-
Notifications
You must be signed in to change notification settings - Fork 314
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Robust signature decoding #115
Conversation
so that they have the same formatting as the ones for integer and sequence types
ed77cf2
to
5a9b2b2
Compare
the users of VerifyingKey.verify() and VerifyingKey.verify_digest() should not need to use multiple exceptions to correctly catch invalid signatures
Verify that strings of unexpected lengths are rejected with the same BadSignatureError exception
5a9b2b2
to
f0f9e8a
Compare
it basically looks good with one exception: |
no, |
the same issues as with decoding integers happen with the NIST521p curve as it's large enough that the length encoding of some fields needs to use multi-byte encoding
f0f9e8a
to
b96e02e
Compare
b96e02e
to
2c3db7c
Compare
@rjrelyea: updated, I've also added more checks to verify if the values are correct DER encodings (not just BER), so please take a second look |
OK, that looks good. nbytes was probably from the copy of dealing with the length field, |
Is there an ETA for a 0.14 release? I just got CVE bugs filed against this in Fedora. Thanks. |
@opoplawski actually, I'm working on 0.13.3 in #124 – there has been too little testing in master to consider it 0.14-worthy |
Ensure that the signature verification raises the same exception irrespective if the error is caused by mismatch of the hash value or because the encoding of the signature is invalid
fixes #114