-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Derive public key from a known good private key #14
Comments
It doesn't work on .NET standard? /cc @BurningEnlightenment |
Right, there's a lot of WIP but nothing concrete/importable for .NET Standard 2.0; I assume the challenge is transparent packaging and resolution of native libraries at runtime? If there's some specific set of tasks off of master that I can help with, let me know.
… On Sep 24, 2017, at 6:29 PM, Frank Denis ***@***.***> wrote:
Also: https://github.com/bfriesen/LibsodiumDotNetStandardSpike /cc @bfriesen
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub, or mute the thread.
|
@jedisct1 Thanks for the pointers. I was able to get @BurningEnlightenment's fork building with a few caveats. After that work, as it turns out, I didn't actually need Caveats:
So, it works, but it's far from something I could probably get away with shipping in production. I also don't know how libsodium-net will protect, for example, an attacker replacing libsodium itself dynamically with their own interop assemblies. If there is a timeline for the .NET Standard stream reaching NuGet let me know, and if there are any work items I can pitch in to help on if there is something back this fork, since it appears mostly ready to go. FYI, here is my hybrid Chaos.NaCl/libsodium-net class:
|
libsodium also requires 64 bytes for the secret key ( |
Hello,
Since libsodium-net does not currently work on .NET Standard (https://github.com/adamcaudill/libsodium-net/pull/155), I'm using your library for Ed25519.
However, I can't use it to recreate a public key given a known good private key, for the reasons listed here: https://bitcoin.stackexchange.com/a/42456; it may be that this implementation is just missing the method
crypto_sign_ed25519_sk_to_seed
, is that correct?The text was updated successfully, but these errors were encountered: