// check public key generated with the private key BLE [80651]:testECCKeyGen - original private key BLE [80652] l=32: E7 A2 4F 2B E2 66 86 11 D0 2C 88 3C 74 F6 E9 0C 7E 43 B8 A9 8C 2A CA CD 73 C0 DD 19 86 24 8F 0D BLE [80653]:testECCKeyGen - ECCROMCC26XX_genKeys() private key (32 bytes swap) BLE [80654] l=32: 0D 8F 24 86 19 DD C0 73 CD CA 2A 8C A9 B8 43 7E 0C E9 F6 74 3C 88 2C D0 11 86 66 E2 2B 4F A2 E7 BLE [80662]:testECCKeyGen - generated public key (64 bytes) BLE [80663] l=32: DA 3C 68 85 95 0E A7 F5 83 38 89 3A F1 56 B9 48 55 22 EC 63 EB 78 62 EF E9 19 30 E9 6D 0C CC 07 BLE [80663] l=32: D0 CA 9B A6 04 17 53 D6 D2 8D C5 AF F7 78 F9 CD 0D 31 DE 01 93 A3 82 1A F2 01 25 CB 7A 00 17 3F // test signature generation with the private key and the 76 bytes of message // digest (12 bytes of identity + 64 bytes of public key) BLE [80678]:testECCSigning - original private key BLE [80679] l=32: E7 A2 4F 2B E2 66 86 11 D0 2C 88 3C 74 F6 E9 0C 7E 43 B8 A9 8C 2A CA CD 73 C0 DD 19 86 24 8F 0D BLE [80680]:testECCSigning - public certificate BLE [80694] l=32: 35 31 32 33 34 35 36 37 38 34 12 04 02 A0 F8 A7 5A E6 CB 60 6C F0 63 C9 4E 4F 14 B1 79 B0 F5 72 BLE [80708] l=32: 7F F0 50 91 3F C2 EC 57 5C 24 6E 94 0D 88 4E 4C C8 6D A6 26 59 38 3F 1B D7 89 79 65 1E F2 27 A4 BLE [80722] l=12: AB 65 A1 BE 72 CB F3 CD 1A CF 60 F3 BLE [80735]:testECCSigning - sha2 out (status + 32 hash) BLE [80736] l=1: 00 BLE [80736] l=32: C3 54 89 6D 46 1A DA 64 32 0A DF E9 58 DD 91 03 E7 CC 50 A3 22 B8 F6 85 90 39 B1 C4 B2 89 51 25 BLE [80738]:testECCSigning - ECCROMCC26XX_signHash() private key BLE [80738] l=32: 0D 8F 24 86 19 DD C0 73 CD CA 2A 8C A9 B8 43 7E 0C E9 F6 74 3C 88 2C D0 11 86 66 E2 2B 4F A2 E7 BLE [80747]:testECCSigning - signature BLE [80748] l=32: 69 E7 25 38 AB 8D 20 3B 18 63 C0 43 57 77 88 06 DF 76 F0 84 13 52 C4 60 21 31 3D AB AE 24 C5 EB BLE [80748] l=32: 6F C8 26 15 88 A9 F2 EE 81 43 6F C3 3D 3F 7C CE 08 66 DD A7 BB 76 AA 88 D4 1A 73 1F DC 44 1C 53