[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-31 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-31 Thread Lee, Chun-Yi
From: Chun-Yi Lee j...@suse.com Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero

Re: [PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-15 Thread joeyli
Hi all experts, Does there have any suggestions or comments for this patch to asymmetric keys? Thanks a lot! Joey Lee 於 五,2013-07-12 於 11:11 +0800,Lee, Chun-Yi 提到: > From: Chun-Yi Lee > > Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in > its first 2 bytes. The

Re: [PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-15 Thread joeyli
Hi all experts, Does there have any suggestions or comments for this patch to asymmetric keys? Thanks a lot! Joey Lee 於 五,2013-07-12 於 11:11 +0800,Lee, Chun-Yi 提到: From: Chun-Yi Lee j...@suse.com Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-11 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-11 Thread Lee, Chun-Yi
From: Chun-Yi Lee j...@suse.com Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-02 Thread joeyli . kernel
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-02 Thread joeyli . kernel
From: Chun-Yi Lee j...@suse.com Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-06-27 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-06-27 Thread Lee, Chun-Yi
From: Chun-Yi Lee j...@suse.com Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-06-15 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-06-15 Thread Lee, Chun-Yi
From: Chun-Yi Lee j...@suse.com Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero