-
Notifications
You must be signed in to change notification settings - Fork 114
Comparing changes
Open a pull request
base repository: sybrenstuvel/python-rsa
base: version-4.6
head repository: sybrenstuvel/python-rsa
compare: version-4.7
- 17 commits
- 14 files changed
- 5 contributors
Commits on Jun 12, 2020
-
Updated documentation to use Pipenv instead of Poetry
See commit d15a7f3 for the reason why.
Configuration menu - View commit details
-
Copy full SHA for b5e1704 - Browse repository at this point
Copy the full SHA b5e1704View commit details -
Configuration menu - View commit details
-
Copy full SHA for ec57ac0 - Browse repository at this point
Copy the full SHA ec57ac0View commit details
Commits on Jun 14, 2020
-
Configuration menu - View commit details
-
Copy full SHA for a87a564 - Browse repository at this point
Copy the full SHA a87a564View commit details
Commits on Jun 15, 2020
-
Configuration menu - View commit details
-
Copy full SHA for e8fc5d2 - Browse repository at this point
Copy the full SHA e8fc5d2View commit details
Commits on Jun 16, 2020
-
Configuration menu - View commit details
-
Copy full SHA for 4beb68d - Browse repository at this point
Copy the full SHA 4beb68dView commit details
Commits on Oct 26, 2020
-
Configuration menu - View commit details
-
Copy full SHA for da6fc2c - Browse repository at this point
Copy the full SHA da6fc2cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 6f59ff0 - Browse repository at this point
Copy the full SHA 6f59ff0View commit details
Commits on Nov 15, 2020
-
Fix #165: CVE-2020-25658 - Bleichenbacher-style timing oracle
Use as many constant-time comparisons as practical in the `rsa.pkcs1.decrypt` function. `cleartext.index(b'\x00', 2)` will still be non-constant-time. The alternative would be to iterate over all the data byte by byte in Python, which is several orders of magnitude slower. Given that a perfect constant-time implementation is very hard or even impossible to do in Python [1], I chose the more performant option here. [1]: https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/
8Configuration menu - View commit details
-
Copy full SHA for dae8ce0 - Browse repository at this point
Copy the full SHA dae8ce0View commit details -
Fix #164: Add padding length check as described by PKCS#1 v1.5
According to PKCS#1 v1.5, the padding should be at least 8 bytes long. See https://tools.ietf.org/html/rfc8017#section-7.2.2 step 3 for more info.
1Configuration menu - View commit details
-
Copy full SHA for f878c37 - Browse repository at this point
Copy the full SHA f878c37View commit details -
Configuration menu - View commit details
-
Copy full SHA for 240b0d8 - Browse repository at this point
Copy the full SHA 240b0d8View commit details -
Use
bytes.find()
instead ofbytes.index()
Use `bytes.find()` instead of `bytes.index()`, as the former doesn't raise an exception when the to-be-found byte doesn't exist.
Configuration menu - View commit details
-
Copy full SHA for f254895 - Browse repository at this point
Copy the full SHA f254895View commit details -
Directly raise
DecryptionError
when crypto length is badCrypto length and blocksize are public info, so don't need side-channel free comparison.
Configuration menu - View commit details
-
Copy full SHA for 341e5c4 - Browse repository at this point
Copy the full SHA 341e5c4View commit details -
Fix #162: Blinding uses slow algorithm
Store blinding factor + its inverse, so that they can be reused & updated on every blinding operation. This avoids expensive computations. The reuse of the previous blinding factor is done via squaring (mod n), as per section 9 of 'A Timing Attack against RSA with the Chinese Remainder Theorem' by Werner Schindler, https://tls.mbed.org/public/WSchindler-RSA_Timing_Attack.pdf
1Configuration menu - View commit details
-
Copy full SHA for 06ec1ea - Browse repository at this point
Copy the full SHA 06ec1eaView commit details
Commits on Jan 10, 2021
-
Configuration menu - View commit details
-
Copy full SHA for b81e317 - Browse repository at this point
Copy the full SHA b81e317View commit details -
Fix #170: mistake in examples of documentation
Strings need to be encoded into bytes before the RSA module can operate on them.
Configuration menu - View commit details
-
Copy full SHA for 539c54a - Browse repository at this point
Copy the full SHA 539c54aView commit details -
Configuration menu - View commit details
-
Copy full SHA for a364e82 - Browse repository at this point
Copy the full SHA a364e82View commit details -
Configuration menu - View commit details
-
Copy full SHA for fa3282a - Browse repository at this point
Copy the full SHA fa3282aView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff version-4.6...version-4.7