Skip to content
Snippets Groups Projects
  1. Apr 08, 2019
  2. Jan 23, 2019
  3. Oct 23, 2018
  4. Oct 16, 2018
  5. Oct 15, 2018
  6. Oct 13, 2018
  7. Oct 12, 2018
  8. Jul 18, 2018
  9. May 29, 2018
  10. Apr 24, 2017
  11. Apr 18, 2017
  12. Apr 04, 2017
  13. Jan 09, 2017
  14. Jan 06, 2017
  15. Oct 25, 2016
  16. Oct 20, 2016
  17. Oct 02, 2016
  18. Sep 22, 2016
  19. Sep 16, 2016
  20. Sep 13, 2016
  21. Sep 01, 2016
    • Richard van der Hoff's avatar
      Fix Ed25519 keypair generation · 0c462cff
      Richard van der Hoff authored
      Ed25519 private keys, it turns out, have 64 bytes, not 32.
      
      We were previously generating only 32 bytes (which is all that is required to
      generate the public key), and then using the public key as the upper 32 bytes
      when generating the per-message session key. This meant that everything
      appeared to work, but the security of the private key was severely compromised.
      
      By way of fixes:
      
       * Use the correct algorithm for generating the Ed25519 private key, and store
         all 512 bits of it.
      
       * Update the account pickle format and refuse to load the old format (since we
         should consider it compromised).
      
       * Bump the library version, and add a function to retrieve the library
         version, so that applications can verify that they are linked against a
         fixed version of the library.
      
       * Remove the curve25519_{sign, verify} functions which were unused and of
         dubious quality.
      0c462cff
  22. May 24, 2016
Loading