On 1/27/21 11:12 AM, Nym Seddon wrote:
Hi Stefan,
In the recommendations from SafeCurves (https://safecurves.cr.yp.to/twist.html)
there are a number of attacks against ECC twists. Two of those attacks are
relevant against NIST P192: invalid-curve attacks and invalid-curve attacks
against ladd
Herbert Xu wrote:
> > I've pulled this into my keys-next branch.
>
> David, please drop them because there are issues with the Crypto API
> bits.
Okay, dropped.
David
On Wed, Jan 27, 2021 at 02:22:08PM +, David Howells wrote:
>
> I've pulled this into my keys-next branch.
David, please drop them because there are issues with the Crypto API
bits.
Thanks,
--
Email: Herbert Xu
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.
Hi Stefan,
In the recommendations from SafeCurves (https://safecurves.cr.yp.to/twist.html)
there are a number of attacks against ECC twists. Two of those attacks are
relevant against NIST P192: invalid-curve attacks and invalid-curve attacks
against ladders.
Both attacks can be mitigated by ch
Stefan Berger wrote:
> This series of patches adds support for x509 certificates signed by a CA
> that uses NIST p256 or p192 keys for signing. It also adds support for
> certificates where the public key is a NIST p256 or p192 key. The math
> for ECDSA signature verification is also added.
>
>
Stefan Berger wrote:
> k=$(keyctrl newring test @u)
keyctl - but I can fix that.
David
From: Stefan Berger
This series of patches adds support for x509 certificates signed by a CA
that uses NIST p256 or p192 keys for signing. It also adds support for
certificates where the public key is a NIST p256 or p192 key. The math
for ECDSA signature verification is also added.
Since self-si