Migrate secp256k1 backend from libsecp256k1 to k256#152
Conversation
Agent-Logs-Url: https://github.com/ecies/rs/sessions/33c626ef-c373-4d69-be29-9b2fb8d3ed92 Co-authored-by: kigawas <4182346+kigawas@users.noreply.github.com>
Agent-Logs-Url: https://github.com/ecies/rs/sessions/33c626ef-c373-4d69-be29-9b2fb8d3ed92 Co-authored-by: kigawas <4182346+kigawas@users.noreply.github.com>
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #152 +/- ##
==========================================
Coverage 100.00% 100.00%
==========================================
Files 12 12
Lines 665 790 +125
==========================================
+ Hits 665 790 +125 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
@copilot push the coverage to 100% |
Agent-Logs-Url: https://github.com/ecies/rs/sessions/b0858736-9672-4eba-94c3-88a61def52aa Co-authored-by: kigawas <4182346+kigawas@users.noreply.github.com>
Agent-Logs-Url: https://github.com/ecies/rs/sessions/b0858736-9672-4eba-94c3-88a61def52aa Co-authored-by: kigawas <4182346+kigawas@users.noreply.github.com>
|
@copilot review the code from cryptography perspective. Reference: https://raw.githubusercontent.com/ashutosh1206/Crypton/refs/heads/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md |
Agent-Logs-Url: https://github.com/ecies/rs/sessions/e3e7110b-c93f-4c29-b619-b9936c756171 Co-authored-by: kigawas <4182346+kigawas@users.noreply.github.com>
Reviewed in 9b4cb61. I don’t see an invalid-curve issue in the secp256k1 path: attacker-controlled keys are parsed via Warning Firewall rules blocked me from connecting to one or more addresses (expand for details)I tried to connect to the following addresses, but was blocked by firewall rules:
If you need me to access, download, or install something from one of these locations, you can either:
|
|
@copilot do a final pass code review |
Agent-Logs-Url: https://github.com/ecies/rs/sessions/a9642d85-a57c-4b95-ac3e-4e093ccfae1c Co-authored-by: kigawas <4182346+kigawas@users.noreply.github.com>
Final pass done in f2eba2f. I found one CI-only test portability issue in the secp256k1 error tests under the no-default-features/std feature matrix and fixed it; the production secp256k1 migration still looks good from a crypto perspective. Re-validated with |
|
@copilot why we need PublicKeyFormat? Is it justified? |
It’s justified mainly for API compatibility, not because the current crate internals need it. Before the migration, |
Uh oh!
There was an error while loading. Please reload this page.