1. 27 May, 2015 1 commit
  2. 26 May, 2015 1 commit
  3. 29 Apr, 2015 1 commit
  4. 08 Apr, 2015 1 commit
  5. 10 Mar, 2015 1 commit
  6. 06 Mar, 2015 1 commit
  7. 10 Feb, 2015 1 commit
  8. 28 Jan, 2015 1 commit
  9. 23 Jan, 2015 4 commits
  10. 22 Jan, 2015 1 commit
  11. 17 Jun, 2014 2 commits
  12. 01 May, 2014 1 commit
  13. 25 Apr, 2014 1 commit
  14. 26 Mar, 2014 1 commit
    • Paul Bakker's avatar
      Add a check for buffer overflow to pkcs11_sign() · db1f0598
      Paul Bakker authored
      pkcs11_sign() reuses *sig to store the header and hash, but those might
      be larger than the actual sig, causing a buffer overflow.
      
      An overflow can occur when using raw sigs with hashlen > siglen, or when
      the RSA key is less than 664 bits long (or less when using hashes
      shorter than SHA512)
      
      As siglen is always within the 'low realm' < 32k, an overflow of asnlen
      + hashlen is not possible.
      db1f0598
  15. 06 Feb, 2014 1 commit
  16. 20 Nov, 2013 1 commit
  17. 18 Sep, 2013 1 commit
  18. 03 Jul, 2013 1 commit
  19. 14 Nov, 2012 2 commits
  20. 24 Apr, 2011 1 commit
  21. 18 Jan, 2011 2 commits