On Monday, September 9, 2019 at 2:06:51 AM UTC-4, Philippe Antoine wrote: > > Hi Jeffrey, > > So it looks like the problem is limited to brainpool curves at the moment. > I'm guessing it may apply to custom curves, too. > > > That is indeed the reproducer given by oss-fuzz. > I am not sure if oss-fuzz would give another reproducer with another curve > (or treat it as duplicate) > I can download and send you the whole corpus so that you can run tests on > it if you wish. > > My fuzzer does not do custom curves, only standard ones from TLS standard > (see the sources from the link below). >
Thanks again Philippe. I've got some free time and want to loop back around to this again. Have you noticed any patterns to the failures? I think the first step is to generate some test data and wire it into our self tests. Known answer tests where we arrive at the expected answer are OK, but I really want the ones like you are finding. Based on the two failures, does this only happen when x gets large, like within a certain range of p? Or maybe with the high bit set? Jeff -- You received this message because you are subscribed to "Crypto++ Users". More information about Crypto++ and this group is available at http://www.cryptopp.com and http://groups.google.com/forum/#!forum/cryptopp-users. --- You received this message because you are subscribed to the Google Groups "Crypto++ Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to cryptopp-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/cryptopp-users/6fbad1bd-2948-4972-8902-e0f0b511fe81%40googlegroups.com.