Skip to content
#

cryptography

Here are 4,536 public repositories matching this topic...

youben11
youben11 commented Apr 9, 2020

Is your feature request related to a problem? Please describe.
When we call decrypt on a tensor, we don't want to always provide the protocol if it can be known otherwise.

Describe the solution you'd like
I think that the current protocol that encrypted the tensor can be checked by looking at the child's type.

adg
adg commented Nov 16, 2018

On the Signup page, the first thing a new Upspin user sees, we provide a link to the Overview before diving into a discussion of the tools. The Overview document itself is long and certainly not required reading to get started with Upspin.

We should add a short overview of the system to the Signup page, perhaps including th

hashmap
hashmap commented Jul 22, 2019

In the past the node and the wallet were in the same repo. When the wallet was extracted into a separate repo, integration tests were moved to - https://github.com/mimblewimble/grin-wallet/tree/master/integration
It would be beneficial to provide a simple way to run integration suits as part of node tests too.
There are several possible options (there are some other for sure):

  • Move part of th
sako0938
sako0938 commented Oct 14, 2019

Background

The binaries are built with most of the build flags already set, but when building from source you must specify which tags are desired. This is an important step to building a usable binary from source.

These flags should be listed in the docs, with what their use is for the entire system, and whether or not excluding it would break the normal function of the system.

A sect

tmoravec
tmoravec commented Apr 21, 2020

When given a wrong argument, some daemon commands fail with "unknown command" error, instead of a meaningful error message.

Examples of useless error messages:

hard_fork_info abc
unknown command: hard_fork_info abc
Monero 'Carbon Chamaeleon' (v0.15.0.0-57854a3e2)
Commands:
  ...

in_peers abcd
unknown command: in_peers abcd
Monero 'Carbon Chamaeleon' (v0.15.0.0-57854a3e2)
Comm
cryptomator
infeo
infeo commented Feb 20, 2020

Summary

While Debug mode is turned on, the user may (unknowinly) leak data about the structure & content of the vault, e.g. clear text file paths. To remind the user that this can happen, we should add

  1. an clear warning indicator in the main window and
  2. add a pop-up message when debug mode is activated

Additional Context

The first time this idea was suggested was in #798

rday
rday commented Mar 2, 2020

Problem:

When you initialize a stuffer with an existing blob, the typical pattern is to write

struct s2n_blob blob;
struct s2n_stuffer stuffer;

GUARD(s2n_stuffer_init(&stuffer, &blob));
GUARD(s2n_stuffer_write(&stuffer, &blob));

This causes a memcpy to write to overlapping pages, which is undefined behavior. A workaround is to use s2n_stuffer_raw_write, but this st

brapse
brapse commented Feb 27, 2020

The blockchain v2 reactor utilizes concurrency to saturate the bottleneck of writing blocks to disk. This concurrency is internal to the reactor where the reactor itself will launch and manage internal state machines running as go-routines. This configuration makes testing difficult as we don't know when messages processed by internal state machines will be processed and when we can assert that th

mike-robertson
mike-robertson commented Oct 10, 2018

Preface: I am not an expert in encryption, so sorry for any inaccuracies with how I am describing the issue here.

In the documentation, it states:

// Note: CBC and ECB modes use PKCS#7 padding as default

Is it possible to configure what padding is used? I am working with a system where they are not expecting padding. Is that something that even makes sense/is possible?

evilaliv3
evilaliv3 commented Sep 1, 2019

While experimenting within the Globaleaks application i just find out that the binding for SSL_CTX_set1_curves_list is currently not exposed.

This would be useful in order to define a preference on the order of the curves that should be used.

The feature would result particularly important especially for the fact that it seems that OpenSSL default order seems to be ```x25519, secp256r1, x448

davidlazar
davidlazar commented May 10, 2018

Currently, with usernames, there isn't a good recovery mechanism for users that lose their keys. Originally we were thinking to let a user reset their account if they haven't extracted a key in 30 days (with no further verification), but this would lead to users losing their usernames if they go offline for an extended period.

With email addresses, we could at least verify that the user owns th

Improve this page

Add a description, image, and links to the cryptography topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the cryptography topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.