Skip to content

Commit d5ef57a

Browse files
authored
ed: update VerifyingKey::from_bytes with ZIP-215 info (#704)
Removes the previous warning that points are unvalidated: they're validated using the ZIP-215 rules, which allows unreduced y-coordinates. Points are ensured valid by performing decompression, which finds a solution to the curve equation, or returns an error. Adds references to ZIP-215 and #626 which is an issue about potentially adding support for the RFC8032/NIST validation criteria in the future.
1 parent b636fb8 commit d5ef57a

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

ed25519-dalek/src/verifying.rs

+5-5
Original file line numberDiff line numberDiff line change
@@ -124,11 +124,8 @@ impl VerifyingKey {
124124

125125
/// Construct a `VerifyingKey` from a slice of bytes.
126126
///
127-
/// # Warning
128-
///
129-
/// The caller is responsible for ensuring that the bytes passed into this
130-
/// method actually represent a `curve25519_dalek::curve::CompressedEdwardsY`
131-
/// and that said compressed point is actually a point on the curve.
127+
/// Verifies the point is valid under [ZIP-215] rules. RFC 8032 / NIST point validation criteria
128+
/// are currently unsupported (see [dalek-cryptography/curve25519-dalek#626]).
132129
///
133130
/// # Example
134131
///
@@ -156,6 +153,9 @@ impl VerifyingKey {
156153
///
157154
/// A `Result` whose okay value is an EdDSA `VerifyingKey` or whose error value
158155
/// is a `SignatureError` describing the error that occurred.
156+
///
157+
/// [ZIP-215]: https://zips.z.cash/zip-0215
158+
/// [dalek-cryptography/curve25519-dalek#626]: https://github.com/dalek-cryptography/curve25519-dalek/issues/626
159159
#[inline]
160160
pub fn from_bytes(bytes: &[u8; PUBLIC_KEY_LENGTH]) -> Result<VerifyingKey, SignatureError> {
161161
let compressed = CompressedEdwardsY(*bytes);

0 commit comments

Comments
 (0)