Adjust FIPS EC/DSA self test data for different nonce generation

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24265)

(cherry picked from commit 8a1f654680)
This commit is contained in:
Tomas Mraz 2024-04-25 20:18:51 +02:00
parent 1c3286a3c7
commit d39f5746d4
1 changed files with 25 additions and 25 deletions

View File

@ -1433,14 +1433,14 @@ static const unsigned char ecd_prime_pub[] = {
0x82
};
static const unsigned char ecdsa_prime_expected_sig[] = {
0x30, 0x3d, 0x02, 0x1d, 0x00, 0xd2, 0x4a, 0xc9,
0x4f, 0xaf, 0xdb, 0x62, 0xfc, 0x41, 0x4a, 0x81,
0x2a, 0x9f, 0xcf, 0xa3, 0xda, 0xfe, 0xa3, 0x49,
0xbd, 0xea, 0xbf, 0x2a, 0x51, 0xb4, 0x0b, 0xc3,
0xbc, 0x02, 0x1c, 0x7f, 0x30, 0xb7, 0xad, 0xab,
0x09, 0x6e, 0x3c, 0xad, 0x7f, 0xf9, 0x5e, 0xaa,
0xe2, 0x38, 0xe5, 0x29, 0x16, 0xc4, 0xc8, 0x77,
0xa1, 0xf8, 0x60, 0x77, 0x39, 0x7a, 0xec
0x30, 0x3d, 0x02, 0x1c, 0x48, 0x4f, 0x3c, 0x97,
0x5b, 0xfa, 0x40, 0x6c, 0xdb, 0xd6, 0x70, 0xb5,
0xbd, 0x2d, 0xd0, 0xc6, 0x22, 0x93, 0x5a, 0x88,
0x56, 0xd0, 0xaf, 0x0a, 0x94, 0x92, 0x20, 0x01,
0x02, 0x1d, 0x00, 0xa4, 0x80, 0xe0, 0x47, 0x88,
0x8a, 0xef, 0x2a, 0x47, 0x9d, 0x81, 0x9a, 0xbf,
0x45, 0xc3, 0x6f, 0x9e, 0x2e, 0xc1, 0x44, 0x9f,
0xfd, 0x79, 0xdb, 0x90, 0x3e, 0xb9, 0xb2
};
static const ST_KAT_PARAM ecdsa_prime_key[] = {
ST_KAT_PARAM_UTF8STRING(OSSL_PKEY_PARAM_GROUP_NAME, ecd_prime_curve_name),
@ -1468,15 +1468,15 @@ static const unsigned char ecd_bin_pub[] = {
0x99, 0xb6, 0x8f, 0x80, 0x46
};
static const unsigned char ecdsa_bin_expected_sig[] = {
0x30, 0x3f, 0x02, 0x1d, 0x08, 0x11, 0x7c, 0xcd,
0xf4, 0xa1, 0x31, 0x9a, 0xc1, 0xfd, 0x50, 0x0e,
0x5d, 0xa9, 0xb6, 0x0e, 0x95, 0x49, 0xe1, 0xbd,
0x44, 0xe3, 0x5b, 0xa9, 0x35, 0x94, 0xa5, 0x2f,
0xae, 0x02, 0x1e, 0x00, 0xe3, 0xba, 0xb8, 0x8f,
0x4b, 0x05, 0x76, 0x88, 0x1e, 0x49, 0xd6, 0x62,
0x76, 0xd3, 0x22, 0x4d, 0xa3, 0x7b, 0x04, 0xcc,
0xfa, 0x7b, 0x41, 0x9b, 0x8c, 0xaf, 0x1b, 0x6d,
0xbd
0x30, 0x3f, 0x02, 0x1d, 0x58, 0xe9, 0xd0, 0x84,
0x5c, 0xad, 0x29, 0x03, 0xf6, 0xa6, 0xbc, 0xe0,
0x24, 0x6d, 0x9e, 0x79, 0x5d, 0x1e, 0xe8, 0x5a,
0xc3, 0x31, 0x0a, 0xa9, 0xfb, 0xe3, 0x99, 0x54,
0x11, 0x02, 0x1e, 0x00, 0xa3, 0x44, 0x28, 0xa3,
0x70, 0x97, 0x98, 0x17, 0xd7, 0xa6, 0xad, 0x91,
0xaf, 0x41, 0x69, 0xb6, 0x06, 0x99, 0x39, 0xc7,
0x63, 0xa4, 0x6a, 0x81, 0xe4, 0x9a, 0x9d, 0x15,
0x8b
};
static const ST_KAT_PARAM ecdsa_bin_key[] = {
ST_KAT_PARAM_UTF8STRING(OSSL_PKEY_PARAM_GROUP_NAME, ecd_bin_curve_name),
@ -1604,14 +1604,14 @@ static const unsigned char dsa_priv[] = {
0x40, 0x7e, 0x5c, 0xb7
};
static const unsigned char dsa_expected_sig[] = {
0x30, 0x3c, 0x02, 0x1c, 0x70, 0xa4, 0x77, 0xb6,
0x02, 0xb5, 0xd3, 0x07, 0x21, 0x22, 0x2d, 0xe3,
0x4f, 0x7d, 0xfd, 0xfd, 0x6b, 0x4f, 0x03, 0x27,
0x4c, 0xd3, 0xb2, 0x8c, 0x7c, 0xc5, 0xc4, 0xdf,
0x02, 0x1c, 0x11, 0x52, 0x65, 0x16, 0x9f, 0xbd,
0x4c, 0xe5, 0xab, 0xb2, 0x01, 0xd0, 0x7a, 0x30,
0x5c, 0xc5, 0xba, 0x22, 0xc6, 0x62, 0x7e, 0xa6,
0x7d, 0x98, 0x96, 0xc9, 0x77, 0x00
0x30, 0x3c, 0x02, 0x1c, 0x69, 0xc6, 0xd6, 0x9e,
0x2b, 0x91, 0xea, 0x72, 0xb3, 0x8b, 0x7c, 0x57,
0x48, 0x75, 0xb7, 0x65, 0xc0, 0xb4, 0xf7, 0xbb,
0x08, 0xa4, 0x95, 0x77, 0xfc, 0xa7, 0xed, 0x31,
0x02, 0x1c, 0x4c, 0x2c, 0xff, 0xc6, 0x55, 0xeb,
0x8f, 0xa7, 0x4f, 0x27, 0xd8, 0xec, 0xfd, 0x62,
0x73, 0xf2, 0xd1, 0x55, 0xa5, 0xf0, 0x41, 0x68,
0x34, 0x8d, 0x9e, 0x88, 0x08, 0x06
};
static const ST_KAT_PARAM dsa_key[] = {