{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":75978021,"defaultBranch":"main","name":"ed25519-dalek","ownerLogin":"dalek-cryptography","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2016-12-08T21:49:17.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/35540388?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1691854679.0","currentOid":""},"activityList":{"items":[{"before":"58a967f6fb28806a21180c880bbec4fdeb907aef","after":"02001d8c3422fb0314b541fdb09d04760f7ab4ba","ref":"refs/heads/main","pushedAt":"2023-08-12T16:08:19.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"Added archival notice (#311)","shortMessageHtmlLink":"Added archival notice (#311)"}},{"before":null,"after":"67c758c3d9ac0746ba4902374bfc224b6ecae655","ref":"refs/heads/archive","pushedAt":"2023-08-12T15:37:59.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"Added archival notice","shortMessageHtmlLink":"Added archival notice"}},{"before":"9b166b75e0bb0c22bd782665f63638efef72556a","after":"58a967f6fb28806a21180c880bbec4fdeb907aef","ref":"refs/heads/main","pushedAt":"2023-06-24T03:53:11.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"chore: Release 2.0.0-rc.3 (#307)\n\n* chore: Release 2.0.0-rc.3\r\n\r\n* cargo update -p curve25519-dalek\r\n\r\n* Removed some old backend selection prose and env vars\r\n\r\n---------\r\n\r\nCo-authored-by: Michael Rosenberg ","shortMessageHtmlLink":"chore: Release 2.0.0-rc.3 (#307)"}},{"before":"4afbf09e1cb15bedc6f79c25cec388b5cd436f0d","after":"9b166b75e0bb0c22bd782665f63638efef72556a","ref":"refs/heads/main","pushedAt":"2023-06-12T04:06:00.371Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"Update to new `Scalar` API (#293)\n\n* Updated to new curve25519 scalar API\r\n\r\n* Made ExpandedSecretKey.scalar_bytes unclamped; clamping occurs in all scalar-point multiplication\r\n\r\n* Added legacy compat deprecation notice\r\n\r\n* Removed deprecation notice on check_scalar\r\n\r\n* Removed unnecessary unwraps","shortMessageHtmlLink":"Update to new Scalar API (#293)"}},{"before":"90f10ed0965ce3b5292700481351b40d9135c428","after":"4afbf09e1cb15bedc6f79c25cec388b5cd436f0d","ref":"refs/heads/main","pushedAt":"2023-05-15T04:50:39.092Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"Add `hazmat` module with `ExpandedSecretKey`, `raw_sign`, `raw_sign_prehashed` (#299)\n\n* Added raw_sign() and raw_sign_prehashed() functions\r\n\r\n* Renamed `nonce` to `hash_prefix` in signing because it's really not a nonce\r\n\r\n* Moved raw signing to hazmat module\r\n\r\n* impl From for VerifyingKey\r\n\r\n* Brought back ExpandedSecretKey; made raw_* functions take it as input\r\n\r\n* Added remaining features to docs.rs feature set\r\n\r\n* Removed redundant ExpandedSecretKey def; made raw signing use a generic CtxDigest\r\n\r\n* Implemented raw_verify with generic CtxDigest\r\n\r\n* Implemented raw_verify_prehashed with generic MsgDigest and CtxDigest\r\n\r\n* Wrote hazmat tests; fixed errors; switched ordering of MsgDigest and CtxDigest\r\n\r\n* Updated changelog\r\n\r\n* ExpandedSecretKey::from_bytes takes an array and is now infallible\r\n\r\n* Add TODO comment for split_array_ref\r\n\r\n* Added from_slice and TryFrom<&[u8]> for ExpandedSecretKey\r\n\r\n---------\r\n\r\nCo-authored-by: Tony Arcieri ","shortMessageHtmlLink":"Add hazmat module with ExpandedSecretKey, raw_sign, `raw_sign_p…"}},{"before":"68a3518a89084aa8894a631380f072293c992046","after":null,"ref":"refs/heads/ed25519-dalek/rename-expanded-secret-key-nonce","pushedAt":"2023-04-14T00:46:28.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"}},{"before":null,"after":"68a3518a89084aa8894a631380f072293c992046","ref":"refs/heads/ed25519-dalek/rename-expanded-secret-key-nonce","pushedAt":"2023-04-13T21:50:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Rename `ExpandedSecretKey::nonce` => `prefix`\n\nThe name \"nonce\" doesn't really capture the role of this value, which\nunfortunately seems to resist a pithy name across all of the specs\nincluding RFC8032, which refers to it as `h_b, ..., h_(2b-1)`. A nonce\nis used once whereas this value is used repeatedly for every message\nsigned.