aboutsummaryrefslogtreecommitdiff
path: root/3rdparty
diff options
context:
space:
mode:
authorGilles Peskine <Gilles.Peskine@arm.com>2024-04-24 16:23:06 +0200
committerGilles Peskine <Gilles.Peskine@arm.com>2024-04-24 16:28:00 +0200
commitcbb4507b44fe5da30658c9694567b91bd3e305b1 (patch)
treefafee84b6ddc147fa88b0daa09c056c87dbeaaf6 /3rdparty
parent9c3ebe30b85cfa4558d769e7ff36e716334bb127 (diff)
downloadmbedtls-cbb4507b44fe5da30658c9694567b91bd3e305b1.zip
mbedtls-cbb4507b44fe5da30658c9694567b91bd3e305b1.tar.gz
mbedtls-cbb4507b44fe5da30658c9694567b91bd3e305b1.tar.bz2
Use large enough keys when testing parsing of non-word-aligned RSA sizes
When PSA is available, we exercise the parsed RSA key with PKCS#1v1.5 signature, which requires the modulus size in bytes to be at least tLen + 11 (per RFC 8017 ยง9.2) where tLen = hLen + oidLen + 6 and hLen = 32, oidLen = 9 for SHA-512 or SHA3-512. 10 is the DER overhead (3 ASN.1 type-length headers with lengths <128). Replace 512-bit test cases (good enough for SHA-256 but not SHA-384 and up) by 768-bit and up (good enough for SHA-512). Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
Diffstat (limited to '3rdparty')
0 files changed, 0 insertions, 0 deletions