Skip to content

Conversation

@nasahlpa
Copy link
Member

In rsa_padding_pss_verify, salt_bytelen = digest_bytelen. Hence, the test where we use a digest bytelen of 64 bytes (for SHA512) but only use a salt bytelen of 32 bytes cannot work.

According to RFC 8017, 9.1.4: "Typical salt lengths in octets are hLen (the length of the output of the hash function Hash) and 0."

Closes #28656.

In `rsa_padding_pss_verify`, `salt_bytelen = digest_bytelen`. Hence,
the test where we use a digest bytelen of 64 bytes (for SHA512) but
only use a salt bytelen of 32 bytes cannot work.

According to RFC 8017, 9.1.4: "Typical salt lengths in octets are
hLen (the length of the output of the hash function Hash) and 0."

Closes lowRISC#28656.

Signed-off-by: Pascal Nasahl <[email protected]>
Copy link
Contributor

@andrea-caforio andrea-caforio left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice. Thanks for taking care of this @nasahlpa.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[crypto] Fix remaining RSA verify tests

2 participants