Daniel Bleichenbacher

Results 20 comments of Daniel Bleichenbacher

I think there are two problems above. The first one is the key derivation: I.e. given a shared secret byte string to derive a key for a given key format....

I'm even surprised that such changes are actually helpful and not in fact hurtful. I.e. the current code looks like a simple case for an escape analysis. E.g. https://www.cc.gatech.edu/~harrold/6340/cs6340_fall2009/Readings/choi99escape.pdf My...

I'm working on adding more flags. Since flags are relatively new, not all the generation code has them. Not sure yet, whether that status of some test vectors should be...

On Wed, Jul 11, 2018 at 7:26 PM, David Benjamin wrote: > For BoringSSL, I think we're interested in: > > - Excluding curves we don't support; the split up...

Is there an RFC or other documentation defining the requirements? I.e., instead of trying to mix schemes, I'd rather generate separate test vectors for "Bitcoin-ECDSA". If the signatures are DER...

Thanks for the pointers. I'm generating a separate file with test vectors for "Bitcoin-ECDSA". This makes it easier to specify how an implementation should behave. Another reason is that replacing...

I have the test vectors, but I need some implementations to test against. I sometimes make mistakes, hence I don't want to publish anything without sanity checks. On Mon, Oct...

Thanks a lot. It will be removed. There are a number of bugs in the JSON schemas. Someone released the schemas and test vectors prematurely, before I even wrote sufficient...

First, I'm a bit surprised that using 512 byte blocks with AVX2 intrinsics would give optimal performance. I wouldn't expect larger than 256 byte blocks here. Adding a few longer...

On Fri, Nov 29, 2019 at 4:44 PM Mark wrote: > I meant to say ChaCha20 rather than ChaCha20-Poly1305, so that might have > confused the issue. > > See...