File tree 2 files changed +25
-10
lines changed
2 files changed +25
-10
lines changed Original file line number Diff line number Diff line change @@ -3225,16 +3225,21 @@ CK_RV apply_sign_mechanism_finalize(yubihsm_pkcs11_op_info *op_info) {
3225
3225
}
3226
3226
3227
3227
if (is_ECDSA_sign_mechanism (op_info -> mechanism .mechanism )) {
3228
- if (op_info -> buffer_length < op_info -> op .sign .sig_len / 2 ) {
3229
- uint16_t padding =
3230
- (op_info -> op .sign .sig_len / 2 ) - op_info -> buffer_length ;
3231
- memmove (op_info -> buffer + padding , op_info -> buffer ,
3232
- op_info -> buffer_length );
3233
- memset (op_info -> buffer , 0 , padding );
3234
- op_info -> buffer_length += padding ;
3235
- } else if (op_info -> buffer_length > op_info -> op .sign .sig_len / 2 ) {
3228
+
3229
+ if (op_info -> buffer_length > op_info -> op .sign .sig_len / 2 ) {
3236
3230
op_info -> buffer_length = op_info -> op .sign .sig_len / 2 ;
3237
3231
}
3232
+
3233
+ // if (op_info->buffer_length < op_info->op.sign.sig_len / 2) {
3234
+ // uint16_t padding =
3235
+ // (op_info->op.sign.sig_len / 2) - op_info->buffer_length;
3236
+ // memmove(op_info->buffer + padding, op_info->buffer,
3237
+ // op_info->buffer_length);
3238
+ // memset(op_info->buffer, 0, padding);
3239
+ // op_info->buffer_length += padding;
3240
+ // } else if (op_info->buffer_length > op_info->op.sign.sig_len / 2) {
3241
+ // op_info->buffer_length = op_info->op.sign.sig_len / 2;
3242
+ // }
3238
3243
}
3239
3244
3240
3245
// TODO(adma): check if more steps are need for PSS or ECDSA
Original file line number Diff line number Diff line change @@ -37,10 +37,15 @@ echo "this is test data" > data.txt
37
37
# ## because it will not look for a key by label/alias. However, specifying an object to delete by its label/alias seems
38
38
# ## to work just fine.
39
39
40
- EC_CURVES=(" secp224r1" " secp256r1" " secp384r1" " secp256k1" " brainpoolP256r1" " brainpoolP384r1" " brainpoolP512r1" )
41
- # EC_CURVES=("secp224r1" "secp256r1" "secp384r1" "secp521r1" "secp256k1" "brainpoolP256r1" "brainpoolP384r1" "brainpoolP512r1")
40
+ # EC_CURVES=("secp224r1" "secp256r1" "secp384r1" "secp256k1" "brainpoolP256r1" "brainpoolP384r1" "brainpoolP512r1")
41
+ EC_CURVES=(" secp224r1" " secp256r1" " secp384r1" " secp521r1" " secp256k1" " brainpoolP256r1" " brainpoolP384r1" " brainpoolP512r1" )
42
42
43
43
for curve in " ${EC_CURVES[@]} " ; do
44
+
45
+ echo " **********************************"
46
+ echo " $curve "
47
+ echo " **********************************"
48
+
44
49
# # Generate key
45
50
test " pkcs11-tool --module $MODULE --login --pin 0001password --keypairgen --id 1 --key-type EC:$curve " " Generate EC key with curve $curve "
46
51
test " pkcs11-tool --module $MODULE --login --pin 0001password --read-object --id 1 --type pubkey --output-file pubkey.der" " Get public key of generated key"
@@ -93,6 +98,11 @@ test "openssl dgst -sha384 -binary -out data.sha384 data.txt" " Hash data with
93
98
test " openssl dgst -sha512 -binary -out data.sha512 data.txt" " Hash data with SHA512 and OpenSSL"
94
99
95
100
for len in " ${RSA_LENGTHS[@]} " ; do
101
+
102
+ echo " **********************************"
103
+ echo " RSA$len "
104
+ echo " **********************************"
105
+
96
106
# Generate key
97
107
test " pkcs11-tool --module $MODULE --login --pin 0001password --keypairgen --id 1 --key-type rsa:$len --usage-sign --usage-decrypt" " Generate RSA$len key"
98
108
test " pkcs11-tool --module $MODULE --login --pin 0001password --read-object --id 1 --type pubkey --output-file pubkey.der" " Get public key of generated key"
You can’t perform that action at this time.
0 commit comments