You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP224r1_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -122,6 +122,10 @@
122
122
"bugType": "MODIFIED_PARAMETER",
123
123
"description": "The order of the public key has been modified.",
124
124
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
125
+
},
126
+
"NoCofactor": {
127
+
"bugType": "MISSING_PARAMETER",
128
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP256r1_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -126,6 +126,10 @@
126
126
"bugType": "MODIFIED_PARAMETER",
127
127
"description": "The order of the public key has been modified.",
128
128
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
129
+
},
130
+
"NoCofactor": {
131
+
"bugType": "MISSING_PARAMETER",
132
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP320r1_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -118,6 +118,10 @@
118
118
"bugType": "MODIFIED_PARAMETER",
119
119
"description": "The order of the public key has been modified.",
120
120
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
121
+
},
122
+
"NoCofactor": {
123
+
"bugType": "MISSING_PARAMETER",
124
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP384r1_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -122,6 +122,10 @@
122
122
"bugType": "MODIFIED_PARAMETER",
123
123
"description": "The order of the public key has been modified.",
124
124
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
125
+
},
126
+
"NoCofactor": {
127
+
"bugType": "MISSING_PARAMETER",
128
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_brainpoolP512r1_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -122,6 +122,10 @@
122
122
"bugType": "MODIFIED_PARAMETER",
123
123
"description": "The order of the public key has been modified.",
124
124
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
125
+
},
126
+
"NoCofactor": {
127
+
"bugType": "MISSING_PARAMETER",
128
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp224r1_pem_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -116,6 +116,10 @@
116
116
"bugType": "MODIFIED_PARAMETER",
117
117
"description": "The order of the public key has been modified.",
118
118
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
119
+
},
120
+
"NoCofactor": {
121
+
"bugType": "MISSING_PARAMETER",
122
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp224r1_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -118,6 +118,10 @@
118
118
"bugType": "MODIFIED_PARAMETER",
119
119
"description": "The order of the public key has been modified.",
120
120
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
121
+
},
122
+
"NoCofactor": {
123
+
"bugType": "MISSING_PARAMETER",
124
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp256k1_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -118,6 +118,10 @@
118
118
"bugType": "MODIFIED_PARAMETER",
119
119
"description": "The order of the public key has been modified.",
120
120
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
121
+
},
122
+
"NoCofactor": {
123
+
"bugType": "MISSING_PARAMETER",
124
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp256r1_pem_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -124,6 +124,10 @@
124
124
"bugType": "MODIFIED_PARAMETER",
125
125
"description": "The order of the public key has been modified.",
126
126
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
127
+
},
128
+
"NoCofactor": {
129
+
"bugType": "MISSING_PARAMETER",
130
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
Copy file name to clipboardExpand all lines: testvectors_v1/ecdh_secp256r1_test.json
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -126,6 +126,10 @@
126
126
"bugType": "MODIFIED_PARAMETER",
127
127
"description": "The order of the public key has been modified.",
128
128
"effect": "If this order is used in a cryptographic primitive instead of the correct order then an invalid curve attack is possible and the private keys may leak. E.g. ECDHC in BC 1.52 suffered from this."
129
+
},
130
+
"NoCofactor": {
131
+
"bugType": "MISSING_PARAMETER",
132
+
"description": "The cofactor field is absent from the ECParameters. RFC 3279 Section 2.3.5 requires the cofactor to be present."
0 commit comments