Merge pull request #167 from cariepointer/signature-example
Add SHA224 as an option for <hash> type in usage print statement and …pull/93/head
commit
dfc56a1985
|
@ -2,7 +2,7 @@
|
|||
|
||||
This directory contains:
|
||||
|
||||
A simple example of using wolfSSL to sign and verify binary data. It supports RSA and ECC for signing and MD2, MD4, MD5, SHA, SHA256, SHA384 and SHA512.
|
||||
A simple example of using wolfSSL to sign and verify binary data. It supports RSA and ECC for signing and MD2, MD4, MD5, SHA, SHA224, SHA256, SHA384 and SHA512.
|
||||
|
||||
This example creates a signature from a hash of the file and signs it using a generated key. Then it performs a verification using the signature and public key.
|
||||
|
||||
|
|
|
@ -425,7 +425,7 @@ int main(int argc, char** argv)
|
|||
if (argc < 2) {
|
||||
printf("Usage: signature <filename> <sig> <hash> <verifyfile> \n");
|
||||
printf(" <sig>: 1=ECC, 2=RSA, 3=RSA (w/DER Encoding): default %d\n", sig_type);
|
||||
printf(" <hash>: 1=MD2, 2=MD4, 3=MD5, 4=SHA, 5=SHA256, 6=SHA384, 7=SHA512, 8=MD5+SHA: default %d\n", hash_type);
|
||||
printf(" <hash>: 1=MD2, 2=MD4, 3=MD5, 4=SHA, 5=SHA224, 6=SHA256, 7=SHA384, 8=SHA512, 9=MD5+SHA: default %d\n", hash_type);
|
||||
printf(" <verifyfile>: optional sig verify binary file\n");
|
||||
return 1;
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue