ed25519-dalek icon indicating copy to clipboard operation
ed25519-dalek copied to clipboard

Fast and efficient ed25519 signing and verification in Rust.

Results 57 ed25519-dalek issues
Sort by recently updated
recently updated
newest added

The least disruptive API changes might be turn `ExpandedSecretKey::sign_*()` to `pub(crate)`, leaving only the correct `KeyPair.sign_*()` API for signing to public invocation, which is always correct and not vulnerable to...

Please add a `rustfmt.toml` or something similar to ensure consistency on format/style. Every time I edit any file, there's a tons of auto formatting done by RA. I think current...

I felt this method was missing, as `Keypair` is the most useful type for signing - it should be easy to construct. Perhaps a `Keypair::from_secret_bytes` would be good as well,...

Are the potential issues described in the following link being worked on here or would they need to be addressed in curve25519-dalek or elsewhere? There is a PoC apparently developed...

Of course, ed25519-dalek does not implement encryption/decryption. However, [ecies_ed25519](https://docs.rs/ecies-ed25519/latest/ecies_ed25519/) does support encryption/decryption, but not signatures or validation. So, if I want to use the same keypair for both encryption/decryption and...

apparently some folks like to use `ed25519` with other hashers (like `keccak` and `sha3`)... to use `dalek` in place of existing libraries exporting these functions one requires a mechanism for...

allows basepoint tables to be excluded to reduce flash usage on embedded devices. this should have no impact on most users, but will require adding `features = [ "basepoint_tables" ]`...

As an alternative to the implementation in https://github.com/dalek-cryptography/ed25519-dalek/pull/201 (including unsafe methods), cc. @isislovecruft - Outstanding [bug](https://github.com/rust-lang/rust/issues/69035) in generic resolution means you sometimes need to call `::...` rather than `Type::...` which...

## What In a nutshell, this offers an opt-in way of performing some public key checks relating to small order components, without having to pay an additional point decompression. ##...

This warning implies that users of `PublicKey::from_bytes` must do separate validation before calling it. This used to be the case, but the eager decompression added in https://github.com/dalek-cryptography/ed25519-dalek/commit/8dbaf9a8d249a24a5225a1247195d4135669f608 means that `PublicKey::from_bytes(bytes).is_ok()`...