diff options
| author | J08nY | 2016-11-26 19:24:37 +0100 |
|---|---|---|
| committer | J08nY | 2016-11-26 19:46:32 +0100 |
| commit | 1a0d0b14ff7720b98ffdda4651bf1b58d34203bd (patch) | |
| tree | 325fa9160b154b543cf21419c5909aad95a815ae /src/applets/ECKeyTester.java | |
| parent | 7ef646a52fe3e470a0d283d0fb0db5265f444794 (diff) | |
| download | ECTester-1a0d0b14ff7720b98ffdda4651bf1b58d34203bd.tar.gz ECTester-1a0d0b14ff7720b98ffdda4651bf1b58d34203bd.tar.zst ECTester-1a0d0b14ff7720b98ffdda4651bf1b58d34203bd.zip | |
Diffstat (limited to 'src/applets/ECKeyTester.java')
| -rw-r--r-- | src/applets/ECKeyTester.java | 14 |
1 files changed, 5 insertions, 9 deletions
diff --git a/src/applets/ECKeyTester.java b/src/applets/ECKeyTester.java index d6ff6c1..acfb64e 100644 --- a/src/applets/ECKeyTester.java +++ b/src/applets/ECKeyTester.java @@ -143,16 +143,12 @@ public class ECKeyTester { short result = ISO7816.SW_NO_ERROR; try { ecdsaSignature.init(signKey, Signature.MODE_SIGN); - short sigLength = ecdsaSignature.sign(inputBuffer, inputOffset, inputLength, sigBuffer, sigOffset); - if (sigLength != 20) { // per javacard.security.Signature an ALG_ECDSA_SHA should be 20 bytes. - result = SimpleECCApplet.SW_SIG_LENGTH_MISMATCH; - } else { - ecdsaSignature.init(verifyKey, Signature.MODE_VERIFY); - boolean correct = ecdsaSignature.verify(inputBuffer, inputOffset, inputLength, sigBuffer, sigOffset, sigLength); - if (!correct) { - result = SimpleECCApplet.SW_SIG_VERIFY_FAIL; - } + + ecdsaSignature.init(verifyKey, Signature.MODE_VERIFY); + boolean correct = ecdsaSignature.verify(inputBuffer, inputOffset, inputLength, sigBuffer, sigOffset, sigLength); + if (!correct) { + result = SimpleECCApplet.SW_SIG_VERIFY_FAIL; } } catch (CryptoException ce) { result = ce.getReason(); |
