Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RSA-PSS should use the proper salt value when creating and verifying signatures #163

Merged
merged 4 commits into from
May 22, 2015

Conversation

mark-adams
Copy link
Contributor

When we added the RFC 7520 test vectors to our project, the RSA-PSS algorithm test would not pass.

After further review, it turns out that I improperly implemented this originally. JWA clearly specifies how the salt length should be set:

The size of the salt value is the same size as the hash function output.

This PR corrects that issue and removes some redundant tests from our original test suite for algorithms since the RFC 7520 tests accomplish the same thing.

@coveralls
Copy link

Coverage Status

Coverage remained the same at 100.0% when pulling c990c44 on mark-adams:fix-rsa-pss into b8f36aa on jpadilla:master.

@jpadilla
Copy link
Owner

@mark-adams would you look at that! Great idea using those test vectors from the RFC. Merge this whenever you like.

mark-adams added a commit that referenced this pull request May 22, 2015
RSA-PSS should use the proper salt value when creating and verifying signatures
@mark-adams mark-adams merged commit 151761d into jpadilla:master May 22, 2015
This was referenced Sep 21, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants