- Apr 22, 2019
-
- Apr 18, 2019
-
-
Hubert Chathi authored
-
- Apr 17, 2019
-
-
Hubert Chathi authored
-
- Oct 23, 2018
-
-
Hubert Chathi authored
-
- Oct 02, 2018
-
-
David Baker authored
-
- Sep 25, 2018
-
-
David Baker authored
-
- Jul 04, 2018
-
- Mar 01, 2017
-
- Jan 18, 2017
-
-
Richard van der Hoff authored
- Dec 22, 2016
-
-
Richard van der Hoff authored
-
- Nov 17, 2016
-
-
manuroe authored
-
- Oct 24, 2016
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Sep 14, 2016
-
- Sep 06, 2016
-
-
Richard van der Hoff authored
-
- Sep 01, 2016
-
-
Richard van der Hoff authored
pre-1.0.0 was broken too
-
Richard van der Hoff authored
Ed25519 private keys, it turns out, have 64 bytes, not 32. We were previously generating only 32 bytes (which is all that is required to generate the public key), and then using the public key as the upper 32 bytes when generating the per-message session key. This meant that everything appeared to work, but the security of the private key was severely compromised. By way of fixes: * Use the correct algorithm for generating the Ed25519 private key, and store all 512 bits of it. * Update the account pickle format and refuse to load the old format (since we should consider it compromised). * Bump the library version, and add a function to retrieve the library version, so that applications can verify that they are linked against a fixed version of the library. * Remove the curve25519_{sign, verify} functions which were unused and of dubious quality.
-
- Jul 11, 2016
-