Hi,
I am trying to implement CBOR.509 Certificates and I am trying to validate the test certificate in Appendix A.1.2 using the keys in A.1.3. The public key is compressed, but I've already verified that the decompression matches what uECC creates using uECC_compute_public_key(). However, I still can't get the validation to work properly.
When I compute the SHA256 of the message in the test-vector I get:
b5bca215e1d1478d2fe7728a54089f2032a4a1a245fafb5bd21d9eeb9d076aed
However the verification still does not succeed:
Hi, I am trying to implement CBOR.509 Certificates and I am trying to validate the test certificate in Appendix A.1.2 using the keys in A.1.3. The public key is compressed, but I've already verified that the decompression matches what uECC creates using
uECC_compute_public_key()
. However, I still can't get the validation to work properly. When I compute the SHA256 of the message in the test-vector I get:b5bca215e1d1478d2fe7728a54089f2032a4a1a245fafb5bd21d9eeb9d076aed
However the verification still does not succeed:I'm at a loss for what's going on? I have reached out to the authors to validate the SHA256 to ensure I'm getting the right result.