Bill Cox <waywardg...@google.com> writes: >I spent 2 weeks last year tracking down a flaky bug that only occurs once in >every 256 connection: the leading 0 byte was no longer being stripped in a >code change I ported from OpenSSL master, and only Maria DB ran random tests >enough to trigger this condition.
My self-test code includes 1K iterations of various PKC ops in mechanisms that are sensitive to leading-zero truncation (PGP springs to mind) to detect this. Without this, it's mostly blind luck as to whether your self-test hits the 1/256 one that triggers the problem. Having to design coverage tests is hard enough, but when you need to iterate them to find problems... Peter. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls