ecc_sign_determinisitic.c test for for deterministic ECDSA Prime Field for SECP256R1, SECP384R1, and SECP521R .gitignore addition and binary file exclusion.

ecc_sign_determinsitic_k2
aidan garske 2024-07-03 10:25:58 -07:00
parent 49bfb703a7
commit 413b997e7f
3 changed files with 8 additions and 10 deletions

1
.gitignore vendored
View File

@ -224,6 +224,7 @@ pk/rsa-pss/sign.txt
pk/rsa/rsa-nb
pk/ecc/ecc_verify
pk/ecc/ecc_sign
pk/ecc/ecc_sign_determinisitc
pk/ecc/ecc_pub
pk/ecc/ecc_keys

Binary file not shown.

View File

@ -466,14 +466,14 @@ int main()
uint8_t sig[ECC_KEY_SIZE*2];
uint32_t sigSz = 0;
#ifdef DEBUG_WOLFSSL
wolfSSL_Debugging_ON();
#endif
#ifdef DEBUG_WOLFSSL
wolfSSL_Debugging_ON();
#endif
if (ECC_KEY_SIZE == 66)
printf("Running NIST P-%d,SHA-%d Deterministic Sign Test\n", (ECC_KEY_SIZE*8)-7, DIGEST_SZ*8);
else
printf("Running NIST P-%d,SHA-%d Deterministic Sign Test\n", (ECC_KEY_SIZE*8), DIGEST_SZ*8);
if (ECC_KEY_SIZE == 66)
printf("Running NIST P-%d,SHA-%d Deterministic Sign Test\n", (ECC_KEY_SIZE*8)-7, DIGEST_SZ*8);
else
printf("Running NIST P-%d,SHA-%d Deterministic Sign Test\n", (ECC_KEY_SIZE*8), DIGEST_SZ*8);
memset(sig, 0, sizeof(sig));
@ -487,9 +487,6 @@ else
print_hex(hash, sizeof(hash));
/* Sign hash using private key */
/* Note: result of an ECC sign varies for each call even with same
private key and hash. This is because a new random public key is
used for each operation. */
sigSz = sizeof(sig);
ret = crypto_ecc_sign(
kPrivKey, sizeof(kPrivKey), /* private key */