Closed mathias-arm closed 2 years ago
Thanks @mathias-arm !
Excerpt from Go 1.19 release notes:
crypto/elliptic Operating on invalid curve points (those for which the IsOnCurve method returns false, and which are never returned by Unmarshal or by a Curve method operating on a valid point) has always been undefined behavior and can lead to key recovery attacks. If an invalid point is supplied to Marshal, MarshalCompressed, Add, Double, or ScalarMult, they will now panic.
What version of the package are you using?
Commit https://github.com/veraison/ccatoken/commit/244f4b5060ad518eda193f462e4d80cd26c531ba
Does this issue reproduce with the latest release?
It is the latest commit when raising this issue.
What OS and CPU architecture are you using (
go env
)?What did you do?
What did you expect to see?
A successful test run
What did you see instead?