diff options
author | Richard Levitte <levitte@openssl.org> | 2002-11-26 11:14:32 +0000 |
---|---|---|
committer | Richard Levitte <levitte@openssl.org> | 2002-11-26 11:14:32 +0000 |
commit | ba8ad074905ac260117a983237bc61a488e9fb1e (patch) | |
tree | f244f6f587a13bf67d44658c4a2438090866b199 /crypto/rsa/rsa_pk1.c | |
parent | 17582ccf21912342b1aeaa60f44c55abc7779a00 (diff) | |
download | openssl-ba8ad074905ac260117a983237bc61a488e9fb1e.zip openssl-ba8ad074905ac260117a983237bc61a488e9fb1e.tar.gz openssl-ba8ad074905ac260117a983237bc61a488e9fb1e.tar.bz2 |
The logic in the main signing and verifying functions to check lengths was
incorrect. Fortunately, there is a second check that's correct, when adding
the pads.
PR: 355
Diffstat (limited to 'crypto/rsa/rsa_pk1.c')
-rw-r--r-- | crypto/rsa/rsa_pk1.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa/rsa_pk1.c b/crypto/rsa/rsa_pk1.c index c1edd67..8560755 100644 --- a/crypto/rsa/rsa_pk1.c +++ b/crypto/rsa/rsa_pk1.c @@ -68,7 +68,7 @@ int RSA_padding_add_PKCS1_type_1(unsigned char *to, int tlen, int j; unsigned char *p; - if (flen > (tlen-11)) + if (flen > (tlen-RSA_PKCS1_PADDING_SIZE)) { RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1,RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); return(0); |