You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Opaque RSA keys introduced in #5625 and extended in #5711 can only do signatures, with mbedtls_pk_sign[_ext](). This task is to extend them to also support decryption (PKCS#1v1.5, not OAEP) with mbedtls_pk_decrypt().
Implement pk_opaque_decrypt() in pk_wrap.c and register it in mbedtls_pk_rsa_opaque_info.
Make sure it's tested, either by extending and existing test function or writing a new one, as is more convenient. Testing can be done using known values as decryption is deterministic.
- misc updates about on-going/recent work
- removal of the section about mixed-PSK: being done in Mbed-TLS#5762
- clarifications in some places
- some typo fixes
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
mpg
added a commit
to mpg/mbedtls
that referenced
this issue
Jul 4, 2022
- misc updates about on-going/recent work
- removal of the section about mixed-PSK: being done in Mbed-TLS#5762
- clarifications in some places
- some typo fixes
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
Opaque RSA keys introduced in #5625 and extended in #5711 can only do signatures, with
mbedtls_pk_sign[_ext]()
. This task is to extend them to also support decryption (PKCS#1v1.5, not OAEP) withmbedtls_pk_decrypt()
.pk_opaque_decrypt()
inpk_wrap.c
and register it inmbedtls_pk_rsa_opaque_info
.Depends on: #5761
The text was updated successfully, but these errors were encountered: