On Fri, Jan 30, 2009 at 10:48:13AM -0800, Marco wrote: > > I have been working with Crypto++ code and I have encountered a bug. > While using DiffieHelman key generator - GenerateKeyPair function, my > program got into endless recursion (stack overflow). Assemby showed > RecursiveInverseModPower2 function and analyzing this function pointed > to a bug - using key length dividable by 3 just flies into endless > recursion. My test used 768bit / 96byte key. It would be great if this > could be fixed...
It would be easier to reproduce this bug having group description and public/private keys, both pairs. It would be great to generate something fresh, double-check problem exists, dump as text or DER, and send to the list. Please make sure not to send any production keys. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [email protected]. More information about Crypto++ and this group is available at http://www.cryptopp.com. -~----------~----~----~----~------~----~------~--~---
