Correct method to generate a Curve25519 keypair
Alexander Lyon
arlyon at me.com
Thu Jun 28 15:56:52 CEST 2018
A little late, but as a follow up to this, I managed to find the solution. The generated keys are valid but Curve25519 is little-endian and printing it to a buffer is big-endian so the hex dumped by gcry_mpi_dump is in reverse. It was as easy as reversing the buffer when appropriate. This allowed me to extract the public key binary.
Alex
> On 24 Jun 2018, at 09:42, Stef Bon <stefbon at gmail.com> wrote:
>
> Op za 23 jun. 2018 om 08:06 schreef Stef Bon <stefbon at gmail.com>:
>>
>>
>> (key-data
>> (public-key
>> (ecc
>> (curve Ed25519)
>> (flags eddsa)
>> (q q-value)))
>> (private-key
>> (ecc
>> (curve Ed25519)
>> (flags eddsa)
>> (q q-value)
>> (d d-value))))
>>
>
> Hi,
> I found that the curve ed25519 has to start with a capital: Ed25519 thus.
> Stef
>
> _______________________________________________
> Gcrypt-devel mailing list
> Gcrypt-devel at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gcrypt-devel
More information about the Gcrypt-devel
mailing list