Open gilles-peskine-arm opened 3 years ago
Note that the pk interface assumes that the input of the signature interface is a hash. So this task only applies to Ed25519ph. Ed25519 (where data derived from the private key is fed to the hash) is out of scope.
Is ed25519ph now fully implemented ? Could someone please post an example snippet on how to use this ?
No, EdDSA is not implemented yet. There's a pull request for it (just the algorithm, not the pk interface), which we currently lack the bandwidth to review.
hi,do you have plans to develop x509 certificate parsing with ED2519 signature?
@georgegan2023 There's currently no issue for that, so please raise one if you're interested. I expect that it'll be easy once we have EdDSA itself, but we need to track that separately since it won't be automatic (we'll at least need OIDs).
Please note that EdDSA is something we definitely want, but at the moment we can't commit to when we'll have it.
mbedtls_pk_sign
andmbedtls_pk_verify
.See also https://github.com/ARMmbed/mbedtls/issues/2452, which is likely to be completed at the same time.
Restartable operation is out of scope.
Prerequisites:
Foreseen extensions: