bugzilla-daemon at bugzilla.mindrot.org
2016-Jun-17 04:17 UTC
[Bug 2586] Ed25519 secret keys are 64 bytes but only 32 bytes used
https://bugzilla.mindrot.org/show_bug.cgi?id=2586 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |WONTFIX CC| |djm at mindrot.org --- Comment #1 from Damien Miller <djm at mindrot.org> --- Yeah, the encoding is redundant - having the public key appended to the private. I updated the PROTOCOL.agent file that is our best reference for how private keys are serialised to mention this, but I don't think we can trivially change it without breaking older OpenSSH clients, since they check the length is what they expect. commit 531c135409b8d8810795b1f3692a4ebfd5c9cae0 Author: djm at openbsd.org <djm at openbsd.org> Date: Thu May 19 07:45:32 2016 +0000 upstream commit fix type of ed25519 values Upstream-ID: b32d0cb372bbe918ca2de56906901eae225a59b0 -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
Apparently Analagous Threads
- [Bug 2586] Ed25519 secret keys are 64 bytes but only 32 bytes used
- ssh-ed25519 and ecdsa-sha2-nistp256 host keys
- [Bug 2695] New: inconsistent outout of "ssh.add -l" between ed25519 and rsa keys
- [patch] ssh-keygen(1): generate Ed25519 keys when invoked without arguments
- Sign/verify data with ed25519 keys of a tinc 1.1 host