Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for VerifyPKCS1v15 (0.2 sec)

  1. src/crypto/rsa/rsa_test.go

    		t.Errorf("SignPKCS1v15: %v", err)
    	}
    	if err == nil {
    		err = VerifyPKCS1v15(&priv.PublicKey, crypto.SHA256, hash[:], sig)
    		if err != nil {
    			t.Errorf("VerifyPKCS1v15: %v", err)
    		}
    		sig[1] ^= 0x80
    		err = VerifyPKCS1v15(&priv.PublicKey, crypto.SHA256, hash[:], sig)
    		if err == nil {
    			t.Errorf("VerifyPKCS1v15 success for tampered signature")
    		}
    		sig[1] ^= 0x80
    		hash[1] ^= 0x80
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jan 12 00:55:41 UTC 2024
    - 30.9K bytes
    - Viewed (0)
  2. src/crypto/rsa/pkcs1v15.go

    	em[1] = 1
    	for i := 2; i < k-len(prefix)-len(hashed)-1; i++ {
    		em[i] = 0xff
    	}
    	copy(em[k-len(prefix)-len(hashed):], prefix)
    	copy(em[k-len(hashed):], hashed)
    	return em, nil
    }
    
    // VerifyPKCS1v15 verifies an RSA PKCS #1 v1.5 signature.
    // hashed is the result of hashing the input message using the given hash
    // function and sig is the signature. A valid signature is indicated by
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 00:11:21 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  3. src/crypto/tls/auth.go

    		}
    	case signaturePKCS1v15:
    		pubKey, ok := pubkey.(*rsa.PublicKey)
    		if !ok {
    			return fmt.Errorf("expected an RSA public key, got %T", pubkey)
    		}
    		if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, signed, sig); err != nil {
    			return err
    		}
    	case signatureRSAPSS:
    		pubKey, ok := pubkey.(*rsa.PublicKey)
    		if !ok {
    			return fmt.Errorf("expected an RSA public key, got %T", pubkey)
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
Back to top