requirement of secure firmware upgrade and secure boot using stsafe a110 crypto chip. Is there any limitation for signature verification about the message length and the type of the private key that need to be used for the signature creation.
I have STSafe a110 crypto chip in my hardware. I have created the private and public key pairs and signed the firmware image. During the firmware upgrade, on host side, the signature needs to be verified using the stsafe a110 chip. I have used ECDSA_do_verify(&Hash[0], 64, sig, eckey_pub); but i got "OpenSSL error 218570907 error:0D07209B:asn1 encoding routines:ASN1_get_object:too long" error. After that i have changed the message size to ECDSA_do_verify(&Hash[0], 32, sig, eckey_pub); But now it is failing with StSafeA_VerifyMessageSignature called, StatusCode:0 SignatureValidity=0 error.
What could be the reason for it? is there a limitation of 32byte message size? are there any other limitations because of which signature verification is failing?
