Kees Cook wrote:
> > + memcpy(, prep->data + ctx->sig_offset, 8);
>
> Instead of the literal 8, sizeof(wrapper)?
Reasonable. It was originally an array of bytes until I found out that it had
structure. Even so, I should probably have used sizeof() then.
> > + if
On Tue, Oct 30, 2012 at 12:21 PM, David Howells wrote:
> The certificate data block in a PE binary has a wrapper around the PKCS#7
> signature we actually want to get at. Strip this off and check that we've got
> something that appears to be a PKCS#7 signature.
>
> Signed-off-by: David Howells
The certificate data block in a PE binary has a wrapper around the PKCS#7
signature we actually want to get at. Strip this off and check that we've got
something that appears to be a PKCS#7 signature.
Signed-off-by: David Howells
---
crypto/asymmetric_keys/pefile_parser.c | 60
The certificate data block in a PE binary has a wrapper around the PKCS#7
signature we actually want to get at. Strip this off and check that we've got
something that appears to be a PKCS#7 signature.
Signed-off-by: David Howells dhowe...@redhat.com
---
crypto/asymmetric_keys/pefile_parser.c |
On Tue, Oct 30, 2012 at 12:21 PM, David Howells dhowe...@redhat.com wrote:
The certificate data block in a PE binary has a wrapper around the PKCS#7
signature we actually want to get at. Strip this off and check that we've got
something that appears to be a PKCS#7 signature.
Signed-off-by:
Kees Cook keesc...@chromium.org wrote:
+ memcpy(wrapper, prep-data + ctx-sig_offset, 8);
Instead of the literal 8, sizeof(wrapper)?
Reasonable. It was originally an array of bytes until I found out that it had
structure. Even so, I should probably have used sizeof() then.
+
6 matches
Mail list logo