taler-docs

Documentation for GNU Taler components, APIs and protocols
Log | Files | Refs | README | LICENSE

commit 0467868945b138f5a310342959f9049d5919115d
parent 31aa125199afacf57c31e789545ec715d3637333
Author: Marcello Stanisci <marcello.stanisci@inria.fr>
Date:   Fri, 30 Oct 2015 11:58:15 +0100

Recalling to firstly decode RSA signature before actual
verification

Diffstat:
Mapi-mint.rst | 2++
1 file changed, 2 insertions(+), 0 deletions(-)

diff --git a/api-mint.rst b/api-mint.rst @@ -839,6 +839,8 @@ All elliptic curve operations are on Curve25519. Public and private keys are th Signatures ------------------------ +Please note that any RSA signature is processed by a function called `GNUNET_CRYPTO_rsa_signature_encode (..)` **before** being sent over the network, so the receiving party must run `GNUNET_CRYPTO_rsa_signature_decode (..)` before verifying it. See their implementation in `src/util/crypto_rsa.c`, in GNUNET's code base. Finally, they are defined in `gnunet/gnunet_crypto_lib.h`. + EdDSA signatures are always made on the hash of a block of the same generic format, the `struct SignedData` given below. In our notation, the type of a field can depend on the value of another field. For the following message, the length of the `payload` array must match the value of the `size` field: .. sourcecode:: c