-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Interfacing with Rust, part 2 #267
Conversation
umbral/signing.py
Outdated
# Try `r` | ||
q = (rs - ge) * inv_r | ||
if q == public_key.point(): | ||
return False |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Noticed this yesterday during the walkthrough - how come this returns False?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This function returns a recovery byte, which can only be \x00
or \x01
, so I return a boolean flag instead.
a173e62
to
48faa64
Compare
856b508
to
40474db
Compare
Have to regenerate the vectors because kfrag signature is now created with a different DST
…ng_pk to verifying_pk
…of KeyFrag.verify()
Have to rebuild vectors again.
8d88535
to
d1a37c4
Compare
More changes based on the needs of
nucypher
. Based on top of #263Synchronized with nucypher/rust-umbral@3cba902
generate_kfrags()
take it instead of the secret keysigning_pk
->verifying_pk
)generate_kfrags()
topre.py
(where the rest of high-level API resides)openssl.py
CurvePoint.from_affine()
is removed