- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for VerifyPKCS1v15 (0.2 sec)
-
src/crypto/rsa/rsa_test.go
t.Errorf("SignPKCS1v15: %v", err) } if err == nil { err = VerifyPKCS1v15(&priv.PublicKey, crypto.SHA256, hash[:], sig) if err != nil { t.Errorf("VerifyPKCS1v15: %v", err) } sig[1] ^= 0x80 err = VerifyPKCS1v15(&priv.PublicKey, crypto.SHA256, hash[:], sig) if err == nil { t.Errorf("VerifyPKCS1v15 success for tampered signature") } sig[1] ^= 0x80 hash[1] ^= 0x80
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jan 12 00:55:41 UTC 2024 - 30.9K bytes - Viewed (0) -
src/crypto/rsa/pkcs1v15.go
em[1] = 1 for i := 2; i < k-len(prefix)-len(hashed)-1; i++ { em[i] = 0xff } copy(em[k-len(prefix)-len(hashed):], prefix) copy(em[k-len(hashed):], hashed) return em, nil } // VerifyPKCS1v15 verifies an RSA PKCS #1 v1.5 signature. // hashed is the result of hashing the input message using the given hash // function and sig is the signature. A valid signature is indicated by
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:21 UTC 2024 - 12.8K bytes - Viewed (0) -
src/crypto/tls/auth.go
} case signaturePKCS1v15: pubKey, ok := pubkey.(*rsa.PublicKey) if !ok { return fmt.Errorf("expected an RSA public key, got %T", pubkey) } if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, signed, sig); err != nil { return err } case signatureRSAPSS: pubKey, ok := pubkey.(*rsa.PublicKey) if !ok { return fmt.Errorf("expected an RSA public key, got %T", pubkey) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 10K bytes - Viewed (0)