Conversation
so that they have the same formatting as the ones for integer and sequence types
ed77cf2 to
5a9b2b2
Compare
the users of VerifyingKey.verify() and VerifyingKey.verify_digest() should not need to use multiple exceptions to correctly catch invalid signatures
Verify that strings of unexpected lengths are rejected with the same BadSignatureError exception
5a9b2b2 to
f0f9e8a
Compare
|
it basically looks good with one exception: |
no, |
the same issues as with decoding integers happen with the NIST521p curve as it's large enough that the length encoding of some fields needs to use multi-byte encoding
f0f9e8a to
b96e02e
Compare
b96e02e to
2c3db7c
Compare
|
@rjrelyea: updated, I've also added more checks to verify if the values are correct DER encodings (not just BER), so please take a second look |
|
OK, that looks good. nbytes was probably from the copy of dealing with the length field, |
|
Is there an ETA for a 0.14 release? I just got CVE bugs filed against this in Fedora. Thanks. |
|
@opoplawski actually, I'm working on 0.13.3 in #124 – there has been too little testing in master to consider it 0.14-worthy |
Ensure that the signature verification raises the same exception irrespective if the error is caused by mismatch of the hash value or because the encoding of the signature is invalid
fixes #114