Conversation
|
I have just quickly changed the libtomcrypt in my CryptX perl bindings for the branch "some-improvements" from this PR. It failed to build (which is probably expected) https://github.com/DCIT/perl-CryptX/actions/runs/18219248768/job/51875345151 I will try to adopt CryptX to the new changes (after that we will see whether CryptX test suite reveals something). |
24f8a2f to
787e5c1
Compare
Cool, thanks!
If I'm not mistaken there are two errors [148] ff. is already caused by #524 [187] ff. is indeed caused by the API change of Both are expected, so thanks already in advance for fixing this in CryptX and testing those changes [148] https://github.com/DCIT/perl-CryptX/actions/runs/18219248768/job/51875345151#step:7:149 |
|
I have updated my perl bindings and it seems to work fine. Just one minor suggestion: please add |
5b5fec8 to
c760347
Compare
e794721 to
151a655
Compare
|
I am not sure about having: type = LTC_ECCSIG_RFC5656 (as I understand the "type" is rather a format specification not a flag defining whether to use deterministic signing) e.g. one might want LTC_ECCSIG_RFC5656 + LTC_ECCSIG_ETH27 at the same time. |
|
ad |
151a655 to
f49bec4
Compare
Yeah, we could, but that would mean that it must be initialized to -1 if one is not interested in it (which is nearly always the case). With the current implementation via a pointer, it is disabled by default, so it'd be easier to use for the majority of users. But if you think it'd be better as
I guess you're confusing RFC5656 and RFC6979 :) |
f49bec4 to
7ff585a
Compare
Oh, yes. Sorry for the noise. |
|
FYI current branch |
3f05dbf to
747b9c1
Compare
it is a segfault (memory corruption) related to |
hmm At least the tests can't reproduce it for AARCH64 with Qemu ... |
|
on cywin it fails inside |
|
The fix DCIT/perl-CryptX@cccc52b now passes tests also on cygwin + arm |
ugh, sorry! The tests seem to work fine for me. I've just pushed my WIP state with the updated macros etc. |
It could absolutely be that the generic validity checks don't handle everything correctly, I've only tested against the built-in set of tests... 😬 |
e8d9a0c to
96e49c1
Compare
|
shouldn't the |
|
The simple example I am not able to implement in the new RSA API (sorry for just a code fragment extracted from my perl bindings): |
|
I'll have a look into it later, but please remove |
It worked. But IMO a bit surprising to me (as the whole concept of key->params / check->params / ltc_rsa_op_parameters ...) Anyway, still bunch of other failures (will investigate later). |
It expects a pair of type `(unsigned char*,unsigned long)` and not `(unsigned char*,unsigned int)`. Fixes: 46fa363 ("Finish up RFC6979 ECDSA keygen") Reported-via: #699 (comment) ff. Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
Yeah, a bit, but not really. The Regular RSA keys can be used with all PKCS#1 versions. Restricted RSA keys ("PSS-keys") must only be used with PKCS#1 versions > 1.5, and come with a set of parameters. There's already |
96e49c1 to
2b65b91
Compare
Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
To be able to do a bit more, add an optional handler callback function. Additional to that, also make it possible to mark elements as optional. Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
(and you should do that too) Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
2b65b91 to
0ea222d
Compare
Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
Signed-off-by: Steffen Jaeckel <s@jaeckel.eu>
0ea222d to
369650c
Compare
I've reordered and refactored some of the commits of #697 in order to limit its scope and simplify the merge and a potential faster release of 2.0
With these changes merged I currently don't see any planned ABI or API breakage (besides #515, but that's an entirely different discussion).
This should be the last PR with intentional changes before a v2.0.0-rc1, c.f. #568