Manuel Pégourié-Gonnard 79ae7eb4d1 Use deterministic ECDSA in PSA when we do in legacy
This fixes the two failing cases in test_suite_pk when ECP_RESTARTABLE
and USE_PSA_CRYPTO are both enabled. The two failing cases where

    ECDSA restartable sign/verify: ECDSA, max_ops=0 (disabled)
    ECDSA restartable sign/verify: ECKEY, max_ops=0 (disabled)

associated with test function pk_sign_verify_restart(). The failure was
caused by the interaction of several things that are each reasonable on
their own:

1. The test function relies on ECDSA restartable, which is reasonable as it
allows making sure that the generated signature is correct with a simple
memcmp().
2. The implementation of pk_sign_restartable() has a shortcut to
dispatch to the sign function (as opposed to sign_restartable) when
restart is disabled (max_ops == 0).
3. When USE_PSA is enabled, the sign function dispatches to PSA, which
so far always used ECDSA (non-deterministic) even when the non-PSA
version would use deterministic ECDSA.

This could be fixed by changing any of those. I chose (3) because I
think it makes sense that when PK dispatches to PSA instead of legacy
this should not change which version of ECDSA is selected.

OTOH, I think it makes sense to keep (2), because that means more
opportunities to dispatch to PSA.

Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2022-12-09 10:07:19 +01:00
..
2022-10-19 08:35:08 -04:00
2021-06-28 09:24:07 +01:00
2022-11-25 13:34:59 +01:00
2022-10-07 14:08:42 +01:00
2022-09-16 12:02:48 +02:00
2022-10-13 14:30:03 +01:00
2022-10-13 14:29:38 +01:00
2022-10-13 16:47:13 +01:00
2021-06-28 09:24:07 +01:00
2021-03-29 14:20:18 +01:00
2021-03-29 14:20:18 +01:00
2021-06-28 09:24:07 +01:00
2022-08-31 10:14:25 +01:00
2022-05-12 09:45:03 +01:00
2022-07-01 16:43:25 +01:00
2022-11-09 22:43:31 +08:00
2022-10-19 08:35:09 -04:00
2022-11-29 15:19:27 +08:00
2022-11-28 17:34:06 +08:00
2022-03-29 17:43:56 +02:00
2022-10-28 12:51:35 -04:00
2022-10-28 12:51:35 -04:00
2022-10-28 12:51:35 -04:00