ed25519-dalek
ed25519-dalek copied to clipboard
Fast and efficient ed25519 signing and verification in Rust.
The least disruptive API changes might be turn `ExpandedSecretKey::sign_*()` to `pub(crate)`, leaving only the correct `KeyPair.sign_*()` API for signing to public invocation, which is always correct and not vulnerable to...
Please add a `rustfmt.toml` or something similar to ensure consistency on format/style. Every time I edit any file, there's a tons of auto formatting done by RA. I think current...
I felt this method was missing, as `Keypair` is the most useful type for signing - it should be easy to construct. Perhaps a `Keypair::from_secret_bytes` would be good as well,...
Are the potential issues described in the following link being worked on here or would they need to be addressed in curve25519-dalek or elsewhere? There is a PoC apparently developed...
Of course, ed25519-dalek does not implement encryption/decryption. However, [ecies_ed25519](https://docs.rs/ecies-ed25519/latest/ecies_ed25519/) does support encryption/decryption, but not signatures or validation. So, if I want to use the same keypair for both encryption/decryption and...
apparently some folks like to use `ed25519` with other hashers (like `keccak` and `sha3`)... to use `dalek` in place of existing libraries exporting these functions one requires a mechanism for...
allows basepoint tables to be excluded to reduce flash usage on embedded devices. this should have no impact on most users, but will require adding `features = [ "basepoint_tables" ]`...
As an alternative to the implementation in https://github.com/dalek-cryptography/ed25519-dalek/pull/201 (including unsafe methods), cc. @isislovecruft - Outstanding [bug](https://github.com/rust-lang/rust/issues/69035) in generic resolution means you sometimes need to call `::...` rather than `Type::...` which...
## What In a nutshell, this offers an opt-in way of performing some public key checks relating to small order components, without having to pay an additional point decompression. ##...
This warning implies that users of `PublicKey::from_bytes` must do separate validation before calling it. This used to be the case, but the eager decompression added in https://github.com/dalek-cryptography/ed25519-dalek/commit/8dbaf9a8d249a24a5225a1247195d4135669f608 means that `PublicKey::from_bytes(bytes).is_ok()`...