\n\nIts usage is a prefix concatenated onto the message to be hashed and\nused to compute `r`, so given that, this commit renames it to `prefix`.","shortMessageHtmlLink":"Rename ExpandedSecretKey::nonce => prefix"}},{"before":"80aac08c1ca4a4a14912707650413b59c989e79a","after":"90f10ed0965ce3b5292700481351b40d9135c428","ref":"refs/heads/main","pushedAt":"2023-04-11T17:19:37.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Fix a typo (#300)","shortMessageHtmlLink":"Fix a typo (#300)"}},{"before":"c8c9f2998916fca4761b0b64a8aec0c1ce120c37","after":"80aac08c1ca4a4a14912707650413b59c989e79a","ref":"refs/heads/main","pushedAt":"2023-03-30T19:00:52.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"Fixed repoerted speedup/slowdown percentages in README benchmarks (#297)","shortMessageHtmlLink":"Fixed repoerted speedup/slowdown percentages in README benchmarks (#297)"}},{"before":"25a9b87908671e8514fe7a40dfa97c39a43f355c","after":null,"ref":"refs/heads/scalar-and-montgomery-point-conversions","pushedAt":"2023-03-30T17:30:21.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"}},{"before":"5014c91270cb7abcf147663f7ae0bd1971c11d75","after":"c8c9f2998916fca4761b0b64a8aec0c1ce120c37","ref":"refs/heads/main","pushedAt":"2023-03-30T17:29:36.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"Add `Scalar` and `MontgomeryPoint` conversions (#296)\n\n* Add `Scalar` and `MontgomeryPoint` conversions\r\n\r\n- Adds `SigningKey::to_scalar` to extract the private scalar\r\n- Adds `VerifyingKey::to_montgomery` to map the verifying key's\r\n `EdwardsPoint` to a `MontgomeryPoint`\r\n- Also adds corresponding `From<&T>` impls which call the inherent\r\n methods.\r\n\r\nThis is useful for systems which are keyed using Ed25519 keys which\r\nwould like to use X25519 for D-H. Having inherent methods means it's\r\npossible to call these methods without having to import `Scalar` and\r\n`MontgomeryPoint` from `curve25519-dalek`.\r\n\r\nThis is of course a bit circuitous: we could just multiply `Scalar` by\r\n`EdwardsPoint` and use the resulting `EdwardsPoint` as the D-H shared\r\nsecret, however it seems many protocols have adopted this approach of\r\nmapping to `MontgomeryPoint` and using that for the shared secret, since\r\nX25519 is traditionally used for ECDH with Curve25519.\r\n\r\n* Add reference to eprint 2021/509\r\n\r\n* Basic X25519 Diffie-Hellman test","shortMessageHtmlLink":"Add Scalar and MontgomeryPoint conversions (#296)"}},{"before":"361b66eac493688f1360e5f8f401797f60971240","after":"25a9b87908671e8514fe7a40dfa97c39a43f355c","ref":"refs/heads/scalar-and-montgomery-point-conversions","pushedAt":"2023-03-30T16:18:20.675Z","pushType":"push","commitsCount":1,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Basic X25519 Diffie-Hellman test","shortMessageHtmlLink":"Basic X25519 Diffie-Hellman test"}},{"before":"239eecb2f9419675de1fe20459065519af82f66d","after":"361b66eac493688f1360e5f8f401797f60971240","ref":"refs/heads/scalar-and-montgomery-point-conversions","pushedAt":"2023-03-30T14:32:44.230Z","pushType":"push","commitsCount":1,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Add reference to eprint 2021/509","shortMessageHtmlLink":"Add reference to eprint 2021/509"}},{"before":"f831f83c83aabef6a741eb58bce61ce2797afc7e","after":"239eecb2f9419675de1fe20459065519af82f66d","ref":"refs/heads/scalar-and-montgomery-point-conversions","pushedAt":"2023-03-30T14:25:33.525Z","pushType":"push","commitsCount":1,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Remove From impls\n\nAs discussed on #296","shortMessageHtmlLink":"Remove From impls"}},{"before":"1720e4243fdd434abdc1f74088923473435e7300","after":"f831f83c83aabef6a741eb58bce61ce2797afc7e","ref":"refs/heads/scalar-and-montgomery-point-conversions","pushedAt":"2023-03-29T21:02:33.422Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Add `Scalar` and `MontgomeryPoint` conversions\n\n- Adds `SigningKey::to_scalar` to extract the private scalar\n- Adds `VerifyingKey::to_montgomery` to map the verifying key's\n `EdwardsPoint` to a `MontgomeryPoint`\n- Also adds corresponding `From<&T>` impls which call the inherent\n methods.\n\nThis is useful for systems which are keyed using Ed25519 keys which\nwould like to use X25519 for D-H. Having inherent methods means it's\npossible to call these methods without having to import `Scalar` and\n`MontgomeryPoint` from `curve25519-dalek`.