You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP224r1_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -66,10 +66,6 @@
66
66
"bugType": "MODIFIED_PARAMETER",
67
67
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
68
68
},
69
-
"Modified curve parameter": {
70
-
"bugType": "MODIFIED_PARAMETER",
71
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
72
-
},
73
69
"ModifiedCofactor": {
74
70
"bugType": "MODIFIED_PARAMETER",
75
71
"description": "The cofactor has been modified. ",
@@ -122,6 +118,10 @@
122
118
"bugType": "MODIFIED_PARAMETER",
123
119
"description": "The order of the public key has been modified.",
124
120
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
121
+
},
122
+
"ModifiedCurveParameter": {
123
+
"bugType": "MODIFIED_PARAMETER",
124
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP256r1_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -70,10 +70,6 @@
70
70
"bugType": "MODIFIED_PARAMETER",
71
71
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
72
72
},
73
-
"Modified curve parameter": {
74
-
"bugType": "MODIFIED_PARAMETER",
75
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
76
-
},
77
73
"ModifiedCofactor": {
78
74
"bugType": "MODIFIED_PARAMETER",
79
75
"description": "The cofactor has been modified. ",
@@ -126,6 +122,10 @@
126
122
"bugType": "MODIFIED_PARAMETER",
127
123
"description": "The order of the public key has been modified.",
128
124
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
125
+
},
126
+
"ModifiedCurveParameter": {
127
+
"bugType": "MODIFIED_PARAMETER",
128
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP320r1_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -62,10 +62,6 @@
62
62
"bugType": "MODIFIED_PARAMETER",
63
63
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
64
64
},
65
-
"Modified curve parameter": {
66
-
"bugType": "MODIFIED_PARAMETER",
67
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
68
-
},
69
65
"ModifiedCofactor": {
70
66
"bugType": "MODIFIED_PARAMETER",
71
67
"description": "The cofactor has been modified. ",
@@ -118,6 +114,10 @@
118
114
"bugType": "MODIFIED_PARAMETER",
119
115
"description": "The order of the public key has been modified.",
120
116
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
117
+
},
118
+
"ModifiedCurveParameter": {
119
+
"bugType": "MODIFIED_PARAMETER",
120
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP384r1_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -66,10 +66,6 @@
66
66
"bugType": "MODIFIED_PARAMETER",
67
67
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
68
68
},
69
-
"Modified curve parameter": {
70
-
"bugType": "MODIFIED_PARAMETER",
71
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
72
-
},
73
69
"ModifiedCofactor": {
74
70
"bugType": "MODIFIED_PARAMETER",
75
71
"description": "The cofactor has been modified. ",
@@ -122,6 +118,10 @@
122
118
"bugType": "MODIFIED_PARAMETER",
123
119
"description": "The order of the public key has been modified.",
124
120
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
121
+
},
122
+
"ModifiedCurveParameter": {
123
+
"bugType": "MODIFIED_PARAMETER",
124
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP512r1_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -66,10 +66,6 @@
66
66
"bugType": "MODIFIED_PARAMETER",
67
67
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
68
68
},
69
-
"Modified curve parameter": {
70
-
"bugType": "MODIFIED_PARAMETER",
71
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
72
-
},
73
69
"ModifiedCofactor": {
74
70
"bugType": "MODIFIED_PARAMETER",
75
71
"description": "The cofactor has been modified. ",
@@ -122,6 +118,10 @@
122
118
"bugType": "MODIFIED_PARAMETER",
123
119
"description": "The order of the public key has been modified.",
124
120
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
121
+
},
122
+
"ModifiedCurveParameter": {
123
+
"bugType": "MODIFIED_PARAMETER",
124
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp224r1_pem_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -60,10 +60,6 @@
60
60
"bugType": "MODIFIED_PARAMETER",
61
61
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
62
62
},
63
-
"Modified curve parameter": {
64
-
"bugType": "MODIFIED_PARAMETER",
65
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
66
-
},
67
63
"ModifiedCofactor": {
68
64
"bugType": "MODIFIED_PARAMETER",
69
65
"description": "The cofactor has been modified. ",
@@ -116,6 +112,10 @@
116
112
"bugType": "MODIFIED_PARAMETER",
117
113
"description": "The order of the public key has been modified.",
118
114
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
115
+
},
116
+
"ModifiedCurveParameter": {
117
+
"bugType": "MODIFIED_PARAMETER",
118
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp224r1_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -62,10 +62,6 @@
62
62
"bugType": "MODIFIED_PARAMETER",
63
63
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
64
64
},
65
-
"Modified curve parameter": {
66
-
"bugType": "MODIFIED_PARAMETER",
67
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
68
-
},
69
65
"ModifiedCofactor": {
70
66
"bugType": "MODIFIED_PARAMETER",
71
67
"description": "The cofactor has been modified. ",
@@ -118,6 +114,10 @@
118
114
"bugType": "MODIFIED_PARAMETER",
119
115
"description": "The order of the public key has been modified.",
120
116
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
117
+
},
118
+
"ModifiedCurveParameter": {
119
+
"bugType": "MODIFIED_PARAMETER",
120
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp256k1_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -62,10 +62,6 @@
62
62
"bugType": "MODIFIED_PARAMETER",
63
63
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
64
64
},
65
-
"Modified curve parameter": {
66
-
"bugType": "MODIFIED_PARAMETER",
67
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
68
-
},
69
65
"ModifiedCofactor": {
70
66
"bugType": "MODIFIED_PARAMETER",
71
67
"description": "The cofactor has been modified. ",
@@ -118,6 +114,10 @@
118
114
"bugType": "MODIFIED_PARAMETER",
119
115
"description": "The order of the public key has been modified.",
120
116
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
117
+
},
118
+
"ModifiedCurveParameter": {
119
+
"bugType": "MODIFIED_PARAMETER",
120
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp256r1_pem_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -68,10 +68,6 @@
68
68
"bugType": "MODIFIED_PARAMETER",
69
69
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
70
70
},
71
-
"Modified curve parameter": {
72
-
"bugType": "MODIFIED_PARAMETER",
73
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
74
-
},
75
71
"ModifiedCofactor": {
76
72
"bugType": "MODIFIED_PARAMETER",
77
73
"description": "The cofactor has been modified. ",
@@ -124,6 +120,10 @@
124
120
"bugType": "MODIFIED_PARAMETER",
125
121
"description": "The order of the public key has been modified.",
126
122
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
123
+
},
124
+
"ModifiedCurveParameter": {
125
+
"bugType": "MODIFIED_PARAMETER",
126
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp256r1_test.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -70,10 +70,6 @@
70
70
"bugType": "MODIFIED_PARAMETER",
71
71
"description": "The cofactor is larger than the limits specified in FIPS-PUB 186-4 table 1, p.36."
72
72
},
73
-
"Modified curve parameter": {
74
-
"bugType": "MODIFIED_PARAMETER",
75
-
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
76
-
},
77
73
"ModifiedCofactor": {
78
74
"bugType": "MODIFIED_PARAMETER",
79
75
"description": "The cofactor has been modified. ",
@@ -126,6 +122,10 @@
126
122
"bugType": "MODIFIED_PARAMETER",
127
123
"description": "The order of the public key has been modified.",
128
124
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
125
+
},
126
+
"ModifiedCurveParameter": {
127
+
"bugType": "MODIFIED_PARAMETER",
128
+
"description": "The parameters a and b of the curve have been modified. The parameters haven been chosen so that public key or generator still are also valid points on the new curve."
0 commit comments