RSA Security Projection Television 5.2.2 Uživatelský manuál Strana 319

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 376
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 318
Chapter 7 Public-Key Operations 297
Performing Elliptic Curve Operations
Step 5: Final
Pass in the signature that was received with the message. B_VerifyFinal returns 0 if
the signature verifies, or an error if it is an invalid signature:
Step 6: Destroy
Destroy all objects that are no longer needed:
Using ECAES
You can use the Elliptic Curve Authenticated Encryption System (ECAES) to perform
public-key encryption. The example in this section corresponds to the file
eces.c.
You will encrypt the following:
if ((status = B_VerifyUpdate (ecDSAVerify, dataToSign, dataToSignLen,
(A_SURRENDER_CTX *)NULL_PTR)) != 0)
break;
if ((status = B_VerifyFinal (ecDSAVerify, signature, signatureLen,
(B_ALGORITHM_OBJ)NULL_PTR,
(A_SURRENDER_CTX *)NULL_PTR)) != 0)
break;
T_free(signature);
B_DestoryAlgorithmObject (&ecDSAVerify);
unsigned char *dataToEncrypt = Encrypt this arbitrarily long sentence
using ECAES!;
unsigned int dataToEncryptLen = sizeof(dataToEncrypt) + 1;
Zobrazit stránku 318
1 2 ... 314 315 316 317 318 319 320 321 322 323 324 ... 375 376

Komentáře k této Příručce

Žádné komentáře