forked from indutny/elliptic
-
Notifications
You must be signed in to change notification settings - Fork 1
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Checking mergeability…
Don’t worry, you can still create the pull request.
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: etherscan-io/elliptic
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: master
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: indutny/elliptic
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: master
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 16 commits
- 26 files changed
- 7 contributors
Commits on Aug 2, 2020
-
build(deps): bump elliptic from 6.4.1 to 6.5.3 (indutny#231)
Bumps [elliptic](https://github.com/indutny/elliptic) from 6.4.1 to 6.5.3. - [Release notes](https://github.com/indutny/elliptic/releases) - [Commits](indutny/elliptic@v6.4.1...v6.5.3) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Configuration menu - View commit details
-
Copy full SHA for 8421a01 - Browse repository at this point
Copy the full SHA 8421a01View commit details -
Configuration menu - View commit details
-
Copy full SHA for e71b2d9 - Browse repository at this point
Copy the full SHA e71b2d9View commit details
Commits on Feb 2, 2021
-
ec: validate that a point before deriving keys
This update checks to make sure that the public key passed in to ECDH is a point that actually exists on the curve. This is important to prevent a twist attack that can be used to reveal the private key of a party in an ECDH operation over a number of occurances. For more details on the attack see this blog post: https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md CVE: CVE-2020-28498
Configuration menu - View commit details
-
Copy full SHA for 441b742 - Browse repository at this point
Copy the full SHA 441b742View commit details -
Configuration menu - View commit details
-
Copy full SHA for f4bc72b - Browse repository at this point
Copy the full SHA f4bc72bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 43ac7f2 - Browse repository at this point
Copy the full SHA 43ac7f2View commit details
Commits on Mar 5, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 0a78e03 - Browse repository at this point
Copy the full SHA 0a78e03View commit details -
Configuration menu - View commit details
-
Copy full SHA for 206da2e - Browse repository at this point
Copy the full SHA 206da2eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 7570078 - Browse repository at this point
Copy the full SHA 7570078View commit details
Commits on Jul 17, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 7ac5360 - Browse repository at this point
Copy the full SHA 7ac5360View commit details -
Configuration menu - View commit details
-
Copy full SHA for 03e06e1 - Browse repository at this point
Copy the full SHA 03e06e1View commit details
Commits on Aug 14, 2024
-
Configuration menu - View commit details
-
Copy full SHA for accb61e - Browse repository at this point
Copy the full SHA accb61eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 3e46a48 - Browse repository at this point
Copy the full SHA 3e46a48View commit details
Commits on Oct 26, 2024
-
fix: signature verification due to leading zeros
According to FIPS 186-5, section 6.4.2 ECDSA Signature Verification Algorithm, the hash of the message must be adjusted based on the order n of the base point of the elliptic curve: If log2(n) ≥ hashlen, set E = H. Otherwise, set E equal to the leftmost log2(n) bits of H. Unfortunately because elliptic converts messages to BN instances the reported `byteLength()` for the message can be incorrect if the message has 8 or more leading zero bits. Here we fix it by: 1. Counting leading zeroes in hex strings provided as messages 2. Counting all array entries in Array-like (e.g. Buffer) messages 3. Providing an `msgBitLength` option to both `.sign`/`.verify` to let user override the behavior Original PR: indutny#322 Credit: @Markus-MS
Configuration menu - View commit details
-
Copy full SHA for 34c8534 - Browse repository at this point
Copy the full SHA 34c8534View commit details -
Configuration menu - View commit details
-
Copy full SHA for b8a7edd - Browse repository at this point
Copy the full SHA b8a7eddView commit details
Commits on Nov 13, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 04cb6f5 - Browse repository at this point
Copy the full SHA 04cb6f5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 9b77436 - Browse repository at this point
Copy the full SHA 9b77436View commit details
Loading
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff master...master