- 04 Apr, 2014 19 commits
-
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Paul Bakker authored
-
Paul Bakker authored
-
Paul Bakker authored
-
Paul Bakker authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
- 02 Apr, 2014 4 commits
-
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
- 31 Mar, 2014 4 commits
-
-
Paul Bakker authored
calculation of RR.
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
- 27 Mar, 2014 4 commits
-
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
-
- 26 Mar, 2014 9 commits
-
-
Paul Bakker authored
-
Paul Bakker authored
-
Paul Bakker authored
-
Paul Bakker authored
-
Paul Bakker authored
pkcs11_sign() reuses *sig to store the header and hash, but those might be larger than the actual sig, causing a buffer overflow. An overflow can occur when using raw sigs with hashlen > siglen, or when the RSA key is less than 664 bits long (or less when using hashes shorter than SHA512) As siglen is always within the 'low realm' < 32k, an overflow of asnlen + hashlen is not possible.
-
Paul Bakker authored
-
Manuel Pégourié-Gonnard authored
-
Manuel Pégourié-Gonnard authored
Introduced in 5246ee5c
-
Paul Bakker authored
-