We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Here the answer is yes :)
sphinx/src/crypto/keys.rs
Line 114 in b168f70
And here too:
Lines 104 to 110 in b168f70
This is because there is no guarantee that the received bytes or scalar are valid ones wrt Curve25519.
Also, public keys must be validated when instantiated, that is, From<[u8; PUBLIC_KEY_SIZE]> should verify that the point is not the point at infinity
From<[u8; PUBLIC_KEY_SIZE]>
The text was updated successfully, but these errors were encountered:
Successfully merging a pull request may close this issue.
Here the answer is yes :)
sphinx/src/crypto/keys.rs
Line 114 in b168f70
And here too:
sphinx/src/crypto/keys.rs
Lines 104 to 110 in b168f70
This is because there is no guarantee that the received bytes or scalar are valid ones wrt Curve25519.
Also, public keys must be validated when instantiated, that is,
From<[u8; PUBLIC_KEY_SIZE]>
should verify that the point is not the point at infinityThe text was updated successfully, but these errors were encountered: