-
Notifications
You must be signed in to change notification settings - Fork 314
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Backport signature decode #124
Conversation
1439b29
to
9c7ebc3
Compare
e204c2d
to
8adaa3b
Compare
8adaa3b
to
2dc0d7a
Compare
@Jakuje please review |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are some nits along the lines, but considering it is backport of something already in master, we should not bother that much with the messy history of the commits.
Only thing that might make sense could be mentioning the master commits IDs in the cherry-picked so it is obvious that it is backport.
the users of VerifyingKey.verify() and VerifyingKey.verify_digest() should not need to use multiple exceptions to correctly catch invalid signatures backport of 487f6d3
Verify that strings of unexpected lengths are rejected with the same BadSignatureError exception backport of 8533e51
the same issues as with decoding integers happen with the NIST521p curve as it's large enough that the length encoding of some fields needs to use multi-byte encoding backport of a655d6f
…nteger backport of 2c3db7c
as assert statements will be removed in optimised build, do use a custom exception that inherits from AssertionError so that the failures are caught this is reworking of d47a238 to implement the same checks but without implementing support for SEC1/X9.62 formatted keys
not a backport, necessary to make the tests runnable on 0.13 branch
proposed for master in tlsfuzzer#132
2dc0d7a
to
1eb2c04
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks good now
Backport the recent fixes to signature decoding.
See #114
also harden the public and private key decoding (partial backport of #118)