mpi_swap_cond: different sizes error on eddsa key generation

Kostis Andrikopoulos el11151 at mail.ntua.gr
Tue Dec 6 20:40:12 CET 2016


On 11/26/2016 01:11 AM, NIIBE Yutaka wrote:
> Or..., could you give me information on:
> Is the call sequence following?
> 
>     ...
>     -> ecc_generate
>     -> _gcry_ecc_eddsa_genkey
>     -> _gcry_mpi_ec_mul_point
>     -> point_swap_cond
>     -> mpi_swap_cond
>     -> log_bug
> 
Hello again,

we run the application in gdb and got the following stack trace:

https://foss.ntua.gr/paste/?09531d0b88a9cd2c#0JMzhgYKcSPzQUtCKmGpUEs1ahW2NtJmye/zb+T7dKo=

The call sequence seems to be the one you suggested.

-- 
Ανδρικόπουλος Κωνσταντίνος
031 11 151 ΣΗΜΜΥ



More information about the Gcrypt-devel mailing list