X.509: Fix internal TLS/X.509 validation of PKCS#1 signature
authorJouni Malinen <jouni@qca.qualcomm.com>
Mon, 19 May 2014 20:25:38 +0000 (23:25 +0300)
committerJouni Malinen <j@w1.fi>
Mon, 19 May 2014 20:27:30 +0000 (23:27 +0300)
commit9c29d48725fd40a82407a89f193cf009aeef9745
treebbc570e3421b6d71d40407fbe9e5e4f9d9d4b459
parente90d955f7ca55ffcb476db55f56aeddda99bb483
X.509: Fix internal TLS/X.509 validation of PKCS#1 signature

Verify that there is no extra data after the hash field. This is needed
to avoid potential attacks using additional data to construct a value
that passes the RSA operation and allows the hash value to be forged.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
src/tls/x509v3.c