Conversation
Signed-off-by: Shiwei Zhang <shizh@microsoft.com>
|
The CI tests are failing since |
Signed-off-by: Shiwei Zhang <shizh@microsoft.com>
|
I would suggest reviewing and merging PR after the |
|
Seems like this PR is on a good track, once CI is passing, and our test coverage is recovered, this seems like a great improvement |
|
@shizhMSFT, with 1.22 released, are you ready to finalize this PR? |
|
I'm not sold about this solution. IMO, we should either remove support for ECDSA curves without public component, or assume that we have to call a deprecated function. |
I agree with that.
I'm afraid of being scanned as a vulnerability by some scanners in the future although it is not.
Can you elaborate more on this? |
|
Unless you are parsing a key that is inside a signature or encryption, developers can translate keys with compressed points to ones with uncompressed points. Any library that doesn't support compressed points will need to throw if it cannot translate, because operations will fail that required both points. |
|
Thanks for the elaboration.
Do we want to go that way? |
|
Based on the above, we're going to close this PR and open a new issue for guidance. |
Resolves #168 by migrating to
crypto/ecdh.Here are notable changes:
crypto/ecdhis introduced ingo 1.21, the minimum go version is thus bumped to1.21from1.18.crypto/ecdhdoes not expose low-level elliptic curve operations, custom curves are no longer supported. Thus the related test case is removed. /cc @qmuntal