Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for VerifyPKCS1v15 (0.31 sec)

  1. src/crypto/rsa/boring_test.go

    	err := VerifyPKCS1v15(key, 0, paddedHash, sig)
    	if err == nil {
    		t.Errorf("raw: expected verification error")
    	}
    
    	err = VerifyPKCS1v15(key, crypto.SHA1, hash, sig)
    	if err == nil {
    		t.Errorf("sha1: expected verification error")
    	}
    }
    
    func BenchmarkBoringVerify(b *testing.B) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Nov 15 00:16:30 UTC 2022
    - 4.5K bytes
    - Viewed (0)
  2. src/crypto/rsa/pkcs1v15_test.go

    	if err != nil {
    		t.Fatalf("failed to decode signature: %s", err)
    	}
    
    	h := sha256.Sum256([]byte("hello"))
    	err = VerifyPKCS1v15(pub, crypto.SHA256, h[:], sig)
    	if err == nil {
    		t.Fatal("VerifyPKCS1v15 accepted a truncated signature")
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Nov 15 00:16:30 UTC 2022
    - 8.6K bytes
    - Viewed (0)
  3. src/crypto/rsa/rsa_test.go

    		t.Errorf("SignPKCS1v15: %v", err)
    	}
    	if err == nil {
    		err = VerifyPKCS1v15(&priv.PublicKey, crypto.SHA256, hash[:], sig)
    		if err != nil {
    			t.Errorf("VerifyPKCS1v15: %v", err)
    		}
    		sig[1] ^= 0x80
    		err = VerifyPKCS1v15(&priv.PublicKey, crypto.SHA256, hash[:], sig)
    		if err == nil {
    			t.Errorf("VerifyPKCS1v15 success for tampered signature")
    		}
    		sig[1] ^= 0x80
    		hash[1] ^= 0x80
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jan 12 00:55:41 UTC 2024
    - 30.9K bytes
    - Viewed (0)
  4. src/crypto/rsa/example_test.go

    	// that the hash function be collision resistant. SHA-256 is the
    	// least-strong hash function that should be used for this at the time
    	// of writing (2016).
    	hashed := sha256.Sum256(message)
    
    	err := rsa.VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA256, hashed[:], signature)
    	if err != nil {
    		fmt.Fprintf(os.Stderr, "Error from verification: %s\n", err)
    		return
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Aug 22 22:52:37 UTC 2023
    - 5.8K bytes
    - Viewed (0)
  5. src/crypto/rsa/pkcs1v15.go

    	em[1] = 1
    	for i := 2; i < k-len(prefix)-len(hashed)-1; i++ {
    		em[i] = 0xff
    	}
    	copy(em[k-len(prefix)-len(hashed):], prefix)
    	copy(em[k-len(hashed):], hashed)
    	return em, nil
    }
    
    // VerifyPKCS1v15 verifies an RSA PKCS #1 v1.5 signature.
    // hashed is the result of hashing the input message using the given hash
    // function and sig is the signature. A valid signature is indicated by
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 00:11:21 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  6. src/crypto/tls/auth.go

    		}
    	case signaturePKCS1v15:
    		pubKey, ok := pubkey.(*rsa.PublicKey)
    		if !ok {
    			return fmt.Errorf("expected an RSA public key, got %T", pubkey)
    		}
    		if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, signed, sig); err != nil {
    			return err
    		}
    	case signatureRSAPSS:
    		pubKey, ok := pubkey.(*rsa.PublicKey)
    		if !ok {
    			return fmt.Errorf("expected an RSA public key, got %T", pubkey)
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
  7. src/crypto/x509/x509.go

    		}
    		if algo.isRSAPSS() {
    			return rsa.VerifyPSS(pub, hashType, signed, signature, &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash})
    		} else {
    			return rsa.VerifyPKCS1v15(pub, hashType, signed, signature)
    		}
    	case *ecdsa.PublicKey:
    		if pubKeyAlgo != ECDSA {
    			return signaturePublicKeyAlgoMismatchError(pubKeyAlgo, pub)
    		}
    		if !ecdsa.VerifyASN1(pub, signed, signature) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 09:20:15 UTC 2024
    - 82K bytes
    - Viewed (0)
  8. src/cmd/vendor/golang.org/x/tools/internal/stdlib/manifest.go

    		{"PrivateKey.PublicKey", Field, 0},
    		{"PublicKey", Type, 0},
    		{"PublicKey.E", Field, 0},
    		{"PublicKey.N", Field, 0},
    		{"SignPKCS1v15", Func, 0},
    		{"SignPSS", Func, 2},
    		{"VerifyPKCS1v15", Func, 0},
    		{"VerifyPSS", Func, 2},
    	},
    	"crypto/sha1": {
    		{"BlockSize", Const, 0},
    		{"New", Func, 0},
    		{"Size", Const, 0},
    		{"Sum", Func, 2},
    	},
    	"crypto/sha256": {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Apr 02 02:20:05 UTC 2024
    - 534.2K bytes
    - Viewed (0)
  9. api/go1.txt

    pkg crypto/rsa, func GenerateMultiPrimeKey(io.Reader, int, int) (*PrivateKey, error)
    pkg crypto/rsa, func SignPKCS1v15(io.Reader, *PrivateKey, crypto.Hash, []uint8) ([]uint8, error)
    pkg crypto/rsa, func VerifyPKCS1v15(*PublicKey, crypto.Hash, []uint8, []uint8) error
    pkg crypto/rsa, method (*PrivateKey) Precompute()
    pkg crypto/rsa, method (*PrivateKey) Validate() error
    pkg crypto/rsa, type CRTValue struct
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Aug 14 18:58:28 UTC 2013
    - 1.7M bytes
    - Viewed (0)
Back to top