Skip to main content

audit

SL-1: The reverse SBox are generated in pre-runtime this means it's only calculated once.

SL-2: The crypt calls crypt_parse which calls the real AES function. The difference between crypt and crypt_parse is that crypt_parse overwrites the input data but crypt copies it if the input and out data does not overlap.

SL-3: NativeSecp256k1 context constructor change to use SECP256K1_CONTEXT_NONE

SL-4: NativeSecp256k1.createKeyPair reduced to one function

SL-5: The sign function can not be called with a zero-length aux_random anymore. If the aux_random is not specified then the aux_random is now generated internally.

SL-6: Note. According to secp256k1.h documentation for secp256k1_context_create it is recommended to call secp256k1_context_randomize after calling secp256k1_context_create.

secp256k1_context_randomize removed from createECDHSecret, pubTweak

secp256k1_context_randomize added to the cloneContext

SL-7: privkey renamed to keypair (Fits the Schnorr implementation)

SL-8: BIP39 now support validateMnemonic

SL-9: Checksum calculated with the deriveChecksumBits function and the last word of the mnemonic-sentences is generated from the checksum. The checksum is also checked in the mnemonicToEntropy function.

SL-10: checkMnemonicNumber has been removed

SL-11: mnemonicNumbers is deprecated and should be removed when the dependencies has been removed.

SL-12: entropy function calculates the raw entropies raw list of word-number. This should not be used directly only to analyze problems. mnemonicToEntropy should be used instead.

SL-13: opCall is deprecated and should be updated when we have solved the dependencies.

SL-14: NFKD normalisation been added to the salt inside the mnemonicToEntropy to normalise the mnemonic-sentence.

SL-15: entropyToMnemonic has been added

SL-16: generateMnemonic checks that the number of words is a multiple of 3 and the entropy is between 16 and 32 bytes, meanng from 12 to 24 words. validateMnemonic has also been added.

SL-17 & SL-18: We havn't found a good solution of this yet.