mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2024-12-29 09:21:19 +00:00
mbedtls_pk_decrypt/encrypt actually check the padding mode
The sign/verify functions happily use the wrong algorithm, but the encrypt/decrypt functions error out if the padding mode specifies V21. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
9cc01ccbf8
commit
88c2755a30
@ -1,7 +1,8 @@
|
||||
Bugfix
|
||||
* Fix mbedtls_pk_sign(), mbedtls_pk_verify(), mbedtls_pk_decrypt() and
|
||||
mbedtls_pk_encrypt() on non-opaque RSA keys to honor the padding mode in
|
||||
the RSA context. Before, if MBEDTLS_USE_PSA_CRYPTO was enabled, they always
|
||||
used PKCS#1 v1.5 even when the RSA context was configured for PKCS#1 v2.1
|
||||
(PSS/OAEP). Fixes #8824.
|
||||
the RSA context. Before, if MBEDTLS_USE_PSA_CRYPTO was enabled and the
|
||||
RSA context was configured for PKCS#1 v2.1 (PSS/OAEP), the sign/verify
|
||||
functions performed a PKCS#1 v1.5 signature instead and the
|
||||
encrypt/decrypt functions returned an error. Fixes #8824.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user