Closed ggutoski closed 3 years ago
The issue is caused by the fact that we currently import signatures generated by curv
into k256
. curv
does not pad scalars to 64 bytes as k256
expects. Every once in a while curve
produces a signature with a scalar that fits into 63 bytes, which causes k256
to barf. More info: https://github.com/RustCrypto/elliptic-curves/issues/323
This problem will disappear after we stop using curv
.
If you run enough tests then eventually you'll see something like this:
Seems like a bug in the
k256
library.