Skip to content

Conversation

jangko
Copy link
Contributor

@jangko jangko commented Oct 10, 2025

Although the modification only touch few lines in two functions, but because of how bearssl written, I have to pull the entire ec_p256_m64.c.

Please share your thoughts, should we still use bearssl for the time being or use other library.

With this patch, now P256verify can handle h = 0 , h = N, and r = 0 while keeping the patched function operation constant time.

EDIT: also can handle when pubkey x or y >= P; fix #3748; fix #3752

@advaita-saha
Copy link
Contributor

If the latest EEST release is passing, we can merge this
But keep the migration from bearSSL to boringSSL open as a long term solution

@advaita-saha
Copy link
Contributor

EEST looks good now 45a3d0b

@jangko jangko marked this pull request as ready for review October 14, 2025 22:22
@jangko jangko merged commit 1ae9947 into master Oct 15, 2025
18 checks passed
@jangko jangko deleted the bearssl branch October 15, 2025 02:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

update EEST test vectors to latest bearSSL secp256r1 ecdsa_verify is faulty

2 participants