Thanks very much, I'll do that.
Paul
-Original Message-
From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Dr. Stephen Henson
Sent: 14 November 2011 12:31
To: openssl-users@openssl.org
Subject: Re: ECDSA with SHA384 - Verification
On Mon, N
On Mon, Nov 14, 2011, Caswell, Paul wrote:
> I have a specific requirement to perform a KAT and am struggling with
> setting k as per my original e-mail.
Well you were on the right lines with your original email. If you look in
ecdsa_sign_setup in ecs_ossl.c you'll see how it uses a random k valu
: openssl-users@openssl.org
Subject: Re: ECDSA with SHA384 - Verification
On Mon, Nov 14, 2011, Caswell, Paul wrote:
> Hi Steve,
> Does this mean you have something I can look at or are you trying to
> tell me that I don't need to test our software as OpenSSL already
tests
> ECDSA?
I
On Mon, Nov 14, 2011, Caswell, Paul wrote:
> Hi Steve,
> Does this mean you have something I can look at or are you trying to
> tell me that I don't need to test our software as OpenSSL already tests
> ECDSA?
It depends on what you want to test ECDSA for. If it is part of FIPS 140-2
compliance (
Of Dr. Stephen Henson
Sent: 14 November 2011 11:54
To: openssl-users@openssl.org
Subject: Re: ECDSA with SHA384 - Verification
On Mon, Nov 14, 2011, Caswell, Paul wrote:
> Hellol,
>
> We have some software that uses OpenSSL for digital signature creation
> and verification. I have to imp
On Mon, Nov 14, 2011, Caswell, Paul wrote:
> Hellol,
>
> We have some software that uses OpenSSL for digital signature creation
> and verification. I have to implement a means to test this against
> known answers and so have fished out the test vectors for ECDSA from
> http://csrc.nist.gov/group