-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RSA-PSS sign 1: PK #5728
RSA-PSS sign 1: PK #5728
Conversation
Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
ea0c59d
to
f6d7e8b
Compare
Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
f6d7e8b
to
999930e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looking mostly good, just two minor points.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Left only one suggestion.
…-PSS Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
I'm not sure if something went wrong with github or if it's just me having a brain glitch, but I can't seem to find the suggestion you left ^^ |
tests/suites/test_suite_pk.function
Outdated
size_t sig_len, pkey_len; | ||
mbedtls_svc_key_id_t key_id; | ||
unsigned char sig[MBEDTLS_PK_SIGNATURE_MAX_SIZE]; | ||
unsigned char pkey[400]; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
suggestion: Can we use macro here instead hard coded value?
Your brain is working perfectly. Looks like a problem on my side (forgot to submit this comment). |
Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for addressing our feedback. Looks all good to me now.
Description
Opaque RSA keys introduced in #5625 can only do PKCS#1v1.5 signatures, with
mbedtls_pk_sign()
. This task is to extend them to also support PSS signatures, withmbedtls_pk_sign_ext()
(introduced in #5559).Resolves #5711
Status
READY
Requires Backporting
NO
Migrations
NO
Additional comments
N/A
Todos
Steps to test or reproduce
test_suite_pk must run clean