15
15
/// RSA PKCS#1 1.5 signatures.
16
16
17
17
use { bssl, c, error, private, signature} ;
18
- use super :: { BIGNUM , PositiveInteger , PUBLIC_MODULUS_MAX_LEN , RSAParameters ,
19
- parse_public_key} ;
18
+ use super :: { BIGNUM , PositiveInteger , VERIFY_PUBLIC_MODULUS_MAX_LEN ,
19
+ RSAParameters , parse_public_key} ;
20
20
use untrusted;
21
21
22
22
@@ -110,7 +110,7 @@ pub fn verify_rsa(params: &RSAParameters,
110
110
msg : untrusted:: Input , signature : untrusted:: Input )
111
111
-> Result < ( ) , error:: Unspecified > {
112
112
let signature = signature. as_slice_less_safe ( ) ;
113
- let mut decoded = [ 0u8 ; ( PUBLIC_MODULUS_MAX_LEN + 7 ) / 8 ] ;
113
+ let mut decoded = [ 0u8 ; VERIFY_PUBLIC_MODULUS_MAX_LEN ] ;
114
114
if signature. len ( ) > decoded. len ( ) {
115
115
return Err ( error:: Unspecified ) ;
116
116
}
@@ -121,7 +121,8 @@ pub fn verify_rsa(params: &RSAParameters,
121
121
try!( bssl:: map_result ( unsafe {
122
122
GFp_rsa_public_decrypt ( decoded. as_mut_ptr ( ) , decoded. len ( ) , n. as_ref ( ) ,
123
123
e. as_ref ( ) , signature. as_ptr ( ) , signature. len ( ) ,
124
- params. min_bits , PUBLIC_MODULUS_MAX_LEN )
124
+ params. min_bits ,
125
+ VERIFY_PUBLIC_MODULUS_MAX_LEN * 8 )
125
126
} ) ) ;
126
127
127
128
untrusted:: Input :: from ( decoded) . read_all (
0 commit comments