Added warning for using P-256

This commit is contained in:
Hannes 2022-03-23 17:00:52 +01:00
parent 50557f32db
commit 6c406867c3
2 changed files with 6 additions and 5 deletions

View file

@ -8,6 +8,8 @@
Implementation of the double ratchet system/encryption as specified by [Signal][1]. Implementation of the double ratchet system/encryption as specified by [Signal][1].
**WARNING! This implementation uses P-256 NOT Curve25519 as specified by Signal!**
The implementation follows the cryptographic recommendations provided by [Signal][2]. The implementation follows the cryptographic recommendations provided by [Signal][2].
The AEAD Algorithm uses a constant Nonce. This might be changed in the future. The AEAD Algorithm uses a constant Nonce. This might be changed in the future.
@ -118,12 +120,9 @@ assert_eq!(im_ratchet, bob_ratchet)
## Features ## Features
The crate supports a feature for better performance: ring. If feature is enabled the crate switches Currently the crate only supports one feature: ring. If feature is enabled the crate switches
to ring-compat and uses ring as backend for Sha512 Hashing. May result in slightly better performance. to ring-compat and uses ring as backend for Sha512 Hashing. May result in slightly better performance.
### WASM
For WASM support enable the feature `wasm`.
TODO: TODO:
- [x] Standard Double Ratchet - [x] Standard Double Ratchet
@ -133,6 +132,6 @@ TODO:
[2]: https://signal.org/docs/specifications/doubleratchet/#recommended-cryptographic-algorithms [2]: https://signal.org/docs/specifications/doubleratchet/#recommended-cryptographic-algorithms
[3]: https://signal.org/docs/specifications/doubleratchet/#double-ratchet-with-header-encryption [3]: https://signal.org/docs/specifications/doubleratchet/#double-ratchet-with-header-encryption
Current version: 0.3.4 Current version: 0.4.0
License: MIT License: MIT

View file

@ -1,5 +1,7 @@
//! Implementation of the double ratchet system/encryption as specified by [Signal][1]. //! Implementation of the double ratchet system/encryption as specified by [Signal][1].
//! //!
//! **WARNING! This implementation uses P-256 NOT Curve25519 as specified by Signal!**
//!
//! The implementation follows the cryptographic recommendations provided by [Signal][2]. //! The implementation follows the cryptographic recommendations provided by [Signal][2].
//! The AEAD Algorithm uses a constant Nonce. This might be changed in the future. //! The AEAD Algorithm uses a constant Nonce. This might be changed in the future.
//! //!