Skip to content

Commit 21728cf

Browse files
PFnordrlubos
authored andcommitted
added skip in ecdsa verify if eddsaph
1 parent b41e899 commit 21728cf

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

oberon/drivers/oberon_ecdsa.c

+4
Original file line numberDiff line numberDiff line change
@@ -295,6 +295,7 @@ psa_status_t oberon_ecdsa_sign_message(
295295
switch (psa_get_key_bits(attributes)) {
296296
#ifdef PSA_NEED_OBERON_PURE_EDDSA_TWISTED_EDWARDS_255
297297
case 255:
298+
if (alg == PSA_ALG_ED25519PH) return PSA_ERROR_NOT_SUPPORTED;
298299
if (key_length != ocrypto_ed25519_SECRET_KEY_BYTES) return PSA_ERROR_INVALID_ARGUMENT;
299300
if (signature_size < ocrypto_ed25519_BYTES) return PSA_ERROR_BUFFER_TOO_SMALL;
300301
*signature_length = ocrypto_ed25519_BYTES;
@@ -304,6 +305,7 @@ psa_status_t oberon_ecdsa_sign_message(
304305
#endif
305306
#ifdef PSA_NEED_OBERON_PURE_EDDSA_TWISTED_EDWARDS_448
306307
case 448:
308+
if (alg == PSA_ALG_ED448PH) return PSA_ERROR_NOT_SUPPORTED;
307309
if (key_length != ocrypto_ed448_SECRET_KEY_BYTES) return PSA_ERROR_INVALID_ARGUMENT;
308310
if (signature_size < ocrypto_ed448_BYTES) return PSA_ERROR_BUFFER_TOO_SMALL;
309311
*signature_length = ocrypto_ed448_BYTES;
@@ -484,6 +486,7 @@ psa_status_t oberon_ecdsa_verify_message(
484486
switch (psa_get_key_bits(attributes)) {
485487
#ifdef PSA_NEED_OBERON_PURE_EDDSA_TWISTED_EDWARDS_255
486488
case 255:
489+
if (alg == PSA_ALG_ED25519PH) return PSA_ERROR_NOT_SUPPORTED;
487490
if (key_length != ocrypto_ed25519_PUBLIC_KEY_BYTES) return PSA_ERROR_INVALID_ARGUMENT;
488491
if (signature_length != ocrypto_ed25519_BYTES) return PSA_ERROR_INVALID_SIGNATURE;
489492
if (type == PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS)) {
@@ -495,6 +498,7 @@ psa_status_t oberon_ecdsa_verify_message(
495498
#endif /* PSA_NEED_OBERON_PURE_EDDSA_TWISTED_EDWARDS_255 */
496499
#ifdef PSA_NEED_OBERON_PURE_EDDSA_TWISTED_EDWARDS_448
497500
case 448:
501+
if (alg == PSA_ALG_ED448PH) return PSA_ERROR_NOT_SUPPORTED;
498502
if (key_length != ocrypto_ed448_PUBLIC_KEY_BYTES) return PSA_ERROR_INVALID_ARGUMENT;
499503
if (signature_length != ocrypto_ed448_BYTES) return PSA_ERROR_INVALID_SIGNATURE;
500504
if (type == PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS)) {

0 commit comments

Comments
 (0)