mpi_swap_cond: different sizes error on eddsa key generation
Kostis Andrikopoulos
el11151 at mail.ntua.gr
Tue Dec 6 20:40:12 CET 2016
On 11/26/2016 01:11 AM, NIIBE Yutaka wrote:
> Or..., could you give me information on:
> Is the call sequence following?
>
> ...
> -> ecc_generate
> -> _gcry_ecc_eddsa_genkey
> -> _gcry_mpi_ec_mul_point
> -> point_swap_cond
> -> mpi_swap_cond
> -> log_bug
>
Hello again,
we run the application in gdb and got the following stack trace:
https://foss.ntua.gr/paste/?09531d0b88a9cd2c#0JMzhgYKcSPzQUtCKmGpUEs1ahW2NtJmye/zb+T7dKo=
The call sequence seems to be the one you suggested.
--
Ανδρικόπουλος Κωνσταντίνος
031 11 151 ΣΗΜΜΥ
More information about the Gcrypt-devel
mailing list