On Monday, September 9, 2019 at 2:06:51 AM UTC-4, Philippe Antoine wrote:
>
> Hi Jeffrey,
>
> So it looks like the problem is limited to brainpool curves at the moment. 
> I'm guessing it may apply to custom curves, too.
>
>
> That is indeed the reproducer given by oss-fuzz.
> I am not sure if oss-fuzz would give another reproducer with another curve 
> (or treat it as duplicate)
> I can download and send you the whole corpus so that you can run tests on 
> it if you wish.
>
> My fuzzer does not do custom curves, only standard ones from TLS standard 
> (see the sources from the link below).
>

Thanks again Philippe. I've got some free time and want to loop back around 
to this again.

Have you noticed any patterns to the failures? I think the first step is to 
generate some test data and wire it into our self tests. Known answer tests 
where we arrive at the expected answer are OK, but I really want the ones 
like you are finding.

Based on the two failures, does this only happen when x gets large, like 
within a certain range of p? Or maybe with the high bit set?

Jeff

-- 
You received this message because you are subscribed to "Crypto++ Users". More 
information about Crypto++ and this group is available at 
http://www.cryptopp.com and 
http://groups.google.com/forum/#!forum/cryptopp-users.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cryptopp-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/cryptopp-users/6fbad1bd-2948-4972-8902-e0f0b511fe81%40googlegroups.com.

Reply via email to