-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Generate DC test vectors and add other signature schemes #35
Conversation
To me, it seems like |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To me, it seems like
-make-dcvectors
and-make-dc
are the same thing. Also, instead of a-dc-algo
argument, we could have an-alg
argument that is passed tomake-dc
,make-root
, etc. I sayalg
and notsig-alg
because we might potentially wrap post-quantum KEMs in DCs.
I agree .... the new option is much more general. Though I would just stick with "-alg" or "-dc-algo" and not differentiate between KEM/signatures at this stage.
I like that of the -alg argument. Around the |
Yeah, I was thinking the latter. For each testcase, the CI runner will dynamically generate the artifacts, run a client-server interaction and then clean up by deleting the artifacts. If (for example) signature algorithms for the root, intermediate cert, and DC are chosen randomly for each testcase run, this might get us decent coverage of the many possible combinations without too much additional complexity. |
This is done now. I added some todos regarding:
I can send that as part of other PRs. Let me know what you think @xvzcf |
) | ||
|
||
type ECDSASigner struct { | ||
// Signer represents an structure holding the signing information | ||
type Signer struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be fine for now, but I'm guessing once we handle RSA we should probably have a separate struct for that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It could also be that we have a bool for each case: isRSA, is ed25519 and curve
param for eddsa.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As discussed, the TODOs can be addressed once I break out the common code into an internal
library.
Open for comments ;)
cc./ @cjpatton @chris-wood @xvzcf