You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 18, 2022. It is now read-only.
I just cut a new release of the p256 (which it appears you're one of the only current downstream users of) which now features a high-level ECDH interface:
It looks like it should fit your current ECDH usage patterns, but if not, please let me know!
Also I'm very interested in ways to make this implementation both work with current protocols but also be more misuse-resistant in terms of feeding ECDH shared secrets into a KDF. I'm not super familiar with how Bluetooth LE AKE works, but if that's something that interests you, please let me know!
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
I just cut a new release of the
p256
(which it appears you're one of the only current downstream users of) which now features a high-level ECDH interface:https://docs.rs/p256/0.4.0/p256/ecdh/index.html
It looks like it should fit your current ECDH usage patterns, but if not, please let me know!
Also I'm very interested in ways to make this implementation both work with current protocols but also be more misuse-resistant in terms of feeding ECDH shared secrets into a KDF. I'm not super familiar with how Bluetooth LE AKE works, but if that's something that interests you, please let me know!
The text was updated successfully, but these errors were encountered: