New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

ECPy

Package Overview
Dependencies
Maintainers
1
Versions
15
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

ECPy - pypi Package Compare versions

Comparing version
1.2.1
to
1.2.3
+13
-2
PKG-INFO
Metadata-Version: 1.1
Name: ECPy
Version: 1.2.1
Version: 1.2.3
Summary: Pure Pyhton Elliptic Curve Library

@@ -58,2 +58,13 @@ Home-page: https://github.com/cslashm/ECPy

1.2.3
-----
Fix ECSchnorr when r is greater than order. Main use case is when
using a hash function with bitlength greater than curve size.
1.2.2
-----
Fix ECDSA with rfc6979. Field was used instead of order for max random.
1.2.1

@@ -77,3 +88,3 @@ -----

Declare ONE infinity point per curve.
Declare ONE infinity point per curve.
Consider global (non attached to a curve) infinity point as deprecated

@@ -80,0 +91,0 @@

@@ -50,2 +50,13 @@ ECPy

1.2.3
-----
Fix ECSchnorr when r is greater than order. Main use case is when
using a hash function with bitlength greater than curve size.
1.2.2
-----
Fix ECDSA with rfc6979. Field was used instead of order for max random.
1.2.1

@@ -69,3 +80,3 @@ -----

Declare ONE infinity point per curve.
Declare ONE infinity point per curve.
Consider global (non attached to a curve) infinity point as deprecated

@@ -72,0 +83,0 @@

+1
-3

@@ -21,3 +21,2 @@ # Copyright 2016 Cedric Mesnil, Ubinity SAS

reqs = []
if sys.version_info[0] == 2:

@@ -30,3 +29,3 @@ reqs.append('future')

setup(name='ECPy',
version='1.2.1',
version='1.2.3',
description='Pure Pyhton Elliptic Curve Library',

@@ -42,3 +41,2 @@ long_description=long_description,

package_dir={'ecpy': 'src/ecpy'},
install_requires=reqs,
classifiers=['Programming Language :: Python :: 2.7',

@@ -45,0 +43,0 @@ 'Programming Language :: Python :: 3',

@@ -310,3 +310,3 @@ WEIERSTRASS = "weierstrass"

'type': WEIERSTRASS,
'size': 192,
'size': 224,
'a': 0xD7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FC,

@@ -313,0 +313,0 @@ 'b': 0x4B337D934104CD7BEF271BF60CED1ED20DA14C08B3BB64F18A60888D,

@@ -59,6 +59,6 @@ # Copyright 2016 Cedric Mesnil <cedric.mesnil@ubinity.com>, Ubinity SAS

"""
field = pv_key.curve.field
order = pv_key.curve.order
V = None
for i in range(1,self.maxtries):
k,V = ecrand.rnd_rfc6979(msg, pv_key.d, field, hasher,V)
k,V = ecrand.rnd_rfc6979(msg, pv_key.d, order, hasher,V)
sig = self._do_sign(msg, pv_key, k, canonical)

@@ -65,0 +65,0 @@ if sig:

@@ -168,3 +168,3 @@ # Copyright 2016 Cedric Mesnil <cedric.mesnil@ubinity.com>, Ubinity SAS

G = curve.generator
size = curve.size>>3
size = (curve.size+7)//8

@@ -252,7 +252,8 @@ Q = G*k

G = pu_key.curve.generator
size = curve.size>>3
size = (curve.size+7)//8
r,s = decode_sig(sig, self.fmt)
if (r == None or r > (pow(2,size*8)-1) or
s == 0 or s >= n ) :
if (r == None or s == None or
r == 0 or
s == 0 or s >= n ):
return False

@@ -259,0 +260,0 @@ hasher = self._hasher()