\n\nThis is of course a bit circuitous: we could just multiply `Scalar` by\n`EdwardsPoint` and use the resulting `EdwardsPoint` as the D-H shared\nsecret, however it seems many protocols have adopted this approach of\nmapping to `MontgomeryPoint` and using that for the shared secret, since\nX25519 is traditionally used for ECDH with Curve25519.","shortMessageHtmlLink":"Add Scalar and MontgomeryPoint conversions"}},{"before":"fffbfc9b6f66a7ec08333e4ca1ced6289bd028f7","after":null,"ref":"refs/heads/ed25519/v2.2","pushedAt":"2023-03-29T21:02:09.967Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"}},{"before":"6ef3d63844e97048b13b24378a76ab7ebdfd9b16","after":null,"ref":"refs/heads/verifying-key-field-names","pushedAt":"2023-03-29T21:01:58.598Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"}},{"before":null,"after":"1720e4243fdd434abdc1f74088923473435e7300","ref":"refs/heads/scalar-and-montgomery-point-conversions","pushedAt":"2023-03-29T17:59:25.190Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Add `Scalar` and `MontgomeryPoint` conversions\n\n- Adds `SigningKey::to_scalar` to extract the private scalar\n- Adds `VerifyingKey::to_montgomery` to map the verifying key's\n `EdwardsPoint` to a `MontgomeryPoint`\n- Also adds corresponding `From<&T>` impls which call the inherent\n methods.\n\nThis is useful for systems which are keyed using Ed25519 keys which\nwould like to use X25519 for D-H. Having inherent methods means it's\npossible to call these methods without having to import `Scalar` and\n`MontgomeryPoint` from `curve25519-dalek`.\n\nThis is of course a bit circuitous: we could just multiply `Scalar` by\n`EdwardsPoint` and use the resulting `EdwardsPoint` as the D-H shared\nsecret, however it seems many protocols have adopted this approach of\nmapping to `MontgomeryPoint` and using that for the shared secret, since\nX25519 is traditionally used for ECDH with Curve25519.","shortMessageHtmlLink":"Add Scalar and MontgomeryPoint conversions"}},{"before":"7901b21e065ecdbd275a285d7eb51f1d3ce3dcdd","after":"5014c91270cb7abcf147663f7ae0bd1971c11d75","ref":"refs/heads/main","pushedAt":"2023-03-26T15:23:14.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"chore: Release 2.0.0-rc.2 (#295)\n\nCo-authored-by: Michael Rosenberg ","shortMessageHtmlLink":"chore: Release 2.0.0-rc.2 (#295)"}},{"before":"2931c688eb11341a1145e257bc41d8ecbe36277c","after":"7901b21e065ecdbd275a285d7eb51f1d3ce3dcdd","ref":"refs/heads/main","pushedAt":"2023-03-26T08:11:23.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"Improve diagnostics when key being deserializing is too long (#294)","shortMessageHtmlLink":"Improve diagnostics when key being deserializing is too long (#294)"}},{"before":"9577d1e3225297a9bad91dbc19b43fd5e3256281","after":"2931c688eb11341a1145e257bc41d8ecbe36277c","ref":"refs/heads/main","pushedAt":"2023-03-21T19:45:33.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Fix `serde` / `no_std` incompatibility \n\nCo-authored-by: ryan kurte \r\nCo-authored-by: Vlad Semenov ","shortMessageHtmlLink":"Fix serde / no_std incompatibility"}},{"before":"7dc1bbd85527306e67bc4741968bd79ea1ae25b1","after":"9577d1e3225297a9bad91dbc19b43fd5e3256281","ref":"refs/heads/main","pushedAt":"2023-03-21T05:46:43.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"rozbb","name":"Michael Rosenberg","path":"/rozbb","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/752802?s=80&v=4"},"commit":{"message":"Add no_std to CI (#289)\n\n* Add no_std to CI\r\n\r\n* Add serde to no_std feature test\r\n\r\n* Try out cargo hack\r\n\r\n* No serde - expect success\r\n\r\n* Add build for no-default-features\r\n\r\n* Exclude default","shortMessageHtmlLink":"Add no_std to CI (#289)"}},{"before":"64b26ad07448637d0116951e70dcffcbd5816e3d","after":"7dc1bbd85527306e67bc4741968bd79ea1ae25b1","ref":"refs/heads/main","pushedAt":"2023-03-18T15:22:16.202Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"tarcieri","name":"Tony Arcieri","path":"/tarcieri","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/797?s=80&v=4"},"commit":{"message":"Remove two unnecessary `into_iter` (#290)","shortMessageHtmlLink":"Remove two unnecessary into_iter (#290)"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAADaXOWeQA","startCursor":null,"endCursor":null}},"title":"Activity · dalek-cryptography/ed25519-dalek"}