We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When signing data, people recommended to use PSS method rather than PKCS1v15 I saw Pointy Castle is still using PKCS1v15.
https://cryptography.io/en/latest/hazmat/primitives/asymmetric/rsa/#signing Valid paddings for signatures are PSS and PKCS1v15. PSS is the recommended choice for any new protocols or applications, PKCS1v15 should only be used to support legacy protocols.
https://cryptography.io/en/latest/limitations/#rsa-pkcs1-v1-5-constant-time-decryption
Here's an example like what cryptography on pub.dev https://pub.dev/documentation/cryptography/latest/cryptography/RsaPss-class.html But this one doesn't work for now.
Also for paddings, PKCS8 might be modern.
PKCS8
The text was updated successfully, but these errors were encountered:
I am also interested in this! Bump
Sorry, something went wrong.
No branches or pull requests
When signing data, people recommended to use PSS method rather than PKCS1v15
I saw Pointy Castle is still using PKCS1v15.
https://cryptography.io/en/latest/hazmat/primitives/asymmetric/rsa/#signing
Valid paddings for signatures are PSS and PKCS1v15. PSS is the recommended choice for any new protocols or applications, PKCS1v15 should only be used to support legacy protocols.
https://cryptography.io/en/latest/limitations/#rsa-pkcs1-v1-5-constant-time-decryption
Here's an example like what cryptography on pub.dev https://pub.dev/documentation/cryptography/latest/cryptography/RsaPss-class.html But this one doesn't work for now.
Also for paddings,
PKCS8
might be modern.The text was updated successfully, but these errors were encountered: