mirror of
https://github.com/cuberite/polarssl.git
synced 2025-09-29 16:32:32 -04:00
mbedtls_pk_decrypt/encrypt actually check the padding mode
The sign/verify functions happily use the wrong algorithm, but the encrypt/decrypt functions error out if the padding mode specifies V21. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
9cc01ccbf8
commit
88c2755a30
@ -1,7 +1,8 @@
|
|||||||
Bugfix
|
Bugfix
|
||||||
* Fix mbedtls_pk_sign(), mbedtls_pk_verify(), mbedtls_pk_decrypt() and
|
* Fix mbedtls_pk_sign(), mbedtls_pk_verify(), mbedtls_pk_decrypt() and
|
||||||
mbedtls_pk_encrypt() on non-opaque RSA keys to honor the padding mode in
|
mbedtls_pk_encrypt() on non-opaque RSA keys to honor the padding mode in
|
||||||
the RSA context. Before, if MBEDTLS_USE_PSA_CRYPTO was enabled, they always
|
the RSA context. Before, if MBEDTLS_USE_PSA_CRYPTO was enabled and the
|
||||||
used PKCS#1 v1.5 even when the RSA context was configured for PKCS#1 v2.1
|
RSA context was configured for PKCS#1 v2.1 (PSS/OAEP), the sign/verify
|
||||||
(PSS/OAEP). Fixes #8824.
|
functions performed a PKCS#1 v1.5 signature instead and the
|
||||||
|
encrypt/decrypt functions returned an error. Fixes #8824.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user