History: enc_rsa


This page describes all changes made to the enc_rsa package, RSA Signature Algorithm, since its release.

Version

2.02 (2018-01-31, 15:00):

  • Added RSA test suite (moved from enc_test).
  • Added missing variable casting.

2.01:

  • Corrected compilation warnings: potentially uninitialized local variable.

2.0:

  • Added New RSA padding type that is configurable by cypher data.

1.11:

  • Corrected output buffer length checking.

1.10:

  • Added RSA CRT algorithm (RFC 2437 chapter 5.2.1). It is used when a key with CRT data is provided.

1.9:

  • Corrected parsing of RSA key.
  • Compilation error is raised when RSA_MAX_PUB_KEY_LEN has an invalid value.

1.8:

  • Moved macro RSA_MAX_PUB_KEY_LEN to configuration file. Now user is able to define maximum size of RSA key.

1.7:

  • Added OID defines for RSA with SHA and RSA with SHA256.
  • Removed mutex clearing during initialization that can cause compile error on OS.

1.6:

  • Corrected: encrypted message length is equal to key modulus m length (RFC 2437, 7.1.1).
  • Removed comparing of big number size in rsa_calc() (big number library now handles all cases).

1.5:

  • Corrected: random bytes that are added to the padding must be non 0.

1.4:

  • Corrected writing over boundaries.
  • Corrected output buffer length checking.

1.3:

  • Code Review.
  • Big number related changes.

1.2:

  • Changes to make module work in Big Endian architecture.

1.1:

  • Code review (changed u to U).
  • Changed version number to match new enc_base package.
  • Added setting of bn_buf_len for big numbers.

1.0:

  • Initial release.