[PATCH v2] Truncate hash values for ECDSA signature scheme
Dmitry Eremin-Solenikov
dbaryshkov at gmail.com
Wed Dec 25 12:23:01 CET 2013
On Sun, Dec 22, 2013 at 5:15 PM, Dmitry Eremin-Solenikov
<dbaryshkov at gmail.com> wrote:
> --- a/tests/pubkey.c
> +++ b/tests/pubkey.c
> @@ -980,9 +980,23 @@ check_ecc_sample_key (void)
> "(data (flags raw)\n"
> " (value #00112233445566778899AABBCCDDEEFF"
> /* */ "000102030405060708090A0B0C0D0E0F#))";
> + static const char hash2_string[] =
> + "(data (flags raw)\n"
> + " (value #00112233445566778899AABBCCDDEEFF"
> + /* */ "000102030405060708090A0B0C0D0E0F"
> + /* */ "000102030405060708090A0B0C0D0E0F"
> + /* */ "00112233445566778899AABBCCDDEEFF#))";
> + /* hash2, but longer than curve length, so it will be truncated */
> + static const char hash3_string[] =
> + "(data (flags raw)\n"
> + " (value #00112233445566778899AABBCCDDEEFF"
> + /* */ "000102030405060708090A0B0C0D0E0F"
> + /* */ "000102030405060708090A0B0C0D0E0F"
> + /* */ "00112233445566778899AABBCCDDEEFF"
> + /* */ "000102030405060708090A0B0C0D0E0F#))";
I forgot about the test. It needs to be fixed.
s/value/hash sha1/ in both lines. I will post patch in the evening.
--
With best wishes
Dmitry
More information about the Gcrypt-devel
mailing list