(This PR is on top of #13. See 96fd46d19acbe8509801075e595f4e782f497ec7 for the actual change.)
Check for invalid points during EdDSA key import (instead of allowing the key to be imported and then returning false for any verifications). This is equivalent to the ECDSA checks already done in Web Crypto in various places ("If the public/private key value is not a valid point on the Elliptic Curve identified by the namedCurve member of normalizedAlgorithm throw a DataError").
(This PR is on top of #13. See 96fd46d19acbe8509801075e595f4e782f497ec7 for the actual change.)
Check for invalid points during EdDSA key import (instead of allowing the key to be imported and then returning false for any verifications). This is equivalent to the ECDSA checks already done in Web Crypto in various places ("If the public/private key value is not a valid point on the Elliptic Curve identified by the namedCurve member of normalizedAlgorithm throw a DataError").
Preview | Diff