--- Log opened Tue Jan 14 00:00:06 2020 00:11 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Remote host closed the connection] 00:12 -!- ddustin [~ddustin@unaffiliated/ddustin] has joined #secp256k1 00:12 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Remote host closed the connection] 00:47 -!- jonatack [~jon@2a01:e0a:53c:a200:bb54:3be5:c3d0:9ce5] has quit [Ping timeout: 252 seconds] 00:52 -!- ddustin [~ddustin@unaffiliated/ddustin] has joined #secp256k1 01:25 -!- jonatack [~jon@213.152.161.249] has joined #secp256k1 03:04 -!- jonatack [~jon@213.152.161.249] has quit [Ping timeout: 240 seconds] 03:06 -!- jonatack [~jon@213.152.161.69] has joined #secp256k1 04:27 -!- belcher [~belcher@unaffiliated/belcher] has joined #secp256k1 06:04 -!- lukedashjr [~luke-jr@unaffiliated/luke-jr] has joined #secp256k1 06:05 -!- luke-jr [~luke-jr@unaffiliated/luke-jr] has quit [Ping timeout: 240 seconds] 06:09 -!- lukedashjr is now known as luke-jr 06:51 -!- jonatack [~jon@213.152.161.69] has quit [Ping timeout: 260 seconds] 08:17 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Remote host closed the connection] 08:18 -!- ddustin [~ddustin@unaffiliated/ddustin] has joined #secp256k1 08:18 < ddustin> Can anyone recommend a good super basic library for hmac-sha and PBKDF? 08:35 -!- jonatack [~jon@2a01:e0a:53c:a200:bb54:3be5:c3d0:9ce5] has joined #secp256k1 08:37 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Remote host closed the connection] 08:38 -!- ddustin [~ddustin@unaffiliated/ddustin] has joined #secp256k1 08:42 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Ping timeout: 240 seconds] 09:37 -!- afk11 [~afk11@gateway/tor-sasl/afk11] has quit [Ping timeout: 240 seconds] 09:40 -!- afk11 [~afk11@gateway/tor-sasl/afk11] has joined #secp256k1 12:16 -!- ddustin [~ddustin@unaffiliated/ddustin] has joined #secp256k1 12:46 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Remote host closed the connection] 12:46 -!- ddustin [~ddustin@unaffiliated/ddustin] has joined #secp256k1 15:31 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Remote host closed the connection] 15:31 -!- ddustin [~ddustin@unaffiliated/ddustin] has joined #secp256k1 15:35 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Ping timeout: 240 seconds] 17:13 -!- belcher [~belcher@unaffiliated/belcher] has quit [Quit: Leaving] 18:44 < gmaxwell> lol. time to send my told-you-so to DJB. 18:45 < gmaxwell> (MSFT vulnerability: certificate includes the generator, so you can pick the generator so you know the DL of any chosen point. A few years back I had a debate in email with DJB about his 'safercurves' page where I argued that it had to include choice of generator, due to this property. ... he did eventually include something) 18:49 < sipa> ah 23:24 -!- jonatack [~jon@2a01:e0a:53c:a200:bb54:3be5:c3d0:9ce5] has quit [Ping timeout: 272 seconds] 23:29 -!- jonatack [~jon@2a01:e0a:53c:a200:bb54:3be5:c3d0:9ce5] has joined #secp256k1 23:43 -!- jonatack [~jon@2a01:e0a:53c:a200:bb54:3be5:c3d0:9ce5] has quit [Ping timeout: 260 seconds] 23:53 < nsh> ty gmaxwell 23:55 < nsh> is it correct to surmise that an attacker supplying their own generator with params to an ECC code-signing certificate can spoof any public signing entity? --- Log closed Wed Jan 15 00:00:08 2020