Home | History | Annotate | Download | only in rsa

Lines Matching full:ciphertext

55 		func(ciphertext []byte) (plaintext []byte, err error) {
56 return DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
58 func(ciphertext []byte) (plaintext []byte, err error) {
59 return rsaPrivateKey.Decrypt(nil, ciphertext, nil)
86 ciphertext, err := EncryptPKCS1v15(random, &rsaPrivateKey.PublicKey, in)
98 plaintext, err := DecryptPKCS1v15(rand, rsaPrivateKey, ciphertext)
228 ciphertext := decodeBase64("fjOVdirUzFoLlukv80dBllMLjXythIf22feqPrNo0YoIjzyzyoMFiLjAc/Y4krkeZ11XFThIrEvw\nkRiZcCq5ng==")
229 _, err := DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
259 // ciphertext is too small doesn't run outside the array bounds.
260 ciphertext, err := EncryptPKCS1v15(rand.Reader, &rsaPrivateKey.PublicKey, []byte{1})
266 if err := DecryptPKCS1v15SessionKey(nil, rsaPrivateKey, ciphertext, key[:]); err != nil {
272 t.Fatal("key was modified when ciphertext was invalid")