bugzilla-daemon at bugzilla.mindrot.org
2016-Jun-17 04:17 UTC
[Bug 2586] Ed25519 secret keys are 64 bytes but only 32 bytes used
https://bugzilla.mindrot.org/show_bug.cgi?id=2586
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |WONTFIX
CC| |djm at mindrot.org
--- Comment #1 from Damien Miller <djm at mindrot.org> ---
Yeah, the encoding is redundant - having the public key appended to the
private. I updated the PROTOCOL.agent file that is our best reference
for how private keys are serialised to mention this, but I don't think
we can trivially change it without breaking older OpenSSH clients,
since they check the length is what they expect.
commit 531c135409b8d8810795b1f3692a4ebfd5c9cae0
Author: djm at openbsd.org <djm at openbsd.org>
Date: Thu May 19 07:45:32 2016 +0000
upstream commit
fix type of ed25519 values
Upstream-ID: b32d0cb372bbe918ca2de56906901eae225a59b0
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
Maybe Matching Threads
- [Bug 2586] Ed25519 secret keys are 64 bytes but only 32 bytes used
- ssh-ed25519 and ecdsa-sha2-nistp256 host keys
- [Bug 2695] New: inconsistent outout of "ssh.add -l" between ed25519 and rsa keys
- [patch] ssh-keygen(1): generate Ed25519 keys when invoked without arguments
- Sign/verify data with ed25519 keys of a tinc 1.1 host
