@@ -38,7 +38,7 @@ void helloack::check_ecdsa_secp256r1_sha256(bytes_view qx, bytes_view qy, bytes_
38
38
void helloack::check_rsa_sha1 (rsa_public_key_view pubkey, bytes_view msg, bytes_view sig)
39
39
{
40
40
auto md = eosio::sha1 ( reinterpret_cast <const char *>( msg.data () ), msg.size () );
41
- assert_rsa_sha1_assert ( pubkey, md, sig,
41
+ assert_rsa_sha1 ( pubkey, md, sig,
42
42
" RSA PKCS v1.5 SHA-1 signature verification failed"
43
43
);
44
44
}
@@ -92,7 +92,7 @@ void helloack::check_rsa_pss_sha512(rsa_pss_public_key_view pubkey, bytes_view m
92
92
void helloack::bt_rsa_1024_sha1 ()
93
93
{
94
94
constexpr auto pubkey = rsa_public_key_view ( rsa_1024_sha1::mod, rsa_1024_sha1::exp );
95
- assert_rsa_sha1_assert ( pubkey, rsa_1024_sha1::md, rsa_1024_sha1::sig,
95
+ assert_rsa_sha1 ( pubkey, rsa_1024_sha1::md, rsa_1024_sha1::sig,
96
96
" RSA 1024 PKCS v1.5 SHA-1 signature verification failed"
97
97
);
98
98
}
@@ -101,7 +101,7 @@ void helloack::bt_rsa_1024_sha1()
101
101
void helloack::bt_rsa_2048_sha1 ()
102
102
{
103
103
constexpr auto pubkey = rsa_public_key_view ( rsa_2048_sha1::mod, rsa_2048_sha1::exp );
104
- assert_rsa_sha1_assert ( pubkey, rsa_2048_sha1::md, rsa_2048_sha1::sig,
104
+ assert_rsa_sha1 ( pubkey, rsa_2048_sha1::md, rsa_2048_sha1::sig,
105
105
" RSA 2048 PKCS v1.5 SHA-1 signature verification failed"
106
106
);
107
107
}
0 commit comments