aboutsummaryrefslogtreecommitdiff
path: root/crypto/rsa/rsa_pk1.c
diff options
context:
space:
mode:
authorRichard Levitte <levitte@openssl.org>2002-11-26 11:14:32 +0000
committerRichard Levitte <levitte@openssl.org>2002-11-26 11:14:32 +0000
commitba8ad074905ac260117a983237bc61a488e9fb1e (patch)
treef244f6f587a13bf67d44658c4a2438090866b199 /crypto/rsa/rsa_pk1.c
parent17582ccf21912342b1aeaa60f44c55abc7779a00 (diff)
downloadopenssl-ba8ad074905ac260117a983237bc61a488e9fb1e.zip
openssl-ba8ad074905ac260117a983237bc61a488e9fb1e.tar.gz
openssl-ba8ad074905ac260117a983237bc61a488e9fb1e.tar.bz2
The logic in the main signing and verifying functions to check lengths was
incorrect. Fortunately, there is a second check that's correct, when adding the pads. PR: 355
Diffstat (limited to 'crypto/rsa/rsa_pk1.c')
-rw-r--r--crypto/rsa/rsa_pk1.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa/rsa_pk1.c b/crypto/rsa/rsa_pk1.c
index c1edd67..8560755 100644
--- a/crypto/rsa/rsa_pk1.c
+++ b/crypto/rsa/rsa_pk1.c
@@ -68,7 +68,7 @@ int RSA_padding_add_PKCS1_type_1(unsigned char *to, int tlen,
int j;
unsigned char *p;
- if (flen > (tlen-11))
+ if (flen > (tlen-RSA_PKCS1_PADDING_SIZE))
{
RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1,RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE);
return(0);