]> asedeno.scripts.mit.edu Git - PuTTY_svn.git/commit
Charles Wilcox reported a signature validation bug with 2500-bit RSA
authorSimon Tatham <anakin@pobox.com>
Sat, 7 Feb 2004 10:02:20 +0000 (10:02 +0000)
committerSimon Tatham <anakin@pobox.com>
Sat, 7 Feb 2004 10:02:20 +0000 (10:02 +0000)
commit8675ff8b83868ebc233616109bc390a24cc4b12f
tree5db1f2d2c82b612f148d3e52dd9906c42cae5ecb
parent73f7a90033f7010cc393f091f93e861a1c54c2db
Charles Wilcox reported a signature validation bug with 2500-bit RSA
keys. This _appears_ to be due to me computing the byte count of the
key by dividing the bit count by 8 and rounding _down_ rather than
up. Therefore, I can't see how this code could ever have worked on
any SSH2 RSA key whose length was not a multiple of 8 bits; and
therefore I'm staggered that we haven't noticed it before! OpenSSH's
keygen appears to be scrupulous about ensuring the returned key
length is exactly what you asked for rather than one bit less, but
even so I'm astonished that _all_ keygen implementations for servers
we've ever interoperated with have avoided tripping this bug...

git-svn-id: http://svn.tartarus.org/sgt/putty@3815 cda61777-01e9-0310-a592-d414129be87e
sshrsa.c