the
problem.

Conflicts:
	src/pk/pkcs1/pkcs_1_pss_decode.c
also test for too short padding strings
@sjaeckel sjaeckel merged commit efc6844 into develop Aug 28, 2014
sjaeckel added a commit that referenced this pull request Aug 28, 2014
@sjaeckel sjaeckel deleted the feature/testRsaPkcs1 branch August 28, 2014 11:36
@sjaeckel sjaeckel modified the milestone: v2.0.0 Feb 21, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants