point=04202020202020ffffff2020202020200020ffffffff20202020ff20ff20ff200104c8423eb699c3ace2e623855cb9238cb43971464f4b6686765c46ed4ce035dc
bignum=000000000000000000000000000000000000000000000000000000000000000a
mbedlts:045de6bae41907dbe3f0aa32b272add6b92fb2b79fdc49af35fb844be1c4c629e899295109c41cfe76a9c06c23d95b2d4be3b6f61a476acf1a67a0d848abba89e1
libecc:045de6bae41907dbe3f0aa32b272add6b92fb2b79fdc49af35fb844be1c4c629e899295109c41cfe76a9c06c23d95b2d4be3b6f61a476acf1a67a0d848abba89e1
libecc:045de6bae41907dbe3f0aa32b272add6b92fb2b79fdc49af35fb844be1c4c629e899295109c41cfe76a9c06c23d95b2d4be3b6f61a476acf1a67a0d848abba89e1
openssl:045de6bae41907dbe3f0aa32b272add6b92fb2b79fdc49af35fb844be1c4c629e899295109c41cfe76a9c06c23d95b2d4be3b6f61a476acf1a67a0d848abba89e1
gcrypt:045de6bae41907dbe3f0aa32b272add6b92fb2b79fdc49af35fb844be1c4c629e899295109c41cfe76a9c06c23d95b2d4be3b6f61a476acf1a67a0d848abba89e1
cryptopp:0407f16bad8b16f5441f1a15f8e7eca364d97bb3a3c09b320bb9807ee26857b66f882ba526e55ebbf22342ae5a0186ed0ca1db8870fd001c63ae36dc72ee15f6e7
That means when I multiply by 10 the point on the curve brainpoolP256r1
x = 202020202020ffffff2020202020200020ffffffff20202020ff20ff20ff2001
y = 04c8423eb699c3ace2e623855cb9238cb43971464f4b6686765c46ed4ce035dc
I get a different result than all the other libraries
I will look into it a bit more, but I already wanted to let you know this...
Best regards,
Philippe
Hi Jeffrey,
Yes, version commit is 8fa8ec9913ccd2ce44f71014322ddb7e198fef68 from yesterday.
It used to work before
Regression range is Cryptopp: b3eb4c6a690d6dfb342856f2a66a71dcec8c429b:a01711e347df30a994609537ce9be2926a366a44
I'm not sure why our self tests did not detect the failure. I think that is a bigger problem.
--
You received this message because you are subscribed to "Crypto++ Users". More information about Crypto++ and this group is available at http://www.cryptopp.com and http://groups.google.com/forum/#!forum/cryptopp-users.
---
You received this message because you are subscribed to the Google Groups "Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cryptopp-user...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cryptopp-users/1BA21383-E3A1-4E56-9C59-607245ED7A71%40catenacyber.fr.
Hi,The fix does not seem complete.Here is another reproducer found by oss-fuzzInteger x("0x20ffff2020ff000020ff2020202020ff20ff20ff202020ffffff20200020ffff");
Integer y("0xba1a84de8fe276f1d082e3e7c10f35e0baca90baca7c9502044854dba0ecdebc");
Integer s("0x0000000000000000000000000000000000000000000000000000000000000007");
So it looks like the problem is limited to brainpool curves at the moment. I'm guessing it may apply to custom curves, too.
I found oss-fuzz at https://github.com/google/oss-fuzz. Is this your GitHub with the sources? If so, could you point out the program of interest?
Hi Jeffrey,So it looks like the problem is limited to brainpool curves at the moment. I'm guessing it may apply to custom curves, too.That is indeed the reproducer given by oss-fuzz.I am not sure if oss-fuzz would give another reproducer with another curve (or treat it as duplicate)I can download and send you the whole corpus so that you can run tests on it if you wish.My fuzzer does not do custom curves, only standard ones from TLS standard (see the sources from the link below).